• Title/Summary/Keyword: Source Risk

Search Result 722, Processing Time 0.036 seconds

Machine learning-based categorization of source terms for risk assessment of nuclear power plants

  • Jin, Kyungho;Cho, Jaehyun;Kim, Sung-yeop
    • Nuclear Engineering and Technology
    • /
    • v.54 no.9
    • /
    • pp.3336-3346
    • /
    • 2022
  • In general, a number of severe accident scenarios derived from Level 2 probabilistic safety assessment (PSA) are typically grouped into several categories to efficiently evaluate their potential impacts on the public with the assumption that scenarios within the same group have similar source term characteristics. To date, however, grouping by similar source terms has been completely reliant on qualitative methods such as logical trees or expert judgements. Recently, an exhaustive simulation approach has been developed to provide quantitative information on the source terms of a large number of severe accident scenarios. With this motivation, this paper proposes a machine learning-based categorization method based on exhaustive simulation for grouping scenarios with similar accident consequences. The proposed method employs clustering with an autoencoder for grouping unlabeled scenarios after dimensionality reductions and feature extractions from the source term data. To validate the suggested method, source term data for 658 severe accident scenarios were used. Results confirmed that the proposed method successfully characterized the severe accident scenarios with similar behavior more precisely than the conventional grouping method.

Comparison of Radiation Doses between 64-slice Single Source and 128-slice Dual Source CT Coronary Angiography in patient (64-slice single source CT와 128-slice dual source CT를 이용한 관상동맥 조영 검사 시 환자선량 비교)

  • Kang, Yeong-Han
    • Journal of the Korean Society of Radiology
    • /
    • v.6 no.2
    • /
    • pp.129-136
    • /
    • 2012
  • The purpose of this study was to estimate radiation doses from 64-slice single source Computed Tomography(SSCT) coronary angiography(CA) and 128-slice dual source Computed Tomography(DSCT). With SSCT CA, the effective dose averaged approximately 13.86 mSv when two dose modulation was not. The mean effective dose for DSCT CA with retrospectively gated helical(RGH) technique was 11.87 mSv, when prospective ECG gating transverse(PGT) without dose modulation technique was 5.61 mSv. The one with dose modulation in PGT technique and flash mode were 3.04 mSv and flash mode was 0.98 mSv respectively. The lifetime attributable risk(LAR) of cancer incidence from SSCT RGH mode averaged approximately 1 for 1,176, and DSCT averaged 1 for 1,960(RGH mode), 1 for 3,030(PGT without modulation), 1 for 5,882(PGT with modulation). Because of CTCA is associated with non-negligible risk of cancer. Doses can be reduced by application PGT, FLASH than RGH using DSCT.

PRACTICAL APPROACHES TO RISK MANAGEMENT FOR GLOBAL CONTRACTORS

  • Seung Heon Han;Du Yon Kim;Han Him Kim
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.1231-1236
    • /
    • 2005
  • Global construction projects manifest more risks than do other industries. Often, firms doing business in construction markets find these risks intimidating. To secure corresponding profits, many global contractors attempt to forecast the effects of risks and establish risk management strategies. However, one key problem with present-day risk management methods is that they are basically analytical or mathematical-oriented approaches which are not easy to adopt in real business. Based on preliminary investigations and evaluations of current tools, this research elicits more practical algorithms for risk checklist by constructing risk scenarios over the whole period of project execution. For the application of the algorithms, a "SE/RF" (Source-Event/Regular-Floating) checklist is suggested, which sorts out risk sources and their subsequent events, as well as dividing various risk factors into either regular or floating categories. In addition, the "PIS" (Probability-Impact-Significance) method is introduced, in place of traditional "PI" (Probability-Impact) methods, by adding the additional criterion of "risk significance" to determine the degree of risk exposure in a more realistic way. As a result, we draw the significant finding that the "PIS" method presents a closer evaluation regarding degree of risk exposure as compared to the level of expert judgments than those from traditional methods. Finally, we provide an integrated procedure for international project risk management with all of the research achievements being incorporated.

  • PDF

A Study on Correlation Analysis of Risk Factors for Urban Regeneration Using ISM method (ISM기법을 이용한 도시재생사업 리스크 요인의 상관성 분석에 관한 연구)

  • Park, Beom-Suk;Jin, Run-Zhi;Han, Sangwon;Hyun, Chang-Taek
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2013.05a
    • /
    • pp.192-193
    • /
    • 2013
  • In recent years, risks associated with mixed used development in urban regeneration projects which have actively been implemented have been on the rise due to uncertainties and complexities of those projects. Thus, risk management is needed to effectively manage those risks that may occur during the process of a project. Many studies have contributed to deal with risk management of those projects. These studies, however, have focused main on identification stage and deriving the main risk factors and have limitations on presenting the relationship among those risk factors. Since many risks are interdependent and have multiple effects, the purpose of this study is to present a way(ISM method) to provide a hierarchical structural framework of risks in Urban Regeneration. The structural of risks can helps decision makers to trace the actual source of these risks.

  • PDF

Fraud Risk Management Model: A Content Analysis Approach

  • MADAH MARZUKI, Marziana;NIK ABDUL MAJID, Wan Zurina;AZIS, Nur Kamaliah;ROSMAN, Romzie;HAJI ABDULATIFF, Nik Kamaruzaman
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.717-728
    • /
    • 2020
  • The objective of this study is to explore the whole process of fraud risk management strategies that should be implemented by the organizations. Secondly, this study discusses the governance issues that arise at each stage of the process. For the purpose of this study, a content analysis of previous literatures is used as a technique for gathering data. This process usually involves codifying qualitative and quantitative information into pre-defined categories in order to derive patterns in the presentation and reporting of information. Based on our content analysis, we found that the fraud risk management process should be made of at least five stages which are inculcating the culture of managing risks in an organization, identifying the risks, evaluating the risks, determining preventive actions and implementing and reviewing stages. Our extended analysis of the fraud risk management process finds that a lot of governance issues arise in the fraud risk management process that should be solved by regulators and companies in order to ensure that fraud risk management process is embedded as corporate culture, not merely as a process. Among them are how to create the risk culture in an organization and whether auditors and risk management committees identify risks from each available source.

Managing Soil Contamination in the United States: Policy and Practice

  • Small, Matthew C.
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2003.10a
    • /
    • pp.58-69
    • /
    • 2003
  • Soil contamination in the United States is managed using a risk-based decision making process. In other words, we don't ask, 'how much soil contamination can be cleaned up\ulcorner' Instead we ask, 'how much contamination can be safely left in place\ulcorner' The determination of 'safe' levels of contamination is based upon the potential for exposure and the toxicity of the contaminants of concern in soil. Potential for exposure is determined by evaluating potential exposure pathways from source to receptor given current or reasonably anticipated land use. Soil cleanup goals are then calculated for any complete exposure pathways based upon toxicity and the route of exposure. In some cases, institutional or engineering controls are also used to limit the potential for exposure. In order to prevent a continuous degradation of environmental quality, risk-based cleanup approaches must be combined with strong contamination prevention programs. In addition, alternative risk management approaches should be incorporated into an overall risk reduction strategy.erall risk reduction strategy.

  • PDF

Evaluating Flood Risk Area using GIS and RADARSAT Data-A Case Study in Northeast Thailand

  • Mongkolsawat, C.;Thirangoon, P.;Suwanwerakamtorn, R.;Karladee, N.;Paiboonsak, S.
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.7-9
    • /
    • 2003
  • The objective of this study is to evaluate flood risk area by integrating GIS and RADARSAT data. The study area, Northeast Thailand, is subject to flood during the rainy season. The main data used in this evaluation included RADARSAT data, landform and topographic map. The evaluation was conducted by overlay operation of flood area in 2001, land form and buffer region beyond the flood areas with the selection criteria defined. Most of the flood risk areas were found in the low lying land form within the buffer region. The cloud penetrating capabilities of SAR is only a source of information for effectively assessment of flood risk area in Northeast Thailand.

  • PDF

Fuzzy FMECA analysis of radioactive gas recovery system in the SPES experimental facility

  • Buffa, P.;Giardina, M.;Prete, G.;De Ruvo, L.
    • Nuclear Engineering and Technology
    • /
    • v.53 no.5
    • /
    • pp.1464-1478
    • /
    • 2021
  • Selective Production of Exotic Species is an innovative plant for advanced nuclear physic studies. A radioactive beam, generated by using an UCx target-ion source system, is ionized, selected and accelerated for experimental objects. Very high vacuum conditions and appropriate safety systems to storage exhaust gases are required to avoid radiological risk for operators and people. In this paper, Failure Mode, Effects, and Criticality Analysis of a preliminary design of high activity gas recovery system is performed by using a modified Fuzzy Risk Priority Number to rank the most critical components in terms of failures and human errors. Comparisons between fuzzy approach and classic application allow to show that Fuzzy Risk Priority Number is able to enhance the focus of risk assessments and to improve the safety of complex and innovative systems such as those under consideration.

Two Modified Z-Source Inverter Topologies - Solutions to Start-Up Dc-Link Voltage Overshoot and Source Current Ripple

  • Bharatkumar, Dave Heema;Singh, Dheerendra;Bansal, Hari Om
    • Journal of Power Electronics
    • /
    • v.19 no.6
    • /
    • pp.1351-1365
    • /
    • 2019
  • This paper proposes two modified Z-source inverter topologies, namely an embedded L-Z-source inverter (EL-ZSI) and a coupled inductor L-Z source inverter (CL-ZSI). The proposed topologies offer a high voltage gain with a reduced passive component count and reduction in source current ripple when compared to conventional ZSI topologies. Additionally, they prevent overshoot in the dc-link voltage by suppressing heavy inrush currents. This feature reduces the transition time to reach the peak value of the dc-link voltage, and reduces the risk of component failure and overrating due to the inrush current. EL-ZSI and CL-ZSI possess all of the inherent advantages of the conventional L-ZSI topology while eliminating its drawbacks. To verify the effectiveness of the proposed topologies, MATLAB/Simulink models and scaled down laboratory prototypes were constructed. Experiments were performed at a low shoot through duty ratio of 0.1 and a modulation index as high as 0.9 to obtain a peak dc-link voltage of 53 V. This paper demonstrates the superiority of the proposed topologies over conventional ZSI topologies through a detailed comparative analysis. Moreover, experimental results verify that the proposed topologies would be advantageous for renewable energy source applications since they provide voltage gain enhancement, inrush current, dc-link voltage overshoot suppression and a reduction of the peak to peak source current ripple.