검색결과

검색조건
좁혀보기
검색필터
결과 내 재검색

간행물

    분야

      발행연도

      -

        검색결과 3,479

        362.
        2022.10 구독 인증기관·개인회원 무료
        The detector response was simulated to design a fork detection system for verifying the characteristics of spent fuel. The fork detection system currently used consists of two fission chamber and an ion chamber, and it is nuclear safeguard equipment that measures the gross neutrons and gross gamma rays emitted from the spent fuel assembly to identify the characteristics of the spent fuel and verify the authenticity of the operation history. In order to improve the current fork detection system, we are developing a system that applies CZT, a room temperature semiconductor detector, and a stilbene detector, which is an organic scintillator. Depletion calculations were performed using the ORIGEN code to determine the radiological characteristics emitted from spent nuclear fuel assembly. The flux of radiation emitted from the spent nuclear fuel assembly was calculated by changing the conditions such as initial enrichment, burnup, and cooling time, which are major variables of spent fuel assembly. The calculated result is used as the source term of the particle transport code. Considering the general operating conditions of the pressurized light water reactor, the conditions were changed in the range of 3-5% for initial enrichment and 30-72 GWD/MTU for burnup, and the cooling time was given within 10 years. MCNP 6.2, a Monte Carlo simulation code, was used to simulate the detector response to radiation emitted from spent nuclear fuel assembly. According to the shape, size, and position of the CZT detector, the gamma counts incident on the detector were calculated and derived the initial design of our fork detection system.
        363.
        2022.10 구독 인증기관·개인회원 무료
        Monitoring a state that intentionally hides its nuclear activity via open-source information is akin to looking through a black box. Direct information on the state’s nuclear activity remains in the dark, leaving scholars to speculate how much nuclear material or warheads are being produced. Nevertheless, a state’s nuclear program consists of a complex network that ranges from producing weapon-grade nuclear materials by operating its nuclear facilities to securing resources to fund these activities. These indirect activities allow a narrow window of opportunity for researchers to map a state’s activity that sometimes may not be directly linked to nuclear activity per se but is significant to maintaining and operating its nuclear program. These may include malicious cyberattacks to steal or launder cryptocurrency and facilitating cooperation with fellow rogue states that do not comply with the NPT and nuclear nonproliferation regime. The problem lies in how researchers can map this network. Much of the literature that uses text analysis uses data from either (1) formal statement, reports, and documents or (2) journal articles to extract relations between topics that is otherwise difficult to surmise. This study, however, analyzes news articles containing keywords related to a states’ nuclear activity such as international sanctions, trade activities, other states’ policy etc. While news articles fail to live up to the academic rigor of journal articles and unlike formal documents may sometime contain misinformation or incorrect facts, they are a valuable medium to show the day-to-day activity of a state. Although bias may exist as particular news articles may or may not be chosen for text analysis, by using articles collected from 2021 to 2022, this study argues it is enough data to show a short-term trend in nuclear activity.
        364.
        2022.10 구독 인증기관·개인회원 무료
        In order to enter a nuclear power plant, access approval is required in advance, and biometric information such as fingerprints of visitors must be registered when issuing a key card, and only those certified through biometric equipment can enter the nuclear facilities (Protected area II). Fingerprint recognizers and facial recognizers are installed and operated in domestic nuclear facilities for access control. Domestic nuclear facilities establish and implement a protection system in accordance with physical protection requirements under the “Act on Physical Protection and Radiological Emergency” and “Physical Protection Regulations” of each nuclear facility. Detailed implementation standards are specified in Regulation Standard (RS) documents established and distributed by KINAC. Biometrics are mentioned in a KINAC RS-104 (Access Control) document. In this study, it was analyzed what points should be considered in order to prepare for performance tests and establish plans for biometric devices. In order for the results of performance evaluation of biometric devices to obtain high reliability and to be applied to nuclear facilities in the future, standardized performance evaluation targets, procedures, standards, and environments must be created. In order to collect samples such as fingerprints for performance evaluation, the size roll of the sample shall be determined, and the appropriateness of the sample size shall be evaluated in consideration of reliability and error range. In addition, the analysis results for the characteristics (gender, age, etc.) of the sample should be presented. When collecting samples, conflicts with other laws such as personal information protection should be considered, and the reliability of the performance test result data should be analyzed and presented. Quality evaluation should also be performed on forged biometric information data such as silicon fingerprints. In addition, when establishing a performance evaluation plan, a systematic evaluation procedure should be established by referring to domestic and foreign certification and evaluation systems such as the Korea Internet & security Agency (KISA). In order to improve the completeness of the access control system using the biometrics of nuclear facilities, it is necessary to test the performance of biometric devices and to install and operate only devices that have the ability to defend against counterfeit technology. In this study, it was analyzed what points should be considered in order to prepare for performance tests and establish plans for biometric devices.
        368.
        2022.10 구독 인증기관·개인회원 무료
        Even though it is emphasized to apply safeguards-by-design (SBD) concept in the early phase of the design of a new nuclear facilities, there is no clear guideline or tools for the practical SBD implementation. Generally known approach is trying to review whether there is any conflicts or shortcomings on a conceptual safeguards components in a design information. This study tries to build a systematic tools which can be easily applied to safeguards analysis. In evaluating the safeguards system or performance in a facility, it is essential to analyze the diversion path for nuclear materials. Diversion paths, however, can be either extremely simplified or complicated depending on the level of knowledge and purpose of specific person who do analyze in the field. In the context, this study discusses the applicability of an event tree and fault tree method to generating diversion paths systematically. The essential components constituting the diversion path were reviewed and the logical flow for systematically creating the diversion path was developed. The path generation algorithm based on the facility design components and logical flow as well as the initial information of the nuclear materials and material flows was test using event tree and fault tree analysis tools. The usage and limitation of the applicability of this two logic methods are discussed and idea to incorporate the logic algorithm into the practical program tools is suggested.The results will be used to develop a program module which can systematically generate diversion paths using the event tree and fault tree method.