2011
DOI: 10.1016/j.anucene.2010.12.003
|View full text |Cite
|
Sign up to set email alerts
|

Deployment analysis and remote accessibility verification for a maintenance task in a PRIDE digital mock-up

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…Robbins et al [31] achieved a real-time and visualized track of remote operating process planning by using virtual reality and an intelligent database. Park et al [32,33] studied visualization and simulation of a nuclear facility disassembling process and established an RHM system.…”
Section: Rhmpmentioning
confidence: 99%
“…Robbins et al [31] achieved a real-time and visualized track of remote operating process planning by using virtual reality and an intelligent database. Park et al [32,33] studied visualization and simulation of a nuclear facility disassembling process and established an RHM system.…”
Section: Rhmpmentioning
confidence: 99%
“…The limitations exposed by the Fukushima accident are now gradually being overcoming with new developments to make the equipment more resistant to high radiation fields as well as to make possible to control them remotely, safely and with reliability [[10]- [12], [14], [16]- [18]]. The new generation of equipment is being designed to perform survey, monitoring, decontamination and dismantling activities in NPPs, embedding cybersecurity features.…”
Section: Introductionmentioning
confidence: 99%
“…The new generation of equipment is being designed to perform survey, monitoring, decontamination and dismantling activities in NPPs, embedding cybersecurity features. As consequence, they are more resistant to a cyber-attack that could lead to an unauthorized operation (equipment hacking) or a failure during its use [ [16]- [18]]. In the past the projects were adapted to make possible to control them remotely, an adaptation new technologies without the required care regarding cybersecurity features, giving rise to problems related to technologies incompatibility, lack of security, etc [[16]- [18]].…”
Section: Introductionmentioning
confidence: 99%
“…A 3D graphical simulation of the dismantling process of the Korea Research Reactors 1 and 2 was performed by Kim et al (2003), and a digital mock-up system for selecting a proper decommissioning scenario for the two reactors was also developed (Kim et al, 2006). A process simulation technology that utilises haptic rendering was used to verify the maintenance task in a PyRoprocess Integrated Inactive DEmonstration (PRIDE) digital mock-up (Park et al, 2011). The Commissariat à l'énergie atomique et aux énergies (CEA) conducted an R&D program to develop a simulation tool that can be used to understand constraints, test different alternatives, and train workers (Chabal et al, 2011).…”
Section: Introductionmentioning
confidence: 99%