• Title/Summary/Keyword: key pool

Search Result 140, Processing Time 0.026 seconds

Experimental study on the influence of heating surface inclination angle on heat transfer and CHF performance for pool boiling

  • Wang, Chenglong;Li, Panxiao;Zhang, Dalin;Tian, Wenxi;Qiu, Suizheng;Su, G.H.;Deng, Jian
    • Nuclear Engineering and Technology
    • /
    • v.54 no.1
    • /
    • pp.61-71
    • /
    • 2022
  • Pool boiling heat transfer is widely applied in nuclear engineering fields. The influence of heating surface orientation on the pool boiling heat transfer has received extensive attention. In this study, the heating surface with different roughness was adopted to conduct pool boiling experiments at different inclination angles. Based on the boiling curves and bubble images, the effects of inclination angle on the pool boiling heat transfer and critical heat flux were analyzed. When the inclination angle was bigger than 90°, the bubble size increased with the increase of inclination angle. Both the bubble departure frequency and critical heat flux decreased as the inclination angle increased. The existing theoretical models about pool boiling heat transfer and critical heat flux were compared. From the perspective of bubble agitation model and Hot/Dry spot model, the experimental phenomena could be explained reasonably. The enlargement of bubble not only could enhance the agitation of nearby liquid but also would cause the bubble to stay longer on the heating surface. Consequently, the effect of inclination angle on the pool boiling heat transfer was not conspicuous. With the increase of inclination angle, the rewetting of heating surface became much more difficult. It has negative effect on the critical heat flux. This work provides experimental data basis for heat transfer and CHF performance of pool boiling.

Quorum based Peer to Peer Key Sharing Protocol over Wireless Sensor Networks

  • Yang, Soong-Yeal;Won, Nam-Sik;Kim, Hyun-Sung;Lee, Sung-Woon
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2008.10b
    • /
    • pp.445-448
    • /
    • 2008
  • The key establishment between nodes is one of the most important issues to secure the communication in wireless sensor networks. Some researcher used the probabilistic key sharing scheme with a pre-shared key pool to reduce the number of keys and the key disclosure possibility. However, there is a potential possibility that some nodes do not have a common share in the key pool. The purpose of this paper is to devise a peer to peer key sharing protocol (PPKP) based on Quorum system and Diffie-Hellman key exchange scheme (DHS). The PPKP establishes a session key by creating a shared key using the DHS and then scrambles it based on Quorum system to secure that. The protocol reduces the number of necessary keys than the previous schemes and could solve the non-common key sharing possibility problem in the probabilistic schemes.

  • PDF

Development of a Pool Cleaning Robot and its Cleaning Performance Evaluation (수영장 청소 로봇 개발 및 청소성능지표)

  • Kim, Jinhyuk;Kim, Jinhyun
    • The Journal of Korea Robotics Society
    • /
    • v.7 no.4
    • /
    • pp.243-251
    • /
    • 2012
  • In this paper, developing of a pool cleaning robot is addressed. First, we analyze commercial pool cleaning robot mechanisms, and the merits and demerits of wireless version of a pool cleaning robot is introduced. And then the water-jet moving mechanism for a pool cleaning robot is proposed to improve energy efficiency and mechanical design advantage, which is one of the strong candidates for wireless pool cleaning robots. Next, the method of cleaning performance evaluation of pool cleaning robots is firstly defined with five key factors, and it was verified by experimental results. If the cleaning performance can be quantitatively defined, we can design optimally a pool cleaning robot, which results in the cost down.

Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks

  • Mohaisen, Abedelaziz;Nyang, Dae-Hun;AbuHmed, Tamer
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.5
    • /
    • pp.222-238
    • /
    • 2008
  • In this paper, the random key pre-distribution scheme introduced in ACM CCS'02 by Eschenauer and Gligor is reexamined, and a generalized form of key establishment is introduced. As the communication overhead is one of the most critical constraints of any successful protocol design, we introduce an alternative scheme in which the connectivity is maintained at the same level as in the original work, while the communication overhead is reduced by about 40% of the original overhead, for various carefully chosen parameters. The main modification relies on the use of a two-level key pool design and two round assignment/key establishment phases. Further analysis demonstrates the efficiency of our modification.

A STUDY ON WELD POOL MONITORING IN PULSED LASER EDGE WELDING

  • Lee, Seung-Key;Na, Suck-Joo
    • Proceedings of the KWS Conference
    • /
    • 2002.10a
    • /
    • pp.595-599
    • /
    • 2002
  • Edge welding of thin sheets is very difficult because of the fit-up problem and small weld area In laser welding, joint fit-up and penetration are critical for sound weld quality, which can be monitored by appropriate methods. Among the various monitoring systems, visual monitoring method is attractive because various kinds of weld pool information can be extracted directly. In this study, a vision sensor was adopted for the weld pool monitoring in pulsed Nd:YAG laser edge welding to monitor whether the penetration is enough and the joint fit-up is within the requirement. Pulsed Nd:YAG laser provides a series of periodic laser pulses, while the shape and brightness of the weld pool change temporally even in one pulse duration. The shutter-triggered and non-interlaced CCD camera was used to acquire a temporally changed weld pool image at the moment representing the weld status well. The information for quality monitoring can be extracted from the monitored weld pool image by an image processing algorithm. Weld pool image contains not only the information about the joint fit-up, but the penetration. The information about the joint fit-up can be extracted from the weld pool shape, and that about a penetration from the brightness. Weld pool parameters that represent the characteristics of the weld pool were selected based on the geometrical appearance and brightness profile. In order to achieve accurate prediction of the weld penetration, which is nonlinear model, neural network with the selected weld pool parameters was applied.

  • PDF

Key Predistribution Schemes in Distributed Wireless Sensor Network (분산 무선 센서 네트워크에서의 선수 키 분배 방법)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.646-648
    • /
    • 2010
  • A Sensor Node in Wireless Sensor Network has very limited resources such as processing capability, memory capacity, battery power, and communication capability. When the communication between any two sensor nodes are required to be secured, the symmetric key cryptography technique is used for its advantage over public key cryptography in terms of requirement of less resources. Keys are pre-distributed to each sensor node from a set of keys called key pool before deployment of sensors nodes. Combinatorial design helps in a great way to determine the way keys are drawn from the key pool for distributing to individual sensor nodes. We study various deterministic key predistribution techniques that are based on combinatorial design.

  • PDF

Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography

  • Mehr, Kamal Adli;Niya, Javad Musevi
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.512-522
    • /
    • 2015
  • Recent developments in identity-based cryptography (IBC) have provided new solutions to problems related to the security of mobile ad hoc networks (MANETs). Although many proposals to solve problems related to the security of MANETs are suggested by the research community, there is no one solution that fits all. The interdependency cycle between secure routing and security services makes the use of IBC in MANETs very challenging. In this paper, two novel methods are proposed to eliminate the need for this cycle. One of these methods utilizes a key pool to secure routes for the distribution of cryptographic materials, while the other adopts a pairing-based key agreement method. Furthermore, our proposed methods utilize threshold cryptography for shared secret and private key generation to eliminate the "single point of failure" and distribute cryptographic services among network nodes. These characteristics guarantee high levels of availability and scalability for the proposed methods. To illustrate the effectiveness and capabilities of the proposed methods, they are simulated and compared against the performance of existing methods.

Development of risk assessment framework and the case study for a spent fuel pool of a nuclear power plant

  • Choi, Jintae;Seok, Ho
    • Nuclear Engineering and Technology
    • /
    • v.53 no.4
    • /
    • pp.1127-1133
    • /
    • 2021
  • A Spent Fuel Pool (SFP) is designed to store spent fuel assemblies in the pool. And, a SFP cooling and cleanup system cools the SFP coolant through a heat exchanger which exchanges heat with component cooling water. If the cooling system fails or interfacing pipe (e.g., suction or discharge pipe) breaks, the cooling function may be lost, probably leading to fuel damage. In order to prevent such an incident, it is required to properly cool the spent fuel assemblies in the SFP by either recovering the cooling system or injecting water into the SFP. Probabilistic safety assessment (PSA) is a good tool to assess the SFP risk when an initiating event for the SFP occurs. Since PSA has been focused on reactor-side so far, it is required to study on the framework of PSA approach for SFP and identify the key factors in terms of fuel damage frequency (FDF) through a case study. In this study, therefore, a case study of SFP-PSA on the basis of design information of APR-1400 has been conducted quantitatively, and several sensitivity analyses have been conducted to understand the impact of the key factors on FDF.

Evaluation of Hepatic Hemangioma by Tc-99m Red Blood Cell Hepatic Blood Pool Scan (간 혈관종의 Tc-99m 표지 적혈구 혈액풀 스캔)

  • Sohn, Myung-Hee
    • The Korean Journal of Nuclear Medicine
    • /
    • v.39 no.3
    • /
    • pp.151-162
    • /
    • 2005
  • Hemangioma is the most common benign tumor of the liver, with a prevalence estimated as high as 7%. Tc-99m red blood cell (RBC) hepatic blood pool scan with single photon omission computed tomography (SPECT) imaging is extremely useful for the confirmation or exclusion of hepatic hemangiomas. The classic finding of absent or decreased perfusion and increased blood pooling ("perfusion/blood pool mismatch") is the key diagnostic element in the diagnosis of hemangiomas. The combination of early arterial flow and delayed blood pooling ("perfusion/blood pool match") is shown uncommonly. In giant hemangioma, filling with radioactivity appears first in the periphery, with progressive central fill-in on sequential RBC blood pool scan. However, the reverse filling pattern, which begins first in the center with progressive peripheral filling, is also rarely seen. Studies with false-positive blood pooling have been reported infrequently in nonhemangiomas, including hemangiosarcoma, hepatocellular carcinoma, hepatic adenoma, and metastatic carcinomas (adenocarcinoma of the colon, small cell carcinoma of the lung, neruroendocrine carcinoma). False-negative results have been also reported rarely except for small hemagniomas that are below the limits of spatial resolution of gamma camera.

Analysis of loss of cooling accident in VVER-1000/V446 spent fuel pool using RELAP5 and MELCOR codes

  • Seyed Khalil Mousavian;Amir Saeed Shirani;Francesco D'Auria
    • Nuclear Engineering and Technology
    • /
    • v.55 no.8
    • /
    • pp.3102-3113
    • /
    • 2023
  • Following the Fukushima nuclear disaster, the simulation of accidents in the spent fuel pool has become more noticeable. Despite the low amount of decay heat power, the consequences of the accidents in a spent fuel pool (SFP) can be severe due to the high content of long-lived radionuclides and lack of protection by the pressure vessel. In this study, the loss-of-cooling accident (LOFA) for the VVER-1000/V446 spent fuel pool is simulated by employing RELAP5 and MELCOR 1.8.6 as the best estimate and severe accident analysis codes, respectively. For two cases with different total power levels, decay heat of spent fuels is calculated by ORIGEN-II code. For modeling SFP of a VVER-1000, a qualified nodalizations are considered in both codes. During LOFA in SFP, the key sequences such as heating up of the pool water, boiling and reducing the water level, uncovering the spent fuels, increasing the temperature of the spent fuels, starting oxidation process (generating Hydrogen and extra power), the onset of fuel melting, and finally releasing radionuclides are studied for both cases. The obtained results show a reasonable consistency between the RELAP5 and MELCOR codes, especially before starting the oxidation process.