493 research outputs found

    A method for risk analysis of nuclear reactor accidents

    Get PDF
    Originally presented as the first author's thesis, (Ph. D.)--in the M.I.T. Dept. of Nuclear Engineering, 1976Includes bibliographical references (pages 207-208)Prepared for the U.S. Nuclear Regulatory Commission, Office of Nuclear Regulatory Research no. AT(49-24)-026

    FRANTIC 5 (a version of FRANTIC II) : a computer code for evaluating system aging effect

    Get PDF
    "November 1986."Includes bibliographical referencesThe FRANTIC 5 code is a modification of the FRANTIC II code for time dependent unavailability analysis. FRANTIC 5 is specially adapted for modeling the aging effects on system and component performance. The FRANTIC 5 code uses the linear aging model, i.e., based on the assumption that component failure rates increase linearly in time. The constant failure rate and the aging acceleration rate for a component can be changed during the plant life, which allows the creation of different time scales for components as a function of the replacement or any significant maintenance or repair action on the component. FRANTIC 5 preserves most of the unique features of FRANTIC II, for example the modeling of periodic testing. The output from FRANTIC 5 consists of the system mean unavailabilities, tables of the system unavailabilities at designated time points and the system mean unavailabilities between consecutive tests. The code is applied for evaluation of aging effects of the Auxiliary Feedwater System of Arkansas Nuclear Unit 1. The usefulness of the method will depend upon the availability of the component aging data needed to develop the model parameters.Prepared for EG&G Idaho, Inc. special research subcontract no. C86-10094

    Time dependent unavailability analysis to standby safety systems

    Get PDF
    "Prepared for Brookhaven National Laboratory."Includes bibliographical references (p. 280-284)Contract no. BNL-54668

    Structural cloud audits that protect private information

    Full text link
    As organizations and individuals have begun to rely more and more heavily on cloud-service providers for critical tasks, cloud-service reliability has become a top priority. It is natural for cloud-service providers to use redundancy to achieve reliability. For example, a provider may replicate critical state in two data centers. If the two data centers use the same power supply, however, then a power out-age will cause them to fail simultaneously; replication per se does not, therefore, enable the cloud-service provider to make strong reliability guarantees to its users. Zhai et al. [28] present a sys-tem, which they refer to as a structural-reliability auditor (SRA), that uncovers common dependencies in seemingly disjoint cloud-infrastructural components (such as the power supply in the exam-ple above) and quantifies the risks that they pose. In this paper, we focus on the need for structural-reliability auditing to be done in a privacy-preserving manner. We present a privacy-preserving structural-reliability auditor (P-SRA), discuss its privacy proper-ties, and evaluate a prototype implementation built on the Share-mind SecreC platform [6]. P-SRA is an interesting application of secure multi-party computation (SMPC), which has not often been used for graph problems. It can achieve acceptable running times even on large cloud structures by using a novel data-partitioning technique that may be useful in other applications of SMPC

    Model-Based Security Testing

    Full text link
    Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST) is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.Comment: In Proceedings MBT 2012, arXiv:1202.582

    Properties of odd nuclei and the impact of time-odd mean fields: A systematic Skyrme-Hartree-Fock analysis

    Get PDF
    We present a systematic analysis of the description of odd nuclei by the Skyrme-Hartree-Fock approach augmented with pairing in BCS approximation and blocking of the odd nucleon. Current and spin densities in the Skyrme functional produce time-odd mean fields (TOMF) for odd nuclei. Their effect on basic properties (binding energies, odd-even staggering, separation energies and spectra) is investigated for the three Skyrme parameterizations SkI3, SLy6, and SV-bas. About 1300 spherical and axially-deformed odd nuclei with 16 < Z < 92 are considered. The calculations demonstrate that the TOMF effect is generally small, although not fully negligible. The influence of the Skyrme parameterization and the consistency of the calculations are much more important. With a proper choice of the parameterization, a good description of binding energies and their differences is obtained, comparable to that for even nuclei. The description of low-energy excitation spectra of odd nuclei is of varying quality depending on the nucleus

    Skyrme-Rpa Description of Dipole Giant Resonance in Heavy and Superheavy Nuclei

    Full text link
    The E1(T=1) isovector dipole giant resonance (GDR) in heavy and super-heavy deformed nuclei is analyzed over a sample of 18 rare-earth nuclei, 4 actinides and three chains of super-heavy elements (Z=102, 114 and 120). Basis of the description is self-consistent separable RPA (SRPA) using the Skyrme force SLy6. The self-consistent model well reproduces the experimental data (energies and widths) in the rare-earth and actinide region. The trend of the resonance peak energies follows the estimates from collective models, showing a bias to the volume mode for the rare-earths isotopes and a mix of volume and surface modes for actinides and super-heavy elements. The widths of the GDR are mainly determined by the Landau fragmentation which in turn is found to be strongly influenced by deformation. A deformation splitting of the GDR can contribute about one third to the width and about 1 MeV further broadening can be associated to mechanism beyond the mean-field description (escape, coupling with complex configurations).Comment: 9 pages, 12 figures, 2 table

    PP2A/B55 and Fcp1 regulate Greatwall and Ensa desphorylation during mitotic exit

    Get PDF
    Entry into mitosis is triggered by activation of Cdk1 and inactivation of its counteracting phosphatase PP2A/B55. Greatwall kinase inactivates PP2A/B55 via its substrates Ensa and ARPP19. Both Greatwall and Ensa/ARPP19 are regulated by phosphorylation, but the dynamic regulation of Greatwall activity and the phosphatases that control Greatwall kinase and its substrates are poorly understood. To address these questions we applied a combination of mathematical modelling and experiments using phospho-specific antibodies to monitor Greatwall, Ensa/ARPP19 and Cdk substrate phosphorylation during mitotic entry and exit. We demonstrate that PP2A/B55 is required for Gwl dephosphorylation at the essential Cdk site Thr194. Ensa/ARPP19 dephosphorylation is mediated by the RNA Polymerase II carboxy terminal domain phosphatase Fcp1. Surprisingly, neither Fcp1 nor PP2A appear to essential to dephosphorylate the bulk of mitotic Cdk1 substrates following Cdk1 inhibition. Taken together our results suggest a hierarchy of phosphatases coordinating Greatwall, Ensa/ARPP19 and Cdk substrate dephosphorylation during mitotic exit
    corecore