• Title/Summary/Keyword: safety verification

Search Result 1,127, Processing Time 0.027 seconds

The development of DCS simulator for the make-up demin-water treatment system of Kori #3&4 (고리 제2발전소 순수생산설비 DCS 시뮬레이터 개발)

  • 김태우;서인용;이용관
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.11a
    • /
    • pp.159-164
    • /
    • 2003
  • DCS (Distributed Control System) is adapted in the most fossil power plant in our country but that is not true in the nuclear power plant (NPP) because of the safety problem. KEPRI has developed many simulators for the training of the operators working in power plants. With this accumulated high technology we are developing a DCS simulator for the performance verification of the developed DCS for the make-up demin-water treatment system of Kori #3&4. In this paper we explain how we develop the system model and show a simulation result.

  • PDF

Management of System Requirement for High-speed Electric Multiple Unit - 400 eXperimental (차세대 고속열차 시스템요구사항 관리)

  • Lee, Tae-Hyung;Park, Choon-Soo;Choi, Sung-Hoon;Kim, Sang-Soo;Han, In-Soo;Kim, Ki-Hwan
    • Proceedings of the KSR Conference
    • /
    • 2009.05b
    • /
    • pp.395-400
    • /
    • 2009
  • The HEMU-400X project starts at 2007. It is important first of all that describing correctly system requirement during configuration of system, design, manufacturing, installation and test verification so that the complicated high-speed electric multiple unit is to run safety and reliable and to achieve target performance and function properly. The system requirement assist the system designer to understand the performance and function of system in basic design. For this process, system engineer have to manage the system requirement. This paper proposes the management contents of system requirement such as change management, requirement traceability, etc, for HEMU-400X.

  • PDF

Experimental Evaluation for Structural Performance of Hybrid Damper Combining Steel Slit and Rotational Friction Damper (강재 슬릿과 회전 마찰형 감쇠 장치를 결합한 복합 감쇠 장치의 실험적 구조 성능 평가)

  • Kim, Yu-Seong;Kang, Joo-Won;Park, Byung-Tae;Lee, Joon-Ho
    • Journal of Korean Association for Spatial Structures
    • /
    • v.19 no.3
    • /
    • pp.101-109
    • /
    • 2019
  • In order to develop the compatible damping device in various vibration source, a hybrid wall-type damper combining slit and friction damper in parallel was developed. Cyclic loading tests and two-story RC reinforced frame tests were performed for structural performance verification. As a result of the 5-cyclic loading test according to KBC-2016 and low displacement cyclic fatigue test, The hybrid wall type damper increased its strength and the ductility was the same as that of the slit damper. In addition, As a result of the two-layer frame test, the reinforced frame had about twice the strength of the unreinforced frame, and the story drift ratio was satisfied to Life Safety Level.

A Study on PublicData Safety Verification System for Privacy in BigData Environment (빅데이터 환경에서 개인정보보호를 위한 공개정보 안전성 검증 체계에 관한 연구)

  • Lee, Jae-Sik;Kim, Ho-Seong;Oh, Yong-Seok
    • Annual Conference of KIPS
    • /
    • 2013.11a
    • /
    • pp.670-671
    • /
    • 2013
  • 빅데이터 환경에서 개인정보가 포함된 데이터가 공개될 경우 많은 프라이버시 문제를 야기할 수 있다. 따라서, 본 논문에서는 데이터 공개 시에 개인정보를 보호하기 위한, 공개정보 안전성 검증 체계를 제안한다. 제안하는 검증 체계는 개인정보가 포함된 공개정보에 대하여 익명화 수행을 지원하고, 익명화된 데이터에 대하여 비익명화를 수행하는 등 공개정보에 대한 안전성을 평가하고, 이를 관리 감독하는 체계이다. 안전성 검증은 공개되는 정보에 따라서 다양하게 이루어 질 수 있으며, 검증의 강도에 따라서 안전성 인증 레벨을 차등 부여한다. 제안하는 체계는 빅데이터 환경에서 데이터 공개 시 개인정보보호를 위한 최소한의 안전성 보장체계라 할 수 있으며, 제안하는 체계를 통하여 빅데이터 환경에서 개인정보에 안전한 데이터 공개 환경이 조성될 것으로 기대한다.

A Systems Engineering Approach for CEDM Digital Twin to Support Operator Actions

  • Mousa, Mostafa Mohammed;Jung, Jae Cheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.16 no.2
    • /
    • pp.16-26
    • /
    • 2020
  • Improving operator performance in complex and time-critical situations is critical to maintain plant safety and operability. These situations require quick detection, diagnosis, and mitigation actions to recover from the root cause of failure. One of the key challenges for operators in nuclear power plants is information management and following the control procedures and instructions. Nowadays Digital Twin technology can be used for analyzing and fast detection of failures and transient situations with the recommender system to provide the operator or maintenance engineer with recommended action to be carried out. Systems engineering approach (SE) is used in developing a digital twin for the CEDM system to support operator actions when there is a misalignment in the control element assembly group. Systems engineering is introduced for identifying the requirements, operational concept, and associated verification and validation steps required in the development process. The system developed by using a machine learning algorithm with a text mining technique to extract the required actions from limiting conditions for operations (LCO) or procedures that represent certain tasks.

Study On Masked Face Detection And Recognition using transfer learning

  • Kwak, NaeJoung;Kim, DongJu
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.294-301
    • /
    • 2022
  • COVID-19 is a crisis with numerous casualties. The World Health Organization (WHO) has declared the use of masks as an essential safety measure during the COVID-19 pandemic. Therefore, whether or not to wear a mask is an important issue when entering and exiting public places and institutions. However, this makes face recognition a very difficult task because certain parts of the face are hidden. As a result, face identification and identity verification in the access system became difficult. In this paper, we propose a system that can detect masked face using transfer learning of Yolov5s and recognize the user using transfer learning of Facenet. Transfer learning preforms by changing the learning rate, epoch, and batch size, their results are evaluated, and the best model is selected as representative model. It has been confirmed that the proposed model is good at detecting masked face and masked face recognition.

Quantitative measures of thoroughness of FBD simulations for PLC-based digital I&C system

  • Lee, Dong-Ah;Kim, Eui-Sub;Yoo, Junbeom
    • Nuclear Engineering and Technology
    • /
    • v.53 no.1
    • /
    • pp.131-141
    • /
    • 2021
  • Simulation is a widely used functional verification method for FBD programs of PLC-based digital I&C system in nuclear power plants. It is difficult, however, to estimate the thoroughness (i.e., effectiveness or quality) of a simulation in the absence of any clear measure for the estimation. This paper proposes two sets of structural coverage adequacy criteria for the FBD simulation, toggle coverage and modified condition/decision coverage, which can estimate the thoroughness of simulation scenarios for FBD programs, as recommended by international standards for functional safety. We developed two supporting tools to generate numerous simulation scenarios and to measure automatically the coverages of the scenarios. The results of our experiment on five FBD programs demonstrated that the measures and tools can help software engineers estimate the thoroughness and improve the simulation scenarios quantitatively.

Some aspects of the analyses of glass structures exposed to impact load

  • Grozdanic, Gabrijela;Galic, Mirela;Marovic, Pavao
    • Coupled systems mechanics
    • /
    • v.10 no.6
    • /
    • pp.475-490
    • /
    • 2021
  • With glass becoming a structural material there is a whole new approach for loading and ensuring the safety of construction. Due to its brittle nature, it is necessary to predict all possible problems so that structural integrity would not be endangered. In this paper, different approaches to modelling the glass elements are presented with references to the advantages, disadvantages, and application of each of them. The intention is clear, there is a need to improve and simplify the design guidelines. Given the increasing use of glass in construction it is not practical to produce experimental tests each time when the verification is needed. Today, architecture is bringing us different types of structures and every project presents a new challenge for engineers. A practical and simple approach is crucial for progress and efficiency. In this paper, different approaches to modelling glass are presented with an emphasis on soft body impact.

A Study on the Verification of Traffic Flow and Traffic Accident Cognitive Function for Road Traffic Situation Cognitive System

  • Am-suk, Oh
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.4
    • /
    • pp.273-279
    • /
    • 2022
  • Owing to the need to establish a cooperative-intelligent transport system (C-ITS) environment in the transportation sector locally and abroad, various research and development efforts such as high-tech road infrastructure, connection technology between road components, and traffic information systems are currently underway. However, the current central control center-oriented information collection and provision service structure and the insufficient road infrastructure limit the realization of the C-ITS, which requires a diversity of traffic information, real-time data, advanced traffic safety management, and transportation convenience services. In this study, a network construction method based on the existing received signal strength indicator (RSSI) selected as a comparison target, and the experimental target and the proposed intelligent edge network compared and analyzed. The result of the analysis showed that the data transmission rate in the intelligent edge network was 97.48%, the data transmission time was 215 ms, and the recovery time of network failure was 49,983 ms.

Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System

  • Ali M. Allam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1471-1483
    • /
    • 2023
  • One of the fastest-growing mobile services accessible today is mobile payments. For the safety of this service, the Near Field Communication (NFC) technology is used. However, NFC standard protocol has prioritized transmission rate over authentication feature due to the proximity of communicated devices. Unfortunately, an adversary can exploit this vulnerability with an antenna that can eavesdrop or alter the exchanged messages between NFC-enabled devices. Many researchers have proposed authentication methods for NFC connections to mitigate this challenge. However, the security and privacy of payment transactions remain insufficient. We offer a privacy-preserving, anonymity-based, safe, and efficient authentication protocol to protect users from tracking and replay attacks to guarantee secure transactions. To improve transaction security and, more importantly, to make our protocol lightweight while ensuring privacy, the proposed protocol employs a secure offline session key generation mechanism. Formal security verification is performed to assess the proposed protocol's security strength. When comparing the performance of current protocols, the suggested protocol outperforms the others.