NPP Krško containment modelling with the ASTEC code

نویسندگان

چکیده

ASTEC is an integral computer code jointly developed by Institut de Radioprotection et Sûreté Nucléaire (IRSN, France) and Gesellschaft für Anlagenund Reaktorsicherheit (GRS, Germany) to assess nuclear power plant behaviour during a severe accident (SA). The was used model simulate NPP postulated station blackout in the Krško. analysis focused on containment behaviour; however complete carried out order provide correct boundary conditions for calculation. During accident, integrity challenged release of reactor system coolant through degraded pump seals, molten corium concrete interaction direct heating mechanisms. Impact those processes relevant parameters, such as compartments pressures temperatures, going be discussed paper.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

- Dalsgaard ASTEC – the Aarhus STellar Evolution Code

The Aarhus code is the result of a long development, starting in 1974, and still ongoing. A novel feature is the integration of the computation of adiabatic oscillations for specified models as part of the code. It offers substantial flexibility in terms of microphysics and has been carefully tested for the computation of solar models. However, considerable development is still required in the ...

متن کامل

Stand-alone containment analysis of Phébus FPT tests with ASTEC and MELCOR codes: the FPT-2 test

During the last 40 years, many studies have been carried out to investigate the different phenomena occurring during a Severe Accident (SA) in a Nuclear Power Plant (NPP). Such efforts have been supported by the execution of different experimental campaigns, and the integral Phébus FP tests were probably some of the most important experiments in this field. In these tests, the degradation of a ...

متن کامل

A Flexible Containment Mechanism for Executing Untrusted Code

A widely used technique for securing computer systems is to execute programs inside protection domains that enforce established security policies. These containers, often referred to as sandboxes, come in a variety of forms. Although current sandboxing techniques have individual strengths, they also have limitations that reduce the scope of their applicability. In this paper, we give a detailed...

متن کامل

Modelling the Checkability of Reusable Code

An important aspect of reusing code is making sure it is used correctly. The easier it is to do this, the easier it is reuse the code with conndence. However techniques developed to do such checking, such as type systems, are not universally accepted because they are regarded as being too diicult to use or too restrictive. We believe a better understanding of \checkability" is important, and we...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Energija

سال: 2022

ISSN: ['0354-8651', '2812-7528']

DOI: https://doi.org/10.37798/2015641-4150