Publications

47 Results

Search results

Jump to search filters

Applications of evidence theory to issues with nuclear weapons

PSA 2019 - International Topical Meeting on Probabilistic Safety Assessment and Analysis

Darby, John L.

Over the last 13 years, at Sandia National Laboratories we have applied the belief/plausibility measure from evidence theory to estimate the uncertainty for numerous safety and security issues for nuclear weapons. For such issues we have significant epistemic uncertainty and are unable to assign probability distributions. We have developed and applied custom software to implement the belief/plausibility measure of uncertainty. For safety issues we perform a quantitative evaluation, and for security issues (e.g., terrorist acts) we use linguistic variables (fuzzy sets) combined with approximate reasoning. We perform the following steps: Train Subject Matter Experts (SMEs) on assignment of evidence Work with SMEs to identify the concern(s): the top-level variable(s) Work with SMEs to identify lower-level variable and functional relationship(s) to the top-level variable(s) Then the SMEs gather their State of Knowledge (SOK) and assign evidence to the lower-level variables. Using this information, we evaluate the variables using custom software and produce an estimate for the top-level variable(s) including uncertainty. We have extended the Kaplan-Garrick risk triplet approach for risk to use the belief/plausibility measure of uncertainty.

More Details

Process for estimating likelihood and confidence in post detonation nuclear forensics

Craft, Charles M.; Darby, John L.

Technical nuclear forensics (TNF) must provide answers to questions of concern to the broader community, including an estimate of uncertainty. There is significant uncertainty associated with post-detonation TNF. The uncertainty consists of a great deal of epistemic (state of knowledge) as well as aleatory (random) uncertainty, and many of the variables of interest are linguistic (words) and not numeric. We provide a process by which TNF experts can structure their process for answering questions and provide an estimate of uncertainty. The process uses belief and plausibility, fuzzy sets, and approximate reasoning.

More Details

Techniques to evaluate the importance of common cause degradation on reliability and safety of nuclear weapons

Darby, John L.

As the nuclear weapon stockpile ages, there is increased concern about common degradation ultimately leading to common cause failure of multiple weapons that could significantly impact reliability or safety. Current acceptable limits for the reliability and safety of a weapon are based on upper limits on the probability of failure of an individual item, assuming that failures among items are independent. We expanded the current acceptable limits to apply to situations with common cause failure. Then, we developed a simple screening process to quickly assess the importance of observed common degradation for both reliability and safety to determine if further action is necessary. The screening process conservatively assumes that common degradation is common cause failure. For a population with between 100 and 5000 items we applied the screening process and conclude the following. In general, for a reliability requirement specified in the Military Characteristics (MCs) for a specific weapon system, common degradation is of concern if more than 100(1-x)% of the weapons are susceptible to common degradation, where x is the required reliability expressed as a fraction. Common degradation is of concern for the safety of a weapon subsystem if more than 0.1% of the population is susceptible to common degradation. Common degradation is of concern for the safety of a weapon component or overall weapon system if two or more components/weapons in the population are susceptible to degradation. Finally, we developed a technique for detailed evaluation of common degradation leading to common cause failure for situations that are determined to be of concern using the screening process. The detailed evaluation requires that best estimates of common cause and independent failure probabilities be produced. Using these techniques, observed common degradation can be evaluated for effects on reliability and safety.

More Details

Evaluation of containment failure and cleanup time for Pu shots on the Z machine

Darby, John L.

Between November 30 and December 11, 2009 an evaluation was performed of the probability of containment failure and the time for cleanup of contamination of the Z machine given failure, for plutonium (Pu) experiments on the Z machine at Sandia National Laboratories (SNL). Due to the unique nature of the problem, there is little quantitative information available for the likelihood of failure of containment components or for the time to cleanup. Information for the evaluation was obtained from Subject Matter Experts (SMEs) at the Z machine facility. The SMEs provided the State of Knowledge (SOK) for the evaluation. There is significant epistemic- or state of knowledge- uncertainty associated with the events that comprise both failure of containment and cleanup. To capture epistemic uncertainty and to allow the SMEs to reason at the fidelity of the SOK, we used the belief/plausibility measure of uncertainty for this evaluation. We quantified two variables: the probability that the Pu containment system fails given a shot on the Z machine, and the time to cleanup Pu contamination in the Z machine given failure of containment. We identified dominant contributors for both the time to cleanup and the probability of containment failure. These results will be used by SNL management to decide the course of action for conducting the Pu experiments on the Z machine.

More Details

Sample sizes for confidence limits for reliability

Darby, John L.

We recently performed an evaluation of the implications of a reduced stockpile of nuclear weapons for surveillance to support estimates of reliability. We found that one technique developed at Sandia National Laboratories (SNL) under-estimates the required sample size for systems-level testing. For a large population the discrepancy is not important, but for a small population it is important. We found that another technique used by SNL provides the correct required sample size. For systems-level testing of nuclear weapons, samples are selected without replacement, and the hypergeometric probability distribution applies. Both of the SNL techniques focus on samples without defects from sampling without replacement. We generalized the second SNL technique to cases with defects in the sample. We created a computer program in Mathematica to automate the calculation of confidence for reliability. We also evaluated sampling with replacement where the binomial probability distribution applies.

More Details

Tools for evaluating risk of terrorist acts using fuzzy sets and belief/plausibility

Annual Conference of the North American Fuzzy Information Processing Society - NAFIPS

Darby, John L.

Terrorist acts are intentional and therefore differ significantly from "dumb" random acts that are the subject of most risk analyses. There is significant epistemic (state of knowledge) uncertainty associated with such intentional acts, especially for the likelihood of specific attack scenarios. Also, many of the variables of concern are not numeric and should be treated as purely linguistic (words). Epistemic uncertainty can be addressed using the belief/plausibility measure of uncertainty, an extension of the traditional probability measure of uncertainty. Fuzzy sets can be used to segregate a variable into purely linguistic values. Linguistic variables can be combined using an approximate reasoning rule base to map combinations of fuzzy sets of the constituent variables to fuzzy sets of the resultant variable. We have implemented the mathematics of fuzzy sets, approximate reasoning, and belief/plausibility into Java software tools. The PoolEvidence© software tool combines evidence (pools) from different experts. The LinguisticBelief© software tool evaluates the risk associated with scenarios of concern using the pooled evidence as input. The tools are not limited to the evaluation of terrorist risk; they are useful for evaluating any decision involving significant epistemic uncertainty and linguistic variables. Sandia National Laboratories' analysts have applied the tools to: risk of terrorist acts, security of nuclear materials, cyber security, prediction of movements of plumes of hazardous materials, and issues with nuclear weapons. This paper focuses on evaluating the risk of acts of terrorism. ©2009 IEEE.

More Details

Capturing the uncertainty in adversary attack simulations

Darby, John L.; Berry, Robert B.; Brooks, Traci N.

This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

More Details

Qualitative Evaluation of the Accuracy of Maps for Release of Hazardous Materials

Darby, John L.

The LinguisticBelief© software tool developed by Sandia National Laboratories was applied to provide a qualitative evaluation of the accuracy of various maps that provide information on releases of hazardous material, especially radionuclides. The methodology, "Uncertainty for Qualitative Assessments," includes uncertainty in the evaluation. The software tool uses the mathematics of fuzzy sets, approximate reasoning, and the belief/ plausibility measure of uncertainty. SNL worked cooperatively with the Remote Sensing Laboratory (RSL) and the National Atmospheric Release Advisory Center (NARAC) at Lawrence Livermore National Laboratory (LLNL) to develop models for three types of maps for use in this study. SNL and RSL developed the maps for "Accuracy Plot for Area" and "Aerial Monitoring System (AMS) Product Confidence". SNL and LLNL developed the "LLNL Model". For each of the three maps, experts from RSL and LLNL created a model in the LinguisticBelief software. This report documents the three models and provides evaluations of maps associated with the models, using example data. Future applications will involve applying the models to actual graphs to provide a qualitative evaluation of the accuracy of the maps, including uncertainty, for use by decision makers. A "Quality Thermometer" technique was developed to rank-order the quality of a set of maps of a given type. A technique for pooling expert option from different experts was provided using the PoolEvidence© software.

More Details

Framework for Integrating Safety, Operations, Security, and Safeguards in the Design and Operation of Nuclear Facilities

Darby, John L.; Horak, Karl E.; Tolk, Keith M.; Whitehead, Donnie W.; Lachance, Jeffrey L.

The US is currently on the brink of a nuclear renaissance that will result in near-term construction of new nuclear power plants. In addition, the Department of Energy’s (DOE) ambitious new Global Nuclear Energy Partnership (GNEP) program includes facilities for reprocessing spent nuclear fuel and reactors for transmuting safeguards material. The use of nuclear power and material has inherent safety, security, and safeguards (SSS) concerns that can impact the operation of the facilities. Recent concern over terrorist attacks and nuclear proliferation led to an increased emphasis on security and safeguard issues as well as the more traditional safety emphasis. To meet both domestic and international requirements, nuclear facilities include specific SSS measures that are identified and evaluated through the use of detailed analysis techniques. In the past, these individual assessments have not been integrated, which led to inefficient and costly design and operational requirements. This report provides a framework for a new paradigm where safety, operations, security, and safeguards (SOSS) are integrated into the design and operation of a new facility to decrease cost and increase effectiveness. Although the focus of this framework is on new nuclear facilities, most of the concepts could be applied to any new, high-risk facility.

More Details

LinguisticBelief: a java application for linguistic evaluation using belief, fuzzy sets, and approximate reasoning

Darby, John L.

LinguisticBelief is a Java computer code that evaluates combinations of linguistic variables using an approximate reasoning rule base. Each variable is comprised of fuzzy sets, and a rule base describes the reasoning on combinations of variables fuzzy sets. Uncertainty is considered and propagated through the rule base using the belief/plausibility measure. The mathematics of fuzzy sets, approximate reasoning, and belief/ plausibility are complex. Without an automated tool, this complexity precludes their application to all but the simplest of problems. LinguisticBelief automates the use of these techniques, allowing complex problems to be evaluated easily. LinguisticBelief can be used free of charge on any Windows XP machine. This report documents the use and structure of the LinguisticBelief code, and the deployment package for installation client machines.

More Details

Linguistic evaluation of terrorist scenarios: example application

Darby, John L.

In 2005, a group of international decision makers developed a manual process for evaluating terrorist scenarios. That process has been implemented in the approximate reasoning Java software tool, LinguisticBelief, released in FY2007. One purpose of this report is to show the flexibility of the LinguisticBelief tool to automate a custom model developed by others. LinguisticBelief evaluates combinations of linguistic variables using an approximate reasoning rule base. Each variable is comprised of fuzzy sets, and a rule base describes the reasoning on combinations of variables fuzzy sets. Uncertainty is considered and propagated through the rule base using the belief/plausibility measure. This report documents the evaluation and rank-ordering of several example terrorist scenarios for the existing process implemented in our software. LinguisticBelief captures and propagates uncertainty and allows easy development of an expanded, more detailed evaluation, neither of which is feasible using a manual evaluation process. In conclusion, the Linguistic-Belief tool is able to (1) automate an expert-generated reasoning process for the evaluation of the risk of terrorist scenarios, including uncertainty, and (2) quickly evaluate and rank-order scenarios of concern using that process.

More Details

Evaluating risk from acts of terrorism with belief and fuzzy sets

Proceedings - International Carnahan Conference on Security Technology

Darby, John L.

Risk consists of the likelihood of an event combined with the consequence ofthat event. There is uncertainty associated with an estimate of risk for an event that may happen in the future. For random, "dumb" events, such as an earthquake, this uncertainty is aleatory (stochastic) in nature and can be addressed with the probability measure of uncertainty. A terrorist act is not a random event; it is an intentional act by a thinking malevolent adversary. Much of the uncertainty in estimating the risk of a terrorist act is epistemic (state of knowledge); the adversary knows what acts will be attempted, but we as a defender have incomplete knowledge to know those acts with certainty. To capture the epistemic uncertainty in evaluating the risk from acts of terrorism, we have applied the belief/plausibility measure of uncertainty from the Dempster/Shafer Theory of Evidence. Also, to address how we as a defender evaluate the selection of scenarios by an adversary, we have applied approximate reasoning with fuzzy sets. We have developed software to perform these evaluations. © 2006 IEEE.

More Details

Evaluating risk from acts of terrorism with belief and fuzzy sets

Proceedings International Carnahan Conference on Security Technology

Darby, John L.

Risk consists of the likelihood of an event combined with the consequence ofthat event. There is uncertainty associated with an estimate of risk for an event that may happen in the future. For random, "dumb" events, such as an earthquake, this uncertainty is aleatory (stochastic) in nature and can be addressed with the probability measure of uncertainty. A terrorist act is not a random event; it is an intentional act by a thinking malevolent adversary. Much of the uncertainty in estimating the risk of a terrorist act is epistemic (state of knowledge); the adversary knows what acts will be attempted, but we as a defender have incomplete knowledge to know those acts with certainty. To capture the epistemic uncertainty in evaluating the risk from acts of terrorism, we have applied the belief/plausibility measure of uncertainty from the Dempster/Shafer Theory of Evidence. Also, to address how we as a defender evaluate the selection of scenarios by an adversary, we have applied approximate reasoning with fuzzy sets. We have developed software to perform these evaluations. © 2006 IEEE.

More Details

Critical infrastructure systems of systems assessment methodology

Depoy, Jennifer M.; Phelan, James M.; Sholander, Peter E.; Varnado, G.B.; Wyss, Gregory D.; Darby, John L.; Walter, Andrew

Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies that separately consider physical security and cyber security. This research has developed a risk assessment methodology that explicitly accounts for both physical and cyber security, while preserving the traditional security paradigm of detect, delay, and respond. This methodology also accounts for the condition that a facility may be able to recover from or mitigate the impact of a successful attack before serious consequences occur. The methodology uses evidence-based techniques (which are a generalization of probability theory) to evaluate the security posture of the cyber protection systems. Cyber threats are compared against cyber security posture using a category-based approach nested within a path-based analysis to determine the most vulnerable cyber attack path. The methodology summarizes the impact of a blended cyber/physical adversary attack in a conditional risk estimate where the consequence term is scaled by a ''willingness to pay'' avoidance approach.

More Details

Evaluation of risk from acts of terrorism :the adversary/defender model using belief and fuzzy sets

Darby, John L.

Risk from an act of terrorism is a combination of the likelihood of an attack, the likelihood of success of the attack, and the consequences of the attack. The considerable epistemic uncertainty in each of these three factors can be addressed using the belief/plausibility measure of uncertainty from the Dempster/Shafer theory of evidence. The adversary determines the likelihood of the attack. The success of the attack and the consequences of the attack are determined by the security system and mitigation measures put in place by the defender. This report documents a process for evaluating risk of terrorist acts using an adversary/defender model with belief/plausibility as the measure of uncertainty. Also, the adversary model is a linguistic model that applies belief/plausibility to fuzzy sets used in an approximate reasoning rule base.

More Details
47 Results
47 Results