INTELLIGENT TECHNIQUES FOR ANOMALY DETECTION IN NUCLEAR REACTORS
نویسندگان
چکیده
The safe operation of nuclear power plants is highly dependent on the ability quickly and accurately identifying possible anomalies perturbations in reactor. Operational defects are primarily diagnosed by detectors that capture changes neutron flux, placed at various points inside outside core. Neutron flux signals subsequently analyzed with signal processing techniques an effort to be better described (have their higher-order characteristics uncovered, locate transient events, etc). To this end, application intelligent may extremely beneficial, as it assist extend current level analysis. Besides, combination methodologies machine learning framework plant data emerging topic has yet show its full potential. In context, contribution attempts introducing approaches more specifically, deep techniques, analysis for identification other reactor core affect operational capabilities. obtained results initial stage captured pressurized water reactors encouraging, underlying robustness potential proposed approach.
منابع مشابه
New techniques in nuclear medicine for tumor detection [Persian]
Widespread studies on tumor diagnosis has led to the development of techniques with greater sensitivity and improved specificity for detection of occult and small subclinical tumors. Tumor imaging by radiolabeling of tumor-specific antibodies (Immunoscintigraphy) or tissue specific biochemical agents (Receptor imaging) and especially physiologic imaging with positron emitters (PET), have ...
متن کاملnew techniques in nuclear medicine for tumor detection [persian]
widespread studies on tumor diagnosis has led to the development of techniques with greater sensitivity and improved specificity for detection of occult and small subclinical tumors. tumor imaging by radiolabeling of tumor-specific antibodies (immunoscintigraphy) or tissue specific biochemical agents (receptor imaging) and especially physiologic imaging with positron emitters (pet), have opened...
متن کاملComparing Anomaly Detection Techniques for HTTP
Much data access occurs via HTTP, which is becoming a universal transport protocol. Because of this, it has become a common exploit target and several HTTP specific IDSs have been proposed as a response. However, each IDS is developed and tested independently, and direct comparisons are difficult. We describe a framework for testing IDS algorithms, and apply it to several proposed anomaly detec...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Epj Web of Conferences
سال: 2021
ISSN: ['2101-6275', '2100-014X']
DOI: https://doi.org/10.1051/epjconf/202124721011