首页> 外文会议>Annual meeting of the Institute of Nuclear Materials Management >Procedure and method of physical protection vulnerability assessment using simulation
【24h】

Procedure and method of physical protection vulnerability assessment using simulation

机译:使用仿真评估物理保护漏洞的过程和方法

获取原文

摘要

Physical protection vulnerability assessment (hereinafter refer to as "VA") is an essential way to evaluate the entire physical protection system (hereinafter refer to as "PPS") of a facility as a performance basis. In general, VA can be done by expert opinion, physical protection inspection, force on force exercise and modeling based simulation. In this paper, we propose the procedure and method for VA using simulation (hereinafter refer to as "VAS"). VAS can be divided into a modeling and a simulation. Modeling can be divided into visual modeling such as terrain, road, protection equipment, and data modeling such as vehicle speed on the terrain, roughness of the road, delay time of the fence, detection rate of sensor. Visual modeling is generally used as a measure of how similar an actual facility is to modeling. Visual modeling becomes the basis of data modeling in the future, it should not be simplified by arbitrary judgment of the modeling person. Data modeling can be more complicated than visual modeling. Protection equipment can be divided into delay and detection. However, in data modeling, the value of the delay or detection value of a specific device is not absolute, but it can be regarded as a problem of a correlation that changes depending on who the targets is and how the target penetrates through method. When the modeling of the two aspects is completed, a verification process of the modeling is required. When a simulation is finished, it is difficult for the user to know the intended result or user mistake. Therefore, it is very important to construct a complete model with defect-free through various verification techniques. The first step in the simulation is to establish the key assets and protection objectives. It is also necessary to define the threats to the facility. Threats can be divided into intruder composition, possessed weapons, numbers, groups, strategies, and vehicle. It is possible to assess the precise vulnerability of the facility when the intrusion was carried out in the most effective way to the facility. In this paper, we describe the procedures and methods of practical VAS based on the experiences of modeling and simulation of nuclear power plants and nuclear fuel cycle facility.
机译:实物保护漏洞评估(以下称为“ VA”)是评估设施的整个实物保护系统(以下称为“ PPS”)作为性能基础的基本方法。通常,VA可以通过专家意见,实物保护检查,作用力练习和基于模型的模拟来完成。在本文中,我们提出了使用仿真进行虚拟增值的程序和方法(以下简称“ VAS”)。 VAS可以分为建模和仿真。建模可以分为可视化建模,例如地形,道路,保护设备,以及数据建模,例如地形上的车速,道路的不平整度,围栏的延迟时间,传感器的检测率。视觉建模通常用于衡量实际设施与建模的相似程度。可视化建模将成为将来数据建模的基础,不应通过建模人员的任意判断来简化可视化建模。数据建模可能比视觉建模更为复杂。保护设备可分为延时和检测。但是,在数据建模中,特定设备的延迟值或检测值不是绝对的,而是可以认为是相关性的问题,该相关性取决于目标是谁以及目标如何穿透方法而变化。当完成两个方面的建模时,需要进行建模的验证过程。模拟完成后,用户很难知道预期的结果或用户的错误。因此,通过各种验证技术构建无缺陷的完整模型非常重要。模拟的第一步是建立关键资产和保护目标。还必须定义对设施的威胁。威胁可以分为入侵者组成,拥有的武器,数量,组,策略和车辆。以最有效的方式对设施进行入侵时,可以评估设施的确切脆弱性。在本文中,我们将基于核电厂和核燃料循环设施的建模和仿真经验,描述实用的增值服务的程序和方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号