WorldWideScience

Sample records for nuclear verification helping

  1. Future directions of nuclear verification

    International Nuclear Information System (INIS)

    Blix, H.

    1997-01-01

    Future directions of nuclear verification are discussed including the following topics: verification of non-proliferation commitments; practicalities of strengthening safeguards; new tasks in nuclear verification

  2. Nuclear disarmament verification

    Energy Technology Data Exchange (ETDEWEB)

    DeVolpi, A.

    1993-12-31

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification.

  3. Nuclear disarmament verification

    International Nuclear Information System (INIS)

    DeVolpi, A.

    1993-01-01

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification

  4. Nuclear test ban verification

    International Nuclear Information System (INIS)

    Chun, Kin-Yip

    1991-07-01

    This report describes verification and its rationale, the basic tasks of seismic verification, the physical basis for earthquake/explosion source discrimination and explosion yield determination, the technical problems pertaining to seismic monitoring of underground nuclear tests, the basic problem-solving strategy deployed by the forensic seismology resarch team at the University of Toronto, and the scientific significance of the team's research. The research carried out at the Univeristy of Toronto has two components: teleseismic verification using P wave recordings from the Yellowknife Seismic Array (YKA), and regional (close-in) verification using high-frequency L g and P n recordings from the Eastern Canada Telemetered Network. Major differences have been found in P was attenuation among the propagation paths connecting the YKA listening post with seven active nuclear explosion testing areas in the world. Significant revisions have been made to previously published P wave attenuation results, leading to more interpretable nuclear explosion source functions. (11 refs., 12 figs.)

  5. Nuclear Data Verification and Standardization

    Energy Technology Data Exchange (ETDEWEB)

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  6. Software verification for nuclear industry

    International Nuclear Information System (INIS)

    Wilburn, N.P.

    1985-08-01

    Why verification of software products throughout the software life cycle is necessary is considered. Concepts of verification, software verification planning, and some verification methodologies for products generated throughout the software life cycle are then discussed

  7. The monitoring and verification of nuclear weapons

    International Nuclear Information System (INIS)

    Garwin, Richard L.

    2014-01-01

    This paper partially reviews and updates the potential for monitoring and verification of nuclear weapons, including verification of their destruction. Cooperative monitoring with templates of the gamma-ray spectrum are an important tool, dependent on the use of information barriers

  8. Key Nuclear Verification Priorities: Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  9. Key Nuclear Verification Priorities - Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  10. Revealing facts through science for nuclear verification

    International Nuclear Information System (INIS)

    Jawerth, Nicole

    2016-01-01

    Keeping track of the facts is an important part of nuclear verification. Receiving hundreds of samples each year, staff at the IAEA’s safeguards laboratories verify data through spot checks and analysis of the uranium and plutonium content of nuclear material samples. The laboratory scientists analyse environmental swipe samples and samples of nuclear material from various points of the nuclear fuel cycle collected by safeguards inspectors during physical inspections of nuclear facilities. The samples are screened, processed, distributed to laboratories in the IAEA network of laboratories, and analysed and archived by scientists at the IAEA’s laboratories in Seibersdorf, Austria

  11. Revealing facts through science for nuclear verification

    International Nuclear Information System (INIS)

    Jawerth, Nicole

    2016-01-01

    Keeping track of the facts is an important part of nuclear verification. Receiving hundreds of samples each year, staff at the IAEA’s safeguards laboratories verify data through spot checks and analysis of the uranium and plutonium content of nuclear material samples. The laboratory scientists analyse environmental swipe samples and samples of nuclear material from various points of the nuclear fuel cycle collected by safeguards inspectors during physical inspections of nuclear facilities. The samples are screened, processed, distributed to laboratories in the IAEA network of laboratories, and analysed and archived by scientists at the IAEA’s laboratories in Seibersdorf, Austriasamples.

  12. Verification and software validation for nuclear instrumentation

    International Nuclear Information System (INIS)

    Gaytan G, E.; Salgado G, J. R.; De Andrade O, E.; Ramirez G, A.

    2014-10-01

    In this work is presented a Verification Methodology and Software Validation, to be applied in instruments of nuclear use with associate software. This methodology was developed under the auspices of IAEA, through the regional projects RLA4022 (ARCAL XCIX) and RLA1011 (RLA CXXIII), led by Mexico. In the first project three plans and three procedures were elaborated taking into consideration IEEE standards, and in the second project these documents were updated considering ISO and IEC standards. The developed methodology has been distributed to the participant countries of Latin America in the ARCAL projects and two related courses have been imparted with the participation of several countries, and participating institutions of Mexico like Instituto Nacional de Investigaciones Nucleares (ININ), Comision Federal de Electricidad (CFE) and Comision Nacional de Seguridad Nuclear y Salvaguardias (CNSNS). In the ININ due to the necessity to work with Software Quality Guarantee in systems for the nuclear power plant of the CFE, a Software Quality Guarantee Plan and five procedures were developed in the year 2004, obtaining the qualification of the ININ for software development for the nuclear power plant of CFE. These first documents were developed taking like reference IEEE standards and regulator guides of NRC, being the first step for the development of the methodology. (Author)

  13. DESIGN INFORMATION VERIFICATION FOR NUCLEAR SAFEGUARDS

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Bean; Richard R. M. Metcalf; Phillip C. Durst

    2009-07-01

    A critical aspect of international safeguards activities performed by the International Atomic Energy Agency (IAEA) is the verification that facility design and construction (including upgrades and modifications) do not create opportunities for nuclear proliferation. These Design Information Verification activities require that IAEA inspectors compare current and past information about the facility to verify the operator’s declaration of proper use. The actual practice of DIV presents challenges to the inspectors due to the large amount of data generated, concerns about sensitive or proprietary data, the overall complexity of the facility, and the effort required to extract just the safeguards relevant information. Planned and anticipated facilities will (especially in the case of reprocessing plants) be ever larger and increasingly complex, thus exacerbating the challenges. This paper reports the results of a workshop held at the Idaho National Laboratory in March 2009, which considered technologies and methods to address these challenges. The use of 3D Laser Range Finding, Outdoor Visualization System, Gamma-LIDAR, and virtual facility modeling, as well as methods to handle the facility data issues (quantity, sensitivity, and accessibility and portability for the inspector) were presented. The workshop attendees drew conclusions about the use of these techniques with respect to successfully employing them in an operating environment, using a Fuel Conditioning Facility walk-through as a baseline for discussion.

  14. Mathematical verification of a nuclear power plant protection system function with combined CPN and PVS

    Energy Technology Data Exchange (ETDEWEB)

    Koo, Seo Ryong; Son, Han Seong; Seong, Poong Hyun [Korea Advanced Institute of Science and Technology, Taejon (Korea, Republic of)

    1998-12-31

    In this work, an automatic software verification method for Nuclear Power Plant (NPP) protection system is developed. This method utilizes Colored Petri Net (CPN) for modeling and Prototype Verification System (PVS) for mathematical verification. In order to help flow-through from modeling by CPN to mathematical proof by PVS, a translator has been developed in this work. The combined method has been applied to a protection system function of Wolsong NPP SDS2(Steam Generator Low Level Trip) and found to be promising for further research and applications. 7 refs., 10 figs. (Author)

  15. Seismic verification of nuclear plant equipment anchorage

    International Nuclear Information System (INIS)

    Lepiece, M.; Van Vyve, J.

    1991-01-01

    More than 60% of the electrical power of Belgium is generated by seven PWR nuclear power plants. For three of them, the electro-mechanical equipment had to be reassessed after ten years of operation, because the seismic requirements were upgraded from 0.1 g to 0.17 g free field ground acceleration. The seismic requalification of the active equipment was a critical problem as the classical methods were too conservative. The approach based on the use of the past experience on the seismic behavior of nonnuclear equipment, chosen and developed by the SQUG, had to be transposed to the Belgian N.P.P. The decision of the accept-ability of equipment relies heavily on the aseismatic capacity of anchorage. The Electrical Power Research Institute (EPRI) developed the procedure and guideline for the demonstration of the aseismatic adequacy of equipment anchorage in a cost-effective and consistent manner, to support the decision by Seismic Review Team. The field inspection procedure to identify the type of fasteners and detect their possible defects and the verification procedure developed to calculate the aseismatic capacity of equipment anchorage on the strength of fasteners, the aseismatic capacity of anchorage and the comparison of the capacity with the demand are reported. (K.I.)

  16. Independent verification in operations at nuclear power plants

    International Nuclear Information System (INIS)

    Donderi, D.C.; Smiley, A.; Ostry, D.J.; Moray, N.P.

    1995-09-01

    A critical review of approaches to independent verification in operations used in nuclear power plant quality assurance programs in other countries, was conducted for this study. This report identifies the uses of independent verification and provides an assessment of the effectiveness of the various approaches. The findings indicate that at Canadian nuclear power plants as much, if not more, independent verification is performed than at power plants in the other countries included in the study. Additional requirements in this area are not proposed for Canadian stations. (author)

  17. A saddle-point for data verification and materials accountancy to control nuclear material

    International Nuclear Information System (INIS)

    Beedgen, R.

    1983-01-01

    Materials accountancy is one of the main elements in international safeguards to determine whether or not nuclear material has been diverted in nuclear plants. The inspector makes independent measurements to verify the plant-operator's data before closing the materials balance with the operator's data. All inspection statements are in principle probability statements because of random errors in measuring the material and verification on a random sampling basis. Statistical test procedures help the inspector to decide under this uncertainty. In this paper a statistical test procedure representing a saddle-point is presented that leads to the highest guaranteed detection probability taking all concealing strategies into account. There are arguments favoring a separate statistical evaluation of data verification and materials accountancy. Following these considerations, a bivariate test procedure is explained that evaluates verification and accountancy separately. (orig.) [de

  18. The CTBT Verification Regime: Monitoring the Earth for nuclear explosions

    International Nuclear Information System (INIS)

    2011-03-01

    The Comprehensive nuclear-Test-Ban Treaty (CTBT) bans all nuclear weapon tests. Its unique verification regime is designed to detect nuclear explosions anywhere on the planet - in the oceans, underground and in the atmosphere. once complete, the international Monitoring system (iMs) will consist of 337 facilities located in 89 countries around the globe. The iMs is currently operating in test mode so that data are already transmitted for analysis from monitoring facilities to the international Data Centre (iDC) at the headquarters of the preparatory Commission for the Comprehensive nuclear-Test-Ban Treaty Organization (CTBTO) in Vienna. Data and analysis results are shared with Member states.

  19. Spent Nuclear Fuel (SNF) Project Design Verification and Validation Process

    International Nuclear Information System (INIS)

    OLGUIN, L.J.

    2000-01-01

    This document provides a description of design verification and validation activities implemented by the Spent Nuclear Fuel (SNF) Project. During the execution of early design verification, a management assessment (Bergman, 1999) and external assessments on configuration management (Augustenburg, 1999) and testing (Loscoe, 2000) were conducted and identified potential uncertainties in the verification process. This led the SNF Chief Engineer to implement corrective actions to improve process and design products. This included Design Verification Reports (DVRs) for each subproject, validation assessments for testing, and verification of the safety function of systems and components identified in the Safety Equipment List to ensure that the design outputs were compliant with the SNF Technical Requirements. Although some activities are still in progress, the results of the DVR and associated validation assessments indicate that Project requirements for design verification are being effectively implemented. These results have been documented in subproject-specific technical documents (Table 2). Identified punch-list items are being dispositioned by the Project. As these remaining items are closed, the technical reports (Table 2) will be revised and reissued to document the results of this work

  20. Verification of structural analysis computer codes in nuclear engineering

    International Nuclear Information System (INIS)

    Zebeljan, Dj.; Cizelj, L.

    1990-01-01

    Sources of potential errors, which can take place during use of finite element method based computer programs, are described in the paper. The magnitude of errors was defined as acceptance criteria for those programs. Error sources are described as they are treated by 'National Agency for Finite Element Methods and Standards (NAFEMS)'. Specific verification examples are used from literature of Nuclear Regulatory Commission (NRC). Example of verification is made on PAFEC-FE computer code for seismic response analyses of piping systems by response spectrum method. (author)

  1. Nuclear disarmament and the verification role of the IAEA

    International Nuclear Information System (INIS)

    Duarte, Carlos S.

    2008-01-01

    At the height of the cold war, nuclear arsenals reached a peak of some 70000 weapons. Although these numbers have since come down significantly, some 27000 weapons remain. The fact that decades go by and nuclear disarmament is not realised contributes to a deep sense of concern and disappointment. So do other factors, such as the persistence of nuclear doctrines that admit first use; the lack of binding negative assurances; the ongoing research on nuclear explosives including subcritical tests, and the maintaining readiness to resume full-scale testing. The sense of insufficient or outright lack of progress in nuclear disarmament is even more disturbing if measured against existing legal obligations. First and foremost among those is of course Article VI of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). According to the ICJ's Advisory Opinion, the obligation contained in Article VI is an obligation to achieve results in nuclear disarmament. Bringing the Comprehensive Nuclear Test Ban Treaty (CTBT) into force is still missing, as well as negotiating a Fissile Materials Cut-Off Treaty (FMCT). Despite significant unilateral reductions in nuclear arsenals, these have not been done within an international process that includes the commitment to total elimination. The notion that it is morally reprehensible for some countries to pursue weapons of mass destruction yet morally acceptable for others to rely on them for their security is simply unworkable. For achieving nuclear disarmament verification objectives, the IAEA clearly would have a major role to play. Under Article III.A.5 of its Statute, the Agency is allowed to apply, at the request of a State, safeguards to any of that State's nuclear activities. The Agency's capabilities and experience make it the international institution best suited to eventually perform nuclear disarmament verification tasks. In order to perform nuclear disarmament verification activities, the Agency would of course need to

  2. IAEA and NPT - The verification challenge. Challenging nuclear issues point the way forward

    International Nuclear Information System (INIS)

    Lodding, Jan; Rauf, Tariq

    2005-01-01

    Five years ago, member States of the global Treaty on the Non-Proliferation of Nuclear Weapons (NPT) agreed on a number of forward-looking elements for non-proliferation and disarmament and for the peaceful uses of nuclear technology. This was widely hailed as a major accomplishment for the global nuclear non-proliferation regime and for multilateral cooperation in this context. The NPT regime - a brainchild of the Cold War era - seemed strengthened and better adapted to meet the challenges of the 21st Century. The elements were contained in the Final Document adopted by consensus of the 187 States parties at the 2000 NPT Review Conference, the sixth such Conference since the NPT's entry into force in 1970. Among 62 references to IAEA safeguards in the Final Document, the Agency's verification system was acknowledged as a fundamental pillar of the nuclear non-proliferation regime, one that plays an indispensable role in the Treaty's implementation and helps to create an environment conducive to nuclear disarmament and to cooperation in the peaceful uses of nuclear energy. The NPT States recognized that IAEA safeguards provide assurance of compliance and assist States In demonstrating compliance with their relevant undertakings. They recognized the IAEA as the competent authority responsible for verifying and assuring compliance with safeguards agreements, and expressed its conviction that nothing should be done to undermine its authority in this regard. Member States having concerns regarding non-compliance with safeguards agreements were called upon to direct such concerns, along with supporting evidence to the Agency for its consideration. The Final Document also supported steps for strengthening the IAEA's safeguards system and for the possible application of IAEA verification in the context of future nuclear disarmament. In the past few years, some widely publicized nuclear issues have highlighted the IAEA's vital verification work in the context of the NPT

  3. Verification of cold nuclear fusion reaction, (1)

    International Nuclear Information System (INIS)

    Yoshida, Zenko; Aratono, Yasuyuki; Hirabayashi, Takakuni

    1991-01-01

    Can cold nuclear fusion reaction occur as is expected? If it occurs, what extent is its reaction probability? At present after 2 years elapsed since its beginning, the clear solution of these questions is not yet obtained. In many reaction systems employing different means, the experiments to confirm the cold nuclear fusion reaction have been attempted. In order to confirm that the nuclear fusion reaction of deuterium mutually has occurred, the neutrons, He-3, protons, tritium or generated heat, which were formed by the reaction and released from the system, are measured. Since it is considered that the frequency of the occurrence at normal temperature of the reaction is very low, it is necessary to select the most suitable method upon evaluating the limit of detection peculiar to the measuring methods. The methods of measuring neutrons, protons, gamma ray and generated heat, and the reaction systems by electrolytic process and dry process are explained. The detection of plural kinds of the reaction products and the confirmation of synchronism of signals are important. (K.I.)

  4. Methods of Verification, Accountability and Control of Special Nuclear Material

    International Nuclear Information System (INIS)

    Stewart, J.E.

    1999-01-01

    This session demonstrates nondestructive assay (NDA) measurement, surveillance and analysis technology required to protect, control and account (MPC and A) for special nuclear materials (SNM) in sealed containers. These measurements, observations and analyses comprise state-of-the art, strengthened, SNM safeguards systems. Staff member specialists, actively involved in research, development, training and implementation worldwide, will present six NDA verification systems and two software tools for integration and analysis of facility MPC and A data

  5. Expert system verification and validation for nuclear power industry applications

    International Nuclear Information System (INIS)

    Naser, J.A.

    1990-01-01

    The potential for the use of expert systems in the nuclear power industry is widely recognized. The benefits of such systems include consistency of reasoning during off-normal situations when humans are under great stress, the reduction of times required to perform certain functions, the prevention of equipment failures through predictive diagnostics, and the retention of human expertise in performing specialized functions. The increased use of expert systems brings with it concerns about their reliability. Difficulties arising from software problems can affect plant safety, reliability, and availability. A joint project between EPRI and the US Nuclear Regulatory Commission is being initiated to develop a methodology for verification and validation of expert systems for nuclear power applications. This methodology will be tested on existing and developing expert systems. This effort will explore the applicability of conventional verification and validation methodologies to expert systems. The major area of concern will be certification of the knowledge base. This is expected to require new types of verification and validation techniques. A methodology for developing validation scenarios will also be studied

  6. Safety assessment and verification for nuclear power plants. Safety guide

    International Nuclear Information System (INIS)

    2001-01-01

    This publication supports the Safety Requirements on the Safety of Nuclear Power Plants: Design. This Safety Guide was prepared on the basis of a systematic review of all the relevant publications including the Safety Fundamentals, Safety of Nuclear Power Plants: Design, current and ongoing revisions of other Safety Guides, INSAG reports and other publications that have addressed the safety of nuclear power plants. This Safety Guide also provides guidance for Contracting Parties to the Convention on Nuclear Safety in meeting their obligations under Article 14 on Assessment and Verification of Safety. The Safety Requirements publication entitled Safety of Nuclear Power Plants: Design states that a comprehensive safety assessment and an independent verification of the safety assessment shall be carried out before the design is submitted to the regulatory body. This publication provides guidance on how this requirement should be met. This Safety Guide provides recommendations to designers for carrying out a safety assessment during the initial design process and design modifications, as well as to the operating organization in carrying out independent verification of the safety assessment of new nuclear power plants with a new or already existing design. The recommendations for performing a safety assessment are suitable also as guidance for the safety review of an existing plant. The objective of reviewing existing plants against current standards and practices is to determine whether there are any deviations which would have an impact on plant safety. The methods and the recommendations of this Safety Guide can also be used by regulatory bodies for the conduct of the regulatory review and assessment. Although most recommendations of this Safety Guide are general and applicable to all types of nuclear reactors, some specific recommendations and examples apply mostly to water cooled reactors. Terms such as 'safety assessment', 'safety analysis' and 'independent

  7. As-Built Verification Plan Spent Nuclear Fuel Canister Storage Building MCO Handling Machine

    International Nuclear Information System (INIS)

    SWENSON, C.E.

    2000-01-01

    This as-built verification plan outlines the methodology and responsibilities that will be implemented during the as-built field verification activity for the Canister Storage Building (CSB) MCO HANDLING MACHINE (MHM). This as-built verification plan covers THE ELECTRICAL PORTION of the CONSTRUCTION PERFORMED BY POWER CITY UNDER CONTRACT TO MOWAT. The as-built verifications will be performed in accordance Administrative Procedure AP 6-012-00, Spent Nuclear Fuel Project As-Built Verification Plan Development Process, revision I. The results of the verification walkdown will be documented in a verification walkdown completion package, approved by the Design Authority (DA), and maintained in the CSB project files

  8. Mathematical verification of a nuclear power plant protection system function with combined CPN and PVS

    International Nuclear Information System (INIS)

    Koo, Seo Ryong; Son, Han Seong; Seong, Poong Hyun

    1999-01-01

    In this work, an automatic software verification method for Nuclear Power Plant (NPP) protection system is developed. This method utilizes Colored Petri Net (CPN) for system modeling and Prototype Verification System (PVS) for mathematical verification. In order to help flow-through from modeling by CPN to mathematical proof by PVS, an information extractor from CPN models has been developed in this work. In order to convert the extracted information to the PVS specification language, a translator also has been developed. ML that is a higher-order functional language programs the information extractor and translator. This combined method has been applied to a protection system function of Wolsung NPP SDS2 (Steam Generator Low Level Trip). As a result of this application, we could prove completeness and consistency of the requirement logically. Through this work, in short, an axiom or lemma based-analysis method for CPN models is newly suggested in order to complement CPN analysis methods and a guideline for the use of formal methods is proposed in order to apply them to NPP software verification and validation. (author). 9 refs., 15 figs

  9. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses. Addendum

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards ( including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  10. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards (including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  11. How the Eximbank helps US nuclear exporters

    International Nuclear Information System (INIS)

    Moore, J.L. Jr.

    1981-01-01

    The way in which the Export-Import Bank operates in support of the United States nuclear industry noting particularly its flexibility in responding to changing needs and budget constraints is described. (author)

  12. Independent verification in operations at nuclear power plants: Summaries of site visits

    International Nuclear Information System (INIS)

    Donderi, D.C.; Smiley, A.; Ostry, D.J.; Moray, N.P.

    1995-09-01

    A critical review of approaches to independent verification in operations used in nuclear power plant quality assurance programs in other countries was conducted and are detailed in volume 1. This paper is a compilation of the visits to nuclear power plant sites to study independent verification in operations at sites in Canada, USA, Japan, United Kingdom, France and Germany. 3 tabs., 22 figs

  13. Global Warming; Can Nuclear Energy Help?

    International Nuclear Information System (INIS)

    Knapp, V.

    1998-01-01

    Kyoto conference is setting the targets and limits for CO 2 emission. In the same time energy consumption is increasing, especially in developing world. If developing countries attain even a moderate fraction of energy consumption of developed countries, this will lead into large increase of total CO 2 emission, unless there is a strong increase of energy production by CO 2 non-emitting sources. Of two major candidates, solar and nuclear energy, the second is technically and economically much closer to ability to accomplish the task. The requirements for a large scale use of nuclear energy and the role of IAEA are discussed. (author)

  14. INIS: Nuclear information helping the world

    International Nuclear Information System (INIS)

    Atieh, T.

    2005-01-01

    The International Nuclear Information System of the IAEA, called INIS is the leading information source on peaceful application of nuclear sciences and technology. It is based on international cooperation and decentralized responsibilities. The INIS secretariat cooperates with 114 national and 19 international centres. INIS comprises more than 2.6 mill bibliographic references and more than 600 non-conventional full text papers. INIS assists the user to locate information in his/her field of interest over the time and informs about colleagues as well as the locations of research. INIS offers a single point of access to current and historical information, reliable and value-added information, ensures worldwide visibility for the researcher and addresses the need of developing and developed countries

  15. Task Force Report: Assessment of Nuclear Monitoring and Verification Technologies

    Science.gov (United States)

    2014-01-01

    UNCLASSIFIED  Recommendation:  State/Bureau  of  Arms  Control,  Verification  and  Compliance  ( AVC )  (diplomatic), DOE/National Nuclear Security...Department.     Recommendation:  State/ AVC ,  DOE/NNSA,  and  DoD/Acquisition,  Technology,  and  Logistics  (AT&L)  should  review  current U.S.  facility...agencies, State/ AVC , ASD(NCB), NNSA and NCPC should create  the processes and oversee the following steps:       Establish  a  “White  Team”  whose

  16. Symposium on international safeguards: Verification and nuclear material security. Proceedings

    International Nuclear Information System (INIS)

    2001-01-01

    During the Symposium on International Safeguards, 18 sessions were devoted to reviewing all aspects of our verification activities and those related to the Security of Nuclear Material. It has been an occasion to highlight the most significant and rapid evolution of IAEA Safeguards, and the challenges it is facing: first the challenge in improving the effectiveness of 'traditional Safeguards'; the challenge in implementing the Additional Protocol in States where it is in force and in trying to expand the number of such States; the challenge in drawing and maintaining credible Safeguards conclusions; the challenge in designing and implementing Integrated Safeguards, including complementary access, managed access and unannounced inspections; the challenge in developing, testing, installing and maintaining new, more efficient and more reliable equipment such as surveillance cameras, seals and Remote Monitoring control; the challenge in developing new information and analytical tools including open sources and satellite imagery; the major challenge of recruiting and training new inspectors, with extremely broad skills to replace the most experienced inspectors who are retiring; and last but not least, the challenge of filling the widening gap between what is required and expected from this Agency and the human and Regular Budget resources available. The activities and progress related to the Trilateral Initiative and the support to nuclear disarmament efforts have also been discussed. And finally, the Agency's present and future activities relating to Physical Protection and Illicit Trafficking have been abundantly reviewed. Some disturbing and controversial views on Nuclear Terrorism were mentioned

  17. Supporting the President's Arms Control and Nonproliferation Agenda: Transparency and Verification for Nuclear Arms Reductions

    International Nuclear Information System (INIS)

    Doyle, James E.; Meek, Elizabeth

    2009-01-01

    The President's arms control and nonproliferation agenda is still evolving and the details of initiatives supporting it remain undefined. This means that DOE, NNSA, NA-20, NA-24 and the national laboratories can help define the agenda, and the policies and the initiatives to support it. This will require effective internal and interagency coordination. The arms control and nonproliferation agenda is broad and includes the path-breaking goal of creating conditions for the elimination of nuclear weapons. Responsibility for various elements of the agenda will be widely scattered across the interagency. Therefore an interagency mapping exercise should be performed to identify the key points of engagement within NNSA and other agencies for creating effective policy coordination mechanisms. These can include informal networks, working groups, coordinating committees, interagency task forces, etc. It will be important for NA-20 and NA-24 to get a seat at the table and a functional role in many of these coordinating bodies. The arms control and nonproliferation agenda comprises both mature and developing policy initiatives. The more mature elements such as CTBT ratification and a follow-on strategic nuclear arms treaty with Russia have defined milestones. However, recent press reports indicate that even the START follow-on strategic arms pact that is planned to be complete by the end of 2009 may take significantly longer and be more expansive in scope. The Russians called for proposals to count non-deployed as well as deployed warheads. Other elements of the agenda such as FMCT, future bilateral nuclear arms reductions following a START follow-on treaty, nuclear posture changes, preparations for an international nuclear security summit, strengthened international safeguards and multilateral verification are in much earlier stages of development. For this reason any survey of arms control capabilities within the USG should be structured to address potential needs across the

  18. Better Quality of IT Help Desk Service in Nuclear Malaysia

    International Nuclear Information System (INIS)

    Mohamad Safuan Bin Sulaiman; Abdul Muin Abdul Rahman; Norzalina Nasirudin

    2012-01-01

    Information Technology Centre (ITC) is a part of technical support division which plays important role as technical service provider for Nuclear Malaysia. As the only IT service provider, it could not be excused from the issue of delivering quality of service for better serving organization. The implementation of IT help desk system has improved the quality of the help desk service through better management of knowledge and communication. In this system, help desk business process has been re engineered in which communications and knowledge is captured in every stage of help desk processes. Although the system is for IT Help desk, surprisingly, its framework has been successfully implemented at other technical support providers like Engineering Division (BKJ) and Instrumentation and Automation Center (IAC). This paper describes the reengeneering of IT help desk business process which focus on the management of IT knowledge and help desk communication for better quality of service. (author)

  19. Discussion on verification criterion and method of human factors engineering for nuclear power plant controller

    International Nuclear Information System (INIS)

    Yang Hualong; Liu Yanzi; Jia Ming; Huang Weijun

    2014-01-01

    In order to prevent or reduce human error and ensure the safe operation of nuclear power plants, control device should be verified from the perspective of human factors engineering (HFE). The domestic and international human factors engineering guidelines about nuclear power plant controller were considered, the verification criterion and method of human factors engineering for nuclear power plant controller were discussed and the application examples were provided for reference in this paper. The results show that the appropriate verification criterion and method should be selected to ensure the objectivity and accuracy of the conclusion. (authors)

  20. Verification and software validation for nuclear instrumentation; Verificacion y validacion de software para instrumentacion nuclear

    Energy Technology Data Exchange (ETDEWEB)

    Gaytan G, E. [ININ, Carretera Mexico-Toluca s/n, 52750 Ocoyoacac, Estado de Mexico (Mexico); Salgado G, J. R. [Comision Nacional de Seguridad Nuclear y Salvaguardias, Dr. Barragan No. 779, Col. Narvarte, 03020 Mexico D. F. (Mexico); De Andrade O, E. [Universidad Federal de Rio de Janeiro, Caixa Postal 68509, 21945-970 Rio de Janeiro (Brazil); Ramirez G, A., E-mail: elvira.gaytan@inin.gob.mx [Comision Federal de Electricidad, Gerencia de Centrales Nucleoelectricas, Alto Lucero, Veracruz (Mexico)

    2014-10-15

    In this work is presented a Verification Methodology and Software Validation, to be applied in instruments of nuclear use with associate software. This methodology was developed under the auspices of IAEA, through the regional projects RLA4022 (ARCAL XCIX) and RLA1011 (RLA CXXIII), led by Mexico. In the first project three plans and three procedures were elaborated taking into consideration IEEE standards, and in the second project these documents were updated considering ISO and IEC standards. The developed methodology has been distributed to the participant countries of Latin America in the ARCAL projects and two related courses have been imparted with the participation of several countries, and participating institutions of Mexico like Instituto Nacional de Investigaciones Nucleares (ININ), Comision Federal de Electricidad (CFE) and Comision Nacional de Seguridad Nuclear y Salvaguardias (CNSNS). In the ININ due to the necessity to work with Software Quality Guarantee in systems for the nuclear power plant of the CFE, a Software Quality Guarantee Plan and five procedures were developed in the year 2004, obtaining the qualification of the ININ for software development for the nuclear power plant of CFE. These first documents were developed taking like reference IEEE standards and regulator guides of NRC, being the first step for the development of the methodology. (Author)

  1. Fuzzy-logic-based safety verification framework for nuclear power plants.

    Science.gov (United States)

    Rastogi, Achint; Gabbar, Hossam A

    2013-06-01

    This article presents a practical implementation of a safety verification framework for nuclear power plants (NPPs) based on fuzzy logic where hazard scenarios are identified in view of safety and control limits in different plant process values. Risk is estimated quantitatively and compared with safety limits in real time so that safety verification can be achieved. Fuzzy logic is used to define safety rules that map hazard condition with required safety protection in view of risk estimate. Case studies are analyzed from NPP to realize the proposed real-time safety verification framework. An automated system is developed to demonstrate the safety limit for different hazard scenarios. © 2012 Society for Risk Analysis.

  2. The use of measurement uncertainty in nuclear materials accuracy and verification

    International Nuclear Information System (INIS)

    Alique, O.; Vaccaro, S.; Svedkauskaite, J.

    2015-01-01

    EURATOM nuclear safeguards are based on the nuclear operators’ accounting for and declaring of the amounts of nuclear materials in their possession, as well as on the European Commission verifying the correctness and completeness of such declarations by means of conformity assessment practices. Both the accountancy and the verification processes comprise the measurements of amounts and characteristics of nuclear materials. The uncertainties associated to these measurements play an important role in the reliability of the results of nuclear material accountancy and verification. The document “JCGM 100:2008 Evaluation of measurement data – Guide to the expression of uncertainty in measurement” - issued jointly by the International Bureau of Weights and Measures (BIPM) and international organisations for metrology, standardisation and accreditation in chemistry, physics and electro technology - describes a universal, internally consistent, transparent and applicable method for the evaluation and expression of uncertainty in measurements. This paper discusses different processes of nuclear materials accountancy and verification where measurement uncertainty plays a significant role. It also suggests the way measurement uncertainty could be used to enhance the reliability of the results of the nuclear materials accountancy and verification processes.

  3. How the Nuclear Applications Laboratories Help in Strengthening Emergency Response

    International Nuclear Information System (INIS)

    2014-01-01

    Safety is one of the most important considerations when engaging in highly advanced scientific and technological activities. In this respect, utilizing the potential of nuclear technology for peaceful purposes also involves risks, and nuclear techniques themselves can be useful in strengthening emergency response measures related to the use of nuclear technology. In the case of a nuclear incident, the rapid measurement and subsequent monitoring of radiation levels are top priorities as they help to determine the degree of risk faced by emergency responders and the general public. Instruments for the remote measurement of radioactivity are particularly important when there are potential health risks associated with entering areas with elevated radiation levels. The Nuclear Science and Instrumentation Laboratory (NSIL) — one of the eight laboratories of the Department of Nuclear Sciences and Applications (NA) in Seibersdorf, Austria — focuses on developing a variety of specialized analytical and diagnostic instruments and methods, and transferring knowledge to IAEA Member States. These include instruments capable of carrying out remote measurements. This emergency response work carried out by the NA laboratories supports health and safety in Member States and supports the IAEA’s mandate to promote the safe and peaceful use of nuclear energy

  4. Knowledge Based Help desk System in Nuclear Malaysia

    International Nuclear Information System (INIS)

    Mohamad Safuan Sulaiman; Abdul Muin Abdul Rahman; Norzalina Nasirudin; Khairiel Adyani Abdul Ghani; Abdul Aziz Mhd Ramli; Mohd Ashhar Khalid

    2012-01-01

    Knowledge based (K-based) Help desk system is a knowledge oriented web based system that provides support to business process of the technical service providers. It is a multi-centric system which focuses on end-users, technical workers and higher level management through utilization of knowledge which resides and grows within the system. The objectives of the system are to be a user-friendly, capture technical knowledge for efficient performance and educating users for self reliance. These were achieved through the improvement of the help desk business process and better management of technical knowledge. This system has been tested and implemented in Information Technology Center (IT), Engineering Division (BKJ) and Instrumentation and Automation Center (IAC) at the Malaysian Nuclear Agency (Nuclear Malaysia). Higher levels of user satisfaction and faster growth in technical knowledge repository have been recorded in the system. This paper describes the help desk system in the perspective of management of its technical knowledge contributing to strengthening organizational knowledge asset of Nuclear Malaysia as national nuclear research institution. (Author)

  5. Sustaining a verification regime in a nuclear weapon-free world. VERTIC research report no. 4

    International Nuclear Information System (INIS)

    Moyland, S. van

    1999-01-01

    Sustaining high levels of commitment to and enthusiasm for the verification regime in a nuclear weapon-free world (NWFW) would be a considerable challenge, but the price of failure would be high. No verification system for a complete ban on a whole of weapon of mass destruction (WMD) has been in existence long enough to provide a precedent or the requisite experience. Nevertheless, lessons from the International Atomic Energy Agency's (IAEA) nuclear safeguards system are instructive. A potential problem over the long haul is the gradual erosion of the deterrent effect of verification that may result from the continual overlooking of minor instances of non-compliance. Flaws in the verification system must be identified and dealt with early lest they also corrode the system. To achieve this the verification organisation's inspectors and analytical staff will need sustained support, encouragement, resources and training. In drawing attention to weaknesses, they must be supported by management and at the political level. The leaking of sensitive information, either industrial or military, by staff of the verification regime is a potential problem. 'Managed access' techniques should be constantly examined and improved. The verification organisation and states parties will need to sustain close co-operation with the nuclear and related industries. Frequent review mechanisms must be established. States must invest time and effort to make them effective. Another potential problem is the withering of resources for sustained verification. Verification organisations tend to be pressured by states to cut or last least cap costs, even if the verification workload increases. The verification system must be effective as knowledge and experience allows. The organisation will need continuously to update its scientific methods and technology. This requires in-house resources plus external research and development (R and D). Universities, laboratories and industry need incentives to

  6. Verification and validation of software related to nuclear power plant instrumentation and control

    International Nuclear Information System (INIS)

    1999-01-01

    This report is produced in response to a recommendation of the IAEA International Working Group on Nuclear Power Plant Control and Instrumentation. The report has objectives of providing practical guidance on the methods available for verification of the software and validation of computer based systems, and on how and when these methods can be effectively applied. It is meant for those who are in any way involved with the development, implementation, maintenance and use of software and computer based instrumentation and control systems in nuclear power plants. The report is intended to be used by designers, software producers, reviewers, verification and validation teams, assessors, plant operators and licensers of computer based systems

  7. Continuous Integration and Deployment Software to Automate Nuclear Data Verification and Validation

    Science.gov (United States)

    Arcilla, R.; Brown, D.; Herman, M.

    2014-04-01

    We developed and implemented a highly-automated nuclear data quality assurance system ADVANCE (Automated Data Verification and Assurance for Nuclear Calculations Enhancement) which is based on the continuous integration and deployment concept that originated from the software industry. ADVANCE uses readily available open-source software components to deliver its powerful functionalities. This paper presents in detail the system's data verification functionalities which are being used to ensure the quality of every new evaluation submitted to the NNDC. Also discussed are the current development efforts to incorporate data validation capabilities into the system.

  8. Synergies across verification regimes: Nuclear safeguards and chemical weapons convention compliance

    International Nuclear Information System (INIS)

    Kadner, Steven P.; Turpen, Elizabeth

    2001-01-01

    In the implementation of all arms control agreements, accurate verification is essential. In setting a course for verifying compliance with a given treaty - whether the NPT or the CWC, one must make a technical comparison of existing information-gathering capabilities against the constraints in an agreement. Then it must be decided whether this level of verifiability is good enough. Generally, the policy standard of 'effective verification' includes the ability to detect significant violations, with high confidence, in sufficient time to respond effectively with policy adjustments or other responses, as needed. It is at this juncture where verification approaches have traditionally diverged. Nuclear safeguards requirements have taken one path while chemical verification methods have pursued another. However, recent technological advances have brought a number of changes affecting verification, and lately their pace has been accelerating. First, all verification regimes have more and better information as a result of new kinds of sensors, imagery, and other technologies. Second, the verification provisions in agreements have also advanced, to include on-site inspections, portal monitoring, data exchanges, and a variety of transparency, confidence-building, and other cooperative measures, Together these developments translate into a technological overlap of certain institutional verification measures such as the NPT's safeguards requirements and the IAEA and the CWC's verification visions and the OPCW. Hence, a priority of international treaty-implementing organizations is exploring the development of a synergistic and coordinated approach to WMD policy making that takes into account existing inter-linkages between nuclear, chemical, and biological weapons issues. Specific areas of coordination include harmonizing information systems and information exchanges and the shared application of scientific mechanisms, as well as collaboration on technological developments

  9. Verification and uncertainty evaluation of CASMO-3/MASTER nuclear analysis system

    Energy Technology Data Exchange (ETDEWEB)

    Song, Jae Seung; Cho, Byung Oh; Joo, Han Kyu; Zee, Sung Quun; Lee, Chung Chan; Park, Sang Yoon

    2000-06-01

    MASTER is a nuclear design code developed by KAERI. It uses group constants generated by CASMO-3 developed by Studsvik. In this report the verification and evaluation of uncertainty were performed for the code system application in nuclear reactor core analysis and design. The verification is performed via various benchmark comparisons for static and transient core condition, and core follow calculations with startup physics test predictions of total 14 cycles of pressurized water reactors. Benchmark calculation include comparisons with reference solutions of IAEA and OECA/NEA problems and critical experiment measurements. The uncertainty evaluation is focused to safety related parameters such as power distribution, reactivity coefficients, control rod worth and core reactivity. It is concluded that CASMO-3/MASTER can be applied for PWR core nuclear analysis and design without any bias factors. Also, it is verified that the system can be applied for SMART core, via supplemental comparisons with reference calculations by MCNP which is a probabilistic nuclear calculation code.

  10. Verification and Uncertainty Reduction of Amchitka Underground Nuclear Testing Models

    Energy Technology Data Exchange (ETDEWEB)

    Ahmed Hassan; Jenny Chapman

    2006-02-01

    The modeling of Amchitka underground nuclear tests conducted in 2002 is verified and uncertainty in model input parameters, as well as predictions, has been reduced using newly collected data obtained by the summer 2004 field expedition of CRESP. Newly collected data that pertain to the groundwater model include magnetotelluric (MT) surveys conducted on the island to determine the subsurface salinity and porosity structure of the subsurface, and bathymetric surveys to determine the bathymetric maps of the areas offshore from the Long Shot and Cannikin Sites. Analysis and interpretation of the MT data yielded information on the location of the transition zone, and porosity profiles showing porosity values decaying with depth. These new data sets are used to verify the original model in terms of model parameters, model structure, and model output verification. In addition, by using the new data along with the existing data (chemistry and head data), the uncertainty in model input and output is decreased by conditioning on all the available data. A Markov Chain Monte Carlo (MCMC) approach is adapted for developing new input parameter distributions conditioned on prior knowledge and new data. The MCMC approach is a form of Bayesian conditioning that is constructed in such a way that it produces samples of the model parameters that eventually converge to a stationary posterior distribution. The Bayesian MCMC approach enhances probabilistic assessment. Instead of simply propagating uncertainty forward from input parameters into model predictions (i.e., traditional Monte Carlo approach), MCMC propagates uncertainty backward from data onto parameters, and then forward from parameters into predictions. Comparisons between new data and the original model, and conditioning on all available data using MCMC method, yield the following results and conclusions: (1) Model structure is verified at Long Shot and Cannikin where the high-resolution bathymetric data collected by CRESP

  11. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    International Nuclear Information System (INIS)

    PICKETT, W.W.

    2000-01-01

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. Because this sub-project is still in the construction/start-up phase, all verification activities have not yet been performed (e.g., canister cover cap and welding fixture system verification, MCO Internal Gas Sampling equipment verification, and As-built verification.). The verification activities identified in this report that still are to be performed will be added to the start-up punchlist and tracked to closure

  12. Verification methods for treaties limiting and banning nuclear tests

    International Nuclear Information System (INIS)

    Voloshin, N.P.

    1998-01-01

    Treaty on limitation of underground nuclear weapon tests and treaty on world banning of nuclear tests contribute to and accompany the process of nuclear disarmament. Test ban in three (Moscow treaty of 1963) as well as the Threshold Test Ban up to 1991 was controlled only with national means. But since 1991 nuclear test threshold of 150 kt has been measured with hydrodynamic and tele seismic methods and checked by the inspection. Distinctive feature of this control is that control is that it is bilateral. This conforms to Treaty on limitation of underground nuclear weapon tests signed by two countries - USA and USSR. The inspection at the place of tests requires monitoring of the test site of the party conducting a test and geological information of rock in the area of explosion. In the treaty of the World Nuclear Test Ban the following ways of international control are provided for: - seismologic measurements; - radionuclide measurements; - hydro-acoustics measurements; - infra-sound measurements; - inspection at the place of the tests conduction

  13. Supporting the President's Arms Control and Nonproliferation Agenda: Transparency and Verification for Nuclear Arms Reductions

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E [Los Alamos National Laboratory; Meek, Elizabeth [Los Alamos National Laboratory

    2009-01-01

    The President's arms control and nonproliferation agenda is still evolving and the details of initiatives supporting it remain undefined. This means that DOE, NNSA, NA-20, NA-24 and the national laboratories can help define the agenda, and the policies and the initiatives to support it. This will require effective internal and interagency coordination. The arms control and nonproliferation agenda is broad and includes the path-breaking goal of creating conditions for the elimination of nuclear weapons. Responsibility for various elements of the agenda will be widely scattered across the interagency. Therefore an interagency mapping exercise should be performed to identify the key points of engagement within NNSA and other agencies for creating effective policy coordination mechanisms. These can include informal networks, working groups, coordinating committees, interagency task forces, etc. It will be important for NA-20 and NA-24 to get a seat at the table and a functional role in many of these coordinating bodies. The arms control and nonproliferation agenda comprises both mature and developing policy initiatives. The more mature elements such as CTBT ratification and a follow-on strategic nuclear arms treaty with Russia have defined milestones. However, recent press reports indicate that even the START follow-on strategic arms pact that is planned to be complete by the end of 2009 may take significantly longer and be more expansive in scope. The Russians called for proposals to count non-deployed as well as deployed warheads. Other elements of the agenda such as FMCT, future bilateral nuclear arms reductions following a START follow-on treaty, nuclear posture changes, preparations for an international nuclear security summit, strengthened international safeguards and multilateral verification are in much earlier stages of development. For this reason any survey of arms control capabilities within the USG should be structured to address potential needs

  14. Stability of transition to a world without nuclear weapons: Technical problems of verification

    International Nuclear Information System (INIS)

    Zhigalov, V.

    1998-01-01

    A serious psychological barrier to acceptance of the concept for achieving the nuclear-weapon-free world is fear of facing the prospect that one or more nations or extremist political groups might develop their own nuclear weapons. Actually this is a question of stability of the nuclear-weapon-free world. From this point of view the most effective system of verification is an absolute necessity. This system must ensure detection of so called undeclared nuclear activity at early stage. Scientists of Russian nuclear centers are working today on solving this problem. This paper is considered to be a comprehensive attempt to analyze the technical and organizational aspects of the problems of transition to a nuclear-weapons-free world, setting aside the difficulties of resolving purely political problems

  15. Status and Application of Spatial Information Technology as a Nuclear Verification Tool

    Energy Technology Data Exchange (ETDEWEB)

    Jo, Seong Youn; Shin, Jang Soo [Korea Institute of Nuclear Non-proliferation And Control, Daejeon (Korea, Republic of)

    2010-05-15

    The spatial information like satellite imagery and GIS data has been widely used for site development planning and monitoring in the area where the access is not allowed with any reason. The IAEA adopts this new method of analysis for enhancing its verification capability and is utilizing to search if there is any undeclared nuclear activities in the nuclear facilities worldwide. The ROK entered the group of the leading countries in the field of space technology with the successful launching of the KompSat I and II, and holds its high position in the IT technology which can draw useful analytic results from the satellite imagery. It implies that the ROK has some potential and related infra required for using the satellite imagery for the purpose of nuclear safeguards. However, we are in the very early stage to apply these advanced techniques to nuclear verification, because we don't have enough work forces enough to deal with these useful tools. It is necessary to review some previous examples about establishing satellite imagery analysis system like the IAEA. In this report, the IAEA's activities related verification using satellite imagery is reviewed and some examples on safeguards application is presented. A way to use satellite images for national inspection also is suggested

  16. North Korea's nuclear weapons program:verification priorities and new challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Moon, Duk-ho (Korean Consulate General in New York)

    2003-12-01

    A comprehensive settlement of the North Korean nuclear issue may involve military, economic, political, and diplomatic components, many of which will require verification to ensure reciprocal implementation. This paper sets out potential verification methodologies that might address a wide range of objectives. The inspection requirements set by the International Atomic Energy Agency form the foundation, first as defined at the time of the Agreed Framework in 1994, and now as modified by the events since revelation of the North Korean uranium enrichment program in October 2002. In addition, refreezing the reprocessing facility and 5 MWe reactor, taking possession of possible weapons components and destroying weaponization capabilities add many new verification tasks. The paper also considers several measures for the short-term freezing of the North's nuclear weapon program during the process of negotiations, should that process be protracted. New inspection technologies and monitoring tools are applicable to North Korean facilities and may offer improved approaches over those envisioned just a few years ago. These are noted, and potential bilateral and regional verification regimes are examined.

  17. Advanced control and instrumentation systems in nuclear power plants. Design, verification and validation

    International Nuclear Information System (INIS)

    Haapanen, P.

    1995-01-01

    The Technical Committee Meeting on design, verification and validation of advanced control and instrumentation systems in nuclear power plants was held in Espoo, Finland on 20 - 23 June 1994. The meeting was organized by the International Atomic Energy Agency's (IAEA) International Working Group's (IWG) on Nuclear Power Plant Control and Instrumentation (NPPCI) and on Advanced Technologies for Water Cooled Reactors (ATWR). VTT Automation together with Imatran Voima Oy and Teollisuuden Voima Oy responded about the practical arrangements of the meeting. In total 96 participants from 21 countries and the Agency took part in the meeting and 34 full papers and 8 posters were presented. Following topics were covered in the papers: (1) experience with advanced and digital systems, (2) safety and reliability analysis, (3) advanced digital systems under development and implementation, (4) verification and validation methods and practices, (5) future development trends. (orig.)

  18. The nuclear test-ban verification regime: An untapped source for climate change monitoring

    International Nuclear Information System (INIS)

    2008-12-01

    The benefits of a global ban on nuclear testing for international security and for protecting human health and the environment from radioactive fallout are obvious. The relevance of the Comprehensive Nuclear-Test-Ban Treaty (CTBT) for climate change research may not, however, be evident at first glance. The CTBT bans all nuclear explosions on Earth. To monitor compliance with the Treaty, the CTBTO Preparatory Commission for the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO), is establishing a verification regime capable of detecting clandestine nuclear tests. As the only international body operating its own system of monitoring stations that literally spans the globe, the CTBTO is in a unique position to contribute to the UN's efforts in the area of climate knowledge.

  19. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    Energy Technology Data Exchange (ETDEWEB)

    BAZINET, G.D.

    2001-05-15

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. The original version of this document was prepared by Vista Engineering for the SNF Project. Revision 1 documented verification actions that were pending at the time the initial report was prepared. Verification activities for the installed and operational SSCs have been completed. Verification of future additions to the CSB related to the canister cover cap and welding fixture system and MCO Internal Gas Sampling equipment will be completed as appropriate for those components. The open items related to verification of those requirements are noted in section 3

  20. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    International Nuclear Information System (INIS)

    BAZINET, G.D.

    2001-01-01

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. The original version of this document was prepared by Vista Engineering for the SNF Project. Revision 1 documented verification actions that were pending at the time the initial report was prepared. Verification activities for the installed and operational SSCs have been completed. Verification of future additions to the CSB related to the canister cover cap and welding fixture system and MCO Internal Gas Sampling equipment will be completed as appropriate for those components. The open items related to verification of those requirements are noted in section 3.1.5 and will be

  1. Working Group 3: Broader Perspectives on Non-proliferation and Nuclear Verification

    International Nuclear Information System (INIS)

    Dreicer, M.; Pregenzer, A.; Stein, G.

    2013-01-01

    This working group (WG) focused on the technical topics related to international security and stability in global nonproliferation and arms control regimes and asked how nonproliferation tools and culture might facilitate verification of future nuclear treaties. The review of existing and future nonproliferation and disarmament regimes (Comprehensive Test Ban Treaty - CTBT, UNSC Resolution 1540, UK/Norway/VERTIC exercise, Fissile Material Cut-off Treaty - FMCT) offered a view on challenges, possibilities, and limitations for future initiatives. The concepts that the WG considered, with potential use in implementing future nuclear verification treaties, are: Triple S Culture (Safety, Security, Safeguards), State-Level Approach, Safeguards-by-Design, risk-based approaches, managed access, inspections, and protection of sensitive information. Under these concepts, many existing tools, considered by the WG could be used for nuclear verification. Export control works to control sensitive technology and expertise. Global implementation is complicated and multi-faceted and would benefit from greater consistency and efficiency. In most cases, international cooperation and development international capability would supplement efforts. This document is composed of the slides and the paper of the presentation. (A.C.)

  2. New Approaches and New Technologies for the Verification of Nuclear Disarmament

    International Nuclear Information System (INIS)

    Keir, David

    2013-01-01

    ESARDA’s New Approaches/Novel Technologies Working group has recently begun to take a great interest in technology for use in arms control verification, in parallel with a focus on Nuclear Safeguards technology. A topic-based meeting of members of the NA/NT Subgroup was hosted at Joint Research Centre (JRC), ITU-Nuclear Security Unit in Ispra (Italy), to further explore the technical issues and opportunities presented by the need for new approaches and technologies in a future verified nuclear weapons dismantlement regime. Nuclear warheads must contain radioactive material and, by their nature, gamma rays and neutrons are likely to penetrate to the outside of the warhead casing and even metal containers. Therefore radiation signatures should be detectable by appropriate pieces of equipment. For this reason, researchers in the field of technical verification of nuclear warhead dismantlement have studied and developed technologies for Non-Destructive Assay (NDA). This paper presents a generic dismantlement pathway for verified nuclear warhead dismantlement, based on the scenario employed by the UK-Norway initiative for their exercise in 2008/9. Using this as a framework the types of measurement challenge likely to be presented to a verifying inspector are discussed. The problem of intrusiveness of measurements in relation to the issue of proliferative release of classified information about the warhead attributes is discussed and the concept of ‘information barriers is introduced as a possible solution to this issue. A list of candidate technologies for use in verification activities, with or without information barriers is then presented and, since most of these are new or novel approaches to the issue, an already-established system for classifying them – in terms of state of development and complexity of use in this context – is proposed. Finally, the concept of capturing this information as a library of ‘data sheets’, designed for periodic review as

  3. Development of an automated testing system for verification and validation of nuclear data

    International Nuclear Information System (INIS)

    Triplett, B. S.; Anghaie, S.; White, M. C.

    2008-01-01

    Verification and validation of nuclear data is critical to the accuracy of both stochastic and deterministic particle transport codes. In order to effectively test a set of nuclear data, the data must be applied to a wide variety of transport problems. Performing this task in a timely, efficient manner is tedious. The nuclear data team at Los Alamos National Laboratory (LANL) in collaboration with the University of Florida is developing a methodology to automate the process of nuclear data verification and validation. The International Criticality Safety Benchmark Experiment Project (ICSBEP) provides a set of criticality problems that may be used to evaluate nuclear data. This process tests a number of data libraries using cases from the ICSBEP benchmark set to demonstrate how automation of these tasks may reduce errors and increase efficiency. The process is driven by an integrated set of Python scripts. Material and geometry data may be read from an existing code input file to generate a standardized template or the template may be generated directly by the user The user specifies the desired precision and other vital problem parameters. The Python scripts generate input decks for multiple transport codes from these templates, run and monitor individual jobs, and parse the relevant output. This output can then be used to generate reports directly or can be stored into a database for later analysis. This methodology eases the burden on the user by reducing the amount of time and effort required for obtaining and compiling calculation results. (authors)

  4. Application of Integrated Verification Approach to FPGA-based Safety-Critical I and C System of Nuclear Power Plant

    International Nuclear Information System (INIS)

    Ahmed, Ibrahim; Heo, Gyunyoung; Jung, Jaecheon

    2016-01-01

    Safety-critical instrumentation and control (I and C) system in nuclear power plant (NPP) implemented on programmable logic controllers (PLCs) plays a vital role in safe operation of the plant. The challenges such as fast obsolescence, the vulnerability to cyber-attack, and other related issues of software systems have currently led to the consideration of field programmable gate arrays (FPGAs) as an alternative to PLCs because of their advantages and hardware related benefits. Generally in FPGA design verification, the designers make use of verification techniques by writing the test benches which involved various stages of verification activities of register-transfer level (RTL), gate-level, and place and route. Writing the test benches is considerably time consuming and require a lot of efforts to achieve a satisfied desire results. Furthermore, performing the verification at each stage is a major bottleneck and demanded much activities and time. In addition, verification is conceivably, the most difficult and complicated aspect of any design. Therefore, in view of these, this work applied an integrated verification approach to the verification of FPGA-based I and C system in NPP that simultaneously verified the whole design modules using MATLAB/Simulink HDL Co-simulation models. Verification is conceivably, the most difficult and complicated aspect of any design, and an FPGA design is not an exception. Therefore, in this work, we introduced and discussed how an application of integrated verification technique to the verification and testing of FPGA-based I and C system design in NPP can facilitate the verification processes, and verify the entire design modules of the system simultaneously using MATLAB/Simulink HDL co-simulation models. In conclusion, the results showed that, the integrated verification approach through MATLAB/Simulink models, if applied to any design to be verified, could speed up the design verification and reduce the V and V tasks

  5. Application of Integrated Verification Approach to FPGA-based Safety-Critical I and C System of Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Ahmed, Ibrahim; Heo, Gyunyoung [Kyunghee Univ., Yongin (Korea, Republic of); Jung, Jaecheon [KEPCO, Ulsan (Korea, Republic of)

    2016-10-15

    Safety-critical instrumentation and control (I and C) system in nuclear power plant (NPP) implemented on programmable logic controllers (PLCs) plays a vital role in safe operation of the plant. The challenges such as fast obsolescence, the vulnerability to cyber-attack, and other related issues of software systems have currently led to the consideration of field programmable gate arrays (FPGAs) as an alternative to PLCs because of their advantages and hardware related benefits. Generally in FPGA design verification, the designers make use of verification techniques by writing the test benches which involved various stages of verification activities of register-transfer level (RTL), gate-level, and place and route. Writing the test benches is considerably time consuming and require a lot of efforts to achieve a satisfied desire results. Furthermore, performing the verification at each stage is a major bottleneck and demanded much activities and time. In addition, verification is conceivably, the most difficult and complicated aspect of any design. Therefore, in view of these, this work applied an integrated verification approach to the verification of FPGA-based I and C system in NPP that simultaneously verified the whole design modules using MATLAB/Simulink HDL Co-simulation models. Verification is conceivably, the most difficult and complicated aspect of any design, and an FPGA design is not an exception. Therefore, in this work, we introduced and discussed how an application of integrated verification technique to the verification and testing of FPGA-based I and C system design in NPP can facilitate the verification processes, and verify the entire design modules of the system simultaneously using MATLAB/Simulink HDL co-simulation models. In conclusion, the results showed that, the integrated verification approach through MATLAB/Simulink models, if applied to any design to be verified, could speed up the design verification and reduce the V and V tasks.

  6. Nuclear proliferation using laser isotope separation - Verification options

    International Nuclear Information System (INIS)

    Erickson, Stanley A.

    2001-01-01

    Full text: This paper discusses the use of laser isotope separation techniques for the purpose of nuclear proliferation by a Non-Nuclear Weapons State (NNWS) that is a signatory of the Non- Proliferation Treaty (NPT) and is subject to inspections by the IAEA. It includes an analysis of the feasibility of the technique by a NNWS, what conditions are necessary for success, what would be required for either the use of the technique as a covert enrichment method or its use as a non-declared adjunct to a declared enrichment facility, and what signs might be available for the detection of such activity. The Atomic Vapor Laser Isotope Separation (AVLIS) technology, developed by LLNL from 1973 through 1999, is used as a concrete example to allow more determination of the questions of feasibility, requirements, and signatures, as this technology has been further developed than others, and has been documented extensively. The question of feasibility of the technique for the enrichment of significant quantities of uranium or plutonium to produce weapons-grade materials is investigated by decomposing the development necessary for the technique into steps that can be analyzed for requirements, both in expertise, equipment, and scientific knowledge. The paper concludes that the technique is usable for proliferation, although with difficulty, by some nations during the next two decades. The technique may be developed in a completely covert method, with no declarations and no public indication that it is under research and development, or alternatively, some admissions may be made to allow or promote exchange of information. The technique can be disclosed as a research and development technology for the separation of non-radioactive isotopes, for the separation of radioactive isotopes including those in commercial use for medical or industrial purposes, or as part of a nuclear fuel cycle. The ability to translate development work from the first two of these to a system usable for

  7. Verification of failover effects from distributed control system communication networks in digitalized nuclear power plants

    Directory of Open Access Journals (Sweden)

    Moon-Gi Min

    2017-08-01

    Full Text Available Distributed Control System (DCS communication networks, which use Fast Ethernet with redundant networks for the transmission of information, have been installed in digitalized nuclear power plants. Normally, failover tests are performed to verify the reliability of redundant networks during design and manufacturing phases; however, systematic integrity tests of DCS networks cannot be fully performed during these phases because all relevant equipment is not installed completely during these two phases. In additions, practical verification tests are insufficient, and there is a need to test the actual failover function of DCS redundant networks in the target environment. The purpose of this study is to verify that the failover functions works correctly in certain abnormal conditions during installation and commissioning phase and identify the influence of network failover on the entire DCS. To quantify the effects of network failover in the DCS, the packets (Protocol Data Units must be collected and resource usage of the system has to be monitored and analyzed. This study introduces the use of a new methodology for verification of DCS network failover during the installation and commissioning phases. This study is expected to provide insight into verification methodology and the failover effects from DCS redundant networks. It also provides test results of network performance from DCS network failover in digitalized domestic nuclear power plants (NPPs.

  8. Verification of failover effects from distributed control system communication networks in digitalized nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Min, Moon Gi; Lee, Jae Ki; Lee, Kwang Hyun; Lee, Dong Il; Lim, Hee Taek [Korea Hydro and Nuclear Power Co., Ltd, Daejeon (Korea, Republic of)

    2017-08-15

    Distributed Control System (DCS) communication networks, which use Fast Ethernet with redundant networks for the transmission of information, have been installed in digitalized nuclear power plants. Normally, failover tests are performed to verify the reliability of redundant networks during design and manufacturing phases; however, systematic integrity tests of DCS networks cannot be fully performed during these phases because all relevant equipment is not installed completely during these two phases. In additions, practical verification tests are insufficient, and there is a need to test the actual failover function of DCS redundant networks in the target environment. The purpose of this study is to verify that the failover functions works correctly in certain abnormal conditions during installation and commissioning phase and identify the influence of network failover on the entire DCS. To quantify the effects of network failover in the DCS, the packets (Protocol Data Units) must be collected and resource usage of the system has to be monitored and analyzed. This study introduces the use of a new methodology for verification of DCS network failover during the installation and commissioning phases. This study is expected to provide insight into verification methodology and the failover effects from DCS redundant networks. It also provides test results of network performance from DCS network failover in digitalized domestic nuclear power plants (NPPs)

  9. Nuclear verification: What it is, how it works, the assurances it can provide

    International Nuclear Information System (INIS)

    Fortakov, V.

    1998-01-01

    International nuclear safeguards consist of a complex control system based on material accountancy with the technical objective of providing for 'the timely detection of diversion of significant quantities of nuclear material from peaceful nuclear activities to the manufacture of nuclear weapons or of other nuclear explosive devices or for purposes unknown, and deterrence of such diversion by the risk of early detection' (INFCIR 153). This paper addresses the many technical principles of nuclear safeguards as implemented today. States with comprehensive safeguards agreements undertake to accept IAEA safeguards on all nuclear material within the State territory or under its jurisdiction or control. The basic procedural elements of the safeguards system are facility design examination and verification, maintenance of records by facility operators, provision of reports to the IAEA and on-site inspections by IAEA staff. The system requires the concerted action of nuclear facility operators, State Authorities and the IAEA inspectorate and is constantly improved to strengthen it and make it more cost-efficient

  10. DESIGN VERIFICATION REPORT SPENT NUCLEAR FUEL (SNF) PROJECT CANISTER STORAGE BUILDING (CSB)

    Energy Technology Data Exchange (ETDEWEB)

    BAZINET, G.D.

    2003-02-12

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. The original version of this document was prepared by Vista Engineering for the SNF Project. Revision 1 documented verification actions that were pending at the time the initial report was prepared. Revision 3 of this document incorporates MCO Cover Cap Assembly welding verification activities. Verification activities for the installed and operational SSCs have been completed.

  11. DESIGN VERIFICATION REPORT SPENT NUCLEAR FUEL (SNF) PROJECT CANISTER STORAGE BUILDING (CSB)

    International Nuclear Information System (INIS)

    BAZINET, G.D.

    2003-01-01

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. The original version of this document was prepared by Vista Engineering for the SNF Project. Revision 1 documented verification actions that were pending at the time the initial report was prepared. Revision 3 of this document incorporates MCO Cover Cap Assembly welding verification activities. Verification activities for the installed and operational SSCs have been completed

  12. Employing 3D Virtual Reality and the Unity Game Engine to Support Nuclear Verification Research

    International Nuclear Information System (INIS)

    Patton, T.

    2015-01-01

    This project centres on the development of a virtual nuclear facility environment to assist non-proliferation and nuclear arms control practitioners - including researchers, negotiators, or inspectors - in developing and refining a verification system and secure chain of custody of material or equipment. The platform for creating the virtual facility environment is the Unity 3D game engine. This advanced platform offers both the robust capability and flexibility necessary to support the design goals of the facility. The project also employs Trimble SketchUp and Blender 3D for constructing the model components. The development goal of this phase of the project was to generate a virtual environment that includes basic physics in which avatars can interact with their environment through actions such as picking up objects, operating vehicles, dismantling a warhead through a spherical representation system, opening/closing doors through a custom security access system, and conducting CCTV surveillance. Initial testing of virtual radiation simulation techniques was also explored in preparation for the next phase of development. Some of the eventual utilities and applications for this platform include: 1. conducting live multi-person exercises of verification activities within a single, shared virtual environment, 2. refining procedures, individual roles, and equipment placement in the contexts of non-proliferation or arms control negotiations 3. hands on training for inspectors, and 4. a portable tool/reference for inspectors to use while carrying out inspections. This project was developed under the Multilateral Verification Project, led by the Verification Research, Training and Information Centre (VERTIC) in the United Kingdom, and financed by the Norwegian Ministry of Foreign Affairs. The environment was constructed at the Vienna Center for Disarmament and Non-Proliferation (VCDNP). (author)

  13. DOE/LLNL verification symposium on technologies for monitoring nuclear tests related to weapons proliferation

    International Nuclear Information System (INIS)

    Nakanishi, K.K.

    1993-01-01

    The rapidly changing world situation has raised concerns regarding the proliferation of nuclear weapons and the ability to monitor a possible clandestine nuclear testing program. To address these issues, Lawrence Livermore National Laboratory's (LLNL) Treaty Verification Program sponsored a symposium funded by the US Department of Energy's (DOE) Office of Arms Control, Division of Systems and Technology. The DOE/LLNL Symposium on Technologies for Monitoring Nuclear Tests Related to Weapons Proliferation was held at the DOE's Nevada Operations Office in Las Vegas, May 6--7,1992. This volume is a collection of several papers presented at the symposium. Several experts in monitoring technology presented invited talks assessing the status of monitoring technology with emphasis on the deficient areas requiring more attention in the future. In addition, several speakers discussed proliferation monitoring technologies being developed by the DOE's weapons laboratories

  14. A new nuclear triad: the non-proliferation of nuclear weapons, international verification and the International Atomic Energy Agency

    International Nuclear Information System (INIS)

    Fischer, D.; Sanders, B.; Scheinman, L.; Bunn, G.

    1992-01-01

    The nuclear non-proliferation regime comprises a wide variety of unilateral, bilateral, regional and multilateral agreements. All these agreements contain undertakings by the contracting states not to manufacture or acquire nuclear weapons and make provisions for means of verifying that the parties abide by these undertakings. The system of verification, the safeguards system, is fundamental to any effective nuclear non-proliferation policy. The purpose of this study is to show that IAEA safeguards, originally products of the political climate of the late 1960s and serving its ends, must be adapted to the political realities of the 1990s. The new aim of IAEA safeguards must be to deal with increased dangers of proliferation around the Asian crescent, and to derive full benefit from the end of the Cold War and from the dramatic progress that has been made since 1988 in devising and securing agreement on intrusive forms of verification that would have been unthinkable until very recently. Although much progress has been made since 1991, additional changes to reinforce the IAEA safeguards system are still required. The proposals contained in this study constitute a contribution to the debate over such changes and the necessary evolution of that system. (author)

  15. Development of a test system for verification and validation of nuclear transport simulations

    Energy Technology Data Exchange (ETDEWEB)

    White, Morgan C [Los Alamos National Laboratory; Triplett, Brian S [GENERAL ELECTRIC; Anghaie, Samim [UNIV OF FL

    2008-01-01

    Verification and validation of nuclear data is critical to the accuracy of both stochastic and deterministic particle transport codes. In order to effectively test a set of nuclear data, the data must be applied to a wide variety of transport problems. Performing this task in a timely, efficient manner is tedious. The nuclear data team at Los Alamos National laboratory in collaboration with the University of Florida has developed a methodology to automate the process of nuclear data verification and validation (V and V). This automated V and V process can efficiently test a number of data libraries using well defined benchmark experiments, such as those in the International Criticality Safety Benchmark Experiment Project (ICSBEP). The process is implemented through an integrated set of Pyton scripts. Material and geometry data are read from an existing medium or given directly by the user to generate a benchmark experiment template file. The user specifies the choice of benchmark templates, codes, and libraries to form a V and V project. The Python scripts generate input decks for multiple transport codes from the templates, run and monitor individual jobs, and parse the relevant output automatically. The output can then be used to generate reports directly or can be stored into a database for later analysis. This methodology eases the burden on the user by reducing the amount of time and effort required for obtaining and compiling calculation results. The resource savings by using this automated methodology could potentially be an enabling technology for more sophisticated data studies, such as nuclear data uncertainty quantification. Once deployed, this tool will allow the nuclear data community to more thoroughly test data libraries leading to higher fidelity data in the future.

  16. Development of a test suite for nuclear data verification and validation

    International Nuclear Information System (INIS)

    Triplett, Brian; Anghaie, Samim; White, Morgan

    2008-01-01

    Verification and validation of nuclear data is critical to the accuracy of both stochastic and deterministic particle transport codes. In order to effectively test a set of nuclear data, the data must be applied to a wide variety of transport problems. Performing this task in a timely, efficient manner is tedious. The nuclear data team at Los Alamos National Laboratory in collaboration with the University of Florida has developed a methodology to automate the process of nuclear data verification and validation (V and V). This automated V and V process can efficiently test a number of data libraries using well defined benchmark experiments, such as those in the International Criticality Safety Benchmark Experiment Project (ICSBEP). The process is implemented through an integrated set of Python scripts. Material and geometry data are read from an existing medium or given directly by the user to generate a benchmark experiment template file. The user specifies the choice of benchmark templates, codes, and libraries to form a V and V project. The Python scripts generate input decks for multiple transport codes from the templates, run and monitor individual jobs, and parse the relevant output automatically. The output can then be used to generate reports directly or can be stored into a database for later analysis. This methodology eases the burden on the user by reducing the amount of time and effort required for obtaining and compiling calculation results. The resource savings by using this automated methodology could potentially be an enabling technology for more sophisticated data studies, such as nuclear data uncertainty quantification. Once deployed, this tool will allow the nuclear data community to more thoroughly test data libraries leading to higher fidelity data in the future. (authors)

  17. Kalam's Swiss visit to help India's nuclear scientists

    CERN Multimedia

    2005-01-01

    President A.P.J. Abdul Kalam arrived here wednesday on a visit that will see the inking of a document giving India access to the latest in nuclear technology; one of his first engagements would be at the European Organisation for Nuclear Research, considered one of the most advanced hysics labs in the world (1/2 page)

  18. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    Energy Technology Data Exchange (ETDEWEB)

    BAZINET, G.D.

    2000-11-03

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. The original version of this document was prepared by Vista Engineering for the SNF Project. The purpose of this revision is to document completion of verification actions that were pending at the time the initial report was prepared. Verification activities for the installed and operational SSCs have been completed. Verification of future additions to the CSB related to the canister cover cap and welding fixture system and MCO Internal Gas Sampling equipment will be completed as appropriate for those components. The open items related to verification of those

  19. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    International Nuclear Information System (INIS)

    BAZINET, G.D.

    2000-01-01

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. The original version of this document was prepared by Vista Engineering for the SNF Project. The purpose of this revision is to document completion of verification actions that were pending at the time the initial report was prepared. Verification activities for the installed and operational SSCs have been completed. Verification of future additions to the CSB related to the canister cover cap and welding fixture system and MCO Internal Gas Sampling equipment will be completed as appropriate for those components. The open items related to verification of those requirements are noted

  20. Verification and validation of the safety parameter display system for nuclear power plant

    International Nuclear Information System (INIS)

    Zhang Yuanfang

    1993-05-01

    During the design and development phase of the safety parameter display system for nuclear power plant, a verification and validation (V and V) plan has been implemented to improve the quality of system design. The V and V activities are briefly introduced, which were executed in four stages of feasibility research, system design, code development and system integration and regulation. The evaluation plan and the process of implementation as well as the evaluation conclusion of the final technical validation for this system are also presented in detail

  1. REPORT OF THE WORKSHOP ON NUCLEAR FACILITY DESIGN INFORMATION EXAMINATION AND VERIFICATION FOR SAFEGUARDS

    Energy Technology Data Exchange (ETDEWEB)

    Richard Metcalf; Robert Bean

    2009-10-01

    Executive Summary The International Atomic Energy Agency (IAEA) implements nuclear safeguards and verifies countries are compliant with their international nuclear safeguards agreements. One of the key provisions in the safeguards agreement is the requirement that the country provide nuclear facility design and operating information to the IAEA relevant to safeguarding the facility, and at a very early stage. , This provides the opportunity for the IAEA to verify the safeguards-relevant features of the facility and to periodically ensure that those features have not changed. The national authorities (State System of Accounting for and Control of Nuclear Material - SSAC) provide the design information for all facilities within a country to the IAEA. The design information is conveyed using the IAEA’s Design Information Questionnaire (DIQ) and specifies: (1) Identification of the facility’s general character, purpose, capacity, and location; (2) Description of the facility’s layout and nuclear material form, location, and flow; (3) Description of the features relating to nuclear material accounting, containment, and surveillance; and (4) Description of existing and proposed procedures for nuclear material accounting and control, with identification of nuclear material balance areas. The DIQ is updated as required by written addendum. IAEA safeguards inspectors examine and verify this information in design information examination (DIE) and design information verification (DIV) activities to confirm that the facility has been constructed or is being operated as declared by the facility operator and national authorities, and to develop a suitable safeguards approach. Under the Next Generation Safeguards Initiative (NGSI), the National Nuclear Security Administrations (NNSA) Office of Non-Proliferation and International Security identified the need for more effective and efficient verification of design information by the IAEA for improving international safeguards

  2. Verification and validation of software related to nuclear power plant control and instrumentation

    International Nuclear Information System (INIS)

    Wall, N.; Kossilov, A.

    1994-01-01

    There has always been significant concern with introduction of software in industry and the nuclear industry is no different from any other sector save its safety demands are some of the most onerous. The problems associated with software have led to the well documented difficulties in the introduction of computer based systems. An important area of concern with software in systems is the processes of Verification and Validation. One of the many activities the IAEA is currently engaged in is the preparation of a document on the process of verification and validation of software. The document follows the safety classification of IEC 1226 but includes software important to plant operation to establish three levels of assurance. The software that might be deployed on a plant was then identified as one of four types: new software, existing software for which full access to the code and documentation is possible, existing software of a proprietary nature and finally configurable software. The document attempts to identify the appropriate methods and tools for conducting the verification and validation processes. (author). 5 refs, 5 figs, 7 tabs

  3. Verification of the Correctness and Completeness of Nuclear Operators' Declarations by Euratom

    International Nuclear Information System (INIS)

    Meylemans, P.; Szymanski, P.; Synetos, S.; Beuseling, P.; Jirsa, P.; Ciccarello, S.; Kilb, W.; Klumpp, P.; Schwalbach, P.; Schoop, K.; Koutsoyannopoulos, C.; Lahogue, Y.; Persson, L.; Coadou, J.; Koehne, W.; Kahnmeyer, W.; Dratschmidt, H.; Thomas, M.; Lahogue-Incerti, M.; )

    2015-01-01

    We present the Euratom nuclear safeguards system, a supranational system used to verify the operators' and States' (when required by the Additional Protocol) declarations. The verifications performed by the European Commission serve to conclude on the nondiversion of the civil stocks of nuclear materials in the territories of EU Member States (Article 77a Euratom Treaty) and to fulfil obligations stemming from nuclear cooperation agreements with third States and international organizations such as the IAEA (Article 77b). In line with multilateral safeguards agreements and their respective additional protocols, as well as under the New Partnership Approach, Euratom works closely with the IAEA in order to avoid unnecessary duplication of efforts while maintaining the ability of both organizations to reach independent conclusions. In our paper the focus lies on the verifications performed before transmitting data to the IAEA. Starting from the sheer volume of data we describe checks and other operations performed (e.g., format adaptations) on the nuclear material accountancy (NMAC) data and Additional Protocol declarations; including quality assurance measures. We also present some statistics on the related workload, including answering queries from the IAEA. We describe the IT tools developed by Euratom for nuclear operators to submit their declarations and which are subsequently verified by Euratom before being transmitted to the IAEA. Moreover, we present support activities aiming at improving the operators' NMAC systems such as audits (including audits of measurement systems). We conclude by presenting the challenges lying ahead and ways to address them to further strengthen and improve the quality of the Euratom work and cooperation with the IAEA. (author)

  4. Numerical verification of equilibrium chemistry software within nuclear fuel performance codes

    International Nuclear Information System (INIS)

    Piro, M.H.; Lewis, B.J.; Thompson, W.T.; Simunovic, S.; Besmann, T.M.

    2010-01-01

    A numerical tool is in an advanced state of development to compute the equilibrium compositions of phases and their proportions in multi-component systems of importance to the nuclear industry. The resulting software is being conceived for direct integration into large multi-physics fuel performance codes, particularly for providing transport source terms, material properties, and boundary conditions in heat and mass transport modules. Consequently, any numerical errors produced in equilibrium chemistry computations will be propagated in subsequent heat and mass transport calculations, thus falsely predicting nuclear fuel behaviour. The necessity for a reliable method to numerically verify chemical equilibrium computations is emphasized by the requirement to handle the very large number of elements necessary to capture the entire fission product inventory. A simple, reliable and comprehensive numerical verification method called the Gibbs Criteria is presented which can be invoked by any equilibrium chemistry solver for quality assurance purposes. (author)

  5. French lessons - can they help the US nuclear industry?

    International Nuclear Information System (INIS)

    Jasper, J.M.

    1987-01-01

    Many analyses of the politics and economics of nuclear energy in the United States rely on comparisons of US reactor programs with those of France, which have proven to be more successful. The kernel of the comparison is that France has a large and growing nuclear system that produces most of the country's electricity, little political resistance, electric rates that are among the lowest in Europe, and independence from the vicissitudes of the oil markets. By contrast, in the US there are widespread political resistance and unfavorable public opinion, uncertainty about future plans for nuclear energy, and a generally costly set of reactors that produce about 15% of the country's electricity. What is more, the relatively expensive American plants are often thought of to be less safe than their cheaper French counterparts. In attempting to explain the French success and the US failure, observers have been all too prone to single out as the root cause a particular political or economic factor that differs between the two countries. One of the major shortcomings of this approach is that there are a number of relevant differences, any of which could play a part in affecting the countries' nuclear programs and which may not be easily changed. Moreover, implicit in each explanation is a prescription for how to aid the ailing nuclear industry in the United States--a prescription that may well be questionable

  6. Development of a consensus standard for verification and validation of nuclear system thermal-fluids software

    International Nuclear Information System (INIS)

    Harvego, Edwin A.; Schultz, Richard R.; Crane, Ryan L.

    2011-01-01

    With the resurgence of nuclear power and increased interest in advanced nuclear reactors as an option to supply abundant energy without the associated greenhouse gas emissions of the more conventional fossil fuel energy sources, there is a need to establish internationally recognized standards for the verification and validation (V and V) of software used to calculate the thermal–hydraulic behavior of advanced reactor designs for both normal operation and hypothetical accident conditions. To address this need, ASME (American Society of Mechanical Engineers) Standards and Certification has established the V and V 30 Committee, under the jurisdiction of the V and V Standards Committee, to develop a consensus standard for verification and validation of software used for design and analysis of advanced reactor systems. The initial focus of this committee will be on the V and V of system analysis and computational fluid dynamics (CFD) software for nuclear applications. To limit the scope of the effort, the committee will further limit its focus to software to be used in the licensing of High-Temperature Gas-Cooled Reactors. Although software verification will be an important and necessary part of the standard, much of the initial effort of the committee will be focused on the validation of existing software and new models that could be used in the licensing process. In this framework, the Standard should conform to Nuclear Regulatory Commission (NRC) and other regulatory practices, procedures and methods for licensing of nuclear power plants as embodied in the United States (U.S.) Code of Federal Regulations and other pertinent documents such as Regulatory Guide 1.203, “Transient and Accident Analysis Methods” and NUREG-0800, “NRC Standard Review Plan”. In addition, the Standard should be consistent with applicable sections of ASME NQA-1-2008 “Quality Assurance Requirements for Nuclear Facility Applications (QA)”. This paper describes the general

  7. Highlights of the IAEA scientific forum: Nuclear science: Physics helping the world

    International Nuclear Information System (INIS)

    Richter, B.

    2005-01-01

    The conclusions drawn at the Scientific Forum during the 49th regular Session of the IAEA General Conference entitled 'Nuclear Physics: Helping the World' are as follows. Physics is indeed helping the world and the IAEA, applications of nuclear are continuing to grow, nuclear power is likely to increase dramatically, work on 'Beyond Kyoto' should begin and nuclear should be part of any 'Clean Development Mechanism'. IAEA should look again at the role of R and D in safeguards, IAEA should look at safety issues in newly nuclear countries, internationalizing the fuel cycle is right IF one can do it

  8. Independent tube verification and dynamic tracking in et inspection of nuclear steam generator

    International Nuclear Information System (INIS)

    Xiongzi, Li; Zhongxue, Gan; Lance, Fitzgibbons

    2001-01-01

    The full text follows. In the examination of pressure boundary tubes in steam generators of commercial pressurized water nuclear power plants (PWR's), it is critical to know exactly which particular tube is being accessed. There are no definitive landmarks or markings on the individual tubes. Today this is done manually, it is tedious, and interrupts the normal inspection work, and is difficult due to the presence of water on the tube surface, plug ends instead of tube openings in the field of view, and varying lighting quality. In order to eliminate the human error and increase the efficiency of operation, there is a need to identify tube position during the inspection process, independent of robot encoder position and motion. A process based on a Cognex MVS-8200 system and its application function package has been developed to independently identify tube locations. ABB Combustion Engineering Nuclear Power's Outage Services group, USPPL in collaboration with ABB Power Plant Laboratories' Advanced Computers and Controls department has developed a new vision-based Independent Tube Verification system (GENESIS-ITVS-TM ). The system employ's a model-based tube-shape detection algorithm and dynamic tracking methodology to detect the true tool position and its offsets from identified tube location. GENESIS-ITVS-TM is an automatic Independent Tube Verification System (ITVS). Independent tube verification is a tube validation technique using computer vision, and not using any robot position parameters. This process independently counts the tubes in the horizontal and vertical axes of the plane of the steam generator tube sheet as the work tool is moved. Thus it knows the true position in the steam generator, given a known starting point. This is analogous to the operator's method of counting tubes for verification, but it is automated. GENESIS-ITVS-TM works independent of the robot position, velocity, or acceleration. The tube position information is solely obtained from

  9. How can help nuclear technology the developing countries?

    International Nuclear Information System (INIS)

    Boeck, H.; Buchtela, K.; Karimzadeh, S.; Musilek, A.

    2004-01-01

    Nuclear technology offers unique tools in the quest for sustainable development, such technology is often the best to gather information and provide solutions that would not otherwise be possible or practical for example diagnosis and therapy, to breed better crops and fight insect pests; to assess new sources of fresh water; and to assess sources of environmental pollution. The International Atomic Energy Agency (IAEA) provides support to 134 member states for using this technology to solve the important challenges they face. These scientific and technical co-operations based on the peaceful use of nuclear techniques (isotopes, stable and radioactive forms of chemical elements, human health, food, agriculture, water and environmental protection, capacity building, future energy needs) are described. (nevyjel)

  10. A New Approach to Nuclear Warhead Verification Using a Zero-Knowledge Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Glaser,; Alexander, [Princeton University

    2012-05-16

    Warhead verification systems proposed to date fundamentally rely on the use of information barriers to prevent the release of classified design information. Measurements with information carriers significantly increase the complexity of inspection systems, make their certification and authentication difficult, and may reduce the overall confidence in the verifiability of future arms- control agreements. This talk presents a proof-of-concept of a new approach to nuclear warhead verification that minimizes the role of information barriers from the outset and envisions instead an inspection system that a priori avoids leakage of sensitive information using a so-called zero-knowledge protocol. The proposed inspection system is based on the template-matching approach and relies on active interrogation of a test object with 14-MeV neutrons. The viability of the method is examined with MCNP Monte Carlo neutron transport calculations modeling the experimental setup, an investigation of different diversion scenarios, and an analysis of the simulated data showing that it does not contain information about the properties of the inspected object.

  11. A method of knowledge base verification and validation for nuclear power plants expert systems

    International Nuclear Information System (INIS)

    Kwon, Il Won

    1996-02-01

    The adoption of expert systems mainly as operator supporting systems is becoming increasingly popular as the control algorithms of system become more and more sophisticated and complicated. As a result of this popularity, a large number of expert systems are developed. The nature of expert systems, however, requires that they be verified and validated carefully and that detailed methodologies for their development be devised. Therefore, it is widely noted that assuring the reliability of expert systems is very important, especially in nuclear industry, and it is also recognized that the process of verification and validation is an essential part of reliability assurance for these systems. Research and practices have produced numerous methods for expert system verification and validation (V and V) that suggest traditional software and system approaches to V and V. However, many approaches and methods for expert system V and V are partial, unreliable, and not uniform. The purpose of this paper is to present a new approach to expert system V and V, based on Petri nets, providing a uniform model. We devise and suggest an automated tool, called COKEP (Checker Of Knowledge base using Extended Petri net), for checking incorrectness, inconsistency, and incompleteness in a knowledge base. We also suggest heuristic analysis for validation process to show that the reasoning path is correct

  12. Verification of MCNP6.2 for Nuclear Criticality Safety Applications

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Forrest B. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rising, Michael Evan [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Alwin, Jennifer Louise [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-10

    Several suites of verification/validation benchmark problems were run in early 2017 to verify that the new production release of MCNP6.2 performs correctly for nuclear criticality safety applications (NCS). MCNP6.2 results for several NCS validation suites were compared to the results from MCNP6.1 [1] and MCNP6.1.1 [2]. MCNP6.1 is the production version of MCNP® released in 2013, and MCNP6.1.1 is the update released in 2014. MCNP6.2 includes all of the standard features for NCS calculations that have been available for the past 15 years, along with new features for sensitivity-uncertainty based methods for NCS validation [3]. Results from the benchmark suites were compared with results from previous verification testing [4-8]. Criticality safety analysts should consider testing MCNP6.2 on their particular problems and validation suites. No further development of MCNP5 is planned. MCNP6.1 is now 4 years old, and MCNP6.1.1 is now 3 years old. In general, released versions of MCNP are supported only for about 5 years, due to resource limitations. All future MCNP improvements, bug fixes, user support, and new capabilities are targeted only to MCNP6.2 and beyond.

  13. Distributed source term analysis, a new approach to nuclear material inventory verification

    CERN Document Server

    Beddingfield, D H

    2002-01-01

    The Distributed Source-Term Analysis (DSTA) technique is a new approach to measuring in-process material holdup that is a significant departure from traditional hold-up measurement methodology. The DSTA method is a means of determining the mass of nuclear material within a large, diffuse, volume using passive neutron counting. The DSTA method is a more efficient approach than traditional methods of holdup measurement and inventory verification. The time spent in performing DSTA measurement and analysis is a fraction of that required by traditional techniques. The error ascribed to a DSTA survey result is generally less than that from traditional methods. Also, the negative bias ascribed to gamma-ray methods is greatly diminished because the DSTA method uses neutrons which are more penetrating than gamma-rays.

  14. Identification of uranium signatures in swipe samples on verification of nuclear activities for nuclear safeguards purposes

    International Nuclear Information System (INIS)

    Pestana, Rafael Cardoso Baptistini

    2013-01-01

    The use of environmental sampling for safeguards purposes, has been applied by the International Atomic Energy Agency–IAEA since 1996 and are routinely used as a complementary measure to strengthen the traditional nuclear safeguards procedures. The aim is verify if the states signatory to the safeguards agreements are not diverging their peaceful nuclear activities for undeclared nuclear activities. This work describes a new protocol of collect and analysis of the swipe samples for identification of nuclear signatures that may be related to the nuclear activities developed in the inspected facility. This work was used as a case of study a real uranium conversion plant of the nuclear fuel cycle of IPEN. The strategy proposed uses different analytical techniques, such as alpha radiation meter, SEM-EDX and ICP-MS to identify signatures of uranium adhered to the swipe samples. In the swipe samples analysis, it was possible to identify particles of UO 2 F 2 and UF4 through the morphological comparison and semi-quantitative analyses performed by SEM-EDX technique. In this work, methods were used that as a result has the average isotopic composition of the sample, in which the enrichment ranged from 1.453 ± 0.023 to 18.24 % ± 0.15 % in the 235 U isotope. Through these externally collections, a non-intrusive sampling, it was possible to identify enriched material handling activities with enrichment of 1.453 % ± 0.023 % to 6.331 ± 0.055 % in the isotope 235 U, as well as the use of reprocessed material, through the identification of the 236 U isotope. The uncertainties obtained for the n( 235 U)/n( 238 U) ratio varied from 0.40% to 0.86 % for the internal swipe samples. (author)

  15. Design and verification of computer-based reactor control system modification at Bruce-A candu nuclear generating station

    International Nuclear Information System (INIS)

    Basu, S.; Webb, N.

    1995-01-01

    The Reactor Control System at Bruce-A Nuclear Generating Station is going through some design modifications, which involve a rigorous design process including independent verification and validation. The design modification includes changes to the control logic, alarms and annunciation, hardware and software. The design (and verification) process includes design plan, design requirements, hardware and software specifications, hardware and software design, testing, technical review, safety evaluation, reliability analysis, failure mode and effect analysis, environmental qualification, seismic qualification, software quality assurance, system validation, documentation update, configuration management, and final acceptance. (7 figs.)

  16. Guidelines for verification and validation of software related to nuclear power plant control and instrumentation. Working material

    International Nuclear Information System (INIS)

    1993-01-01

    The main purpose of the consultancy organized by the IAEA and held form 6 to 10 September 1993 was to prepare an extended outline of a new technical document in which a current status of Verification and Validation of software related to NPP I and C systems and guidance on the practical use of Verification and Validation methods for solving special problems in design, operation and maintenance of nuclear power plants are to be presented. The present volume contains: (1) report of the meeting; (2) reports presented by the national delegates; and (3) technical draft document. Ref and figs

  17. Nuclear cooperation targets global challenges. States back main pillars of the IAEA's work to strengthen nuclear safety, verification and technology transfer

    International Nuclear Information System (INIS)

    2000-01-01

    States meeting at the 44th IAEA General Conference in Vienna have set a challenging agenda for international nuclear cooperation into the 21st century that targets issues of global safety, security, and sustainable development. They adopted resolutions endorsing the Agency's programmes for strengthening activities under its three main pillars of work - nuclear verification, safety, and technology - that are closely linked to major challenges before the world. The document presents the main actions taken during the conference

  18. A formal design verification and validation on the human factors of a computerized information system in nuclear power plants

    International Nuclear Information System (INIS)

    Lee, Yong Hee; Park, Jae Chang; Cheon, Se Woo; Jung, Kwang Tae; Baek, Seung Min; Han, Seung; Park, Hee Suk; Son, Ki Chang; Kim, Jung Man; Jung Yung Woo

    1999-11-01

    This report describe a technical transfer under the title of ''A formal design verification and validation on the human factors of a computerized information system in nuclear power plants''. Human factors requirements for the information system designs are extracted from various regulatory and industrial standards and guidelines, and interpreted into a more specific procedures and checklists for verifying the satisfaction of those requirements. A formalized implementation plan is established for human factors verification and validation of a computerized information system in nuclear power plants. Additionally, a Computer support system, named as DIMS-web (design Issue Management System), is developed based upon web internet environment so as to enhance the implementation of the human factors activities. DIMS-Web has three maine functions: supporting requirements review, tracking design issues, and management if issues screening evaluation. DIMS-Web shows its benefits in practice through a trial application to the design review of CFMS for YGN nuclear unit 5 and 6. (author)

  19. A Translator Verification Technique for FPGA Software Development in Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jae Yeob; Kim, Eui Sub; Yoo, Jun Beom [Konkuk University, Seoul (Korea, Republic of)

    2014-10-15

    Although the FPGAs give a high performance than PLC (Programmable Logic Controller), the platform change from PLC to FPGA impose all PLC software engineers give up their experience, knowledge and practices accumulated over decades, and start a new FPGA-based hardware development from scratch. We have researched to fine the solution to this problem reducing the risk and preserving the experience and knowledge. One solution is to use the FBDtoVerilog translator, which translates the FBD programs into behavior-preserving Verilog programs. In general, the PLCs are usually designed with an FBD, while the FPGAs are described with a HDL (Hardware Description Language) such as Verilog or VHDL. Once PLC designer designed the FBD programs, the FBDtoVerilog translates the FBD into Verilog, mechanically. The designers, therefore, need not consider the rest of FPGA development process (e.g., Synthesis and Place and Routing) and can preserve the accumulated experience and knowledge. Even if we assure that the translation from FBD to Verilog is correct, it must be verified rigorously and thoroughly since it is used in nuclear power plants, which is one of the most safety critical systems. While the designer develops the FPGA software with the FBD program translated by the translator, there are other translation tools such as synthesis tool and place and routing tool. This paper also focuses to verify them rigorously and thoroughly. There are several verification techniques for correctness of translator, but they are hard to apply because of the outrageous cost and performance time. Instead, this paper tries to use an indirect verification technique for demonstrating the correctness of translator using the co-simulation technique. We intend to prove only against specific inputs which are under development for a target I and C system, not against all possible input cases.

  20. Verification and disarmament

    International Nuclear Information System (INIS)

    Blix, H.

    1998-01-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed

  1. Verification and disarmament

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H. [IAEA, Vienna (Austria)

    1998-07-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed.

  2. Joint experiment on verification of the treaty on the limitation of underground nuclear tests and its value in nuclear disarmament problem

    International Nuclear Information System (INIS)

    Mikhailov, V.N.

    1998-01-01

    This conference commemorates the 10th anniversary of the Joint Verification Experiment. The experiment was performed in order to specify methods controlling yield of underground explosions in the USA and the USSR. Basic of the the experiment were coordinated and formulated in the Agreement signed by Heads of departments of foreign policies in Moscow on 31 May 1988. The tasks can be briefly revealed the following way: - each of the parties can measure (on mutual basis) the explosion yield in the course of the experiment performed on the test site of the other party using tele seismic and hydrodynamic methods; - each party also makes tele seismic measurement of both explosions of the experiment with the help of its national net of seismic stations; - each party makes hydrodynamic measurements of explosion yield in the course of the experiment in a special additional borehole; - each party performs tele-seismic measurements of both explosions' yield at its five seismic stations with which the parties exchanged data on the explosions made earlier. In the course of the experiment the parties exchanged the data obtained in the same volume. The analysis showed: 1. The experiment conformed to all the requirements of the Agreement in spite of all the complexity of the procedures and differences in conditions of the experiment performance. 2. The experiment became an example of an unprecedented level of cooperation between two countries in one of the most significant for national security fields of defense activity. 3. The experiment gave the basis for concrete coordination of underground test yield control measures. It also considerable advanced the elaboration of protocols to treaties of 1974 and 1976. 4. In the course of the experiment there appeared an opportunity to compare scientific-technical level of hydrodynamic and seismic measurements and safety provision for nuclear tests of both countries. Cooperative development of anti intrusive devices for hydrodynamic method

  3. Formal specification and verification of interactive systems with plasticity: Applications to nuclear-plant supervision

    International Nuclear Information System (INIS)

    Oliveira, Raquel Araujo de

    2015-01-01

    The advent of ubiquitous computing and the increasing variety of platforms and devices change user expectations in terms of user interfaces. Systems should be able to adapt themselves to their context of use, i.e., the platform (e.g. a PC or a tablet), the users who interact with the system (e.g. administrators or regular users), and the environment in which the system executes (e.g. a dark room or outdoor). The capacity of a UI to withstand variations in its context of use while preserving usability is called plasticity. Plasticity provides users with different versions of a UI. Although it enhances UI capabilities, plasticity adds complexity to the development of user interfaces: the consistency between multiple versions of a given UI should be ensured. Given the large number of possible versions of a UI, it is time-consuming and error prone to check these requirements by hand. Some automation must be provided to verify plasticity.This complexity is further increased when it comes to UIs of safety-critical systems. Safety-critical systems are systems in which a failure has severe consequences. The complexity of such systems is reflected in the UIs, which are now expected not only to provide correct, intuitive, non-ambiguous and adaptable means for users to accomplish a goal, but also to cope with safety requirements aiming to make sure that systems are reasonably safe before they enter the market. Several techniques to ensure quality of systems in general exist, which can also be used to safety-critical systems. Formal verification provides a rigorous way to perform verification, which is suitable for safety-critical systems. Our contribution is an approach to verify safety-critical interactive systems provided with plastic UIs using formal methods. Using a powerful tool-support, our approach permits:-The verification of sets of properties over a model of the system. Using model checking, our approach permits the verification of properties over the system formal

  4. Verification of nuclear data for DT neutron induced charged-particle emission reaction of light nuclei

    International Nuclear Information System (INIS)

    Kondo, K.; Murata, I.; Ochiai, K.; Kubota, N.; Miyamaru, H.; Takagi, S.; Shido, S.; Konno, C.; Nishitani, T.

    2007-01-01

    Double-differential cross-section (DDX) for emitted charged particles is necessary to estimate material damage, gas production and nuclear heating in a fusion reactor. Detailed measurements of the cross-sections for beryllium, carbon and fluorine, which are among the composition materials of expected fusion blankets and first walls, were carried out with a charged-particle spectrometer using a pencil-beam DT neutron source. As verification of the cross-sections evaluated in three nuclear libraries (JENDL-3.3, ENDF/B-VI and JEFF-3.1), our measured data were compared with the data evaluated in the libraries. From the comparison, the following problems were pointed out: Beryllium: Remarkable differences in energy and angular distribution for α-particles were observed between the measured data and the libraries. The estimated total cross-section for α-particle production well agreed with the libraries. Carbon: There was a discrepancy of about 20% between JENDL-3.3 and ENDF/B-VI (JEFF-3.1) for α-particle production cross-section, and no DDX for α-particles is given in the libraries. Our obtained total cross-section for α-particle production was rather consistent with ENDF/B-VI (JEFF-3.1), and the value evaluated in JENDL-3.3 seemed too large. Fluorine: The remarkable differences for DDX of protons and α-particles were observed between the obtained result and JENDL-3.3, although detailed DDX was stored only in JENDL. The obtained total cross-sections mostly supported the evaluation of ENDF/B-VI (JEFF-3.1)

  5. Report on the INMM Workshop on preparing for nuclear arms reductions to address technical transparency and verification challenges

    International Nuclear Information System (INIS)

    Dreicer, M.; Dalnoki-Veress, F.; Lewis, P.

    2013-01-01

    In May 2011, a workshop was held to develop broader awareness of the technical and operational challenges that could be used to enhance effective transparency and/or verification in the medium to long-term. Building confidence in a broader multi-lateral engagement scenario adds even greater challenges than the traditional bi-lateral approaches. The multi-disciplinary group that attended included decision-makers needing to understand present and possible future technical capabilities, and the technical community needing clearer definition of possible requirements and operational constraints. In additional to traditional presentations, the group conducted an exercise to stimulate new perspectives on verification requirements for a scenario based on nuclear arms reductions at very low numbers of nuclear weapons. The workshop participants were divided into two groups and asked to explore the political and technical requirements needed for States to move towards significant arms reductions. Using a technique called 'back-casting' participants were asked to imagine a world without nuclear weapons and describe what would be needed to achieve levels of one thousand, one hundred, ten, and ultimately zero weapons in the world. Most participants agreed that a strong political commitment will be necessary and that complete disarmament will only be possible if states are convinced that nuclear weapons serve no purpose. Both groups believed that a time period of greater instability would be encountered when moving from 1000 to 100 nuclear weapons and that it would be imperative to accelerate quickly through this period. The group discussed the need to have an international body monitor the disarmament process to maintain legitimacy for the international community. One possibility could be the development of an intergovernmental panel on verification and disarmament to monitor and facilitate disarmament. The groups recognized the problem of fissile material disposition after

  6. Technology Foresight and nuclear test verification: a structured and participatory approach

    Science.gov (United States)

    Noack, Patrick; Gaya-Piqué, Luis; Haralabus, Georgios; Auer, Matthias; Jain, Amit; Grenard, Patrick

    2013-04-01

    As part of its mandate, the CTBTO's nuclear explosion monitoring programme aims to maintain its sustainability, effectiveness and its long-term relevance to the verification regime. As such, the PTS is conducting a Technology Foresight programme of activities to identify technologies, processes, concepts and ideas that may serve said purpose and become applicable within the next 20 years. Through the Technology Foresight activities (online conferences, interviews, surveys, workshops and other) we have involved the wider science community in the fields of seismology, infrasound, hydroacoustics, radionuclide technology, remote sensing and geophysical techniques. We have assembled a catalogue of over 200 items, which incorporate technologies, processes, concepts and ideas which will have direct future relevance to the IMS (International Monitoring System), IDC (International Data Centre) and OSI (On-Site Inspection) activities within the PTS. In order to render this catalogue as applicable and useful as possible for strategy and planning, we have devised a "taxonomy" based on seven categories, against which each technology is assessed through a peer-review mechanism. These categories are: 1. Focus area of the technology in question: identify whether the technology relates to (one or more of the following) improving our understanding of source and source physics; propagation modelling; data acquisition; data transport; data processing; broad modelling concepts; quality assurance and data storage. 2. Current Development Stage of the technology in question. Based on a scale from one to six, this measure is specific to PTS needs and broadly reflects Technology Readiness Levels (TRLs). 3. Impact of the technology on each of the following capabilities: detection, location, characterization, sustainment and confidence building. 4. Development cost: the anticipated monetary cost of validating a prototype (i.e. Development Stage 3) of the technology in question. 5. Time to

  7. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Directory of Open Access Journals (Sweden)

    Song-Hae Ye

    2015-10-01

    Full Text Available Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard, Internet Protocol (IP phones, personal digital assistant (PDA for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  8. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    International Nuclear Information System (INIS)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk; Lyou, Joon

    2015-01-01

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs

  9. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk [Korea Hydro and Nuclear Power Co. (KHNP), Central Research Institute, Daejeon (Korea, Republic of); Lyou, Joon [Dept. of Electronics Engineering, Chungnam National University, Daejeon (Korea, Republic of)

    2015-10-15

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  10. Verification study of the FORE-2M nuclear/thermal-hydraulilc analysis computer code

    International Nuclear Information System (INIS)

    Coffield, R.D.; Tang, Y.S.; Markley, R.A.

    1982-01-01

    The verification of the LMFBR core transient performance code, FORE-2M, was performed in two steps. Different components of the computation (individual models) were verified by comparing with analytical solutions and with results obtained from other conventionally accepted computer codes (e.g., TRUMP, LIFE, etc.). For verification of the integral computation method of the code, experimental data in TREAT, SEFOR and natural circulation experiments in EBR-II were compared with the code calculations. Good agreement was obtained for both of these steps. Confirmation of the code verification for undercooling transients is provided by comparisons with the recent FFTF natural circulation experiments. (orig.)

  11. Fault-specific verification (FSV) - An alternative VV ampersand T strategy for high reliability nuclear software systems

    International Nuclear Information System (INIS)

    Miller, L.A.

    1994-01-01

    The author puts forth an argument that digital instrumentation and control systems can be safely applied in the nuclear industry, but it will require changes to the way software for such systems is developed and tested. He argues for a fault-specific verification procedure to be applied to software development. This plan includes enumerating and classifying all software faults at all levels of the product development, over the whole development process. While collecting this data, develop and validate different methods for software verification, validation and testing, and apply them against all the detected faults. Force all of this development toward an automated product for doing this testing. Continue to develop, expand, test, and share these testing methods across a wide array of software products

  12. User input verification and test driven development in the NJOY21 nuclear data processing code

    Energy Technology Data Exchange (ETDEWEB)

    Trainer, Amelia Jo [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Conlin, Jeremy Lloyd [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); McCartney, Austin Paul [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-08-21

    Before physically-meaningful data can be used in nuclear simulation codes, the data must be interpreted and manipulated by a nuclear data processing code so as to extract the relevant quantities (e.g. cross sections and angular distributions). Perhaps the most popular and widely-trusted of these processing codes is NJOY, which has been developed and improved over the course of 10 major releases since its creation at Los Alamos National Laboratory in the mid-1970’s. The current phase of NJOY development is the creation of NJOY21, which will be a vast improvement from its predecessor, NJOY2016. Designed to be fast, intuitive, accessible, and capable of handling both established and modern formats of nuclear data, NJOY21 will address many issues that many NJOY users face, while remaining functional for those who prefer the existing format. Although early in its development, NJOY21 is quickly providing input validation to check user input. By providing rapid and helpful responses to users while writing input files, NJOY21 will prove to be more intuitive and easy to use than any of its predecessors. Furthermore, during its development, NJOY21 is subject to regular testing, such that its test coverage must strictly increase with the addition of any production code. This thorough testing will allow developers and NJOY users to establish confidence in NJOY21 as it gains functionality. This document serves as a discussion regarding the current state input checking and testing practices of NJOY21.

  13. A formal design verification and validation on the human factors of a computerized information system in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yong Hee; Park, Jae Chang; Cheon, Se Woo; Jung, Kwang Tae; Baek, Seung Min; Han, Seung; Park, Hee Suk; Son, Ki Chang; Kim, Jung Man; Jung Yung Woo

    1999-11-01

    This report describe a technical transfer under the title of ''A formal design verification and validation on the human factors of a computerized information system in nuclear power plants''. Human factors requirements for the information system designs are extracted from various regulatory and industrial standards and guidelines, and interpreted into a more specific procedures and checklists for verifying the satisfaction of those requirements. A formalized implementation plan is established for human factors verification and validation of a computerized information system in nuclear power plants. Additionally, a Computer support system, named as DIMS-web (design Issue Management System), is developed based upon web internet environment so as to enhance the implementation of the human factors activities. DIMS-Web has three maine functions: supporting requirements review, tracking design issues, and management if issues screening evaluation. DIMS-Web shows its benefits in practice through a trial application to the design review of CFMS for YGN nuclear unit 5 and 6. (author)

  14. More on fatigue verification of Class 1 nuclear power piping according to ASME BPV III NB-3600

    International Nuclear Information System (INIS)

    Zeng, Lingfu; Dahlström, Lars; Jansson, Lennart G.

    2011-01-01

    In this paper, fatigue verification of Class 1 nuclear power piping according to ASME Boiler and Pressure Vessel Code, Section III, NB-3600, and relevant issues that are often discussed in connection to the power uprate of several Swedish BWR reactors in recent years, are dealt with. Key parameters involved in the fatigue verification, i.e. the alternating stress intensity S alt , the penalty factor K e and the cumulative damage factor U, and relevant computational procedures applicable for the assessment of low-cycle fatigue failure using strain-controlled data, are particularly addressed. A so-called simplified elastic-plastic discontinuity analysis for alternative verification when basic fatigue requirements found unsatisfactory, and the procedures provided in NB-3600 for evaluating the alternating stress intensity S alt , are reviewed in detail. Our emphasis is placed on other procedures alternative to the simplified elastic-plastic discontinuity analysis. A more in-depth discussion is given to an alternative suggested earlier by the authors using nonlinear finite element analyses. This paper is a continuation of our work presented in ICONE16/17/18, which attempted to categorize design rules in the code into linear design rules and non-linear design rules and to clarify corresponding design requirements and finite element analyses, in particular, those non-linear ones. (author)

  15. Human factors verification and validation of the advanced nuclear plant control room design

    International Nuclear Information System (INIS)

    Gutierrez, Richard; Zizzo, David; Yu, Kim

    2005-01-01

    The GE Advanced Boiling Water Reactor (ABWR) design has implemented the applicable human factors engineering (HFE) principles in the design of human-system interfaces (HSI). The ABWR uses unique features such as large mimic and touch-screen technology to present plant overviews and system operating details to the control room operating staff. The HSI designs, both in the console panels and the software generated graphical user interfaces, have been developed and evaluated using HFE guidelines. In addition to HFE guidelines reviews performed during design and implementation, broader reviews have been performed under the HFE Verification and Validation Implementation Plan (HFE V and VIP). Based upon the NUREG-0711, Nuclear Regulatory Commission (NRC) HFE Program Review Model (HFE PRM) (Reference 1), the HFE V and VIP, hereafter also referred to as V and V, has provided feedback during the various phases of design, implementation, and integration of the HSI. As one of the ten elements of the HFE PRM, the V and V activities reaffirm that the design of the HSI conforms to the HFE design principles and that the plant operating staff in the control room can perform their assigned tasks. This rigorous HFE V and V process is now being applied in the implementation of the ABWR design for Taiwan Power Company's Lungmen Power Station. Two 1350 MWe ABWR units are currently under construction at Lungmen. The HFE V and V ensures that the process for the design is compliant with the HFE principles. An important aspect of the Lungmen HFE program has been the direct involvement of the end user, Taiwan Power Company (TPC), throughout the design development and implementation. These HFE V and V activities, performed in three phases, ensures that the necessary displays, control, and alarms are provided to support the identified personnel tasks. The HFE V and V also checks to determine that the design of each identified component is compliant with the HFE principles. The V and V ensures

  16. Verification of a primary-to-secondary leaking safety procedure in a nuclear power plant using coloured Petri nets

    International Nuclear Information System (INIS)

    Nemeth, E.; Bartha, T.; Fazekas, Cs.; Hangos, K.M.

    2009-01-01

    This paper deals with formal and simulation-based verification methods of a PRImary-to-SEcondary leaking (abbreviated as PRISE) safety procedure. The PRISE safety procedure controls the draining of the contaminated water in a faulty steam generator when a non-compensable leaking from the primary to the secondary circuit occurs. Because of the discrete nature of the verification, a Coloured Petri Net (CPN) representation is proposed for both the procedure and the plant model. We have proved by using a non-model-based strategy that the PRISE safety procedure is safe, there are no dead markings in the state space, and all transitions are live; being either impartial or fair. Further analysis results have been obtained using a model-based verification approach. We created a simple, low dimensional, nonlinear dynamic model of the primary circuit in a VVER-type pressurized water nuclear power plant for the purpose of the model-based verification. This is in contrast to the widely used safety analysis that requires an accurate detailed model. Our model also describes the relevant safety procedures, as well as all of the major leaking-type faults. We propose a novel method to transform this model to a CPN form by discretization. The composed plant and PRISE safety procedure system has also been analysed by simulation using CPN analysis tools. We found by the model-based analysis-using both single and multiple faults-that the PRISE safety procedure initiates the draining when the PRISE event occurs, and no false alarm will be initiated

  17. The research for the design verification of nuclear power plant based on VR dynamic plant

    International Nuclear Information System (INIS)

    Wang Yong; Yu Xiao

    2015-01-01

    This paper studies a new method of design verification through the VR plant, in order to perform verification and validation the design of plant conform to the requirements of accident emergency. The VR dynamic plant is established by 3D design model and digital maps that composed of GIS system and indoor maps, and driven by the analyze data of design analyzer. The VR plant could present the operation conditions and accident conditions of power plant. This paper simulates the execution of accident procedures, the development of accidents, the evacuation planning of people and so on, based on VR dynamic plant, and ensure that the plant design will not cause bad effect. Besides design verification, simulated result also can be used for optimization of the accident emergency plan, the training of accident plan and emergency accident treatment. (author)

  18. Adult education as information and help in forming opinions shown from the example of nuclear power

    International Nuclear Information System (INIS)

    Wild, W.; Markus, B.; Dietrich, T.; Schmitt Glaeser, W.

    1977-01-01

    The lectures printed here, partly in revised form, were given at a University meeting for teachers in adult education on July 9th and 10th 1976 in Bayreuth, with the main theme of 'Adult education as information and help in forming opinions shown from the subject of nuclear power'. It should be shown by examples related to this problem, which urgently requires more objectivity, and which will be freed of emotional opinions with extraordinary difficulty, how complex such objects can be and how many different aspects have to be taken into account. The grouping of scientific referees, a teacher, a nuclear physicist, a radiation biologist and a lawyer, makes the plurality of the aspects quite clear. Themes: 1) The contribution of adult education to de-idealogising the population, 2) The scientific and technical basis of generation and use of nuclear power, 3)Radiation stresses of living organismus, particularly human being. 4) Smug authorities, protesting citizens, overload judges. (GL) [de

  19. Some major challenges: Nuclear non-proliferation, nuclear arms control and nuclear terrorism. Vienna, 29 October 2001. Statement to the symposium on international safeguards: Verification and nuclear material security

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2001-01-01

    The main topics dealt with the ensuring of an effective, universal and adequately financed system for the verification of nuclear non-proliferation, namely as follows: Effectiveness of the system; Participation in the system ; Financing of the system; Making Progress in Nuclear Arms Control; Protection Against Nuclear Terrorism. In the Safeguards Implementation Report (SIR) for 2000, the Agency was able to conclude that for all 140 states with safeguards agreements in place the nuclear material and other items placed under safeguards remained in peaceful nuclear activities or were otherwise adequately accounted for. The Agency currently safeguards over 900 facilities in 70 countries on a regular safeguards budget of approximately US $80 million per year. Turning to the major recent challenge, protection against nuclear terrorism, the IAEA has long been active in encouraging States to make security an integral part of the management of their nuclear programmes. The recent attacks in the United States were, however, a wake-up call to all that more can and must be done. In the week immediately following the tragedy, the IAEA General Conference adopted a resolution which requested a thorough review of Agency activities and programmes relevant to preventing acts of nuclear terrorism

  20. Nuclear Energy -- Knowledge Base for Advanced Modeling and Simulation (NE-KAMS) Code Verification and Validation Data Standards and Requirements: Fluid Dynamics Version 1.0

    Energy Technology Data Exchange (ETDEWEB)

    Greg Weirs; Hyung Lee

    2011-09-01

    V&V and UQ are the primary means to assess the accuracy and reliability of M&S and, hence, to establish confidence in M&S. Though other industries are establishing standards and requirements for the performance of V&V and UQ, at present, the nuclear industry has not established such standards or requirements. However, the nuclear industry is beginning to recognize that such standards are needed and that the resources needed to support V&V and UQ will be very significant. In fact, no single organization has sufficient resources or expertise required to organize, conduct and maintain a comprehensive V&V and UQ program. What is needed is a systematic and standardized approach to establish and provide V&V and UQ resources at a national or even international level, with a consortium of partners from government, academia and industry. Specifically, what is needed is a structured and cost-effective knowledge base that collects, evaluates and stores verification and validation data, and shows how it can be used to perform V&V and UQ, leveraging collaboration and sharing of resources to support existing engineering and licensing procedures as well as science-based V&V and UQ processes. The Nuclear Energy Knowledge base for Advanced Modeling and Simulation (NE-KAMS) is being developed at the Idaho National Laboratory in conjunction with Bettis Laboratory, Sandia National Laboratories, Argonne National Laboratory, Utah State University and others with the objective of establishing a comprehensive and web-accessible knowledge base to provide V&V and UQ resources for M&S for nuclear reactor design, analysis and licensing. The knowledge base will serve as an important resource for technical exchange and collaboration that will enable credible and reliable computational models and simulations for application to nuclear power. NE-KAMS will serve as a valuable resource for the nuclear industry, academia, the national laboratories, the U.S. Nuclear Regulatory Commission (NRC) and

  1. Verification of Chemical Weapons Destruction

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  2. New Help from cellular medicine to surgery; Nuevas ayudas de la medicina nuclear a la cirugia

    Energy Technology Data Exchange (ETDEWEB)

    Carreras Delgado, J. L.

    2009-07-01

    New Nuclear Medicine techniques to help the surgeon in the operation room are now being introduced. They aim to get a better location of the objective or a shorter duration of the surgical process. The selective radio guided biopsy of the sentinel node included in the clinical practise guidelines for the surgery of tumours as breast cancer and malignant melanoma is the paradigm of this new techniques. Other techniques are intraoperatory detection with probes or portable gamma cameras of tumour lesions as parathyroid adenomas, metastatic neuroendocrine tumours and other tumours. (Author) 16 refs.

  3. Anchorage of equipment - requirements and verification methods with emphasis on equipment of existing and constructed VVER-type nuclear power plants

    International Nuclear Information System (INIS)

    Masopust, R.

    1999-01-01

    Criteria and verification methods which are recommended for use in the capacity evaluation of anchorage of safety-related equipment at WWER-type nuclear power plants are presented. Developed in compliance with the relevant basic standards documents specifically for anchorage of WWER-type equipment components, the criteria and methods cover different types of anchor bolts and other anchorage elements which are typical of existing, constructed, or reconstructed WWER-type nuclear power plants

  4. Human factors design, verification, and validation for two types of control room upgrades at a nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Boring, Laurids Ronald [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2014-10-01

    This paper describes the NUREG-0711 based human factors engineering (HFE) phases and associated elements required to support design, verification and validation (V&V), and implementation of a new plant process computer (PPC) and turbine control system (TCS) at a representative nuclear power plant. This paper reviews ways to take a human-system interface (HSI) specification and use it when migrating legacy PPC displays or designing displays with new functionality. These displays undergo iterative usability testing during the design phase and then undergo an integrated system validation (ISV) in a full scope control room training simulator. Following the successful demonstration of operator performance with the systems during the ISV, the new system is implemented at the plant, first in the training simulator and then in the main control room.

  5. Testing the algorithms for automatic identification of errors on the measured quantities of the nuclear power plant. Verification tests

    International Nuclear Information System (INIS)

    Svatek, J.

    1999-12-01

    During the development and implementation of supporting software for the control room and emergency control centre at the Dukovany nuclear power plant it appeared necessary to validate the input quantities in order to assure operating reliability of the software tools. Therefore, the development of software for validation of the measured quantities of the plant data sources was initiated, and the software had to be debugged and verified. The report contains the proposal for and description of the verification tests for testing the algorithms of automatic identification of errors on the observed quantities of the NPP by means of homemade validation software. In particular, the algorithms treated serve the validation of the hot leg temperature at primary circuit loop no. 2 or 4 at the Dukovany-2 reactor unit using data from the URAN and VK3 information systems, recorded during 3 different days. (author)

  6. Software verification, model validation, and hydrogeologic modelling aspects in nuclear waste disposal system simulations. A paradigm shift

    International Nuclear Information System (INIS)

    Sheng, G.M.

    1994-01-01

    This work reviewed the current concept of nuclear waste disposal in stable, terrestrial geologic media with a system of natural and man-made multi-barriers. Various aspects of this concept and supporting research were examined with the emphasis on the Canadian Nuclear Fuel Waste Management Program. Several of the crucial issues and challenges facing the current concept were discussed. These include: The difficulties inherent in a concept that centres around lithologic studies; the unsatisfactory state of software quality assurance in the present computer simulation programs; and the lack of a standardized, comprehensive, and systematic procedure to carry out a rigorous process of model validation and assessment of simulation studies. An outline of such an approach was presented and some of the principles, tools and techniques for software verification were introduced and described. A case study involving an evaluation of the Canadian performance assessment computer program is presented. A new paradigm to nuclear waste disposal was advocated to address the challenges facing the existing concept. The RRC (Regional Recharge Concept) was introduced and its many advantages were described and shown through a modelling exercise. (orig./HP)

  7. Enhancing nuclear safety verification ability for personnel of regulatory body in Vietnam

    International Nuclear Information System (INIS)

    Tu, Nguyen Hoang; Choi, Kwang Sik

    2012-01-01

    A major issue dominating the nuclear energy development program is the availability of sufficient human resources. Vietnam needs to have significant numbers of engineers, technicians, and scientists in order to support and ensure the safety of nuclear power plant which will be paramount as the government's goal. In particular, to ensure safety in utilization of nuclear energy, a country embarking on a nuclear power program should consider the early establishment of a regulatory body which regulates nuclear power plants at all stages to protect public from radiation hazards and to preserve the environment. In this paper, some lessons learned and the status of human resource development for nuclear safety in Vietnam is presented. Some recommendations, proposed ideas are given on strategy development of human resource

  8. Inverse transport for the verification of the Comprehensive Nuclear Test Ban Treaty

    Directory of Open Access Journals (Sweden)

    J.-P. Issartel

    2003-01-01

    Full Text Available An international monitoring system is being built as a verification tool for the Comprehensive Test Ban Treaty. Forty stations will measure on a worldwide daily basis the concentration of radioactive noble gases. The paper introduces, by handling preliminary real data, a new approach of backtracking for the identification of sources of passive tracers after positive measurements. When several measurements are available the ambiguity about possible sources is reduced significantly. The approach is validated against ETEX data. A distinction is made between adjoint and inverse transport shown to be, indeed, different though equivalent ideas. As an interesting side result it is shown that, in the passive tracer dispersion equation, the diffusion stemming from a time symmetric turbulence is necessarily a self-adjoint operator, a result easily verified for the usual gradient closure, but more general.

  9. Verification of radioactive waste management of nuclear medicine clinics in the city of Recife

    International Nuclear Information System (INIS)

    Silva, V.C.B.; Lopes-Filho, F.J.; Passos, R.S.; Lira, R.F.; Santos, M.A.P.; Belo, I.B.; Lima, F.R.A.; Vieira, J.W.; Ferreira-Filho, A.

    2010-01-01

    The increasing use of ionizing radiation in various areas can not be dissociated from the concerns of safety and radiation security. In Nuclear Medicine, this concern becomes higher, because of the radionuclides used in diagnosis and therapy of radiation sources are not sealed. Their use inevitably produces radioactive waste that must be controlled through proper management, according to the normative standards established in Brazil by the National Commission of Nuclear Energy (CNEN). The management of radioactive waste seeks to lower the occupational doses besides the environmental preservation. In the work carried out by the Regional Center of Nuclear Sciences Northeast (CRCN-NE) and the Federal Office for Education, Science and Technology (OPSI), we see the systems management of radioactive waste from Nuclear Medicine in the city of Recife. The results were obtained from the preparation of a sheet of compliance and its implementation in eight clinics. (author)

  10. Nuclear science for food security. IAEA says plant breeding technique can help beat world hunger

    International Nuclear Information System (INIS)

    2008-01-01

    The International Atomic Energy Agency (IAEA) today called for increased investment in a plant breeding technique that could bolster efforts aimed at pulling millions of people out of the hunger trap. IAEA scientists use radiation to produce improved high-yielding plants that adapt to harsh climate conditions such as drought or flood, or that are resistant to certain diseases and insect pests. Called mutation induction, the technique is safe, proven and cost-effective. It has been in use since the 1920s. 'The global nature of the food crisis is unprecedented. Families all around the world are struggling to feed themselves,' says Mohamed ElBaradei, Director General of the IAEA. 'To provide sustainable, long-term solutions, we must make use of all available resources. Selecting the crops that are better able to feed us is one of humankind's oldest sciences. But we've neglected to give it the support and investment it requires for universal application. The IAEA is urging a revival of nuclear crop breeding technologies to help tackle world hunger.' For decades the IAEA, in partnership with the Food and Agriculture Organization of the United Nations (FAO), has assisted its Member States to produce more, better and safer food. In plant breeding and genetics, its expertise is helping countries around the world to achieve enhanced agricultural output using nuclear technology. Already more than 3000 crop varieties of some 170 different plant species have been released through the direct intervention of the IAEA: they include barley that grows at 5000 meters (16,400 ft) and rice that thrives in saline soil. These varieties provide much needed food as well as millions of dollars in economic benefits for farmers and consumers, especially in developing countries. But with increased investment and broader application, the technology could positively impact the health and livelihood of even greater numbers of people. And as world hunger grows, the need has never been more urgent

  11. Formal verification method for nuclear I and C systems using ESDT and SMV in the software design phase

    International Nuclear Information System (INIS)

    Song, Myung Jun; Koo, Seo Ryong; Seong, Poong Hyun

    2004-01-01

    As PLCs are widely used in the digital I and C systems of nuclear power plants (NPPs), the safety of PLC software has become the most important consideration. Software safety is an important property for safety critical systems, especially those in aerospace, satellite and nuclear power plants, whose failure could result in danger to human life, property or environment. It is recently becoming more important due to the increase in the complexity and size of safety critical systems. This research proposes a method to perform effective verification tasks on the traceability analysis and software design evaluation in the software design phase. In order to perform the traceability analysis between a Software Requirements Specification (SRS) written in a natural language and a Software Design Specification (SDS) written in Function Block Diagram (FBD), this method uses extended-structured decision tables (ESDTs). ESDTs include information related to the traceability analysis from a text-based SRS and a FBD-based SDS, respectively. Through comparing with both ESDTs from an SRS and ESDTs from an SDS, the effective traceability analysis of both a text-based SRS and a FBD-based SDS can be achieved. For the software design evaluation, a model checking, which is mainly used to verify PLC programs formally, is used in this research. A FBD-style design specification is translated into input languages of the SMV by translation rules and then the FBD-style design specification can be formally analyzed using SMV. (author)

  12. Use of open source information and commercial satellite imagery for nuclear nonproliferation regime compliance verification by a community of academics

    Science.gov (United States)

    Solodov, Alexander

    The proliferation of nuclear weapons is a great threat to world peace and stability. The question of strengthening the nonproliferation regime has been open for a long period of time. In 1997 the International Atomic Energy Agency (IAEA) Board of Governors (BOG) adopted the Additional Safeguards Protocol. The purpose of the protocol is to enhance the IAEA's ability to detect undeclared production of fissile materials in member states. However, the IAEA does not always have sufficient human and financial resources to accomplish this task. Developed here is a concept for making use of human and technical resources available in academia that could be used to enhance the IAEA's mission. The objective of this research was to study the feasibility of an academic community using commercially or publicly available sources of information and products for the purpose of detecting covert facilities and activities intended for the unlawful acquisition of fissile materials or production of nuclear weapons. In this study, the availability and use of commercial satellite imagery systems, commercial computer codes for satellite imagery analysis, Comprehensive Test Ban Treaty (CTBT) verification International Monitoring System (IMS), publicly available information sources such as watchdog groups and press reports, and Customs Services information were explored. A system for integrating these data sources to form conclusions was also developed. The results proved that publicly and commercially available sources of information and data analysis can be a powerful tool in tracking violations in the international nuclear nonproliferation regime and a framework for implementing these tools in academic community was developed. As a result of this study a formation of an International Nonproliferation Monitoring Academic Community (INMAC) is proposed. This would be an independent organization consisting of academics (faculty, staff and students) from both nuclear weapon states (NWS) and

  13. Policy implications of Iran's Nuclear Deal in technical terms for the plutonium route, uranium route, covert options, inspections, monitoring and verifications

    Energy Technology Data Exchange (ETDEWEB)

    Pinheiro, Andre Ricardo M., E-mail: andrericardopinheiro@usp.br [Universidade de São Paulo (USP), SP (Brazil). Departamento de Engenharia Naval; Guimarães, Leonam dos Santos, E-mail: leonam@eletronuclear.gov.br [Eletrobrás Termonuclear S.A. (ELETRONUCLEAR), Rio de Janeiro, RJ (Brazil)

    2017-07-01

    The present Paper addresses the policy implications of Joint Comprehensive Plan of Action (JCPOA) known as 'Ian Nuclear Deal', implemented on 16{sup th} January of 2016 between the Iran and the P5+1 countries (the U.S., U.K. France, Germany, Russia, and China), along with the EU in technical terms to analyze the Plutonium Route, Uranium Route and the Covert options and Inspections, Monitoring and Verifications. A historical review is presented to understand how the Iranian Nuclear Program is formed. Following is shown the current nuclear facilities in Iran and its capacity to process nuclear materials. It is analyzed the impact of JCPOA in Uranium and Plutonium routes. Covert Options always will be an option, so the most sensitive impact is related to the new monitoring and verification policies that must ensure real control of illegal procedures. The main conclusion is that the deal postpones the Iran's nuclear program for more than a decade (15 years), delaying Iran's nuclear bomb time from a few months to at least one year, although there is a current latent capacity to develop a nuclear bomb in Uranium route. It also gives IAEA inspectors capability to monitor nuclear activities and prevent to possible development to a nuclear bomb. To arrive in this conclusion an extensive technical analyze of impact of JCPOA in Iran's nuclear capabilities was made to discover how effective is the deal to prevent Iran to build, or acquire a nuclear weapon. (author)

  14. Policy implications of Iran's Nuclear Deal in technical terms for the plutonium route, uranium route, covert options, inspections, monitoring and verifications

    International Nuclear Information System (INIS)

    Pinheiro, Andre Ricardo M.

    2017-01-01

    The present Paper addresses the policy implications of Joint Comprehensive Plan of Action (JCPOA) known as 'Ian Nuclear Deal', implemented on 16 th January of 2016 between the Iran and the P5+1 countries (the U.S., U.K. France, Germany, Russia, and China), along with the EU in technical terms to analyze the Plutonium Route, Uranium Route and the Covert options and Inspections, Monitoring and Verifications. A historical review is presented to understand how the Iranian Nuclear Program is formed. Following is shown the current nuclear facilities in Iran and its capacity to process nuclear materials. It is analyzed the impact of JCPOA in Uranium and Plutonium routes. Covert Options always will be an option, so the most sensitive impact is related to the new monitoring and verification policies that must ensure real control of illegal procedures. The main conclusion is that the deal postpones the Iran's nuclear program for more than a decade (15 years), delaying Iran's nuclear bomb time from a few months to at least one year, although there is a current latent capacity to develop a nuclear bomb in Uranium route. It also gives IAEA inspectors capability to monitor nuclear activities and prevent to possible development to a nuclear bomb. To arrive in this conclusion an extensive technical analyze of impact of JCPOA in Iran's nuclear capabilities was made to discover how effective is the deal to prevent Iran to build, or acquire a nuclear weapon. (author)

  15. Analytical three-dimensional neutron transport benchmarks for verification of nuclear engineering codes. Final report

    International Nuclear Information System (INIS)

    Ganapol, B.D.; Kornreich, D.E.

    1997-01-01

    Because of the requirement of accountability and quality control in the scientific world, a demand for high-quality analytical benchmark calculations has arisen in the neutron transport community. The intent of these benchmarks is to provide a numerical standard to which production neutron transport codes may be compared in order to verify proper operation. The overall investigation as modified in the second year renewal application includes the following three primary tasks. Task 1 on two dimensional neutron transport is divided into (a) single medium searchlight problem (SLP) and (b) two-adjacent half-space SLP. Task 2 on three-dimensional neutron transport covers (a) point source in arbitrary geometry, (b) single medium SLP, and (c) two-adjacent half-space SLP. Task 3 on code verification, includes deterministic and probabilistic codes. The primary aim of the proposed investigation was to provide a suite of comprehensive two- and three-dimensional analytical benchmarks for neutron transport theory applications. This objective has been achieved. The suite of benchmarks in infinite media and the three-dimensional SLP are a relatively comprehensive set of one-group benchmarks for isotropically scattering media. Because of time and resource limitations, the extensions of the benchmarks to include multi-group and anisotropic scattering are not included here. Presently, however, enormous advances in the solution for the planar Green's function in an anisotropically scattering medium have been made and will eventually be implemented in the two- and three-dimensional solutions considered under this grant. Of particular note in this work are the numerical results for the three-dimensional SLP, which have never before been presented. The results presented were made possible only because of the tremendous advances in computing power that have occurred during the past decade

  16. Analytical three-dimensional neutron transport benchmarks for verification of nuclear engineering codes. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Ganapol, B.D.; Kornreich, D.E. [Univ. of Arizona, Tucson, AZ (United States). Dept. of Nuclear Engineering

    1997-07-01

    Because of the requirement of accountability and quality control in the scientific world, a demand for high-quality analytical benchmark calculations has arisen in the neutron transport community. The intent of these benchmarks is to provide a numerical standard to which production neutron transport codes may be compared in order to verify proper operation. The overall investigation as modified in the second year renewal application includes the following three primary tasks. Task 1 on two dimensional neutron transport is divided into (a) single medium searchlight problem (SLP) and (b) two-adjacent half-space SLP. Task 2 on three-dimensional neutron transport covers (a) point source in arbitrary geometry, (b) single medium SLP, and (c) two-adjacent half-space SLP. Task 3 on code verification, includes deterministic and probabilistic codes. The primary aim of the proposed investigation was to provide a suite of comprehensive two- and three-dimensional analytical benchmarks for neutron transport theory applications. This objective has been achieved. The suite of benchmarks in infinite media and the three-dimensional SLP are a relatively comprehensive set of one-group benchmarks for isotropically scattering media. Because of time and resource limitations, the extensions of the benchmarks to include multi-group and anisotropic scattering are not included here. Presently, however, enormous advances in the solution for the planar Green`s function in an anisotropically scattering medium have been made and will eventually be implemented in the two- and three-dimensional solutions considered under this grant. Of particular note in this work are the numerical results for the three-dimensional SLP, which have never before been presented. The results presented were made possible only because of the tremendous advances in computing power that have occurred during the past decade.

  17. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    OpenAIRE

    Ye, Song-Hae; Kim, Young-Sik; Lyou, Ho-Sun; Kim, Min-Suk; Lyou, Joon

    2015-01-01

    Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency respons...

  18. Verification of the Barnwell Nuclear Fuel Plant (BNFP) mechanical headend design

    International Nuclear Information System (INIS)

    Townes, G.A.

    1978-11-01

    Design of the Barnwell Nuclear Fuel Plant mechanical head end includes unique provisions for remote maintenance, minimizes remote handling, and permits high throughput (6 MTU of spent fuel per day). Operability studies have been performed under a contract with the Department of Energy that: (1) assessed its capabilities for possible use in fuel encapsulation with or without compaction as a preparation for spent fuel storage, (2) verified the design of the mechanical head end as remotely maintainable, and (3) provided operator training

  19. Design verification enhancement of field programmable gate array-based safety-critical I&C system of nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Ahmed, Ibrahim [Department of Nuclear Engineering, Kyung Hee University, 1732 Deogyeong-daero, Giheung-gu, Yongin-si, Gyeonggi-do 17104 (Korea, Republic of); Jung, Jaecheon, E-mail: jcjung@kings.ac.kr [Department of Nuclear Power Plant Engineering, KEPCO International Nuclear Graduate School, 658-91 Haemaji-ro, Seosang-myeon, Ulju-gun, Ulsan 45014 (Korea, Republic of); Heo, Gyunyoung [Department of Nuclear Engineering, Kyung Hee University, 1732 Deogyeong-daero, Giheung-gu, Yongin-si, Gyeonggi-do 17104 (Korea, Republic of)

    2017-06-15

    Highlights: • An enhanced, systematic and integrated design verification approach is proposed for V&V of FPGA-based I&C system of NPP. • RPS bistable fixed setpoint trip algorithm is designed, analyzed, verified and discussed using the proposed approaches. • The application of integrated verification approach simultaneously verified the entire design modules. • The applicability of the proposed V&V facilitated the design verification processes. - Abstract: Safety-critical instrumentation and control (I&C) system in nuclear power plant (NPP) implemented on programmable logic controllers (PLCs) plays a vital role in safe operation of the plant. The challenges such as fast obsolescence, the vulnerability to cyber-attack, and other related issues of software systems have currently led to the consideration of field programmable gate arrays (FPGAs) as an alternative to PLCs because of their advantages and hardware related benefits. However, safety analysis for FPGA-based I&C systems, and verification and validation (V&V) assessments still remain important issues to be resolved, which are now become a global research point of interests. In this work, we proposed a systematic design and verification strategies from start to ready-to-use in form of model-based approaches for FPGA-based reactor protection system (RPS) that can lead to the enhancement of the design verification and validation processes. The proposed methodology stages are requirement analysis, enhanced functional flow block diagram (EFFBD) models, finite state machine with data path (FSMD) models, hardware description language (HDL) code development, and design verifications. The design verification stage includes unit test – Very high speed integrated circuit Hardware Description Language (VHDL) test and modified condition decision coverage (MC/DC) test, module test – MATLAB/Simulink Co-simulation test, and integration test – FPGA hardware test beds. To prove the adequacy of the proposed

  20. Design verification enhancement of field programmable gate array-based safety-critical I&C system of nuclear power plant

    International Nuclear Information System (INIS)

    Ahmed, Ibrahim; Jung, Jaecheon; Heo, Gyunyoung

    2017-01-01

    Highlights: • An enhanced, systematic and integrated design verification approach is proposed for V&V of FPGA-based I&C system of NPP. • RPS bistable fixed setpoint trip algorithm is designed, analyzed, verified and discussed using the proposed approaches. • The application of integrated verification approach simultaneously verified the entire design modules. • The applicability of the proposed V&V facilitated the design verification processes. - Abstract: Safety-critical instrumentation and control (I&C) system in nuclear power plant (NPP) implemented on programmable logic controllers (PLCs) plays a vital role in safe operation of the plant. The challenges such as fast obsolescence, the vulnerability to cyber-attack, and other related issues of software systems have currently led to the consideration of field programmable gate arrays (FPGAs) as an alternative to PLCs because of their advantages and hardware related benefits. However, safety analysis for FPGA-based I&C systems, and verification and validation (V&V) assessments still remain important issues to be resolved, which are now become a global research point of interests. In this work, we proposed a systematic design and verification strategies from start to ready-to-use in form of model-based approaches for FPGA-based reactor protection system (RPS) that can lead to the enhancement of the design verification and validation processes. The proposed methodology stages are requirement analysis, enhanced functional flow block diagram (EFFBD) models, finite state machine with data path (FSMD) models, hardware description language (HDL) code development, and design verifications. The design verification stage includes unit test – Very high speed integrated circuit Hardware Description Language (VHDL) test and modified condition decision coverage (MC/DC) test, module test – MATLAB/Simulink Co-simulation test, and integration test – FPGA hardware test beds. To prove the adequacy of the proposed

  1. Environmental technology verification methods

    CSIR Research Space (South Africa)

    Szewczuk, S

    2016-03-01

    Full Text Available Environmental Technology Verification (ETV) is a tool that has been developed in the United States of America, Europe and many other countries around the world to help innovative environmental technologies reach the market. Claims about...

  2. Design verification and 3D visualization of a nuclear transmutation reactor - PEACER

    Energy Technology Data Exchange (ETDEWEB)

    Kim, C. H.; Hwang, I. S.; Suh, K. Y.; Kim, M. H.; Lee, K. J.; Shin, J. G.; Yi, K. W.; Jeong, S. H.; Lee, H. W. [Seoul National Univ., Seoul (Korea, Republic of)

    2004-07-01

    The conceptual design of a nuclear transmutation energy system named as the PEACER (Proliferation-resistant, Environment-friendly, Accident-tolerant, Continuable-energy, and Economical Reactor) has been verified through independent assessment. The lead-bismuth (Pb-Bi) cooled fast reactor core with a thermal trap region can burn transuranic (TRU) wastes and tabilize Tc-99 and I-129 produced from the water reactors. Pyrochemical partitioning processes are designed to achieve an overall decontamination factor of 10{sup 5} on the TRU elements by utilizing electrorefining and reductive salt purification. Proliferation-resistance is embedded using the technical barrier of the pyrochemical processing and the institutional barrier through multi-national operation. In summary, the original design is verified to have sound basis. Several issues, however, are identified that requires design improvements. A design shakedown effort has been initiated to address the needs. With the design improvement, all the PEACER goals can be met with no fundamental difficulties. An innovative 3D design tool has been developed by interfacing commercial 3D tools including CATIA and, VRML with nuclear solver codes. 3D visualizations have been customized for PEACER transparency on both geometry and functional performances. The new tool, designated as PEACER-VIEWER, can be used to enhance the proliferation resistance, accident-tolerance and economy of the PEACER design. In order to verify the expected benefit of PEACER design, the corrosion resistance and natural circulation capability are going to be demonstrated at a new large scale loop designated as HELIOS (Heavy Eutectic Liquid metal Loop for Investigation of Operability and Safety) that is being constructed at NUTRECK(Nuclear TRansmutation Energy research Center of Korea)

  3. FY2017 Final Report: Power of the People: A technical ethical and experimental examination of the use of crowdsourcing to support international nuclear safeguards verification.

    Energy Technology Data Exchange (ETDEWEB)

    Gastelum, Zoe Nellie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sentz, Kari [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Swanson, Meili Claire [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rinaudo, Cristina [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-10-01

    Recent advances in information technology have led to an expansion of crowdsourcing activities that utilize the “power of the people” harnessed via online games, communities of interest, and other platforms to collect, analyze, verify, and provide technological solutions for challenges from a multitude of domains. To related this surge in popularity, the research team developed a taxonomy of crowdsourcing activities as they relate to international nuclear safeguards, evaluated the potential legal and ethical issues surrounding the use of crowdsourcing to support safeguards, and proposed experimental designs to test the capabilities and prospect for the use of crowdsourcing to support nuclear safeguards verification.

  4. What happened at Fukushima Daiichi Nuclear Power Plants. Verification of effects of earthquake and resulting tsunami

    International Nuclear Information System (INIS)

    Yamazaki, Tatsuhiro

    2012-01-01

    At 14:46 on March 11, 2011, the Tohoku District-off the Pacific Ocean Earthquake occurred. The magnitude of this earthquake was 9.0, the largest in Japan's recorded history, and afterwards enormous tsunami struck the Pacific coast of Tohoku District. This great earthquake and resulting tsunami struck the Fukushima Daiichi Nuclear Power Plants (NPPs) of Tokyo Electric Power Co. (TEPCO), whose cooling function was lost and suffered a severe nuclear accident. This article described the mechanism and safety measure of BWR type NPPs and verified how the great earthquake and resulting tsunami affected NPPs. Progression of the accident at Fukushima Daiichi NPPs was outlined. Damage by the earthquake could not be fully inspected but might not be significant to safety systems. However, the earthquake of longer duration time as much as about 250 sec caused failure of breaker or lightening arrester and also damage on electric facility such as transmission line insulator. Tsunami or inundation height was as high as O.P. (Onahama Pile) +11.5-15.5 m for Unit 1-4 reactor area while designed as O.P. +5.7 m, which caused blackout (power outage) and a reactor core meltdown at Fukushima Daiichi NPPs. (T. Tanaka)

  5. Verification of split spectrum technique for ultrasonic inspection of welded structures in nuclear reactors

    International Nuclear Information System (INIS)

    Ericsson, L.; Stepinski, T.

    1992-01-01

    Ultrasonic nondestructive inspection of materials is often limited by the presence of backscattered echoes from the material structure. A digital signal processing technique for removal of this material noise, referred to as split spectrum processing (SSP), has been developed and verified using simple laboratory experiments during the last decade. However, application of the split spectrum processing algorithm to industrial conditions has been rarely reported. In the paper the results of the practical evaluation of the SSP technique are presented. A number of different ultrasonic transducers were used for acquiring echoes from artificial flaws as well as natural cracks. The flaws were located in test blocks employed by the Swedish Nuclear Power Companies as reference during ultrasonic inspection of nuclear reactor vessels. The acquired ultrasonic A-scan signals were processed off-line using specially developed algorithms on a personal computer (PC). The experiments show evidence that properly tuned SSP algorithms result in a considerable improvement of the signal to material noise ratio. The enhancements were similar irrespective of the features of the transducer used or the nature of the inspected flaw. The problems related to the development of self-tuning SSP algorithms for on-line processing of B-scans are discussed. (author)

  6. Nuclear power plant monitoring and control system software: verification and validation

    International Nuclear Information System (INIS)

    Kaneda, M.; Niki, K.; Shibata, K.

    1986-01-01

    The design philosophy, configuration, and production of process computer system software used for the monitoring and control of nuclear power plants are presented in detail. To achieve a very complex software system that not only has excellent performance, high reliability, and full fail safe protection, but also is easy to produce, verify, and validate, and has flexibility for future modifications, we developed the following software production system to support safe operation of nuclear power stations. The fundamental design philosophy of our monitoring and control system software is the complete separation of program logic from the data base. The logic section is highly standardized and applicable to a wide range of power generation plant computer application systems. The plant-unique properties and characteristics are all described in the data base. This separation of logic and data base has a dramatic effect on the reliability and productivity of the software system. One of the main features of the data base system is the use of easy-to-learn, easy-to-use, problem-oriented language that enables non-programmers to build up the data base using simple fill-in-the-blank type tables. The generation of these tables is fully automated, and the full set of online table editing utility software, which runs on the target plant process computer, has proven very effective in incorporation of changes and modifications at the site. (author)

  7. Multilateral disarmament verification

    International Nuclear Information System (INIS)

    Persbo, A.

    2013-01-01

    Non-governmental organisations, such as VERTIC (Verification Research, Training and Information Centre), can play an important role in the promotion of multilateral verification. Parties involved in negotiating nuclear arms accords are for the most part keen that such agreements include suitable and robust provisions for monitoring and verification. Generally progress in multilateral arms control verification is often painstakingly slow, but from time to time 'windows of opportunity' - that is, moments where ideas, technical feasibility and political interests are aligned at both domestic and international levels - may occur and we have to be ready, so the preparatory work is very important. In the context of nuclear disarmament, verification (whether bilateral or multilateral) entails an array of challenges, hurdles and potential pitfalls relating to national security, health, safety and even non-proliferation, so preparatory work is complex and time-greedy. A UK-Norway Initiative was established in order to investigate the role that a non-nuclear-weapon state such as Norway could potentially play in the field of nuclear arms control verification. (A.C.)

  8. Verification and uncertainty evaluation of HELIOS/MASTER nuclear design system

    Energy Technology Data Exchange (ETDEWEB)

    Song, Jae Seung; Kim, J. C.; Cho, B. O. [Korea Atomic Energy Research Institute, Taejon (Korea)

    1999-03-01

    A nuclear design system HELIOS/MASTER was established and core follow calculations were performed for Yonggwang Unit 1 cycles 1 through 7 and Yonggwang Unit 3 cycles 1 through 2. The accuracy of HELIOS/MASTER system was evaluated by estimations of uncertainties of reactivity and peaking factors and by comparisons of the maximum differences of isothermal temperature coefficient, inverse boron worth and control rod worth with the CASMO-3/MASTER uncertainties. The reactivity uncertainty was estimated by 362 pcm, and the uncertainties of three-dimensional, axially integrated radial, and planar peaking factors were evaluated by 0.048, 0.034, and 0.044 in relative power unit, respectively. The maximum differences of isothermal temperature coefficient, inverse boron worth and control rod worth were within the CASMO-3/MASTER uncertainties. 17 refs., 17 figs., 10 tabs. (Author)

  9. Indian Point Nuclear Power Station: verification analysis of County Radiological Emergency-Response Plans

    International Nuclear Information System (INIS)

    Nagle, J.; Whitfield, R.

    1983-05-01

    This report was developed as a management tool for use by the Federal Emergency Management Agency (FEMA) Region II staff. The analysis summarized in this report was undertaken to verify the extent to which procedures, training programs, and resources set forth in the County Radiological Emergency Response Plans (CRERPs) for Orange, Putnam, and Westchester counties in New York had been realized prior to the March 9, 1983, exercise of the Indian Point Nuclear Power Station near Buchanan, New York. To this end, a telephone survey of county emergency response organizations was conducted between January 19 and February 22, 1983. This report presents the results of responses obtained from this survey of county emergency response organizations

  10. Verification of new technologies introduced into the privately-owned port of Higashidori Nuclear Power Station

    International Nuclear Information System (INIS)

    Murano, Sei-ichiro; Ozaki, Tsutomu; Date, Masanao

    2005-01-01

    The privately-owned port of Higashidori Nuclear Power Station introduced the rubble-slopping breakwater as the seawall and the concrete-caisson breakwater (new caisson breakwater) as the outlet seawall. The distribution of wave pressure on the new caisson breakwater was measured by the wave pressure meteor set on it and compared with the results of the hydraulic model tests. The precast concrete armour unit used Acropod. The conditions of new caisson breakwater, measurement of wave pressure, and the optimum conditions of seawall are stated. The new caisson breakwater showed the high dispersive effect of the impact wave force on the surf zone. The construction cost was decreased by reduction of sectional area and the wave dissipating concrete block. There are no problems about the stability of breakwater confirmed by the hydraulic model test. (S.Y.)

  11. Response time verification of in situ hydraulic pressure sensors in a nuclear reactor

    International Nuclear Information System (INIS)

    Foster, C.G.

    1978-01-01

    A method and apparatus for verifying response time in situ of hydraulic pressure and pressure differential sensing instrumentation in a nuclear circuit is disclosed. Hydraulic pressure at a reference sensor and at an in situ process sensor under test is varied according to a linear ramp. Sensor response time is then determined by comparison of the sensor electrical analog output signals. The process sensor is subjected to a relatively slowly changing and a relatively rapidly changing hydraulic pressure ramp signal to determine an upper bound for process sensor response time over the range of all pressure transients to which the sensor is required to respond. Signal linearity is independent of the volumetric displacement of the process sensor. The hydraulic signal generator includes a first pressurizable gas reservoir, a second pressurizable liquid and gas reservoir, a gate for rapidly opening a gas communication path between the two reservoirs, a throttle valve for regulating rate of gas pressure equalization between the two reservoirs, and hydraulic conduit means for simultaneously communicating a ramp of hydraulic pressure change between the liquid/gas reservoir and both a reference and a process sensor. By maintaining a sufficient pressure differential between the reservoirs and by maintaining a sufficient ratio of gas to liquid in the liquid/gas reservoir, excellent linearity and minimal transient effects can be achieved for all pressure ranges, magnitudes, and rates of change of interest

  12. Verification of completeness of spent nuclear fuel assemblies by means of tomography

    International Nuclear Information System (INIS)

    Jacobsson Svaerd, Staffan; Haakansson, Ane; Lundqvist Saleh, Tobias

    2008-01-01

    Within the safeguards regime, new technologies are desired to allow for detection of possible diversion of individual fuel rods from an irradiated nuclear fuel assembly. A measurement technique, based on Single-Photon Emission Computed Tomography, has been developed and demonstrated on a SVEA-96 BWR assembly, which had been irradiated for one power cycle at the Forsmark 2 NPP. Images of the assembly's internal distribution of the gamma-ray emitting isotope 140 Ba/ 140 La have been obtained tomo-graphically, without requiring the assembly to be dismantled. Image analysis has been applied and the capability to detect the removal of a single rod from the assembly centre has been demonstrated. In addition, rod-activity reconstructions have been performed, involving detailed modelling of the gamma-ray transport through the fuel. An agreement of 3.1% (1 σ) with data from the production code POLCA-7 was demonstrated. An inspection procedure is suggested where tomographic data is collected, online image reconstruction is performed and image analysis is applied, resulting in a preliminary statement of the assembly's completeness less than a minute after the measurement is completed. In cases where the completeness is questionable, an off-line rod-activity reconstruction can be performed, resulting in highly accurate data without the need for additional measurements. (authors)

  13. Validation and verification of the ORNL Monte Carlo codes for nuclear safety analysis

    International Nuclear Information System (INIS)

    Emmett, M.B.

    1993-01-01

    The process of ensuring the quality of computer codes can be very time consuming and expensive. The Oak Ridge National Laboratory (ORNL) Monte Carlo codes all predate the existence of quality assurance (QA) standards and configuration control. The number of person-years and the amount of money spent on code development make it impossible to adhere strictly to all the current requirements. At ORNL, the Nuclear Engineering Applications Section of the Computing Applications Division is responsible for the development, maintenance, and application of the Monte Carlo codes MORSE and KENO. The KENO code is used for doing criticality analyses; the MORSE code, which has two official versions, CGA and SGC, is used for radiation transport analyses. Because KENO and MORSE were very thoroughly checked out over the many years of extensive use both in the United States and in the international community, the existing codes were open-quotes baselined.close quotes This means that the versions existing at the time the original configuration plan is written are considered to be validated and verified code systems based on the established experience with them

  14. Development of sealed radioactive sources immobilized in epoxy resin for verification of detectors used in nuclear medicine

    Energy Technology Data Exchange (ETDEWEB)

    Tiezzi, Rodrigo; Rostelato, Maria Elisa C.M.; Nagatomi, Helio R.; Zeituni, Calos A.; Benega, Marcos A.G.; Souza, Daiane B. de; Costa, Osvaldo L. da; Souza, Carla D.; Rodrigues, Bruna T.; Souza, Anderson S. de; Peleias Junior, Fernando S.; Santos, Rafael Melo dos; Melo, Emerson Ronaldo de, E-mail: rktiezzi@gmail.com [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil); Karan Junior, Dib [Universidade de Sao Paulo (USP), Sao Paulo, SP (Brazil)

    2015-07-01

    The radioactive sealed sources are used in verification ionization chamber detectors, which measure the activity of radioisotopes used in several areas, such as in nuclear medicine. The measurement of the activity of radioisotopes must be made with accuracy, because it is administered to a patient. To ensure the proper functioning of the ionization chamber detectors, standardized tests are set by the International Atomic Energy Agency (IAEA) and the National Nuclear Energy Commission using sealed radioactive sources of Barium-133, Cesium-137 and Cobalt-57. The tests assess the accuracy, precision, reproducibility and linearity of response of the equipment. The focus of this work was the study and the development of these radioactive sources with standard Barium-133, Cesium-137 and Cobalt-57,using a polymer, in case commercial epoxy resin of diglycidyl ether of bisphenol A (DGEBA) and a curing agent based on modified polyamine diethylenetriamine (DETA), to immobilize the radioactive material. The polymeric matrix has the main function of fix and immobilize the radioactive contents not allowing them to leak within the technical limits required by the standards of radiological protection in the category of characteristics of a sealed source and additionally have the ability to retain the emanation of any gases that may be formed during the manufacture process and the useful life of this artifact. The manufacturing process of a sealed source standard consists of the potting ,into bottle standardized geometry, in fixed volume of a quantity of a polymeric matrix within which is added and dispersed homogeneously to need and exact amount in activity of the radioactive materials standards. Accordingly, a study was conducted for the choice of epoxy resin, analyzing its characteristics and properties. Studies and tests were performed, examining the maximum solubility of the resin in water (acidic solution, simulating the conditions of radioactive solution), loss of mechanical

  15. Development of sealed radioactive sources immobilized in epoxy resin for verification of detectors used in nuclear medicine

    International Nuclear Information System (INIS)

    Tiezzi, Rodrigo

    2016-01-01

    The radioactive sealed sources are used in verification ionization chamber detectors, which measure the activity of radioisotopes used in several areas, such as in nuclear medicine. The measurement of the activity of radioisotopes must be made with accuracy, because it is administered to a patient. To ensure the proper functioning of the ionization chamber detectors, standardized tests are set by the International Atomic Energy Agency (IAEA) and the National Nuclear Energy Commission using sealed radioactive sources of Barium-133, Cesium-137 and Cobalt-57. The tests assess the accuracy, precision, reproducibility and linearity of response of the equipment. The focus of this work was the study and the development of these radioactive sources with standard Barium-133 and Cesium-137,using a polymer, in case commercial epoxy resin of diglycidyl ether of bisphenol A (DGEBA) and a curing agent based on modified polyamine diethylenetriamine (DETA), to immobilize the radioactive material. The polymeric matrix has the main function of fix and immobilize the radioactive contents not allowing them to leak within the technical limits required by the standards of radiological protection in the category of characteristics of a sealed source and additionally have the ability to retain the emanation of any gases that may be formed during the manufacture process and the useful life of this artifact. The manufacturing process of a sealed source standard consists of the potting ,into bottle standardized geometry, in fixed volume of a quantity of a polymeric matrix within which is added and dispersed homogeneously to need and exact amount in activity of the radioactive materials standards. Accordingly, a study was conducted for the choice of epoxy resin, analyzing its characteristics and properties. Studies and tests were performed, examining the maximum miscibility of the resin with the water (acidic solution, simulating the conditions of radioactive solution), loss of mechanical and

  16. The year of the cat: Taxing nuclear risk with the help of capital markets

    International Nuclear Information System (INIS)

    Eberl, Jakob; Jus, Darko

    2012-01-01

    This paper proposes new regulation for nuclear power reactors aimed at increasing their safety. We begin by describing how limited liability leads to risk-loving behaviour in nuclear power companies and unsafe nuclear power reactors. By reviewing current regulatory regimes, we show that this issue is not being sufficiently addressed today. Therefore, we evaluate five regulatory instruments: (1) safety regulation, (2) minimum equity requirements, (3) mandatory insurance, (4) risk-sharing pools, and (5) catastrophe bonds. We conclude that any of these instruments either cannot be recommended in its pure form or is infeasible in reality. We therefore propose a new approach that, in its core, consists of a two-stage procedure. In the first stage, capital markets assess the risk stemming from each nuclear reactor via catastrophe bonds. In the second step, the regulator uses this private risk assessment and intervenes by charging an actuarially fair premium in the form of a Pigouvian risk tax. Society ultimately acts as an explicit insurer for nuclear risk and is, on average, fairly compensated for the risk it is taking over. - Highlights: ► Limited liability leads to excessive risk-taking in nuclear power companies. ► Current regulation does not address this issue sufficiently. ► We evaluate five regulatory instruments and explain their shortcomings. ► We propose a market-based nuclear risk tax as a new regulatory instrument.

  17. Nuclear power - help or extermination. The splendours and miseries of energetics development

    International Nuclear Information System (INIS)

    Hrynkiewicz, A.; Kolenda, Z.

    1986-01-01

    This report has been published soon after a Chernobyl accident. The authors try to answer the following questions: why nuclear power is and will continue be an increasingly widely used source of energy and what is the nuclear risk. In the same time they want to call our attention on the dangerous consequences of the more and more intensive development of conventional energetics based on the combustion, in particular, of coal. The energetic situation in Poland they analysed too. (M.F-W)

  18. Nuclear and Radiological Event Scale Turns 20. INES Helps Authorities Rate Events and Communicate Their Significance

    International Nuclear Information System (INIS)

    Verlini, Giovanni

    2011-01-01

    Originally developed in the 1990s jointly by IAEA and Nuclear Energy Agency of the Organization for Economic Co-operation and Development (OECD/NEA) and Member States experts, INES was last revised in 2008 to become a more versatile and informative tool. INES is now designed to address events associated with the transport, storage and use of radioactive material and radiation sources, whether they occur at a nuclear installation or not.

  19. Application of digital solutions to help the safe and efficient operation of nuclear power plants

    International Nuclear Information System (INIS)

    Ortega P, F.; Fernandez F, S.

    2017-09-01

    In the search for excellence, the emergence of solutions to digitize nuclear power plants is an opportunity to optimize the operation and safety of them. The new technologies available today in the market, applied under a global vision of the operation, can contribute to the excellent operation of nuclear power plants in terms of efficiency and effectiveness. Tecnatom has a long experience in various areas related to the operation of the plants, giving the aforementioned global vision, essential to develop global solutions that pursue the safe and efficient operation of the operation. (Author)

  20. Verification of analysis methods for predicting the behaviour of seismically isolated nuclear structures. Final report of a co-ordinated research project 1996-1999

    International Nuclear Information System (INIS)

    2002-06-01

    This report is a summary of the work performed under a co-ordinated research project (CRP) entitled Verification of Analysis Methods for Predicting the Behaviour of Seismically isolated Nuclear Structures. The project was organized by the IAEA on the recommendation of the IAEA's Technical Working Group on Fast Reactors (TWGFR) and carried out from 1996 to 1999. One of the primary requirements for nuclear power plants and facilities is to ensure safety and the absence of damage under strong external dynamic loading from, for example, earthquakes. The designs of liquid metal cooled fast reactors (LMFRs) include systems which operate at low pressure and include components which are thin-walled and flexible. These systems and components could be considerably affected by earthquakes in seismic zones. Therefore, the IAEA through its advanced reactor technology development programme supports the activities of Member States to apply seismic isolation technology to LMFRs. The application of this technology to LMFRs and other nuclear plants and related facilities would offer the advantage that standard designs may be safely used in areas with a seismic risk. The technology may also provide a means of seismically upgrading nuclear facilities. Design analyses applied to such critical structures need to be firmly established, and the CRP provided a valuable tool in assessing their reliability. Ten organizations from India, Italy, Japan, the Republic of Korea, the Russian Federation, the United Kingdom, the United States of America and the European Commission co-operated in this CRP. This report documents the CRP activities, provides the main results and recommendations and includes the work carried out by the research groups at the participating institutes within the CRP on verification of their analysis methods for predicting the behaviour of seismically isolated nuclear structures

  1. Experimental inventory verification system

    International Nuclear Information System (INIS)

    Steverson, C.A.; Angerman, M.I.

    1991-01-01

    As Low As Reasonably Achievable (ALARA) goals and Department of Energy (DOE) inventory requirements are frequently in conflict at facilities across the DOE complex. The authors wish, on one hand, to verify the presence of correct amounts of nuclear materials that are in storage or in process; yet on the other hand, we wish to achieve ALARA goals by keeping individual and collective exposures as low as social, technical, economic, practical, and public policy considerations permit. The Experimental Inventory Verification System (EIVSystem) is a computer-based, camera-driven system that utilizes image processing technology to detect change in vault areas. Currently in the test and evaluation phase at Idaho National Engineering Laboratory, this system guards personnel. The EIVSystem continually monitors the vault, providing proof of changed status for objects sorted within the vault. This paper reports that these data could provide the basis for reducing inventory requirements when no change has occurred, thus helping implement ALARA policy; the data will also help describe there target area of an inventory when change has been shown to occur

  2. Independent Verification and Validation Of SAPHIRE 8 Software Requirements Project Number: N6423 U.S. Nuclear Regulatory Commission

    Energy Technology Data Exchange (ETDEWEB)

    Kent Norris

    2009-09-01

    The purpose of the Independent Verification and Validation (IV&V) role in the evaluation of the SAPHIRE requirements definition is to assess the activities that results in the specification, documentation, and review of the requirements that the software product must satisfy, including functionality, performance, design constraints, attributes and external interfaces. The IV&V team began this endeavor after the software engineering and software development of SAPHIRE had already been in production. IV&V reviewed the requirements specified in the NRC Form 189s to verify these requirements were included in SAPHIRE’s Software Verification and Validation Plan (SVVP).

  3. MAPI's knowledge-based system will help to deal with abnormal conditions (in nuclear plants)

    International Nuclear Information System (INIS)

    Anon.

    1987-01-01

    Mitsubishi Atomic Power Industries (MAPI) in Japan is incorporating artificial intelligence characteristics into a system for guiding nuclear power plant operators during fault conditions. The central feature of the system is the incorporation of the operator's cognitive processes as the framework for its display of information and its mode of reasoning. A small scale prototype system has been developed and work is underway to produce and test a full-scale prototype system by 1991. (UK)

  4. Ensuring Longevity: Ancient Glasses Help Predict Durability of Vitrified Nuclear Waste

    Energy Technology Data Exchange (ETDEWEB)

    Weaver, Jamie L.; McCloy, John S.; Ryan, Joseph V.; Kruger, Albert A.

    2016-05-01

    How does glass alter with time? For the last hundred years this has been an important question to the fields of object conservation and archeology to ensure the preservation of glass artifacts. This same question is part of the development and assessment of durable glass waste forms for the immobilization of nuclear wastes. Researchers have developed experiments ranging from simple to highly sophisticated to answer this question, and, as a result, have gained significant insight into the mechanisms that drive glass alteration. However, the gathered data have been predominately applicable to only short-term alteration times, i.e. over the course of decades. What has remained elusive is the long-term mechanisms of glass alteration[1]. These mechanisms are of particular interest to the international nuclear waste glass community as they strive to ensure that vitrified products will be durable for thousands to tens of thousands of years. For the last thirty years this community has been working to fill this research gap by partnering with archeologists, museum curators, and geologists to identify hundred to million-year old glass analogues that have altered in environments representative of those expected at potential nuclear waste disposal sites. The process of identifying a waste glass relevant analogue is challenging as it requires scientists to relate data collected from short-term laboratory experiments to observations made from long-term analogues and extensive geochemical modeling.

  5. Medicine and ionizing rays: a help sheet in analysing risks in nuclear medicine

    International Nuclear Information System (INIS)

    Gauron, C.

    2006-01-01

    This document first proposes the various applicable legal and regulatory texts concerning radioprotection in the medical sector (European directives, institutions in charge of radioprotection, general arrangements, regulatory texts concerning worker protection against ionizing radiations, personnel specialized in medical radio-physics, electro-radiology operators, quality control of medical devices, and nuclear medicine and radiology). The second part proposes a synthesis of useful knowledge for radioprotection in the case of nuclear medicine when performing in vivo diagnosis, positron emission tomography or PET being excluded. Several aspects are considered: the concerned personnel, the course of treatment procedures, the hazards, the identification of the risk associated with ionizing radiation, the risk assessment and the determination of exposure levels, the strategy to control the risks (reduction of risks, technical measures concerning the installation or the personnel, teaching and information, prevention and medical monitoring), and risk control assessment. The next parts present the same kind of information but for positron emission tomography or PET with Fluorine 18, for therapeutic practice without hospitalization (activity of iodine 137 less than 740 MBq), for therapeutic practice in case of hospitalization (iodine 137 activity greater than 740 MBq), and when taking patients into care after treatment in a nuclear medicine (in this last case, legal and regulatory information focus on patients)

  6. Verification and validation benchmarks.

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of

  7. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William L.; Trucano, Timothy G.

    2008-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  8. Advances of the Surgery of the Breast Cancer with help of the Nuclear Medicine

    International Nuclear Information System (INIS)

    Sierra Garcia, A.; Gomez Embuena, D. A.

    2009-01-01

    The incorporation of the nuclear medicine to the surgical current practice In the treatment of the cancer of breast, by means of the application of radioactive isotopes, have supposed a great achievement not only in the surgical and predicted results but also in the surgical skills more effective and less aggressive. The systematic research of the marking and extirpation of Sentinel Lymph Node is avoiding in the early cancer the linfadenectomy axilar. The application of the ROLL and SNOLL skills is being determinant in the extirpation with trustworthy margins of the non-palpable lesions cancer, with big safety instead harpoons that we used before. (Author) 6 refs.

  9. Operational readiness verification, phase 1: A study on safety during outage and restart of nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Hollnagel, E. [Linkoeping Univ. (Sweden). Dept. of Computer and Information Science; Gauthereau, V. [Linkoeping Univ. (Sweden). Dept. of Industrial Engineering

    2001-06-01

    This report contains the findings from the first phase of a study on safety during outage and restart of nuclear power plants. Operational Readiness Verification (ORV) - in Swedish called Driftklarhetsverifiering (DKV) - refers to the test and verification activities that are necessary to ensure that plant systems are able to provide their required functions when needed - more concretely that all plant systems are in their correct functional state when the plant is restarted after an outage period. The concrete background for this work is that nine ORV related incidents were reported in Sweden between July 1995 and October 1998. The work reported here comprised a literature survey of research relevant for ORV issues, and an assessment of the present situation at Swedish NPPs with respect to ORV. The literature survey was primarily aimed at research related to NPPs, but also looked at domains where similar problems have occurred, such as maintenance in commercial aviation. The survey looked specifically for organisational and MTO aspects relevant to the present situation in Swedish NPPs. One finding was that ORV should be seen as an integral part of maintenance, rather than as a separate activity. Another, that there is a characteristic distribution of error modes for maintenance and ORV, with many sequence errors and omissions, rather than a set of unique error modes. An international study further showed that there are important differences in how procedures are used, and in the balance between decentralisation and centralisation. Several studies also suggested that ORV could usefully be described as a barrier system in relation to the flow of work, for instance using the following five stages: (1) preventive actions during maintenance/outage, (2) post-test after completion of work, (3) pre-test before start-up, (4) the start-up sequence itself, and (5) preventive actions during power operation - possibly including automatic safety systems. In the field survey

  10. Operational readiness verification, phase 1: A study on safety during outage and restart of nuclear power plants

    International Nuclear Information System (INIS)

    Hollnagel, E.; Gauthereau, V.

    2001-06-01

    This report contains the findings from the first phase of a study on safety during outage and restart of nuclear power plants. Operational Readiness Verification (ORV) - in Swedish called Driftklarhetsverifiering (DKV) - refers to the test and verification activities that are necessary to ensure that plant systems are able to provide their required functions when needed - more concretely that all plant systems are in their correct functional state when the plant is restarted after an outage period. The concrete background for this work is that nine ORV related incidents were reported in Sweden between July 1995 and October 1998. The work reported here comprised a literature survey of research relevant for ORV issues, and an assessment of the present situation at Swedish NPPs with respect to ORV. The literature survey was primarily aimed at research related to NPPs, but also looked at domains where similar problems have occurred, such as maintenance in commercial aviation. The survey looked specifically for organisational and MTO aspects relevant to the present situation in Swedish NPPs. One finding was that ORV should be seen as an integral part of maintenance, rather than as a separate activity. Another, that there is a characteristic distribution of error modes for maintenance and ORV, with many sequence errors and omissions, rather than a set of unique error modes. An international study further showed that there are important differences in how procedures are used, and in the balance between decentralisation and centralisation. Several studies also suggested that ORV could usefully be described as a barrier system in relation to the flow of work, for instance using the following five stages: (1) preventive actions during maintenance/outage, (2) post-test after completion of work, (3) pre-test before start-up, (4) the start-up sequence itself, and (5) preventive actions during power operation - possibly including automatic safety systems. In the field survey

  11. Investigation of pile foundations of nuclear power plants with help of non linear analyses

    International Nuclear Information System (INIS)

    Diaz, B.E.; Schulz, M.; Costa, E.; Vaz, L.E.

    1984-01-01

    A few important 1300 MW PWR nuclear power plants have been built over pile foundations. The design requirements of Nuclear Power Plants prescribe accurate investigation of the as built conditions of the foundation. This study must take into account the actual concrete strength existent among and along the pile shafts of the foundation. In order to simulate the structural response of the foundation up to the failure, a non linear analysis must be performed. In this paper the required computer analysis procedures will be described. It can be verified that the redistribution of the internal forces in this highly hyperstatic soil-structure system can be of two types. The total applied forces over the foundation are redistributed among the piles and for each pile itself a local redistribution of forces takes place along the pile shaft. This type of analysis allows an accurate investigation of the actual safety margin existent in the pile foundation, based on the actual as built conditions of the construction. (Author) [pt

  12. Women who helped shape the history of nuclear science and technology

    International Nuclear Information System (INIS)

    Quintin, Laura; Vuillaume, Fabienne; )

    2017-01-01

    A little over a year ago, the NEA moved to a new building operated by the OECD in Boulogne Billancourt, located in the southern suburbs of Paris. The Boulogne building was built in 1927, originally as an industrial space long used to produce telephone control units, and had recently undergone renovations to transform the interior to an office space. Because the offices were both new and undecorated, the opportunity presented itself to be creative with the new NEA meeting rooms. NEA Director-General Mr William D. Magwood, IV, was thus inspired to give a personality to the seven meeting rooms and so initiated a staff survey to choose names for the rooms. The results of the survey ranged from elements of the periodic table to nuclear reactor components or to Star Trek characters, but the final decision was made to name the rooms after notable female scientists who had advanced knowledge in the nuclear field. Seven remarkable women, with exceptional careers but who have rarely been cast into the limelight, now grace the walls of NEA meeting rooms

  13. Proceedings of the 22nd Annual DoD/DOE Seismic Research Symposium: Planning for Verification of and Compliance with the Comprehensive Nuclear-Test-Ban Treaty (CTBT)

    Energy Technology Data Exchange (ETDEWEB)

    Nichols, James W., LTC [Editor

    2000-09-15

    These proceedings contain papers prepared for the 22nd Annual DoD/DOE Seismic Research Symposium: Planning for Verification of and Compliance with the Comprehensive Nuclear-Test-Ban Treaty (CTBT), held 13-15 September 2000 in New Orleans, Louisiana. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), Air Force Technical Applications Center (AFTAC), Department of Defense (DoD), US Army Space and Missile Defense Command, Defense Special Weapons Agency (DSWA), and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  14. Established applications of non-destructive techniques for nuclear materials measurements control or verification; reported to ESARDA

    International Nuclear Information System (INIS)

    Adamson, A.S.

    1979-01-01

    Non-destructive measurement techniques are widely used in the states and organisations represented in the European Safeguards Research and Development Association (ESARDA). This paper comprises a list of those applications which are either used routinely, or which it has been decided to use routinely, for plant control, assay or verification purposes. Wherever possible precision and accuracies achieved in these routine conditions are stated. (author)

  15. Nuclear Energy Advanced Modeling and Simulation Waste Integrated Performance and Safety Codes (NEAMS Waste IPSC) verification and validation plan. version 1.

    Energy Technology Data Exchange (ETDEWEB)

    Bartlett, Roscoe Ainsworth; Arguello, Jose Guadalupe, Jr.; Urbina, Angel; Bouchard, Julie F.; Edwards, Harold Carter; Freeze, Geoffrey A.; Knupp, Patrick Michael; Wang, Yifeng; Schultz, Peter Andrew; Howard, Robert (Oak Ridge National Laboratory, Oak Ridge, TN); McCornack, Marjorie Turner

    2011-01-01

    The objective of the U.S. Department of Energy Office of Nuclear Energy Advanced Modeling and Simulation Waste Integrated Performance and Safety Codes (NEAMS Waste IPSC) is to provide an integrated suite of computational modeling and simulation (M&S) capabilities to quantitatively assess the long-term performance of waste forms in the engineered and geologic environments of a radioactive-waste storage facility or disposal repository. To meet this objective, NEAMS Waste IPSC M&S capabilities will be applied to challenging spatial domains, temporal domains, multiphysics couplings, and multiscale couplings. A strategic verification and validation (V&V) goal is to establish evidence-based metrics for the level of confidence in M&S codes and capabilities. Because it is economically impractical to apply the maximum V&V rigor to each and every M&S capability, M&S capabilities will be ranked for their impact on the performance assessments of various components of the repository systems. Those M&S capabilities with greater impact will require a greater level of confidence and a correspondingly greater investment in V&V. This report includes five major components: (1) a background summary of the NEAMS Waste IPSC to emphasize M&S challenges; (2) the conceptual foundation for verification, validation, and confidence assessment of NEAMS Waste IPSC M&S capabilities; (3) specifications for the planned verification, validation, and confidence-assessment practices; (4) specifications for the planned evidence information management system; and (5) a path forward for the incremental implementation of this V&V plan.

  16. TERRA: a nuclear reactor to help explore space, deep ocean and difficult access locations

    Energy Technology Data Exchange (ETDEWEB)

    Guimarães, Lamartine N.F.; Ribeiro, Guilherme Borges; Araújo, Élvis Falcão de; Braz Filho, Francisco Antônio; Leite, Valeria S.F.O.; Dias, Artur Flávio, E-mail: guimarae@ieav.cta.br [Instituto de Estudos Avançados (IEAv), São José dos Campos, SP (Brazil). Divisão de Energia Nuclear; Nascimento, Jamil Alves do; Placco, Guilherme M. [Instituto Tecnológico de Aeronáutica (PGCTE/ITA), São José dos Campos, SP (Brazil). Pós-Graduação em Ciência e Tecnologia Espacial

    2017-07-01

    The TERRA (Tecnologia de Reatores Rápidos Avançados) project, is a Brazilian effort to develop the enabling technologies to generate electric power in space. Those technologies are: an independent reactor core concept, a Stirling convertor to handle power in the range of 0.1 to 200 kW and a Brayton convertor to handle power in the range 200 to 1000 kW. Besides those technologies, it is also looked into heat pipes design and passive multi fluid turbines. The first reactor core concept was finish in 2016. A complete paper is being prepared and it is in the review process at this moment. A developed Stirling machine works quite reasonably. A second copy of this Stirling machine was built and is now undergoing testing. The Brayton cycle initial design project was intended to use a gas furnace to simulate the nuclear heat. A design retrofit was necessary and decision was made to change the furnace from gas to electric. A detail electric design project was requested to the market. This detail design was delivered august 2016. It is hoped that the 300 kW electric furnace will be procured in 2018. A couple of new APUs was received in November 2016. One of these APUs will be used in the actual Brayton cycle under construction. 18 kg of Mo13Re was acquired for materials testing. A copper/water thermosyphon was developed and it is the first step to produce heat pipes. A new workbench is under development to test the passive multi fluid turbine. A passive multi fluid turbine is an evolution of the Tesla turbine. All these developments will be presented at the conference with a little more of detail. (author)

  17. TERRA: a nuclear reactor to help explore space, deep ocean and difficult access locations

    International Nuclear Information System (INIS)

    Guimarães, Lamartine N.F.; Ribeiro, Guilherme Borges; Araújo, Élvis Falcão de; Braz Filho, Francisco Antônio; Leite, Valeria S.F.O.; Dias, Artur Flávio; Nascimento, Jamil Alves do; Placco, Guilherme M.

    2017-01-01

    The TERRA (Tecnologia de Reatores Rápidos Avançados) project, is a Brazilian effort to develop the enabling technologies to generate electric power in space. Those technologies are: an independent reactor core concept, a Stirling convertor to handle power in the range of 0.1 to 200 kW and a Brayton convertor to handle power in the range 200 to 1000 kW. Besides those technologies, it is also looked into heat pipes design and passive multi fluid turbines. The first reactor core concept was finish in 2016. A complete paper is being prepared and it is in the review process at this moment. A developed Stirling machine works quite reasonably. A second copy of this Stirling machine was built and is now undergoing testing. The Brayton cycle initial design project was intended to use a gas furnace to simulate the nuclear heat. A design retrofit was necessary and decision was made to change the furnace from gas to electric. A detail electric design project was requested to the market. This detail design was delivered august 2016. It is hoped that the 300 kW electric furnace will be procured in 2018. A couple of new APUs was received in November 2016. One of these APUs will be used in the actual Brayton cycle under construction. 18 kg of Mo13Re was acquired for materials testing. A copper/water thermosyphon was developed and it is the first step to produce heat pipes. A new workbench is under development to test the passive multi fluid turbine. A passive multi fluid turbine is an evolution of the Tesla turbine. All these developments will be presented at the conference with a little more of detail. (author)

  18. Procedure generation and verification

    International Nuclear Information System (INIS)

    Sheely, W.F.

    1986-01-01

    The Department of Energy has used Artificial Intelligence of ''AI'' concepts to develop two powerful new computer-based techniques to enhance safety in nuclear applications. The Procedure Generation System, and the Procedure Verification System, can be adapted to other commercial applications, such as a manufacturing plant. The Procedure Generation System can create a procedure to deal with the off-normal condition. The operator can then take correct actions on the system in minimal time. The Verification System evaluates the logic of the Procedure Generator's conclusions. This evaluation uses logic techniques totally independent of the Procedure Generator. The rapid, accurate generation and verification of corrective procedures can greatly reduce the human error, possible in a complex (stressful/high stress) situation

  19. International ENEA/ISMES/ENS specialist meeting on 'On-site experimental verification of the seismic behaviour of nuclear reactor structures and components'. Proceedings

    International Nuclear Information System (INIS)

    1988-01-01

    The seismic verification of nuclear plants is a subject of increasing interest in all the industrial countries, with respect to both the safety aspects and the impact of the seismic event on the design and the costs of a nuclear reactor. This topic is especially of great interest for a country like Italy, whose territory is unfortunately characterized by non - negligible seismicity: we remember, not too many years ago, the catastrophic earthquakes of Frioul and Irpinia, that caused thousands of dead people. The meeting aimed at establishing the state-of-the-art on on-site testing of nuclear reactors structures and components, with particular attention to experiences and research programmes concerning: methodologies of on-site tests and interpretation of the experimental data; seismic monitoring systems, recorded data, their use and interpretation; calibration and validation of numerical analyses. Six technical sessions were held, during which 23 high papers were presented and discussed, and six panel discussions were held (the importance of discussion was emphasized in the meeting). The technical contributions consisted of: an introduction paper, summarizing the seismic studies performed in Italy for PEC reactor and explaining the reasons why on-site tests had been performed on this reactor; 6 invited lectures, one for each of the countries that are more deeply involved in seismic analysis, providing the state-of-the-art on the topics of interest for the meeting; 16 contributed papers dealing with more specific technical items, related to the various countries and international organizations

  20. Societal Verification: Intellectual Game or International Game-Changer

    International Nuclear Information System (INIS)

    Hartigan, Kelsey; Hinderstein, Corey

    2013-01-01

    Within the nuclear nonproliferation and arms control field, there is an increasing appreciation for the potential of open source information technologies to supplement existing verification and compliance regimes. While clearly not a substitute for on-site inspections or national technical means, it may be possible to better leverage information gleaned from commercial satellite imagery, international trade records and the vast amount of data being exchanged online and between publics (including social media) so as to develop a more comprehensive set of tools and practices for monitoring and verifying a state’s nuclear activities and helping judge compliance with international obligations. The next generation “toolkit” for monitoring and verifying items, facility operations and activities will likely include a more diverse set of analytical tools and technologies than are currently used internationally. To explore these and other issues, the Nuclear Threat Initiative has launched an effort that examines, in part, the role that emerging technologies and “citizen scientists” might play in future verification regimes. This paper will include an assessment of past proliferation and security “events” and whether emerging tools and technologies would have provided indicators concurrently or in advance of these actions. Such case studies will be instrumental in understanding the reliability of these technologies and practices and in thinking through the requirements of a 21st century verification regime. Keywords: Verification, social media, open-source information, arms control, disarmament.

  1. Open verification methodology cookbook

    CERN Document Server

    Glasser, Mark

    2009-01-01

    Functional verification is an art as much as a science. It requires not only creativity and cunning, but also a clear methodology to approach the problem. The Open Verification Methodology (OVM) is a leading-edge methodology for verifying designs at multiple levels of abstraction. It brings together ideas from electrical, systems, and software engineering to provide a complete methodology for verifying large scale System-on-Chip (SoC) designs. OVM defines an approach for developing testbench architectures so they are modular, configurable, and reusable. This book is designed to help both novic

  2. Development of digital device based work verification system for cooperation between main control room operators and field workers in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Seung Min, E-mail: jewellee@kaeri.re.kr [Korea Atomic Energy Research Institute, 305-353, 989-111 Daedeok-daero, Yuseong-gu, Daejeon (Korea, Republic of); Department of Nuclear and Quantum Engineering, Korea Advanced Institute of Science and Technology, 373-1, Guseong-dong, Yuseong-gu, Daejeon 305-701 (Korea, Republic of); Lee, Hyun Chul, E-mail: leehc@kaeri.re.kr [Korea Atomic Energy Research Institute, 305-353, 989-111 Daedeok-daero, Yuseong-gu, Daejeon (Korea, Republic of); Ha, Jun Su, E-mail: junsu.ha@kustar.ac.ae [Department of Nuclear Engineering, Khalifa University of Science Technology and Research, Abu Dhabi P.O. Box 127788 (United Arab Emirates); Seong, Poong Hyun, E-mail: phseong@kaist.ac.kr [Department of Nuclear and Quantum Engineering, Korea Advanced Institute of Science and Technology, 373-1, Guseong-dong, Yuseong-gu, Daejeon 305-701 (Korea, Republic of)

    2016-10-15

    Highlights: • A digital device-based work verification and cooperation support system was developed. • Requirements were derived by interviewing field operators having experiences with mobile-based work support systems. • The usability of the proposed system was validated by conducting questionnaire surveys. • The proposed system will be useful if the manual or the set of guidelines is well constructed. - Abstract: Digital technologies have been applied in the nuclear field to check task results, monitor events and accidents, and transmit/receive data. The results of using digital devices have proven that these devices can provide high accuracy and convenience for workers, allowing them to obtain obvious positive effects by reducing their workloads. In this study, as one step forward, a digital device-based cooperation support system, the nuclear cooperation support and mobile documentation system (Nu-COSMOS), is proposed to support communication between main control room (MCR) operators and field workers by verifying field workers’ work results in nuclear power plants (NPPs). The proposed system consists of a mobile based information storage system to support field workers by providing various functions to make workers more trusted by MCR operators; also to improve the efficiency of meeting, and a large screen based information sharing system supports meetings by allowing both sides to share one medium. The usability of this system was estimated by interviewing field operators working in nuclear power plants and experts who have experience working as operators. A survey to estimate the usability of the suggested system and the suitability of the functions of the system for field working was conducted for 35 subjects who have experience in field works or with support system development-related research. The usability test was conducted using the system usability scale (SUS), which is widely used in industrial usability evaluation. Using questionnaires

  3. Numerical simulation and experimental verification of microstructure evolution in large forged pipe used for AP1000 nuclear power plants

    International Nuclear Information System (INIS)

    Wang, Shenglong; Yang, Bin; Zhang, Mingxian; Wu, Huanchun; Peng, Jintao; Gao, Yang

    2016-01-01

    Highlights: • Establish systematically the database of 316LN stainless steel for Deform-3D. • Simulate the microstructure evolution during forging of AP1000 primary coolant pipe. • Carry out full-scale forging experiment for verification in engineering practice. • Get desirable grain size in simulation and experiment. • The variation trends of grain sizes in simulation and experiment are consistent. - Abstract: AP1000 primary coolant pipe is a large special-shaped forged pipe made of 316LN stainless steel. Due to the non-uniform temperature and deformation during its forging, coarse and fine grains usually coexist in the forged pipe, resulting in the heterogeneous microstructure and anisotropic performance. To investigate the microstructure evolution during the entire forging process, in the present research, the database of the 316LN stainless steel was established and a numerical simulation was performed. The results indicate that the middle body section of the forged pipe has an extremely uniform average grain size with the value smaller than 30 μm. The grain sizes in the ends of body sections were ranged from 30 μm to 60 μm. Boss sections have relatively homogeneous microstructure with the average grain size 30 μm to 44 μm. Furthermore, a full-scale hot forging was carried out for verification. Comparison of theoretical and experimental results showed good agreement and hence demonstrated the capabilities of the numerical simulation presented here. It is noteworthy that all grains in the workpiece were confirmed less than 180 μm, which meets the designer’s demands.

  4. Environmental Detection of Clandestine Nuclear Weapon Programs

    Science.gov (United States)

    Kemp, R. Scott

    2016-06-01

    Environmental sensing of nuclear activities has the potential to detect nuclear weapon programs at early stages, deter nuclear proliferation, and help verify nuclear accords. However, no robust system of detection has been deployed to date. This can be variously attributed to high costs, technical limitations in detector technology, simple countermeasures, and uncertainty about the magnitude or behavior of potential signals. In this article, current capabilities and promising opportunities are reviewed. Systematic research in a variety of areas could improve prospects for detecting covert nuclear programs, although the potential for countermeasures suggests long-term verification of nuclear agreements will need to rely on methods other than environmental sensing.

  5. On-site inspections: The ultimate verification measure

    International Nuclear Information System (INIS)

    2009-04-01

    Having existed for a mere six weeks in 2008, the State of Arcania was short-lived. The fictitious state helped to test on-site inspections, a key element of a global alarm system that monitors the Earth for signs of nuclear explosions. The Preparatory Commission for the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO) is mandated to build this system to verify States' compliance with the Comprehensive Nuclear-Test-Ban Treaty (CTBT). On-site inspections (OSI ) complement the verification regime's other elements: the International Monitoring System with its network of 337 facilities, the International Data Centre with its extensive data analysis capacities, and the Global Communications Infrastructure. On-site inspections can be invoked only after the Treaty's entry into force. A Member State may request an inspection should the analysis of monitoring data indicate that a nuclear explosion was carried out in violation of the CT BT. Facts gathered directly on the ground during an inspection will help States to establish whether or not a nuclear explosion did indeed take place. Thus, on-site inspections constitute the final verification measure under the Treaty.

  6. Software verification, model validation and hydrogeologic modelling aspects in nuclear waste disposal system simulations : a paradigm shift

    NARCIS (Netherlands)

    Sheng, G.M.

    1994-01-01

    This work (1) reviews the current concept ad~ internationally on the disposal of highlevel nuclear wastes; (2) discusses some of the major challenges facing this disposal technology; (3) presents an evaluation of the Canadian performance assessment work as a case study; and (4) introduces a

  7. Material integrity verification radar

    International Nuclear Information System (INIS)

    Koppenjan, S.K.

    1999-01-01

    The International Atomic Energy Agency (IAEA) has the need for verification of 'as-built' spent fuel-dry storage containers and other concrete structures. The IAEA has tasked the Special Technologies Laboratory (STL) to fabricate, test, and deploy a stepped-frequency Material Integrity Verification Radar (MIVR) system to nondestructively verify the internal construction of these containers. The MIVR system is based on previously deployed high-frequency, ground penetrating radar (GPR) systems that have been developed by STL for the U.S. Department of Energy (DOE). Whereas GPR technology utilizes microwave radio frequency energy to create subsurface images, MTVR is a variation for which the medium is concrete instead of soil. The purpose is to nondestructively verify the placement of concrete-reinforcing materials, pipes, inner liners, and other attributes of the internal construction. The MIVR system underwent an initial field test on CANDU reactor spent fuel storage canisters at Atomic Energy of Canada Limited (AECL), Chalk River Laboratories, Ontario, Canada, in October 1995. A second field test at the Embalse Nuclear Power Plant in Embalse, Argentina, was completed in May 1996. The DOE GPR also was demonstrated at the site. Data collection and analysis were performed for the Argentine National Board of Nuclear Regulation (ENREN). IAEA and the Brazilian-Argentine Agency for the Control and Accounting of Nuclear Material (ABACC) personnel were present as observers during the test. Reinforcing materials were evident in the color, two-dimensional images produced by the MIVR system. A continuous pattern of reinforcing bars was evident and accurate estimates on the spacing, depth, and size were made. The potential uses for safeguard applications were jointly discussed. The MIVR system, as successfully demonstrated in the two field tests, can be used as a design verification tool for IAEA safeguards. A deployment of MIVR for Design Information Questionnaire (DIQ

  8. Is flow verification necessary

    International Nuclear Information System (INIS)

    Beetle, T.M.

    1986-01-01

    Safeguards test statistics are used in an attempt to detect diversion of special nuclear material. Under assumptions concerning possible manipulation (falsification) of safeguards accounting data, the effects on the statistics due to diversion and data manipulation are described algebraically. A comprehensive set of statistics that is capable of detecting any diversion of material is defined in terms of the algebraic properties of the effects. When the assumptions exclude collusion between persons in two material balance areas, then three sets of accounting statistics are shown to be comprehensive. Two of the sets contain widely known accountancy statistics. One of them does not require physical flow verification - comparisons of operator and inspector data for receipts and shipments. The third set contains a single statistic which does not require physical flow verification. In addition to not requiring technically difficult and expensive flow verification, this single statistic has several advantages over other comprehensive sets of statistics. This algebraic approach as an alternative to flow verification for safeguards accountancy is discussed in this paper

  9. Conception and realization of an expert system to help the interpretation of the mechanical shocks in a nuclear power plant

    International Nuclear Information System (INIS)

    Brunet, E.

    1988-01-01

    The computer system MIGRE, developed with the aim of helping the understanding of mechanical shocks in the nuclear power plant primary circuit. The MIGRE system allows the description of a study domain, the acquisition and exploitation of operational knowledges. The structural organization of the system is submitted to two constraints: in the first place, the system's operation depends on the accomplishment and development of an application, and on a diagnostic's research; the second constraint is the fact that the work space of PROLOG, on Macintoch, is restricted. A specific configuration is associated to each one of the work environments. The organization principle (in ''hierarchical Worlds'') of a program by PROLOG, allows to reach easily this kind of architecture. This principle makes a modular organization easy and allows to distinguish statical from dynamical steps of the system. The selection of the system different functions takes place by menus. The transition from one configuration to another is automatically effectuated and unseen by the user. Problems applying the Knowledge acquisition and the wandering bodies function, are also considered [fr

  10. Communication dated 18 December 2013 received from the Delegation of the European Union to the International Organisations in Vienna on the European Union's Support for the IAEA Activities in the Areas of Nuclear Security and Verification

    International Nuclear Information System (INIS)

    2014-01-01

    The Secretariat has received a note verbale dated 18 December 2013 from the Delegation of the European Union to the International Organisations in Vienna with Council Decision 2013/517/CFSP of 21 October 2013, in support of the IAEA activities in the areas of nuclear security and verification and in the framework of the implementation of the EU Strategy against Proliferation of Weapons of Mass Destruction. As requested in that communication, the note verbale and the enclosure are circulated herewith for information

  11. On-line high-performance liquid chromatography-ultraviolet-nuclear magnetic resonance method of the markers of nerve agents for verification of the Chemical Weapons Convention.

    Science.gov (United States)

    Mazumder, Avik; Gupta, Hemendra K; Garg, Prabhat; Jain, Rajeev; Dubey, Devendra K

    2009-07-03

    This paper details an on-flow liquid chromatography-ultraviolet-nuclear magnetic resonance (LC-UV-NMR) method for the retrospective detection and identification of alkyl alkylphosphonic acids (AAPAs) and alkylphosphonic acids (APAs), the markers of the toxic nerve agents for verification of the Chemical Weapons Convention (CWC). Initially, the LC-UV-NMR parameters were optimized for benzyl derivatives of the APAs and AAPAs. The optimized parameters include stationary phase C(18), mobile phase methanol:water 78:22 (v/v), UV detection at 268nm and (1)H NMR acquisition conditions. The protocol described herein allowed the detection of analytes through acquisition of high quality NMR spectra from the aqueous solution of the APAs and AAPAs with high concentrations of interfering background chemicals which have been removed by preceding sample preparation. The reported standard deviation for the quantification is related to the UV detector which showed relative standard deviations (RSDs) for quantification within +/-1.1%, while lower limit of detection upto 16mug (in mug absolute) for the NMR detector. Finally the developed LC-UV-NMR method was applied to identify the APAs and AAPAs in real water samples, consequent to solid phase extraction and derivatization. The method is fast (total experiment time approximately 2h), sensitive, rugged and efficient.

  12. HTGR analytical methods and design verification

    International Nuclear Information System (INIS)

    Neylan, A.J.; Northup, T.E.

    1982-05-01

    Analytical methods for the high-temperature gas-cooled reactor (HTGR) include development, update, verification, documentation, and maintenance of all computer codes for HTGR design and analysis. This paper presents selected nuclear, structural mechanics, seismic, and systems analytical methods related to the HTGR core. This paper also reviews design verification tests in the reactor core, reactor internals, steam generator, and thermal barrier

  13. Verification of Safety Margins of Battery Banks Capacity of Class 1E DC System in a Nuclear Power Plant

    International Nuclear Information System (INIS)

    Lukman, Abdulrauf; Zhu, Oon-Pyo

    2015-01-01

    According to Ref 'Station blackout (SBO) is generally a plant condition with complete loss of all alternating current (AC) power from off-site sources, from the main generator and from standby AC power sources important to safety to the essential and nonessential switchgear buses. Direct current (DC) power supplies and uninterruptible AC power supplies may be available as long as batteries can supply the loads, alternate AC power supplies are available'. The above IAEA document indicated the importance of batteries during SBO. Prior to the Fukushima accident, most batteries might be designed with coping capability of four hours. However, the accident showed the need for the coping capability to be increased to at least eight hours. The purpose of this research is to verify the safety capacity margin of the nuclear qualified battery banks of class 1E DC system and test the response to SBO using the load profile of a Korean design nuclear power plant (NPP). The capacity margins of class 1E batteries of DC power system batteries in a nuclear power plant were determined using the load profile of the plant. It was observed that if appropriate manufacturer Kt data are not available, the accuracy of the battery capacity might not be accurately calculated. The result obtained shows that the batteries have the coping capability of two hours for channel A and B, and eight hours for channel C and D. Also capacity margin as show in figure show a reasonable margin for each batteries of the DC system

  14. Atmospheric transport modelling related to radionuclide monitoring in support of the comprehensive nuclear-test-ban treaty verification

    International Nuclear Information System (INIS)

    Kalinowski, M.B.

    2001-01-01

    Global monitoring for relevant radionuclides in the atmosphere serves as part of the International Monitoring System to verify compliance with the Comprehensive Nuclear-Test-Ban-Treaty (CTBT). Atmospheric transport modelling can be applied to support these measurements and to get indications for possible source locations of detected relevant anthropogenic nuclides. This paper puts a focus on those issues that are of relevance to the International Data Centre (IDC). Possible methods of atmospheric transport modelling are outlined. The current tentative implementation at the IDC is described here. (orig.) [de

  15. Research and practice of application software verification and validation for nuclear safety digital I and C system

    International Nuclear Information System (INIS)

    Dong Yaxin; Xu Xianzhu; Bai Xiangji

    2014-01-01

    Application software V and V activities determine whether the output results are consistent with the requirements of tasks throughout each stage of application software development process, and confirm whether the ultimately generated application software is conform to its intended use and other related requirements. A set of reasonable and feasible workflow for application software V and V activities was proposed based on the characteristics of the application software in this paper, and was demonstrated with the application software V and V activities in transformation project of in-core instrumentation system (RIC) in a nuclear power plant. (authors)

  16. CTBT integrated verification system evaluation model supplement

    Energy Technology Data Exchange (ETDEWEB)

    EDENBURN,MICHAEL W.; BUNTING,MARCUS; PAYNE JR.,ARTHUR C.; TROST,LAWRENCE C.

    2000-03-02

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia's Monitoring Systems and Technology Center and has been funded by the U.S. Department of Energy's Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, ''top-level,'' modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM's unique features is that it integrates results from the various CTBT sensor technologies (seismic, in sound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection), location accuracy, and identification capability of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system's performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. The original IVSEM report, CTBT Integrated Verification System Evaluation Model, SAND97-25 18, described version 1.2 of IVSEM. This report describes the changes made to IVSEM version 1.2 and the addition of identification capability estimates that have been incorporated into IVSEM version 2.0.

  17. CTBT integrated verification system evaluation model supplement

    International Nuclear Information System (INIS)

    EDENBURN, MICHAEL W.; BUNTING, MARCUS; PAYNE, ARTHUR C. JR.; TROST, LAWRENCE C.

    2000-01-01

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia's Monitoring Systems and Technology Center and has been funded by the U.S. Department of Energy's Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, ''top-level,'' modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM's unique features is that it integrates results from the various CTBT sensor technologies (seismic, in sound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection), location accuracy, and identification capability of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system's performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. The original IVSEM report, CTBT Integrated Verification System Evaluation Model, SAND97-25 18, described version 1.2 of IVSEM. This report describes the changes made to IVSEM version 1.2 and the addition of identification capability estimates that have been incorporated into IVSEM version 2.0

  18. Helping Kids Help

    Science.gov (United States)

    Heiss, E. Renee

    2008-01-01

    Educators need to help kids help others so that they can help themselves. Volunteering does not involve competition or grades. This is one area where students don't have to worry about measuring up to the expectations of parents, teachers, and coaches. Students participate in charitable work to add another line to a college transcript or job…

  19. United Nations Development Assistance Frameworks (UNDAFs): Helping to Ensure the Integration of Nuclear Techniques with other Development Initiatives and Plans

    International Nuclear Information System (INIS)

    2011-01-01

    The IAEA and the Department of Technical Cooperation in particular, rely on harmonious and collaborative work with numerous partners over a broad range of policy levels to promote peace and development through the peaceful application of nuclear science and technology. The Strategy and Partnership Section (TCSPS) of the Division of Programme Support and Coordination is at the forefront of developing and maintaining successful partnerships with the IAEA's Department of Technical Cooperation. Part of the work of TCSPS involves streamlining the Country Programme Framework (CPF) process and building networks that support the United Nations one house approach. Country Programme Frameworks are programming tools that provide a frame of reference for technical cooperation between the IAEA and its Member States in the medium term (4-6 years). They provide a concise framework for national development needs or problems that can be addressed using nuclear science and technology. In support of the IAEA's efforts to align and provide leverage for its technical cooperation activities within the larger development context, the CPF preparation process now makes extensive use of national development plans and United Nations Development Assistance Frameworks (UNDAFs). UNDAFs are the planning framework for the development operations of the UN system at the country level and not only help to ensure that the application of nuclear techniques is integrated with existing development initiatives and plans, but also assist identifying areas where such techniques might be usefully deployed. In the past two years, 13 UNDAFs have been signed, reflecting the IAEA's focus on optimizing development activities at the country level. Currently the Secretariat is engaged in 22 ongoing UNDAF processes to ensure that the TC programme is aligned with the national development priorities reflected in these frameworks. One outstanding example of the work that is possible within the UNDAF framework is

  20. Verification of surface contamination density standard using clearance automatic laser inspection system for objects from a nuclear power plant

    International Nuclear Information System (INIS)

    Sasaki, Michiya; Ogino, Haruyuki; Ichiji, Takeshi; Hattori, Takatoshi

    2008-01-01

    In the clearance level inspection in Japan, it is necessary to indicate that the activity level of the target object must be less than not only the clearance levels, but also the surface contamination density standards. The classification measurements for these two standards have been performed separately, and the GM survey meters based on beta-ray measurement have mainly been used for surface contamination density measurement so far. Recently the Clearance Automatic Laser Inspection System, named CLALIS, has been developed to estimate the low-level activity concentration. This system consists of 3-dimensional laser scanner for shape measurement and eight large NE102A plastic scintillation detectors for gamma-ray measurement, and it has been clarified that the CLALIS has adequate detection ability for clearance measurement of both metal scraps and concrete debris. In this study, we compared the surface contamination densities for a number of actual contaminated and non-contaminated objects generated inside from the radiation controlled area at the Kashiwazaki-Kariwa nuclear power station by using the CLALIS and the GM survey meter. As a result, since CLALIS could detect the surface contamination as well as the GM survey meter for all measurement targets, it was revealed that CLALIS can rationally achieve clearance level inspection in a single radiation measurement. The practicality of CLALIS in view of the detection limit and processing time was discussed by comparison with the usual radiation monitors for surface contamination measurement. (author)

  1. Utilization of the Differential Die-Away Self-Interrogation Technique for Characterization and Verification of Spent Nuclear Fuel

    Energy Technology Data Exchange (ETDEWEB)

    Trahan, Alexis Chanel [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-01-27

    New nondestructive assay techniques are sought to better characterize spent nuclear fuel. One of the NDA instruments selected for possible deployment is differential die-away self-interrogation (DDSI). The proposed DDSI approach for spent fuel assembly assay utilizes primarily the spontaneous fission and (α, n) neutrons in the assemblies as an internal interrogating radiation source. The neutrons released in spontaneous fission or (α,n) reactions are thermalized in the surrounding water and induce fission in fissile isotopes, thereby creating a measurable signal from isotopes of interest that would be otherwise difficult to measure. The DDSI instrument employs neutron coincidence counting with 3He tubes and list-mode-based data acquisition to allow for production of Rossi-alpha distributions (RADs) in post-processing. The list-mode approach to data collection and subsequent construction of RADs has expanded the analytical possibilities, as will be demonstrated throughout this thesis. One of the primary advantages is that the measured signal in the form of a RAD can be analyzed in its entirety including determination of die-away times in different time domains. This capability led to the development of the early die-away method, a novel leakage multiplication determination method which is tested throughout the thesis on different sources in simulation space and fresh fuel experiments. The early die-away method is a robust, accurate, improved method of determining multiplication without the need for knowledge of the (α,n) source term. The DDSI technique and instrument are presented along with the many novel capabilities enabled by and discovered through RAD analysis. Among the new capabilities presented are the early die-away method, total plutonium content determination, and highly sensitive missing pin detection. Simulation of hundreds of different spent and fresh fuel assemblies were used to develop the analysis algorithms and the techniques were tested on a

  2. What we need to know ...and when. Educating the public about nuclear terrorist risks can help raise levels of security

    International Nuclear Information System (INIS)

    Khripunov, I.

    2006-01-01

    Nuclear power infrastructures could be the target of terrorist acts of theft, sabotage, unauthorized access or other malicious acts given their radiological and chemical content and potential for building weapons. Attacks on its major components, including fuel production, reactors, waste handling, and reprocessing facilities, would lead to serious consequences-even if there is little or no damage to a nuclear power plant itself and other related structures. Public fear of nuclear radiation, in combination with a possibly massive resultant blackout and other aggravating factors, could create significant distress and panic. In other words, successful terrorist attempts to attack nuclear power infrastructure can easily bring about systemic disaster. Systemic risks impact society on a large scale and their effects may spread much further from the original hazardous source. Those risks widely affect systems that society depends on, such as health, transport, environment, telecommunications. Their consequences may be technical, social, environmental, psychological and economic and involve different stakeholders. In this context, however, one important stakeholder has been under-appreciated, under-utilized and somewhat misunderstood: the general public. The nuclear power infrastructure must learn how to efficiently communicate to the public and develop better options for public risk communication that relate to deliberate attacks or accidents. The public is also a challenging stockholder because citizens are deeply split regarding the acceptability and value of nuclear power generation and tend to express their feelings emotionally. However, there is growing recognition that because of skyrocketing oil prices and evidence of the greenhouse effect, nuclear power may be approaching renaissance. Hence, the public must no longer be looked upon only as potential victims or panicked masses but rather as an important contributing factor for better nuclear security throughout

  3. Communication dated 18 December 2013 received from the Delegation of the European Union to the International Organisations in Vienna on the European Union's Support for the IAEA Activities in the Areas of Nuclear Security and Verification

    International Nuclear Information System (INIS)

    2014-01-01

    The Secretariat has received a note verbale dated 18 December 2013 from the Delegation of the European Union to the International Organisations in Vienna with Council Decision 2013/517/CFSP of 21 October 2013, in support of the IAEA activities in the areas of nuclear security and verification and in the framework of the implementation of the EU Strategy against Proliferation of Weapons of Mass Destruction. As requested in that communication, the note verbale and the enclosure are circulated herewith for information [fr

  4. Communication dated 18 December 2013 received from the Delegation of the European Union to the International Organisations in Vienna on the European Union's Support for the IAEA Activities in the Areas of Nuclear Security and Verification

    International Nuclear Information System (INIS)

    2014-01-01

    The Secretariat has received a note verbale dated 18 December 2013 from the Delegation of the European Union to the International Organisations in Vienna with Council Decision 2013/517/CFSP of 21 October 2013, in support of the IAEA activities in the areas of nuclear security and verification and in the framework of the implementation of the EU Strategy against Proliferation of Weapons of Mass Destruction. As requested in that communication, the note verbale and the enclosure are circulated herewith for information [es

  5. Swarm Verification

    Science.gov (United States)

    Holzmann, Gerard J.; Joshi, Rajeev; Groce, Alex

    2008-01-01

    Reportedly, supercomputer designer Seymour Cray once said that he would sooner use two strong oxen to plow a field than a thousand chickens. Although this is undoubtedly wise when it comes to plowing a field, it is not so clear for other types of tasks. Model checking problems are of the proverbial "search the needle in a haystack" type. Such problems can often be parallelized easily. Alas, none of the usual divide and conquer methods can be used to parallelize the working of a model checker. Given that it has become easier than ever to gain access to large numbers of computers to perform even routine tasks it is becoming more and more attractive to find alternate ways to use these resources to speed up model checking tasks. This paper describes one such method, called swarm verification.

  6. Monitoring of surface chemical and underground nuclear explosions with help of ionospheric radio-sounding above test site

    International Nuclear Information System (INIS)

    Krasnov, V.M.; Drobzheva, Ya.V.

    2000-01-01

    We describe the basic principles, advantages and disadvantages of ionospheric method to monitor surface chemical and underground nuclear explosions. The ionosphere is 'an apparatus' for the infra-sound measurements immediately above the test site. Using remote radio sounding of the ionosphere you can obtain that information. So you carry out the inspection at the test site. The main disadvantage of the ionospheric method is the necessity to sound the ionosphere with radio waves. (author)

  7. Nuclear science: Physics helping the world. Introductory statement to the Scientific Forum, 27 September 2005, Vienna, Austria

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2005-01-01

    This article is the opening address by the Director General of the IAEA to the 8th Scientific Forum, a venue that has become one of the highlights of our annual General Conference. 2005 has been declared the World Year of Physics, in part to commemorate the 100th anniversary of Albert Einstein's three groundbreaking papers - on the theory of relativity, the photoelectric effect, and the theory of Brownian motion. It is important to consider that many of the benefits of technology we enjoy today would have been considered near-magic only a few generations ago - and the pace of discovery is not slowing down. Given that physics is at the core of nearly all nuclear science and technology benefits, it seemed appropriate to examine, at this year's Scientific Forum, a number of the contributions that continued advances in nuclear physics are making towards sustainable development. The resulting Forum agenda is built around four such topics: Meeting Energy Needs, Developing Advanced Materials and Technologies, Advancing Radiation Medicine and Supporting Nuclear Safety

  8. Independent Verification and Validation Of SAPHIRE 8 Software Design and Interface Design Project Number: N6423 U.S. Nuclear Regulatory Commission

    Energy Technology Data Exchange (ETDEWEB)

    Kent Norris

    2009-10-01

    The purpose of the Independent Verification and Validation (IV&V) role in the evaluation of the SAPHIRE software design and interface design is to assess the activities that results in the development, documentation, and review of a software design that meets the requirements defined in the software requirements documentation. The IV&V team began this endeavor after the software engineering and software development of SAPHIRE had already been in production. IV&V reviewed the requirements specified in the NRC Form 189s to verify these requirements were included in SAPHIRE’s Software Verification and Validation Plan (SVVP) design specification.

  9. Verification and the safeguards legacy

    International Nuclear Information System (INIS)

    Perricos, Demetrius

    2001-01-01

    A number of inspection or monitoring systems throughout the world over the last decades have been structured drawing upon the IAEA experience of setting up and operating its safeguards system. The first global verification system was born with the creation of the IAEA safeguards system, about 35 years ago. With the conclusion of the NPT in 1968, inspections were to be performed under safeguards agreements, concluded directly between the IAEA and non-nuclear weapon states parties to the Treaty. The IAEA developed the safeguards system within the limitations reflected in the Blue Book (INFCIRC 153), such as limitations of routine access by the inspectors to 'strategic points', including 'key measurement points', and the focusing of verification on declared nuclear material in declared installations. The system, based as it was on nuclear material accountancy. It was expected to detect a diversion of nuclear material with a high probability and within a given time and therefore determine also that there had been no diversion of nuclear material from peaceful purposes. The most vital element of any verification system is the inspector. Technology can assist but cannot replace the inspector in the field. Their experience, knowledge, intuition and initiative are invaluable factors contributing to the success of any inspection regime. The IAEA inspectors are however not part of an international police force that will intervene to prevent a violation taking place. To be credible they should be technically qualified with substantial experience in industry or in research and development before they are recruited. An extensive training program has to make sure that the inspectors retain their professional capabilities and that it provides them with new skills. Over the years, the inspectors and through them the safeguards verification system gained experience in: organization and management of large teams; examination of records and evaluation of material balances

  10. Verification and validation for waste disposal models

    International Nuclear Information System (INIS)

    1987-07-01

    A set of evaluation criteria has been developed to assess the suitability of current verification and validation techniques for waste disposal methods. A survey of current practices and techniques was undertaken and evaluated using these criteria with the items most relevant to waste disposal models being identified. Recommendations regarding the most suitable verification and validation practices for nuclear waste disposal modelling software have been made

  11. Development of sealed radioactive sources immobilized in epoxy resin for verification of detectors used in nuclear medicine; Desenvolvimento de fontes radioativas seladas imobilizadas em resina epoxi para verificacao de detectores utilizados em medicina nuclear

    Energy Technology Data Exchange (ETDEWEB)

    Tiezzi, Rodrigo

    2016-07-01

    The radioactive sealed sources are used in verification ionization chamber detectors, which measure the activity of radioisotopes used in several areas, such as in nuclear medicine. The measurement of the activity of radioisotopes must be made with accuracy, because it is administered to a patient. To ensure the proper functioning of the ionization chamber detectors, standardized tests are set by the International Atomic Energy Agency (IAEA) and the National Nuclear Energy Commission using sealed radioactive sources of Barium-133, Cesium-137 and Cobalt-57. The tests assess the accuracy, precision, reproducibility and linearity of response of the equipment. The focus of this work was the study and the development of these radioactive sources with standard Barium-133 and Cesium-137,using a polymer, in case commercial epoxy resin of diglycidyl ether of bisphenol A (DGEBA) and a curing agent based on modified polyamine diethylenetriamine (DETA), to immobilize the radioactive material. The polymeric matrix has the main function of fix and immobilize the radioactive contents not allowing them to leak within the technical limits required by the standards of radiological protection in the category of characteristics of a sealed source and additionally have the ability to retain the emanation of any gases that may be formed during the manufacture process and the useful life of this artifact. The manufacturing process of a sealed source standard consists of the potting ,into bottle standardized geometry, in fixed volume of a quantity of a polymeric matrix within which is added and dispersed homogeneously to need and exact amount in activity of the radioactive materials standards. Accordingly, a study was conducted for the choice of epoxy resin, analyzing its characteristics and properties. Studies and tests were performed, examining the maximum miscibility of the resin with the water (acidic solution, simulating the conditions of radioactive solution), loss of mechanical and

  12. Determination of the changes of water storage in an aridisol at the central Bolivian highlands with the help of nuclear techniques

    International Nuclear Information System (INIS)

    Orsag, V.

    1989-01-01

    The results of this kind of research, the first one conducted in Bolivia with the help of nuclear techniques for three years, allow to demonstrate that the soil classified as ''typical paleargid'' or ''aridisol'' with loam-clay sandy texture, has a very varied water storage until reaching a depth of 76 cm. This strictly depends on the variable rain fall in different seasons and the strong evaporation rate during the cloudless winter at 4000 m of altitude. The growing period of the Andean cultivated plants coincides with the increasing soil water content from September to January and the harvest period with the decrease of water storage from March to May

  13. Monitoring and verification R&D

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F [Los Alamos National Laboratory; Budlong - Sylvester, Kory W [Los Alamos National Laboratory; Fearey, Bryan L [Los Alamos National Laboratory

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R&D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R&D required to address these gaps and other monitoring and verification challenges.

  14. Monitoring and verification R and D

    International Nuclear Information System (INIS)

    Pilat, Joseph F.; Budlong-Sylvester, Kory W.; Fearey, Bryan L.

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R and D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R and D required to address these gaps and other monitoring and verification challenges.

  15. Verification of safety critical software

    International Nuclear Information System (INIS)

    Son, Ki Chang; Chun, Chong Son; Lee, Byeong Joo; Lee, Soon Sung; Lee, Byung Chai

    1996-01-01

    To assure quality of safety critical software, software should be developed in accordance with software development procedures and rigorous software verification and validation should be performed. Software verification is the formal act of reviewing, testing of checking, and documenting whether software components comply with the specified requirements for a particular stage of the development phase[1]. New software verification methodology was developed and was applied to the Shutdown System No. 1 and 2 (SDS1,2) for Wolsung 2,3 and 4 nuclear power plants by Korea Atomic Energy Research Institute(KAERI) and Atomic Energy of Canada Limited(AECL) in order to satisfy new regulation requirements of Atomic Energy Control Boars(AECB). Software verification methodology applied to SDS1 for Wolsung 2,3 and 4 project will be described in this paper. Some errors were found by this methodology during the software development for SDS1 and were corrected by software designer. Outputs from Wolsung 2,3 and 4 project have demonstrated that the use of this methodology results in a high quality, cost-effective product. 15 refs., 6 figs. (author)

  16. Seismic verification of underground explosions

    International Nuclear Information System (INIS)

    Glenn, L.A.

    1985-06-01

    The first nuclear test agreement, the test moratorium, was made in 1958 and lasted until the Soviet Union unilaterally resumed testing in the atmosphere in 1961. It was followed by the Limited Test Ban Treaty of 1963, which prohibited nuclear tests in the atmosphere, in outer space, and underwater. In 1974 the Threshold Test Ban Treaty (TTBT) was signed, limiting underground tests after March 1976 to a maximum yield of 250 kt. The TTBT was followed by a treaty limiting peaceful nuclear explosions and both the United States and the Soviet Union claim to be abiding by the 150-kt yield limit. A comprehensive test ban treaty (CTBT), prohibiting all testing of nuclear weapons, has also been discussed. However, a verifiable CTBT is a contradiction in terms. No monitoring technology can offer absolute assurance that very-low-yield illicit explosions have not occurred. The verification process, evasion opportunities, and cavity decoupling are discussed in this paper

  17. Verification of ceramic structures

    NARCIS (Netherlands)

    Behar-Lafenetre, S.; Cornillon, L.; Rancurel, M.; Graaf, D. de; Hartmann, P.; Coe, G.; Laine, B.

    2012-01-01

    In the framework of the "Mechanical Design and Verification Methodologies for Ceramic Structures" contract [1] awarded by ESA, Thales Alenia Space has investigated literature and practices in affiliated industries to propose a methodological guideline for verification of ceramic spacecraft and

  18. CTBT Integrated Verification System Evaluation Model

    Energy Technology Data Exchange (ETDEWEB)

    Edenburn, M.W.; Bunting, M.L.; Payne, A.C. Jr.

    1997-10-01

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia`s Monitoring Systems and Technology Center and has been funded by the US Department of Energy`s Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, top-level, modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM`s unique features is that it integrates results from the various CTBT sensor technologies (seismic, infrasound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection) and location accuracy of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system`s performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. This report describes version 1.2 of IVSEM.

  19. Neutron spectrometric methods for core inventory verification in research reactors

    International Nuclear Information System (INIS)

    Ellinger, A.; Filges, U.; Hansen, W.; Knorr, J.; Schneider, R.

    2002-01-01

    In consequence of the Non-Proliferation Treaty safeguards, inspections are periodically made in nuclear facilities by the IAEA and the EURATOM Safeguards Directorate. The inspection methods are permanently improved. Therefore, the Core Inventory Verification method is being developed as an indirect method for the verification of the core inventory and to check the declared operation of research reactors

  20. Getting Help

    Science.gov (United States)

    ... NIAAA College Materials Supporting Research Special Features CollegeAIM College Administrators Parents & Students Home > Special Features > Getting Help Getting Help Resources from NIAAA Treatment for Alcohol Problems: Finding and Getting Help This guide from ...

  1. Verification of Simulation Tools

    International Nuclear Information System (INIS)

    Richard, Thierry

    2015-01-01

    Before qualifying a simulation tool, the requirements shall first be clearly identified, i.e.: - What type of study needs to be carried out? - What phenomena need to be modeled? This phase involves writing a precise technical specification. Once the requirements are defined, the most adapted product shall be selected from the various software options available on the market. Before using a particular version of a simulation tool to support the demonstration of nuclear safety studies, the following requirements shall be met. - An auditable quality assurance process complying with development international standards shall be developed and maintained, - A process of verification and validation (V and V) shall be implemented. This approach requires: writing a report and/or executive summary of the V and V activities, defining a validated domain (domain in which the difference between the results of the tools and those of another qualified reference is considered satisfactory for its intended use). - Sufficient documentation shall be available, - A detailed and formal description of the product (software version number, user configuration, other settings and parameters) in the targeted computing environment shall be available. - Source codes corresponding to the software shall be archived appropriately. When these requirements are fulfilled, the version of the simulation tool shall be considered qualified for a defined domain of validity, in a given computing environment. The functional verification shall ensure that: - the computer architecture of the tool does not include errors, - the numerical solver correctly represents the physical mathematical model, - equations are solved correctly. The functional verification can be demonstrated through certification or report of Quality Assurance. The functional validation shall allow the user to ensure that the equations correctly represent the physical phenomena in the perimeter of intended use. The functional validation can

  2. Proceedings of the Defense Nuclear Agency Conference on Arms Control and Verification Technology (ACT) Held in Williamsburg, Virginia on 1-4 June 1992

    Science.gov (United States)

    1993-12-01

    vapor recovery system or flare . For instance, under these regulations, sampling connecting systems must be equipped with a closed-purge system or closed...12% 233U/U) PWR BWR Total HM (kg) 460 188 460 460(130 U)a Charge (kg) 235U 13.5 5.5 10.6 0.9 233U - - 13.8 Pu - - 3.7 - Discharge (kg) 235U 3.5 1.6...early 1991.5 The purpose of the ARS experiments was to simulate CW verification measurements under realistic conditions and to determine the maximum

  3. INF and IAEA: A comparative analysis of verification strategy

    International Nuclear Information System (INIS)

    Scheinman, L.; Kratzer, M.

    1992-07-01

    This is the final report of a study on the relevance and possible lessons of Intermediate Range Nuclear Force (INF) verification to the International Atomic Energy Agency (IAEA) international safeguards activities

  4. Verification and validation of deterministic radiation transport numerical methods, codes, and nuclear data for estimating radiation dose to patients during CT scan

    International Nuclear Information System (INIS)

    Hykes, J. M.; Azmy, Y. Y.; Schunert, S.; King, S. H.; Klingensmith, J. J.

    2009-01-01

    The goal of this work is to determine the viability of modeling an important x-ray procedure, the computed tomography (CT) scan of a pregnant woman and her conceptus using a deterministic radiation transport program. A prior experimental study provides the deposited dose as measured in an anthropomorphic phantom, with detectors positioned in the estimated uterine location. In this paper, we first verify the discrete ordinates code TORT3.2 and a suitably constructed multigroup cross section library against the Monte Carlo code MCNP5. Using MCNP, we demonstrate that accounting for the transport of secondary electrons is unnecessary in tissue-equivalent material. After demonstrating proper verification, we proceed to validate the MCNP and TORT simulations against data measured for the CTDI FDA phantom. In the model, the computed edge-to-center dose ratio is within experimental uncertainty, while the computed exposures are less than 35% from the measured values. (authors)

  5. Physics Verification Overview

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-12

    The purpose of the verification project is to establish, through rigorous convergence analysis, that each ASC computational physics code correctly implements a set of physics models and algorithms (code verification); Evaluate and analyze the uncertainties of code outputs associated with the choice of temporal and spatial discretization (solution or calculation verification); and Develop and maintain the capability to expand and update these analyses on demand. This presentation describes project milestones.

  6. Software verification and testing

    Science.gov (United States)

    1985-01-01

    General procedures for software verification and validation are provided as a guide for managers, programmers, and analysts involved in software development. The verification and validation procedures described are based primarily on testing techniques. Testing refers to the execution of all or part of a software system for the purpose of detecting errors. Planning, execution, and analysis of tests are outlined in this document. Code reading and static analysis techniques for software verification are also described.

  7. Sandia technology. Volume 13, number 2 Special issue: verification of arms control treaties

    International Nuclear Information System (INIS)

    1989-01-01

    Nuclear deterrence, a cornerstone of US national security policy, has helped prevent global conflict for over 40 years. The DOE and DoD share responsibility for this vital part of national security. The US will continue to rely on nuclear deterrence for the foreseeable future. In the late 1950s, Sandia developed satellite-borne nuclear burst detection systems to support the treaty banning atmospheric nuclear tests. This activity has continued to expand and diversify. When the Non-Proliferation Treaty was ratified in 1970, we began to develop technologies to protect nuclear materials from falling into unauthorized hands. This program grew and now includes systems for monitoring the movement and storage of nuclear materials, detecting tampering, and transmiting sensitive data securely. In the late 1970s, negotiations to further limit underground nuclear testing were being actively pursued. In less than 18 months, we fielded the National Seismic Station, an unattended observatory for in-country monitoring of nuclear tests. In the mid-l980s, arms-control interest shifted to facility monitoring and on-site inspection. Our Technical On-site Inspection Facility is the national test bed for perimeter and portal monitoring technology and the prototype for the inspection portal that was recently installed in the USSR under the Intermediate-Range Nuclear Forces accord. The articles in the special issue of Sundiu Technology describe some of our current contributions to verification technology. This work supports the US policy to seek realistic arms control agreements while maintaining our national security.

  8. Sandia technology. Volume 13, number 2 Special issue : verification of arms control treaties.

    Energy Technology Data Exchange (ETDEWEB)

    1989-03-01

    Nuclear deterrence, a cornerstone of US national security policy, has helped prevent global conflict for over 40 years. The DOE and DoD share responsibility for this vital part of national security. The US will continue to rely on nuclear deterrence for the foreseeable future. In the late 1950s, Sandia developed satellite-borne nuclear burst detection systems to support the treaty banning atmospheric nuclear tests. This activity has continued to expand and diversify. When the Non-Proliferation Treaty was ratified in 1970, we began to develop technologies to protect nuclear materials from falling into unauthorized hands. This program grew and now includes systems for monitoring the movement and storage of nuclear materials, detecting tampering, and transmiting sensitive data securely. In the late 1970s, negotiations to further limit underground nuclear testing were being actively pursued. In less than 18 months, we fielded the National Seismic Station, an unattended observatory for in-country monitoring of nuclear tests. In the mid-l980s, arms-control interest shifted to facility monitoring and on-site inspection. Our Technical On-site Inspection Facility is the national test bed for perimeter and portal monitoring technology and the prototype for the inspection portal that was recently installed in the USSR under the Intermediate-Range Nuclear Forces accord. The articles in the special issue of Sundiu Technology describe some of our current contributions to verification technology. This work supports the US policy to seek realistic arms control agreements while maintaining our national security.

  9. Inspector measurement verification activities

    International Nuclear Information System (INIS)

    George, R.S.; Crouch, R.

    e most difficult and complex activity facing a safeguards inspector involves the verification of measurements and the performance of the measurement system. Remeasurement is the key to measurement verification activities. Remeasurerements using the facility's measurement system provide the bulk of the data needed for determining the performance of the measurement system. Remeasurements by reference laboratories are also important for evaluation of the measurement system and determination of systematic errors. The use of these measurement verification activities in conjunction with accepted inventory verification practices provides a better basis for accepting or rejecting an inventory. (U.S.)

  10. Implementation and verification of nuclear interactions in a Monte-Carlo code for the Procom-ProGam proton therapy planning system

    International Nuclear Information System (INIS)

    Kostyuchenko, V.I.; Makarova, A.S.; Ryazantsev, O.B.; Samarin, S.I.; Uglov, A.S.

    2013-01-01

    Proton interaction with an exposed object material needs to be modeled with account for three basic processes: electromagnetic stopping of protons in matter, multiple coulomb scattering and nuclear interactions. Just the last type of processes is the topic of this paper. Monte Carlo codes are often used to simulate high-energy particle interaction with matter. However, nuclear interaction models implemented in these codes are rather extensive and their use in treatment planning systems requires huge computational resources. We have selected the IThMC code for its ability to reproduce experiments which measure the distribution of the projected ranges of nuclear secondary particles generated by proton beams in a multi-layer Faraday cup. The multi-layer Faraday cup detectors measure charge rather than dose and allow distinguishing between electromagnetic and nuclear interactions. The event generator used in the IThMC code is faster, but less accurate than any other used in testing. Our model of nuclear reactions demonstrates quite good agreement with experiment in the context of their effect on the Bragg peak in therapeutic applications

  11. Burnup verification tests with the FORK measurement system-implementation for burnup credit

    International Nuclear Information System (INIS)

    Ewing, R.I.

    1994-01-01

    Verification measurements may be used to help ensure nuclear criticality safety when burnup credit is applied to spent fuel transport and storage systems. The FORK system measures the passive neutron and gamma-ray emission from spent fuel assemblies while in the storage pool. It was designed at Los Alamos National Laboratory for the International Atomic Energy Agency safeguards program and is well suited to verify burnup and cooling time records at commercial Pressurized Water Reactor (PWR) sites. This report deals with the application of the FORK system to burnup credit operations

  12. Helping to eliminate vitamin A deficiency disorders using nuclear and related techniques. Report of an IAEA consultants' meeting, 30 November - 2 December 1994

    International Nuclear Information System (INIS)

    1995-01-01

    A Consultants' Meeting was convened by the IAEA from 30 November to 2 December 1994, and made recommendations on the objectives and strategies of a new Coordinated Research Programme (CRP), ''Helping to Eliminate Vitamin A Deficiency Disorders Using Nuclear and Related Techniques''. The objectives of the CRP will be to i) develop and/or modify isotopic and related techniques for measuring whole body retinol stores and carotenoid bioavailability and bioconversion which can be transferred to food-based vitamin A intervention programmes in developing countries; ii) evaluate and improve the sensitivity of commonly used biological, ecological, and dietary indicators of vitamin A status in human populations; iii) formulate model protocols which incorporate isotopic and related techniques in evaluations of intervention programmes, in collaboration with expert nutrition groups (e.g., WHO, FAO, UNICEF, MI, USAID, etc.). Priority will be given to proposals which aim to improve or validate the deuterated retinol dilution method for measuring retinol stores, particularly during pregnancy or during the complementary feeding in young children, and which propose to develop appropriate methods for measuring absorption and the bioavailability of provitamin A carotenoids. The production of uniformly-labelled carotenoids is of particular interest but proposals which use extrinsic labels as well as non-isotopic methods will also be considered. The studies should be conducted in developing countries through collaborations via 'twinning' relationships between scientists of developing and industrialized countries. 19 refs, 2 figs

  13. Validation for application of the Monte Carlo simulation code for 235U mass content verification for large size samples of nuclear materials

    Directory of Open Access Journals (Sweden)

    M.S. El Tahawy

    2014-03-01

    Full Text Available In this work, a new semi- absolute non-destructive assay technique has been developed to verify the mass content of 235U in the large sizes nuclear material samples of different enrichment through combination of experimental measurements and Mont Carlo calculations (version MCNP5. A good agreement was found between the calculated and declared values of the mass content of 235U of uranium oxide (UO2 samples. The results obtained from Mont Carlo calculations showed that the semi-absolute technique can be used with sufficient reliability to verify the uranium mass content in the large sizes nuclear material samples of different enrichment.

  14. Modelling of near-field radionuclide transport phenomena in a KBS-3V type of repository for nuclear waste with Goldsim Code - and verification against previous methods

    International Nuclear Information System (INIS)

    Pulkkanen, V.-M.; Nordman, H.

    2010-03-01

    Traditional radionuclide transport models overestimate significantly some phenomena, or completely ignore them. This motivates the development of new more precise models. As a result, this work is a description of commissioning of a new KBS-3V near-field radionuclide transport model, which has been done with a commercial software called GoldSim. According to earlier models, GoldSim model uses rz coordinates, but the solubilities of radionuclides have been treated more precisely. To begin with, the physical phenomena concerning near-field transport have been introduced according to GoldSim way of thinking. Also, the computational methods of GoldSim have been introduced and compared to methods used earlier. The actual verification of GoldSim model has been carried out by comparing the GoldSim results from simple cases to the corresponding results obtained with REPCOM, a software developed by VTT and used in several safety assessments. The results agree well. Finally, a few complicated cases were studied. In these cases, the REPCOM's limitations in handling of some phenomena become evident. The differences in the results are caused especially by the extension of the solubility limit to the whole computational domain, and the element-wise treatment of the solubilities which was used instead of nuclide-wise treatment. This work has been carried out as a special assignment to the former laboratory of Advanced Energy Systems in Helsinki University of Technology. The work was done at VTT. (orig.)

  15. Modelling of near-field radionuclide transport phenomena in a KBS-3V type of repository for nuclear waste with Goldsim Code - and verification against previous methods

    Energy Technology Data Exchange (ETDEWEB)

    Pulkkanen, V.-M.; Nordman, H. (VTT Technical Research Centre, Espoo (Finland))

    2010-03-15

    Traditional radionuclide transport models overestimate significantly some phenomena, or completely ignore them. This motivates the development of new more precise models. As a result, this work is a description of commissioning of a new KBS-3V near-field radionuclide transport model, which has been done with a commercial software called GoldSim. According to earlier models, GoldSim model uses rz coordinates, but the solubilities of radionuclides have been treated more precisely. To begin with, the physical phenomena concerning near-field transport have been introduced according to GoldSim way of thinking. Also, the computational methods of GoldSim have been introduced and compared to methods used earlier. The actual verification of GoldSim model has been carried out by comparing the GoldSim results from simple cases to the corresponding results obtained with REPCOM, a software developed by VTT and used in several safety assessments. The results agree well. Finally, a few complicated cases were studied. In these cases, the REPCOM's limitations in handling of some phenomena become evident. The differences in the results are caused especially by the extension of the solubility limit to the whole computational domain, and the element-wise treatment of the solubilities which was used instead of nuclide-wise treatment. This work has been carried out as a special assignment to the former laboratory of Advanced Energy Systems in Helsinki University of Technology. The work was done at VTT. (orig.)

  16. Numerical Verification Of Equilibrium Chemistry

    International Nuclear Information System (INIS)

    Piro, Markus; Lewis, Brent; Thompson, William T.; Simunovic, Srdjan; Besmann, Theodore M.

    2010-01-01

    A numerical tool is in an advanced state of development to compute the equilibrium compositions of phases and their proportions in multi-component systems of importance to the nuclear industry. The resulting software is being conceived for direct integration into large multi-physics fuel performance codes, particularly for providing boundary conditions in heat and mass transport modules. However, any numerical errors produced in equilibrium chemistry computations will be propagated in subsequent heat and mass transport calculations, thus falsely predicting nuclear fuel behaviour. The necessity for a reliable method to numerically verify chemical equilibrium computations is emphasized by the requirement to handle the very large number of elements necessary to capture the entire fission product inventory. A simple, reliable and comprehensive numerical verification method is presented which can be invoked by any equilibrium chemistry solver for quality assurance purposes.

  17. Managing the Verification Trajectory

    NARCIS (Netherlands)

    Ruys, T.C.; Brinksma, Hendrik

    In this paper we take a closer look at the automated analysis of designs, in particular of verification by model checking. Model checking tools are increasingly being used for the verification of real-life systems in an industrial context. In addition to ongoing research aimed at curbing the

  18. Verification Account Management System (VAMS)

    Data.gov (United States)

    Social Security Administration — The Verification Account Management System (VAMS) is the centralized location for maintaining SSA's verification and data exchange accounts. VAMS account management...

  19. Heavy water physical verification in power plants

    International Nuclear Information System (INIS)

    Morsy, S.; Schuricht, V.; Beetle, T.; Szabo, E.

    1986-01-01

    This paper is a report on the Agency experience in verifying heavy water inventories in power plants. The safeguards objectives and goals for such activities are defined in the paper. The heavy water is stratified according to the flow within the power plant, including upgraders. A safeguards scheme based on a combination of records auditing, comparing records and reports, and physical verification has been developed. This scheme has elevated the status of heavy water safeguards to a level comparable to nuclear material safeguards in bulk facilities. It leads to attribute and variable verification of the heavy water inventory in the different system components and in the store. The verification methods include volume and weight determination, sampling and analysis, non-destructive assay (NDA), and criticality check. The analysis of the different measurement methods and their limits of accuracy are discussed in the paper

  20. Verification of a Fissile Material Cut-off Treaty (FMCT): The Potential Role of the IAEA

    International Nuclear Information System (INIS)

    Chung, Jin Ho

    2016-01-01

    The objective of a future verification of a FMCT(Fissile Material Cut-off Treaty) is to deter and detect non-compliance with treaty obligations in a timely and non-discriminatory manner with regard to banning the production of fissile material for nuclear weapons or other nuclear devices. Since the International Atomic Energy Agency (IAEA) has already established the IAEA safeguards as a verification system mainly for Non -Nuclear Weapon States (NNWSs), it is expected that the IAEA's experience and expertise in this field will make a significant contribution to setting up a future treaty's verification regime. This paper is designed to explore the potential role of the IAEA in verifying the future treaty by analyzing verification abilities of the Agency in terms of treaty verification and expected challenges. Furthermore, the concept of multilateral verification that could be facilitated by the IAEA will be examined as a measure of providing a credible assurance of compliance with a future treaty. In this circumstance, it is necessary for the IAEA to be prepared for playing a leading role in FMCT verifications as a form of multilateral verification by taking advantage of its existing verification concepts, methods, and tools. Also, several challenges that the Agency faces today need to be overcome, including dealing with sensitive and proliferative information, attribution of fissile materials, lack of verification experience in military fuel cycle facilities, and different attitude and culture towards verification between NWSs and NNWSs

  1. Verification of a Fissile Material Cut-off Treaty (FMCT): The Potential Role of the IAEA

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Jin Ho [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-05-15

    The objective of a future verification of a FMCT(Fissile Material Cut-off Treaty) is to deter and detect non-compliance with treaty obligations in a timely and non-discriminatory manner with regard to banning the production of fissile material for nuclear weapons or other nuclear devices. Since the International Atomic Energy Agency (IAEA) has already established the IAEA safeguards as a verification system mainly for Non -Nuclear Weapon States (NNWSs), it is expected that the IAEA's experience and expertise in this field will make a significant contribution to setting up a future treaty's verification regime. This paper is designed to explore the potential role of the IAEA in verifying the future treaty by analyzing verification abilities of the Agency in terms of treaty verification and expected challenges. Furthermore, the concept of multilateral verification that could be facilitated by the IAEA will be examined as a measure of providing a credible assurance of compliance with a future treaty. In this circumstance, it is necessary for the IAEA to be prepared for playing a leading role in FMCT verifications as a form of multilateral verification by taking advantage of its existing verification concepts, methods, and tools. Also, several challenges that the Agency faces today need to be overcome, including dealing with sensitive and proliferative information, attribution of fissile materials, lack of verification experience in military fuel cycle facilities, and different attitude and culture towards verification between NWSs and NNWSs.

  2. The Challenge for Arms Control Verification in the Post-New START World

    Energy Technology Data Exchange (ETDEWEB)

    Wuest, C R

    2012-05-24

    Nuclear weapon arms control treaty verification is a key aspect of any agreement between signatories to establish that the terms and conditions spelled out in the treaty are being met. Historically, arms control negotiations have focused more on the rules and protocols for reducing the numbers of warheads and delivery systems - sometimes resorting to complex and arcane procedures for counting forces - in an attempt to address perceived or real imbalances in a nation's strategic posture that could lead to instability. Verification procedures are generally defined in arms control treaties and supporting documents and tend to focus on technical means and measures designed to ensure that a country is following the terms of the treaty and that it is not liable to engage in deception or outright cheating in an attempt to circumvent the spirit and the letter of the agreement. As the Obama Administration implements the articles, terms, and conditions of the recently ratified and entered-into-force New START treaty, there are already efforts within and outside of government to move well below the specified New START levels of 1550 warheads, 700 deployed strategic delivery vehicles, and 800 deployed and nondeployed strategic launchers (Inter-Continental Ballistic Missile (ICBM) silos, Submarine-Launched Ballistic Missile (SLBM) tubes on submarines, and bombers). A number of articles and opinion pieces have appeared that advocate for significantly deeper cuts in the U.S. nuclear stockpile, with some suggesting that unilateral reductions on the part of the U.S. would help coax Russia and others to follow our lead. Papers and studies prepared for the U.S. Department of Defense and at the U.S. Air War College have also been published, suggesting that nuclear forces totaling no more than about 300 warheads would be sufficient to meet U.S. national security and deterrence needs. (Davis 2011, Schaub and Forsyth 2010) Recent articles by James M. Acton and others suggest that

  3. Advanced verification topics

    CERN Document Server

    Bhattacharya, Bishnupriya; Hall, Gary; Heaton, Nick; Kashai, Yaron; Khan Neyaz; Kirshenbaum, Zeev; Shneydor, Efrat

    2011-01-01

    The Accellera Universal Verification Methodology (UVM) standard is architected to scale, but verification is growing and in more than just the digital design dimension. It is growing in the SoC dimension to include low-power and mixed-signal and the system integration dimension to include multi-language support and acceleration. These items and others all contribute to the quality of the SOC so the Metric-Driven Verification (MDV) methodology is needed to unify it all into a coherent verification plan. This book is for verification engineers and managers familiar with the UVM and the benefits it brings to digital verification but who also need to tackle specialized tasks. It is also written for the SoC project manager that is tasked with building an efficient worldwide team. While the task continues to become more complex, Advanced Verification Topics describes methodologies outside of the Accellera UVM standard, but that build on it, to provide a way for SoC teams to stay productive and profitable.

  4. Search Help

    Science.gov (United States)

    Guidance and search help resource listing examples of common queries that can be used in the Google Search Appliance search request, including examples of special characters, or query term seperators that Google Search Appliance recognizes.

  5. Help LEP

    CERN Multimedia

    Carreras,R; Lehmann,P

    1988-01-01

    première partie: Help LEP ou le tunnel de l'infini- pièce radiophonique intéréssant sur l'origine de la matière deuxième partie: Help LEP débat; suite à cette pièce interview avec 3 physiciens du Cern sur le projet LEP et le but du Cern qui est la recherche fondamentale

  6. Packaged low-level waste verification system

    International Nuclear Information System (INIS)

    Tuite, K.T.; Winberg, M.; Flores, A.Y.; Killian, E.W.; McIsaac, C.V.

    1996-01-01

    Currently, states and low-level radioactive waste (LLW) disposal site operators have no method of independently verifying the radionuclide content of packaged LLW that arrive at disposal sites for disposal. At this time, disposal sites rely on LLW generator shipping manifests and accompanying records to insure that LLW received meets the waste acceptance criteria. An independent verification system would provide a method of checking generator LLW characterization methods and help ensure that LLW disposed of at disposal facilities meets requirements. The Mobile Low-Level Waste Verification System (MLLWVS) provides the equipment, software, and methods to enable the independent verification of LLW shipping records to insure that disposal site waste acceptance criteria are being met. The MLLWVS system was developed under a cost share subcontract between WMG, Inc., and Lockheed Martin Idaho Technologies through the Department of Energy's National Low-Level Waste Management Program at the Idaho National Engineering Laboratory (INEL)

  7. Standard Verification System (SVS)

    Data.gov (United States)

    Social Security Administration — SVS is a mainframe program that accesses the NUMIDENT to perform SSN verifications. This program is called by SSA Internal applications to verify SSNs. There is also...

  8. SSN Verification Service

    Data.gov (United States)

    Social Security Administration — The SSN Verification Service is used by Java applications to execute the GUVERF02 service using the WebSphere/CICS Interface. It accepts several input data fields...

  9. Verification of RADTRAN

    International Nuclear Information System (INIS)

    Kanipe, F.L.; Neuhauser, K.S.

    1995-01-01

    This document presents details of the verification process of the RADTRAN computer code which was established for the calculation of risk estimates for radioactive materials transportation by highway, rail, air, and waterborne modes

  10. Training for the seismic qualification utility group (SQUG) generic implementation procedure (GIP) for verification of seismic effects on nuclear power plant equipment

    International Nuclear Information System (INIS)

    Schaffstall, R.E.; Smith, N.P.; Baker, K.M.

    1993-01-01

    Resolution of USI A-46 was accomplished May, 1992 with the issuance of the SER for the GIP, Revision 2. The implementation of the resolution for the SQUG plants will be completed by 1996. Both the USNRC and the SQUG utilities have expended considerable resources to effect a common understanding that the effort has been worth the price. The Training Program developed to ensure that the efforts expended by the SQUG was indeed worth the price will be a major contributor in the success of the implementation. All of the older nuclear power plants in the United States now have an alternative standard to determine seismic resistance using experience data- a standard against which they can be evaluated and found seismically adequate to achieve and maintain a safe and reliable shutdown when subjected to strong motion earthquakes

  11. Systems Approach to Arms Control Verification

    Energy Technology Data Exchange (ETDEWEB)

    Allen, K; Neimeyer, I; Listner, C; Stein, G; Chen, C; Dreicer, M

    2015-05-15

    Using the decades of experience of developing concepts and technologies for verifying bilateral and multilateral arms control agreements, a broad conceptual systems approach is being developed that takes into account varying levels of information and risk. The IAEA has already demonstrated the applicability of a systems approach by implementing safeguards at the State level, with acquisition path analysis as the key element. In order to test whether such an approach could also be implemented for arms control verification, an exercise was conducted in November 2014 at the JRC ITU Ispra. Based on the scenario of a hypothetical treaty between two model nuclear weapons states aimed at capping their nuclear arsenals at existing levels, the goal of this exercise was to explore how to use acquisition path analysis in an arms control context. Our contribution will present the scenario, objectives and results of this exercise, and attempt to define future workshops aimed at further developing verification measures that will deter or detect treaty violations.

  12. Software verification and validation plan for the GWSCREEN code

    International Nuclear Information System (INIS)

    Rood, A.S.

    1993-05-01

    The purpose of this Software Verification and Validation Plan (SVVP) is to prescribe steps necessary to verify and validate the GWSCREEN code, version 2.0 to Quality Level B standards. GWSCREEN output is to be verified and validated by comparison with hand calculations, and by output from other Quality Level B computer codes. Verification and validation will also entail performing static and dynamic tests on the code using several analysis tools. This approach is consistent with guidance in the ANSI/ANS-10.4-1987, open-quotes Guidelines for Verification and Validation of Scientific and Engineering Computer Programs for the Nuclear Industry.close quotes

  13. RISKIND verification and benchmark comparisons

    Energy Technology Data Exchange (ETDEWEB)

    Biwer, B.M.; Arnish, J.J.; Chen, S.Y.; Kamboj, S.

    1997-08-01

    This report presents verification calculations and benchmark comparisons for RISKIND, a computer code designed to estimate potential radiological consequences and health risks to individuals and the population from exposures associated with the transportation of spent nuclear fuel and other radioactive materials. Spreadsheet calculations were performed to verify the proper operation of the major options and calculational steps in RISKIND. The program is unique in that it combines a variety of well-established models into a comprehensive treatment for assessing risks from the transportation of radioactive materials. Benchmark comparisons with other validated codes that incorporate similar models were also performed. For instance, the external gamma and neutron dose rate curves for a shipping package estimated by RISKIND were compared with those estimated by using the RADTRAN 4 code and NUREG-0170 methodology. Atmospheric dispersion of released material and dose estimates from the GENII and CAP88-PC codes. Verification results have shown the program to be performing its intended function correctly. The benchmark results indicate that the predictions made by RISKIND are within acceptable limits when compared with predictions from similar existing models.

  14. RISKIND verification and benchmark comparisons

    International Nuclear Information System (INIS)

    Biwer, B.M.; Arnish, J.J.; Chen, S.Y.; Kamboj, S.

    1997-08-01

    This report presents verification calculations and benchmark comparisons for RISKIND, a computer code designed to estimate potential radiological consequences and health risks to individuals and the population from exposures associated with the transportation of spent nuclear fuel and other radioactive materials. Spreadsheet calculations were performed to verify the proper operation of the major options and calculational steps in RISKIND. The program is unique in that it combines a variety of well-established models into a comprehensive treatment for assessing risks from the transportation of radioactive materials. Benchmark comparisons with other validated codes that incorporate similar models were also performed. For instance, the external gamma and neutron dose rate curves for a shipping package estimated by RISKIND were compared with those estimated by using the RADTRAN 4 code and NUREG-0170 methodology. Atmospheric dispersion of released material and dose estimates from the GENII and CAP88-PC codes. Verification results have shown the program to be performing its intended function correctly. The benchmark results indicate that the predictions made by RISKIND are within acceptable limits when compared with predictions from similar existing models

  15. Verification of the databases EXFOR and ENDF

    Science.gov (United States)

    Berton, Gottfried; Damart, Guillaume; Cabellos, Oscar; Beauzamy, Bernard; Soppera, Nicolas; Bossant, Manuel

    2017-09-01

    The objective of this work is for the verification of large experimental (EXFOR) and evaluated nuclear reaction databases (JEFF, ENDF, JENDL, TENDL…). The work is applied to neutron reactions in EXFOR data, including threshold reactions, isomeric transitions, angular distributions and data in the resonance region of both isotopes and natural elements. Finally, a comparison of the resonance integrals compiled in EXFOR database with those derived from the evaluated libraries is also performed.

  16. Development of technologies for national control of and accountancy for nuclear materials

    International Nuclear Information System (INIS)

    Choi, Young Myung; Kwack, E. H.; Kim, B. K.

    2002-03-01

    The aim of this project is to establish a rigid foundation of national safeguards and to develop the new technologies for the nuclear control. This project is composed of four different technologies; 1. Monitoring technology for nuclear materials, 2. Detection technology for a single particle, 3. Safeguards information management technology, 4. Physical protection technology. Various studies such as a remote verification system for CANDU spent fuel in dry storage canister, a spent fuel verification system using an optical fiber scintillator, and development of softwares for safeguards and physical protection were performed in the frist phase('99-'01). As a result of this research, it has been identified that the developed technologies could be a crucial means of the control for the nuclear material and facilities related. We are planing to accomplish a steady national safeguard system in the second phase('02-'06). This research will help to elevate the transparency and credibility in national nuclear activities by improving the relative technologies

  17. A Human Factors Design Verification on MMI and Control console of the ARM Prototype of the Korean Standard Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Oh, In Seok; Lee, Jung Woon; Lee, Yong Hee; Lee, Hyun Chul; Park, Jae Chang; Hwang, In Koo; Jang, Tong Il; Kim, Dae Ho; Hwang, Seong Hwan; Park, Jae Kyu

    2007-12-15

    In this study, a human factors evaluation was performed on the display and control panel design of AFHS (Advanced Fuel Handling System) for the SKN 3 and 4 units. In order to evaluate the HSI design, we set up an improvements strategy of the designed interfaces in consideration of the latest human factors guidelines such as NUREG-0700 Rev.2 and NUREG-0711. The evaluation was focused on appropriateness and suitability of the operating displays and control panel configuration of the system which is designed to be used in loading and unloading tasks of nuclear fuels in the reactor building. As the result of this evaluation, A set of HEDs (Human Engineering Discrepancies) to be changed were selected. Although those items were not significant problems in the aspect of human factors, they were determined to be resolved to enhance the operator's performance and convenience. KAERI suggested the design alternatives on those issue items to the designers and repeated the design-reviews on the design changes of interface elements. Through the review-and-change process, all the HEDs and HSI issues were resolved and adopted in the final design process.

  18. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  19. Calculating the new global nuclear terrorism threat

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA on 29 October to 2 November at an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. Although terrorists have never used a nuclear weapon, reports that some terrorist groups, particularly al-Qaeda, have attempted to acquire nuclear material is a cause of great concern. According to the IAEA, since 1993, there have been 175 cases of trafficking in nuclear material and 201 cases of trafficking in other radioactive sources (medical, industrial). However, only 18 of these cases have actually involved small amounts of highly enriched uranium or plutonium, the material needed to produce a nuclear bomb. IAEA experts judge the quantities involved to be insufficient to construct a nuclear explosive device. The IAEA experts have evaluated the risks for nuclear terrorism in these three categories: Nuclear facilities; Nuclear Material; Radioactive Sources. The IAEA is proposing a number of new initiatives, including strengthening border monitoring, helping States search for and dispose of orphan sources and strengthening the capabilities of the IAEA Emergency Response Centre to react to radiological emergencies following a terrorist attack. In the short term, the IAEA estimates that at least $30-$50 million annually will be needed to strengthen and expand its programs to meet this terrorist threat

  20. Multi-canister overpack project -- verification and validation, MCNP 4A

    Energy Technology Data Exchange (ETDEWEB)

    Goldmann, L.H.

    1997-11-10

    This supporting document contains the software verification and validation (V and V) package used for Phase 2 design of the Spent Nuclear Fuel Multi-Canister Overpack. V and V packages for both ANSYS and MCNP are included. Description of Verification Run(s): This software requires that it be compiled specifically for the machine it is to be used on. Therefore to facilitate ease in the verification process the software automatically runs 25 sample problems to ensure proper installation and compilation. Once the runs are completed the software checks for verification by performing a file comparison on the new output file and the old output file. Any differences between any of the files will cause a verification error. Due to the manner in which the verification is completed a verification error does not necessarily indicate a problem. This indicates that a closer look at the output files is needed to determine the cause of the error.

  1. Verification of wet blasting decontamination technology

    International Nuclear Information System (INIS)

    Matsubara, Sachito; Murayama, Kazunari; Yoshida, Hirohisa; Igei, Shigemitsu; Izumida, Tatsuo

    2013-01-01

    Macoho Co., Ltd. participated in the projects of 'Decontamination Verification Test FY 2011 by the Ministry of the Environment' and 'Decontamination Verification Test FY 2011 by the Cabinet Office.' And we tested verification to use a wet blasting technology for decontamination of rubble and roads contaminated by the accident of Fukushima Daiichi Nuclear Power Plant of the Tokyo Electric Power Company. As a results of the verification test, the wet blasting decontamination technology showed that a decontamination rate became 60-80% for concrete paving, interlocking, dense-grated asphalt pavement when applied to the decontamination of the road. When it was applied to rubble decontamination, a decontamination rate was 50-60% for gravel and approximately 90% for concrete and wood. It was thought that Cs-134 and Cs-137 attached to the fine sludge scraped off from a decontamination object and the sludge was found to be separated from abrasives by wet cyclene classification: the activity concentration of the abrasives is 1/30 or less than the sludge. The result shows that the abrasives can be reused without problems when the wet blasting decontamination technology is used. (author)

  2. The Concept of Conversion Factors and Reference Crops for the Prediction of 137Cs Root Uptake: Field Verification in Post-Chernobyl Landscape, 30 Years after Nuclear Accident

    Science.gov (United States)

    Komissarova, Olga; Paramonova, Tatiana

    2017-04-01

    One of the notable lessons obtained from nuclear accidents could be revealing the general features of 137Cs root uptake by agricultural crops for prediction the radionuclide accumulation in plants and its further distribution via food chains. Transfer factors (TFs) (the ratio of 137Cs activities in vegetation and in soil) have become a basis for such assessment when the characteristics of radioactive contamination, soil properties and phylogenetic features of different plant taxons important for root uptake are known. For the sake of simplicity the concept of conversion factor (CF) was accepted by IAEA (2006) to obtain unknown value of TF from the TF value of the reference crop cultivated on the same soil. Cereals were selected like reference group of agricultural crops. Presuming TF for cereals equal 1, CFs for tubers and fodder leguminous are 4, for grasses - 4.5, for leafy vegetables - 9, ets. To verify TFs and corresponding CFs values under environmental conditions of post-Chernobyl agricultural landscape the study in the area of Plavsky radioactive hotspot (Tula region, Russia) was conducted. Nowadays, after 30 years after the Chernobyl accident ( the first half-life period of 137Cs), arable chernozems of the territory are still polluted at the level 126-282 kBq/m2. The main crops of field rotation: wheat and barley (cereals), potatoes (tubers), soybean (leguminous), amaranth (non-leafy vegetables), rape ("other crops"), as well as galega-bromegrass mixture (cultivated species of grasses) and pasture grasses of semi-natural dry and wet meadows have been studied. Accumulation parameters of 137Cs in aboveground biomass, belowground biomass and edible parts of the plants were examined separately. Experimentally obtained 137Cs TFs in cereals are 0.24-0.32 for total biomass, 0.07-0.14 for aerial parts, 0.54-0.64 for roots and 0.01-0.02 for grain. Thus, (i) 137Cs transfer in grain of wheat and barley is insignificant and (ii) corresponding TFs values in both crops

  3. Engineering a static verification tool for GPU kernels

    OpenAIRE

    Bardsley, E; Betts, A; Chong, N; Collingbourne, P; Deligiannis, P; Donaldson, AF; Ketema, J; Liew, D; Qadeer, S

    2014-01-01

    We report on practical experiences over the last 2.5 years related to the engineering of GPUVerify, a static verification tool for OpenCL and CUDA GPU kernels, plotting the progress of GPUVerify from a prototype to a fully functional and relatively efficient analysis tool. Our hope is that this experience report will serve the verification community by helping to inform future tooling efforts. ? 2014 Springer International Publishing.

  4. Requirement Assurance: A Verification Process

    Science.gov (United States)

    Alexander, Michael G.

    2011-01-01

    Requirement Assurance is an act of requirement verification which assures the stakeholder or customer that a product requirement has produced its "as realized product" and has been verified with conclusive evidence. Product requirement verification answers the question, "did the product meet the stated specification, performance, or design documentation?". In order to ensure the system was built correctly, the practicing system engineer must verify each product requirement using verification methods of inspection, analysis, demonstration, or test. The products of these methods are the "verification artifacts" or "closure artifacts" which are the objective evidence needed to prove the product requirements meet the verification success criteria. Institutional direction is given to the System Engineer in NPR 7123.1A NASA Systems Engineering Processes and Requirements with regards to the requirement verification process. In response, the verification methodology offered in this report meets both the institutional process and requirement verification best practices.

  5. Formal Verification of Computerized Procedure with Colored Petri Nets

    International Nuclear Information System (INIS)

    Kim, Yun Goo; Shin, Yeong Cheol

    2008-01-01

    Computerized Procedure System (CPS) supports nuclear power plant operators in performing operating procedures which are instructions to guide in monitoring, decision making and controlling nuclear power plants. Computerized Procedure (CP) should be loaded to CPS. Due to its execution characteristic, computerized procedure acts like a software in CPS. For example, procedure flows are determined by operator evaluation and computerized procedure logic which are pre-defined. So the verification of Computerized Procedure logic and execution flow is needed before computerized procedures are installed in the system. Formal verification methods are proposed and the modeling of operating procedures with Coloured Petri Nets(CP-nets) is presented

  6. Verification and Validation of Digitally Upgraded Control Rooms

    Energy Technology Data Exchange (ETDEWEB)

    Boring, Ronald [Idaho National Lab. (INL), Idaho Falls, ID (United States); Lau, Nathan [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-09-01

    As nuclear power plants undertake main control room modernization, a challenge is the lack of a clearly defined human factors process to follow. Verification and validation (V&V) as applied in the nuclear power community has tended to involve efforts such as integrated system validation, which comes at the tail end of the design stage. To fill in guidance gaps and create a step-by-step process for control room modernization, we have developed the Guideline for Operational Nuclear Usability and Knowledge Elicitation (GONUKE). This approach builds on best practices in the software industry, which prescribe an iterative user-centered approach featuring multiple cycles of design and evaluation. Nuclear regulatory guidance for control room design emphasizes summative evaluation—which occurs after the design is complete. In the GONUKE approach, evaluation is also performed at the formative stage of design—early in the design cycle using mockups and prototypes for evaluation. The evaluation may involve expert review (e.g., software heuristic evaluation at the formative stage and design verification against human factors standards like NUREG-0700 at the summative stage). The evaluation may also involve user testing (e.g., usability testing at the formative stage and integrated system validation at the summative stage). An additional, often overlooked component of evaluation is knowledge elicitation, which captures operator insights into the system. In this report we outline these evaluation types across design phases that support the overall modernization process. The objective is to provide industry-suitable guidance for steps to be taken in support of the design and evaluation of a new human-machine interface (HMI) in the control room. We suggest the value of early-stage V&V and highlight how this early-stage V&V can help improve the design process for control room modernization. We argue that there is a need to overcome two shortcomings of V&V in current practice

  7. Verification and Validation of Digitally Upgraded Control Rooms

    International Nuclear Information System (INIS)

    Boring, Ronald; Lau, Nathan

    2015-01-01

    As nuclear power plants undertake main control room modernization, a challenge is the lack of a clearly defined human factors process to follow. Verification and validation (V&V) as applied in the nuclear power community has tended to involve efforts such as integrated system validation, which comes at the tail end of the design stage. To fill in guidance gaps and create a step-by-step process for control room modernization, we have developed the Guideline for Operational Nuclear Usability and Knowledge Elicitation (GONUKE). This approach builds on best practices in the software industry, which prescribe an iterative user-centered approach featuring multiple cycles of design and evaluation. Nuclear regulatory guidance for control room design emphasizes summative evaluation - which occurs after the design is complete. In the GONUKE approach, evaluation is also performed at the formative stage of design - early in the design cycle using mockups and prototypes for evaluation. The evaluation may involve expert review (e.g., software heuristic evaluation at the formative stage and design verification against human factors standards like NUREG-0700 at the summative stage). The evaluation may also involve user testing (e.g., usability testing at the formative stage and integrated system validation at the summative stage). An additional, often overlooked component of evaluation is knowledge elicitation, which captures operator insights into the system. In this report we outline these evaluation types across design phases that support the overall modernization process. The objective is to provide industry-suitable guidance for steps to be taken in support of the design and evaluation of a new human-machine interface (HMI) in the control room. We suggest the value of early-stage V&V and highlight how this early-stage V&V can help improve the design process for control room modernization. We argue that there is a need to overcome two shortcomings of V&V in current practice

  8. Process Monitoring for Nuclear Safeguards

    International Nuclear Information System (INIS)

    Ehinger, Michael H.; Pomeroy, George D.; Budlong-Sylvester, Kory W.

    2009-01-01

    Process Monitoring has long been used to evaluate industrial processes and operating conditions in nuclear and non-nuclear facilities. In nuclear applications there is a recognized need to demonstrate the safeguards benefits from using advanced process monitoring on spent fuel reprocessing technologies and associated facilities, as a complement to nuclear materials accounting. This can be accomplished by: defining credible diversion pathway scenarios as a sample problem; using advanced sensor and data analysis techniques to illustrate detection capabilities; and formulating 'event detection' methodologies as a means to quantify performance of the safeguards system. Over the past 30 years there have been rapid advances and improvement in the technology associated with monitoring and control of industrial processes. In the context of bulk handling facilities that process nuclear materials, modern technology can provide more timely information on the location and movement of nuclear material to help develop more effective safeguards. For international safeguards, inspection means verification of material balance data as reported by the operator through the State to the international inspectorate agency. This verification recognizes that the State may be in collusion with the operator to hide clandestine activities, potentially during abnormal process conditions with falsification of data to mask the removal. Records provided may show material is accounted for even though a removal occurred. Process monitoring can offer additional fidelity during a wide variety of operating conditions to help verify the declaration or identify possible diversions. The challenge is how to use modern technology for process monitoring and control in a proprietary operating environment subject to safeguards inspectorate or other regulatory oversight. Under the U.S. National Nuclear Security Administration's Next Generation Safeguards Initiative, a range of potential safeguards applications

  9. Nuclear Scans

    Science.gov (United States)

    Nuclear scans use radioactive substances to see structures and functions inside your body. They use a special ... images. Most scans take 20 to 45 minutes. Nuclear scans can help doctors diagnose many conditions, including ...

  10. Integrated Java Bytecode Verification

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian; Franz, Michael

    2005-01-01

    Existing Java verifiers perform an iterative data-flow analysis to discover the unambiguous type of values stored on the stack or in registers. Our novel verification algorithm uses abstract interpretation to obtain definition/use information for each register and stack location in the program...

  11. MARATHON Verification (MARV)

    Science.gov (United States)

    2017-08-01

    the verification and "lessons learned " from the semantic and technical issues we discovered as we implemented the approach. 15. SUBJECT TERMS...any programming language at use at CAA for modeling or other data analysis applications, to include R, Python , Scheme, Common Lisp, Julia, Mathematica

  12. Technical workshop on safeguards, verification technologies, and other related experience

    International Nuclear Information System (INIS)

    1998-01-01

    The aim of the Technical Workshop on safeguards was to encourage a clearer understanding of the IAEA Safeguards System, its origins and evolution and the present state of the art. Presentations held by the IAEA officials and outside experts examined as well other components of the non-proliferation regime, the current practices and procedures, and the future prospects. A series of presentations described the characteristics of the interaction between global and regional verification systems and described relevant past and present experience. Prominence given to such state of the art verification technologies as environmental sampling, satellite imaging and monitoring thorough remote and unattended techniques demonstrated, beyond any doubt, the essentially dynamic nature of verification. It is generally acknowledged that there have been major achievements in preventing spread of nuclear weapons, but no verification system can in itself prevent proliferation

  13. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1999-01-01

    In the post-Cold War period, interest in having the International Atomic Energy Agency (IAEA) use its expertise in support of the arms control and disarmament process has grown. Various pledges by the U.S. and Russian presidents to place former defense materials under some type of international monitoring raises the prospect of using IAEA safeguards concepts and approaches for monitoring these materials, which may include both classified and unclassified materials. Clearly, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA monitoring is the conflict between traditional IAEA materials accounting procedures and various national and international constraints, including U.S. classification laws, and the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). Possible 'verification' approaches to classified former defense materials could be based on item accountancy, 'attributes measurements', and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical feasibility or for their possible acceptability in an inspection regime. Substantial work remains in these areas. This paper examines some of the challenges presented by international inspections of classified materials. (author)

  14. From high to low. The IAEA is helping to reduce the use of high-risk nuclear fuel at the world's research reactors

    International Nuclear Information System (INIS)

    Adelfang, P.; Goldman, I.

    2006-01-01

    Research reactors play a key role in the development of peaceful uses of atomic energy. They are used for the production of isotopes for medicine and industry, for research in physics, biology and materials science, and for scientific education and training. They also continue to play an important role in support of nuclear power programmes. The IAEA's data shows there are 249 operational research reactors worldwide. Of these, more than 100 reactors are still fuelled with highly enriched uranium (HEU). It is considered high-risk nuclear material since it can be easily used for a nuclear explosive device. As part of a developing international norm to minimize and eventually eliminate HEU in civilian nuclear applications, research reactor operators increasingly are working with national and international agencies. They are being encouraged and supported to improve their physical security arrangements, convert their reactors to low-enriched uranium (LEU) fuel, and ship irradiated fuel back to the country of origin.For more than twenty years the IAEA has been supporting international efforts associated with reducing the amount of HEU in international commerce. Projects and activities have directly supported a programme the United States initiated in 1978, called Reduced Enrichment for Research and Test Reactors (RERTR). The IAEA's work additionally supports efforts to return research reactor fuel to the country where it was originally enriched so-called take back activities. IAEA initiatives have included the development and maintenance of several databases with information related to research reactors and research reactor spent fuel inventories. These databases have been essential in planning and managing both RERTR and take-back programmes. Other Agency activities through technical cooperation and other channels have supported the conversion of research reactors to using lower enriched fuels. In other ways, the IAEA supports the exchange of information among experts

  15. NPT and the peaceful use of nuclear energy

    International Nuclear Information System (INIS)

    Pellaud, B.

    1993-01-01

    In his opening remarks the author spoke on the role of IAEA safeguards in the process of international verification and confidence building that peaceful nuclear programmes are not used for the production of nuclear weapons or other nuclear explosive devices

  16. Public's perception and judgment on nuclear power

    International Nuclear Information System (INIS)

    Choi, Young Sung; Kim, Jong Seok; Lee, Byung Wook

    2000-01-01

    A public's perception and judgment model on nuclear power is developed to reveal the structure of public acceptance toward nuclear power in Korea. This is somewhat a verification of an earlier study by the author using two independent sets of survey data. A perception model makes it possible to construct two major exploratory variables, perceived risk and perceived benefit. The difference of perception is analyzed for different groups such as gender, education difference, and different information channels. A judgment model helps identify influential factors that improve the acceptance of nuclear energy. Estimates of model parameters from independent data sets were not significantly different, which implies the validity of the model. Methodologies of this study can be used as the basis for investigating the structure of public perception of technological risks and benefits, designing a public information and risk communication program, and developing remedial policy actions to improve public acceptance

  17. Seismic Surveillance. Nuclear Test Ban Verification

    Science.gov (United States)

    1990-02-26

    Laboratory Southern Methodist University Dallas, TX 75275 -3- OTHERS (United States) Dr. Monem Abdel-Gawad Dr. G.A. Bollinger Rockwell International Science...Sciences Institute of Advanced Studies G.P.O. Box 4 Canberra 2601, AUSTRALIA Dr. Bernard Massinon Societe Radiomana 27 rue Claude Bernard 75005 Paris ...FRANCE (2 Copies) Dr. Pierre Mecheler Societe Radiomana 27 rue Claude Bernard 75005 Paris , FRANCE Dr. Svein Mykkeltveit NTNF/NORSAR P.O. Box 51 N-2007

  18. An international cooperative verification agenda for arms reduction

    International Nuclear Information System (INIS)

    Hinderstein, C.

    2013-01-01

    The biggest challenge to the overall verification and monitoring agenda for future arms reductions may be that posed by uncertainties regarding the quantities of existing stocks of fissile material and nuclear weapons. We must develop strategies to reduce the residual uncertainties regarding completeness of initial declarations as all declared weapons-related inventories go to zero. Establishing this confidence in countries' initial baseline declarations will likely be a key point in all states' decisions to move to very low numbers, much less zero. The author reviews the questions and challenges that need to be addressed if there is to be significant progress in negotiating and implementing a verifiable fissile material cutoff treaty (FMCT) and a policy of nuclear weapon dismantling. In support of greater security as the world works towards the elimination of nuclear weapons, individual States could begin immediately by increasing the transparency of their nuclear activities. The International Verification Project is designed to bring experts from a wide array of related backgrounds together to build capacity for verification internationally in support of arms control goals (and in support of the larger objective of a world without nuclear weapons), build confidence between nuclear and non-nuclear-weapon states, promote freer flow of information among governments and between governments and non-governmental organizations (NGOs) and solve technical problems that could be barriers to progress. The paper is followed by the slides of the presentation. (A.C.)

  19. Distorted Fingerprint Verification System

    Directory of Open Access Journals (Sweden)

    Divya KARTHIKAESHWARAN

    2011-01-01

    Full Text Available Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.

  20. Methods of Software Verification

    Directory of Open Access Journals (Sweden)

    R. E. Gurin

    2015-01-01

    Full Text Available This article is devoted to the problem of software verification (SW. Methods of software verification designed to check the software for compliance with the stated requirements such as correctness, system security and system adaptability to small changes in the environment, portability and compatibility, etc. These are various methods both by the operation process and by the way of achieving result. The article describes the static and dynamic methods of software verification and paid attention to the method of symbolic execution. In its review of static analysis are discussed and described the deductive method, and methods for testing the model. A relevant issue of the pros and cons of a particular method is emphasized. The article considers classification of test techniques for each method. In this paper we present and analyze the characteristics and mechanisms of the static analysis of dependencies, as well as their views, which can reduce the number of false positives in situations where the current state of the program combines two or more states obtained both in different paths of execution and in working with multiple object values. Dependences connect various types of software objects: single variables, the elements of composite variables (structure fields, array elements, the size of the heap areas, the length of lines, the number of initialized array elements in the verification code using static methods. The article pays attention to the identification of dependencies within the framework of the abstract interpretation, as well as gives an overview and analysis of the inference tools.Methods of dynamic analysis such as testing, monitoring and profiling are presented and analyzed. Also some kinds of tools are considered which can be applied to the software when using the methods of dynamic analysis. Based on the work a conclusion is drawn, which describes the most relevant problems of analysis techniques, methods of their solutions and

  1. RESRAD-BUILD verification

    International Nuclear Information System (INIS)

    Kamboj, S.; Yu, C.; Biwer, B. M.; Klett, T.

    2002-01-01

    The results generated by the RESRAD-BUILD code (version 3.0) were verified with hand or spreadsheet calculations using equations given in the RESRAD-BUILD manual for different pathways. For verification purposes, different radionuclides--H-3, C-14, Na-22, Al-26, Cl-36, Mn-54, Co-60, Au-195, Ra-226, Ra-228, Th-228, and U-238--were chosen to test all pathways and models. Tritium, Ra-226, and Th-228 were chosen because of the special tritium and radon models in the RESRAD-BUILD code. Other radionuclides were selected to represent a spectrum of radiation types and energies. Verification of the RESRAD-BUILD code was conducted with an initial check of all the input parameters for correctness against their original source documents. Verification of the calculations was performed external to the RESRAD-BUILD code with Microsoft Excel to verify all the major portions of the code. In some cases, RESRAD-BUILD results were compared with those of external codes, such as MCNP (Monte Carlo N-particle) and RESRAD. The verification was conducted on a step-by-step basis and used different test cases as templates. The following types of calculations were investigated: (1) source injection rate, (2) air concentration in the room, (3) air particulate deposition, (4) radon pathway model, (5) tritium model for volume source, (6) external exposure model, (7) different pathway doses, and (8) time dependence of dose. Some minor errors were identified in version 3.0; these errors have been corrected in later versions of the code. Some possible improvements in the code were also identified

  2. 10 CFR 60.47 - Facility information and verification.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Facility information and verification. 60.47 Section 60.47 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN GEOLOGIC... International Atomic Energy Agency (IAEA) and take other action as necessary to implement the US/IAEA Safeguards...

  3. Verification of Building Blocks for Asynchronous Circuits

    Directory of Open Access Journals (Sweden)

    Freek Verbeek

    2013-04-01

    Full Text Available Scalable formal verification constitutes an important challenge for the design of asynchronous circuits. Deadlock freedom is a property that is desired but hard to verify. It is an emergent property that has to be verified monolithically. We present our approach to using ACL2 to verify necessary and sufficient conditions over asynchronous delay-insensitive primitives. These conditions are used to derive SAT/SMT instances from circuits built out of these primitives. These SAT/SMT instances help in establishing absence of deadlocks. Our verification effort consists of building an executable checker in the ACL2 logic tailored for our purpose. We prove that this checker is correct. This approach enables us to prove ACL2 theorems involving defun-sk constructs and free variables fully automatically.

  4. Human factors engineering plan for reviewing nuclear plant modernization programs

    Energy Technology Data Exchange (ETDEWEB)

    O' Hara, John; Higgins, James [Brookhaven National Laboratory, Upton, NY (United States)

    2004-12-01

    The Swedish Nuclear Power Inspectorate reviews the human factors engineering (HFE) aspects of nuclear power plants (NPPs) involved in the modernization of the plant systems and control rooms. The purpose of a HFE review is to help ensure personnel and public safety by verifying that accepted HFE practices and guidelines are incorporated into the program and nuclear power plant design. Such a review helps to ensure the HFE aspects of an NPP are developed, designed, and evaluated on the basis of a structured top-down system analysis using accepted HFE principles. The review addresses eleven HFE elements: HFE Program Management, Operating Experience Review, Functional Requirements Analysis and Allocation, Task Analysis, Staffing, Human Reliability Analysis, Human-System Interface Design, Procedure Development, Training Program Development, Human Factors Verification and Validation, and Design Implementation.

  5. Human factors engineering plan for reviewing nuclear plant modernization programs

    International Nuclear Information System (INIS)

    O'Hara, John; Higgins, James

    2004-12-01

    The Swedish Nuclear Power Inspectorate reviews the human factors engineering (HFE) aspects of nuclear power plants (NPPs) involved in the modernization of the plant systems and control rooms. The purpose of a HFE review is to help ensure personnel and public safety by verifying that accepted HFE practices and guidelines are incorporated into the program and nuclear power plant design. Such a review helps to ensure the HFE aspects of an NPP are developed, designed, and evaluated on the basis of a structured top-down system analysis using accepted HFE principles. The review addresses eleven HFE elements: HFE Program Management, Operating Experience Review, Functional Requirements Analysis and Allocation, Task Analysis, Staffing, Human Reliability Analysis, Human-System Interface Design, Procedure Development, Training Program Development, Human Factors Verification and Validation, and Design Implementation

  6. The Microbiology of Subsurface, Salt-Based Nuclear Waste Repositories: Using Microbial Ecology, Bioenergetics, and Projected Conditions to Help Predict Microbial Effects on Repository Performance

    Energy Technology Data Exchange (ETDEWEB)

    Swanson, Juliet S. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Cherkouk, Andrea [Helmholtz-Zentrum Dresden-Rossendorf, Rossendorf (Germany); Arnold, Thuro [Helmholtz-Zentrum Dresden-Rossendorf, Rossendorf (Germany); Meleshyn, Artur [Gesellschaft fur Anlagen und Reaktorsicherheit, Braunschweig (Germany); Reed, Donald T. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-11-17

    This report summarizes the potential role of microorganisms in salt-based nuclear waste repositories using available information on the microbial ecology of hypersaline environments, the bioenergetics of survival under high ionic strength conditions, and “repository microbiology” related studies. In areas where microbial activity is in question, there may be a need to shift the research focus toward feasibility studies rather than studies that generate actual input for performance assessments. In areas where activity is not necessary to affect performance (e.g., biocolloid transport), repository-relevant data should be generated. Both approaches will lend a realistic perspective to a safety case/performance scenario that will most likely underscore the conservative value of that case.

  7. A hybrid approach to quantify software reliability in nuclear safety systems

    International Nuclear Information System (INIS)

    Arun Babu, P.; Senthil Kumar, C.; Murali, N.

    2012-01-01

    Highlights: ► A novel method to quantify software reliability using software verification and mutation testing in nuclear safety systems. ► Contributing factors that influence software reliability estimate. ► Approach to help regulators verify the reliability of safety critical software system during software licensing process. -- Abstract: Technological advancements have led to the use of computer based systems in safety critical applications. As computer based systems are being introduced in nuclear power plants, effective and efficient methods are needed to ensure dependability and compliance to high reliability requirements of systems important to safety. Even after several years of research, quantification of software reliability remains controversial and unresolved issue. Also, existing approaches have assumptions and limitations, which are not acceptable for safety applications. This paper proposes a theoretical approach combining software verification and mutation testing to quantify the software reliability in nuclear safety systems. The theoretical results obtained suggest that the software reliability depends on three factors: the test adequacy, the amount of software verification carried out and the reusability of verified code in the software. The proposed approach may help regulators in licensing computer based safety systems in nuclear reactors.

  8. Plan for a laser weapon verification research program

    Energy Technology Data Exchange (ETDEWEB)

    Karr, T.J.

    1990-03-01

    Currently there is great interest in the question of how, or even whether, a treaty limiting the development and deployment of laser weapons could be verified. The concept of cooperative laser weapon verification is that each party would place monitoring stations near the other party's declared or suspect laser weapon facilities. The monitoring stations would measure the primary laser observables'' such as power or energy, either directly or by collecting laser radiation scattered from the air or the target, and would verify that the laser is operated within treaty limits. This concept is modeled along the lines of the seismic network recently activated in the USSR as a joint project of the United States Geologic Survey and the Soviet Academy of Sciences. The seismic data, gathered cooperatively, can be used by each party as it wishes, including to support verification of future nuclear test ban treaties. For laser weapon verification the monitoring stations are envisioned as ground-based, and would verify treaty limitations on ground-based laser anti-satellite (ASAT) weapons and on the ground-based development of other laser weapons. They would also contribute to verification of limitations on air-, sea- and space-based laser weapons, and the technology developed for cooperative verification could also be used in national technical means of verification. 2 figs., 4 tabs.

  9. Verification Survey of Uranium Mine Remediation

    International Nuclear Information System (INIS)

    Ron, Stager

    2009-01-01

    The Canadian Nuclear Safety Commission (CNSC) contracted an independent verification of an intensive gamma radiation survey conducted by a mining company to demonstrate that remediation of disturbed areas was complete. This site was the first of the recent mines being decommissioned in Canada and experience gained here may be applied to other mines being decommissioned in the future. The review included examination of the site-specific basis for clean-up criteria and ALARA as required by CNSC guidance. A paper review of the company report was conducted to determine if protocols were followed and that the summarized results could be independently reproduced. An independent verification survey was conducted on parts of the site and comparisons were made between gamma radiation measurements from the verification survey and the original company survey. Some aspects of data collection using rate meters linked to GPS data loggers are discussed as are aspects for data management and analyses methods required for the large amount of data collected during these surveys. Recommendations were made for implementation of future surveys and reporting the data from those surveys in order to ensure that remediation was complete. (authors)

  10. Quantum money with classical verification

    International Nuclear Information System (INIS)

    Gavinsky, Dmitry

    2014-01-01

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it

  11. Nuclear safeguards - a new profession

    International Nuclear Information System (INIS)

    Thorne, L.

    1984-01-01

    Early moves to restrict the proliferation of nuclear weapons are described together with the application of vigorous scientific techniques to the political framework of international treaties. Technical criteria for safeguards and verification methods are discussed. (U.K.)

  12. A Practitioners Perspective on Verification

    Science.gov (United States)

    Steenburgh, R. A.

    2017-12-01

    NOAAs Space Weather Prediction Center offers a wide range of products and services to meet the needs of an equally wide range of customers. A robust verification program is essential to the informed use of model guidance and other tools by both forecasters and end users alike. In this talk, we present current SWPC practices and results, and examine emerging requirements and potential approaches to satisfy them. We explore the varying verification needs of forecasters and end users, as well as the role of subjective and objective verification. Finally, we describe a vehicle used in the meteorological community to unify approaches to model verification and facilitate intercomparison.

  13. Scalable Techniques for Formal Verification

    CERN Document Server

    Ray, Sandip

    2010-01-01

    This book presents state-of-the-art approaches to formal verification techniques to seamlessly integrate different formal verification methods within a single logical foundation. It should benefit researchers and practitioners looking to get a broad overview of the spectrum of formal verification techniques, as well as approaches to combining such techniques within a single framework. Coverage includes a range of case studies showing how such combination is fruitful in developing a scalable verification methodology for industrial designs. This book outlines both theoretical and practical issue

  14. Natural Analogues - One Way to Help Build Public Confidence in the Predicted Performance of a Mined Geologic Repository for Nuclear Waste

    Energy Technology Data Exchange (ETDEWEB)

    Stuckless, J. S.

    2002-02-26

    The general public needs to have a way to judge the predicted long-term performance of the potential high-level nuclear waste repository at Yucca Mountain. The applicability and reliability of mathematical models used to make this prediction are neither easily understood nor accepted by the public. Natural analogues can provide the average person with a tool to assess the predicted performance and other scientific conclusions. For example, hydrologists with the Yucca Mountain Project have predicted that most of the water moving through the unsaturated zone at Yucca Mountain, Nevada will move through the host rock and around tunnels. Thus, seepage into tunnels is predicted to be a small percentage of available infiltration. This hypothesis can be tested experimentally and with some quantitative analogues. It can also be tested qualitatively using a variety of analogues such as (1) well-preserved Paleolithic to Neolithic paintings in caves and rock shelters, (2) biological remains preserved in caves and rock shelters, and (3) artifacts and paintings preserved in man-made underground openings. These examples can be found in materials that are generally available to the non-scientific public and can demonstrate the surprising degree of preservation of fragile and easily destroyed materials for very long periods of time within the unsaturated zone.

  15. Does better taxon sampling help? A new phylogenetic hypothesis for Sepsidae (Diptera: Cyclorrhapha) based on 50 new taxa and the same old mitochondrial and nuclear markers.

    Science.gov (United States)

    Zhao, Lei; Annie, Ang Shi Hui; Amrita, Srivathsan; Yi, Su Kathy Feng; Rudolf, Meier

    2013-10-01

    We here present a phylogenetic hypothesis for Sepsidae (Diptera: Cyclorrhapha), a group of schizophoran flies with ca. 320 described species that is widely used in sexual selection research. The hypothesis is based on five nuclear and five mitochondrial markers totaling 8813 bp for ca. 30% of the diversity (105 sepsid taxa) and - depending on analysis - six or nine outgroup species. Maximum parsimony (MP), maximum likelihood (ML), and Bayesian inferences (BI) yield overall congruent, well-resolved, and supported trees that are largely unaffected by three different ways to partition the data in BI and ML analyses. However, there are also five areas of uncertainty that affect suprageneric relationships where different analyses yield alternate topologies and MP and ML trees have significant conflict according to Shimodaira-Hasegawa tests. Two of these were already affected by conflict in a previous analysis that was based on the same genes and a subset of 69 species. The remaining three involve newly added taxa or genera whose relationships were previously resolved with low support. We thus find that the denser taxon sample in the present analysis does not reduce the topological conflict that had been identified previously. The present study nevertheless presents a significant contribution to the understanding of sepsid relationships in that 50 additional taxa from 18 genera are added to the Tree-of-Life of Sepsidae and that the placement of most taxa is well supported and robust to different tree reconstruction techniques. Copyright © 2013 Elsevier Inc. All rights reserved.

  16. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-01-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials

  17. Technical safety requirements control level verification; TOPICAL

    International Nuclear Information System (INIS)

    STEWART, J.L.

    1999-01-01

    A Technical Safety Requirement (TSR) control level verification process was developed for the Tank Waste Remediation System (TWRS) TSRs at the Hanford Site in Richland, WA, at the direction of the US. Department of Energy, Richland Operations Office (RL). The objective of the effort was to develop a process to ensure that the TWRS TSR controls are designated and managed at the appropriate levels as Safety Limits (SLs), Limiting Control Settings (LCSs), Limiting Conditions for Operation (LCOs), Administrative Controls (ACs), or Design Features. The TSR control level verification process was developed and implemented by a team of contractor personnel with the participation of Fluor Daniel Hanford, Inc. (FDH), the Project Hanford Management Contract (PHMC) integrating contractor, and RL representatives. The team was composed of individuals with the following experience base: nuclear safety analysis; licensing; nuclear industry and DOE-complex TSR preparation/review experience; tank farm operations; FDH policy and compliance; and RL-TWRS oversight. Each TSR control level designation was completed utilizing TSR control logic diagrams and TSR criteria checklists based on DOE Orders, Standards, Contractor TSR policy, and other guidance. The control logic diagrams and criteria checklists were reviewed and modified by team members during team meetings. The TSR control level verification process was used to systematically evaluate 12 LCOs, 22 AC programs, and approximately 100 program key elements identified in the TWRS TSR document. The verification of each TSR control required a team consensus. Based on the results of the process, refinements were identified and the TWRS TSRs were modified as appropriate. A final report documenting key assumptions and the control level designation for each TSR control was prepared and is maintained on file for future reference. The results of the process were used as a reference in the RL review of the final TWRS TSRs and control suite. RL

  18. National Center for Nuclear Security: The Nuclear Forensics Project (F2012)

    Energy Technology Data Exchange (ETDEWEB)

    Klingensmith, A. L.

    2012-03-21

    These presentation visuals introduce the National Center for Nuclear Security. Its chartered mission is to enhance the Nation’s verification and detection capabilities in support of nuclear arms control and nonproliferation through R&D activities at the NNSS. It has three focus areas: Treaty Verification Technologies, Nonproliferation Technologies, and Technical Nuclear Forensics. The objectives of nuclear forensics are to reduce uncertainty in the nuclear forensics process & improve the scientific defensibility of nuclear forensics conclusions when applied to nearsurface nuclear detonations. Research is in four key areas: Nuclear Physics, Debris collection and analysis, Prompt diagnostics, and Radiochemistry.

  19. High-level verification

    CERN Document Server

    Lerner, Sorin; Kundu, Sudipta

    2011-01-01

    Given the growing size and heterogeneity of Systems on Chip (SOC), the design process from initial specification to chip fabrication has become increasingly complex. This growing complexity provides incentive for designers to use high-level languages such as C, SystemC, and SystemVerilog for system-level design. While a major goal of these high-level languages is to enable verification at a higher level of abstraction, allowing early exploration of system-level designs, the focus so far for validation purposes has been on traditional testing techniques such as random testing and scenario-based

  20. Parking Space Verification

    DEFF Research Database (Denmark)

    Høg Peter Jensen, Troels; Thomsen Schmidt, Helge; Dyremose Bodin, Niels

    2018-01-01

    With the number of privately owned cars increasing, the issue of locating an available parking space becomes apparant. This paper deals with the verification of vacant parking spaces, by using a vision based system looking over parking areas. In particular the paper proposes a binary classifier...... system, based on a Convolutional Neural Network, that is capable of determining if a parking space is occupied or not. A benchmark database consisting of images captured from different parking areas, under different weather and illumination conditions, has been used to train and test the system...

  1. The crisis bears the chance. The nuclear conflict with Iran and the impact on the nuclear non-proliferation regime

    International Nuclear Information System (INIS)

    Meier, Oliver

    2014-01-01

    The contribution on the nuclear conflict with Iran and the impact on the nuclear non-proliferation regime covers the following topics: Iran and the verification of non-nuclear -weapon states, the system of nuclear safeguards, the application of new verification instruments, verification of possible military research and development activities, the limitation of proliferation relevant activities, delivery guarantees as mean for non-proliferation, Iran and the handling of contract violations, graded reactions, political issues, problems of harmonization, capacity and process deficiencies, before the ninth non-proliferation verification conference, approaches for strengthening the non-proliferation regime, recommendation to the German politics.

  2. Survey on Offline Finger Print Verification System

    NARCIS (Netherlands)

    Suman, R.; Kaur, R.

    2012-01-01

    The fingerprint verification, means where "verification" implies a user matching a fingerprint against a single fingerprint associated with the identity that the user claims. Biometrics can be classified into two types Behavioral (signature verification, keystroke dynamics, etc.) And Physiological

  3. Evolution of verification technics in mixed oxide fuel fabrication plants

    International Nuclear Information System (INIS)

    Bonucci, A.; Fernandez, F.; Kaiser, S.; Dossogne, P.

    1991-01-01

    In the MOX fabrication plants the increase in throughput and the consequent changes in the conditioning of the nuclear material and in the fabrication process applied is requiring a constant tailoring of the verification methods and techniques to the operational constraints. This paper describes the evolution of the verification scheme as a response to the changed conditions and the experience gained on the technical means used (NDA, DA, C/S). It describes as well the foreseeable evolution and the means which will be necessary to develop or to adapt

  4. A hand held photo identity verification system for mobile applications

    International Nuclear Information System (INIS)

    Kumar, Ranajit; Upreti, Anil; Mahaptra, U.; Bhattacharya, S.; Srivastava, G.P.

    2009-01-01

    A handheld portable system has been developed for mobile personnel identity verification. The system consists of a contact less RF smart card reader integrated to a Simputer through serial link. The simputer verifies the card data, with the data base and aids the security operator in identifying the persons by providing the facial image of the verified person along with other personal details like name, designation, division etc. All transactions are recorded in the Simputer with time and date for future record. This system finds extensive applications in mobile identity verification in nuclear or other industries. (author)

  5. Issues of verification and validation of application-specific integrated circuits in reactor trip systems

    International Nuclear Information System (INIS)

    Battle, R.E.; Alley, G.T.

    1993-01-01

    Concepts of using application-specific integrated circuits (ASICs) in nuclear reactor safety systems are evaluated. The motivation for this evaluation stems from the difficulty of proving that software-based protection systems are adequately reliable. Important issues concerning the reliability of computers and software are identified and used to evaluate features of ASICS. These concepts indicate that ASICs have several advantages over software for simple systems. The primary advantage of ASICs over software is that verification and validation (V ampersand V) of ASICs can be done with much higher confidence than can be done with software. A method of performing this V ampersand V on ASICS is being developed at Oak Ridge National Laboratory. The purpose of the method's being developed is to help eliminate design and fabrication errors. It will not solve problems with incorrect requirements or specifications

  6. Efficiency of material accountability verification procedures: A case study

    International Nuclear Information System (INIS)

    Avenhaus, R.

    1976-01-01

    In the model agreement INFCIRC/153 the international nuclear materials safeguards system has been established such that the material accountability principle is the main safeguards tool, with containment and surveillance as complementary measures. In addition, it has been agreed that the plant operator generates all data necessary for the material balance establishment and reports them to the safeguards authority and furthermore, that these data are verified by representatives of the safeguards authority with the help of independent measurements. In this paper, the problem of the determination of the efficiency of the combined system - data verification and material balance establishment - is analysed. Here, the difficulty arises that the two statistical procedures used are not independent because part of the operator's data are used in both cases. It is the purpose of this paper to work out the procedure for calculating the systems efficiency, i.e. the overall guaranteed probability of detection for the whole system for an assumed diversion and a given false alarm rate as a function of the safeguards effort spent over a given interval of time. Simplified formulae are derived which allow for a quick determination of the whole system efficiency: it is shown that the correlation between the two parts of the total system can be neglected. Therefore, the total systems efficiency can be represented as the product of the efficiencies of the two subsystems. The method developed is applied to a concrete case of a chemical reprocessing plant for irradiated fuels on the basis of data collected earlier. (author)

  7. Consortium for Verification Technology Fellowship Report.

    Energy Technology Data Exchange (ETDEWEB)

    Sadler, Lorraine E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-06-01

    As one recipient of the Consortium for Verification Technology (CVT) Fellowship, I spent eight days as a visiting scientist at the University of Michigan, Department of Nuclear Engineering and Radiological Sciences (NERS). During this time, I participated in multiple department and research group meetings and presentations, met with individual faculty and students, toured multiple laboratories, and taught one-half of a one-unit class on Risk Analysis in Nuclear Arms control (six 1.5 hour lectures). The following report describes some of the interactions that I had during my time as well as a brief discussion of the impact of this fellowship on members of the consortium and on me/my laboratory’s technical knowledge and network.

  8. Model Validation and Verification of Data Mining from the ...

    African Journals Online (AJOL)

    In this paper, we seek to present a hybrid method for Model Validation and Verification of Data Mining from the Knowledge Workers Productivity Approach. It is hoped that this paper will help managers to implement different corresponding measures. A case study is presented where this model measure and validates at the ...

  9. Verification of object-oriented programs: A transformational approach

    NARCIS (Netherlands)

    Apt, K.R.; de Boer, F.S.; Olderog, E.R.; de Gouw, S.

    2012-01-01

    We show that verification of object-oriented programs by means of the assertional method can be achieved in a simple way by exploiting a syntax-directed transformation from object-oriented programs to recursive programs. This transformation suggests natural proofs rules and its correctness helps us

  10. Advances of the Surgery of the Breast Cancer with help of the Nuclear Medicine; Avances de la cirugia del cancer de mama con la colaboracion de la medicina nuclear

    Energy Technology Data Exchange (ETDEWEB)

    Sierra Garcia, A.; Gomez Embuena, D. A.

    2009-07-01

    The incorporation of the nuclear medicine to the surgical current practice In the treatment of the cancer of breast, by means of the application of radioactive isotopes, have supposed a great achievement not only in the surgical and predicted results but also in the surgical skills more effective and less aggressive. The systematic research of the marking and extirpation of Sentinel Lymph Node is avoiding in the early cancer the linfadenectomy axilar. The application of the ROLL and SNOLL skills is being determinant in the extirpation with trustworthy margins of the non-palpable lesions cancer, with big safety instead harpoons that we used before. (Author) 6 refs.

  11. Non proliferation regimes undertakings: Benefits and limits of synergies in verification technologies and procedures

    International Nuclear Information System (INIS)

    Richard, M.

    2001-01-01

    Full text: Thirty years ago the NPT was entering into force. Therewith, when a State became party to the NPT, it had, in accordance with article III.1 of the Treaty, an undertaking to conclude a Comprehensive Safeguards agreement with the IAEA and accept safeguards verification on source or special fissionable material in all peaceful nuclear activities within its territories in order to verify that such material is not diverted. This multilateral instrument was the foundation stone of the non-proliferation regime and marked the actual birth of internationally accepted measures to verily compliance with politically stringent agreements. Since that time several important multilateral or bilateral instruments on non-proliferation and disarmament have been negotiated and adopted to curb the development and the acquisition of Weapons of Mass Destruction (WMD) most of them since the middle of the eighties and the collapse of the Soviet Union. Amongst the multilateral instruments are the Convention on the Prohibition of Bacteriological Weapon and Toxin Weapons (1972), the Convention on the Prohibition of Chemical Weapons (1993), the Comprehensive Test Ban Treaty (1996), the Strengthening of the IAEA Safeguards and the Additional Protocol (1997), with some still in negotiation like the Protocol of the Convention on the Prohibition of Bacteriological and Toxin Weapons, and some on which negotiation is still a wish like the Fissile Material Cut-off Treaty. Bilateral disarmament agreements between the United States of America and the Russian Federation such as the INF Treaty, START I and II, the agreements on the elimination of excess defence nuclear material as well as the Trilateral Initiative with the IAEA pave the way to nuclear disarmament with the reduction of both the number of nuclear weapons arsenal and the fissile material inventories. The politically stringent undertakings of States that have become parties to those agreements would not be possible without the

  12. A practical approach to perform graded verification and validation

    International Nuclear Information System (INIS)

    Terrado, Carlos; Woolley, J.

    2000-01-01

    Modernization of instrumentation and control (I and C) systems in nuclear power plants often implies to go from analog to digital systems. One condition for the upgrade to be successful is that the new systems achieve at least the same quality level as the analog they replace. The most important part of digital systems quality assurance (QA) is verification and validation (V and V). V and V is concerned with the process as much as the product, it is a systematic program of review and testing activities performed throughout the system development life cycle. Briefly, we can say that verification is to build the product correctly, and validation is to build the correct product. Since V and V is necessary but costly, it is helpful to tailor the effort that should be performed to achieve the quality goal for each particular case. To do this, an accepted practice is to establish different V and V levels, each one with a proper degree of stringency or rigor. This paper shows a practical approach to estimate the appropriate level of V and V, and the resulting V and V techniques recommended for each specific system. The firs step purposed is to determine 'What to do', that is the selection of the V and V class. The main factors considered here are: required integrity, functional complexity, defense in depth and development environment. A guideline to classify the particular system using these factors and show how they lead to the selection of the V and V class is presented. The second step is to determine 'How to do it', that is to choose an appropriate set of V and V methods according to the attributes of the system and the V and V class already selected. A list of possible V and V methods that are recommended for each V and V level during different stages of the development life cycle is included. As a result of the application of this procedure, solutions are found for generalists interested in 'What to do', as well as for specialists, interested in 'How to do'. Finally

  13. Bibliography for Verification and Validation in Computational Simulation

    International Nuclear Information System (INIS)

    Oberkampf, W.L.

    1998-01-01

    A bibliography has been compiled dealing with the verification and validation of computational simulations. The references listed in this bibliography are concentrated in the field of computational fluid dynamics (CFD). However, references from the following fields are also included: operations research, heat transfer, solid dynamics, software quality assurance, software accreditation, military systems, and nuclear reactor safety. This bibliography, containing 221 references, is not meant to be comprehensive. It was compiled during the last ten years in response to the author's interest and research in the methodology for verification and validation. The emphasis in the bibliography is in the following areas: philosophy of science underpinnings, development of terminology and methodology, high accuracy solutions for CFD verification, experimental datasets for CFD validation, and the statistical quantification of model validation. This bibliography should provide a starting point for individual researchers in many fields of computational simulation in science and engineering

  14. Knowledge base verification based on enhanced colored petri net

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jong Hyun; Seong, Poong Hyun [Korea Advanced Institute of Science and Technology, Taejon (Korea, Republic of)

    1997-12-31

    Verification is a process aimed at demonstrating whether a system meets it`s specified requirements. As expert systems are used in various applications, the knowledge base verification of systems takes an important position. The conventional Petri net approach that has been studied recently in order to verify the knowledge base is found that it is inadequate to verify the knowledge base of large and complex system, such as alarm processing system of nuclear power plant. Thus, we propose an improved method that models the knowledge base as enhanced colored Petri net. In this study, we analyze the reachability and the error characteristics of the knowledge base and apply the method to verification of simple knowledge base. 8 refs., 4 figs. (Author)

  15. Bibliography for Verification and Validation in Computational Simulations

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, W.L.

    1998-10-01

    A bibliography has been compiled dealing with the verification and validation of computational simulations. The references listed in this bibliography are concentrated in the field of computational fluid dynamics (CFD). However, references from the following fields are also included: operations research, heat transfer, solid dynamics, software quality assurance, software accreditation, military systems, and nuclear reactor safety. This bibliography, containing 221 references, is not meant to be comprehensive. It was compiled during the last ten years in response to the author's interest and research in the methodology for verification and validation. The emphasis in the bibliography is in the following areas: philosophy of science underpinnings, development of terminology and methodology, high accuracy solutions for CFD verification, experimental datasets for CFD validation, and the statistical quantification of model validation. This bibliography should provide a starting point for individual researchers in many fields of computational simulation in science and engineering.

  16. Verification and validation of RADMODL Version 1.0

    Energy Technology Data Exchange (ETDEWEB)

    Kimball, K.D.

    1993-03-01

    RADMODL is a system of linked computer codes designed to calculate the radiation environment following an accident in which nuclear materials are released. The RADMODL code and the corresponding Verification and Validation (V&V) calculations (Appendix A), were developed for Westinghouse Savannah River Company (WSRC) by EGS Corporation (EGS). Each module of RADMODL is an independent code and was verified separately. The full system was validated by comparing the output of the various modules with the corresponding output of a previously verified version of the modules. The results of the verification and validation tests show that RADMODL correctly calculates the transport of radionuclides and radiation doses. As a result of this verification and validation effort, RADMODL Version 1.0 is certified for use in calculating the radiation environment following an accident.

  17. Online fingerprint verification.

    Science.gov (United States)

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications.

  18. Shift Verification and Validation

    Energy Technology Data Exchange (ETDEWEB)

    Pandya, Tara M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Evans, Thomas M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Davidson, Gregory G [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Johnson, Seth R. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Godfrey, Andrew T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-09-07

    This documentation outlines the verification and validation of Shift for the Consortium for Advanced Simulation of Light Water Reactors (CASL). Five main types of problems were used for validation: small criticality benchmark problems; full-core reactor benchmarks for light water reactors; fixed-source coupled neutron-photon dosimetry benchmarks; depletion/burnup benchmarks; and full-core reactor performance benchmarks. We compared Shift results to measured data and other simulated Monte Carlo radiation transport code results, and found very good agreement in a variety of comparison measures. These include prediction of critical eigenvalue, radial and axial pin power distributions, rod worth, leakage spectra, and nuclide inventories over a burn cycle. Based on this validation of Shift, we are confident in Shift to provide reference results for CASL benchmarking.

  19. Symposium on International Safeguards: Preparing for Future Verification Challenges

    International Nuclear Information System (INIS)

    2010-01-01

    The purpose of the symposium is to foster dialogue and information exchange involving Member States, the nuclear industry and members of the broader nuclear non-proliferation community to prepare for future verification challenges. Topics addressed during the 2010 symposium include the following: - Supporting the global nuclear non-proliferation regime: Building support for strengthening international safeguards; Enhancing confidence in compliance with safeguards obligations; Legal authority as a means to enhance effectiveness and efficiency; Verification roles in support of arms control and disarmament. - Building collaboration and partnerships with other international forums: Other verification and non-proliferation regimes; Synergies between safety, security and safeguards regimes. - Improving cooperation between IAEA and States for safeguards implementation: Strengthening State systems for meeting safeguards obligations; Enhancing safeguards effectiveness and efficiency through greater cooperation; Lessons learned: recommendations for enhancing integrated safeguards implementation. - Addressing safeguards challenges in an increasingly interconnected world: Non-State actors and covert trade networks; Globalization of nuclear information and technology. - Preparing for the global nuclear expansion and increasing safeguards workload: Furthering implementation of the State-level concept and integrated safeguards; Information-driven safeguards; Remote data-driven safeguards inspections; Safeguards in States without comprehensive safeguards agreements. - Safeguarding advanced nuclear facilities and innovative fuel cycles: Proliferation resistance; Safeguards by design; Safeguards approaches for advanced facilities. - Advanced technologies and methodologies: For verifying nuclear material and activities; For detecting undeclared nuclear material and activities; For information collection, analysis and integration. - Enhancing the development and use of safeguards

  20. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    Energy Technology Data Exchange (ETDEWEB)

    Luke, S J

    2011-12-20

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  1. Improved verification methods for safeguards verifications at enrichment plants

    International Nuclear Information System (INIS)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D.

    2009-01-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF 6 cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  2. A Correctness Verification Technique for Commercial FPGA Synthesis Tools

    International Nuclear Information System (INIS)

    Kim, Eui Sub; Yoo, Jun Beom; Choi, Jong Gyun; Kim, Jang Yeol; Lee, Jang Soo

    2014-01-01

    Once the FPGA (Filed-Programmable Gate Array) designers designs Verilog programs, the commercial synthesis tools automatically translate the Verilog programs into EDIF programs so that the designers can have largely focused on HDL designs for correctness of functionality. Nuclear regulation authorities, however, require more considerate demonstration of the correctness and safety of mechanical synthesis processes of FPGA synthesis tools, even if the FPGA industry have acknowledged them empirically as correct and safe processes and tools. In order to assure of the safety, the industry standards for the safety of electronic/electrical devices, such as IEC 61508 and IEC 60880, recommend using the formal verification technique. There are several formal verification tools (i.e., 'FormalPro' 'Conformal' 'Formality' and so on) to verify the correctness of translation from Verilog into EDIF programs, but it is too expensive to use and hard to apply them to the works of 3rd-party developers. This paper proposes a formal verification technique which can contribute to the correctness demonstration in part. It formally checks the behavioral equivalence between Verilog and subsequently synthesized Net list with the VIS verification system. A Net list is an intermediate output of FPGA synthesis process, and EDIF is used as a standard format of Net lists. If the formal verification succeeds, then we can assure that the synthesis process from Verilog into Net list worked correctly at least for the Verilog used. In order to support the formal verification, we developed the mechanical translator 'EDIFtoBLIFMV,' which translates EDIF into BLIF-MV as an input front-end of VIS system, while preserving their behavior equivalence.. We performed the case study with an example of a preliminary version of RPS in a Korean nuclear power plant in order to provide the efficiency of the proposed formal verification technique and implemented translator. It

  3. Verification Process of Behavioral Consistency between Design and Implementation programs of pSET using HW-CBMC

    International Nuclear Information System (INIS)

    Lee, Dong Ah; Lee, Jong Hoon; Yoo, Jun Beom

    2011-01-01

    Controllers in safety critical systems such as nuclear power plants often use Function Block Diagrams (FBDs) to design embedded software. The design is implemented using programming languages such as C to compile it into particular target hardware. The implementation must have the same behavior with the design and the behavior should be verified explicitly. For example, the pSET (POSAFE-Q Software Engineering Tool) is a loader software to program POSAFE-Q PLC (Programmable Logic Controller) and is developed as a part of the KNICS (Korea Nuclear Instrumentation and Control System R and D Center) project. It uses FBDs to design software of PLC, and generates ANSI-C code to compile it into specific machine code. To verify the equivalence between the FBDs and ANSI-C code, mathematical proof of code generator or a verification tools such as RETRANS can help guarantee the equivalence. Mathematical proof, however, has a weakness that requires high expenditure and repetitive fulfillment whenever the translator is modified. On the other hand, RETRANS reconstructs the generated source code without consideration of the generator. It has also a weakness that the reconstruction of generated code needs additional analysis This paper introduces verification process of behavioral consistency between design and its implementation of the pSET using the HW-CBMC. The HW-CBMC is a formal verification tool, verifying equivalence between hardware and software description. It requires two inputs for checking equivalence, Verilog for hard-ware and ANSI-C for software. In this approach, FBDs are translated into semantically equivalent Verilog pro-gram, and the HW-CBMC verifies equivalence between the Verilog program and the ANSI-C program which is generated from the FBDs

  4. Numident Online Verification Utility (NOVU)

    Data.gov (United States)

    Social Security Administration — NOVU is a mainframe application that accesses the NUMIDENT to perform real-time SSN verifications. This program is called by other SSA online programs that serve as...

  5. How regional non-proliferation arrangements complement international verification

    International Nuclear Information System (INIS)

    Carlson, J.

    1999-01-01

    This presentation focuses on international verification in the form of IAEA Safeguards, and discusses the relationship between IAEA safeguards and the relevant regional arrangements, both the existing and the future. For most States the political commitment against acquisition of nuclear weapons has been carefully reached and strongly held. Their observance of treaty commitments does not depend on the deterrent effect of verification activities. Safeguards serve to assist States who recognise it is in their own interest to demonstrate their compliance to others. Thus safeguards are a vital confidence building measure in their own right, as well as being a major complement to the broader range of international confidence building measures. Safeguards can both complement other confidence building measures and in turn be complemented by them. Within consideration of how it could work it is useful to consider briefly current developments of IAEA safeguards, i.e. existing regional arrangements and nuclear weapon free zones

  6. Nuclear law and disorder

    International Nuclear Information System (INIS)

    Roche, Douglas

    2005-01-01

    community, nuclear and non-nuclear alike, is concerned about proliferation. But the new attempt by the NWS to gloss over the discriminatory aspects of the NPT has caused the patience of the members of the Non-Aligned Movement to snap. They see a two-class world of nuclear haves and have-nots becoming a permanent feature of the global landscape. Compounding the nuclear risk is the threat of nuclear terrorism, which is growing day by day. It is estimated that 40 countries have the knowledge to produce nuclear weapons, and the existence of an extensive illicit market for nuclear items shows the inadequacy of the present export control system. Despite the arduous efforts of the International Atomic Energy Agency (which is seriously under funded relative to the inspection responsibilities it has been given), the margin of security is, 'thin and worrisome.' Security Council Resolution 1540, requiring all States to take measures to prevent non-State actors from acquiring nuclear, chemical and biological weapons, is a helpful step to stemming proliferation. The constant monitoring by the IAEA, where it is able to operate, gives a measure of confidence. The eminent physicist, Frank von Hippel, says 'nothing could be simpler' than for terrorists to obtain highly enriched uranium and set off an explosive device with power equal to that of the Hiroshima bomb. The task awaiting the 2005 Review of the NPT is to convince the nuclear-weapons States that the only hope of stopping the proliferation of nuclear weapons is to address nuclear disarmament with the same eagerness. This is precisely the stance taken by Foreign Ministers of the New Agenda Coalition (Brazil, Egypt, Ireland, Mexico, New Zealand, South Africa and Sweden), which showed impressive leadership at the 2000 NPT Review in negotiating the 13 Practical Steps with the nuclear-weapons States, is now clearly reaching out to other middle power States to build up what might be called the m oderate middle' in the nuclear weapons

  7. The joint verification experiments as a global non-proliferation exercise

    International Nuclear Information System (INIS)

    Shaner, J.W.

    1998-01-01

    This conference commemorates the 10th anniversary of the second of two Joint Verification Experiments conducted by the Soviet Union and the US. These two experiments, one at the Nevada test site in the US, and the second here at the Semipalatinsk test site were designed to test the verification of a nuclear testing treaty limiting the size underground explosions to 150 kilotons. By building trust and technical respect between the weapons scientists of the two most powerful adversaries, the Joint Verification Experiment (JVE) had the unanticipated result of initiating a suite of cooperative projects and programs aimed at reducing the Cold War threats and preventing the proliferation of weapons of mass destruction

  8. Verification and validation of control system software

    International Nuclear Information System (INIS)

    Munro, J.K. Jr.; Kisner, R.A.; Bhadtt, S.C.

    1991-01-01

    The following guidelines are proposed for verification and validation (V ampersand V) of nuclear power plant control system software: (a) use risk management to decide what and how much V ampersand V is needed; (b) classify each software application using a scheme that reflects what type and how much V ampersand V is needed; (c) maintain a set of reference documents with current information about each application; (d) use Program Inspection as the initial basic verification method; and (e) establish a deficiencies log for each software application. The following additional practices are strongly recommended: (a) use a computer-based configuration management system to track all aspects of development and maintenance; (b) establish reference baselines of the software, associated reference documents, and development tools at regular intervals during development; (c) use object-oriented design and programming to promote greater software reliability and reuse; (d) provide a copy of the software development environment as part of the package of deliverables; and (e) initiate an effort to use formal methods for preparation of Technical Specifications. The paper provides background information and reasons for the guidelines and recommendations. 3 figs., 3 tabs

  9. Experimental verification of internal dosimetry calculations. Annual progress report

    International Nuclear Information System (INIS)

    1980-05-01

    During the past year a dosimetry research program has been established in the School of Nuclear Engineering at the Georgia Institute of Technology. The major objective of this program has been to provide research results upon which a useful internal dosimetry system could be based. The important application of this dosimetry system will be the experimental verification of internal dosimetry calculations such as those published by the MIRD Committee

  10. Design verification testing for fuel element type CAREM

    International Nuclear Information System (INIS)

    Martin Ghiselli, A.; Bonifacio Pulido, K.; Villabrille, G.; Rozembaum, I.

    2013-01-01

    The hydraulic and hydrodynamic characterization tests are part of the design verification process of a nuclear fuel element prototype and its components. These tests are performed in a low pressure and temperature facility. The tests requires the definition of the simulation parameters for setting the test conditions, the results evaluation to feedback mathematical models, extrapolated the results to reactor conditions and finally to decide the acceptability of the tested prototype. (author)

  11. Comments for A Conference on Verification in the 21st Century

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-06-12

    The author offers 5 points for the discussion of Verification and Technology: (1) Experience with the implementation of arms limitation and arms reduction agreements confirms that technology alone has never been relied upon to provide effective verification. (2) The historical practice of verification of arms control treaties between Cold War rivals may constrain the cooperative and innovative use of technology for transparency, veification and confidence building in the future. (3) An area that has been identified by many, including the US State Department and NNSA as being rich for exploration for potential uses of technology for transparency and verification is information and communications technology (ICT). This includes social media, crowd-sourcing, the internet of things, and the concept of societal verification, but there are issues. (4) On the issue of the extent to which verification technologies are keeping pace with the demands of future protocols and agrements I think the more direct question is ''are they effective in supporting the objectives of the treaty or agreement?'' In this regard it is important to acknowledge that there is a verification grand challenge at our doorstep. That is ''how does one verify limitations on nuclear warheads in national stockpiles?'' (5) Finally, while recognizing the daunting political and security challenges of such an approach, multilateral engagement and cooperation at the conceptual and technical levels provides benefits for addressing future verification challenges.

  12. IAEA, EU Senior Officials Review Nuclear-Related Cooperation, Chart Way Ahead

    International Nuclear Information System (INIS)

    Amano, Y.

    2014-01-01

    International Atomic Energy Agency (IAEA) and European Union officials met this week for the second annual Senior Officials Meeting to review and further strengthen their nuclear-related cooperation. In the past year, the two institutions have improved collaboration in nuclear safety, security, safeguards and peaceful use of nuclear energy through implementing a number of initiatives. In 2013, new contracts for projects have been signed amounting to approximately 24 million euros. These included an EU Council decision to support IAEA nuclear security and verification activities worth of 8.05 million euros. Furthermore, a Memorandum of Understanding establishing a framework for cooperation to help improve nuclear safety was signed, as well as the Practical Arrangement on technical nuclear security issues. The EU and the IAEA have also worked to explore and identify new areas for cooperation such as using nuclear applications for socio-economic development. The meeting addressed enhanced cooperation in the areas of nuclear safety, nuclear security, nuclear applications, nuclear energy and safeguards. Participants agreed on the following steps, including holding a Senior Officials Meeting planned in early 2015 in the premises of the European Commission in Luxembourg

  13. Nuclear blackmail and nuclear balance

    International Nuclear Information System (INIS)

    Betts, R.K.

    1987-01-01

    This book raises pointed questions about nuclear saber rattling. More than a dozen cases since the bombing of Hiroshima and Magasaki in which some sort of nuclear threat was used as a sparring technique in tense confrontations are cited. Each incident is described and analyzed. Two theories offered to explain America's use of nuclear threats, the balance of interest theory and the balance of power theory, are contrasted throughout the book. This book helps to fill the gap in the understanding of nuclear weapons and their uses, while pointing out that nuclear bravado could lead to an unintended unleashing of these weapons

  14. RELAP-7 Software Verification and Validation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Curtis L. [Idaho National Lab. (INL), Idaho Falls, ID (United States). Risk, Reliability, and Regulatory Support; Choi, Yong-Joon [Idaho National Lab. (INL), Idaho Falls, ID (United States). Risk, Reliability, and Regulatory Support; Zou, Ling [Idaho National Lab. (INL), Idaho Falls, ID (United States). Risk, Reliability, and Regulatory Support

    2014-09-25

    This INL plan comprehensively describes the software for RELAP-7 and documents the software, interface, and software design requirements for the application. The plan also describes the testing-based software verification and validation (SV&V) process—a set of specially designed software models used to test RELAP-7. The RELAP-7 (Reactor Excursion and Leak Analysis Program) code is a nuclear reactor system safety analysis code being developed at Idaho National Laboratory (INL). The code is based on the INL’s modern scientific software development framework – MOOSE (Multi-Physics Object-Oriented Simulation Environment). The overall design goal of RELAP-7 is to take advantage of the previous thirty years of advancements in computer architecture, software design, numerical integration methods, and physical models. The end result will be a reactor systems analysis capability that retains and improves upon RELAP5’s capability and extends the analysis capability for all reactor system simulation scenarios.

  15. Design information verification

    International Nuclear Information System (INIS)

    Johnson, Shirley

    2001-01-01

    The paper provides the bases to complete a Design Information Questionnaire (DIQ) for a research reactor. The IAEA requirements for provision of design information for nuclear facility is described. The role of the provided information for the development of the safeguards approach and for planning of the IAEA's general inspection program for a specific facility is emphasized. Content and preparation of the IAEA DIQ by the State is presented

  16. SPR Hydrostatic Column Model Verification and Validation.

    Energy Technology Data Exchange (ETDEWEB)

    Bettin, Giorgia [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lord, David [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rudeen, David Keith [Gram, Inc. Albuquerque, NM (United States)

    2015-10-01

    A Hydrostatic Column Model (HCM) was developed to help differentiate between normal "tight" well behavior and small-leak behavior under nitrogen for testing the pressure integrity of crude oil storage wells at the U.S. Strategic Petroleum Reserve. This effort was motivated by steady, yet distinct, pressure behavior of a series of Big Hill caverns that have been placed under nitrogen for extended period of time. This report describes the HCM model, its functional requirements, the model structure and the verification and validation process. Different modes of operation are also described, which illustrate how the software can be used to model extended nitrogen monitoring and Mechanical Integrity Tests by predicting wellhead pressures along with nitrogen interface movements. Model verification has shown that the program runs correctly and it is implemented as intended. The cavern BH101 long term nitrogen test was used to validate the model which showed very good agreement with measured data. This supports the claim that the model is, in fact, capturing the relevant physical phenomena and can be used to make accurate predictions of both wellhead pressure and interface movements.

  17. Verification and validation process for the safety software in KNICS

    International Nuclear Information System (INIS)

    Kwon, Kee-Choon; Lee, Jang-Soo; Kim, Jang-Yeol

    2004-01-01

    This paper describes the Verification and Validation (V and V ) process for safety software of Programmable Logic Controller (PLC), Digital Reactor Protection System (DRPS), and Engineered Safety Feature-Component Control System (ESF-CCS) that are being developed in Korea Nuclear Instrumentation and Control System (KNICS) projects. Specifically, it presents DRPS V and V experience according to the software development life cycle. The main activities of DRPS V and V process are preparation of software planning documentation, verification of Software Requirement Specification (SRS), Software Design Specification (SDS) and codes, and testing of the integrated software and the integrated system. In addition, they include software safety analysis and software configuration management. SRS V and V of DRPS are technical evaluation, licensing suitability evaluation, inspection and traceability analysis, formal verification, preparing integrated system test plan, software safety analysis, and software configuration management. Also, SDS V and V of RPS are technical evaluation, licensing suitability evaluation, inspection and traceability analysis, formal verification, preparing integrated software test plan, software safety analysis, and software configuration management. The code V and V of DRPS are traceability analysis, source code inspection, test case and test procedure generation, software safety analysis, and software configuration management. Testing is the major V and V activity of software integration and system integration phase. Software safety analysis at SRS phase uses Hazard Operability (HAZOP) method, at SDS phase it uses HAZOP and Fault Tree Analysis (FTA), and at implementation phase it uses FTA. Finally, software configuration management is performed using Nu-SCM (Nuclear Software Configuration Management) tool developed by KNICS project. Through these activities, we believe we can achieve the functionality, performance, reliability and safety that are V

  18. CASL Verification and Validation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Mousseau, Vincent Andrew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dinh, Nam [North Carolina State Univ., Raleigh, NC (United States)

    2016-06-30

    This report documents the Consortium for Advanced Simulation of LWRs (CASL) verification and validation plan. The document builds upon input from CASL subject matter experts, most notably the CASL Challenge Problem Product Integrators, CASL Focus Area leaders, and CASL code development and assessment teams. This document will be a living document that will track progress on CASL to do verification and validation for both the CASL codes (including MPACT, CTF, BISON, MAMBA) and for the CASL challenge problems (CIPS, PCI, DNB). The CASL codes and the CASL challenge problems are at differing levels of maturity with respect to validation and verification. The gap analysis will summarize additional work that needs to be done. Additional VVUQ work will be done as resources permit. This report is prepared for the Department of Energy’s (DOE’s) CASL program in support of milestone CASL.P13.02.

  19. VBMC: a formal verification tool for VHDL program

    International Nuclear Information System (INIS)

    Ajith, K.J.; Bhattacharjee, A.K.

    2014-08-01

    The design of Control and Instrumentation (C and I) systems used in safety critical applications such as nuclear power plants involves partitioning of the overall system functionality into sub-parts and implementing each sub-part in hardware and/or software as appropriate. With increasing use of programmable devices like FPGA, the hardware subsystems are often implemented in Hardware Description Languages (HDL) like VHDL. Since the functional bugs in such hardware subsystems used in safety critical C and I systems have serious consequences, it is important to use rigorous reasoning to verify the functionalities of the HDL models. This report describes the design of a software tool named VBMC (VHDL Bounded Model Checker). The capability of this tool is in proving/refuting functional properties of hardware designs described in VHDL. VBMC accepts design as a VHDL program file, functional property in PSL, and verification bound (number of cycles of operation) as inputs. It either reports that the design satisfies the functional property for the given verification bound or generates a counterexample providing the reason of violation. In case of satisfaction, the proof holds good for the verification bound. VBMC has been used for the functional verification of FPGA based intelligent I/O boards developed at Reactor Control Division, BARC. (author)

  20. The KNICS approach for verification and validation of safety software

    International Nuclear Information System (INIS)

    Cha, Kyung Ho; Sohn, Han Seong; Lee, Jang Soo; Kim, Jang Yeol; Cheon, Se Woo; Lee, Young Joon; Hwang, In Koo; Kwon, Kee Choon

    2003-01-01

    This paper presents verification and validation (VV) to be approached for safety software of POSAFE-Q Programmable Logic Controller (PLC) prototype and Plant Protection System (PPS) prototype, which consists of Reactor Protection System (RPS) and Engineered Safety Features-Component Control System (ESF-CCS) in development of Korea Nuclear Instrumentation and Control System (KNICS). The SVV criteria and requirements are selected from IEEE Std. 7-4.3.2, IEEE Std. 1012, IEEE Std. 1028 and BTP-14, and they have been considered for acceptance framework to be provided within SVV procedures. SVV techniques, including Review and Inspection (R and I), Formal Verification and Theorem Proving, and Automated Testing, are applied for safety software and automated SVV tools supports SVV tasks. Software Inspection Support and Requirement Traceability (SIS-RT) supports R and I and traceability analysis, a New Symbolic Model Verifier (NuSMV), Statemate MAGNUM (STM) ModelCertifier, and Prototype Verification System (PVS) are used for formal verification, and McCabe and Cantata++ are utilized for static and dynamic software testing. In addition, dedication of Commercial-Off-The-Shelf (COTS) software and firmware, Software Safety Analysis (SSA) and evaluation of Software Configuration Management (SCM) are being performed for the PPS prototype in the software requirements phase

  1. Runtime Verification Through Forward Chaining

    Directory of Open Access Journals (Sweden)

    Alan Perotti

    2014-12-01

    Full Text Available In this paper we present a novel rule-based approach for Runtime Verification of FLTL properties over finite but expanding traces. Our system exploits Horn clauses in implication form and relies on a forward chaining-based monitoring algorithm. This approach avoids the branching structure and exponential complexity typical of tableaux-based formulations, creating monitors with a single state and a fixed number of rules. This allows for a fast and scalable tool for Runtime Verification: we present the technical details together with a working implementation.

  2. IMRT plan verification in radiotherapy

    International Nuclear Information System (INIS)

    Vlk, P.

    2006-01-01

    This article describes the procedure for verification of IMRT (Intensity modulated radiation therapy) plan, which is used in the Oncological Institute of St. Elisabeth in Bratislava. It contains basic description of IMRT technology and developing a deployment plan for IMRT planning system CORVUS 6.0, the device Mimic (Multilammelar intensity modulated collimator) and the overall process of verifying the schedule created. The aim of verification is particularly good control of the functions of MIMIC and evaluate the overall reliability of IMRT planning. (author)

  3. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  4. K Basins Field Verification Program

    International Nuclear Information System (INIS)

    Booth, H.W.

    1994-01-01

    The Field Verification Program establishes a uniform and systematic process to ensure that technical information depicted on selected engineering drawings accurately reflects the actual existing physical configuration. This document defines the Field Verification Program necessary to perform the field walkdown and inspection process that identifies the physical configuration of the systems required to support the mission objectives of K Basins. This program is intended to provide an accurate accounting of the actual field configuration by documenting the as-found information on a controlled drawing

  5. VERIFICATION OF GEAR DYNAMIC MODEL IN DIFFERENT OPERATING CONDITIONS

    Directory of Open Access Journals (Sweden)

    Grzegorz PERUŃ

    2014-09-01

    Full Text Available The article presents the results of verification of the drive system dynamic model with gear. Tests were carried out on the real object in different operating conditions. For the same assumed conditions were also carried out simulation studies. Comparison of the results obtained from those two series of tests helped determine the suitability of the model and verify the possibility of replacing experimental research by simulations with use of dynamic model.

  6. Nuclear energy and nuclear weapons

    International Nuclear Information System (INIS)

    Robertson, J.A.L.

    1983-06-01

    We all want to prevent the use of nuclear weapons. The issue before us is how best to achieve this objective; more specifically, whether the peaceful applications of nuclear energy help or hinder, and to what extent. Many of us in the nuclear industry are working on these applications from a conviction that without peaceful nuclear energy the risk of nuclear war would be appreciably greater. Others, however, hold the opposite view. In discussing the subject, a necessary step in allaying fears is understanding some facts, and indeed facing up to some unpalatable facts. When the facts are assessed, and a balance struck, the conclusion is that peaceful nuclear energy is much more part of the solution to preventing nuclear war than it is part of the problem

  7. How Nasa's Independent Verification and Validation (IVandV) Program Builds Reliability into a Space Mission Software System (SMSS)

    Science.gov (United States)

    Fisher, Marcus S.; Northey, Jeffrey; Stanton, William

    2014-01-01

    The purpose of this presentation is to outline how the NASA Independent Verification and Validation (IVV) Program helps to build reliability into the Space Mission Software Systems (SMSSs) that its customers develop.

  8. VERIFICATION OF PARALLEL AUTOMATA-BASED PROGRAMS

    OpenAIRE

    M. A. Lukin

    2014-01-01

    The paper deals with an interactive method of automatic verification for parallel automata-based programs. The hierarchical state machines can be implemented in different threads and can interact with each other. Verification is done by means of Spin tool and includes automatic Promela model construction, conversion of LTL-formula to Spin format and counterexamples in terms of automata. Interactive verification gives the possibility to decrease verification time and increase the maxi...

  9. The Tools That Help Systems Engineering

    Science.gov (United States)

    Gamertsfelder, Jacob O.

    2017-01-01

    There are many tools that systems engineers use in today's space programs. In my time in the Commercial Crew Program I sought to improve one of the vital tools for the verification and validation team. This was my main project but only a small part of what I have done in the department. I have also had the chance to learn from the best and see actual hardware, this real world experience will help me be a better aerospace engineer when I enter the workforce. I look forward to seeing the Commercial Crew Program progress to launch.

  10. Formal Verification of Circuits and Systems

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    Today formal verification is finding increasing acceptance in some areas, especially model abstraction and functional verification. Other major chal- lenges, like timing verification, remain before this technology can be posed as a complete alternative to simulation. This special issue is devoted to presenting some of the ...

  11. EPRI expert system activities for nuclear utility industry application

    International Nuclear Information System (INIS)

    Naser, J.A.

    1990-01-01

    This paper reports on expert systems which have reached a level of maturity where they offer considerable benefits for the nuclear utility industry. The ability of expert systems to enhance expertise makes them an important tool for the nuclear utility industry in the areas of engineering, operations and maintenance. Benefits of expert system applications include comprehensive and consistent reasoning, reduction of time required for activities, retention of human expertise and ability to utilize multiple experts knowledge for an activity. The Electric Power Research Institute (EPRI) has been performing four basic activities to help the nuclear industry take advantage of this expert system technology. The first is the development of expert system building tools which are tailored to nuclear utility industry applications. The second is the development of expert system applications. The third is work in developing a methodology for verification and validation of expert systems. The last is technology transfer activities to help the nuclear utility industry benefit from expert systems. The purpose of this paper is to describe the EPRI activities

  12. International safeguards: Accounting for nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Fishbone, L.G.

    1988-09-28

    Nuclear safeguards applied by the International Atomic Energy Agency (IAEA) are one element of the non-proliferation regime'', the collection of measures whose aim is to forestall the spread of nuclear weapons to countries that do not already possess them. Safeguards verifications provide evidence that nuclear materials in peaceful use for nuclear-power production are properly accounted for. Though carried out in cooperation with nuclear facility operators, the verifications can provide assurance because they are designed with the capability to detect diversion, should it occur. Traditional safeguards verification measures conducted by inspectors of the IAEA include book auditing; counting and identifying containers of nuclear material; measuring nuclear material; photographic and video surveillance; and sealing. Novel approaches to achieve greater efficiency and effectiveness in safeguards verifications are under investigation as the number and complexity of nuclear facilities grow. These include the zone approach, which entails carrying out verifications for groups of facilities collectively, and randomization approach, which entails carrying out entire inspection visits some fraction of the time on a random basis. Both approaches show promise in particular situations, but, like traditional measures, must be tested to ensure their practical utility. These approaches are covered on this report. 15 refs., 16 figs., 3 tabs.

  13. International safeguards: Accounting for nuclear materials

    International Nuclear Information System (INIS)

    Fishbone, L.G.

    1988-01-01

    Nuclear safeguards applied by the International Atomic Energy Agency (IAEA) are one element of the ''non-proliferation regime'', the collection of measures whose aim is to forestall the spread of nuclear weapons to countries that do not already possess them. Safeguards verifications provide evidence that nuclear materials in peaceful use for nuclear-power production are properly accounted for. Though carried out in cooperation with nuclear facility operators, the verifications can provide assurance because they are designed with the capability to detect diversion, should it occur. Traditional safeguards verification measures conducted by inspectors of the IAEA include book auditing; counting and identifying containers of nuclear material; measuring nuclear material; photographic and video surveillance; and sealing. Novel approaches to achieve greater efficiency and effectiveness in safeguards verifications are under investigation as the number and complexity of nuclear facilities grow. These include the zone approach, which entails carrying out verifications for groups of facilities collectively, and randomization approach, which entails carrying out entire inspection visits some fraction of the time on a random basis. Both approaches show promise in particular situations, but, like traditional measures, must be tested to ensure their practical utility. These approaches are covered on this report. 15 refs., 16 figs., 3 tabs

  14. Material surveillance and verification program at a uranium enriching plant

    International Nuclear Information System (INIS)

    DeVito, V.J.

    1975-01-01

    A license for a nuclear facility in the United States is approved only after a licensee demonstrates by procedure or practice that an adequate material control system exists. A license can specify acceptable material control practices. Therefore, processors in the United States receiving uranium hexafluoride (UF 6 ) from a U. S. Government-owned enriching plant can accept shipper's values for nuclear material accounting purposes if: there is surveillance during withdrawal of the UF 6 , an independent sample is obtained, and certain measurement verification is subsequently performed by the receiver or the receiver's agent. Because of the high equipment and operating costs, essentially all UF 6 processors have adopted a surveillance and verification program. A resident observer is employed to perform surveillance, obtain samples, and tamper-safe the shipping cylinders. Samples are analyzed by the receiver or by an independent laboratory. The observer determines by surveillance that withdrawals, or transfers of material, weighings, and sampling are accomplished in accordance with accepted procedures. Surveillance of the withdrawals includes observing the transfer of UF 6 from the enriching plant cylinder to the shipping cylinder(s) and the withdrawal of samples. In addition, it inclu []es observing the weighing of all cylinders associated with a sample lot of UF 6 . Following the surveillance of withdrawals, weighings, and sampling, the cylinders are made tamper-safe by the application of tamper-indicating devices. Statistics for the verification program have shown shipper and receiver measurements to be within the limits acceptable for adequate material control. (auth)

  15. Hot cell verification facility update

    International Nuclear Information System (INIS)

    Titzler, P.A.; Moffett, S.D.; Lerch, R.E.

    1985-01-01

    The Hot Cell Verification Facility (HCVF) provides a prototypic hot cell mockup to check equipment for functional and remote operation, and provides actual hands-on training for operators. The facility arrangement is flexible and assists in solving potential problems in a nonradioactive environment. HCVF has been in operation for six years, and the facility is a part of the Hanford Engineering Development Laboratory

  16. Eggspectation : organic egg verification tool

    NARCIS (Netherlands)

    Ruth, van S.M.; Hoogenboom, L.A.P.

    2011-01-01

    In 2009 RIKILT conducted a study on about 2,000 eggs to evaluate three different analytical verification methods: carotenoid profiling, fatty acid profiling and isotope ratio mass spectrometry. The eggs were collected from about 50 Dutch farms. The selection was based on the farms’ location and

  17. Static Verification for Code Contracts

    Science.gov (United States)

    Fähndrich, Manuel

    The Code Contracts project [3] at Microsoft Research enables programmers on the .NET platform to author specifications in existing languages such as C# and VisualBasic. To take advantage of these specifications, we provide tools for documentation generation, runtime contract checking, and static contract verification.

  18. Runtime Verification in Distributed Computing

    NARCIS (Netherlands)

    Malakuti Khah Olun Abadi, Somayeh; Park, Jong Hyuk; Obaidat, Mohammad; Aksit, Mehmet; Bockisch, Christoph

    2011-01-01

    Runtime verification aims to check whether an application executes its behaviour as specified. Thereby the active execution trace of an application is checked in terms of the actual execution context; diagnosis and, possibly, recovery actions are taken when the specification is violated. In today’s

  19. Automated Verification of Virtualized Infrastructures

    DEFF Research Database (Denmark)

    Bleikertz, Sören; Gross, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    Virtualized infrastructures and clouds present new challenges for security analysis and formal verification: they are complex environments that continuously change their shape, and that give rise to non-trivial security goals such as isolation and failure resilience requirements. We present a pla...

  20. Verification and validation for CIPRNet

    NARCIS (Netherlands)

    Voogd, J.

    2016-01-01

    In this chapter it is shown that if an appreciable risk is present in the use of Modelling and Simulation (M&S), Verification and Validation (V&V) should be employed to manage and mitigate that risk. The use of M&S in the domain of critical infrastructure (CI) will always be accompanied by such a

  1. Nuclear physics

    International Nuclear Information System (INIS)

    Kamal, Anwar

    2014-01-01

    Explains the concepts in detail and in depth. Provides step-by-step derivations. Contains numerous tables and diagrams. Supports learning and teaching with numerous worked examples, questions and problems with answers. Sketches also the historical development of the subject. This textbook explains the experimental basics, effects and theory of nuclear physics. It supports learning and teaching with numerous worked examples, questions and problems with answers. Numerous tables and diagrams help to better understand the explanations. A better feeling to the subject of the book is given with sketches about the historical development of nuclear physics. The main topics of this book include the phenomena associated with passage of charged particles and radiation through matter which are related to nuclear resonance fluorescence and the Moessbauer effect., Gamov's theory of alpha decay, Fermi theory of beta decay, electron capture and gamma decay. The discussion of general properties of nuclei covers nuclear sizes and nuclear force, nuclear spin, magnetic dipole moment and electric quadrupole moment. Nuclear instability against various modes of decay and Yukawa theory are explained. Nuclear models such as Fermi Gas Model, Shell Model, Liquid Drop Model, Collective Model and Optical Model are outlined to explain various experimental facts related to nuclear structure. Heavy ion reactions, including nuclear fusion, are explained. Nuclear fission and fusion power production is treated elaborately.

  2. Verification of industrial x-ray machine: MINTs experience

    International Nuclear Information System (INIS)

    Aziz Amat; Saidi Rajab; Eesan Pasupathi; Saipo Bahari Abdul Ratan; Shaharudin Sayuti; Abd Nassir Ibrahim; Abd Razak Hamzah

    2005-01-01

    Radiation and electrical safety of the industrial x-ray equipment required to meet Atomic Energy Licensing Board(AELB) guidelines ( LEM/TEK/42 ) at the time of installation and subsequently a periodic verification should be ensured. The purpose of the guide is to explain the requirements employed in conducting the test on industrial x-ray apparatus and be certified in meeting with our local legislative and regulation. Verification is aimed to provide safety assurance information on electrical requirements and the minimum radiation exposure to the operator. This regulation is introduced on new models imported into the Malaysian market. Since June, 1997, Malaysian Institute for Nuclear Technology Research (MINT) has been approved by AELB to provide verification services to private company, government and corporate body throughout Malaysia. Early January 1997, AELB has made it mandatory that all x-ray equipment for industrial purpose (especially Industrial Radiography) must fulfill certain performance test based on the LEM/TEK/42 guidelines. MINT as the third party verification encourages user to improve maintenance of the equipment. MINT experiences in measuring the performance on intermittent and continuous duty rating single-phase industrial x-ray machine in the year 2004 indicated that all of irradiating apparatus tested pass the test and met the requirements of the guideline. From MINT record, 1997 to 2005 , three x-ray models did not meet the requirement and thus not allowed to be used unless the manufacturers willing to modify it to meet AELB requirement. This verification procedures on electrical and radiation safety on industrial x-ray has significantly improved the the maintenance cultures and safety awareness in the usage of x-ray apparatus in the industrial environment. (Author)

  3. SNF verification requirements imposed through 10 CFR Part 961: Interrelationship with MC ampersand A requirements for the OCRWM safeguards system

    International Nuclear Information System (INIS)

    Slater, N.; Vance, S.

    1994-01-01

    Article VI.B.2 of the Standard Contract for Disposal of Spent Nuclear Fuel and/or High-Level Radioactive Waste (10 CFR Part 961, Standard Contract) provides that spent nuclear fuel shall be subject to verification prior to acceptance by the Department of Energy. As part of the overall process for scheduling deliveries of spent nuclear fuel, the Standard Contract requires contract holders to submit detailed descriptions of the spent nuclear fuel they intend to deliver. Thus, the provision for verification in the Standard contract allows the Department the opportunity to ensure that the spent nuclear fuel intended for deliver is consistent with the description provided, and that the material is properly loaded, packaged, marked, and labeled. The Department is currently evaluating the verification requirements for spent nuclear fuel that it will establish pursuant to Article VI.B.2 of the Standard Contract. The Department recognizes that there may be significant overlap between these verification requirements and the requirements established for material control and accountability (MC ampersand A). Therefore, the Department may recommend modifications to the process established in the Standard Contract to ensure that the verification and MC ampersand A functions and activities are fully integrated

  4. Verification station for Sandia/Rockwell Plutonium Protection system

    International Nuclear Information System (INIS)

    Nicholson, N.; Hastings, R.D.; Henry, C.N.; Millegan, D.R.

    1979-04-01

    A verification station has been designed to confirm the presence of plutonium within a container module. These container modules [about 13 cm (5 in.) in diameter and 23 cm (9 in.) high] hold sealed food-pack cans containing either plutonium oxide or metal and were designed by Sandia Laboratories to provide security and continuous surveillance and safety. After the plutonium is placed in the container module, it is closed with a solder seal. The verification station discussed here is used to confirm the presence of plutonium in the container module before it is placed in a carousel-type storage array inside the plutonium storage vault. This measurement represents the only technique that uses nuclear detectors in the plutonium protection system

  5. Initial performance of the advanced inventory verification sample system (AVIS)

    Energy Technology Data Exchange (ETDEWEB)

    Marlow, Johnna B [Los Alamos National Laboratory; Swinhoe, Martyn T [Los Alamos National Laboratory; Menlove, Howard O [Los Alamos National Laboratory; Rael, Carlos D [Los Alamos National Laboratory

    2009-01-01

    This paper describes the requirements, design and initial performance of the Advanced Inventory Verification Sample System (AVIS) a non-destructive assay (NDA) system to measure small samples of bulk mixed uranium-plutonium oxide (MOX) materials (powders and pellets). The AVIS design has evolved from previously developed conceptual physics and engineering designs for the Inventory Sample Verification System (INVS), a safeguards system for nondestructive assay of small samples. The AVIS is an integrated gamma-neutron system. Jointly designed by the Nuclear Material Control Center (NMCC) and the Los Alamos National Laboratory (LANL), AVIS is intended to meet a performance specification of a total measurement uncertainty of less than 0.5% in the neutron ({sup 240}Pu{sub effective}) measurement. This will allow the AVIS to replace destructive chemical analysis for many samples, with concomitant cost, exposure and waste generation savings for the facility. Data taken to date confirming the performance of the AVIS is presented.

  6. Iran and the IAEA: Verification and monitoring under the JCPOA

    International Nuclear Information System (INIS)

    2016-01-01

    On 16 January 2016, IAEA Director General Yukiya Amano announced that Iran had completed the necessary preparatory steps to start implementation of the Joint Comprehensive Plan of Action (JCPOA). This ushers in a new phase in the relations between the IAEA and Iran, and represents the start of an increased effort of the IAEA’s verification and monitoring activities in Iran. The JCPOA was agreed last July between Iran and China, France, Germany, Russia, the United Kingdom, the United States and the European Union, the so called E3/EU+3. The IAEA, which is not party to the JCPOA, is undertaking a wide range of verification and monitoring of nuclear-related commitments set out in the document.

  7. The status of nuclear inspections in Iraq. New York, 27 January 2003. Statement to the United Nations Security Council

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2003-01-01

    For the past 60 days, the inspectors of the IAEA have been engaged in the process of verifying the existence or absence of a nuclear weapons programme in Iraq. Today, pursuant to paragraph 5 of resolution 1441, I have submitted to the President of the Security Council an update report on progress since our nuclear verification activities in Iraq were resumed - in terms of the approach we adopted, the tools being used, the specific results achieved, the degree of co-operation received, and finally the view on how the inspectors should proceed. This statement outlines the key aspects of this report. To date no evidence was found that Iraq has revived its nuclear weapons programme since the elimination of the programme in the 1990s. However, the work is steadily progressing and should be allowed to run its natural course. With the IAEA verification system now in place, barring exceptional circumstances, and provided there is sustained proactive cooperation by Iraq, the IAEA should be able within the next few months to provide credible assurance that Iraq has no nuclear weapons programme. These few months would be a valuable investment in peace because they could help to avoid a war. We trust that we will continue to have your support as we make every effort to verify Iraq's nuclear disarmament through peaceful means, and to demonstrate that the inspection process can and does work, as a central feature of the international nuclear arms control regime

  8. Reviving nuclear disarmament, 26 February 2008, Oslo, Norway

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2008-01-01

    In 1987, Reagan and Gorbachev did agree to abolish an entire class of nuclear weapons - shorter- and intermediate-range missiles - in the INF Treaty. They also created a legacy of dialogue, trust and verification. Significant cuts were subsequently agreed by the two opposing power blocs in everything from military manpower, tanks and warplanes to attack helicopters. There were also verified reductions in strategic nuclear weapons in the START process. Unfortunately, the momentum got lost. In recent years, nuclear threats have become more dangerous and more complex. The number of states known to have nuclear weapons has expanded to nine. Virtually all are extending or modernizing their nuclear weapon arsenals. Others have tried to develop clandestine nuclear programmes. Extremist groups have shown keen interest in acquiring nuclear weapons. Nuclear materials have become more difficult to control. Roughly 27 000 nuclear warheads still remain in the arsenals of these nine countries, 95 percent of which are in the hands of the United States and the Russian Federation. Strategic reliance on these weapons by these countries and their allies undoubtedly motivates others to do the same. And naturally, plans to replenish and modernize these weapons create a pervasive feeling of cynicism among many states - which sense a 'do as I say, not as I do' posture. The rest of the world should actually concentrate on is reaching out to the Middle East by helping to address the dire conditions in the region - chronic and festering conflicts, poverty and social injustice, repression and inept governance. These very conditions are at the root of the pervasive sense of injustice and humiliation that translates into extremism and violence, the drivers for most of the world's major non-proliferation and security concerns. Control of the nuclear fuel cycle is key to curbing proliferation risks. But it must be unambiguously under multinational control, not just managed by the leading nuclear

  9. Children's (Pediatric) Nuclear Medicine

    Medline Plus

    Full Text Available ... liver and gallbladder. gastrointestinal tract. heart. lungs. brain. thyroid. Nuclear medicine scans are typically used to help ... children. epilepsy . location, anatomy and function of the thyroid gland. top of page How does the nuclear ...

  10. Children's (Pediatric) Nuclear Medicine

    Medline Plus

    Full Text Available ... What are some common uses of the procedure? Children's (pediatric) nuclear medicine imaging is performed to help diagnose childhood disorders that are congenital (present at birth) or that develop during childhood. Physicians use nuclear medicine imaging to ...

  11. The peaceful uses of nuclear energy. Amman, 5 March 1999

    International Nuclear Information System (INIS)

    ElBaradei, M.

    1999-01-01

    The document reproduces the text of the conference given by the Director General of the IAEA at a meeting held at the Diplomatic Institute, Amman, 5 March 1999. The following aspects from the Agency's activity are presented to emphasize its role in the peaceful use of nuclear energy: the transfer of nuclear technologies to the developing countries through the technical co-operation programme, nuclear power for electricity production, nuclear safety, safeguards and verification including a broad outlook for nuclear disarmament, the strengthened safeguards system, present verification activities, Middle East nuclear weapons free zone

  12. Help for the Caregiver

    Science.gov (United States)

    ... the caregiver needs it. Education and Information Coping Skills Counseling Family Meetings Home Care Help Hospice Care for the Cancer Patient Caregivers have a very hard job and it's normal to need help. Although ...

  13. Automated Installation Verification of COMSOL via LiveLink for MATLAB

    Energy Technology Data Exchange (ETDEWEB)

    Crowell, Michael W [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-01-01

    Verifying that a local software installation performs as the developer intends is a potentially time-consuming but necessary step for nuclear safety-related codes. Automating this process not only saves time, but can increase reliability and scope of verification compared to ‘hand’ comparisons. While COMSOL does not include automatic installation verification as many commercial codes do, it does provide tools such as LiveLink™ for MATLAB® and the COMSOL API for use with Java® through which the user can automate the process. Here we present a successful automated verification example of a local COMSOL 5.0 installation for nuclear safety-related calculations at the Oak Ridge National Laboratory’s High Flux Isotope Reactor (HFIR).

  14. Verification for excess reactivity on beginning equilibrium core of RSG GAS

    International Nuclear Information System (INIS)

    Daddy Setyawan; Budi Rohman

    2011-01-01

    BAPETEN is an institution authorized to control the use of nuclear energy in Indonesia. Control for the use of nuclear energy is carried out through three pillars: regulation, licensing, and inspection. In order to assure the safety of the operating research reactors, the assessment unit of BAPETEN is carrying out independent assessment in order to verify safety related parameters in the SAR including neutronic aspect. The work includes verification to the Power Peaking Factor in the equilibrium silicide core of RSG GAS reactor by computational method using MCNP-ORIGEN. This verification calculation results for is 9.4 %. Meanwhile, the RSG-GAS safety analysis report shows that the excess reactivity on equilibrium core of RSG GAS is 9.7 %. The verification calculation results show a good agreement with the report. (author)

  15. Automated Installation Verification of COMSOL via LiveLink for MATLAB

    International Nuclear Information System (INIS)

    Crowell, Michael W

    2015-01-01

    Verifying that a local software installation performs as the developer intends is a potentially time-consuming but necessary step for nuclear safety-related codes. Automating this process not only saves time, but can increase reliability and scope of verification compared to ''hand'' comparisons. While COMSOL does not include automatic installation verification as many commercial codes do, it does provide tools such as LiveLink TM for MATLAB® and the COMSOL API for use with Java® through which the user can automate the process. Here we present a successful automated verification example of a local COMSOL 5.0 installation for nuclear safety-related calculations at the Oak Ridge National Laboratory's High Flux Isotope Reactor (HFIR).

  16. A helping hand

    NARCIS (Netherlands)

    Mirjam de Klerk; Alice de Boer; Sjoerd Kooiker; Inger Plaisier; Peggy Schyns

    2014-01-01

    Original title: Hulp geboden   The help provided to people with a care need is about to undergo major changes in the Netherlands. People who need help will be expected to rely more on help from members of their network. What are the opportunities for informal carers and volunteers, and where

  17. Specification and verification of the RTOS for plant protection systems

    International Nuclear Information System (INIS)

    Kim, Jin Hyun; Ahn, Young Ah; Lee, Su-Young; Choi, Jin Young; Lee, Na Young

    2004-01-01

    PLC is a computer system for instrumentation and control (I and C) systems such as control of machinery on factory assembly lines. control of machinery on factory assembly lines and Nucleare power plants. In nuclear power industry, systems is classified into 3 classes- Non-safety, safety-related and safety-critical up to integrity on system's using purpose. If PLC is used for controlling reactor in nuclear power plant, it should be identified as safety-critical. PLC has several I and C logics in software, including real-time operating system (RTOS). Hence, RTOS must be also proved that it is safe and reliable by various way and methods. In this paper, we apply formal methods to a development of RTOS for PLC in safety-critical level; Statecharts for specification and model checking for verification. In this paper, we give the results of applying formal methods to RTOS. (author)

  18. Determination of ABOS 1-3+ system components belonging to the scope of license application of Paks Nuclear Power Plant Unit 1 for extension of service life, designated for the review, and verification of completeness of the scope

    International Nuclear Information System (INIS)

    Biro, Agnes Janosine; Tanits, Katalin Baumann-ne; Gosi, Peter; Kovacs, Andras; Ratkai, Sandor

    2012-01-01

    the task the tables, colored schemes and records justifying the verification of completeness were utilized in the development of Chapter 2 of the documentation meant to support the SLE license application of Unit 1. (author)

  19. Concepts of Model Verification and Validation

    International Nuclear Information System (INIS)

    Thacker, B.H.; Doebling, S.W.; Hemez, F.M.; Anderson, M.C.; Pepin, J.E.; Rodriguez, E.A.

    2004-01-01

    Model verification and validation (VandV) is an enabling methodology for the development of computational models that can be used to make engineering predictions with quantified confidence. Model VandV procedures are needed by government and industry to reduce the time, cost, and risk associated with full-scale testing of products, materials, and weapon systems. Quantifying the confidence and predictive accuracy of model calculations provides the decision-maker with the information necessary for making high-consequence decisions. The development of guidelines and procedures for conducting a model VandV program are currently being defined by a broad spectrum of researchers. This report reviews the concepts involved in such a program. Model VandV is a current topic of great interest to both government and industry. In response to a ban on the production of new strategic weapons and nuclear testing, the Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship Program (SSP). An objective of the SSP is to maintain a high level of confidence in the safety, reliability, and performance of the existing nuclear weapons stockpile in the absence of nuclear testing. This objective has challenged the national laboratories to develop high-confidence tools and methods that can be used to provide credible models needed for stockpile certification via numerical simulation. There has been a significant increase in activity recently to define VandV methods and procedures. The U.S. Department of Defense (DoD) Modeling and Simulation Office (DMSO) is working to develop fundamental concepts and terminology for VandV applied to high-level systems such as ballistic missile defense and battle management simulations. The American Society of Mechanical Engineers (ASME) has recently formed a Standards Committee for the development of VandV procedures for computational solid mechanics models. The Defense Nuclear Facilities Safety Board (DNFSB) has been a proponent of model

  20. The Efficacy of Social Media as a Research Tool and Information Source for Safeguards Verification

    International Nuclear Information System (INIS)

    Skoeld, T.; Feldman, Y.

    2015-01-01

    The IAEA Department of Safeguards aims to provide credible assurances to the international community that States are fulfiling their safeguards obligations in that all nuclear material remains in peaceful use. In order to draw a soundly-based safeguards conclusion for a State that has a safeguards agreement in force with the IAEA, the Department establishes a knowledge base of the State's nuclear-related infrastructure and activities against which a State's declarations are evaluated for correctness and completeness. Open source information is one stream of data that is used in the evaluation of nuclear fuel cycle activities in the State. The Department is continuously working to ensure that it has access to the most up-to-date, accurate, relevant and credible open source information available, and has begun to examine the use of social media as a new source of information. The use of social networking sites has increased exponentially in the last decade. In fact, social media has emerged as the key vehicle for delivering and acquiring information in near real-time. Therefore, it has become necessary for the open source analyst to consider social media as an essential element in the broader concept of open source information. Characteristics, such as ''immediacy'', ''recency'', ''interractiveness'', which set social networks apart from the ''traditional media'', are also the same attributes that present a challenge for using social media as an efficient information-delivery platform and a credible source of information. New tools and technologies for social media analytics have begun to emerge to help systematically monitor and mine this large body of data. The paper will survey the social media landscape in an effort to identify platforms that could be of value for safeguards verification purposes. It will explore how a number of social networking sites, such as Twitter

  1. Virtual nuclear capabilities and deterrence in a world without nuclear weapons. VERTIC research report no. 3

    International Nuclear Information System (INIS)

    Paloczi-Horvath, G.

    1998-01-01

    items specific to nuclear weapons. The nuclear disarmament treaty need not take specific account of implicit VND. It would entail only a tacit intellectual understanding that, in the early years after complete and timetabled nuclear disarmament, an NWS or DFNWS might retain the de facto capability to re-arm. An explicit VND regime would require intrusive and effective verification and enforcement measures and clearly defined regulations concerning their application. Implicit VND would not have such a 'regime' and would be verified in the same manner as a nuclear disarmament treaty and would hence not require separate arrangements. This report suggests that an implicit VND posture might help guarantee observance of a nuclear disarmament treaty during the early years after going to 'zero', by representing the ability of treaty signatories to re-arm in response to nuclear weapon 'break out'. Any form of VND risks becoming a permanent state of affairs after arsenals are reduced to 'zero'. For this reason, a fully-implemented nuclear disarmament treaty cannot be regarded as the end of efforts to contain, and eventually eliminate, states parties' ability to recreate their arsenals. It would be necessary for a nuclear disarmament treaty to include a codicil on restraint in official public statements about nuclear and delivery system capabilities in order not to undermine an implicit VND posture. The objective would be to move beyond implicit VND to unambiguous nuclear disarmament over a defined period, so that this form of assumed deterrence is no longer needed. In any case, VNC would remain a permanent fact of life in a nuclear weapon-free world after going to 'zero'. Therefore, a time-limited security architecture should be part of the nuclear disarmament treaty, specifying exactly how long states can retain the nuclear weapons-related capabilities underpinning any VND posture

  2. Formal Verification of Continuous Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer

    2012-01-01

    The purpose of this thesis is to develop a method for verifying timed temporal properties of continuous dynamical systems, and to develop a method for verifying the safety of an interconnection of continuous systems. The methods must be scalable in the number of continuous variables...... to the high complexity of both the dynamical system and the specification. Therefore, there is a need for methods capable of verifying complex specifications of complex systems. The verification of high dimensional continuous dynamical systems is the key to verifying general systems. In this thesis......, an abstraction approach is taken to the verification problem. A method is developed for abstracting continuous dynamical systems by timed automata. This method is based on subdividing the state space into cells by use of subdivisioning functions that are decreasing along the vector field. To allow...

  3. nuclear fuel design criteria

    International Nuclear Information System (INIS)

    Can, S.

    1997-01-01

    Nuclear fuel design is strictly dependent on reactor type and experiences obtained from performance of nuclear fuels. The objectives of the design are reliability, and economy. Nuclear fuel design requires an interdisciplinary work which has to cover, at least nuclear design, thermalhydraulic design, mechanical design, and material properties.The procedure of design, as describe in the quality assurance, consist of a number of steps. The most important parts are: Design description or inputs, preliminary design, detailed design and design output, and design verification. The first step covers objectives and requirements, as defined by the customer and by the regulatory authority for product performance,environmental factors, safety, etc. The second describes assumptions and alternatives, safety, economy and engineering analyses. The third covers technical specifications, design drawings, selection of QA program category, etc. The most important form of design verification is design review by qualified independent internal or external reviewers. The scope of the review depends on the specific character of the design work. Personnel involved in verification and review do not assume prime responsibility for detecting errors. Responsibility for the design remains with the personnel involved in the design work

  4. Cleanup Verification Package for the 118-C-1, 105-C Solid Waste Burial Ground

    International Nuclear Information System (INIS)

    Appel, M.J.; Capron, J.M.

    2007-01-01

    This cleanup verification package documents completion of remedial action for the 118-C-1, 105-C Solid Waste Burial Ground. This waste site was the primary burial ground for general wastes from the operation of the 105-C Reactor and received process tubes, aluminum fuel spacers, control rods, reactor hardware, spent nuclear fuel and soft wastes

  5. Cleanup Verification Package for the 118-C-1, 105-C Solid Waste Burial Ground

    Energy Technology Data Exchange (ETDEWEB)

    M. J. Appel and J. M. Capron

    2007-07-25

    This cleanup verification package documents completion of remedial action for the 118-C-1, 105-C Solid Waste Burial Ground. This waste site was the primary burial ground for general wastes from the operation of the 105-C Reactor and received process tubes, aluminum fuel spacers, control rods, reactor hardware, spent nuclear fuel and soft wastes.

  6. An overview of CTBT verification technologies and status of IMS networks

    International Nuclear Information System (INIS)

    Basham, P.

    2002-01-01

    The CTBT history is described in brief. Nuclear test environments and verification regime are presented with illustrations. Geographical location of seismic, hydroacoustic, infrasound and radionuclide monitoring networks are indicated on globe maps. Benefits of the International Monitoring System (IMS) to host countries are listed

  7. Physical inventory verification exercise at a light-water reactor facility

    International Nuclear Information System (INIS)

    Bosler, G.E.; Menlove, H.O.; Halbig, J.K.

    1986-04-01

    A simulated physical inventory verification exercise was performed at the Three Mile Island (TMI) Unit 1 reactor. Inspectors from the Internatinal Atomic Energy Agency made measurements on fresh- and spent-fuel assemblies and verified the special nuclear material inventory at TMI. Simulated inspection log sheets and computerized inspection reports were prepared

  8. MUSE WFM AO Science Verification

    Science.gov (United States)

    Leibundgut, B.; Bacon, R.; Jaffé, Y. L.; Johnston, E.; Kuntschner, H.; Selman, F.; Valenti, E.; Vernet, J.; Vogt, F.

    2017-12-01

    The goal of Science Verification (SV) as part of the transition into operations is to carry out scientific observations to test the end-to-end operations of a new instrument or new instrument modes. The Multi Unit Spectroscopic Explorer, (MUSE; Bacon et al., 2010), at the Very Large Telescope (VLT) can be operated in several modes. The wide-field mode has been offered since Period 94 (October 2014) for natural-seeing observations. With the commissioning of the Adaptive Optics Facility (AOF; Arsenault et al., 2017) the wide-field mode can be supported by ground-layer adaptive optics through four artificial laser guide stars and the adaptive optics module, Ground Atmospheric Layer Adaptive OptiCs for Spectroscopic Imaging (GALACSI). The MUSE wide-field mode adaptive optics Science Verification (hereafter referred to MUSE WFM AO SV) was scheduled from 12–14 August 2017. Out of 41 submitted proposals, 19 observing programmes were scheduled, covering a wide range of science topics and amounting to an allocation of 42 hours. This included sufficient oversubscription to cover all expected observing conditions. Due to inclement weather during the original SV nights, two more nights were allocated on 16 and 17 September 2017 to observe more programmes. In total, seven programmes were completed, six programmes received partial data, and the remaining six projects could not be started. We summarise here the planning, execution and first results from the Science Verification.

  9. A study on the decommissioning methods of nuclear facilities of North Korea

    International Nuclear Information System (INIS)

    Chung, U. S.; Park, J. H.; Park, S. K.; Hong, S. B.; Lee, G. W.

    2012-02-01

    For Korea, it is essential to participate in the decommissioning of North Korean nuclear facilities for Pu-based weapon program and to lead the project for the protection of the environments from the possible spread of nuclear contamination. Before, the studies for the verification of the North Korea nuclear facilities and for the technical preparation of the decommissioning of north Korea were conducted but the depth of the studies was not reached to the evaluation of the decommissioning project by the documentation of a decommissioning plan to the provision of the technical information to the policy decision makers. It is very helpful for understanding the characteristics of the decommissioning projects to formulate a possible dismantling scenario and to make a decommissioning plan. The cost and the periods estimated on the base of this scenario is more exact and the analysis for the selection of different policies will be possible

  10. Non-Proliferation, the IAEA Safeguards System, and the importance of nuclear material measurements

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, Rebecca S. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-18

    The objective of this project is to explain the contribution of nuclear material measurements to the system of international verification of State declarations and the non-proliferation of nuclear weapons.

  11. Children's (Pediatric) Nuclear Medicine

    Medline Plus

    Full Text Available ... medicine imaging is performed to help diagnose childhood disorders that are congenital (present at birth) or that develop ... Nuclear medicine scans are typically used to help ...

  12. Report on the control of the safety and security of nuclear facilities. Part 2: the reconversion of military plutonium stocks. The use of the helps given to central and eastern Europe countries and to the new independent states

    International Nuclear Information System (INIS)

    Birraux, C.

    2002-01-01

    This report deals with two different aspects of the safety and security of nuclear facilities. The first aspect concerns the reconversion of weapon grade plutonium stocks: the plutonium in excess, plutonium hazards and nuclear fuel potentialities, the US program, the Russian program, the actions of European countries (France, Germany), the intervention of other countries, the unanswered questions (political aspects, uncertainties), the solutions of the future (improvement of reactors, the helium-cooled high temperature reactor technology (gas-turbine modular helium reactor: GT-MHR), the Carlo Rubbia's project). The second aspect concerns the actions carried out by the European Union in favor of the civil nuclear facilities of central and eastern Europe: the European Union competencies through the Euratom treaty, the conclusions of the European audit office about the PHARE and TACIS nuclear programs, the status of committed actions, the coming planned actions, and the critical analysis of the policy adopted so far. (J.S.)

  13. Development and verification of Monte Carlo burnup calculation system

    International Nuclear Information System (INIS)

    Ando, Yoshihira; Yoshioka, Kenichi; Mitsuhashi, Ishi; Sakurada, Koichi; Sakurai, Shungo

    2003-01-01

    Monte Carlo burnup calculation code system has been developed to evaluate accurate various quantities required in the backend field. From the Actinide Research in a Nuclear Element (ARIANE) program, by using, the measured nuclide compositions of fuel rods in the fuel assemblies irradiated in the commercial Netherlands BWR, the analyses have been performed for the code system verification. The code system developed in this paper has been verified through analysis for MOX and UO2 fuel rods. This system enables to reduce large margin assumed in the present criticality analysis for LWR spent fuels. (J.P.N.)

  14. Formal verification of reactor process control software using assertion checking environment

    International Nuclear Information System (INIS)

    Sharma, Babita; Balaji, Sowmya; John, Ajith K.; Bhattacharjee, A.K.; Dhodapkar, S.D.

    2005-01-01

    Assertion Checking Environment (ACE) was developed in-house for carrying out formal (rigorous/ mathematical) functional verification of embedded software written in MISRA C. MISRA C is an industrially sponsored safe sub-set of C programming language and is well accepted in the automotive and aerospace industries. ACE uses static assertion checking technique for verification of MISRA C programs. First the functional specifications of the program are derived from the specifications in the form of pre- and post-conditions for each C function. These pre- and post-conditions are then introduced as assertions (formal comments) in the program code. The annotated C code is then formally verified using ACE. In this paper we present our experience of using ACE for the formal verification of process control software of a nuclear reactor. The Software Requirements Document (SRD) contained textual specifications of the process control software. The SRD was used by the designers to draw logic diagrams which were given as input to a code generator. The verification of the generated C code was done at 2 levels viz. (i) verification against specifications derived from logic diagrams, and (ii) verification against specifications derived from SRD. In this work we checked approximately 600 functional specifications of the software having roughly 15000 lines of code. (author)

  15. Dictionary of nuclear power

    International Nuclear Information System (INIS)

    Koelzer, W.

    2012-06-01

    The actualized version (June 2012) of the dictionary on nuclear power includes all actualizations and new inputs since the last version of 2001. The original publication dates from 1980. The dictionary includes definitions, terms, measuring units and helpful information on the actual knowledge concerning nuclear power, nuclear fuel cycle, nuclear facilities, radioactive waste management, nuclear physics, reactor physics, isotope production, biological radiation effects, and radiation protection.

  16. Advances in instrumentation for nuclear industry

    International Nuclear Information System (INIS)

    Mayya, Y.S.

    2012-01-01

    The key motivations for advances in instrumentation in Nuclear industry always are - improved plant availability and safety with reduced cost. The time tested design principles applicable to safety systems in Nuclear power plants guide these developments: simplicity, diversity, independence, defence-in-depth and fail-safety. Nuclear instruments are primarily made up of detectors/sensors and processing electronics. Today's instruments leverage the latest advancements in material science, sensors, architectures, processors, computation and development platforms, networks, software, diagnostics and HMl technologies to achieve the above objectives. Nuclear plants are heavily instrumented: a wide variety of instruments are deployed not only for the safe and reliable operation of the plant itself but also for the monitoring of health and safety of personnel. This applies to all nuclear installations including research and power reactors, fuel reprocessing plants, fuel fabrication facilities, heavy water plants etc. In addition to the above, it has now become necessary for these plants to have instruments for monitoring movement of Special nuclear materials. Historically, the nuclear industry has been slower in embracing new technologies due to the rigorous process of verification and validation involved for licensing. As newer technologies emerge, they also impinge on regulatory framework, principles and practices as has been happening over the previous decades as computers and software based systems made gradual inroads in to the safety island. Electronics Corporation of India came into being with the mandate of meeting all the instrumentation requirements of the Atomic Energy Program of the country. This not only includes the instrumentation for safe operation of nuclear power reactors and allied facilities but also for the related basic and nuclear science research and development activities. Since its inception, ECIL has been involved in the development, production

  17. Reframing the debate against nuclear weapons

    International Nuclear Information System (INIS)

    Tyson, Rhianna

    2005-01-01

    'Some 35,000 nuclear weapons remain in the arsenals of the nuclear powers, with thousands still deployed on hair-trigger alert. Whatever rationale these weapons may once have had has long since dwindled. Political, moral, and legal constraints on actually using them further undermine their strategic utility without, however, reducing the risks of inadvertent war or proliferation. The objective of nuclear non-proliferation is not helped by the fact that the nuclear weapon States continue to insist that those weapons in their hands enhance security, while in the hands of others they are a threat to world peace. If we were making steady progress towards disarmament, this situation would be less alarming. Unfortunately, the reverse is true.' - United Nations Secretary-General Kofi Annan. 'Something is wrong with the nuclear disarmament and non-proliferation regime. Although seemingly well-equipped with an arsenal of legal and political mechanisms, such as the Nuclear Non-Proliferation Treaty (NPT), the 1996 Advisory Opinion of the International Court of Justice (ICJ), decades' worth of General Assembly (GA) resolutions and even a recent slew of ad-hoc, plurilateral initiatives such as the Proliferation Security Initiative, the regime created to prevent the catastrophe of nuclear war remains inadequate. This insufficiency is even starker when viewed in relation to the regimes controlling other weapons of mass destruction. Despite its own challenges, the Organization for the Prohibition on Chemical Weapons remains relatively well-funded and well-situated to facilitate the implementation of the Chemical Weapons Convention (CWC). Even the Biological and Toxin Weapons Convention (BTWC), while still lacking the necessary verification mechanisms, has managed to effectively criminalize not just the use and threat of use of biological weapons, but also their production, development and stockpiling. Meanwhile, the anti-nuclear regime seems to be faltering. Progress made in

  18. Formal verification and validation of the safety-critical software in a digital reactor protection system

    International Nuclear Information System (INIS)

    Kwon, K. C.; Park, G. Y.

    2006-01-01

    This paper describes the Verification and Validation (V and V) activities for the safety-critical software in a Digital Reactor Protection System (DRPS) that is being developed through the Korea nuclear instrumentation and control system project. The main activities of the DRPS V and V process are a preparation of the software planning documentation, a verification of the software according to the software life cycle, a software safety analysis and a software configuration management. The verification works for the Software Requirement Specification (SRS) of the DRPS consist of a technical evaluation, a licensing suitability evaluation, a inspection and traceability analysis, a formal verification, and preparing a test plan and procedure. Especially, the SRS is specified by the formal specification method in the development phase, and the formal SRS is verified by a formal verification method. Through these activities, we believe we can achieve the functionality, performance, reliability, and safety that are the major V and V objectives of the nuclear safety-critical software in a DRPS. (authors)

  19. IAEA verification experiment at the Portsmouth Gaseous Diffusion Plant

    International Nuclear Information System (INIS)

    Gordon, D.M.; Subudhi, M.; Calvert, O.L.; Bonner, T.N.; Cherry, R.C.; Whiting, N.E.

    1998-01-01

    In April 1996, the United States (US) added the Portsmouth Gaseous Diffusion Plant to the list of facilities eligible for the application of International Atomic Energy Agency (IAEA) safeguards. At that time, the US proposed that the IAEA carry out a Verification Experiment at the plant with respect to the downblending of about 13 metric tons of highly enriched uranium (HEU) in the form of UF 6 . This material is part of the 226 metric tons of fissile material that President Clinton has declared to be excess to US national-security needs and which will be permanently withdrawn from the US nuclear stockpile. In September 1997, the IAEA agreed to carry out this experiment, and during the first three weeks of December 1997, the IAEA verified the design information concerning the downblending process. The plant has been subject to short-notice random inspections since December 17, 1997. This paper provides an overview of the Verification Experiment, the monitoring technologies used in the verification approach, and some of the experience gained to date

  20. Performance Verification for Safety Injection Tank with Fluidic Device

    International Nuclear Information System (INIS)

    Yune, Seok Jeong; Kim, Da Yong

    2014-01-01

    In LBLOCA, the SITs of a conventional nuclear power plant deliver excessive cooling water to the reactor vessel causing the water to flow into the containment atmosphere. In an effort to make it more efficient, Fluidic Device (FD) is installed inside a SIT of Advanced Power Reactor 1400 (APR 1400). FD, a complete passive controller which doesn't require actuating power, controls injection flow rates which are susceptible to a change in the flow resistance inside a vortex chamber of FD. When SIT Emergency Core Cooling (ECC) water level is above the top of the stand pipe, the water enters the vortex chamber through both the top of the stand pipe and the control ports resulting in injection of the water at a large flow rate. When the water level drops below the top of the stand pipe, the water only enters the vortex chamber through the control ports resulting in vortex formation in the vortex chamber and a relatively small flow injection. Performance verification of SIT shall be carried out because SITs play an integral role to mitigate accidents. In this paper, the performance verification method of SIT with FD is presented. In this paper, the equations for calculation of flow resistance coefficient (K) are induced to evaluate on-site performance of APR 1400 SIT with FD. Then, the equations are applied to the performance verification of SIT with FD and good results are obtained

  1. A Formal Verification Method of Function Block Diagram

    International Nuclear Information System (INIS)

    Koh, Kwang Yong; Seong, Poong Hyun; Jee, Eun Kyoung; Jeon, Seung Jae; Park, Gee Yong; Kwon, Kee Choon

    2007-01-01

    Programmable Logic Controller (PLC), an industrial computer specialized for real-time applications, is widely used in diverse control systems in chemical processing plants, nuclear power plants or traffic control systems. As a PLC is often used to implement safety, critical embedded software, rigorous safety demonstration of PLC code is necessary. Function block diagram (FBD) is a standard application programming language for the PLC and currently being used in the development of a fully-digitalized reactor protection system (RPS), which is called the IDiPS, under the KNICS project. Therefore, verification issue of FBD programs is a pressing problem, and hence is of great importance. In this paper, we propose a formal verification method of FBD programs; we defined FBD programs formally in compliance with IEC 61131-3, and then translate the programs into Verilog model, and finally the model is verified using a model checker SMV. To demonstrate the feasibility and effective of this approach, we applied it to IDiPS which currently being developed under KNICS project. The remainder of this paper is organized as follows. Section 2 briefly describes Verilog and Cadence SMV. In Section 3, we introduce FBD2V which is a tool implemented to support the proposed FBD verification framework. A summary and conclusion are provided in Section 4

  2. Verification and validation guidelines for high integrity systems. Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    Hecht, H.; Hecht, M.; Dinsmore, G.; Hecht, S.; Tang, D. [SoHaR, Inc., Beverly Hills, CA (United States)

    1995-03-01

    High integrity systems include all protective (safety and mitigation) systems for nuclear power plants, and also systems for which comparable reliability requirements exist in other fields, such as in the process industries, in air traffic control, and in patient monitoring and other medical systems. Verification aims at determining that each stage in the software development completely and correctly implements requirements that were established in a preceding phase, while validation determines that the overall performance of a computer system completely and correctly meets system requirements. Volume I of the report reviews existing classifications for high integrity systems and for the types of errors that may be encountered, and makes recommendations for verification and validation procedures, based on assumptions about the environment in which these procedures will be conducted. The final chapter of Volume I deals with a framework for standards in this field. Volume II contains appendices dealing with specific methodologies for system classification, for dependability evaluation, and for two software tools that can automate otherwise very labor intensive verification and validation activities.

  3. Verification and validation guidelines for high integrity systems. Volume 1

    International Nuclear Information System (INIS)

    Hecht, H.; Hecht, M.; Dinsmore, G.; Hecht, S.; Tang, D.

    1995-03-01

    High integrity systems include all protective (safety and mitigation) systems for nuclear power plants, and also systems for which comparable reliability requirements exist in other fields, such as in the process industries, in air traffic control, and in patient monitoring and other medical systems. Verification aims at determining that each stage in the software development completely and correctly implements requirements that were established in a preceding phase, while validation determines that the overall performance of a computer system completely and correctly meets system requirements. Volume I of the report reviews existing classifications for high integrity systems and for the types of errors that may be encountered, and makes recommendations for verification and validation procedures, based on assumptions about the environment in which these procedures will be conducted. The final chapter of Volume I deals with a framework for standards in this field. Volume II contains appendices dealing with specific methodologies for system classification, for dependability evaluation, and for two software tools that can automate otherwise very labor intensive verification and validation activities

  4. The SeaHorn Verification Framework

    Science.gov (United States)

    Gurfinkel, Arie; Kahsai, Temesghen; Komuravelli, Anvesh; Navas, Jorge A.

    2015-01-01

    In this paper, we present SeaHorn, a software verification framework. The key distinguishing feature of SeaHorn is its modular design that separates the concerns of the syntax of the programming language, its operational semantics, and the verification semantics. SeaHorn encompasses several novelties: it (a) encodes verification conditions using an efficient yet precise inter-procedural technique, (b) provides flexibility in the verification semantics to allow different levels of precision, (c) leverages the state-of-the-art in software model checking and abstract interpretation for verification, and (d) uses Horn-clauses as an intermediate language to represent verification conditions which simplifies interfacing with multiple verification tools based on Horn-clauses. SeaHorn provides users with a powerful verification tool and researchers with an extensible and customizable framework for experimenting with new software verification techniques. The effectiveness and scalability of SeaHorn are demonstrated by an extensive experimental evaluation using benchmarks from SV-COMP 2015 and real avionics code.

  5. Measurement techniques for the verification of excess weapons materials

    International Nuclear Information System (INIS)

    Tape, J.W.; Eccleston, G.W.; Yates, M.A.

    1998-01-01

    The end of the superpower arms race has resulted in an unprecedented reduction in stockpiles of deployed nuclear weapons. Numerous proposals have been put forward and actions have been taken to ensure the irreversibility of nuclear arms reductions, including unilateral initiatives such as those made by President Clinton in September 1993 to place fissile materials no longer needed for a deterrent under international inspection, and bilateral and multilateral measures currently being negotiated. For the technologist, there is a unique opportunity to develop the technical means to monitor nuclear materials that have been declared excess to nuclear weapons programs, to provide confidence that reductions are taking place and that the released materials are not being used again for nuclear explosive programs. However, because of the sensitive nature of these materials, a fundamental conflict exists between the desire to know that the bulk materials or weapon components in fact represent evidence of warhead reductions, and treaty commitments and national laws that require the protection of weapons design information. This conflict presents a unique challenge to technologists. The flow of excess weapons materials, from deployed warheads through storage, disassembly, component storage, conversion to bulk forms, and disposition, will be described in general terms. Measurement approaches based on the detection of passive or induced radiation will be discussed along with the requirement to protect sensitive information from release to unauthorized parties. Possible uses of measurement methods to assist in the verification of arms reductions will be described. The concept of measuring attributes of items rather than quantitative mass-based inventory verification will be discussed along with associated information-barrier concepts required to protect sensitive information

  6. Verification and validation methodology of training simulators

    International Nuclear Information System (INIS)

    Hassan, M.W.; Khan, N.M.; Ali, S.; Jafri, M.N.

    1997-01-01

    A full scope training simulator comprising of 109 plant systems of a 300 MWe PWR plant contracted by Pakistan Atomic Energy Commission (PAEC) from China is near completion. The simulator has its distinction in the sense that it will be ready prior to fuel loading. The models for the full scope training simulator have been developed under APROS (Advanced PROcess Simulator) environment developed by the Technical Research Center (VTT) and Imatran Voima (IVO) of Finland. The replicated control room of the plant is contracted from Shanghai Nuclear Engineering Research and Design Institute (SNERDI), China. The development of simulation models to represent all the systems of the target plant that contribute to plant dynamics and are essential for operator training has been indigenously carried out at PAEC. This multifunctional simulator is at present under extensive testing and will be interfaced with the control planes in March 1998 so as to realize a full scope training simulator. The validation of the simulator is a joint venture between PAEC and SNERDI. For the individual components and the individual plant systems, the results have been compared against design data and PSAR results to confirm the faithfulness of the simulator against the physical plant systems. The reactor physics parameters have been validated against experimental results and benchmarks generated using design codes. Verification and validation in the integrated state has been performed against the benchmark transients conducted using the RELAP5/MOD2 for the complete spectrum of anticipated transient covering the well known five different categories. (author)

  7. Handi Helps, 1985

    Science.gov (United States)

    Handi Helps, 1985

    1985-01-01

    The six issues of Handi Helps presented here focus on specific issues of concern to the disabled, parents, and those working with the disabled. The two-page handi help fact sheets focus on the following topics: child sexual abuse prevention, asthma, scoliosis, the role of the occupational therapist, kidnapping, and muscular dystrophy. Each handi…

  8. Help! It's Hair Loss!

    Science.gov (United States)

    ... Videos for Educators Search English Español Help! It's Hair Loss! KidsHealth / For Kids / Help! It's Hair Loss! ... is alopecia (say: al-uh-PEE-shuh). The Hair-y Story The hair on your head is ...

  9. A verification environment for bigraphs

    DEFF Research Database (Denmark)

    Perrone, Gian David; Debois, Søren; Hildebrandt, Thomas

    2013-01-01

    We present the BigMC tool for bigraphical reactive systems that may be instantiated as a verification tool for any formalism or domain-specific modelling language encoded as a bigraphical reactive system. We introduce the syntax and use of BigMC, and exemplify its use with two small examples......: a textbook “philosophers” example, and an example motivated by a ubiquitous computing application. We give a tractable heuristic with which to approximate interference between reaction rules, and prove this analysis to be safe. We provide a mechanism for state reachability checking of bigraphical reactive...

  10. Multidimensional Analysis of Nuclear Detonations

    Science.gov (United States)

    2015-09-17

    Training Command in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Robert C. Slaughter, B.S., M.S. Captain, USAF 16...15-S-029 Abstract Digitized versions of atmospheric nuclear testing films represent a unique data set that enables the scientific community to create...temperature distribution of a nuclear fireball using digitized film . This temperature analysis underwent verification using the Digital Imaging and Remote

  11. Collective nuclear dynamics. Abstracts

    International Nuclear Information System (INIS)

    Abrosimov, V.I.; Kolomietz, V.M.

    1994-01-01

    The fourth International school on nuclear physics was help on 29 Aug - 7 Sep, 1994 in Ukraine. The specialists discussed following subjects: liquid drop and the shell correction method; nuclear deformation energy and fission; nuclear structure at high spins, superdeformed states, structure of excited and exotic nuclei; nuclear fluid dynamics and large scale collective motion; order and chaos as they relate to the collective motion; quantum and interference phenomena in nuclear collisions; quasi-fission and multinucleon fragmentation effects; shell effects in non-nuclear systems; new nuclear facilities

  12. Peaceful uses of nuclear energy: Meeting societal needs. 15 November 2004, Mumbai, India. 15th Annual Conference of the Indian Nuclear Society (INSAC-2004)

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    A number of issues facing the international nuclear community and the IAEA discussed are concerned with Nuclear Power, including Global Growth and Current Status of Nuclear Power, Nuclear Safety Performance and Reliability, Factors That Will Shape Future Growth, Carbon Emissions and the Growth in Demand, security of energy supply, Public Perceptions and Misconceptions, Innovation in Reactor and Fuel Cycle Technology, Nuclear Security, Non-power nuclear applications, Nuclear Verification - The final aspect of the IAEA activity

  13. Particularities of Verification Processes for Distributed Informatics Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2013-01-01

    Full Text Available This paper presents distributed informatics applications and characteristics of their development cycle. It defines the concept of verification and there are identified the differences from software testing. Particularities of the software testing and software verification processes are described. The verification steps and necessary conditions are presented and there are established influence factors of quality verification. Software optimality verification is analyzed and some metrics are defined for the verification process.

  14. SoC Design Approach Using Convertibility Verification

    Directory of Open Access Journals (Sweden)

    Basu Samik

    2008-01-01

    Full Text Available Abstract Compositional design of systems on chip from preverified components helps to achieve shorter design cycles and time to market. However, the design process is affected by the issue of protocol mismatches, where two components fail to communicate with each other due to protocol differences. Convertibility verification, which involves the automatic generation of a converter to facilitate communication between two mismatched components, is a collection of techniques to address protocol mismatches. We present an approach to convertibility verification using module checking. We use Kripke structures to represent protocols and the temporal logic to describe desired system behavior. A tableau-based converter generation algorithm is presented which is shown to be sound and complete. We have developed a prototype implementation of the proposed algorithm and have used it to verify that it can handle many classical protocol mismatch problems along with SoC problems. The initial idea for -based convertibility verification was presented at SLA++P '07 as presented in the work by Roopak Sinha et al. 2008.

  15. Can Reading Help?

    Science.gov (United States)

    Crowe, Chris

    2003-01-01

    Ponders the effect of September 11th on teenagers. Proposes that reading books can help teenagers sort out complicated issues. Recommends young adult novels that offer hope for overcoming tragedy. Lists 50 short story collections worth reading. (PM)

  16. Helping Kids Handle Worry

    Science.gov (United States)

    ... About Stress (Video) Anxiety, Fears, and Phobias Childhood Stress How Can I Help My Child Cope With Divorce? Relax & Unwind Center Worry Less in 3 Steps Five Steps for Fighting Stress Worrying About War - for Kids Stress What Stresses ...

  17. Divorce: Helping Children Cope.

    Science.gov (United States)

    Cook, Alicia S.; McBride, Jean

    1982-01-01

    Examines children's reactions to the divorce process and explores ways in which adults can promote growth and adjustment in children of divorce. Suggests ways in which parents, teachers, and counselors can help children. (RC)

  18. Hooked on Helping

    Science.gov (United States)

    Longhurst, James; McCord, Joan

    2014-01-01

    In this article, teens presenting at a symposium on peer-helping programs describe how caring for others fosters personal growth and builds positive group cultures. Their individual thoughts and opinions are expressed.

  19. Helping a Grieving Parent

    Science.gov (United States)

    ... not manage his time well — leaving one project unfinished and going on to something else. You might help him plan a schedule, or offer to work with him. Spending time together and focusing on ...

  20. Dual-use benefits of the CTBT verification system

    International Nuclear Information System (INIS)

    Meade, C.E.F.

    1999-01-01

    Since it has been completed in September 1996, the CTBT has been signed by 151 countries. Awaiting the 44 ratifications and entry into force, all of the nuclear powers have imposed unilateral moratoriums on nuclear test explosions. The end of these weapons development activities is often cited as the principal benefit of the CTBT. As the world begins to implement the Treaty, it has become clear that the development and operation of the CTBT verification system will provide a wide range of additional benefits if the data analysis products are available for dual-purpose applications. As this paper describes these could have economic and social implications, especially for countries with limited technical infrastructures. These involve, seismic monitoring, mineral exploration, scientific and technical training

  1. Status and prospects of nuclear arms control study

    International Nuclear Information System (INIS)

    Sun Xiangli; Wang Deli

    1995-01-01

    Some main issues and problems involved in nuclear arms control study, such as nuclear policy, NPT regime, verification technologies for a CTBT and disposal of military nuclear materials are introduced, in which both the current state and prospects of these issues are analyzed

  2. Cognitive Bias in Systems Verification

    Science.gov (United States)

    Larson, Steve

    2012-01-01

    Working definition of cognitive bias: Patterns by which information is sought and interpreted that can lead to systematic errors in decisions. Cognitive bias is used in diverse fields: Economics, Politics, Intelligence, Marketing, to name a few. Attempts to ground cognitive science in physical characteristics of the cognitive apparatus exceed our knowledge. Studies based on correlations; strict cause and effect is difficult to pinpoint. Effects cited in the paper and discussed here have been replicated many times over, and appear sound. Many biases have been described, but it is still unclear whether they are all distinct. There may only be a handful of fundamental biases, which manifest in various ways. Bias can effect system verification in many ways . Overconfidence -> Questionable decisions to deploy. Availability -> Inability to conceive critical tests. Representativeness -> Overinterpretation of results. Positive Test Strategies -> Confirmation bias. Debiasing at individual level very difficult. The potential effect of bias on the verification process can be managed, but not eliminated. Worth considering at key points in the process.

  3. Video-based fingerprint verification.

    Science.gov (United States)

    Qin, Wei; Yin, Yilong; Liu, Lili

    2013-09-04

    Conventional fingerprint verification systems use only static information. In this paper, fingerprint videos, which contain dynamic information, are utilized for verification. Fingerprint videos are acquired by the same capture device that acquires conventional fingerprint images, and the user experience of providing a fingerprint video is the same as that of providing a single impression. After preprocessing and aligning processes, "inside similarity" and "outside similarity" are defined and calculated to take advantage of both dynamic and static information contained in fingerprint videos. Match scores between two matching fingerprint videos are then calculated by combining the two kinds of similarity. Experimental results show that the proposed video-based method leads to a relative reduction of 60 percent in the equal error rate (EER) in comparison to the conventional single impression-based method. We also analyze the time complexity of our method when different combinations of strategies are used. Our method still outperforms the conventional method, even if both methods have the same time complexity. Finally, experimental results demonstrate that the proposed video-based method can lead to better accuracy than the multiple impressions fusion method, and the proposed method has a much lower false acceptance rate (FAR) when the false rejection rate (FRR) is quite low.

  4. Runtime Verification with State Estimation

    Science.gov (United States)

    Stoller, Scott D.; Bartocci, Ezio; Seyster, Justin; Grosu, Radu; Havelund, Klaus; Smolka, Scott A.; Zadok, Erez

    2011-01-01

    We introduce the concept of Runtime Verification with State Estimation and show how this concept can be applied to estimate theprobability that a temporal property is satisfied by a run of a program when monitoring overhead is reduced by sampling. In such situations, there may be gaps in the observed program executions, thus making accurate estimation challenging. To deal with the effects of sampling on runtime verification, we view event sequences as observation sequences of a Hidden Markov Model (HMM), use an HMM model of the monitored program to "fill in" sampling-induced gaps in observation sequences, and extend the classic forward algorithm for HMM state estimation (which determines the probability of a state sequence, given an observation sequence) to compute the probability that the property is satisfied by an execution of the program. To validate our approach, we present a case study based on the mission software for a Mars rover. The results of our case study demonstrate high prediction accuracy for the probabilities computed by our algorithm. They also show that our technique is much more accurate than simply evaluating the temporal property on the given observation sequences, ignoring the gaps.

  5. 9 CFR 417.8 - Agency verification.

    Science.gov (United States)

    2010-01-01

    ... ANALYSIS AND CRITICAL CONTROL POINT (HACCP) SYSTEMS § 417.8 Agency verification. FSIS will verify the adequacy of the HACCP plan(s) by determining that each HACCP plan meets the requirements of this part and all other applicable regulations. Such verification may include: (a) Reviewing the HACCP plan; (b...

  6. 18 CFR 158.5 - Verification.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Verification. 158.5 Section 158.5 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT....5 Verification. The facts stated in the memorandum must be sworn to by persons having knowledge...

  7. A correlation-based fingerprint verification system

    NARCIS (Netherlands)

    Bazen, A.M.; Gerez, Sabih H.; Veelenturf, L.P.J.; van der Zwaag, B.J.; Verwaaijen, G.T.B.

    2000-01-01

    In this paper, a correlation-based fingerprint verification system is presented. Unlike the traditional minutiae-based systems, this system directly uses the richer gray-scale information of the fingerprints. The correlation-based fingerprint verification system first selects appropriate templates

  8. On Verification Modelling of Embedded Systems

    NARCIS (Netherlands)

    Brinksma, Hendrik; Mader, Angelika H.

    Computer-aided verification of embedded systems hinges on the availability of good verification models of the systems at hand. Such models must be much simpler than full design models or specifications to be of practical value, because of the unavoidable combinatorial complexities in the

  9. 21 CFR 123.8 - Verification.

    Science.gov (United States)

    2010-04-01

    ..., including signing and dating, by an individual who has been trained in accordance with § 123.10, of the... FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) FOOD FOR HUMAN CONSUMPTION FISH AND FISHERY PRODUCTS General Provisions § 123.8 Verification. (a) Overall verification. Every...

  10. Fingerprint verification prediction model in hand dermatitis.

    Science.gov (United States)

    Lee, Chew K; Chang, Choong C; Johor, Asmah; Othman, Puwira; Baba, Roshidah

    2015-07-01

    Hand dermatitis associated fingerprint changes is a significant problem and affects fingerprint verification processes. This study was done to develop a clinically useful prediction model for fingerprint verification in patients with hand dermatitis. A case-control study involving 100 patients with hand dermatitis. All patients verified their thumbprints against their identity card. Registered fingerprints were randomized into a model derivation and model validation group. Predictive model was derived using multiple logistic regression. Validation was done using the goodness-of-fit test. The fingerprint verification prediction model consists of a major criterion (fingerprint dystrophy area of ≥ 25%) and two minor criteria (long horizontal lines and long vertical lines). The presence of the major criterion predicts it will almost always fail verification, while presence of both minor criteria and presence of one minor criterion predict high and low risk of fingerprint verification failure, respectively. When none of the criteria are met, the fingerprint almost always passes the verification. The area under the receiver operating characteristic curve was 0.937, and the goodness-of-fit test showed agreement between the observed and expected number (P = 0.26). The derived fingerprint verification failure prediction model is validated and highly discriminatory in predicting risk of fingerprint verification in patients with hand dermatitis. © 2014 The International Society of Dermatology.

  11. Face Verification for Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.

    2009-01-01

    In this thesis, we presented a detailed study of the face verification problem on the mobile device, covering every component of the system. The study includes face detection, registration, normalization, and verification. Furthermore, the information fusion problem is studied to verify face

  12. A correlation-based fingerprint verification system

    NARCIS (Netherlands)

    Bazen, A.M.; Gerez, Sabih H.; Veelenturf, L.P.J.; van der Zwaag, B.J.; Verwaaijen, G.T.B.

    In this paper, a correlation-based fingerprint verification system is presented. Unlike the traditional minutiae-based systems, this system directly uses the richer gray-scale information of the fingerprints. The correlation-based fingerprint verification system first selects appropriate templates

  13. Spectroscopic fast neutron transmission imaging in a treaty verification setting

    Directory of Open Access Journals (Sweden)

    K. Ogren

    2018-01-01

    Full Text Available Measurements of the geometric configuration of objects and their material composition are needed for nuclear treaty verification purposes. We experimentally demonstrate a simple method based on monoenergetic fast neutron transmission to realize crude imaging of the geometric configuration of special nuclear material, confirm its fissionable content, and obtain information on its approximate fissile mass. In the experiment, we used monoenergetic neutrons from D(d, n3He and T(d, n4He reactions and a linear array of liquid scintillation detectors to perform spectroscopic neutron imaging of up to 13.7 kg of highly enriched uranium in a spherical geometry. We also show an example of detection of material diversion and confirm the presence of fissionable material based on the measurement of high-energy prompt fission neutrons, including estimating the quantity of material from the comparison of measured and predicted fission neutron emission rate. The combination of crude imaging and fissionable material detection and quantification in a simple approach may be attractive in certain treaty verification scenarios.

  14. Verification of accident management strategies at the Forsmark plant

    International Nuclear Information System (INIS)

    Loewenhielm, G.; Engqvist, A.; Ingemarsson, K.F.; Andersson, T.

    1992-01-01

    Due to government requirements severe accident mitigating measures were implemented at the Swedish State Power Board nuclear power plants in 1988. These measures included protection against early containment impairment, highly redundant containment spray and filtered venting of the containment. We also developed accident management strategies and corresponding documents to counteract a severe accident situation. This paper describes the accident management strategies and documents at the Forsmark nuclear power plant, the verification process of the basic approach, and our ongoing program for further development and verification of the accident management program. In summary: From the beginning it was emphasized that it was not only mitigating measures implemented, it was an accident mitigation program, including new EOP's and education and training. This program was implemented, as required by the Swedish government in the end of 1988. Since that time the accident management strategy has been validated, verified and further developed. As a general conclusion, the implemented accident management program has reached a fair degree of completeness at the Forsmark plant. It is expected that in the case a hypothetical accident would occur the envisaged strategy would handle the accident in such a way that the radiological consequences would be insignificant and radiation exposure to the personnel would be within ICRP recommendations. To reach and keep this goal it is imperative that a mental preparedness is always present. This is achieved with a continuous education, training and analyses

  15. Spectroscopic fast neutron transmission imaging in a treaty verification setting

    Science.gov (United States)

    Ogren, K.; Nattress, J.; Jovanovic, I.

    2018-01-01

    Measurements of the geometric configuration of objects and their material composition are needed for nuclear treaty verification purposes. We experimentally demonstrate a simple method based on monoenergetic fast neutron transmission to realize crude imaging of the geometric configuration of special nuclear material, confirm its fissionable content, and obtain information on its approximate fissile mass. In the experiment, we used monoenergetic neutrons from D(d, n)3He and T(d, n)4He reactions and a linear array of liquid scintillation detectors to perform spectroscopic neutron imaging of up to 13.7 kg of highly enriched uranium in a spherical geometry. We also show an example of detection of material diversion and confirm the presence of fissionable material based on the measurement of high-energy prompt fission neutrons, including estimating the quantity of material from the comparison of measured and predicted fission neutron emission rate. The combination of crude imaging and fissionable material detection and quantification in a simple approach may be attractive in certain treaty verification scenarios.

  16. OpenMP 4.5 Validation and Verification Suite

    Energy Technology Data Exchange (ETDEWEB)

    2017-12-15

    OpenMP, a directive-based programming API, introduce directives for accelerator devices that programmers are starting to use more frequently in production codes. To make sure OpenMP directives work correctly across architectures, it is critical to have a mechanism that tests for an implementation's conformance to the OpenMP standard. This testing process can uncover ambiguities in the OpenMP specification, which helps compiler developers and users make a better use of the standard. We fill this gap through our validation and verification test suite that focuses on the offload directives available in OpenMP 4.5.

  17. Dictionary of nuclear power

    International Nuclear Information System (INIS)

    Koelzer, W.

    2012-04-01

    The actualized version (April 2012) of the dictionary on nuclear power includes all actualizations and new inputs since the last version of 2001. The original publication dates from 1980. The dictionary includes definitions, terms, measuring units and helpful information on the actual knowledge concerning nuclear power, nuclear facilities, and radiation protection.

  18. Comparison of megavoltage position verification for prostate irradiation based on bony anatomy and implanted fiducials

    NARCIS (Netherlands)

    Nederveen, Aart J.; Dehnad, Homan; van der Heide, Uulke A.; van Moorselaar, R. Jeroen A.; Hofman, Pieter; Lagendijk, Jan J. W.

    2003-01-01

    PURPOSE: The patient position during radiotherapy treatment of prostate cancer can be verified with the help of portal images acquired during treatment. In this study we quantify the clinical consequences of the use of image-based verification based on the bony anatomy and the prostate target

  19. MODEL-BASED VALIDATION AND VERIFICATION OF ANOMALIES IN LEGISLATION

    Directory of Open Access Journals (Sweden)

    Vjeran Strahonja

    2006-12-01

    Full Text Available An anomaly in legislation is absence of completeness, consistency and other desirable properties, caused by different semantic, syntactic or pragmatic reasons. In general, the detection of anomalies in legislation comprises validation and verification. The basic idea of research, as presented in this paper, is modelling legislation by capturing domain knowledge of legislation and specifying it in a generic way by using commonly agreed and understandable modelling concepts of the Unified Modelling Language (UML. Models of legislation enable to understand the system better, support the detection of anomalies and help to improve the quality of legislation by validation and verification. By implementing model-based approach, the object of validation and verification moves from legislation to its model. The business domain of legislation has two distinct aspects: a structural or static aspect (functionality, business data etc., and a behavioural or dynamic part (states, transitions, activities, sequences etc.. Because anomalism can occur on two different levels, on the level of a model, or on the level of legislation itself, a framework for validation and verification of legal regulation and its model is discussed. The presented framework includes some significant types of semantic and syntactic anomalies. Some ideas for assessment of pragmatic anomalies of models were found in the field of software quality metrics. Thus pragmatic features and attributes can be determined that could be relevant for evaluation purposes of models. Based on analogue standards for the evaluation of software, a qualitative and quantitative scale can be applied to determine the value of some feature for a specific model.

  20. Verifying a nuclear weapon`s response to radiation environments

    Energy Technology Data Exchange (ETDEWEB)

    Dean, F.F.; Barrett, W.H.

    1998-05-01

    The process described in the paper is being applied as part of the design verification of a replacement component designed for a nuclear weapon currently in the active stockpile. This process is an adaptation of the process successfully used in nuclear weapon development programs. The verification process concentrates on evaluating system response to radiation environments, verifying system performance during and after exposure to radiation environments, and assessing system survivability.

  1. IAEA perspective on verification measures relevant to a fissile material production cut-off treaty (FMCT)

    Energy Technology Data Exchange (ETDEWEB)

    Shea, T.E. [IAEA, Vienna (Austria)

    1998-07-01

    In my presentation, I have drawn on IAEA safeguards experience and in the attached Annexes, I have included the methods currently approved for safeguarding enrichment and reprocessing facilities. These provisions are continuing to evolve and new methods are being developed that could also have an impact on the verification measures adopted for the FMCT. With the Additional Protocol as specified in INFCIRC/540, IAEA safeguards will provide comprehensive coverage in relation to fissile material production in those non-nuclear weapon states that adopt the protocol. The elements of the strengthened safeguards system have now been set, and over the next few years, useful experience will be gained in the verification methods and the procedural arrangements for bringing them into effect. That experience will no doubt be important in defining the verification provisions of the FMCT. I noted earlier that verification under the FMCT will depend upon the scope of the Treaty, the maximum time intervals tolerable between a violation and its detection, the importance of detecting violations in relation to the magnitude of the violations and the degree of certainty desired in detecting treaty violations - or conversely, in assuring the absence of violations. The cost of verification will depend on acceptance by states of the treaty, especially nuclear weapon states and threshold states. Within those states, the costs will be driven by the number of separate sites to be inspected, the nature of the nuclear operations located at those sites, the present status of the facilities involved and future plans for those facilities and for peaceful facilities which produce - or could produce - fissile materials. The cost will also depend on the use of efficient verification concepts by the verification authority, including integrated sensor networks and remote monitoring, and on the deployment arrangements adopted. When the negotiations commence, these issues and many more will need to be

  2. Nuclear spectrometry for environmental analysis and mapping

    International Nuclear Information System (INIS)

    Simon, Aliz

    2013-01-01

    Full text: The International Atomic Energy Agency (IAEA) helps countries to mobilize peaceful applications of nuclear science and technology. The three main pillars of the activities are: safety and security; science and technology; and safeguards and verification. As part of the science and technology pillar, the Physics Section supports Member States regarding utilization of particle accelerators and research reactors, applications of nuclear instrumentation, and controlled nuclear fusion research. Support is provided to the Member States in the form of capacity building, knowledge transfer and networking. The IAEA's coordinated research activities are designed to contribute to this mandate, by stimulating and coordinating research in IAEA Member States in selected nuclear fields. These coordinated research activities are normally implemented through Coordinated Research Projects that bring together research institutes from both developing and developed Member States to collaborate on the research topic of interest. The establishment of sustainable education and training programmes is fundamental for the safe, secure and efficient development of the nuclear field. The lAEA offers a wide spectrum of activities in support of education, training, human resource development and capacity building including interregional, regional and national training courses and workshops; assists visits and reviews services; initiates, formulates and runs programmes; networks managers and specialists for sharing good practices; assists in publications that compile the best international practices; supplies training materials and training tools; and supports internship programmes for the young generations of scientists and fellows. For the developing countries, the Technical Cooperation Programme provides the necessary skills and equipment to establish sustainable technology in the counterpart country or region through training courses, expert missions, fellowships, scientific

  3. Nuclear astrophysics

    International Nuclear Information System (INIS)

    Arnould, M.; Takahashi, K.

    1999-01-01

    Nuclear astrophysics is that branch of astrophysics which helps understanding of the Universe, or at least some of its many faces, through the knowledge of the microcosm of the atomic nucleus. It attempts to find as many nuclear physics imprints as possible in the macrocosm, and to decipher what those messages are telling us about the varied constituent objects in the Universe at present and in the past. In the last decades much advance has been made in nuclear astrophysics thanks to the sometimes spectacular progress made in the modelling of the structure and evolution of the stars, in the quality and diversity of the astronomical observations, as well as in the experimental and theoretical understanding of the atomic nucleus and of its spontaneous or induced transformations. Developments in other subfields of physics and chemistry have also contributed to that advance. Notwithstanding the accomplishment, many long-standing problems remain to be solved, and the theoretical understanding of a large variety of observational facts needs to be put on safer grounds. In addition, new questions are continuously emerging, and new facts endangering old ideas. This review shows that astrophysics has been, and still is, highly demanding to nuclear physics in both its experimental and theoretical components. On top of the fact that large varieties of nuclei have to be dealt with, these nuclei are immersed in highly unusual environments which may have a significant impact on their static properties, the diversity of their transmutation modes, and on the probabilities of these modes. In order to have a chance of solving some of the problems nuclear astrophysics is facing, the astrophysicists and nuclear physicists are obviously bound to put their competence in common, and have sometimes to benefit from the help of other fields of physics, like particle physics, plasma physics or solid-state physics. Given the highly varied and complex aspects, we pick here some specific nuclear

  4. Approach to IAEA material-balance verification at the Portsmouth Gas Centrifuge Enrichment Plant

    International Nuclear Information System (INIS)

    Gordon, D.M.; Sanborn, J.B.; Younkin, J.M.; DeVito, V.J.

    1983-01-01

    This paper describes a potential approach by which the International Atomic Energy Agency (IAEA) might verify the nuclear-material balance at the Portsmouth Gas Centrifuge Enrichment Plant (GCEP). The strategy makes use of the attributes and variables measurement verification approach, whereby the IAEA would perform independent measurements on a randomly selected subset of the items comprising the U-235 flows and inventories at the plant. In addition, the MUF-D statistic is used as the test statistic for the detection of diversion. The paper includes descriptions of the potential verification activities, as well as calculations of: (1) attributes and variables sample sizes for the various strata, (2) standard deviations of the relevant test statistics, and (3) the detection sensitivity which the IAEA might achieve by this verification strategy at GCEP

  5. Formal verification of functional properties of a SCR-style software requirements specification using PVS

    International Nuclear Information System (INIS)

    Kim, Taeho; Stringer-Calvert, David; Cha, Sungdeok

    2005-01-01

    Industrial software companies developing safety-critical systems are required to use rigorous safety analysis techniques to demonstrate compliance to regulatory bodies. In this paper, we describe an approach to formal verification of functional properties of requirements for an embedded real-time software written in software cost reduction (SCR)-style language using PVS specification and verification system. Key contributions of the paper include development of an automated method of translating SCR-style requirements into PVS input language as well as identification of property templates often needed in verification. Using specification for a nuclear power plant system, currently in operation, we demonstrate how safety demonstration on requirements can be accomplished while taking advantage of assurance provided by formal methods

  6. Transmutation in ADS and needs for nuclear data, with an introduction to the n-TOF at CERN

    CERN Document Server

    González, E; Fernández, R; García, J; Villamarín, D

    1999-01-01

    Transmutation can help in the nuclear waste problem by reducing seriously the life and amount of the most dangerous isotopes (radiotoxicity, heat, packing volume and neutron multiplication reductions). ADS are one of the best technologies for nuclear waste transmutation at large scale. Although enough information is available to prepare conceptual designs and make assessments on their performance, a large R&D campaign is required to obtain the precision data required to optimize the detailed engineering design and refine our expectations calculations on waste reduction by the different transmutation strategies being proposed. In particular a large R&D effort is required in nuclear physics, where fundamental differential measurements and integral verification experiments are required. In this sense, the PS213 n-TOF at CERN PS (at Switzerland) will become one of the largest installations to perform the fundamental differential measurements and a wide international collaboration has been setup to perform...

  7. Guidelines for the verification and validation of expert system software and conventional software. Volume 7, User's manual: Final report

    International Nuclear Information System (INIS)

    Miller, L.A.; Hayes, J.E.; Mirsky, S.M.

    1995-05-01

    Reliable software is required for nuclear power industry applications. Verification and validation techniques applied during the software development process can help eliminate errors that could inhibit the proper operation of digital systems and cause availability and safety problems. Most of the techniques described in this report are valid for conventional software systems as well as for expert systems. The project resulted in a set of 16 V ampersand V guideline packages and 11 sets of procedures based on the class, development phase, and system component being tested. These guideline packages and procedures help a utility define the level of V ampersand V, which involves evaluating the complexity and type of software component along with the consequences of failure. In all, the project identified 153 V ampersand V techniques for conventional software systems and demonstrated their application to all aspects of expert systems except for the knowledge base, which requires specially developed tools. Each of these conventional techniques covers anywhere from 2-52 total types of conventional software defects, and each defect is covered by 21-50 V ampersand V techniques. The project also identified automated tools to Support V ampersand V activities

  8. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  9. MFTF sensor verification computer program

    International Nuclear Information System (INIS)

    Chow, H.K.

    1984-01-01

    The design, requirements document and implementation of the MFE Sensor Verification System were accomplished by the Measurement Engineering Section (MES), a group which provides instrumentation for the MFTF magnet diagnostics. The sensors, installed on and around the magnets and solenoids, housed in a vacuum chamber, will supply information about the temperature, strain, pressure, liquid helium level and magnet voltage to the facility operator for evaluation. As the sensors are installed, records must be maintained as to their initial resistance values. Also, as the work progresses, monthly checks will be made to insure continued sensor health. Finally, after the MFTF-B demonstration, yearly checks will be performed as well as checks of sensors as problem develops. The software to acquire and store the data was written by Harry Chow, Computations Department. The acquired data will be transferred to the MFE data base computer system

  10. Formal verification of algorithms for critical systems

    Science.gov (United States)

    Rushby, John M.; Von Henke, Friedrich

    1993-01-01

    We describe our experience with formal, machine-checked verification of algorithms for critical applications, concentrating on a Byzantine fault-tolerant algorithm for synchronizing the clocks in the replicated computers of a digital flight control system. First, we explain the problems encountered in unsynchronized systems and the necessity, and criticality, of fault-tolerant synchronization. We give an overview of one such algorithm, and of the arguments for its correctness. Next, we describe a verification of the algorithm that we performed using our EHDM system for formal specification and verification. We indicate the errors we found in the published analysis of the algorithm, and other benefits that we derived from the verification. Based on our experience, we derive some key requirements for a formal specification and verification system adequate to the task of verifying algorithms of the type considered. Finally, we summarize our conclusions regarding the benefits of formal verification in this domain, and the capabilities required of verification systems in order to realize those benefits.

  11. Ayudele! [Help Him!].

    Science.gov (United States)

    Spencer, Maria Gutierrez, Comp.; Almance, Sofia, Comp.

    Written in Spanish and English, the booklet briefly discusses what parents can do to help their child learn at school. The booklet briefly notes the importance of getting enough sleep; eating breakfast; praising the child; developing the five senses; visiting the doctor; having a home and garden; talking, listening, and reading to the child;…

  12. Helping You Age Well

    Science.gov (United States)

    ... surgery can help. Reproductive: Fibroids, ovarian cysts, and cancer of uterus can occur in women; sexual dysfunction increases for men and women. Skin: Protect your skin from the sun; avoid shingles with new ... cancer checks. NIH Resources This special section has been ...

  13. Help Teens Manage Diabetes

    Science.gov (United States)

    ... Grey, dean of the Yale University School of Nursing, developed and tested a program called Coping Skills Training (CST) as a part of routine diabetes ... is to improve diabetic teens' coping and communication skills, healthy ... sugar levels. "Nursing research is about helping people deal with the ...

  14. Help for Mental Illnesses

    Science.gov (United States)

    ... that participate with your plan. Mental Health and Addiction Insurance Help : This website from the U.S. Department ... in the Health & Education section. The website is mobile and print-friendly. Printed ... eastern time, M-F Phone: 1-866-615-6464 TTY: 1-301-443- ...

  15. Stretching: Does It Help?

    Science.gov (United States)

    Vardiman, Phillip; Carrand, David; Gallagher, Philip M.

    2010-01-01

    Stretching prior to activity is universally accepted as an important way to improve performance and help prevent injury. Likewise, limited flexibility has been shown to decrease functional ability and predispose a person to injuries. Although this is commonly accepted, appropriate stretching for children and adolescents involved with sports and…

  16. Being 'green' helps profitability?

    International Nuclear Information System (INIS)

    Austin, D.

    1999-01-01

    Pollution reduction beyond regulatory compliance is gaining momentum among firms, but managers ask if being 'green' helps profitability. Evidence suggests it doesn't hurt, but when we see environmentally attractive firms with sound financial performance, it cannot yet say which is cause and which is effect [it

  17. Profile: parents help themselves.

    Science.gov (United States)

    Woods, G E

    1981-01-01

    A short account is given of a voluntary organization, PACE, formed by parents of young handicapped children in Leeds. PACE provides friendship and help to other parents, arranges the toy library, riding for the disabled and other activities for the children. It also raises money that is needed for special projects.

  18. Helping Them Grow.

    Science.gov (United States)

    Kreidler, William J.; And Others

    1995-01-01

    Three articles present suggestions to help elementary teachers promote student development. The first describes games that encourage a sense of community. The second deals with making parent teacher conferences a positive experience. The third discusses how to give confused children who are involved in custody battles an alternative to acting out.…

  19. 600 MW nuclear power database

    International Nuclear Information System (INIS)

    Cao Ruiding; Chen Guorong; Chen Xianfeng; Zhang Yishu

    1996-01-01

    600 MW Nuclear power database, based on ORACLE 6.0, consists of three parts, i.e. nuclear power plant database, nuclear power position database and nuclear power equipment database. In the database, there are a great deal of technique data and picture of nuclear power, provided by engineering designing units and individual. The database can give help to the designers of nuclear power

  20. Nuclear dilemma

    Energy Technology Data Exchange (ETDEWEB)

    Penn, J.

    Declaring nuclear preparedness 'immoral' helps to recreate the pacifism of 50 years ago. War itself is a dilemma, not the weapons with which it is waged. We must ask of the anti-war proposals: whom do they benefit. On the whole people concerned are ordinary citizens who are fearful of nuclear incineration. But marching with them is a spectrum of forces with other motivations and purposes. In a real life situation of international tension or crises, numbers of weapons in combination with their particular charateristics could mean the difference between peace and outbreak of war.

  1. Nuclear energy

    CERN Document Server

    Marquardt, Meg

    2016-01-01

    A piece of nuclear fuel the size of your fingertip holds as much energy as 150 gallons (568 L) of oil. In Nuclear Energy, learn how scientists developed this amazing source of energy, how it works, and why it has attracted controversy. Easy-to-read text, vivid images, and helpful back matter give readers a clear look at this subject. Features include a table of contents, infographics, a glossary, additional resources, and an index. Aligned to Common Core Standards and correlated to state standards. Core Library is an imprint of Abdo Publishing, a division of ABDO.

  2. Groundwater flow code verification ``benchmarking`` activity (COVE-2A): Analysis of participants` work

    Energy Technology Data Exchange (ETDEWEB)

    Dykhuizen, R.C.; Barnard, R.W.

    1992-02-01

    The Nuclear Waste Repository Technology Department at Sandia National Laboratories (SNL) is investigating the suitability of Yucca Mountain as a potential site for underground burial of nuclear wastes. One element of the investigations is to assess the potential long-term effects of groundwater flow on the integrity of a potential repository. A number of computer codes are being used to model groundwater flow through geologic media in which the potential repository would be located. These codes compute numerical solutions for problems that are usually analytically intractable. Consequently, independent confirmation of the correctness of the solution is often not possible. Code verification is a process that permits the determination of the numerical accuracy of codes by comparing the results of several numerical solutions for the same problem. The international nuclear waste research community uses benchmarking for intercomparisons that partially satisfy the Nuclear Regulatory Commission (NRC) definition of code verification. This report presents the results from the COVE-2A (Code Verification) project, which is a subset of the COVE project.

  3. Groundwater flow code verification ''benchmarking'' activity (COVE-2A): Analysis of participants' work

    International Nuclear Information System (INIS)

    Dykhuizen, R.C.; Barnard, R.W.

    1992-02-01

    The Nuclear Waste Repository Technology Department at Sandia National Laboratories (SNL) is investigating the suitability of Yucca Mountain as a potential site for underground burial of nuclear wastes. One element of the investigations is to assess the potential long-term effects of groundwater flow on the integrity of a potential repository. A number of computer codes are being used to model groundwater flow through geologic media in which the potential repository would be located. These codes compute numerical solutions for problems that are usually analytically intractable. Consequently, independent confirmation of the correctness of the solution is often not possible. Code verification is a process that permits the determination of the numerical accuracy of codes by comparing the results of several numerical solutions for the same problem. The international nuclear waste research community uses benchmarking for intercomparisons that partially satisfy the Nuclear Regulatory Commission (NRC) definition of code verification. This report presents the results from the COVE-2A (Code Verification) project, which is a subset of the COVE project

  4. Safeguards Guidance Document for Designers of Commercial Nuclear Facilities: International Nuclear Safeguards Requirements and Practices For Uranium Enrichment Plants

    Energy Technology Data Exchange (ETDEWEB)

    Robert Bean; Casey Durst

    2009-10-01

    This report is the second in a series of guidelines on international safeguards requirements and practices, prepared expressly for the designers of nuclear facilities. The first document in this series is the description of generic international nuclear safeguards requirements pertaining to all types of facilities. These requirements should be understood and considered at the earliest stages of facility design as part of a new process called “Safeguards-by-Design.” This will help eliminate the costly retrofit of facilities that has occurred in the past to accommodate nuclear safeguards verification activities. The following summarizes the requirements for international nuclear safeguards implementation at enrichment plants, prepared under the Safeguards by Design project, and funded by the U.S. Department of Energy (DOE) National Nuclear Security Administration (NNSA), Office of NA-243. The purpose of this is to provide designers of nuclear facilities around the world with a simplified set of design requirements and the most common practices for meeting them. The foundation for these requirements is the international safeguards agreement between the country and the International Atomic Energy Agency (IAEA), pursuant to the Treaty on the Non-proliferation of Nuclear Weapons (NPT). Relevant safeguards requirements are also cited from the Safeguards Criteria for inspecting enrichment plants, found in the IAEA Safeguards Manual, Part SMC-8. IAEA definitions and terms are based on the IAEA Safeguards Glossary, published in 2002. The most current specification for safeguards measurement accuracy is found in the IAEA document STR-327, “International Target Values 2000 for Measurement Uncertainties in Safeguarding Nuclear Materials,” published in 2001. For this guide to be easier for the designer to use, the requirements have been restated in plainer language per expert interpretation using the source documents noted. The safeguards agreement is fundamentally a

  5. Verification of Timed-Arc Petri Nets

    DEFF Research Database (Denmark)

    Jacobsen, Lasse; Jacobsen, Morten; Møller, Mikael Harkjær

    2011-01-01

    of interesting theoretical properties distinguishing them from other time extensions of Petri nets. We shall give an overview of the recent theory developed in the verification of TAPN extended with features like read/transport arcs, timed inhibitor arcs and age invariants. We will examine in detail...... the boundaries of automatic verification and the connections between TAPN and the model of timed automata. Finally, we will mention the tool TAPAAL that supports modelling, simulation and verification of TAPN and discuss a small case study of alternating bit protocol....

  6. Privacy Preserving Iris Based Biometric Identity Verification

    Directory of Open Access Journals (Sweden)

    Przemyslaw Strzelczyk

    2011-08-01

    Full Text Available Iris biometrics is considered one of the most accurate and robust methods of identity verification. Individually unique iris features can be presented in a compact binary form easily compared with reference template to confirm identity. However, when templates or features are disclosed, iris biometrics is no longer suitable for verification. Therefore, there is a need to perform iris feature matching without revealing the features itself and reference template. The paper proposes an extension of the standard iris-based verification protocol that introduces features and a template locking mechanism, which guarantees that no sensitive information is exposed.Article in English

  7. Comparing formal verification approaches of interlocking systems

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Nguyen, Hoang Nga; Roggenbach, Markus

    2016-01-01

    The verification of railway interlocking systems is a challenging task, and therefore several research groups have suggested to improve this task by using formal methods, but they use different modelling and verification approaches. To advance this research, there is a need to compare...... these approaches. As a first step towards this, in this paper we suggest a way to compare different formal approaches for verifying designs of route-based interlocking systems and we demonstrate it on modelling and verification approaches developed within the research groups at DTU/Bremen and at Surrey...

  8. A Verification Logic for GOAL Agents

    Science.gov (United States)

    Hindriks, K. V.

    Although there has been a growing body of literature on verification of agents programs, it has been difficult to design a verification logic for agent programs that fully characterizes such programs and to connect agent programs to agent theory. The challenge is to define an agent programming language that defines a computational framework but also allows for a logical characterization useful for verification. The agent programming language GOAL has been originally designed to connect agent programming to agent theory and we present additional results here that GOAL agents can be fully represented by a logical theory. GOAL agents can thus be said to execute the corresponding logical theory.

  9. Constraint specialisation in Horn clause verification

    DEFF Research Database (Denmark)

    Kafle, Bishoksan; Gallagher, John Patrick

    2017-01-01

    We present a method for specialising the constraints in constrained Horn clauses with respect to a goal. We use abstract interpretation to compute a model of a query–answer transformed version of a given set of clauses and a goal. The constraints from the model are then used to compute...... underlying the clauses. Experimental results on verification problems show that this is an effective transformation, both in our own verification tools (based on a convex polyhedra analyser) and as a pre-processor to other Horn clause verification tools....

  10. Nuclear questions

    Energy Technology Data Exchange (ETDEWEB)

    Durrani, M. [Physics World (United Kingdom)

    2006-01-01

    The future of nuclear power has returned to centre stage. Freezing weather on both sides of the Atlantic and last month's climate-change talks in Montreal have helped to put energy and the future of nuclear power right back on the political agenda. The issue is particularly pressing for those countries where existing nuclear stations are reaching the end of their lives. In the UK, prime minister Tony Blair has commissioned a review of energy, with a view to deciding later this year whether to build new nuclear power plants. The review comes just four years after the Labour government published a White Paper on energy that said the country should keep the nuclear option open but did not follow this up with any concrete action. In Germany, new chancellor and former physicist Angela Merkel is a fan of nuclear energy and had said she would extend the lifetime of its nuclear plants beyond 2020, when they are due to close. However, that commitment has had to be abandoned, at least for the time being, following negotiations with her left-wing coalition partners. The arguments in favour of nuclear power will be familiar to all physicists - it emits almost no carbon dioxide and can play a vital role in maintaining a diverse energy supply. To over-rely on imported supplies of oil and gas can leave a nation hostage to fortune. The arguments against are equally easy to list - the public is scared of nuclear power, it generates dangerous waste with potentially huge clean-up costs, and it is not necessarily cheap. Nuclear plants could also be a target for terrorist attacks. Given political will, many of these problems can be resolved, or at least tackled. China certainly sees the benefits of nuclear power, as does Finland, which is building a new 1600 MW station - the world's most powerful - that is set to open in 2009. Physicists, of course, are essential to such developments. They play a vital role in ensuring the safety of such plants and developing new types of

  11. Design for Verification: Enabling Verification of High Dependability Software-Intensive Systems

    Science.gov (United States)

    Mehlitz, Peter C.; Penix, John; Markosian, Lawrence Z.; Koga, Dennis (Technical Monitor)

    2003-01-01

    Strategies to achieve confidence that high-dependability applications are correctly implemented include testing and automated verification. Testing deals mainly with a limited number of expected execution paths. Verification usually attempts to deal with a larger number of possible execution paths. While the impact of architecture design on testing is well known, its impact on most verification methods is not as well understood. The Design for Verification approach considers verification from the application development perspective, in which system architecture is designed explicitly according to the application's key properties. The D4V-hypothesis is that the same general architecture and design principles that lead to good modularity, extensibility and complexity/functionality ratio can be adapted to overcome some of the constraints on verification tools, such as the production of hand-crafted models and the limits on dynamic and static analysis caused by state space explosion.

  12. A hardware-software system for the automation of verification and calibration of oil metering units secondary equipment

    Science.gov (United States)

    Boyarnikov, A. V.; Boyarnikova, L. V.; Kozhushko, A. A.; Sekachev, A. F.

    2017-08-01

    In the article the process of verification (calibration) of oil metering units secondary equipment is considered. The purpose of the work is to increase the reliability and reduce the complexity of this process by developing a software and hardware system that provides automated verification and calibration. The hardware part of this complex carries out the commutation of the measuring channels of the verified controller and the reference channels of the calibrator in accordance with the introduced algorithm. The developed software allows controlling the commutation of channels, setting values on the calibrator, reading the measured data from the controller, calculating errors and compiling protocols. This system can be used for checking the controllers of the secondary equipment of the oil metering units in the automatic verification mode (with the open communication protocol) or in the semi-automatic verification mode (without it). The peculiar feature of the approach used is the development of a universal signal switch operating under software control, which can be configured for various verification methods (calibration), which allows to cover the entire range of controllers of metering units secondary equipment. The use of automatic verification with the help of a hardware and software system allows to shorten the verification time by 5-10 times and to increase the reliability of measurements, excluding the influence of the human factor.

  13. Statement to Conference for a Nuclear-Weapons-Free World, 12 October 2011, Astana, Kazakhstan

    International Nuclear Information System (INIS)

    Amano, Y.

    2011-01-01

    all nuclear weapons. There were four elements to that commitment. First, IAEA can play a role in nuclear disarmament through verification - for example, helping to build confidence by verifying independently that nuclear materials from dismantled weapons will not be used again for military purposes. Last year, the Agency was asked by the Russian Federation and the United States to independently verify implementation of their agreement on the disposition of plutonium no longer required for defence purposes. IAEA experts have been working with both countries on a draft agreement and good progress has been made. It will represent a unique example of transparency in this field. Second, IAEA will support the creation of new Nuclear-Weapon-Free Zones and help to implement them. These already cover vast regions of the world, including Central Asia. Next month, I will host a forum in Vienna on the relevance of the experience of existing nuclear-weapon-free zones for the establishment of such a zone in the Middle East. Third, IAEA's safeguards inspectors will continue to work around the globe to check that nuclear materials from civilian nuclear programmes are not diverted to nuclear weapons. Fourth, IAEA security experts will redouble efforts to work with countries to help prevent nuclear materials from falling into the hands of terrorist groups. The nuclear threat does not only exist at the level of nation states. As a human being, as Director General of the IAEA - and not least as a citizen of the only country ever to experience the unspeakable horror of nuclear bombs - I believe with all my heart and soul that these horrific weapons must be eliminated. Achieving that goal will require continued global efforts to increase awareness and understanding of the vital importance of nuclear disarmament and non-proliferation. I am confident that your Conference will make an important contribution to that goal and wish you every success in your deliberations. Thank you. (IAEA)

  14. Data Exchanges and Verifications Online (DEVO)

    Data.gov (United States)

    Social Security Administration — DEVO is the back-end application for processing SSN verifications and data exchanges. DEVO uses modern technology for parameter driven processing of both batch and...

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: FUEL CELLS

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  16. The PASCAL-HDM Verification System

    Science.gov (United States)

    1983-01-01

    The PASCAL-HDM verification system is described. This system supports the mechanical generation of verification conditions from PASCAL programs and HDM-SPECIAL specifications using the Floyd-Hoare axiomatic method. Tools are provided to parse programs and specifications, check their static semantics, generate verification conditions from Hoare rules, and translate the verification conditions appropriately for proof using the Shostak Theorem Prover, are explained. The differences between standard PASCAL and the language handled by this system are explained. This consists mostly of restrictions to the standard language definition, the only extensions or modifications being the addition of specifications to the code and the change requiring the references to a function of no arguments to have empty parentheses.

  17. HDM/PASCAL Verification System User's Manual

    Science.gov (United States)

    Hare, D.

    1983-01-01

    The HDM/Pascal verification system is a tool for proving the correctness of programs written in PASCAL and specified in the Hierarchical Development Methodology (HDM). This document assumes an understanding of PASCAL, HDM, program verification, and the STP system. The steps toward verification which this tool provides are parsing programs and specifications, checking the static semantics, and generating verification conditions. Some support functions are provided such as maintaining a data base, status management, and editing. The system runs under the TOPS-20 and TENEX operating systems and is written in INTERLISP. However, no knowledge is assumed of these operating systems or of INTERLISP. The system requires three executable files, HDMVCG, PARSE, and STP. Optionally, the editor EMACS should be on the system in order for the editor to work. The file HDMVCG is invoked to run the system. The files PARSE and STP are used as lower forks to perform the functions of parsing and proving.

  18. Procedure Verification and Validation Toolset Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed research is aimed at investigating a procedure verification and validation toolset, which will allow the engineers who are responsible for developing...

  19. Verification and Performance Analysis for Embedded Systems

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2009-01-01

    This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems....

  20. Engineering drawing field verification program. Revision 3

    International Nuclear Information System (INIS)

    Ulk, P.F.

    1994-01-01

    Safe, efficient operation of waste tank farm facilities is dependent in part upon the availability of accurate, up-to-date plant drawings. Accurate plant drawings are also required in support of facility upgrades and future engineering remediation projects. This supporting document establishes the procedure for performing a visual field verification of engineering drawings, the degree of visual observation being performed and documenting the results. A copy of the drawing attesting to the degree of visual observation will be paginated into the released Engineering Change Notice (ECN) documenting the field verification for future retrieval and reference. All waste tank farm essential and support drawings within the scope of this program will be converted from manual to computer aided drafting (CAD) drawings. A permanent reference to the field verification status will be placed along the right border of the CAD-converted drawing, referencing the revision level, at which the visual verification was performed and documented

  1. FLEXible Damage Detection and Verification System

    Data.gov (United States)

    National Aeronautics and Space Administration — This project expands on the previously demonstrated Flat Surface Damage Detection System (FSDDS) capabilities.  The Flexible Damage Detection and Verification System...

  2. Formal Verification of Circuits and Systems

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    based model checking style of verification. The next paper by D'Souza & Thiagarajan presents an automata-theoretic approach to analysing timing properties of systems. The last paper by Mohalik and Ramanujam presents the assumption.

  3. Standard Verification System Lite (SVS Lite)

    Data.gov (United States)

    Social Security Administration — SVS Lite is a mainframe program used exclusively by the Office of Child Support Enforcement (OCSE) to perform batch SSN verifications. This process is exactly the...

  4. Library stock verification: a ritual and an occupational hazard

    OpenAIRE

    Sridhar, M. S.

    1991-01-01

    Explains the sensitive, controversial stock verification as one of the occupational hazards and a postmortem, emphasises need for clarity of objectives and procedures regarding stock verification and responsibilities of loss, points out that the cost of stock verification often far exceeds the benefits, highlights norms and procedures of stock verification for Government of India institutions, discusses some advantages and various methods and procedures of physical verification, put forth pre...

  5. Regional Seismic Arrays and Nuclear Test Ban Verification

    Science.gov (United States)

    1990-12-01

    geophysical inverse problems, such as Gauss- Newton or Levenberg-Marquardt (Aki and Richards, 1980), cannot be used. Instead, one must rely on methods...possible scattering mechanism is Lg-to-Sn and Sn-to-Lg scattering. Studies by Isacks and Stephens (1975), Chinn et al. (1980), and Ni and Barazangi (1983...early Lg arrivals observed by Isacks and Stephens (1975), Barazangi (1977), Chinn et al. (1980), and Ni and Barazangi (1983) on land from offshore events

  6. Uncertainty Quantification for Safety Verification Applications in Nuclear Power Plants

    Science.gov (United States)

    Boafo, Emmanuel

    There is an increasing interest in computational reactor safety analysis to systematically replace the conservative calculations by best estimate calculations augmented by quantitative uncertainty analysis methods. This has been necessitated by recent regulatory requirements that have permitted the use of such methods in reactor safety analysis. Stochastic uncertainty quantification methods have shown great promise, as they are better suited to capture the complexities in real engineering problems. This study proposes a framework for performing uncertainty quantification based on the stochastic approach, which can be applied to enhance safety analysis. (Abstract shortened by ProQuest.).

  7. Verification and Validation in Systems Engineering

    CERN Document Server

    Debbabi, Mourad; Jarraya, Yosr; Soeanu, Andrei; Alawneh, Luay

    2010-01-01

    "Verification and validation" represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle. Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic verification and validation of systems engineering design models expressed in standardized modeling languages. Their presentation includes a bird's eye view of the most prominent modeling languages for software and systems engineering, namely the Unified Model

  8. Optimal Information-Theoretic Wireless Location Verification

    OpenAIRE

    Yan, Shihao; Malaney, Robert; Nevat, Ido; Peters, Gareth W.

    2012-01-01

    We develop a new Location Verification System (LVS) focussed on network-based Intelligent Transport Systems and vehicular ad hoc networks. The algorithm we develop is based on an information-theoretic framework which uses the received signal strength (RSS) from a network of base-stations and the claimed position. Based on this information we derive the optimal decision regarding the verification of the user's location. Our algorithm is optimal in the sense of maximizing the mutual information...

  9. Location Verification Systems Under Spatially Correlated Shadowing

    OpenAIRE

    Yan, Shihao; Nevat, Ido; Peters, Gareth W.; Malaney, Robert

    2014-01-01

    The verification of the location information utilized in wireless communication networks is a subject of growing importance. In this work we formally analyze, for the first time, the performance of a wireless Location Verification System (LVS) under the realistic setting of spatially correlated shadowing. Our analysis illustrates that anticipated levels of correlated shadowing can lead to a dramatic performance improvement of a Received Signal Strength (RSS)-based LVS. We also analyze the per...

  10. Scalable hardware verification with symbolic simulation

    CERN Document Server

    Bertacco, Valeria

    2006-01-01

    An innovative presentation of the theory of disjoint support decomposition, presenting novel results and algorithms, plus original and up-to-date techniques in formal verificationProvides an overview of current verification techniques, and unveils the inner workings of symbolic simulationFocuses on new techniques that narrow the performance gap between the complexity of digital systems and the limited ability to verify themAddresses key topics in need of future research.

  11. Inventory verification measurements using neutron multiplicity counting

    International Nuclear Information System (INIS)

    Ensslin, N.; Foster, L.A.; Harker, W.C.; Krick, M.S.; Langner, D.G.

    1998-01-01

    This paper describes a series of neutron multiplicity measurements of large plutonium samples at the Los Alamos Plutonium Facility. The measurements were corrected for bias caused by neutron energy spectrum shifts and nonuniform multiplication, and are compared with calorimetry/isotopics. The results show that multiplicity counting can increase measurement throughput and yield good verification results for some inventory categories. The authors provide recommendations on the future application of the technique to inventory verification

  12. Approaches to Formal Verification of Security Protocols

    OpenAIRE

    Lal, Suvansh; Jain, Mohit; Chaplot, Vikrant

    2011-01-01

    In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Application of formal methods for verification of security protocols would enhance their reliability thereby, increasing the usability of systems that employ them. Thus, formal verification of security protocols has become a key issue in computer and communications security. In...

  13. Towards automatic verification of ladder logic programs

    OpenAIRE

    Zoubek , Bohumir; Roussel , Jean-Marc; Kwiatkowska , Martha

    2003-01-01

    International audience; Control system programs are usually validated by testing prior to their deployment. Unfortunately, testing is not exhaustive and therefore it is possible that a program which passed all the required tests still contains errors. In this paper we apply techniques of automatic verification to a control program written in ladder logic. A model is constructed mechanically from the ladder logic program and subjected to automatic verification against requirements that include...

  14. Verification ghosts. The changing political environment of the IAEA

    International Nuclear Information System (INIS)

    Redden, K.J.

    2003-01-01

    Six years ago, Dr. Hans Blix wrote in the IAEA Bulletin of a 'general optimism about further arms control and verification.' At the time, world events warranted such a prognosis; the IAEA was riding a wave of momentum after its instrumental role in the roll-back of the South African nuclear weapons program and bringing Ukraine, Belarus, and Kazakhstan into the Nuclear Non Proliferation Treaty (NPT) as non-nuclear-weapon States. The NPT's indefinite extension was only two years old, and the most pressing challenges, while recognizable, were somewhat stagnant. Today, some tidings elicit similar optimism. The IAEA's increasing efforts to combat terrorism and the decision by Member States to depart from nearly 20 years of zero real growth budgetary policy are remarkable testaments to the Agency's adaptability and credibility in the face of new threats. And with the worldwide frenzy over terrorism and redoubled phobia of weapons of mass destruction (WMD), the Agency garners public attention now as never before. Emblematic of this recent upsurge in political attention, US President George W. Bush's annual State of the Union address in 2003 mentioned supporting the IAEA as a specific priority of his administration, the first mention of the Agency in that speech since President Eisenhower in 1961 lauded its creation under 'Atoms for Peace'. Such visibility portends a future with prospects for overcoming bureaucratic inertia and effecting significant changes to the Agency's benefit. But with that visibility has come an uncertainty about the IAEA's role in world affairs. Despite being able to resolve most benign problems more easily, the Agency must operate in an environment haunted by the non-proliferation analogue of Charles Dickens' triumvirate specters: the ghosts of verification challenges past, present and future -namely, the cessation of UN-mandated inspections in Iraq, the difficulties ensuring compliance in North Korea and Iran, and the need to maintain the IAEA

  15. Nuclear law - Nuclear safety

    International Nuclear Information System (INIS)

    Pontier, Jean-Marie; Roux, Emmanuel; Leger, Marc; Deguergue, Maryse; Vallar, Christian; Pissaloux, Jean-Luc; Bernie-Boissard, Catherine; Thireau, Veronique; Takahashi, Nobuyuki; Spencer, Mary; Zhang, Li; Park, Kyun Sung; Artus, J.C.

    2012-01-01

    This book contains the contributions presented during a one-day seminar. The authors propose a framework for a legal approach to nuclear safety, a discussion of the 2009/71/EURATOM directive which establishes a European framework for nuclear safety in nuclear installations, a comment on nuclear safety and environmental governance, a discussion of the relationship between citizenship and nuclear, some thoughts about the Nuclear Safety Authority, an overview of the situation regarding the safety in nuclear waste burying, a comment on the Nome law with respect to electricity price and nuclear safety, a comment on the legal consequences of the Fukushima accident on nuclear safety in the Japanese law, a presentation of the USA nuclear regulation, an overview of nuclear safety in China, and a discussion of nuclear safety in the medical sector

  16. DOE handbook: Integrated safety management systems (ISMS) verification. Team leader's handbook

    International Nuclear Information System (INIS)

    1999-06-01

    The primary purpose of this handbook is to provide guidance to the ISMS verification Team Leader and the verification team in conducting ISMS verifications. The handbook describes methods and approaches for the review of the ISMS documentation (Phase I) and ISMS implementation (Phase II) and provides information useful to the Team Leader in preparing the review plan, selecting and training the team, coordinating the conduct of the verification, and documenting the results. The process and techniques described are based on the results of several pilot ISMS verifications that have been conducted across the DOE complex. A secondary purpose of this handbook is to provide information useful in developing DOE personnel to conduct these reviews. Specifically, this handbook describes methods and approaches to: (1) Develop the scope of the Phase 1 and Phase 2 review processes to be consistent with the history, hazards, and complexity of the site, facility, or activity; (2) Develop procedures for the conduct of the Phase 1 review, validating that the ISMS documentation satisfies the DEAR clause as amplified in DOE Policies 450.4, 450.5, 450.6 and associated guidance and that DOE can effectively execute responsibilities as described in the Functions, Responsibilities, and Authorities Manual (FRAM); (3) Develop procedures for the conduct of the Phase 2 review, validating that the description approved by the Approval Authority, following or concurrent with the Phase 1 review, has been implemented; and (4) Describe a methodology by which the DOE ISMS verification teams will be advised, trained, and/or mentored to conduct subsequent ISMS verifications. The handbook provides proven methods and approaches for verifying that commitments related to the DEAR, the FRAM, and associated amplifying guidance are in place and implemented in nuclear and high risk facilities. This handbook also contains useful guidance to line managers when preparing for a review of ISMS for radiological

  17. DOE handbook: Integrated safety management systems (ISMS) verification team leader`s handbook

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-06-01

    The primary purpose of this handbook is to provide guidance to the ISMS verification Team Leader and the verification team in conducting ISMS verifications. The handbook describes methods and approaches for the review of the ISMS documentation (Phase I) and ISMS implementation (Phase II) and provides information useful to the Team Leader in preparing the review plan, selecting and training the team, coordinating the conduct of the verification, and documenting the results. The process and techniques described are based on the results of several pilot ISMS verifications that have been conducted across the DOE complex. A secondary purpose of this handbook is to provide information useful in developing DOE personnel to conduct these reviews. Specifically, this handbook describes methods and approaches to: (1) Develop the scope of the Phase 1 and Phase 2 review processes to be consistent with the history, hazards, and complexity of the site, facility, or activity; (2) Develop procedures for the conduct of the Phase 1 review, validating that the ISMS documentation satisfies the DEAR clause as amplified in DOE Policies 450.4, 450.5, 450.6 and associated guidance and that DOE can effectively execute responsibilities as described in the Functions, Responsibilities, and Authorities Manual (FRAM); (3) Develop procedures for the conduct of the Phase 2 review, validating that the description approved by the Approval Authority, following or concurrent with the Phase 1 review, has been implemented; and (4) Describe a methodology by which the DOE ISMS verification teams will be advised, trained, and/or mentored to conduct subsequent ISMS verifications. The handbook provides proven methods and approaches for verifying that commitments related to the DEAR, the FRAM, and associated amplifying guidance are in place and implemented in nuclear and high risk facilities. This handbook also contains useful guidance to line managers when preparing for a review of ISMS for radiological

  18. Concepts for inventory verification in critical facilities

    International Nuclear Information System (INIS)

    Cobb, D.D.; Sapir, J.L.; Kern, E.A.; Dietz, R.J.

    1978-12-01

    Materials measurement and inventory verification concepts for safeguarding large critical facilities are presented. Inspection strategies and methods for applying international safeguards to such facilities are proposed. The conceptual approach to routine inventory verification includes frequent visits to the facility by one inspector, and the use of seals and nondestructive assay (NDA) measurements to verify the portion of the inventory maintained in vault storage. Periodic verification of the reactor inventory is accomplished by sampling and NDA measurement of in-core fuel elements combined with measurements of integral reactivity and related reactor parameters that are sensitive to the total fissile inventory. A combination of statistical sampling and NDA verification with measurements of reactor parameters is more effective than either technique used by itself. Special procedures for assessment and verification for abnormal safeguards conditions are also considered. When the inspection strategies and inventory verification methods are combined with strict containment and surveillance methods, they provide a high degree of assurance that any clandestine attempt to divert a significant quantity of fissile material from a critical facility inventory will be detected. Field testing of specific hardware systems and procedures to determine their sensitivity, reliability, and operational acceptability is recommended. 50 figures, 21 tables

  19. Verification and Examination Management of Complex Systems

    Directory of Open Access Journals (Sweden)

    Stian Ruud

    2014-10-01

    Full Text Available As ship systems become more complex, with an increasing number of safety-critical functions, many interconnected subsystems, tight integration to other systems, and a large amount of potential failure modes, several industry parties have identified the need for improved methods for managing the verification and examination efforts of such complex systems. Such needs are even more prominent now that the marine and offshore industries are targeting more activities and operations in the Arctic environment. In this paper, a set of requirements and a method for verification and examination management are proposed for allocating examination efforts to selected subsystems. The method is based on a definition of a verification risk function for a given system topology and given requirements. The marginal verification risks for the subsystems may then be evaluated, so that examination efforts for the subsystem can be allocated. Two cases of requirements and systems are used to demonstrate the proposed method. The method establishes a systematic relationship between the verification loss, the logic system topology, verification method performance, examination stop criterion, the required examination effort, and a proposed sequence of examinations to reach the examination stop criterion.

  20. 78 FR 33132 - Quality Verification for Plate-Type Uranium-Aluminum Fuel Elements for Use in Research and Test...

    Science.gov (United States)

    2013-06-03

    ... Fuel Elements for Use in Research and Test Reactors AGENCY: Nuclear Regulatory Commission. ACTION... Regulatory Guide (RG) 2.3, ``Quality Verification for Plate-Type Uranium-Aluminum Fuel Elements for Use in... assurance program for verifying the quality of plate-type uranium-aluminum fuel elements used in research...