• Title/Summary/Keyword: Operation key

Search Result 1,728, Processing Time 0.023 seconds

Assessment on Aging Management of Delayed Neutron Monitoring System Tubing for Continued Operation of Wolsong Unit 1 (월성1호기 계속운전 관련 결함연료위치탐지계통 배관의 열화관리평가)

  • Song, Myung Ho;Kim, Hong Key;Lee, Young Ho
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.7 no.2
    • /
    • pp.14-20
    • /
    • 2011
  • The end of design lifetime for Wolsong unit 1 will be reached on 20th November in 2012. So the license renewal documents for the continuous operation of Wolsong unit 1 is under reviewing now. Major components of primary system such as pressure tubes, feeder pipes including delayed neutron monitoring system tubing are being replaced and many components of secondary system are also being repaired. In this paper, the assessment on the wear degradation of delayed neutron monitoring system tubing(on the other hand, DN tube was called) was performed for the ageing management of the same component. The wear defects of this component was one of causes that resulted in heavy water leakage accidents. Therefore design specifications of Wolsong uint 1 and heavy water leakage accidents of pressurized heavy water reactors were reviewed and causes of wear defect for DN tubes were analyzed. Wear propagation equations based on the heavy water leakage history were made and the proper repairing time was possible to be expected if the continued operation was considered. Finally design change items of DN tubes that were conducted for the long term operation of Wolsong unit 1 are introduced.

Performance Analysis of a Statistical CFB Encryption Algorithm for Cryptographic Synchronization Method in the Wireless Communication Networks (무선 통신망 암호동기에 적합한 Statistical CFB 방식의 암호 알고리즘 성능 분석)

  • Park Dae-seon;Kim Dong-soo;Kim Young-soo;Yoon Jang-hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1419-1424
    • /
    • 2005
  • This paper suggests a new cipher mode of operation which can recover cryptographic synchronization. First, we study the typical cipher modes of operation, especially focused on cryptographic synchronization problems. Then, we suggest a statistical cipher-feedback mode of operation. We define the error sources mathmatically and simulate propagation errors caused by a bit insertion or bit deletion. In the simulation, we compare the effects of changing the synchronization pattern length and feedback key length. After that, we analyze the simulation results with the calculated propagation errors. finally. we evaluate the performance of the statistical cipher-feedback mode of operation and recommand the implementation considerations.

Development of the Regulatory Guidelines for Continued Operation of CANDU Reactor in Korea (CANDU형 원전 계속운전 평가지침서 개발)

  • Choi, Young-Hwan;Kim, Hong-Key
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.34 no.4
    • /
    • pp.495-499
    • /
    • 2010
  • In this paper, the regulatory guidelines for the continued operation of the CANDU reactor in Korea were introduced. Wolsong Unit 1, which is a CANDU 600 reactor in Korea, will reach its design life of 30 years in 2012. A licensee who wants to operate a nuclear power plant beyond its design life should submit reports of periodic safety reviews (PSRs) conducted on the basis of 11 safety factors. In addition, the licensee should provide the following: (1) scoping and screening results for aging management, (2) aging management program, (3) TLAA, including the continued operation term, (4) operation-experience feedback, and (5) important safety-research results. In this study, 54 regulatory guidelines for the five above-mentioned items for the CANDU reactor in Korea were developed.

Development of Regulatory Technology on Aging for Continued Operation of Wolsong Unit 1 (월성1호기 계속운전 경년열화 규제기술 개발)

  • Kim, Hong Key;Song, Myung Ho;Nho, Seung Hwan;Kim, Se Chang
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.7 no.4
    • /
    • pp.57-62
    • /
    • 2011
  • As NPPs' operating times increase, the integrity of nuclear components is continually degraded due to aging effects of systems, structures and components. In addition, for the case of continued operation beyond design life, additional aging effects occurred during the extended operating period lead to more degradation of the integrity of nuclear components. Therefore, it is very important to mange and evaluate the aging to secure the safety of NPPs. Wolsong unit 1 is approaching to its design life of 30 years in 2012. The license renewal documents for continued operation of Wolsong unit 1 Is under reviewing now. In this paper, regulatory technologies for continued operation of Wolsong unit 1 developed by KINS will be introduced. That technologies include the safety review guidelines, regulatory guides for aging management program and regulatory program for audit calculation.

EXTENSION OF OPERATIONAL LIFE-TIME OF WWER-440/213 TYPE UNITS AT PAKS NUCLEAR POWER PLANT

  • Katona, Tamas Janos;Ratkai, Sandor
    • Nuclear Engineering and Technology
    • /
    • v.40 no.4
    • /
    • pp.269-276
    • /
    • 2008
  • Operational license of WWER-440/213 units at Paks NPP, Hungary is limited to the design lifetime of 30 years. Prolongation by additional 20 years of the operational lifetime is feasible. Moreover, enhancement of the reactor thermal power by 8% will increase both the net power output and the competitiveness of the plant. Paks NPP is a pioneer considering the power up-rate and preparation of long-term operation of WWER-440/213 design. Systematic preparatory work for long-term operation of Paks NPP has been started in 2000. A regulatory framework and a comprehensive engineering practice have been developed. According to the authors view, creation of a gapless engineering system via consequent application of best practices, and feed-back of experiences together with proper consideration of WWER-440/V213 features are the decisive elements of ensuring the safety of long-term operation. That systematic engineering approach is in the focus of recent paper. Key elements of justification and measures for ensuring the safety of long-term operation of Paks NPP WWER-440/213 units are identified and discussed. These are the assessment of plant condition and review of adequacy of ageing management programmes, also the review, validation and reconstitution of time limited ageing analyses as core tasks of licence renewal.

Retrieval methodology for similar NPP LCO cases based on domain specific NLP

  • No Kyu Seong ;Jae Hee Lee ;Jong Beom Lee;Poong Hyun Seong
    • Nuclear Engineering and Technology
    • /
    • v.55 no.2
    • /
    • pp.421-431
    • /
    • 2023
  • Nuclear power plants (NPPs) have technical specifications (Tech Specs) to ensure that the equipment and key operating parameters necessary for the safe operation of the power plant are maintained within limiting conditions for operation (LCO) determined by a safety analysis. The LCO of Tech Specs that identify the lowest functional capability of equipment required for safe operation for a facility must be complied for the safe operation of NPP. There have been previous studies to aid in compliance with LCO relevant to rule-based expert systems; however, there is an obvious limit to expert systems for implementing the rules for many situations related to LCO. Therefore, in this study, we present a retrieval methodology for similar LCO cases in determining whether LCO is met or not met. To reflect the natural language processing of NPP features, a domain dictionary was built, and the optimal term frequency-inverse document frequency variant was selected. The retrieval performance was improved by adding a Boolean retrieval model based on terms related to the LCO in addition to the vector space model. The developed domain dictionary and retrieval methodology are expected to be exceedingly useful in determining whether LCO is met.

Development of a system dynamics computer model to simulate the operational effects of the new environmental technology certification system (환경신기술인증제도의 운영효과를 모의하기 위한 시스템다이내믹스 컴퓨터 모델의 개발)

  • Kim, Taeyoung;Park, Suwan
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.34 no.2
    • /
    • pp.105-114
    • /
    • 2020
  • In this study, based on the System Dynamics (SD) methodology, the interrelationship between the factors inherent in the operation of the New Technology Certification System (NTCS) in Korea was identified by a causal map containing a feedback loop mechanism in connection with 'new technology development investment', 'commercialization of new technology', and 'sales by new technology'. This conceptualized causal map was applied to the simulation of the operations of the New Excellent Technology and Environmental Technology Verification System (NET&ETV) run by the Ministry of Environment among various NTCSs in Korea. A SD computer simulation model was developed to analyze and predict the operational performance of the NET&ETV in terms of key performance indices such as 'sales by new technology'. Using this model, we predicted the future operational status the NET&ETV and found a policy leverage that greatly influences the operation of the NET&ETV. Also the sensitivity of the key indicators to changes in the external variables in the model was analyzed to find policy leverage.

The Analysis of Cipher Padding Problem for Message Recovery Security Function of Honey Encryption (허니암호의 메시지 복구보안 기능을 위한 암호패딩 문제점 분석)

  • Ji, Changhwan;Yoon, Jiwon
    • Journal of KIISE
    • /
    • v.44 no.6
    • /
    • pp.637-642
    • /
    • 2017
  • Honey Encryption (HE) is a technique to overcome the weakness of a brute-force attack of the existing password-based encryption (PBE). By outputting a plausible plaintext even if the wrong key is entered, it provides message recovery security which an attacker can tolerate even if the attacker tries a brute-force attack against a small entropy secret key. However, application of a cipher that requires encryption padding to the HE present a bigger problem than the conventional PBE method. In this paper, we apply a typical block cipher (AES-128) and a stream cipher (A5 / 1) to verify the problem of padding through the analysis of the sentence frequency and we propose a safe operation method of the HE.

A Study on the Development of a University-based Institutional Repository Operational Model for Scholarly Information Distribution (학술정보 유통을 위한 기관 레포지터리 운영모형 개발 연구)

  • Jang, Kum-Yeoun
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.1
    • /
    • pp.93-109
    • /
    • 2013
  • This study extracted quality control factors for invigorating Institutional Repository operations, and re-extracted key quality control factors with significant influence among them. Furthermore, this study developed an operating model reflecting an improvement scheme of these key quality control factors, and estimated how much effective the operating model was to the user. As a result of inspecting satisfaction for IR operating model and the general system, it has been found that librarians' satisfaction for them is higher than that of the general user. Korea's universities prefer a proxy submission mode by librarians to a self-archiving submission mode by writers. Therefore, based on the operation model developed by this study, it is suggested that Institutional Repository operation can be actively invigorated with librarians of these universities as central players.

A Study on the Design and the Performance Improvement of IP Access Control Protocol for External Mobile terminal (외부 이동단말의 접근제어를 위한 IP 프로토콜 설계 및 성능 개선에 관한 연구)

  • 박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.41-48
    • /
    • 2004
  • Access control protocol have verified security of external mobile terminal that access to inner information sever at Ubiquitous ages. In this paper, I would design for If Access Control Protocol of considering operation time when make cipher digital signature. Public key are used Individual identification number that issued from certify communication company, and cipher algorithm are used ECDSA definition factor for generation and verification of digital signature and it used Elliptic Curve with over 160 bit Key. Also, Access control operate on If level that designed IPv6 frame architecture. I would conclude that IP Access Control Protocol have verified security and improved performance in operation time more 4 times than before protocols when through the communication of use cipher digital signature for authentication and verification.

  • PDF