Publications

Results 1–25 of 149

Search results

Jump to search filters

Development of a leading simulator/trailing simulator methodology as part of an integrated safety-security analysis for nuclear power plants

Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability

Cohn, Brian C.; Noel, Todd G.; Osborn, Douglas M.; Aldemir, Tunc

Nuclear power plant (NPP) risk assessment is broadly separated into disciplines of nuclear safety, security, and safeguards. Different analysis methods and computer models have been constructed to analyze each of these as separate disciplines. However, due to the complexity of NPP systems, there are risks that can span all these disciplines and require consideration of safety-security (2S) interactions which allows a more complete understanding of the relationship among these risks. A novel leading simulator/trailing simulator (LS/TS) method is introduced to integrate multiple generic safety and security computer models into a single, holistic 2S analysis. A case study is performed using this novel method to determine its effectiveness. The case study shows that the LS/TS method avoided introducing errors in simulation, compared to the same scenario performed without the LS/TS method. A second case study is then used to illustrate an integrated 2S analysis which shows that different levels of damage to vital equipment from sabotage at a NPP can affect accident evolution by several hours.

More Details

Updated Economic Model for Estimation of GDP Losses in the MACCS Offsite Consequence Analysis Code RDEIM Model Report for MACCS v4.2

Outkin, Alexander V.; Bixler, Nathan E.; Osborn, Douglas M.; Andrews, Nathan A.; Walton, Fotini W.

This report updates the Regional Disruption Economic Impact Model (RDEIM) GDP-based model described in Bixler et al. (2020) used in the MACCS accident consequence analysis code. MACCS is the U.S. Nuclear Regulatory Commission (NRC) used to perform probabilistic health and economic consequence assessments for atmospheric releases of radionuclides. It is also used by international organizations, both reactor owners and regulators. It is intended and most commonly used for hypothetical accidents that could potentially occur in the future rather than to evaluate past accidents or to provide emergency response during an ongoing accident. It is designed to support probabilistic risk and consequence analyses and is used by the NRC, U.S. nuclear licensees, the Department of Energy, and international vendors, licensees, and regulators. The update of the RDEIM model in version 4.2 expresses the national recovery calculation explicitly, rather than implicitly as in the previous version. The calculation of the total national GDP losses remains unchanged. However, anticipated gains from recovery are now allocated across all the GDP loss types – direct, indirect, and induced – whereas in version 4.1, all recovery gains were accounted for in the indirect loss type. To achieve this, we’ve introduced new methodology to streamline and simplify the calculation of all types of losses and recovery. In addition, RDEIM includes other kinds of losses, including tangible wealth. This includes loss of tangible assets (e.g., depreciation) and accident expenditures (e.g., decontamination). This document describes the updated RDEIM economic model and provides examples of loss and recovery calculation, results analysis, and presentation. Changes to the tangible cost calculation and accident expenditures are described in section 2.2. The updates to the RDEIM input-output (I-O) model are not expected to affect the final benchmark results Bixler et al. (2020), as the RDEIM calculation for the total national GDP losses remains unchanged. The reader is referred to the MACCS revision history for other cost modelling changes since version 4.0 that may affect the benchmark. RDEIM has its roots in a code developed by Sandia National Laboratories for the Department of Homeland Security to estimate short-term losses from natural and manmade accidents, called the Regional Economic Accounting analysis tool (REAcct). This model was adapted and modified for MACCS. It is based on I-O theory, which is widely used in economic modeling. It accounts for direct losses to a disrupted region affected by an accident, indirect losses to the national economy due to disruption of the supply chain, and induced losses from reduced spending by displaced workers. RDEIM differs from REAcct in in its treatment and estimation of indirect loss multipliers, elimination of double-counting associated with inter-industry trade in the affected area, and that it is intended to be used for extended periods that can occur from a major nuclear reactor accident, such as the one that occurred at the Fukushima Daiichi site in Japan. Most input-output models do not account for economic adaptation and recovery, and in this regard RDEIM differs from its parent, REAcct, because it allows for a user-definable national recovery period. Implementation of a recovery period was one of several recommendations made by an independent peer review panel to ensure that RDEIM is state-of-practice. For this and several other reasons, RDEIM differs from REAcct.

More Details

Alpha Spectrometry Results for Groundwater Samples Collected in Northern Iraq and a Summary of the Environmental Setting of the Adaya Burial Site

Copland, John R.; Farrar, David R.; Osborn, Douglas M.

The Radiation Protection Center (RPC) of the Iraqi Ministry of Environment continues to evaluate the potential health impacts associated with the Adaya Burial Site, which is located 33 kilometers (20.5 miles) southwest of Mosul. This report documents the radiological analyses of 16 groundwater samples collected from wells located in the vicinity of the Adaya Burial Site and at other sites in northern Iraq. The Adaya Burial Site is a high-risk dump site because a large volume of radioactive material and contaminated soil is located on an unsecure hillside above the village of Tall ar Ragrag. The uranium activities for the 16 water samples in northern Iraq are considered to be naturally occurring and do not indicate artificial (man-made) contamination. With one exception, the alpha spectrometry results for the 16 wells that were sampled in 2019 indicate that the water quality concerning the three uranium isotopes (Uranium-233/234, Uranium-235/236, and Uranium-238) was acceptable for potable purposes (drinking and cooking). However, Well 7 in Mosul had a Uranium-233/234 activity concentration that slightly exceeded the World Health Organization guidance level. Eight of the 16 wells are located in the villages of Tall ar Ragrag and Adaya and had naturally occurring uranium concentrations. Wells in the villages of Tall ar Ragrag and Adaya are located near the Adaya Burial Site and should be sampled on an annual schedule. The list of groundwater analytes should include metals, total uranium, isotopic uranium, gross alpha/beta, gamma spectroscopy, organic compounds, and standard water quality parameters. Our current understanding of the hydrogeologic setting in the vicinity of the Adaya Burial Site is solely based on villager's domestic wells, topographic maps, and satellite imagery. To better understand the hydrogeologic setting, a Groundwater Monitoring Program needs to be developed and should include the installation of twelve groundwater monitoring wells in the vicinity of Tall ar Ragrag and the Adaya Burial Site. Characterization of the limestone aquifer and overlying alluvium is needed. RPC should continue to support health assessments for the villagers in Tall ar Ragrag and Adaya. Collecting samples for surface water (storm water), airborne dust, vegetation, and washway sediment should be conducted on a routine basis. Human access to the Adaya Burial Site needs to be strictly limited. Livestock access on or near the burial site needs to be eliminated. The surface-water exposure pathway is likely a greater threat than the groundwater exposure pathway. Installation of a surface-water diversion or collection system is recommended in order to reduce the potential for humans and livestock to come in contact with contaminated water and sediment. To reduce exposure to villagers, groundwater treatment should be considered if elevated uranium or other contaminants are detected in drinking water. Installing water-treatment systems would likely be quicker to accomplish than remediation and excavation of the Adaya Burial Site. The known potential for human exposure to uranium and metals (such as arsenic, chromium, selenium, and strontium) at the Adaya Burial Site is serious. Additional characterization , mitigation, and remediation efforts should be given a high priority.

More Details

INTEGRATED SAFETY AND SECURITY ANALYSIS OF NUCLEAR POWER PLANTS USING DYNAMIC EVENT TREES

Proceedings of the 2021 International Topical Meeting on Probabilistic Safety Assessment and Analysis, PSA 2021

Cohn, Brian C.; Haskin, Troy C.; Noel, Todd G.; Cardoni, Jeffrey N.; Osborn, Douglas M.; Aldemir, Tunc

Nuclear security relies on the method of vital area identification (VAI) to inform the sabotage target locations within a nuclear power plant (NPP) that need to be protected. The VAI methodology uses fault trees (FTs) and event trees (ETs) to identify locations in the NPP that contain vital systems, structures, or components. However, the traditional FT/ET process cannot fully capture the dynamics occurring following NPP sabotage or of mitigating actions. A methodology is presented which examines the consequences of sabotage to NPP systems using the dynamic probabilistic risk assessment approach to explore these dynamics. A force-on-force computer code determines the timing and extent of damage to NPP systems and a reactor response code models the effects of this damage on the reactor. These two codes are connected using the novel leading simulator/trailing simulator (LS/TS) methodology. A case study is created using the LS/TS methodology to model an adversary attack on an NPP. This case study models uncertainties in an adversary attack and in the response to determine if reactor core damage would occur, and the time to core damage, as well as the extent of core damage, if damage occurs.

More Details

Risk-Informed Access Delay Timeline Development

Proceedings of the 2021 International Topical Meeting on Probabilistic Safety Assessment and Analysis, PSA 2021

Osborn, Douglas M.; Brooks, Dusty M.; Thompson, Andrew D.

The U.S. Department of Energy Office of Nuclear Energy’s Light Water Reactor Sustainability Program is developing a new method to modernize how access delay timelines are developed and utilized in physical security system evaluations. This new method utilizes Bayesian methods to combine subject matter expert judgement and small performance test datasets in a consistent and defensible way. It will also allow a more holistic view of delay performance that provides distributions of task times and task success probabilities to account for tasks that, if failed, would result in failure of the attack. This paper describes the methodology and its application to an example problem, demonstrating that it can be applied to access delay timeline analyses to summarize delay performance using subjective and objective information.

More Details

EXPLORING VITAL AREA IDENTIFICATION USING SYSTEMS-THEORETIC PROCESS ANALYSIS

Proceedings of the 2021 International Topical Meeting on Probabilistic Safety Assessment and Analysis, PSA 2021

Sandt, Emily S.; Clark, Andrew; Williams, Adam D.; Cohn, Brian C.; Osborn, Douglas M.; Aldemir, Tunc

Vital Area Identification (VAI) is an important element in securing nuclear facilities, including the range of recently proposed advanced reactors (AR). As ARs continue to develop and progress to licensure status, it will be necessary to ensure that safety analysis methods are compatible with the new reactor designs. These reactors tout inherently passive safety systems that drastically reduce the number of active components whose failures need to be considered as basic events in a Level 1 probabilistic risk assessment (PRA). Instead, ARs rely on natural processes for their safety, which may be difficult to capture through the use of fault trees (FTs) and subsequently difficult to determine the effects of lost equipment when completing a traditional VAI analysis. Traditional VAI methodology incorporates FTs from Level 1 PRA as a substantial portion of the effort to identify candidate vital area sets. The outcome of VAI is a selected set of areas deemed vital which must be protected in order to prevent radiological sabotage. An alternative methodology is proposed to inform the VAI process and selection of vital areas: Systems-Theoretic Process Analysis (STPA). STPA is a systems-based, top-down approach which analyzes a system as a hierarchical control structure composed of components (both those that are controlled and their controllers) and controlled actions taken by/acted upon those components. The control structure is then analyzed based on several situational parameters, including a time component, to produce a list of scenarios which may lead to system losses. A case study is presented to demonstrate how STPA can be used to inform VAI for ARs.

More Details

DOE-NE LWRS Integrated Program Plan - Physical Security Pathway

Osborn, Douglas M.

Domestic nuclear power is facing increased financial pressures from a variety of areas and there is pressure on these utilities to reduce their cost of operation. Currently, about 20%-30% of all on-site personnel are related to physical security. The LWRS Program recognized that R&D related to physical security could play a role in providing nuclear utilities technical and staffing efficiency options to meet their physical security commitments, but utilities often lack the technical basis or the ability to create the technical basis to realize or implement these efficiencies; towards this end, the LWRS Program created the Physical Security Pathway in September 2019. The pathway performs R&D to develop methods, tools, and technologies to optimize and modernize a nuclear power facility’s security posture. The pathway will: (1) conduct research on risk-informed techniques for physical security that account for a dynamic adversary; (2) apply advanced modeling and simulation tools to better inform physical-security scenarios and reduce uncertainties in force-on-force modeling; (3) assess benefits from proposed enhancements and novel mitigation strategies and explore changes to best practices, guides, or regulation to enable modernization; and (4) enhance and provide the technical basis for stakeholders to employ new security methods, tools, and technologies.

More Details

High-Level Considerations for Access and Access Controls by Design

Bland, Jesse J.; Evans, Alan S.; Goolsby, Tommy D.; Horowitz, Steven M.; Monthan, Chad W.; Osborn, Douglas M.; Rivers, Joe; Rodgers, Thomas W.; White, Jake; Williams, Adam D.

The design and construction of a nuclear power plant must include robust structures and a security boundary that is difficult to penetrate. For security considerations, the reactors would ideally be sited underground, beneath a massive solid block, which would be too thick to be penetrated by tools or explosives. Additionally, all communications and power transfer lines would also be located underground and would be fortified against any possible design basis threats. Limiting access with difficult-to-penetrate physical barriers is a key aspect for determining response and staffing requirements. Considerations considered in a graded approach to physical protection are described.

More Details

High-Level Considerations for Access and Access Controls by Design

Bland, Jesse J.; Evans, Alan S.; Goolsby, Tommy D.; Horowitz, Steven M.; Monthan, Chad W.; Osborn, Douglas M.; Rivers, Joe; Rodgers, Thomas W.; White, Jake; Williams, Adam D.

Nuclear power plants must be, by design and construction, robust structures and difficult to penetrate. Limiting access with difficult-to-penetrate physical barriers is going to be key for staffing reduction. Ideally, for security, the reactors would be sited underground, beneath a massive solid block, too thick to be penetrated by tools or explosives with all communications and power transfer lines also underground and fortified. Having the minimal possible number of access points and methods to completely block access from these points if a threat is detected will greatly help us justify staffing reduction.

More Details
Results 1–25 of 149
Results 1–25 of 149