WorldWideScience

Sample records for criticality alarm system

  1. Transportable criticality alarm system

    International Nuclear Information System (INIS)

    Clem, W.E.

    1988-09-01

    The Transportable Criticality Alarm System was developed at the Hanford Site in 1982 to comply with the requirements of US Department of Energy Order DOE 5480.1, 12/18/80, and ANSI/ANS-8.3- 1979. The portable unit that it replaced failed to comply with the new requirements in that it did not provide the necessary warning of malfunctions, nor did it provide the Hanford Site standard criticality alarm signal. Modern technology allowed the Transportable Criticality Alarm System to comply with the criticality requirements cited and to incorporate other features that make it more usable, maintainable, and reliable. The Transportable Criticality Alarm System (TCAS) provides temporary criticality coverage in manned areas where the facility criticality alarm system is not operable. This gamma radiation-sensitive system has been in use for the past 6 yr at the Hanford Site. 2 refs., 4 figs., 1 tab

  2. Criticality accident alarm system

    International Nuclear Information System (INIS)

    Malenfant, R.E.

    1991-01-01

    The American National Standard ANSI/ANS-8.3-1986, Criticality Accident Alarm System provides guidance for the establishment and maintenance of an alarm system to initiate personnel evacuation in the event of inadvertent criticality. In addition to identifying the physical features of the components of the system, the characteristics of accidents of concern are carefully delineated. Unfortunately, this ANSI Standard has led to considerable confusion in interpretation, and there is evidence that the ''minimum accident of concern'' may not be appropriate. Furthermore, although intended as a guide, the provisions of the standard are being rigorously applied, sometimes with interpretations that are not consistent. Although the standard is clear in the use of absorbed dose in free air of 20 rad, at least one installation has interpreted the requirement to apply to dose in soft tissue. The standard is also clear in specifying the response to both neutrons and gamma rays. An assembly of uranyl fluoride enriched to 5% 235 U was operated to simulate a potential accident. The dose, delivered in a free run excursion 2 m from the surface of the vessel, was greater than 500 rad, without ever exceeding a rate of 20 rad/min, which is the set point for activating an alarm that meets the standard. The presence of an alarm system would not have prevented any of the five major accidents in chemical operations nor is it absolutely certain that the alarms were solely responsible for reducing personnel exposures following the accident. Nevertheless, criticality alarm systems are now the subject of great effort and expense. 13 refs

  3. Transactions of the criticality alarm systems workshop

    International Nuclear Information System (INIS)

    1988-01-01

    The first Criticality Alarm workshop was held by the US Department of Energy Albuquerque Operations Office in 1985. This second workshop is the first held on an international level. There were 98 persons in attendance. They represented the Department of Energy (DOE) field offices, DOE contractors, the Nuclear Regulatory Commission (NRC), NRC licensees, and agencies in the United Kingdom, France, West Germany, and Japan. Topics were on practices experience, and development. A key value of the workshop was the sharing of critical alarm system experiences, problems, and advances in the state of the art. In addition, several Criticality Alarm Systems (CAS) equipment systems were exhibited. Papers were presented on: nature of criticality accidents; lessons learned from past accidents; application of ANS 8.3 standard; gamma and neutron detection systems; research and development in progress; testing at Oak Ridge and Los Alamos; methods used to place detectors; centralized readout feature; false alarms; trip-point settings; and testing and maintenance. The individual papers have been cataloged separately

  4. Technical guide to criticality alarm system design

    International Nuclear Information System (INIS)

    Greenfield, B.

    2009-01-01

    An instructional manual was created to guide criticality safety engineers through the technical aspects of designing a criticality alarm system (CAS) for Dept. of Energy (DOE) hazard class 1 and 2 facilities. The manual was structured such that it can be used by engineers designing completely new systems and by those who are working with existing facilities. Major design tasks are thoroughly analyzed to provide concise direction for how to complete the analysis. Regulatory and technical performance requirements were both addressed. (authors)

  5. Design criteria and principles for criticality detection and alarm systems

    International Nuclear Information System (INIS)

    Delafield, H.J.; Clifton, J.J.

    1984-10-01

    The report gives design principles and criteria for criticality detection and alarm systems based on earlier work and revised in the light of more recent experience. In particular, account is taken of the developments which have taken place in the field of radiation detection and in the understanding of the different types of criticality excursion. General guidance is given on the principles to apply in deciding upon the need for a criticality system. The characteristics of a criticality incident are described in terms of the minimum incident of concern, and the radiation field. Criteria for the threshold of detection of a criticality incident are then derived and the methods of detection considered. The selection and siting of criticality detectors is discussed, and design principles are given for alarm systems. Finally, testing and post-alarm procedures are outlined, followed by a summary of the principal recommendations. The supporting Appendices include a discussion of reliability and a summary of radiation detector characteristics. (author)

  6. Development of a criticality monitoring and alarm system

    International Nuclear Information System (INIS)

    Egey, Julio; Izraelevitch, Federico H.; Matatagui, Emilio

    2009-01-01

    In this work we are presenting the development of a Criticality Monitor and Alarm System (SIMAC). It monitors the burst of radiation produced during such an accident and triggers an alarm for evacuation in case the radiation exceeds a pre-established threshold. It consists of two subsystems, one for gamma rays and the other for neutrons. Each subsystem has three independent detectors modules. Each module is composed of an ion chamber plus its associated electronics, feeding a logic module that in turn would trigger the evacuation alarm. An additional feature is a PC interface for data acquisition. The radiation detectors are ion chambers working in current mode. The electronics associated to each detector can manage a wide signal range using a logarithmic converter. (author)

  7. Recent and proposed changes in criticality alarm system requirements

    International Nuclear Information System (INIS)

    Putman, V.L.

    1998-01-01

    Various changes in criticality alarm system (CAS) requirements of American Nuclear Society (ANS) standards, US Department of Energy (DOE) orders, US Nuclear Regulatory Commission (NRC) regulations and guidance, and Occupational Safety and Health Administration (OSHA) standards or regulations were approved or proposed in the last 5 yr. Many changes interpreted or clarified existing requirements or accommodated technological or organizational developments. However, some changes could substantively affect CAS programs, including several changes originally thought to be editorial. These changes are discussed here

  8. Plutonium Finishing Plant (PFP) Criticality Alarm System Commercial Grade Item (CGI) Critical Characteristics

    International Nuclear Information System (INIS)

    WHITE, W.F.

    1999-01-01

    This document specifies the critical characteristics for Commercial Grade Items (CGI) procured for PFP's criticality alarm system as required by HNF-PRO-268 and HNF-PRO-1819. These are the minimum specifications that the equipment must meet in order to properly perform its safety function. There may be several manufacturers or models that meet the critical characteristics for any one item. PFP's Criticality Alarm System includes the nine criticality alarm system panels and their associated hardware. This includes all parts up to the first breaker in the electrical distribution system. Specific system boundaries and justifications are contained in HNF-SD-CP-SDD-003, ''Definition and Means of Maintaining the Criticality Detectors and Alarms Portion of the PFP Safety Envelope.'' The procurement requirements associated with the system necessitates procurement of some system equipment as Commercial Grade Items in accordance with HNF-PRO-268, ''Control of Purchased Items and Services.''

  9. Criticality alarm device

    International Nuclear Information System (INIS)

    Kasai, Kenji.

    1994-01-01

    The device of the present invention is utilized, for example, to a reprocessing facility for storing and processing nuclear fuels and measures and controls the nuclear fuel assembly system so as not to exceed criticality. That is, a conventional criticality alarm device applies a predetermined processing to neutron fluxes generated from a nuclear fuel assembly system containing nuclear fuels and outputs an alarm. The device of the present invention comprises (1) a neutron flux supply source for increasing and decreasing neutron fluxes periodically and supplying them to nuclear fuel assemblies, (2) a detector for detecting neutron fluxes in the nuclear fuel assemblies, (3) a critical state judging section for judging the critical state of the nuclear fuel assemblies based on the periodically changing signals obtained from the detector (2) and (4) an alarm section for outputting criticality alarms depending on the result of the judgement. The device of the present invention can accurately recognize the critical state of the nuclear fuel assembly system and can forecast reaching of the nuclear fuel assembly to criticality or prompt neutron critical state. (I.S.)

  10. Masters Thesis- Criticality Alarm System Design Guide with Accompanying Alarm System Development for the Radioisotope Production Laboratory in Richland, Washington

    Energy Technology Data Exchange (ETDEWEB)

    Greenfield, Bryce A. [Univ. of New Mexico, Albuquerque, NM (United States)

    2009-12-01

    A detailed instructional manual was created to guide criticality safety engineers through the process of designing a criticality alarm system (CAS) for Department of Energy (DOE) hazard class 1 and 2 facilities. Regulatory and technical requirements were both addressed. A list of design tasks and technical subtasks are thoroughly analyzed to provide concise direction for how to complete the analysis. An example of the application of the design methodology, the Criticality Alarm System developed for the Radioisotope Production Laboratory (RPL) of Richland, Washington is also included. The analysis for RPL utilizes the Monte Carlo code MCNP5 for establishing detector coverage in the facility. Significant improvements to the existing CAS were made that increase the reliability, transparency, and coverage of the system.

  11. A criticism of ANSI/ANS-8.3-1986: Criticality accident alarm system

    International Nuclear Information System (INIS)

    Malenfant, R.E.

    1991-01-01

    The American National Standard on criticality accident alarm systems has given rise to confusion in interpretation and implementation of the requirements. In addition, some of the standards have recently been incorporated into US Department of Energy (DOE) orders, and others have been paraphrased in the DOE orders. Some of the DOE orders referencing these standards are being incorporated into law by means of the Code of Federal Regulations. As such, the intent of the authors of the standards to recommend a code of good practice is now being codified into law with attendant civil and criminal penalties for failure to comply. It is suggested that ANSI/ANS-8.3-1986, Critically Accident Alarm System, be carefully reviewed to alleviate the confusion that has been experienced in practice, to clarify the minimum accident of concern, to further define the dose (or dose rate) criteria for activation, and to stress the fact that a prime consideration in any safety system is the overall reduction of risk

  12. CSER 95-003: Exemption from Criticality Alarm System requirement for 232-Z building

    International Nuclear Information System (INIS)

    Nirider, L.T.; Miller, E.M.

    1995-01-01

    This CSER establishes an exemption for 232-Z from the requirement for a Criticality Alarm System, because the formation of a critical configuration is not a credible event for any circumstance involving the cleaning out and removal of the Burning Hood and associated equipment

  13. Criticality alarm device

    International Nuclear Information System (INIS)

    Sasaki, Takashi.

    1995-01-01

    In a critical alarm device comprising an n-number of radiation detectors and a 2/3 logic module, the 2/3 logic module comprises a rectifier inputting an output of an AC power and outputting it as a full wave-rectified, DC voltage, an analog/digital converter inputting the output from the rectifier, putting it to analog/digital conversion and continuously storing it into a memory, a latch circuit inputting critical signals from the 2/3 logic and holding them and outputting latch signals, and a means for outputting timing signals for data storage to a memory based on clocks at a predetermined period and outputting timing signals for stopping the data storage to the memory after passing a predetermined period from the inputting time point if the latch signals are inputted from the latch circuit. Then, judgement whether the generation of criticality is caused by an actual radiation detection or by noises from the power source is enabled, to provide extremely high reliability. (N.H.)

  14. Review of design criteria for Criticality Accident Alarm System (CAAS) used in Fuel Reprocessing Facility

    International Nuclear Information System (INIS)

    Chandrasekaran, S.; Basu, Pew; Sivasubramaniyan, K.; Venkatraman, B.

    2016-01-01

    Though fuel cycle facilities handling fissile materials are designed with careful criticality safety analysis, the criticality accident cannot be ruled out completely. Criticality Accident Alarm System (CAAS) is being installed as part of criticality safety management in fuel cycle facilities. CAAS system being used in India, is ECIL make, ionization chamber based gamma detector, which houses three identical detectors and works on 2/3 logic. As per ISO 7753 and ANSI/ANS-8.3, the CAAS must be designed to be capable of detecting any minimum accident occurs which could be of concern. Based on this, alarm limit used in CAAS is: 4 R/h (fast transient excursion) and 3 mR in 0.5 sec (slow excursion). In case of reprocessing facilities wherein process tanks located in heavy shielding, identification of CAAS installation locations require detailed radiation transport calculations. A study has been taken to estimate the gamma dose rate from thick concrete hot cells in order to determine the locations of CAAS to meet the present design criteria of alarm limit

  15. Development of a criticality alarm system neutron detector: Final project report

    International Nuclear Information System (INIS)

    O'Dell, A.A.

    1989-05-01

    The primary objective of this project was to develop a prototype neutron detector for use in criticality alarm systems (CASs) at US Department of Energy (DOE) and contractor facilities wherever significant amounts of fissile material are processed or stored. Constraints placed on the design of the detector were that the overall size of the detector was to be as small as practical, the input voltage requirements were to be no more than 24 V, and that the gamma sensitivity would be as low as possible. Also, the detector should give dosimetric neutron response, and should have sufficient temporal capabilities to measure the entire range from fast (>1 ms) to slow (seconds to minutes) excursions, and sufficient dynamic range to measure from background to over 100 times background levels to insure proper activation of the Immediate Evacuation Alarm (IEA). Finally, the detector should insure rapid (<1 s) activation of the IEA in the event of a criticality excursion. 24 figs., 11 tabs

  16. Optimal Alarm Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — An optimal alarm system is simply an optimal level-crossing predictor that can be designed to elicit the fewest false alarms for a fixed detection probability. It...

  17. Replacement of the criticality accident alarm system in the Tokai reprocessing plant

    International Nuclear Information System (INIS)

    Sanada, Yukihisa; Momose, Takumaro; Suzuki, Kei; Kawai, Keiichi

    2008-01-01

    A Criticality Accident Alarm System (CAAS) was installed as part of criticality safety management for use in reducing the radiation workers could be exposed to in the rare case of a criticality accident. The initial CAAS version was installed the Tokai Reprocessing Plant (TRP) in the 1980s. It includes units that can detect gamma-rays or neutron-rays released in criticality accidents (CADs), one of which consists of three plastic scintillation gamma detectors and three solid state neutron detectors with fissile material, and in being highly reliable utilizes the 2 out of 3 voting system. The purpose of this study is to give the design principles and procedures for determining the adequate relocation of the CADs within the TRP. The optimal places for the CADs to be relocated to were determined using a conservative evaluation method. Firstly, equipment needing to be monitored for criticality accidents was selected with consideration given to the risk of excessive exposure to workers. Secondly, the detection threshold of a minimum accident was set to be an increase in power of 10 15 fissions/s occurring within a rise-time of between 0.5 ms and 1 s. The sum of neutron and gamma doses of a minimum accident (10 15 fissions) was 0.3 Gy at an unshielded distance of 1 m. Finally, doses at where the CADs were installed were evaluated using parameters calculated with MCNP and ANISN. As a result, the alarm trip level of both the gamma detector and the neutron detector being set at 2.0 mGy/h enabled minimum criticality accidents to be conservatively detected. These results were then applied to the new CAD positions. (author)

  18. Bibliography for nuclear criticality accident experience, alarm systems, and emergency management

    International Nuclear Information System (INIS)

    Putman, V.L.

    1995-09-01

    The characteristics, detection, and emergency management of nuclear criticality accidents outside reactors has been an important component of criticality safety for as long as the need for this specialized safety discipline has been recognized. The general interest and importance of such topics receives special emphasis because of the potentially lethal, albeit highly localized, effects of criticality accidents and because of heightened public and regulatory concerns for any undesirable event in nuclear and radiological fields. This bibliography lists references which are potentially applicable to or interesting for criticality alarm, detection, and warning systems; criticality accident emergency management; and their associated programs. The lists are annotated to assist bibliography users in identifying applicable: industry and regulatory guidance and requirements, with historical development information and comments; criticality accident characteristics, consequences, experiences, and responses; hazard-, risk-, or safety-analysis criteria; CAS design and qualification criteria; CAS calibration, maintenance, repair, and testing criteria; experiences of CAS designers and maintainers; criticality accident emergency management (planning, preparedness, response, and recovery) requirements and guidance; criticality accident emergency management experience, plans, and techniques; methods and tools for analysis; and additional bibliographies

  19. Advanced alarm management system

    International Nuclear Information System (INIS)

    Easter, J.R.

    1995-01-01

    The Westinghouse Advanced Alarm Management System (AWARE) is one of the Man-Machine Design Interfaces (MMI) which has great flexibility with regard to hardware type and configuration, alarm system concept, plant scope, engineering scope and installation. The AWARE System provides the capability to better manage the quantity prioritization and presentation of real-time process alarm messages in the control room. The messages are specific, precise and dynamic. The AWARE System can provide a large reduction in the number of messages that the control room staff must address at any one time, thus making the alarm message system a useful tool for the operators during situations that normally produce a high volume of messages as well as improving the clarity of the presentation of process abnormalities during small disturbances. The operating staff is now provided with the basis for a better understanding of the current plant state and for taking the appropriate control actions. (2 refs., 3 figs.)

  20. Coincidence logic modules for criticality alarming

    International Nuclear Information System (INIS)

    Schaief, C.C. III.

    1977-04-01

    A coincidence Logic Module and a companion contact closure Relay Module utilizing the NIM Standard have been developed for criticality alarming. The units provide an ALARM whenever two or more out of N detectors become activated. In addition, an ALERT is generated whenever one or more detectors is activated or when certain electronic component failures occur. The number of detector inputs (N) can be expanded in groups of six by adding modules. Serial and parallel redundancy were used to reduce the probability of system failure

  1. Conservatism in SRS Criticality Alarm System 12 Rad Zone Calculations - How Much is Enough?

    International Nuclear Information System (INIS)

    Yates, K.R.

    2002-01-01

    Savannah River Site (SRS) uses two methods (i.e., Approximate Method and MCNP) of calculating the 12-rad zone. The reasons for the two-tier approach are described in Ref. 1 and 2. Lately, there have been occasions in which the use of either the Approximate Method (AM) or MCNP3 calculations indicated potential facility impacts. For example, one or both methods may indicate that a 12-rad zone extends outside of relatively thick shielding, or extends to the roof of a facility, or extends through shielding to part of a stairwell. In such cases, a criticality alarm system may have to be installed to protect workers in a small, localized area from a potential dose that is not substantially greater than 12 rad in air. But, is the potential dose really greater than 12 rad in air? A subcommittee was appointed to look into the two 12-rad zone calculation methods for the purpose of identifying items contributing to over-conservatism and under-conservatism, and to recommend a path forward

  2. Design of and experience with the gamma-detecting criticality accident alarm system at ALKEM MOX fuel fabrication plant

    International Nuclear Information System (INIS)

    Kindleben, G.

    1988-01-01

    At ALKEM mixed oxide fuel fabrication plant there are two criticality accident alarm systems in operation and another one is planned for different buildings. They use ionization chambers for gamma-measuring. The measuring channels are self controlled with implemented test sources. The order of limit transgression at the detectors is registrated. The interpretation indicates the room of the radiation source, which is signaled by flash lights. Extensive radiation protection shieldings make detector-placing a complex problem with secondary gamma-radiation to be taken into account. Most of the appearing defects can easily be repaired by exchange of components. Some of them have been eliminated by technical modification. Redundancy prevents total system failure. Some false alarms occurred during the operation time of the alarm systems. The main reason is pulse induction, resulting from lightning strike. Measures to prevent such events have been taken, while further measures are being considered

  3. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  4. The LEP alarm system

    International Nuclear Information System (INIS)

    Tyrrell, M.W.

    1992-01-01

    Unlike alarm systems for previous accelerators, the LEP alarm system caters not only for the operation of the accelerator but also for technical services and provides the direct channel for personnel safety. It was commissioned during 1989 and has seen a continued development up to the present day. The system, comprising over 50 computers including 5 different platforms and 4 different operating systems, is described. The hierarchical structure of the software is outlined from the interface to the equipment groups, through the front end computers to the central server, and finally to the operator consoles. Reasons are given for choosing a conventional, as opposed to a 'knowledge based' approach. Finally, references are made to a prototype real time expert system for surveying the power converters of LEP, which was conducted during 1990 as part of the alarm development program. (author)

  5. The design of a new criticality incident detection and alarm system

    International Nuclear Information System (INIS)

    Nobes, T.S.

    1999-01-01

    This paper presents a general review of criticality and its detection. After a brief description of what a criticality incident involves, an outline is given of detection methods and warning systems. (author)

  6. Evaluation of Neutron Response of Criticality Accident Alarm System Detector to Quasi-Monoenergetic 24 keV Neutrons

    Science.gov (United States)

    Tsujimura, Norio; Yoshida, Tadayoshi; Yashima, Hiroshi

    The criticality accident alarm system (CAAS), which was recently developed and installed at the Japan Atomic Energy Agency's Tokai Reprocessing Plant, consists of a plastic scintillator combined with a cadmium-lined polyethylene moderator and thereby responds to both neutrons and gamma rays. To evaluate the neutron absorbed dose rate response of the CAAS detector, a 24 keV quasi-monoenergetic neutron irradiation experiment was performed at the B-1 facility of the Kyoto University Research Reactor. The detector's evaluated neutron response was confirmed to agree reasonably well with prior computer-predicted responses.

  7. Evaluation of neutron response of criticality accident alarm system detector to quasi-monoenergetic 24 keV neutrons

    International Nuclear Information System (INIS)

    Tsujimura, Norio; Yoshida, Tadayoshi; Yashima, Hiroshi

    2016-01-01

    The criticality accident alarm system (CAAS), which was recently developed and installed at the Japan Atomic Energy Agency's Tokai Reprocessing Plant, consists of a plastic scintillator combined with a cadmium-lined polyethylene moderator and thereby responds to both neutrons and gamma rays. To evaluate the neutron absorbed dose rate response of the CAAS detector, a 24 keV quasi-monoenergetic neutron irradiation experiment was performed at the B-1 facility of the Kyoto University Research Reactor. The detector's evaluated neutron response was confirmed to agree reasonably well with prior computer-predicted responses. (author)

  8. Determination of the response function for the Portsmouth Gaseous Diffusion Plant criticality accident alarm system neutron detectors

    International Nuclear Information System (INIS)

    Tayloe, R.W. Jr.; Brown, A.S.; Dobelbower, M.C.; Woollard, J.E.

    1997-03-01

    Neutron-sensitive radiation detectors are used in the Portsmouth Gaseous Diffusion Plant's (PORTS) criticality accident alarm system (CAAS). The CAAS is composed of numerous detectors, electronics, and logic units. It uses a telemetry system to sound building evacuation horns and to provide remote alarm status in a central control facility. The ANSI Standard for a CAAS uses a free-in-air dose rate to define the detection criteria for a minimum accident-of-concern. Previously, the free-in-air absorbed dose rate from neutrons was used for determining the areal coverge of criticality detection within PORTS buildings handling fissile materials. However, the free-in-air dose rate does not accurately reflect the response of the neutron detectors in use at PORTS. Because the cost of placing additional CAAS detectors in areas of questionable coverage (based on a free-in-air absorbed dose rate) is high, the actual response function for the CAAS neutron detectors was determined. This report, which is organized into three major sections, discusses how the actual response function for the PORTS CAAS neutron detectors was determined. The CAAS neutron detectors are described in Section 2. The model of the detector system developed to facilitate calculation of the response function is discussed in Section 3. The results of the calculations, including confirmatory measurements with neutron sources, are given in Section 4

  9. Alarm management system

    International Nuclear Information System (INIS)

    Woods, D.D.; Elm, W.C.; Lipner, M.H.; Butterworth, G.E.; Easter, J.R.

    1989-01-01

    An alarm management system is described, comprising: a light water pressurized nuclear power plant; sensors coupled to the plant indicating the state of the plant; a sensor signal processor, operatively connected to the sensors, for producing state signals indicating the state of the sensors monitoring the power plant from the sensor signals and for combining the state signals using rule based algorithms to produce abnormality indication signals; a message processor, operatively connected to the sensor signal processor for receiving the abnormality indication signals; a spatially dedicated parallel display for each function, operatively connected to the message processor, for displaying the portion of the messages simultaneously; and a serial display, operatively connected to the message processor, for displaying the message in the queues in priority order within category within function upon request, the message processor outputting messages from the queue to the parallel display as display space becomes available on the parallel display due to an abnormality being resolved

  10. Assessment of the Plutonium Finishing Plant Criticality Alarm System U.S. Department of Energy Richland Operations Office

    International Nuclear Information System (INIS)

    NIRIDER, L.T.

    2002-01-01

    At the request of the Assistant Manager for Safety and Engineering, the U.S. Department of Energy Richland Operations Office (RL) Engineering Support Division, performed an oversight review of the Plutonium Finishing Plant (PFP) nuclear Criticality Alarm System (CAS). The review was conducted to satisfy requirements and agreements associated with Defense Nuclear Facility Safety Board (DNFSB) Recommendation 2000-2, ''Vital Safety Systems.'' The PFP is managed by Fluor Hanford, Inc. for RL. The field assessment and staff interviews were conducted August 12 through August 19,2002. This was a limited scope assessment that consisted of a review of the nuclear CAS operations, maintenance, and compliance with National Consensus Standards Requirements. The main purpose of the assessment was to determine the adequacy of the existing alarm system and its associated infrastructure to support the PFP facility mission through the remaining facility lifetime. The Review Plan was modeled upon Criteria and Review Approach Documents (CRAD) developed for DNFSB Recommendation 2000-2 reviews conducted across the Hanford Site. Concerns regarding component degradation and failure, increasing numbers of occurrence reports associated with the alarm system, and reliability issues were addressed. Additionally, RL performed a review of the engineering aspects of the CAS including the functions of design authorities and aspects of systems engineering. However, the focus of the assessment was on operations, maintenance, and reliability of the CAS, associated procurement practices, adequacy of safety and engineering policies and procedures, safety documentation, and fundamental engineering practices including training, qualification, and systems engineering. This assessment revealed that the PFP CAS and its associated infrastructure, administrative procedures, and conduct of operations are generally effective. There are no imminent criticality safety issues associated with the operation of the

  11. Measurement of the Portsmouth Gaseous Diffusion Plant criticality accident alarm

    International Nuclear Information System (INIS)

    Tayloe, R.W. Jr.; D'Aquila, D.M.; McGinnis, R.B.

    1991-01-01

    The nuclear criticality accident radiation alarm system installed at the Portsmouth Gaseous Diffusion Plant was tested extensively at critical facilities located at the Los Alamos National Laboratory. The ability of the neutron scintillator radiation detection units to respond to a minimum accident of concern as defined in Standard ANSI/ANS-83.-1986 was demonstrated. Detector placement and the established trip point are based on shielding calculations performed by the Oak Ridge National Laboratory and criticality specialists at the Portsmouth plant. Based on these experiments and calculations, a detector trip point of 5 mrad/h in air is used. Any credible criticality accident is expected to produce neutron radiation fields >5 mrad/h in air at one or more radiation alarm locations. Each radiation alarm location has a cluster of three detectors that employs a two-out-of-three alarm logic. Earlier work focused on testing the alarm logic latching circuitry. This work was directed toward measurements involving the actual audible alarm signal delivered

  12. 2010 Criticality Accident Alarm System Benchmark Experiments At The CEA Valduc SILENE Facility

    International Nuclear Information System (INIS)

    Miller, Thomas Martin; Dunn, Michael E.; Wagner, John C.; McMahan, Kimberly L.; Authier, Nicolas; Jacquet, Xavier; Rousseau, Guillaume; Wolff, Herve; Piot, Jerome; Savanier, Laurence; Baclet, Nathalie; Lee, Yi-kang; Masse, Veronique; Trama, Jean-Christophe; Gagnier, Emmanuel; Naury, Sylvie; Lenain, Richard; Hunter, Richard; Kim, Soon; Dulik, George Michael; Reynolds, Kevin H.

    2011-01-01

    Several experiments were performed at the CEA Valduc SILENE reactor facility, which are intended to be published as evaluated benchmark experiments in the ICSBEP Handbook. These evaluated benchmarks will be useful for the verification and validation of radiation transport codes and evaluated nuclear data, particularly those that are used in the analysis of CAASs. During these experiments SILENE was operated in pulsed mode in order to be representative of a criticality accident, which is rare among shielding benchmarks. Measurements of the neutron flux were made with neutron activation foils and measurements of photon doses were made with TLDs. Also unique to these experiments was the presence of several detectors used in actual CAASs, which allowed for the observation of their behavior during an actual critical pulse. This paper presents the preliminary measurement data currently available from these experiments. Also presented are comparisons of preliminary computational results with Scale and TRIPOLI-4 to the preliminary measurement data.

  13. Systems analysis of a security alarm system

    International Nuclear Information System (INIS)

    Schiff, A.

    1975-01-01

    When the Lawrence Livermore Laboratory found that its security alarm system was causing more false alarms and maintenance costs than LLL felt was tolerable, a systems analysis was undertaken to determine what should be done about the situation. This report contains an analysis of security alarm systems in general and ends with a review of the existing Security Alarm Control Console (SACC) and recommendations for its improvement, growth and change. (U.S.)

  14. Renewal of the control terminals of the criticality alarm system of the factory

    International Nuclear Information System (INIS)

    Escandon Ortiz, E.; Dorado Sierra, P.; Ortiz Trujillo, D.; Zurron Cifuentes, O.; Lopez Marquez, J.

    2011-01-01

    The new terminals to be installed are based on computer servers with eDNA management software and have the same features as the existing, but with the advantage of a greater dynamism and flexibility in obtaining and storage of historical data from the modules of acquisition of data (DAM) system.

  15. Some points of advanced alarm system design

    International Nuclear Information System (INIS)

    Hollo, E.

    1977-01-01

    A description of some of the more relevant questions relating to advanced alarm systems for nuclear power plant installations. The development of such alarm systems embodies three main tasks: development of formal alarm handling methods, design of alarm patterns, development of alarm analysis systems. The major aspects of these tests are dealt with and the close relation between the alarm analysis and the plant disturbance analysis procedure is emphasized. (author)

  16. Central alarm system replacement in NPP Krsko

    International Nuclear Information System (INIS)

    Cicvaric, D.; Susnic, M.; Djetelic, N.

    2004-01-01

    Current NPP Krsko central alarm system consists of three main segments. Main Control Board alarm system (BETA 1000), Ventilation Control Board alarm system (BETA 1000) and Electrical Control Board alarm system (BETA 1100). All sections are equipped with specific BetaTone audible alarms and silence, acknowledge as well as test push buttons. The main reason for central alarm system replacement is system obsolescence and problems with maintenance, due to lack of spare parts. Other issue is lack of system redundancy, which could lead to loss of several Alarm Light Boxes in the event of particular power supply failure. Current central alarm system does not provide means of alarm optimization, grouping or prioritization. There are three main options for central alarm system replacement: Conventional annunciator system, hybrid annunciator system and advanced alarm system. Advanced alarm system implementation requires Main Control Board upgrade, integration of process instrumentation and plant process computer as well as long time for replacement. NPP Krsko has decided to implement hybrid alarm system with patchwork approach. The new central alarm system will be stand alone, digital, with advanced filtering and alarm grouping options. Sequence of event recorder will be linked with plant process computer and time synchronized with redundant GPS signal. Advanced functions such as link to plant procedures will be implemented with plant process computer upgrade in outage 2006. Central alarm system replacement is due in outage 2004.(author)

  17. Final Report for the Testing of the Y-12 Criticality Accident Alarm System Detectors at the Godiva IV Burst Reactor (IER-443)

    Energy Technology Data Exchange (ETDEWEB)

    Scorby, John C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hickman, David [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hudson, Becka [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Beller, Tim [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Goda, Joetta [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Haught, Chris [Y-12 National Security Complex, Oak Ridge, TN (United States); Woodrow, Christopher [Y-12 National Security Complex, Oak Ridge, TN (United States); Ward, Dann [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Wilson, Chris [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom); Clark, Leo [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom)

    2018-01-05

    This report documents the experimental conditions and final results for the performance testing of the Y-12 Criticality Accident Alarm System (CAAS) detectors at the Godiva IV Burst Reactor at the National Criticality Experimental Research Center (NCERC) at the Nevada National Security Site (NNSS). The testing followed a previously issued test plan and was conducted during the week of July 17, 2017, with completion on Thursday July 20. The test subjected CAAS detectors supplied by Y-12 to very intense and short duration mixed neutron and gamma radiation fields to establish compliance to maximum radiation and minimum pulse width requirements. ANSI/ANS- 8.3.1997 states that the “system shall be sufficiently robust as to actuate an alarm signal when exposed to the maximum radiation expected”, which has been defined at Y-12, in Documented Safety Analyses (DSAs), to be a dose rate of 10 Rad/s. ANSI/ANS-8.3.1997 further states that “alarm actuation shall occur as a result of a minimum duration transient” which may be assumed to be 1 msec. The pulse widths and dose rates provided by each burst during the test exceeded those requirements. The CAAS detectors all provided an immediate alarm signal and remained operable after the bursts establishing compliance to the requirements and fitness for re-deployment at Y-12.

  18. SUBSURFACE VISUAL ALARM SYSTEM ANALYSIS

    International Nuclear Information System (INIS)

    D.W. Markman

    2001-01-01

    The ''Subsurface Fire Hazard Analysis'' (CRWMS M andO 1998, page 61), and the document, ''Title III Evaluation Report for the Surface and Subsurface Communication System'', (CRWMS M andO 1999a, pages 21 and 23), both indicate the installed communication system is adequate to support Exploratory Studies Facility (ESF) activities with the exception of the mine phone system for emergency notification purposes. They recommend the installation of a visual alarm system to supplement the page/party phone system The purpose of this analysis is to identify data communication highway design approaches, and provide justification for the selected or recommended alternatives for the data communication of the subsurface visual alarm system. This analysis is being prepared to document a basis for the design selection of the data communication method. This analysis will briefly describe existing data or voice communication or monitoring systems within the ESF, and look at how these may be revised or adapted to support the needed data highway of the subsurface visual alarm. system. The existing PLC communication system installed in subsurface is providing data communication for alcove No.5 ventilation fans, south portal ventilation fans, bulkhead doors and generator monitoring system. It is given that the data communication of the subsurface visual alarm system will be a digital based system. It is also given that it is most feasible to take advantage of existing systems and equipment and not consider an entirely new data communication system design and installation. The scope and primary objectives of this analysis are to: (1) Briefly review and describe existing available data communication highways or systems within the ESF. (2) Examine technical characteristics of an existing system to disqualify a design alternative is paramount in minimizing the number of and depth of a system review. (3) Apply general engineering design practices or criteria such as relative cost, and degree

  19. The Best Ever Alarm System Toolkit

    International Nuclear Information System (INIS)

    Kasemir, Kay; Chen, Xihui; Danilova, Ekaterina N.

    2009-01-01

    Learning from our experience with the standard Experimental Physics and Industrial Control System (EPICS) alarm handler (ALH) as well as a similar intermediate approach based on script-generated operator screens, we developed the Best Ever Alarm System Toolkit (BEAST). It is based on Java and Eclipse on the Control System Studio (CSS) platform, using a relational database (RDB) to store the configuration and log actions. It employs a Java Message Service (JMS) for communication between the modular pieces of the toolkit, which include an Alarm Server to maintain the current alarm state, an arbitrary number of Alarm Client user interfaces (GUI), and tools to annunciate alarms or log alarm related actions. Web reports allow us to monitor the alarm system performance and spot deficiencies in the alarm configuration. The Alarm Client GUI not only gives the end users various ways to view alarms in tree and table, but also makes it easy to access the guidance information, the related operator displays and other CSS tools. It also allows online configuration to be simply modified from the GUI. Coupled with a good 'alarm philosophy' on how to provide useful alarms, we can finally improve the configuration to achieve an effective alarm system.

  20. Fire auto alarm system intelligent trend

    International Nuclear Information System (INIS)

    Du Chengbao

    1997-01-01

    The author gives the course and trend of the fire alarm system going to more computerized and more intelligent. It is described that only the system applied artificial intelligent and confusion control is the true intelligent fire alarm system. The author gives the detailed analysis on the signal treatment of artificial intelligent applied to analogue fire alarm system as well as the alarm system controlled by confusion technology and artificial nervous net

  1. Video systems for alarm assessment

    International Nuclear Information System (INIS)

    Greenwoll, D.A.; Matter, J.C.; Ebel, P.E.

    1991-09-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing closed-circuit television systems for video alarm assessment. There is a section on each of the major components in a video system: camera, lens, lighting, transmission, synchronization, switcher, monitor, and recorder. Each section includes information on component selection, procurement, installation, test, and maintenance. Considerations for system integration of the components are contained in each section. System emphasis is focused on perimeter intrusion detection and assessment systems. A glossary of video terms is included. 13 figs., 9 tabs

  2. Video systems for alarm assessment

    Energy Technology Data Exchange (ETDEWEB)

    Greenwoll, D.A.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Ebel, P.E. (BE, Inc., Barnwell, SC (United States))

    1991-09-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing closed-circuit television systems for video alarm assessment. There is a section on each of the major components in a video system: camera, lens, lighting, transmission, synchronization, switcher, monitor, and recorder. Each section includes information on component selection, procurement, installation, test, and maintenance. Considerations for system integration of the components are contained in each section. System emphasis is focused on perimeter intrusion detection and assessment systems. A glossary of video terms is included. 13 figs., 9 tabs.

  3. Plan for IER-443 Testing of the Y-12 and AWE Criticality Accident Alarm System Detectors at the Godiva IV Burst Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Scorby, J. C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hickman, D. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hudson, B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Garbett, S. [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom); Auld, G. [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom); Horrne, A. [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom); Beller, T. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Goda, J. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Haught, C. [Y-12 National Security Complex, Oak Ridge, TN (United States); Woodrow, C. [Y-12 National Security Complex, Oak Ridge, TN (United States); Ward, D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-07-24

    This document provides the scope and details of the “Plan for Testing the Y-12 and AWE Criticality Accident Alarm System Detectors at the Godiva IV Burst Reactor”. Due to the relative simplicity of the testing goals, scope, and methodology, the NCSP Manager approved execution of the test when ready. No preliminary CED-1 or final design CED-2 reports were required or issued. The test will subject Criticality Accident Alarm System (CAAS) detectors supplied by Y- 12 and AWE to very intense and short duration mixed neutron and gamma radiation fields. The goals of the test will be to (1) substantiate functionality, for both existing and newly acquired Y- 12 CAAS detectors, and (2) the ability of the AWE detectors to provide quality temporal dose information after a hypothetical criticality accident. ANSI/ANS-8.3.1997 states that the “system shall be sufficiently robust as to actuate an alarm signal when exposed to the maximum radiation expected”, which has been defined at Y-12, in Documented Safety Analyses (DSAs), to be a dose rate of 10 Rad/s. ANSI/ANS-8.3.1997 further states that “alarm actuation shall occur as a result of a minimum duration transient” which may be assumed to be 1 msec. The pulse widths and dose rates which will be achieved in this test will exceed these requirements. Pulsed radiation fields will be produced by the Godiva IV fast metal burst reactor at the National Criticality Experimental Research Center (NCERC) at the Nevada National Security Site (NNSS). The magnitude of the pulses and the relative distances to the detectors will be varied to afford a wide range of radiation fluence and pulse widths. The magnitude of the neutron and gamma fields will be determined by reactor temperature rise to fluence and dose conversions which have been previously established through extensive measurements performed under IER-147. The requirements for CAAS systems to detect and alarm under a “minimum accident of concern” as well as other

  4. Alarm system for ABWR main control panels

    Energy Technology Data Exchange (ETDEWEB)

    Kobayashi, Yuji; Saito, Koji [Toshiba Corp., Yokohoma (Japan)

    1997-09-01

    TOSHIBA has developed integrated digital control and instrumentation system for ABWR, which is the third-generation man machine interface system for main control room that we call A-PODIA (Advanced PODIA). A-Podia has been introduced the first actual ABWR plant in Japan. in A-PODIA, TOSHIBA has realized improvement of alarm system that all operator crews in the control room can recognize plant anomalies easily. The alarm system can recognize essential alarms for plant safety easily and understand annunciators with each integrated annunciators and their prioritized color easily by classifying alarms into plant-level essential annunciators, system-level integrated annunciators and equipment level individual annunciators with hierarchical structure. This paper describes conventional alarm system and the design philosophy, alarm system design and operation of ``Alarm System for ABWR Main Control Panels``. (author). 5 refs, 8 figs, 1 tab.

  5. Alarm system for ABWR main control panels

    International Nuclear Information System (INIS)

    Kobayashi, Yuji; Saito, Koji

    1997-01-01

    TOSHIBA has developed integrated digital control and instrumentation system for ABWR, which is the third-generation man machine interface system for main control room that we call A-PODIA (Advanced PODIA). A-Podia has been introduced the first actual ABWR plant in Japan. in A-PODIA, TOSHIBA has realized improvement of alarm system that all operator crews in the control room can recognize plant anomalies easily. The alarm system can recognize essential alarms for plant safety easily and understand annunciators with each integrated annunciators and their prioritized color easily by classifying alarms into plant-level essential annunciators, system-level integrated annunciators and equipment level individual annunciators with hierarchical structure. This paper describes conventional alarm system and the design philosophy, alarm system design and operation of ''Alarm System for ABWR Main Control Panels''. (author). 5 refs, 8 figs, 1 tab

  6. A questionnaire comparison of two alarm systems

    International Nuclear Information System (INIS)

    Collier, Steven G.

    1997-11-01

    A questionnaire was developed, based on guidelines for alarm system design given in NUREG/CR-6105. The intentions were both to develop a subjective instrument for rating the effectiveness of alarm systems and to learn lessons on alarm system design from a comparison of two systems. The questionnaire was administered to reactor operations staff at two locations with different alarm systems embedded in a simulation of the same underlying PWR power plant: Loviisa NPP and Halden Man-Machine Laboratory. The questionnaire, considered as a measuring instrument, had good to high reliability and moderate to good content validity. The questionnaire is considered suitable for further use in the shortened form resulting from this study. Further work is also recommended. The degree of reliability and validity also lend a degree of validation to the NUREG guidelines. The questionnaire was able to show differences between ratings of the two alarm systems. The Loviisa system showed more consistency with other control room features and was better at drawing the operators' attention to important alarms. Both systems were not rated particularly well on alarm prioritisation and spurious alarms. The Halden system was better at showing naturally occurring relationships between alarms. Some of these differences may have been due to the subjects' greater familiarity with the Loviisa alarm system. The results nevertheless show that the questionnaire can measure subjective responses to alarm systems. (author)

  7. An alarm multiplexer communication system

    International Nuclear Information System (INIS)

    Herrera, G.V.

    1986-01-01

    A low cost Alarm Multiplexer Communication System (AMCS) has been developed to perform the security sensor monitoring and control functions and to provide remote relay control capability for integrated security systems. AMCS has a distributed multiplexer/repeater architecture with up to four dual communication loops and dual control computers that guarantee total system operation under any single point failure condition. Each AMCS can control up to 4096 sensors and 2048 remote relays. AMCS reports alarm status information to and is controlled by either one or two Host computers. This allows for independent operation of primary and backup security command centers. AMCS communicates with the Host computers over an asynchronous serial communication link and has a message protocol which allows AMCS to fully recover from lost messages or large blocks of data communication errors. This paper describes the AMCS theory of operation, AMCS fault modes, and AMCS system design methodology. Also, cost and timing information is presented. AMCS is being used and considered for several DOE and DOD facilities

  8. Ecological alarm system for Itaipu

    Energy Technology Data Exchange (ETDEWEB)

    Faehser, L.

    1984-05-01

    At Itaipu, on the Rio Parana, Brazil and Paraguay are constructing the world's largest hydro-electric power plant with a capacity seven times as high as that of Assuan. An information system is intended to give fair warning in case of threatening ecological conditions. The computer-supported alarm system had four objectives: 1. presentation of the present ecological situation; 2. evaluation of the ecological risks; 3. warning about ecological deficits; 4. suggestions for establishing ecological stability. In a first step the available inventory data concerning soil, topography, vegetation and water were evaluated by expert groups according to their risk grade (0-4) and ecological weight (1-10). The product of these evaluations indicates the ecological deficit (0-40). At a threshold value of 30, the information system automatically signals ecological alarm and locates the centre of danger via computer-plotted maps and tables. The necessary data are supplied periodically by selected measurement stations. Quantification of ecological facts enables the persons who are responsible for decisions at Itaipu to recognize, avoid, or diminish elements of danger even if they have little or no ecological knowledge. The file of data that has been compiled so far should be extended parallel with the development in the Itaipu area. With the help of factor analysis connections of cause and effect can be detected in this extremely complex reservoir system which has hardly been explored yet.

  9. Object oriented design in the AGSDCS alarm system

    International Nuclear Information System (INIS)

    Morris, J.T.

    1994-01-01

    The alarm subsystem of the Alternating Gradient Synchrotron Distributed Control System (AGSDCS) has been redesigned to enhance reliability, flexibility, and ease of maintenance. The alarm system is functionally divided into Alarm Generators, Alarm Displays, and a central Alarm Receiver. The task was simplified by defining a set of C++ classes that could be reused by all components of the alarm system. The AlarmData class represents instances of alarm conditions. The AlarmFilter class is used by both the Alarm Receiver and Alarm Displays to select the alarms that are of interest to a particular user. The AlarmDatabase class is used by the Alarm Receiver to manage the central alarm database. The Alarm Displays use the AlarmDatabase class to manage the local database representing the alarms on their screens. ((orig.))

  10. Advanced alarm systems: Display and processing issues

    Energy Technology Data Exchange (ETDEWEB)

    O`Hara, J.M. [Brookhaven National Lab., Upton, NY (United States); Wachtel, J.; Perensky, J. [US Nuclear Regulatory Commission, Washington, DC (United States). Office of Nuclear Regulatory Research

    1995-05-01

    This paper describes a research program sponsored by the US Nuclear Regulatory Commission to address the human factors engineering (HFE) deficiencies associated with nuclear power plant alarm systems. The overall objective of the study is to develop HFE review guidance for alarm systems. In support of this objective, human performance issues needing additional research were identified. Among the important issues were alarm processing strategies and alarm display techniques. This paper will discuss these issues and briefly describe our current research plan to address them.

  11. Definition of areas requiring criticality alarm annunciation and emergency control

    International Nuclear Information System (INIS)

    Hobson, J.M.

    1988-01-01

    The design of fissile material handling at British Nuclear Fuels plc requires the provision of a criticality incident detection system unless a specific case for omission can be formally made. Where such systems are provided, the 100 mSv contour resulting from a reference criticality incident must be restricted to an area of administrative control within which it is reasonably practicable to provide alarm annunciation and for which emergency arrangements can be defined. For typical reprocessing plant applications, the definition of these areas, and their restriction by provision of shielding where necessary, potentially requires a very large number of three dimensional neutron transport calculations in complex geometries. However, by considering the requirements and nature of this assessment, simple generic methods have been developed and justified. Consequently, rapid and inexpensive assessments of control areas can be carried out

  12. Useful and usable alarm systems : recommended properties

    International Nuclear Information System (INIS)

    Veland, Oeystein; Kaarstad, Magnhild; Seim, Lars Aage; Foerdestroemmen, Nils T.

    2001-01-01

    This document describes the result of a study on alarm systems conducted by IFE in Halden. The study was initiated by the Norwegian Petroleum Directorate. The objective was to identify and formulate a set of important properties for useful and usable alarm systems. The study is mainly based on review of the latest international recognised guidelines and standards on alarm systems available at the time of writing, with focus on realistic solutions from research and best practice from different industries. In addition, IFE experiences gathered through specification and design of alarm systems and experimental activities in HAMMLAB and bilateral projects, have been utilized where relevant. The document presents a total of 43 recommendations divided into a number of general recommendations and more detailed recommendations on alarm generation, structuring, prioritisation, presentation and handling. (Author)

  13. Reactor alarm system development and application issues

    Energy Technology Data Exchange (ETDEWEB)

    Drexler, J E; Oicese, G O [INVAP S.E. (Argentina)

    1997-09-01

    The new hardware and software technologies, and the need in research reactors for assistance systems in operation and maintenance, have given an appropriate background to develop a computer based system named ``Reactor Alarm System`` (RAS). RAS is a software package, user oriented, with emphasis on production, experiments and maintenance goals. It is designed to run on distributed systems conformed with microcomputers under QNX operating system. RAS main features are: (a) Alarm Panel Display; (b) Alarm Page; (c) Alarm Masking and Inhibition; (d) Alarms Color and Attributes; (e) Condition Classification; and (f) Arrangement Presentation. RAS design allows it to be installed as a part of a computer based Supervision and Control System in new installations or retrofit existing reactor instrumentation systems. The analysis of human factors during development stage and successive user feedback from different applications, brought out several RAS improvements: (a) Multiple-copy alarm summaries; (b) Improved alarm handling; (c) Extended dictionary; and (d) Enhanced hardware availability. It has proved successful in providing new capabilities for operators, and also has shown the continuous increase of user-demands, reflecting the expectations placed today on computer-based systems. (author). 6 figs, 1 tabs.

  14. Reactor alarm system development and application issues

    International Nuclear Information System (INIS)

    Drexler, J.E.; Oicese, G.O.

    1997-01-01

    The new hardware and software technologies, and the need in research reactors for assistance systems in operation and maintenance, have given an appropriate background to develop a computer based system named ''Reactor Alarm System'' (RAS). RAS is a software package, user oriented, with emphasis on production, experiments and maintenance goals. It is designed to run on distributed systems conformed with microcomputers under QNX operating system. RAS main features are: a) Alarm Panel Display; b) Alarm Page; c) Alarm Masking and Inhibition; d) Alarms Color and Attributes; e) Condition Classification; and f) Arrangement Presentation. RAS design allows it to be installed as a part of a computer based Supervision and Control System in new installations or retrofit existing reactor instrumentation systems. The analysis of human factors during development stage and successive user feedback from different applications, brought out several RAS improvements: a) Multiple-copy alarm summaries; b) Improved alarm handling; c) Extended dictionary; and d) Enhanced hardware availability. It has proved successful in providing new capabilities for operators, and also has shown the continuous increase of user-demands, reflecting the expectations placed today on computer-based systems. (author). 6 figs, 1 tabs

  15. Measurement of the Portsmouth Gaseous Diffusion Plant criticality accident alarm

    International Nuclear Information System (INIS)

    Tayloe, R.W. Jr.; McGinnis, B.

    1990-01-01

    Measurements of the Portsmouth Gaseous Diffusion Plant's nuclear criticality accident radiation alarm signal response time, sound wave frequency, and sound volume levels were made to demonstrate compliance with ANSI/ANS-8.3-1986. A steady-state alarm signal is produced within one-half second of obtaining a two-out-of-three detector trip. The fundamental alarm sound wave frequency is 440 hertz. The sound volume levels are greater than 10 decibels above background and ranged from 100 to 125 A-weighted decibels. The requirements of the standard were met; however the recommended maximum sound volume level of 115 dBA was exceeded. Emergency procedures require immediate evacuation upon initiation of a facility's radiation alarm. Comparison with standards for allowable time of exposure at different noise levels indicate that the elevated noise level at this location does not represent an occupational injury hazard. 8 refs., 5 figs

  16. Automated Information System (AIS) Alarm System

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.

    1997-05-01

    The Automated Information Alarm System is a joint effort between Los Alamos National Laboratory, Lawrence Livermore National Laboratory, and Sandia National Laboratory to demonstrate and implement, on a small-to-medium sized local area network, an automated system that detects and automatically responds to attacks that use readily available tools and methodologies. The Alarm System will sense or detect, assess, and respond to suspicious activities that may be detrimental to information on the network or to continued operation of the network. The responses will allow stopping, isolating, or ejecting the suspicious activities. The number of sensors, the sensitivity of the sensors, the assessment criteria, and the desired responses may be set by the using organization to meet their local security policies.

  17. Automated Information System (AIS) Alarm System

    International Nuclear Information System (INIS)

    Hunteman, W.

    1997-01-01

    The Automated Information Alarm System is a joint effort between Los Alamos National Laboratory, Lawrence Livermore National Laboratory, and Sandia National Laboratory to demonstrate and implement, on a small-to-medium sized local area network, an automated system that detects and automatically responds to attacks that use readily available tools and methodologies. The Alarm System will sense or detect, assess, and respond to suspicious activities that may be detrimental to information on the network or to continued operation of the network. The responses will allow stopping, isolating, or ejecting the suspicious activities. The number of sensors, the sensitivity of the sensors, the assessment criteria, and the desired responses may be set by the using organization to meet their local security policies

  18. HYBRID ALARM SYSTEMS: COMBINING SPATIAL ALARMS AND ALARM LISTS FOR OPTIMIZED CONTROL ROOM OPERATION

    Energy Technology Data Exchange (ETDEWEB)

    Ronald L. Boring; J.J. Persensky

    2012-07-01

    The US Department of Energy (DOE) is sponsoring research, development, and deployment on Light Water Reactor Sustainability (LWRS), in which the Idaho National Laboratory (INL) is working closely with nuclear utilities to develop technologies and solutions to help ensure the safe operational life extension of current nuclear power plants. One of the main areas of focus is control room modernization. Within control room modernization, alarm system upgrades present opportunities to meet the broader goals of the LWRS project in demonstrating the use and safety of the advanced instrumentation and control (I&C) technologies and the short-term and longer term objectives of the plant. In this paper, we review approaches for and human factors issues behind upgrading alarms in the main control room of nuclear power plants.

  19. Computational Human Performance Modeling For Alarm System Design

    Energy Technology Data Exchange (ETDEWEB)

    Jacques Hugo

    2012-07-01

    The introduction of new technologies like adaptive automation systems and advanced alarms processing and presentation techniques in nuclear power plants is already having an impact on the safety and effectiveness of plant operations and also the role of the control room operator. This impact is expected to escalate dramatically as more and more nuclear power utilities embark on upgrade projects in order to extend the lifetime of their plants. One of the most visible impacts in control rooms will be the need to replace aging alarm systems. Because most of these alarm systems use obsolete technologies, the methods, techniques and tools that were used to design the previous generation of alarm system designs are no longer effective and need to be updated. The same applies to the need to analyze and redefine operators’ alarm handling tasks. In the past, methods for analyzing human tasks and workload have relied on crude, paper-based methods that often lacked traceability. New approaches are needed to allow analysts to model and represent the new concepts of alarm operation and human-system interaction. State-of-the-art task simulation tools are now available that offer a cost-effective and efficient method for examining the effect of operator performance in different conditions and operational scenarios. A discrete event simulation system was used by human factors researchers at the Idaho National Laboratory to develop a generic alarm handling model to examine the effect of operator performance with simulated modern alarm system. It allowed analysts to evaluate alarm generation patterns as well as critical task times and human workload predicted by the system.

  20. Evaluation of the concrete shield compositions from the 2010 criticality accident alarm system benchmark experiments at the CEA Valduc SILENE facility

    International Nuclear Information System (INIS)

    Miller, Thomas Martin; Celik, Cihangir; Dunn, Michael E; Wagner, John C; McMahan, Kimberly L; Authier, Nicolas; Jacquet, Xavier; Rousseau, Guillaume; Wolff, Herve; Savanier, Laurence; Baclet, Nathalie; Lee, Yi-kang; Trama, Jean-Christophe; Masse, Veronique; Gagnier, Emmanuel; Naury, Sylvie; Blanc-Tranchant, Patrick; Hunter, Richard; Kim, Soon; Dulik, George Michael; Reynolds, Kevin H.

    2015-01-01

    In October 2010, a series of benchmark experiments were conducted at the French Commissariat a l'Energie Atomique et aux Energies Alternatives (CEA) Valduc SILENE facility. These experiments were a joint effort between the United States Department of Energy Nuclear Criticality Safety Program and the CEA. The purpose of these experiments was to create three benchmarks for the verification and validation of radiation transport codes and evaluated nuclear data used in the analysis of criticality accident alarm systems. This series of experiments consisted of three single-pulsed experiments with the SILENE reactor. For the first experiment, the reactor was bare (unshielded), whereas in the second and third experiments, it was shielded by lead and polyethylene, respectively. The polyethylene shield of the third experiment had a cadmium liner on its internal and external surfaces, which vertically was located near the fuel region of SILENE. During each experiment, several neutron activation foils and thermoluminescent dosimeters (TLDs) were placed around the reactor. Nearly half of the foils and TLDs had additional high-density magnetite concrete, high-density barite concrete, standard concrete, and/or BoroBond shields. CEA Saclay provided all the concrete, and the US Y-12 National Security Complex provided the BoroBond. Measurement data from the experiments were published at the 2011 International Conference on Nuclear Criticality (ICNC 2011) and the 2013 Nuclear Criticality Safety Division (NCSD 2013) topical meeting. Preliminary computational results for the first experiment were presented in the ICNC 2011 paper, which showed poor agreement between the computational results and the measured values of the foils shielded by concrete. Recently the hydrogen content, boron content, and density of these concrete shields were further investigated within the constraints of the previously available data. New computational results for the first experiment are now available

  1. EDAC, a detection and criticality alarm system. Physical and electronic characteristics (French patent no. 2184399, December 1974)

    International Nuclear Information System (INIS)

    Prigent, Raymond; Renard, Claude.

    1976-10-01

    A project of investigations (CRAC project) conducted around 1970 brought new conclusions on accident characteristics. These conclusions were at the origin of a new philosophy of detection that resulted in the development of a detection probe sensitive both to neutrons and gamma with a response representative of the dose received by the exposed individuals. To meet these criteria, the main components of the probe are a plastic and a boron scintillators optically and mechanically connected to a photo-emissive cell, the whole being surrounded with a polyethylene casing. The characteristics of these various elements have been determined experimentally in order to get a balanced response; the chief experimental results are described. The information from the probes are collected in a processing unit with characteristics meeting the critically safety commission specifications [fr

  2. Alarm processing system using AI techniques for nuclear power plant

    International Nuclear Information System (INIS)

    Yang, Joon On; Chang, Soon Heung

    1990-01-01

    An alarm processing system (APS) has been developed using artificial intelligence (AI) techniques. The alarms of nuclear power plants (NPP's) are classified into the generalized and special alarms. The generalized alarms are also classified into the global and local alarms. For each type of alarms, the specific processing rules are applied to filter and suppress unnecessary and potentially misleading alarms. The local processing are based on 'model-based reasoning.' The global and special alarms are processed by using the general cause-consequence check rules. The priorities of alarms are determined according to the plant state and the consistencies between them

  3. The alarm system of the SAPHIR detector

    International Nuclear Information System (INIS)

    Schultz-Coulon, H.C.

    1993-06-01

    In order to obtain an effective control of the different detector components an alarm system was built and implemented into the data acquisition system of the SAPHIR experiment. It provides an easy way of indicating errors by either adequate library calls or an appropriate hardware signal, both leading to an active alarm. This allows to react directly to any error detected by one of the specific control systems. In addition for selected kinds of errors the data run can be stopped automatically. Concept and construction of this system are described and some examples for its application are given. (orig.)

  4. Evaluation of coverage of enriched UF6 cylinder storage lots by existing criticality accident alarms

    International Nuclear Information System (INIS)

    Lee, B.L. Jr.; Dobelbower, M.C.; Woollard, J.E.; Sutherland, P.J.; Tayloe, R.W. Jr.

    1995-03-01

    The Portsmouth Gaseous Diffusion Plant (PORTS) is leased from the US Department of Energy (DOE) by the United States Enrichment Corporation (USEC), a government corporation formed in 1993. PORTS is in transition from regulation by DOE to regulation by the Nuclear Regulatory Commission (NRC). One regulation is 10 CFR Part 76.89, which requires that criticality alarm systems be provided for the site. PORTS originally installed criticality accident alarm systems in all building for which nuclear criticality accidents were credible. Currently, however, alarm systems are not installed in the enriched uranium hexafluoride (UF 6 ) cylinder storage lots. This report analyzes and documents the extent to which enriched UF 6 cylinder storage lots at PORTS are covered by criticality detectors and alarms currently installed in adjacent buildings. Monte Carlo calculations are performed on simplified models of the cylinder storage lots and adjacent buildings. The storage lots modelled are X-745B, X-745C, X745D, X-745E, and X-745F. The criticality detectors modelled are located in building X-343, the building X-344A/X-342A complex, and portions of building X-330 (see Figures 1 and 2). These criticality detectors are those located closest to the cylinder storage lots. Results of this analysis indicate that the existing criticality detectors currently installed at PORTS are largely ineffective in detecting neutron radiation from criticality accidents in most of the cylinder storage lots at PORTS, except sometimes along portions of their peripheries

  5. An Undergraduate Experiment in Alarm System Design.

    Science.gov (United States)

    Martini, R. A.; And Others

    1988-01-01

    Describes an experiment involving data acquisition by a computer, digital signal transmission from the computer to a digital logic circuit and signal interpretation by this circuit. The system is being used at the Illinois Institute of Technology. Discusses the fundamental concepts involved. Demonstrates the alarm experiment as it is used in…

  6. Object-oriented alarm-filtering system

    International Nuclear Information System (INIS)

    Corsberg, D.R.; Wilkie, D.

    1986-01-01

    This paper discusses an alarm-filtering system (AFS) being developed by EG and G Idaho, Inc. for the Advanced Test Reactor (ATR) at the Idaho National Engineering Laboratory. The ultimate goal of this project is to place AFS into ATR's reactor control room to act as an aid during major plant transients. In addition, methods of alarm analysis are investigated based on functional relationships rather than on a historical approach utilizing cause-consequence trees. Artificial intelligence techniques, including object-oriented programming, are also demonstrated as useful in analyzing alarms and alarm sequences. After a brief description of the problem AFS addresses, this paper discusses the design constraints and human factors that influenced the development of the system. The reader is then presented with operational and architectural descriptions of the system as well as what directions the future development of AFS may take. The fact that AFS is being considered as a partial solution to the problems discussed in the next section demonstrates the viability of its underlying technology and approach. 10 refs

  7. Nuclear power plant alarm systems: Problems and issues

    International Nuclear Information System (INIS)

    O'Hara, J.M.; Brown, W.S.

    1991-01-01

    Despite the incorporation of advanced technology into nuclear power plant alarm systems, human factors problems remain. This paper identifies to be addressed in order to allow advanced technology to be used effectively in the design of nuclear power plant alarm systems. The operator's use and processing of alarm system information will be considered. Based upon a review of alarm system research, issues related to general system design, alarm processing, display and control are discussed. It is concluded that the design of effective alarm systems depends on an understanding of the information processing capabilities and limitations of the operator. 39 refs

  8. Nuclear power plant alarm systems: Problems and issues

    Energy Technology Data Exchange (ETDEWEB)

    O' Hara, J.M.; Brown, W.S.

    1991-01-01

    Despite the incorporation of advanced technology into nuclear power plant alarm systems, human factors problems remain. This paper identifies to be addressed in order to allow advanced technology to be used effectively in the design of nuclear power plant alarm systems. The operator's use and processing of alarm system information will be considered. Based upon a review of alarm system research, issues related to general system design, alarm processing, display and control are discussed. It is concluded that the design of effective alarm systems depends on an understanding of the information processing capabilities and limitations of the operator. 39 refs.

  9. Alarm handling systems and techniques developed to match operator tasks

    Energy Technology Data Exchange (ETDEWEB)

    Bye, A; Moum, B R [Institutt for Energiteknikk, Halden (Norway). OECD Halden Reaktor Projekt

    1997-09-01

    This paper covers alarm handling methods and techniques explored at the Halden Project, and describes current status on the research activities on alarm systems. Alarm systems are often designed by application of a bottom-up strategy, generating alarms at component level. If no structuring of the alarms is applied, this may result in alarm avalanches in major plant disturbances, causing cognitive overload of the operator. An alarm structuring module should be designed using a top-down approach, analysing operator`s tasks, plant states, events and disturbances. One of the operator`s main tasks during plant disturbances is status identification, including determination of plant status and detection of plant anomalies. The main support of this is provided through the alarm systems, the process formats, the trends and possible diagnosis systems. The alarm system should both physically and conceptually be integrated with all these systems. 9 refs, 5 figs.

  10. Alarm handling systems and techniques developed to match operator tasks

    International Nuclear Information System (INIS)

    Bye, A.; Moum, B.R.

    1997-01-01

    This paper covers alarm handling methods and techniques explored at the Halden Project, and describes current status on the research activities on alarm systems. Alarm systems are often designed by application of a bottom-up strategy, generating alarms at component level. If no structuring of the alarms is applied, this may result in alarm avalanches in major plant disturbances, causing cognitive overload of the operator. An alarm structuring module should be designed using a top-down approach, analysing operator's tasks, plant states, events and disturbances. One of the operator's main tasks during plant disturbances is status identification, including determination of plant status and detection of plant anomalies. The main support of this is provided through the alarm systems, the process formats, the trends and possible diagnosis systems. The alarm system should both physically and conceptually be integrated with all these systems. 9 refs, 5 figs

  11. Addressing the alarm analysis barrier - a tool for improving alarm systems

    Energy Technology Data Exchange (ETDEWEB)

    Davey, E C; Basso, R A; Feher, M P [Atomic Energy of Canada Ltd., Chalk River, ON (Canada)

    1996-12-31

    This paper describes a software application tool for the initial specification and maintenance of the thousands of alarms in nuclear and other process control plants. The software program is used by system designers and maintainers to analyze, characterize, record and maintain the alarm information and configuration decisions for an alarm system. The tool provides a comprehensive design and information handling environment for: the existing alarm functions in current CANDU plants; the new alarm processing and presentation concepts developed under CANDU Owners Group (COG) sponsorship that are available to be applied to existing CANDU plants on a retrofit basis; and, the alarm functions to be implemented in new CANDU plants. (author). 3 refs., 1 fig.

  12. Addressing the alarm analysis barrier - a tool for improving alarm systems

    International Nuclear Information System (INIS)

    Davey, E.C.; Basso, R.A.; Feher, M.P.

    1995-01-01

    This paper describes a software application tool for the initial specification and maintenance of the thousands of alarms in nuclear and other process control plants. The software program is used by system designers and maintainers to analyze, characterize, record and maintain the alarm information and configuration decisions for an alarm system. The tool provides a comprehensive design and information handling environment for: the existing alarm functions in current CANDU plants; the new alarm processing and presentation concepts developed under CANDU Owners Group (COG) sponsorship that are available to be applied to existing CANDU plants on a retrofit basis; and, the alarm functions to be implemented in new CANDU plants. (author). 3 refs., 1 fig

  13. Development of alarm logics for critical function monitoring in SMART-P reactor

    Energy Technology Data Exchange (ETDEWEB)

    Seong, Seung Hwan; Hur, Seop; Seo, Jae Kwang; Lee, Tae Ho; Park, Cheon Tae; Kang, Han Ok

    2003-04-01

    The alarm logics for the critical functions of SMART-P reactor are developed, which are based on the those of Korean Standard Nuclear power Plant(KSNP). The SMART-P reactor is an integral typed nuclear power plant and has the some different design features compared to those of KSNP. It, however, has the similar features in critical functions because it is a kind of pressurized water reactor. The alarm logics for Critical Function Monitoring System(CFMS) in SMART-P are developed from those for CFMS in KSNP. The alarm logics of CFMS in only the primary loop are, therefore, developed, though the general CFMS covered the status of primary and secondary loop including the features of the containment. The specific setpoint of related variables related to the alarm logics will be developed after the specific designs of SMART-P are finished. In appendix, we describe the conceptual architecture and variables of display screens on CFMS according to the developed alarm logics.

  14. Security alarm communication and display systems development

    International Nuclear Information System (INIS)

    Waddoups, I.G.

    1990-01-01

    Sandia National Laboratories (SNL) has, as lead Department of Energy (DOE) physical security laboratory, developed a variety of alarm communication and display systems for DOE and Department of Defense (DOD) facilities. This paper briefly describes some of the systems developed and concludes with a discussion of technology relevant to those currently designing, developing, implementing, or procuring such a system. Development activities and the rapid evolution of computers over the last decade have resulted in a broad variety of capabilities to support most security system communication and display needs. The major task in selecting a system is becoming familiar with these capabilities and finding the best match to a specific need

  15. Development of the newly advanced alarm system for APWR plant

    Energy Technology Data Exchange (ETDEWEB)

    Shimada, Manabu; Yamamoto, Yoshihiro; Tani, Mamoru; Kobashi, Shuichi [Kansai Electric Power Co., Inc., Osaka (Japan)

    1997-09-01

    We have been developing AMCB (Advanced Main Control Board) for APWR consisting of a large overview display and on operator console. We have adopted the alarm prioritizing functions, which are already in use in the existing Japanese PWR plants, for easier identification of the high priority alarms. Moreover, we have developed an alarm system with a large overview display, which presents alarms on the plant process flow diagram. This enhances the location aids and pattern recognition in the alarm identification process. This time, we made further improvement and studies for better and various functions combining a large overview display with a CRT display. We determined the alarm system specification as follows, taking account of flexible alarm recognition processes. (1) The high priority alarms can be identified upon the LOD (large overview display). On the display, the alarms are described on the plant flow diagram, and the alarm status is shown on the fixed position of process or equipment symbols. (2) Other alarms are identified on large overview display and on CRTs using a hierarchical process. (3) The alarm messages are divided into 4 different groups according to the plant systems, thus enabling to undertake the countermeasure operations, using only the CRT. Moreover, we integrated a computerized ARPs (Alarm Response Procedures) into the alarm system. (author). 4 figs, 5 tabs.

  16. Development of the newly advanced alarm system for APWR plant

    International Nuclear Information System (INIS)

    Shimada, Manabu; Yamamoto, Yoshihiro; Tani, Mamoru; Kobashi, Shuichi

    1997-01-01

    We have been developing AMCB (Advanced Main Control Board) for APWR consisting of a large overview display and on operator console. We have adopted the alarm prioritizing functions, which are already in use in the existing Japanese PWR plants, for easier identification of the high priority alarms. Moreover, we have developed an alarm system with a large overview display, which presents alarms on the plant process flow diagram. This enhances the location aids and pattern recognition in the alarm identification process. This time, we made further improvement and studies for better and various functions combining a large overview display with a CRT display. We determined the alarm system specification as follows, taking account of flexible alarm recognition processes. (1) The high priority alarms can be identified upon the LOD (large overview display). On the display, the alarms are described on the plant flow diagram, and the alarm status is shown on the fixed position of process or equipment symbols. (2) Other alarms are identified on large overview display and on CRTs using a hierarchical process. (3) The alarm messages are divided into 4 different groups according to the plant systems, thus enabling to undertake the countermeasure operations, using only the CRT. Moreover, we integrated a computerized ARPs (Alarm Response Procedures) into the alarm system. (author). 4 figs, 5 tabs

  17. Recommendations to alarm systems and lessons learned on alarm system implementation

    International Nuclear Information System (INIS)

    Soerenssen, Aimar; Veland, Oeystein; Farbrot, Jan Erik; Kaarstad, Magnhild; Seim, Lars Aage; Foerdestroemmen, Nils; Bye, Andreas

    2001-11-01

    Alarm systems have been of major concern within complex industrial processes for many years. Within the nuclear community, the TMI accident in 1979 was the first really serious event that showed also the importance of the man-machine aspects of the systems in general, and the alarm system in particular. The OECD Halden Reactor Project has been working with alarm systems since 1974. This report is an attempt to gather some of the knowledge that has been accumulated during the years in Halden, both in research and also in bilateral projects. Bilateral projects within this field have provided a practical basis of knowledge.A major part of this report consists of a set of recommendations, which reflect HRP's current understanding of how an alarm system should work. There are also recommendations on design methods. But also other issues are included, as system development and implementation experience, and experimental knowledge on the performance of alarm systems. Some open issues are also discussed. (Author). 54 refs., 15 figs

  18. Expert systems and microwave communication systems alarms processing: A feasibility study

    Energy Technology Data Exchange (ETDEWEB)

    Tonn, B.; Goeltz, R.; Purucker, S.

    1987-07-01

    This report presents the results of a feasibility study conducted by Oak Ridge National Laboratory (ORNL) for the Bonneville Power Administration concerning the applicability of Artificial Intelligence (AI) technology to process alarms associated with Bonneville's Microwave Communication System (MCS). Specifically, the discussion focuses on the characteristics of a prototype expert system/database management system (DBMS) configuration capable of intelligently processing alarms, efficiently storing alarm-based historical data, and providing analysis and reporting tools. Such a system has the potential to improve response to critical alarms, increase the information content of a large volume of complicated data, free operators from performing routine analysis, and provide alarm information to operators, field personnel, and management through queries and automatically produced reports.

  19. A Study on Performance Requirements for Advanced Alarm System

    International Nuclear Information System (INIS)

    Seong, Duk Hyun; Jeong, Jae Hoon; Sim, Young Rok; Ko, Jong Hyun; Kim, Jung Seon; Jang, Gwi Sook; Park, Geun Ok

    2005-01-01

    A design goals of advanced alarm system is providing advanced alarm information to operator in main control room. To achive this, we applied computer based system to Alarm System. Because, It should apply data management and advanced alarm processing(ie. Data Base Mangegment System and S/W module for alarm processing). These are not impossible in analog based alarm system. And, preexitance research examples are made on digital computer. We have digital systems for test of advanced alarm system table and have tested and studied using by test equipment in the view point of the system performance, stability and security. In this paper, we discribed about general software architecture of preexitance research examples. Also, CPU performance and requirements of system software that served to accommodate it, stability and security

  20. Communication strategies and timeliness of response to life critical telemetry alarms.

    Science.gov (United States)

    Bonzheim, Kimberly A; Gebara, Rani I; O'Hare, Bridget M; Ellis, R Darin; Brand, Monique A; Balar, Salil D; Stockman, Rita; Sciberras, Annette M; Haines, David E

    2011-05-01

    A centralized electrocardiogram telemetry monitoring system (TMS) facilitates early identification of critical arrhythmias and acute medical decompensation. Timely intervention can only be performed if abnormalities are communicated rapidly to the direct caregiver. The study objectives were to measure effectiveness of bi-directional voice communication badges versus one-way alphanumeric pagers for telemetry alarm response and communication loop closure. A sequential observational pilot study of nursing response to TMS alarms compared communication technologies on four nursing units in a 1,061 bed tertiary care hospital with 264 TMS channels of telemetry over a 2-year period. Subsequently, the communication technologies were compared in a randomized fashion on a 68-bed progressive cardiac care unit. Caregivers were blinded to the protocol. All alarm responses were recorded during two periods using either pagers or voice communication devices. Alarm response time and closure of the communication loop were analyzed in a blinded fashion. The direct communication functionality of the badge significantly shortened the time to first contact, time to completion, and rate of closure of the communication loop in both the pilot and study phases. Median time to first contact with the communication badge was 0.5  min, compared to 1.6  min with pager communication (p Communication loop closure was achieved in 100% of clinical alarms using the badge versus 19% with the pager (p Communication badge technology reduced alarm time to first contact and completion as well as facilitated communication loop closures. Immediate two-way communication significantly impacted practice, alarm management, and resulted in faster bedside care.

  1. Ionization smoke detector and alarm system

    International Nuclear Information System (INIS)

    1974-01-01

    An ionization smoke detector particularly suited to residential use is disclosed. The detector is battery-operated and is connected with a non-latching, pulsating alarm circuit. The detector has a sensing chamber formed by a perforated metallic shell and an electrode within which an insulated radiation source is centrally positioned to generate an ionization current for detecting smoke or other similar aerosols. The alarm circuit provides a pulsating alarm signal when smoke levels above a pre-determined value are sensed. The alarm circuit also includes a low voltage detection circuit for sounding the alarm when the end of useful battery life is approaching. (Auth.)

  2. System for alarms analysis and optimization in petrochemicals plants; Sistema para analise e otimizacao de alarmes em plantas petroquimicas

    Energy Technology Data Exchange (ETDEWEB)

    Leitao, Gustavo; Pifer, Aderson; Guedes, Luiz Affonso [Universidade Federal do Rio Grande do Norte (UFRN), Natal, RN (Brazil); Saito, Kaku; Aquino, Leonardo [PETROBRAS, Rio de Janeiro, RJ (Brazil). Centro de Pesquisas (CENPES)

    2008-07-01

    The present work presents a group of algorithms, techniques and functionalities on alarms management which can be used efficiently on the treatment of 'disturbances' caused by the informal management of the alarm systems. Among the disturbances handled by these techniques, there is the recognition of intermittent alarms and false alarms, location of alarm floods and correlation between alarms, aiming the identification of communal root causes. The results will be presented through a case study on petrochemical alarm plants. At last, the results obtained by the utilization of such functionalities will be presented and discussed. (author)

  3. A revival of the alarm system: Making the alarm list useful during incidents

    International Nuclear Information System (INIS)

    Larsson, J. E.; Oehman, B.; Calzada, A.; Nihlwing, C.; Jokstad, H.; Kristianssen, L. I.; Kvalem, J.; Lind, M.

    2006-01-01

    In control rooms there are often problems with information overload, which means that the operators may receive more information than they are able to interpret. The most serious information overload occurs in two types of situations. The first is when the operating state of the plant changes, which often gives raise to a shower of alarms and events. Such an alarm shower is expected, but can be dangerous, because it may hide other alarms originating from unrelated faults. The second problem occurs when a fault causes several consequential faults, leading to a so-called alarm cascade. Because the alarms seldom arrive in correct time order, it can be very difficult to analyze such a cascade, and the information overload occurs in exactly the moment when a potentially dangerous situation starts. In an ongoing project, GoalArt and IFE are cooperating in testing and evaluating GoalArt's methods for alarm reduction and root cause analysis. The testing comprises two specific algorithms, root cause analysis and state-based alarm priority. The GoalArt system has been integrated with the HAMBO simulator so that operators can evaluate the algorithms on-line. (authors)

  4. Experimental evaluation of human-system interaction on alarm design

    International Nuclear Information System (INIS)

    Huang, F.-H.; Lee, Y.-L.; Hwang, S.-L.; Yenn, T.-C.; Yu, Y.-C.; Hsu, C.-C.; Huang, H.-W.

    2007-01-01

    This study evaluates the practicability of automatic reset alarm system in Fourth Nuclear Power Plant (FNPP) of Taiwan. The features of auto-reset alarm system include dynamic prioritization of all alarm signals and fast system reset. Two experiments were conducted to evaluate the effect of automatic/manual reset on operation time, situational awareness (SA), task load index (TLX), and subjective ratings. All participants, including Experts and Novices, took part in the experiment on the alarm system simulator with Load Rejection procedure. The experimental results imply that the auto-reset alarm system may be applied in an advanced control room under Load Rejection procedure, because all participants' operation time were reduced as well as Novice's SA were raised up. Nevertheless, to ensure operating safety in FNPP, the effects of the auto-reset alarm system in other procedures/special situations still need to be tested in the near future

  5. A Design of Alarm System in a Research Reactor Facility

    International Nuclear Information System (INIS)

    Park, Jaekwan; Jang, Gwisook; Seo, Sangmun; Suh, Yongsuk

    2013-01-01

    The digital alarm system has become an indispensable design to process a large amount of alarms of power plants. Korean research reactor operated for decades maintains a hybrid alarm system with both an analog annunciator and a digital alarm display. In this design, several alarms are indicated on an analog panel and digital display, respectively, and it requires more attention and effort of the operators. As proven in power plants, a centralized alarm system design is necessary for a new research reactor. However, the number of alarms and operators in a research reactor is significantly lesser than power plants. Thus, simplification should be considered as an important factor for the operation efficiency. This paper introduces a simplified alarm system. As advances in information technology, fully digitalized alarm systems have been applied to power plants. In a new research reactor, it will be more useful than an analog or hybrid configuration installed in research reactors decades ago. However, the simplification feature should be considered as an important factor because the number of alarms and number of operators in a research reactor is significantly lesser than in power plants

  6. Expert System Constant False Alarm Rate (CFAR) Processor

    National Research Council Canada - National Science Library

    Wicks, Michael C

    2006-01-01

    An artificial intelligence system improves radar signal processor performance by increasing target probability of detection and reducing probability of false alarm in a severe radar clutter environment...

  7. Development and Characteristics of an ANSI/ANS-8-3-1997-Compliant Criticality Alarm

    International Nuclear Information System (INIS)

    McMahan, J.W.

    2002-01-01

    A Criticality Alarm System (CAS) was developed at the Savannah River Site (SRS) beginning in 1964, which used an ionization chamber and battery - powered tube amplifier. Three generations of improvements are described here, to improve reliability, reduce maintenance cost, and eliminate false alarms. The original configuration for the CAS instrument (called Nuclear Incident Monitor-NIM model I) was a single chassis containing all components including the batteries and the detector, and a warning bell and light. To decrease the contamination potential of NIMs, the detector can now be removed from the chassis and remotely located for some installations. In the presently used second generation model II, each unit consists of an ion chamber with electrometer amplifier, voltage comparator circuits, battery and power supplies, monitoring circuits, and relay alarm circuits. The electrometer circuit is housed with the ion chamber in an aluminum enclosure. The remaining components are located in the main chassis. An alarm point of one R per Hour is adjustable over a narrow range for calibration purposes. Evacuation zones were determined on a 25 rad dose basis, and then modified to the 12 rad level

  8. JOYO operation support system 'JOYCAT' based on intelligent alarm handling

    International Nuclear Information System (INIS)

    Tamaoki, Tetsuo; Yamamoto, Hiroki; Sato, Masuo; Yoshida, Megumu; Kaneko, Tomoko; Terunuma, Seiichi; Takatsuto, Hiroshi; Morimoto, Makoto.

    1992-01-01

    An operation support system for the experimental fast reactor 'JOYO' was developed based on an intelligent alarm-handling. A specific feature of this system, called JOYCAT (JOYO Consulting and Analyzing Tool), is in its sequential processing structure that a uniform treatment by using design knowledge base is firstly applied for all activated alarms, and an exceptional treatment by using heuristic knowledge base is then applied only for the former results. This enables us to achieve real-time and flexible alarm-handling. The first alarm-handling determines the candidates of causal alarms, important alarms with which the operator should firstly cope, through identifying the cause-consequence relations among alarms based on the design knowledge base in which importance and activating conditions are described for each of 640 alarms in a frame format. The second alarm-handling makes the final judgement with the candidates by using the heuristic knowledge base described as production rules. Then, operation manuals concerning the most important alarms are displayed to operators. JOYCAT has been in commission since September of 1990, after a wide scope of validation tests by using an on-site full-scope training simulator. (author)

  9. Alarm handler for the advanced photon source control system

    International Nuclear Information System (INIS)

    Kraimer, M.R.; Cha, B.K.; Anderson, M.

    1991-01-01

    The Advanced Photon Source (APS), now under construction at Argonne National Laboratory, will have a control system employing graphics workstations at the operator interface level and VME-based microprocessors operating with a distributed database at the field level. The alarm handler is an application utilizing X-Windows running on one or more operator interface workstations which monitors alarms generated by the VME-based microprocessors. Alarms can be grouped in a hierarchical manner. The operator can monitor, acknowledge, and mask alarms either individually or aggregately. Alarm changes of state and all operator modifications are logged. When alarms occur, display windows are automatically generated conveying system and subsystem relationships and severity. Menus are used to modify the alarm action configuration files and to obtain help. Since alarm groups are defined via an alarm configuration file, the alarm handler is a general purpose application which can be customized to monitor a single subsystem or configured to monitor the entire accelerator complex. 2 refs., 2 figs

  10. The heuristics of nurse responsiveness to critical patient monitor and ventilator alarms in a private room neonatal intensive care unit.

    Science.gov (United States)

    Joshi, Rohan; Mortel, Heidi van de; Feijs, Loe; Andriessen, Peter; Pul, Carola van

    2017-01-01

    Alarm fatigue is a well-recognized patient safety concern in intensive care settings. Decreased nurse responsiveness and slow response times to alarms are the potentially dangerous consequences of alarm fatigue. The aim of this study was to determine the factors that modulate nurse responsiveness to critical patient monitor and ventilator alarms in the context of a private room neonatal intensive care setting. The study design comprised of both a questionnaire and video monitoring of nurse-responsiveness to critical alarms. The Likert scale questionnaire, comprising of 50 questions across thematic clusters (critical alarms, yellow alarms, perception, design, nursing action, and context) was administered to 56 nurses (90% response rate). Nearly 6000 critical alarms were recorded from 10 infants in approximately 2400 hours of video monitoring. Logistic regression was used to identify patient and alarm-level factors that modulate nurse-responsiveness to critical alarms, with a response being defined as a nurse entering the patient's room within the 90s of the alarm being generated. Based on the questionnaire, the majority of nurses found critical alarms to be clinically relevant even though the alarms did not always mandate clinical action. Based on video observations, for a median of 34% (IQR, 20-52) of critical alarms, the nurse was already present in the room. For the remaining alarms, the response rate within 90s was 26%. The median response time was 55s (IQR, 37-70s). Desaturation alarms were the most prevalent and accounted for more than 50% of all alarms. The odds of responding to bradycardia alarms, compared to desaturation alarms, were 1.47 (95% CI = 1.21-1.78; heuristics in determining whether or not to respond to the alarm. Amongst other factors, the category and duration of critical alarms along with the clinical status of the patient determine nurse-responsiveness to alarms.

  11. Implementation of the Integrated Alarm System for KOMAC facility using EPICS framework and Eclipse

    International Nuclear Information System (INIS)

    Song, Young-Gi; Kim, Jae-Ha; Kim, Han-Sung; Kwon, Hyeok-Jung; Cho, Yong-Sub

    2017-01-01

    The alarm detecting layer is the component that monitors alarm signals which are transported to the processing part through message queue. The main purpose of the processing part is to transfer the alarm signals connecting an alarm identification and state of the alarm to database system. The operation interface of system level signal links has been developed by EPICS framework. EPICS tools have been used for monitoring device alarm status. The KOMAC alarm system was developed for offering a user-friendly, intuitive user interface. The alarm system is implemented with EPICS IOC for alarm server, eclipse-mars integrated development tool for alarm viewer, and mariadb for alarm log. The new alarm system supports intuitive user interface on alarm information and alarm history. Alarm view has plans to add login function, user permission on alarm acknowledge, user permission of PV import, search and report function.

  12. Definition and means of maintaining the criticality detectors and alarms portion of the PFP safety envelope

    International Nuclear Information System (INIS)

    White, W.F.

    1997-01-01

    The Criticality Alarm System (CAS) provides continuous detection for high radiation (criticality) events and automatically initiates an evacuation signal to affected personnel. The Safety Envelope (SE) for PFP includes the necessary equipment and the required procedures to ensure the CAS is capable of performing its intended function. This document provides the definition and means of maintaining the SE for PFP related to the CAS. This document also identifies and provides a justification for those portions of the CAS excluded from the PFP Safety Envelope

  13. Alarm systems a guide to design, management and procurement

    CERN Document Server

    Engineering Equipment and Materials Users' Association. London

    2013-01-01

    Alarm systems form an essential part of the operator interfaces to large modern industrial facilities. They provide vital support to the operators by warning them of situations that need their attention and have an important role in preventing, controlling and mitigating the effects of abnormal situations. Since it was first published in 1999, EEMUA 191 has become the globally accepted and leading guide to good practice for all aspects of alarm systems. The guide, developed by users of alarm systems with input from the GB Health and Safety Executive, gives comprehensive guidance on designing, managing and procuring an effective alarm system. The new Third Edition has been comprehensively updated and includes guidance on implementing the alarm management philosophy in practice; applications in geographically distributed processes; and performance metrics and KPIs.

  14. Los Alamos Scientific Laboratory long-range alarm system

    International Nuclear Information System (INIS)

    DesJardin, R.; Machanik, J.

    1980-01-01

    The Los Alamos Scientific Laboratory (LASL) Long-Range Alarm System is described. The last few years have brought significant changes in the Department of Energy regulations for protection of classified documents and special nuclear material. These changes in regulations have forced a complete redesign of the LASL security alarm system. LASL covers many square miles of varying terrain and consists of separate technical areas connected by public roads and communications. A design study over a period of 2 years produced functional specifications for a distributed intelligence, expandable alarm system that will handle 30,000 alarm points from hundreds of data concentrators spread over a 250-km 2 area. Emphasis in the design was on nonstop operation, data security, data communication, and upward expandability to incorporate fire alarms and the computer-aided dispatching of security and fire vehicles. All aspects of the alarm system were to be fault tolerant from the central computer system down to but not including the individual data concentrators. Redundant communications lines travel over public domain from the alarmed area to the central alarm station

  15. Operator Performance Comparison of two VDT-based Alarm Systems

    International Nuclear Information System (INIS)

    Lee, Hyun-Chul; Oh, In-Suk; Sim, Bong-Shick; Koo, In-Soo; Kim, Jeong-Taek; Lee, Ki-Young; Park, Jong-Kyun

    1998-01-01

    This study is carried out to investigate performance differences between two alarm presentation methods from the viewpoint of human factors and to provide items to be improved. One of the alarm display methods considered in this study displays alarm lists on VDT combined with hardwired alarm panels. The other method displays alarms on plant mimic diagrams of VDT. This alarm display method has other features for operator aid with which operator can get detailed information on the activated alarm in the mimic diagrams, and the capability for alarm processing such as alarm reduction and prioritization. To compare the two display methods, a human factor experiment was performed with a plant simulator in the ITF (Integrated Test Facility) that plant operators run for 4 event scenarios. During the experiment, physiological measurements, system and operator action log, and audio/video recordings were collected. Operators subjective opinion was collected as well after the experiment. Time, error rate and situation awareness were major human factor criteria used for the comparison during the analysis stage of the experiment. No statistical significance was found in the results of our statistical comparison analysis. Several findings were identified, however, through the analysis of subjective opinions. (authors)

  16. Design of SMART alarm system using main memory database

    International Nuclear Information System (INIS)

    Jang, Kue Sook; Seo, Yong Seok; Park, Keun Oak; Lee, Jong Bok; Kim, Dong Hoon

    2001-01-01

    To achieve design goal of SMART alarm system, first of all we have to decide on how to handle and manage alarm information and how to use database. So this paper analyses concepts and deficiencies of main memory database applied in real time system. And this paper sets up structure and processing principles of main memory database using nonvolatile memory such as flash memory and develops recovery strategy and process board structures using these. Therefore this paper shows design of SMART alarm system is suited functions and requirements

  17. DTR, Taut Wire System: An alarm barrier with experience

    International Nuclear Information System (INIS)

    Kraft, A.J.

    1986-01-01

    The Taut Wire Fence Alarm System concept was developed and introduced more that fifteen years ago in Israel. A sudden expansion of the nations's border lines, the difficulty to monitor intrusions along those elongated lines and the need for timely as well as accurate armed response to an intrusion attempt dictated the need for an alarming barrier. Traditionally, protection of perimeters was accomplished by the installation of a fence or other type obstacles (man made or natural) and surveillance by manned patrols, fixed observation posts, and/or electronic devices. Defense planners recognized therefore the need for an alarming barrier. A concentrated effort by scientists solved the problem by developing the first Taut Wire Fence Alarm System in a configuration of an alarm barrier. The system was specified to have an extremely low false alarm rate (FAR/NAR), high probability of detection, the capability to follow various terrains, operability in a wide range of environmental conditions, a capability to delay an intruder, ease of installation by unskilled labor, and low maintenance requirements. The authors try here to explain the various constraints and considerations given during the design stages of the Taut Wire Alarm System so as to bring the present magnitude of users to a better understanding of the system's operation

  18. Definition and means of maintaining the criticality detectors and alarms portion of the PFP safety envelope

    Energy Technology Data Exchange (ETDEWEB)

    White, W.F.

    1997-05-13

    The purpose of this document is to provide the definition and means of maintaining the Safety Envelope (SE) related to the Criticality Alarm System (CAS). This document provides amplification of the Limiting Condition for Operation (LCO) described in the Plutonium Finishing Plant (PFP) Operational Safety Requirements (OSR), WHC-SD-CP-OSR-010, Rev. 0, 1994, Section 3.1.2, Criticality Detectors and Alarms. This document, with its appendices, provides the following: (1) System functional requirements for determining system operability (Section 3); (2) A list of annotated system block diagrams which indicate the safety envelope boundaries (Appendix C); (3) A list of the Safety Class 1 and 2 Safety Envelope (SC-1/2 SE) equipment for input into the Master Component Index (Appendix B); (4) Functional requirements for individual SC-1/2 SE components, including appropriate setpoints and process parameters (Section 6 and Appendix A); (5) A list of the operational, maintenance and surveillance procedures necessary to operate and maintain the SC-1/2 SE components as required by the LCO (Section 6 and Appendix A).

  19. Definition and means of maintaining the criticality detectors and alarms portion of the PFP safety envelope

    International Nuclear Information System (INIS)

    White, W.F.

    1997-01-01

    The purpose of this document is to provide the definition and means of maintaining the Safety Envelope (SE) related to the Criticality Alarm System (CAS). This document provides amplification of the Limiting Condition for Operation (LCO) described in the Plutonium Finishing Plant (PFP) Operational Safety Requirements (OSR), WHC-SD-CP-OSR-010, Rev. 0, 1994, Section 3.1.2, Criticality Detectors and Alarms. This document, with its appendices, provides the following: (1) System functional requirements for determining system operability (Section 3); (2) A list of annotated system block diagrams which indicate the safety envelope boundaries (Appendix C); (3) A list of the Safety Class 1 and 2 Safety Envelope (SC-1/2 SE) equipment for input into the Master Component Index (Appendix B); (4) Functional requirements for individual SC-1/2 SE components, including appropriate setpoints and process parameters (Section 6 and Appendix A); (5) A list of the operational, maintenance and surveillance procedures necessary to operate and maintain the SC-1/2 SE components as required by the LCO (Section 6 and Appendix A)

  20. Locations of criticality alarms and nuclear accident dosimeters at Hanford

    International Nuclear Information System (INIS)

    1992-08-01

    Hanford facilities that contain fissionable materials capable of achieving critical mass are monitored with nuclear accident dosimeters (NADS) in compliance with the requirements of DOE Order 5480.11, Chapter XI, Section 4.c. (DOE 1988). The US Department of Energy (DOE) Richland Field Office (RL) has assigned the responsibility for maintaining and evaluating the Hanford NAD system to the Instrumentation and External Dosimetry (I ampersand ED) Section of Pacific Northwest Laboratory's (PNL's) Health Physics Department. This manual provides a description of the Hanford NAD, criteria and instructions for proper NAD placement, and the locations of these dosimeters onsite

  1. ARC Code TI: Optimal Alarm System Design and Implementation

    Data.gov (United States)

    National Aeronautics and Space Administration — An optimal alarm system can robustly predict a level-crossing event that is specified over a fixed prediction horizon. The code contained in this packages provides...

  2. A Nuisance Alarm Data System for evaluation of intrusion detectors

    International Nuclear Information System (INIS)

    Ream, W.K.

    1990-01-01

    A Nuisance Alarm Data System (NADS) was developed to gather long-term background alarm data on exterior intrusion detectors as part of their evaluation. Since nuisance alarms play an important part in the selection of intrusion detectors for use at Department of Energy (DOE) facilities, an economical and reliable way to monitor and record these alarms was needed. NADS consists of an IBM personal computer and printer along with other commercial units to communicate with the detectors, to gather weather data, and to record video for assessment. Each alarm, its assessment, and the weather conditions occurring at alarm time are placed into a data base that is used in the evaluation of the detector. The operating software is written in Turbo Pascal for easy maintenance and modification. A portable system, based on the NADS design, has been built and shipped to other DOE locations to do on-site alarm monitoring. This has been valuable for the comparison of different detectors in the on-site environment and for testing new detectors when the appropriate conditions do not exist or cannot be simulated at the Exterior Intrusion Detection Testbed

  3. New Concept For Alarm Structure And Management In Dcs Systems

    Directory of Open Access Journals (Sweden)

    Mohammed Hegazy

    2015-08-01

    Full Text Available The objective of this paper is to set new standard for good design and best practice to applied when any DCS ManufacturesSuppliers configure process alarm system in any oil refining oil and gas production gas-handling facilities gasification plant or any chemical processing plant and thereby to optimizeminimize unnecessary alarms from reporting to operator workstations CAD Control Alarm Display. These views based on the experience acquired and implemented during involvement with the commissioning and startup of two DCS projects in Mina Al-Ahmadi Refinery Kuwait.

  4. The study of system function analysis method for success path alarm design

    International Nuclear Information System (INIS)

    Kang, S. K.; Shin, Y. C.

    1999-01-01

    The key benefit to the common use of the critical function approach for safety and mission functions is that monitoring methods expected to be used by operaotrs during emergency condition are used continuously during normal operation. For each critical safety function there exists two or more success paths. Information Processing System monitors the availability, operation state and performance of the critical function success paths. In this paper, We have studied System Function Analysis(SFA) for the design of Success Path Alarm(SPA) for applying in KNGR. In here, we thought that SFA will help the design of SPA. The SFA can be applicable to the design of SPA according to NUREG-0711, also can induce the algorithm for alarm of system, train and flow path. We present a method of system function analysis for designing Success Path Alarm

  5. Alarm management for process control a best-practice guide for design, implementation, and use of industrial alarm systems

    CERN Document Server

    Rothenberg, Douglas H

    2014-01-01

    No modern industrial enterprise, particularly in such areas as chemical processing, can operate without a secure, and reliable, network of automated monitors and controls. And those operations need alarm systems to alert engineers and managers the moment anything goes wrong or needs attention. This book, by one of the world's leading experts on industrial alarm systems, will provide A to Z coverage of designing, implementing, and maintaining an effective alarm network.

  6. A study of reset mode in advanced alarm system simulator

    International Nuclear Information System (INIS)

    Yenn, T. C.; Hwang, S. L.; Huang, F. H.; Yu, A. C.; Hsu, C. C.; Huang, H. W.

    2006-01-01

    An automation function has been widely applied in main control room of nuclear power plants. That leads to a new issue of human-automation interaction, which considers human operational performance in automated systems. In this research is the automation alarm reset in the advanced alarm system (AAS) of Advanced Nuclear Power Plant in Taiwan. Since alarms are very crucial for the understanding of the status of the plant as well as the reset function of alarm system will be changed from fully manual to fully automatic, it is very important to test and evaluate the performance and the effect of reset modes in AAS. The purpose of this paper is to evaluate the impact of the auto-reset alarm system on the plant performance and on operators' preference and task load. To develop a dynamic simulator as an AAS was conducted to compare manual and automatic reset function of alarm system on task performance and subjective ratings of task workload, comprehension, and preference. The simulation includes PCTRAN model and alarm software processing. The final results revealed that, using the auto-reset mode, participants had lower task load index (TLX) on effort in the first test trial and was more satisfied in multiple tasks condition. In contrast, using manual reset mode, participants were more satisfied on alarm handling, monitoring, and decision making. In other words, either reset mode in the study has unique features to assist operator, but is insufficient. The reset function in AAS therefore should be very flexible. Additionally, the experimental results also pointed out that the user interfaces need to be improved. Those experiences will be helpful for human factors verification and validation in the near future. (authors)

  7. Renewal of the control terminals of the criticality alarm system of the factory; Renovacion de los terminales de control del sistema de alarma de criticidad de la fabrica

    Energy Technology Data Exchange (ETDEWEB)

    Escandon Ortiz, E.; Dorado Sierra, P.; Ortiz Trujillo, D.; Zurron Cifuentes, O.; Lopez Marquez, J.

    2011-07-01

    The new terminals to be installed are based on computer servers with eDNA management software and have the same features as the existing, but with the advantage of a greater dynamism and flexibility in obtaining and storage of historical data from the modules of acquisition of data (DAM) system.

  8. PROLOG language application for alarm system realization in accelerator control

    International Nuclear Information System (INIS)

    Frolov, I.; Vaguine, A.; Abe, I.; Nakahara, K.; Furukawa, K.; Kamikubota, N.

    1994-01-01

    Such PROLOG features as backtracking, matching and recursive data representation are powerful tools for ALARM system realization. Although the main idea is the possibility to describe some technical system in recursive form, backtracking and matching are ideal for processing recursive data structures. This paper represents a technique which would allow PROLOG language application for ALARM system realization using an example of the KEK LINAC magnet system. The technique is based on an object-oriented internal data representation in terms of objects, properties, relations and knowledge conception. In addition, each property value is characterized by a typical 'time life'. (author)

  9. 29 CFR 1910.165 - Employee alarm systems.

    Science.gov (United States)

    2010-07-01

    ... OCCUPATIONAL SAFETY AND HEALTH STANDARDS Fire Protection Other Fire Protection Systems § 1910.165 Employee... notification to assigned personnel whenever a deficiency exists in the system. The employer shall assure that... 29 Labor 5 2010-07-01 2010-07-01 false Employee alarm systems. 1910.165 Section 1910.165 Labor...

  10. Nuclear-power-plant perimeter-intrusion alarm systems

    International Nuclear Information System (INIS)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981

  11. General multiplex centralized fire-alarm display system

    International Nuclear Information System (INIS)

    Zhu Liqun; Chen Jinming

    2002-01-01

    The fire-alarm display system is developed, which can connect with each type of fire controllers produced in the factory and SIGMASYS controllers. It can display whole alarm information. The display system software gathers communication, database and multimedia, has functions of inspecting fire, showing alarm, storing data, searching information and so on. The drawing software lets the user expediently add, delete, move and modify fire detection or fire fighting facilities on the building floor maps. The graphic transform software lets the display use the vectorgraph produced by popular plotting software such as Auto CAD. The system software provides the administration function, such as log book of changing shift and managing workers etc.. The software executed on Windows 98 platform. The user interface is friendly and reliable in operation

  12. AN AUTOMATIC CAR ANTI-THEFT ALARM SYSTEM

    OpenAIRE

    J. A. Enokela; E.J. Ibanga

    2007-01-01

    The theft of cars and other automobiles by criminals has become so frequent in our society as to be classified as alarming. Most of the thefts are organized by gangs of robbers but sometimes individuals engage in this activity. The result usually, however, is that the persons from whom the vehicles have been stolen are left to grieve as many of these vehicles are never recovered. This paper describes a simple alarm system that can be easily installed in all kinds of vehicles. The system desc...

  13. Integrated alarm annunciation and entry control systems -- Survey results

    International Nuclear Information System (INIS)

    Clever, J.J.; Arakaki, L.H.; Monaco, F.M.; Juarros, L.E.; Quintana, G.R.

    1993-10-01

    This report provides the results and analyses of a detailed survey undertaken in Summer 1993 to address integrated intrusion detection alarm annunciation and entry control system issues. This survey was undertaken as a first attempt toward beginning to answer questions about integrated systems and commercial capabilities to meet or partially meet US Department of Energy (DOE) site needs

  14. Satellite Search and Rescue System Studies: Alarm and Position Reporting.

    Science.gov (United States)

    alarm and position reporting ( ALPR ) techniques, and the operational or planned spacecraft which might be available for piggybacking the ALPR payload...Several system concepts were then developed to perform the ALPR functions. The candidates were screened and the preferred system concepts were chosen

  15. Design of alarm systems in Swedish nuclear power plants

    International Nuclear Information System (INIS)

    Thunberg, Anna; Osvalder, Anna-Lisa

    2008-04-01

    Research within the area of improving alarm system design and performance has mainly focused on new alarm systems. However, smaller modernisations of legacy systems are more common in the Swedish nuclear industry than design of totally new systems. This imposes problems when the new system should function together with the old system. This project deals with the special concerns raised by modernisation projects. The objective of the project has been to increase the understanding of the relationship between the operator's performance and the design of the alarm system. Of major concern has been to consider the cognitive abilities of the operator, different operator roles and work situations, and varying need of information. The aim of the project has been to complement existing alarm design guidance and to develop user-centred alarm design concepts. Different case studies have been performed in several industry sectors (nuclear, oil refining, pulp and paper, aviation and medical care) to identify best practice. Several empirical studies have been performed within the nuclear area to investigate the operator's need of information, performance and workload in different operating modes. The aspect of teamwork has also been considered. The analyses show that the operator has different roles in different work situations which affect both the type of information needed and how the information is processed. In full power operation, the interaction between the operator and the alarm system is driven by internal factors and the operator tries to maintain high situation awareness by actively searching for information. The operator wants to optimise the process and need detailed information with possibilities to follow-up and get historical data. In disturbance management, the operator is more dependent on external information presented by the alarm system. The new compilation of alarm guidance is based on the operator's varying needs in different working situations and is

  16. Functional relationship based alarm processing system for nuclear power

    International Nuclear Information System (INIS)

    Corsberg, D.; Sebo, D.

    1986-01-01

    At the Idaho National Engineering Laboratory (INEL), two knowledge-based systems, Alarm Filtering System (AFS) and Reactor Safety Assessment System (RSAS), are being developed to address the problem of information overload faced by operators during major plant transients. This paper discusses those systems, their strengths and weaknesses, and how their basic methodologies can be combined into a system that can better support the operator in identifying the plant state

  17. Communication interface of computerized automatic fire alarm system

    International Nuclear Information System (INIS)

    Yu Hongmei; Zhu Liqun; Fang Shaohong; Du Chengbao

    1997-01-01

    The problems of communication between multiple single-chip computers and microcomputer have been solved by the way of hardware and software. The automatic fire alarm system is realized by using the serial port both on single-chip computer and microcomputer

  18. SeaQuest/E906 Shift Alarm System

    Science.gov (United States)

    Kitts, Noah

    2014-09-01

    SeaQuest, Fermilab E906, is a fixed target experiment that measures the Drell-Yan cross-section ratio of proton-proton to proton-deuterium collisions in order to extract the sea anti-quark structure of the proton. SeaQuest will extend the measurements made by E866/NuSea with greater precision at higher Bjorken-x. The continuously running experiment is always being monitored. Those on shift must keep track of all of the detector readouts in order to make sure the experiment is running correctly. As an experiment that is still in its early stages of running, an alarm system for people on shift is being created to provide warnings, such as a plot showing a detector's performance is sufficiently different to need attention. This plan involves python scripts that track live data. When the data shows a problem within the experiment, a corresponding alarm ID is sent to the MySQL database which then sets off an alarm. These alarms, which will alert the person on shift through both an audible and visual response, are important for ensuring that issues do not go unnoticed, and to help make sure the experiment is recording good data.

  19. Plant experience with an expert system for alarm diagnosis

    International Nuclear Information System (INIS)

    Gimmy, K.L.

    1986-01-01

    An expert system called Diagnosis of Multiple Alarms (DMA) is in routine use at four nuclear reactors operated by the DuPont Company. The system is wired to plant alarm annunciators and does event-tree analysis to see if a pattern exists. Any diagnosis is displayed to the plant operator and the corrective procedure to be followed is also identified. The display is automatically superseded if a higher priority diagnosis is made. The system is integrated with operator training and procedures. Operating results have been positive. DMA has diagnosed several hard-to-locate small leaks. There have been some false diagnosis, and realistic plant environments must be considered in such expert systems. 2 refs., 5 figs

  20. Nuclear incident monitor criticality alarm instrument for the Savannah River Site: Technical manual

    International Nuclear Information System (INIS)

    Jenkins, J.B.

    1996-01-01

    The Savannah River Site is a Department of Energy facility. The facility stores, processes, and works with fissionable material at a number of locations. Technical standards and US Department of Energy orders, require these locations to be monitored by criticality alarm systems under certain circumstances. The Savannah River Site calls such instruments Nuclear Incident Monitors or NIMs. The Sole purpose of the Nuclear Incident Monitor is to provide an immediate evacuation signal in the case of an accidental criticality in order to minimize personnel exposure to radiation. The new unit is the third generation Nuclear Incident Monitor at the Savannah River Site. The second generation unit was developed in 1979. It was designed to eliminate vacuum-tube circuits, and was the first solid state NIM at SRS. The major design objectives of the second generation NIM were to improve reliability and reduce maintenance costs. Ten prototype units have been built and tested. This report describes the design of the new NIM and the testing that took place to verify its acceptability

  1. Central display system of figures in fire alarm

    International Nuclear Information System (INIS)

    Fang Shaohong; Zhu Zicheng; Zhu Liqun; Ren Yi; Yu Hongmei; Du Chengbao; Xie Guoxue

    1997-01-01

    A new type of 'central display system of figures in fire alarm' includes two parts: (1) software package of drawing picture; (2) real time processing and operate system (POS). Main function of the software package is to draw floor plane figures, fire-fighting facility signs and room numbers; and then all pictures are used in POS. Main functions of POS are to process fire alarm, faults and activation of fire fighting control facility, save and print reports, look over floor plane figures, look over concrete condition of fire fighting facilities, and to show appropriate prompt according to different case. This system realizes many functions, such as, control with mouse, operation with push-button, menu operation interface, flip windows to prompt, and chinese character. It have won acclaim for its amazing interface, its convenience to operate, its reliability and flexibility

  2. Seismic alarm system for Ignalina nuclear power plant

    International Nuclear Information System (INIS)

    Wieland, M.; Griesser, L.; Austin, G.E.; Tiurin, S.; Kuendig, C.

    2001-01-01

    A seismic alarm system will be installed at the Ignalina Nuclear Power Plant (INPP) in Lithuania. There are two reactors, both RMBK 1500 MW units. Each reactor is a water cooled, graphite moderated, channel type reactor. INPP has the most advanced version of the RMBK reactor design series. The first and second units of INPP went into service at the end of 1983 and in August 1987 respectively. Their design lifetime is approx. 30 years. The various buildings and plant have been designed for two earthquake levels, that is the design earthquake and the maximum possible earthquake with peak ground accelerations ranging from 1.2% to 10% of the acceleration due to gravity. Certain parts of the buildings and some of the equipment of the first and second units do not comply with Western seismic standards. As seismic strengthening of the existing buildings and equipment is not feasible economically, a reactor protection system based on an earthquake early warning system was recommended. This system essentially consists of six seismic stations encircling INPP at a radial distance of approx. 30 km and a seventh station at INPP. Each station includes three seismic substations each 500 m apart. The ground motion at each station is measured continuously by three accelerometers and one seismometer. Data is transmitted via telemetry to the control centre at INPP. Early warning alarms are generated if a seismic threshold is exceeded. This paper discusses the characteristics of INPP, the seismic alarm system presently under construction and the experience with other early warning and seismic alarm systems. (author)

  3. Teaching methodology of the diagnosing process on the example of the fire alarm system

    Directory of Open Access Journals (Sweden)

    Paś Jacek

    2017-03-01

    Full Text Available The article presents a method of teaching the process of diagnosing the technical and functional condition of the fire alarm system (SSP. The fire alarm system’s laboratory model is a representation of a real fire alarm system. The lecturer has the opportunity to inflict several different independent damage. The aim of the laboratory exercise is to familiarize students with the methodology and structure of the fire alarm system diagnosing process.

  4. The ecology and evolution of avian alarm call signaling systems

    Science.gov (United States)

    Billings, Alexis Chandon

    Communication is often set up as a simple dyadic exchange between one sender and one receiver. However, in reality, signaling systems have evolved and are used with many forms and types of information bombarding multiple senders, who in turn send multiple signals of different modalities, through various environmental spaces, finally reaching multiple receivers. In order to understand both the ecology and evolution of a signaling system, we must examine all the facets of the signaling system. My dissertation focused on the alarm call signaling system in birds. Alarm calls are acoustic signals given in response to danger or predators. My first two chapters examine how information about predators alters alarm calls. In chapter one I found that chickadees make distinctions between predators of different hunting strategies and appear to encode information about predators differently if they are heard instead of seen. In my second chapter, I test these findings more robustly in a non-model bird, the Steller's jay. I again found that predator species matters, but that how Steller's jays respond if they saw or heard the predator depends on the predator species. In my third chapter, I tested how habitat has influenced the evolution of mobbing call acoustic structure. I found that habitat is not a major contributor to the variation in acoustic structure seen across species and that other selective pressures such as body size may be more important. In my fourth chapter I present a new framework to understand the evolution of multimodal communication across species. I identify a unique constraint, the need for overlapping sensory systems, thresholds and cognitive abilities between sender and receiver in order for different forms of interspecific communication to evolve. Taken together, these chapters attempt to understand a signaling system from both an ecological and evolutionary perspective by examining each piece of the communication scheme.

  5. Development of the effectiveness measure for an advanced alarm system using signal detection theory

    International Nuclear Information System (INIS)

    Park, J.K.; Choi, S.S.; Hong, J.H.; Chang, S.H.

    1997-01-01

    Since many alarms which are activated during major process deviations or accidents in nuclear power plants can result in negative effects for operators, various types of advanced alarm systems that can select important alarms for the identification of process deviation have been developed to reduce the operator's workload. However, the irrelevant selection of important alarms could distract the operator from correct identification of process deviation. Therefore, to evaluate the effectiveness of the advanced alarm system, a tradeoff between the alarm reduction rate (how many alarms are reduced?) and informativeness (how many important alarms that are conducive to identifying process deviation are provided?) of an advanced alarm system should be considered. In this paper, a new measure is proposed to evaluate the effectiveness of an advanced alarm system with regard to the identification of process deviation. Here, the effectiveness measure is the combination of informativeness measure and reduction rate, and the informativeness measure means the information processing capability performed by the advanced alarm system including wrong rejection and wrong acceptance, and it can be calculated using the signal detection theory (SDT). The effectiveness of the prototype alarm system was evaluated using the loss of coolant accident (LOCA) scenario, and the validity of the effectiveness measure was investigated from two types of the operator response, such as the identification accuracy and the operator's preference for the identification of LOCA

  6. Orthos, an alarm system for the ALICE DAQ operations

    Science.gov (United States)

    Chapeland, Sylvain; Carena, Franco; Carena, Wisla; Chibante Barroso, Vasco; Costa, Filippo; Denes, Ervin; Divia, Roberto; Fuchs, Ulrich; Grigore, Alexandru; Simonetti, Giuseppe; Soos, Csaba; Telesca, Adriana; Vande Vyvre, Pierre; von Haller, Barthelemy

    2012-12-01

    ALICE (A Large Ion Collider Experiment) is the heavy-ion detector studying the physics of strongly interacting matter and the quark-gluon plasma at the CERN LHC (Large Hadron Collider). The DAQ (Data Acquisition System) facilities handle the data flow from the detectors electronics up to the mass storage. The DAQ system is based on a large farm of commodity hardware consisting of more than 600 devices (Linux PCs, storage, network switches), and controls hundreds of distributed hardware and software components interacting together. This paper presents Orthos, the alarm system used to detect, log, report, and follow-up abnormal situations on the DAQ machines at the experimental area. The main objective of this package is to integrate alarm detection and notification mechanisms with a full-featured issues tracker, in order to prioritize, assign, and fix system failures optimally. This tool relies on a database repository with a logic engine, SQL interfaces to inject or query metrics, and dynamic web pages for user interaction. We describe the system architecture, the technologies used for the implementation, and the integration with existing monitoring tools.

  7. Orthos, an alarm system for the ALICE DAQ operations

    International Nuclear Information System (INIS)

    Chapeland, Sylvain; Carena, Franco; Carena, Wisla; Chibante Barroso, Vasco; Costa, Filippo; Divia, Roberto; Fuchs, Ulrich; Grigore, Alexandru; Simonetti, Giuseppe; Soos, Csaba; Telesca, Adriana; Vande Vyvre, Pierre; Von Haller, Barthelemy; Denes, Ervin

    2012-01-01

    ALICE (A Large Ion Collider Experiment) is the heavy-ion detector studying the physics of strongly interacting matter and the quark-gluon plasma at the CERN LHC (Large Hadron Collider). The DAQ (Data Acquisition System) facilities handle the data flow from the detectors electronics up to the mass storage. The DAQ system is based on a large farm of commodity hardware consisting of more than 600 devices (Linux PCs, storage, network switches), and controls hundreds of distributed hardware and software components interacting together. This paper presents Orthos, the alarm system used to detect, log, report, and follow-up abnormal situations on the DAQ machines at the experimental area. The main objective of this package is to integrate alarm detection and notification mechanisms with a full-featured issues tracker, in order to prioritize, assign, and fix system failures optimally. This tool relies on a database repository with a logic engine, SQL interfaces to inject or query metrics, and dynamic web pages for user interaction. We describe the system architecture, the technologies used for the implementation, and the integration with existing monitoring tools.

  8. Alarm filtering and presentation

    International Nuclear Information System (INIS)

    Bray, M.A.

    1989-01-01

    This paper discusses alarm filtering and presentation in the control room of nuclear and other process control plants. Alarm generation and presentation is widely recognized as a general process control problem. Alarm systems often fail to provide meaningful alarms to operators. Alarm generation and presentation is an area in which computer aiding is feasible and provides clear benefits. Therefore, researchers have developed several computerized alarm filtering and presentation approaches. This paper discusses problems associated with alarm generation and presentation. Approaches to improving the alarm situation and installation issues of alarm system improvements are discussed. The impact of artificial intelligence (AI) technology on alarm system improvements is assessed. (orig.)

  9. Project 93L-EWL-097, fire alarm system improvements, 300 Area

    International Nuclear Information System (INIS)

    Scott, M.V.

    1995-01-01

    This document contains the Acceptance Test Procedure (ATP) which will demonstrate that the modifications to the Fire Protection systems in the 338 Building function as intended. The ATP will test the fire alarm control panel, flow alarm pressure switch, post indicator valve tamper switch, heat detectors, flow switches, and fire alarm signaling devices

  10. Human factors engineering guidance for the review of advanced alarm systems

    International Nuclear Information System (INIS)

    O'Hara, J.M.; Brown, W.S.; Higgins, J.C.; Stubler, W.F.

    1994-09-01

    This report provides guidance to support the review of the human factors aspects of advanced alarm system designs in nuclear power plants. The report is organized into three major sections. The first section describes the methodology and criteria that were used to develop the design review guidelines. Also included is a description of the scope, organization, and format of the guidelines. The second section provides a systematic review procedure in which important characteristics of the alarm system are identified, described, and evaluated. The third section provides the detailed review guidelines. The review guidelines are organized according to important characteristics of the alarm system including: alarm definition; alarm processing and reduction; alarm prioritization and availability; display; control; automated; dynamic, and modifiable characteristics; reliability, test, maintenance, and failure indication; alarm response procedures; and control-display integration and layout

  11. Human factors engineering guidance for the review of advanced alarm systems

    Energy Technology Data Exchange (ETDEWEB)

    O`Hara, J.M.; Brown, W.S.; Higgins, J.C.; Stubler, W.F. [Brookhaven National Lab., Upton, NY (United States)

    1994-09-01

    This report provides guidance to support the review of the human factors aspects of advanced alarm system designs in nuclear power plants. The report is organized into three major sections. The first section describes the methodology and criteria that were used to develop the design review guidelines. Also included is a description of the scope, organization, and format of the guidelines. The second section provides a systematic review procedure in which important characteristics of the alarm system are identified, described, and evaluated. The third section provides the detailed review guidelines. The review guidelines are organized according to important characteristics of the alarm system including: alarm definition; alarm processing and reduction; alarm prioritization and availability; display; control; automated; dynamic, and modifiable characteristics; reliability, test, maintenance, and failure indication; alarm response procedures; and control-display integration and layout.

  12. Engineering work plan for PFP criticality alarm panel first unit re-build

    International Nuclear Information System (INIS)

    Clem, W.E.

    1994-01-01

    This document describes the first step in increasing the quality, reliability, and ease of maintenance of the nine Criticality Alarm Panels (CAP) at PFP. Development control practices and guidelines of WHC-CM-6-1, EP-2.4 and WHC-IP-1026, EPG-2.4 are applied to develop a prototype of a replacement Criticality Alarm Panel (CAP) with facility-use potential. During the development of the prototype CAP, the design requirements of all of PFP's nine CAPs are considered to develop standardized hardware and detailed design drawings that are tailored to PFP maintenance needs. Increased quality and reliability is achieved through quality hardware, proven technology and design techniques, and the use of the Class 1E workmanship standards of WHC-CM-8-1. The end result of the work described by this work plan is a verified/read-to-install replacement for CAP Z4 and verified/released H-2 drawings that are formatted such that they can easily be replicated when producing design drawings for the other eight CAPs

  13. Computerized systems for on-line management of failures: a state-of-the-art discussion of alarm systems and diagnostic systems applied in the nuclear industry

    International Nuclear Information System (INIS)

    Kim, I.S.

    1994-01-01

    It is now well perceived in the nuclear industry that improving plant information systems is vital for enhancing the operational safety of nuclear power plants. Considerable work is underway worldwide to support operators' decision-making, particularly in their difficult tasks of managing process anomalies on-line. The work includes development of (1) advanced alarm systems, such as various kinds of computer-based alarm processing systems, Critical Function Monitoring System, Success Path Monitoring System and Safety Assessment System II, and (2) real-timer diagnostic systems, such as Disturbance Analysis System, Maryland Operator Advisory System II, Model-Integrated Diagnostic Analysis System, Diagnosis System using Knowledge Engineering Technique, Detailed Diagnosis, and Operator Advisor System. This paper presents a state-of-the-art review of plant information systems for on-line management of failures in nuclear power plants, focusing on the methodological features of computerized alarm systems and diagnostic systems. (author)

  14. Design of remote control alarm system by microwave detection

    Science.gov (United States)

    Wang, Junli

    2018-04-01

    A microwave detection remote control alarm system is designed, which is composed of a Microwave detectors, a radio receiving/transmitting module and a digital encoding/decoding IC. When some objects move into the surveillance area, microwave detectors will generate a control signal to start transmitting system. A radio control signal will be spread by the transmitting module, once the signal can be received, and it will be disposed by some circuits, arousing some voices that awake the watching people. The whole device is a modular configuration, it not only has some advantage of frequency stable, but also reliable and adjustment-free, and it is suitable for many kinds of demands within the distance of 100m.

  15. Development of an integrated knowledge-base and its management tool for computerized alarm processing system

    International Nuclear Information System (INIS)

    Heo, Gyun Young; Choi, Seong Soo; Kim, Han Gon; Chang, Soon Heung

    1997-01-01

    For a long time, a number of alarm processing techniques have been researched to reduce the number of actuated alarms for operators to deal with effectively during the abnormal as well as the normal conditions. However, the strategy that the only systems with a few clear technologies should be used as a part of an alarm annunciation system has been adopted considering the effectiveness and the reliability in actual alarm processing systems. Therefore, alarm processing systems have difficult knowledge-base maintenance problems and limited expansion or enhancement defects. To solve these shortcomings, the integrated knowledge-base which can express the general information related to all the alarm processing techniques is proposed and its management tool, Knowledge Input Tool for Alarm (KIT-A) which can handle the data of the knowledge-base efficiently is developed. Since the integrated knowledge-base with KIT-A can manipulate all the alarm information without the modification of alarm processing system itself, it is expected to considerably advance the overall capability of maintenance and enhancement of the alarm processing systems

  16. Simulator testing of the Westinghouse aware alarm management system

    Energy Technology Data Exchange (ETDEWEB)

    Carrera, J P; Easter, J R; Roth, E M [Westinghouse Electric Corp., Pittsburgh, PA (United States)

    1997-09-01

    Over the last year, Westinghouse engineers and operators from the Beznau nuclear power station (KKB), owned by the Nordostschweizerische Krafwerke AG of Baden, Switzerland, have been installing and testing the Westinghouse AWARE Alarm Management System in Beznau/SNUPPS operator training simulator, owned and operated by the Westinghouse Electric Corp., in Waltz Mill, PA, USA. The testing has focused primarily on validating the trigger logic data base and on familiarizing the utility`s training department with the operation of the system in a real-time environment. Some of the tests have included plant process scenarios in which the computerized Emergency Procedures were available and used through the COMPRO (COMputerized PROcedures) System in conjunction with the AWARE System. While the results to date are qualitative from the perspective of system performance and improvement in message presentation, the tests have generally confirmed the expectations of the design. There is a large reduction in the number of messages that the control room staff must deal with during major process abnormalities, yet at times of relative minor disturbances, some additional messages are available which add clarification, e.g., ``Pump Trouble`` messages. The ``flow`` of an abnormality as it progresses from one part of the plant`s processes to another is quite visible. Timing of the messages and the lack of message avalanching is proving to give the operators additional time to respond to messages. Generally, the anxiety level to ``do something`` immediately upon a reactor trip appears to be reduced. (author). 8 refs.

  17. Simulator testing of the Westinghouse aware alarm management system

    International Nuclear Information System (INIS)

    Carrera, J.P.; Easter, J.R.; Roth, E.M.

    1997-01-01

    Over the last year, Westinghouse engineers and operators from the Beznau nuclear power station (KKB), owned by the Nordostschweizerische Krafwerke AG of Baden, Switzerland, have been installing and testing the Westinghouse AWARE Alarm Management System in Beznau/SNUPPS operator training simulator, owned and operated by the Westinghouse Electric Corp., in Waltz Mill, PA, USA. The testing has focused primarily on validating the trigger logic data base and on familiarizing the utility's training department with the operation of the system in a real-time environment. Some of the tests have included plant process scenarios in which the computerized Emergency Procedures were available and used through the COMPRO (COMputerized PROcedures) System in conjunction with the AWARE System. While the results to date are qualitative from the perspective of system performance and improvement in message presentation, the tests have generally confirmed the expectations of the design. There is a large reduction in the number of messages that the control room staff must deal with during major process abnormalities, yet at times of relative minor disturbances, some additional messages are available which add clarification, e.g., ''Pump Trouble'' messages. The ''flow'' of an abnormality as it progresses from one part of the plant's processes to another is quite visible. Timing of the messages and the lack of message avalanching is proving to give the operators additional time to respond to messages. Generally, the anxiety level to ''do something'' immediately upon a reactor trip appears to be reduced. (author). 8 refs

  18. To stay or to go? Balancing the risk of reprocessing plant control room evacuation following a criticality alarm

    International Nuclear Information System (INIS)

    Love, Suzanne; McCrindle, David; Harris, Neil; Haworth, Justin

    2003-01-01

    Following a criticality alarm within the Magnox Separation Plant at Sellafield, there is a conflict of interest between the risks associated with complete evacuation versus continued manning of the control room. The historic emergency response policy would be to completely evacuate the control room upon a criticality alarm. If, however, the alarm was found to be false, the inevitable loss in control over the plant could have environmental, operational and radiological release consequences. Maintaining control room manning following a genuine alarm might, however, result in an avoidable high dose to an operator. Based upon the estimated dose equivalent to a control room operator for a range of criticality incident morphologies a risk analysis was undertaken. The results indicate that the differential risk between an operator who evacuates immediately and an operator who remains for a short time to complete diagnostic checks is very small. As a consequence a new emergency policy was therefore developed on plant which results in a relatively low risk to control room operators, but still allows control over the plant to be retained following a false criticality alarm. (author)

  19. Advanced alarm system design and human performance: Guidance development and current research

    Energy Technology Data Exchange (ETDEWEB)

    O` Hara, J M [Brookhaven National Lab., Upton, NY (United States)

    1997-09-01

    This paper describes a research program sponsored by the U.S. Nuclear Regulatory Commission to address the human factors engineering (HFE) aspects of nuclear power plant alarm systems. The overall objective of the program is to develop HFE review guidance for advanced alarm systems. Guidance has been developed based on a broad base of technical and research literature. As part of the development effort, aspects of alarm system design for which the technical basis was insufficient to support guidance development were identified and prioritized. Research is currently underway to address the highest priority topics: alarm processing and display characteristics. (author). 29 refs, 2 figs.

  20. Advanced alarm system design and human performance: Guidance development and current research

    International Nuclear Information System (INIS)

    O'Hara, J.M.

    1997-01-01

    This paper describes a research program sponsored by the U.S. Nuclear Regulatory Commission to address the human factors engineering (HFE) aspects of nuclear power plant alarm systems. The overall objective of the program is to develop HFE review guidance for advanced alarm systems. Guidance has been developed based on a broad base of technical and research literature. As part of the development effort, aspects of alarm system design for which the technical basis was insufficient to support guidance development were identified and prioritized. Research is currently underway to address the highest priority topics: alarm processing and display characteristics. (author). 29 refs, 2 figs

  1. Development of Alarm System link Drawing for Operation Support for APR1400 Digital Main Control Room

    International Nuclear Information System (INIS)

    Kim, Ki-Hwan

    2016-01-01

    Digitalized MMI(Man-Machine Interface) including Digital Main Control Room(MCR) and digital I and C system was being applied for SKN 3 and 4 Nuclear Power Plant(NPP) and subsequent APR1400 NPP type. But, operators can not easily find instrument for alarm immediately. Therefore, Alarm system is required to easily find instrument for Alarm. For this implementation, we will plan system design considering design feature without affecting network load and CPU load. We have developed Alarm system link drawing for digital MCR. Operators of the digitalized MCR navigates from their consoles to the drawings related to the plant alarms and their instruments or the operation status. Such method gives cognitive load to the operators having to travel to different locations in finding the related information. Screen Sharing System, which is the fundamental technique for Drawing Interconnection Alarm System is close to completion, and it should be functionally tested and verified by the human factor engineering. For the actual application to the operating plants, the drawings to be interconnected to the alarms and the opinions from the operators/maintenance departments for designating alarm number should be surveyed, Also, another function that allows the access to the alarm related drawings not only from the MCR but also from the other offices

  2. Development of Alarm System link Drawing for Operation Support for APR1400 Digital Main Control Room

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Ki-Hwan [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    Digitalized MMI(Man-Machine Interface) including Digital Main Control Room(MCR) and digital I and C system was being applied for SKN 3 and 4 Nuclear Power Plant(NPP) and subsequent APR1400 NPP type. But, operators can not easily find instrument for alarm immediately. Therefore, Alarm system is required to easily find instrument for Alarm. For this implementation, we will plan system design considering design feature without affecting network load and CPU load. We have developed Alarm system link drawing for digital MCR. Operators of the digitalized MCR navigates from their consoles to the drawings related to the plant alarms and their instruments or the operation status. Such method gives cognitive load to the operators having to travel to different locations in finding the related information. Screen Sharing System, which is the fundamental technique for Drawing Interconnection Alarm System is close to completion, and it should be functionally tested and verified by the human factor engineering. For the actual application to the operating plants, the drawings to be interconnected to the alarms and the opinions from the operators/maintenance departments for designating alarm number should be surveyed, Also, another function that allows the access to the alarm related drawings not only from the MCR but also from the other offices.

  3. A Human Factors Perspective on Alarm System Research and Development 2000 to 2010

    Energy Technology Data Exchange (ETDEWEB)

    Curt Braun; John Grimes; Eric Shaver; Ronald Boring (Principal Investigator)

    2011-09-01

    By definition, alarms serve to notify human operators of out-of-parameter conditions that could threaten equipment, the environment, product quality and, of course, human life. Given the complexities of industrial systems, human machine interfaces, and the human operator, the understanding of how alarms and humans can best work together to prevent disaster is continually developing. This review examines advances in alarm research and development from 2000 to 2010 and includes the writings of trade professionals, engineering and human factors researchers, and standards organizations with the goal of documenting advances in alarms system design, research, and implementation.

  4. Changes are detected - cameras and video systems are monitoring the plant site, only rarely giving false alarm

    International Nuclear Information System (INIS)

    Zeissler, H.

    1988-01-01

    The main purpose of automatic data acquisition and processing for monitoring goals is to relieve the security personnel from monotonous observation tasks. The novel video systems can be programmed to detect moving target alarm signals, or accept alarm-suppressing image changes. This allows an intelligent alarm evaluation for physical protection in industry, differentiating between real and false alarm signals. (orig.) [de

  5. 40 CFR 264.34 - Access to communications or alarm system.

    Science.gov (United States)

    2010-07-01

    ... FACILITIES Preparedness and Prevention § 264.34 Access to communications or alarm system. (a) Whenever... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 264.34 Section 264.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID...

  6. The use of simulation in the development of human factors guidelines for alarm systems

    International Nuclear Information System (INIS)

    O'Hara, J.; Brown, W.S.; Wachtel, J.; Persensky, J.

    1997-01-01

    This paper describes a research program sponsored by the US Nuclear Regulatory Commission to address the human factors engineering (HFE) aspects of nuclear power plant alarm systems. The overall objective of the program is to develop HFE review guidance for advanced alarm systems. As part of this program, guidance was developed based on a broad review and analysis of technical and research literature. In the course of guidance development, aspects of alarm system design for which the technical basis was insufficient to support guidance developed were identified. Experimental research is currently underway to address the highest priority topics: alarm processing and display characteristics. This paper provides an overview of the approach to guidance development and discusses the role of simulation in the development approach. Finally, the current simulator-based experiment is described to illustrate how the alarm system design features are being studied

  7. 40 CFR 265.34 - Access to communications or alarm system.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 265.34 Section 265.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID..., STORAGE, AND DISPOSAL FACILITIES Preparedness and Prevention § 265.34 Access to communications or alarm...

  8. A basic design of alarm system for the future nuclear power plants in Korea

    International Nuclear Information System (INIS)

    Lee, Cheol-Kwon; Hur, Seop; Shin, Jae-Hwal; Koo, In-Soo; Park, Jong-Kyun

    1997-01-01

    The design of an advanced alarm system is under way to apply to the new MMIS for the future nuclear power plants in Korea. Based on the alarm system design bases we established the design requirements and are now refining them with the results of evaluation through the prototype. To realize the advanced system new algorithms for alarm processing and display are implemented and various new devices are examined. The evaluation for the design is performed in accordance with the verification and validation plans and through the prototype. (author). 7 refs, 2 figs

  9. Integrated knowledge base tool for acquisition and verification of NPP alarm systems

    International Nuclear Information System (INIS)

    Park, Joo Hyun; Seong, Poong Hyun

    1998-01-01

    Knowledge acquisition and knowledge base verification are important activities in developing knowledge-based systems such as alarm processing systems. In this work, we developed the integrated tool, for knowledge acquisition and verification of NPP alarm processing systems, by using G2 tool. The tool integrates document analysis method and ECPN matrix analysis method, for knowledge acquisition and knowledge verification, respectively. This tool enables knowledge engineers to perform their tasks from knowledge acquisition to knowledge verification consistently

  10. Alarm analysis of secondary loop system based on MFM and SDG methods

    International Nuclear Information System (INIS)

    Yang Ning; Lu Gubing; Chen Pan

    2014-01-01

    The multilevel flow model (MFM) and the signed directed graph (SDG) were combined to analyze the alarm signals of the secondary loop system for nuclear power plant. The MFM was used to delaminate and describe nuclear power plant, and the SDG was used to analyze the logicality of the facility sign in the MFM. Two kinds of faults in the secondary loop system in nuclear power plant were simulated and the alarm signals were analyzed. The simulation results show that the fault source can be identified exactly and the transmit route of the alarm signals can be described clearly, which is helpful for operators to judge. (authors)

  11. COUNTERMEASURE FOR MINIMIZE UNWANTED ALARM OF AUTOMATIC FIRE NOTIFICATION SYSTEM IN THE REPUBLIC OF KOREA

    Directory of Open Access Journals (Sweden)

    Hasung Kong

    2015-01-01

    Full Text Available In this article investigated the cause of error through survey to building officials for minimizing the unwanted alarm of automatic fire notification and suggested countermeasure for minimizing the unwanted alarm. The main cause of the unwanted alarm is defective fire detector, interlocking with automatic fire detection system, lack in fire safety warden’s ability, worn-out fire detect receiving system. The countermeasure for minimizing unwanted alarm is firstly, tightening up the standard of model approval, Secondly, interlocking with cross-section circuit method fire extinguishing system or realizing automatic fire notification system interlocking with home network, thirdly, tightening up licensing examination of fire safety warden, lastly, it suggested term of use rule of fire detect receiving system

  12. COUNTERMEASURE FOR MINIMIZE UNWANTED ALARM OF AUTOMATIC FIRE NOTIFICATION SYSTEM IN THE REPUBLIC OF KOREA

    Directory of Open Access Journals (Sweden)

    Hasung Kong

    2015-01-01

    Full Text Available In this article investigated the cause of error through survey to building officials for minimizing the unwanted alarm of automatic fire notification and suggested countermeasure for minimizing the unwanted alarm. The main cause of the unwanted alarm is defective fire detector, interlocking with automatic fire detection system, lack in fire safety warden’s ability, worn-out fire detect receiving system. The countermeasure for minimizing unwanted alarm is firstly, tightening up the standard of model approval, Secondly, interlocking with cross-section circuit method fire extinguishing system or realizing automatic fire notification system interlocking with home network, thirdly, tightening up licensing examination of fire safety warden, lastly, it suggested term of use rule of fire detect receiving system.

  13. Intelligent buildings, automatic fire alarm and fire-protection control system

    International Nuclear Information System (INIS)

    Tian Deyuan

    1999-01-01

    The author describes in brief the intelligent buildings, and the automatic fire alarm and fire-protection control system. On the basis of the four-bus, three-bus and two-bus, a new transfer technique was developed

  14. Nuisance alarm suppression techniques for fibre-optic intrusion detection systems

    Science.gov (United States)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-02-01

    The suppression of nuisance alarms without degrading sensitivity in fibre-optic intrusion detection systems is important for maintaining acceptable performance. Signal processing algorithms that maintain the POD and minimize nuisance alarms are crucial for achieving this. A level crossings algorithm is presented for suppressing torrential rain-induced nuisance alarms in a fibre-optic fence-based perimeter intrusion detection system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr, and intrusion events can be detected simultaneously during rain periods. The use of a level crossing based detection and novel classification algorithm is also presented demonstrating the suppression of nuisance events and discrimination of nuisance and intrusion events in a buried pipeline fibre-optic intrusion detection system. The sensor employed for both types of systems is a distributed bidirectional fibre-optic Mach Zehnder interferometer.

  15. 40 CFR 267.34 - When must personnel have access to communication equipment or an alarm system?

    Science.gov (United States)

    2010-07-01

    ... to an internal alarm or emergency communication device, either directly or through visual or voice... communication equipment or an alarm system? 267.34 Section 267.34 Protection of Environment ENVIRONMENTAL... have access to communication equipment or an alarm system? (a) Whenever hazardous waste is being poured...

  16. Bilevel alarm monitoring multiplexer

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1977-06-01

    This report describes the operation of the Bilevel Alarm Monitoring Multiplexer used in the Adaptive Intrusion Data System (AIDS) to transfer and control alarm signals being sent to the Nova 2 computer, the Memory Controlled Data Processor, and its own integral Display Panel. The multiplexer can handle 48 alarm channels and format the alarms into binary formats compatible with the destination of the alarm data

  17. Low Power Wireless Smoke Alarm System in Home Fires

    Directory of Open Access Journals (Sweden)

    Juan Aponte Luis

    2015-08-01

    Full Text Available A novel sensing device for fire detection in domestic environments is presented. The fire detector uses a combination of several sensors that not only detect smoke, but discriminate between different types of smoke. This feature avoids false alarms and warns of different situations. Power consumption is optimized both in terms of hardware and software, providing a high degree of autonomy of almost five years. Data gathered from the device are transmitted through a wireless communication to a base station. The low cost and compact design provides wide application prospects.

  18. Real-time Alarm Monitoring System for Detecting Driver Fatigue in Wireless Areas

    Directory of Open Access Journals (Sweden)

    Rongrong Fu

    2017-04-01

    Full Text Available The purpose of this paper was to develop a real-time alarm monitoring system that can detect the fatigue driving state through wireless communication. The drivers’ electroencephalogram (EEG signals were recorded from occipital electrodes. Seven EEG rhythms with different frequency bands as gamma, hbeta, beta, sigma, alpha, theta and delta waves were extracted. They were simultaneously assessed using relative operating characteristic (ROC curves and grey relational analysis to select one as the fatigue feature. The research results showed that the performance of theta wave was the best one. Therefore, theta wave was used as fatigue feature in the following alarm device. The real-time alarm monitoring system based on the result has been developed, once the threshold was settled by using the data of the first ten minutes driving period. The developed system can detect driver fatigue and give alarm to indicate the onset of fatigue automatically.

  19. Development of alarm cause tracking system for Korea standard nuclear power plant

    International Nuclear Information System (INIS)

    Lee, Jung Woon; Kim, Jung Taek; Park, Jae Chang; Lee, Hyun Chul; Park, Joong Pal

    2004-05-01

    The proposed system, the ACTS(Alarm Cause Tracking System), in the 1st and 2nd development period(2001. 7 ∼ 2003. 6), tracks and displays the causes of alarms on-line from computerized logic diagrams. And the system highlights the specific procedures related the causes in the procedure of the alarm. In this period(2003. 7 ∼ 2004. 4), we developed the ACTS for Korea standard nuclear power plant. Also, we computerized control logic diagrams and alarm procedures for the ACTS. A long-term target is to apply the ACTS at the real power plant, and a short-term target is to connect the ACTS with the ITF(Intergrated Test Facility) in KAERI site to develop other applications

  20. Nitric Acid Revamp and Upgrading of the Alarm & Protection Safety System at Petrokemija, Croatia

    Directory of Open Access Journals (Sweden)

    Hoško, I.

    2012-04-01

    Full Text Available Every industrial production, particularly chemical processing, demands special attention in conducting the technological process with regard to the security requirements. For this reason, production processes should be continuously monitored by means of control and alarm safety instrumented systems. In the production of nitric acid at Petrokemija d. d., the original alarm safety system was designed as a combination of an electrical relay safety system and transistorized alarm module system. In order to increase safety requirements and modernize the technological process of nitric acid production, revamping and upgrading of the existing alarm safety system was initiated with a new microprocessor system. The newly derived alarm safety system, Simatic PCS 7, links the function of "classically" distributed control (DCS and logical systems in a common hardware and software platform with integrated engineering tools and operator interface to meet the minimum safety standards with safety integrity level 2 (SIL2 up to level 3 (SIL3, according to IEC 61508 and IEC 61511. This professional paper demonstrates the methodology of upgrading the logic of the alarm safety system in the production of nitric acid in the form of a logical diagram, which was the basis for a further step in its design and construction. Based on the mentioned logical diagram and defined security requirements, the project was implemented in three phases: analysis and testing, installation of the safety equipment and system, and commissioning. Developed also was a verification system of all safety conditions, which could be applied to other facilities for production of nitric acid. With the revamped and upgraded interlock alarm safety system, a new and improved safety boundary in the production of nitric acid was set, which created the foundation for further improvement of the production process in terms of improved analysis.

  1. A new fire alarm system for electrical installations

    CERN Document Server

    Pietersen, A H

    1978-01-01

    Fires in electrical installations are considered to develop in four phases - initiation, smouldering, flame formation and heat development. Cables are among the more sensitive components, with working temperatures around 50 degrees C and fire detection at 70 degrees C. Conventional alarms include smoke detectors. The new technique described uses microcapsules containing powder forming a gas of the Freon type after diffusion. A typical microcapsule loses 4% per year and has a natural life of 10 years. Fabrication methods are described. Detection is by gas concentration, with a sensitivity of 1 to 10 ppm, or by acoustic methods with microphones to pick up the sound of fractures. Pressure/temperature characteristics of various types of Freon mixtures commercially available are given in graphical form.

  2. Alarm systems detect volcanic tremor and earthquake swarms during Redoubt eruption, 2009

    Science.gov (United States)

    Thompson, G.; West, M. E.

    2009-12-01

    We ran two alarm algorithms on real-time data from Redoubt volcano during the 2009 crisis. The first algorithm was designed to detect escalations in continuous seismicity (tremor). This is implemented within an application called IceWeb which computes reduced displacement, and produces plots of reduced displacement and spectrograms linked to the Alaska Volcano Observatory internal webpage every 10 minutes. Reduced displacement is a measure of the amplitude of volcanic tremor, and is computed by applying a geometrical spreading correction to a displacement seismogram. When the reduced displacement at multiple stations exceeds pre-defined thresholds and there has been a factor of 3 increase in reduced displacement over the previous hour, a tremor alarm is declared. The second algorithm was to designed to detect earthquake swarms. The mean and median event rates are computed every 5 minutes based on the last hour of data from a real-time event catalog. By comparing these with thresholds, three swarm alarm conditions can be declared: a new swarm, an escalation in a swarm, and the end of a swarm. The end of swarm alarm is important as it may mark a transition from swarm to continuous tremor. Alarms from both systems were dispatched using a generic alarm management system which implements a call-down list, allowing observatory scientists to be called in sequence until someone acknowledged the alarm via a confirmation web page. The results of this simple approach are encouraging. The tremor alarm algorithm detected 26 of the 27 explosive eruptions that occurred from 23 March - 4 April. The swarm alarm algorithm detected all five of the main volcanic earthquake swarm episodes which occurred during the Redoubt crisis on 26-27 February, 21-23 March, 26 March, 2-4 April and 3-7 May. The end-of-swarm alarms on 23 March and 4 April were particularly helpful as they were caused by transitions from swarm to tremor shortly preceding explosive eruptions; transitions which were

  3. Network-Based Real-time Integrated Fire Detection and Alarm (FDA) System with Building Automation

    Science.gov (United States)

    Anwar, F.; Boby, R. I.; Rashid, M. M.; Alam, M. M.; Shaikh, Z.

    2017-11-01

    Fire alarm systems have become increasingly an important lifesaving technology in many aspects, such as applications to detect, monitor and control any fire hazard. A large sum of money is being spent annually to install and maintain the fire alarm systems in buildings to protect property and lives from the unexpected spread of fire. Several methods are already developed and it is improving on a daily basis to reduce the cost as well as increase quality. An integrated Fire Detection and Alarm (FDA) systems with building automation was studied, to reduce cost and improve their reliability by preventing false alarm. This work proposes an improved framework for FDA system to ensure a robust intelligent network of FDA control panels in real-time. A shortest path algorithmic was chosen for series of buildings connected by fiber optic network. The framework shares information and communicates with each fire alarm panels connected in peer to peer configuration and declare the network state using network address declaration from any building connected in network. The fiber-optic connection was proposed to reduce signal noises, thus increasing large area coverage, real-time communication and long-term safety. Based on this proposed method an experimental setup was designed and a prototype system was developed to validate the performance in practice. Also, the distributed network system was proposed to connect with an optional remote monitoring terminal panel to validate proposed network performance and ensure fire survivability where the information is sequentially transmitted. The proposed FDA system is different from traditional fire alarm and detection system in terms of topology as it manages group of buildings in an optimal and efficient manner.Introduction

  4. Jeopardy alarm system - a building technology like any other technology?; Gefahrenmeldetechnik - eine Gebaeudetechnik wie jede andere?

    Energy Technology Data Exchange (ETDEWEB)

    Hegewald, B. [ZVEI, Fachkreis Ueberfall- und Einbruchmeldeanlagen, Frankfurt am Main (Germany)]|[Siemens AG, Muenchen

    1995-12-31

    In chapter 15 of the anthology about building control the jeopardy alarm system technology is described. The following aspects are discussed: importance of the safety, definition of jeopardy alarm systems, application of safety technique, instructions, guidelines and regulations, advantages of safety systems, integration or combination. (BWI) [Deutsch] Kapitel 15 des Sammelbandes ueber Buidling Control ist der Gefahrenmeldetechnik gewidmet. In diesem Zusammenhang wird auf folgende Themenbereiche eingegangen: Stellenwert der Sicherheit; Definition der Gefahrenmeldeanlagen; Einsatz der Sicherungstechnik; Vorschriften, Richtlinien und Bestimmung; Vorteile von Sicherungssystemen; Integration oder Kombination. (BWI)

  5. An engineering approach to knowledge-based systems, the alarm processing and diagnostic system

    International Nuclear Information System (INIS)

    Mah, E.; Damon, L.

    1992-01-01

    The number of alarms that may be initiated during transients or accidents in nuclear-generating control rooms may temporarily exceed an operator's ability to assimilate and respond. This phenomenon is characterized as Cognitive Overload. The Alarm Processing and Diagnostic System (APDS) was designed to deal with this problem through a unique and operationally sensitive method of alarm prioritization and filtration. The approach taken attempts to parallel the operator's situation assessment methodology when dealing with transient conditions. A strong criteria for the development methodology employed was its ultimate acceptance by parties engaged in the operation of nuclear power facilities. As such, the methodology used had to be easily understood and consistent with the acceptance standards of nuclear power. This necessitated the verifiable practices found in engineering design. While APDS remains rooted in artificial intelligence or expert systems, it goes beyond the paradigm of rules and inferencing to an object-oriented structure that allows traditional and well-documented engineering-based decision methods to be applied. These features have important consequences when considering final acceptance, implementation, and maintenance. 3 refs., 1 tab

  6. An alarm filtering system for an automated process: a multiple-agent approach

    International Nuclear Information System (INIS)

    Khoualdi, Kamel

    1994-01-01

    Nowadays, the supervision process of industrial installations is more and more complex involving the automation of their control. A malfunction generates an avalanche of alarms. The operator, in charge of the supervision, must face the incident and execute right actions to recover a normal situation. Generally, he is drowned under the great number of alarms. Our aim, in the frame of our researches, is to perform an alarm filtering system for an automated metro line, to help the operator finding the main alarm responsible for the malfunction. Our works are divided into two parts, both dealing with study and development of an alarm filtering system but using two different approaches. The first part is developed in the frame of the SARA project (an operator assistance system for an automated metro line) which is an expert system prototype helping the operators of a command center. In this part, a centralized approach has been used representing the events with a single event graph and using a global procedure to perform diagnosis. This approach has itself shown its limits. In the second part of our works, we have considered the distributed artificial intelligence (DAI) techniques, and more especially the multi-agent approach. The multi-agent approach has been motivated by the natural distribution of the metro line equipment and by the fact that each equipment has its own local control and knowledge. Thus, each equipment has been considered as an autonomous agent. Through agents cooperation, the system is able to determine the main alarm and the faulty equipment responsible for the incident. A prototype, written in SPIRAL (a tool for knowledge-based system) is running on a workstation. This prototype has allowed the concretization and the validation of our multi-agent approach. (author) [fr

  7. Automatic diagnosis of alarms: a system to improve operator emergency response

    International Nuclear Information System (INIS)

    Olson, H.P.; Gimmy, K.L.; Nomm, E.; Finley, R.H.

    1980-01-01

    A system is being developed at the Savannah River Plant to help reactor operators respond to multiple alarms in a developing incident situation. The need for such systems has becme evident in recent years, particularly after the Three Mile Island incident

  8. CRAW: An expert system for nuclear reactor cover gas alarm analysis

    International Nuclear Information System (INIS)

    Zimmerman, B.D.; Rawlins, J.A.

    1987-08-01

    CRAW is an expert system designed to distinguish fuel pin rupture at the Fast Flux Test Facility. The software is used to evaluate tag gases detected by the alarm system and access operational consequences of a rupture. The ability to distinguish fuel rod as opposed to fuel pin rupture is included. The software is implemented on an IBM-PC

  9. Design of alarm systems in Swedish nuclear power plants; Utformning av larmsystem i svenska kaernkraftverk

    Energy Technology Data Exchange (ETDEWEB)

    Thunberg, Anna; Osvalder, Anna-Lisa (Dept. of Product and Production Development, Chalmers Univ. of Technology, Goeteborg (Sweden))

    2008-04-15

    Research within the area of improving alarm system design and performance has mainly focused on new alarm systems. However, smaller modernisations of legacy systems are more common in the Swedish nuclear industry than design of totally new systems. This imposes problems when the new system should function together with the old system. This project deals with the special concerns raised by modernisation projects. The objective of the project has been to increase the understanding of the relationship between the operator's performance and the design of the alarm system. Of major concern has been to consider the cognitive abilities of the operator, different operator roles and work situations, and varying need of information. The aim of the project has been to complement existing alarm design guidance and to develop user-centred alarm design concepts. Different case studies have been performed in several industry sectors (nuclear, oil refining, pulp and paper, aviation and medical care) to identify best practice. Several empirical studies have been performed within the nuclear area to investigate the operator's need of information, performance and workload in different operating modes. The aspect of teamwork has also been considered. The analyses show that the operator has different roles in different work situations which affect both the type of information needed and how the information is processed. In full power operation, the interaction between the operator and the alarm system is driven by internal factors and the operator tries to maintain high situation awareness by actively searching for information. The operator wants to optimise the process and need detailed information with possibilities to follow-up and get historical data. In disturbance management, the operator is more dependent on external information presented by the alarm system. The new compilation of alarm guidance is based on the operator's varying needs in different working

  10. Improvement and test of alarm cause tracking system for Kori nuclear power plant units 3 and 4

    International Nuclear Information System (INIS)

    Lee, Jung Woon; Park, Jae Chang; Lee, Jung Woon; Kim, Jung Taek; Lyu, Sung Pil; Kim, Eun Ju; Park, Joong Pal

    2003-05-01

    The proposed system, ACTS(Alarm Cause Tracking System), in the 1st development period(2002. 7 ∼ 2003. 6), tracks and displays the causes of alarms on-line from computerized logic diagrams. And the system highlights the specific procedures related the causes in the procedure of the alarm. But, some problems were found in ACTS on editing logic diagram and logic processing in realtime for 2000 logic diagrams. In 2nd development period, we improved the data structure of graphic information for logic diagram and changed function oriented programming to object oriented programming for logic elements. Also, the display of precedent alarms which introduce many following alarms is provided to avoid confusion from the followed nuisance alarms. And logic input signal generator was developed to test the ACTS which generates input signal in time sequence of events acquired from simulator or real plant

  11. A real time knowledge-based alarm system EXTRA

    International Nuclear Information System (INIS)

    Ancelin, J.; Gaussot, J.P.; Legaud, P.

    1987-01-01

    EXTRA is an experimental expert system for industrial process control. The main objectives are the diagnosis and operation aids. From a methodological point of view, EXTRA is based on a deep knowledge of the plant operation and on qualitative simulation principles. The application concerns all the electric power and the Chemical and Volume Control System of a P.W.R. nuclear plant. The tests conducted on a full-scope simulator representative of the real plant yielded excellent results and taught the authors a number of lessons. The main lesson concerns the efficiency and flexibility provided by the combination of a knowledge-based system and of an advanced mini-computer

  12. Neural Network Target Identification System for False Alarm Reduction

    Science.gov (United States)

    Ye, David; Edens, Weston; Lu, Thomas T.; Chao, Tien-Hsin

    2009-01-01

    A multi-stage automated target recognition (ATR) system has been designed to perform computer vision tasks with adequate proficiency in mimicking human vision. The system is able to detect, identify, and track targets of interest. Potential regions of interest (ROIs) are first identified by the detection stage using an Optimum Trade-off Maximum Average Correlation Height (OT-MACH) filter combined with a wavelet transform. False positives are then eliminated by the verification stage using feature extraction methods in conjunction with neural networks. Feature extraction transforms the ROIs using filtering and binning algorithms to create feature vectors. A feed forward back propagation neural network (NN) is then trained to classify each feature vector and remove false positives. This paper discusses the test of the system performance and parameter optimizations process which adapts the system to various targets and datasets. The test results show that the system was successful in substantially reducing the false positive rate when tested on a sonar image dataset.

  13. Optimized Vibration Chamber for Landslide Sensory and Alarm System

    Science.gov (United States)

    Ismail, Eliza Sabira Binti; Hadi Habaebi, Mohamed; Daoud, Jamal I.; Rafiqul Islam, Md

    2017-11-01

    Landslide is one of natural hazard that is not unfamiliar disaster in Malaysia. Malaysia has experienced this disaster many times since 1969. This natural hazard has become a major research concern for Malaysian government when many people were injured badly and even had been killed. Many previous research works published in the open literature aimed at designing a system that could detect landslide in early stage before the landslide becomes catastrophic. This paper presents the early works on a major work-in-progress landslide early warning system for Malaysian environment. The aim of this system is to develop the most efficiently reliable cost-effective system in which slight earth movements are monitored continuously. The challenge this work aims at is to work with a low budget system that produces efficient performance. Hence, the material used is off-the-shelf. Early design optimization results of the vibration sensor used is quite promising detecting the slightest faint tremors, which are amplified using the best vibration chamber available. It is shown that the choice of proper pipe length and diameter dimensions in combination to a gravel to exaggerate the produced higher sensitivity level noise of 5 dB.

  14. Handling Worldwide LHC Computing Grid Critical Service Incidents : The infrastructure and experience behind nearly 5 years of GGUS ALARMs

    CERN Multimedia

    Dimou, M; Dulov, O; Grein, G

    2013-01-01

    In the Wordwide LHC Computing Grid (WLCG) project the Tier centres are of paramount importance for storing and accessing experiment data and for running the batch jobs necessary for experiment production activities. Although Tier2 sites provide a significant fraction of the resources a non-availability of resources at the Tier0 or the Tier1s can seriously harm not only WLCG Operations but also the experiments' workflow and the storage of LHC data which are very expensive to reproduce. This is why availability requirements for these sites are high and committed in the WLCG Memorandum of Understanding (MoU). In this talk we describe the workflow of GGUS ALARMs, the only 24/7 mechanism available to LHC experiment experts for reporting to the Tier0 or the Tier1s problems with their Critical Services. Conclusions and experience gained from the detailed drills performed in each such ALARM for the last 4 years are explained and the shift with time of Type of Problems met. The physical infrastructure put in place to ...

  15. Control Engineering Embraces Instrumentation and Alarm Systems Of Navy

    Directory of Open Access Journals (Sweden)

    Gheorghe Samoilescu

    2008-10-01

    Full Text Available Control engineering can be applied not only to propelling and auxiliary machinery but also to electrical installations, refrigeration, cargo handling (especially in tankers and deck machinery, e.g. Windlass control. Opinion still vary on such matters as the relative merits of pneumatic versus electronic system and whether the control center should be in the engine room or adjacent to the navigating bridge. Arguments against the exclusion of the engineer officer from close contact with the machinery are countered by the fact that electronic systems are based on changes other than those of human response. Automated ships (UMS operate closer to prescribed standards and therefore operate with greater efficiency. The closer control of machinery operating conditions (cooling water temperatures and pressures, permits machinery to be run at its optimum design conditions, making for fuel economy and reduced maintenance.

  16. Expert system for the real-time management of alarms in an electric grid. Un systeme expert pour la gestion en temps reel des alarmes dans un reseau electrique

    Energy Technology Data Exchange (ETDEWEB)

    Girouard, P.

    1987-01-01

    A model-base expert system is presented for the processing of alarm messages in power networks' control centers. This alarm processor, called GESTAL, generates concise diagnoses identifying the causes(s) of network disturbances and describing the operation of the protection and alarm systems which operate to isolate faulty components. Essentially, the alarm processor is an agenda driven expert system which is composed of a model of the power network's alarm and protection systems as well as several sets of rules. Based on the nextwork model, graph structures are constructed which represent relationships between alarms as they are received. These graph structures are then analysed in order to diagnose the disturbances(s). The alarm processor has been developed using the ART 3.0 programming language in a Symbolics Lisp-machine environment. Background material on expert systems, electric power networks, and alarm processing software is included, as well as a description of GESTAL'S functional characteristics and design. 51 refs., 28 figs.

  17. Smart container UWB sensor system for situational awareness of intrusion alarms

    Science.gov (United States)

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

    2013-06-11

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

  18. Multiple-Parameter, Low-False-Alarm Fire-Detection Systems

    Science.gov (United States)

    Hunter, Gary W.; Greensburg, Paul; McKnight, Robert; Xu, Jennifer C.; Liu, C. C.; Dutta, Prabir; Makel, Darby; Blake, D.; Sue-Antillio, Jill

    2007-01-01

    Fire-detection systems incorporating multiple sensors that measure multiple parameters are being developed for use in storage depots, cargo bays of ships and aircraft, and other locations not amenable to frequent, direct visual inspection. These systems are intended to improve upon conventional smoke detectors, now used in such locations, that reliably detect fires but also frequently generate false alarms: for example, conventional smoke detectors based on the blockage of light by smoke particles are also affected by dust particles and water droplets and, thus, are often susceptible to false alarms. In contrast, by utilizing multiple parameters associated with fires, i.e. not only obscuration by smoke particles but also concentrations of multiple chemical species that are commonly generated in combustion, false alarms can be significantly decreased while still detecting fires as reliably as older smoke-detector systems do. The present development includes fabrication of sensors that have, variously, micrometer- or nanometer-sized features so that such multiple sensors can be integrated into arrays that have sizes, weights, and power demands smaller than those of older macroscopic sensors. The sensors include resistors, electrochemical cells, and Schottky diodes that exhibit different sensitivities to the various airborne chemicals of interest. In a system of this type, the sensor readings are digitized and processed by advanced signal-processing hardware and software to extract such chemical indications of fires as abnormally high concentrations of CO and CO2, possibly in combination with H2 and/or hydrocarbons. The system also includes a microelectromechanical systems (MEMS)-based particle detector and classifier device to increase the reliability of measurements of chemical species and particulates. In parallel research, software for modeling the evolution of a fire within an aircraft cargo bay has been developed. The model implemented in the software can

  19. Changes in Default Alarm Settings and Standard In-Service are Insufficient to Improve Alarm Fatigue in an Intensive Care Unit: A Pilot Project.

    Science.gov (United States)

    Sowan, Azizeh Khaled; Gomez, Tiffany Michelle; Tarriela, Albert Fajardo; Reed, Charles Calhoun; Paper, Bruce Michael

    2016-01-11

    alarm parameters and frequency of replacing patients' electrodes. Despite the in-service, 50% (12/24) of the nurses specified their need for more training on cardiac monitors in the postproject period. Changing default alarm settings and standard in-service education on cardiac monitor use are insufficient to improve alarm systems safety. Alarm management in ICUs is very complex, involving alarm management practices by clinicians, availability of unit policies and procedures, unit layout, complexity and usability of monitoring devices, and adequacy of training on system use. The complexity of the newer monitoring systems requires urgent usability testing and multidimensional interventions to improve alarm systems safety and to attain the Joint Commission National Patient Safety Goal on alarm systems safety in critical care units.

  20. Distributed error and alarm processing in the CMS data acquisition system

    Energy Technology Data Exchange (ETDEWEB)

    Bauer, G.; et al.

    2012-01-01

    The error and alarm system for the data acquisition of the Compact Muon Solenoid (CMS) at CERN was successfully used for the physics runs at Large Hadron Collider (LHC) during first three years of activities. Error and alarm processing entails the notification, collection, storing and visualization of all exceptional conditions occurring in the highly distributed CMS online system using a uniform scheme. Alerts and reports are shown on-line by web application facilities that map them to graphical models of the system as defined by the user. A persistency service keeps a history of all exceptions occurred, allowing subsequent retrieval of user defined time windows of events for later playback or analysis. This paper describes the architecture and the technologies used and deals with operational aspects during the first years of LHC operation. In particular we focus on performance, stability, and integration with the CMS sub-detectors.

  1. Approaching Behaviour Monitor and Vibration Indication in Developing a General Moving Object Alarm System (GMOAS

    Directory of Open Access Journals (Sweden)

    Haiwei Dong

    2013-07-01

    Full Text Available People who suffer from hearing impairment caused by illness, age or extremely noisy environments are constantly in danger of being hit or knocked down by fast moving objects behind them when they have no companion or augmented sensory system to warn them. In this paper, we propose the General Moving Object Alarm System (GMOAS, a system focused on aiding the safe mobility of people under these circumstances. The GMOAS is a wearable haptic device that consists of two main subsystems: (i a moving object monitoring subsystem that uses laser range data to detect and track approaching objects, and (ii an alarm subsystem that warns the user of possibly dangerous approaching objects by triggering tactile vibrations on an “alarm necklace”. For moving object monitoring, we propose a simple yet efficient solution to monitor the approaching behavior of objects. Compared with previous work in motion detection and tracking, we are not interested in specific objects but any type of approaching object that might harm the user. To this extent, we define a boundary in the laser range data where the objects are monitored. Within this boundary a fan-shape grid is constructed to obtain an evenly distributed spatial partitioning of the data. These partitions are efficiently clustered into continuous objects which are then tracked through time using an object association algorithm based on updating a deviation matrix that represents angle, distance and size variations of the objects. The speed of the tracked objects is monitored throughout the algorithm. When the speed of an approaching object surpasses the safety threshold, the alarm necklace is triggered indicating the approaching direction of the fast moving object. The alarm necklace is equipped with three motors that can indicate five directions with respect to the user: left, back, right, left-back and right-back. We performed three types of outdoor experiments (object passing, approaching and crossing that

  2. Application control chart concepts of designing a pre-alarm system in the nuclear power plant control room

    International Nuclear Information System (INIS)

    Hwang, S.-L.; Lin, J.-T.; Liang, G.-F.; Yau, Y.-J.; Yenn, T.-C.; Hsu, C.-C.

    2008-01-01

    This study applied the concepts of the Shewhart control chart to design a pre-alarm system for the nuclear power plant control room. As a support in detecting faults, the pre-alarm system reminded the operators of a change in the system state in its early stages. Two pre-alarm types were designed to compare with the original system, and all participants were requested to monitor each simulated system under both normal and abnormal states. The tasks for the participants included shutting down the reactor, searching for procedures, monitoring system parameters and executing secondary tasks. In each trial, the task performance, mental workload and situation awareness (SA) of the participants were measured. Results indicated that participants had lower mental workload, but equal SA, when monitoring the system with either type of pre-alarm designs, and lower alarm frequency and higher secondary task performance were obtained with the pre-alarm design. Therefore, the pre-alarm system effectively assisted the operators in monitoring tasks

  3. Development of electric power transmission line anomaly approaching alarm system. Sodensen ijo sekkin keiho sochi no kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    Kusaba, Masaro; Tabata, Takatoshi; Miyazaki, Shusuke [Kyushu Electric Power Co., Inc., Fukuoka (Japan)

    1989-03-30

    In order to plan preventive measures from the occurrence of electric power transmission line accident, a power transmission line anomaly approaching alarm system was developed to automatically alarm the operators and surveillants. The surveillance system, composed of camera, surveillance unit proper and alarm receiving portion, generates alarm and indicate hazard to the operators, when animal invades a hazardous area designated on the monitor. Wireless telegraph for the alarm transmission use used frequency around a 322MHz band with the Radio Ray law and preventive measures from noise, taken into consideration. The prototype is characterized by unnecessary ancillary fitting to the surveillance object, rare erroneous operations and high reliability. While the hazardous area can be simply designated, changed and released, as made by volume on the control panel. It is moreover easy to designate, as done by confirming the surveillance object on the display. It is also possible in multidimensional surveillance and easy to use on site. 7 figs.

  4. Intelligent Smoke Alarm System with Wireless Sensor Network Using ZigBee

    Directory of Open Access Journals (Sweden)

    Qin Wu

    2018-01-01

    Full Text Available The conflagration of fire is still a serious problem caused by humans, and houses are at a high risk of fire. Recently, people have used smoke alarms which only have one sensor to detect fire. Smoke is emitted in several forms in daily life. A single sensor is not a reliable way to detect fire. With the rapid advancement in Internet technology, people can monitor their houses remotely to determine the current condition of the house. This paper introduces an intelligent smoke alarm system that uses ZigBee transmission technology to build a wireless network, uses random forest to identify smoke, and uses E-charts for data visualization. By combining the real-time dynamic changes of various environmental factors, compared to the traditional smoke alarm, the accuracy and controllability of the fire warning are increased, and the visualization of the data enables users to monitor the room environment more intuitively. The proposed system consists of a smoke detection module, a wireless communication module, and intelligent identification and data visualization module. At present, the collected environmental data can be classified into four statuses, that is, normal air, water mist, kitchen cooking, and fire smoke. Reducing the frequency of miscalculations also means improving the safety of the person and property of the user.

  5. Alarms, Chemical

    Science.gov (United States)

    cited in applicable qualitative materiel requirements, small development requirements, technical characteristics, and other requirements and documentation that pertain to automatic chemical agent alarms.

  6. Exploration on a Modern Positive Social Alarming System%现代实证性社会预警的探索

    Institute of Scientific and Technical Information of China (English)

    阎耀军

    2005-01-01

    A new theoretical model of social alarming index system with its operational platforms was constructed on the basis of the research on modem positive social alarming systems at home and abroad. A retrospective evaluation of the state of social harmony and stability in China from 1985 to 2002 and a simulation of social alarming feedback loops empirically examined the effectiveness of this new social alarming index system.

  7. Alarming atmospheres

    DEFF Research Database (Denmark)

    Højlund, Marie; Kinch, Sofie

    2014-01-01

    Nurses working in the Neuro-Intensive Care Unit at Aarhus University Hospital lack the tools to prepare children for the alarming atmosphere they will enter when visiting a hospitalised relative. The complex soundscape dominated by alarms and sounds from equipment is mentioned as the main stressor...

  8. Planning an Automatic Fire Detection, Alarm, and Extinguishing System for Research Laboratories

    Directory of Open Access Journals (Sweden)

    Rostam Golmohamadi

    2014-04-01

    Full Text Available Background & Objectives: Educational and research laboratories in universities have a high risk of fire, because they have a variety of materials and equipment. The aim of this study was to provide a technical plan for safety improvement in educational and research laboratories of a university based on the design of automatic detection, alarm, and extinguishing systems . Methods : In this study, fire risk assessment was performed based on the standard of Military Risk Assessment method (MIL-STD-882. For all laboratories, detection and fire alarm systems and optimal fixed fire extinguishing systems were designed. Results : Maximum and minimum risks of fire were in chemical water and wastewater (81.2% and physical agents (62.5% laboratories, respectively. For studied laboratories, we designed fire detection systems based on heat and smoke detectors. Also in these places, fire-extinguishing systems based on CO2 were designed . Conclusion : Due to high risk of fire in studied laboratories, the best control method for fire prevention and protection based on special features of these laboratories is using automatic detection, warning and fire extinguishing systems using CO2 .

  9. Probabilities of False Alarm for Vital Sign Detection on the Basis of a Doppler Radar System

    Directory of Open Access Journals (Sweden)

    Nguyen Thi Phuoc Van

    2018-02-01

    Full Text Available Vital detection on the basis of Doppler radars has drawn a great deal of attention from researchers because of its high potential for applications in biomedicine, surveillance, and finding people alive under debris during natural hazards. In this research, the signal-to-noise ratio (SNR of the remote vital-sign detection system is investigated. On the basis of different types of noise, such as phase noise, Gaussian noise, leakage noise between the transmitting and receiving antennae, and so on, the SNR of the system has first been examined. Then the research has focused on the investigation of the detection and false alarm probabilities of the system when the transmission link between the human and the radar sensor system took the Nakagami-m channel model. The analytical model for the false alarm and the detection probabilities of the system have been derived. The proposed theoretical models for the SNR and detection probability match with the simulation and measurement results. These theoretical models have the potential to be used as good references for the hardware development of the vital-sign detection radar sensor system.

  10. Alarm processing - Ways to the future

    Energy Technology Data Exchange (ETDEWEB)

    Pirus, D [EDF - Septen Service Etudes et Projets Thermiques et Nucleires, Villeurbanne Cedex (France)

    1997-09-01

    After a brief presentation of the main characteristics an efficient alarm system should have, a presentation of the N4 alarm processing and presentation is described in terms of reduction in alarm occurrence, alarm handling and operator presentation. The EDF experiments on the future alarm processing expected for the next generation of the French nuclear plants are then presented. This alarm system will manage the alarms functionally in order to present to the operators the real consequences on the whole plant of a dedicated alarm and try to imbed deeply the alarm presentation within the operating formats and the procedures. (author).

  11. Alarm processing - Ways to the future

    International Nuclear Information System (INIS)

    Pirus, D.

    1997-01-01

    After a brief presentation of the main characteristics an efficient alarm system should have, a presentation of the N4 alarm processing and presentation is described in terms of reduction in alarm occurrence, alarm handling and operator presentation. The EDF experiments on the future alarm processing expected for the next generation of the French nuclear plants are then presented. This alarm system will manage the alarms functionally in order to present to the operators the real consequences on the whole plant of a dedicated alarm and try to imbed deeply the alarm presentation within the operating formats and the procedures. (author)

  12. Minimum critical mass systems

    International Nuclear Information System (INIS)

    Dam, H. van; Leege, P.F.A. de

    1987-01-01

    An analysis is presented of thermal systems with minimum critical mass, based on the use of materials with optimum neutron moderating and reflecting properties. The optimum fissile material distributions in the systems are obtained by calculations with standard computer codes, extended with a routine for flat fuel importance search. It is shown that in the minimum critical mass configuration a considerable part of the fuel is positioned in the reflector region. For 239 Pu a minimum critical mass of 87 g is found, which is the lowest value reported hitherto. (author)

  13. The event notification and alarm system for the Open Science Grid operations center

    Science.gov (United States)

    Hayashi, S.; Teige and, S.; Quick, R.

    2012-12-01

    The Open Science Grid Operations (OSG) Team operates a distributed set of services and tools that enable the utilization of the OSG by several HEP projects. Without these services users of the OSG would not be able to run jobs, locate resources, obtain information about the status of systems or generally use the OSG. For this reason these services must be highly available. This paper describes the automated monitoring and notification systems used to diagnose and report problems. Described here are the means used by OSG Operations to monitor systems such as physical facilities, network operations, server health, service availability and software error events. Once detected, an error condition generates a message sent to, for example, Email, SMS, Twitter, an Instant Message Server, etc. The mechanism being developed to integrate these monitoring systems into a prioritized and configurable alarming system is emphasized.

  14. The event notification and alarm system for the Open Science Grid operations center

    Energy Technology Data Exchange (ETDEWEB)

    Hayashi, S; Teige and, S; Quick, R [Indiana University, University Information Technology Services (United States)

    2012-12-13

    The Open Science Grid Operations (OSG) Team operates a distributed set of services and tools that enable the utilization of the OSG by several HEP projects. Without these services users of the OSG would not be able to run jobs, locate resources, obtain information about the status of systems or generally use the OSG. For this reason these services must be highly available. This paper describes the automated monitoring and notification systems used to diagnose and report problems. Described here are the means used by OSG Operations to monitor systems such as physical facilities, network operations, server health, service availability and software error events. Once detected, an error condition generates a message sent to, for example, Email, SMS, Twitter, an Instant Message Server, etc. The mechanism being developed to integrate these monitoring systems into a prioritized and configurable alarming system is emphasized.

  15. The event notification and alarm system for the Open Science Grid operations center

    International Nuclear Information System (INIS)

    Hayashi, S; Teige and, S; Quick, R

    2012-01-01

    The Open Science Grid Operations (OSG) Team operates a distributed set of services and tools that enable the utilization of the OSG by several HEP projects. Without these services users of the OSG would not be able to run jobs, locate resources, obtain information about the status of systems or generally use the OSG. For this reason these services must be highly available. This paper describes the automated monitoring and notification systems used to diagnose and report problems. Described here are the means used by OSG Operations to monitor systems such as physical facilities, network operations, server health, service availability and software error events. Once detected, an error condition generates a message sent to, for example, Email, SMS, Twitter, an Instant Message Server, etc. The mechanism being developed to integrate these monitoring systems into a prioritized and configurable alarming system is emphasized.

  16. An overview of process instrumentation, protective safety interlocks and alarm system at the JET facilities active gas handling system

    International Nuclear Information System (INIS)

    Skinner, N.; Brennan, P.; Brown, K.; Gibbons, C.; Jones, G.; Knipe, S.; Manning, C.; Perevezentsev, A.; Stagg, R.; Thomas, R.; Yorkshades, J.

    2003-01-01

    The Joint European Torus (JET) Facilities Active Gas Handling System (AGHS) comprises ten interconnected processing sub-systems that supply, process and recover tritium from gases used in the JET Machine. Operations require a diverse range of process instrumentation to carry out a multiplicity of monitoring and control tasks and approximately 500 process variables are measured. The different types and application of process instruments are presented with specially adapted or custom-built versions highlighted. Forming part of the Safety Case for tritium operations, a dedicated hardwired interlock and alarm system provides an essential safety function. In the event of failure modes, each hardwired interlock will back-up software interlocks and shutdown areas of plant to a failsafe condition. Design of the interlock and alarm system is outlined and general methodology described. Practical experience gained during plant operations is summarised and the methods employed for routine functional testing of essential instrument systems explained

  17. Nuclear criticality information system

    International Nuclear Information System (INIS)

    Koponen, B.L.; Hampel, V.E.

    1981-01-01

    The nuclear criticality safety program at LLNL began in the 1950's with a critical measurements program which produced benchmark data until the late 1960's. This same time period saw the rapid development of computer technology useful for both computer modeling of fissile systems and for computer-aided management and display of the computational benchmark data. Database management grew in importance as the amount of information increased and as experimental programs were terminated. Within the criticality safety program at LLNL we began at that time to develop a computer library of benchmark data for validation of computer codes and cross sections. As part of this effort, we prepared a computer-based bibliography of criticality measurements on relatively simple systems. However, it is only now that some of these computer-based resources can be made available to the nuclear criticality safety community at large. This technology transfer is being accomplished by the DOE Technology Information System (TIS), a dedicated, advanced information system. The NCIS database is described

  18. A new bed-exiting alarm system for welfare facility residents.

    Science.gov (United States)

    Ogawa, Hidekuni; Yonezawa, Yoshiharu; Maki, Hiromichi; Caldwell, W

    2009-01-01

    A newly developed alarm system detects welfare facility residents leaving their beds, and does not respond to the care staff, who wear shoes or slippers. It employs a stainless steel tape electrode, several linear integrated circuits and a low-power 8-bit single chip microcomputer. The electrode, which is used as a bed-exiting detection sensor, is attached to the floor mat to record changes in the always-present AC (alternating current) voltage induced on the patient's body by electrostatic coupling from the standard 100 volt, 60 Hz AC utility power wiring in the room walls and ceiling. The resident's body movements, before trying to get out of bed and after leaving the bed, are detected by the microcomputer from changes in the induced AC voltage. The microcomputer alerts the care staff station, via a power line communication system or PHS (personal handy phone System).

  19. Observation systems with alarm thresholds and their use in designing underground facilities

    Energy Technology Data Exchange (ETDEWEB)

    Olsson, Lars [Geostatistik AB, Tumba (Sweden); Stille, Haakan [Royal Inst. of Tech., Stockholm (Sweden). Div. of Soil and Rock Mechanics

    2002-08-01

    The decision-based methodology described has wide applications in the building process. It can be applied whenever the exact outcome of the work is not known and where countermeasures might be needed. One such application is in the pre-investigations for the siting of spent nuclear fuel facilities aimed at determining the criteria for abandoning work on a given site. It can be seen that the principles of for designing an observation system and determining the alarm threshold are well understood. Several possible theoretical tools are also known, albeit from other disciplines than civil engineering. However, the choice of tools for a real problem should be investigated so that the advantages and drawbacks are illustrated. Reliable methods for designing observation systems in practice are, however, not known and are therefore not in use. A continuation of this study should therefore be aimed at comparing different theoretical tools and examining their practical application, including Quality Assurance and updating. It is therefore suggested that an observation system with alarm thresholds etc should be designed using the principles described in this report and should include testing and comparison of different models for predicting behaviour. This work could be undertaken for a real or for a hypothetical project. A real project is, of course, more difficult but has all the real-world problems that must be solved. A very brief, and not theoretically fully developed, account of the application of an observation system during the expansion of the interim spent fuel storage facility CLAB is enclosed as Appendix 1. Some comments on proposed changes in the system based on the principles set forth in this report are given in Appendix 2.

  20. Observation systems with alarm thresholds and their use in designing underground facilities

    International Nuclear Information System (INIS)

    Olsson, Lars; Stille, Haakan

    2002-08-01

    The decision-based methodology described has wide applications in the building process. It can be applied whenever the exact outcome of the work is not known and where countermeasures might be needed. One such application is in the pre-investigations for the siting of spent nuclear fuel facilities aimed at determining the criteria for abandoning work on a given site. It can be seen that the principles of for designing an observation system and determining the alarm threshold are well understood. Several possible theoretical tools are also known, albeit from other disciplines than civil engineering. However, the choice of tools for a real problem should be investigated so that the advantages and drawbacks are illustrated. Reliable methods for designing observation systems in practice are, however, not known and are therefore not in use. A continuation of this study should therefore be aimed at comparing different theoretical tools and examining their practical application, including Quality Assurance and updating. It is therefore suggested that an observation system with alarm thresholds etc should be designed using the principles described in this report and should include testing and comparison of different models for predicting behaviour. This work could be undertaken for a real or for a hypothetical project. A real project is, of course, more difficult but has all the real-world problems that must be solved. A very brief, and not theoretically fully developed, account of the application of an observation system during the expansion of the interim spent fuel storage facility CLAB is enclosed as Appendix 1. Some comments on proposed changes in the system based on the principles set forth in this report are given in Appendix 2

  1. Development of an alarm analysis system based on multi-level flow models for nuclear power plant

    International Nuclear Information System (INIS)

    Zhang Jiande; Yang Ming; Zhang Zhijian

    2008-01-01

    An alarm analysis system based on Multi-level Flow Models (MFM) was developed for a PWR NPP. By automatically identifying the primary root causes in complex fault situations, the workload of the operators can be reduced. In addition, because MFM also provides a set of graphical symbols that implies causalities, operators can confirm diagnosis results by semiotic analysis, and hence the understandability of the process of alarm analysis as well as the reliability of maintenance task can be increased. 19 cases of simulation data from RELAP5/MOD2 code were utilized for evaluating the performance of the proposed system. The simulation results show that the proposed alarm analysis system has a good ability to detect and diagnose accidents earlier in time before reactor trip. (authors)

  2. Remote multi-function fire alarm system based on internet of things

    Science.gov (United States)

    Wang, Lihui; Zhao, Shuai; Huang, Jianqing; Ji, Jianyu

    2018-05-01

    This project uses MCU STC15W408AS (stable, energy saving, high speed), temperature sensor DS18B20 (cheap, high efficiency, stable), MQ2 resistance type semiconductor smog sensor (high stability, fast response and economy) and NRF24L01 wireless transmitting and receiving module (energy saving, small volume, reliable) as the main body to achieve concentration temperature data presentation, intelligent voice alarming and short distance wireless transmission. The whole system is safe, reliable, cheap, quick reaction and good performance. This project uses the MCU STM32F103RCT6 as the main control chip, and use WIFI module ESP8266, wireless module NRF24L01 to make the gateway. Users can remotely check and control the related devices in real-time on smartphones or computers. We can also realize the functions of intelligent fire monitoring, remote fire extinguishing, cloud data storage through the third party server Big IOT.

  3. Multi-Sensor Building Fire Alarm System with Information Fusion Technology Based on D-S Evidence Theory

    Directory of Open Access Journals (Sweden)

    Qian Ding

    2014-10-01

    Full Text Available Multi-sensor and information fusion technology based on Dempster-Shafer evidence theory is applied in the system of a building fire alarm to realize early detecting and alarming. By using a multi-sensor to monitor the parameters of the fire process, such as light, smoke, temperature, gas and moisture, the range of fire monitoring in space and time is expanded compared with a single-sensor system. Then, the D-S evidence theory is applied to fuse the information from the multi-sensor with the specific fire model, and the fire alarm is more accurate and timely. The proposed method can avoid the failure of the monitoring data effectively, deal with the conflicting evidence from the multi-sensor robustly and improve the reliability of fire warning significantly.

  4. Critical/non-critical system methodology report

    International Nuclear Information System (INIS)

    1989-01-01

    The method used to determine how the waste Isolation Pilot Plant (WIPP) facilities/systems were classified as critical or non-critical to the receipt of CH waste is described within this report. All WIPP critical facilities/systems are listed in the Operational Readiness Review Dictionary. Using the Final Safety Analysis Report (FSAR) as a guide to define the boundaries of the facilities/systems, a direct correlation of the ORR Dictionary to the FSAR can be obtained. The critical facilities/systems are those which are directly related to or have a critical support role in the receipt of CH waste. The facility/systems must meet one of the following requirements to be considered critical: (a) confinement or measure of the release of radioactive materials; (b) continued receipt and/or storage of transuranic waste (TRU) without an interruption greater than one month according to the shipping plan schedule; (c) the environmental and occupational safety of personnel meets the established site programs; and (d) the physical security of the WIPP facilities

  5. A prototype expert system for fault analysis, alarm handling and operator advising in a PWR nuclear power plant

    International Nuclear Information System (INIS)

    Gondran, M.; Ancelin, J.; Hery, J.F.; Laleuf, J.C.; Legaud, P.

    1986-01-01

    This paper successively describes the methodological advantages of the expert-systems approach and then two major applications of it that are under development in Electricite de France: assistance in alarms and operational management, and computer-assisted reliability. Topics considered include man-machine systems, human factors engineering, reactor operation, artificial intelligence, and decision making

  6. [Optimized resource mobilization and quality of treatment of severely injured patients through a structured trauma room alarm system].

    Science.gov (United States)

    Spering, C; Roessler, M; Kurlemann, T; Dresing, K; Stürmer, K M; Lehmann, W; Sehmisch, S

    2017-12-12

    The treatment of severely injured patients in the trauma resuscitation unit (TRU) requires an interdisciplinary and highly professional trauma team approach. The complete team needs to be waiting for the patient in the TRU on arrival. Treating severely injured patients in the TRU, the trauma team connects the initial preclinical emergency stabilization with the subsequent sophisticated treatment. Thus, the trauma team depends on concise information from the emergency personnel at the scene to provide its leader with further information as well as an accurate alarm including all departments necessary to stabilize the patient in the TRU. Aiming at an accurate and most efficient trauma team alarm, this study was designed to provide and analyze an alarm system which mobilizes the trauma team in a stepwise fashion depending on the pattern of injuries and the threat to life. The trauma team alarm system was analyzed in a prospective data acquisition at a level I trauma center over a period of 12 months. Evaluation followed the acquisition phase and provided comparison to the status prior to the establishment of the alarm system. All items underwent statistical testing using t‑tests (p  0.01). The duration from arrival of the patient in the TRU to the initial multislice computed tomography (CT) scan was reduced by 6 min while the total period of treatment in the TRU was reduced by 17 min. After the alarm system to gradually mobilize the trauma team was put into action, team members left the TRU if unneeded prior to finishing the initial treatment in only 4% of the cases. The patient fatality rate was 8.8% (injury severity score, ISS = 23 points) after establishment of the alarm system compared to 12.9% (ISS = 25 points) before. The implementation of an accurate and patient status-based alarm system to mobilize the trauma team can improve the quality of treatment while the duration of treatment of the severely injured patients in the TRU can be decreased. It

  7. Production of sensitivity and false alarm rate

    International Nuclear Information System (INIS)

    Han Zijie; Kang Wu; Chu Chengsheng; Hao Fanhua; Liu Xiaoya; Cao Lin; Hu Yongbo; Gong Jian; Xiang Yongchun; Zhang Jianhua; Yang Xiangdong

    2007-01-01

    The false alarm rate and sensitivity in nuclear material monitoring system are affected by alarm principle. Two different alarm principles are studied with theory and experiment analysis in this paper. Our research shows that theory analysis and experiment result are accordant very much. This study provides technology support for designing better alarm principle in nuclear material monitoring system. (authors)

  8. Sound the alarm : monitoring system's real-time data reduces well downtime

    Energy Technology Data Exchange (ETDEWEB)

    Harrison, L.

    2008-10-15

    This article presented a new electrical heating element tool used to boost performance at low-producing wells. The down hole tool (DHT) was designed to generate steam underground in order to avoid the energy losses associated with above-ground equipment. The tool operates like an oven element but is connected to a computerized well-monitoring system in order to ensure that heat is evenly distributed. The DHT is equipped with an Optiview monitoring system designed to provide continuous readouts of near real time data. The system can also be customized to deliver messages to telephones, computers, or alarm systems. Changes in hydraulic torque, flow rates, tank levels, speeds, temperatures and hydraulic pressures can be set within ranges in order to optimize oil and gas well production by reducing operating costs and increasing equipment efficiencies. Use of the tool has during tests has minimized the need for well servicing. The patent pending technology is also being investigated for its use in water disposal and other pump-to-surface units. It was concluded that use of the technology will allow oil and gas managers to determine the status of wells in remote locations. 1 fig.

  9. Expert system in OPS5 for intelligent processing of the alarms in nuclear plants

    International Nuclear Information System (INIS)

    Cavalcante Junior, Jose Airton Chaves

    1997-11-01

    This work intends to establish a model of knowledge representation based on a expert system to supervise either security or operating to be applied generally on monitoring and detecting faults of industrial processes. The model structure proposed here let the system represent the knowledge related to faults on a process using a combination of rules either basic or associative. Besides, the model proposed has a mechanism of propagation of events in real time that acts on this structure making it possible to have an intelligent alarm processing. The rules used by the system define faults from the data acquired by instrumentation (basic rules), or from the establishment of a conjunction of faults already existent (associate rules). The computing implementation of the model defined in this work was developed in OPS5. It was applied on an example consisting of the shutdown of the Angra-I's power plant and was called FDAX (FDA Extended). For the simulated tests the FDAX was connected to the SICA (Integrated System of Angra-I Computers). It results save validity to the model, confirming thus its performance to real time applications. (author)

  10. Alarm systems in the nuclear industry - survey of the working situation and identification of future research issues

    International Nuclear Information System (INIS)

    Joensson, Anna; Osvalder, Anna-Lisa; Holmstroem, Conny; Dahlman, Sven

    2004-01-01

    Safety issues are important in the control of industrial processes. An essential part for interpreting and avoiding hazardous situations is the alarm system and its design. To increase the knowledge and to develop new design solutions this doctoral project was initiated. The work has been divided into three stages and this paper presents the results of the first stage. The objective of stage one was to investigate how operators in both nuclear and non-nuclear plants work. A comparison between different branches of industry was also performed. From these results a future research issue has been identified. The methods used were observations, interviews and a literature study. The results showed that the operators are satisfied with the performance of the alarm system during normal operating conditions. However, several problems could also be identified but most of them are already well-known in the nuclear industry. Since these problems are well known but still exist, this result contributes to the basic hypothesis that a theoretical basis is lacking for the design of the alarm system. The proposed issue for forthcoming work is therefore to collect and compile existing knowledge about the human information processing and alarm systems, and combine the knowledge from these areas. With a better understanding of the relation between these areas it is possible to develop new design solutions which are better adapted to the human capabilities and limitations. This would support operator performance which in turn increases plant performance and safety. (Author)

  11. False Alarms and Overmonitoring: Major Factors in Alarm Fatigue Among Labor Nurses.

    Science.gov (United States)

    Simpson, Kathleen Rice; Lyndon, Audrey

    2018-06-08

    Nurses can be exposed to hundreds of alarms during their shift, contributing to alarm fatigue. The purposes were to explore similarities and differences in perceptions of clinical alarms by labor nurses caring for generally healthy women compared with perceptions of adult intensive care unit (ICU) and neonatal ICU nurses caring for critically ill patients and to seek nurses' suggestions for potential improvements. Nurses were asked via focus groups about the utility of clinical alarms from medical devices. There was consensus that false alarms and too many devices generating alarms contributed to alarm fatigue, and most alarms lacked clinical relevance. Nurses identified certain types of alarms that they responded to immediately, but the vast majority of the alarms did not contribute to their clinical assessment or planned nursing care. Monitoring only those patients who need it and only those physiologic values that are warranted, based on patient condition, may decrease alarm burden.

  12. Radiation alarms and access control systems: Recommendations of the National Council on Radiation Protection and Measurements

    International Nuclear Information System (INIS)

    1986-01-01

    In facilities where radioactive materials are handled, or where radiation-producing equipment is used, the building, the equipment, and the associated safety procedures should be designed and developed together to provide a safe work environment. The specific combination of requirements for a given facility is defined by the operational radiation safety program. It should be emphasized that this report describes a range of alarm and access control systems that can provide an acceptable level of safety at many types of facilities. Depending on circumstances, the solutions offered may not be appropriate for certain facilities because they are to restrictive, not restrictive enough, or do not cover all circumstances. The document is offered as a starting point providing ideas that professional health physicists can adapt to meet the needs of a particular situation. Under no circumstances should this report be interpreted in ''cookbook'' fashion, with literal adherence to every recommendation demanded, nor should it be expected to provide adequate protection in every case without consideration of local conditions

  13. Utilization of GSM Module (Sim 900 Based Arduino-Uno for Alarm System and Remote Automatic Door Locking

    Directory of Open Access Journals (Sweden)

    Fauzi Fauzi

    2018-01-01

    Full Text Available Sebuah sistem alarm dan pengunci pintu otomatis jarak jauh untuk keamanan rumah telah dibuat. Otomatisasi kunci pintu rumah ini beroperasi dengan menggunakan perintah yang dikirimkan oleh pemilik rumah melalui pesan singkat melalui handphone sehingga keamanan rumah akan tetap dapat dikendalikan meski dari jarak yang jauh. Penelitian ini bertujuan untuk membangun otomatisasi rumah pintar yang mampu melakukan dua hal yakni mengunci pintu dan menyalakan alarm dengan menggunakan mikrokontroler Arduino-uno dan modul GSM. Pengontrolan secara otomatis tersebut cukup kompleks dan memerlukan berbagai komponen yang terintegrasi dengan kemampuan pembacaan masukan, pemrosesan data dan pengontrolan keluaran secara bersamaan dan terprogram.  A remote door automatic alarm and door lock system for home security has been designed. This home door lock automation operates using commands sent by homeowners via short messages from handphone so that home security will remain controllable even from a long distance. This study aims to build smart home automation that can do two things: lock the door and turn on the alarm by using Arduino-uno microcontroller and GSM module. The automatic control is quite complex and requires a variety of integrated components with the ability to read input, data processing and control the output simultaneously and programmed.   Keywords: Arduino, GSM, Automatic Doors, SMS Rerefences Depari, G.S. (1985. Belajar Teori dan Keterampilan Elektronika. Bandung: Armico Daryanto, 2005. Pengetahuan Teknik Elektronika. Erlangga. Jakarta. Session, Kendall Webster, 2003. 1001 Rangkaian Elektronika. PT. Elek Media Komputindo Kelompok Gramedia, Jakarta. Sustrisno, 1986, Elektronika Teori dan penerapanya. Penerbit ITB, Bandung

  14. Fundamental Principles of Alarm Design

    DEFF Research Database (Denmark)

    Us, Tolga; Jensen, Niels; Lind, Morten

    2011-01-01

    Traditionally alarms are designed on the basis of empirical guidelines rather than on a sound scientific framework rooted in a theoretical foundation for process and control system design. This paper proposes scientific principles and a methodology for design of alarms based on a functional...... be applied to any engineering system which can be modeled by MFM. The methodology provides a set of alarms which can facilitate event interpretation and operator support for abnormal situation management. The proposed design methodology provides the information content of the alarms, but does not deal...

  15. Alarm management a comprehensive guide

    CERN Document Server

    Hollifield, Bill R

    2011-01-01

    In this second edition, Alarm Management: A Comprehensive Guide, various problems of alarm systems are covered with precise guidance on how they come about and how to effectively correct them. It is written by individuals with vast experience in the different plants, processes, and environments requiring effective alarm management. The second edition is filled with good examples and explanations of procedures, with practical lists and tips on how one should proceed. It is based on hundreds of successful projects.

  16. An improvement of the Earthworm Based Earthquake Alarm Reporting system in Taiwan

    Science.gov (United States)

    Chen, D. Y.; Hsiao, N. C.; Yih-Min, W.

    2017-12-01

    The Central Weather Bureau of Taiwan (CWB) has operated the Earthworm Based Earthquake Alarm Reporting (eBEAR) system for the purpose of earthquake early warning (EEW). The system has been used to report EEW messages to the general public since 2016 through text message from the mobile phones and the television programs. The system for inland earthquakes is able to provide accurate and fast warnings. The average epicenter error is about 5 km and the processing time is about 15 seconds. The epicenter error is defined as the distance between the epicenter estimated by the EEW system and the epicenter estimated by man. The processing time is defined as the time difference between the time earthquakes occurred and the time the system issued warning. The CWB seismic network consist about 200 seismic stations. In some area of Taiwan the distance between each seismic station is about 10 km. It means that when an earthquake occurred the seismic P wave is able to propagate through 6 stations, which is the minimum number of required stations in the EEW system, within 20 km. If the latency of data transmitting is about 1 sec, the P-wave velocity is about 6 km per sec and we take 3-sec length time window to estimate earthquake magnitude, then the processing should be around 8 sec. In fact, however, the average processing time is larger than this figure. Because some outliers of P-wave onset picks may exist in the beginning of the earthquake occurrence, the Geiger's method we used in the EEW system for earthquake location is not stable. It usually takes more time to wait for enough number of good picks. In this study we used grid search method to improve the estimations of earthquake location. The MAXEL algorithm (Sheen et al., 2015, 2016) was tested in the EEW system by simulating historical earthquakes occurred in Taiwan. The results show the processing time can be reduced and the location accuracy is acceptable for EEW purpose.

  17. INEL test reactor facility alarms: descriptions, technical specifications, and modification procedure

    International Nuclear Information System (INIS)

    Potash, L.M.; Boone, M.P.

    1980-04-01

    This report identifies standards, procedures, and practices which will affect any attempt to integrate or introduce human engineering principles into nuclear power plant alarm systems. Additional information concerning type of signal used, expected reaction, type of sensor, etc., is presented because of its relevance to future work on alarm system integration. The INEL test reactors were studied. Interviews were conducted with operators, designers, and management personnel. Additional information was obtained from available documentation. Only fire-alarm systems, and to a lesser extent, criticality alarms, have detailed industry-wide standards. One general standard has been written for control-room annunciators

  18. Gynecological cancer alarm symptoms:

    DEFF Research Database (Denmark)

    Balasubramaniam, Kirubakaran; Ravn, Pernille; dePont Christensen, René

    2016-01-01

    INTRODUCTION: To determine the proportion of patients who were referred to specialist care after reporting gynecological cancer alarm symptoms to their general practitioner. To investigate whether contact with specialist care was associated with lifestyle factors or socioeconomic status. MATERIAL...... and odds ratios (ORs) for associations between specialist care contact, lifestyle factors and socioeconomic status. RESULTS: The study included 25 866 non-pregnant women; 2957 reported the onset of at least one gynecological cancer alarm symptom, and 683 of these (23.1%) reported symptoms to their general......: Educational level influence contact with specialist care among patients with gynecological cancer alarm symptoms. Future studies should investigate inequalities in access to the secondary healthcare system. This article is protected by copyright. All rights reserved....

  19. Preliminary Design of Critical Function Monitoring System of PGSFR

    International Nuclear Information System (INIS)

    2015-01-01

    A PGSFR (Prototype Gen-IV Sodium-cooled Fast Reactor) is under development at Korea Atomic Energy Research Institute. A critical function monitoring system of the PGSFR is preliminarily studied. The functions of CFMS are to display critical plant variables related to the safety of the plant during normal and accident conditions and guide the operators corrective actions to keep the plant in a safe condition and mitigate the consequences of accidents. The minimal critical functions of the PGSFR are composed of reactivity control, reactor core cooling, reactor coolant system integrity, primary heat transfer system(PHTS) heat removal, sodium water reaction mitigation, radiation control and containment conditions. The variables and alarm legs of each critical function of the PGSFR are as follows; - Reactivity control: The variables of reactivity control function are power range neutron flux instrumentation, intermediate range neutron flux instrumentation, source range neutron flux instrumentation, and control rod bottom contacts. The alarm leg to display the reactivity controls consists of status of control drop malfunction, high post trip power and thermal reactivity addition. - Reactor core cooling: The variables are PHTS sodium level, hot pool temperature of PHTS, subassembly exit temperature, cold pool temperature of the PHTS, PHTS pump current, and PHTS pump breaker status. The alarm leg consists of high core delta temperature, low sodium level of the PHTS, high subassembly exit temperature, and low PHTS pump load. - Reactor coolant system integrity: The variables are PHTS sodium level, cover gas pressure, and safeguard vessel sodium level. The alarm leg is composed of low sodium level of PHTS, high cover gas pressure and high sodium level of the safety guard vessel. - PHTS heat removal: The variables are PHTS sodium level, hot pool temperature of PHTS, core exit temperature, cold pool temperature of the PHTS, flow rate of passive residual heat removal system

  20. Preliminary Design of Critical Function Monitoring System of PGSFR

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2015-07-01

    A PGSFR (Prototype Gen-IV Sodium-cooled Fast Reactor) is under development at Korea Atomic Energy Research Institute. A critical function monitoring system of the PGSFR is preliminarily studied. The functions of CFMS are to display critical plant variables related to the safety of the plant during normal and accident conditions and guide the operators corrective actions to keep the plant in a safe condition and mitigate the consequences of accidents. The minimal critical functions of the PGSFR are composed of reactivity control, reactor core cooling, reactor coolant system integrity, primary heat transfer system(PHTS) heat removal, sodium water reaction mitigation, radiation control and containment conditions. The variables and alarm legs of each critical function of the PGSFR are as follows; - Reactivity control: The variables of reactivity control function are power range neutron flux instrumentation, intermediate range neutron flux instrumentation, source range neutron flux instrumentation, and control rod bottom contacts. The alarm leg to display the reactivity controls consists of status of control drop malfunction, high post trip power and thermal reactivity addition. - Reactor core cooling: The variables are PHTS sodium level, hot pool temperature of PHTS, subassembly exit temperature, cold pool temperature of the PHTS, PHTS pump current, and PHTS pump breaker status. The alarm leg consists of high core delta temperature, low sodium level of the PHTS, high subassembly exit temperature, and low PHTS pump load. - Reactor coolant system integrity: The variables are PHTS sodium level, cover gas pressure, and safeguard vessel sodium level. The alarm leg is composed of low sodium level of PHTS, high cover gas pressure and high sodium level of the safety guard vessel. - PHTS heat removal: The variables are PHTS sodium level, hot pool temperature of PHTS, core exit temperature, cold pool temperature of the PHTS, flow rate of passive residual heat removal system

  1. Automatically Identifying and Predicting Unplanned Wind Turbine Stoppages Using SCADA and Alarms System Data: Case Study and Results

    Science.gov (United States)

    Leahy, Kevin; Gallagher, Colm; Bruton, Ken; O'Donovan, Peter; O'Sullivan, Dominic T. J.

    2017-11-01

    Using 10-minute wind turbine SCADA data for fault prediction offers an attractive way of gaining additional prognostic capabilities without needing to invest in extra hardware. To use these data-driven methods effectively, the historical SCADA data must be labelled with the periods when the turbine was in faulty operation as well the sub-system the fault was attributed to. Manually identifying faults using maintenance logs can be effective, but is also highly time consuming and tedious due to the disparate nature of these logs across manufacturers, operators and even individual maintenance events. Turbine alarm systems can help to identify these periods, but the sheer volume of alarms and false positives generated makes analysing them on an individual basis ineffective. In this work, we present a new method for automatically identifying historical stoppages on the turbine using SCADA and alarms data. Each stoppage is associated with either a fault in one of the turbine’s sub-systems, a routine maintenance activity, a grid-related event or a number of other categories. This is then checked against maintenance logs for accuracy and the labelled data fed into a classifier for predicting when these stoppages will occur. Results show that the automated labelling process correctly identifies each type of stoppage, and can be effectively used for SCADA-based prediction of turbine faults.

  2. Line supervision of alarm communications

    International Nuclear Information System (INIS)

    Chritton, M.R.

    1991-01-01

    The objective of this paper is to explain the role and application of alarm communication link supervision in security systems such as for nuclear facilities. The vulnerabilities of the various types of alarm communication links will be presented. Throughout the paper, an effort has been made to describe only those technologies commercially available and to avoid speculative theoretical solutions

  3. Multi-temporal change image inference towards false alarms reduction for an operational photogrammetric rockfall detection system

    Science.gov (United States)

    Partsinevelos, Panagiotis; Kallimani, Christina; Tripolitsiotis, Achilleas

    2015-06-01

    Rockfall incidents affect civil security and hamper the sustainable growth of hard to access mountainous areas due to casualties, injuries and infrastructure loss. Rockfall occurrences cannot be easily prevented, whereas previous studies for rockfall multiple sensor early detection systems have focused on large scale incidents. However, even a single rock may cause the loss of a human life along transportation routes thus, it is highly important to establish methods for the early detection of small-scale rockfall incidents. Terrestrial photogrammetric techniques are prone to a series of errors leading to false alarm incidents, including vegetation, wind, and non relevant change in the scene under consideration. In this study, photogrammetric monitoring of rockfall prone slopes is established and the resulting multi-temporal change imagery is processed in order to minimize false alarm incidents. Integration of remote sensing imagery analysis techniques is hereby applied to enhance early detection of a rockfall. Experimental data demonstrated that an operational system able to identify a 10-cm rock movement within a 10% false alarm rate is technically feasible.

  4. Critical Characteristics of Radiation Detection System Components to be Dedicated for use in Safety Class and Safety Significant System

    International Nuclear Information System (INIS)

    DAVIS, S.J.

    2000-01-01

    This document identifies critical characteristics of components to be dedicated for use in Safety Significant (SS) Systems, Structures, or Components (SSCs). This document identifies the requirements for the components of the common, radiation area, monitor alarm in the WESF pool cell. These are procured as Commercial Grade Items (CGI), with the qualification testing and formal dedication to be performed at the Waste Encapsulation Storage Facility (WESF) for use in safety significant systems. System modifications are to be performed in accordance with the approved design. Components for this change are commercially available and interchangeable with the existing alarm configuration This document focuses on the operational requirements for alarm, declaration of the safety classification, identification of critical characteristics, and interpretation of requirements for procurement. Critical characteristics are identified herein and must be verified, followed by formal dedication, prior to the components being used in safety related applications

  5. Research on alarm triggered fault-diagnosis expert system for U-shaped tube breaking accident of steam generators

    International Nuclear Information System (INIS)

    Qian Hong; Luo Jianbo; Jin Weixiao; Zhou Jinming; Wang Du

    2015-01-01

    According to the U-shaped tube breaking accident of steam generator (SGTR), this paper designs a fault-diagnosis expert system based on the alarm triggering. By analyzing the fault mechanism of SGTR accidents, the fault symptom is obtained. The parameters of the belief rule are set up based on the simulation experiment. The information fusion is conducted on the fault-diagnosis results from multiple expert systems to obtain the final diagnose result. The test result shows that the expert system can diagnose the SGTR accident accurately and rapidly, and provide with the operation guidance. (authors)

  6. EDUCATIONAL USE OF CLOUD COMPUTING AND AT-MEGA MICROCONTROLLER - A CASE STUDY OF AN ALARM SYSTEM

    Directory of Open Access Journals (Sweden)

    Tomasz Cieplak

    2016-06-01

    Full Text Available The article shows a case study of Cloud Computing model combined with AT-Mega microcontrollers for educational purposes. The presented system takes advantage of many aspects of Internet of Things model, thus conjoining Cloud Management system with measurement-execution module based on Arduino platform. One benefit of this solution is a cost-effective way of showcasing machine and device integration with distinct cloud services. This article is based on practical experience with students' projects and an home alarm system with use of a Cloud Computing services will be described.

  7. Distributed optical fiber temperature sensor (DOFTS) system applied to automatic temperature alarm of coal mine and tunnel

    Science.gov (United States)

    Zhang, Zaixuan; Wang, Kequan; Kim, Insoo S.; Wang, Jianfeng; Feng, Haiqi; Guo, Ning; Yu, Xiangdong; Zhou, Bangquan; Wu, Xiaobiao; Kim, Yohee

    2000-05-01

    The DOFTS system that has applied to temperature automatically alarm system of coal mine and tunnel has been researched. It is a real-time, on line and multi-point measurement system. The wavelength of LD is 1550 nm, on the 6 km optical fiber, 3000 points temperature signal is sampled and the spatial position is certain. Temperature measured region: -50 degree(s)C--100 degree(s)C; measured uncertain value: +/- 3 degree(s)C; temperature resolution: 0.1 degree(s)C; spatial resolution: test, test content and practical test results have been discussed.

  8. Ultrasonic Technology in Duress Alarms.

    Science.gov (United States)

    Lee, Martha A.

    2000-01-01

    Provides the pros and cons of the most commonly used technologies in personal duress alarm systems in the school environment. Discussed are radio frequency devices, infrared systems, and ultrasonic technology. (GR)

  9. Dynamic alarm response procedures

    International Nuclear Information System (INIS)

    Martin, J.; Gordon, P.; Fitch, K.

    2006-01-01

    The Dynamic Alarm Response Procedure (DARP) system provides a robust, Web-based alternative to existing hard-copy alarm response procedures. This paperless system improves performance by eliminating time wasted looking up paper procedures by number, looking up plant process values and equipment and component status at graphical display or panels, and maintenance of the procedures. Because it is a Web-based system, it is platform independent. DARP's can be served from any Web server that supports CGI scripting, such as Apache R , IIS R , TclHTTPD, and others. DARP pages can be viewed in any Web browser that supports Javascript and Scalable Vector Graphics (SVG), such as Netscape R , Microsoft Internet Explorer R , Mozilla Firefox R , Opera R , and others. (authors)

  10. Development of radiation alarm monitor

    International Nuclear Information System (INIS)

    Myung Jae Song; Myung Chan Lee; Jung Kwan Son

    1997-01-01

    The Radiation Alarm Monitor is developed domestically in order to protect radiation workers from over exposure. The Radiation Alarm Monitor with microprocessor installed can record the information of radiation field before and after accidents. It can also provide the data to analyze the accident and to set a counterplan. It features a wide detection range of radiation (I OmR/h - I OOR/h), radiation work and data storage, portability, high precision (5%) due to calibration, and adaptation of a powerful alarm system. In order to protect workers from over exposure, light and sound alarm had been designed to initiate when accident occurs such as an unexpected change of radiation field such as radiation rate and accumulated dosed between 90 min. before the alarm and 30 min. after the alarm. In addition, the Radiation Alarm Monitor interfaces with computer so that the accident can be analyzed. After the testing conditions in other countries for the Radiation Alarm Monitor were compared, the most stringent test, ANSI N42. 17-A, was selected. The performance testing was car-ried out under various conditions of temperature, humidity, vibration and electromagnetic wave hindrance by Korea Research Institute of Standards and Science (KRISS). As a result, the Radiation Alan-n Monitor passed all test. Also, for the Radiation Alarm Monitor, environmental adaptability tests under the environmental conditions of NPP sites had been performed. The Radiation Alan-n Monitor had been reviewed by radiation workers at NPPs and their opinions had been collected. Operating procedure will be written and distributed to every NPP sites. Radiation Alarm Monitor will be modified for use under the specific environmental conditions of each site. It will be distributed to NPP sites and will be used by radiation workers

  11. Toxicity alarm: Case history

    International Nuclear Information System (INIS)

    Hogan, D.; Retallack, J.

    1993-01-01

    In late fall 1991, the Novacor petrochemical plant near Joffre, Alberta experienced a toxicity alarm, the first since its startup 14 years ago. Fish exposed to a normal toxicity test were stressed within 2 h and showed 100% mortality after 24 h. A history of the events leading up to, during, and after the toxicity alarm is presented. The major effluent sources were three cooling water systems. Although these sources are well characterized, the event causes were not immediately clear. Initial toxic screening indicated that one was very toxic, another moderately toxic, and the third not toxic at all. All three systems utilized the same chemical treatment program to avoid fouling: stabilized phosphates with minor variants. The most toxic of the cooling systems operated at 10-12 cycles, had three chemicals for biocide control, and had three makeup streams. Toxic and nontoxic system characteristics were compared. An in-depth modified toxicity identification and evaluation program was then performed to identify and evaluate the cause of the toxicity alarm for future prevention. The most probable causes of toxicity were identified by elimination. The combination of high numbers of cycles, hydrocarbons in the makeup water, and bromine added as an antifoulant resulted in formation of aromatic bromamines which are capable of causing the toxic condition experienced. 2 tabs

  12. A Computer System for CBRN Contamination Threats Analysis Support, Prediction Their Effects and Alarming the Population: Polish Case Study

    Directory of Open Access Journals (Sweden)

    Tarapata Zbigniew

    2017-01-01

    Full Text Available The article outlines a concept for the system supporting analyses of threats related to contamination and alarming (WAZkA, for the purpose of the National System for Detection of Contamination and Alarming (Krajowy System Wykrywania Skażeń i Alarmowania, KSWSiA in Poland. Additionally, the article presents the point of designing such system, its concept and components. The main objective of WAZkA is to support the following processes of the KSWSiA: information exchange between the system elements and coordination of the system operations, as well as to prepare assessment and expert analyses, needed by the decision-making bodies, with respect to risk emergency situations during natural disasters, technical failures or other events resulting in biological, chemical or radioactive contamination. The selected modules included in the WAZkA system: Event Tree Analyzer, visualization module (COP and emulators of the threats monitoring systems, were described as well as the idea of using the system for the purpose of training, including the designed emulators of the risk monitoring systems together with the scenario editor. The Event Tree Anlyzer is a graphical representation of a chronological sequence of events, significant from the point of view of the functioning of the object, which occur after a given event that initiates such sequence. COP is the GIS tool, which allows to present an operating situation on the basis of background maps. The application offers a possibility of enriching the presented operating situation with the risk data provided in the form of NATO ADat-P3 (CBRN reports. Emulators of the threats monitoring systems allow to generate, in an artificial and user-controlled manner, data on risks, which “pretend” to be real data obtained from the monitoring systems. The above approach significantly facilitates the organization of training and learning about rare situations or situations that have never occurred, but that are

  13. False alarms and missed events: the impact and origins of perceived inaccuracy in tornado warning systems.

    Science.gov (United States)

    Ripberger, Joseph T; Silva, Carol L; Jenkins-Smith, Hank C; Carlson, Deven E; James, Mark; Herron, Kerry G

    2015-01-01

    Theory and conventional wisdom suggest that errors undermine the credibility of tornado warning systems and thus decrease the probability that individuals will comply (i.e., engage in protective action) when future warnings are issued. Unfortunately, empirical research on the influence of warning system accuracy on public responses to tornado warnings is incomplete and inconclusive. This study adds to existing research by analyzing two sets of relationships. First, we assess the relationship between perceptions of accuracy, credibility, and warning response. Using data collected via a large regional survey, we find that trust in the National Weather Service (NWS; the agency responsible for issuing tornado warnings) increases the likelihood that an individual will opt for protective action when responding to a hypothetical warning. More importantly, we find that subjective perceptions of warning system accuracy are, as theory suggests, systematically related to trust in the NWS and (by extension) stated responses to future warnings. The second half of the study matches survey data against NWS warning and event archives to investigate a critical follow-up question--Why do some people perceive that their warning system is accurate, whereas others perceive that their system is error prone? We find that subjective perceptions are--in part-a function of objective experience, knowledge, and demographic characteristics. When considered in tandem, these findings support the proposition that errors influence perceptions about the accuracy of warning systems, which in turn impact the credibility that people assign to information provided by systems and, ultimately, public decisions about how to respond when warnings are issued. © 2014 Society for Risk Analysis.

  14. Criticality monitoring with digital systems and solid state neutron detectors

    International Nuclear Information System (INIS)

    Willhoite, S.B.

    1984-01-01

    A commercially available system for criticality monitoring combines the well established technology of digital radiation monitoring with state-of-the art detector systems capable of detecting criticality excursions of varying length and intensity with a high degree of confidence. The field microcomputer servicing the detector clusters contains hardware and software to acquire detector information in both the digital count rate and bit sensing modes supported by the criticality detectors. In both cases special criticality logic in the field microcomputer is used to determine the validity of the criticality event. The solid-state neutron detector consists of a 6 LiF wafer coupled to a diffused-junction charged particle detector. Alpha particles resulting from (n,α) interactions within the lithium wafer produce a pulsed signal corresponding to neutron intensity. Special detector circuitry causes the setting of a criticality bit recognizable by the microcomputer should neutron field intensities either exceed a hardware selectable frequency or saturate the detector resulting in a high current condition. These two modes of criticality sensing, in combination with the standard method of comparing an operator selectable alarm setpoint with the detector count rate, results in a criticality system capable of effective operation under the most demanding criticality monitoring conditions

  15. Detection and classification of alarm threshold violations in condition monitoring systems working in highly varying operational conditions

    Science.gov (United States)

    Strączkiewicz, M.; Barszcz, T.; Jabłoński, A.

    2015-07-01

    All commonly used condition monitoring systems (CMS) enable defining alarm thresholds that enhance efficient surveillance and maintenance of dynamic state of machinery. The thresholds are imposed on the measured values such as vibration-based indicators, temperature, pressure, etc. For complex machinery such as wind turbine (WT) the total number of thresholds might be counted in hundreds multiplied by the number of operational states. All the parameters vary not only due to possible machinery malfunctions, but also due to changes in operating conditions and these changes are typically much stronger than the former ones. Very often, such a behavior may lead to hundreds of false alarms. Therefore, authors propose a novel approach based on parameterized description of the threshold violation. For this purpose the novelty and severity factors are introduced. The first parameter refers to the time of violation occurrence while the second one describes the impact of the indicator-increase to the entire machine. Such approach increases reliability of the CMS by providing the operator with the most useful information of the system events. The idea of the procedure is presented on a simulated data similar to those from a wind turbine.

  16. Detection and classification of alarm threshold violations in condition monitoring systems working in highly varying operational conditions

    International Nuclear Information System (INIS)

    Strączkiewicz, M; Barszcz, T; Jabłoński, A

    2015-01-01

    All commonly used condition monitoring systems (CMS) enable defining alarm thresholds that enhance efficient surveillance and maintenance of dynamic state of machinery. The thresholds are imposed on the measured values such as vibration-based indicators, temperature, pressure, etc. For complex machinery such as wind turbine (WT) the total number of thresholds might be counted in hundreds multiplied by the number of operational states. All the parameters vary not only due to possible machinery malfunctions, but also due to changes in operating conditions and these changes are typically much stronger than the former ones. Very often, such a behavior may lead to hundreds of false alarms. Therefore, authors propose a novel approach based on parameterized description of the threshold violation. For this purpose the novelty and severity factors are introduced. The first parameter refers to the time of violation occurrence while the second one describes the impact of the indicator-increase to the entire machine. Such approach increases reliability of the CMS by providing the operator with the most useful information of the system events. The idea of the procedure is presented on a simulated data similar to those from a wind turbine. (paper)

  17. Alarm-Processing in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Otazo, J; Fernandez, R

    2000-01-01

    Information overload due to the activation of a great number of alarms in a short time is a common problem for the operator in the control room of a industrial plant, mainly in complex process like the nuclear power plants.The problem is the conventional conception of the alarm system, that defines each alarm like a separated and independent entity of the global situation of the plant.A direct consequence is the generation of multiple alarms during a significative disturbance in the process, being most of them redundant and irrelevant to the actual process state wich involves an extra load to the operator, who wastes time in acting selecting the important alarms of the group that appears or lead to a an erroneous action.The present work first describes the techniques developed in the last years to attack the avalanche of alarms problem.Later we present our approach to alarm-processing: an expert system as alarm-filter.Our objective is collect in the system the state of the art in the development of advanced alarm systems, offering an improvement of the information flow to the operators through the suppression of nonsignificant alarms and a structured visualization of the process state.Such support is important during a disturbance for the identification of plant state, diagnosis, consequence prediction and corrective actions.The system is arranged in three stages: alarm-generation, alarm-filter and alarm-presentation.The alarm-generation uses conventional techniques or receives them from an external system.The alarm-filter uses suppression techniques based on: irrelevance analysis with the operation mode and the state of components, causal reasoning and static importance analysis.The alarm presentation is made through a structured way using a priority scheme with three level.The knowledge representation of each alarm is based on frames and a graph of alarms for global knowledge, where the connections between nodes represent causal and irrelevance relations

  18. Intelligent alarming

    Science.gov (United States)

    Braden, W. B.

    1992-01-01

    This talk discusses the importance of providing a process operator with concise information about a process fault including a root cause diagnosis of the problem, a suggested best action for correcting the fault, and prioritization of the problem set. A decision tree approach is used to illustrate one type of approach for determining the root cause of a problem. Fault detection in several different types of scenarios is addressed, including pump malfunctions and pipeline leaks. The talk stresses the need for a good data rectification strategy and good process models along with a method for presenting the findings to the process operator in a focused and understandable way. A real time expert system is discussed as an effective tool to help provide operators with this type of information. The use of expert systems in the analysis of actual versus predicted results from neural networks and other types of process models is discussed.

  19. Impact of Advanced Alarm Systems and Information Displays on Human Reliability in the Digital Control Room of Nuclear Power Plants

    International Nuclear Information System (INIS)

    Kim, Jong Hyun; Dang, Vinh N

    2011-01-01

    This paper discusses the potential impacts of two advanced features of digital control rooms, alarm systems and information display systems, on the Human Reliability Analysis (HRA) in nuclear power plants. Although the features of digital control rooms have already been implemented in new or upgraded nuclear power plants, HRAs have so far not taken much credit for these features. In this circumstance, this paper aims at examining the potential effects of these features on human performance and discussing how these effects can be addressed with existing HRA methods. A conclusion derivable from past experimental studies is that those features are supportive in the severe conditions such as complex scenarios and knowledge-based works. However, in the less complex scenarios and rule-based work, they may have no difference with or sometimes negative impacts on operator performance. The discussion about the impact on the HRA is provided on the basis on the THERP method

  20. Non-specific alarm calls trigger mobbing behavior in Hainan gibbons (Nomascus hainanus).

    Science.gov (United States)

    Deng, Huaiqing; Gao, Kai; Zhou, Jiang

    2016-09-30

    Alarm calls are important defensive behaviors. Here, we report the acoustic spectrum characteristics of alarm calls produced by Hainan gibbons (Nomascus hainanus) inhabiting Bawangling National Nature Reserve in Hainan, China. Analysis of call data collected from 2002-2014 shows that alarm calls are emitted by all family group members, except infants. Alarm behavior included simple short alarming calls (7-10 min) followed by longer variable-frequency mobbing calls lasting 5-12 min. The duration of individual alarming and mobbing calls was 0.078 ± 0.014 s and 0.154 ± 0.041 s at frequency ranges of 520-1000 Hz and 690-3920 Hz, respectively. Alarming call duration was positively associated with group size. The alarm calls can trigger mobbing behavior in Hainan gibbons; this is a defense way of social animals, and first report among the primates' species. The system of vocal alarm behavior described in this critically endangered species is simple and effective.

  1. Evaluating alternative responses to safeguards alarms

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Judd, B.R.; McCord, R.K.

    1982-01-01

    This paper describes a quantitative approach to help evaluate and respond to safeguards alarms. These alarms may be generated internally by a facility's safeguards systems or externally by individuals claiming to have stolen special nuclear material (SNM). This approach can be used to identify the most likely cause of an alarm - theft, hoax, or error - and to evaluate alternative responses to alarms. Possible responses include conducting investigations, initiating measures to recover stolen SNM, and replying to external threats. Based on the results of each alarm investigation step, the evaluation revises the likelihoods of possible causes of an alarm, and uses this information to determine the optimal sequence of further responses. The choice of an optimal sequence of responses takes into consideration the costs and benefits of successful thefts or hoaxes. These results provide an analytical basis for setting priorities and developing contingency plans for responding to safeguards alarms

  2. Safety rule of the KTA. Alarm system, staff locator systems, and internal and external communication lines of nuclear power plants. Pt. 1

    International Nuclear Information System (INIS)

    1977-01-01

    This rule aims at stipulating the requirements on type and extent of communication means for personnel within the nuclear power plant, and from the nuclear power plant to the outside. Requirements on design, construction, operating equipment, and alarm and locator system tests for nuclear power plants are defined. The rule applies to stationary nuclear power plants with one power station unit, but not to facilities of process control, radiation protection control, fire protection control, environmental control, and plant security. (orig./HP) [de

  3. 46 CFR 169.732 - Carbon dioxide alarm.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Carbon dioxide alarm. 169.732 Section 169.732 Shipping... Control, Miscellaneous Systems, and Equipment Markings § 169.732 Carbon dioxide alarm. Each carbon dioxide alarm must be conspicuously identified: “WHEN ALARM SOUNDS—VACATE AT ONCE. CARBON DIOXIDE BEING RELEASED.” ...

  4. Habituating alarming atmospheres

    DEFF Research Database (Denmark)

    Højlund, Marie

    This paper proposes embodied rhythmic sound habituation as a possible resource when designing contextualized technologies in critical atmospheres. The main contribution is collating the concept of rhythm as presented by Henri Lefebvre with the concept of sound habituation to help operationalize...... functionality for the staff, but are stressful for visitors and patients, as they are designed to demand attention even though they have no direct functional meaning to them. By introducing sounds from the ward, integrated in the furniture as simple sound sample triggers, KidKit invites children to become...... accustomed to the alarming sounds through rhythmic interaction in the waiting room, and bringing the furniture with them afterwards as a secure anchor, when entering the ward. This rhythmic habituation can enable the child to focus her attention on the meeting with the hospitalized relative....

  5. Critical points in magnetic systems

    International Nuclear Information System (INIS)

    Bongaarts, A.L.M.

    1975-01-01

    The magnetical phase transitions of CsCoCl 3 .2H 2 O and CsCoCl 3 .2D 2 O are investigated by neutron diffraction techniques with special attention to the critical points in the phase diagrams. CsCoCl 3 .2H 2 O turned out to be a one-dimentional magnetic antiferromagnet with ferromagnetic and antiferromagnetic interactions. In the vicinity of the Neel point, the critical behavior in zero magnetic field could be described as a three-dimentional long range ordering, while the fluctuations in the system are one-dimensional. In the presence of a magnetic field, the behavior of the system in the critical region of the magnetic phase diagram between the Neel temperature at zero field (3.3degK) and 1.85degK, was in good agreement with the theory. Below 1.85degK, the phase transition in a magnetic field changes into a line of triple points whose end point could be identified as a tricritical point, i.e., an intersection of three critical lines. The parameters derived from observations in the neighborhood of this tricritical point obey the scaling laws but are not in numerical agreement with theoretical predictions

  6. Speech Alarms Pilot Study

    Science.gov (United States)

    Sandor, A.; Moses, H. R.

    2016-01-01

    Currently on the International Space Station (ISS) and other space vehicles Caution & Warning (C&W) alerts are represented with various auditory tones that correspond to the type of event. This system relies on the crew's ability to remember what each tone represents in a high stress, high workload environment when responding to the alert. Furthermore, crew receive a year or more in advance of the mission that makes remembering the semantic meaning of the alerts more difficult. The current system works for missions conducted close to Earth where ground operators can assist as needed. On long duration missions, however, they will need to work off-nominal events autonomously. There is evidence that speech alarms may be easier and faster to recognize, especially during an off-nominal event. The Information Presentation Directed Research Project (FY07-FY09) funded by the Human Research Program included several studies investigating C&W alerts. The studies evaluated tone alerts currently in use with NASA flight deck displays along with candidate speech alerts. A follow-on study used four types of speech alerts to investigate how quickly various types of auditory alerts with and without a speech component - either at the beginning or at the end of the tone - can be identified. Even though crew were familiar with the tone alert from training or direct mission experience, alerts starting with a speech component were identified faster than alerts starting with a tone. The current study replicated the results from the previous study in a more rigorous experimental design to determine if the candidate speech alarms are ready for transition to operations or if more research is needed. Four types of alarms (caution, warning, fire, and depressurization) were presented to participants in both tone and speech formats in laboratory settings and later in the Human Exploration Research Analog (HERA). In the laboratory study, the alerts were presented by software and participants were

  7. Alarm pocket dosimeter

    Energy Technology Data Exchange (ETDEWEB)

    Hiraki, H; Kitamura, S [Matsushita Electric Industrial Co. Ltd., Kadoma, Osaka (Japan)

    1975-04-01

    This instrument is a highly reliable pocket dosimeter which has been developed for personal monitoring use. The dosimeter generates an alarm sound when the exposure dose reaches a preset value. Using a tiny GM tube for a radiation detector and measuring the integrated dose by means of a digital counting method, this new pocket dosimeter has high accuracy and stability. Using a sealed alkali storage battery for the power supply, and with an automatic control charger, this dosimetry system is easy and economical to operate and maintain. Detectable radiation by the dosimeter are X and ..gamma.. rays. Standard preset dose values are 30, 50, 80 and 100 mR. Detection accuracy is betwen +10% and -20%. The dosimeter is continuously usable for more than 14 hours after charging for 2 hours. The dosimeter has the following features; good realiability, shock-proof loud and clear alarm sound, the battery charger also serves as a stock container for the dosimeters, and no switching operation required for the power supply due to the internal automatic switch. Therefore, the dosimetry system is very useful for personal monitoring management in many radiation industry establishments.

  8. Reducing false asystole alarms in intensive care.

    Science.gov (United States)

    Dekimpe, Remi; Heldt, Thomas

    2017-07-01

    High rates of false monitoring alarms in intensive care can desensitize staff and therefore pose a significant risk to patient safety. Like other critical arrhythmia alarms, asystole alarms require immediate attention by the care providers as a true asystole event can be acutely life threatening. Here, it is illustrated that most false asystole alarms can be attributed to poor signal quality, and we propose and evaluate an algorithm to identify data windows of poor signal quality and thereby help suppress false asystole alarms. The algorithm combines intuitive signal-quality features (degree of signal saturation and baseline wander) and information from other physiological signals that might be available. Algorithm training and testing was performed on the MIMIC II and 2015 PhysioNet/Computing in Cardiology Challenge databases, respectively. The algorithm achieved an alarm specificity of 81.0% and sensitivity of 95.4%, missing only one out of 22 true asystole alarms. On a separate neonatal data set, the algorithm was able to reject 89.7% (890 out of 992) of false asystole alarms while keeping all 22 true events. The results show that the false asystole alarm rate can be significantly reduced through basic signal quality evaluation.

  9. A framework for modeling information propagation of biological systems at critical states.

    Science.gov (United States)

    Hu, Feng; Yang, Fang

    2016-03-01

    We explore the dynamics of information propagation at the critical state of a biologically inspired system by an individual-based computer model. "Quorum response", a type of social interaction which has been recognized taxonomically in animal groups, is applied as the sole interaction rule among individuals. In the model, we assume a truncated Gaussian distribution to depict the distribution of the individuals' vigilance level. Each individual can assume either a naïve state or an alarmed one and only switches from the former state to the latter one. If an individual has turned into an alarmed state, it stays in the state during the process of information propagation. Initially, each individual is set to be at the naïve state and information is tapped into the system by perturbing an individual at the boundaries (alerting it to the alarmed state). The system evolves as individuals turn into the alarmed state, according to the quorum response rules, consecutively. We find that by fine-tuning the parameters of the mean and the standard deviation of the Gaussian distribution, the system is poised at a critical state. We present the phase diagrams to exhibit that the parameter space is divided into a super-critical and a sub-critical zone, in which the dynamics of information propagation varies largely. We then investigate the effects of the individuals' mobility on the critical state, and allow a proportion of randomly chosen individuals to exchange their positions at each time step. We find that mobility breaks down criticality of the system. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  10. Development of contact scanner for Wolsung NPP alarm and annunciation system

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Eung Se [Korea Electric Power Corp. (KEPCO), Taejon (Korea, Republic of). Research Center

    1995-12-31

    Contact scanner system in Wolsung NPP(model ESE-1565) is early `70 equipment so most of components are obsolete. To make 100% compatible PCBs for this system is main object of the study. Most of components used in the system are now not available in the electric market, furthermore original system maker no longer supplies spare parts. System supplier(AECL) quoted lots of money than general PCBs prices in case of spare PCBs are re-marked by canada maker. Contents and scope of the study are specifications research and system analysis, improvements of repairability and reliability, circuit design and simulations using computer aided tools(CAE), make arbitrary mechanical contacts signal generator for test system. Now the long-run test of home made PCBs are conducting at Wolsung NPP. (author). 20 refs., 42 figs.

  11. Urethral alarm probe for permanent prostate implants

    International Nuclear Information System (INIS)

    Cutajar, D.; Lerch, M.; Takacs, G.

    2008-01-01

    We have developed a urethral dosimetry system for real time dose verification along the urethra during permanent implant prostate brachytherapy. The urethral alarm uses 'spectroscopic dosimetry' to calculate the dose rate along the urethra in real time. The application of spectroscopic dosimetry for the urethral alarm probe was verified using Monte Carlo calculations. In phantom depth dose measurements as well as isotropy measurements were performed to verify the usefulness of the urethra alarm probe as an in vivo real time dosimeter. (author)

  12. Towards False Alarm Reduction using Fuzzy If-Then Rules for Medical Cyber Physical Systems

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Su, Chunhua

    2018-01-01

    Cyber-Physical Systems (CPS) are integrations of computation, networking and physical processes. Its process control is often referred to as embedded systems. Generally, CPS and Internet of Things (IoT) have the same basic architecture, whereas the former shows a higher combination and coordination...

  13. Implementation guidance for industrial-level security systems using radio frequency alarm links

    Energy Technology Data Exchange (ETDEWEB)

    Swank, R.G.

    1996-07-12

    Spread spectrum (SS) RF transmission technologies have properties that make the transmitted signal difficult to intercept, interpret, and jam. The digital code used in the modulation process results in a signal that has high reception reliability and supports multiple use of frequency bands and selective addressing. These attributes and the relatively low installation cost of RF systems make SSRF technologies candidate for communications links in security systems used for industrial sites, remote locations, and where trenching or other disturbances of soil or structures may not be desirable or may be costly. This guide provides a description of such a system and presents implementation methods that may be of engineering benefit.

  14. 75 FR 11918 - Hewlett Pachard Company, Business Critical Systems, Mission Critical Business Software Division...

    Science.gov (United States)

    2010-03-12

    ... Pachard Company, Business Critical Systems, Mission Critical Business Software Division, Openvms Operating... Colorado, Marlborough, Massachuetts; Hewlett Pachard Company, Business Critical Systems, Mission Critical... Company, Business Critical Systems, Mission Critical Business Software Division, OpenVMS Operating System...

  15. Design of a positional tracking and radiological alarm system for transportation of radioactive isotopes

    International Nuclear Information System (INIS)

    Saindane, Shashank; Pujari, R.N.; Narsaiah, M.V.R.; Chaudhury, Probal; Pradeepkumar, K.S.

    2016-01-01

    The safety aspects during the transport of radioactive material have to ensure that even in event of accident the potential of radiation exposure to public is extremely small. Continuous monitoring and online data transfer to emergency control room will strengthen the emergency preparedness to response to any such accident during transport of radioactive material. The paper presents the combined application of Geographical Information Systems (GIS), Global Positioning System (GPS), General Packet Radio Service (GPRS) and the Internet for tracking the shipment vehicle transporting radioactive isotopes for use in the medical industry. The key features of the prototype system designed are realtime radiological status update along with photo snap of the shipping flask at predefined interval along with positional coordinates, GIS platform and a web-based user interface. The system consists of a GM based radiation monitoring device (RMD) along with a LAN camera, GPS for tracking the shipment vehicle, a communications server, a web-server, a database server, and a map server. The RMD and tracking device mounted in the shipment vehicle collects location and radiological information on real-time via the GPS. This information is transferred continuously through GPRS to a central database. The users will be able to view the current location of the vehicle via a web-based application

  16. Proposal for the award of an industrial services contract for maintenance of fire and gas detection and evacuation alarm systems

    CERN Document Server

    2001-01-01

    This document concerns the award of an Industrial Services contract for maintenance of fire and gas detection and evacuation alarm systems. Following a market survey carried out among 48 firms in fourteen Member States, a call for tenders (IT-2818/ST) was sent on 15 December 2000 to four firms and three consortia, each consisting of two firms, in five Member States. By the closing date, CERN had received tenders from one firm and three consortia in four Member States. The Finance Committee is invited to agree to the negotiation of a contract with the consortium SCHRACK SECONET (AT) - SOTEB (FR), the lowest bidder, for an initial period of three years from 1 October 2001 for an amount not exceeding 5 800 000 Swiss francs, not subject to revision. The contract will include options for two one-year extensions beyond the initial three-year period. The consortium has indicated the following distribution by country of the contract value covered by this adjudication proposal: AT-50%, FR-50%.

  17. Good alarm design plays a vital role in successful DCS implementation: Hard learned lessons from petrochemical applications

    International Nuclear Information System (INIS)

    Wilson, C.; Rothenberg, D.

    2006-01-01

    Nuclear operators are eager to update their automation infrastructure, but are apprehensive due to the consequences of failure. The process industries have learned that alarm design is critical to a successful Distributed Control System (DCS) implementation. This paper shares valuable insight into how alarms play a key role in successful management of upsets, help focus operator attention, and supply critical information during periods of high stress. (authors)

  18. Experience and improvements in advanced alarm annunciation systems in nuclear power plants. Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-09-01

    The objective of the meeting is to provide an international forum for the presentation and discussion on R and D, in-plant experiences and improvements to annunciation systems. In planning the meeting, we have fully recognized that annunciation is an integral part of control centre design and plant operation. However, we have proposed to keep the meeting focussed on annunciation-related topics so as to maximize the benefits from the discussions. Among us this week, we have 62 participants from 9 countries presenting 22 papers. Further, these representatives are from utilities, design/engineering, research and development, and regulatory organizations. The meeting is organized into 7 session, focussing on a specific aspect or perspective on annunciation. Refs, figs, tabs.

  19. Experience and improvements in advanced alarm annunciation systems in nuclear power plants. Proceedings

    International Nuclear Information System (INIS)

    1997-01-01

    The objective of the meeting is to provide an international forum for the presentation and discussion on R and D, in-plant experiences and improvements to annunciation systems. In planning the meeting, we have fully recognized that annunciation is an integral part of control centre design and plant operation. However, we have proposed to keep the meeting focussed on annunciation-related topics so as to maximize the benefits from the discussions. Among us this week, we have 62 participants from 9 countries presenting 22 papers. Further, these representatives are from utilities, design/engineering, research and development, and regulatory organizations. The meeting is organized into 7 session, focussing on a specific aspect or perspective on annunciation. Refs, figs, tabs

  20. Outsourcing critical financial system operations.

    Science.gov (United States)

    Cox, Nora; Pilbauer, Jan

    2018-01-01

    Payments Canada provides Canada's national payments systems and is responsible for the clearing and settlement infrastructure, processes and rules that underpin the exchange of billions of dollars each day through the Canadian economy. Strategic sourcing is a reality for this small organisation with a broad scope of national regulations and global standards to comply with. This paper outlines Payments Canada's approach to outsourcing its critical financial system operations, which centres on four key principles: strong relationship management; continuous learning, recording and reporting; evaluating the business landscape; and a commitment to evolving the organisation to greater resilience. This last point is covered in detail with an exploration of the organisation's resilience and security strategy as well as its risk appetite. As Payments Canada progresses to its future state, which includes modernising its core payment systems, underlying rules and standards, risk management for the industry as a whole will remain at the forefront of its collective mind. The expectation is that outsourcing will remain a fundamental element of its operating model in future, a strategy that will ensure the organisation can focus on its core business competencies and eliminate the need to develop and support in-house expertise in commodity areas.

  1. Critical function monitoring system algorithm development

    International Nuclear Information System (INIS)

    Harmon, D.L.

    1984-01-01

    Accurate critical function status information is a key to operator decision-making during events threatening nuclear power plant safety. The Critical Function Monitoring System provides continuous critical function status monitoring by use of algorithms which mathematically represent the processes by which an operating staff would determine critical function status. This paper discusses in detail the systematic design methodology employed to develop adequate Critical Function Monitoring System algorithms

  2. The CANDU alarm analysis tool (CAAT)

    Energy Technology Data Exchange (ETDEWEB)

    Davey, E C; Feher, M P; Lupton, L R [Control Centre Technology Branch, ON (Canada)

    1997-09-01

    AECL undertook the development of a software tool to assist alarm system designers and maintainers based on feedback from several utilities and design groups. The software application is called the CANDU Alarm Analysis Tool (CAAT) and is being developed to: Reduce by one half the effort required to initially implement and commission alarm system improvements; improve the operational relevance, consistency and accuracy of station alarm information; record the basis for alarm-related decisions; provide printed reports of the current alarm configuration; and, make day-to-day maintenance of the alarm database less tedious and more cost-effective. The CAAT assists users in accessing, sorting and recording relevant information, design rules, decisions, and provides reports in support of alarm system maintenance, analysis of design changes, or regulatory inquiry. The paper discusses the need for such a tool, outlines the application objectives and principles used to guide tool development, describes the how specific tool features support user design and maintenance tasks, and relates the lessons learned from early application experience. (author). 4 refs, 2 figs.

  3. The CANDU alarm analysis tool (CAAT)

    International Nuclear Information System (INIS)

    Davey, E.C.; Feher, M.P.; Lupton, L.R.

    1997-01-01

    AECL undertook the development of a software tool to assist alarm system designers and maintainers based on feedback from several utilities and design groups. The software application is called the CANDU Alarm Analysis Tool (CAAT) and is being developed to: Reduce by one half the effort required to initially implement and commission alarm system improvements; improve the operational relevance, consistency and accuracy of station alarm information; record the basis for alarm-related decisions; provide printed reports of the current alarm configuration; and, make day-to-day maintenance of the alarm database less tedious and more cost-effective. The CAAT assists users in accessing, sorting and recording relevant information, design rules, decisions, and provides reports in support of alarm system maintenance, analysis of design changes, or regulatory inquiry. The paper discusses the need for such a tool, outlines the application objectives and principles used to guide tool development, describes the how specific tool features support user design and maintenance tasks, and relates the lessons learned from early application experience. (author). 4 refs, 2 figs

  4. Automated analysis of off-line measured gamma-spectra using UniSampo gamma-ray spectrum analysis software including criterias for alarming systems

    International Nuclear Information System (INIS)

    Nikkinen, M.T.

    2005-01-01

    In many laboratories the number of measured routine gamma-spectra can be significant and the labour work to review all the data is time consuming and expensive task. In many cases the routine sample does not normally contain radiation above a detectable level, and still the review of the spectra has to be performed. By introducing simple rules for emerging conditions, the review work can be significantly reduced. In one case the need to review the environmental measurement spectra was reduced to less than 1% compared to the original need, which in turn made the review personnel available for more useful functions. Using the UniSampo analysis system, the analysis results of spectra that are causing alarming conditions can be transmitted via e-mail to any address. Some systems are even equipped with the capability to forward these results to hand-portable telephones or pagers. This is a very practical solution for automated environmental monitoring, when the sample spectra are collected automatically and transmitted to central computer for further analysis. Set up of an automatic analysis system, rules for the emerging conditions, technical solutions for an automated alarming system and a generic hypothesis test for the alarming system developed for UniSampo analysis software are described. (author)

  5. Functional alarming and information retrieval

    International Nuclear Information System (INIS)

    Goodstein, L.P.

    1985-08-01

    This paper deals with two facets of the design and efficient utilisation by operating personnel of computer-based interfaces for monitoring and the supervisory control of complex industrial systems - e.g., power stations, chemical plants, etc. These are alarming and information retrieval both of which are extremely sensitive to computerisation. For example, the advent of computers for display requires that some means of assuring easy and rapid access to large amounts of relevant stored information be found. In this paper, alarming and information retrieval are linked together through a multilevel functional description of the target plant. This representation serves as a framework for structuring the access to information as well as defining associated ''alarms'' at the various descriptive levels. Particular attention is paid to the level where mass and energy flows and balances are relevant. It is shown that the number of alarms here is reduced considerably while information about content and interrelationships is enhanced - which at the same time eases the retrieval problem. (author)

  6. Speech Alarms Pilot Study

    Science.gov (United States)

    Sandor, Aniko; Moses, Haifa

    2016-01-01

    Speech alarms have been used extensively in aviation and included in International Building Codes (IBC) and National Fire Protection Association's (NFPA) Life Safety Code. However, they have not been implemented on space vehicles. Previous studies conducted at NASA JSC showed that speech alarms lead to faster identification and higher accuracy. This research evaluated updated speech and tone alerts in a laboratory environment and in the Human Exploration Research Analog (HERA) in a realistic setup.

  7. Security Alarm for Motorcycle

    Directory of Open Access Journals (Sweden)

    Ismail Ismail

    2015-11-01

    Full Text Available A security alarm for motorcycle has been developed. This equipment consists of two parts. Part one is as a remote control, where it produces a radio signal with frequency of 37.5 MHz to turn on (activate or to turn off alarm. Part two consists of sensor, receiver to receive signal from part one, and alarm. This part two will be attached to motorcycle while part one will be kept as a key by the owner of motorcycle. This equipment has been tested in the laboratory and it worked well. When part two is activated by pushing the “set button” in part one, then any movement of part two (as a movement of motor cycle by about 20 cm from initial position will cause the alarm sounds continuously. The alarm will be off whenever the “reset button” in part one is pushed. Part one (a remote control can activate part two with a maximum of twelve meter separation apart. This shows that the equipment can be used as a security alarm to prevent the motorcycle to be stolen in the future.

  8. Critical enrichment and critical density of infinite systems for nuclear criticality safety evaluation

    International Nuclear Information System (INIS)

    Naito, Yoshitaka; Koyama, Takashi; Komuro, Yuichi

    1986-03-01

    Critical enrichment and critical density of homogenous infinite systems, such as U-H 2 O, UO 2 -H 2 O, UO 2 F 2 aqueous solution, UO 2 (NO 3 ) 2 aqueous solution, Pu-H 2 O, PuO 2 -H 2 O, Pu(NO 3 ) 4 aqueous solution and PuO 2 ·UO 2 -H 2 O, were calculated with the criticality safety evaluation computer code system JACS for nuclear criticality safety evaluation on fuel facilities. The computed results were compared with the data described in European and American criticality handbooks and showed good agreement with each other. (author)

  9. Proposal for the award of a blanket purchase contract for the design, supply, installation and maintenance of automatic fire-detection, fire-protection and voice-alarm systems for the Super Proton Synchrotron

    CERN Document Server

    2017-01-01

    Proposal for the award of a blanket purchase contract for the design, supply, installation and maintenance of automatic fire-detection, fire-protection and voice-alarm systems for the Super Proton Synchrotron

  10. Alarm points for fixed oxygen monitors

    International Nuclear Information System (INIS)

    Miller, G.C.

    1987-05-01

    Oxygen concentration monitors were installed in a vault where numerous pipes carried inert cryogens and gases to the Mirror Fusion Test Facility (MFTF-B) experimental vessel at Lawrence Livermore National Laboratory (LLNL). The problems associated with oxygen-monitoring systems and the reasons why such monitors were installed were reviewed. As a result of this review, the MFTF-B monitors were set to sound an evacuation alarm when the oxygen concentration fell below 18%. We chose the 18% alarm criterion to minimize false alarms and to allow time for personnel to escape in an oxygen-deficient environment

  11. Systems pathology: a critical review.

    Science.gov (United States)

    Costa, Jose

    2012-02-01

    The technological advances of the last twenty years together with the dramatic increase in computational power have injected new life into systems-level thinking in Medicine. This review emphasizes the close relationship of Systems Pathology to Systems Biology and delineates the differences between Systems Pathology and Clinical Systems Pathology. It also suggests an algorithm to support the application of systems-level thinking to clinical research, proposes applying systems-level thinking to the health care systems and forecasts an acceleration of preventive medicine as a result of the coupling of personal genomics with systems pathology. Copyright © 2011 Federation of European Biochemical Societies. Published by Elsevier B.V. All rights reserved.

  12. Intelligent Transportation Systems : critical standards

    Science.gov (United States)

    1999-06-01

    Intelligent Transportation Systems (ITS) standards are industry-consensus standards that provide the details about how different systems interconnect and communicate information to deliver the ITS user services described in the National ITS Architect...

  13. Achieving Critical System Survivability Through Software Architectures

    National Research Council Canada - National Science Library

    Knight, John C; Strunk, Elisabeth A

    2006-01-01

    .... In a system with a survivability architecture, under adverse conditions such as system damage or software failures, some desirable function will be eliminated but critical services will be retained...

  14. Critical infrastructure systems of systems assessment methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Sholander, Peter E.; Darby, John L.; Phelan, James M.; Smith, Bryan; Wyss, Gregory Dane; Walter, Andrew; Varnado, G. Bruce; Depoy, Jennifer Mae

    2006-10-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies that separately consider physical security and cyber security. This research has developed a risk assessment methodology that explicitly accounts for both physical and cyber security, while preserving the traditional security paradigm of detect, delay, and respond. This methodology also accounts for the condition that a facility may be able to recover from or mitigate the impact of a successful attack before serious consequences occur. The methodology uses evidence-based techniques (which are a generalization of probability theory) to evaluate the security posture of the cyber protection systems. Cyber threats are compared against cyber security posture using a category-based approach nested within a path-based analysis to determine the most vulnerable cyber attack path. The methodology summarizes the impact of a blended cyber/physical adversary attack in a conditional risk estimate where the consequence term is scaled by a ''willingness to pay'' avoidance approach.

  15. Safety-critical Java for embedded systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, René Rydhof

    2016-01-01

    This paper presents the motivation for and outcomes of an engineering research project on certifiable Javafor embedded systems. The project supports the upcoming standard for safety-critical Java, which defines asubset of Java and libraries aiming for development of high criticality systems....... The outcome of this projectinclude prototype safety-critical Java implementations, a time-predictable Java processor, analysis tools formemory safety, and example applications to explore the usability of safety-critical Java for this applicationarea. The text summarizes developments and key contributions...

  16. NCIS: a nuclear criticality information system

    International Nuclear Information System (INIS)

    Koponen, B.L.; Hampel, V.E.

    1984-01-01

    The NCIS is one of the developments carried out to meet the requirements in the field of criticality safety information. Its primary goal is to enhance nuclear criticality safety by dissemination of data, standards, and training material. This paper presents the ''NCIS'' progess since 1950: computer-searching, database management, nuclear critical experiments bibliography. American Nuclear Society transactions criticality safety publications compilation, edition of a personnel directory representing over 140 organizations located in 16 countries and showing a wide range of specialists involved in the field of nuclear criticality safety. The NCIS uses the information management and communication resources of TIS (Technology Information System): automated access procedures; creation of program-dependent information systems; communications. The NCIS is still in a growing, formative stage; it has concentrated first on collecting and organizing the nuclear criticality literature; nuclear critical data, calculational tools, standards, and training materials will follow. Finally the planned and contemplated resources are dealt with: expansion of bibliographic compilations; news database; fundamental criticality safety reference; criticality benchmarck database; user community; training resources; related resources; criticality accident database; dynamic databook; dynamic textbook; expert knowledge system; and, extraction of intelligence

  17. An experimental evaluation of alarm processing and display characteristics

    International Nuclear Information System (INIS)

    O'Hara, J.; Brown, W.; Hallbert, B.; Skraaning, G.Jr.; Persensky, J.; Wachtel, J.

    1998-01-01

    This paper describes a research program sponsored by the U.S. Nuclear Regulatory Commission to address the human factors engineering (HFE) aspects of nuclear power plant alarm systems. The overall objective of the program is to develop HFE review guidance for advanced alarm systems. As part of this program, guidance has been developed based on a broad base of technical and research literature. In the course of guidance development, aspects of alarm system design for which the technical basis was insufficient to support complete guidance development were identified. The primary purpose of the research reported in this paper was to evaluate the effects of three of these alarm system design characteristics on operator performance in order to contribute to the understanding of potential safety issues and to provide data to support the development of design review guidance in these areas. Three alarm system design characteristics studied were (1) alarm processing (degree of alarm reduction), (2) alarm availability (dynamic prioritization and suppression), and (3) alarm display (a dedicated tile format, a mixed tile and message list format, and a format in which alarm information is integrated into the process displays). A secondary purpose was to provide confirmatory evidence of selected alarm system guidance developed in an earlier phase of the project. The alarm characteristics were combined into eight separate experimental conditions. Six, two-person crews of professional nuclear power plant operators participated in the study. Following training, each crew completed 16 test trials which consisted of two trials in each of the eight experimental conditions (one with a low-complexity scenario and one with a high-complexity scenario). Measures of process performance. operator task performance, situation awareness, and workload were obtained. In addition. operator opinions and evaluations of the alarm processing and display conditions were collected. Numerous strengths

  18. Mission-Critical Systems Design Framework

    Directory of Open Access Journals (Sweden)

    Kyriakos Houliotis

    2018-03-01

    Full Text Available Safety-critical systems are well documented and standardized (e.g. IEC 61508, RTCA DO-178B within system design cycles. However in Defence and Security, systems that are critical to the success of a Mission are not defined within the literature nor are there any guidelines in defining criticality in their design or operational capabilities. When it comes to Vetronics (Vehicle Electronics, a mission-critical system, is a system with much complexity and mixed criticality levels that is a part of the overall platform (military vehicle offering integrated system capabilities. In this paper, a framework is presented, providing guidelines in designing efficiently and effectively mission-critical systems considering principles of Interoperable Open Architectures (IOA, mission-critical integrity levels and following new standardization activities such as NATO Generic Vehicle Architecture (NGVA. A Defensive Aid Suite (DAS system is used as a case study to illustrate how this framework can be exploited. The indention of this extension is to provide an approach to precisely estimate threats in order to de-risk missions in the very early stages.

  19. 'Oh, no it isn't!' 'Oh, yes it is!'. The omission of criticality incident detection systems in the UK

    International Nuclear Information System (INIS)

    Thorne, Peter R.; Bowden, Russell L; Venner, Jack

    2003-01-01

    In the UK, the default position is that every process involving fissile material should have a Criticality Incident Detection and Alarm System (CIDAS), unless a robust argument is made that such a system can be omitted. Implementation has been inconsistent and inefficient. In practice decisions appear to be subjective and there are different views and opinions. This paper argues two opposing points of view and presents some simple ground rules. (author)

  20. Sensor fusion for intelligent alarm analysis

    International Nuclear Information System (INIS)

    Nelson, C.L.; Fitzgerald, D.S.

    1996-01-01

    The purpose of an intelligent alarm analysis system is to provide complete and manageable information to a central alarm station operator by applying alarm processing and fusion techniques to sensor information. This paper discusses the sensor fusion approach taken to perform intelligent alarm analysis for the Advanced Exterior Sensor (AES). The AES is an intrusion detection and assessment system designed for wide-area coverage, quick deployment, low false/nuisance alarm operation, and immediate visual assessment. It combines three sensor technologies (visible, infrared, and millimeter wave radar) collocated on a compact and portable remote sensor module. The remote sensor module rotates at a rate of 1 revolution per second to detect and track motion and provide assessment in a continuous 360 degree field-of-regard. Sensor fusion techniques are used to correlate and integrate the track data from these three sensors into a single track for operator observation. Additional inputs to the fusion process include environmental data, knowledge of sensor performance under certain weather conditions, sensor priority, and recent operator feedback. A confidence value is assigned to the track as a result of the fusion process. This helps to reduce nuisance alarms and to increase operator confidence in the system while reducing the workload of the operator

  1. Applying AI techniques to improve alarm display effectiveness

    International Nuclear Information System (INIS)

    Gross, J.M.; Birrer, S.A.; Crosberg, D.R.

    1987-01-01

    The Alarm Filtering System (AFS) addresses the problem of information overload in a control room during abnormal operations. Since operators can miss vital information during these periods, systems which emphasize important messages are beneficial. AFS uses the artificial intelligence (AI) technique of object-oriented programming to filter and dynamically prioritize alarm messages. When an alarm's status changes, AFS determines the relative importance of that change according to the current process state. AFS bases that relative importance on relationships the newly changed alarm has with other activated alarms. Evaluations of a alarm importance take place without regard to the activation sequence of alarm signals. The United States Department of Energy has applied for a patent on the approach used in this software. The approach was originally developed by EG and G Idaho for a nuclear reactor control room

  2. The Level of Europium-154 Contaminating Samarium-153-EDTMP Activates the Radiation Alarm System at the US Homeland Security Checkpoints

    Directory of Open Access Journals (Sweden)

    Mohammed Najeeb Al Hallak

    2009-08-01

    Full Text Available 153Sm-EDTMP is a radiopharmaceutical composed of EDTMP (ethylenediamine-tetramethylenephosphonate and Samarium-153 [1]. 153Sm-EDTMP has an affinity for skeletal tissue and concentrates in areas with increased bone turnover; thus, it is successfully used in relieving pain related to diffuse bone metastases [1]. The manufacturing process of 153Sm-EDTMP leads to contamination with 154Eu (Europium-154 [2]. A previous study only alluded to the retention of 154Eu in the bones after receiving treatment with 153Sm-EDTMP [2]. Activation of the alarm at security checkpoints after 153Sm-EDTMP therapy has not been previously reported. Two out of 15 patients who received 153Sm-EDTMP at Roger Maris Cancer Center (Fargo, N. Dak., USA activated the radiation activity sensors while passing through checkpoints; one at a US airport and the other while crossing theAmerican-Canadian border. We assume that the 154Eu which remained in the patients’ bones activated the sensors. Methods: In order to investigate this hypothesis, we obtained the consent from 3 of our 15 patients who received 153Sm-EDTMP within the previous 4 months to 2 years, including the patient who had activated the radiation alarm at the airport. The patients were scanned with a handheld detector and a gamma camera for energies from 511 keV to 1.3 MeV. Results: All three patients exhibited identical spectral images, and further analysis showed that the observed spectra are the result of 154Eu emissions. Conclusion: Depending on the detection thresholds and windows used by local and federal authorities, the remaining activity of 154Eu retained in patients who received 153Sm-EDTMP could be sufficient enough to increase the count rates above background levels and activate the sensors. At Roger Maris Cancer Center, patients are now informed of the potential consequences of 153Sm-EDTMP therapy prior to initiating treatment. In addition, patients treated with 153Sm-EDTMP at Roger Maris Cancer Center

  3. Lack of Critical Slowing Down Suggests that Financial Meltdowns Are Not Critical Transitions, yet Rising Variability Could Signal Systemic Risk

    Science.gov (United States)

    Hoarau, Quentin

    2016-01-01

    Complex systems inspired analysis suggests a hypothesis that financial meltdowns are abrupt critical transitions that occur when the system reaches a tipping point. Theoretical and empirical studies on climatic and ecological dynamical systems have shown that approach to tipping points is preceded by a generic phenomenon called critical slowing down, i.e. an increasingly slow response of the system to perturbations. Therefore, it has been suggested that critical slowing down may be used as an early warning signal of imminent critical transitions. Whether financial markets exhibit critical slowing down prior to meltdowns remains unclear. Here, our analysis reveals that three major US (Dow Jones Index, S&P 500 and NASDAQ) and two European markets (DAX and FTSE) did not exhibit critical slowing down prior to major financial crashes over the last century. However, all markets showed strong trends of rising variability, quantified by time series variance and spectral function at low frequencies, prior to crashes. These results suggest that financial crashes are not critical transitions that occur in the vicinity of a tipping point. Using a simple model, we argue that financial crashes are likely to be stochastic transitions which can occur even when the system is far away from the tipping point. Specifically, we show that a gradually increasing strength of stochastic perturbations may have caused to abrupt transitions in the financial markets. Broadly, our results highlight the importance of stochastically driven abrupt transitions in real world scenarios. Our study offers rising variability as a precursor of financial meltdowns albeit with a limitation that they may signal false alarms. PMID:26761792

  4. The application of VMEbus system to the safety related parameters indication and alarm system for nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Chul Kwon; Koo, In Soo; Jang, Gwi Sook; Shin, Jae Hwal

    1996-12-01

    This report presents the basic feature, the status of technical development, and it`s application for the VMEbus which has been utilized in industrial application such as controller, robotics, automation control. The application software of VMEbus is also reviewed. The design considerations are presented when applying the system to the instrumentation and control technique of nuclear power plants. The conceptual design of safety related parameter using the integrated VMEbus system. The results indicate that the application of VMEbus has advantages such as easy maintenance, accurate and reliable operation, easy expansion and upgrade. Also, the integrated VMEbus system is capable of limited real-time processing because it can be processed by multi-processors and can reduce the effort of software development by using off-the-shelf software. However, the adoption of digital system is produced problems such as software common mode failure, EMI and RFI, and verification and validation methods of off-the-shelf hardware and software. To resolve these problems in the future, further research are required. (author). 7 tabs., 19 figs., 24 refs.

  5. The application of VMEbus system to the safety related parameters indication and alarm system for nuclear power plants

    International Nuclear Information System (INIS)

    Lee, Chul Kwon; Koo, In Soo; Jang, Gwi Sook; Shin, Jae Hwal.

    1996-12-01

    This report presents the basic feature, the status of technical development, and it's application for the VMEbus which has been utilized in industrial application such as controller, robotics, automation control. The application software of VMEbus is also reviewed. The design considerations are presented when applying the system to the instrumentation and control technique of nuclear power plants. The conceptual design of safety related parameter using the integrated VMEbus system. The results indicate that the application of VMEbus has advantages such as easy maintenance, accurate and reliable operation, easy expansion and upgrade. Also, the integrated VMEbus system is capable of limited real-time processing because it can be processed by multi-processors and can reduce the effort of software development by using off-the-shelf software. However, the adoption of digital system is produced problems such as software common mode failure, EMI and RFI, and verification and validation methods of off-the-shelf hardware and software. To resolve these problems in the future, further research are required. (author). 7 tabs., 19 figs., 24 refs

  6. Criticality and entanglement in random quantum systems

    International Nuclear Information System (INIS)

    Refael, G; Moore, J E

    2009-01-01

    We review studies of entanglement entropy in systems with quenched randomness, concentrating on universal behavior at strongly random quantum critical points. The disorder-averaged entanglement entropy provides insight into the quantum criticality of these systems and an understanding of their relationship to non-random ('pure') quantum criticality. The entanglement near many such critical points in one dimension shows a logarithmic divergence in subsystem size, similar to that in the pure case but with a different universal coefficient. Such universal coefficients are examples of universal critical amplitudes in a random system. Possible measurements are reviewed along with the one-particle entanglement scaling at certain Anderson localization transitions. We also comment briefly on higher dimensions and challenges for the future.

  7. Validation Of Critical Knowledge-Based Systems

    Science.gov (United States)

    Duke, Eugene L.

    1992-01-01

    Report discusses approach to verification and validation of knowledge-based systems. Also known as "expert systems". Concerned mainly with development of methodologies for verification of knowledge-based systems critical to flight-research systems; e.g., fault-tolerant control systems for advanced aircraft. Subject matter also has relevance to knowledge-based systems controlling medical life-support equipment or commuter railroad systems.

  8. NCIS - a Nuclear Criticality Information System (overview)

    International Nuclear Information System (INIS)

    Koponen, B.L.; Hampel, V.E.

    1983-07-01

    A Nuclear Criticality Information System (NCIS) is being established at the Lawrence Livermore National Laboratory (LLNL) in order to serve personnel responsible for safe storage, transport, and handling of fissile materials and those concerned with the evaluation and analysis of nuclear, critical experiments. Public concern for nuclear safety provides the incentive for improved access to nuclear safety information

  9. Critical Thresholds in Earth-System Dynamics

    Science.gov (United States)

    Rothman, D.

    2017-12-01

    The history of the Earth system is a story of change. Some changesare gradual and benign, but others, especially those associated withcatastrophic mass extinction, are relatively abrupt and destructive.What sets one group apart from the other? Here I hypothesize thatperturbations of Earth's carbon cycle lead to mass extinction if theyexceed either a critical rate at long time scales or a critical sizeat short time scales. By analyzing 31 carbon-isotopic events duringthe last 542 million years, I identify the critical rate with a limitimposed by mass conservation. Further analysis identifies thecrossover timescale separating fast from slow events with thetimescale of the ocean's homeostatic response to a change in pH. Theproduct of the critical rate and the crossover timescale then yieldsthe critical size. The modern critical size for the marine carboncycle is roughly similar to the mass of carbon that human activitieswill likely have added to the oceans by the year 2100.

  10. System Predicts Critical Runway Performance Parameters

    Science.gov (United States)

    Millen, Ernest W.; Person, Lee H., Jr.

    1990-01-01

    Runway-navigation-monitor (RNM) and critical-distances-process electronic equipment designed to provide pilot with timely and reliable predictive navigation information relating to takeoff, landing and runway-turnoff operations. Enables pilot to make critical decisions about runway maneuvers with high confidence during emergencies. Utilizes ground-referenced position data only to drive purely navigational monitor system independent of statuses of systems in aircraft.

  11. Critical infrastructure system security and resiliency

    CERN Document Server

    Biringer, Betty; Warren, Drake

    2013-01-01

    Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents a practical methodology for developing an effective protection system that can either prevent undesired events or mitigate the consequences of such events.Developed at Sandia National Labs, the authors' analytical approach and

  12. Critical Points in Distance Learning System

    Directory of Open Access Journals (Sweden)

    Airina Savickaitė

    2013-08-01

    Full Text Available Purpose – This article presents the results of distance learning system analysis, i.e. the critical elements of the distance learning system. The critical points of distance learning are a part of distance education online environment interactivity/community process model. The most important is the fact that the critical point is associated with distance learning participants. Design/methodology/approach – Comparative review of articles and analysis of distance learning module. Findings – A modern man is a lifelong learner and distance learning is a way to be a modern person. The focus on a learner and feedback is the most important thing of learning distance system. Also, attention should be paid to the lecture-appropriate knowledge and ability to convey information. Distance system adaptation is the way to improve the learner’s learning outcomes. Research limitations/implications – Different learning disciplines and learning methods may have different critical points. Practical implications – The information of analysis could be important for both lecturers and students, who studies distance education systems. There are familiar critical points which may deteriorate the quality of learning. Originality/value – The study sought to develop remote systems for applications in order to improve the quality of knowledge. Keywords: distance learning, process model, critical points. Research type: review of literature and general overview.

  13. Critical Incident Reporting Systems: Perceived Competing Social ...

    African Journals Online (AJOL)

    The safe operation of complex socio-technical systems is dependent upon the reporting of safety critical incidents by operators within a system. Through the action of reporting, systems develop the capability as a learning organisation to improve human and organisational performance. The aim of the study is therefore to ...

  14. The Nuclear Criticality Information System: An update

    International Nuclear Information System (INIS)

    Koponen, B.L.

    1991-07-01

    The US Department of Energy's Nuclear Criticality Information System (NCIS) has served the criticality community for the past ten years with publications and with an online information system. NCIS provides a mean for widely distributed nuclear criticality specialists to communicate and work together instantly. Users of the system may receive assistance from all members of the NCIS community, which provides a much broader base of support than is available at any single site. When unified by NCIS, these diverse specialists provide a resource that has proven to be very useful in the safe handling of fissile material. NCIS also is a source of current nuclear criticality safety information; the rapid access of such up-to-date information on the handling of fissile materials outside of nuclear reactors is international in scope, extending beyond political and geographical boundaries

  15. Classification of alarm processing techniques and human performance issues

    International Nuclear Information System (INIS)

    Kim, I.S.; O'Hara, J.M.

    1993-01-01

    Human factors reviews indicate that conventional alarm systems based on the one sensor, one alarm approach, have many human engineering deficiencies, a paramount example being too many alarms during major disturbances. As an effort to resolve these deficiencies, various alarm processing systems have been developed using different techniques. To ensure their contribution to operational safety, the impacts of those systems on operating crew performance should be carefully evaluated. This paper briefly reviews some of the human factors research issues associated with alarm processing techniques and then discusses a framework with which to classify the techniques. The dimensions of this framework can be used to explore the effects of alarm processing systems on human performance

  16. Classification of alarm processing techniques and human performance issues

    Energy Technology Data Exchange (ETDEWEB)

    Kim, I.S.; O' Hara, J.M.

    1993-01-01

    Human factors reviews indicate that conventional alarm systems based on the one sensor, one alarm approach, have many human engineering deficiencies, a paramount example being too many alarms during major disturbances. As an effort to resolve these deficiencies, various alarm processing systems have been developed using different techniques. To ensure their contribution to operational safety, the impacts of those systems on operating crew performance should be carefully evaluated. This paper briefly reviews some of the human factors research issues associated with alarm processing techniques and then discusses a framework with which to classify the techniques. The dimensions of this framework can be used to explore the effects of alarm processing systems on human performance.

  17. Classification of alarm processing techniques and human performance issues

    Energy Technology Data Exchange (ETDEWEB)

    Kim, I.S.; O`Hara, J.M.

    1993-05-01

    Human factors reviews indicate that conventional alarm systems based on the one sensor, one alarm approach, have many human engineering deficiencies, a paramount example being too many alarms during major disturbances. As an effort to resolve these deficiencies, various alarm processing systems have been developed using different techniques. To ensure their contribution to operational safety, the impacts of those systems on operating crew performance should be carefully evaluated. This paper briefly reviews some of the human factors research issues associated with alarm processing techniques and then discusses a framework with which to classify the techniques. The dimensions of this framework can be used to explore the effects of alarm processing systems on human performance.

  18. Complex programmable logic device based alarm sequencer for nuclear power plants

    International Nuclear Information System (INIS)

    Khedkar, Ravindra; Solomon, J. Selva; KrishnaKumar, B.

    2001-01-01

    Complex Programmable Logic Device based Alarm Sequencer is an instrument, which detects alarms, memorizes them and displays the sequences of occurrence of alarms. It caters to sixteen alarm signals and distinguishes the sequence among any two alarms with a time resolution of 1 ms. The system described has been designed for continuous operation in process plants, nuclear power plants etc. The system has been tested and found to be working satisfactorily. (author)

  19. General methods for alarm reduction; Larmsanering med generella metoder

    Energy Technology Data Exchange (ETDEWEB)

    Ahnlund, Jonas; Bergquist, Tord; Raaberg, Martin [Lund Univ. (Sweden). Dept. of Information Technology

    2003-10-01

    The information in the control rooms has increased due to the technological advances in process control. Large industries produce large data quantities, where some information is unnecessary or even incorrect. The operator needs support from an advanced and well-adjusted alarm system to be able to separate a real event from a minor disturbance. The alarms must be of assistance and not a nuisance. An enhanced alarm situation qualifies an increased efficiency with fewer production disturbances and an improved safety. Yet, it is still unusual that actions are taken to improve the situation. An alarm cleanup with general methods can shortly be described as taking advantage of the control systems built-in functions, the possibility to modify or create function blocks and fine-tune the settings in the alarm system. In this project, we make use of an intelligent software, Alarm Cleanup Toolbox, that simulate different signal processing methods and tries to find improved settings on all the signals in the process. This is a fast and cost-efficient way to improve the overall alarm situation, and lays a foundation for more advanced alarm systems. An alarm cleanup has been carried out at Flintraennan district heating plant in Malmoe, where various signal processing methods has been implemented in a parallel alarm system. This made it possible to compare the two systems under the same conditions. The result is very promising, and shows that a lot of improvements can be achieved with very little effort. An analysis of the alarm system at Vattenreningen (the water purification process) at Heleneholmsverket in Malmoe has been carried out. Alarm Cleanup Toolbox has, besides suggesting improved settings, also found logical errors in the alarm system. Here, no implementation was carried out and therefore the results are analytical, but they validate the efficiency of the general methods. The project has shown that an alarm cleanup with general methods is cost-efficient, and that the

  20. Alarm management in gas pipeline plant: a case study

    Energy Technology Data Exchange (ETDEWEB)

    Araujo, Juliano; Lima, Marcelo; Leitao, Gustavo; Guedes, Luiz Affonso [Universidade Federal do Rio Grande do Norte (UFRN), Natal, RN (Brazil); Branco, Nicolau; Coelho, Robson; Elias, Gustavo Passos; Nunes, Marcelo [Transportadora Brasileira Gasoduto Bolivia-Brasil (TBG), Rio de Janeiro, RJ (Brazil)

    2009-07-01

    In order to improve the requirements of industrial processes, many decision support systems have been introduced in recent years. In this context, the alarm management systems have great relevance. On the other hand, the informatics revolution allowed a great increase of information concerning the operation of the industrial processes. Currently, process operators handle an excessive number of about 1.500 alarms per day. Thus, this overdose of information implies in the discredit of alarms. Then, in order to improve the operation activities of industrial processes, it is mandatory to incorporate procedures to evaluate and rationalize alarms. Since the EMMUA191 Standard is the reference guide to alarm management, but it does not specify how to execute an alarm management procedure, in this paper, a systematic procedure to evaluate alarms configurations in industrial processes is proposed. This procedure is in line with EMMUA191 and is composed by the following steps: to use statistics analyses to identify problematic alarms, such as occurrence, intermittency, correlation, and flooding calculation; to indicate problematic alarm group; and to propose a set of actions to be implemented. To validate our proposal, we present a case study in a gas pipeline plant using the BR-AlarmExpert software. (author)

  1. Critical care nursing: Embedded complex systems.

    Science.gov (United States)

    Trinier, Ruth; Liske, Lori; Nenadovic, Vera

    2016-01-01

    Variability in parameters such as heart rate, respiratory rate and blood pressure defines healthy physiology and the ability of the person to adequately respond to stressors. Critically ill patients have lost this variability and require highly specialized nursing care to support life and monitor changes in condition. The critical care environment is a dynamic system through which information flows. The critical care unit is typically designed as a tree structure with generally one attending physician and multiple nurses and allied health care professionals. Information flow through the system allows for identification of deteriorating patient status and timely interventionfor rescue from further deleterious effects. Nurses provide the majority of direct patient care in the critical care setting in 2:1, 1:1 or 1:2 nurse-to-patient ratios. The bedside nurse-critically ill patient relationship represents the primary, real-time feedback loop of information exchange, monitoring and treatment. Variables that enhance information flow through this loop and support timely nursing intervention can improve patient outcomes, while barriers can lead to errors and adverse events. Examining patient information flow in the critical care environment from a dynamic systems perspective provides insights into how nurses deliver effective patient care and prevent adverse events.

  2. Alarm personal dosemeter

    International Nuclear Information System (INIS)

    Nunomiya, Tomoya; Yamauchi, Hideshi; Shibata, Tetsuo

    2007-01-01

    Fuji Electric advanced the development of the conventional alarm personal dosemeter (APD) by adopting JIS Z 4312 (2002), which reflects IEC61526 (1998), and by improving the radiation performance characteristics, electromagnetic performance characteristics and mechanical performance characteristics of the APD (acquiring a CE marking). This new dosemeter will target overseas market in the future. The APD is a suitable dosemeter for detecting and monitoring radiation exposure to personnel working in the controlled areas of nuclear facilities, such as nuclear power stations. The APD product line includes 'gamma ray', 'gamma ray + beta ray' and 'gamma ray + neutron' models. (author)

  3. 75 FR 5146 - Hewlett Packard Company Business Critical Systems, Mission Critical Business Software Division...

    Science.gov (United States)

    2010-02-01

    ... Packard Company Business Critical Systems, Mission Critical Business Software Division, OpenVMS Operating... Colorado, Marlborough, MA; Hewlett Packard Company Business Critical Systems, Mission Critical Business... Assistance on August 27, 2009, applicable to workers of Hewlett Packard Company, Business Critical Systems...

  4. FAULT DIAGNOSIS WITH MULTI-STATE ALARMS IN A NUCLEAR POWER CONTROL SIMULATOR

    Energy Technology Data Exchange (ETDEWEB)

    Austin Ragsdale; Roger Lew; Brian P. Dyre; Ronald L. Boring

    2012-10-01

    This research addresses how alarm systems can increase operator performance within nuclear power plant operations. The experiment examined the effect of two types of alarm systems (two-state and three-state alarms) on alarm compliance and diagnosis for two types of faults differing in complexity. We hypothesized three-state alarms would improve performance in alarm recognition and fault diagnoses over that of two-state alarms. We used sensitivity and criterion based on Signal Detection Theory to measure performance. We further hypothesized that operator trust would be highest when using three-state alarms. The findings from this research showed participants performed better and had more trust in three-state alarms compared to two-state alarms. Furthermore, these findings have significant theoretical implications and practical applications as they apply to improving the efficiency and effectiveness of nuclear power plant operations.

  5. AI-based alarm processing for a nuclear power plant

    International Nuclear Information System (INIS)

    Na, N.J.; Kim, I.S.; Hwang, I.K.; Lee, D.Y.; Ham, C.S.

    1996-01-01

    A real-time expert system is implemented using artificial intelligence and object-oriented technology for alarm processing and presentation in a nuclear power plant. The knowledge base is constructed based on some schemes to process and display alarms to the plant operators. The activated alarms are dynamically prioritized by the reasoning rules, and then, presented on the process mimic overview and by some other means. To demonstrate the proposed system, the alarm processing and presentation is carried out in a simulated environment of the TMI-2 accident

  6. Testing alarm resolution procedures in a fuel fabrication facility

    International Nuclear Information System (INIS)

    Smith, B.W.; Razvi, J.

    1984-07-01

    Process monitoring data can be used for generating material loss estimates. The intent of using process control data is to enhance nuclear material control and accounting for the timely detection and resolution of discrepancies. The purpose of an alarm resolution system is to distinguish between system errors and an actual loss of nuclear material. A study has been performed to develop and test a site-specific set of alarm resolution procedures. The results of the study are described and include the frequency of alarms, the causes of alarms, the type of resolution, and the modeling of loss estimates. 3 references, 2 figures, 2 tables

  7. Critically Important Object Security System Element Model

    Directory of Open Access Journals (Sweden)

    I. V. Khomyackov

    2012-03-01

    Full Text Available A stochastic model of critically important object security system element has been developed. The model includes mathematical description of the security system element properties and external influences. The state evolution of the security system element is described by the semi-Markov process with finite states number, the semi-Markov matrix and the initial semi-Markov process states probabilities distribution. External influences are set with the intensity of the Poisson thread.

  8. An evaluation approach for alarm processing improvement

    International Nuclear Information System (INIS)

    Kim, Jung-Taek; Lee, Dong-Young; Hwang, In-Koo; Park, Jae-Chang

    1997-01-01

    In light of the need to improve MMIS of NPPs, the advanced I and C research team of KAERI has embarked on developing an Alarm and Diagnosis-Integrated Operator Support System, called ADIOS, to filter or suppress unnecessary or nuisance alarms and diagnose abnormality of the plant process. ADIOS has been built in an object-oriented AI environment of G-2 expert system software tool, as presented in a companion paper. ADIOS then is evaluated according to the plan in three steps; (1) preliminary tests to refine the knowledge base and inference structure of ADIOS in such a dynamic environment, and also to evaluate the appropriateness of alarm-processing algorithms; (2) to ensure correctness, consistency, and completeness in the knowledge base using COKEP (Checker Of Knowledge base using Extended Petri net); and (3) the cognitive performance evaluation using the Simulation Analyzer with a Cognitive Operator Model (SACOM) in the KAERI's Integrated Test Facility (ITF). (author). 5 figs, 1 tab

  9. Systems biology in critical-care nursing.

    Science.gov (United States)

    Schallom, Lynn; Thimmesch, Amanda R; Pierce, Janet D

    2011-01-01

    Systems biology applies advances in technology and new fields of study including genomics, transcriptomics, proteomics, and metabolomics to the development of new treatments and approaches of care for the critically ill and injured patient. An understanding of systems biology enhances a nurse's ability to implement evidence-based practice and to educate patients and families on novel testing and therapies. Systems biology is an integrated and holistic view of humans in relationship with the environment. Biomarkers are used to measure the presence and severity of disease and are rapidly expanding in systems biology endeavors. A systems biology approach using predictive, preventive, and participatory involvement is being utilized in a plethora of conditions of critical illness and injury including sepsis, cancer, pulmonary disease, and traumatic injuries.

  10. A critical incident reporting system in anaesthesia.

    Science.gov (United States)

    Madzimbamuto, F D; Chiware, R

    2001-01-01

    To audit the recently established Critical Incident Reporting System in the Department of Anaesthesia and Critical Care Medicine, University of Zimbabwe Medical School. The system was set up with the purpose of improving the quality of care delivered by the department. Cross sectional study. A critical incident was defined as 'any adverse and reversible event in theatre, during or immediately after surgery that if it persisted without correction would cause harm to the patient'. The anaesthetic or recovery room staff filled a critical incident form anonymously. Data was collected from critical incident reporting forms for analysis. The anaesthetic service in the two teaching hospitals of Harare Central and Parirenyatwa General Hospitals. Between May and October 2000, 62 completed critical incident forms were collected. The nature of the incident and the monitoring used were recorded, the cause was classified as human, equipment or monitoring failure and the outcome for each patient reported. There was no formal system for reminding staff to fill in their critical incident forms. A total of 14,165 operations were performed over the reporting period: 62 critical incident forms were collected, reporting 130 incidents, giving a rate of 0.92% (130/14,165). Of these, 42 patients were emergencies and 20 elective. The incidents were hypotension, hypoxia, bradycardia, ECG changes, aspiration, laryngospasm, high spinal, and cardiac arrest. Monitoring present on patients who had critical incidents was: capnography 57%, oxymetry 90% and ECG 100%. Other monitors are not reported. Human error contributed in 32/62 of patients and equipment failure in 31/62 of patients. Patient outcome showed 15% died, 23% were unplanned admissions to HDU while 62% were discharged to the ward with little or no adverse outcome. Despite some under reporting, the critical incident rate was within the range reported in the literature. Supervision of juniors is not adequate, especially on call. The

  11. Framework for analyzing safeguards alarms and response decisions

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Judd, B.R.; McCord, R.K.

    1982-01-01

    This paper describes a quantitative approach to help evaluate and respond to safeguards alarms. These alrms may be generated internally by a facility's safeguards systems or externally by individuals claiming to possess stolen Special Nuclear Material (SNM). This approach can be used to identify the most likely cause of an alarm - theft, hoax, or error - and to evaluate alternative responses to alarms. Possible responses include conducting investigations, initiating measures to recover stolen SNM, and replying to external threats. Based on the results of each alarm investigation step, the evaluation revises the likelihoods of possible causes of an alarm, and uses this information to determine the optimal sequence of further responses. The choice of an optimal sequence of responses takes into consideration the costs and benefits of successful thefts or hoaxes. These results provide an analytical basis for setting priorities and developing contingency plans for responding to safeguards alarms

  12. Resolution of alarms for loss of bulk nuclear material

    International Nuclear Information System (INIS)

    Eggers, R.F.; Davenport, L.C.

    1982-01-01

    Under methods of material accountability considered in the NRC's Reform Amendment (Federal Register, 46(175):45144 to 45151 dated September 10, 1981) prompt detection of losses and resolution of alarms play a central role in the day-to-day activities of the Material Control and Accounting (MC and A) System. This paper will discuss the two basic pathways of alarm resolution, namely, verification of the magnitude of the loss indicated by the initial alarm, and detection of deliberate or accidental accounting discrepancies. Progress along these pathways leads to a consensus that either (1) a loss occurred, (2) the original alarm was caused by MC and A error, or (3) the cause of the original alarm is uncertain. Three phases of response will be outlined and an example of response to alarms will be given for a mixed oxide powder processing control unit

  13. Critical Systems Thinking on Decentralization: the Corporate ...

    African Journals Online (AJOL)

    This article calls for the devolution of power by large organizations to their subsidiaries or subordinate units – mainly Strategic Business Units (SBUs). It proposes more decentralized models of management and outlines a new theory taking a critical systems thinking approach. Corporations are advised to attack and ...

  14. Critical opalescence in the pure Coulomb system

    Energy Technology Data Exchange (ETDEWEB)

    Bobrov, V.B., E-mail: vic5907@mail.r [Joint Institute for High Temperatures, Russian Academy of Sciences, Izhorskaia St., 13, Bd. 2. Moscow 125412 (Russian Federation); Trigger, S.A., E-mail: satron@mail.r [Joint Institute for High Temperatures, Russian Academy of Sciences, Izhorskaia St., 13, Bd. 2. Moscow 125412 (Russian Federation); Institut fuer Physik, Humboldt-Universitaet zu Berlin, Newtonstrasse 15, D-12489 Berlin (Germany)

    2011-04-18

    Highlights: The review of the critical opalescence problem is presented. Light scattering in a two-component electron-nuclear system is studied. The exact relations between the structure factors and compressibility are found. The obtained relations are valid for strong interaction for the Coulomb systems. The experimental verification of these relations is possible for various elements. - Abstract: Based on the dielectric formalism and quantum field theory methods, the phenomenon of critical opalescence is explained for light scattering in pure matter as a two-component electron-nuclear system with Coulomb interaction. A similar phenomenon is shown to occur in the case of neutron scattering in pure substances as well. The obtained results are valid for quantum case and arbitrary strong Coulomb interaction. Thus, the relations between structure factors derived for the electron-nuclear system are the exact result of the quantum statistical mechanics.

  15. Critical opalescence in the pure Coulomb system

    International Nuclear Information System (INIS)

    Bobrov, V.B.; Trigger, S.A.

    2011-01-01

    Highlights: → The review of the critical opalescence problem is presented. → Light scattering in a two-component electron-nuclear system is studied. → The exact relations between the structure factors and compressibility are found. → The obtained relations are valid for strong interaction for the Coulomb systems. → The experimental verification of these relations is possible for various elements. - Abstract: Based on the dielectric formalism and quantum field theory methods, the phenomenon of critical opalescence is explained for light scattering in pure matter as a two-component electron-nuclear system with Coulomb interaction. A similar phenomenon is shown to occur in the case of neutron scattering in pure substances as well. The obtained results are valid for quantum case and arbitrary strong Coulomb interaction. Thus, the relations between structure factors derived for the electron-nuclear system are the exact result of the quantum statistical mechanics.

  16. The critical care cascade: a systems approach.

    Science.gov (United States)

    Ghosh, Rishi; Pepe, Paul

    2009-08-01

    To emphasize the evolving body of evidence that supports the need for a more seamless and interconnected continuum of patient care for a growing compendium of critical care conditions, starting in the prehospital and emergency department (ED) phases of management and continuing through ICU and rehabilitation services. The care of critically ill and injured patients has become increasingly complex. It now has been demonstrated that, for a number of such critical care conditions, optimal management not only relies heavily on the talents of highly coordinated, multidisciplinary teams, but it also may require shared responsibilities across a continuum of longitudinal care involving numerous specialties and departments. This continuum usually needs to begin in the prehospital and ED settings with management extending through specialized in-hospital diagnostic and interventional suites to traditional ICU and rehabilitation programs. In recent years, examples of these conditions have included the development of systems of care for trauma, cardiac arrest, myocardial infarction, stroke, sepsis syndromes, toxicology and other critical illnesses. Although the widespread implementation of such multidisciplinary, multispecialty critical care cascades of care has been achieved most commonly in trauma care, current healthcare delivery systems generally tend to employ compartmentalized organization for the majority of other critical care patients. Accordingly, optimal systematic care often breaks down in the management of these complex patients due to barriers such as lack of interoperable communication between teams, disjointed transfers between services, unnecessary time-consuming, re-evaluations and transitional pauses in time-dependent circumstances, deficiencies in cross-disciplinary education and quality assurance loops, and significant variability in patient care practices. Such barriers can lead to adverse outcomes in this fragile patient population. This article discusses

  17. Microservices: Migration of a Mission Critical System

    OpenAIRE

    Dragoni, Nicola; Dustdar, Schahram; Larsen, Stephan T.; Mazzara, Manuel

    2017-01-01

    The microservices paradigm aims at changing the way in which software is perceived, conceived and designed. One of the foundational characteristics of this new promising paradigm, compared for instance to monolithic architectures, is scalability. In this paper, we present a real world case study in order to demonstrate how scalability is positively affected by re-implementing a monolithic architecture into microservices. The case study is based on the FX Core system, a mission critical system...

  18. Security for safety critical space borne systems

    Science.gov (United States)

    Legrand, Sue

    1987-01-01

    The Space Station contains safety critical computer software components in systems that can affect life and vital property. These components require a multilevel secure system that provides dynamic access control of the data and processes involved. A study is under way to define requirements for a security model providing access control through level B3 of the Orange Book. The model will be prototyped at NASA-Johnson Space Center.

  19. Safety-Critical Java for Embedded Systems

    DEFF Research Database (Denmark)

    Rios Rivas, Juan Ricardo

    for Java aims at providing a reduced set of the Java programming language that can be used for systems that need to be certified at the highest levels of criticality. Safety-critical Java (SCJ) restricts how a developer can structure an application by providing a specific programming model...... and by restricting the set of methods and libraries that can be used. Furthermore, its memory model do not use a garbage-collected heap but scoped memories. In this thesis we examine the use of the SCJ specification through an implementation in a time-predictable, FPGA-based Java processor. The specification is now...

  20. The octopus burnup and criticality code system

    Energy Technology Data Exchange (ETDEWEB)

    Kloosterman, J.L.; Kuijper, J.C. [Netherlands Energy Research Foundation (ECN), Petten (Netherlands); Leege, P.F.A. de

    1996-09-01

    The OCTOPUS burnup and criticality code system is described. This system links the spectrum codes from the SCALE4.1, WIMS7 and MCNP4A packages to the ORIGEN-S and FISPACT4.2 fuel depletion and activation codes, which enables us to perform very accurate burnup calculations in complicated three-dimensional geometries. The data used by all codes are consistently based on the JEF2.2 evaluated nuclear data file. Some special features of OCTOPUS not available in other codes are described, as well as the validation of the system. (author)

  1. The OCTOPUS burnup and criticality code system

    Energy Technology Data Exchange (ETDEWEB)

    Kloosterman, J.L. [Netherlands Energy Research Foundation (ECN), Petten (Netherlands); Kuijper, J.C. [Netherlands Energy Research Foundation (ECN), Petten (Netherlands); Leege, P.F.A. de [Technische Univ. Delft (Netherlands). Interfacultair Reactor Inst.

    1996-06-01

    The OCTOPUS burnup and criticality code system is described. This system links the spectrum codes from the SCALE4.1, WIMS7 and MCNP4A packages to the ORIGEN-S and FISPACT4.2 fuel depletion and activation codes, which enables us to perform very accurate burnup calculations in complicated three-dimensional goemetries. The data used by all codes are consistently based on the JEF2.2 evaluated nuclear data file. Some special features of OCTOPUS not available in other codes are described, as well as the validation of the system. (orig.).

  2. The octopus burnup and criticality code system

    International Nuclear Information System (INIS)

    Kloosterman, J.L.; Kuijper, J.C.; Leege, P.F.A. de.

    1996-01-01

    The OCTOPUS burnup and criticality code system is described. This system links the spectrum codes from the SCALE4.1, WIMS7 and MCNP4A packages to the ORIGEN-S and FISPACT4.2 fuel depletion and activation codes, which enables us to perform very accurate burnup calculations in complicated three-dimensional geometries. The data used by all codes are consistently based on the JEF2.2 evaluated nuclear data file. Some special features of OCTOPUS not available in other codes are described, as well as the validation of the system. (author)

  3. The OCTOPUS burnup and criticality code system

    International Nuclear Information System (INIS)

    Kloosterman, J.L.; Kuijper, J.C.; Leege, P.F.A. de

    1996-06-01

    The OCTOPUS burnup and criticality code system is described. This system links the spectrum codes from the SCALE4.1, WIMS7 and MCNP4A packages to the ORIGEN-S and FISPACT4.2 fuel depletion and activation codes, which enables us to perform very accurate burnup calculations in complicated three-dimensional goemetries. The data used by all codes are consistently based on the JEF2.2 evaluated nuclear data file. Some special features of OCTOPUS not available in other codes are described, as well as the validation of the system. (orig.)

  4. 46 CFR 95.15-30 - Alarms.

    Science.gov (United States)

    2010-10-01

    ... navigated, other than paint and lamp lockers and similar small spaces, shall be fitted with an approved... only for systems required to be fitted with a delayed discharge. Such alarms shall be so arranged as to sound during the 20 second delay period prior to the discharge of carbon dioxide into the space, and the...

  5. Development experience and strategy for the combined algorithm on the alarm processing and diagnosis

    International Nuclear Information System (INIS)

    Chung, Hak-Yeong

    1997-01-01

    In this paper, I presented the development experience on the alarm processing and fault diagnosis which has been achieved from early 1988 to late 1995. The scope covered is the prototype stage, the development stage of on-line operator-aid system, and an intelligent human-machine interface system. In the second part, I proposed a new method (APEXS) of multi-alarm processing to select the causal alarm(s) among occurred alarms by using the time information of each occurred alarm and alarm tree knowledge and the corresponding diagnosis method based on the selected causal alarm(s) by using the prescribed qualitative model. With more knowledge base about the plant and some modification suitable for real environment, APEXS will be able to adapt to a real steam power plant. (author). 18 refs, 3 figs, 1 tab

  6. Percolation Systems away from the Critical Point

    OpenAIRE

    Dhar, Deepak

    2001-01-01

    This article reviews some effects of disorder in percolation systems even away from the critical density p_c. For densities below p_c, the statistics of large clusters defines the animals problem. Its relation to the directed animals problem and the Lee-Yang edge singularity problem is described. Rare compact clusters give rise to Griffiths singuraties in the free energy of diluted ferromagnets, and lead to a very slow relaxation of magnetization. In biassed diffusion on percolation clusters,...

  7. Method of controlling thermo-catalytic explosion alarms in mine monitoring systems. Verfahren zur Kontrolle von thermokatalytischen Schlagwetteranzeiger in Bergwerks-Ueberwachungssystemen

    Energy Technology Data Exchange (ETDEWEB)

    Karpov, E F; Birenberg, I E; Basovsky, B I; Popov, V V

    1979-09-06

    The test procedure for thermo-catalytic explosion alarms for the remote measurement of the methane concentration was changed, so that the readiness of the explosion alarm to operate or faults in it could be measured remotely above ground, without the use of named gas mixtures or master gas analysis equipment. The maximum output signal of indicators is determined simultaneously with switching on the indicators and applying the voltage to the sensors, and its dynamic response characteristic is then measured.

  8. Chemical dosimetry system for criticality accidents.

    Science.gov (United States)

    Miljanić, Saveta; Ilijas, Boris

    2004-01-01

    Ruder Bosković Institute (RBI) criticality dosimetry system consists of a chemical dosimetry system for measuring the total (neutron + gamma) dose, and a thermoluminescent (TL) dosimetry system for a separate determination of the gamma ray component. The use of the chemical dosemeter solution chlorobenzene-ethanol-trimethylpentane (CET) is based on the radiolytic formation of hydrochloric acid, which protonates a pH indicator, thymolsulphonphthalein. The high molar absorptivity of its red form at 552 nm is responsible for a high sensitivity of the system: doses in the range 0.2-15 Gy can be measured. The dosemeter has been designed as a glass ampoule filled with the CET solution and inserted into a pen-shaped plastic holder. For dose determinations, a newly constructed optoelectronic reader has been used. The RBI team took part in the International Intercomparison of Criticality Accident Dosimetry Systems at the SILENE Reactor, Valduc, June 2002, with the CET dosimetry system. For gamma ray dose determination TLD-700 TL detectors were used. The results obtained with CET dosemeter show very good agreement with the reference values.

  9. Stop the Noise: A Quality Improvement Project to Decrease Electrocardiographic Nuisance Alarms.

    Science.gov (United States)

    Sendelbach, Sue; Wahl, Sharon; Anthony, Anita; Shotts, Pam

    2015-08-01

    As many as 99% of alarm signals may not need any intervention and can result in patients' deaths. Alarm management is now a Joint Commission National Patient Safety Goal. To reduce the number of nuisance electrocardiographic alarm signals in adult patients on the medical cardiovascular care unit. A quality improvement process was used that included eliminating duplicative alarms, customizing alarms, changing electrocardiography electrodes daily, standardizing skin preparation, and using disposable electrocardiography leads. In the cardiovascular care unit, the mean number of electrocardiographic alarm signals per day decreased from 28.5 (baseline) to 3.29, an 88.5% reduction. Use of a bundled approach to managing alarm signals decreased the mean number of alarm signals in a cardiovascular care unit. ©2015 American Association of Critical-Care Nurses.

  10. CAP--a combined codes, alarms and paging system--effective in nuclear and fossil-fueled power plants

    International Nuclear Information System (INIS)

    Foster, W.M.; Anderson, M.E.

    1981-01-01

    The CAP system now employed in two TVA power generating facilities has proven to be effective in both operational and emergency alerting and voice communications. Alternatives to emergency signalling point to advantages of a distributed amplifier/speaker system providing multi-signal and voice capabilities. Inclusion of a CAP-type system in all nuclear and fossil-fueled power plants is recommended, particularly in view of new NCR emergency alerting guidelines recently published. Outdoor-area warning is also included. Paper No. 80 JPGC 803-7

  11. Critical opalescence in the pure Coulomb system

    Science.gov (United States)

    Bobrov, V. B.; Trigger, S. A.

    2011-04-01

    Based on the dielectric formalism and quantum field theory methods, the phenomenon of critical opalescence is explained for light scattering in pure matter as a two-component electron-nuclear system with Coulomb interaction. A similar phenomenon is shown to occur in the case of neutron scattering in pure substances as well. The obtained results are valid for quantum case and arbitrary strong Coulomb interaction. Thus, the relations between structure factors derived for the electron-nuclear system are the exact result of the quantum statistical mechanics.

  12. Formal verification of algorithms for critical systems

    Science.gov (United States)

    Rushby, John M.; Von Henke, Friedrich

    1993-01-01

    We describe our experience with formal, machine-checked verification of algorithms for critical applications, concentrating on a Byzantine fault-tolerant algorithm for synchronizing the clocks in the replicated computers of a digital flight control system. First, we explain the problems encountered in unsynchronized systems and the necessity, and criticality, of fault-tolerant synchronization. We give an overview of one such algorithm, and of the arguments for its correctness. Next, we describe a verification of the algorithm that we performed using our EHDM system for formal specification and verification. We indicate the errors we found in the published analysis of the algorithm, and other benefits that we derived from the verification. Based on our experience, we derive some key requirements for a formal specification and verification system adequate to the task of verifying algorithms of the type considered. Finally, we summarize our conclusions regarding the benefits of formal verification in this domain, and the capabilities required of verification systems in order to realize those benefits.

  13. Diagnostic suite neuro-fuzzy in an advanced alarm monitoring and predictive diagnostic system for rotating machinery

    International Nuclear Information System (INIS)

    Geruzzi, P.

    1999-01-01

    The 'Foxboro SCADA', former 'Automation Systems Division' of Nuovo Pignone, at the end of eighty years, has been involved in the development of a flexible and powerful Diagnostic System for Rotating Machinery designed and manufactured in other divisions of the Company. This system amalgamates, in a single computer, all the functionality nowadays necessary to correctly manage locally and remotely the Evolutionary Maintenance of rotating machines as well as the relevant plants. It's specially designed to plan preventive and emergency maintenance procedures and to help the maintenance staff/service in preventing the occurrence of failures or severe damage to complete turbo-machinery plant including turbine, compressor and other machines. The system is designed to supervise and to analyze the operating state of one or more turbo- machinery units such as turbo-compressors, turbo-generators and turbo-pumps giving an effective support to plan preventive and breakdown maintenance monitoring the performances of each turbo-group's element and analyzing a large number of thermodynamic and mechanical parameters related to high pressure turbines, low pressure turbines, combustion chambers, axial compressors and load (compressors, generators, and pumps). A brief presentation of the system is provided (author) (ml)

  14. 3rd International Workshop on Critical Systems Development with UML

    OpenAIRE

    Jan Jürjens; Eduardo B. Fernandez; Robert France; Bernhard Rumpe

    2017-01-01

    Topics of the Workshop include: --- Applications of UML to real-time systems security-critical systems dependable / safety-critical systems performance-critical systems embedded systems hybrid systems reactive systems --- Extensions of UML (UML-RT, UMLsec, Automotive UML, Embedded UML, ...) and new developments (UML 2.0, MDA) --- Modeling, synthesis, model transformation, code generation, testing, validation, and verification of critical systems using UML --- Aspect-oriented or Component-base...

  15. The control, monitor, and alarm system for the ICT equipment of the ASTRI SST-2M telescope prototype for the Cherenkov Telescope Array

    Science.gov (United States)

    Gianotti, Fulvio; Fioretti, Valentina; Tanci, Claudio; Conforti, Vito; Tacchini, Alessandro; Leto, Giuseppe; Gallozzi, Stefano; Bulgarelli, Andrea; Trifoglio, Massimo; Malaguti, Giuseppe; Zoli, Andrea

    2014-07-01

    ASTRI is an Italian flagship project whose first goal is the realization of an end-to-end telescope prototype, named ASTRI SST-2M, for the Cherenkov Telescope Array (CTA). The prototype will be installed in Italy during Fall 2014. A second goal will be the realization of the ASTRI/CTA mini-array which will be composed of seven SST-2M telescopes placed at the CTA Southern Site. The Information and Communication Technology (ICT) equipment necessary to drive the infrastructure for the ASTRI SST-2M prototype is being designed as a complete and stand-alone computer center. The design goal is to obtain basic ICT equipment that might be scaled, with a low level of redundancy, for the ASTRI/CTA mini-array, taking into account the necessary control, monitor and alarm system requirements. The ICT equipment envisaged at the Serra La Nave observing station in Italy, where the ASTRI SST-2M telescope prototype will operate, includes computers, servers and workstations, network devices, an uninterruptable power supply system, and air conditioning systems. Suitable hardware and software tools will allow the parameters related to the behavior and health of each item of equipment to be controlled and monitored. This paper presents the proposed architecture and technical solutions that integrate the ICT equipment in the framework of the Observatory Control System package of the ASTRI/CTA Mini- Array Software System, MASS, to allow their local and remote control and monitoring. An end-toend test case using an Internet Protocol thermometer is reported in detail.

  16. Effect of direct eye contact in PTSD related to interpersonal trauma: an fMRI study of activation of an innate alarm system.

    Science.gov (United States)

    Steuwe, Carolin; Daniels, Judith K; Frewen, Paul A; Densmore, Maria; Pannasch, Sebastian; Beblo, Thomas; Reiss, Jeffrey; Lanius, Ruth A

    2014-01-01

    In healthy individuals, direct eye contact initially leads to activation of a fast subcortical pathway, which then modulates a cortical route eliciting social cognitive processes. The aim of this study was to gain insight into the neurobiological effects of direct eye-to-eye contact using a virtual reality paradigm in individuals with posttraumatic stress disorder (PTSD) related to prolonged childhood abuse. We examined 16 healthy comparison subjects and 16 patients with a primary diagnosis of PTSD using a virtual reality functional magnetic resonance imaging paradigm involving direct vs averted gaze (happy, sad, neutral) as developed by Schrammel et al. in 2009. Irrespective of the displayed emotion, controls exhibited an increased blood oxygenation level-dependent response during direct vs averted gaze within the dorsomedial prefrontal cortex, left temporoparietal junction and right temporal pole. Under the same conditions, individuals with PTSD showed increased activation within the superior colliculus (SC)/periaqueductal gray (PAG) and locus coeruleus. Our findings suggest that healthy controls react to the exposure of direct gaze with an activation of a cortical route that enhances evaluative 'top-down' processes underlying social interactions. In individuals with PTSD, however, direct gaze leads to sustained activation of a subcortical route of eye-contact processing, an innate alarm system involving the SC and the underlying circuits of the PAG.

  17. Critical issues in NASA information systems

    Science.gov (United States)

    1987-01-01

    The National Aeronautics and Space Administration has developed a globally-distributed complex of earth resources data bases since LANDSAT 1 was launched in 1972. NASA envisages considerable growth in the number, extent, and complexity of such data bases, due to the improvements expected in its remote sensing data rates, and the increasingly multidisciplinary nature of its scientific investigations. Work already has begun on information systems to support multidisciplinary research activities based on data acquired by the space station complex and other space-based and terrestrial sources. In response to a request from NASA's former Associate Administrator for Space Science and Applications, the National Research Council convened a committee in June 1985 to identify the critical issues involving information systems support to space science and applications. The committee has suggested that OSSA address four major information systems issues; centralization of management functions, interoperability of user involvement in the planning and implementation of its programs, and technology.

  18. Critical Time Crystals in Dipolar Systems.

    Science.gov (United States)

    Ho, Wen Wei; Choi, Soonwon; Lukin, Mikhail D; Abanin, Dmitry A

    2017-07-07

    We analyze the quantum dynamics of periodically driven, disordered systems in the presence of long-range interactions. Focusing on the stability of discrete time crystalline (DTC) order in such systems, we use a perturbative procedure to evaluate its lifetime. For 3D systems with dipolar interactions, we show that the corresponding decay is parametrically slow, implying that robust, long-lived DTC order can be obtained. We further predict a sharp crossover from the stable DTC regime into a regime where DTC order is lost, reminiscent of a phase transition. These results are in good agreement with the recent experiments utilizing a dense, dipolar spin ensemble in diamond [Nature (London) 543, 221 (2017)NATUAS0028-083610.1038/nature21426]. They demonstrate the existence of a novel, critical DTC regime that is stabilized not by many-body localization but rather by slow, critical dynamics. Our analysis shows that the DTC response can be used as a sensitive probe of nonequilibrium quantum matter.

  19. [Mortality rates of circulatory system diseases and malignant neoplasms in Zagreb population younger than sixty-five--call for alarm].

    Science.gov (United States)

    Vizintin, Marina Polić; Mrcela, Nada Tomasović; Kovacić, Luka

    2012-12-01

    The aim of this work was to analyze the public health indicators for circulatory heart diseases and malignant neoplasms in the population younger than 65 in the City of Zagreb, Croatia, and compare them with the European Union (EU) countries. The purpose was to evaluate the situation and propose the public health preventive measures. The study population were Zagreb citizens aged 0-64 according to the 2001 census. Total Zagreb population was 779145, making 17.6% of total Croatian population. Data from the Croatian Bureau of Statistics and Dr Andrija Stampar Institute of Public Health were used. The standardized 0-64 mortality rates of the selected diseases 2006-2010 were used in the analysis. In 2010, the standardized mortality rates of all analyzed diseases were significantly higher in Zagreb population aged 0-64 than the EU averages except for cervical cancer. In 2010, the mortality rates in Zagreb population aged 0-64 were as follows: circulatory system diseases 61.22, ischemic heart disease 28.99, cerebrovascular diseases 12.51, malignant neoplasms 94.69, tracheal and lung cancer 24.92, breast cancer 21.08 and cervical cancer 2.05. Standardized mortality rates in Zagreb population aged 0-64 for circulatory system were lower than for Croatia (61.22 vs. 63.25), but higher for malignant neoplasms (94.69 vs. 91.2), except for cervical cancer (2.05 vs. 3.14). High standardized mortality rates for the selected diseases in the City of Zagreb, Croatia, were observed. The rates were higher in Zagreb population compared to EU averages except for cervical cancer. This situation urges revision of the public health strategy and implementation of more intensive preventive and screening measures to reduce the risk factors.

  20. Reducing hospital noise: a review of medical device alarm management.

    Science.gov (United States)

    Konkani, Avinash; Oakley, Barbara; Bauld, Thomas J

    2012-01-01

    Increasing noise in hospital environments, especially in intensive care units (ICUs) and operating rooms (ORs), has created a formidable challenge for both patients and hospital staff. A major contributing factor for the increasing noise levels in these environments is the number of false alarms generated by medical devices. This study focuses on discovering best practices for reducing the number of false clinical alarms in order to increase patient safety and provide a quiet environment for both work and healing. The researchers reviewed Pub Med, Web of Knowledge and Google Scholar sources to obtain original journal research and review articles published through January 2012. This review includes 27 critically important journal articles that address different aspects of medical device alarms management, including the audibility, identification, urgency mapping, and response time of nursing staff and different solutions to such problems. With current technology, the easiest and most direct method for reducing false alarms is to individualize alarm settings for each patient's condition. Promoting an institutional culture change that emphasizes the importance of individualization of alarms is therefore an important goal. Future research should also focus on the development of smart alarms.

  1. Monitoring and Control of Urban Critical Infrastructures: A Novel Approach to System Design and Data Fusion

    Directory of Open Access Journals (Sweden)

    Mario La Manna

    2015-02-01

    Full Text Available The monitoring and control of urban critical infrastructures consists of the protection of assets such as houses, offices, government and private buildings, with low cost, high quality and high dependability. In order to satisfy all these requirements at the same time, the control of a number of assets has to be performed by means of automated systems based on networks of heterogeneous sensors. This new concept idea is based on the use of unmanned operations at each of the many remote assets (each asset is monitored through a network of sensors and a man-in-the-loop automated control in a central site (Operational Center, which performs alarm detection and system management.

  2. Application of Fault Tree Analysis for Estimating Temperature Alarm Circuit Reliability

    International Nuclear Information System (INIS)

    El-Shanshoury, A.I.; El-Shanshoury, G.I.

    2011-01-01

    Fault Tree Analysis (FTA) is one of the most widely-used methods in system reliability analysis. It is a graphical technique that provides a systematic description of the combinations of possible occurrences in a system, which can result in an undesirable outcome. The presented paper deals with the application of FTA method in analyzing temperature alarm circuit. The criticality failure of this circuit comes from failing to alarm when temperature exceeds a certain limit. In order for a circuit to be safe, a detailed analysis of the faults causing circuit failure is performed by configuring fault tree diagram (qualitative analysis). Calculations of circuit quantitative reliability parameters such as Failure Rate (FR) and Mean Time between Failures (MTBF) are also done by using Relex 2009 computer program. Benefits of FTA are assessing system reliability or safety during operation, improving understanding of the system, and identifying root causes of equipment failures

  3. Critical quench dynamics in confined systems.

    Science.gov (United States)

    Collura, Mario; Karevski, Dragi

    2010-05-21

    We analyze the coherent quantum evolution of a many-particle system after slowly sweeping a power-law confining potential. The amplitude of the confining potential is varied in time along a power-law ramp such that the many-particle system finally reaches or crosses a critical point. Under this protocol we derive general scaling laws for the density of excitations created during the nonadiabatic sweep of the confining potential. It is found that the mean excitation density follows an algebraic law as a function of the sweeping rate with an exponent that depends on the space-time properties of the potential. We confirm our scaling laws by first order adiabatic calculation and exact results on the Ising quantum chain with a varying transverse field.

  4. Procedures and techniques for monitoring the radiation detection, signalization and alarm systems in the centralized ambience monitoring systems of the basic nuclear facilities of the CEN Saclay

    International Nuclear Information System (INIS)

    Andre, J.-J.; Drouet, J.; Leblanc, P.

    1979-01-01

    After referring to the regulations governing the 'systematic ambience monitoring' in the basic nuclear facilities, the main radiation detection, signalization and alarm devices existing at present in these facilities of the Saclay Nuclear Study Centre are described. The analysis of the operating defects of the measuring channels and detection possibilities leads to the anomalies being classified in two separate groups: the anomalies of the logical 'all or nothing' type of which all the possible origins are integrated into a so-called 'continuity' line and the evolutive anomalies of various origins corresponding to poor functioning extending possibly to a complete absence of signal. The techniques for testing the detection devices of the radiation monitoring board set up in the 'Departement de Rayonnements' at the Saclay Nuclear Study Centre are also described [fr

  5. Changes in 900 MW PWR alarm processing policy

    Energy Technology Data Exchange (ETDEWEB)

    Pont, M [Electricite de France, Generation and Transmission, Nuclear Power Plant Operations, Paris (France)

    1997-09-01

    Following a brief description of the current 900 MW PWR alarm processing system, this document presents the feasibility study carried out within the scope of the Instrumentation and Control Refurbishment project (R2C). (author). 4 figs, tabs.

  6. Changes in 900 MW PWR alarm processing policy

    International Nuclear Information System (INIS)

    Pont, M.

    1997-01-01

    Following a brief description of the current 900 MW PWR alarm processing system, this document presents the feasibility study carried out within the scope of the Instrumentation and Control Refurbishment project (R2C). (author). 4 figs, tabs

  7. rf duress alarms: market survey and preliminary characterization

    International Nuclear Information System (INIS)

    Draper, B.L.

    1979-05-01

    This report represents the first phase of the duress alarm studies. Presented here are the results of an extensive market survey and some preliminary observations on the effectiveness of many system components

  8. Critical behavior in the system cyclopentanone + water + secondary butyl alcohol

    Science.gov (United States)

    Krishna, U. Santhi; Unni, P. K. Madhavan

    2018-05-01

    We report detailed measurements of coexistence surface in the ternary system cylcopentanone + water + secondary butyl alcohol. The coexistence surface is seen to have an unusual tunnel like feature and is a potential system in which special critical points such as the Quadruple Critical Point (QCP) could be studied. Analysis of coexistence curves indicates that the system shows 3D-Ising like critical behavior.

  9. Nuclear Criticality Information System. Database examples

    Energy Technology Data Exchange (ETDEWEB)

    Foret, C.A.

    1984-06-01

    The purpose of this publication is to provide our users with a guide to using the Nuclear Criticality Information System (NCIS). It is comprised of an introduction, an information and resources section, a how-to-use section, and several useful appendices. The main objective of this report is to present a clear picture of the NCIS project and its available resources as well as assisting our users in accessing the database and using the TIS computer to process data. The introduction gives a brief description of the NCIS project, the Technology Information System (TIS), online user information, future plans and lists individuals to contact for additional information about the NCIS project. The information and resources section outlines the NCIS database and describes the resources that are available. The how-to-use section illustrates access to the NCIS database as well as searching datafiles for general or specific data. It also shows how to access and read the NCIS news section as well as connecting to other information centers through the TIS computer.

  10. Nuclear Criticality Information System. Database examples

    International Nuclear Information System (INIS)

    Foret, C.A.

    1984-06-01

    The purpose of this publication is to provide our users with a guide to using the Nuclear Criticality Information System (NCIS). It is comprised of an introduction, an information and resources section, a how-to-use section, and several useful appendices. The main objective of this report is to present a clear picture of the NCIS project and its available resources as well as assisting our users in accessing the database and using the TIS computer to process data. The introduction gives a brief description of the NCIS project, the Technology Information System (TIS), online user information, future plans and lists individuals to contact for additional information about the NCIS project. The information and resources section outlines the NCIS database and describes the resources that are available. The how-to-use section illustrates access to the NCIS database as well as searching datafiles for general or specific data. It also shows how to access and read the NCIS news section as well as connecting to other information centers through the TIS computer

  11. Ship cabin leakage alarm based on ARM SCM

    Science.gov (United States)

    Qu, Liyan

    2018-03-01

    If there is a leakage in the cabin of a sailing ship, it is a major accident that threatens the personnel and property of the ship. If we can’t take timely measures, there will be a devastating disaster. In order to judge the leakage of the cabin, it is necessary to set up a leakage alarm system, so as to achieve the purpose of detecting and alarming the leakage of the cabin, and avoid the occurrence of accidents. This paper discusses the design of ship cabin leakage alarm system based on ARM SCM. In order to ensure the stability and precision of the product, the hardware design of the alarm system is carried out, such as circuit design, software design, the programming of SCM, the software programming of upper computer, etc. It is hoped that it can be of reference value to interested readers.

  12. Spiny lobsters detect conspecific blood-borne alarm cues exclusively through olfactory sensilla.

    Science.gov (United States)

    Shabani, Shkelzen; Kamio, Michiya; Derby, Charles D

    2008-08-01

    When attacked by predators, diverse animals actively or passively release molecules that evoke alarm and related anti-predatory behavior by nearby conspecifics. The actively released molecules are alarm pheromones, whereas the passively released molecules are alarm cues. For example, many insects have alarm-signaling systems that involve active release of alarm pheromones from specialized glands and detection of these signals using specific sensors. Many crustaceans passively release alarm cues, but the nature of the cues, sensors and responses is poorly characterized. Here we show in laboratory and field experiments that injured Caribbean spiny lobsters, Panulirus argus, passively release alarm cues via blood (hemolymph) that induce alarm responses in the form of avoidance and suppression of feeding. These cues are detected exclusively through specific olfactory chemosensors, the aesthetasc sensilla. The alarm cues for Caribbean spiny lobsters are not unique to the species but do show some phylogenetic specificity: P. argus responds primarily with alarm behavior to conspecific blood, but with mixed alarm and appetitive behaviors to blood from the congener Panulirus interruptus, or with appetitive behaviors to blood from the blue crab Callinectes sapidus. This study lays the foundation for future neuroethological studies of alarm cue systems in this and other decapod crustaceans.

  13. Critical management system for nuclear fuels

    International Nuclear Information System (INIS)

    Tai, Ichiro; Seki, Eiji.

    1981-01-01

    Purpose: To enable to provide display for the scale of accidents and critical state by detecting gamma-rays issued from nuclear fuels by gamma-ray level indicators to obtain outputs in proportion to the input level of the gamma-rays based on the detected pulse signals. Constitution: The gamma-ray level indicators comprises a plastic scintillator that emits light upon input of gamma-rays and a photomultiplier that amplifies weak fluorescence obtained from the scintillator. The photomultiplier is applied with a high voltage from a power source. A pre-amplifier amplifies pulse signals corresponding to individual gamma-rays at a high amplification factor and send them to a pulse counter circuit if the detected signal level from the gamma-ray level indicators is low, or amplifies the pulse detection signals at a low amplification factor and sends them to a voltage pulse averaging circuit if the detection signal level is high. A signal procession circuit selects the output from the pulse counter circuit or the voltage pulse averaging circuit. Thus, the system has a linear characteristic over a wide range equivalent to a wide range of incident gamma-rays. (Horiuchi, T.)

  14. A weighted dissimilarity index to isolate faults during alarm floods

    CERN Document Server

    Charbonnier, S; Gayet, P

    2015-01-01

    A fault-isolation method based on pattern matching using the alarm lists raised by the SCADA system during an alarm flood is proposed. A training set composed of faults is used to create fault templates. Alarm vectors generated by unknown faults are classified by comparing them with the fault templates using an original weighted dissimilarity index that increases the influence of the few alarms relevant to diagnose the fault. Different decision strategies are proposed to support the operator in his decision making. The performances are evaluated on two sets of data: an artificial set and a set obtained from a highly realistic simulator of the CERN Large Hadron Collider process connected to the real CERN SCADA system.

  15. 'System-of-systems' approach for interdependent critical infrastructures

    International Nuclear Information System (INIS)

    Eusgeld, Irene; Nan, Cen; Dietz, Sven

    2011-01-01

    The study of the interdependencies within critical infrastructures (CI) is a growing field of research as the importance of potential failure propagation among infrastructures may lead to cascades affecting all supply networks. New powerful methods are required to model and describe such 'systems-of-systems' (SoS) as a whole. An overall model is required to provide security and reliability assessment taking into account various kinds of threats and failures. A significant challenge associated with this model may be to create 'what-if' scenarios for the analysis of interdependencies. In this paper the interdependencies between industrial control systems (ICS), in particular SCADA (Supervisory Control and Data Acquisition), and the underlying critical infrastructures to address the vulnerabilities related to the coupling of these systems are analyzed. The modeling alternatives for system-of-systems, integrated versus coupled models, are discussed. An integrated model contains detailed low level models of (sub)systems as well as a high level model, covering all hierarchical levels. On the other hand, a coupled model aggregates different simulated outputs of the low level models as inputs at a higher level. Strengths and weaknesses of both approaches are analyzed and a model architecture for SCADA and the 'system under control' are proposed. Furthermore, the HLA simulation standard is introduced and discussed in this paper as a promising approach to represent interdependencies between infrastructures. To demonstrate the capabilities of the HLA standard for the interdependencies study, an exemplary application and some first results are also briefly presented in this paper.

  16. Mine alarm stations for mine haulage systems in coal surface mines. Stantsiya pozharnoi signalizatsii dlya gorno-transportnogo oborudovaniya ugol'nykh razrezov

    Energy Technology Data Exchange (ETDEWEB)

    Terebilo, N.I.; Bukhanets, B.N.; Rozhkov, V.L.; Martynenko, V.D. (Vsesoyuznyi Nauchno-Issledovatel' skii Institut Gornospasatel' nogo Dela, Donetsk (USSR))

    1988-01-01

    Describes design and operation of the STs fire alarm station developed by the Spetsavtomatika plant in Minsk and successfully tested in the Borodino surface coal mine. The station consists of 14 measuring circuits with the measuring cycle not longer than 4 s. The station detects fires at earthmoving and haulage equipment, cuts off energy supply to fire zones and activates fire extinguishing equipment. The station will be manufactured on a commercial scale. 2 refs.

  17. Development of alarm handling methods for boiling water reactors

    Energy Technology Data Exchange (ETDEWEB)

    Yukiharu, Ohga; Hiroshi, Seki; Setsuo, Arita [Power and Industrial Systems R and D Div., Hitachi, Ltd., Hitachi, Ibaraki (Japan)

    1997-09-01

    A method was developed to select important alarms in two steps: first, selection is based on the physical relationship between the alarms, and second, selection is according to the initial event. An approach combining a neural network and knowledge processing was proposed to identify the event rapidly. A prototype system was evaluated in the Kashiwazaki/Kariwa-4 Nuclear Power Plant during the startup test. The evaluation test confirmed that about 30% of the alarms are selected from among the many activated alarms. The second method, dealing with presentation, supports operators in their selection and confirmation of the required information for plant operation. The method selects and offers plant information in response to plant status changes and operators` demands. The selection procedure is based on the knowledge and data as structured by the plant functional structure; i.e. a means-ends abstraction hierarchy model. A prototype system was evaluated using a BWR simulator. The results showed that appropriate information items are automatically selected according to plant status changes and information on generated alarms is presented to operators together with the related trend graph and system diagram. Answers are generated in reply to the operators` demands and operators can confirm the generated alarms on each plant function, such as systems and components. 8 refs, 10 figs, 2 tabs.

  18. Development of alarm handling methods for boiling water reactors

    International Nuclear Information System (INIS)

    Ohga Yukiharu; Seki Hiroshi; Arita Setsuo

    1997-01-01

    A method was developed to select important alarms in two steps: first, selection is based on the physical relationship between the alarms, and second, selection is according to the initial event. An approach combining a neural network and knowledge processing was proposed to identify the event rapidly. A prototype system was evaluated in the Kashiwazaki/Kariwa-4 Nuclear Power Plant during the startup test. The evaluation test confirmed that about 30% of the alarms are selected from among the many activated alarms. The second method, dealing with presentation, supports operators in their selection and confirmation of the required information for plant operation. The method selects and offers plant information in response to plant status changes and operators' demands. The selection procedure is based on the knowledge and data as structured by the plant functional structure; i.e. a means-ends abstraction hierarchy model. A prototype system was evaluated using a BWR simulator. The results showed that appropriate information items are automatically selected according to plant status changes and information on generated alarms is presented to operators together with the related trend graph and system diagram. Answers are generated in reply to the operators' demands and operators can confirm the generated alarms on each plant function, such as systems and components. 8 refs, 10 figs, 2 tabs

  19. Summary of work carried out in the field of N4 plant series alarm processing

    International Nuclear Information System (INIS)

    Joly, J.-J.; Maurin, S.

    1990-01-01

    This document summarizes work executed or under way regarding the processing of new N4 plant series alarms. A review of the specific objectives is provided as well as a general description of the processing of these alarms. A description of the systems and prototypes developed is then provided: -autonomous N4 alarm supplementary processing system, -logic check expert system, -functional design check expert system based on qualitative system modeling

  20. A new method for defining and managing process alarms and for correcting process operation when an alarm occurs

    International Nuclear Information System (INIS)

    Brooks, Robin; Thorpe, Richard; Wilson, John

    2004-01-01

    A new mathematical treatment of alarms that considers them as multi-variable interactions between process variables has provided the first-ever method to calculate values for alarm limits. This has resulted in substantial reductions in false alarms and hence in alarm annunciation rates in field trials. It has also unified alarm management, process control and product quality control into a single mathematical framework so that operations improvement and hence economic benefits are obtained at the same time as increased process safety. Additionally, an algorithm has been developed that advises what changes should be made to Manipulable process variables to clear an alarm. The multi-variable Best Operating Zone at the heart of the method is derived from existing historical data using equation-free methods. It does not require a first-principles process model or an expensive series of process identification experiments. Integral with the method is a new format Process Operator Display that uses only existing variables to fully describe the multi-variable operating space. This combination of features makes it an affordable and maintainable solution for small plants and single items of equipment as well as for the largest plants. In many cases, it also provides the justification for the investments about to be made or already made in process historian systems. Field Trials have been and are being conducted at IneosChlor and Mallinckrodt Chemicals, both in the UK, of the new geometric process control (GPC) method for improving the quality of both process operations and product by providing Process Alarms and Alerts of much high quality than ever before. The paper describes the methods used, including a simple visual method for Alarm Rationalisation that quickly delivers large sets of Consistent Alarm Limits, and the extension to full Alert Management with highlights from the Field Trials to indicate the overall effectiveness of the method in practice

  1. A new method for defining and managing process alarms and for correcting process operation when an alarm occurs

    Energy Technology Data Exchange (ETDEWEB)

    Brooks, Robin [Curvaceous Software Limited, P.O. Box 43, Gerrards Cross, Bucks SL98UX (United Kingdom)]. E-mail: enquiries@curvaceous.com; Thorpe, Richard [Curvaceous Software Limited, P.O. Box 43, Gerrards Cross, Bucks SL98UX (United Kingdom); Wilson, John [Curvaceous Software Limited, P.O. Box 43, Gerrards Cross, Bucks SL98UX (United Kingdom)

    2004-11-11

    A new mathematical treatment of alarms that considers them as multi-variable interactions between process variables has provided the first-ever method to calculate values for alarm limits. This has resulted in substantial reductions in false alarms and hence in alarm annunciation rates in field trials. It has also unified alarm management, process control and product quality control into a single mathematical framework so that operations improvement and hence economic benefits are obtained at the same time as increased process safety. Additionally, an algorithm has been developed that advises what changes should be made to Manipulable process variables to clear an alarm. The multi-variable Best Operating Zone at the heart of the method is derived from existing historical data using equation-free methods. It does not require a first-principles process model or an expensive series of process identification experiments. Integral with the method is a new format Process Operator Display that uses only existing variables to fully describe the multi-variable operating space. This combination of features makes it an affordable and maintainable solution for small plants and single items of equipment as well as for the largest plants. In many cases, it also provides the justification for the investments about to be made or already made in process historian systems. Field Trials have been and are being conducted at IneosChlor and Mallinckrodt Chemicals, both in the UK, of the new geometric process control (GPC) method for improving the quality of both process operations and product by providing Process Alarms and Alerts of much high quality than ever before. The paper describes the methods used, including a simple visual method for Alarm Rationalisation that quickly delivers large sets of Consistent Alarm Limits, and the extension to full Alert Management with highlights from the Field Trials to indicate the overall effectiveness of the method in practice.

  2. A new method for defining and managing process alarms and for correcting process operation when an alarm occurs.

    Science.gov (United States)

    Brooks, Robin; Thorpe, Richard; Wilson, John

    2004-11-11

    A new mathematical treatment of alarms that considers them as multi-variable interactions between process variables has provided the first-ever method to calculate values for alarm limits. This has resulted in substantial reductions in false alarms and hence in alarm annunciation rates in field trials. It has also unified alarm management, process control and product quality control into a single mathematical framework so that operations improvement and hence economic benefits are obtained at the same time as increased process safety. Additionally, an algorithm has been developed that advises what changes should be made to Manipulable process variables to clear an alarm. The multi-variable Best Operating Zone at the heart of the method is derived from existing historical data using equation-free methods. It does not require a first-principles process model or an expensive series of process identification experiments. Integral with the method is a new format Process Operator Display that uses only existing variables to fully describe the multi-variable operating space. This combination of features makes it an affordable and maintainable solution for small plants and single items of equipment as well as for the largest plants. In many cases, it also provides the justification for the investments about to be made or already made in process historian systems. Field Trials have been and are being conducted at IneosChlor and Mallinckrodt Chemicals, both in the UK, of the new geometric process control (GPC) method for improving the quality of both process operations and product by providing Process Alarms and Alerts of much high quality than ever before. The paper describes the methods used, including a simple visual method for Alarm Rationalisation that quickly delivers large sets of Consistent Alarm Limits, and the extension to full Alert Management with highlights from the Field Trials to indicate the overall effectiveness of the method in practice.

  3. Why Mission-Critical Systems Are Critical to the Future of Academic Libraries

    Science.gov (United States)

    Oberlander, Cyril

    2012-01-01

    A mission-critical system is one that is so intertwined with the operation of an organization that the organization can scarcely function without it. Just as in corporations, mission-critical library systems offer the capability to unlock talent and time. They are essential to the transformation of higher education and the learning environment. A…

  4. Percolation systems away from the critical point

    Indian Academy of Sciences (India)

    DEEPAK DHAR. Tata Institute of Fundamental Research, Homi Bhabha Road, Mumbai 400 005, India ... There is more to percolation theory than the critical exponents. Of course, an experi- .... simple qualitative arguments. In the summation ...

  5. Critical behavior of non-ideal systems

    CERN Document Server

    Ivanov, Dmitry Yu

    2008-01-01

    Dmitry Yu. Ivanov is a professor at the Baltic State Technical University (St. Petersburg, Russia). His research focuses on thermodynamics, critical phenomena and phase transitions, theoretical and experimental investigations of multiple light scattering and correlation spectroscopy in application to Material Science and critical phenomena. His research activities included projects at the Nuclear Research Center in Dubna and Krichevsky Laboratory (Russia) and at the CNRS laboratories and Universities of Paris and Nice (France). He has authored about 70 scientific publications.

  6. A proactive alarm reduction method and its human factors validation test for a main control room for SMART

    International Nuclear Information System (INIS)

    Jang, Gwi-sook; Suh, Sang-moon; Kim, Sa-kil; Suh, Yong-suk; Park, Je-yun

    2013-01-01

    Highlights: ► A proactive alarm reduction method improves effectiveness on the alarm reduction. ► The method suppresses alarms based on the ECA rules and facts for the alarm reduction under an alarm flood situation. ► The alarm reduction logics are supplemented to a high hit ratio of the reduction logics during on-line operations. ► The method is validated by human factors validation test based on regulatory requirements. -- Abstract: Conventional alarm systems tend to overwhelm operators during a transient because of a large number of nearly simultaneous annunciator activations with varying degrees of relevance to operator tasks. Thus alarm processing techniques have developed to support operators in coping with the volume of alarms, to identify which alarms are significant, and to reduce the need for operators to infer the plant conditions. This paper proposes a proactive alarm reduction method for SMART (System-integrated Modular Advanced ReacTor) whereby based on the contents of the past operating effects alarm reduction is carried out during the next transient. We designed and implemented the proactive alarm reduction system and constructed the environment for the human factors validation test. Also, eight subjects actually working in a nuclear power plant (NPP) tested the practical effectiveness of the proposed proactive alarm reduction method according to the procedure of human factors validation test under a dynamic simulation of a partial scope for an NPP.

  7. Nuthatches eavesdrop on variations in heterospecific chickadee mobbing alarm calls

    Science.gov (United States)

    Templeton, Christopher N.; Greene, Erick

    2007-01-01

    Many animals recognize the alarm calls produced by other species, but the amount of information they glean from these eavesdropped signals is unknown. We previously showed that black-capped chickadees (Poecile atricapillus) have a sophisticated alarm call system in which they encode complex information about the size and risk of potential predators in variations of a single type of mobbing alarm call. Here we show experimentally that red-breasted nuthatches (Sitta canadensis) respond appropriately to subtle variations of these heterospecific “chick-a-dee” alarm calls, thereby evidencing that they have gained important information about potential predators in their environment. This study demonstrates a previously unsuspected level of discrimination in intertaxon eavesdropping. PMID:17372225

  8. ALARM, Thermohydraulics of BWR with Jet Pumps During LOCA

    International Nuclear Information System (INIS)

    Araya, F.; Akimoto, M.

    1985-01-01

    1 - Nature of physical problem solved: ALARM-B2 which is an improved version of ALARM-B1 is a computer program to analyze thermo-hydraulic phenomena of BWR during a blowdown period under a large-break loss-of-coolant accident condition with special emphasis on the heat transfer phenomena in the core region. 2 - Method of solution: A so called volume-junction method is used to present fluid conservations. The primary system is divided into a number of special elements called 'control-volumes'. The system of partial differential equations describing fluid conservations for a stream-tube are integrated over a number of control volumes. The resulting set of simultaneous differential equations that is based on the assumptions of one-dimensional, homogeneous and thermal- equilibrium flow is linearized and solved for a small time increment by a simple explicit numerical technique. The one-dimensional heat conduction equations describing temperature profiles within solid material are written in finite difference forms which are linearized and solved by the Crank-Nicholson implicit method. In order to simulate the blowdown heat transfer phenomena, the code has correlation packages for heat transfer coefficient and critical heat flux. The heat generation in the core is given by a point reactor kinetics model with six groups of delayed neutrons and decay of eleven groups of fission products and actinides. The solution technique of the reactor kinetics is based on the Runge-Kutta method. ALARM-B2 has the models to simulate various components incorporated in BWRs such as jet pumps, recirculation pumps, steam separators, valves, and so on. The discharge and injection systems are modeled by leak and fill systems, respectively. 3 - Restrictions on the complexity of the problem: As this has been developed to simulate a blowdown thermo-hydraulic transient during a large break LOCA, users must pay attention when applying the code to any medium or small break LOCAs or to later phases

  9. Hornbills can distinguish between primate alarm calls.

    Science.gov (United States)

    Rainey, Hugo J.; Zuberbühler, Klaus; Slater, Peter J. B.

    2004-01-01

    Some mammals distinguish between and respond appropriately to the alarm calls of other mammal and bird species. However, the ability of birds to distinguish between mammal alarm calls has not been investigated. Diana monkeys (Cercopithecus diana) produce different alarm calls to two predators: crowned eagles (Stephanoaetus coronatus) and leopards (Panthera pardus). Yellow-casqued hornbills (Ceratogymna elata) are vulnerable to predation by crowned eagles but are not preyed on by leopards and might therefore be expected to respond to the Diana monkey eagle alarm call but not to the leopard alarm call. We compared responses of hornbills to playback of eagle shrieks, leopard growls, Diana monkey eagle alarm calls and Diana monkey leopard alarm calls and found that they distinguished appropriately between the two predator vocalizations as well as between the two Diana monkey alarm calls. We discuss possible mechanisms leading to these responses. PMID:15209110

  10. Reliable and Efficient Access for Alarm-initiated and Regular M2M Traffic in IEEE 802.11ah Systems

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Stefanovic, Cedomir; Popovski, Petar

    2016-01-01

    IEEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M...... reporting regimes, which are periodic, on-demand and alarm reporting. The proposed access method is based a periodically re- occurring pool of time slots, whose size is proactively determined on the basis of the reporting activity in the cell. We show that it is possible to both efficiently and reliably...

  11. Dynamical critical phenomena in driven-dissipative systems.

    Science.gov (United States)

    Sieberer, L M; Huber, S D; Altman, E; Diehl, S

    2013-05-10

    We explore the nature of the Bose condensation transition in driven open quantum systems, such as exciton-polariton condensates. Using a functional renormalization group approach formulated in the Keldysh framework, we characterize the dynamical critical behavior that governs decoherence and an effective thermalization of the low frequency dynamics. We identify a critical exponent special to the driven system, showing that it defines a new dynamical universality class. Hence critical points in driven systems lie beyond the standard classification of equilibrium dynamical phase transitions. We show how the new critical exponent can be probed in experiments with driven cold atomic systems and exciton-polariton condensates.

  12. 46 CFR 76.15-30 - Alarms.

    Science.gov (United States)

    2010-10-01

    ... than paint and lamp lockers and similar small spaces, shall be fitted with an approved audible alarm in... required to be fitted with a delayed discharge. Such alarms shall be so arranged as to sound during the 20 second delay period prior to the discharge of carbon dioxide into the space, and the alarm shall depend...

  13. Semi-supervised detection of intracranial pressure alarms using waveform dynamics

    International Nuclear Information System (INIS)

    Scalzo, Fabien; Hu, Xiao

    2013-01-01

    Patient monitoring systems in intensive care units (ICU) are usually set to trigger alarms when abnormal values are detected. Alarms are generated by threshold-crossing rules that lead to high false alarm rates. This is a recognized issue that causes alarm fatigue, waste of human resources, and increased patient risks. Recently developed smart alarm models require alarms to be validated by experts during the training phase. The manual annotation process involved is time-consuming and virtually impossible to achieve for the thousands of alarms recorded in the ICU every week. To tackle this problem, we investigate in this study if the use of semi-supervised learning methods, that can naturally integrate unlabeled data samples in the model, can be used to improve the accuracy of the alarm detection. As a proof of concept, the detection system is evaluated on intracranial pressure (ICP) signal alarms. Specific morphological and trending features are extracted from the ICP signal waveform to capture the dynamic of the signal prior to alarms. This study is based on a comprehensive dataset of 4791 manually labeled alarms recorded from 108 neurosurgical patients. A comparative analysis is provided between kernel spectral regression (SR-KDA) and support vector machine (SVM) both modified for the semi-supervised setting. Results obtained during the experimental evaluations indicate that the two models can significantly reduce false alarms using unlabeled samples; especially in the presence of a restrained number of labeled examples. At a true alarm recognition rate of 99%, the false alarm reduction rates improved from 9% (supervised) to 27% (semi-supervised) for SR-KDA, and from 3% (supervised) to 16% (semi-supervised) for SVM. (paper)

  14. The evaluation of set of criticality parameters using scale system

    International Nuclear Information System (INIS)

    Abe, Alfredo; Sanchez, Andrea; Yamaguchi, Mistuo

    2009-01-01

    In evaluating the criticality safety of the nuclear fuel facility, it is important to apply a consistent methodology, which consider every aspects concerning various types of criticality parameters. Usually, the critical parameters are compiled and arranged into handbooks, and these handbooks are based on experience with nuclear facilities, experimental data from criticality safety research facilities, and theoretical studies performed using numerical simulations. Most of criticality safety evaluation can be addressed using the criticality parameters data directly from handbook, but some critical parameters for a specific chemical mixtures and/or enrichment are not be available. Consequently, not available parameters has to be evaluated. This work present the methodology to evaluate a set of critical parameters using SCALE system for various types of mixtures present at nuclear fuel cycle facilities for two different level of enrichment, the results are verified in the independent calculation using MCNP Monte Carlo Code. (author)

  15. A critical systems perspective on the design of organizational space

    NARCIS (Netherlands)

    Mobach, Mark P.

    2007-01-01

    This paper is the first to introduce critical systems thinking into a new emerging research strand: the design of organizational space. The study revealed two things. First, critical systems thinking provides a thorough framework to understand the possibilities to connect organization and building;

  16. "Actionable" critical success factors for supply chain information system implementations

    NARCIS (Netherlands)

    Denolf, Janne M.; Trienekens, Jacques H.; Nel Wognum, P.M.; Schütz, Verena; Vorst, Van Der Jack G.A.J.; Onno Omta, S.W.F.

    2018-01-01

    Implementing a supply chain information system (SCIS) incurs organizational and technical complexities. For managing these complexities, information system researchers have identified generic critical success factors. However, CSFs are abstract and, therefore, difficult to use in practice. To

  17. System Hardening Architecture for Safer Access to Critical Business ...

    African Journals Online (AJOL)

    System Hardening Architecture for Safer Access to Critical Business Data. ... and the threat is growing faster than the potential victims can deal with. ... in this architecture are applied to the host, application, operating system, user, and the ...

  18. Rationing in health systems: A critical review.

    Science.gov (United States)

    Keliddar, Iman; Mosadeghrad, Ali Mohammad; Jafari-Sirizi, Mehdi

    2017-01-01

    Background: It is difficult to provide health care services to all those in need of such services due to limited resources and unlimited demands. Thus, priority setting and rationing have to be applied. This study aimed at critically examining the concept of rationing in health sector and identifying its purposes, influencing factors, mechanisms, and outcomes. Methods: The critical interpretive synthesis methodology was used in this study. PubMed, Cochrane, and Proquest databases were searched using the related key words to find related documents published between 1970 and 2015. In total, 161 published reports were reviewed and included in the study. Thematic content analysis was applied for data analysis. Results: Health services rationing means restricting the access of some people to useful or potentially useful health services due to budgetary limitation. The inherent features of the health market and health services, limited resources, and unlimited needs necessitate health services rationing. Rationing can be applied in 4 levels: health care policy- makers, health care managers, health care providers, and patients. Health care rationing can be accomplished through fixed budget, benefit package, payment mechanisms, queuing, copayments, and deductibles. Conclusion: This paper enriched our understanding of health services rationing and its mechanisms at various levels and contributed to the literature by broadly conceptualizing health services rationing.

  19. Accident alarm equipment for steam generator, especially liquid sodium heated steam generator

    International Nuclear Information System (INIS)

    Matal, O.; Jung, J.; Banovec, J.

    1982-01-01

    The alarm equipment consists of a system of sensors mounted onto the steam generator and its accessories. Each of the sensors is used for a different accident characteristic, such as the flow of sodium, the acoustic spectrum, the concentration of hydrogen in sodium. The system of sensors is connected to the common accident alarm system. The equipment will not issue the alarm signal if it receives a message from only one sensor, only when the message is confirmed from other sensors. This excludes false alarm. (M.D.)

  20. Alarm pheromone processing in the ant brain: an evolutionary perspective

    Directory of Open Access Journals (Sweden)

    Makoto Mizunami

    2010-06-01

    Full Text Available Social insects exhibit sophisticated communication by means of pheromones, one example of which is the use of alarm pheromones to alert nestmates for colony defense. We review recent advances in the understanding of the processing of alarm pheromone information in the ant brain. We found that information about formic acid and n-undecane, alarm pheromone components, is processed in a set of specific glomeruli in the antennal lobe of the ant Camponotus obscuripes. Alarm pheromone information is then transmitted, via projection neurons, to the lateral horn and the calyces of the mushroom body of the protocerebrum. In the lateral horn, we found a specific area where terminal boutons of alarm pheromone-sensitive projection neurons are more densely distributed than in the rest of the lateral horn. Some neurons in the protocerebrum responded specifically to formic acid or n-undecane and they may participate in the control of behavioral responses to each pheromone component. Other neurons, especially those originating from the mushroom body lobe, responded also to non-pheromonal odors and may play roles in integration of pheromonal and non-pheromonal signals. We found that a class of neurons receive inputs in the lateral horn and the mushroom body lobe and terminate in a variety of premotor areas. These neurons may participate in the control of aggressive behavior, which is sensitized by alarm pheromones and is triggered by non-pheromonal sensory stimuli associated with a potential enemy. We propose that the alarm pheromone processing system has evolved by differentiation of a part of general odor processing system.

  1. Sensor Systems Collect Critical Aerodynamics Data

    Science.gov (United States)

    2010-01-01

    With the support of Small Business Innovation Research (SBIR) contracts with Dryden Flight Research Center, Tao of Systems Integration Inc. developed sensors and other components that will ultimately form a first-of-its-kind, closed-loop system for detecting, measuring, and controlling aerodynamic forces and moments in flight. The Hampton, Virginia-based company commercialized three of the four planned components, which provide sensing solutions for customers such as Boeing, General Electric, and BMW and are used for applications such as improving wind turbine operation and optimizing air flow from air conditioning systems. The completed system may one day enable flexible-wing aircraft with flight capabilities like those of birds.

  2. Status, plans, and capabilities of the Nuclear Criticality Information System

    International Nuclear Information System (INIS)

    Koponen, B.L.

    1984-01-01

    The Nuclear Criticality Information System (NCIS), in preparation since 1981, has substantially evolved and now contains a growing number of resources pertinent to nuclear criticality safety. These resources include bibliographic compilations, experimental data, communications media, and the International Directory of Nuclear Criticality Safety Personnel. These resources are part of the LLNL Technology Information System (TIS) which provides the host computer for NCIS. The TIS provides nationwide access to authorized members of the nuclear criticality community via interactive dial-up from computer terminals that utilize communication facilities such as commercial and federal telephone networks, toll-free WATS lines, TYMNET, and the ARPANET/MILNET computer network

  3. SCALE system cross-section validation for criticality safety analysis

    International Nuclear Information System (INIS)

    Hathout, A.M.; Westfall, R.M.; Dodds, H.L. Jr.

    1980-01-01

    The purpose of this study is to test selected data from three cross-section libraries for use in the criticality safety analysis of UO 2 fuel rod lattices. The libraries, which are distributed with the SCALE system, are used to analyze potential criticality problems which could arise in the industrial fuel cycle for PWR and BWR reactors. Fuel lattice criticality problems could occur in pool storage, dry storage with accidental moderation, shearing and dissolution of irradiated elements, and in fuel transport and storage due to inadequate packing and shipping cask design. The data were tested by using the SCALE system to analyze 25 recently performed critical experiments

  4. 'Critical' behaviour of weakly bound systems

    International Nuclear Information System (INIS)

    Lassaut, M.; Lombard, R.J.; Bulboaca, I.

    1995-11-01

    The class of 3-dimensional finite range or similar potentials λW(r) is discussed, depending on a strength constant λ. The behaviour of the eigenvalue E as function of λ-λ c is studied, where λ c is the critical value at the transition from 0 → 1 bound state. For the l=0 case, E α (λ-λ c ) 2 was found, whereas the relationship is linear for l≥1. Treating l as a continuous parameter in the radial Schroedinger equation, the evolution of the power-law between l=0 and l=1 is given. Besides spherically symmetric scalar potentials, the case of a repulsive scalar potential combined with a spin-orbit component of the Thomas form is also discussed. (author)

  5. Life-critical digital flight control systems

    Science.gov (United States)

    Mcwha, James

    1990-01-01

    Digital autopilot systems were first used on commercial airplanes in the late 1970s. The A-320 airplane was the first air transport airplane with a fly-by-wire primary flight control system. On the 767-X (777) airplane Boeing will install all fly-by-wire flight controls. Activities related to safety, industry status and program phases are discussed.

  6. Alarm reduction with correlation analysis; Larmsanering genom korrelationsanalys

    Energy Technology Data Exchange (ETDEWEB)

    Bergquist, Tord; Ahnlund, Jonas; Johansson, Bjoern; Gaardman, Lennart; Raaberg, Martin [Lund Univ. (Sweden). Dept. of Information Technology

    2004-09-01

    This project's main interest is to improve the overall alarm situation in the control rooms. By doing so, the operators working environment is less overstrained, which simplifies the decision-making. According to a study of the British refinery industry, the operators make wrong decisions in four times out of ten due to badly tuned alarm systems, with heavy expenses as a result. Furthermore, a more efficiently alarm handling is estimated to decrease the production loss with between three and eight percent. This sounds, according to Swedish standards, maybe a bit extreme, but there is no doubt about the benefits of having a well-tuned alarm system. This project can be seen as an extension of 'General Methods for Alarm Reduction' (VARMEFORSK--835), where the process improvements were the result of suggestions tailored for every signal. Here, instead causal dependences in the process are examined. A method for this, specially designed to fit process signals, has been developed. It is called MLPC (Multiple Local Property Correlation) and could be seen as an unprejudiced way of increase the information value in the process. There are a number of ways to make use of the additional process understanding a correlation analysis provides. In the report some are mentioned, foremost aiming to improve the alarm situation for operators. Signals from two heating plants have been analyzed with MLPC. In simulations, with the use of the result from these analyses as a base, a large number of alarms have been successfully suppressed. The results have been studied by personal with process knowledge, and they are very positive to the use of MLPC and they express many benefits by the clarification of process relations. It was established in 'General Methods for Alarm Reduction' that low pass filter are superior to mean value filter and time delay when trying to suppress alarms. As a result, a module for signal processing has been developed. The main purpose is

  7. Utilization of Keno system for criticality calculation

    International Nuclear Information System (INIS)

    Maragni, M.G.

    1990-01-01

    Several studies involving benchmarks have been performed with the KENO-IV code in order to utilize it in a more efficient way at IPEN-COPESP. The influence of different cross section libraries has been verifed. The Hansen-Roach library produced better results for fast systems, while GAMTEC-II code was more efficient for thermal systems. For reflectors it has been shown that the differential albedo and automatic reflection options are more appropriate for infinite and finite reflectors, respectively. A number of histories greater than 30.000 did not seem to improve the results. Plutonium systems should be treated with special care. (author) [pt

  8. Resolving MC and A alarms from process monitoring in a fuel fabrication facility

    International Nuclear Information System (INIS)

    Smith, B.W.; Razvi, J.

    1984-01-01

    Process monitoring data can be used for generating material loss estimates. The intent of using process control data is to enhance nuclear material control and accounting for the timely detection and resolution of discrepancies. The purpose of an alarm resolution system is to distinguish between system errors and an actual loss of nuclear material. A study has been performed to develop and test a site-specific set of alarm resolution procedures. The results of the study are described and include the frequency of alarms, the causes of alarms, the type of resolution, and the modeling of loss estimates

  9. Systemic trade risk of critical resources.

    Science.gov (United States)

    Klimek, Peter; Obersteiner, Michael; Thurner, Stefan

    2015-11-01

    In the wake of the 2008 financial crisis, the role of strongly interconnected markets in causing systemic instability has been increasingly acknowledged. Trade networks of commodities are susceptible to cascades of supply shocks that increase systemic trade risks and pose a threat to geopolitical stability. We show that supply risk, scarcity, and price volatility of nonfuel mineral resources are intricately connected with the structure of the worldwide trade networks spanned by these resources. At the global level, we demonstrate that the scarcity of a resource is closely related to the susceptibility of the trade network with respect to cascading shocks. At the regional level, we find that, to some extent, region-specific price volatility and supply risk can be understood by centrality measures that capture systemic trade risk. The resources associated with the highest systemic trade risk indicators are often those that are produced as by-products of major metals. We identify significant strategic shortcomings in the management of systemic trade risk, in particular in the European Union.

  10. Criticality calculation of non-ordinary systems

    Energy Technology Data Exchange (ETDEWEB)

    Kalugin, A. V., E-mail: Kalugin-AV@nrcki.ru; Tebin, V. V. [National Research Centre Kurchatov Institute (Russian Federation)

    2016-12-15

    The specific features of calculation of the effective multiplication factor using the Monte Carlo method for weakly coupled and non-asymptotic multiplying systems are discussed. Particular examples are considered and practical recommendations on detection and Monte Carlo calculation of systems typical in numerical substantiation of nuclear safety for VVER fuel management problems are given. In particular, the problems of the choice of parameters for the batch mode and the method for normalization of the neutron batch, as well as finding and interpretation of the eigenvalue spectrum for the integral fission matrix, are discussed.

  11. Comparison study of hybrid VS critical systems in point kinetics

    International Nuclear Information System (INIS)

    Ritter, G.; Tommasi, J.; Slessarev, L.; Salvatores, M.; Mouney, H.; Vergnes, J.

    1999-01-01

    An essential motivation for hybrid systems is a potentially high level of intrinsic safety against reactivity accidents. In this respect, it is necessary to assess the behaviour of an Accelerator Driven System during a TOP, LOF or TOC accident. A comparison between a critical and sub-critical reactor shows a larger sensitivity for the critical system. The ADS has an unquestionable advantage in case of TOP but a less favourable behaviour as for LOFWS type of accidents. However in the ADS cases, the beam could be easily shut off during the transient. Therefore, a part of the R and D effort should be focused on the monitoring and control of power. (author)

  12. Systems approach critical to agroecosystems management

    Science.gov (United States)

    Sustainable dryland agriculture in the semi-arid Great Plains of the U.S. depends on achieving economic yields while maintaining soil resources. The traditional system of conventional tillage wheat-fallow was vulnerable to excessive soil erosion which resulted in excessive organic matter loss. No-...

  13. Triggers for the critical engagement with decision support systems

    NARCIS (Netherlands)

    Hartmann, Timo; Javernick-Will, A.; Chinowsky, P.

    2012-01-01

    In previous work, we showed that the critical engagement with a decision sup- port system during its implementation by a project team is an important an- tecedent for the successful later use of the technology. However, the mechanisms that trigger such critical engagement are so far not well

  14. Automatic diagnosis of multiple alarms for reactor-control rooms

    International Nuclear Information System (INIS)

    Gimmy, K.L.; Nomm, E.

    1981-01-01

    A system has been developed at the Savannah River Plant to help reactor operators respond to multiple alarms in a developing incident situation. The need for such systems has become evident in recent years, particularly after the three Mile Island incident

  15. Critical issues in an electronic documentation system.

    Science.gov (United States)

    Weir, Charlene R; Nebeker, Jonathan R

    2007-10-11

    The Veterans Health Administration (VHA), of the U.S. Department of Veteran Affairs has instituted a medical record (EMR) that includes electronic documentation of all narrative components of the medical record. To support clinicians using the system, multiple efforts have been instituted to ease the creation of narrative reports. Although electronic documentation is easier to read and improves access to information, it also may create new and additional hazards for users. This study is the first step in a series of studies to evaluate the issues surrounding the creation and use of electronic documentation. Eighty-eight providers across multiple clinical roles were interviewed in 10 primary care sites in the VA system. Interviews were tape-recorded, transcribed and qualitatively analyzed for themes. In addition, specific questions were asked about perceived harm due to electronic documentation practices. Five themes relating to difficulties with electronic documentation were identified: 1) information overload; 2) hidden information; 3) lack of trust; 4) communication; 5) decision-making. Three providers reported that they knew of an incident where current documentation practices had caused patient harm and over 75% of respondents reported significant mis-trust of the system.

  16. Alarm Fatigue vs User Expectations Regarding Context-Aware Alarm Handling in Hospital Environments Using CallMeSmart.

    Science.gov (United States)

    Solvoll, Terje; Arntsen, Harald; Hartvigsen, Gunnar

    2017-01-01

    Surveys and research show that mobile communication systems in hospital settings are old and cause frequent interruptions. In the quest to remedy this, an Android based communication system called CallMeSmart tries to encapsulate most of the frequent communication into one hand held device focusing on reducing interruptions and at the same time make the workday easier for healthcare workers. The objective of CallMeSmart is to use context-awareness techniques to automatically monitor the availability of physicians' and nurses', and use this information to prevent or route phone calls, text messages, pages and alarms that would otherwise compromise patient care. In this paper, we present the results from interviewing nurses on alarm fatigue and their expectations regarding context-aware alarm handling using CallMeSmart.

  17. Nuclear data requirements for accelerator driven sub-critical systems

    Indian Academy of Sciences (India)

    The development of accelerator driven sub-critical systems (ADSS) require significant amount of new nuclear data in extended energy regions as well as for a variety of new materials. This paper reviews these perspectives in the Indian context.

  18. Cognitive systems engineering analysis of the JCO criticality accident

    International Nuclear Information System (INIS)

    Tanabe, Fumiya; Yamaguchi, Yukichi

    2000-01-01

    The JCO Criticality Accident is analyzed with a framework based on cognitive systems engineering. With the framework, analysis is conducted integrally both from the system viewpoint and actors viewpoint. The occupational chemical risk was important as safety constraint for the actors as well as the nuclear risk, which is due to criticality accident, to the public and to actors. The inappropriate actor's mental model of the work system played a critical role and several factors (e.g. poor training and education, lack of information on criticality safety control in the procedures and instructions, and lack of warning signs at workplace) contributed to form and shape the mental model. Based on the analysis, several countermeasures, such as warning signs, information system for supporting actors and improved training and education, are derived to prevent such an accident. (author)

  19. Alarm management for storage and transportation terminals; Gerenciamento de alarmes para terminais de transferencia e estocagem

    Energy Technology Data Exchange (ETDEWEB)

    Loureiro, Patricia [PETROBRAS, Rio de Janeiro, RJ (Brazil); Feldman, Rafael Noac [PETROBRAS Transporte S.A. (TRANSPETRO), Rio de Janeiro, RJ (Brazil)

    2005-07-01

    Recently, in many industrial segments, it has been taken into account the issues related to the high amount of alarms that are announced in the control rooms, even if the industrial process is under normal conditions. Recent studies and surveys have shown that the three major problems related to it are: alarms that remain active during normal operation; alarms that remain chattering during an operational period; the phenomenon called Alarm flood, that occurs when an extensive amount of alarms is announced and the operator does not have enough time to take effective actions. In order to reduce or to eliminate the two above mentioned causes, alarm analysis and housekeeping, called Alarm Rationalization, have been efficient in major cases, because such facts occur mainly due to inadequate limits definition and/or equipment and instruments out of service or in maintenance. Such alarms are called in the literature as bad-actors or villains, and their occurrences may reach up to 50% of the daily total amount of alarms. This paper aims to present the main results of a project named Alarm Management for Transfer and Storage Terminals. The project development is based on two different terminal surveys, in order not only to identify the most frequent causes of undesirable alarms, but also to generate design standards. The main phases of the project are: alarm rationalization based on bad-actors detection; generate a set of design and operation standards; generate an Alarm Philosophy document for the Terminals. (author)

  20. CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2011-12-01

    Full Text Available Critical Information Infrastructure security will always be difficult to ensure, just because of the features that make it irreplaceable tor other critical infrastructures normal operation. It is decentralized, interconnected interdependent, controlled by multiple actors (mainly private and incorporating diverse types of technologies. It is almost axiomatic that the disruption of the Critical Information Infrastructure affects systems located much farther away, and the cyber problems have direct consequences on the real world. Indeed the Internet can be used as a multiplier in order to amplify the effects of an attack on some critical infrastructures. Security challenges increase with the technological progress. One of the last lines of defense which comes to complete the overall security scheme of the Critical Information Infrastructure is represented by the Network Intrusion Detection Systems.

  1. Systems thinking, critical realism and philosophy a confluence of ideas

    CERN Document Server

    Mingers, John

    2014-01-01

    Systems Thinking, Critical Realism and Philosophy: A Confluence of Ideas seeks to re-address the whole question of philosophy and systems thinking for the twenty first century and provide a new work that would be of value to both systems and philosophy. This is a highly opportune time when different fields - critical realism, philosophy of science and systems thinking - are all developing around the same set of concepts and yet not realizing it. This book will be of interest to the academic systems community worldwide and due to it's interdisciplinary coverage, it will also

  2. Identification and Isolation of Human Alarm Pheromones

    National Research Council Canada - National Science Library

    Mujica-Parodi, Lilianne R; Strey, Helmut

    2006-01-01

    .... Task I, Optimization of Sample Collection, focused on the collection of the putative alarm pheromone via axillary sweat samples obtained during reference (physical exercise) and arousal (skydive) conditions...

  3. A Critical Systems Metamethodology for Problem Situation Structuring

    OpenAIRE

    Slavica P. Petrovic

    2012-01-01

    The increasing complexity and diversity of management problem situations in organizations, as well as the increasing variety of theories, methodologies, methods, techniques, and models that can be employed in problem situation structuring and solving, must be considered as relevant aspects of management process in contemporary circumstances. Creative holism in management problem situations in organizations is enabled by means of Critical Systems Thinking (CST) as well as Critical Systems Prac...

  4. Computational methods for criticality safety analysis within the scale system

    International Nuclear Information System (INIS)

    Parks, C.V.; Petrie, L.M.; Landers, N.F.; Bucholz, J.A.

    1986-01-01

    The criticality safety analysis capabilities within the SCALE system are centered around the Monte Carlo codes KENO IV and KENO V.a, which are both included in SCALE as functional modules. The XSDRNPM-S module is also an important tool within SCALE for obtaining multiplication factors for one-dimensional system models. This paper reviews the features and modeling capabilities of these codes along with their implementation within the Criticality Safety Analysis Sequences (CSAS) of SCALE. The CSAS modules provide automated cross-section processing and user-friendly input that allow criticality safety analyses to be done in an efficient and accurate manner. 14 refs., 2 figs., 3 tabs

  5. Global parameter optimization for maximizing radioisotope detection probabilities at fixed false alarm rates

    Energy Technology Data Exchange (ETDEWEB)

    Portnoy, David, E-mail: david.portnoy@jhuapl.edu [Johns Hopkins University Applied Physics Laboratory, 11100 Johns Hopkins Road, Laurel, MD 20723 (United States); Feuerbach, Robert; Heimberg, Jennifer [Johns Hopkins University Applied Physics Laboratory, 11100 Johns Hopkins Road, Laurel, MD 20723 (United States)

    2011-10-01

    Today there is a tremendous amount of interest in systems that can detect radiological or nuclear threats. Many of these systems operate in extremely high throughput situations where delays caused by false alarms can have a significant negative impact. Thus, calculating the tradeoff between detection rates and false alarm rates is critical for their successful operation. Receiver operating characteristic (ROC) curves have long been used to depict this tradeoff. The methodology was first developed in the field of signal detection. In recent years it has been used increasingly in machine learning and data mining applications. It follows that this methodology could be applied to radiological/nuclear threat detection systems. However many of these systems do not fit into the classic principles of statistical detection theory because they tend to lack tractable likelihood functions and have many parameters, which, in general, do not have a one-to-one correspondence with the detection classes. This work proposes a strategy to overcome these problems by empirically finding parameter values that maximize the probability of detection for a selected number of probabilities of false alarm. To find these parameter values a statistical global optimization technique that seeks to estimate portions of a ROC curve is proposed. The optimization combines elements of simulated annealing with elements of genetic algorithms. Genetic algorithms were chosen because they can reduce the risk of getting stuck in local minima. However classic genetic algorithms operate on arrays of Booleans values or bit strings, so simulated annealing is employed to perform mutation in the genetic algorithm. The presented initial results were generated using an isotope identification algorithm developed at Johns Hopkins University Applied Physics Laboratory. The algorithm has 12 parameters: 4 real-valued and 8 Boolean. A simulated dataset was used for the optimization study; the 'threat' set of

  6. Global parameter optimization for maximizing radioisotope detection probabilities at fixed false alarm rates

    International Nuclear Information System (INIS)

    Portnoy, David; Feuerbach, Robert; Heimberg, Jennifer

    2011-01-01

    Today there is a tremendous amount of interest in systems that can detect radiological or nuclear threats. Many of these systems operate in extremely high throughput situations where delays caused by false alarms can have a significant negative impact. Thus, calculating the tradeoff between detection rates and false alarm rates is critical for their successful operation. Receiver operating characteristic (ROC) curves have long been used to depict this tradeoff. The methodology was first developed in the field of signal detection. In recent years it has been used increasingly in machine learning and data mining applications. It follows that this methodology could be applied to radiological/nuclear threat detection systems. However many of these systems do not fit into the classic principles of statistical detection theory because they tend to lack tractable likelihood functions and have many parameters, which, in general, do not have a one-to-one correspondence with the detection classes. This work proposes a strategy to overcome these problems by empirically finding parameter values that maximize the probability of detection for a selected number of probabilities of false alarm. To find these parameter values a statistical global optimization technique that seeks to estimate portions of a ROC curve is proposed. The optimization combines elements of simulated annealing with elements of genetic algorithms. Genetic algorithms were chosen because they can reduce the risk of getting stuck in local minima. However classic genetic algorithms operate on arrays of Booleans values or bit strings, so simulated annealing is employed to perform mutation in the genetic algorithm. The presented initial results were generated using an isotope identification algorithm developed at Johns Hopkins University Applied Physics Laboratory. The algorithm has 12 parameters: 4 real-valued and 8 Boolean. A simulated dataset was used for the optimization study; the 'threat' set of spectra

  7. Global parameter optimization for maximizing radioisotope detection probabilities at fixed false alarm rates

    Science.gov (United States)

    Portnoy, David; Feuerbach, Robert; Heimberg, Jennifer

    2011-10-01

    Today there is a tremendous amount of interest in systems that can detect radiological or nuclear threats. Many of these systems operate in extremely high throughput situations where delays caused by false alarms can have a significant negative impact. Thus, calculating the tradeoff between detection rates and false alarm rates is critical for their successful operation. Receiver operating characteristic (ROC) curves have long been used to depict this tradeoff. The methodology was first developed in the field of signal detection. In recent years it has been used increasingly in machine learning and data mining applications. It follows that this methodology could be applied to radiological/nuclear threat detection systems. However many of these systems do not fit into the classic principles of statistical detection theory because they tend to lack tractable likelihood functions and have many parameters, which, in general, do not have a one-to-one correspondence with the detection classes. This work proposes a strategy to overcome these problems by empirically finding parameter values that maximize the probability of detection for a selected number of probabilities of false alarm. To find these parameter values a statistical global optimization technique that seeks to estimate portions of a ROC curve is proposed. The optimization combines elements of simulated annealing with elements of genetic algorithms. Genetic algorithms were chosen because they can reduce the risk of getting stuck in local minima. However classic genetic algorithms operate on arrays of Booleans values or bit strings, so simulated annealing is employed to perform mutation in the genetic algorithm. The presented initial results were generated using an isotope identification algorithm developed at Johns Hopkins University Applied Physics Laboratory. The algorithm has 12 parameters: 4 real-valued and 8 Boolean. A simulated dataset was used for the optimization study; the "threat" set of spectra

  8. Program computes single-point failures in critical system designs

    Science.gov (United States)

    Brown, W. R.

    1967-01-01

    Computer program analyzes the designs of critical systems that will either prove the design is free of single-point failures or detect each member of the population of single-point failures inherent in a system design. This program should find application in the checkout of redundant circuits and digital systems.

  9. An Architecture Design Method for Critical Embedded Systems

    NARCIS (Netherlands)

    Feitosa, Daniel

    2014-01-01

    Critical embedded systems (CES) have become ubiquitous in the modern society, like in cars and energy appliances. However, besides their popularity, engineering of these systems is still particularly challenging. One of the greatest challenges in the development of such systems is their expected

  10. Surveying the critical success factors of BPM-systems implementation.

    NARCIS (Netherlands)

    Ravesteyn, P.; Batenburg, R.

    2010-01-01

    Purpose – The purpose of this paper is to explore if there is a common ground for the definition of business process management (BPM) and BPM-systems, as well as the critical success factors (CSFs) for BPM-system implementation. A BPM-system implementation framework is validated that classifies the

  11. TMACS test procedure TP001: Alarm management. Revision 6

    International Nuclear Information System (INIS)

    Scanlan, P.K.

    1994-01-01

    The TMACS Software Project Test Procedures translate the project's acceptance criteria into test steps. Software releases are certified when the affected Test Procedures are successfully performed and the customers authorize installation of these changes. This Test Procedure addresses the Alarm Management requirements of the TMACS. The features to be tested are: real-time alarming on high and low level and discrete alarms, equipment alarms, dead-band filtering, alarm display color coding, alarm acknowledgement, and alarm logging

  12. Controlling misses and false alarms in a machine learning framework for predicting uniformity of printed pages

    Science.gov (United States)

    Nguyen, Minh Q.; Allebach, Jan P.

    2015-01-01

    In our previous work1 , we presented a block-based technique to analyze printed page uniformity both visually and metrically. The features learned from the models were then employed in a Support Vector Machine (SVM) framework to classify the pages into one of the two categories of acceptable and unacceptable quality. In this paper, we introduce a set of tools for machine learning in the assessment of printed page uniformity. This work is primarily targeted to the printing industry, specifically the ubiquitous laser, electrophotographic printer. We use features that are well-correlated with the rankings of expert observers to develop a novel machine learning framework that allows one to achieve the minimum "false alarm" rate, subject to a chosen "miss" rate. Surprisingly, most of the research that has been conducted on machine learning does not consider this framework. During the process of developing a new product, test engineers will print hundreds of test pages, which can be scanned and then analyzed by an autonomous algorithm. Among these pages, most may be of acceptable quality. The objective is to find the ones that are not. These will provide critically important information to systems designers, regarding issues that need to be addressed in improving the printer design. A "miss" is defined to be a page that is not of acceptable quality to an expert observer that the prediction algorithm declares to be a "pass". Misses are a serious problem, since they represent problems that will not be seen by the systems designers. On the other hand, "false alarms" correspond to pages that an expert observer would declare to be of acceptable quality, but which are flagged by the prediction algorithm as "fails". In a typical printer testing and development scenario, such pages would be examined by an expert, and found to be of acceptable quality after all. "False alarm" pages result in extra pages to be examined by expert observers, which increases labor cost. But "false

  13. Formal methods for industrial critical systems a survey of applications

    CERN Document Server

    Margaria-Steffen, Tiziana

    2012-01-01

    "Today, formal methods are widely recognized as an essential step in the design process of industrial safety-critical systems. In its more general definition, the term formal methods encompasses all notations having a precise mathematical semantics, together with their associated analysis methods, that allow description and reasoning about the behavior of a system in a formal manner.Growing out of more than a decade of award-winning collaborative work within the European Research Consortium for Informatics and Mathematics, Formal Methods for Industrial Critical Systems: A Survey of Applications presents a number of mainstream formal methods currently used for designing industrial critical systems, with a focus on model checking. The purpose of the book is threefold: to reduce the effort required to learn formal methods, which has been a major drawback for their industrial dissemination; to help designers to adopt the formal methods which are most appropriate for their systems; and to offer a panel of state-of...

  14. Systems modeling and simulation applications for critical care medicine

    Science.gov (United States)

    2012-01-01

    Critical care delivery is a complex, expensive, error prone, medical specialty and remains the focal point of major improvement efforts in healthcare delivery. Various modeling and simulation techniques offer unique opportunities to better understand the interactions between clinical physiology and care delivery. The novel insights gained from the systems perspective can then be used to develop and test new treatment strategies and make critical care delivery more efficient and effective. However, modeling and simulation applications in critical care remain underutilized. This article provides an overview of major computer-based simulation techniques as applied to critical care medicine. We provide three application examples of different simulation techniques, including a) pathophysiological model of acute lung injury, b) process modeling of critical care delivery, and c) an agent-based model to study interaction between pathophysiology and healthcare delivery. Finally, we identify certain challenges to, and opportunities for, future research in the area. PMID:22703718

  15. Systems modeling and simulation applications for critical care medicine.

    Science.gov (United States)

    Dong, Yue; Chbat, Nicolas W; Gupta, Ashish; Hadzikadic, Mirsad; Gajic, Ognjen

    2012-06-15

    Critical care delivery is a complex, expensive, error prone, medical specialty and remains the focal point of major improvement efforts in healthcare delivery. Various modeling and simulation techniques offer unique opportunities to better understand the interactions between clinical physiology and care delivery. The novel insights gained from the systems perspective can then be used to develop and test new treatment strategies and make critical care delivery more efficient and effective. However, modeling and simulation applications in critical care remain underutilized. This article provides an overview of major computer-based simulation techniques as applied to critical care medicine. We provide three application examples of different simulation techniques, including a) pathophysiological model of acute lung injury, b) process modeling of critical care delivery, and c) an agent-based model to study interaction between pathophysiology and healthcare delivery. Finally, we identify certain challenges to, and opportunities for, future research in the area.

  16. A Cost Effective System Design Approach for Critical Space Systems

    Science.gov (United States)

    Abbott, Larry Wayne; Cox, Gary; Nguyen, Hai

    2000-01-01

    NASA-JSC required an avionics platform capable of serving a wide range of applications in a cost-effective manner. In part, making the avionics platform cost effective means adhering to open standards and supporting the integration of COTS products with custom products. Inherently, operation in space requires low power, mass, and volume while retaining high performance, reconfigurability, scalability, and upgradability. The Universal Mini-Controller project is based on a modified PC/104-Plus architecture while maintaining full compatibility with standard COTS PC/104 products. The architecture consists of a library of building block modules, which can be mixed and matched to meet a specific application. A set of NASA developed core building blocks, processor card, analog input/output card, and a Mil-Std-1553 card, have been constructed to meet critical functions and unique interfaces. The design for the processor card is based on the PowerPC architecture. This architecture provides an excellent balance between power consumption and performance, and has an upgrade path to the forthcoming radiation hardened PowerPC processor. The processor card, which makes extensive use of surface mount technology, has a 166 MHz PowerPC 603e processor, 32 Mbytes of error detected and corrected RAM, 8 Mbytes of Flash, and I Mbytes of EPROM, on a single PC/104-Plus card. Similar densities have been achieved with the quad channel Mil-Std-1553 card and the analog input/output cards. The power management built into the processor and its peripheral chip allows the power and performance of the system to be adjusted to meet the requirements of the application, allowing another dimension to the flexibility of the Universal Mini-Controller. Unique mechanical packaging allows the Universal Mini-Controller to accommodate standard COTS and custom oversized PC/104-Plus cards. This mechanical packaging also provides thermal management via conductive cooling of COTS boards, which are typically

  17. Critical phenomena in quasi-two-dimensional vibrated granular systems.

    Science.gov (United States)

    Guzmán, Marcelo; Soto, Rodrigo

    2018-01-01

    The critical phenomena associated to the liquid-to-solid transition of quasi-two-dimensional vibrated granular systems is studied using molecular dynamics simulations of the inelastic hard sphere model. The critical properties are associated to the fourfold bond-orientational order parameter χ_{4}, which measures the level of square crystallization of the system. Previous experimental results have shown that the transition of χ_{4}, when varying the vibration amplitude, can be either discontinuous or continuous, for two different values of the height of the box. Exploring the amplitude-height phase space, a transition line is found, which can be either discontinuous or continuous, merging at a tricritical point and the continuous branch ends in an upper critical point. In the continuous transition branch, the critical properties are studied. The exponent associated to the amplitude of the order parameter is β=1/2, for various system sizes, in complete agreement with the experimental results. However, the fluctuations of χ_{4} do not show any critical behavior, probably due to crossover effects by the close presence of the tricritical point. Finally, in quasi-one-dimensional systems, the transition is only discontinuous, limited by one critical point, indicating that two is the lower dimension for having a tricritical point.

  18. Display-And-Alarm Circuit For Accelerometer

    Science.gov (United States)

    Bozeman, Richard J., Jr.

    1995-01-01

    Compact accelerometer assembly consists of commercial accelerometer retrofit with display-and-alarm circuit. Provides simple means for technician attending machine to monitor vibrations. Also simpifies automatic safety shutdown by providing local alarm or shutdown signal when vibration exceeds preset level.

  19. T-Farm complex alarm upgrades

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, J.B.

    1995-01-01

    The alarm and controls associated with the T, TX, and TY farms are located in the 242-T control room. The design data for replacement and upgrades of the alarm panels is in this document. This task was canceled previous to the 90% design review point.

  20. Multi-parameter vital sign database to assist in alarm optimization for general care units.

    Science.gov (United States)

    Welch, James; Kanter, Benjamin; Skora, Brooke; McCombie, Scott; Henry, Isaac; McCombie, Devin; Kennedy, Rosemary; Soller, Babs

    2016-12-01

    Continual vital sign assessment on the general care, medical-surgical floor is expected to provide early indication of patient deterioration and increase the effectiveness of rapid response teams. However, there is concern that continual, multi-parameter vital sign monitoring will produce alarm fatigue. The objective of this study was the development of a methodology to help care teams optimize alarm settings. An on-body wireless monitoring system was used to continually assess heart rate, respiratory rate, SpO 2 and noninvasive blood pressure in the general ward of ten hospitals between April 1, 2014 and January 19, 2015. These data, 94,575 h for 3430 patients are contained in a large database, accessible with cloud computing tools. Simulation scenarios assessed the total alarm rate as a function of threshold and annunciation delay (s). The total alarm rate of ten alarms/patient/day predicted from the cloud-hosted database was the same as the total alarm rate for a 10 day evaluation (1550 h for 36 patients) in an independent hospital. Plots of vital sign distributions in the cloud-hosted database were similar to other large databases published by different authors. The cloud-hosted database can be used to run simulations for various alarm thresholds and annunciation delays to predict the total alarm burden experienced by nursing staff. This methodology might, in the future, be used to help reduce alarm fatigue without sacrificing the ability to continually monitor all vital signs.

  1. Network Randomization and Dynamic Defense for Critical Infrastructure Systems

    Energy Technology Data Exchange (ETDEWEB)

    Chavez, Adrian R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Martin, Mitchell Tyler [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hamlet, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Stout, William M.S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lee, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-04-01

    Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and development to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.

  2. Critical behavior of spin systems with quenched disorder

    International Nuclear Information System (INIS)

    Murtazaev, Akai K.; Kamilov, Ibragimkhan K.; Babaev, Albert B.

    2006-01-01

    A static critical behavior of three-dimensional diluted quenched Ising model on a cubic lattice is studied by Monte-Carlo methods. The static critical exponents of a specific heat α, susceptibility γ, magnetization β and exponent of correlation radius ν in a wide interval of change the values of spin concentrations p are calculated on the basis of the finite-size scaling theory using the common technique. The problem about universality classes of critical behavior for three-dimensional diluted systems is considered

  3. Intelligent monitoring, control, and security of critical infrastructure systems

    CERN Document Server

    Polycarpou, Marios

    2015-01-01

    This book describes the challenges that critical infrastructure systems face, and presents state of the art solutions to address them. How can we design intelligent systems or intelligent agents that can make appropriate real-time decisions in the management of such large-scale, complex systems? What are the primary challenges for critical infrastructure systems? The book also provides readers with the relevant information to recognize how important infrastructures are, and their role in connection with a society’s economy, security and prosperity. It goes on to describe state-of-the-art solutions to address these points, including new methodologies and instrumentation tools (e.g. embedded software and intelligent algorithms) for transforming and optimizing target infrastructures. The book is the most comprehensive resource to date for professionals in both the private and public sectors, while also offering an essential guide for students and researchers in the areas of modeling and analysis of critical in...

  4. Traceability of Software Safety Requirements in Legacy Safety Critical Systems

    Science.gov (United States)

    Hill, Janice L.

    2007-01-01

    How can traceability of software safety requirements be created for legacy safety critical systems? Requirements in safety standards are imposed most times during contract negotiations. On the other hand, there are instances where safety standards are levied on legacy safety critical systems, some of which may be considered for reuse for new applications. Safety standards often specify that software development documentation include process-oriented and technical safety requirements, and also require that system and software safety analyses are performed supporting technical safety requirements implementation. So what can be done if the requisite documents for establishing and maintaining safety requirements traceability are not available?

  5. Detection of criticality accidents. The Intertechnique EDAC II system

    International Nuclear Information System (INIS)

    Prigent, R.

    1991-01-01

    The chief aim of the new generation of EDAC II criticality accidents detection system is to reduce the risks associated to the handling of fissile material by providing a swift and safe warning of the development of any criticality accident. To this function already devolving on the EDAC system of the previous generation, the EDAC II adds the possibility of storing in memory the characteristics of the accident, providing a daily follow-up of the striking events in the system through the print-out of a log book and providing assistance to the operators during the periodical tests. (Author)

  6. On Critical Behaviour in Systems of Hamiltonian Partial Differential Equations.

    Science.gov (United States)

    Dubrovin, Boris; Grava, Tamara; Klein, Christian; Moro, Antonio

    2015-01-01

    We study the critical behaviour of solutions to weakly dispersive Hamiltonian systems considered as perturbations of elliptic and hyperbolic systems of hydrodynamic type with two components. We argue that near the critical point of gradient catastrophe of the dispersionless system, the solutions to a suitable initial value problem for the perturbed equations are approximately described by particular solutions to the Painlevé-I (P[Formula: see text]) equation or its fourth-order analogue P[Formula: see text]. As concrete examples, we discuss nonlinear Schrödinger equations in the semiclassical limit. A numerical study of these cases provides strong evidence in support of the conjecture.

  7. Tank waste remediation system nuclear criticality safety program management review

    International Nuclear Information System (INIS)

    BRADY RAAP, M.C.

    1999-01-01

    This document provides the results of an internal management review of the Tank Waste Remediation System (TWRS) criticality safety program, performed in advance of the DOE/RL assessment for closure of the TWRS Nuclear Criticality Safety Issue, March 1994. Resolution of the safety issue was identified as Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement) Milestone M-40-12, due September 1999

  8. Wild birds learn to eavesdrop on heterospecific alarm calls.

    Science.gov (United States)

    Magrath, Robert D; Haff, Tonya M; McLachlan, Jessica R; Igic, Branislav

    2015-08-03

    Many vertebrates gain critical information about danger by eavesdropping on other species' alarm calls [1], providing an excellent context in which to study information flow among species in animal communities [2-4]. A fundamental but unresolved question is how individuals recognize other species' alarm calls. Although individuals respond to heterospecific calls that are acoustically similar to their own, alarms vary greatly among species, and eavesdropping probably also requires learning [1]. Surprisingly, however, we lack studies demonstrating such learning. Here, we show experimentally that individual wild superb fairy-wrens, Malurus cyaneus, can learn to recognize previously unfamiliar alarm calls. We trained individuals by broadcasting unfamiliar sounds while simultaneously presenting gliding predatory birds. Fairy-wrens in the experiment originally ignored these sounds, but most fled in response to the sounds after two days' training. The learned response was not due to increased responsiveness in general or to sensitization following repeated exposure and was independent of sound structure. Learning can therefore help explain the taxonomic diversity of eavesdropping and the refining of behavior to suit the local community. In combination with previous work on unfamiliar predator recognition (e.g., [5]), our results imply rapid spread of anti-predator behavior within wild populations and suggest methods for training captive-bred animals before release into the wild [6]. A remaining challenge is to assess the importance and consequences of direct association of unfamiliar sounds with predators, compared with social learning-such as associating unfamiliar sounds with conspecific alarms. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Acknowledging the Infrasystem: A Critical Feminist Analysis of Systems Theory.

    Science.gov (United States)

    Creedon, Pamela J.

    1993-01-01

    Examines the absence of a critical feminist perspective in the application of systems theory as a unifying model for public relations. Describes an unacknowledged third system, the infrasystem, that constructs both suprasystem and subsystem interactions. Concludes with a case analysis of sport as illustration. (HB)

  10. Critical assessment of Nigeria criminal justice system and the ...

    African Journals Online (AJOL)

    Critical assessment of Nigeria criminal justice system and the perennial problem of awaiting trial in Port Harcourt maximum prison, Rivers State. ... Global Journal of Social Sciences ... Keywords: Nigeria criminal justice system, awaiting trial, rigidity of the penal law, holding charges, delay in the disposal of cases ...

  11. Critical experiments analysis by ABBN-90 constant system

    Energy Technology Data Exchange (ETDEWEB)

    Tsiboulia, A.; Nikolaev, M.N.; Golubev, V. [Institute of Physics and Power Engineering, Obninsk (Russian Federation)] [and others

    1997-06-01

    The ABBN-90 is a new version of the well-known Russian group-constant system ABBN. Included constants were calculated based on files of evaluated nuclear data from the BROND-2, ENDF/B-VI, and JENDL-3 libraries. The ABBN-90 is intended for the calculation of different types of nuclear reactors and radiation shielding. Calculations of criticality safety and reactivity accidents are also provided by using this constant set. Validation of the ABBN-90 set was made by using a computerized bank of evaluated critical experiments. This bank includes the results of experiments conducted in Russia and abroad of compact spherical assemblies with different reflectors, fast critical assemblies, and fuel/water-solution criticalities. This report presents the results of the calculational analysis of the whole collection of critical experiments. All calculations were produced with the ABBN-90 group-constant system. Revealed discrepancies between experimental and calculational results and their possible reasons are discussed. The codes and archives INDECS system is also described. This system includes three computerized banks: LEMEX, which consists of evaluated experiments and their calculational results; LSENS, which consists of sensitivity coefficients; and LUND, which consists of group-constant covariance matrices. The INDECS system permits us to estimate the accuracy of neutronics calculations. A discussion of the reliability of such estimations is finally presented. 16 figs.

  12. System for critical infrastructure security based on multispectral observation-detection module

    Science.gov (United States)

    Trzaskawka, Piotr; Kastek, Mariusz; Życzkowski, Marek; Dulski, Rafał; Szustakowski, Mieczysław; Ciurapiński, Wiesław; Bareła, Jarosław

    2013-10-01

    Recent terrorist attacks and possibilities of such actions in future have forced to develop security systems for critical infrastructures that embrace sensors technologies and technical organization of systems. The used till now perimeter protection of stationary objects, based on construction of a ring with two-zone fencing, visual cameras with illumination are efficiently displaced by the systems of the multisensor technology that consists of: visible technology - day/night cameras registering optical contrast of a scene, thermal technology - cheap bolometric cameras recording thermal contrast of a scene and active ground radars - microwave and millimetre wavelengths that record and detect reflected radiation. Merging of these three different technologies into one system requires methodology for selection of technical conditions of installation and parameters of sensors. This procedure enables us to construct a system with correlated range, resolution, field of view and object identification. Important technical problem connected with the multispectral system is its software, which helps couple the radar with the cameras. This software can be used for automatic focusing of cameras, automatic guiding cameras to an object detected by the radar, tracking of the object and localization of the object on the digital map as well as target identification and alerting. Based on "plug and play" architecture, this system provides unmatched flexibility and simplistic integration of sensors and devices in TCP/IP networks. Using a graphical user interface it is possible to control sensors and monitor streaming video and other data over the network, visualize the results of data fusion process and obtain detailed information about detected intruders over a digital map. System provide high-level applications and operator workload reduction with features such as sensor to sensor cueing from detection devices, automatic e-mail notification and alarm triggering. The paper presents

  13. The nuclear criticality information system's project to archive unpublished critical experiment data

    International Nuclear Information System (INIS)

    Koponen, B.L.; Doherty, A.L.; Clayton, E.D.

    1991-01-01

    Critical experiment facilities produced a large amount of important data during the past forty-five years. However, much useful data remains unpublished. The unpublished material exists in the form of experimenters' logbooks, notes, photographs, material descriptions, etc. These data could be important for computer code validation, understanding the physics of criticality, facility design, or for setting process limits. In the past, criticality specialists have been able to obtain unpublished details by direct contact with the experimenters. The closure of facilities and the loss of personnel is likely to lead to the loss of the facility records unless an effort is made to ensure that the records are preserved. It has been recognized for some time that the unpublished records of critical experiment facilities comprise a valuable resource, thus the Nuclear Criticality Information System (NCIS) is working to ensure that the records are preserved and made available via NCIS. As a first step in the archiving project, we identified criteria to help judge which series of experiments should be considered for archiving. Data that are used for validating calculations or the basis for subcritical limits in standards, handbooks, and guides are of particular importance. In this paper we will discuss the criteria for archiving, the priority list of experiments for archiving, and progress in developing an NCIS image database using current CD-ROM technology. (Author)

  14. Criticality safety and facility design considerations

    International Nuclear Information System (INIS)

    Waltz, W.R.

    1991-06-01

    Operations with fissile material introduce the risk of a criticality accident that may be lethal to nearby personnel. In addition, concerns over criticality safety can result in substantial delays and shutdown of facility operations. For these reasons, it is clear that the prevention of a nuclear criticality accident should play a major role in the design of a nuclear facility. The emphasis of this report will be placed on engineering design considerations in the prevention of criticality. The discussion will not include other important aspects, such as the physics of calculating limits nor criticality alarm systems

  15. Assessments of the kinetic and dynamic transient behavior of sub-critical systems (ADS) in comparison to critical reactor systems

    International Nuclear Information System (INIS)

    Schikorr, W.M.

    2001-01-01

    The neutron kinetic and the reactor dynamic behavior of Accelerator Driven Systems (ADS) is significantly different from those of conventional power reactor systems currently in use for the production of power. It is the objective of this study to examine and to demonstrate the intrinsic differences of the kinetic and dynamic behavior of accelerator driven systems to typical plant transient initiators in comparison to the known, kinetic and dynamic behavior of critical thermal and fast reactor systems. It will be shown that in sub-critical assemblies, changes in reactivity or in the external neutron source strength lead to an asymptotic power level essentially described by the instantaneous power change (i.e. prompt jump). Shutdown of ADS operating at high levels of sub-criticality, (i.e. k eff ∼0.99), without the support of reactivity control systems (such as control or safety rods), may be problematic in case the ability of cooling of the core should be impaired (i.e. loss of coolant flow). In addition, the dynamic behavior of sub-critical systems to typical plant transients such as protected or unprotected loss of flow (LOF) or heat sink (LOH) transients are not necessarily substantially different from the plant dynamic behavior of critical systems if the reactivity feedback coefficients of the ADS design are unfavorable. As expected, the state of sub-criticality and the temperature feedback coefficients, such as Doppler and coolant temperature coefficient, play dominant roles in determining the course and direction of plant transients. Should the combination of these safety coefficients be very unfavorable, not much additional margin in safety may be gained by making a critical system only sub-critical (i.e. k eff ∼0.95). A careful optimization procedure between the selected operating level of sub-criticality, the safety reactivity coefficients and the possible need for additional reactivity control systems seems, therefore, advisable during the early

  16. Progress report of the critical equipment monitoring system

    International Nuclear Information System (INIS)

    Pantis, M.J.

    1984-01-01

    The Philadelphia Electric Company has contracted with Energy Data Systems to develop a Critical Equipment Monitoring System for its Peach Bottom Nuclear Plant. This computerized system is designed to acquire and maintain accurate and timely status information on plant equipment. It will provide auditable record of plant and equipment transactions. Positive equipment identification and location will be provided. Errors in complex logical checking will be minimized. This system should reduce operator loading and improve operator communicatin with the plant personnel. Phase I of this system was installed at Peach Bottom Nuclear Station May 1982. It provides the necessary hardware and software to do check-off lists on critical plant systems. This paper describes some of the start-up and operational problems encountered

  17. Comprehensive smoke alarm coverage in lower economic status homes: alarm presence, functionality, and placement.

    Science.gov (United States)

    Sidman, Elanor A; Grossman, David C; Mueller, Beth A

    2011-08-01

    The objectives of this study are to estimate smoke alarm coverage and adherence with national guidelines in low- to mid-value owner-occupied residences, and to identify resident demographic, behavioral, and building characteristics and other fire and burn safety practices associated with smoke alarm utilization. Baseline visits were conducted with 779 households in King County, Washington, for a randomized trial of smoke alarm functionality. Presence, functionality, features, and location of pre-existing smoke alarms were ascertained by staff observation and testing. Household and building descriptors were collected using questionnaires. Households were classified by presence of smoke alarms, functional alarms, and functional and properly mounted alarms placed in hallways and on each floor but not in recommended avoidance locations. Smoke alarms were present in 89%, and functional units in 78%, of households. Only 6-38% met all assessed functionality and placement recommendations. Homes frequently lacked alarms in any bedrooms or on each floor. Building age, but not renovation status, was associated with all dimensions of smoke alarm coverage; post-1980 constructions were 1.7 times more likely to comply with placement recommendations than were pre-1941 homes (95% CI: 1.1-2.6). Respondent education and race/ethnicity, children wood stoves and fireplaces, number of smoke alarms, recency of smoke alarm testing, carbon monoxide monitors, and fire ladders displayed varying relationships with alarm presence, functionality, and placement. Strategies for maintaining smoke alarms in functional condition and improving compliance with placement recommendations are necessary to achieve universal coverage, and will benefit the majority of households.

  18. Alarm management in TRANSPETRO National Oil Control Center

    Energy Technology Data Exchange (ETDEWEB)

    Amado, Helio; Costa, Luciano [TRANSPETRO - PETROBRAS Transporte S.A., Rio de Janeiro, RJ (Brazil)

    2009-07-01

    For sure Alarm Management is not a new issue. EEMUA 191 has been around since 1999 and everyone has received visits from consultants in this area. Besides this regulators have requested that operators have a policy for it. However there are few papers showing actual pipeline operator experience in alarm management. In this paper we present the work developed in TRANSPETRO National Oil Control Center since 2006, where we operate 5509 km of crude oil and refined products pipelines. Since the beginning of the centralized operation in 2002, alarm management has been a concern but a systematic approach has been taken since 2006. Initially we will make a brief revision of the literature and show trends for regulations. Then we will show the tools and the approach we have taken. Finally, the further developments we see. The point that we want to discuss is that, it has been very difficult to implement the system in a linear way and we believe that companies that have huge legacy systems, the same probably will occur. Putting in simple words, our main conclusion is: Implementing an Alarm Management policy produces good results however probably sometimes is better not to follow strictly the traditional steps. (author)

  19. Differences in alarm events between disposable and reusable electrocardiography lead wires.

    Science.gov (United States)

    Albert, Nancy M; Murray, Terri; Bena, James F; Slifcak, Ellen; Roach, Joel D; Spence, Jackie; Burkle, Alicia

    2015-01-01

    Disposable electrocardiographic lead wires (ECG-LWs) may not be as durable as reusable ones. To examine differences in alarm events between disposable and reusable ECG-LWs. Two cardiac telemetry units were randomized to reusable ECG-LWs, and 2 units alternated between disposable and reusable ECG-LWs for 4 months. A remote monitoring team, blinded to ECG-LW type, assessed frequency and type of alarm events by using total counts and rates per 100 patient days. Event rates were compared by using generalized linear mixed-effect models for differences and noninferiority between wire types. In 1611 patients and 9385.5 patient days of ECG monitoring, patient characteristics were similar between groups. Rates of alarms for no telemetry, leads fail, or leads off were lower in disposable ECG-LWs (adjusted relative risk [95% CI], 0.71 [0.53-0.96]; noninferiority P < .001; superiority P = .03) and monitoring (artifact) alarms were significantly noninferior (adjusted relative risk [95% CI]: 0.88, [0.62-1.24], P = .02; superiority P = .44). No between-group differences existed in false or true crisis alarms. Disposable ECG-LWs were noninferior to reusable ECG-LWs for all false-alarm events (N [rate per 100 patient days], disposable 2029 [79.1] vs reusable 6673 [97.9]; adjusted relative risk [95% CI]: 0.81 [0.63-1.06], P = .002; superiority P = .12.) Disposable ECG-LWs with patented push-button design had superior performance in reducing alarms created by no telemetry, leads fail, or leads off and significant noninferiority in all false-alarm rates compared with reusable ECG-LWs. Fewer ECG alarms may save nurses time, decrease alarm fatigue, and improve patient safety. ©2015 American Association of Critical-Care Nurses.

  20. Specialized computer system to diagnose critical lined equipment

    Science.gov (United States)

    Yemelyanov, V. A.; Yemelyanova, N. Y.; Morozova, O. A.; Nedelkin, A. A.

    2018-05-01

    The paper presents data on the problem of diagnosing the lining condition at the iron and steel works. The authors propose and describe the structure of the specialized computer system to diagnose critical lined equipment. The relative results of diagnosing lining condition by the basic system and the proposed specialized computer system are presented. To automate evaluation of lining condition and support in making decisions regarding the operation mode of the lined equipment, the specialized software has been developed.

  1. Fault tolerant microcomputer based alarm annunciator for Dhruva reactor

    International Nuclear Information System (INIS)

    Chandra, A.K.

    1988-01-01

    The Dhruva alarm annunciator displays the status of 624 alarm points on an array of display windows using the standard ringback sequence. Recognizing the need for a very high availability, the system is implemented as a fault tolerant configuration. The annunciator is partitioned into three identical units; each unit is implemented using two microcomputers wired in a hot standby mode. In the event of one computer malfunctioning, the standby computer takes over control in a bouncefree transfer. The use of microprocessors has helped built-in flexibility in the system. The system also provides built-in capability to resolve the sequence of occurrence of events and conveys this information to another system for display on a CRT. This report describes the system features, fault tolerant organisation used and the hardware and software developed for the annunciation function. (author). 8 figs

  2. Alarm criteria in radiation portal monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Burr, Tom [Los Alamos National Laboratory, Statistical Sciences Group, Mail Stop F600, Los Alamos, NM 87545 (United States)]. E-mail: tburr@lanl.gov; Gattiker, James R. [Los Alamos National Laboratory, Statistical Sciences Group, Mail Stop F600, Los Alamos, NM 87545 (United States); Myers, Kary [Los Alamos National Laboratory, Statistical Sciences Group, Mail Stop F600, Los Alamos, NM 87545 (United States); Tompkins, George [Los Alamos National Laboratory, Risk Analysis and Decision Support Systems, Stop F609, Los Alamos, NM 87545 (United States)

    2007-05-15

    Gamma detectors at border crossings are intended to detect illicit nuclear material. These detectors collect counts that are used to determine whether to trigger an alarm. Several candidate alarm rules are evaluated, with attention to background suppression caused by the vehicle. Because the count criterion leads to many nuisance alarms and because background suppression by the vehicle is smaller for ratios of counts, analysis of a ratio criterion is included. Detection probability results that consider the effects of 5 factors are given for 2 signal-injection studies, 1 for counts, and 1 for count ratios.

  3. Alarm criteria in radiation portal monitoring

    International Nuclear Information System (INIS)

    Burr, Tom; Gattiker, James R.; Myers, Kary; Tompkins, George

    2007-01-01

    Gamma detectors at border crossings are intended to detect illicit nuclear material. These detectors collect counts that are used to determine whether to trigger an alarm. Several candidate alarm rules are evaluated, with attention to background suppression caused by the vehicle. Because the count criterion leads to many nuisance alarms and because background suppression by the vehicle is smaller for ratios of counts, analysis of a ratio criterion is included. Detection probability results that consider the effects of 5 factors are given for 2 signal-injection studies, 1 for counts, and 1 for count ratios

  4. Wallac automatic alarm dosimeter type RAD21

    International Nuclear Information System (INIS)

    Burgess, P. H.; Iles, W.J.

    1980-02-01

    The Automatic Alarm Dosimeter type RAD 21 is a batterypowered personal dosemeter and exposure rate alarm monitor, designed to be worn on the body, covering an exposure range from 0.1 to 999.9 mR and has an audible alarm which can be pre-set over the range 1 mR h -1 to 250 mR h -1 . The instrument is designed to measure x- and γ radiation over the energy range 50 keV to 3 MeV. The facilities and controls, the radiation, electrical, environmental and mechanical characteristics, and the manual, have been evaluated. (U.K.)

  5. Effects of integrated designs of alarm and process information on diagnosis performance in digital nuclear power plants.

    Science.gov (United States)

    Wu, Xiaojun; She, Manrong; Li, Zhizhong; Song, Fei; Sang, Wei

    2017-12-01

    In the main control rooms of nuclear power plants (NPPs), operators frequently switch between alarm displays and system-information displays to incorporate information from different screens. In this study, we investigated two integrated designs of alarm and process information - integrating alarm information into process displays (denoted as Alarm2Process integration) and integrating process information into alarm displays (denoted as Process2Alarm integration). To analyse the effects of the two integration approaches and time pressure on the diagnosis performance, a laboratory experiment was conducted with ninety-six students. The results show that compared with the non-integrated case, Process2Alarm integration yields better diagnosis performance in terms of diagnosis accuracy, time required to generate correct hypothesis and completion time. In contrast, the Alarm2Process integration leads to higher levels of workload, with no improvement in diagnosis performance. The diagnosis performance of Process2Alarm integration was consistently better than that of Alarm2Process integration, regardless of the levels of time pressure. Practitioner Summary: To facilitate operator's synthesis of NPP information when performing diagnosis tasks, we proposed to integrate process information into alarm displays. The laboratory validation shows that the integration approach significantly improves the diagnosis performance for both low and high time-pressure levels.

  6. Criticality safety validation: Simple geometry, single unit 233U systems

    International Nuclear Information System (INIS)

    Putman, V.L.

    1997-06-01

    Typically used LMITCO criticality safety computational methods are evaluated for suitability when applied to INEEL 233 U systems which reasonably can be modeled as simple-geometry, single-unit systems. Sixty-seven critical experiments of uranium highly enriched in 233 U, including 57 aqueous solution, thermal-energy systems and 10 metal, fast-energy systems, were modeled. These experiments include 41 cylindrical and 26 spherical cores, and 41 reflected and 26 unreflected systems. No experiments were found for intermediate-neutron-energy ranges, or with interstitial non-hydrogenous materials typical of waste systems, mixed 233 U and plutonium, or reflectors such as steel, lead, or concrete. No simple geometry experiments were found with cubic or annular cores, or approximating infinite sea systems. Calculations were performed with various tools and methodologies. Nine cross-section libraries, based on ENDF/B-IV, -V, or -VI.2, or on Hansen-Roach source data, were used with cross-section processing methods of MCNP or SCALE. The k eff calculations were performed with neutral-particle transport and Monte Carlo methods of criticality codes DANT, MCNP 4A, and KENO Va

  7. Battery-Aware Scheduling of Mixed Criticality Systems

    DEFF Research Database (Denmark)

    Wognsen, Erik Ramsgaard; Hansen, Rene Rydhof; Larsen, Kim Guldstrand

    2014-01-01

    . Mixed criticality and soft real-time systems may accept deadline violations and therefore enable trade-offs and evaluation of performance by criteria such as the number of tasks that can be completed with a given battery. We model a task set in combination with the kinetic battery model as a stochastic...

  8. Bolted Flanged Connection for Critical Plant/Piping Systems

    International Nuclear Information System (INIS)

    Efremov, Anatoly

    2006-01-01

    A novel type of Bolted Flanged Connection with bolts and gasket manufactured on a basis of advanced Shape Memory Alloys is examined. Presented approach combined with inverse flexion flange design of plant/piping joint reveals a significant increase of internal pressure under conditions of a variety of operating temperatures relating to critical plant/piping systems. (author)

  9. The commons from a critical social systems perspective

    Directory of Open Access Journals (Sweden)

    Wolfgang Hofkirchner

    2014-04-01

    Full Text Available Normal 0 21 false false false IT JA X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tabla normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:Cambria; mso-ascii-font-family:Cambria; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Cambria; mso-hansi-theme-font:minor-latin; mso-ansi-language:DE; mso-fareast-language:EN-US;} When developing the so-called Salzburg Approach to Information and Communication Technologies (ICTs and Society in the years 2004 to 2010, the sociology of technology the then working group of mine at the University of Salzburg used was based upon a combination of critical thinking and systems thinking – of Critical Theory and Systems Theory. Criticism and systemism both include what I’m used to calling the Logic of the Third. The Logic of the Third is the foundation of a critical social systems theory.  

  10. Disease scoring systems for oral lichen planus; a critical appraisal

    NARCIS (Netherlands)

    Wang, J.; van der Waal, I.

    2015-01-01

    The aim of the present study has been to critically review 22 disease scoring systems (DSSs) on oral lichen planus (OLP) that have been reported in the literature during the past decades. Although the presently available DSSs may all have some merit, particularly for research purposes, the diversity

  11. 'One physical system': Tansley's ecosystem as Earth's critical zone.

    Science.gov (United States)

    Richter, Daniel deB; Billings, Sharon A

    2015-05-01

    Integrative concepts of the biosphere, ecosystem, biogeocenosis and, recently, Earth's critical zone embrace scientific disciplines that link matter, energy and organisms in a systems-level understanding of our remarkable planet. Here, we assert the congruence of Tansley's (1935) venerable ecosystem concept of 'one physical system' with Earth science's critical zone. Ecosystems and critical zones are congruent across spatial-temporal scales from vegetation-clad weathering profiles and hillslopes, small catchments, landscapes, river basins, continents, to Earth's whole terrestrial surface. What may be less obvious is congruence in the vertical dimension. We use ecosystem metabolism to argue that full accounting of photosynthetically fixed carbon includes respiratory CO₂ and carbonic acid that propagate to the base of the critical zone itself. Although a small fraction of respiration, the downward diffusion of CO₂ helps determine rates of soil formation and, ultimately, ecosystem evolution and resilience. Because life in the upper portions of terrestrial ecosystems significantly affects biogeochemistry throughout weathering profiles, the lower boundaries of most terrestrial ecosystems have been demarcated at depths too shallow to permit a complete understanding of ecosystem structure and function. Opportunities abound to explore connections between upper and lower components of critical-zone ecosystems, between soils and streams in watersheds, and between plant-derived CO₂ and deep microbial communities and mineral weathering. © 2015 The Authors. New Phytologist © 2015 New Phytologist Trust.

  12. SUPERCOMPUTER SIMULATION OF CRITICAL PHENOMENA IN COMPLEX SOCIAL SYSTEMS

    Directory of Open Access Journals (Sweden)

    Petrus M.A. Sloot

    2014-09-01

    Full Text Available The paper describes a problem of computer simulation of critical phenomena in complex social systems on a petascale computing systems in frames of complex networks approach. The three-layer system of nested models of complex networks is proposed including aggregated analytical model to identify critical phenomena, detailed model of individualized network dynamics and model to adjust a topological structure of a complex network. The scalable parallel algorithm covering all layers of complex networks simulation is proposed. Performance of the algorithm is studied on different supercomputing systems. The issues of software and information infrastructure of complex networks simulation are discussed including organization of distributed calculations, crawling the data in social networks and results visualization. The applications of developed methods and technologies are considered including simulation of criminal networks disruption, fast rumors spreading in social networks, evolution of financial networks and epidemics spreading.

  13. Energy dependence of critical state of single-component systems

    International Nuclear Information System (INIS)

    Volchenkova, R.A.

    1985-01-01

    Equations of critical states of the single-component systems: Psub(cr)(/Psub(o)=(Tsub(cr)/Tsub(o))x0.73, Tsub(cr)=K(Tsub(boil))sup(1.116) and Hsub(cr)(/Hsub(B)=Tsub(sr)/Tsub(B))sup(1.48) where Tsub(B)=1K, Hsub(B)-2 kcal/g-at, K-dimension factor are presented. It is shown that the revealed dependence Hsub(cr)=H(Tsub(cr)) is an energy boundary of a liquid-vapour phase state of the single-component systems beyond limits of which difference between liquid and vapour phases vanishes in increasing the system energy content. The given equations of state are true for all the single-component systems and permit to consider physicomechanical properties of substances in dynamic state depending on external conditions. Critical temperatures and dependences for elements from the most fusible He to infusible W and Re have been calculated

  14. Application of SAE ARP4754A to Flight Critical Systems

    Science.gov (United States)

    Peterson, Eric M.

    2015-01-01

    This report documents applications of ARP4754A to the development of modern computer-based (i.e., digital electronics, software and network-based) aircraft systems. This study is to offer insight and provide educational value relative to the guidelines in ARP4754A and provide an assessment of the current state-of-the- practice within industry and regulatory bodies relative to development assurance for complex and safety-critical computer-based aircraft systems.

  15. Percutaneous nephrolithotomy; alarming variables for postoperative bleeding

    Directory of Open Access Journals (Sweden)

    Shakhawan H.A. Said

    2017-03-01

    Conclusion: According to our present results stone complexity (GSS grade 3 and 4, history of ipsilateral renal stone surgery, and occurrence of intraoperative pelvicalyceal perforation are alarming variables for post-PCNL bleeding.

  16. Application of neural networks to multiple alarm processing and diagnosis in nuclear power plants

    International Nuclear Information System (INIS)

    Cheon, Se Woo; Chang Soon Heung; Chung, Hak Yeong

    1992-01-01

    This paper presents feasibility studies of multiple alarm processing and diagnosis using neural networks. The back-propagation neural network model is applied to the training of multiple alarm patterns for the identification of failure in a reactor coolant pump (RCP) system. The general mapping capability of the neural network enables to identify a fault easily. The case studies are performed with emphasis on the applicability of the neural network to pattern recognition problems. It is revealed that the neural network model can identify the cause of multiple alarms properly, even when untrained or sensor-failed alarm symptoms are given. It is also shown that multiple failures are easily identified using the symptoms of multiple alarms

  17. Seminar in Critical Inquiry Twenty-first Century Nuclear Systems

    Energy Technology Data Exchange (ETDEWEB)

    LeMone, D. V.

    2002-02-25

    Critical Inquiry, has not only been successful in increasing university student retention rate but also in improving student academic performance beyond the initial year of transition into the University. The seminar course herein reviewed is a balanced combination of student personal and academic skill development combined with a solid background in modern nuclear systems. It is a valid premise to assume that entering students as well as stakeholders of the general public demonstrate equal levels of capability. Nuclear systems is designed to give a broad and basic knowledge of nuclear power, medical, industrial, research, and military systems (nuclear systems) in 20-25 hours.

  18. Seminar in Critical Inquiry Twenty-first Century Nuclear Systems

    International Nuclear Information System (INIS)

    LeMone, D. V.

    2002-01-01

    Critical Inquiry, has not only been successful in increasing university student retention rate but also in improving student academic performance beyond the initial year of transition into the University. The seminar course herein reviewed is a balanced combination of student personal and academic skill development combined with a solid background in modern nuclear systems. It is a valid premise to assume that entering students as well as stakeholders of the general public demonstrate equal levels of capability. Nuclear systems is designed to give a broad and basic knowledge of nuclear power, medical, industrial, research, and military systems (nuclear systems) in 20-25 hours

  19. The theory of critical phenomena in two-dimensional systems

    International Nuclear Information System (INIS)

    Olvera de la C, M.

    1981-01-01

    An exposition of the theory of critical phenomena in two-dimensional physical systems is presented. The first six chapters deal with the mean field theory of critical phenomena, scale invariance of the thermodynamic functions, Kadanoff's spin block construction, Wilson's renormalization group treatment of critical phenomena in configuration space, and the two-dimensional Ising model on a triangular lattice. The second part of this work is made of four chapters devoted to the application of the ideas expounded in the first part to the discussion of critical phenomena in superfluid films, two-dimensional crystals and the two-dimensional XY model of magnetic systems. Chapters seven to ten are devoted to the following subjects: analysis of long range order in one, two, and three-dimensional physical systems. Topological defects in the XY model, in superfluid films and in two-dimensional crystals. The Thouless-Kosterlitz iterated mean field theory of the dipole gas. The renormalization group treatment of the XY model, superfluid films and two-dimensional crystal. (author)

  20. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  1. The use of operator surveys by the CEGB to evaluate nuclear control room design and initiatives in the design of alarm systems and control room operating procedures

    International Nuclear Information System (INIS)

    Jackson, A.R.G.

    1988-01-01

    This paper reports on the use of operator surveys and trip report analysis methods which the Central Electricity Generating Board has developed to assess the extent and adequacy of operator support systems currently installed on its four twin-reactor, first generation Advanced Gas Cooled Reactor nuclear power plants. The survey consisted of a programme of structured interviews with control room engineers. The scope of the questions addressed; working environment, communications, man-machine interface, procedural information, and the diagnostic and predictive support system. The analysis of trip reports was targetted at identifying aspects of the performance of the operator support systems which might have been contributory to the cause of reactor trip. The results of this work are being used to assist in determining guidelines for the development of operator support systems, computerised controls and the structure of station operating procedures

  2. Description of Fracture Systems for External Criticality Reports

    International Nuclear Information System (INIS)

    Nicot, Jean-Philippe

    2001-01-01

    The purpose of this Analysis/Model Report (AMR) is to describe probabilistically the main features of the geometry of the fracture system in the vicinity of the repository. They will be used to determine the quantity of fissile material that could accumulate in the fractured rock underneath a waste package as it degrades. This AMR is to feed the geochemical calculations for external criticality reports. This AMR is done in accordance with the technical work plan (BSC (Bechtel SAIC Company) 2001 b). The scope of this AMR is restricted to the relevant parameters of the fracture system. The main parameters of interest are fracture aperture and fracture spacing distribution parameters. The relative orientation of the different fracture sets is also important because of its impact on criticality, but they will be set deterministically. The maximum accumulation of material depends primarily on the fracture porosity, combination of the fracture aperture, and fracture intensity. However, the fracture porosity itself is not sufficient to characterize the potential for accumulation of a fracture system. The fracture aperture is also important because it controls both the flow through the fracture and the potential plugging of the system. Other features contributing to the void space such as lithophysae are also investigated. On the other hand, no analysis of the matrix porosity is done. The parameters will be used in sensitivity analyses of geochemical calculations providing actinide accumulations and in the subsequent Monte Carlo criticality analyses

  3. Architecture Level Safety Analyses for Safety-Critical Systems

    Directory of Open Access Journals (Sweden)

    K. S. Kushal

    2017-01-01

    Full Text Available The dependency of complex embedded Safety-Critical Systems across Avionics and Aerospace domains on their underlying software and hardware components has gradually increased with progression in time. Such application domain systems are developed based on a complex integrated architecture, which is modular in nature. Engineering practices assured with system safety standards to manage the failure, faulty, and unsafe operational conditions are very much necessary. System safety analyses involve the analysis of complex software architecture of the system, a major aspect in leading to fatal consequences in the behaviour of Safety-Critical Systems, and provide high reliability and dependability factors during their development. In this paper, we propose an architecture fault modeling and the safety analyses approach that will aid in identifying and eliminating the design flaws. The formal foundations of SAE Architecture Analysis & Design Language (AADL augmented with the Error Model Annex (EMV are discussed. The fault propagation, failure behaviour, and the composite behaviour of the design flaws/failures are considered for architecture safety analysis. The illustration of the proposed approach is validated by implementing the Speed Control Unit of Power-Boat Autopilot (PBA system. The Error Model Annex (EMV is guided with the pattern of consideration and inclusion of probable failure scenarios and propagation of fault conditions in the Speed Control Unit of Power-Boat Autopilot (PBA. This helps in validating the system architecture with the detection of the error event in the model and its impact in the operational environment. This also provides an insight of the certification impact that these exceptional conditions pose at various criticality levels and design assurance levels and its implications in verifying and validating the designs.

  4. Software Safety Risk in Legacy Safety-Critical Computer Systems

    Science.gov (United States)

    Hill, Janice L.; Baggs, Rhoda

    2007-01-01

    Safety Standards contain technical and process-oriented safety requirements. Technical requirements are those such as "must work" and "must not work" functions in the system. Process-Oriented requirements are software engineering and safety management process requirements. Address the system perspective and some cover just software in the system > NASA-STD-8719.13B Software Safety Standard is the current standard of interest. NASA programs/projects will have their own set of safety requirements derived from the standard. Safety Cases: a) Documented demonstration that a system complies with the specified safety requirements. b) Evidence is gathered on the integrity of the system and put forward as an argued case. [Gardener (ed.)] c) Problems occur when trying to meet safety standards, and thus make retrospective safety cases, in legacy safety-critical computer systems.

  5. Software Reliability Issues Concerning Large and Safety Critical Software Systems

    Science.gov (United States)

    Kamel, Khaled; Brown, Barbara

    1996-01-01

    This research was undertaken to provide NASA with a survey of state-of-the-art techniques using in industrial and academia to provide safe, reliable, and maintainable software to drive large systems. Such systems must match the complexity and strict safety requirements of NASA's shuttle system. In particular, the Launch Processing System (LPS) is being considered for replacement. The LPS is responsible for monitoring and commanding the shuttle during test, repair, and launch phases. NASA built this system in the 1970's using mostly hardware techniques to provide for increased reliability, but it did so often using custom-built equipment, which has not been able to keep up with current technologies. This report surveys the major techniques used in industry and academia to ensure reliability in large and critical computer systems.

  6. The under-critical reactors physics for the hybrid systems

    International Nuclear Information System (INIS)

    Schapira, J.P.; Vergnes, J.; Zaetta, A.

    1998-01-01

    This day, organized by the SFEN, took place at Paris the 12 march 1998. Nine papers were presented. They take stock on the hybrid systems and more specifically the under-critical reactors. One of the major current preoccupation of nuclear industry is the problems of the increase of radioactive wastes produced in the plants and the destruction of the present stocks. To solve these problems a solution is the utilisation of hybrid systems: the coupling of a particle acceleration to an under-critical reactor. Historical aspects, advantages and performances of such hybrid reactors are presented in general papers. More technical papers are devoted to the spallation, the MUSE and the TARC experiments. (A.L.B.)

  7. Emerging and Future Cyber Threats to Critical Systems

    OpenAIRE

    Djambazova , Edita; Almgren , Magnus; Dimitrov , Kiril; Jonsson , Erland

    2010-01-01

    Part 2: Adversaries; International audience; This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serious and undesirable consequences, based on the character...

  8. Spacecraft System Integration and Test: SSTI Lewis critical design audit

    Science.gov (United States)

    Brooks, R. P.; Cha, K. K.

    1995-01-01

    The Critical Design Audit package is the final detailed design package which provides a comprehensive description of the SSTI mission. This package includes the program overview, the system requirements, the science and applications activities, the ground segment development, the assembly, integration and test description, the payload and technology demonstrations, and the spacecraft bus subsystems. Publication and presentation of this document marks the final requirements and design freeze for SSTI.

  9. Universality classes and critical phenomena in confined liquid systems

    Directory of Open Access Journals (Sweden)

    A.V. Chalyi

    2013-06-01

    Full Text Available It is well known that the similar universal behavior of infinite-size (bulk systems of different nature requires the same basic conditions: space dimensionality; number components of order parameter; the type (short- or long-range of the intermolecular interaction; symmetry of the fluctuation part of thermodynamical potential. Basic conditions of similar universal behavior of confined systems needs the same supplementary conditions such as the number of monolayers for a system confinement; low crossover dimensionality, i.e., geometric form of restricted volume; boundary conditions on limiting surfaces; physical properties under consideration. This review paper is aimed at studying all these conditions of similar universal behavior for diffusion processes in confined liquid systems. Special attention was paid to the effects of spatial dispersion and low crossover dimensionality. This allowed us to receive receiving correct nonzero expressions for the diffusion coefficient at the critical point and to take into account the specific geometric form of the confined liquid volume. The problem of 3D⇔2D dimensional crossover was analyzed. To receive a smooth crossover for critical exponents, the Kawasaki-like approach from the theory of mode coupling in critical dynamics was proposed. This ensured a good agreement between data of computer experiment and theoretical calculations of the size dependence of the critical temperature Tc(H of water in slitlike pores. The width of the quasi-elastic scattering peak of slow neutrons near the structural phase transition in the aquatic suspensions of plasmatic membranes (mesostructures with the typical thickness up to 10 nm was studied. It was shown that the width of quasi-elastic peak of neutron scattering decreases due to the process of cell proliferation, i.e., with an increase of the membrane size (including the membrane thickness. Thus, neutron studies could serve as an additional diagnostic test for the

  10. Protecting Commercial Space Systems: A Critical National Security Issue

    Science.gov (United States)

    1999-04-01

    systems. Part two will describe, at the operational level , this author’s theory for space protection and recommend a course of action to work...minimal loss of life. These factors force us to conclude this is a critical national security issue just as many in high- level government positions...Command and Staff College Operational Forces Coursebook (Academic Year 1999), 35. 3 The USCG is not a Title 10 Service, thus Posse Comitatus is not a

  11. Systems Engineering-Based Tool for Identifying Critical Research Systems

    Science.gov (United States)

    Abbott, Rodman P.; Stracener, Jerrell

    2016-01-01

    This study investigates the relationship between the designated research project system independent variables of Labor, Travel, Equipment, and Contract total annual costs and the dependent variables of both the associated matching research project total annual academic publication output and thesis/dissertation number output. The Mahalanobis…

  12. Critical interfaces in geosynthetic multilayer liner system of a landfill

    Directory of Open Access Journals (Sweden)

    Qian Xuede

    2008-12-01

    Full Text Available This study is to identify the critical interface in a geosynthetic multilayer liner system by examining the effects of the interface shear strength of liner components, leachate level, leachate buildup cases, and peak and residual interface strengths. According to current landfill design procedures, conducting stability analysis along the same interface at both the back slope and base may result in a non-conservative result. The critical interfaces with the minimum factor of safety are generally found at different locations along the back slope and base. The critical interface for a multilayer liner system cannot simply be assumed during stability analysis. It can shift from one interface to another with changes in the leachate level and with different leachate buildup cases. The factor of safety for an interface with a high friction angle and low apparent cohesion generally drops much more quickly than it does under inverse conditions when the leachate level increases. The failure interface in a liner system under residual conditions is usually different from the failure interface under peak conditions.

  13. 46 CFR 97.37-9 - Carbon dioxide alarm.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Carbon dioxide alarm. 97.37-9 Section 97.37-9 Shipping... Markings for Fire and Emergency Equipment, Etc. § 97.37-9 Carbon dioxide alarm. (a) All carbon dioxide alarms shall be conspicuously identified: “WHEN ALARM SOUNDS—VACATE AT ONCE. CARBON DIOXIDE BEING...

  14. 46 CFR 78.47-9 - Carbon dioxide alarm.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 3 2010-10-01 2010-10-01 false Carbon dioxide alarm. 78.47-9 Section 78.47-9 Shipping... and Emergency Equipment, Etc. § 78.47-9 Carbon dioxide alarm. (a) All carbon dioxide alarms shall be conspicuously identified: “WHEN ALARM SOUNDS—VACATE AT ONCE. CARBON DIOXIDE BEING RELEASED.” (b) [Reserved] ...

  15. 46 CFR 196.37-9 - Carbon dioxide alarm.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Carbon dioxide alarm. 196.37-9 Section 196.37-9 Shipping... Markings for Fire and Emergency Equipment, etc. § 196.37-9 Carbon dioxide alarm. (a) All carbon dioxide alarms shall be conspicuously identified: “WHEN ALARM SOUNDS—VACATE AT ONCE. CARBON DIOXIDE BEING...

  16. 46 CFR 108.627 - Carbon dioxide alarm.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Carbon dioxide alarm. 108.627 Section 108.627 Shipping... EQUIPMENT Equipment Markings and Instructions § 108.627 Carbon dioxide alarm. Each carbon dioxide alarm must be identified by marking: “WHEN ALARM SOUNDS VACATE AT ONCE. CARBON DIOXIDE BEING RELEASED” next to...

  17. Design of reactor alarm instrument based on SOPC

    International Nuclear Information System (INIS)

    Li Meng; Lu Yi; Rong Ru

    2008-01-01

    The design of embedded alarm instrument in reactors based on Nios II CPU is introduced in this paper. This design uses the SOPC technology based on the Cyclone series FPGA as a digital bench, and connects the MPU and drivers and interface of times, RS232, sdram,and etc. into a FPGA chip. It is proved that the system achieves the design goals in primary experimentation. (authors)

  18. The research of nuclear experiment radiation environment wireless alarm device

    International Nuclear Information System (INIS)

    Wang Xiaoqiong; Wang Pan; Fang Fang

    2009-01-01

    This article introduces based on monolithic integrated circuit's nuclear experiment radiation environment wireless alarm device's software and hardware design. The system by G-M tube, high-pressured module, signal conditioning circuit, power source module, monolithic integrated circuit and wireless transmission module is composed. The device has low power consumption, high performance, high accuracy detection, easy maintenance, small size, simple operation, and other features, and has a broad application prospects. (authors)

  19. Analyzing Software Requirements Errors in Safety-Critical, Embedded Systems

    Science.gov (United States)

    Lutz, Robyn R.

    1993-01-01

    This paper analyzes the root causes of safety-related software errors in safety-critical, embedded systems. The results show that software errors identified as potentially hazardous to the system tend to be produced by different error mechanisms than non- safety-related software errors. Safety-related software errors are shown to arise most commonly from (1) discrepancies between the documented requirements specifications and the requirements needed for correct functioning of the system and (2) misunderstandings of the software's interface with the rest of the system. The paper uses these results to identify methods by which requirements errors can be prevented. The goal is to reduce safety-related software errors and to enhance the safety of complex, embedded systems.

  20. Disease scoring systems for oral lichen planus; a critical appraisal

    Science.gov (United States)

    Wang, Jing

    2015-01-01

    The aim of the present study has been to critically review 22 disease scoring systems (DSSs) on oral lichen planus (OLP) that have been reported in the literature during the past decades. Although the presently available DSSs may all have some merit, particularly for research purposes, the diversity of both the objective and subjective parameters used in these systems and the lack of acceptance of one of these systems for uniform use, there is a need for an international, authorized consensus meeting on this subject. Because of the natural course of OLP characterized by remissions and exacerbations and also due to the varying distribution pattern and the varying clinical types, e.g. reticular and erosive, the relevance of a DSS based on morphologic parameters is somewhat questionable. Instead, one may consider to only look for a quality of life scoring system adapted for use in OLP patients. Key words:Oral lichen planus, disease scoring system, classification. PMID:25681372

  1. Bowel management systems in critical care: a service evaluation.

    Science.gov (United States)

    Ritzema, Jennifer

    2017-01-25

    Aim Many patients who are critically ill develop faecal incontinence associated with diarrhoea, and require a bowel management system (BMS) to prevent skin excoriation. Following guidelines produced by the National Institute for Health and Care Excellence, early rehabilitation has resulted in a reduction in the number of days that patients receive mechanical ventilation. However, patients with a BMS are potentially mechanically ventilated for longer because they are cared for in bed. The aim of this evaluation was to investigate whether patients with a BMS are mechanically ventilated for longer than those without a BMS. Method This was a retrospective service evaluation, in which a database search was conducted to identify patients admitted to the critical care department in one healthcare organisation during 2013. The search was narrowed to identify patients admitted to the critical care department who had received advanced respiratory support (mechanical ventilation), to compare the mean number of mechanically ventilated days between patients with and without a BMS (n = 122). Data were analysed using the Mann-Whitney U test. Results There was a significant difference in the number of mechanically ventilated days (Pcritically ill patients with a BMS are placed in a sitting position for short periods of time. Further research should explore alternative bowel care options for patients who are critically ill.

  2. On self-organized criticality in nonconserving systems

    International Nuclear Information System (INIS)

    Socolar, J.E.S.; Grinstein, G.; Jayaprakash, C.

    1993-01-01

    Two models with nonconserving dynamics and slow continuous deterministic driving, a stick-slip model (SSM) of earthquake dynamics and a toy forest-fire model (FFM), have recently been argued to show numerical evidence of self-organized criticality (generic, scale-invariant steady states). To determine whether the observed criticality is indeed generic, we study these models as a function of a parameter γ which was implicitly tuned to a special value, γ=1, in their original definitions. In both cases, the maximum Lyapunov exponent vanishes at γ=1. We find that the FFM does not exhibit self-organized criticality for any γ, including γ=1; nor does the SSM with periodic boundary conditions. Both models show evidence of macroscopic periodic oscillations in time for some range of γ values. We suggest that such oscillations may provide a mechanism for the generation of scale-invariant structure in nonconserving systems, and, in particular, that they underlie the criticality previously observed in the SSM with open boundary conditions

  3. Evaluating Models of Human Performance: Safety-Critical Systems Applications

    Science.gov (United States)

    Feary, Michael S.

    2012-01-01

    This presentation is part of panel discussion on Evaluating Models of Human Performance. The purpose of this panel is to discuss the increasing use of models in the world today and specifically focus on how to describe and evaluate models of human performance. My presentation will focus on discussions of generating distributions of performance, and the evaluation of different strategies for humans performing tasks with mixed initiative (Human-Automation) systems. I will also discuss issues with how to provide Human Performance modeling data to support decisions on acceptability and tradeoffs in the design of safety critical systems. I will conclude with challenges for the future.

  4. Verification and Validation for Flight-Critical Systems (VVFCS)

    Science.gov (United States)

    Graves, Sharon S.; Jacobsen, Robert A.

    2010-01-01

    On March 31, 2009 a Request for Information (RFI) was issued by NASA s Aviation Safety Program to gather input on the subject of Verification and Validation (V & V) of Flight-Critical Systems. The responses were provided to NASA on or before April 24, 2009. The RFI asked for comments in three topic areas: Modeling and Validation of New Concepts for Vehicles and Operations; Verification of Complex Integrated and Distributed Systems; and Software Safety Assurance. There were a total of 34 responses to the RFI, representing a cross-section of academic (26%), small & large industry (47%) and government agency (27%).

  5. Moving Towards a Common Alarm Service for the LHC Era

    CERN Document Server

    Calderini, F; Stapley, N; Tyrell, M W

    2003-01-01

    The Large Hadron Collider (LHC) is one of the greatest technological challenges ever faced by accelerator builders. It is due for commissioning in 4 years and will have a lifetime well in excess of 10. The LHC will contain a completely heterogeneous mixture of industrial controls, both hardware and software, as well as dedicated, specialised, 'home' built systems. As part of the control infrastructure of such a complex machine, a number of 'services' will be essential as aids during operation, such as: logging / archiving, post-mortem, sequences, alarm system, etc. This paper describes the approach to be taken in order to define and provide the alarm service necessary for LHC. Details will be given of: the graceful transition from the current LEP alarm system; accommodating the SPS, PS and CERN's technical services; the technologies to be used; the approach of parallel investigations of industrial and 'home' builtsystems to ensure the best possible solution; and an indication of time scales to provide an oper...

  6. Automated information-analytical system for thunderstorm monitoring and early warning alarms using modern physical sensors and information technologies with elements of artificial intelligence

    Science.gov (United States)

    Boldyreff, Anton S.; Bespalov, Dmitry A.; Adzhiev, Anatoly Kh.

    2017-05-01

    Methods of artificial intelligence are a good solution for weather phenomena forecasting. They allow to process a large amount of diverse data. Recirculation Neural Networks is implemented in the paper for the system of thunderstorm events prediction. Large amounts of experimental data from lightning sensors and electric field mills networks are received and analyzed. The average recognition accuracy of sensor signals is calculated. It is shown that Recirculation Neural Networks is a promising solution in the forecasting of thunderstorms and weather phenomena, characterized by the high efficiency of the recognition elements of the sensor signals, allows to compress images and highlight their characteristic features for subsequent recognition.

  7. Review on modeling and simulation of interdependent critical infrastructure systems

    International Nuclear Information System (INIS)

    Ouyang, Min

    2014-01-01

    Modern societies are becoming increasingly dependent on critical infrastructure systems (CISs) to provide essential services that support economic prosperity, governance, and quality of life. These systems are not alone but interdependent at multiple levels to enhance their overall performance. However, recent worldwide events such as the 9/11 terrorist attack, Gulf Coast hurricanes, the Chile and Japanese earthquakes, and even heat waves have highlighted that interdependencies among CISs increase the potential for cascading failures and amplify the impact of both large and small scale initial failures into events of catastrophic proportions. To better understand CISs to support planning, maintenance and emergency decision making, modeling and simulation of interdependencies across CISs has recently become a key field of study. This paper reviews the studies in the field and broadly groups the existing modeling and simulation approaches into six types: empirical approaches, agent based approaches, system dynamics based approaches, economic theory based approaches, network based approaches, and others. Different studies for each type of the approaches are categorized and reviewed in terms of fundamental principles, such as research focus, modeling rationale, and the analysis method, while different types of approaches are further compared according to several criteria, such as the notion of resilience. Finally, this paper offers future research directions and identifies critical challenges in the field. - Highlights: • Modeling approaches on interdependent critical infrastructure systems are reviewed. • I mainly review empirical, agent-based, system-dynamics, economic, network approaches. • Studies by each approach are sorted out in terms of fundamental principles. • Different approaches are further compared with resilience as the main criterion

  8. Controlled cross-over study in normal subjects of naloxone-preceding-lactate infusions; respiratory and subjective responses: relationship to endogenous opioid system, suffocation false alarm theory and childhood parental loss.

    Science.gov (United States)

    Preter, M; Lee, S H; Petkova, E; Vannucci, M; Kim, S; Klein, D F

    2011-02-01

    The expanded suffocation false alarm theory (SFA) hypothesizes that dysfunction in endogenous opioidergic regulation increases sensitivity to CO2, separation distress and panic attacks. In panic disorder (PD) patients, both spontaneous clinical panics and lactate-induced panics markedly increase tidal volume (TV), whereas normals have a lesser effect, possibly due to their intact endogenous opioid system. We hypothesized that impairing the opioidergic system by naloxone could make normal controls parallel PD patients' response when lactate challenged. Whether actual separations and losses during childhood (childhood parental loss, CPL) affected naloxone-induced respiratory contrasts was explored. Subjective panic-like symptoms were analyzed although pilot work indicated that the subjective aspect of anxious panic was not well modeled by this specific protocol. Randomized cross-over sequences of intravenous naloxone (2 mg/kg) followed by lactate (10 mg/kg), or saline followed by lactate, were given to 25 volunteers. Respiratory physiology was objectively recorded by the LifeShirt. Subjective symptomatology was also recorded. Impairment of the endogenous opioid system by naloxone accentuates TV and symptomatic response to lactate. This interaction is substantially lessened by CPL. Opioidergic dysregulation may underlie respiratory pathophysiology and suffocation sensitivity in PD. Comparing specific anti-panic medications with ineffective anti-panic agents (e.g. propranolol) can test the specificity of the naloxone+lactate model. A screen for putative anti-panic agents and a new pharmacotherapeutic approach are suggested. Heuristically, the experimental unveiling of the endogenous opioid system impairing effects of CPL and separation in normal adults opens a new experimental, investigatory area.

  9. Controlled cross-over study in normal subjects of naloxone-preceding-lactate infusions; respiratory and subjective responses: relationship to endogenous opioid system, suffocation false alarm theory and childhood parental loss

    Science.gov (United States)

    Preter, M.; Lee, S. H.; Petkova, E.; Vannucci, M.; Kim, S.; Klein, D. F.

    2015-01-01

    Background The expanded suffocation false alarm theory (SFA) hypothesizes that dysfunction in endogenous opioidergic regulation increases sensitivity to CO2, separation distress and panic attacks. In panic disorder (PD) patients, both spontaneous clinical panics and lactate-induced panics markedly increase tidal volume (TV), whereas normals have a lesser effect, possibly due to their intact endogenous opioid system. We hypothesized that impairing the opioidergic system by naloxone could make normal controls parallel PD patients' response when lactate challenged. Whether actual separations and losses during childhood (childhood parental loss, CPL) affected naloxone-induced respiratory contrasts was explored. Subjective panic-like symptoms were analyzed although pilot work indicated that the subjective aspect of anxious panic was not well modeled by this specific protocol. Method Randomized cross-over sequences of intravenous naloxone (2 mg/kg) followed by lactate (10 mg/kg), or saline followed by lactate, were given to 25 volunteers. Respiratory physiology was objectively recorded by the LifeShirt. Subjective symptomatology was also recorded. Results Impairment of the endogenous opioid system by naloxone accentuates TV and symptomatic response to lactate. This interaction is substantially lessened by CPL. Conclusions Opioidergic dysregulation may underlie respiratory pathophysiology and suffocation sensitivity in PD. Comparing specific anti-panic medications with ineffective anti-panic agents (e.g. propranolol) can test the specificity of the naloxone + lactate model. A screen for putative anti-panic agents and a new pharmacotherapeutic approach are suggested. Heuristically, the experimental unveiling of the endogenous opioid system impairing effects of CPL and separation in normal adults opens a new experimental, investigatory area. PMID:20444308

  10. Towards a lessons learned system for critical software

    International Nuclear Information System (INIS)

    Andrade, J.; Ares, J.; Garcia, R.; Pazos, J.; Rodriguez, S.; Rodriguez-Paton, A.; Silva, A.

    2007-01-01

    Failure can be a major driver for the advance of any engineering discipline and Software Engineering is no exception. But failures are useful only if lessons are learned from them. In this article we aim to make a strong defence of, and set the requirements for, lessons learned systems for safety-critical software. We also present a prototype lessons learned system that includes many of the features discussed here. We emphasize that, apart from individual organizations, lessons learned systems should target industrial sectors and even the Software Engineering community. We would like to encourage the Software Engineering community to use this kind of systems as another tool in the toolbox, which complements or enhances other approaches like, for example, standards and checklists

  11. Towards a lessons learned system for critical software

    Energy Technology Data Exchange (ETDEWEB)

    Andrade, J. [University of A Coruna. Campus de Elvina, s/n. 15071, A Coruna (Spain)]. E-mail: jag@udc.es; Ares, J. [University of A Coruna. Campus de Elvina, s/n. 15071, A Coruna (Spain)]. E-mail: juanar@udc.es; Garcia, R. [University of A Coruna. Campus de Elvina, s/n. 15071, A Coruna (Spain)]. E-mail: rafael@udc.es; Pazos, J. [Technical University of Madrid. Campus de Montegancedo, s/n. 28660, Boadilla del Monte, Madrid (Spain)]. E-mail: jpazos@fi.upm.es; Rodriguez, S. [University of A Coruna. Campus de Elvina, s/n. 15071, A Coruna (Spain)]. E-mail: santi@udc.es; Rodriguez-Paton, A. [Technical University of Madrid. Campus de Montegancedo, s/n. 28660, Boadilla del Monte, Madrid (Spain)]. E-mail: arpaton@fi.upm.es; Silva, A. [Technical University of Madrid. Campus de Montegancedo, s/n. 28660, Boadilla del Monte, Madrid (Spain)]. E-mail: asilva@fi.upm.es

    2007-07-15

    Failure can be a major driver for the advance of any engineering discipline and Software Engineering is no exception. But failures are useful only if lessons are learned from them. In this article we aim to make a strong defence of, and set the requirements for, lessons learned systems for safety-critical software. We also present a prototype lessons learned system that includes many of the features discussed here. We emphasize that, apart from individual organizations, lessons learned systems should target industrial sectors and even the Software Engineering community. We would like to encourage the Software Engineering community to use this kind of systems as another tool in the toolbox, which complements or enhances other approaches like, for example, standards and checklists.

  12. Probabilistic DHP adaptive critic for nonlinear stochastic control systems.

    Science.gov (United States)

    Herzallah, Randa

    2013-06-01

    Following the recently developed algorithms for fully probabilistic control design for general dynamic stochastic systems (Herzallah & Káarnáy, 2011; Kárný, 1996), this paper presents the solution to the probabilistic dual heuristic programming (DHP) adaptive critic method (Herzallah & Káarnáy, 2011) and randomized control algorithm for stochastic nonlinear dynamical systems. The purpose of the randomized control input design is to make the joint probability density function of the closed loop system as close as possible to a predetermined ideal joint probability density function. This paper completes the previous work (Herzallah & Káarnáy, 2011; Kárný, 1996) by formulating and solving the fully probabilistic control design problem on the more general case of nonlinear stochastic discrete time systems. A simulated example is used to demonstrate the use of the algorithm and encouraging results have been obtained. Copyright © 2013 Elsevier Ltd. All rights reserved.

  13. Behavioral alarm treatment for nocturnal enuresis

    Directory of Open Access Journals (Sweden)

    Rodrigo F. Pereira

    2010-06-01

    Full Text Available PURPOSES: To investigate the efficacy of alarm treatment in a sample of Brazilian children and adolescents with nocturnal enuresis and relate treatment success to age and type of clinical support. MATERIALS AND METHODS: During 32 weeks, 84 children and adolescents received alarm treatment together with weekly psychological support sessions for individual families or groups of 5 to 10 families. RESULTS: 71% of the participants achieved success, defined as 14 consecutive dry nights. The result was similar for children and adolescents and for individual or group support. The time until success was shorter for participants missing fewer support sessions. CONCLUSIONS: Alarm treatment was effective for the present sample, regardless of age or type of support. Missing a higher number of support sessions, which may reflect low motivation for treatment, increased the risk of failure.

  14. Nuclear criticality evacuation with telemonitoring and microprocessors

    International Nuclear Information System (INIS)

    Fergus, R.W.; Moe, H.J. Sr.

    1979-01-01

    At Argonne National Laboratory, criticality alarms are required at widely separated locations to evacuate personnel in case of accident while emergency teams or maintenance personnel respond from a central location. The system functions have been divided in a similar manner. The alarm site hardware can independently detect a criticality and sound the evacuation signal while general monitoring and routine tests are handled by a communication link to a central monitoring station. The radiation detectors and evacuation sounders at each site are interconnected by a common two conductor cable in a unique telemonitoring format. This format allows both control and data information to be received or transmitted at any point on the cable which can be up to 3000 meters total length. The site microprocessor maintains a current data table, detects several faults, drives a printer, and communicates with the central telemonitoring station. The radiation detectors are made with plastic scintillators and photomultiplier tubes operated in a constant current mode with a 4 decade measurement range. The detectors also respond within microseconds to the criticality radiation burst. These characteristics can be tested with an internal light emitting diode either completely with a manual procedure or routinely with a system test initiated by the central monitoring station. Although the system was developed for a criticality alarm which requires reliable and redundant features, the basic techniques are useable for other monitoring and instrumentation applications

  15. Diversity requirements for safety critical software-based automation systems

    International Nuclear Information System (INIS)

    Korhonen, J.; Pulkkinen, U.; Haapanen, P.

    1998-03-01

    System vendors nowadays propose software-based systems even for the most critical safety functions in nuclear power plants. Due to the nature and mechanisms of influence of software faults new methods are needed for the safety and reliability evaluation of these systems. In the research project 'Programmable automation systems in nuclear power plants (OHA)' various safety assessment methods and tools for software based systems are developed and evaluated. This report first discusses the (common cause) failure mechanisms in software-based systems, then defines fault-tolerant system architectures to avoid common cause failures, then studies the various alternatives to apply diversity and their influence on system reliability. Finally, a method for the assessment of diversity is described. Other recently published reports in OHA-report series handles the statistical reliability assessment of software based (STUK-YTO-TR 119), usage models in reliability assessment of software-based systems (STUK-YTO-TR 128) and handling of programmable automation in plant PSA-studies (STUK-YTO-TR 129)

  16. Judging the urgency of non-verbal auditory alarms: a case study.

    Science.gov (United States)

    Arrabito, G Robert; Mondor, Todd; Kent, Kimberley

    2004-06-22

    When designed correctly, non-verbal auditory alarms can convey different levels of urgency to the aircrew, and thereby permit the operator to establish the appropriate level of priority to address the alarmed condition. The conveyed level of urgency of five non-verbal auditory alarms presently used in the Canadian Forces CH-146 Griffon helicopter was investigated. Pilots of the CH-146 Griffon helicopter and non-pilots rated the perceived urgency of the signals using a rating scale. The pilots also ranked the urgency of the alarms in a post-experiment questionnaire to reflect their assessment of the actual situation that triggers the alarms. The results of this investigation revealed that participants' ratings of perceived urgency appear to be based on the acoustic properties of the alarms which are known to affect the listener's perceived level of urgency. Although for 28% of the pilots the mapping of perceived urgency to the urgency of their perception of the triggering situation was statistically significant for three of the five alarms, the overall data suggest that the triggering situations are not adequately conveyed by the acoustic parameters inherent in the alarms. The pilots' judgement of the triggering situation was intended as a means of evaluating the reliability of the alerting system. These data will subsequently be discussed with respect to proposed enhancements in alerting systems as it relates to addressing the problem of phase of flight. These results call for more serious consideration of incorporating situational awareness in the design and assignment of auditory alarms in aircraft.

  17. Development and Application of a Clinical Microsystem Simulation Methodology for Human Factors-Based Research of Alarm Fatigue.

    Science.gov (United States)

    Kobayashi, Leo; Gosbee, John W; Merck, Derek L

    2017-07-01

    (1) To develop a clinical microsystem simulation methodology for alarm fatigue research with a human factors engineering (HFE) assessment framework and (2) to explore its application to the comparative examination of different approaches to patient monitoring and provider notification. Problems with the design, implementation, and real-world use of patient monitoring systems result in alarm fatigue. A multidisciplinary team is developing an open-source tool kit to promote bedside informatics research and mitigate alarm fatigue. Simulation, HFE, and computer science experts created a novel simulation methodology to study alarm fatigue. Featuring multiple interconnected simulated patient scenarios with scripted timeline, "distractor" patient care tasks, and triggered true and false alarms, the methodology incorporated objective metrics to assess provider and system performance. Developed materials were implemented during institutional review board-approved study sessions that assessed and compared an experimental multiparametric alerting system with a standard monitor telemetry system for subject response, use characteristics, and end-user feedback. A four-patient simulation setup featuring objective metrics for participant task-related performance and response to alarms was developed along with accompanying structured HFE assessment (questionnaire and interview) for monitor systems use testing. Two pilot and four study sessions with individual nurse subjects elicited true alarm and false alarm responses (including diversion from assigned tasks) as well as nonresponses to true alarms. In-simulation observation and subject questionnaires were used to test the experimental system's approach to suppressing false alarms and alerting providers. A novel investigative methodology applied simulation and HFE techniques to replicate and study alarm fatigue in controlled settings for systems assessment and experimental research purposes.

  18. Game Theoretic Approach for Systematic Feature Selection; Application in False Alarm Detection in Intensive Care Units

    Directory of Open Access Journals (Sweden)

    Fatemeh Afghah

    2018-03-01

    Full Text Available Intensive Care Units (ICUs are equipped with many sophisticated sensors and monitoring devices to provide the highest quality of care for critically ill patients. However, these devices might generate false alarms that reduce standard of care and result in desensitization of caregivers to alarms. Therefore, reducing the number of false alarms is of great importance. Many approaches such as signal processing and machine learning, and designing more accurate sensors have been developed for this purpose. However, the significant intrinsic correlation among the extracted features from different sensors has been mostly overlooked. A majority of current data mining techniques fail to capture such correlation among the collected signals from different sensors that limits their alarm recognition capabilities. Here, we propose a novel information-theoretic predictive modeling technique based on the idea of coalition game theory to enhance the accuracy of false alarm detection in ICUs by accounting for the synergistic power of signal attributes in the feature selection stage. This approach brings together techniques from information theory and game theory to account for inter-features mutual information in determining the most correlated predictors with respect to false alarm by calculating Banzhaf power of each feature. The numerical results show that the proposed method can enhance classification accuracy and improve the area under the ROC (receiver operating characteristic curve compared to other feature selection techniques, when integrated in classifiers such as Bayes-Net that consider inter-features dependencies.

  19. International conference on sub-critical accelerator driven systems. Proceedings

    International Nuclear Information System (INIS)

    Litovkina, L.P.; Titarenko, Yu.E.

    1999-01-01

    The International Meeting on Sub-Critical Accelerator Driven Systems was organized by the State Scientific Center - Institute for Theoretical and Experimental Physics with participation of Atomic Ministry of RF. The Meeting objective was to analyze the recent achievements and tendencies of the accelerator-driven systems development. The Meeting program covers a broad range of problems including the accelerator-driven systems (ADS) conceptual design; analyzing the ADS role in nuclear fuel cycle; accuracy of modeling the main parameters of ADS; conceptual design of high-current accelerators. Moreover, the results of recent experimental and theoretical studies on nuclear data accumulation to support the ADS technologies are presented. About 70 scientists from the main scientific centers of Russia, as well as scientists from USA, France, Belgium, India, and Yugoslavia, attended the meeting and presented 44 works [ru

  20. Information Retrieval and Criticality in Parity-Time-Symmetric Systems.

    Science.gov (United States)

    Kawabata, Kohei; Ashida, Yuto; Ueda, Masahito

    2017-11-10

    By investigating information flow between a general parity-time (PT-)symmetric non-Hermitian system and an environment, we find that the complete information retrieval from the environment can be achieved in the PT-unbroken phase, whereas no information can be retrieved in the PT-broken phase. The PT-transition point thus marks the reversible-irreversible criticality of information flow, around which many physical quantities such as the recurrence time and the distinguishability between quantum states exhibit power-law behavior. Moreover, by embedding a PT-symmetric system into a larger Hilbert space so that the entire system obeys unitary dynamics, we reveal that behind the information retrieval lies a hidden entangled partner protected by PT symmetry. Possible experimental situations are also discussed.