Nuclear fusion is clean sustainable renewable energy - Scottish actor Robert Carlysle villain in James Bond The World Is Not Enough and Dr Tony Miller during 2004 the year this student passed with Distinction - this is instructions really for building a nuclear reactor

Kazakhstan does contain the most abundant supply of uranium and it was featured in The World Is Not Enough James Bond film - refer to the King Caspian pipeline. The villian was a woman - Electra King, who remembers? Electra my be symbolic of electrons, but actually she worked in partnership with character Renard, another Scottish actor Robert Carlysle.

Kazakhstan borders Russia so actually important to consider Russia used to be part of a broader block of nations known as the Soviet Union. Michael Palin travelled from the Soviet Union down through Africa going from North to South called the Travels of Michael Palin in 80 days broadcast on the BBC iPlayer. Michael Palin went through Uganda and Rwanda and Lizz Truss a candidate for Prime Minister is focusing on support for Rwanda, but actually the broader point is Michael Palin kept a diary and also he was with a film crew.

Boris Gardner, Boris Yeltsin and Boris Johnson - also Tony Blair and Vladimir Putin stood side by side when London transport network crippled

There is Boris Gardner a singer and Boris Yeltsin the last president of the Soviet Union and actually the last President before it broke up. Boris Johnson is stepping down as Prime Minister of the United Kingdom - contention currently between Lizz Truss former Home Secretary and Rishi Sunak former Chancellor. Vladimir Putin succeeded Boris Yeltsin - important to remember Putin actually during July 2005 stood shoulder to shoulder with Tony Blair after terrorist bombings rocked the London transport network at Glenagles golf resort also in Scotland on 7th July 2005.

Boris Yeltsin from Wikipedia - Boris transformed Russia's command economy into a capitalist market economy by implementing economic shock therapy, market exchange rate of the ruble, nationwide privatization, and lifting of price controls. Economic volatility and inflation ensued.

Boris Yeltsin from Wikipedia - Amid the economic shift, a small number of oligarchs obtained a majority of the national property and wealth, while international monopolies came to dominate the market.

Boris Yeltsin from Wikipedia - A constitutional crisis emerged in 1993 after Yeltsin ordered the unconstitutional dissolution of the Russian parliament, leading parliament to impeach him. The crisis ended after troops loyal to Yeltsin stormed the parliament building and stopped an armed uprising; he then introduced a new constitution which significantly expanded the powers of the president.

Boris Yeltsin from Wikipedia - Secessionist sentiment in the Russian Caucasus led to the First Chechen War, War of Dagestan, and Second Chechen War between 1994 and 1999. Internationally, Yeltsin promoted renewed collaboration with Europe and signed arms control agreements with the United States. Amid growing internal pressure, he resigned by the end of 1999 and was succeeded by his chosen successor, Vladimir Putin, who was serving as prime minister.

Boris Yeltsin from Wikipedia - He kept a low profile after leaving office and was accorded a state funeral upon his death in 2007.

From Wikipedia - Boris Yeltsin was a controversial figure. Domestically, he was highly popular in the late 1980s and early 1990s, although his reputation was damaged by the economic and political crises of his presidency, and he left office widely unpopular with the Russian population.

He received praise and criticism for his role in dismantling the Soviet Union, transforming Russia into a representative democracy, and introducing new political, economic, and cultural freedoms to the country. Conversely, he was accused of economic mismanagement, overseeing a massive growth in inequality and corruption, and sometimes of undermining Russia's standing as a major world power.

Police communication error and need to keep on updating websites to keep an audience

The problem with websites is there is an onus to update content regularly to keep an audience - who is viewing this web page? There may be judges viewing, perhaps the Chief Constable of the Police who is chair of Acpo. If the police are viewing they should note today 4th August 2022, a letter was received from Police Scotland referring to the complaint to the National Crime Agency. Complaint really about PC Main and PC Fraser around Broomhill Primary 25 minutes to get to school - response from police vague sufficient to say there is a communication issue preventing successful resolution of the complaint. Trying to inform in an efficient and honest manner, typing out the full response by the police which was actually not very informative would be waste of time. Also significant to note the police letter said to phone a number but actually no reference number for the complaint was contained in the letter. Reference numbers intended to link string together information form connotations, but actually taking time to write meaningful feedback actually may provide closure in cases.

Incremental back-ups can back-up just content of a website efficiently low file size - spliting documents and photos into a single container file sharing via social media websites

Incremental back-ups of data really useful actually to preserving text content such as web pages - the web pages comprising this website total 190 around 10MB megabytes minus all the supporting documents - benefits of combining evidence into single container video files and sharing via media sharing websites is that the real substantial detail - the messages on this website can be backed-up most efficiently. Microsoft OneDrive also Google Drive do provide 15GB free storage space actually - actually free accounts can actually provide a means to back-up really essential data you do not want to lose. Free accounts can enable data duplication.

Free 15GB digital accounts suitable for a child with passwords shared amongst multiple loved ones

Actually a free account of 15GB could be suitable for a child where the password is shared by an Uncle or Aunty for example and parents containing positive imagery of loved ones associated with a child, photos from a child's early years and childhood including videos, also relationships such as family trees and links to Facebook Timelines of family members including people who may be understanding and supportive in the event of some unforeseen tragedy - actually multiple people knowing the passwords for an account linked to a child actually could help a child keep fond memories - tablet computers can be linked to online accounts also and when a tablet is lost it may be necessary to change the password without need to remotely wipe a tablet or smartphone. Photos of parents, grandparents even great grandparents is one thing, but identifying people is a different matter - sometimes sharing photos is necessary to identify people, wider family members may actually people able to identify someone from the past. This really makes the case for renaming filenames and renaming filenames linked to photos with names of linked corresponding people.

Google Maps zones in using IP address also GPS and compass

Google Maps hones in on your current location usually the place where you are or reside, your home - this is based actually on your computer's IP address from a laptop and desktop computer at home. On the move via mobile data, Google Maps refers to GPS coordinates and actually the compass plays a role here. Compasses typially have four sides - North, East, South and West - Never Eat Shreaded Wheat is the way to remember the compass rotation.

Keith Center of Westhill KC Joinery Services responsible capable electrician, joiner, plumber

Lethal voltage levels involved in building a nuclear reactor. Make sure you know your high voltage safety or have a qualified electrical advisor. Experienced electrician Keith Center of Westhill KC Joinery Services does not need to advertise services he is so popular or so he says. Skilled in joinery and plumbing, he renovated a kitchen during June 2016 taking pine off walls, laying laminate flooring and fitting out all new appliances and kitchen cupboards from Howdens kitchen also adding a new ceiling doing lighting as well making sure electrical outlets are well away from appliances in awkward locations actually - difficult to actually unplug an appliance now without another joiner.

Raster images and vector graphics also Google Image search

Google Image Search actually contains a vast number of diagrams perhaps useful for reference - if you find something useful right-click on an image and click Save Image, making sure not to click Save Link if you are running Mozilla Firefox. Diagrams are different from JPEG photographs - there are raster images also vector images.

Raster images are the types of images that are produced when scanning or photographing an object. Raster images are compiled using pixels, or tiny dots, containing unique color and tonal information that come together to create the image. Since raster images are pixel based, they are resolution dependent.

Vector graphics like PNG images or line art more suitable for diagrams with lines and textual content - a vector graphic is an artwork made up of points, lines, and curves that are based upon mathematical equations, rather than solid colored square pixels. This means no matter the size or how far zoomed in the image is, the lines, curves, and points remain smooth.

Who knows how to build a nuclear reactor? Nuclear reactors mix chemicals so chemistry is actually important - what are those pharmacists doing at Lloyds Pharmacy?

Trying to build a nuclear reactor like Leader Kim Jong-un of North Korea since 2011 - police will only have concerns when someone tries buying chemicals from B and Q also starting to mix chemicals also. Really mixing also combining or amalgamating or blending chemicals not for novices actually - risk of self detonation and suicide also risk of anti-psychotic medication since such drugs linked to risk taking, but actually trying to figure out how to build a nuclear reactor might prove useful when information is shared. Lots of online information actually - many resources undescovered actually but creating content and explaining really is the holly grail and talking about the holly grail that's the domain of archaeologist Indiana Jones and the Last Crudsade with Scottish actor Sean Connery.

Are any budding nuclear physicists reading this? The nuclear pysicist from The World Is Not Enough was Dr or doctor Christmas Jones.

Aberdeen Robert Gordon University retired School of Engineering lecturer Dr or doctor Tony Miller did a Phd to become a doctor and is a doctor of philsophy not a medical doctor. Very organised man, produced lecture plans and also wrote his own notes, spoon fed information.

Words from Dr Tony Miller on safety critical systems - information copied in part most relevant parts

Fault Avoidance techniques aim to prevent faults from entering the system during the design stage e.g. use of formal methods

Fault Removal methods refer to the process of finding faults within the system before it is handed over to the user i.e. system integration and test.

Fault Detection refers to the use of procedures and techniques to detect faults in the system during service and so minimise their effect and avoid major incidents.

Fault Tolerance is addressed at the design stage. Care and attention is given to possible component failures and the system designed to allow operation to continue in the face of isolated component malfunction.

Primary Safety: where the equipment itself is dangerous e.g. explosives, rotating machinery, power circuits, breathing apparatus.

Functional Safety: where failure of equipment will by consequence lead to an unsafe situation with the rest of the system e.g.- control circuits, alarm indicators, circuit breakers, instrument panels.

Indirect Safety: where failure may affect the design of safety related equipment or the safe operation of a management system e.g. documentation, CAD software, communications network, data bases, management/personality conflicts.

2. Active and Latent Failures

Active failures have an immediate effect on the system. They are unsafe acts, by equipment and humans, and unsafe conditions.

Latent failures lie unnoticed in an organisation until revealed by some event, which could be an active failure.

The importance of latent failures should be recognised to increase awareness of the role of managers and design engineers in enabling detection of these failures before they cause loss.

3. Skill, Rule and Knowledge-based Errors

Skill based errors involve ‘slips’ and ‘lapses’ in highly practised and routine tasks.

Rule based errors occur when a faulty judgement is made and wrong procedures followed, which are inappropriate for the situation.

Knowledge based errors arise when there is failure to create the right procedure due to lack of understanding.

4. Violations

Sometimes referred to as ‘risk taking’, violations is when the rules are purposefully broken. The person assumes the risks are worth taking for the benefits of the outcome.

Success in system design, operational management and the relevence of training programmes depends on an adequate diagnosis of the nature of the errors likely to be made.

Risk Analysis and ALARP As Low As Reasonably Practical - notes in part from Dr Tony Miller give credit where its due

Definitions:

Hazard: the possibility of an unwanted/harmful event

Accident: an unintended event or sequence of events that causes death, injury, environmental or material damage.

Risk: combination of the frequency or probability of a specified hazardous event, and its consequence.

i.e. risk = frequency x severity

Standards:

The measures of frequency and severity are often divided into classes to simplify the guidelines and standards. The best known standards are related to the avionics industry, the military ( Interim Defence Standard 00-56), and a recent International industrial standard known as IEC1508.

When risk is calculated using frequency and severity classes, the outcome is not a numerical value, but a risk class, a risk level or a risk factor. Use of risk classes simplifies the use of standards, and even when numerical data is available, the risk outcome will tend to be translated into a class. This is because the standards specify development and design techniques appropriate to each risk class.

The IEC 1508 standard differs in its naming of the classes from other standards, even though it has the same number of categories as the military 00-56 standard.

Acceptable Risk

The definitions of risk classes include those which have catastrophic consequences and which could occur frequently. Clearly these are unacceptable and something must be done. However there are other classes where a decision has to be made as to whether it is 'worth' assigning resources to reducing the risk. The question is 'what is an acceptable risk'.

The acceptability of a given risk class is determined by the benefits associated with that risk, and by the amount of effort that would be required to reduce it.

The criterion for accepting a risk is based on the decision as to whether it is:

'As Low As is Reasonably Practical' (ALARP).

A risk level satisfying this criterion is known as a Tolerable Risk, if the risk is intolerable, then the process of risk management or risk reduction must be initiated.

Safety Integrity Levels - notes from Dr Tony Miller

The task of producing a safety-critical system can be seen as a process of risk management or risk reduction i.e. of introducing safety (management) systems which are themselves highly dependable.

Levels of safety integrity are related to levels of importance associated with making the system safe, and as such are to do with the safety systems added to a process in order to make the risks ALARP. It can be viewed as the amount of risk reduction necessary. A safety system for a car is different from the safety system in a nuclear power station. The safety integrity levels serve to differentiate the amount of care and engineering required of the safety system itself.

‘Safety integrity is the likelihood of a safety-related system satisfactorily performing the required safety functions under all the stated conditions within a stated period of time’. (Taken from ‘Safety-Critical Computer Systems’, Neil Storey, page 70).

The international community is moving towards accepting a 4-level classification, with level 1 being the least critical and level 4 the most critical. This is the convention used in the standard IEC 1508.

The standard defines the maximum number of times a system built to a particular integrity level would be expected to fail in a given time interval.

With continuous processes, failure rates are quoted in failures per year (or per hour). With systems, which only operate when required, failures are given as failures on demand. In the IEC 1508 standard the target figures happen to be the same for both.

Software in Safety Related Systems - Lecture 8 from Safety, Risk and Reliability Management (Dr Tony Miller)

V-development lifecycle model - used in Lecture 8 by Dr Tony Miller called Lifecycle Models for Safety, Risk and Reliability Management

Summary of flow from original diagram - Primary flow of information goes through all stages and there is a secondary flow of information to certain other stages, processes can be iterative going back to design and test stage.

End of notes from Dr Tony Miller - An ENDIF statement always follows the ELSE clause, if present, or the THEN clause in computer program instructions or sequential also step by step instructions.

The THEN clause specifies the job steps that the system processes when the evaluation of the relational-expression for the IF statement is a true condition.

The system evaluates the relational-expression at execution time.

Safety, Risk and Reliability Management coursework issued by Dr Tony Miller during 2005 - this is instructions really for building a nuclear reactor

The product is a plastic moulding used in the construction of ventilation systems. The furnace is used to harden the plastic at a set temperature. The product enters the furnace on a conveyor belt driven by a continuosly operating motor, and passes through at a fixed rate. The time the material spends at the elevated temperature is just as important to the success of the operation as the temperature itself. To fire the furnace, pumps spray a mixture of oxygen and fuel into the chamber, at a rate controlled by the valves. Two lines are provided to give some redundancy in case of failure. Only one line needed for successful operation. The temperature must be kept between upper and lower levels for the chemical process to work properly, and this is governed by controlling the amount of fuel injected. The outside of the furnace is kept cool by a water jacket to prevent injury and structural failure.

If, due to some fault in the process, the temperature of the furnace becomes too high the material can catch fire, producing highly toxic gasses, with serious consequences to personnel and equipment.

Control systems - motorised valves control the air/flow supply pipes. A flow meter on each pipe senses the level of the flow. A computer system performs the function of master controller reading all sensors and transmitting signals to control the valves. On the furnace itself, there are temperature sensors inside and outside the furnace. Water is pumped through the cooling jacket at a fixed rate.

Computer system - the computer system is at the heart of the process, reading all sensors, activating valves and generating an alarm signal to warn personnel of any danger.

Dr Tony Miller Nuclear Reactor Diagram

Chemical reactors courtesy of Google Image Search unkown contributor

EGP is a Russian acronym but translated into English stand for Power Heterogenous Loop reactor. It is the world's smallest running commercial nuclear reactor, however smaller reactors are currently in development. The EGP-6 reactors are the only reactors to be built on perma-frost.

Exterior Gateway Protocol (EGP) is also a routing protocol on Cisco routers for exchanging routing information between two neighbor gateway hosts (each with its own router) in a network of autonomous systems. EGP is commonly used between hosts on the Internet to exchange routing table information.

Interior Gateway Protocol (IGP) is a Routing Protocol which is used to find network path information within an Autonomous System. Exterior Gateway Protocol (EGP) is a Routing Protocol which is used to find network path information between different Autonomous Systems.

Power Heterogenous Loop reactor actually implies unequal voltages.

Voltage imbalances are caused by big single-phase loads, such as induction furnaces, traction systems, and other large inductive machines, drawing a current on the phase they are connected to that does not appear on the other two phases.

A loop reactor, cooling, circulation pump and valve are the core components that make up a nuclear reactor. Valves open and close actually in a nuclear reactor - valves are linked to pressure systems think bicycle tyres also. This is also linked to Physics and the laws of motion.

Two types of nuclear reactors include boiling-water reactor or a pressurized-water reactor.

TerraPower has chosen traveling wave reactors (TWRs) as its primary technology. The major benefit of such reactors is high fuel utilization in a manner that does not require nuclear reprocessing and could eventually eliminate the need to enrich uranium.