ANS is committed to advancing, fostering, and promoting the development and application of nuclear sciences and technologies to benefit society.
Explore the many uses for nuclear science and its impact on energy, the environment, healthcare, food, and more.
Explore membership for yourself or for your organization.
Conference Spotlight
2026 Annual Conference
May 31–June 3, 2026
Denver, CO|Sheraton Denver
Standards Program
The Standards Committee is responsible for the development and maintenance of voluntary consensus standards that address the design, analysis, and operation of components, systems, and facilities related to the application of nuclear science and technology. Find out What’s New, check out the Standards Store, or Get Involved today!
Latest Magazine Issues
Dec 2025
Jul 2025
Latest Journal Issues
Nuclear Science and Engineering
January 2026
Nuclear Technology
December 2025
Fusion Science and Technology
November 2025
Latest News
Blades-in turbine inspections at Quad Cities set new benchmark for Constellation
When Constellation decided to install replacement Alstom low-pressure turbines at three of its boiling water reactor plants more than 15 years ago, one benefit was knowing the new turbines should operate reliably—and without major inspections—for several years.
Joshua Daley, Kandy Phan, Lon Dawson (SNL), Jason A. Abrahamson, Timothy McJunkin (INL)
Proceedings | Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technolgies (NPIC&HMIT 2019) | Orlando, FL, February 9-14, 2019 | Pages 1514-1523
U. S. Nuclear Power Plants are seeking to implement wireless communications for cost-effective operations. New technology introduced into power plants must not introduce security concerns into critical plant functions. This paper describes the potential for new security concerns with proposed nuclear power plant wireless system implementations and methods of evaluation. While two aspects of concern are introduced, only one (cyber attack vulnerability) is expanded with a description of test setup and methods. A novel method of cyber vulnerability discovery is also described. The goal of this research is to establish wireless technology as a part of a secure operations architecture that brings increased efficiency without introducing new security concerns.