• Title/Summary/Keyword: RCCA

Search Result 11, Processing Time 0.017 seconds

Development of A Computer Program for Drop Time and Impact Velocity of the Rod Cluster Control Assembly (제어봉집합체의 낙하시간과 충격속도 계산을 위한 프로그램 개발)

  • Park, Ki-Seong;Kim, Il-Kon
    • Nuclear Engineering and Technology
    • /
    • v.26 no.2
    • /
    • pp.197-204
    • /
    • 1994
  • In a PWR rod cluster control assembly(RCCA) for shutdown is released upon action of control rod drive mechanism and falls down through the guide thimble by its weight. Drop time and impact velocity of the RCCA are two key parameters with respect to reactivity insertion time and the mechanical integrity of fuel assembly. Therefore, the precise control of drop time and impact velocity is prerequisite to modifying the existing design features of the RCCA and guide thimble or newly designing them. During its falling down into the core, the RCCA is retarded by various forces acting on it such as fluid resistance caused by the RCCA movement, buoyance and mechanical friction caused by contacting inner surface of the guide thimble, etc. However, complicated coupling of the various forces makes it difficult to derive an analytical dynamic equation for the drop time and impact velocity. This paper deals with the development of a computer program containing an analytical dynamic equation applicable to the Korean Fuel Assembly(KOFA). The computer program is benchmarked with an available single control rod drop tests. Since the predicted values are in good agreement with the test results, the computer program developed in this paper can be employed to modify the exiting design features of the RCCA and guide thimble and to develope their new design features for advanced nuclear reactors.

  • PDF

RCCA End-Tip Examination by ECT (원자로 제어봉 End-Tip 원주방향균열 와전류검사)

  • Lee, H.J.;Nam, M.W.;Jung, G.J.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.18 no.6
    • /
    • pp.455-463
    • /
    • 1998
  • RCCA(rod cluster control assembly) End-Tip suffers from neutron irradiation and constant vibration due to high-speed internal flow of primary coolant during plant operation. Such operating conditions cause the RCCA end-tip crackings around tile circumferential weldment of the end-tip, and in some cases, the defective end-tips were completly broken loose. However, no reliable inspection techniques for end-tip crackings were developed in the past, although some techniques exist for inspecting RCCA control rod wears. Therefore, NDE group at KEPRI has developed an ECT technique for the detection and the sizing of the end-tip crackings. The technique uses a specially designed surface-riding probe that can detect size of circumferential crackings with an accuracy of ${\pm}5.31%$ RMS error. This paper describes the ECT instrumentation including the ECT probes, calibration bars, as well as technical approaches.

  • PDF

An Efficient Broadcast Encryption System with Delegation of Decryption (복호화 위임을 제공하는 효율적인 브로드캐스트 암호시스템)

  • Han, Su Min;Park, Seung Hwan;Park, Jong Hwan;Lee, Dong Hoon
    • Journal of Broadcast Engineering
    • /
    • v.18 no.5
    • /
    • pp.758-770
    • /
    • 2013
  • In a Broadcast Encryption System, a sender sends an encrypted message to a large set of receivers at once over an insecure channel and it enables only users in a target set to decrypt the message with their private keys. In 2005, Boneh et al. proposed a fully collusion-resistant public key broadcast encryption in which the ciphertext and the privatekey sizes are constant. In general, pairing-based broadcast encryption system is efficient in bandwidth and storing aspects than non-pairing based broadcast encryption system, however, it requires many computational costs that resource-constrained devices is not suit to be applied. In this paper, we propose a Broadcast Encryption scheme(called BEWD) that user can decrypt a ciphertext more efficiently. The scheme is based on Boneh et al.scheme. More precisely, it reduces receiver's computational costs by delegating pairing computation to a proxy server which computation is required to receiver in Boneh et al.scheme. Furthermore, the scheme enables a user to check if the proxy server compute correctly. We show that our scheme is secure against selective IND-RCCA adversaries under l-BDHE assumption.

The Experiment of Flow Induced Vibration in PWR RCCAs

  • Kim, Sang-Nyung;Cheol Shin
    • Journal of Mechanical Science and Technology
    • /
    • v.15 no.3
    • /
    • pp.291-299
    • /
    • 2001
  • Recently, severe wear on the shutdown rod cladding of Ulchin Nuclear Power Plant #1, #2 were observed by the Eddy Current Test(E.C.T.). In particular, the wear at the sixth card location was up to 75%. The test results indicated that the Flow Induced Vibration(F.I.V.) might be the cause of the fretting wear resulting from the contact between Rod Cluster Control Assemblies(RCCAs) and their spacing cards(guide plates) arranged in the guide tube. From reviewing RCCAs fretting wear repots and analyzing the general characteristics of F.I.V. mechanism in the reactor, geometric layout and flow conditions around the control rod, it is concluded that the turbulence excitation is the most probable vibration mechanism of RCCA. To identify the governing mechanism of RCCA vibration, an experiment was performed for a representative rod position in which the most serious fretting wear experienced among the six rod positions. The experimental rig was designed and set up to satisfy the governing nondimensional numbers which are Reynolds number and mass damping parameter. The vibration amplitude measurement by the non-contact laser displacement sensor showed good agreements in the frequency and the maximum wearing(vibration) location with Ulchin E.C.T. results and Framatome report, respectively. The sudden increase in the vibration amplitude was sensed around the 6th guide plate with mass flow rate variation. Comparing the similitude rod behaviour with the idealized response of a cylinder in flow induced vibration, it was found that he dominant mechanism of vibration was transferred from turbulence excitation to periodic shedding at the mass flow ate 90ι/min. Also the critical velocity of the vibration in RCCAs was determined and the vibration can be prevented by reducing the bypass flow rate below the critical velocity.

  • PDF

Virtual Simulator Rod Control System Modeling for Nuclear Power Plant Operator Training (원자력 발전소 운전원 훈련용 가상 시뮬레이터 제어봉 제어계통 모델링)

  • Choi J.H.
    • Proceedings of the KIPE Conference
    • /
    • 2003.07a
    • /
    • pp.133-136
    • /
    • 2003
  • 이 논문은 고리 $\#$1 원자력 발전소를 기준 발전소로 하여 개발되고 있는운전원 교육용 가상 시뮬레이터 의 일부로서, 제어봉 제어계통 모델링에 대한 내용을 제시하는 것이 주된 목적이다. 제어봉 제어 계통의 목적은 원자로 출력을 변화시키기 위하여 제어봉 집합체(RCCA)를 동작시켜 단기적인 반응도(Short Term Reactivity)를 조절하기 위한 것이다. 실제 발전소와 똑같은 제어봉 제어가 가능하면, 실제로 운전원이 가상 시뮬레이터를 통해서 모든 상황과 사고들을 대처하는 능력을 가질 수 있도록 설계되었다 본 논문에서는 고리 $\#$1 원자력 발전소 운전원 교육용 가상 시뮬레이터를 구현하기 위해 현재까지 설계된 제어봉 제어계통의 기능, 구성, 제어봉 제어에 대한 전반적인 내용을 제시하고자 한다.

  • PDF

Optimization of Dynamic Terms in Core Overtemperature Delta-T Trip Function (노심 과온도 Delta-T 보호식의 동적보정함수 최적화)

  • Park, Jin-Ho;Yoon, Han-Young;Kim, Hee-Cheol;Lee, Chong-Chul
    • Nuclear Engineering and Technology
    • /
    • v.24 no.3
    • /
    • pp.236-242
    • /
    • 1992
  • The characteristics of dynamic terms in the core overtemperature Delta-T trip function are investigated for various time constants and the effects on the trip setpoint are studied for the uncontrolled RCCA bank withdrawal at power event by using the NLOOP and the PUMA code. Based on this study, a procedure determining the optimal dynamic term is suggested and accordingly the optimum time constants are determined for the KORI 3&4 transition core. It reveals that the vessel average temperature-lead-lag term is the most sensitive in DNB trip setpoint and the optimized time constants are 21 seconds for lead and 4 seconds for lag.

  • PDF

Point Kinetics Approach to the Analysis of Overpower Transients of the Ko-ri Unit 1 Reactor (점 근사 동특성 모델을 이용한 고리 원자력 1호기의 과도출력 전이 해석)

  • Hyun Dae Kim;Chang Hyun Chung;Chang Hyo Kim
    • Nuclear Engineering and Technology
    • /
    • v.13 no.3
    • /
    • pp.153-161
    • /
    • 1981
  • The dynamic behavior of the Ko-ri Unit 1 nuclear reactor following some credible and postulated accidents has been analyzed to a certain extent by means of neutronics and temperature equations formulated in terms of point reactor model. In general, the result of numerical calculation is harnessed to be incorporated in more elaborate models so as to predict transient behavior in a reliable mode as a part of accident analysis. It is shown in the case of power response upon an uncontrolled withdrawal of rod cluster control assembly at hot full power that the point reactor kinetics model proves to be good enough to reproduce the generic features described in the final safety analysis report of the Ko-ri Unit 1.

  • PDF

Development of Transient Simulation Code for Pressurized Water Reactors (가압경수형 원자력발전소의 과도현상 모의코드 개발)

  • Auh, Geun-Sun;Ko, Chang-Seog;Lee, Sung-Jae;Hwang, Dae-Hyun;Kim, Dong-Su;Chae, Sung-Ki
    • Nuclear Engineering and Technology
    • /
    • v.19 no.3
    • /
    • pp.198-204
    • /
    • 1987
  • A plant simulation code, MCSIM (Micro-Computer SIMulator), has been developed to simulate plant transient accidents for pressurized water reactors. Reactor coolant system is modeled using decoupled energy and momentum equations, drift flux two-phase flow model and integral momentum equation. A two-fluid pressurizer model is used to simulate the pressurizer dynamics. Pot Boiler model is used for steam generator, steady-state decoupled energy and momentum equations for secondary side system, and point kinetics equations for nuclear power calculation. For test of the present version of MCSIM, complete loss of flow and RCCA withdrawal accidents are calculated with MCSIM. The results are compared with those in FSAR of KNU 5 & 6.

  • PDF

A Morphometric Study on Cadaveric Aortic Arch and Its Major Branches in 25 Korean Adults : The Perspective of Endovascular Surgery

  • Shin, Il-Young;Chung, Yong-Gu;Shin, Won-Han;Im, Soo-Bin;Hwang, Sun-Chul;Kim, Bum-Tae
    • Journal of Korean Neurosurgical Society
    • /
    • v.44 no.2
    • /
    • pp.78-83
    • /
    • 2008
  • Objective : To understand the anatomic characteristics of the aortic arch (AA) and its major branches to build a foundation toward performing endovascular surgery safely. Methods : A total of 25 formalin fixed Korean adult cadavers were used. The authors investigated : anatomical variations of the AA and its major branches; curvature of the AA; distance from the mid-vertebrae line to the origin of the major branches; distances from the origin of the major branches of AA to the origin of its distal branches; and the angle of the three major branches, the brachiocephalic trunk (BCT), the left common carotid artery (LCCA) and the left subclavian artery (LSCA) arising from AA. Results : The three major branches directly originated from AA in 21 (84%) of the cadavers. In two (8%) of remaining four cadavers. orifice of LCCA was slightly above the stem of BCT. In remaining two (8%) cadavers, the left vertebral artery (LVA) was directly originated from AA. Average angle of AA curvature to the coronal plane was 62.2 degrees. BCT originated 0.92 mm on the right of the mid-vertebrae line. LCCA and LSCA originated from 12.3 mm and 22.8 mm on the left of the mid-vertebrae line. Mean distance from the origin of the BCT to the origin of the RCCA was 32.5 mm. Mean distance from the origin of the LSCA to the origin of the LVA was 33.8 mm. Average angles at which the major branches arise from the AA were 65.3, 46.9 and 63.8 degrees. Conclusion : This study may provides a basic anatomical information to catheterize AA and its branches for safely performing endovascular surgery.

Towards efficient sharing of encrypted data in cloud-based mobile social network

  • Sun, Xin;Yao, Yiyang;Xia, Yingjie;Liu, Xuejiao;Chen, Jian;Wang, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1892-1903
    • /
    • 2016
  • Mobile social network is becoming more and more popular with respect to the development and popularity of mobile devices and interpersonal sociality. As the amount of social data increases in a great deal and cloud computing techniques become developed, the architecture of mobile social network is evolved into cloud-based that mobile clients send data to the cloud and make data accessible from clients. The data in the cloud should be stored in a secure fashion to protect user privacy and restrict data sharing defined by users. Ciphertext-policy attribute-based encryption (CP-ABE) is currently considered to be a promising security solution for cloud-based mobile social network to encrypt the sensitive data. However, its ciphertext size and decryption time grow linearly with the attribute numbers in the access structure. In order to reduce the computing overhead held by the mobile devices, in this paper we propose a new Outsourcing decryption and Match-then-decrypt CP-ABE algorithm (OM-CP-ABE) which firstly outsources the computation-intensive bilinear pairing operations to a proxy, and secondly performs the decryption test on the attributes set matching access policy in ciphertexts. The experimental performance assessments show the security strength and efficiency of the proposed solution in terms of computation, communication, and storage. Also, our construction is proven to be replayable choosen-ciphertext attacks (RCCA) secure based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model.