검색결과

검색조건
좁혀보기
검색필터
결과 내 재검색

간행물

    분야

      발행연도

      -

        검색결과 6,928

        401.
        2023.05 구독 인증기관·개인회원 무료
        Considering the domestic situation where all nuclear power plants are located on seaside, the interim storage site is also likely to be located on coastal site. Maritime transportation is inevitable and the its risk assessment is very important for safety. Currently, there is no independently developed maritime transportation risk assessment code in Korea, and no research has been conducted to evaluate the release of radioactive waste due to the immersion of transport cask. Previous studies show that the release rate of radionuclides contained in a submerged transport cask is significantly affected by the area of flow path generated at the breached containment boundary. Due to the robustness of a cask, the breach is the most likely generated between the lid and body of cask. CRIEPI investigated the effect of cask containment on the release rate of radioactive contents into the ocean and proposed a procedure to calculate the release rate considering the so-called barrier effect. However, the contribution of O-ring on the release rate was not considered in the work. In this study, test and analysis is performed to determine the equivalent flow path gap considering the influence of O-rings. These results will be implemented in the computational model to assess sea water flow through a breached containment boundary using CFD techniques to assess radionuclide release rates. The evaluation of release rate due to container lid gaps has been performed by CRIEPI and BAM. In CRIEPI, the gap of the flow path was calculated from the roughness of the container surface without a quantitative assessment of the severity of the accident. In this work, to evaluate the release rate as a function of lid displacement, a small containment vessel is engineered and a metal Oring of the Helicoflex HN type is installed, which is the most commonly used one in transport and storage casks. The lid of containment vessel is displaced in vertical and horizontal direction and the release rate of the vessel was quantified using the helium leak test and the pressure drop test. Through this work, the relationship between the vertical opening displacement and horizontal sliding displacement of the cask lid and the actual flow path area created is established. This will be implemented in the CFD model for flow rate calculation from a submerged transport cask in the deep sea.
        402.
        2023.05 구독 인증기관·개인회원 무료
        In the event of a loss of a SNF (spent nuclear fuel) transport cask during maritime transportation, it is essential to evaluate the critical depth at which the integrity of the cask can be maintained under high water pressure. SNF transport casks are classified as Type B containers and the integrity of of the containment boundary must be maintained up to a depth of 200 meters unless the containment boundary was breached under beyond-design basis accidents. However, if an intact SNF cask is lost at a depth deeper than 200-meter, release of radioactive material may occur due to breach of containment boundary with over-pressure. In this study, we developed a code for the evaluation of the pressure limit of SNF transport cask, which can be evaluated by inputting the main dimensions and loading conditions of cask. The evaluation model was coded as a computer module for ease of use. In the previous study, models with three different fidelities were developed to ensure the reliability of the calculation and maintain sufficient flexibility to deal with various input conditions. Those three models consisted of a high-fidelity model that provided the most realistic response, a low-fidelity model with parameterized simplified geometry, and a mathematical model based on the shell theory. The maximum stress evaluation of the three models confirmed that the mathematical model provides the most conservative results than the other two models. The previous results demonstrate that mathematical models can be used in the code of computer modules. In this study, additional models of transport cask were created using parametric modeling techniques to improve the accuracy of the pressure limit assessment code for different cask and situations. The same boundary conditions and loading conditions were imposed as in the previous simplified model, and the maximum stress results considering the change in the shape of the transport container were derived and compared with the mathematical model. The comparison results showed that the mathematical model had more conservative values than the simplified model even under various input conditions. Accordingly, we applied the mathematical model to develop a transportation container pressure limit evaluation code that can be simulated in various situations such as shape change and various situations.
        403.
        2023.05 구독 인증기관·개인회원 무료
        Recently, more than 70 SMRs have been developed around the world due to their modularity, flexibility, and miniaturization. An innovative SMR (i-SMR) is also being developed in Korea, and operators are planning to apply for a Standard Design Approval (SDA) in 2026 after completing the standard design. Accordingly, regulatory organizations are conducting R&D on regulatory requirements and guidelines for systematic SMR standard design review by referring to IAEA and NRC cases. In terms of security, SMRs are expected to undergo many changes not only in terms of physical security through security systems, security areas, and vital equipments, but also in terms of cybersecurity through new digital technologies, remote monitoring, and automated operation. Accordingly, the IAEA Fundamental Safety Principles (SF-1) require operators to improve the safety of nuclear facilities by considering security requirements, access control requirements, and the results of operational impact assessments based on threats from the design and construction stages. Similarly, the U.S. nuclear regulatory body (NRC) has confirmed the status of security assessment and design considering design basis threats (DBTs) in the NuScale standard design review process, and the Canadian nuclear regulatory body (CNSC) has revised security regulatory guidelines and applied them to the SMR standard design review. Among these various activities related to SMR security, this paper analyzes the major changes in the cybersecurity regulatory guidelines for SMRs recently revised by the CNSC, the Canadian nuclear regulatory body. Compared to the previous guidelines, the Defensive Cybersecurity Architecture (DCSA), including external logical access control, security level and zone communication requirements, verification and validation (V&V) activities during development phases, and system & service acquisition security requirements have been added. Other changes, such as the cyber incident response program, will be analyzed and compared. Through the revised regulatory guidelines, the CNSC has divided cybersecurity levels into four (High, Moderate, Low, and Business), strictly prohibiting remote access to High and Moderate levels, and allowing remote access to Low levels only for maintenance purposes. In addition, the paper will analyze the detailed revisions, such as prohibiting access to the High level from lower levels and allowing only handshaking signals from the Low level to the Moderate level.
        404.
        2023.05 구독 인증기관·개인회원 무료
        This study examined the Democratic People’s Republic of Korea (DPRK)’s illegal trade in UNsanctioned items as revealed in the UN panel of experts report in order to estimate the types of illegal trade in nuclear items, one of the UN-sanctioned prohibited items, and to find efficient ways to block it. Also, The research revealed that DPRK secretly imports UN-sanctioned prohibited items without going through customs through maritime transshipment, conceals or disguises them through identity laundering by falsifying documents at customs clearance, and makes various attempts to escape the international community’s surveillance, such as using a combination of methods such as Re-Flagged and Double-Flagged for identity laundering, and concealing them without operating the Automatic Identification System (AIS) at sea. The DPRK’s Illicit trade cases have been divided into two types of transactions: those that violate customs clearance procedures by providing false information to customs through disguise or concealment, and those that do not go through normal customs procedures, such as smuggling. To block customs violations, technical measures such as increasing the number of inspections of container ships or improving the accuracy of inspections are required, while to block smuggling, since it does not go through physical inspections, there are ways to monitor it through satellite images or strengthen border enforcement such as airport bays and land routes. As a result, DPRK’s nuclear items are designated as sanctioned items under UN resolutions, and it is assumed that DPRK and its networks will attempt to trade illegally through a combination of customs clearance violations and non-customs clearance violations, depending on the circumstances. Furthermore, since DPRK is subject to extensive sanctions from the international community, including the UN, in connection with its nuclear weapons program, illegal trade continues, and efforts should be made to block illegal trade through physical inspection at customs clearance.
        405.
        2023.05 구독 인증기관·개인회원 무료
        Licensees are required to protect critical digital assets (CDAs) in nuclear facilities against cyber-attacks, up to and including design basis threat (DBT), according to「ACT ON PHYSICAL PROTECTION AND RADIOLOGICAL EMERGENCY」. However, CDAs may be excluded from cyber security regulations at nuclear power plant decommissioning, and this may lead to severe consequences if the excluded CDAs contain sensitive information such as the number and location of nuclear fuels and information on security officers. In that case, that information could be leaked to the adversary without adequately removing the information before discarding the CDAs. It can be potentially abused to threaten nuclear facilities inducing radiological sabotage and nuclear material theft. So, controls of sensitive information are needed. This study aims to derive regulatory improvements related to discarding CDAs that have sensitive information by analyzing foreign cases such as IAEA and U.S. NRC. The sensitive information in the IAEA guide is the following: (1) details of physical protection systems and any other security measures in place for nuclear material, other radioactive material, associated facilities, and activities; (2) information relating to the quantity and form of nuclear material or other radioactive material in use or storage; (3) information relating to the quantity and form of nuclear material or other radioactive material in transport; (4) details of computer systems; (5) contingency and response plans for nuclear security events; (6) personal information; (7) threat assessments and security alerting information; (8) details of sensitive technology; (9) details of vulnerabilities or weaknesses that relate to the above topics; (10) historical information on any of the above topics. In the case of the U.S. NRC, they categorize sensitive information into three groups: (1) classified information, (2) safeguard information (SGI), (3) sensitive unclassified non-safeguards information (SUNSI). Classified information is information whose compromise would cause damage to national security or assist in manufacturing nuclear weapons. The SGI concerns the physical protection of operating power reactors, spent fuel shipments, strategic special nuclear material, or other radioactive material. Finally, SUNSI is generally not publicly available information such as personnel privacy, attorney-client privilege, and a confidential source. IAEA recommends protecting the above sensitive information in accordance with NSS No.23-G (Security of Nuclear Information), and NRC protects classified information, SGI, and SUNSI under relative laws. In the case of ROK, if security control measures are enhanced CDAs that possess sensitive information, the risk of information leakage will be decreased when those CDAs are discarded.
        406.
        2023.05 구독 인증기관·개인회원 무료
        Nuclear Safety and Security Commission (NSSC) and KINAC review a Cyber Security Plan (CSP) by「ACT ON PHYSICAL PROTECTION AND RADIOLOGICAL EMERGENCY」. The CSP contains cyber security implementation plans for the licensee’s nuclear power plant, and it shall meet the requirements of KINAC/RS-015, a regulatory standard. The KINAC/RS-015 provides more detailed information on the legal requirements, so if licensees implement cyber security under the approved CSP, they can meet the law. To protect nuclear facilities from cyber-attacks, licensees should identify their essential digital assets, so-called “Critical Digital Assets” (CDAs). Then, they apply cyber security controls (countermeasures for cyber-attacks) on CDAs consisting of technical, operational, and management security controls. However, it is hard to apply cyber security controls on CDAs because of the large amounts of CDAs and security controls in contrast to the shortage of human resources. So, licensees in the USA developed a methodology to solve this problem and documented it by NEI 13-10, and US NRC endorsed this document. The main idea of this methodology is, by classifying CDAs according to their importance, applying small amounts of security controls on less important CDAs, so-called non-direct CDAs. In the case of non-direct CDAs, only basic cyber security controls are applied, that is, baseline cyber security controls. The baseline cyber security controls are a minimum set of cyber security controls; they consist of control a) from control g) a total of 7 controls. Although non-direct CDAs are less critical than other CDAs (direct CDAs), they are still essential to protect them from cyber-attacks. This paper aims to suggest a cyber security enhancement method for non-direct CDAs by analyzing the baseline cyber security controls. In this paper, baseline cyber security controls were analyzed respectively and relatively and then concluded how to apply small amounts of cyber security controls on non-direct CDAs rather than direct CDAs without scarifying cyber security.
        419.
        2023.04 KCI 등재 구독 인증기관 무료, 개인회원 유료
        Shenchuangtu (神創圖), written by an unknown author, discusses dots and strokes (筆劃), writing rules (筆法), and structures (結構) for regular script (楷書), a Chinese character font style. Dating back to the late 19th or early 20th century, Shenchuangtu begins with the Eight Principles of Yong (永字八法) and presents the names of seventy-two Chinese character dots and strokes that compose a character, also explaining ninety-four types of Chinese character structuring rules. It provides such valuable data, yet no systematic research has been conducted to date. As such, introducing the valuable data to the academic field in the present study is of great significance. In this study, Shenchuangtu is examined for its composition and content. Furthermore, Shenchuangtu is compared with Dazijiegou Bashisifa (大字結構八十四法), written by Li Chun (李淳) during the Ming Dynasty (明代). It is expected that this work can present significant research in the study of Korean and calligraphy, as well as Chinese characters.
        5,500원
        420.
        2023.04 KCI 등재 구독 인증기관 무료, 개인회원 유료
        세계 5대 갯벌해역으로 유명한 한국 서해 경기만의 기후변화 영향을 파악하고, 기후변화 영향을 최소화하기 위한 적응방안 연 구하였다. 경기만의 기후변화 영향으로 2100년에 수온은 1.2 ℃ 증가하고, 염분이 1.1 PSU 감소하며, 해수면은 35.2 cm 상승하는 것으로 예 측되었다. 또한 해수면 상승의 효과로 150.5 km2의 해안지역이 침수될 것으로 예상되었다. 기후변화로 인한 경기만 생태환경 영향을 최소 화하기 위한 적응대책으로는 1) 경기만 자체 자연환경의 적응능력 유지를 위한 지원, 2) 생물 서식지 확보를 위한 인간 활동 조정 등 두가 지 방안이 제시되었다.
        4,000원