找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems; The Fifth Internatio Yang Xu,Yongbin Sun,Zheming Liu

[复制链接]
楼主: lumbar-puncture
发表于 2025-3-26 22:17:41 | 显示全部楼层
An AHP-Fuzzy Complex Evaluation Method for MCR Human Factors Engineering Verification and Validatio Plants (NPPs). In order to reduce potential human errors, the design of an MCR must consider appropriate human factors. Human factors verification and validation (V&V) evaluations comprehensively determine that the HFE design conforms to HFE design principles. HFE V&V enables plant personnel to suc
发表于 2025-3-27 01:34:36 | 显示全部楼层
发表于 2025-3-27 09:06:48 | 显示全部楼层
发表于 2025-3-27 11:19:20 | 显示全部楼层
发表于 2025-3-27 15:58:14 | 显示全部楼层
Design of Defence in Depth for I&C System in Pressurized Water Reactor Nuclear Power Plant,ence of itself in addition to meeting the overall Defence in Depth (DiD) target of the plant and ensuring the correct and reliable implementation of monitoring, control and protection functions under various operation conditions. The requirements of International Atomic Energy Agency (IAEA) are summ
发表于 2025-3-27 19:12:11 | 显示全部楼层
Test Analysis About Hydrogen Detection Equipment Under Severe Accident in Nuclear Power Plant,es to prevent severe accident happening. Control and detection hydrogen in containment under severe accident is one of the improvement actions. This article has analyzed the requirements for hydrogen detection system and related tests requirements for this detection system. A comparison of IEC 61298
发表于 2025-3-27 23:19:54 | 显示全部楼层
Research on Converged Wireless Communication Network Scheme in Nuclear Power Plants,or the cases where the coverage area is large, but multiple-feeder installation is restricted and signals can be only transmitted by a single feeder. The above three WCN schemes can converge the installed and other wireless communication technologies under different circumstances. Due to the complem
发表于 2025-3-28 05:36:25 | 显示全部楼层
发表于 2025-3-28 07:38:28 | 显示全部楼层
发表于 2025-3-28 11:38:59 | 显示全部楼层
Information Fusion Analysis of Cyberattack Identification Based on D-S Evidence Theory,D-S evidence theory to integrate data from different sources, including both cyber and physical spaces. The Dempster’s rule of combination is used to synthesize the basic probability distribution of each evidence, and the attack type identification is also performed. Three typical types of cyberatta
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-4 03:15
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表