A nuclear power plant real-time engineering simulator was developed based on general-purpose ther- mal-hydraulic system simulation code RELAP5. It mainly consists of three parts:improved thermal-hydraulic system simul...A nuclear power plant real-time engineering simulator was developed based on general-purpose ther- mal-hydraulic system simulation code RELAP5. It mainly consists of three parts:improved thermal-hydraulic system simulation code RELAP5,control and protection system and human-machine interface. A normal transient of CHASHMA nuclear power plant turbine step load change from 100% to 90% of full power,was simulated by the en- gineering simulator as an application example. This paper presents structure and main features of the engineering simulator,and application results are shown and discussed.展开更多
With the global warming and sea level rising, it is widely recognized that there is an increasing tendency of typhoon occurrence frequency and intensity. The defenses code against typhoon attacks for nuclear power pla...With the global warming and sea level rising, it is widely recognized that there is an increasing tendency of typhoon occurrence frequency and intensity. The defenses code against typhoon attacks for nuclear power plant should be calibrated because of the increasing threat of typhoon disaster and severe consequences. This paper discusses the probabilistic approach of definitions about "probable maximum typhoon" and "probable maximum storm surge" in nuclear safety regulations of China and has made some design code calibrations by use of a newly proposed Double Layer Nested Mtdti-objective Probability Model (DLNMPM).展开更多
An analysis of the recent major security incidents related to industrial control systems,revealed that most had been caused by company employees.Therefore,enterprise security management systems have been developed to ...An analysis of the recent major security incidents related to industrial control systems,revealed that most had been caused by company employees.Therefore,enterprise security management systems have been developed to focus on companies’personnel.Nonetheless,several hacking incidents,involving major companies and public/financial institutions,were actually attempted by the cooperative firms or the outsourced manpower undertaking maintenance work.Specifically,institutions that operate industrial control systems(ICSs)associated with critical national infrastructures,such as traffic or energy,have contracted several cooperative firms.Nonetheless,ICT’s importance is gradually increasing,due to outsourcing,and is the most vulnerable factor in security.This paper proposes a virtualized security management scheme for the resident cooperative firms in the industrial control infrastructure.Since such companies often cannot afford adequate investment in security,the scheme is to let an ICS company provide the virtualized system.One of its merits is the convenience of controlling a VDI server at the center.The cooperative firms were classified,based on their respective security levels,and statistics were collected throughout a four-year period for the results.This paper analyzes the policies and virtualization systems that have been applied to the security of the partner companies,which engaged in ICS security.A suitable model for ICS security was then proposed by analyzing their effects on the system efficiencies,based on the comparisons of the security inspection results obtained before and after virtualization.The proposed system is expected to contribute to industrial safety.展开更多
文摘A nuclear power plant real-time engineering simulator was developed based on general-purpose ther- mal-hydraulic system simulation code RELAP5. It mainly consists of three parts:improved thermal-hydraulic system simulation code RELAP5,control and protection system and human-machine interface. A normal transient of CHASHMA nuclear power plant turbine step load change from 100% to 90% of full power,was simulated by the en- gineering simulator as an application example. This paper presents structure and main features of the engineering simulator,and application results are shown and discussed.
基金supported by the Nationam Natural Science Foundation of China(Grant No.50679076)Office of State Flood Control and Drought Relief Headquarters of China(Grant No.20060120)
文摘With the global warming and sea level rising, it is widely recognized that there is an increasing tendency of typhoon occurrence frequency and intensity. The defenses code against typhoon attacks for nuclear power plant should be calibrated because of the increasing threat of typhoon disaster and severe consequences. This paper discusses the probabilistic approach of definitions about "probable maximum typhoon" and "probable maximum storm surge" in nuclear safety regulations of China and has made some design code calibrations by use of a newly proposed Double Layer Nested Mtdti-objective Probability Model (DLNMPM).
基金This research was supported by the Energy Cloud R&D Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Science,ICT(NRF2019M3F2A1073385).
文摘An analysis of the recent major security incidents related to industrial control systems,revealed that most had been caused by company employees.Therefore,enterprise security management systems have been developed to focus on companies’personnel.Nonetheless,several hacking incidents,involving major companies and public/financial institutions,were actually attempted by the cooperative firms or the outsourced manpower undertaking maintenance work.Specifically,institutions that operate industrial control systems(ICSs)associated with critical national infrastructures,such as traffic or energy,have contracted several cooperative firms.Nonetheless,ICT’s importance is gradually increasing,due to outsourcing,and is the most vulnerable factor in security.This paper proposes a virtualized security management scheme for the resident cooperative firms in the industrial control infrastructure.Since such companies often cannot afford adequate investment in security,the scheme is to let an ICS company provide the virtualized system.One of its merits is the convenience of controlling a VDI server at the center.The cooperative firms were classified,based on their respective security levels,and statistics were collected throughout a four-year period for the results.This paper analyzes the policies and virtualization systems that have been applied to the security of the partner companies,which engaged in ICS security.A suitable model for ICS security was then proposed by analyzing their effects on the system efficiencies,based on the comparisons of the security inspection results obtained before and after virtualization.The proposed system is expected to contribute to industrial safety.