2015
DOI: 10.1016/j.anucene.2015.02.041
|View full text |Cite
|
Sign up to set email alerts
|

Methodology for analyzing risk at nuclear facilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…Hence, the aggregations of three kinds of indicators will be computed, respectively, according to the combination rule of Dempster-Shafer theory of evidence, noted as M s , M m , and M w , shown in Table 6. Chlorine trifluoride Medium I 10 Nickel powder, high purity Medium I 11 Gasket, large Weak I 12 Feed system/product and tails withdrawal Weak I 13 Expansion bellows Weak I 14…”
Section: Applicationmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, the aggregations of three kinds of indicators will be computed, respectively, according to the combination rule of Dempster-Shafer theory of evidence, noted as M s , M m , and M w , shown in Table 6. Chlorine trifluoride Medium I 10 Nickel powder, high purity Medium I 11 Gasket, large Weak I 12 Feed system/product and tails withdrawal Weak I 13 Expansion bellows Weak I 14…”
Section: Applicationmentioning
confidence: 99%
“…Since improper use of nuclear energy may cause mass destruction, it is necessary to evaluate nuclear safeguards and limit the development of nuclear detonations. Nuclear safeguards evaluations [9][10][11][12][13][14] are invoked to test and verify that states meet with the international treaty, which put forward by International Atomic Energy Agency (IAEA) and make sure that those nuclear materials will not be used to manufacture nuclear weapons. In order to make the evaluation of indicators and then make the final assessment of the States' declarations to the institution concerning any activity which are related to nuclear power, the IAEA experts collect relevant information from some main sources: information provided by the State itself, Internet and newspapers, and nonsafeguards IAEA databases.…”
Section: Introductionmentioning
confidence: 99%
“…Most known nuclear security events were carried out by insiders or at least with the help of insiders [5]. It is speculated that the theft of highly enriched uranium in Russia and the destruction of nuclear power plants in Belgium, which caused significant economic losses, were carried out by unidentified insiders [6]. Due to the high radioactivity in the spent fuel treatment process, as well as the closure of equipment, pipelines and radioactive solution valves in the heavy concrete equipment room or hot room, personnel cannot access nuclear materials.…”
Section: Introductionmentioning
confidence: 99%
“…Such evaluation involves the destructive testing of a fixed number of macroscopic specimens inserted in surveillance capsules located near the RPV inner wall prior to the initial reactor start-up. The surveillance specimens are taken out-of-pile at a selected periodicity (a few years, typically) and then handled, tested, and disposed of in hot cell facilities [10,11,12]. Although reliable, this conventional approach is timeconsuming and extremely costly and lacks flexibility.…”
Section: Introductionmentioning
confidence: 99%