EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Sensitivity Uncertainty Based Nuclear Criticality Safety Validation

Download or read book Sensitivity Uncertainty Based Nuclear Criticality Safety Validation written by and published by . This book was released on 2016 with total page 47 pages. Available in PDF, EPUB and Kindle. Book excerpt: These are slides from a seminar given to the University of Mexico Nuclear Engineering Department. Whisper is a statistical analysis package developed to support nuclear criticality safety validation. It uses the sensitivity profile data for an application as computed by MCNP6 along with covariance files for the nuclear data to determine a baseline upper-subcritical-limit for the application. Whisper and its associated benchmark files are developed and maintained as part of MCNP6, and will be distributed with all future releases of MCNP6. Although sensitivity-uncertainty methods for NCS validation have been under development for 20 years, continuous-energy Monte Carlo codes such as MCNP could not determine the required adjoint-weighted tallies for sensitivity profiles. The recent introduction of the iterated fission probability method into MCNP led to the rapid development of sensitivity analysis capabilities for MCNP6 and the development of Whisper. Sensitivity-uncertainty based methods represent the future for NCS validation - making full use of today's computer power to codify past approaches based largely on expert judgment. Validation results are defensible, auditable, and repeatable as needed with different assumptions and process models. The new methods can supplement, support, and extend traditional validation approaches.

Book Computational Methods for Sensitivity and Uncertainty Analysis in Criticality Safety

Download or read book Computational Methods for Sensitivity and Uncertainty Analysis in Criticality Safety written by and published by . This book was released on 1999 with total page 9 pages. Available in PDF, EPUB and Kindle. Book excerpt: Interest in the sensitivity methods that were developed and widely used in the 1970s (the FORSS methodology at ORNL among others) has increased recently as a result of potential use in the area of criticality safety data validation procedures to define computational bias, uncertainties and area(s) of applicability. Functional forms of the resulting sensitivity coefficients can be used as formal parameters in the determination of applicability of benchmark experiments to their corresponding industrial application areas. In order for these techniques to be generally useful to the criticality safety practitioner, the procedures governing their use had to be updated and simplified. This paper will describe the resulting sensitivity analysis tools that have been generated for potential use by the criticality safety community.

Book SENSITIVITY AND UNCERTAINTY ANALYSES APPLIED TO CRITICALITY SAFETY VALIDATION    ILLUSTRATIVE APPLICATIONS AND     NUREG

Download or read book SENSITIVITY AND UNCERTAINTY ANALYSES APPLIED TO CRITICALITY SAFETY VALIDATION ILLUSTRATIVE APPLICATIONS AND NUREG written by U.S. Nuclear Regulatory Commission and published by . This book was released on 2000* with total page pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Sensitivity and Uncertainty Analysis for Nuclear Criticality Safety Using KENO in the SCALE Code System

Download or read book Sensitivity and Uncertainty Analysis for Nuclear Criticality Safety Using KENO in the SCALE Code System written by and published by . This book was released on 2000 with total page 8 pages. Available in PDF, EPUB and Kindle. Book excerpt: Sensitivity and uncertainty methods have been developed to aid in the establishment of areas of applicability and validation of computer codes and nuclear data for nuclear criticality safety studies. A key component in this work is the generation of sensitivity and uncertainty parameters for typically several hundred benchmarks experiments used in validation exercises. Previously, only one-dimensional sensitivity tools were available for this task, which necessitated the remodeling of multidimensional inputs in order for such an analysis to be performed. This paper describes the development of the SEN3 Monte Carlo based sensitivity analysis sequence for SCALE. Two options in the SEN3 package for the reconstruction of angular-dependent forward and adjoint fluxes are described and contrasted. These options are the direct calculation of flux moments versus the calculation of angular fluxes, with subsequent conversion to flux moments prior to sensitivity coefficient generation. The latter technique is found to be significantly more efficient.

Book Application of Covariance Data to Criticality Safety Data Validation

Download or read book Application of Covariance Data to Criticality Safety Data Validation written by and published by . This book was released on 1999 with total page 5 pages. Available in PDF, EPUB and Kindle. Book excerpt: The use of cross-section covariance data has long been a key part of traditional sensitivity and uncertainty analyses (S/U). This paper presents the application of S/U methodologies to the data validation tasks of a criticality safety computational study. The S/U methods presented are designed to provide a formal means of establishing the area (or range) of applicability for criticality safety data validation studies. The goal of this work is to develop parameters that can be used to formally determine the ''similarity'' of a benchmark experiment (or a set of benchmark experiments individually) and the application area that is to be validated. These parameters are termed D parameters, which represent the differences by energy group of S/U-generated sensitivity profiles, and ck parameters, which are the correlation coefficients, each of which gives information relative to the similarity between pairs of selected systems. The application of a Generalized Linear Least-Squares Methodology (GLLSM) tool to criticality safety validation tasks is also described in this paper. These methods and guidelines are also applied to a sample validation for uranium systems with enrichments greater than 5 wt %.

Book Application of Sensitivity and Uncertainty Analysis Methods to a Validation Study for Weapons Grade Mixed Oxide Fuel

Download or read book Application of Sensitivity and Uncertainty Analysis Methods to a Validation Study for Weapons Grade Mixed Oxide Fuel written by and published by . This book was released on 2002 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: At the Oak Ridge National Laboratory (ORNL), sensitivity and uncertainty (S/U) analysis methods and a Generalized Linear Least-Squares Methodology (GLLSM) have been developed to quantitatively determine the similarity or lack thereof between critical benchmark experiments and an application of interest. The S/U and GLLSM methods provide a mathematical approach, which is less judgment based relative to traditional validation procedures, to assess system similarity and estimate the calculational bias and uncertainty for an application of interest. The objective of this paper is to gain experience with the S/U and GLLSM methods by revisiting a criticality safety evaluation and associated traditional validation for the shipment of weapons-grade (WG) MOX fuel in the MO-1 transportation package. In the original validation, critical experiments were selected based on a qualitative assessment of the MO-1 and MOX contents relative to the available experiments. Subsequently, traditional trending analyses were used to estimate the[Delta]k bias and associated uncertainty. In this paper, the S/U and GLLSM procedures are used to re-evaluate the suite of critical experiments associated with the original MO-1 evaluation. Using the S/U procedures developed at ORNL, critical experiments that are similar to the undamaged and damaged MO-1 package are identified based on sensitivity and uncertainty analyses of the criticals and the MO-1 package configurations. Based on the trending analyses developed for the S/U and GLLSM procedures, the[Delta]k bias and uncertainty for the most reactive MO-1 package configurations are estimated and used to calculate an upper subcritical limit (USL) for the MO-1 evaluation. The calculated bias and uncertainty from the S/U and GLLSM analyses lead to a calculational USL that supports the original validation study for the MO-1.

Book NUREG CR

    Book Details:
  • Author : U.S. Nuclear Regulatory Commission
  • Publisher :
  • Release : 1977
  • ISBN :
  • Pages : 48 pages

Download or read book NUREG CR written by U.S. Nuclear Regulatory Commission and published by . This book was released on 1977 with total page 48 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Proposed Methodology for Establishing Area of Applicability

Download or read book Proposed Methodology for Establishing Area of Applicability written by and published by . This book was released on 1999 with total page 11 pages. Available in PDF, EPUB and Kindle. Book excerpt: This paper presents the application of sensitivity and uncertainty (S/U) analysis methodologies to the data validation tasks of a criticality safety computational study. The S/U methods presented are designed to provide a formal means of establishing the area (or range) of applicability for criticality safety data validation studies. The development of parameters that are analogous to the standard trending parameters form the key to the technique. These parameters are the so-called D parameters, which represent the differences by energy group of S/U-generated sensitivity profiles, and c parameters, which are the k correlation coefficients, each of which give information relative to the similarity between pairs of selected systems. The use of a Generalized Linear Least-Squares Methodology (GLLSM) tool is also described in this paper. These methods and guidelines are also applied to a sample validation for uranium systems with enrichments greater than 5 wt %.

Book Application of the SCALE TSUNAMI Tools for the Validation of Criticality Safety Calculations Involving 233U

Download or read book Application of the SCALE TSUNAMI Tools for the Validation of Criticality Safety Calculations Involving 233U written by and published by . This book was released on 2009 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: The Radiochemical Development Facility at Oak Ridge National Laboratory has been storing solid materials containing 233U for decades. Preparations are under way to process these materials into a form that is inherently safe from a nuclear criticality safety perspective. This will be accomplished by down-blending the 233U materials with depleted or natural uranium. At the request of the U.S. Department of Energy, a study has been performed using the SCALE sensitivity and uncertainty analysis tools to demonstrate how these tools could be used to validate nuclear criticality safety calculations of selected process and storage configurations. ISOTEK nuclear criticality safety staff provided four models that are representative of the criticality safety calculations for which validation will be needed. The SCALE TSUNAMI-1D and TSUNAMI-3D sequences were used to generate energy-dependent k{sub eff} sensitivity profiles for each nuclide and reaction present in the four safety analysis models, also referred to as the applications, and in a large set of critical experiments. The SCALE TSUNAMI-IP module was used together with the sensitivity profiles and the cross-section uncertainty data contained in the SCALE covariance data files to propagate the cross-section uncertainties (??/?) to k{sub eff} uncertainties (?k/k) for each application model. The SCALE TSUNAMI-IP module was also used to evaluate the similarity of each of the 672 critical experiments with each application. Results of the uncertainty analysis and similarity assessment are presented in this report. A total of 142 experiments were judged to be similar to application 1, and 68 experiments were judged to be similar to application 2. None of the 672 experiments were judged to be adequately similar to applications 3 and 4. Discussion of the uncertainty analysis and similarity assessment is provided for each of the four applications. Example upper subcritical limits (USLs) were generated for application 1 based on trending of the energy of average lethargy of neutrons causing fission, trending of the TSUNAMI similarity parameters, and use of data adjustment techniques.

Book Accelerator Driven System at Kyoto University Critical Assembly

Download or read book Accelerator Driven System at Kyoto University Critical Assembly written by Cheol Ho Pyeon and published by Springer. This book was released on 2021-03-20 with total page 352 pages. Available in PDF, EPUB and Kindle. Book excerpt: This open access book is a unique compilation of experimental benchmark analyses of the accelerator-driven system (ADS) at the Kyoto University Critical Assembly (KUCA) on the most recent advances in the development of computational methods. It is devoted especially to nuclear engineers and scientists. Readers will find a detailed description of advanced measurement techniques and calculation methodologies for the ADS with 14 MeV neutrons and high-energy neutrons (with combined use of 100 MeV protons and Pb-Bi target) at KUCA. Additionally, experimental results of nuclear transmutation of minor actinides by ADS and at a critical state are included. Readers also have access to benchmarks of specific ADS experiments with raw data in the Appendix. The book is a valuable resource for the ADS experiments at KUCA which are globally recognized as both static and kinetic studies from the point of view of fundamental research.

Book Reactor Physics  Methods and Applications

Download or read book Reactor Physics Methods and Applications written by Tengfei Zhang and published by Frontiers Media SA. This book was released on 2022-06-29 with total page 272 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book The nth Order Comprehensive Adjoint Sensitivity Analysis Methodology  Volume II

Download or read book The nth Order Comprehensive Adjoint Sensitivity Analysis Methodology Volume II written by Dan Gabriel Cacuci and published by Springer Nature. This book was released on 2023-04-26 with total page 474 pages. Available in PDF, EPUB and Kindle. Book excerpt: This text describes a comprehensive adjoint sensitivity analysis methodology (nth-CASAM), developed by the author, which enablesthe efficient and exact computation of arbitrarily high-order functional derivatives of model responses to model parameters in large-scale systems. The nth-CASAM framework is set in linearly increasing Hilbert spaces, each of state-function-dimensionality, as opposed to exponentially increasing parameter-dimensional spaces, thereby overcoming the so-called “curse of dimensionality” in sensitivity and uncertainty analysis. The nth-CASAM is applicable to any model; the larger the number of model parameters, the more efficient the nth-CASAM becomes for computing arbitrarily high-order response sensitivities. The book will be helpful to those working in the fields of sensitivity analysis, uncertainty quantification, model validation, optimization, data assimilation, model calibration, sensor fusion, reduced-order modelling, inverse problems and predictive modelling. This Volume Two, the second of three, presents the large-scale application of the nth-CASAM to perform a representative fourth-order sensitivity analysis of the Polyethylene-Reflected Plutonium benchmark described in the Nuclear Energy Agency (NEA) International Criticality Safety Benchmark Evaluation Project (ICSBEP) Handbook. This benchmark is modeled mathematically by the Boltzmann particle transport equation, involving 21,976 imprecisely-known parameters, the numerical solution of which requires representative large-scale computations. The sensitivity analysis presented in this volume is the most comprehensive ever performed in the field of reactor physics and the results presented in this book prove, perhaps counter-intuitively, that many of the 4th-order sensitivities are much larger than the corresponding 3rd-order ones, which are, in turn, much larger than the 2nd-order ones, all of which are much larger than the 1st-order sensitivities. Currently, the nth-CASAM is the only known methodology which enables such large-scale computations of exactly obtained expressions of arbitrarily-high-order response sensitivities.

Book Accelerator Driven System at Kyoto University Critical Assembly

Download or read book Accelerator Driven System at Kyoto University Critical Assembly written by Cheol Ho Pyeon and published by Springer Nature. This book was released on 2021-03-19 with total page 353 pages. Available in PDF, EPUB and Kindle. Book excerpt: This open access book is a unique compilation of experimental benchmark analyses of the accelerator-driven system (ADS) at the Kyoto University Critical Assembly (KUCA) on the most recent advances in the development of computational methods. It is devoted especially to nuclear engineers and scientists. Readers will find a detailed description of advanced measurement techniques and calculation methodologies for the ADS with 14 MeV neutrons and high-energy neutrons (with combined use of 100 MeV protons and Pb-Bi target) at KUCA. Additionally, experimental results of nuclear transmutation of minor actinides by ADS and at a critical state are included. Readers also have access to benchmarks of specific ADS experiments with raw data in the Appendix. The book is a valuable resource for the ADS experiments at KUCA which are globally recognized as both static and kinetic studies from the point of view of fundamental research.

Book Sensitivity   Uncertainty Analysis  Volume 1

Download or read book Sensitivity Uncertainty Analysis Volume 1 written by Dan G. Cacuci and published by CRC Press. This book was released on 2003-05-28 with total page 304 pages. Available in PDF, EPUB and Kindle. Book excerpt: As computer-assisted modeling and analysis of physical processes have continued to grow and diversify, sensitivity and uncertainty analyses have become indispensable investigative scientific tools in their own right. While most techniques used for these analyses are well documented, there has yet to appear a systematic treatment of the method based