• Title/Summary/Keyword: Safeguards techniques

Search Result 15, Processing Time 0.02 seconds

Retrofit Production and Field Evaluation for Use of Safeguards Equipment in Extreme Temperature Environments (극한 온도환경에서의 안전조치 검증장비 사용을 위한 리트로핏 제작 및 현장 평가)

  • Heekyun Baek;Jinwon Lee;Jung-Ki Shin
    • Journal of Radiation Industry
    • /
    • v.18 no.1
    • /
    • pp.79-87
    • /
    • 2024
  • In a previous study, the suitability for use of inspection equipment was evaluated at temperatures outside the quality assurance range. The quality assurance operating temperature of the safeguards equipment is 0~+40℃, and previous studies have confirmed the performance of the safeguards equipment for temperatures ranging from -40~+70℃. The scintillator-based verification equipment showed a shift in the centroid channel and a change in the count rate in all temperature ranges, and the semiconductor-based safeguards equipment generated Leakage Current and equipment failure. In this study, a retrofit was performed applying a vacuum housing to the safeguards equipment (Inspector-2000-based inspection equipment), and performance evaluation was performed at a low temperature and snowy site, and it was confirmed that the same performance was observed as the measurement results at room temperature.

Evaluation of Usability in Extreme Temperature Environments of Safeguards Equipment (안전조치 검증장비의 극한 온도환경 적용성 평가)

  • Heekyun Baek;Jinwon Lee;Jung-Ki Shin
    • Journal of Radiation Industry
    • /
    • v.18 no.1
    • /
    • pp.71-78
    • /
    • 2024
  • For most commercial radiation measurement equipment, manufacturers specify an operating temperature in the range of 0 to +40℃. However, in environments that exceed the quality assurance performance of the safeguards equipment, such as the winter environment in North Korea, the performance of the equipment deteriorates or normal use is impossible. In this study, safeguards equipment measurements were performed by creating an extreme temperature environment using a constant temperature and humidity test chamber. The safeguards equipment used in the evaluation was MIRION's Inspector-2000-based equipment, which evaluated the usability in extreme temperature environments using three types of detection units: NaI(Tl), CZT, and HPGe.

Reconsideration of Significant Quantity (SQ) for Pu Based on the Strategic Impact Investigation of Non-Strategic Nuclear Weapon (NSNW) Using Monte-Carlo Simulations

  • Woo, Seung Min;Lee, Manseok;Ryu, Je Ir
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.19 no.4
    • /
    • pp.421-433
    • /
    • 2021
  • The present multidisciplinary study, which is a nexus of engineering and political science, investigates how the modernization of Non-Strategic Nuclear Weapons (NSNWs) affects the IAEA safeguards system based on the likelihood of the use of nuclear weapons. To this end, this study examines the characteristics of modernized NSNWs using Monte Carlo techniques. The results thus obtained show that 10 kt NSNWs with a Circular Error Probability (CEP) of 10 m can destroy the target as effectively as a 500 kt weapon with a CEP of 100 m. The IAEA safeguards system shows that the Significant Quantity (SQ) of 1 of plutonium is 8 kg, a parameter that was established when strategic nuclear weapons were dominant. However, the results of this study indicate that in recent years, low-yield nuclear weapons such as NSNWs have been more strategically interesting than strategic nuclear weapons as NSNWs require less plutonium than strategic nuclear weapons. Therefore, we would like to conclude that reducing the SQ of plutonium can result in more robust safeguards and non-proliferation strategies.

Recent Developments in Nuclear Forensic and Nuclear Safeguards Analysis Using Mass Spectrometry

  • Song, Kyuseok;Park, Jong-Ho;Lee, Chi-Gyu;Han, Sun-Ho
    • Mass Spectrometry Letters
    • /
    • v.7 no.2
    • /
    • pp.31-40
    • /
    • 2016
  • The analysis of nuclear materials and environmental samples is an important issue in nuclear safeguards and nuclear forensics. An analysis technique for safeguard samples has been developed for the detection of undeclared nuclear activities and verification of declared nuclear activities, while nuclear forensics has been developed to trace the origins and intended use of illicitly trafficked nuclear or radioactive materials. In these two analytical techniques, mass spectrometry has played an important role in determining the isotope ratio of various nuclides, contents of trace elements, and production dates. These two techniques typically use similar analytical instruments, but the analytical procedure and the interpretation of analytical results differ depending on the analytical purpose. The isotopic ratio of the samples is considered the most important result in an environmental sample analysis, while age dating and impurity analysis may also be important for nuclear forensics. In this review, important aspects of these techniques are compared and the role of mass spectrometry, along with recent progress in related technologies, are discussed.

Conceptual design of neutron measurement system for input accountancy in pyroprocessing

  • Lee, Chaehun;Seo, Hee;Menlove, Spencer H.;Menlove, Howard O.
    • Nuclear Engineering and Technology
    • /
    • v.52 no.5
    • /
    • pp.1022-1028
    • /
    • 2020
  • One of the possible options for spent-fuel management in Korea is pyroprocessing, which is a process for electrochemical recycling of spent nuclear fuel. Nuclear material accountancy is considered to be a safeguards measure of fundamental importance, for the purposes of which, the amount of nuclear material in the input and output materials should be measured as accurately as possible by means of chemical analysis and/or non-destructive assay. In the present study, a neutron measurement system based on the fast-neutron energy multiplication (FNEM) and passive neutron albedo reactivity (PNAR) techniques was designed for nuclear material accountancy of a spent-fuel assembly (i.e., the input accountancy of a pyroprocessing facility). Various parameters including inter-detector distance, source-to-detector distance, neutron-reflector material, the structure of a cadmium sleeve around the close detectors, and an air cavity in the moderator were investigated by MCNP6 Monte Carlo simulations in order to maximize its performance. Then, the detector responses with the optimized geometry were estimated for the fresh-fuel assemblies with different 235U enrichments and a spent-fuel assembly. It was found that the measurement technique investigated here has the potential to measure changes in neutron multiplication and, in turn, amount of fissile material.

A Study on The Practical Risk Mitigation Methodology for Systematical Risk Management of Information System (정보시스템의 체계적인 위험관리를 위한 실용적인 위험감소 방법론에 관한 연구)

  • Eom, Jung-Ho;Woo, Byeong-Koo;Kim, In-Jung;Chung, Tai-M.
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.125-132
    • /
    • 2003
  • In the paper, we can select the best safeguard as proposed the definite and systematical method and procedure on risk mitigation of risk management for information system. The practical risk mitigation methodology has a good fulfillment procedure and a definition to fulfill procedure on each phase. So, it is easy to fulfill and can apply to any risk management methodology. The practical risk mitigation is composed of 6 phases, which are the existing safeguard assessment, safeguard means selection, safeguard technique selection, risk admission assessment, cost-effective analysis and safeguard embodiment. The practical risk mitigation's advantages are as follow. Efficient selection of safeguards to apply to risk's features with safeguard's means and techniques before embodying safeguards. Prevention of redundant works and security budgets waste as re-using the existing excellent safeguards through the existing safeguard assessment. Reflection of organization's CEO opinions to require special safeguards for the most important information system.

Feasibility study of spent fuel internal tomography (SFIT) for partial defect detection within PWR spent nuclear fuel

  • Hyung-Joo Choi;Hyojun Park;Bo-Wi Cheon;Hyun Joon Choi;Hakjae Lee;Yong Hyun Chung;Chul Hee Min
    • Nuclear Engineering and Technology
    • /
    • v.56 no.6
    • /
    • pp.2412-2420
    • /
    • 2024
  • The International Atomic Energy Agency (IAEA) mandates safeguards to ensure non-proliferation of nuclear materials. Among inspection techniques used to detect partial defects within spent nuclear fuel (SNF), gamma emission tomography (GET) has been reported to be reliable for detection of partial defects on a pin-by-pin level. Conventional GET, however, is limited by low detection efficiency due to the high density of nuclear fuel rods and self-absorption. This paper proposes a new type of GET named Spent Fuel Internal Tomography (SFIT), which can acquire sinograms at the guide tube. The proposed device consists of the housing, shielding, C-shaped collimator, reflector, and gadolinium aluminum gallium garnet (GAGG) scintillator. For accurate attenuation correction, the source-distinguishable range of the SFIT device was determined using MC simulation to the region away from the proposed device to the second layer. For enhanced inspection accuracy, a proposed specific source-discrimination algorithm was applied. With this, the SFIT device successfully distinguished all source locations. The comparison of images of the existing and proposed inspection methods showed that the proposed method, having successfully distinguished all sources, afforded a 150 % inspection accuracy improvement.

Ability of non-destructive assay techniques to identify sophisticated material partial defects

  • Lloyd, Cody;Goddard, Braden
    • Nuclear Engineering and Technology
    • /
    • v.52 no.6
    • /
    • pp.1252-1258
    • /
    • 2020
  • This study explores the ability of non-destructive assay techniques to detect a partial material defect in which 100 g of plutonium are diverted from the center of a 1000 g can of PuO2 powder. Four safeguards measurements techniques: neutron multiplicity counting, calorimetry, gravimetry, and gamma ray spectroscopy are used in an attempt to detect the defect. Several materials are added to the partial defect PuO2 can to replicate signatures of the diverted material. 252Cf is used to compensate for the doubles neutron counts, 241Am is used to compensate for the decay heat, and aluminum is used to compensate for the weight. Although, the doubles and triples difference before and after diversion are statistically indistinguishable with the AWCC in fast and thermal mode, the difference in the singles counts are statistically detectable in both modes. The relatively short half-life of 252Cf leads to a decrease (three sigma uncertainty) in the doubles neutron counts after 161 days. Combining this with the precise quantity of 241Am needed (10.7 g) to mimic the heat signature and the extreme precision in 252Cf mass needed to defeat neutron multiplicity measurements gives reassurance in the International Atomic Energy Agency's ability to detect partial material defects.

Improving the Cyber Security over Banking Sector by Detecting the Malicious Attacks Using the Wrapper Stepwise Resnet Classifier

  • Damodharan Kuttiyappan;Rajasekar, V
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1657-1673
    • /
    • 2023
  • With the advancement of information technology, criminals employ multiple cyberspaces to promote cybercrime. To combat cybercrime and cyber dangers, banks and financial institutions use artificial intelligence (AI). AI technologies assist the banking sector to develop and grow in many ways. Transparency and explanation of AI's ability are required to preserve trust. Deep learning protects client behavior and interest data. Deep learning techniques may anticipate cyber-attack behavior, allowing for secure banking transactions. This proposed approach is based on a user-centric design that safeguards people's private data over banking. Here, initially, the attack data can be generated over banking transactions. Routing is done for the configuration of the nodes. Then, the obtained data can be preprocessed for removing the errors. Followed by hierarchical network feature extraction can be used to identify the abnormal features related to the attack. Finally, the user data can be protected and the malicious attack in the transmission route can be identified by using the Wrapper stepwise ResNet classifier. The proposed work outperforms other techniques in terms of attack detection and accuracy, and the findings are depicted in the graphical format by employing the Python tool.