Analysis of Individual Fuel Element Burnup and Core Burnup Lifetime of BAEC TRIGA Core Using TRIGAP Code
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 8
Abstract
The 3 MW TRIGA Mark II research reactor of Bangladesh Atomic Energy Commission (BAEC) has been operating since 1986 without any reshuffling or reloading yet. The key objective of this study was to calculate the core burnup lifetime at 700 MWd of the BAEC TRIGA Low Enrichment Uranium (LEU) fresh core and it is an important characteristic of the in-core fuel management. The core burnup lifetimes at 2 MW power condition was calculated using TRIGAP code. The calculated results were compared to the three dimensional MVP-BURN result and also the reference data of Safety Evaluation Report (NUREG-1282). It was found that the calculated core burnup lifetime shows a good agreement to the MVP-BURN result. By analyzing the results it might be concluded that the TRIGAP code shows a good performance for core burnup lifetime calculation of the LEU fresh core of 3 MW TRIGA MARK II research reactor, which reflects that the TRIGA model is simulated properly by TRIGAP code.
Authors and Affiliations
M Asaduzzaman, S. M. A. Islam, M. J. H. Khan, M. S. Hossain
slugModeling and Design of MEMS Accelerometer to detect vibrations on chest wall
A slight vibration is felt when a hand is placed on the chest. The vibration has great information as sounds, functions of heart and lung motion. The screening of heart disease can be carried out by listening to hear...
A Review of complexity method for wireless Channel Estimation using a BEM
Our channel estimation method differs in its ability to estimate fast time-varying wireless channel since pilot tones are inserted into each OFDM block, and in its explicit relation with space-frequency code design whic...
Implementation of GSM and Zigbee Technology to Improve the Operational Efficiency of Road Transportation System
At the moment, reporting bus station is rely mainly on driver’s manual operation, thus, making mistakes and misleading passengers becomes inevitable when driving the bus. Therefore, this Paper proposes a supervisory sys...
Secure Data Storage in Cloud
Now-a-days, we have the ability to utilize scalable, distributed computing environments within the confines of the Internet, a practice known as cloud computing. Cloud computing can be said as the long term vision of co...
slugBest Path Routing Algorithm for IDS
In networking there can be any type of security compromise.IDS detects such type of security threat. Information is transferred from one point to another point across the network. There may be various paths between sour...