493 research outputs found
A method for risk analysis of nuclear reactor accidents
Originally presented as the first author's thesis, (Ph. D.)--in the M.I.T. Dept. of Nuclear Engineering, 1976Includes bibliographical references (pages 207-208)Prepared for the U.S. Nuclear Regulatory Commission, Office of Nuclear Regulatory Research no. AT(49-24)-026
FRANTIC 5 (a version of FRANTIC II) : a computer code for evaluating system aging effect
"November 1986."Includes bibliographical referencesThe FRANTIC 5 code is a modification of the FRANTIC II code for time dependent unavailability analysis. FRANTIC 5 is specially adapted for modeling the aging effects on system and component performance. The FRANTIC 5 code uses the linear aging model, i.e., based on the assumption that component failure rates increase linearly in time. The constant failure rate and the aging acceleration rate for a component can be changed during the plant life, which allows the creation of different time scales for components as a function of the replacement or any significant maintenance or repair action on the component. FRANTIC 5 preserves most of the unique features of FRANTIC II, for example the modeling of periodic testing. The output from FRANTIC 5 consists of the system mean unavailabilities, tables of the system unavailabilities at designated time points and the system mean unavailabilities between consecutive tests. The code is applied for evaluation of aging effects of the Auxiliary Feedwater System of Arkansas Nuclear Unit 1. The usefulness of the method will depend upon the availability of the component aging data needed to develop the model parameters.Prepared for EG&G Idaho, Inc. special research subcontract no. C86-10094
Time dependent unavailability analysis to standby safety systems
"Prepared for Brookhaven National Laboratory."Includes bibliographical references (p. 280-284)Contract no. BNL-54668
Recommended from our members
Handbook of methods for risk-based analysis of technical specifications
Technical Specifications (TS) requirements for nuclear power plants define the Limiting Conditions for Operations (LCOs) and Surveillance Requirements (SRs) to assure safety during operation. In general, these requirements are based on deterministic analyses and engineering judgments. Improvements in these requirements are facilitated by the availability of plant-specific Probabilistic Risk Assessments (PRAs). The US Nuclear Regulatory Commission (USNRC) Office of Research sponsored research to develop systematic, risk-based methods to improve various aspects of TS requirements. A handbook of methods summarizing such risk-based approaches has been completed in 1994. It is expected that this handbook will provide valuable input to NRC`s present work in developing guidance for using PRA in risk-informed regulation. The handbook addresses reliability and risk-based methods for evaluating allowed outage times (AOTs), action statements requiring shutdown where shutdown risk may be substantial, surveillance test intervals (STIs), managing plant configurations, and scheduling maintenance
Structural cloud audits that protect private information
As organizations and individuals have begun to rely more and more heavily on cloud-service providers for critical tasks, cloud-service reliability has become a top priority. It is natural for cloud-service providers to use redundancy to achieve reliability. For example, a provider may replicate critical state in two data centers. If the two data centers use the same power supply, however, then a power out-age will cause them to fail simultaneously; replication per se does not, therefore, enable the cloud-service provider to make strong reliability guarantees to its users. Zhai et al. [28] present a sys-tem, which they refer to as a structural-reliability auditor (SRA), that uncovers common dependencies in seemingly disjoint cloud-infrastructural components (such as the power supply in the exam-ple above) and quantifies the risks that they pose. In this paper, we focus on the need for structural-reliability auditing to be done in a privacy-preserving manner. We present a privacy-preserving structural-reliability auditor (P-SRA), discuss its privacy proper-ties, and evaluate a prototype implementation built on the Share-mind SecreC platform [6]. P-SRA is an interesting application of secure multi-party computation (SMPC), which has not often been used for graph problems. It can achieve acceptable running times even on large cloud structures by using a novel data-partitioning technique that may be useful in other applications of SMPC
Model-Based Security Testing
Security testing aims at validating software system requirements related to
security properties like confidentiality, integrity, authentication,
authorization, availability, and non-repudiation. Although security testing
techniques are available for many years, there has been little approaches that
allow for specification of test cases at a higher level of abstraction, for
enabling guidance on test identification and specification as well as for
automated test generation.
Model-based security testing (MBST) is a relatively new field and especially
dedicated to the systematic and efficient specification and documentation of
security test objectives, security test cases and test suites, as well as to
their automated or semi-automated generation. In particular, the combination of
security modelling and test generation approaches is still a challenge in
research and of high interest for industrial applications. MBST includes e.g.
security functional testing, model-based fuzzing, risk- and threat-oriented
testing, and the usage of security test patterns. This paper provides a survey
on MBST techniques and the related models as well as samples of new methods and
tools that are under development in the European ITEA2-project DIAMONDS.Comment: In Proceedings MBT 2012, arXiv:1202.582
Properties of odd nuclei and the impact of time-odd mean fields: A systematic Skyrme-Hartree-Fock analysis
We present a systematic analysis of the description of odd nuclei by the
Skyrme-Hartree-Fock approach augmented with pairing in BCS approximation and
blocking of the odd nucleon. Current and spin densities in the Skyrme
functional produce time-odd mean fields (TOMF) for odd nuclei. Their effect on
basic properties (binding energies, odd-even staggering, separation energies
and spectra) is investigated for the three Skyrme parameterizations SkI3, SLy6,
and SV-bas. About 1300 spherical and axially-deformed odd nuclei with 16 < Z <
92 are considered. The calculations demonstrate that the TOMF effect is
generally small, although not fully negligible. The influence of the Skyrme
parameterization and the consistency of the calculations are much more
important. With a proper choice of the parameterization, a good description of
binding energies and their differences is obtained, comparable to that for even
nuclei. The description of low-energy excitation spectra of odd nuclei is of
varying quality depending on the nucleus
Skyrme-Rpa Description of Dipole Giant Resonance in Heavy and Superheavy Nuclei
The E1(T=1) isovector dipole giant resonance (GDR) in heavy and super-heavy
deformed nuclei is analyzed over a sample of 18 rare-earth nuclei, 4 actinides
and three chains of super-heavy elements (Z=102, 114 and 120). Basis of the
description is self-consistent separable RPA (SRPA) using the Skyrme force
SLy6. The self-consistent model well reproduces the experimental data (energies
and widths) in the rare-earth and actinide region. The trend of the resonance
peak energies follows the estimates from collective models, showing a bias to
the volume mode for the rare-earths isotopes and a mix of volume and surface
modes for actinides and super-heavy elements. The widths of the GDR are mainly
determined by the Landau fragmentation which in turn is found to be strongly
influenced by deformation. A deformation splitting of the GDR can contribute
about one third to the width and about 1 MeV further broadening can be
associated to mechanism beyond the mean-field description (escape, coupling
with complex configurations).Comment: 9 pages, 12 figures, 2 table
PP2A/B55 and Fcp1 regulate Greatwall and Ensa desphorylation during mitotic exit
Entry into mitosis is triggered by activation of Cdk1 and inactivation of its counteracting phosphatase PP2A/B55. Greatwall kinase inactivates PP2A/B55 via its substrates Ensa and ARPP19. Both Greatwall and Ensa/ARPP19 are regulated by phosphorylation, but the dynamic regulation of Greatwall activity and the phosphatases that control Greatwall kinase and its substrates are poorly understood. To address these questions we applied a combination of mathematical modelling and experiments using phospho-specific antibodies to monitor Greatwall, Ensa/ARPP19 and Cdk substrate phosphorylation during mitotic entry and exit. We demonstrate that PP2A/B55 is required for Gwl dephosphorylation at the essential Cdk site Thr194. Ensa/ARPP19 dephosphorylation is mediated by the RNA Polymerase II carboxy terminal domain phosphatase Fcp1. Surprisingly, neither Fcp1 nor PP2A appear to essential to dephosphorylate the bulk of mitotic Cdk1 substrates following Cdk1 inhibition. Taken together our results suggest a hierarchy of phosphatases coordinating Greatwall, Ensa/ARPP19 and Cdk substrate dephosphorylation during mitotic exit
- …