Крючков Фундаменталс оф Нуцлеар Материалс Пхысицал Протецтион 2011
.pdf
|
|
Intruder |
|
|
|
|
|
|
|
|
|
|
|
Conspiracy |
|
|
|
External intruders |
|
Insider |
|||
|
|
||||
|
|
||||
|
|
|
|
|
|
Group of intruders |
|
Auxiliary |
personnel |
||
|
|||||
acting by force |
|
with limited |
access to |
||
|
|
|
guarded areas |
|
|
Single intruder with no |
|
Key personnel with the |
|||
right of access to the |
|
right of access to |
|||
installation |
|
vulnerable points |
|||
|
|
|
Guard personnel with |
||
|
|
|
limited access to |
||
|
|
|
guarded areas |
|
Fig. 5.2. Classification of intruders
A macromodel contains the following data:
∙intruder type;
∙anticipated act;
∙target;
∙number of intruders (where there is more than one intruder);
∙awareness;
∙preparedness;
∙equipment, if any;
∙weapons.
A micromodel contains the following data:
∙techniques to defeat physical barriers and detections sensors (DS);
∙speed of movement within the DS detection area;
∙appliances at hand, if any;
∙dedicated facilities intended, e.g., to disable DSs, if any.
Macromodels are used primarily to conceptualize the PPS design in general, while micromodels help formulate requirements, say, to the detection sensors and physical barriers on the perimeter, in local areas, within buildings and rooms, etc.
Practically, an intruder model for a particular NI is formed for the installation after its vulnerability is analyzed by filling in respective questionnaire forms.
452
EFC |
|
Escape during power |
|||
|
|
operation |
|||
|
|
|
|
|
|
|
|
|
|
|
|
EDPO
I
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Escape during core |
|
|
|
|
|
Escape without core |
|
|
||||||||
|
|
melting |
|
|
|
|
|
|
|
melting |
|
|
||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
EDCM |
|
|
|
|
|
|
|
|
|
|
EWCM |
|||||
|
|
& |
|
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
Reactor containment |
|
|
|
Fuel element cladding |
|
|
Failure of the primary |
|||||||||||
|
failure from fuel |
|
|
|
||||||||||||||
failure |
|
|
|
|
|
|
circuit boundary |
|||||||||||
|
|
melting |
|
|
|
|||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||
RCF |
FCFFM |
|
|
|
|
|
|
FPCB |
||||||||||
I |
|
|
|
|
||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
|
|
|
|
|
|
|
|
|
||||||||||
|
|
|
|
|
|
|
|
|||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Fuel melting as the result of |
|
Fuel melting as the result of |
|
|
Fuel melting as the result |
|||||||||||||
loss-of-coolant |
|
loss-of-coolant |
|
|
|
of an operational |
||||||||||||
accident with |
|
|
accident with |
|
|
|
occurrence |
|||||||||||
insufficiency of |
|
|
a failure of |
|
|
|
with a failure of |
|||||||||||
safety |
|
|
safety |
|
|
|
safety |
|||||||||||
systems |
|
|
systems |
|
|
|
systems |
|||||||||||
|
|
|
|
|
|
|
|
|||||||||||
FM-LCISS |
FM-LCFSS |
|
FM-OOFSS |
Fig. 7.2. Expansion of a level 3 event (Note: EFC – escape from core)
The next step in defining the protected area is to locate the NF component which, if failed, may induce the given event. To do this, the tree of events (Fig. 7.3) should be transformed into a tree of locations.
459
Radioactivity escape in escape of permissible level
RE
I
Intermediate |
|
Intermediate |
|
Intermediate |
||
|
event 1 |
|
event 2 |
|
|
event 3 |
IE1 |
I |
|
IE2 |
|
IE3 |
|
|
|
& |
|
|
& |
|
Intermediate |
|
|
Initial |
Initial |
Intermediate |
Initial |
event 4 |
|
event 6 |
event 7 |
event 6 |
event 10 |
|
IE4 |
|
E6 |
E7 |
|
IE6 |
E10 |
& |
|
|
L2 |
|
& |
L4 |
|
Initial |
|
Intermediate |
|
Initial |
Initial |
|
event 3 |
|
event 5 |
|
event 8 |
event 9 |
|
E3 |
|
IE5 |
|
E8 |
E9 |
|
|
|
I |
|
L3 |
L5 |
Initial |
Initial |
|
Initial |
Initial |
|
|
event 1 |
event 2 |
|
event 4 |
event 5 |
|
|
E1 |
ES2 |
E4 |
E5 |
|
L1 |
|
|
|
|
|
|
|
Fig. 7.3. Example of an event tree
Let us assume that the locations L1…L5 match the in itial events E1…E10.
460