河北科技大学研究生学位论文格式及范文 下载本文

摘 要

摘 要

核电站核级阀门的设计技术提出将电控系统和阀门整体结合在一起,从全局考虑阀门整体的一致性和优化性。本文参照核电阀门的设计技术,根据项目要求初步设计出自主研发的核电厂风道阀门电控系统。为了进一步扩大该电控系统的使用范围,使之可在强核辐射环境下正常运行,本文阐述了核辐射对电路的损伤效应和机理。

本文针对该电控系统中最易失效的电子单元,通过仿真实验研究了0.8μm PMOSFET 经过Co-60γ射线辐照后的总剂量效应,分析了辐照效应对器件可靠性的影响。并在此基础上设计了抗辐照反相器单元,通过 ISE-TCAD 软件模拟总剂量辐照效应对传统反相器以及抗辐照反相器单元电路的影响。仿真结果表明,经过加固设计的反相器单元在经受 1000krad(Si)的辐照后,输出依然可以保持“高”电平。 之后本文针对本电控系统在辐射中容易失效的稳压模块7805CT进行更换,换为可靠性更高的HZD05B-12S05型DC/DC 转换器,并对其进行了进一步研究。转换器的可靠性尤其是抗辐射性能在近年来备受关注,其中PWM 控制器是 DC/DC 转换器反馈控制回路中的核心器件,辐射引起的 PWM控制器的功能退化将导致 DC/DC 转换器输出不稳定甚至失效。VDMOS 器件是转换器的开关和线性放大器件,辐射引起的 VDMOS 器件退化会导致 DC/DC 转换器效率下降。本文从 PWM 和 VDMOS 器件辐射退化和 DC/DC 转换器整体退化之间的定量关系研究入手,利用噪声和 VDMOS 器件与 PWM 辐射退化之间的定量关系,设计出了易损器件抗辐射筛选方案,并仿真验证了筛选效果。实验结果表明累积辐照剂量在 300Krad(Si)之前,经筛选加固的DC/DC 转换器输出电压可以保持基本不变;累积辐照剂量达到 500Krad(Si)时,输出电压增大到 5.05V,比未经筛选的 DC/DC 转换器输出电压变化量小 0.1V,显示出了更好的抗辐射特性。做为对筛选方法的必要补充,同时引入了可靠性工程的新理念,PHM方法。设计出了基于PHM理念的DC/DC转换器整体预兆单元,通过仿真验证其效果,表明该方案有很强的实用性,可以进一步提高电控系统的可靠性。

关键词 电控系统;核电;核辐射;可靠性

I

河北科技大学硕士学位论文

Abstract

In view of research that a newly built chemical industrial zone and Supporting wastewater treatment equipments.On the basis of quantity and quality of the water in one chemical industrial zone,this paper investigates and studies current process of high concentrated Organic Pollutants,NH3-N and COD in petrochmical wastewater,and compares two options and selects the optimum plan that adjustment—sedimentation--1 -class A/O--2-class A/O--monitor-sanitizeing.This research subject is treated Petrochemical project wastewater,which is good in stable discharging water,easy maintenance and management and good reliability and practical,which removal efficiency of BOD,COD and SS.This paper has desgined overall sewage treatment plant in chemical industrial zone,and the water quality meets 2-class criteria specified in the Integrated Wastewater Discharge Standard (GB 8978-1996). The selected treatment methods solves the problem that Organic Pollutants in petrochmical wastewater is difficult to Biodegradate and accomplishes the design of sewage treatment plant.The scale of this project construction is 3×104m3/d,covers the area of 13000m2,Rough calculation of investment is 15022.18×104yuan,one Cubic meter wastewater treatment and operation cost 2.61yuan and 1.94yuan.Through benefit evaluation,the project has good environment effect and the social effect.The design study providing reference for similar chemical industrical Sewage treatment plants.

Key words Chemical industry;Industrial wastewater;Biological treatment;Wastewater

treatment technology;Design of sewage treatment plant

II

目 录

目 录

摘 要 ··································································································· I Abstract ································································································· II 第1章 绪 论 ························································································ 1 1.1 论文的研究背景 ············································································· 1 1.1.1 研究背景 ················································································ 1 1.1.2 选题意义 ················································································ 1 1.2 国内外研究现状及发展趋势 ······························································ 1 1.2.1 物理方法 ················································································ 1 1.2.2 化学方法 ················································································ 2 1.2.3 生物处理法 ············································································· 2 1.2.4 超声法 ··················································································· 3 1.3 研究内容 ······················································································ 3 第2章 SSL协议内容及研究 ····································································· 5 2.1 SSL协议的概述 ············································································· 5 2.1.1 SSL的协议堆栈 ······································································· 5 2.1.2 数据的传输流程 ······································································· 6 2.2 SSL连接及会话 ············································································· 6 2.3 记录协议层 ··················································································· 7 2.3.1 记录协议的操作过程 ································································· 7 2.3.2 SSL记录格式 ·········································································· 8 2.4 SSL改变加密约定协议 ···································································· 9 2.5 本章小结 ······················································································ 9 第3章 信息安全机制 ············································································· 11 3.1 加密机制 ····················································································· 11 3.1.1 密码学基础知识 ······································································ 11 3.1.2 对称加密算法 ········································································· 12 3.1.3 公开密钥密码 ········································································· 12 3.2 数据完整性机制 ············································································ 13 3.2.1 数据完整性验证 ······································································ 13 3.2.2 数字摘要 ··············································································· 13 3.3 数字签名机制 ··············································································· 13

III

河北科技大学硕士学位论文

3.3.1 数字摘要 ··············································································· 13 3.3.2 数字摘要的实现方 ··································································· 13 3.4 访问数字签名机制 ········································································· 14 3.5 本章小结 ····················································································· 14 第4章 安全代理的设计与分析 ································································· 15 4.1 计算机代理技术 ············································································ 15 4.2 设计安全代理的必要性 ··································································· 15 4.3 安全代理的工作原理 ······································································ 16 4.3.1 安全代理的客户端原理 ····························································· 16 4.3.2 安全代理的服务端原理 ····························································· 17 4.4 本论文设计的主要工作 ··································································· 18 4.5 安全代理的设计思想 ······································································ 18 4.5.1 安全代理的客户端设计 ····························································· 18 4.5.2 安全代理的服务端设计 ····························································· 19 4.6 本章小结 ····················································································· 20 第5章 安全代理的实现 ·········································································· 21 5.1 安全代理的实现技术 ······································································ 21 5.1.1 密码技术 ··············································································· 21 5.1.2 套接字编程技术 ······································································ 21 5.2 本章小结 ····················································································· 22 结 论 ·································································································· 23 附 录 ·································································································· 25

附录A ··························································································· 25 附录B ···························································································· 25 参考文献 ······························································································ 27 攻读硕士学位期间所发表的论文 ································································ 29 致 谢 ·································································································· 31 个人简历 ······························································································ 33

IV