• Title/Summary/Keyword: Leakage scenarios

Search Result 86, Processing Time 0.025 seconds

Validity Review on Classification of Explosion Hazardous Area using Hypothetic Volume (가상체적을 이용한 폭발위험장소 구분의 타당성 검토)

  • Yim, Ji-Pyo;Chung, Chang-Bock
    • Journal of the Korean Society of Safety
    • /
    • v.29 no.6
    • /
    • pp.68-75
    • /
    • 2014
  • It is very important to classify explosion hazardous area (EHA) suitably and to use proper explosion-proof electric installations for facilities using flammable gases and liquids. In the past, various examples in the Notification of Ministry of Employment and Labor were referred to in classifying EHA. But, at present, many companies use the hypothetical volume in Korean Standards (KS). This study reviews the validity of EHA classification based on the hypothetical volume by comparing the calculated radii of EHA with those obtained by a consequence analysis program called PHAST and a mathematical approach in British Standards (BS). The radii of EHA by the hypothetical volume were found to be slightly larger than those by the other two methods. This was attributed to rather conservative uses of a safety factor(k) and a correction factor(f) for availability of ventilation in calculating the hypothetical volume. Since the differences are not so conspicuous, however, it is concluded that the hypothetical volume in KS is a valid means for the classification of EHA. This study also presents a table of the radii of EHA for easy reference by small-scale companies using city gas, C3-LPG and flammable liquid(toluene), respectively. The table consists of 25 leakage scenarios corresponding to combinations of 5 pipe(nozzle) sizes and 5 operating conditions for each flammable gas and liquid.

CFD Approach on Gas Explosion for SIL in Gas Fuelled Ship

  • Kim, Ki-Pyoung;Kim, You-Taek;Kang, Ho-Keun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.2
    • /
    • pp.195-200
    • /
    • 2015
  • It is envisaged that the effect of increasingly stricter air emissions legislation implemented through IMO Annex VI and other local air quality controls, together with favorable financial conditions for the use of natural gas instead of liquid fuel oil as a bunker fuel, will see an increasing number of DF engine and single gas fuel engine applications to LNG carriers and other vessel types. As part of provision for the current international movements in the shipping industry to reduce GHG emission in air, new design concepts using natural gas as an alternative fuel source for propulsion of large commercial vessels, have been developed by shipyards and research institutes. In this study, an explosion analysis for a gas supply machinery room of LNG-fuelled container ship is presented. The gas fuel concept is employed for the high pressure ME-GI where a leakage in the natural gas double supply pipe to the engines is the subject of the present analysis. The consequences of a leak are simulated with computational fluid dynamics (CFD) tools to predict typical leak scenarios, gas cloud sizes and possible explosion pressures. In addition, capacity of the structure which is subject to explosion loads has been assessed.

Numerical evaluation of buried composite and steel pipe structures under the effects of gravity

  • Toh, William;Tan, Long Bin;Tse, Kwong Ming;Raju, Karthikayen;Lee, Heow Pueh;Tan, Vincent Beng Chye
    • Steel and Composite Structures
    • /
    • v.26 no.1
    • /
    • pp.55-66
    • /
    • 2018
  • In this paper, the response of an underground fibreglass reinforced plastic (FRP) composite pipe system subjected to realistic loading scenarios that may be experienced by an actual buried pipeline is investigated. The model replicates an arbitrary site with a length of buried pipeline, passing through a $90^{\circ}$ bend and into a valve pit. Various loading conditions, which include effects of pipe pressurization, differences in response between stainless steel and fibreglass composite pipes and severe loss of bed-soil support are studied. In addition to pipe response, the resulting soil stresses and ground settlement are also analysed. Furthermore, the locations of potential leakage and burst have also been identified by evaluating the contact pressures at the joints and by comparing stresses to the pipe hoop and axial failure strengths.

An Integrated On-Line Diagnostic System for the NORS Process of Maiden Reactor Project: The Design Concept and Lessons Learned

  • Kim, Inn-Seock
    • Nuclear Engineering and Technology
    • /
    • v.32 no.3
    • /
    • pp.261-273
    • /
    • 2000
  • During an extensive review made as part of the Integrated Diagnosis System project of the Maiden Reactor Project, MOAS (Maryland Operator Advisory System) was identified as one of the most thorough systems developed thus far. MOAS is an integrated on-line diagnosis system that encompasses diverse functional aspects that are required for an effective process disturbance management: (1) intelligent process monitoring and alarming, (2) on-line sensor data validation and sensor failure diagnosis, (3) on-line hardware (besides sensors) failure diagnosis, and (4) real-time corrective measure synthesis. The MOAS methodology was used at the Maiden Man-Machine Laboratory HAMMLAB of the OECD Maiden Reactor Project. The performance of MOAS, developed in G2 real-time expert system shell for the high-pressure preheaters of the NORS process in the HAMMLAB, was tested against a variety of transient scenarios, including failures of the control valves and sensors, and tube leakage of the preheaters. These tests showed that MOAS successfully carried out its intended functions, i.e., quickly recognizing an occurring disturbance, correctly diagnosing its cause, and presenting advice on its control to the operator. The lessons learned and insights gained during the implementation and performance tests also are discussed.

  • PDF

Iris Ciphertext Authentication System Based on Fully Homomorphic Encryption

  • Song, Xinxia;Chen, Zhigang;Sun, Dechao
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.599-611
    • /
    • 2020
  • With the application and promotion of biometric technology, biometrics has become more and more important to identity authentication. In order to ensure the privacy of the user, the biometrics cannot be stored or manipulated in plaintext. Aiming at this problem, this paper analyzes and summarizes the scheme and performance of the existing biometric authentication system, and proposes an iris-based ciphertext authentication system based on fully homomorphic encryption using the FV scheme. The implementation of the system is partly powered by Microsoft's SEAL (Simple Encrypted Arithmetic Library). The entire system can complete iris authentication without decrypting the iris feature template, and the database stores the homomorphic ciphertext of the iris feature template. Thus, there is no need to worry about the leakage of the iris feature template. At the same time, the system does not require a trusted center for authentication, and the authentication is completed on the server side directly using the one-time MAC authentication method. Tests have shown that when the system adopts an iris algorithm with a low depth of calculation circuit such as the Hamming distance comparison algorithm, it has good performance, which basically meets the requirements of real application scenarios.

Safety Analysis of Potential Hazards at Hydrogen Refueling Station (수소충전소 잠재적 위험에 대한 안전성해석)

  • Park, Woo-Il;Kim, Dong-Hwan;Kang, Seung-Kyu
    • Journal of the Korean Institute of Gas
    • /
    • v.25 no.4
    • /
    • pp.43-48
    • /
    • 2021
  • This study was conducted using FLACS, a specialized gas accident analysis program. Hydrogen refueling stations subject of safety analysis, consist of compression facilities, storage tanks, and hydrogen piping. The safety analysis of potential risk factors was conducted after reflecting the design specifications of major facilities and components, environmental conditions around hydrogen refueling stations, etc. As of 2021, about 70 refueling stations in Korea are available, and 1,200 are scheduled to be introduced in the next 2040. To prepare for possible accidents caused by potential hazards for the safe distribution of hydrogen refueling stations, we intend to derive hydrogen leakage diffusion scenarios and review their safety.

Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing

  • Lin, Te-Yuan;Fuh, Chiou-Shann
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5654-5668
    • /
    • 2018
  • Driven by security and real-time demands of Internet of Things (IoT), the timing of fog computing and edge computing have gradually come into place. Gateways bear more nearby computing, storage, analysis and as an intelligent broker of the whole computing lifecycle in between local devices and the remote cloud. In fog computing, the edge broker requires X-aware capabilities that combines software programmability, stream processing, hardware optimization and various connectivity to deal with such as security, data abstraction, network latency, service classification and workload allocation strategy. The prosperous of Field Programmable Gate Array (FPGA) pushes the possibility of gateway capabilities further landed. In this paper, we propose a software-defined gateway (SDG) scheme for fog computing paradigm termed as Fog Computing Zero-Knowledge Gateway that strengthens data protection and resilience merits designed for industrial internet of things or highly privacy concerned hybrid cloud scenarios. It is a proxy for fog nodes and able to integrate with existing commodity gateways. The contribution is that it converts Privacy-Enhancing Technologies rules into provable statements without knowing original sensitive data and guarantees privacy rules applied to the sensitive data before being propagated while preventing potential leakage threats. Some logical functions can be offloaded to any programmable micro-controller embedded to achieve higher computing efficiency.

Examination on Autonomous Recovery Algorithm of Piping System (배관 체계 자율 복구 알고리즘 비교, 분석 및 고찰)

  • Yang, Dae Won;Lee, Jeung-hoon;Shin, Yun-Ho
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.4
    • /
    • pp.1-11
    • /
    • 2021
  • Piping systems comprising pumps and valves are essential in the power plant, oil, and defense industry. Their purpose includes a stable supply of the working fluid or ensuring the target system's safe operation. However, piping system accidents due to leakage of toxic substances, explosions, and natural disasters are prevalent In addition, with the limited maintenance personnel, it becomes difficult to detect, isolate, and reconfigure the damage of the piping system and recover the unaffected area. An autonomous recovery piping system can play a vital role under such circumstances. The autonomous recovery algorithms for the piping system can be divided into low-pressure control algorithms, hydraulic resistance control algorithms, and flow inventory control algorithms. All three methods include autonomous opening/closing logic to isolate damaged areas and recovery the unaffected area of piping systems. However, because each algorithm has its strength and weakness, appropriate application considering the overall design, vital components, and operating conditions is crucial. In this regard, preliminary research on algorithm's working principle, its design procedures, and expected damage scenarios should be accomplished. This study examines the characteristics of algorithms, the design procedure, and working logic. Advantages and disadvantages are also analyzed through simulation results for a simplified piping system.

A Study on a Method for Detecting Leak Holes in Respirators Using IoT Sensors

  • Woochang Shin
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.378-385
    • /
    • 2023
  • The importance of wearing respiratory protective equipment has been highlighted even more during the COVID-19 pandemic. Even if the suitability of respiratory protection has been confirmed through testing in a laboratory environment, there remains the potential for leakage points in the respirators due to improper application by the wearer, damage to the equipment, or sudden movements in real working conditions. In this paper, we propose a method to detect the occurrence of leak holes by measuring the pressure changes inside the mask according to the wearer's breathing activity by attaching an IoT sensor to a full-face respirator. We designed 9 experimental scenarios by adjusting the degree of leak holes of the respirator and the breathing cycle time, and acquired respiratory data for the wearer of the respirator accordingly. Additionally, we analyzed the respiratory data to identify the duration and pressure change range for each breath, utilizing this data to train a neural network model for detecting leak holes in the respirator. The experimental results applying the developed neural network model showed a sensitivity of 100%, specificity of 94.29%, and accuracy of 97.53%. We conclude that the effective detection of leak holes can be achieved by incorporating affordable, small-sized IoT sensors into respiratory protective equipment.

Toxic Concentration(T-LOC) Endpoint Distance Study for Fire Brigade Protection in Response to Chemical Accidents (화학사고 초기대응 소방대 보호를 위한 독성농도(T-LOC) 끝점거리 연구)

  • Jong Chan Yun;Chul Hee Cho;Jeong Hun Won
    • Journal of the Korean Society of Safety
    • /
    • v.38 no.6
    • /
    • pp.60-71
    • /
    • 2023
  • The purpose of this study is to propose a quantitative toxicity endpoint distance suitable for the initial response of firefighters by comparing and analyzing the commonly applied toxic level of concern (T-LOC), specifically emergency response planning guidelines (ERPG), acute exposure guideline levels (AEGL), and immediately dangerous to life or health (IDLH). This is to protect the fire brigade, which responds to toxic chemical accidents first during the golden time. Using areal locations of hazardous atmospheres, a damage prediction program, the amount of leakage for both acidic and basic substances, along with the endpoint distance, were analyzed for alternative accident and worst-case accident scenarios. The results showed that the toxicity endpoint distance, serving as a compromise between Level-3 and Level-2 of T-LOC, was longer than ERPG-3 and shorter than ERPG-2 with IDLH, while its values were analyzed in the order of ERPG-2, AEGL-2, IDLH, AEGL-3, and ERPG-3. It is suggested that the application of IDLH in an emergency (red card) and ERPG-2 endpoint distance in a non-emergency (non-red card) can be utilized for the initial response of the fire brigade.