NORM 发表于 2025-3-26 22:17:41

An AHP-Fuzzy Complex Evaluation Method for MCR Human Factors Engineering Verification and Validatio Plants (NPPs). In order to reduce potential human errors, the design of an MCR must consider appropriate human factors. Human factors verification and validation (V&V) evaluations comprehensively determine that the HFE design conforms to HFE design principles. HFE V&V enables plant personnel to suc

玷污 发表于 2025-3-27 01:34:36

http://reply.papertrans.cn/67/6687/668653/668653_32.png

Exploit 发表于 2025-3-27 09:06:48

http://reply.papertrans.cn/67/6687/668653/668653_33.png

MINT 发表于 2025-3-27 11:19:20

http://reply.papertrans.cn/67/6687/668653/668653_34.png

Loathe 发表于 2025-3-27 15:58:14

Design of Defence in Depth for I&C System in Pressurized Water Reactor Nuclear Power Plant,ence of itself in addition to meeting the overall Defence in Depth (DiD) target of the plant and ensuring the correct and reliable implementation of monitoring, control and protection functions under various operation conditions. The requirements of International Atomic Energy Agency (IAEA) are summ

CHAFE 发表于 2025-3-27 19:12:11

Test Analysis About Hydrogen Detection Equipment Under Severe Accident in Nuclear Power Plant,es to prevent severe accident happening. Control and detection hydrogen in containment under severe accident is one of the improvement actions. This article has analyzed the requirements for hydrogen detection system and related tests requirements for this detection system. A comparison of IEC 61298

opalescence 发表于 2025-3-27 23:19:54

Research on Converged Wireless Communication Network Scheme in Nuclear Power Plants,or the cases where the coverage area is large, but multiple-feeder installation is restricted and signals can be only transmitted by a single feeder. The above three WCN schemes can converge the installed and other wireless communication technologies under different circumstances. Due to the complem

CAPE 发表于 2025-3-28 05:36:25

http://reply.papertrans.cn/67/6687/668653/668653_38.png

得体 发表于 2025-3-28 07:38:28

http://reply.papertrans.cn/67/6687/668653/668653_39.png

Observe 发表于 2025-3-28 11:38:59

Information Fusion Analysis of Cyberattack Identification Based on D-S Evidence Theory,D-S evidence theory to integrate data from different sources, including both cyber and physical spaces. The Dempster’s rule of combination is used to synthesize the basic probability distribution of each evidence, and the attack type identification is also performed. Three typical types of cyberatta
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems; The Fifth Internatio Yang Xu,Yongbin Sun,Zheming Liu