• No results found

Control System of a Super Fast Reactor with Single Flow Pass Core

N/A
N/A
Protected

Academic year: 2020

Share "Control System of a Super Fast Reactor with Single Flow Pass Core"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig. 1 Core designs of SCW fast reactors (a) up and down flow direction 2-pass core, (b) all up flow direction 2-pass core, (c) one-pass core
Fig. 4 Step response of the one-pass SCW fast reactor to a reduction of turbine control valve aperture by 5%
Fig. 7 Performance of the pressure control system regarding a 10% stepwise decrease of power set point: (a) Change of turbine control valve opening, (b) Response of the pressure
Fig. 9 Response of the one-pass SCW fast reactor to a typical load change: (a) Change of the power and coolant flow; (b) Response of the steam temperature
+2

References

Related documents

International Journal of Scientific Research in Computer Science, Engineering and Information Technology CSEIT1835186 | Received 05 June 2018 | Accepted 15 June 2018 | May June 2018 [

improving Mobile App Quality testing commercial solutions crowd the mobile test automation space, ranging from traditional testing vendors like iBM, Hp enterprise, cA, tricentis,

Hypothesis 1: There will be a positive relationship between customer service orientation of the hotel and the service recovery performance of frontline hotel staff.. The

3) Activation Function Layer: Element wise activation function is applied to the output of convolution layer by activation function layer. The volume remains

231, 252 (2008) (“A company will use risk management in- struments to transfer those risks that counterparties can manage at lower cost. Hedging against pre-existing risk is mitigating

Haslam-McKenzie (cited in Barclay et al. And even when there is a succession plan in place, little discussion has taken place amongst the family during its development. This

Provable data possession (PDP) (or proofs of recoverable (POR) is this a probabilistic validation technique for a storage provider to prove the integrity and