291
Views
11
CrossRef citations to date
0
Altmetric
Articles

Using Machine Learning Methods to Predict Bias in Nuclear Criticality Safety

, &

References

  • Blum, A. L., and P. Langley. 1997. Selection of relevant features and examples in machine learning. Artif. Intell. 97 (1–2):245–271.
  • Breiman, L. 2001. Random forests. Mach. Learn. 45(1):5–32.
  • Broadhead, B. L., B. T. Rearden, C. M. Hopper, J. J. Wagschal, and C. V. Parks. 2004. Sensitivity-and uncertainty-based criticality safety validation techniques. Nuclear Sci. Eng. 146 (3):340–366.
  • Brown, F. B., M. E. Rising, and J. L. Alwin. 2016. Lecture notes on criticality safety validation using MCNP & Whisper. Tech. Rep., Los Alamos National Lab. (LANL), Los Alamos, NM.
  • Brown, F. B., M. E. Rising, and J. L. Alwin. 2017. User manual for Whisper-1.1. Tech. Rep. LA-UR-17-20567, Los Alamos National Laboratory, Los Alamos, NM.
  • Denison, D. G., B. K. Mallick, and A. F. Smith. 1998. A Bayesian CART algorithm. Biometrika 85 (2):363–377.
  • Dietterich, T. G. 2000. Ensemble methods in machine learning. In International workshop on multiple classifier systems, 1–15. Springer.
  • Dietterich, T. G., and E. B. Kong. 1995. Machine learning bias, statistical bias, and statistical variance of decision tree algorithms. Tech. rep., technical report, Department of Computer Science, Oregon State University, Corvallis, OR.
  • Drucker, H. 1997. Improving regressors using boosting techniques. ICML 97:107–115.
  • Goorley, J. T., M. James, B. Thomas, F. Brown, J, Bull, L. J. Cox, J. Durkee, J. Elson, F. Michael, and R. A. Forster. 2012. Initial MCNP6 release overview. Nuclear Technol. 180.
  • Kiedrowski, B., and F. Brown, 2013. Methodology, verification, and performance of the continuous-energy nuclear data sensitivity capability in mcnp6. Proceedings of the 2013 international conference on mathematics and computational methods applied to nuclear science and engineering.
  • Kiedrowski, B. C., F. B. Brown, J. L. Conlin, J. A. Favorite, A. C. Kahler, A. R. Kersting, D. K. Parsons, and J. L. Walker. 2015. Whisper: Sensitivity/uncertainty-based computational methods and software for determining baseline upper subcritical limits. Nuclear Sci. Eng. 181 (1):17–47.
  • Liaw, A., and M. Wiener. 2002. Classification and regression by Random Forest. R News 2 (3):18–22.
  • Pedregosa, F., et al. 2011. Scikit-learn: Machine learning in Python. J. Mach. Learn. Res. 12:2825–2830.
  • Prati, R. C., G. E. Batista, and M. C. Monard. 2009. Data mining with imbalanced class distributions: Concepts and methods. IICAI:359–376.
  • Rearden, B. T. 2004. Perturbation theory eigenvalue sensitivity analysis with Monte Carlo techniques. Nuclear Sci. Eng. 146 (3):367–382.
  • Refaeilzadeh, P., L. Tang, and H. Liu. 2009. Cross-validation. In Encyclopedia of database systems, 532–538. Springer.
  • Scholkopf, B., and A. J. Smola. 2001. Learning with kernels: Support vector machines, regularization, optimization, and beyond. MIT Press [Database].
  • Solomatine, D. P., and D. L. Shrestha. 2004. AdaBoost. RT: A boosting algorithm for regression problems. In Neural networks, 2004. Proceedings. 2004 IEEE international joint conference on, vol. 2, 1163–1168. IEEE.
  • Wager, S., T. Hastie, and B. Efron. 2014. Confidence intervals for random forests: The jackknife and the infinitesimal jackknife. J. Mach. Learn. Res. 15 (1):1625–1651.
  • Werner, C., J. S. Bull, C. J. Solomon, F. B. Brown, G. W. McKinney, M. E. Rising, and A. J. Zukaitis. 2018. MCNP6.2 release notes. Tech. Rep. LA-UR-18-20808, Los Alamos National Laboratory, Los Alamos, NM.
  • Zadrozny, B. 2004. Learning and evaluating classifiers under sample selection bias. In Proceedings of the twenty-first international conference on machine learning, 114. ACM.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.