Auto sync: 2026-03-07 14:19:48 (8 files changed)
M 2-state-of-the-art/v2.tex M 3-research-approach/v3.tex M main.aux M main.fdb_latexmk M main.log M main.pdf M main.synctex.gz M main.toc
This commit is contained in:
parent
f1b43da96f
commit
b05d807e02
@ -15,7 +15,7 @@ Emergency Operating Procedures (EOPs) for design-basis accidents, Severe
|
|||||||
Accident Management Guidelines (SAMGs) for beyond-design-basis events, and
|
Accident Management Guidelines (SAMGs) for beyond-design-basis events, and
|
||||||
Extensive Damage Mitigation Guidelines (EDMGs) for catastrophic damage
|
Extensive Damage Mitigation Guidelines (EDMGs) for catastrophic damage
|
||||||
scenarios. These procedures must comply with 10 CFR 50.34(b)(6)(ii) and are
|
scenarios. These procedures must comply with 10 CFR 50.34(b)(6)(ii) and are
|
||||||
developed using guidance from NUREG-0900~\cite{NUREG-0899, 10CFR50.34}, but their
|
developed using guidance from NUREG-0899~\cite{NUREG-0899, 10CFR50.34}, but their
|
||||||
development relies fundamentally on expert judgment and simulator validation
|
development relies fundamentally on expert judgment and simulator validation
|
||||||
rather than formal verification. Procedures undergo technical evaluation,
|
rather than formal verification. Procedures undergo technical evaluation,
|
||||||
simulator validation testing, and biennial review as part of operator
|
simulator validation testing, and biennial review as part of operator
|
||||||
|
|||||||
@ -452,11 +452,11 @@ reachable within time horizon $T$:
|
|||||||
\text{Reach}(\mathcal{X}_{entry}, f_i, [0,T]) \cap \mathcal{X}_{exit} \neq \emptyset
|
\text{Reach}(\mathcal{X}_{entry}, f_i, [0,T]) \cap \mathcal{X}_{exit} \neq \emptyset
|
||||||
\]
|
\]
|
||||||
|
|
||||||
Because the discrete controller defines clear boundaries in continuous state
|
\textcolor{blue}{Because the discrete controller defines clear boundaries in continuous state
|
||||||
space, the verification problem for each transitory mode is well-posed. We know
|
space, the verification problem for each transitory mode is well-posed. We know
|
||||||
the possible initial conditions, we know the target conditions, and we know the
|
the possible initial conditions, we know the target conditions, and we know the
|
||||||
safety envelope. The verification task is to confirm that the candidate
|
safety envelope. The verification task is to confirm that the candidate
|
||||||
continuous controller achieves the objective from all possible starting points.
|
continuous controller achieves the objective from all possible starting points.}
|
||||||
|
|
||||||
Several tools exist for computing reachable sets of hybrid
|
Several tools exist for computing reachable sets of hybrid
|
||||||
systems, including CORA, Flow*, SpaceEx, and JuliaReach. The choice of tool
|
systems, including CORA, Flow*, SpaceEx, and JuliaReach. The choice of tool
|
||||||
@ -478,20 +478,18 @@ appropriate to the fidelity of the reactor models available.
|
|||||||
|
|
||||||
\subsubsection{Stabilizing Modes}
|
\subsubsection{Stabilizing Modes}
|
||||||
|
|
||||||
\textcolor{blue}{Stabilizing modes are continuous controllers with an objective
|
Stabilizing modes are continuous controllers with an objective of maintaining a
|
||||||
of maintaining a particular discrete state indefinitely. Rather than driving
|
particular discrete state indefinitely. Rather than driving the system toward an
|
||||||
the system toward an exit condition, they keep the system within a safe
|
exit condition, they keep the system within a safe operating region. Examples
|
||||||
operating region. Examples include steady-state power operation, hot standby,
|
include steady-state power operation, hot standby, and load-following at
|
||||||
and load-following at constant power level.}
|
constant power level. Reachability analysis for stabilizing modes may not be a
|
||||||
|
suitable approach to validation. Instead, we plan to use barrier certificates.
|
||||||
|
Barrier certificates analyze the dynamics of the system to determine whether
|
||||||
|
flux across a given boundary exists. They evaluate whether any trajectory leaves
|
||||||
|
a given boundary. This definition is exactly what defines the validity of a
|
||||||
|
stabilizing continuous control mode.
|
||||||
|
|
||||||
Reachability analysis for stabilizing modes may not be the most prudent approach
|
A barrier certificate (or control barrier function) is a
|
||||||
to validation. Instead, barrier certificates must be used. Barrier certificates
|
|
||||||
analyze the dynamics of the system to determine whether flux across a given
|
|
||||||
boundary exists. They evaluate whether any trajectory leaves a given boundary.
|
|
||||||
This definition is exactly what defines the validity of a stabilizing continuous
|
|
||||||
control mode.
|
|
||||||
|
|
||||||
\textcolor{blue}{A barrier certificate (or control barrier function) is a
|
|
||||||
scalar function $B: \mathcal{X} \rightarrow \mathbb{R}$ that certifies forward
|
scalar function $B: \mathcal{X} \rightarrow \mathbb{R}$ that certifies forward
|
||||||
invariance of a safe set. The idea is analogous to Lyapunov functions for
|
invariance of a safe set. The idea is analogous to Lyapunov functions for
|
||||||
stability: rather than computing trajectories explicitly, we find a certificate
|
stability: rather than computing trajectories explicitly, we find a certificate
|
||||||
@ -504,7 +502,7 @@ barrier certificate condition requires:
|
|||||||
This condition states that on the boundary of the safe set (where $B(x) = 0$),
|
This condition states that on the boundary of the safe set (where $B(x) = 0$),
|
||||||
the time derivative of $B$ is non-negative. Geometrically, this means the
|
the time derivative of $B$ is non-negative. Geometrically, this means the
|
||||||
vector field points inward or tangent to the boundary, never outward. If this
|
vector field points inward or tangent to the boundary, never outward. If this
|
||||||
condition holds, no trajectory starting inside $\mathcal{C}$ can ever leave.}
|
condition holds, no trajectory starting inside $\mathcal{C}$ can ever leave.
|
||||||
|
|
||||||
Because the design of the discrete controller defines careful boundaries in
|
Because the design of the discrete controller defines careful boundaries in
|
||||||
continuous state space, the barrier is known prior to designing the continuous
|
continuous state space, the barrier is known prior to designing the continuous
|
||||||
@ -513,13 +511,17 @@ complication in validating stabilizing continuous control modes. The discrete
|
|||||||
specifications tell us what region must be invariant; the barrier certificate
|
specifications tell us what region must be invariant; the barrier certificate
|
||||||
confirms that the candidate controller achieves this invariance.
|
confirms that the candidate controller achieves this invariance.
|
||||||
|
|
||||||
\textcolor{blue}{Finding barrier certificates can be formulated as a
|
Finding barrier certificates can be formulated as a
|
||||||
sum-of-squares (SOS) optimization problem for polynomial systems, or solved
|
sum-of-squares (SOS) optimization problem for polynomial systems, or solved
|
||||||
using satisfiability modulo theories (SMT) solvers for broader classes of
|
using satisfiability modulo theories (SMT) solvers for broader classes of
|
||||||
dynamics. The key advantage is that the verification is independent of how
|
dynamics. The key advantage is that the verification is independent of how
|
||||||
the controller was designed. Standard control techniques can be used to
|
the controller was designed. Standard control techniques can be used to
|
||||||
build continuous controllers, and barrier certificates provide a separate
|
build continuous controllers, and barrier certificates provide a separate
|
||||||
check that the result satisfies the required invariants.}
|
check that the result satisfies the required invariants. This also allows for
|
||||||
|
the checking of control modes with different models than they are designed for.
|
||||||
|
For example, a lower fidelity model can be used for controller design, but a
|
||||||
|
higher fidelity model can be used for the actual validation of that stabilizing
|
||||||
|
controller.
|
||||||
|
|
||||||
%%% NOTES (Section 4.2):
|
%%% NOTES (Section 4.2):
|
||||||
% - Clarify relationship between barrier certificates and Lyapunov stability
|
% - Clarify relationship between barrier certificates and Lyapunov stability
|
||||||
@ -533,17 +535,12 @@ check that the result satisfies the required invariants.}
|
|||||||
|
|
||||||
\subsubsection{Expulsory Modes}
|
\subsubsection{Expulsory Modes}
|
||||||
|
|
||||||
The validation of transitory and stabilizing modes hinges on an assumption of
|
Expulsory modes are continuous controllers responsible for
|
||||||
correct plant models. In the case of a mechanical failure, the model will almost
|
|
||||||
certainly be invalidated. For this reason, we must also build safe shutdown
|
|
||||||
modes, since a human will not be in the loop to handle failures.
|
|
||||||
|
|
||||||
\textcolor{blue}{Expulsory modes are continuous controllers responsible for
|
|
||||||
ensuring safety when failures occur. They are designed for robustness rather
|
ensuring safety when failures occur. They are designed for robustness rather
|
||||||
than optimality. The control objective is to drive the plant to a safe shutdown
|
than optimality. The control objective is to drive the plant to a safe shutdown
|
||||||
state from potentially anywhere in the state space, under degraded or uncertain
|
state from potentially anywhere in the state space, under degraded or uncertain
|
||||||
dynamics. Examples include emergency core cooling, reactor SCRAM sequences, and
|
dynamics. Examples include emergency core cooling, reactor SCRAM sequences, and
|
||||||
controlled depressurization procedures.}
|
controlled depressurization procedures.
|
||||||
|
|
||||||
We can detect that physical failures exist because our physical controllers have
|
We can detect that physical failures exist because our physical controllers have
|
||||||
been previously proven correct by reachability and barrier certificates. We know
|
been previously proven correct by reachability and barrier certificates. We know
|
||||||
@ -554,7 +551,7 @@ violated by the continuous physical controller. This is a direct consequence of
|
|||||||
having verified the nominal continuous control modes: unexpected behavior
|
having verified the nominal continuous control modes: unexpected behavior
|
||||||
implies off-nominal conditions.
|
implies off-nominal conditions.
|
||||||
|
|
||||||
\textcolor{blue}{The mathematical formulation for expulsory mode verification
|
The mathematical formulation for expulsory mode verification
|
||||||
differs from transitory modes in two key ways. First, the entry conditions may
|
differs from transitory modes in two key ways. First, the entry conditions may
|
||||||
be the entire state space (or a large, conservatively bounded region) rather
|
be the entire state space (or a large, conservatively bounded region) rather
|
||||||
than a well-defined entry set. The failure may occur at any point during
|
than a well-defined entry set. The failure may occur at any point during
|
||||||
@ -565,7 +562,7 @@ failure modes:
|
|||||||
\]
|
\]
|
||||||
where $\Theta_{failure}$ captures the range of possible degraded plant
|
where $\Theta_{failure}$ captures the range of possible degraded plant
|
||||||
behaviors identified through failure mode and effects analysis (FMEA) or
|
behaviors identified through failure mode and effects analysis (FMEA) or
|
||||||
traditional safety analysis.}
|
traditional safety analysis.
|
||||||
|
|
||||||
We verify expulsory modes using reachability analysis with parametric
|
We verify expulsory modes using reachability analysis with parametric
|
||||||
uncertainty. The verification condition requires that for all parameter values
|
uncertainty. The verification condition requires that for all parameter values
|
||||||
@ -578,12 +575,12 @@ the safe shutdown state:
|
|||||||
This is more conservative than nominal reachability, accounting for the fact
|
This is more conservative than nominal reachability, accounting for the fact
|
||||||
that we cannot know exactly which failure mode is active.
|
that we cannot know exactly which failure mode is active.
|
||||||
|
|
||||||
\textcolor{blue}{Traditional safety analysis techniques inform the construction
|
Traditional safety analysis techniques inform the construction
|
||||||
of $\Theta_{failure}$. Probabilistic risk assessment, FMEA, and design basis
|
of $\Theta_{failure}$. Probabilistic risk assessment, FMEA, and design basis
|
||||||
accident analysis identify credible failure scenarios and their effects on
|
accident analysis identify credible failure scenarios and their effects on
|
||||||
plant dynamics. The expulsory mode must handle the worst-case dynamics within
|
plant dynamics. The expulsory mode must handle the worst-case dynamics within
|
||||||
this envelope. This is where conservative controller design is appropriate:
|
this envelope. This is where conservative controller design is appropriate as
|
||||||
safety margins matter more than performance during emergency shutdown.}
|
safety margins will matter more than performance during emergency shutdown.
|
||||||
|
|
||||||
%%% NOTES (Section 4.3):
|
%%% NOTES (Section 4.3):
|
||||||
% - Discuss sensor failures vs actual plant failures
|
% - Discuss sensor failures vs actual plant failures
|
||||||
@ -597,40 +594,25 @@ safety margins matter more than performance during emergency shutdown.}
|
|||||||
|
|
||||||
\subsection{Industrial Implementation}
|
\subsection{Industrial Implementation}
|
||||||
|
|
||||||
\textcolor{blue}{The methodology described above must be validated on realistic
|
The methodology described above must be validated on realistic
|
||||||
systems using industrial-grade hardware to demonstrate practical feasibility.
|
systems using industrial-grade hardware to demonstrate practical feasibility.
|
||||||
This research will leverage the University of Pittsburgh Cyber Energy Center's
|
This research will leverage the University of Pittsburgh Cyber Energy Center's
|
||||||
partnership with Emerson to implement and test the HAHACS methodology on
|
partnership with Emerson to implement and test the HAHACS methodology on
|
||||||
production control equipment.}
|
production control equipment. Emerson's Ovation distributed control system is widely deployed
|
||||||
|
|
||||||
\textcolor{blue}{Emerson's Ovation distributed control system is widely deployed
|
|
||||||
in power generation facilities, including nuclear plants. The Ovation platform
|
in power generation facilities, including nuclear plants. The Ovation platform
|
||||||
provides a realistic target for demonstrating that formally synthesized
|
provides a realistic target for demonstrating that formally synthesized
|
||||||
controllers can execute on industrial hardware meeting timing and reliability
|
controllers can execute on industrial hardware meeting timing and reliability
|
||||||
requirements. The discrete automaton produced by reactive synthesis will be
|
requirements. The discrete automaton produced by reactive synthesis will be
|
||||||
compiled to run on Ovation controllers, with verification that the implemented
|
compiled to run on Ovation controllers, with verification that the implemented
|
||||||
behavior matches the synthesized specification exactly.}
|
behavior matches the synthesized specification exactly.
|
||||||
|
|
||||||
\textcolor{blue}{For the continuous dynamics, we will use a small modular
|
For the continuous dynamics, we will use a small modular
|
||||||
reactor simulation. The SmAHTR (Small modular Advanced High Temperature
|
reactor simulation. The SmAHTR (Small modular Advanced High Temperature
|
||||||
Reactor) model provides a relevant testbed for startup and shutdown procedures.
|
Reactor) model provides a relevant testbed for startup and shutdown procedures.
|
||||||
The ARCADE (Advanced Reactor Control Architecture Development Environment)
|
The ARCADE (Advanced Reactor Control Architecture Development Environment)
|
||||||
interface will establish communication between the Emerson Ovation hardware and
|
interface will establish communication between the Emerson Ovation hardware and
|
||||||
the reactor simulation, enabling hardware-in-the-loop testing of the complete
|
the reactor simulation, enabling hardware-in-the-loop testing of the complete
|
||||||
hybrid controller.}
|
hybrid controller.
|
||||||
|
|
||||||
\textcolor{blue}{The demonstration will proceed through stages aligned with
|
|
||||||
Technology Readiness Levels:
|
|
||||||
\begin{enumerate}
|
|
||||||
\item \textbf{TRL 3:} Individual components validated in isolation (synthesized
|
|
||||||
automaton, verified continuous modes)
|
|
||||||
\item \textbf{TRL 4:} Integrated hybrid controller executing complete sequences
|
|
||||||
in pure simulation
|
|
||||||
\item \textbf{TRL 5:} Hardware-in-the-loop testing with Ovation executing the
|
|
||||||
discrete controller and simulation providing plant response
|
|
||||||
\end{enumerate}
|
|
||||||
Success at TRL 5 demonstrates that the methodology produces deployable
|
|
||||||
controllers, not merely theoretical constructs.}
|
|
||||||
|
|
||||||
Working with Emerson on such an implementation is an incredible advantage for
|
Working with Emerson on such an implementation is an incredible advantage for
|
||||||
the success and impact of this work. We will directly address the gap of
|
the success and impact of this work. We will directly address the gap of
|
||||||
|
|||||||
30
main.aux
30
main.aux
@ -33,25 +33,25 @@
|
|||||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.2}Stabilizing Modes}{12}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.2}Stabilizing Modes}{12}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.3}Expulsory Modes}{13}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.3}Expulsory Modes}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3}Industrial Implementation}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3}Industrial Implementation}{14}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {4}Metrics for Success}{16}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {4}Metrics for Success}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {paragraph}{TRL 3 \textit {Critical Function and Proof of Concept}}{16}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {paragraph}{TRL 3 \textit {Critical Function and Proof of Concept}}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {paragraph}{TRL 4 \textit {Laboratory Testing of Integrated Components}}{16}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {paragraph}{TRL 4 \textit {Laboratory Testing of Integrated Components}}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {paragraph}{TRL 5 \textit {Laboratory Testing in Relevant Environment}}{16}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {paragraph}{TRL 5 \textit {Laboratory Testing in Relevant Environment}}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {5}Risks and Contingencies}{18}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {5}Risks and Contingencies}{17}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Computational Tractability of Synthesis}{18}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Computational Tractability of Synthesis}{17}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}Discrete-Continuous Interface Formalization}{18}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}Discrete-Continuous Interface Formalization}{17}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3}Procedure Formalization Completeness}{19}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3}Procedure Formalization Completeness}{18}{}\protected@file@percent }
|
||||||
\citation{eia_lcoe_2022}
|
\citation{eia_lcoe_2022}
|
||||||
\citation{eesi_datacenter_2024}
|
\citation{eesi_datacenter_2024}
|
||||||
\citation{eia_lcoe_2022}
|
\citation{eia_lcoe_2022}
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {6}Broader Impacts}{21}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {6}Broader Impacts}{20}{}\protected@file@percent }
|
||||||
\bibstyle{ieeetr}
|
\bibstyle{ieeetr}
|
||||||
\bibdata{references}
|
\bibdata{references}
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {7}Schedule, Milestones, and Deliverables}{23}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {7}Schedule, Milestones, and Deliverables}{22}{}\protected@file@percent }
|
||||||
\gtt@chartextrasize{0}{164.1287pt}
|
\gtt@chartextrasize{0}{164.1287pt}
|
||||||
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Project schedule showing major research thrusts, milestones (orange row), and publications (green row). Red diamonds indicate completion points. Overlapping bars indicate parallel work where appropriate.}}{23}{}\protected@file@percent }
|
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Project schedule showing major research thrusts, milestones (orange row), and publications (green row). Red diamonds indicate completion points. Overlapping bars indicate parallel work where appropriate.}}{22}{}\protected@file@percent }
|
||||||
\newlabel{fig:gantt}{{3}{23}{Schedule, Milestones, and Deliverables}{figure.3}{}}
|
\newlabel{fig:gantt}{{3}{22}{Schedule, Milestones, and Deliverables}{figure.3}{}}
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.1}Milestones and Deliverables}{23}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {7.1}Milestones and Deliverables}{22}{}\protected@file@percent }
|
||||||
\bibcite{NUREG-0899}{1}
|
\bibcite{NUREG-0899}{1}
|
||||||
\bibcite{10CFR50.34}{2}
|
\bibcite{10CFR50.34}{2}
|
||||||
\bibcite{10CFR55.59}{3}
|
\bibcite{10CFR55.59}{3}
|
||||||
@ -67,5 +67,5 @@
|
|||||||
\bibcite{Kiniry2024}{13}
|
\bibcite{Kiniry2024}{13}
|
||||||
\bibcite{eia_lcoe_2022}{14}
|
\bibcite{eia_lcoe_2022}{14}
|
||||||
\bibcite{eesi_datacenter_2024}{15}
|
\bibcite{eesi_datacenter_2024}{15}
|
||||||
\@writefile{toc}{\contentsline {section}{References}{24}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{References}{23}{}\protected@file@percent }
|
||||||
\gdef \@abspage@last{28}
|
\gdef \@abspage@last{27}
|
||||||
|
|||||||
@ -1,13 +1,13 @@
|
|||||||
# Fdb version 4
|
# Fdb version 4
|
||||||
["bibtex main"] 1772647153.79833 "main.aux" "main.bbl" "main" 1772647228.17025 2
|
["bibtex main"] 1772657516.80216 "main.aux" "main.bbl" "main" 1772909692.49481 2
|
||||||
"./references.bib" 1765591319.20023 14069 2a4f74c587187a8a71049043171eb0fe ""
|
"./references.bib" 1765591319.20023 14069 2a4f74c587187a8a71049043171eb0fe ""
|
||||||
"/usr/local/texlive/2025/texmf-dist/bibtex/bst/base/ieeetr.bst" 1292289607 18361 1a00e58565e7f19bf2b3e1bfb82254ae ""
|
"/usr/local/texlive/2025/texmf-dist/bibtex/bst/base/ieeetr.bst" 1292289607 18361 1a00e58565e7f19bf2b3e1bfb82254ae ""
|
||||||
"main.aux" 1772647227.95816 5748 e33be58dd60b44046113ddb8b0d9bf30 "pdflatex"
|
"main.aux" 1772909692.27813 5748 38dc212531f318e67f49d597c2908f59 "pdflatex"
|
||||||
(generated)
|
(generated)
|
||||||
"main.bbl"
|
"main.bbl"
|
||||||
"main.blg"
|
"main.blg"
|
||||||
(rewritten before read)
|
(rewritten before read)
|
||||||
["pdflatex"] 1772647226.2456 "main.tex" "main.pdf" "main" 1772647228.17034 0
|
["pdflatex"] 1772909690.76715 "main.tex" "main.pdf" "main" 1772909692.4949 0
|
||||||
"/usr/local/texlive/2025/texmf-dist/fonts/enc/dvips/base/8r.enc" 1165713224 4850 80dc9bab7f31fb78a000ccfed0e27cab ""
|
"/usr/local/texlive/2025/texmf-dist/fonts/enc/dvips/base/8r.enc" 1165713224 4850 80dc9bab7f31fb78a000ccfed0e27cab ""
|
||||||
"/usr/local/texlive/2025/texmf-dist/fonts/map/fontname/texfonts.map" 1577235249 3524 cb3e574dea2d1052e39280babc910dc8 ""
|
"/usr/local/texlive/2025/texmf-dist/fonts/map/fontname/texfonts.map" 1577235249 3524 cb3e574dea2d1052e39280babc910dc8 ""
|
||||||
"/usr/local/texlive/2025/texmf-dist/fonts/tfm/adobe/symbol/psyr.tfm" 1136768653 1408 5937f58aa508ea2cea4901c07d10f5fe ""
|
"/usr/local/texlive/2025/texmf-dist/fonts/tfm/adobe/symbol/psyr.tfm" 1136768653 1408 5937f58aa508ea2cea4901c07d10f5fe ""
|
||||||
@ -245,17 +245,17 @@
|
|||||||
"/usr/local/texlive/2025/texmf.cnf" 1741450484 577 418a7058ec8e006d8704f60ecd22c938 ""
|
"/usr/local/texlive/2025/texmf.cnf" 1741450484 577 418a7058ec8e006d8704f60ecd22c938 ""
|
||||||
"1-goals-and-outcomes/research_statement_v1.tex" 1765591319.18896 4450 070caee751214eaddffa6b3403f8ed43 ""
|
"1-goals-and-outcomes/research_statement_v1.tex" 1765591319.18896 4450 070caee751214eaddffa6b3403f8ed43 ""
|
||||||
"1-goals-and-outcomes/v1.tex" 1765591319.1893 5825 07f6fba24cfa050a3b2b00c416f0f45f ""
|
"1-goals-and-outcomes/v1.tex" 1765591319.1893 5825 07f6fba24cfa050a3b2b00c416f0f45f ""
|
||||||
"2-state-of-the-art/v2.tex" 1772219521.82345 12622 8fd5435154f6a45bb3e558ffebacbf58 ""
|
"2-state-of-the-art/v2.tex" 1772909690.23793 12622 1460f7a4c2b48a1a772d8a0f5db216af ""
|
||||||
"3-research-approach/v3.tex" 1772647226.05037 36560 f9231e331bb93290a2a1d788c915c945 ""
|
"3-research-approach/v3.tex" 1772743152.76875 35753 93d4c7b608feeba783c33affa59dd220 ""
|
||||||
"4-metrics-of-success/v1.tex" 1765591319.19036 5586 e5fb80ced00bcdc318ffe3861b0064bc ""
|
"4-metrics-of-success/v1.tex" 1765591319.19036 5586 e5fb80ced00bcdc318ffe3861b0064bc ""
|
||||||
"5-risks-and-contingencies/v1.tex" 1765591319.19058 10412 17e755aa8451c45198372af7afe3c500 ""
|
"5-risks-and-contingencies/v1.tex" 1765591319.19058 10412 17e755aa8451c45198372af7afe3c500 ""
|
||||||
"6-broader-impacts/v1.tex" 1765591319.19072 4834 418aae223b778759691eaf9124a5360c ""
|
"6-broader-impacts/v1.tex" 1765591319.19072 4834 418aae223b778759691eaf9124a5360c ""
|
||||||
"8-schedule/v1.tex" 1765591319.19095 4473 8ad96bbf9cedf2ea09298ecbd4e01b83 ""
|
"8-schedule/v1.tex" 1765591319.19095 4473 8ad96bbf9cedf2ea09298ecbd4e01b83 ""
|
||||||
"dane_proposal_format.cls" 1769715785.9835 2883 ea175794171aa0291ef71716b2190bf0 ""
|
"dane_proposal_format.cls" 1769715785.9835 2883 ea175794171aa0291ef71716b2190bf0 ""
|
||||||
"main.aux" 1772647227.95816 5748 e33be58dd60b44046113ddb8b0d9bf30 "pdflatex"
|
"main.aux" 1772909692.27813 5748 38dc212531f318e67f49d597c2908f59 "pdflatex"
|
||||||
"main.bbl" 1772647153.8597 2919 0ea026a17b15c1ad2ed657bdbf26dfdc "bibtex main"
|
"main.bbl" 1772657516.86263 2919 0ea026a17b15c1ad2ed657bdbf26dfdc "bibtex main"
|
||||||
"main.tex" 1772218582.98667 954 b43a8fa32e5ebbd5cc6319a366737c39 ""
|
"main.tex" 1772218582.98667 954 b43a8fa32e5ebbd5cc6319a366737c39 ""
|
||||||
"main.toc" 1772647227.96211 2129 5b96f286c13251cf15256102f6fd6b8f "pdflatex"
|
"main.toc" 1772909692.28232 2129 eb658283ff0c872296846602d3e9dde6 "pdflatex"
|
||||||
(generated)
|
(generated)
|
||||||
"main.aux"
|
"main.aux"
|
||||||
"main.log"
|
"main.log"
|
||||||
|
|||||||
34
main.log
34
main.log
@ -1,4 +1,4 @@
|
|||||||
This is pdfTeX, Version 3.141592653-2.6-1.40.27 (TeX Live 2025) (preloaded format=pdflatex 2025.3.8) 4 MAR 2026 13:00
|
This is pdfTeX, Version 3.141592653-2.6-1.40.27 (TeX Live 2025) (preloaded format=pdflatex 2025.3.8) 7 MAR 2026 13:54
|
||||||
entering extended mode
|
entering extended mode
|
||||||
restricted \write18 enabled.
|
restricted \write18 enabled.
|
||||||
file:line:error style messages enabled.
|
file:line:error style messages enabled.
|
||||||
@ -948,38 +948,36 @@ LaTeX Warning: Citation `MANYUS THESIS' on page 11 undefined on input line 383.
|
|||||||
|
|
||||||
[12]
|
[12]
|
||||||
|
|
||||||
[13]
|
[13])
|
||||||
|
|
||||||
[14])
|
[14] (./4-metrics-of-success/v1.tex
|
||||||
|
|
||||||
[15] (./4-metrics-of-success/v1.tex
|
[15])
|
||||||
|
|
||||||
[16])
|
[16] (./5-risks-and-contingencies/v1.tex
|
||||||
|
|
||||||
[17] (./5-risks-and-contingencies/v1.tex
|
[17]
|
||||||
|
|
||||||
[18]
|
[18])
|
||||||
|
|
||||||
[19])
|
[19] (./6-broader-impacts/v1.tex)
|
||||||
|
|
||||||
[20] (./6-broader-impacts/v1.tex)
|
[20]
|
||||||
|
|
||||||
[21]
|
[21] (./8-schedule/v1.tex
|
||||||
|
|
||||||
[22] (./8-schedule/v1.tex
|
|
||||||
Missing character: There is no , in font nullfont!
|
Missing character: There is no , in font nullfont!
|
||||||
) (./main.bbl
|
) (./main.bbl
|
||||||
|
|
||||||
[23]
|
[22]
|
||||||
Underfull \hbox (badness 10000) in paragraph at lines 32--33
|
Underfull \hbox (badness 10000) in paragraph at lines 32--33
|
||||||
\OT1/cmtt/m/n/12 nuclear . org / information -[] library / safety -[] and -[] security / safety -[] of -[]
|
\OT1/cmtt/m/n/12 nuclear . org / information -[] library / safety -[] and -[] security / safety -[] of -[]
|
||||||
[]
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
[24])
|
[23])
|
||||||
|
|
||||||
[25] (./main.aux)
|
[24] (./main.aux)
|
||||||
***********
|
***********
|
||||||
LaTeX2e <2024-11-01> patch level 2
|
LaTeX2e <2024-11-01> patch level 2
|
||||||
L3 programming layer <2025-01-18>
|
L3 programming layer <2025-01-18>
|
||||||
@ -998,10 +996,10 @@ Here is how much of TeX's memory you used:
|
|||||||
1141 hyphenation exceptions out of 8191
|
1141 hyphenation exceptions out of 8191
|
||||||
110i,9n,107p,1062b,965s stack positions out of 10000i,1000n,20000p,200000b,200000s
|
110i,9n,107p,1062b,965s stack positions out of 10000i,1000n,20000p,200000b,200000s
|
||||||
</usr/local/texlive/2025/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/public/amsfonts/cm/cmtt12.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm10.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/public/rsfs/rsfs10.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/urw/symbol/usyr.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/urw/symbol/usyr.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/urw/times/utmb8a.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/urw/times/utmbi8a.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/urw/times/utmr8a.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/urw/times/utmri8a.pfb>
|
</usr/local/texlive/2025/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/public/amsfonts/cm/cmtt12.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm10.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/public/rsfs/rsfs10.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/urw/symbol/usyr.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/urw/symbol/usyr.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/urw/times/utmb8a.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/urw/times/utmbi8a.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/urw/times/utmr8a.pfb></usr/local/texlive/2025/texmf-dist/fonts/type1/urw/times/utmri8a.pfb>
|
||||||
Output written on main.pdf (28 pages, 189916 bytes).
|
Output written on main.pdf (27 pages, 188983 bytes).
|
||||||
PDF statistics:
|
PDF statistics:
|
||||||
183 PDF objects out of 1000 (max. 8388607)
|
180 PDF objects out of 1000 (max. 8388607)
|
||||||
111 compressed objects within 2 object streams
|
109 compressed objects within 2 object streams
|
||||||
0 named destinations out of 1000 (max. 500000)
|
0 named destinations out of 1000 (max. 500000)
|
||||||
109 words of extra memory for PDF output out of 10000 (max. 10000000)
|
109 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||||
|
|
||||||
|
|||||||
BIN
main.synctex.gz
BIN
main.synctex.gz
Binary file not shown.
24
main.toc
24
main.toc
@ -13,15 +13,15 @@
|
|||||||
\contentsline {subsubsection}{\numberline {3.2.2}Stabilizing Modes}{12}{}%
|
\contentsline {subsubsection}{\numberline {3.2.2}Stabilizing Modes}{12}{}%
|
||||||
\contentsline {subsubsection}{\numberline {3.2.3}Expulsory Modes}{13}{}%
|
\contentsline {subsubsection}{\numberline {3.2.3}Expulsory Modes}{13}{}%
|
||||||
\contentsline {subsection}{\numberline {3.3}Industrial Implementation}{14}{}%
|
\contentsline {subsection}{\numberline {3.3}Industrial Implementation}{14}{}%
|
||||||
\contentsline {section}{\numberline {4}Metrics for Success}{16}{}%
|
\contentsline {section}{\numberline {4}Metrics for Success}{15}{}%
|
||||||
\contentsline {paragraph}{TRL 3 \textit {Critical Function and Proof of Concept}}{16}{}%
|
\contentsline {paragraph}{TRL 3 \textit {Critical Function and Proof of Concept}}{15}{}%
|
||||||
\contentsline {paragraph}{TRL 4 \textit {Laboratory Testing of Integrated Components}}{16}{}%
|
\contentsline {paragraph}{TRL 4 \textit {Laboratory Testing of Integrated Components}}{15}{}%
|
||||||
\contentsline {paragraph}{TRL 5 \textit {Laboratory Testing in Relevant Environment}}{16}{}%
|
\contentsline {paragraph}{TRL 5 \textit {Laboratory Testing in Relevant Environment}}{15}{}%
|
||||||
\contentsline {section}{\numberline {5}Risks and Contingencies}{18}{}%
|
\contentsline {section}{\numberline {5}Risks and Contingencies}{17}{}%
|
||||||
\contentsline {subsection}{\numberline {5.1}Computational Tractability of Synthesis}{18}{}%
|
\contentsline {subsection}{\numberline {5.1}Computational Tractability of Synthesis}{17}{}%
|
||||||
\contentsline {subsection}{\numberline {5.2}Discrete-Continuous Interface Formalization}{18}{}%
|
\contentsline {subsection}{\numberline {5.2}Discrete-Continuous Interface Formalization}{17}{}%
|
||||||
\contentsline {subsection}{\numberline {5.3}Procedure Formalization Completeness}{19}{}%
|
\contentsline {subsection}{\numberline {5.3}Procedure Formalization Completeness}{18}{}%
|
||||||
\contentsline {section}{\numberline {6}Broader Impacts}{21}{}%
|
\contentsline {section}{\numberline {6}Broader Impacts}{20}{}%
|
||||||
\contentsline {section}{\numberline {7}Schedule, Milestones, and Deliverables}{23}{}%
|
\contentsline {section}{\numberline {7}Schedule, Milestones, and Deliverables}{22}{}%
|
||||||
\contentsline {subsection}{\numberline {7.1}Milestones and Deliverables}{23}{}%
|
\contentsline {subsection}{\numberline {7.1}Milestones and Deliverables}{22}{}%
|
||||||
\contentsline {section}{References}{24}{}%
|
\contentsline {section}{References}{23}{}%
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user