Yes, true, fusion reactors don't work quite yet, but, er, maybe AI can help us stop our experiments from imploding

No neural networks here, though, only decision tree algos

Machine-learning algorithms may help scientists develop a warning system capable of preventing fusion reactor meltdowns in the future.

Scientists have attempted to harness the power of nuclear fusion for decades in the hopes of providing clean energy. Clouds of plasma made up of positively and negatively charged ions are placed in a donut-shaped chamber and controlled with superconducting electromagnets in tokamak constructions. As the strength of the magnetic field is cranked up, the ions whiz around the reaction chamber coming into close contact with one another to fuse. Thermal energy is released in the process.

Tokamaks, however, are temperamental. A lack of control can lead to a sudden release of the heat generated. Disruptions like these can melt the surface of the reaction chamber. Now, researchers led by Princeton Plasma Physics Laboratory (PPPL), a fusion research lab working under the US Department of Energy (DoE), are attempting to build a control system that monitors and predicts the likelihood of disruption events unfolding during the operation of tokomaks using machine-learning software.

Specifically, a paper published in the American Institute of Physics's Physics of Plasma journal describes using decision-tree algorithms. Details from various fusion reactors, such as their plasma current, plasma energy, radiation power, strength of radial magnetic field, and more are taken into account and used as inputs into the algorithm.

"Using 10 signals at different time moments, we made use of a broader range of signals and calculated the mean, trend, and variance within a specific time window," the paper said.

If the value of each signal is above a certain threshold, it increases the chance of a meltdown. All these different scenarios for each input are run through the decision-tree algorithm until it reaches the last two branches that predict whether there will be a disruption event or not within the next 250 milliseconds.

That's an incredibly short amount of time, so the results from the algorithm will probably have to be fed into a wider diagnostic system that automatically controls the tokamak rather than relying on human intervention. "In the real-time experiments we did, the algorithms successfully predicted the disruption," Yichen Fu, a graduate student, and Egemen Kolemen, an assistant professor at Princeton University, who both work at PPPL and are co-authors of the study, told The Register. "We used the prediction of our algorithm as a control input to dynamically adjust neutral beam power so that we could reach the best performance while avoiding instabilities."

The researchers took data from thousands of experiments run on the DoE's DIII-D National Fusion Facility operated by General Atomics, an energy and defense biz in San Diego, to train their algorithms. After they tested their methods, they found it was generally accurate approximately 80 per cent of the time.

Although the algorithms are promising, the study is more of a proof of concept and won't be used for real tokomaks anytime soon. "This work represents significant progress in the use of machine learning to develop a disruption prediction and avoidance method in fusion devices," said Raffi Nazikian, who heads the ITER and Tokamaks Department at PPPL. ®

Broader topics

Other stories you might like

  • Verizon: Ransomware sees biggest jump in five years
    We're only here for DBIRs

    The cybersecurity landscape continues to expand and evolve rapidly, fueled in large part by the cat-and-mouse game between miscreants trying to get into corporate IT environments and those hired by enterprises and security vendors to keep them out.

    Despite all that, Verizon's annual security breach report is again showing that there are constants in the field, including that ransomware continues to be a fast-growing threat and that the "human element" still plays a central role in most security breaches, whether it's through social engineering, bad decisions, or similar.

    According to the US carrier's 2022 Data Breach Investigations Report (DBIR) released this week [PDF], ransomware accounted for 25 percent of the observed security incidents that occurred between November 1, 2020, and October 31, 2021, and was present in 70 percent of all malware infections. Ransomware outbreaks increased 13 percent year-over-year, a larger increase than the previous five years combined.

    Continue reading
  • Slack-for-engineers Mattermost on open source and data sovereignty
    Control and access are becoming a hot button for orgs

    Interview "It's our data, it's our intellectual property. Being able to migrate it out those systems is near impossible... It was a real frustration for us."

    These were the words of communication and collaboration platform Mattermost's founder and CTO, Corey Hulen, speaking to The Register about open source, sovereignty and audio bridges.

    "Some of the history of Mattermost is exactly that problem," says Hulen of the issue of closed source software. "We were using proprietary tools – we were not a collaboration platform before, we were a games company before – [and] we were extremely frustrated because we couldn't get our intellectual property out of those systems..."

    Continue reading
  • UK government having hard time complying with its own IR35 tax rules
    This shouldn't come as much of a surprise if you've been reading the headlines at all

    Government departments are guilty of high levels of non-compliance with the UK's off-payroll tax regime, according to a report by MPs.

    Difficulties meeting the IR35 rules, which apply to many IT contractors, in central government reflect poor implementation by Her Majesty's Revenue & Customs (HMRC) and other government bodies, the Public Accounts Committee (PAC) said.

    "Central government is spending hundreds of millions of pounds to cover tax owed for individuals wrongly assessed as self-employed. Government departments and agencies owed, or expected to owe, HMRC £263 million in 2020–21 due to incorrect administration of the rules," the report said.

    Continue reading
  • Internet went offline in Pakistan as protestors marched for ousted prime minister
    Two hour outage 'consistent with an intentional disruption to service' said NetBlocks

    Internet interruption-watcher NetBlocks has reported internet outages across Pakistan on Wednesday, perhaps timed to coincide with large public protests over the ousting of Prime Minister Imran Khan.

    The watchdog organisation asserted that outages started after 5:00PM and lasted for about two hours. NetBlocks referred to them as “consistent with an intentional disruption to service.”

    Continue reading
  • Suspected phishing email crime boss cuffed in Nigeria
    Interpol, cops swoop with intel from cybersecurity bods

    Interpol and cops in Africa have arrested a Nigerian man suspected of running a multi-continent cybercrime ring that specialized in phishing emails targeting businesses.

    His alleged operation was responsible for so-called business email compromise (BEC), a mix of fraud and social engineering in which staff at targeted companies are hoodwinked into, for example, wiring funds to scammers or sending out sensitive information. This can be done by sending messages that impersonate executives or suppliers, with instructions on where to send payments or data, sometimes by breaking into an employee's work email account to do so.

    The 37-year-old's detention is part of a year-long, counter-BEC initiative code-named Operation Delilah that involved international law enforcement, and started with intelligence from cybersecurity companies Group-IB, Palo Alto Networks Unit 42, and Trend Micro.

    Continue reading

Biting the hand that feeds IT © 1998–2022