Next Article in Journal
Barriers, Challenges, and Requirements for ICT Usage among Sub-Assistant Agricultural Officers in Bangladesh: Toward Sustainability in Agriculture
Next Article in Special Issue
Optimizing Human Performance to Enhance Safety: A Case Study in an Automotive Plant
Previous Article in Journal
Effect of Farm Size on Sustainability Dimensions: Case of Durum Wheat in Northern Tunisia
Previous Article in Special Issue
Risk Assessment of Insider Threats Based on IHFACS-BN
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Risk Analysis and Evaluation of Nuclear Security Radiation Events in Spent Fuel Reprocessing Plants

School of Resource Environment and Safety Engineering, University of South China, Hengyang 421001, China
*
Authors to whom correspondence should be addressed.
Sustainability 2023, 15(1), 781; https://doi.org/10.3390/su15010781
Submission received: 11 October 2022 / Revised: 25 December 2022 / Accepted: 30 December 2022 / Published: 31 December 2022
(This article belongs to the Special Issue Human and Organizational Factors in Complex Systems)

Abstract

:
Spent fuel reprocessing is of great significance to the nuclear fuel cycle and the sustainable development of nuclear energy. At the same time, nuclear security radiation incidents in the spent fuel reprocessing plant are also related to national personal and property safety, which play a pivotal role. In this paper, the spent fuel reprocessing plant is divided into four plant areas: the main process area, the three-waste area, the auxiliary equipment area, and the pre-plant area, which are further subdivided into 12 evaluation units. The expert scoring method is used to score and evaluate the possibility of eight basic nuclear accident types in each area, namely radioactive dispersal device, computer nuclear security, destruction of nuclear facilities, transportation nuclear security, internal threat, potential threat, illegal transfer, and theft. According to the professional titles, length of service, education and other qualifications of experts, different weights are assigned to the experts. The scoring results are applied to the Fault Tree Analysis (FTA) of nuclear security events as the probability of basic events, so as to obtain the risk of each basic event. At the same time, the fuzzy comprehensive evaluation method and probability–mathematical statistics method are used to evaluate each evaluation unit to determine the risk of each evaluation unit and the plant area. There results show that the main process area has the highest risk degree, while the pre-plant area has the lowest risk degree, and there is a 1.5-fold relationship. This research provides theoretical and technical support for the safety management and operation of spent fuel reprocessing plants. The analysis results of this paper can be used as a reference for the proportion of nuclear security protection improvements in each plant area, so as to achieve an efficient safety protection effect. The research method in this paper can be also applicable to other similar places by providing as input the corresponding probability of occurrence to obtain the index of its risk degree, so as to reasonably allocate funds and manpower and reduce risks.

1. Introduction

Spent fuel reprocessing is one of the key technologies to realize the sustainable development and recycling of nuclear power. Due to the particularity of nuclear power, the security of spent fuel reprocessing plants has attracted much attention. Once an accident results in the release of radioactive substances, it may seriously affect the environment and human beings, eventually causing huge economic losses and having far-reaching social impacts [1]. The analysis and evaluation of nuclear security radiation events in the spent fuel reprocessing plant can provide a scientific basis for risk prevention and reduction. Therefore, in recent years, researchers have also been actively carrying out research on nuclear security issues [2]. Nuclear security is defined as the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear material, other radioactive substances, or their associated facilities [3]. The definition of nuclear safety is different, which is the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in the protection of workers, the public, and the environment from undue radiation hazards. A key difference between nuclear safety and security is intentionality. Accidents related to nuclear safety are unintentional, whereas nuclear security incidents are clearly intentional and undertaken with a specific motive. So far, researchers have analyzed the basic accident types of nuclear security radiation events, mainly focusing on the following aspects: attention gradually enhances the terrorist attacks of the radioactive dispersal device [4], computer nuclear security breaches called cyber terrorism at nuclear facilities [5], the destruction of nuclear facilities as a result of an external attack [6], transport nuclear security with a risk of radioactive material release [7], the internal threat of one of the most serious problems in the supervision of the physical protection of spent fuel reprocessing plants [8], potential threats [9], illegal transfer of nuclear materials and other radioactive sources [10], and theft [11].
The safety system theory analysis method can be adopted to analyze and evaluate the risk of the spent fuel reprocessing device [12], which has certain feasibility. Firstly, it is necessary to determine the possibility of the occurrence of each basic event. The expert scoring method [13], which has the advantages of simplicity, flexibility, and practicality, has significant advantages in this respect. It is suitable for solving the complex practical problems of fewer data and a lack of information [14], and can achieve the qualitative assessment of the occurrence probability and consequence of the identified event [15]. In terms of the risk analysis of basic events [16], researchers have also carried out relevant research work according to different application environments. FTA is more suitable for reliability analysis and the deductive evaluation of the safety system of complex projects such as chemical and nuclear facilities [17], and it has effective quantitative properties on the probability of accidents [18]. The fuzzy comprehensive evaluation method can quantify some uncertain and difficult to quantify factors, intuitively reflect the membership of evaluation indicators, and more objectively and accurately reflect the real situation [19]. It is often used to make engineering decisions on fuzzy, imprecise, and uncertain existing data and information [20], and is widely used in architecture, management, biotechnology, medical science, environmental science and other fields [21,22,23,24,25]. Weijun Li et al. [26] used the fuzzy comprehensive evaluation method to evaluate the performance of enterprises in health, safety and environment (HSE) management, and took a specific petrochemical company as an example to verify the accuracy and effectiveness of this method. This method and academic thought are also applicable to the spent fuel reprocessing plant, the subject of this study. Therefore, it is verified from the side that when the probability of basic nuclear safety events occurring in the spent fuel reprocessing plant is difficult to obtain, the fuzzy comprehensive evaluation method has significant advantages in the internal risk analysis of the spent fuel reprocessing plant, and it also ensures the accuracy and effectiveness of the results.
Based on eight types of basic nuclear security incidents, this paper uses the expert scoring method to quantify qualitative information in the form of frequency instead of probability. The fault tree model of nuclear security radiation events in the spent fuel reprocessing plant has been established, and the importance of each basic event has been determined. Using the method of fuzzy comprehensive evaluation and probability–mathematical statistics, the risk of each plant in the spent fuel reprocessing plant has been studied, and the relationship between the risk degree gap among them has been obtained. The research method of this paper can be input real numbers or probabilities on different events, which many lead to accidental situations, so it can be used as a guideline (one of them) on how to distribute money and manpower in nuclear installations to mitigate risk.

2. Determine the Basic Event Probability

It is very difficult to obtain the basic event probability value, which can be obtained through a large number of repeated trials, observations, analysis, and inspection; the accuracy will be affected by the environment and application conditions. Especially in the special nuclear environment of the spent fuel reprocessing plant, this paper uses the expert scoring method, combined with expert weights, to obtain the occurrence probability of each basic event by the weighted average method, and uses frequency to replace the probability.

2.1. Construct an Expert Scoring System

In the process of analysis and research in this paper, 30 experts were invited to form an expert group, and the spent fuel pool is divided into four plant areas: the main process area, the three-waste area, the auxiliary equipment area and the pre-plant area. In order to improve the accuracy of the analysis, the evaluation unit is further subdivided, and the main process area is divided into three units: the spent fuel pool, the extraction process plant, and the tail-end conversion plant. The three-waste area is divided into four units: waste liquid purification workshop, curing workshop, discharge workshop and solid waste reconditioning workshop. The auxiliary equipment area is divided into two units: equipment room and warehouse. The pre-plant area is divided into three units, such as central control room, office, and dormitory, with a total of twelve units. At the same time, the possibility of the occurrence of eight types of basic nuclear security incidents is divided into seven levels: very small, small, slightly small, medium, somewhat large, large, and very large. Through the above settings, experts evaluate the possibility of various nuclear security incidents in each evaluation unit.
Due to the deviation in the familiarity of the experts with the spent fuel reprocessing plant and the eight types of nuclear security events, in order to ensure the accuracy of the conclusion, the experts’ qualifications such as professional title, educational background, length of service, and fit degree of work unit are given corresponding scores, and then normalized to form corresponding weights. In order to facilitate the statistical data and presentation, the experts with the same score are divided into the same group, so the 30 invited experts are divided into six groups, and the specific grouping is shown in Table 1 below. Assuming that a total of n experts participate in the scoring, the total score of each expert is C, then the weight X i of each expert is as follows:
X i = C i i = 1 n C i
In the formula, C i represents the total score of the first expert.

2.2. Calculation of Probability of Occurrence of Basic Events

The radioactive dispersal device event is used here as an example. The first group of experts considers that among the 12 evaluation units, there are 3 units with a very small probability of radioactive dispersal device events, 4 units with a small probability, 3 units with a slightly small probability, and 1 unit with a somewhat large probability. In the same way, the evaluation results of the other five groups of experts can be obtained. The number of units with a “very small” probability of the radioactive dispersion device event, which is evaluated by each group of experts, is multiplied by the expert weight of the corresponding group. On such a basis, the probability value of the event can be calculated, the occurring likelihood of which is “very small” in the same way, the probability can be a small, slightly small, medium, somewhat large, large, or very large probability value, and the algorithm’s normalized corresponding results are obtained. According to the principle of probability theory, the probability of occurrence is set as P, then the probability of non-occurrence is 1 P . The probability of non-occurrence of the top event can be obtained by multiplying the probability of non-occurrence of each basic event, and 1 minus the probability that the top event will not occur is the probability that the radioactive dispersal device event will occur. The calculation process of the event probability of the radioactive dispersal device is shown in Table 2. The occurrence probability and normalized results of the eight basic events are shown in Table 3.

3. Construct FTA for Nuclear Security Radiation Events

Assuming that the probability of a nuclear security radiation event in the spent fuel reprocessing plant is 1, the nuclear security radiation event fault tree of the spent fuel reprocessing plant is established through the analysis of the radioactive leakage problem in the whole plant and the response of each part to the accident after nuclear leakage, as shown in Figure 1. The corresponding top, middle, and base event descriptions in Figure 1 are shown in Table 4.
The top event of the fault tree is the nuclear security radiation event of the spent fuel reprocessing plant, and the eight types of events such as the radioactive dispersal device are the basic events. In case of radioactive leakage or emergency failure after the accident, the top event will occur. The radioactive leakage event is caused by the radioactive dispersal device event or the leakage of high-level liquid waste, while the leakage of high-level liquid waste is caused by the leakage of a container or transfer system or excessive feeding. When the nuclear facility destruction event and potential threat event occur at the same time, the container will leak. The simultaneous occurrence of transportation nuclear security incidents and illegal transfer incidents will lead to leakage of the transfer system. The simultaneous occurrence of an internal threat event and a potential threat event will lead to the failure of auxiliary equipment. When it or a computer nuclear security event occurs, it will lead to excessive feeding. Emergency failure is due to the occurrence of computer nuclear security events or potential threats, internal threats or failures of regulatory equipment. The failure of supervision equipment is caused by the failure of detection instruments or support equipment. Illegal transfer or theft will lead to the loss of radioactive sources, which will lead to the failure of detection instruments or support equipment when it occurs at the same time as the destruction of nuclear facilities.

3.1. Structure Function of Fault Tree

The top event is represented by T, then the fault tree structure function T = ( X ) ,   ( X ) is a function of X1, X2, … X8, whilst gate “×” is multiplication or gate “+” is addition.
The structure function of the fault tree is:
T = X1 + X3 × X6 + X4 × X7 + X2 + X5 × X6 + X2 + X6 + X5 + X3 × (X7 + X8) + X3 × (X7 + X8) = X1 + X2 + X5 + X6 + X3 × X7 + X3 × X8 + X4 × X7
From the result of structure function T, the minimum cut set can be obtained: {X1}, {X2}, {X5}, {X6}, {X3,X7}, {X3,X8}, {X4,X7}
The minimum cut set is the set of the minimum basic events that can cause the top events to occur. That is, if one of the status values of X1, X2, X5 and X6 is 1, the φ Χ status value is 1, indicating that the top event occurs; similarly, if the status values of X3 and X7 are 1 at the same time, the φ Χ status value is 1; if the state values of X3 and X8 are 1 at the same time, the φ Χ state value is 1;if the state values of X4 and X7 are 1 at the same time, the φ Χ state value is 1.

3.2. Importance Analysis of the Fault Tree

The importance analysis includes the structural importance, probabilistic importance, and critical importance. Among them, the structural importance degree is qualitative analysis, the probability and critical importance degree is quantitative analysis. The combination of qualitative analysis and quantitative analysis is an effective way to analyze all kinds of basic nuclear security incidents in spent fuel reprocessing plants.
Therefore, the importance analysis of the above fault tree is carried out. See (2)–(4) for the formula [27] of structural importance I φ X i , probability importance I g X i and critical importance I δ X i .
I φ X i = 1 2 n 1 1 2 n 1 φ 1 i ,   X φ 0 i ,   X
I g X i = Q q X i
I δ X i = Q q X i Q q X i
Among them, X i represents eight basic events, and n represents the number of basic events, that is, n = 8. Q represents the probability of occurrence of the top event, and q represents the probability of occurrence of each basic event.
The order of structure importance is as follows:
I φ ( X 1 ) = I φ ( X 2 ) = I φ ( X 5 ) = I φ ( X 6 ) = I φ ( X 3 ) = I φ ( X 7 ) > I φ ( X 4 ) = I φ ( X 8 )
This basic event structure importance ranking result description is as follows: basic event X1 radioactive dispersal device, X2 computer nuclear security, X5 internal threats, X6 potential threats have the greatest impact on the occurrence of nuclear security accidents, followed by X3 destruction to nuclear facilities and X7 illegal transfer incident, X4 transport nuclear security and X8 the incidence of theft have the least impact on the occurrence of nuclear security accidents.
Therefore, it can be concluded that structural importance: radioactive dispersal device = computer nuclear security = internal threat = potential threat > destruction to nuclear facilities = illegal transfer > transportation nuclear security = theft.
The probability importance is: X1 = 0.640, X2 = 0.648, X3 = 0.130, X4 = 0.068, X5 = 0.640, X6 = 0.640, X7 = 0.156, X8 = 0.062.
The order of probability importance is:
Ig(X2) > Ig(X1) = Ig(X5) = Ig(X6) > Ig(X7) > Ig(X3) > Ig(X4) > Ig(X8)
The result of probability importance ranking of the basic event is described as follows: reducing the probability of the basic event X2 computer nuclear security event can quickly reduce the probability of the top event, the least sensitive event is the X8 theft event.
Therefore, it can be concluded that the probability importance is as follows: computer nuclear security > radioactive dispersal device = internal threat = potential threat > illegal transfer > destruction to nuclear facilities > transport nuclear security > theft.
The critical importance is: X1 = 0.176, X2 = 0.193, X3 = 0.036, X4 = 0.028, X5 = 0.176, X6 = 0.176, X7 = 0.046, X8 = 0.018.
The order of critical importance is:
I δ ( X 2 ) > I δ ( X 1 ) = I δ ( X 5 ) = I δ ( X 6 ) > I δ ( X 7 ) > I δ ( X 3 ) > I δ ( X 4 ) > I δ ( X 8 )
The critical importance of this basic event ranking result description is as follows: the rate of change of the probability of occurrence of the basic event X2 computer nuclear security event has the largest change rate to the probability of occurrence of the overhead event, and the event that has the least impact on the rate of change in the probability of occurrence of the overhead event is the X8 theft event.
Therefore, it can be concluded that the critical importance is as follows: computer nuclear security > radioactive dispersal device = internal threat = potential threat > illegal transfer > destruction to nuclear facilities > transport nuclear security > theft.
Of the comprehensive quantitative and qualitative factors, it can be concluded that importance analysis of computer nuclear security is the biggest, which should be paid more attention to in daily operation and management; importance analysis of theft is minimal, but it may happen.

4. Construct a Fuzzy Comprehensive Evaluation System

The fuzzy comprehensive evaluation method includes five steps: factor set, weight set, evaluation set, single factor fuzzy evaluation and fuzzy comprehensive evaluation [26].

4.1. Construct Factor Set

The factor set refers to the set of elements that affect the evaluation in the decision-making system. The factor set U is composed of eight risk factors affecting nuclear security events in the spent fuel reprocessing plant, including the radioactive dispersal device, computer nuclear security, destruction of nuclear facilities, transportation nuclear security, internal threat, potential threat, illegal transfer, and theft.

4.2. Construct Weight Set

Since the influence degree of each factor in the factor set on the nuclear security system is different, the weight coefficient should be considered. It reflects the level of importance of each factor. The weight coefficient of each factor is obtained by the above method of the frequency instead of the probability of the expert scoring method, and the specific weight value is shown in Table 5.
Taking the factor of the radioactive dispersal device as an example, it represents that the subordinate degree of this factor to “important” is 0.12.

4.3. Construct Evaluation Set

The four plant areas of the evaluation object spent fuel reprocessing plant are subdivided into 12 areas, which are the evaluation units for comprehensive evaluation. In order to evaluate its importance in nuclear security accidents, senior engineers, researchers, professors, and other experts from relevant nuclear industry groups, research institutes, and universities are invited to form an expert group to score and evaluate the possibility of eight types of basic nuclear security events in each region. The possibility is divided into seven levels, which are: very small, small, slightly small, medium, somewhat large, large and very large. V= {small (V1), small (V2), small (V3), medium (V4), larger (V5), large (V6), large (V7)}.
The probability distribution of a radioactive dispersal device event in a spent fuel pool area is taken as an example. Experts believe that 67.6% of the probability of the event is “very small”, 30.3% is “small”, and 2.1% is “slightly small”.
After analysis and calculation, the probability distribution of eight types of basic events in each evaluation unit is obtained. See Figure 2, Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9, Figure 10, Figure 11, Figure 12 and Figure 13 for details. The abscissa in the figure is the first two digits of the first letter of eight basic events.
Taking the spent fuel pool as an example, this evaluation unit has a 67.6% probability of occurrence of radioactive dispenser events with a “very small” probability, a 46.1% probability of occurrence of computer nuclear security events with a “slightly small” probability, a 54.1% probability of occurrence of nuclear facility damage events with a “medium” probability, and a 35.2% probability of occurrence of transportation nuclear security events with a “medium” probability, there is also a 54.1% probability that internal threats will occur with a “medium” probability and a 64.5% probability that potential threats, illegal transfers, and theft will occur with a “very small” probability.

4.4. Single Factor Fuzzy Evaluation

In the research of this paper, there are eight factors affecting nuclear security accidents, and one factor is evaluated separately to determine the membership degree of the evaluation object to the elements of the evaluation set.
Suppose the i element in the factor set U is judged, and the membership degree of the j element in the evaluation set V is r i j , then the fuzzy set can be obtained according to the evaluation result of the i factor:
R i = { r i 1 , r i 2 , , r i n }
The membership degree rows of each single-factor evaluation set are formed into a matrix, which is called the evaluation matrix:
R = r 11 r 1 n r m 1 r mn
In this paper, the spent fuel pool unit in the main process area is taken as an example for calculation. According to the above, the evaluation matrix of the spent fuel pool unit in the main process area is:
R 1 = 0.676   0.303   0.021   0   0   0   0   0.373   0.166   0.461   0   0   0   0   0   0.188   0.271   0.541   0   0   0   0.272   0.052   0.209   0.352   0.115   0   0   0.293   0.166   0   0.541   0   0   0   0.645   0.167   0   0.188   0   0   0 0.645   0.167   0   0.188   0   0   0 0.645   0.167   0.188   0   0   0   0

4.5. Fuzzy Comprehensive Evaluation

Fuzzy comprehensive evaluation refers to the comprehensive consideration of the impact of eight basic events on nuclear security radiation events in each evaluation unit, and the final evaluation results are obtained. The formula of the fuzzy comprehensive evaluation model is as follows:
B = AR
B represents the result of the evaluation set, A represents the weight set, and R represents the evaluation matrix.
The evaluation set results of each evaluation unit can be obtained as follows:
spent fuel pool B1 = [0.130 0.130 0.130 0.130 0.115 0 0]
extraction process plant B2 = [0.130 0.130 0.130 0.130 0.120 0.115 0]
tail-end conversion plant B3 = [0.130 0.120 0.130 0.130 0.130 0.130 0]
waste liquid Purification Workshop B4 = [0.130 0.130 0.130 0.120 0.120 0.120 0]
solidification workshop B5 = [0.130 0.130 0.130 0.052 0.115 0.052 0]
discharge workshop B6 = [0.130 0.130 0.130 0.120 0 0.120 0]
solid waste preparation workshop B7 = [0.130 0.130 0.130 0.130 0.115 0 0]
equipment room B8 = [0.130 0.130 0.130 0.130 0.130 0 0]
warehouse B9 = [0.130 0.130 0.130 0.130 0.130 0 0]
centralized control room B10 = [0.130 0.130 0.130 0.120 0 0 0]
office B11 = [0.130 0.130 0.130 0.130 0 0 0]
dormitory B12 = [0.130 0 0.130 0 0 0 0]

5. Probability and Mathematical Statistical Evaluation

The method of probability and mathematical statistics is used to process the data after fuzzy comprehensive evaluation. Taking the spent fuel pool unit as an example, 13% of the experts think that the risk is very small, 13% think the risk is small, 13% think that the risk is slightly small, 13% think the risk is medium, and 11.5% think the risk is somewhat large. According to the knowledge of probability theory, the following can be obtained:
1 B 1 = [ 0.870   0.870   0.870   0.870   0.885   1   1 ]
Then, the probability P of no danger for the spent fuel pool unit is:
0.870 × 0.870 × 0.870 × 0.870 × 0.885 × 1 × 1 = 0.507
Therefore, the hazard probability of the spent fuel pool unit is: 1 − P = 1 − 0.507 = 0.493.
This method is used to calculate the risk of 12 evaluation units, and the results are shown in Table 6 below.
In order to rationally allocate the protective forces in nuclear facilities, the importance of 12 evaluation units is compared and analyzed. As can be seen from the above evaluation results, there are significant differences in the hazards of the twelve evaluation units in the spent fuel reprocessing plants. Among them, the tail-end conversion plant is the most dangerous, which has a significant impact on the overall safety of the spent fuel reprocessing plant. Therefore, more attention should be paid to the tail-end conversion plant in the daily safety inspection and emergency drill of the spent fuel reprocessing plant, and emergency plans for various accidents should be made to prevent accidents. The dormitory area is the least dangerous, but this does not mean that the accident will not occur in the area, so it is also necessary to put in a certain amount of manpower and material resources to prevent tragedy from happening.
According to the above data, it is possible to obtain the hazard probability values of the four plant areas by adding and averaging them, and the specific results are shown in Table 7 below.
As can be seen from the results in Table 7, the order of importance of the four plants is: main process area > three-waste area > auxiliary equipment area > pre-plant area. The results show that in the spent fuel reprocessing plant, the main process area has the highest risk. Therefore, more attention should be paid to the establishment and implementation of various preventive measures and systems. The pre-plant area has the lowest risk, but there is still the possibility of risk, which requires to be paid more attention to. At the same time, the risk of the main process area is about 1.5 times that of the pre-plant area, which also indicates that it is a more appropriate arrangement to invest 1.5 times the safety protection force of the pre-plant area in the main process area.

6. Comparative Analysis of Results

According to the risk assessment of each evaluation unit by experts, the index method is used to analyze them. The index method is to sum up and average the probability of eight types of nuclear security incidents in each plant area that are not less than “medium” by experts, and compare the results with those obtained by the above fuzzy comprehensive evaluation method, probability mathematical statistics and other methods. The risk calculation results of the assessment unit calculated according to the index method are shown in Table 8, and the risk level calculation results of each plant area are shown in Table 9.
According to the above data, the extraction process plant has the highest risk, and the main process area in the four plants has the highest risk, which is the same as the conclusion obtained through fuzzy comprehensive evaluation and probability mathematical statistics. However, there is a large discrepancy between the risk degree of the three waste areas and the results obtained by the main methods used in this paper. This is mainly because the index method ignores the influence of low probability of occurrence in the calculations. Therefore, it rationales the applicability of the fuzzy comprehensive evaluation and probability mathematical statistics methods.

7. Conclusions

(1)
The probability of occurrence of basic events is difficult to obtain and the accuracy is low, the expert scoring method can be adopted to avoid the error by setting the weight corresponding to the qualifications of experts. The method of frequency instead of probability can obtain the probability of basic events.
(2)
The fuzzy comprehensive evaluation method and the combination of probabilistic-mathematical statistics are used to obtain the hazards of each evaluation unit and plant area, which provides theoretical support for nuclear safety operations and emergency prevention of spent fuel reprocessing plants.
(3)
Through the fault tree and risk analysis, it is concluded that the computer nuclear security incident is the most dangerous of the eight types of nuclear security basic events, so it is necessary to take more precautions against the occurrence of such accidents in daily operation. Through the fuzzy comprehensive evaluation and the calculation method of probabilistic-mathematical statistics, it is concluded that the tail-end transformation plant in the main process area has the highest danger, and the dormitory unit in the pre-plant area of the factory has the lowest danger. The method of adding and taking the average value shows that the main process area is the most dangerous, the pre-plant area is the least dangerous, and there is a relationship of about 1.5 times, so a considerable proportion of manpower and material resources should be invested in the work to achieve the most economical and safe preventive effect.
(4)
In this paper, the expert scoring method is used to obtain the probability of eight basic events, which will make the subjective factors stronger. In the process of establishing the model, the fuzzy comprehensive evaluation method is inevitably affected by subjective factors in terms of index selection, evaluation criteria establishment and weight determination, which has certain limitations. Therefore, our future work will mainly focus on how to correctly handle the impact of subjective and objective factors on the results, and reduce the impact of subjectivity as much as possible.

Author Contributions

Conceptualized the research and performed the validation, C.W. and S.X.; administered the project, developed the methodology, curated the data, conducted the formal analysis, produced visualizations, and wrote and prepared the original draft manuscript, C.W., S.Z. and Z.H.; reviewed and edited the manuscript, F.Z., Z.Q. and H.D.; acquired funding, S.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (11905102).

Data Availability Statement

The data are not publicly available due to further research.

Acknowledgments

The authors are grateful to Houdong Liu and Jiahua Chen for their guidance on the research. Thank you very much for the editorial services provided by sustainability. We also thank all the interviewees in the field visits.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wang, F.; Wang, J.; Wang, J.; Li, Y.; Hu, L.; Wu, Y. Risk monitor risk angel for risk-informed applications in nuclear power plants. Ann. Nucl. Energy 2016, 91, 142–147. [Google Scholar] [CrossRef]
  2. Tromm, W. Nuclear energy research in Germany 2010. Research centers. Atw. Int. Z. Kernenerg. 2011, 56, 412–418. [Google Scholar]
  3. Ibrahim, M.; Hamdan, S.N.; Haris, M.F.; Ismail, S.; Sulaiman, M.S.; Aris, S.M.N.; Hasan, M.H.B.; Aslan, M.D.A.; Ghani, N.F.A.; Hamid, A.H.A.; et al. Big data analytics nuclear security framework. IOP Conf. Ser. Mater. Sci. Eng. 2021, 1106, 012026. [Google Scholar] [CrossRef]
  4. Majewski, M.; Nestler, K.; Veit, D.A.; Diekmeyer, B.; Waldeck, S.; Port, M.; Becker, B.V. Detection of embedded low-level radioactive shrapnel after the explosion of a radiological dispersal device in radiological emergency imaging. Health Phys. 2020, 119, 95–100. [Google Scholar] [CrossRef] [PubMed]
  5. Cho, H.S.; Woo, T.H. Cyber security in nuclear industry—Analytic study from the terror incident in nuclear power plants (NPPs). Ann. Nucl. Energy 2017, 99, 47–53. [Google Scholar] [CrossRef]
  6. Moo, J.H.; Chirayath, S.S.; Cho, S.G. Physical protection system vulnerability assessment of a small nuclear research reactor due to TNT-shaped charge impact on its reinforced concrete wall. Nucl. Eng. Technol. 2022, 54, 2135–2146. [Google Scholar] [CrossRef]
  7. Tao, L.; Wang, J.; Long, P.; Wang, D.; Wang, F.; Zhou, B.; Chen, J. Probabilistic safety assessment method for spent nuclear fuel road transportation. Ann. Nucl. Energy 2020, 137, 107043. [Google Scholar] [CrossRef]
  8. Ni, S.; Zou, S.; Chen, J. Evolutionary Game Model of Internal Threats to Nuclear Security in Spent Fuel Reprocessing Plants Based on RDEU Theory. Sustainability 2022, 14, 2163. [Google Scholar] [CrossRef]
  9. Solodov, A.; Williams, A.; Al Hanaei, S.; Goddard, B. Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities. Secur. J. 2018, 31, 305–324. [Google Scholar] [CrossRef]
  10. Al Hamrashdi, H.; Monk, S.D.; Cheneler, D. Passive gamma-ray and neutron imaging systems for national security and nuclear non-proliferation in controlled and uncontrolled detection areas: Review of past and current status. Sensors 2019, 19, 2638. [Google Scholar] [CrossRef] [Green Version]
  11. Busch, N. Risks of Nuclear Terror: Vulnerabilities to Theft and Sabotage at Nuclear Weapons Facilities. Contemp. Secur. Policy 2002, 23, 19–60. [Google Scholar] [CrossRef]
  12. Li, R.R. Application of Risk Assessment Grading Method in Accident Analysis of Nuclear Fuel Reprocessing Plant; University of South China: Hengyang, China, 2018. [Google Scholar]
  13. Sun, M.; Zheng, W.X.; Duan, X.B. Research on Deep Coal Seam Mining Floor Starta Water Bursting Influenced Factors Based on Analytic Hierachy Process. Appl. Mech. Mater. 2014, 608–609, 737–741. [Google Scholar] [CrossRef]
  14. Jin, H.; Hu, Z.; Li, K.; Chu, M.; Zou, G.; Yu, G.; Zhang, J. Study on How Expert and Novice Pilots Can Distribute Their Visual Attention to Improve Flight Performance. IEEE Access 2021, 9, 44757–44769. [Google Scholar] [CrossRef]
  15. Gavrilyuk, V.I.; Drapey, S.S.; Kaydyk, B.V.; Kirischuck, V.I.; Parkhomenko, V.V.; Romanova, O.P.; Samsonenko, A.V.; Katunin, E.I.; Boyko, A.V. Nuclear security risks in Ukraine< TITLE lang=""> Piɜiki y cϕepi ϕiɜiчнoї yaдepнoї δeɜпeki Уkpaїнi. Nucl. Phys. At. Energy 2021, 22, 409–414. [Google Scholar]
  16. Wang, J.; Lin, M. Seismic probabilistic risk analysis and application in a nuclear power plant. Nucl. Technol. 2018, 203, 221–231. [Google Scholar] [CrossRef]
  17. Fahmy, R.A.; Gomaa, R.I. Dynamic fault tree analysis of auxiliary feedwater system in a pressurized water reactor. Kerntechnik 2021, 86, 164–172. [Google Scholar] [CrossRef]
  18. Hermansyah, H.; Kumaraningrum, A.R.; Purba, J.H.; Yohda, M. Safety analysis technique for system with limited data: Case study of the multipurpose research reactor in Indonesia. Energies 2020, 13, 1975. [Google Scholar] [CrossRef] [Green Version]
  19. Hu, Y.; Wu, L.; Pan, X.; Wang, Z.; Xu, X. Comprehensive evaluation of cloud manufacturing service based on fuzzy theory. Int. J. Fuzzy Syst. 2021, 23, 1755–1764. [Google Scholar] [CrossRef]
  20. Purba, J.H.; Tjahyani, D.T.S.; Widodo, S.; Ekariansyah, A.S. Fuzzy probability based event tree analysis for calculating core damage frequency in nuclear power plant probabilistic safety assessment. Prog. Nucl. Energy 2020, 125, 103376. [Google Scholar] [CrossRef]
  21. Aghimien, D.O.; Aigbavboa, C.; Edwards, D.J.; Mahamadu, A.M.; Olomolaiye, P.; Nash, H.; Onyia, M. A fuzzy synthetic evaluation of the challenges of smart city development in developing countries. Smart Sustain. Built Environ. 2020, 11, 405–421. [Google Scholar] [CrossRef]
  22. Oppong, G.D.; Chan, A.P.; Ameyaw, E.E.; Frimpong, S.; Dansoh, A. Fuzzy evaluation of the factors contributing to the success of external stakeholder management in construction. J. Constr. Eng. Manag. 2021, 147, 04021142. [Google Scholar] [CrossRef]
  23. Yucesan, M.; Gul, M. Hospital service quality evaluation: An integrated model based on Pythagorean fuzzy AHP and fuzzy TOPSIS. Soft Comput. 2020, 24, 3237–3255. [Google Scholar] [CrossRef]
  24. Vivek, K.; Subbarao, K.V.; Routray, W.; Kamini, N.R.; Dash, K.K. Application of fuzzy logic in sensory evaluation of food products: A comprehensive study. Food Bioprocess Technol. 2020, 13, 1–29. [Google Scholar] [CrossRef]
  25. Robati, M.; Rezaei, F. Evaluation and ranking of urban sustainability based on sustainability assessment by fuzzy evaluation model. Int. J. Environ. Sci. Technol. 2022, 19, 625–650. [Google Scholar] [CrossRef]
  26. Li, W.; Liang, W.; Zhang, L.; Tang, Q. Performance assessment system of health, safety and environment based on experts’ weights and fuzzy comprehensive evaluation. J. Loss Prev. Process Ind. 2015, 35, 95–103. [Google Scholar] [CrossRef]
  27. Xi, J.; Zhao, Y.; Ding, T.; Tian, J.; Li, L. Analysis Model of Risk Factors of Urban Bus Operation Based on FTA-CLR. Adv. Civ. Eng. 2021, 2021, 6657786. [Google Scholar] [CrossRef]
Figure 1. Nuclear security fault tree for spent fuel reprocessing plant.
Figure 1. Nuclear security fault tree for spent fuel reprocessing plant.
Sustainability 15 00781 g001
Figure 2. Spent fuel pool area evaluation result.
Figure 2. Spent fuel pool area evaluation result.
Sustainability 15 00781 g002
Figure 3. Extraction process plan area evaluation result.
Figure 3. Extraction process plan area evaluation result.
Sustainability 15 00781 g003
Figure 4. Tail-end conversion plant area evaluation result.
Figure 4. Tail-end conversion plant area evaluation result.
Sustainability 15 00781 g004
Figure 5. Waste liquid purification workshop area evaluation result.
Figure 5. Waste liquid purification workshop area evaluation result.
Sustainability 15 00781 g005
Figure 6. Solidification workshop area evaluation result.
Figure 6. Solidification workshop area evaluation result.
Sustainability 15 00781 g006
Figure 7. Discharge workshop area evaluation result.
Figure 7. Discharge workshop area evaluation result.
Sustainability 15 00781 g007
Figure 8. Solid waste preparation workshop area evaluation result.
Figure 8. Solid waste preparation workshop area evaluation result.
Sustainability 15 00781 g008
Figure 9. Equipment room area evaluation result.
Figure 9. Equipment room area evaluation result.
Sustainability 15 00781 g009
Figure 10. Warehouse workshop area evaluation result.
Figure 10. Warehouse workshop area evaluation result.
Sustainability 15 00781 g010
Figure 11. Centralized control room.
Figure 11. Centralized control room.
Sustainability 15 00781 g011
Figure 12. Office area evaluation result.
Figure 12. Office area evaluation result.
Sustainability 15 00781 g012
Figure 13. Dormitory area evaluation result.
Figure 13. Dormitory area evaluation result.
Sustainability 15 00781 g013
Table 1. Expert weight allocation table.
Table 1. Expert weight allocation table.
Serial Number/
Group
ExpertsNumber of PeopleQualificationLength of ServiceRecord of Formal SchoolingTotalThe Weight
1Safety Engineer95 (Senior Engineer)5 (30 to 40 years)5 (PhD students)150.115
2Safety Engineer85 (Senior Engineer)4 (20 to 30 years)4 (Master’s students)130.352
3Strategic Planner64 (Researcher)3 (10 to 20 years)5 (PhD students)120.272
4Professor44 (Associate Professor)2 (5 to 10 years)5 (PhD students)110.188
5Safety Engineer23 (Assistant Engineer)2 (5 to 10 years)5 (PhD students)100.021
6Safety Engineer13 (Assistant Engineer)1 (0 to 5 years)4 (Master’s students)80.052
Table 2. Calculation table of probability of occurrence of basic events.
Table 2. Calculation table of probability of occurrence of basic events.
The Serial NumberThe WeightVery SmallSmallSlightly SmallMediumSomewhat LargeLargeVery Large
10.1153410130
20.3527004100
30.2727220100
40.1880174000
50.0215160000
60.0526101130
A total of 5.1301.5371.1012.2120.0520.5010
The normalized 0.4550.1360.0980.1960.0700.0450
1 − P 0.5450.8640.9020.8040.9300.9551
Table 3. List of basic nuclear security incidents for spent fuel reprocessing plants.
Table 3. List of basic nuclear security incidents for spent fuel reprocessing plants.
Event NumberThe Name of the EventProbability of OccurrenceNormalized Results
X1Radioactive dispersal device0.6970.12
X2Computer nuclear security0.7060.13
X3Destruction of nuclear facilities0.6900.12
X4Transportation nuclear security0.7070.13
X5Internal threat0.7020.12
X6Potential threat0.6870.12
X7Illegal transfer0.7210.13
X8Theft0.7090.13
Table 4. Nuclear security radiation event letter symbols and corresponding events.
Table 4. Nuclear security radiation event letter symbols and corresponding events.
NumberIncidentNumberIncident
TNuclear security radiation incidentM10Support equipment failure
M1Radioactive release eventM11Lose
M2Emergency failureX1Radioactive dispersal device
M3Leakage of high level of waste liquidX2Computer nuclear security
M4Container leakX3Destruction of nuclear facilities
M5Transit system leakageX4Transportation nuclear security
M6OverfeedingX5Internal threat
M7Auxiliary device failureX6Potential threat
M8Monitoring equipment failureX7Illegal transfer
M9Test instrument failureX8Theft
Table 5. Weight values of each factor.
Table 5. Weight values of each factor.
FactorsThe Weight
U1Radioactive dispersal device0.12
U2Computer nuclear security0.13
U3Destruction nuclear facilities0.12
U4Transportation nuclear security0.13
U5Internal threat0.12
U6Potential threat0.12
U7Illegal transfer0.13
U8Theft0.13
The weight set A = {0.12 0.13 0.12 0.13 0.12 0.12 0.13 0.13}.
Table 6. Evaluation of unit hazard calculation results.
Table 6. Evaluation of unit hazard calculation results.
The Evaluation UnitSpent Fuel PoolExtraction Process PlantTail-End Conversion PlantWaste Liquid Purification WorkshopSolidification WorkshopDischarge Workshop
The calculation results0.4930.5540.5610.5510.4760.490
Normalized results0.0860.0970.0980.0960.0830.086
The Evaluation UnitSolid Waste Preparation WorkshopEquipment RoomWarehouseCentralized Control RoomOfficeDormitory
The calculation results0.4930.5020.5020.4210.4270.243
Normalized results0.0860.0880.0880.0740.0750.043
Table 7. Calculation results of hazardous levels in the plant area.
Table 7. Calculation results of hazardous levels in the plant area.
The FactoryThe Main Process AreaThree-Waste AreaAuxiliary Equipment AreaPre-Plant Area
The calculation results0.5360.5030.5020.364
Normalized results0.2810.2640.2640.191
Table 8. Risk calculation results of evaluation unit (index method).
Table 8. Risk calculation results of evaluation unit (index method).
The Evaluation UnitSpent Fuel PoolExtraction Process PlantTail-End Conversion PlantWaste Liquid Purification WorkshopSolidification WorkshopDischarge Workshop
The calculation results0.2400.2720.7360.7070.0340.059
Normalized results0.0830.0950.2560.2450.0120.020
The Evaluation UnitSolid Waste Preparation WorkshopEquipment RoomWarehouseCentralized Control RoomOfficeDormitory
The calculation results0.2220.0910.2750.1560.0880
Normalized results0.0770.0320.0950.0540.0310
Table 9. Calculation results of hazardous levels in the plant area (index method).
Table 9. Calculation results of hazardous levels in the plant area (index method).
The FactoryThe Main Process AreaThree-Waste AreaAuxiliary Equipment AreaPre-Plant Area
The calculation results0.4160.1170.1830.081
Normalized results0.5220.1460.2300.102
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wei, C.; Xu, S.; Zou, S.; Zhao, F.; Qin, Z.; Dong, H.; Hou, Z. Risk Analysis and Evaluation of Nuclear Security Radiation Events in Spent Fuel Reprocessing Plants. Sustainability 2023, 15, 781. https://doi.org/10.3390/su15010781

AMA Style

Wei C, Xu S, Zou S, Zhao F, Qin Z, Dong H, Hou Z. Risk Analysis and Evaluation of Nuclear Security Radiation Events in Spent Fuel Reprocessing Plants. Sustainability. 2023; 15(1):781. https://doi.org/10.3390/su15010781

Chicago/Turabian Style

Wei, Cuiyue, Shoulong Xu, Shuliang Zou, Fang Zhao, Zhiwei Qin, Hanfeng Dong, and Zhixiong Hou. 2023. "Risk Analysis and Evaluation of Nuclear Security Radiation Events in Spent Fuel Reprocessing Plants" Sustainability 15, no. 1: 781. https://doi.org/10.3390/su15010781

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop