Affiliation:
1. Department of Mechanical and Control Engineering , The Cyber University of Korea , 106 Bukchon-ro , Jongno-gu , Seoul 03051 , Republic of Korea
Abstract
Abstract
Nuclear terrorism is studied by the complex algorithm with Analytic Hierarchy Process (AHP) and neural networking method. For the modeling, the modified crisis response is incorporated with the AHP level structure of five detections. It is applied to select the nine ranks with an input layer, hidden layer, and output layer in a neural networking algorithm containing the operator’s thinking. For 60 years, the range of the secure operation is between 0.01972 in the 18th year and 0.02099 in the 41st year, which means the highest range of security is about 1.064 times higher than that of the lowest value in this study. For the graphics, the highest and lowest values are seen as detection #5 and #1 respectively. The five sites differ in a dynamic manner where the #5 site is more than that of #1. This anti-terrorism study could be applied to energy or chemical plants in the future.
Funder
National Research Foundation of Korea
Subject
Safety, Risk, Reliability and Quality,General Materials Science,Nuclear Energy and Engineering,Nuclear and High Energy Physics,Radiation
Reference21 articles.
1. BCSIA (2011). The U.S.-Russia joint threat assessment on nuclear terrorism. Belfer Center for Science and International Affairs (BCSIA), Harvard University, Cambridge, USA.
2. Cipollaro, A. and Lomonaco, G. (2016). Contributing to the nuclear 3S’s via a methodology aiming at enhancing the synergies between nuclear security and safety. Prog. Nucl. Energy 86: 31, https://doi.org/10.1016/j.pnucene.2015.09.013.
3. Coyle, G. (2004). The hierarchy process (AHP). Pearson Education Ltd, London, UK.
4. Drake, P.R. (1998). Using the analytic hierarchy process in engineering education. Int. J. Eng. Educ. 14: 191–196.
5. Durmuşoğlu, Z.D.U. (2018). Assessment of techno-entrepreneurship projects by using analytical hierarchy process (AHP). Technol. Soc. 54: 41–46, https://doi.org/10.1016/j.techsoc.2018.02.001.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献