• Title/Summary/Keyword: Emergency power

Search Result 744, Processing Time 0.024 seconds

The Japan Health Physics Society Guideline on Dose Monitoring for the Lens of the Eye

  • Yokoyama, Sumi;Tsujimura, Norio;Hashimoto, Makoto;Yoshitomi, Hiroshi;Kato, Masahiro;Kurosawa, Tadahiro;Tatsuzaki, Hideo;Sekiguchi, Hiroshi;Koguchi, Yasuhiro;Ono, Koji;Akiyoshi, Masahumi;Kunugita, Naoki;Natsuhori, Masahiro;Natsume, Yoshinori;Nabatame, Kuniaki;Kawashima, Tsunenori;Takagi, Shunji;Ohno, Kazuko;Iwai, Satoshi
    • Journal of Radiation Protection and Research
    • /
    • v.47 no.1
    • /
    • pp.1-7
    • /
    • 2022
  • Background: In Japan, new regulations that revise the dose limit for the lens of the eye (hereafter the lens), operational quantities, and measurement positions for the lens dose were enforced in April 2021. Based on the international safety standards, national guidelines, the results of the Radiation Safety Research Promotion Fund of the Nuclear Regulation Authority, and other studies, the Working Group of Radiation Protection Standardization Committee, the Japan Health Physics Society (JHPS) developed a guideline for radiation dose monitoring for the lens. Materials and Methods: The Working Group of the JHPS discussed the criteria of non-uniform exposure and the management criteria set not to exceed the dose limit for the lens. Results and Discussion: In July 2020, the JHPS guideline was published. The guideline consists of three parts: main text, explanations, and 26 examples. In the questions, the corresponding answers were prepared, and specific examples were provided to enable similar cases to be addressed. Conclusion: With the development of the guideline on radiation dose monitoring of the lens, radiation managers and workers will be able to smoothly comply with revised regulations and optimize radiation protection.

Development of a Server-independent System to Identify and Communicate Fire Information and Location Tracking of Evacuees (화재정보 확인과 대피자 위치추적을 위한 서버 독립형 시스템 개발)

  • Lee, Chijoo;Lee, Taekwan
    • Journal of the Korea Institute of Building Construction
    • /
    • v.21 no.6
    • /
    • pp.677-687
    • /
    • 2021
  • If a fire breaks out in a building, occupants can evacuate more rapidly if they are able to identify the location of the fire, the exits, and themselves. This study derives the requirements of system development, such as distance non-limitation, a non-additional device, a non-centralized server system, and low power for an emergency, to identify information about the fire and the location of evacuees. The objective is to receive and transmit information and reduce the time and effort of the database for location tracking. Accordingly, this study develops a server-independent system that collects information related to a building fire and an evacuee's location and provides information to the evacuee on their mobile device. The system is composed of a transmitting unit to disseminate fire location information and a mobile device application to determine the locations of the fire and the evacuee. The developed system can contribute to reducing the damage to humans because evacuees can identify the location of the fire, exits, and themselves regardless of the impaired server system by fire, the interruption of power source, and the evacuee's location. Furthermore, this study proposes a theoretical basis for reducing the effort required for database construction of the k-nearest neighbor fingerprint.

Analysis of the Chinese Navy's Offensive Strategy for the West Sea and the Development Direction of the Korean Navy's Response Strategy (중국해군의 공세적 서해(西海) 진출 전략 분석과 한국해군의 대응전략 발전방향)

  • Kim, Nam-su
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.1-35
    • /
    • 2023
  • The purpose of this study is to present the direction of development of our navy's response strategy through analysis at the ends, ways, and means level of the Chinese navy's offensive strategy for the West Sea. As a result of the analysis, at the ends level, the Chinese Navy's offensive strategy for the West Sea strategy is being linked to a grand strategy to protect maritime rights and achieve maritime power between the U.S. and China competition, at the ways level, the Chinese Navy is expected to create a foundation for the international community to recognize the West Sea as China's inland sea through "routine entry" and "exercise authority", and in case of emergency, it will try to secure sea control in the West Sea in a short period of time by blocking Korea's maritime transportation route based on the overwhelming preemptive attack capability of aircraft carriers. At the means level, it is accelerating the construction of aircraft carrier warfare units and improving its ability to engage long-range missiles. As a direction of development of the Korean Navy's response strategy in response to this, first, Establishment and Development of National Maritime Security Strategy in conjunction with the Korean Indo-Pacific Strategy. Second, it proposes the development of the concept of effective security operations for the east sea area of the West Sea intermediate line, and third, the development of the concept of combat performance and capacity building to strengthen survival and lethality.

  • PDF

Exploring the power of physics-informed neural networks for accurate and efficient solutions to 1D shallow water equations (물리 정보 신경망을 이용한 1차원 천수방정식의 해석)

  • Nguyen, Van Giang;Nguyen, Van Linh;Jung, Sungho;An, Hyunuk;Lee, Giha
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.12
    • /
    • pp.939-953
    • /
    • 2023
  • Shallow water equations (SWE) serve as fundamental equations governing the movement of the water. Traditional numerical approaches for solving these equations generally face various challenges, such as sensitivity to mesh generation, and numerical oscillation, or become more computationally unstable around shock and discontinuities regions. In this study, we present a novel approach that leverages the power of physics-informed neural networks (PINNs) to approximate the solution of the SWE. PINNs integrate physical law directly into the neural network architecture, enabling the accurate approximation of solutions to the SWE. We provide a comprehensive methodology for formulating the SWE within the PINNs framework, encompassing network architecture, training strategy, and data generation techniques. Through the results obtained from experiments, we found that PINNs could be an accurate output solution of SWE when its results were compared with the analytical method. In addition, PINNs also present better performance over the Artificial Neural Network. This study highlights the transformative potential of PINNs in revolutionizing water resources research, offering a new paradigm for accurate and efficient solutions to the SVE.

Low price type inspection and monitoring system of lithium ion batteries for hybrid vessels (하이브리드 선박용 리튬 배터리의 저가형 감시시스템 구현)

  • Kwon, Hyuk-joo;Kim, Min-kwon;Lee, Sung-geun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.1
    • /
    • pp.28-33
    • /
    • 2016
  • Batteries are used for main power engine in the fields such as mobiles, electric vehicles and unmanned submarines, for starter and lamp driver in general automotive, for emergency electric source in ship. These days, lead-acid and the lithium ion batteries are increasingly used in the fields of the secondary battery, and the lead-acid battery has a low price and safety comparatively, The lithium ion battery has a high energy density, excellent output characteristics and long life, whereas it has the risk of explosion by reacting with moisture in the air. But Recently, due to the development of waterproof, fireproof, dustproof technology, lithium batteries are widely used, particularly, because their usages are getting wider enough to be used as a power source for hybrid ship and electric propulsion ship, it is necessary to manage more strictly. Hybrid ship has power supply units connected to the packets to produce more than 500kWh large power source, and therefore, A number of the communication modules and wires need to implement the wire inspection and monitor system(WIIMS) that allows monitoring server to transmit detecting voltage, current and temperature data, which is required for the management of the batteries. This paper implements a low price type wireless inspection and monitoring system(WILIMS) of the lithium ion battery for hybrid vessels using BLE wireless communication modules and power line modem( PLM), which have the advantages of low price, no electric lines compared to serial communication inspection systems(SCIS). There are state of charge(SOC), state of health(SOH) in inspection parts of batteries, and proposed system will be able to prevent safety accidents because it allows us to predict life time and make a preventive maintenance by checking them at regular intervals.

Aspect of the chief of state guard EMP (Electro Magnetic Pulse) protection system for the consideration (국가원수 경호적 측면에서의 EMP(Electro Magnetic Pulse) 방호 시스템에 대한 고찰)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.37-66
    • /
    • 2014
  • In recent years, with the development of computers and electronics, electronics and communication technology in a growing and each part is dependent on the cross-referencing makes all electronic equipment is obsolete due to direct or indirect damage EMP. Korea and the impending standoff North Korea has a considerable level of technologies related to the EMP, EMP weapons you already have or in a few years, the development of EMP weapons will complete. North Korea launched a long-range missile and conducted a nuclear test on several occasions immediately after, when I saw the high-altitude nuclear blackmail has been strengthening the outright offensive nuclear EMP attacks at any time and practical significance for the EMP will need offensive skills would improve. At this point you can predict the damage situation of Korea's security reality that satisfy the need, more than anything else to build a protective system of the EMP. The scale of the damage that unforeseen but significant military damage and socio-economic damage and fatalities when I looked into the situation which started out as a satellite communications systems and equipment to attack military and security systems and transportation, finance, national emergency system, such as the damage elsewhere. In General, there is no direct casualties reported, but EMP medical devices that rely on lethal damage to people who can show up. In addition, the State power system failure due to a power supply interruption would not have thought the damage would bring State highly dependent on domestic power generation of nuclear plants is a serious nuclear power plant accident in the event of a blackout phenomenon can lead to the plant's internal problems should see a forecast. First of all, a special expert Committee of the EMP, the demand for protective facilities and equipment and conduct an investigation, he takes fits into your budget is under strict criteria by configuring the contractors should be sifting through. He then created the Agency for verification of performance EMP protection after you have verified the performance of maintenance, maintenance, safety and security management, design and construction company organized and systematic process Guard facilities or secret communications equipment and perfect for the EMP, such as protective equipment maneuver system should take.

  • PDF

Rapid Detection of Radioactive Strontium in Water Samples Using Laser-Induced Breakdown Spectroscopy (LIBS) (Laser-Induced Breakdown Spectroscopy (LIBS)를 이용한 방사성 스트론튬 오염물질에 대한 신속한 모니터링 기술)

  • Park, Jin-young;Kim, Hyun-a;Park, Kihong;Kim, Kyoung-woong
    • Economic and Environmental Geology
    • /
    • v.50 no.5
    • /
    • pp.341-352
    • /
    • 2017
  • Along with Cs-137 (half-life: 30.17 years), Sr-90 (half-life: 28.8 years) is one of the most important environmental monitoring radioactive elements. Rapid and easy monitoring method for Sr-90 using Laser-Induced Breakdown Spectroscopy (LIBS) has been studied. Strontium belongs to a bivalent alkaline earth metal such as calcium and has similar electron arrangement and size. Due to these similar chemical properties, it can easily enter into the human body through the food chain via water, soil, and crops when leaked into the environment. In addition, it is immersed into the bone at the case of human influx and causes the toxicity for a long time (biological half-life: about 50 years). It is a very reductive and related with the specific reaction that makes wet analysis difficult. In particular, radioactive strontium should be monitored by nuclear power plants but it is very difficult to be analysed from high-cost problems as well as low accuracy of analysis due to complicated analysis procedures, expensive analysis equipment, and a pretreatment process of using massive chemicals. Therefore, we introduce the Laser-Induced Breakdown Spectroscopy (LIBS) analysis method that analyzes the elements in the sample using the inherent spectrum by generating plasma on the sample using pulse energy, and it can be analyzed in a few seconds without preprocessing. A variety of analytical plates for samples were developed to improve the analytical sensitivity by optimizing the laser, wavelength, and time resolution. This can be effectively applied to real-time monitoring of radioactive wastewater discharged from a nuclear power plant, and furthermore, it can be applied as an emergency monitoring means such as possible future accidents at a nuclear power plants.

End to End Model and Delay Performance for V2X in 5G (5G에서 V2X를 위한 End to End 모델 및 지연 성능 평가)

  • Bae, Kyoung Yul;Lee, Hong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.1
    • /
    • pp.107-118
    • /
    • 2016
  • The advent of 5G mobile communications, which is expected in 2020, will provide many services such as Internet of Things (IoT) and vehicle-to-infra/vehicle/nomadic (V2X) communication. There are many requirements to realizing these services: reduced latency, high data rate and reliability, and real-time service. In particular, a high level of reliability and delay sensitivity with an increased data rate are very important for M2M, IoT, and Factory 4.0. Around the world, 5G standardization organizations have considered these services and grouped them to finally derive the technical requirements and service scenarios. The first scenario is broadcast services that use a high data rate for multiple cases of sporting events or emergencies. The second scenario is as support for e-Health, car reliability, etc.; the third scenario is related to VR games with delay sensitivity and real-time techniques. Recently, these groups have been forming agreements on the requirements for such scenarios and the target level. Various techniques are being studied to satisfy such requirements and are being discussed in the context of software-defined networking (SDN) as the next-generation network architecture. SDN is being used to standardize ONF and basically refers to a structure that separates signals for the control plane from the packets for the data plane. One of the best examples for low latency and high reliability is an intelligent traffic system (ITS) using V2X. Because a car passes a small cell of the 5G network very rapidly, the messages to be delivered in the event of an emergency have to be transported in a very short time. This is a typical example requiring high delay sensitivity. 5G has to support a high reliability and delay sensitivity requirements for V2X in the field of traffic control. For these reasons, V2X is a major application of critical delay. V2X (vehicle-to-infra/vehicle/nomadic) represents all types of communication methods applicable to road and vehicles. It refers to a connected or networked vehicle. V2X can be divided into three kinds of communications. First is the communication between a vehicle and infrastructure (vehicle-to-infrastructure; V2I). Second is the communication between a vehicle and another vehicle (vehicle-to-vehicle; V2V). Third is the communication between a vehicle and mobile equipment (vehicle-to-nomadic devices; V2N). This will be added in the future in various fields. Because the SDN structure is under consideration as the next-generation network architecture, the SDN architecture is significant. However, the centralized architecture of SDN can be considered as an unfavorable structure for delay-sensitive services because a centralized architecture is needed to communicate with many nodes and provide processing power. Therefore, in the case of emergency V2X communications, delay-related control functions require a tree supporting structure. For such a scenario, the architecture of the network processing the vehicle information is a major variable affecting delay. Because it is difficult to meet the desired level of delay sensitivity with a typical fully centralized SDN structure, research on the optimal size of an SDN for processing information is needed. This study examined the SDN architecture considering the V2X emergency delay requirements of a 5G network in the worst-case scenario and performed a system-level simulation on the speed of the car, radius, and cell tier to derive a range of cells for information transfer in SDN network. In the simulation, because 5G provides a sufficiently high data rate, the information for neighboring vehicle support to the car was assumed to be without errors. Furthermore, the 5G small cell was assumed to have a cell radius of 50-100 m, and the maximum speed of the vehicle was considered to be 30-200 km/h in order to examine the network architecture to minimize the delay.

A Study on How to Cope with the Abusive Call on On-demand Bonds (독립적 보증과 그 부당한 청구에 대한 대응방안 연구)

  • KIM, Seung-Hyeon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.69
    • /
    • pp.261-301
    • /
    • 2016
  • Recently the abusive calls on on-demand bonds have been a critical issue among many engineering and construction companies in Korea. On-demand bond is referred to as an independent guarantee in the sense that the guarantee is independent from its underlying contract although it was issued based on such underlying contract. For this reason, the issuing bank is not required to and/or entitled to look into whether there really is a breach of underlying contract in relation to the call on demand-bonds. Due to this kind of principle of independence, the applicant has to run the risk of the on demand bond being called by the beneficiary without due grounds. Only where the call proves to be fraudulent or abusive in a very clear way, the issuing bank would not be obligated to pay the bond proceeds for the call on on-demand bonds. In order to prevent the issuing bank from paying the proceeds under the on-demand bond, the applicant usually files with its competent court an application for injunction prohibiting the beneficiary from calling against the issuing bank. However, it is in practice difficult for the applicant to prove the beneficiary's call on the bond to be fraudulent since the courts in almost all the jurisdictions of advanced countries require very strict and objective evidences such as the documents which were signed by the owner (beneficiary) or any other third party like the engineer. There is another way of preventing the beneficiary from calling on the bond, which is often utilized especially in the United Kingdom or Western European countries such as Germany. Based upon the underlying contract, the contractor which is at the same time the applicant of on-demand bond requests the court to order the owner (the beneficiary) not to call on the bond. In this case, there apparently seems to be no reason why the court should apply the strict fraud rule to determine whether to grant an injunction in that the underlying legal relationship was created based on a construction contract rather than a bond. However, in most jurisdictions except for United Kingdom and Singapore, the court also applies the strict fraud rule on the ground that the parties promised to make the on-demand bond issued under the construction contract. This kind of injunction is highly unlikely to be utilized on the international level because it is very difficult in normal situations to establish the international jurisdiction towards the beneficiary which will be usually located outside the jurisdiction of the relevant court. This kind of injunction ordering the owner not to call on the bond can be rendered by the arbitrator as well even though the arbitrator has no coercive power for the owner to follow it. Normally there would be no arbitral tribunal existing at the time of the bond being called. In this case, the emergency arbitrator which most of the international arbitration rules such as ICC, LCIA and SIAC, etc. adopt can be utilized. Finally, the contractor can block the issuing bank from paying the bond proceeds by way of a provisional attachment in case where it also has rights to claim some unpaid interim payments or damages. This is the preservative measure under civil law system, which the lawyers from common law system are not familiar with. As explained in this article, it is very difficult to block the issuing bank from paying in response to the bond call by the beneficiary even if the call has no valid ground under the underlying construction contract. Therefore, it is necessary for the applicants who are normally engineering and construction companies to be prudent to make on-demand bonds issued. They need to take into account the creditability of the project owner as well as trustworthiness of the judiciary system of the country where the owner is domiciled.

  • PDF

A Study on Construction and Application of Nuclear Grade ESF ACS Simulator (원자력등급 ESF 공기정화계통 시뮬레이터 제작 및 활용에 관한 연구)

  • Lee, Sook-Kyung;Kim, Kwang-Sin;Sohn, Soon-Hwan;Song, Kyu-Min;Lee, Kei-Woo;Park, Jeong-Seo;Hong, Soon-Joon;Kang, Sun-Haeng
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.8 no.4
    • /
    • pp.319-327
    • /
    • 2010
  • A nuclear plant ESF ACS simulator was designed, built, and verified to perform experiment related to ESF ACS of nuclear power plants. The dimension of 3D CAD model was based on drawings of the main control room(MCR) of Yonggwang units 5 and 6. The CFD analysis was performed based on the measurement of the actual flow rate of ESF ACS. The air flowing in ACS was assumed to have $30^{\circ}C$ and uniform flow. The flow rate across the HEPA filter was estimated to be 1.83 m/s based on the MCR ACS flow rate of 12,986 CFM and HEPA filter area of 9 filters having effective area of $610{\times}610mm^2$ each. When MCR ACS was modeled, air flow blocking filter frames were considered for better simulation of the real ACS. In CFD analysis, the air flow rate in the lower part of the active carbon adsorber was simulated separately at higher than 7 m/s to reflect the measured value of 8 m/s. Through the CFD analyses of the ACSes of fuel building emergency ventilation system, emergency core cooling system equipment room ventilation cleanup system, it was confirmed that all three EFS ACSes can be simulated by controlling the flow rate of the simulator. After the CFD analysis, the simulator was built in nuclear grade and its reliability was verified through air flow distribution tests before it was used in main tests. The verification result showed that distribution of the internal flow was uniform except near the filter frames when medium filter was installed. The simulator was used in the tests to confirm the revised contents in Reg. Guide 1.52 (Rev. 3).