WorldWideScience

Sample records for safe wifi units

  1. Usage of Wifi Technology for PLC Programming

    Directory of Open Access Journals (Sweden)

    Jaromír ŠKUTA

    2009-06-01

    Full Text Available This contribution describes usage of WIFI technology for programming and parameterization of application in PLC. INSYS WLAN unit from the Microelectronics INSYS Corporation is the base of application. Software access point with using USB WIFI component WL167 is running in industrial PC. Particular PC clients are connecting into network infrastructure PLC by the help of this access point and INSYS WLAN unit. This connection allows configuring and uploading program into this PLC.

  2. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  3. Wifi-friendly building, enabling wifi signal indoor: an initial study

    Science.gov (United States)

    Suherman; Mubarakah, Naemah; Sagala, Romulo S.; Prayitno, Hendra

    2018-03-01

    The 802.11 network (wireless fidelity/WiFi) is the most common wireless infrastructure applied for internet access indoor. Widespread devices and installation simplicity make it better than similar technologies such as 802.16 and other 802.xx series. The access points are the most influential devices for indoor access. However, building indoor architectures contribute to the signal quality. Since WiFi installation in buildings becomes prevalent, the architecture should consider WiFi-friendliness into consideration. The more friendly the building to WiFi signal, the more efficient the 802.11 based wireless infrastructure. This paper present preliminary study how the building, specially the obstacle material, effects the WiFi signal propagation indoor. The study was performed by using ESP8266-based WiFi signal reader, to determine the impact indoor obstacles to WiFi signal propagation. The initial study shows that simple reflecting materials increase signal level about 1.14 dBm. WiFi-friendly building can be achieved by transforming building properties into signal interconnector. A simple photo frame with aluminium sheet insertion increase signal level on the second floor up to 6.56dBm.

  4. Effective Remote Control of Several Outdoor Security Lights by SMS and Wifi Technology

    Directory of Open Access Journals (Sweden)

    M. F. Akorede

    2017-08-01

    Full Text Available The aim of this study was to design and develop a control system using Short Message Service (SMS and wireless networking (WiFi technology to remotely control outdoor security lights in large organisations. The device comprises four main units, namely: the mobile phone or a computer system, the Global System for Mobile communication (GSM modem, the switching unit and the WiFi module. One feature that makes the developed system better than other related existing works is its ability to use two means of control. It makes use of WiFi when the operator is within the coverage area of the network of about 100 m to the device, at no cost, otherwise it uses SMS containing certain codes to control the lights. A Subscriber Identity Module (SIM card is placed in the GSM modem and SMS from the transmitter are sent to that mobile number. The module is also constantly checked by the microcontroller unit, processes the information, extracts the message and command from the GSM modem and WiFi module respectively and then acts accordingly. Owing to its simplicity, C programming is used to programme the microcontroller. The developed device when tested with three lighting points operating on 230V power supply, gives an impressive performance in terms of accuracy and promptness with both SMS and WiFi technology.

  5. WifiLeaks: Underestimated Privacy Implications of the ACCESS_WIFI_STATE Android Permission

    OpenAIRE

    Achara , Jagdish Prasad; Cunche , Mathieu; Roca , Vincent; Francillon , Aurélien

    2014-01-01

    A short version has been accepted for publication in: 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC'14) Oxford, United Kingdom, July 23rd -- 25th 2014; On Android, users can choose to install an application, or not, based on the permissions it requests. These permissions are later enforced on the application by the system, e.g., when accessing sensitive user data. In this work, we focus on the access to Wi-Fi related information, which is protected by the A...

  6. How much can Wi-Fi offload?

    DEFF Research Database (Denmark)

    Hu, Liang; Coletti, Claudio; Nguyen, Huan Cong

    2012-01-01

    This paper is envisaged to provide a first quantitative study on how much indoor deployed Wi-Fi can offload the operator’s 3G HSPA macro cellular networks in a real largescale dense-urban scenario. Wi-Fi has been perceived as a costeffective mean of adding wireless capacity by leveraging low......-cost access points and unlicensed spectrum. However, the quantitative offloading gain that Wi-Fi can achieve is still unknown. We studied the Wi-Fi offloading gain as a function of access point density, where it is shown that 10 access points/km2 can already boost average user throughput by 300% and the gain...... increases linearly proportional to the access point density. Indoor Wi-Fi deployment also significantly reduces the number of users in outage, especially for indoor area. A user is considered to be in outage if they have a user throughput less than 512 kbps. We also propose three Wi-Fi deployment algorithms...

  7. A Wi-Fi Union Mechanism for Internet Advertising Reciprocal Platform in Microenterprises.

    Science.gov (United States)

    Nguyen, Thi Thanh An; Chang, Che-Pin; Yuan, Shyan-Ming

    2017-07-13

    With the evolution of the Internet and smartphone devices, Internet advertising has become one of the most important methods for delivering promotional marketing messages to customers. However, the efficiency of Internet advertising for microenterprise is not very high, since Wi-Fi advertising-which is limited by a small router coverage area-is mainly used. Moreover, because of the lack of money, microenterprises have been using low-cost methods to promote their products. Thus, enhancing the effectiveness of Wi-Fi advertising, and solving the problem of cost and the range of the views are now an essential investigation in this study. In this paper, we propose a reciprocal model with Wi-Fi union mechanism for Internet advertising based on fog computing architecture to enhance the efficiency of advertisement, reduce the cost, and increase the range of the views for microenterprise by using the Internet. In particular, the system was built in advertisers', publishers', and consumers' sides. In our system, we use contribution point (CP) as an exchange value among the participants. Advertisers and publishers can get CP by helping the others in the system to promote their advertisements, increasing their CP by one unit. Similarly, advertisers and publishers can use their CP to ask for assistance from the others, decreasing their CP by one unit. The result shows that the system in a Wi-Fi union is easy to use, and advertisements can be seen by all customers who are using free Wi-Fi from the stores of the union. This method can solve the problem of cost and fixed consumer groups.

  8. A Wi-Fi Union Mechanism for Internet Advertising Reciprocal Platform in Microenterprises

    Science.gov (United States)

    Nguyen, Thi Thanh An; Chang, Che-Pin

    2017-01-01

    With the evolution of the Internet and smartphone devices, Internet advertising has become one of the most important methods for delivering promotional marketing messages to customers. However, the efficiency of Internet advertising for microenterprise is not very high, since Wi-Fi advertising—which is limited by a small router coverage area—is mainly used. Moreover, because of the lack of money, microenterprises have been using low-cost methods to promote their products. Thus, enhancing the effectiveness of Wi-Fi advertising, and solving the problem of cost and the range of the views are now an essential investigation in this study. In this paper, we propose a reciprocal model with Wi-Fi union mechanism for Internet advertising based on fog computing architecture to enhance the efficiency of advertisement, reduce the cost, and increase the range of the views for microenterprise by using the Internet. In particular, the system was built in advertisers’, publishers’, and consumers’ sides. In our system, we use contribution point (CP) as an exchange value among the participants. Advertisers and publishers can get CP by helping the others in the system to promote their advertisements, increasing their CP by one unit. Similarly, advertisers and publishers can use their CP to ask for assistance from the others, decreasing their CP by one unit. The result shows that the system in a Wi-Fi union is easy to use, and advertisements can be seen by all customers who are using free Wi-Fi from the stores of the union. This method can solve the problem of cost and fixed consumer groups. PMID:28703761

  9. Indoor Positioning using Wi-Fi

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun; Krarup, Mads Vering; Stisen, Allan

    The past decade has witnessed substantial research on methods for indoor Wi-Fi positioning. While much effort has gone into achieving high positioning accuracy and easing fingerprint collection, it is our contention that the general problem is not sufficiently well understood, thus preventing...... deployments and their usage by applications to become more widespread. Based on our own and published experiences on indoor Wi-Fi positioning deployments, we hypothesize the following: Current indoor Wi-Fi positioning systems and their utilization in applications are hampered by the lack of understanding...... of the requirements present in the real-world deployments. In this paper, we report findings from qualitatively studying organisational requirements for indoor Wi-Fi positioning. The studied cases and deployments cover both company and public-sector settings and the deployment and evaluation of several types...

  10. Wi-Fi Networks Security and Accessing Control

    OpenAIRE

    Tarek S. Sobh

    2013-01-01

    As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP) problem has raised more attention and resulted in obtaining wireless access without subscriber permission.This work assumes Wi-Fi...

  11. A Wireless Physiological Signal Monitoring System with Integrated Bluetooth and WiFi Technologies.

    Science.gov (United States)

    Yu, Sung-Nien; Cheng, Jen-Chieh

    2005-01-01

    This paper proposes a wireless patient monitoring system which integrates Bluetooth and WiFi wireless technologies. A wireless portable multi-parameter device was designated to acquire physiological signals and transmit them to a local server via Bluetooth wireless technology. Four kinds of monitor units were designed to communicate via the WiFi wireless technology, including a local monitor unit, a control center, mobile devices (personal digital assistant; PDA), and a web page. The use of various monitor units is intending to meet different medical requirements for different medical personnel. This system was demonstrated to promote the mobility and flexibility for both the patients and the medical personnel, which further improves the quality of health care.

  12. Campus Area Network Wi-Fi Security

    Directory of Open Access Journals (Sweden)

    Arjun K. Pillay

    2017-07-01

    Full Text Available Wireless connectivity devices such as mobile phones and laptops are being increasingly used by University students to access learning resources on campus networks and the Internet. Each of the mobile devices offers security protocols for connection to a Wi-Fi router. This paper presents an overview of Wi-Fi security and recommendations in relation to free Wi-Fi service at The University of Fiji.

  13. DIY WiFi

    CERN Document Server

    Jungnickel, Katrina

    2013-01-01

    Who makes WiFi?Why do different makers matter?What do barbeques and backyards have to do with the internet?This book explores how WiFi is made from the ground up, or in this case from the backyard out. Forged around barbeques, made of found, adapted and off-the-shelf materials and installed in ordinary domestic spaces, this book documents the collective work of individuals committed to making 'Ournet not the internet'.Drawing on rich ethnographic material, Jungnickel's research on community WiFi networking provides an overdue account of the innovative digital cultures and practices of ordinary people making extra-ordinary things. What make-do methods, mods and tales of resourceful ingenuity permit is another way of seeing how technologies come into being. It brings to life an Australian version of WiFi, enriching global studies of wireless technology by signalling the potential of comparative studies. Critically, the book presents the first sustained study of homebrew high-tech backyard technologists who imbu...

  14. Data acquisition and meter unit based in wifi communication protocol

    Directory of Open Access Journals (Sweden)

    Gerardo Cázarez Ayala

    2012-05-01

    Full Text Available Without doubt, the competitive fast rhythm of the industries is one of the main causes helped bring to the accelerated growth of the electronic technology and the communication. The need to develop new products with a best quality, cheaper and faster as assure and increase the quality of the products in the international markets, requires of new technologies to the metering, monitoring and control of their production processes, of which finality is to improve the processes to guaranteed their products in the market in the less time possible, the best quality and low cost for the final consumer. This work is based in the design and implementation of a Wireless Data Acquisition Unit based in WiFi protocol, which is oriented to meter, monitoring and the control of processes in the industry, commercial and the home automation applications, using one of the wirelessprotocols with the biggest acceptance in the market, with the main objective of to take advantage of the installed physical infrastructure in the place of the application, like industry, company or house. The Unit is based in the RN-131G, a Roving Network company module, which is able to work in stand-alone mode with ultralow power consummation and supporting the IEEE 802.11b/g protocols, in which is possible to achieve transfer rates of up to 11 Mbps and 54 Mbps in /b & /g specifications respectively. Whit this unit is possible to meter up to 5 analogs signals with 14 bits precision and has include a temperature and relative humidity sensors. This unit can meter two digital signals and act mean two digitals outputs, and gas include an USB port for communication and programming tasks.

  15. A Wi-Fi Union Mechanism for Internet Advertising Reciprocal Platform in Microenterprises

    Directory of Open Access Journals (Sweden)

    Thi Thanh An Nguyen

    2017-07-01

    Full Text Available With the evolution of the Internet and smartphone devices, Internet advertising has become one of the most important methods for delivering promotional marketing messages to customers. However, the efficiency of Internet advertising for microenterprise is not very high, since Wi-Fi advertising—which is limited by a small router coverage area—is mainly used. Moreover, because of the lack of money, microenterprises have been using low-cost methods to promote their products. Thus, enhancing the effectiveness of Wi-Fi advertising, and solving the problem of cost and the range of the views are now an essential investigation in this study. In this paper, we propose a reciprocal model with Wi-Fi union mechanism for Internet advertising based on fog computing architecture to enhance the efficiency of advertisement, reduce the cost, and increase the range of the views for microenterprise by using the Internet. In particular, the system was built in advertisers’, publishers’, and consumers’ sides. In our system, we use contribution point (CP as an exchange value among the participants. Advertisers and publishers can get CP by helping the others in the system to promote their advertisements, increasing their CP by one unit. Similarly, advertisers and publishers can use their CP to ask for assistance from the others, decreasing their CP by one unit. The result shows that the system in a Wi-Fi union is easy to use, and advertisements can be seen by all customers who are using free Wi-Fi from the stores of the union. This method can solve the problem of cost and fixed consumer groups.

  16. Tracking Human Mobility Using WiFi Signals

    DEFF Research Database (Denmark)

    Sapiezynski, Piotr; Stopczynski, Arkadiusz; Gatej, Radu

    2015-01-01

    We study six months of human mobility data, including WiFi and GPS traces recorded with high temporal resolution, and find that time series of WiFi scans contain a strong latent location signal. In fact, due to inherent stability and low entropy of human mobility, it is possible to assign location...... to WiFi access points based on a very small number of GPS samples and then use these access points as location beacons. Using just one GPS observation per day per person allows us to estimate the location of, and subsequently use, WiFi access points to account for 80% of mobility across a population....... These results reveal a great opportunity for using ubiquitous WiFi routers for high-resolution outdoor positioning, but also significant privacy implications of such side-channel location tracking....

  17. 150 Mb/s wifi transmission over 50m large core diameter step index POF

    NARCIS (Netherlands)

    Shi, Y.; Nieto Munoz, M.; Okonkwo, C.M.; Boom, van den H.P.A.; Tangdiongga, E.; Koonen, A.M.J.

    2011-01-01

    We demonstrate successful transmission of WiFi signals over 50m step-index plastic optical fibre with 1mm core diameter employing an eye-safe resonant cavity light emitting diode and an avalanche photodetector. The EVM performance of 4.1% at signal data rate of 150Mb/s is achieved.

  18. Wi-Fi Coexistence with Duty Cycled LTE-U

    Directory of Open Access Journals (Sweden)

    Yimin Pang

    2017-01-01

    Full Text Available Coexistence of Wi-Fi and LTE-Unlicensed (LTE-U technologies has drawn significant concern in industry. In this paper, we investigate the Wi-Fi performance in the presence of duty cycle based LTE-U transmission on the same channel. More specifically, one LTE-U cell and one Wi-Fi basic service set (BSS coexist by allowing LTE-U devices to transmit their signals only in predetermined duty cycles. Wi-Fi stations, on the other hand, simply contend the shared channel using the distributed coordination function (DCF protocol without cooperation with the LTE-U system or prior knowledge about the duty cycle period or duty cycle of LTE-U transmission. We define the fairness of the above scheme as the difference between Wi-Fi performance loss ratio (considering a defined reference performance and the LTE-U duty cycle (or function of LTE-U duty cycle. Depending on the interference to noise ratio (INR being above or below −62 dbm, we classify the LTE-U interference as strong or weak and establish mathematical models accordingly. The average throughput and average service time of Wi-Fi are both formulated as functions of Wi-Fi and LTE-U system parameters using probability theory. Lastly, we use the Monte Carlo analysis to demonstrate the fairness of Wi-Fi and LTE-U air time sharing.

  19. Mapping of MAC Address with Moving WiFi Scanner

    Directory of Open Access Journals (Sweden)

    Arief Hidayat

    2017-10-01

    Full Text Available Recently, Wifi is one of the most useful technologies that can be used for detecting and counting MAC Address. This paper described using of WiFi scanner which carried out seven times circulated the bus. The method used WiFi and GPS are to counting MAC address as raw data from the pedestrian smartphone, bus passenger or WiFi devices near from the bus as long as the bus going around the route. There are seven processes to make map WiFi data.

  20. 3G Femto or 802.11g WiFi

    DEFF Research Database (Denmark)

    Jørgensen, Niels T.K.; Rodriguez Larrad, Ignacio; Elling, Jan

    2014-01-01

    In this paper HSPA Release 6 femto and IEEE 802.11g WiFi indoor data solutions are investigated from an end user perspective. Femto and WiFi access points are deployed at typical locations in an urban environment and end user performance is measured. Three key performance indicators (KPI) were...... defined - downlink and uplink user data rates, latency and mobile power consumption. These three KPIs are of high importance when choosing an indoor data solution. Our measurements show that the downlink and uplink data rates of the WiFi solution are significantly higher than femto data rates. Similarly...... active mode power consumption measurements. Based on our KPIs, the preferred indoor data solution today is WiFi. The deciding factor is the combined latency and power performance of the WiFi, where WiFi outperforms the femto....

  1. ESP8266 WI-FI MODULE FOR MONITORING SYSTEM APPLICATION

    OpenAIRE

    Tae-Gue Oh; Chung-Hyuk Yim; Gyu-Sik Kim

    2017-01-01

    The ESP8266 Wi-Fi module is a self-contained system-on-chip (SOC) with integrated TCP/IP protocol stacks that can give any microcontroller access to a Wi-Fi network. In this paper, the interface between the ESP8266 Wi-Fi module and arduino MCU is studied for monitoring system application. Through some experimental studies, we believe that the ESP8266 Wi-Fi module is very useful for monitoring system application.

  2. Inferring Stop-Locations from WiFi

    DEFF Research Database (Denmark)

    Wind, David Kofoed; Sapiezynski, Piotr; Furman, Magdalena Anna

    2016-01-01

    methods are based exclusively on WiFi data. We study two months of WiFi data collected every two minutes by a smartphone, and infer stop-locations in the form of labelled time-intervals. For this purpose, we investigate two algorithms, both of which scale to large datasets: a greedy approach to select...

  3. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  4. A campus-wide Wi-Fi service for CERN

    CERN Multimedia

    2016-01-01

    Improvements are coming to CERN’s Wi-Fi service as connectivity is improved in offices, restaurants and meeting rooms.   All Wi-Fi traffic will be routed via central controllers in CERN’s Computer Centre to provide a better managed service. (Image: Veronika McQuade/CERN) The IT department’s Communication Systems group has provided Wi-Fi connectivity at CERN for many years now but with a focus on meeting rooms, auditoriums and informal meeting places such as the restaurants. Although some buildings have Wi-Fi coverage in offices, most do not and CERN’s Wi-Fi service is lagging behind the demand driven by the growing number of tablets, lightweight laptops and other wireless-only devices. Furthermore, the current network infrastructure can’t cope with the many devices in the Main Auditorium during events such as the recent LIGO announcement and it often has difficulty handling the demand at Restaurant 1 during lunchtimes. The wireless access points d...

  5. Continuous Indoor Positioning Fusing WiFi, Smartphone Sensors and Landmarks.

    Science.gov (United States)

    Deng, Zhi-An; Wang, Guofeng; Qin, Danyang; Na, Zhenyu; Cui, Yang; Chen, Juan

    2016-09-05

    To exploit the complementary strengths of WiFi positioning, pedestrian dead reckoning (PDR), and landmarks, we propose a novel fusion approach based on an extended Kalman filter (EKF). For WiFi positioning, unlike previous fusion approaches setting measurement noise parameters empirically, we deploy a kernel density estimation-based model to adaptively measure the related measurement noise statistics. Furthermore, a trusted area of WiFi positioning defined by fusion results of previous step and WiFi signal outlier detection are exploited to reduce computational cost and improve WiFi positioning accuracy. For PDR, we integrate a gyroscope, an accelerometer, and a magnetometer to determine the user heading based on another EKF model. To reduce accumulation error of PDR and enable continuous indoor positioning, not only the positioning results but also the heading estimations are recalibrated by indoor landmarks. Experimental results in a realistic indoor environment show that the proposed fusion approach achieves substantial positioning accuracy improvement than individual positioning approaches including PDR and WiFi positioning.

  6. Security of Mobile Devices and Wi-Fi Networks

    OpenAIRE

    Hong, Zimeng

    2015-01-01

    Along with the progress of times and the development of science and technology, mobile devices have become more and more popular. At the same time, an increasing number of Wi-Fi networks are being built for the demand of mobile devices. Therefore, the security between mobile devices and Wi-Fi networks became a main object in the IT area. The purpose of the thesis is to analyze security threats and give relative advises for all the mobile device and Wi-Fi network users. The thesis mainly ta...

  7. Tracking Human Mobility Using WiFi Signals

    DEFF Research Database (Denmark)

    Sapiezynski, Piotr; Stopczynski, Arkadiusz; Gatej, Radu

    2015-01-01

    to WiFi access points based on a very small number of GPS samples and then use these access points as location beacons. Using just one GPS observation per day per person allows us to estimate the location of, and subsequently use, WiFi access points to account for 80% of mobility across a population...

  8. State-of-the-art assessment of requirements for attachments of WiFi equipments to electric utility facilities

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2009-07-01

    Electric utilities are receiving a growing number of requests to attach WiFi equipment to their systems. However, many utilities are not prepared to meet these requests because they have not had enough time to formally review and comment on the particular issues associated with Wi-Fi attachments. Although electric utilities are required to allow the attachments, there is no uniform standard to govern those attachments. This paper discussed the state-of-the-art philosophies and requirements of electric utilities who have allowed WiFi equipment on their systems. The advantages and limitations of each philosophy or practice were also discussed. The requirements for codes and standards in the United States and Canada for high voltage construction were also evaluated.

  9. Voice over IP in the WiFi Network business models: Will voice be a killer application for WiFi Public Networks?

    OpenAIRE

    Infante, Jorge; Bellalta, Boris

    2013-01-01

    The stunning growth of WiFi networks, together with the spreading of mobile telephony and the increasing use of Voice over IP (VoIP) on top of Internet, pose relevant questions on the application of WiFi networks to support VoIP services that could be used as a complement and/or competition to the 2G/3G cellular networks. The paper explores the state of the art on the capability of WiFi networks to support voice services in a user itinerant context, identifying actual and future strengths, we...

  10. Exposure to radiofrequency electromagnetic fields from Wi-Fi in Australian schools

    International Nuclear Information System (INIS)

    Karipidis, Ken; Henderson, Stuart; Wijayasinghe, Don; Tjong, Lydiawati; Tinker, Rick

    2017-01-01

    The increasing use of Wi-Fi in schools and other places has given rise to public concern that the radiofrequency (RF) electromagnetic fields from Wi-Fi have the potential to adversely affect children. The current study measured typical and peak RF levels from Wi-Fi and other sources in 23 schools in Australia. All of the RF measurements were much lower than the reference levels recommended by international guidelines for protection against established health effects. The typical and peak RF levels from Wi-Fi in locations occupied by children in the classroom were of the order of 10 4 and 10 2 % of the exposure guidelines, respectively. Typical RF levels in the classroom were similar between Wi-Fi and radio but higher than other sources. In the school yard typical RF levels were higher for radio, TV and mobile phone base stations compared to Wi-Fi. The results of this study showed that the typical RF exposure of children from Wi-Fi at school is very low and comparable or lower to other sources in the environment. (authors)

  11. Continuous Indoor Positioning Fusing WiFi, Smartphone Sensors and Landmarks

    Directory of Open Access Journals (Sweden)

    Zhi-An Deng

    2016-09-01

    Full Text Available To exploit the complementary strengths of WiFi positioning, pedestrian dead reckoning (PDR, and landmarks, we propose a novel fusion approach based on an extended Kalman filter (EKF. For WiFi positioning, unlike previous fusion approaches setting measurement noise parameters empirically, we deploy a kernel density estimation-based model to adaptively measure the related measurement noise statistics. Furthermore, a trusted area of WiFi positioning defined by fusion results of previous step and WiFi signal outlier detection are exploited to reduce computational cost and improve WiFi positioning accuracy. For PDR, we integrate a gyroscope, an accelerometer, and a magnetometer to determine the user heading based on another EKF model. To reduce accumulation error of PDR and enable continuous indoor positioning, not only the positioning results but also the heading estimations are recalibrated by indoor landmarks. Experimental results in a realistic indoor environment show that the proposed fusion approach achieves substantial positioning accuracy improvement than individual positioning approaches including PDR and WiFi positioning.

  12. Community Based Networks and 5G Wi-Fi

    DEFF Research Database (Denmark)

    Williams, Idongesit

    2018-01-01

    This paper argues on why Community Based Networks should be recognized as potential 5G providers using 5G Wi-Fi. The argument is hinged on findings in a research to understand why Community Based Networks deploy telecom and Broadband infrastructure. The study was a qualitative study carried out...... inductively using Grounded Theory. Six cases were investigated. Two Community Based Network Mobilization Models were identified. The findings indicate that 5G Wi-Fi deployment by Community Based Networks is possible if policy initiatives and the 5G Wi-Fi standards are developed to facilitate the causal...

  13. EVALUASI APLIKASI EXPLOID WIFI DI TINGKAT AVAILABILITY DAN VULNERABILITY

    Directory of Open Access Journals (Sweden)

    Timur Dali Purwanto

    2017-11-01

    Full Text Available Pada sistem jaringan wireless sering terjadi masalah yaitu salah satunya keamanan wifi yang menggunakan keamanan WPA, WPA2, dan WEP yang ditinjau dari vulneravility. Karena teknologi  wireless memanfaatkan frekwensi tinggi untuk menghantarkan sebuah komunikasi, maka kerentanan terhadap keamanan juga lebih tinggi dibanding dengan teknologi komunikasi yang lainnya. Sekarang ini sudah banyak tool aplikasi exploit wifi yang di gunakan oleh hacker atau attacker salah satunya tool Reaver dan tool Aircrack dalam system operasi kali linux, dari kedua tool tersebut peneliti ingin mencari perbandingan dari tingkat availability. Karena kedua tool tersebut menrut peneliti adalah tool yang terbaik saat ini. Dalam penelitian ini parameter yang akan di ukur adalah seberapa capat waktu ackes ke jaringan wifi, seberapa cepat menembus keamanan wifi, dan berapa besaran biter yang di dapat. Dari hasil penelitian dan uji coba maka di simpulkan bahwa untuk segi kecepatan aircrack yang lebih cepat untuk memecah password karena bruteforce dengan wordlist, reaver langsung scanning password wifi namun memakan waktu sangat lama hampir 13 jam untuk waktu terlama   Kata kunci:  Tool Reaver dan Aircrack, Avability dan vurnability bruteforce, wordlist

  14. Ubiquity of Wi-Fi: Crowdsensing Properties for Urban Fingerprint Positioning

    Directory of Open Access Journals (Sweden)

    LECA, C. L.

    2017-11-01

    Full Text Available Positioning systems based on location fingerprinting have become an area of intense research, mainly with the aim of providing indoor localization. Many challenges arise when trying to deploy location fingerprinting to an outdoor environment. The main problem is achieving coverage of large outdoor spaces, which needs an intensive data gathering effort. This paper proposes the use of mobile crowdsensing in order to build a fingerprint database consisting of Wi-Fi networks received signal strength measurements. Mobile crowdsensing is represented by the usage of smart-phones equipped with GPS and Wi-Fi sensors for the collection of fingerprints. The primary objective of this work is to prove the feasibility of urban positioning using Wi-Fi crowdsensed data by showing that Wi-Fi networks are ubiquitous in urban areas. We then examine the gathered data and report our findings on challenges in building and maintaining a large-scale fingerprint database, the influence of the data collection method on the Wi-Fi data and the influence of fading on measurements. As Wi-Fi access-points are shown to exhibit mobility, we also propose and analyze methods for detecting and classification of mobile and static access-points.

  15. Geomagnetism-Aided Indoor Wi-Fi Radio-Map Construction via Smartphone Crowdsourcing.

    Science.gov (United States)

    Li, Wen; Wei, Dongyan; Lai, Qifeng; Li, Xianghong; Yuan, Hong

    2018-05-08

    Wi-Fi radio-map construction is an important phase in indoor fingerprint localization systems. Traditional methods for Wi-Fi radio-map construction have the problems of being time-consuming and labor-intensive. In this paper, an indoor Wi-Fi radio-map construction method is proposed which utilizes crowdsourcing data contributed by smartphone users. We draw indoor pathway map and construct Wi-Fi radio-map without requiring manual site survey, exact floor layout and extra infrastructure support. The key novelty is that it recognizes road segments from crowdsourcing traces by a cluster based on magnetism sequence similarity and constructs an indoor pathway map with Wi-Fi signal strengths annotated on. Through experiments in real world indoor areas, the method is proved to have good performance on magnetism similarity calculation, road segment clustering and pathway map construction. The Wi-Fi radio maps constructed by crowdsourcing data are validated to provide competitive indoor localization accuracy.

  16. An Improved Neural Network Training Algorithm for Wi-Fi Fingerprinting Positioning

    Directory of Open Access Journals (Sweden)

    Esmond Mok

    2013-09-01

    Full Text Available Ubiquitous positioning provides continuous positional information in both indoor and outdoor environments for a wide spectrum of location based service (LBS applications. With the rapid development of the low-cost and high speed data communication, Wi-Fi networks in many metropolitan cities, strength of signals propagated from the Wi-Fi access points (APs namely received signal strength (RSS have been cleverly adopted for indoor positioning. In this paper, a Wi-Fi positioning algorithm based on neural network modeling of Wi-Fi signal patterns is proposed. This algorithm is based on the correlation between the initial parameter setting for neural network training and output of the mean square error to obtain better modeling of the nonlinear highly complex Wi-Fi signal power propagation surface. The test results show that this neural network based data processing algorithm can significantly improve the neural network training surface to achieve the highest possible accuracy of the Wi-Fi fingerprinting positioning method.

  17. Geomagnetism-Aided Indoor Wi-Fi Radio-Map Construction via Smartphone Crowdsourcing

    Directory of Open Access Journals (Sweden)

    Wen Li

    2018-05-01

    Full Text Available Wi-Fi radio-map construction is an important phase in indoor fingerprint localization systems. Traditional methods for Wi-Fi radio-map construction have the problems of being time-consuming and labor-intensive. In this paper, an indoor Wi-Fi radio-map construction method is proposed which utilizes crowdsourcing data contributed by smartphone users. We draw indoor pathway map and construct Wi-Fi radio-map without requiring manual site survey, exact floor layout and extra infrastructure support. The key novelty is that it recognizes road segments from crowdsourcing traces by a cluster based on magnetism sequence similarity and constructs an indoor pathway map with Wi-Fi signal strengths annotated on. Through experiments in real world indoor areas, the method is proved to have good performance on magnetism similarity calculation, road segment clustering and pathway map construction. The Wi-Fi radio maps constructed by crowdsourcing data are validated to provide competitive indoor localization accuracy.

  18. Evil-twin framework: a Wi-Fi intrusion testing framework for pentesters

    OpenAIRE

    Esser, André

    2017-01-01

    In today’s world there is no scarcity of Wi-Fi hotspots. Although users are always recommended to join protected networks to ensure they are secure, this is by far not their only concern. The convenience of easily connecting to a Wi-Fi hotspot has left security holes wide open for attackers to abuse. This stresses the concern about the lack of security on the client side of Wi-Fi capable technologies. The Wi-Fi communications security has been a concern since it was first deplo...

  19. Streaming Multimedia via Overlay Networks using Wi-Fi Peer-to-Peer Connections

    DEFF Research Database (Denmark)

    Poderys, Justas; Soler, José

    2017-01-01

    Short range ad-hoc wireless networks can be used to deliver streaming multimedia for information, entertainment and advertisement purposes. To enable short-range communication between various devices, the Wi-Fi Alliance proposed an extension to the IEEE802.11 Wi-Fi standard called Wi-Fi Peer......-to-Peer (P2P). It allows compliant devices to form ad-hoc communication groups without interrupting conventional access point-based Wi-Fi communication. This paper proposes to use Wi-Fi P2P connectivity to distribute streaming multimedia in ah-hoc formed user groups. The exchange of multimedia data...... is performed by forming an overlay network using Peer-to-Peer Streaming Peer Protocol (PPSPP). In order to make PPSPP function over WiFi P2P connections, this paper proposes a number of changes to the protocol. The performance of the proposed system is evaluated using a computer networks emulator...

  20. Applied research of embedded WiFi technology in the motion capture system

    Science.gov (United States)

    Gui, Haixia

    2012-04-01

    Embedded wireless WiFi technology is one of the current wireless hot spots in network applications. This paper firstly introduces the definition and characteristics of WiFi. With the advantages of WiFi such as using no wiring, simple operation and stable transmission, this paper then gives a system design for the application of embedded wireless WiFi technology in the motion capture system. Also, it verifies the effectiveness of design in the WiFi-based wireless sensor hardware and software program.

  1. FeltRadio – Experiencing Community-generated WiFi Activities

    DEFF Research Database (Denmark)

    Fritsch, Jonas; Gronvall, Erik

    2016-01-01

    FeltRadio is a portable technology for sensing WiFi through sensorial augmentation and Electric Muscle Stimulation (EMS). The technology enables its wearer to sensorially engage with the radio waves and WiFi activities that have become an integrated part of our everyday lives. The sensorial...... engagement changes people’s experience of WiFi activities, and allows them to participate in wireless communication infrastructures in novel ways. This is both an immediately embodied activity as it is a new form of social awareness. In this paper, we briefly present the FeltRadio technology and show how...

  2. Improving Wi-Fi Based Indoor Positioning Using Bluetooth Add-Ons

    DEFF Research Database (Denmark)

    Baniukevic, Artur; Sabonis, Dovydas; Jensen, Christian S.

    2011-01-01

    enabling indoor LBSs. Existing indoor positioning services typically use a single technology such as Wi-Fi, RFID or Bluetooth. Wi-Fi based indoor positioning is relatively easy to deploy, but does often not offer good positioning accuracy. In contrast, the use of RFID or Bluetooth for positioning requires...... considerable investments in equipment in order to ensure good positioning accuracy. Motivated by these observations, we propose a hybrid approach to indoor positioning. In particular, we introduce Bluetooth hotspots into an indoor space with an existing Wi-Fi infrastructure such that better positioning...

  3. Low-effort place recognition with WiFi fingerprints using deep learning

    OpenAIRE

    Nowicki, Michał; Wietrzykowski, Jan

    2016-01-01

    Using WiFi signals for indoor localization is the main localization modality of the existing personal indoor localization systems operating on mobile devices. WiFi fingerprinting is also used for mobile robots, as WiFi signals are usually available indoors and can provide rough initial position estimate or can be used together with other positioning systems. Currently, the best solutions rely on filtering, manual data analysis, and time-consuming parameter tuning to achieve reliable and accur...

  4. Coordinated Dynamic Spectrum Management of LTE-U and Wi-Fi Networks

    OpenAIRE

    Sagari, Shweta; Baysting, Samuel; Saha, Dola; Seskar, Ivan; Trappe, Wade; Raychaudhuri, Dipankar

    2015-01-01

    This paper investigates the co-existence of Wi-Fi and LTE in emerging unlicensed frequency bands which are intended to accommodate multiple radio access technologies. Wi-Fi and LTE are the two most prominent access technologies being deployed today, motivating further study of the inter-system interference arising in such shared spectrum scenarios as well as possible techniques for enabling improved co-existence. An analytical model for evaluating the baseline performance of co-existing Wi-Fi...

  5. Putting 'Local' Back into Public Wifi Hotspots

    DEFF Research Database (Denmark)

    Korn, Matthias; Klokmose, Clemens Nylandsted

    2012-01-01

    Public Wifi hotspots in cafes and public places are based on wireless local area network technology (WLAN). In contrast to the common understanding of connecting directly to the internet when connecting to a Wifi hotspot, we are proposing to bring the original notion of connecting to a local...... hotspot in cafes, bars, community centers, and other (semi-)public places in order to facilitate co-located activities for such varied purposes as fostering local community, civic participation, sociality in general, and entertainment. We propose a network locality that builds on local infrastructure...

  6. Evaluating Wi-Fi indoor positioning approaches in a real world environment

    OpenAIRE

    Hantoush, Raafat

    2016-01-01

    Global positioning system(GPS) does not provide generally a good positioning performance in an indoor location because of many reasons (Henniges, 2012). On the other hand, other alternatives such as the WI-FI technology has become recently in a popular use to provide indoor localization. And that is due to many reasons, such as the wide spread of WI-FI infrastructure in the indoor environments and the low cost of this technology. This study attempts to evaluate different WI-FI indoor position...

  7. Passive WiFi monitoring of the rhythm of the campus

    NARCIS (Netherlands)

    Kalogianni, E.; Sileryte, R.; Lam, M.; Zhou, K.; Van der Ham, M.; Van der Spek, S.C.; Verbree, E.

    2015-01-01

    Within this research-driven project, passive WiFi monitoring of WiFi enabled devices was used to detect users (students, employees, visitors) of buildings at the campus of Delft University of Technology to gain insight into the Rhythm of the Campus: the occupation, duration of stay and moving

  8. The role of regulation in preventing Wi-Fi over-congestion in densely populated areas

    NARCIS (Netherlands)

    Hartog, F.T.H. den; Nijs, J.M.M. de

    2017-01-01

    Given the ever increasing number of Wi-Fi devices in use by the public, the progressing urbanisation, and the current attempts by the industry to improve Wi-Fi system performance, we here analyse the case of apartment blocks with residents increasingly suffering from Wi-Fi over-congestion. Here,

  9. Maritime super Wi-Fi coverage based on TVWS

    Science.gov (United States)

    Ren, Jia; Chen, Baodan; Zhang, Yonghui; Huang, Fang

    2014-10-01

    After analyzing the occupancy and characteristics of television white space (TVWS), this paper proposes wireless broadband networking by using super Wi-Fi technology in maritime environment operating on TVWS. A sea surface channel model is developed for predicting maritime network coverage of super Wi-Fi technology. This channel model is based on Irregular Terrain Methodology (ITM) model with revised parameters and dual-path propagation effect. The simulations demonstrated that the sea surface channel model can accurately reflect the transmission loss of radio wave in TVWS.

  10. Inferring Person-to-person Proximity Using WiFi Signals

    DEFF Research Database (Denmark)

    Sapiezynski, Piotr; Stopczynski, Arkadiusz; Wind, David Kofoed

    2017-01-01

    phone towers, Bluetooth beacons, and WiFi networks as proxies for location. However, while mobility is an important aspect of human behavior, understanding complex social systems requires studying not only the movement of individuals, but also their interactions. Sensing social interactions on a large...... scale is a technical challenge and many commonly used approaches—including RFID badges or Bluetooth scanning—offer only limited scalability. Here we show that it is possible, in a scalable and robust way, to accurately infer person-to-person physical proximity from the lists of WiFi access points...... measured by smartphones carried by the two individuals. Based on a longitudinal dataset of approximately 800 participants with ground-truth interactions collected over a year, we show that our model performs better than the current state-of-the-art. Our results demonstrate the value of WiFi signals...

  11. An Indoor Continuous Positioning Algorithm on the Move by Fusing Sensors and Wi-Fi on Smartphones.

    Science.gov (United States)

    Li, Huaiyu; Chen, Xiuwan; Jing, Guifei; Wang, Yuan; Cao, Yanfeng; Li, Fei; Zhang, Xinlong; Xiao, Han

    2015-12-11

    Wi-Fi indoor positioning algorithms experience large positioning error and low stability when continuously positioning terminals that are on the move. This paper proposes a novel indoor continuous positioning algorithm that is on the move, fusing sensors and Wi-Fi on smartphones. The main innovative points include an improved Wi-Fi positioning algorithm and a novel positioning fusion algorithm named the Trust Chain Positioning Fusion (TCPF) algorithm. The improved Wi-Fi positioning algorithm was designed based on the properties of Wi-Fi signals on the move, which are found in a novel "quasi-dynamic" Wi-Fi signal experiment. The TCPF algorithm is proposed to realize the "process-level" fusion of Wi-Fi and Pedestrians Dead Reckoning (PDR) positioning, including three parts: trusted point determination, trust state and positioning fusion algorithm. An experiment is carried out for verification in a typical indoor environment, and the average positioning error on the move is 1.36 m, a decrease of 28.8% compared to an existing algorithm. The results show that the proposed algorithm can effectively reduce the influence caused by the unstable Wi-Fi signals, and improve the accuracy and stability of indoor continuous positioning on the move.

  12. On the Tradeoff between Performance and Programmability for Software Defined WiFi Networks

    Directory of Open Access Journals (Sweden)

    Tausif Zahid

    2018-01-01

    Full Text Available WiFi has become one of the major network access networks due to its simple technical implementation and high-bandwidth provisioning. In this paper, we studied software defined WiFi networks (SDWN against traditional WiFi networks to understand the potential benefits, such as the ability of SDWN to effectively hide the handover delay between access points (AP of the adoption of the SDWN architecture on WiFi networks and identify representative application scenarios where such SDWN approach could bring additional benefits. This study delineated the performance bottlenecks such as the throughput degradation by around 50% compared with the conventional WiFi networks. In addition, our study also shed some insights into performance optimization issues. All of the performance measurements were conducted on a network testbed consisting of a single basic service set (BSS and an extended service set (ESS managed by a single SDN controller deployed with various laboratory settings. Our evaluation included the throughput performance under different traffic loads with different number of nodes and packet sizes for both TCP and UDP traffic flows. Handover delays were measured during the roaming phase between different APs against the traditional WiFi networks. Our results have demonstrated the tradeoff between performance and programmability of software defined APs.

  13. The genesis of WiFi and its applications

    CERN Multimedia

    CERN. Geneva

    2008-01-01

    In 1985 changes to US regulations caused a paradigm shift by permitting the use of radio spectrum for devices that did not need to have an end-user license. After a few years, products appeared on the market and a group developed a standard for broadband wireless communications among computers. The presentation will explain how the standard developed and was adopted by the Wi-Fi Alliance, as well as the global harmonization and expansion of the available radio spectrum to over half a GHz. The success of Wi-Fi and user innovation and initiatives makes it a vehicle to bring broadband internet to rural areas both in developing as well as in developed countries. Vic Hayes is a Senior Research Fellow at the Delft University of Technology and is writing a book titled "The genesis of Wi-Fi and the road toward global success". He holds a BSEE and joined NCR in the Netherlands in 1974. He co-established and chaired the IEEE 802.11 Standards Working Group for Wireless Local Area Networks and became known as the "Fathe...

  14. WIRELESS FIDELITY (Wi-Fi) BROADBAND NETWORK ...

    African Journals Online (AJOL)

    ES Obe

    broadband speed and coverage, while Wi-Fi can be integrated with WiMAX networks to provide Internet ... Microwave Access (WiMAX), IEEE 802.11 standards. 1.0 INTRODUCTION .... These 2G systems provided circuit- switched data ...

  15. Influence of smartphone Wi-Fi signals on adipose-derived stem cells.

    Science.gov (United States)

    Lee, Sang-Soon; Kim, Hyung-Rok; Kim, Min-Sook; Park, Sanghoon; Yoon, Eul-Sik; Park, Seung-Ha; Kim, Deok-Woo

    2014-09-01

    The use of smartphones is expanding rapidly around the world, thus raising the concern of possible harmful effects of radiofrequency generated by smartphones. We hypothesized that Wi-Fi signals from smartphones may have harmful influence on adipose-derived stem cells (ASCs). An in vitro study was performed to assess the influence of Wi-Fi signals from smartphones. The ASCs were incubated under a smartphone connected to a Wi-Fi network, which was uploading files at a speed of 4.8 Mbps for 10 hours a day, for a total of 5 days. We constructed 2 kinds of control cells, one grown in 37°C and the other grown in 39°C. After 5 days of Wi-Fi exposure from the smartphone, the cells underwent cell proliferation assay, apoptosis assay, and flow cytometry analysis. Three growth factors, vascular endothelial growth factor, hepatocyte growth factor, and transforming growth factor-β, were measured from ASC-conditioned media. Cell proliferation rate was higher in Wi-Fi-exposed cells and 39°C control cells compared with 37°C control cells. Apoptosis assay, flow cytometry analysis, and growth factor concentrations showed no remarkable differences among the 3 groups. We could not find any harmful effects of Wi-Fi electromagnetic signals from smartphones. The increased proliferation of ASCs under the smartphone, however, might be attributable to the thermal effect.

  16. Indoor positioning using differential Wi-Fi lateration

    Science.gov (United States)

    Retscher, Guenther; Tatschl, Thomas

    2017-12-01

    For Wi-Fi positioning usually location fingerprinting or (tri)lateration are employed whereby the received signal strengths (RSSs) of the surrounding Wi-Fi Access Points (APs) are scanned on the mobile devices and used to perform localization. Within the scope of this study, the position of a mobile user is determined on the basis of lateration. Two new differential approaches are developed and compared to two common models, i.e., the one-slope and multi-wall model, for the conversion of the measured RSS of the Wi-Fi signals into ranges. The two novel methods are termed DWi-Fi as they are derived either from the well-known DGPS or VLBI positioning principles. They make use of a network of reference stations deployed in the area of interest. From continuous RSS observations on these reference stations correction parameters are derived and applied by the user in real-time. This approach leads to a reduced influence of temporal and spatial variations and various propagation effects on the positioning result. In practical use cases conducted in a multi-storey office building with three different smartphones, it is proven that the two DWi-Fi approaches outperform the common models as static positioning yielded to position errors of about 5 m in average under good spatial conditions.

  17. An Indoor Continuous Positioning Algorithm on the Move by Fusing Sensors and Wi-Fi on Smartphones

    Directory of Open Access Journals (Sweden)

    Huaiyu Li

    2015-12-01

    Full Text Available Wi-Fi indoor positioning algorithms experience large positioning error and low stability when continuously positioning terminals that are on the move. This paper proposes a novel indoor continuous positioning algorithm that is on the move, fusing sensors and Wi-Fi on smartphones. The main innovative points include an improved Wi-Fi positioning algorithm and a novel positioning fusion algorithm named the Trust Chain Positioning Fusion (TCPF algorithm. The improved Wi-Fi positioning algorithm was designed based on the properties of Wi-Fi signals on the move, which are found in a novel “quasi-dynamic” Wi-Fi signal experiment. The TCPF algorithm is proposed to realize the “process-level” fusion of Wi-Fi and Pedestrians Dead Reckoning (PDR positioning, including three parts: trusted point determination, trust state and positioning fusion algorithm. An experiment is carried out for verification in a typical indoor environment, and the average positioning error on the move is 1.36 m, a decrease of 28.8% compared to an existing algorithm. The results show that the proposed algorithm can effectively reduce the influence caused by the unstable Wi-Fi signals, and improve the accuracy and stability of indoor continuous positioning on the move.

  18. Cascading Denial of Service Attacks on Wi-Fi Networks

    OpenAIRE

    Xin, Liangxiao; Starobinski, David; Noubir, Guevara

    2016-01-01

    We unveil the existence of a vulnerability in Wi-Fi, which allows an adversary to remotely launch a Denial-of-Service (DoS) attack that propagates both in time and space. This vulnerability stems from a coupling effect induced by hidden nodes. Cascading DoS attacks can congest an entire network and do not require the adversary to violate any protocol. We demonstrate the feasibility of such attacks through experiments with real Wi-Fi cards, extensive ns-3 simulations, and theoretical analysis....

  19. PILA: Sub-Meter Localization Using CSI from Commodity Wi-Fi Devices.

    Science.gov (United States)

    Tian, Zengshan; Li, Ze; Zhou, Mu; Jin, Yue; Wu, Zipeng

    2016-10-10

    The aim of this paper is to present a new indoor localization approach by employing the Angle-of-arrival (AOA) and Received Signal Strength (RSS) measurements in Wi-Fi network. To achieve this goal, we first collect the Channel State Information (CSI) by using the commodity Wi-Fi devices with our designed three antennas to estimate the AOA of Wi-Fi signal. Second, we propose a direct path identification algorithm to obtain the direct signal path for the sake of reducing the interference of multipath effect on the AOA estimation. Third, we construct a new objective function to solve the localization problem by integrating the AOA and RSS information. Although the localization problem is non-convex, we use the Second-order Cone Programming (SOCP) relaxation approach to transform it into a convex problem. Finally, the effectiveness of our approach is verified based on the prototype implementation by using the commodity Wi-Fi devices. The experimental results show that our approach can achieve the median error 0.7 m in the actual indoor environment.

  20. Do Leadership Style, Unit Climate, and Safety Climate Contribute to Safe Medication Practices?

    Science.gov (United States)

    Farag, Amany; Tullai-McGuinness, Susan; Anthony, Mary K; Burant, Christopher

    2017-01-01

    This study aims at: examining if leadership style and unit climate predict safety climate; and testing the direct, indirect, and total effect of leadership style, unit climate, and safety climate on nurses' safe medication practices. The Institute of Medicine and nursing scholars propose that safety climate is a prerequisite to safety practices. However, there is limited empirical evidence about factors contributing to the development of safety climate and about the association with nurses' safe medication practices. This cross-sectional study used survey data from 246 RNs working in a Magnet® hospital. Leadership style and unit climate predicted 20% to 50% of variance on all safety climate dimensions. Model testing revealed the indirect impact of leadership style and unit climate on nurses' safe medication practices. Our hypothesized model explained small amount of the variance on nurses' safe medication practices. This finding suggests that nurses' safe medication practices are influenced by multiple contextual and personal factors that should be further examined.

  1. Creating wi-fi bluetooth mesh network for crisis management applications

    Science.gov (United States)

    Al-Tekreeti, Safa; Adams, Christopher; Al-Jawad, Naseer

    2010-04-01

    This paper proposes a wireless mesh network implementation consisting of both Wi-Fi Ad-Hoc networks as well as Bluetooth Piconet/Scatternet networks, organised in an energy and throughput efficient structure. This type of networks can be easily constructed for Crises management applications, for example in an Earthquake disaster. The motivation of this research is to form mesh network from the mass availability of WiFi and Bluetooth enabled electronic devices such as mobile phones and PC's that are normally present in most regions were major crises occurs. The target of this study is to achieve an effective solution that will enable Wi-Fi and/or Bluetooth nodes to seamlessly configure themselves to act as a bridge between their own network and that of the other network to achieve continuous routing for our proposed mesh networks.

  2. WiFi Is on the Way

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    WiFi mobile phones soon may get a nod of approval from China’s telecom industry regulator At present, China’s telecom regulator prohibits phone calls made via the Internet or the browsing of Web pages via a mobile phone in wire-

  3. A comparative analysis of Indoor WiFi Positioning at a large building complex

    DEFF Research Database (Denmark)

    Mathisen, Andreas; Krogh, Søren; Stisen, Allan

    2016-01-01

    Indoor Positioning based on WiFi has received extensive focus from research communities, owing its promises of ubiquitous positioning indoors for a variety of applications. The majority of the existing research on WiFi positioning centers around the improvement of positioning accuracy. However...... are in daily use. The positioning methods covered utilizes received signal strength from existing WiFi infrastructure to ease deployment and maintenance. We identify meaningful key metrics which describe different aspects of the methods’ performance. Using these metrics, we furthermore report on experiences...

  4. ZIL: An Energy-Efficient Indoor Localization System Using ZigBee Radio to Detect WiFi Fingerprints

    OpenAIRE

    Niu, Jianwei; Wang, Bowei; Shu, Lei; Duong, Trung Q.; Chen, Yuanfang

    2015-01-01

    In existing WiFi-based localization methods, smart mobile devices consume quite a lot of power as WiFi interfaces need to be used for frequent AP scanning during the localization process. In this work, we design an energy-efficient indoor localization system called ZigBee assisted indoor localization (ZIL) based on WiFi fingerprints via ZigBee interference signatures. ZIL uses ZigBee interfaces to collect mixed WiFi signals, which include non-periodic WiFi data and periodic beacon signals. Ho...

  5. SenSafe: A Smartphone-Based Traffic Safety Framework by Sensing Vehicle and Pedestrian Behaviors

    Directory of Open Access Journals (Sweden)

    Zhenyu Liu

    2016-01-01

    Full Text Available Traffic accident involving vehicles is one of the most serious problems in the transportation system nowadays. How to detect dangerous steering and then alarm drivers in real time is a problem. What is more, walking while using smartphones makes pedestrian more susceptible to various risks. Although dedicated short range communication (DSRC provides the way for safety communications, most of vehicles have not been deployed with DSRC components. Even worse, DSRC is not supported by the smartphones for vehicle-to-pedestrian (V2P communication. In this paper, a smartphone-based framework named SenSafe is developed to improve the traffic safety. SenSafe is a framework which only utilizes the smartphone to sense the surrounding events and provides alerts to drivers. Smartphone-based driving behaviors detection mechanism is developed inside the framework to discover various steering behaviors. Besides, the Wi-Fi association and authentication overhead is reduced to broadcast the compressed sensing data using the Wi-Fi beacon to inform the drivers of the surroundings. Furthermore, a collision estimation algorithm is designed to issue appropriate warnings. Finally, an Android-based implementation of SenSafe framework has been achieved to demonstrate the application reliability in real environments.

  6. Energy Modeling of IoT Mobile Terminals on WiFi Environmental Impacts †.

    Science.gov (United States)

    Sun, Yuxia; Chen, Junxian; Tang, Yong; Chen, Yanjia

    2018-05-28

    With the popularity of various IoT mobile terminals such as mobile phones and sensors, the energy problems of IoT mobile terminals have attracted increasingly more attention. In this paper, we explore the impacts of some important factors of WiFi environments on the energy consumption of mobile phones, which are typical IoT end devices. The factors involve the WiFi signal strength under good signal conditions, the type and the amount of protocol packets that are initiated by WiFi APs (Access Points) to maintain basic network communication with the phones. Controlled experiments are conducted to quantitatively study the phone energy impacts by the above WiFi environmental factors. To describe such impacts, we construct a time-based signal strength-aware energy model and packet type/amount-aware energy models. The models constructed in the paper corroborate the following user experience on phone energy consumption: (1) a phone's energy is drawn faster under higher WiFi signal strengths than under lower ones even in normal signal conditions; (2) phones consume energy faster in a public WiFi network than in a private one even in the basic phone state. The energy modeling methods proposed in the paper enable ordinary developers to analyze phone energy draw conveniently by utilizing inexpensive power meters as measurement tools. The modeling methods are general and are able to be used for phones of any type and any platform.

  7. Enhancing Teaching and Learning Wi-Fi Networking Using Limited Resources to Undergraduates

    Science.gov (United States)

    Sarkar, Nurul I.

    2013-01-01

    Motivating students to learn Wi-Fi (wireless fidelity) wireless networking to undergraduate students is often difficult because many students find the subject rather technical and abstract when presented in traditional lecture format. This paper focuses on the teaching and learning aspects of Wi-Fi networking using limited hardware resources. It…

  8. Cognitive radio-based transmission energy management in Wi-Fi nodes

    CSIR Research Space (South Africa)

    Olwal, TO

    2012-10-01

    Full Text Available -services. To solve such problems, in part, this study addresses the transmission energy management in Wi-Fi networks. Figure 1: Internet needs of rural communities PROPOSAL A cognitive radio-based transmission energy management (CR-TEM) solution for Wi... is incorporated into the Wi-Fi device to monitor the operation environments. Based on the environmental data, the transmission energy is adaptively adjusted until optimal conditions are achieved. Figure 2 illustrates the fundamentals of the cognitive radio...

  9. Wi-Fi Service enhancement at CERN

    Science.gov (United States)

    Ducret, V.; Sosnowski, A.; Gonzalez Caballero, B.; Barrand, Q.

    2017-10-01

    Since the early 2000’s, the number of mobile devices connected to CERN’s internal network has increased from just a handful to well over 10,000. Wireless access is no longer simply “nice to have” or just for conference and meeting rooms; support for mobility is expected by most, if not all, of the CERN community. In this context, a full renewal of the CERN Wi-Fi network has been launched to deliver a state-of-the-art campus-wide Wi-Fi Infrastructure. We aim to deliver, in more than 200 office buildings with a surface area of over 400,000m2 and including many high-priority and high-occupation zones, an end-user experience comparable, for most applications, to a wired connection and with seamless mobility support. We describe here the studies and tests performed at CERN to ensure the solution we are deploying can meet these goals as well as delivering a single, simple, flexible and open management platform.

  10. WiFi networks and malware epidemiology.

    Science.gov (United States)

    Hu, Hao; Myers, Steven; Colizza, Vittoria; Vespignani, Alessandro

    2009-02-03

    In densely populated urban areas WiFi routers form a tightly interconnected proximity network that can be exploited as a substrate for the spreading of malware able to launch massive fraudulent attacks. In this article, we consider several scenarios for the deployment of malware that spreads over the wireless channel of major urban areas in the US. We develop an epidemiological model that takes into consideration prevalent security flaws on these routers. The spread of such a contagion is simulated on real-world data for georeferenced wireless routers. We uncover a major weakness of WiFi networks in that most of the simulated scenarios show tens of thousands of routers infected in as little as 2 weeks, with the majority of the infections occurring in the first 24-48 h. We indicate possible containment and prevention measures and provide computational estimates for the rate of encrypted routers that would stop the spreading of the epidemics by placing the system below the percolation threshold.

  11. WiFi networks and malware epidemiology

    Science.gov (United States)

    Hu, Hao; Myers, Steven; Colizza, Vittoria; Vespignani, Alessandro

    2009-01-01

    In densely populated urban areas WiFi routers form a tightly interconnected proximity network that can be exploited as a substrate for the spreading of malware able to launch massive fraudulent attacks. In this article, we consider several scenarios for the deployment of malware that spreads over the wireless channel of major urban areas in the US. We develop an epidemiological model that takes into consideration prevalent security flaws on these routers. The spread of such a contagion is simulated on real-world data for georeferenced wireless routers. We uncover a major weakness of WiFi networks in that most of the simulated scenarios show tens of thousands of routers infected in as little as 2 weeks, with the majority of the infections occurring in the first 24–48 h. We indicate possible containment and prevention measures and provide computational estimates for the rate of encrypted routers that would stop the spreading of the epidemics by placing the system below the percolation threshold. PMID:19171909

  12. Design of a visible-light-communication enhanced WiFi system

    OpenAIRE

    Shao, Sihua; Khreishah, Abdallah; Ayyash, Moussa; Rahaim, Michael B.; Elgala, Hany; Jungnickel, Volker; Schulz, Dominic; Little, Thomas D. C.

    2015-01-01

    Visible light communication (VLC) has wide unlicensed bandwidth, enables communication in radio frequency (RF) sensitive environments, realizes energy-efficient data transmission, and has the potential to boost the capacity of wireless access networks through spatial reuse. On the other hand, WiFi provides more coverage than VLC and does not suffer from the likelihood of blockage due to the light of sight (LOS) requirement of VLC. In order to take the advantages of both WiFi and VLC, we propo...

  13. Positioning indoors with Wi-Fi devices of low-cost; Posicionamento em ambientes internos com dispositivos wi-fi de baixo custo

    Energy Technology Data Exchange (ETDEWEB)

    Moreira, Fabricio M.; Farias, Marcos S.; Carvalho, Paulo Victor R. de, E-mail: fabricio_mv1@hotmail.com, E-mail: msantana@ien.gov.br, E-mail: paulov@ien.gov.br [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil). Serviço de Instrumentação

    2017-07-01

    The rhythm of research development linked to location tracking is highly linked with the advancement of wireless sensor network and wireless technologies. A classic example is the Global Positioning System (GPS), where satellites are used to send signals to receivers on earth that use these signals to compute navigation information. However, as communication between the satellites and GPS receivers require radio propagation in line of sight, the GPS system usually only works outdoors. For the growing interest in research to position tracking indoors, you must use wireless devices based on Bluetooth or Wi-Fi technology (IEEE 802.11). The aim of this work is to show the development of applications using new Wi-Fi devices (ESP8266) for the estimation of positioning and location indoors.

  14. Inferring Person-to-person Proximity Using WiFi Signals

    DEFF Research Database (Denmark)

    Sapiezynski, Piotr; Stopczynski, Arkadiusz; Wind, David Kofoed

    2017-01-01

    scale is a technical challenge and many commonly used approaches—including RFID badges or Bluetooth scanning—offer only limited scalability. Here we show that it is possible, in a scalable and robust way, to accurately infer person-to-person physical proximity from the lists of WiFi access points...... measured by smartphones carried by the two individuals. Based on a longitudinal dataset of approximately 800 participants with ground-truth interactions collected over a year, we show that our model performs better than the current state-of-the-art. Our results demonstrate the value of WiFi signals...

  15. WiFi Data Acquisition System Applied to a Photovoltaic Powered Water Pumping Plant

    Directory of Open Access Journals (Sweden)

    Sandro César Silveira JUCÁ

    2015-02-01

    Full Text Available The present paper describes how to design and assemble a low cost online monitoring and WiFi data acquisition system using free software applied to microgeneration based on renewable energy sources. The development of online monitoring systems for microgeneration plants based on renewable energy sources is becoming more important, considering that monitoring and data acquisition systems are applicable in stages of the microgeneration process. The monitoring and data acquisition WiFi system was developed using an embedded WiFi modem (Wifly coupled to a microcontrolled board based on the free tool SanUSB. This monitoring system was applied to a photovoltaic (PV water pumping plant without batteries, so as the control system and the wireless communication with the online server, which is also autonomous and powered by PV panel. The free software for online monitoring and WiFi data acquisition allows the analysis of stored data and charts through mobile devices as notebooks, tablets and smartphones.

  16. Spectrum Sensing Experimentation for LTE and WiFi Unlicensed Band Operation

    Directory of Open Access Journals (Sweden)

    N. Milošević

    2016-11-01

    Full Text Available If several different systems operate in the same frequency band, a coordination between them is needed for effective use of the available spectrum. The coordination is especially important if the systems are not designed to operate in such an environment. The very important initial phase of the coordination process is acquiring of the spectrum usage map or spectrum sensing. The paper describes the spectrum sensing experimentation in the unlicensed 5 GHz band during the WiFi or LTE transmission. It describes the experiment workflow and depicts the obtained results. The experiments were performed at NITOS testbed at the University of Thessaly, Greece, and show that it is possible to determine whether WiFi or LTE transmission is sensed. Therefore, based on spectrum sensing it will be possible to coordinate a shared access of WiFi and LTE users in the unlicensed 5 GHz band.

  17. Wi-Fi Versus Cell Phone Service

    Science.gov (United States)

    Roberts, Gary

    2006-01-01

    Regardless of whether cell phones remain the dominant platform or Wi-Fi becomes the prevalent platform, there are some things that libraries can do to improve patron service in light of evolving expectations, behaviors, and tools. People today are more nomadic, which leads to the very real possibility of having to deliver content not just to the…

  18. Autonomous WiFi Sensor for Heating Systems in the Internet of Things

    Directory of Open Access Journals (Sweden)

    C. A. Trasviña-Moreno

    2016-01-01

    Full Text Available In smart cities and home applications, the use of Wireless Sensor Networks to extract environmental data becomes more common with the passing of time. These sensors are used for a wide array of applications, but mainly to manage energy consumption in domestic buildings. One of the key energy consumers in households is heating systems. To monitor them, sensors are used with wireless communication protocols, like ZigBee, to transmit data to a central processing unit (CPU. WiFi communications, on the contrary, are rarely seen in these implementations due to its high energy consumption, although almost in every home one can find such networks. Yet, with the Internet of Things (IoT, new revisions of the standard have arisen which enable this technology for wireless sensing. To validate this theory and fill a technological necessity, this proposal is presented. In this work, the design and implementation of an autonomous WiFi sensor, paired with thermoelectric energy harvesting, are presented as an IoT solution for monitoring heating devices. For this, a thorough analysis of the proposed architecture is presented. Tests regarding energy consumption and generation, efficiency, and real world scenario trials are done. Finalizing, a comparison between the obtained results and current implementations is shown.

  19. Measurements of Radiofrequency Radiation with a Body-Borne Exposimeter in Swedish Schools with Wi-Fi

    Directory of Open Access Journals (Sweden)

    Lena K. Hedendahl

    2017-11-01

    Full Text Available IntroductionWireless access to the Internet is now commonly used in schools. Many schools give each student their own laptop and utilize the laptops and wireless fidelity (Wi-Fi connection for educational purposes. Most children also bring their own mobile phones to school. Since children are obliged by law to attend school, a safe environment is important. Lately, it has been discussed if radiofrequency (RF radiation can have long-term adverse effects on children’s health.MethodThis study conducted exposimetric measurements in schools to assess RF emissions in the classroom by measuring the teachers’ RF exposure in order to approximate the children’s exposure. Teachers in grades 7–12 carried a body-borne exposimeter, EME-Spy 200, in school during 1–4 days of work. The exposimeter can measure 20 different frequency bands from 87 to 5,850 MHz.ResultsEighteen teachers from seven schools participated. The mean exposure to RF radiation ranged from 1.1 to 66.1 µW/m2. The highest mean level, 396.6 µW/m2, occurred during 5 min of a lesson when the teacher let the students stream and watch YouTube videos. Maximum peaks went up to 82,857 µW/m2 from mobile phone uplink.DiscussionOur measurements are in line with recent exposure studies in schools in other countries. The exposure levels varied between the different Wi-Fi systems, and if the students were allowed to use their own smartphones on the school’s Wi-Fi network or if they were connected to GSM/3G/4G base stations outside the school. An access point over the teacher’s head gave higher exposure compared with a school with a wired Internet connection for the teacher in the classroom. All values were far below International Commission on Non-Ionizing Radiation Protection’s reference values, but most mean levels measured were above the precautionary target level of 3–6 µW/m2 as proposed by the Bioinitiative Report. The length of time wireless devices are used is an

  20. Attacks on Mobile Devices Using Wi-Fi Technology

    Directory of Open Access Journals (Sweden)

    A. A. Sheptunov

    2012-09-01

    Full Text Available The article presents an overview of wireless technology Wi-Fi, as well as its vulnerabilities. Examples of attacks that exploit these vulnerabilities are provided. The methods of protection against such threats are suggested.

  1. Next Generation to Connect the Wi-Fi with IEEE Cloud Router

    OpenAIRE

    Kaur, Ramandeep

    2014-01-01

    The Wi-Fi has many features for internet access. There are many Wi-Fi technologies are used with the help of router. He latest router is AC router, it is also known as 802.11AC router with many benefits include speed, band etc. Ac router offers the ultimate performance and excellent bandwidth with antennas compare of N router (802.11N router).It is also upgrade the previous technology network. The wireless communication devices are upgrade time to time. Ac router is beneficial for HD videos...

  2. The effect of Wi-Fi electromagnetic waves in unimodal and multimodal object recognition tasks in male rats.

    Science.gov (United States)

    Hassanshahi, Amin; Shafeie, Seyed Ali; Fatemi, Iman; Hassanshahi, Elham; Allahtavakoli, Mohammad; Shabani, Mohammad; Roohbakhsh, Ali; Shamsizadeh, Ali

    2017-06-01

    Wireless internet (Wi-Fi) electromagnetic waves (2.45 GHz) have widespread usage almost everywhere, especially in our homes. Considering the recent reports about some hazardous effects of Wi-Fi signals on the nervous system, this study aimed to investigate the effect of 2.4 GHz Wi-Fi radiation on multisensory integration in rats. This experimental study was done on 80 male Wistar rats that were allocated into exposure and sham groups. Wi-Fi exposure to 2.4 GHz microwaves [in Service Set Identifier mode (23.6 dBm and 3% for power and duty cycle, respectively)] was done for 30 days (12 h/day). Cross-modal visual-tactile object recognition (CMOR) task was performed by four variations of spontaneous object recognition (SOR) test including standard SOR, tactile SOR, visual SOR, and CMOR tests. A discrimination ratio was calculated to assess the preference of animal to the novel object. The expression levels of M1 and GAT1 mRNA in the hippocampus were assessed by quantitative real-time RT-PCR. Results demonstrated that rats in Wi-Fi exposure groups could not discriminate significantly between the novel and familiar objects in any of the standard SOR, tactile SOR, visual SOR, and CMOR tests. The expression of M1 receptors increased following Wi-Fi exposure. In conclusion, results of this study showed that chronic exposure to Wi-Fi electromagnetic waves might impair both unimodal and cross-modal encoding of information.

  3. Inferring Stop-Locations from WiFi.

    Directory of Open Access Journals (Sweden)

    David Kofoed Wind

    Full Text Available Human mobility patterns are inherently complex. In terms of understanding these patterns, the process of converting raw data into series of stop-locations and transitions is an important first step which greatly reduces the volume of data, thus simplifying the subsequent analyses. Previous research into the mobility of individuals has focused on inferring 'stop locations' (places of stationarity from GPS or CDR data, or on detection of state (static/active. In this paper we bridge the gap between the two approaches: we introduce methods for detecting both mobility state and stop-locations. In addition, our methods are based exclusively on WiFi data. We study two months of WiFi data collected every two minutes by a smartphone, and infer stop-locations in the form of labelled time-intervals. For this purpose, we investigate two algorithms, both of which scale to large datasets: a greedy approach to select the most important routers and one which uses a density-based clustering algorithm to detect router fingerprints. We validate our results using participants' GPS data as well as ground truth data collected during a two month period.

  4. Positioning indoors with Wi-Fi devices of low-cost

    International Nuclear Information System (INIS)

    Moreira, Fabricio M.; Farias, Marcos S.; Carvalho, Paulo Victor R. de

    2017-01-01

    The rhythm of research development linked to location tracking is highly linked with the advancement of wireless sensor network and wireless technologies. A classic example is the Global Positioning System (GPS), where satellites are used to send signals to receivers on earth that use these signals to compute navigation information. However, as communication between the satellites and GPS receivers require radio propagation in line of sight, the GPS system usually only works outdoors. For the growing interest in research to position tracking indoors, you must use wireless devices based on Bluetooth or Wi-Fi technology (IEEE 802.11). The aim of this work is to show the development of applications using new Wi-Fi devices (ESP8266) for the estimation of positioning and location indoors

  5. Crowd-Sourced Mobility Mapping for Location Tracking Using Unlabeled Wi-Fi Simultaneous Localization and Mapping

    Directory of Open Access Journals (Sweden)

    Mu Zhou

    2015-01-01

    Full Text Available Due to the increasing requirements of the seamless and round-the-clock Location-based services (LBSs, a growing interest in Wi-Fi network aided location tracking is witnessed in the past decade. One of the significant problems of the conventional Wi-Fi location tracking approaches based on received signal strength (RSS fingerprinting is the time-consuming and labor intensive work involved in location fingerprint calibration. To solve this problem, a novel unlabeled Wi-Fi simultaneous localization and mapping (SLAM approach is developed to avoid the location fingerprinting and additional inertial or vision sensors. In this approach, an unlabeled mobility map of the coverage area is first constructed by using the crowd-sourcing from a batch of sporadically recorded Wi-Fi RSS sequences based on the spectral cluster assembling. Then, the sequence alignment algorithm is applied to conduct location tracking and mobility map updating. Finally, the effectiveness of this approach is verified by the extensive experiments carried out in a campus-wide area.

  6. Wake-on-a-Schedule: Energy-aware Communication in Wi-Fi Networks

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2014-02-01

    Full Text Available Excessive energy consumption of mobile device Wi-Fi (IEEE 802.11x interface is limiting its operational time on batteries, and impacts total energy consumption of electronic devices. In recent years research community has invested great effort in better efficiency of energy consumption. However, there is still a space for improvement. Wi-Fi devices connected to the single AP (Access Point compete for the medium during data exchange. However, due to the performance anomaly in 802.11 networks, a low data rate device will force all other devices connected to the AP to communicate at low rate, which will increase the total energy consumption of these devices. Wake-on-a-Schedule algorithm is proposed reducing the energy consumption of devices placed in the area with the weaker signal by scheduling the data packets for each client on the server side which will not allow clients to compete for the Wi-Fi medium. Through extensive measurements we show that our algorithm can save up to 60% of energy consumption on the client side.

  7. Wi-Fi Hotspot Auto-Discovery: A Practical & Energy-Aware System for Smart Objects using Cellular Signals

    Directory of Open Access Journals (Sweden)

    Nithyananthan Poosamani

    2015-08-01

    Full Text Available The Internet of Things (IoT paradigm aims to interconnect a variety of heterogeneous Smart Objects (SO using energy-efficient methodologies and standard communication protocols. A majority of consumer devices sold today come equipped with wireless LAN and cellular technology to connect with the world-wide network. To discover Wi-Fi hot spots, there is a need for constant scanning of Wi-Fi radio in these devices and results in significant battery drain. We present PRiSM, a practical system to automatically locate Wi-Fi hotspots while Wi-Fi radio is turned off, by using the statistical characteristics of cellular signals. Cellular signals are received at zero extra cost in mobile devices and hence PRiSM is highly energy-efficient. It is a lightweight client-side only implementation and needs no prior knowledge on floor plans or wireless infrastructure. We implement PRiSM on Android-based devices and show up to 96% of energy savings in Wi-Fi sensing operations which is equivalent to saving up to 16% of total battery capacity, together with an average prediction accuracy of up to 98%.

  8. Adopting the FAB-MAP algorithm for indoor localization with WiFi fingerprints

    OpenAIRE

    Wietrzykowski, Jan; Nowicki, Michał; Skrzypczyński, Piotr

    2016-01-01

    Personal indoor localization is usually accomplished by fusing information from various sensors. A common choice is to use the WiFi adapter that provides information about Access Points that can be found in the vicinity. Unfortunately, state-of-the-art approaches to WiFi-based localization often employ very dense maps of the WiFi signal distribution, and require a time-consuming process of parameter selection. On the other hand, camera images are commonly used for visual place recognition, de...

  9. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    Directory of Open Access Journals (Sweden)

    Bram Bonné

    2017-07-01

    Full Text Available Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the participants’ devices connect to and the connections made by apps on these devices, for a period of 30 days. Afterwards, participants are surveyed about their awareness and privacy sensitiveness. We show that while a higher expertise in computer networks corresponds to more awareness about the connections made by apps, neither this expertise nor the actual privacy stance of the participant translates to better security habits. Moreover, participants in general were unaware about a significant part of connections made by apps on their devices, a matter that is worsened by the fact that one third of Wi-Fi networks that participants connect to do not have any security enabled. Based on our results, we provide recommendations to network providers, developers and users on how to improve Wi-Fi security for mobile devices.

  10. Copenhagen ITS: Forsøg med wifi-baseret positionering på H.C. Andersens Boulevard

    DEFF Research Database (Denmark)

    Høeg, Per; Nielsen, Thomas Sick; Olsen, Allan

    2017-01-01

    I samarbejde med Københavns Kommune afprøvede CITS konsortiet potentialet i wifi-baseret positionering med en forsøgsstrækning på H.C. Andersens Boulevard i vintermånederne 2014-2015. Wifi-positioneringen giver et nyt datagrundlag for trafik og bylivsundersøgelser, herunder f.eks. et grundlag...

  11. Cross-Layer Framework for Fine-Grained Channel Access in Next Generation High-Density WiFi Networks

    Institute of Scientific and Technical Information of China (English)

    ZHAO Haitao; ZHANG Shaojie; Emiliano Garcia-Palacios

    2016-01-01

    Densely deployed WiFi networks will play a crucial role in providing the capacity for next generation mobile internet.However,due to increasing interference,overlapped channels in WiFi networks and throughput efficiency degradation,densely deployed WiFi networks is not a guarantee to obtain higher throughput.An emergent challenge is how to efficiently utilize scarce spectrum resources,by matching physical layer resources to traffic demand.In this aspect,access control allocation strategies play a pivotal role but remain too coarse-grained.As a solution,this research proposes a flexible framework for fine-grained channel width adaptation and multi-channel access in WiFi networks.This approach,named SFCA (Subcarrier Fine-grained Channel Access),adopts DOFDM (Discontinuous Orthogonal Frequency Division Multiplexing) at the PHY layer.It allocates the frequency resource with a subcarrier granularity,which facilitates the channel width adaptation for multi-channel access and thus brings more flexibility and higher frequency efficiency.The MAC layer uses a frequencytime domain backoff scheme,which combines the popular time-domain BEB scheme with a frequency-domain backoff to decrease access collision,resulting in higher access probability for the contending nodes.SFCA is compared with FICA (an established access scheme) showing significant outperformance.Finally we present results for next generation 802.11 ac WiFi networks.

  12. Device-Free Passive Identity Identification via WiFi Signals.

    Science.gov (United States)

    Lv, Jiguang; Yang, Wu; Man, Dapeng

    2017-11-02

    Device-free passive identity identification attracts much attention in recent years, and it is a representative application in sensorless sensing. It can be used in many applications such as intrusion detection and smart building. Previous studies show the sensing potential of WiFi signals in a device-free passive manner. It is confirmed that human's gait is unique from each other similar to fingerprint and iris. However, the identification accuracy of existing approaches is not satisfactory in practice. In this paper, we present Wii, a device-free WiFi-based Identity Identification approach utilizing human's gait based on Channel State Information (CSI) of WiFi signals. Principle Component Analysis (PCA) and low pass filter are applied to remove the noises in the signals. We then extract several entities' gait features from both time and frequency domain, and select the most effective features according to information gain. Based on these features, Wii realizes stranger recognition through Gaussian Mixture Model (GMM) and identity identification through a Support Vector Machine (SVM) with Radial Basis Function (RBF) kernel. It is implemented using commercial WiFi devices and evaluated on a dataset with more than 1500 gait instances collected from eight subjects walking in a room. The results indicate that Wii can effectively recognize strangers and can achieves high identification accuracy with low computational cost. As a result, Wii has the potential to work in typical home security systems.

  13. Device-Free Passive Identity Identification via WiFi Signals

    Directory of Open Access Journals (Sweden)

    Jiguang Lv

    2017-11-01

    Full Text Available Device-free passive identity identification attracts much attention in recent years, and it is a representative application in sensorless sensing. It can be used in many applications such as intrusion detection and smart building. Previous studies show the sensing potential of WiFi signals in a device-free passive manner. It is confirmed that human’s gait is unique from each other similar to fingerprint and iris. However, the identification accuracy of existing approaches is not satisfactory in practice. In this paper, we present Wii, a device-free WiFi-based Identity Identification approach utilizing human’s gait based on Channel State Information (CSI of WiFi signals. Principle Component Analysis (PCA and low pass filter are applied to remove the noises in the signals. We then extract several entities’ gait features from both time and frequency domain, and select the most effective features according to information gain. Based on these features, Wii realizes stranger recognition through Gaussian Mixture Model (GMM and identity identification through a Support Vector Machine (SVM with Radial Basis Function (RBF kernel. It is implemented using commercial WiFi devices and evaluated on a dataset with more than 1500 gait instances collected from eight subjects walking in a room. The results indicate that Wii can effectively recognize strangers and can achieves high identification accuracy with low computational cost. As a result, Wii has the potential to work in typical home security systems.

  14. Signals of Opportunity Navigation Using Wi-Fi Signals

    Science.gov (United States)

    2011-03-24

    Multiplexed Signals of Opportunity. Master’s Thesis, Air Force Institute of Technology, 2007. 33. Wiles, Charles. “Introducing the Gears Geolocation ... API for All Laptop WiFi Users”, October 2008. URL http://googlecode.blogspot.com. 88 REPORT DOCUMENTATION PAGE Form ApprovedOMB No. 0704–0188 The public

  15. A Novel Multimedia Streaming System for Urban Rail Environments Using Wi-Fi Peer-to-Peer Technology

    DEFF Research Database (Denmark)

    Poderys, Justas; Farooq, Jahanzeb; Soler, José

    2018-01-01

    to passenger devices using Wi-Fi Peer-to-Peer (P2P) technology. Such a multimedia distribution system can be deployed incrementally, as it can function concurrently with Wi-Fi connections already available in a number of trains. This paper presents the results obtained by emulating multimedia streaming...

  16. An Android/LAMP Mobile In/Out Board Based on Wi-Fi Fingerprinting

    Directory of Open Access Journals (Sweden)

    Keith Kelley

    2011-10-01

    Full Text Available Library technology and other professionals with diverse skills must be able to locate each other during the workday, in order to most responsively serve their clients. While staff often carry cellular phones, contact can be especially challenging given the constant, highly mobile nature of library work, especially on larger campuses with variable cellular phone service. Western Michigan University (WMU Libraries has developed an Android/LAMP application that library staff may use on their increasingly prevalent Wi-Fi enabled mobile devices to “check in” at various locations where they do work, so that their colleagues may locate them as needed. The application takes advantage of WMU’s widespread Wi-Fi network, a set of free platform and software development tools and open standards, and methods from the computer science literature, and overcomes GPS and telephony limitations. This article describes the application, which is based on Wi-Fi fingerprinting, and suggests how other developers could use it and new methods from the computer science literature as starting points to create their own applications.

  17. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    OpenAIRE

    Bonné, Bram; Rovelo Ruiz, Gustavo; Quax, Peter; Lamotte, Wim

    2017-01-01

    Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the partici...

  18. Effect of radiofrequency radiation from Wi-Fi devices on mercury release from amalgam restorations.

    Science.gov (United States)

    Paknahad, Maryam; Mortazavi, S M J; Shahidi, Shoaleh; Mortazavi, Ghazal; Haghani, Masoud

    2016-01-01

    Dental amalgam is composed of approximately 50% elemental mercury. Despite concerns over the toxicity of mercury, amalgam is still the most widely used restorative material. Wi-Fi is a rapidly using local area wireless computer networking technology. To the best of our knowledge, this is the first study that evaluates the effect of exposure to Wi-Fi signals on mercury release from amalgam restorations. Standard class V cavities were prepared on the buccal surfaces of 20 non-carious extracted human premolars. The teeth were randomly divided into 2 groups (n = 10). The control group was stored in non-environment. The specimens in the experimental groups were exposed to a radiofrequency radiation emitted from standard Wi Fi devices at 2.4 GHz for 20 min. The distance between the Wi-Fi router and samples was 30 cm and the router was exchanging data with a laptop computer that was placed 20 m away from the router. The concentration of mercury in the artificial saliva in the groups was evaluated by using a cold-vapor atomic absorption Mercury Analyzer System. The independent t test was used to evaluate any significant differences in mercury release between the two groups. The mean (±SD) concentration of mercury in the artificial saliva of the Wi-Fi exposed teeth samples was 0.056 ± .025 mg/L, while it was only 0.026 ± .008 mg/L in the non-exposed control samples. This difference was statistically significant (P =0.009). Exposure of patients with amalgam restorations to radiofrequency radiation emitted from conventional Wi-Fi devices can increase mercury release from amalgam restorations.

  19. Indoor Location Sensing with Invariant Wi-Fi Received Signal Strength Fingerprinting

    Directory of Open Access Journals (Sweden)

    Mohd Nizam Husen

    2016-11-01

    Full Text Available A method of location fingerprinting based on the Wi-Fi received signal strength (RSS in an indoor environment is presented. The method aims to overcome the RSS instability due to varying channel disturbances in time by introducing the concept of invariant RSS statistics. The invariant RSS statistics represent here the RSS distributions collected at individual calibration locations under minimal random spatiotemporal disturbances in time. The invariant RSS statistics thus collected serve as the reference pattern classes for fingerprinting. Fingerprinting is carried out at an unknown location by identifying the reference pattern class that maximally supports the spontaneous RSS sensed from individual Wi-Fi sources. A design guideline is also presented as a rule of thumb for estimating the number of Wi-Fi signal sources required to be available for any given number of calibration locations under a certain level of random spatiotemporal disturbances. Experimental results show that the proposed method not only provides 17% higher success rate than conventional ones but also removes the need for recalibration. Furthermore, the resolution is shown finer by 40% with the execution time more than an order of magnitude faster than the conventional methods. These results are also backed up by theoretical analysis.

  20. AUTOMATIC CONSTRUCTION OF WI-FI RADIO MAP USING SMARTPHONES

    Directory of Open Access Journals (Sweden)

    T. Liu

    2016-06-01

    Full Text Available Indoor positioning could provide interesting services and applications. As one of the most popular indoor positioning methods, location fingerprinting determines the location of mobile users by matching the received signal strength (RSS which is location dependent. However, fingerprinting-based indoor positioning requires calibration and updating of the fingerprints which is labor-intensive and time-consuming. In this paper, we propose a visual-based approach for the construction of radio map for anonymous indoor environments without any prior knowledge. This approach collects multi-sensors data, e.g. video, accelerometer, gyroscope, Wi-Fi signals, etc., when people (with smartphones walks freely in indoor environments. Then, it uses the multi-sensor data to restore the trajectories of people based on an integrated structure from motion (SFM and image matching method, and finally estimates location of sampling points on the trajectories and construct Wi-Fi radio map. Experiment results show that the average location error of the fingerprints is about 0.53 m.

  1. Falls prevention in hospitals and mental health units: an extended evaluation of the FallSafe quality improvement project.

    Science.gov (United States)

    Healey, Frances; Lowe, Derek; Darowski, Adam; Windsor, Julie; Treml, Jonathan; Byrne, Lisa; Husk, Janet; Phipps, Jill

    2014-07-01

    inpatient falls are a major patient safety issue causing distress, injury and death. Systematic review suggests multifactorial assessment and intervention can reduce falls by 20-30%, but large-scale studies of implementation are few. This paper describes an extended evaluation of the FallSafe quality improvement project, which presented key components of multifactorial assessment and intervention as a care bundle. : data on delivery of falls prevention processes were collected at baseline and for 18 months from nine FallSafe units and nine control units. Data on falls were collected from local risk management systems for 24 months, and data on under-reporting through staff surveys. : in FallSafe units, delivery of seven care bundle components significantly improved; most improvements were sustained after active project support was withdrawn. Twelve-month moving average of reported fall rates showed a consistent downward trend in FallSafe units but not controls. Significant reductions in reported fall rate were found in FallSafe units (adjusted rate ratio (ARR) 0.75, 95% confidence interval (CI) 0.68-0.84 P control units (ARR 0.91, 95% CI 0.81-1.03 P = 0.13). No significant changes in injurious fall rate were found in FallSafe units (ARR 0.86, 95% CI 0.71-1.03 P = 0.11), or controls (ARR 0.88, 95% CI 0.72-1.08 P = 0.13). In FallSafe units, staff certain falls had been reported increased from 60 to 77%. : introducing evidence-based care bundles of multifactorial assessment and intervention using a quality improvement approach resulted in improved delivery of multifactorial assessment and intervention and significant reductions in fall rates, but not in injurious fall rates. © The Author 2013. Published by Oxford University Press on behalf of the British Geriatrics Society. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  2. RSSI BASED LOCATION ESTIMATION IN A WI-FI ENVIRONMENT: AN EXPERIMENTAL STUDY

    Directory of Open Access Journals (Sweden)

    M. Ganesh Madhan

    2014-12-01

    Full Text Available In real life situations, location estimation of moving objects, armed personnel are of great importance. In this paper, we have attempted to locate targets which are mobile in a Wi-Fi environment. Radio Frequency (RF localization techniques based on Received Signal Strength Indication (RSSI algorithms are used. This study utilises Wireless Mon tool, software to provide complete technical information regarding received signal strength obtained from different wireless access points available in a campus Wi-Fi environment, considered for the study. All simulations have been done in MATLAB. The target location estimated by this approach agrees well with the actual GPS data.

  3. Effectiveness of using WiFi technologies to detect and predict building occupancy

    Directory of Open Access Journals (Sweden)

    Ouf Mohamed M.

    2017-01-01

    Implications and influences: Given the large contribution of HVAC systems to overall buildings' energy consumption, this study presents a new method for efficiently operating HVAC systems. Results highlighted the accuracy of using WiFi connections as predictors for occupancy patterns to be used for controlling HVAC systems instead of CO2 sensors. These findings provide a foundation for further research on using WiFi networks to manage and operate HVAC systems in new buildings. Efficient operation of these systems based on real-time occupancy as opposed to static schedules provides facility managers with an opportunity for significant energy savings at a relatively low cost.

  4. Dynamic Power-Saving Method for Wi-Fi Direct Based IoT Networks Considering Variable-Bit-Rate Video Traffic.

    Science.gov (United States)

    Jin, Meihua; Jung, Ji-Young; Lee, Jung-Ryun

    2016-10-12

    With the arrival of the era of Internet of Things (IoT), Wi-Fi Direct is becoming an emerging wireless technology that allows one to communicate through a direct connection between the mobile devices anytime, anywhere. In Wi-Fi Direct-based IoT networks, all devices are categorized by group of owner (GO) and client. Since portability is emphasized in Wi-Fi Direct devices, it is essential to control the energy consumption of a device very efficiently. In order to avoid unnecessary power consumed by GO, Wi-Fi Direct standard defines two power-saving methods: Opportunistic and Notice of Absence (NoA) power-saving methods. In this paper, we suggest an algorithm to enhance the energy efficiency of Wi-Fi Direct power-saving, considering the characteristics of multimedia video traffic. Proposed algorithm utilizes the statistical distribution for the size of video frames and adjusts the lengths of awake intervals in a beacon interval dynamically. In addition, considering the inter-dependency among video frames, the proposed algorithm ensures that a video frame having high priority is transmitted with higher probability than other frames having low priority. Simulation results show that the proposed method outperforms the traditional NoA method in terms of average delay and energy efficiency.

  5. Analisis Kinerja Sistem Informasi dan Teknologi Informasi untuk Menunjang Kinerja Karyawan Menggunakan Framework IT Balanced Scorecard (Studi Kasus pada Wi-Fi Universitas Kristen Satya Wacana

    Directory of Open Access Journals (Sweden)

    Bertho Molly

    2017-12-01

    Wi-Fi UKSW merupakan fasilitas jaringan internet yang dibangun untuk memfasilitasi dan mendukung kebutuhan civitas UKSW dalam proses belajar mengajar. Tujuan penelitian ini adalah melakukan pengukuran bagaimana tingkat pemanfaatan Sistem Informasi dan Teknologi Informasi berdasarkan kinerja karyawan Wi-Fi UKSW. Penelitian ini menggunakan metode IT Balanced Scorecard sebagai sarana pengukuran yang jelas, memantau dan mengoptimalkan realisasi dari nilai atau manfaat bisnis dan manfaat Teknologi Informasi dimana IT Balanced Scorecard mempunyai 4 perspektif (Perspektif Kontribusi Perusahaan, Perspektif Orientasi Pengguna, Perspektif Penyempurnaan Operasional, dan Perspektif Orientasi Masa Depan. Penelitian ini dimulai dari tahapan perencanaan, tahapan studi kelayakan awal dan studi literature, tahapan wawancara dan observasi, tahapan analisis data, serta tahapan membuat dan menyusun laporan serta rekomendasi menggunakan IT Balanced Scorecard. Adapun beberapa hal yang ditemukan dalam penelitian ini dan harus ditangani yaitu, dibutuhkannya penambahan Sumber Daya Manusia (SDM untuk membantu kinerja Wi-Fi UKSW baik dalam hal penanganan complain maupun penyelesaian proyek mengingat Wi-Fi UKSW selalu dibutuhkan dan digunakan oleh semua civitas UKSW serta perlu adanya evaluasi dan upgrade terhadap sistem aplikasi monitoring Wi-Fi. Karena sebagai sarana penyedia layanan jaringan internet yang mana semua yang dilakukan karyawan Wi-Fi UKSW berhubungan erat dengan Sistem Informasi dan Teknologi Informasi dan hasilnya, yang kehadirannya memberikan nilai manfaat yang baik khususnya bagi kemajuan kinerja karyawan Wi-Fi UKSW. Kata kunci: Kinerja SI dan TI, IT Balanced Scorecard, Wi-Fi UKSW Abstract Wi-Fi SWCU is an internet network facility built to facilitate and support the needs of SWCU civities in teaching and learning. The purpose of this research is take measurements of what is the level the use of Information Systems and Information Technology based on of employee performance

  6. The Society for Vascular Surgery Wound, Ischemia, and foot Infection (WIfI) classification independently predicts wound healing in diabetic foot ulcers.

    Science.gov (United States)

    Hicks, Caitlin W; Canner, Joseph K; Mathioudakis, Nestoras; Sherman, Ronald; Malas, Mahmoud B; Black, James H; Abularrage, Christopher J

    2018-04-02

    Previous studies have reported correlation between the Wound, Ischemia, and foot Infection (WIfI) classification system and wound healing time on unadjusted analyses. However, in the only multivariable analysis to date, WIfI stage was not predictive of wound healing. Our aim was to examine the association between WIfI classification and wound healing after risk adjustment in patients with diabetic foot ulcers (DFUs) treated in a multidisciplinary setting. All patients presenting to our multidisciplinary DFU clinic from June 2012 to July 2017 were enrolled in a prospective database. A Cox proportional hazards model accounting for patients' sociodemographics, comorbidities, medication profiles, and wound characteristics was used to assess the association between WIfI classification and likelihood of wound healing at 1 year. There were 310 DFU patients enrolled (mean age, 59.0 ± 0.7 years; 60.3% male; 60.0% black) with 709 wounds, including 32.4% WIfI stage 1, 19.9% stage 2, 25.2% stage 3, and 22.4% stage 4. Mean wound healing time increased with increasing WIfI stage (stage 1, 96.9 ± 8.3 days; stage 4, 195.1 ± 10.6 days; P healing at 1 year was 94.1% ± 2.0% for stage 1 wounds vs 67.4% ± 4.4% for stage 4 (P healing (stage 4 vs stage 1: hazard ratio, [HR] 0.44; 95% confidence interval, 0.33-0.59). Peripheral artery disease (HR, 0.73), increasing wound area (HR, 0.99 per square centimeter), and longer time from wound onset to first assessment (HR, 0.97 per month) also decreased the likelihood of wound healing, whereas use of clopidogrel was protective (HR, 1.39; all, P ≤ .04). The top three predictors of poor wound healing were WIfI stage 4 (z score, -5.40), increasing wound area (z score, -3.14), and WIfI stage 3 (z score, -3.11), respectively. Among patients with DFU, the WIfI classification system predicts wound healing at 1 year in both crude and risk-adjusted analyses. This is the first study to validate the WIfI score as an independent

  7. Design of smart home gateway based on Wi-Fi and ZigBee

    Science.gov (United States)

    Li, Yang

    2018-04-01

    With the increasing demand for home lifestyle, the traditional smart home products have been unable to meet the needs of users. Aim at the complex wiring, high cost and difficult operation problems of traditional smart home system, this paper designs a home gateway for smart home system based on Wi-Fi and ZigBee. This paper first gives a smart home system architecture base on cloud server, Wi-Fi and ZigBee. This architecture enables users to access the smart home system remotely from Internet through the cloud server or through Wi-Fi at home. It also offers the flexibility and low cost of ZigBee wireless networking for home equipment. This paper analyzes the functional requirements of the home gateway, and designs a modular hardware architecture based on the RT5350 wireless gateway module and the CC2530 ZigBee coordinator module. Also designs the software of the home gateway, including the gateway master program and the ZigBee coordinator program. Finally, the smart home system and home gateway are tested in two kinds of network environments, internal network and external network. The test results show that the designed home gateway can meet the requirements, support remote and local access, support multi-user, support information security technology, and can timely report equipment status information.

  8. A novel particle filter approach for indoor positioning by fusing WiFi and inertial sensors

    Directory of Open Access Journals (Sweden)

    Zhu Nan

    2015-12-01

    Full Text Available WiFi fingerprinting is the method of recording WiFi signal strength from access points (AP along with the positions at which they were recorded, and later matching those to new measurements for indoor positioning. Inertial positioning utilizes the accelerometer and gyroscopes for pedestrian positioning. However, both methods have their limitations, such as the WiFi fluctuations and the accumulative error of inertial sensors. Usually, the filtering method is used for integrating the two approaches to achieve better location accuracy. In the real environments, especially in the indoor field, the APs could be sparse and short range. To overcome the limitations, a novel particle filter approach based on Rao Blackwellized particle filter (RBPF is presented in this paper. The indoor environment is divided into several local maps, which are assumed to be independent of each other. The local areas are estimated by the local particle filter, whereas the global areas are combined by the global particle filter. The algorithm has been investigated by real field trials using a WiFi tablet on hand with an inertial sensor on foot. It could be concluded that the proposed method reduces the complexity of the positioning algorithm obviously, as well as offers a significant improvement in position accuracy compared to other conventional algorithms, allowing indoor positioning error below 1.2 m.

  9. Radiofrequency exposure from wireless LANs utilizing Wi-Fi technology.

    Science.gov (United States)

    Foster, Kenneth R

    2007-03-01

    This survey measured radiofrequency (RF) fields from wireless local area networks (WLANs) using Wi-Fi technology against a background of RF fields in the environment over the frequency range 75 MHz-3 GHz. A total of 356 measurements were conducted at 55 sites (including private residences, commercial spaces, health care and educational institutions, and other public spaces) in four countries (U.S., France, Germany, Sweden). Measurements were conducted under conditions that would result in the higher end of exposures from such systems. Where possible, measurements were conducted in public spaces as close as practical to the Wi-Fi access points. Additional measurements were conducted at a distance of approximately 1 m from a laptop while it was uploading and downloading large files to the WLAN. This distance was chosen to allow a useful comparison of fields in the far-field of the antenna in the laptop, and give a representative measure of the exposure that a bystander might receive from the laptop. The exposure to the user, particularly if the antenna of the client card were placed against his or her body, would require different measurement techniques beyond the scope of this study. In all cases, the measured Wi-Fi signal levels were very far below international exposure limits (IEEE C95.1-2005 and ICNIRP) and in nearly all cases far below other RF signals in the same environments. An discusses technical aspects of the IEEE 802.11 standard on which WLANs operate that are relevant to determining the levels of RF energy exposure from WLANs. Important limiting factors are the low operating power of client cards and access points, and the low duty cycle of transmission that normally characterizes their operation.

  10. Electromagnetic radiation (Wi-Fi) and epilepsy induce calcium entry and apoptosis through activation of TRPV1 channel in hippocampus and dorsal root ganglion of rats.

    Science.gov (United States)

    Ghazizadeh, Vahid; Nazıroğlu, Mustafa

    2014-09-01

    Incidence rates of epilepsy and use of Wi-Fi worldwide have been increasing. TRPV1 is a Ca(2+) permeable and non-selective channel, gated by noxious heat, oxidative stress and capsaicin (CAP). The hyperthermia and oxidant effects of Wi-Fi may induce apoptosis and Ca(2+) entry through activation of TRPV1 channel in epilepsy. Therefore, we tested the effects of Wi-Fi (2.45 GHz) exposure on Ca(2+) influx, oxidative stress and apoptosis through TRPV1 channel in the murine dorsal root ganglion (DRG) and hippocampus of pentylentetrazol (PTZ)-induced epileptic rats. Rats in the present study were divided into two groups as controls and PTZ. The PTZ groups were divided into two subgroups namely PTZ + Wi-Fi and PTZ + Wi-Fi + capsazepine (CPZ). The hippocampal and DRG neurons were freshly isolated from the rats. The DRG and hippocampus in PTZ + Wi-Fi and PTZ + Wi-Fi + CPZ groups were exposed to Wi-Fi for 1 hour before CAP stimulation. The cytosolic free Ca(2+), reactive oxygen species production, apoptosis, mitochondrial membrane depolarization, caspase-3 and -9 values in hippocampus were higher in the PTZ group than in the control although cell viability values decreased. The Wi-Fi exposure induced additional effects on the cytosolic Ca(2+) increase. However, pretreatment of the neurons with CPZ, results in a protection against epilepsy-induced Ca(2+) influx, apoptosis and oxidative damages. In results of whole cell patch-clamp experiments, treatment of DRG with Ca(2+) channel antagonists [thapsigargin, verapamil + diltiazem, 2-APB, MK-801] indicated that Wi-Fi exposure induced Ca(2+) influx via the TRPV1 channels. In conclusion, epilepsy and Wi-Fi in our experimental model is involved in Ca(2+) influx and oxidative stress-induced hippocampal and DRG death through activation of TRPV1 channels, and negative modulation of this channel activity by CPZ pretreatment may account for the neuroprotective activity against oxidative stress.

  11. Real-Time and Accurate Indoor Localization with Fusion Model of Wi-Fi Fingerprint and Motion Particle Filter

    Directory of Open Access Journals (Sweden)

    Xinlong Jiang

    2015-01-01

    Full Text Available As the development of Indoor Location Based Service (Indoor LBS, a timely localization and smooth tracking with high accuracy are desperately needed. Unfortunately, any single method cannot meet the requirement of both high accuracy and real-time ability at the same time. In this paper, we propose a fusion location framework with Particle Filter using Wi-Fi signals and motion sensors. In this framework, we use Extreme Learning Machine (ELM regression algorithm to predict position based on motion sensors and use Wi-Fi fingerprint location result to solve the error accumulation of motion sensors based location occasionally with Particle Filter. The experiments show that the trajectory is smoother as the real one than the traditional Wi-Fi fingerprint method.

  12. An Overview of different Business Models for public Wi-Fi and their Implications on Indirect Revenue

    OpenAIRE

    Kaiser, Tobias Werner; Verbrugge, Sofie; Van der Wee, Marlies; Colle, Didier

    2017-01-01

    The importance of public Wi-Fi for providing service to customers and mobile data offloading is steadily increasing. This paper aimed at analyzing the business model of select cases of customer-facing and municipal Wi-Fi networks with respect to physical setting, network ownership, service provisioning, (in)direct revenues, and cooperational benefits. Depending on the setting, different sources of indirect revenue can be identified, in particular with respect to the difference between custome...

  13. EMI and BER/PER Analysis of Wi-Fi and Bluetooth Communication for CRIP Platform

    DEFF Research Database (Denmark)

    Ravelo, Blaise; Cabral, Jorge; Wagner, Stefan Rahr

    This paper is devoted to the characterization of the electromagnetic interference (EMI) effects on wireless communication devices for telemedicine healthcare application. The proposed wireless system operates at the 2.4GHz ISM band with a hardware interface communicating by Wi-Fi and BLE (Bluetooth...... path loss model is investigated for the indoor RF link budget. The quality of the EM coverage and SNR and SINR on QoS with transmitted data BER and PER is analysed. It was examined that the QoS can be degraded according to the distance between the Wi-Fi and BLE device sensitivity and also...

  14. The current state of evidence regarding the health effects of wifi communication systems Sistemas de comunicación wifi y efectos sobre la salud. El estado de las evidencias actuales Sistemas de comunicação wifi e efeitos na saúde: O estado atual da evidência

    Directory of Open Access Journals (Sweden)

    Francisco Vargas Marcos

    2012-08-01

    Full Text Available Some communication media have reported alleged health risks, especially in schools, related to exposure to Radio Frequencies (RF emitted by wifi telecommunication systems. These reports have generated demands for information, which the relevant environmental health authorities have to deal with in a transparent, clear and effective way, based on current scientific evidence. This study describes the main technical features of wifi systems, the rules that govern their operation, the authorized levels of emission, and the levels observed in some specific studies.Until now, very few specific studies have been undertaken about the health effects associated to exposure to RF emitted by these systems. This article describes the main risk assessments and the more relevant studies published by prestigious specialized international agencies.The study details the current state of knowledge about the health effects of RF and the international recommendations proposed, regarding the safety of these technologies. It concludes that, to date, there is no consistent evidence that exposure to the RF signals emitted by wifi systems, below internationally accepted guidelines, has adverse health effects on the general population. There are no scientific reasons to justify that wifi systems should be removed from schools or should not be used by the rest of the population.En algunos medios de comunicación se ha informado sobre supuestos riesgos para la salud, especialmente en el ámbito escolar, derivados de la exposición a las radiofrecuencias (RF emitidas por los sistemas de telecomunicación inalámbricos (wifi, en su abreviatura en inglés. Estas noticias han generado demandas de información que las autoridades sanitarias competentes en salud ambiental deben responder de forma transparente, clara, eficaz y basada en el conocimiento científico actual. En este trabajo se describen las principales características técnicas de estos sistemas, las normas que

  15. ARQ Security in Wi-Fi and RFID Networks

    OpenAIRE

    Elsabagh, Mohamed; Abdallah, Yara; Youssef, Moustafa; Gamal, Hesham El

    2010-01-01

    In this paper, we present two practical ARQ-Based security schemes for Wi-Fi and RFID networks. Our proposed schemes enhance the confidentiality and authenticity functions of these networks, respectively. Both schemes build on the same idea; by exploiting the statistical independence between the multipath fading experienced by the legitimate nodes and potential adversaries, secret keys are established and then are continuously updated. The continuous key update property of both schemes makes ...

  16. Pioneering SUPER - Small Unit Passively-safe Enclosed Reactor - 15559

    International Nuclear Information System (INIS)

    Bhownik, P.K.; Gairola, A.; Shamim, J.A.; Suh, K.Y.; Suh, K.S.

    2015-01-01

    This paper presents the basic features of the Small Unit Passively-safe Enclosed Reactor abbreviated as SUPER, a new reactor system that has been designed and proposed at the Seoul National University's Department of Energy Systems Engineering. SUPER is a small modular reactor system or SMR that is cooled by sub-cooled as well as supercritical water. As a new member of SMRs, SUPER is a small-scale nuclear plant that is designed to be factory-manufactured and shipped as modules to be assembled at a site. The concept offers promising answers to many questions about nuclear power including proliferation resistance, waste management, safety, and startup costs. SUPER is a customized paradigm of a supercritical water reactor or SCWR, a type sharing commonalities with the current fleet of light water reactors, or LWRs. SUPER has evolved from the System-integrated Modular Advance Reactor, or SMART, being developed at the Korea Atomic Energy Research Institute, or KAERI. SUPER enhanced the safety features for robustness, design/equipment simplification for natural convection, multi-purpose application for co-generation flexibilities, suitable for isolated or small electrical grids, just-in-time capacity addition, short construction time, and last, but not least, lower capital cost per unit. The primary objectives of SUPER is to develop the conceptual design for a safe and economic small, natural circulation SCWR, to address the economic and safety attributes of the concept, and to demonstrate its technical feasibilities. (authors)

  17. Received Signal Strength Database Interpolation by Kriging for a Wi-Fi Indoor Positioning System.

    Science.gov (United States)

    Jan, Shau-Shiun; Yeh, Shuo-Ju; Liu, Ya-Wen

    2015-08-28

    The main approach for a Wi-Fi indoor positioning system is based on the received signal strength (RSS) measurements, and the fingerprinting method is utilized to determine the user position by matching the RSS values with the pre-surveyed RSS database. To build a RSS fingerprint database is essential for an RSS based indoor positioning system, and building such a RSS fingerprint database requires lots of time and effort. As the range of the indoor environment becomes larger, labor is increased. To provide better indoor positioning services and to reduce the labor required for the establishment of the positioning system at the same time, an indoor positioning system with an appropriate spatial interpolation method is needed. In addition, the advantage of the RSS approach is that the signal strength decays as the transmission distance increases, and this signal propagation characteristic is applied to an interpolated database with the Kriging algorithm in this paper. Using the distribution of reference points (RPs) at measured points, the signal propagation model of the Wi-Fi access point (AP) in the building can be built and expressed as a function. The function, as the spatial structure of the environment, can create the RSS database quickly in different indoor environments. Thus, in this paper, a Wi-Fi indoor positioning system based on the Kriging fingerprinting method is developed. As shown in the experiment results, with a 72.2% probability, the error of the extended RSS database with Kriging is less than 3 dBm compared to the surveyed RSS database. Importantly, the positioning error of the developed Wi-Fi indoor positioning system with Kriging is reduced by 17.9% in average than that without Kriging.

  18. The Making of a Sustainable Wireless City? Mapping Public Wi-Fi Access in Shanghai

    Directory of Open Access Journals (Sweden)

    Mingfeng Wang

    2016-01-01

    Full Text Available In the context of the global information economy, ready access to the Internet is critical to a city’s competitiveness, which has prompted a number of cities to launch plans to establish wireless networks. Most literature on the development of wireless cities focuses on cities in Western countries, and few have discussed how Chinese cities have adopted wireless technologies in their urban infrastructure development efforts. This paper examines recent development and spatial distribution of public Wi-Fi access in Shanghai, a leading business hub in China. We mapped Wi-Fi hotspots through the government sponsored “i-Shanghai” project and China Mobile Communications Corporation (CMCC. We find that while telecommunication providers have been proactively deploying WLAN (wireless local area network,a proxy of public Wi-Fi or wireless access hotspots in Shanghai, neither government sponsored WLAN hotspots nor facilities established by CMCC could cover the old traditional neighborhoods in the central city and sub-districts in remote rural areas. We also address the development of a more sustainable wireless city in Shanghai with a particular focus on digital divide and social equity issues.

  19. Estimating Bus Loads and OD Flows Using Location-Stamped Farebox and Wi-Fi Signal Data

    Directory of Open Access Journals (Sweden)

    Yuxiong Ji

    2017-01-01

    Full Text Available Electronic fareboxes integrated with Automatic Vehicle Location (AVL systems can provide location-stamped records to infer passenger boarding at individual stops. However, bus loads and Origin-Destination (OD flows, which are useful for route planning, design, and real-time controls, cannot be derived directly from farebox data. Recently, Wi-Fi sensors have been used to collect passenger OD flow information. But the data are insufficient to capture the variation of passenger demand across bus trips. In this study, we propose a hierarchical Bayesian model to estimate trip-level OD flow matrices and a period-level OD flow matrix using sampled OD flow data collected by Wi-Fi sensors and boarding data provided by fareboxes. Bus loads on each bus trip are derived directly from the estimated trip-level OD flow matrices. The proposed method is evaluated empirically on an operational bus route and the results demonstrate that it provides good and detailed transit route-level passenger demand information by combining farebox and Wi-Fi signal data.

  20. ANDROID CHATTING APPLICATION BASED ON WI-FI TECHNOLOGY

    OpenAIRE

    Ekata M. Lambture *, Prof. Z.M. Shaikh

    2016-01-01

    As we know that Android operating system is one of the popular operating system for mobile applications.It supports mobile applications such as Chatting based applications,File sharing applications etc. In market thosands of applications are available in which users can send-receive messages,shares the files,send images,audio,video through network connectivity such as 2G,3G,4G. Android chatting application based on wi-fi technology provides same features but using WI-FI(Wireless Fidelity)...

  1. WiFi Hot Spot Service Business for the Automotive and Oil Industries: A Competitive Analysis

    Directory of Open Access Journals (Sweden)

    Louis-Francois PAU

    2010-01-01

    Full Text Available While you refuel for gas, why not refuel for information or upload vehicle data, using a cheap wireless technology as WiFi? This paper analyzes in extensive detail the user segmentation by vehicle usage, service offering, and full business models from WiFi hot spot services delivered to and from vehicles (private, professional, public around gas stations. Are also analyzed the parties which play a role in such services: authorization, provisioning and delivery, with all the dependencies modelled by attributed digraphs. Account is made of WiFi base station technical capabilities and costs. Five year financial models (CAPEX, OPEX, and data pertain to two possible service suppliers: multi-service oil companies, and mobile service operators (or MVNOs. Model optimization on the return-on-investment (R.O.I. is carried out for different deployment scenarios, geographical coverage assumptions, as well as tariff structures. Comparison is also being made with public GPRS and 3G data services, as precursors to HSPA/LTE, and the effect of WiFi roaming is analyzed. Regulatory implications, including those dealing with public safety, are addressed. Analysis shows that due to manpower costs and marketing costs, suitable R.O.I. will not be achieved unless externalities are accounted for and innovative tariff structures are introduced. Open issues and further research are outlined. Further work is currently carried out with automotive electronics sector, wireless systems providers, wireless terminals platform suppliers, and vehicle manufacturers. Future relevance of this work is also discussed for the emerging electrical reloading grids for electrical vehicles.

  2. Spectrum Graph Coloring and Applications to Wi-Fi Channel Assignment

    Directory of Open Access Journals (Sweden)

    David Orden

    2018-03-01

    Full Text Available We introduce and explore a family of vertex-coloring problems, which, surprisingly enough, have not been considered before despite stemming from the problem of Wi-Fi channel assignment. Given a spectrum of colors, endowed with a matrix of interferences between each pair of colors, the Threshold Spectrum Coloring problem fixes the number of colors available and aims to minimize the interference threshold, i.e., the maximum of the interferences at the vertices. Conversely, the Chromatic Spectrum Coloring problem fixes a threshold and aims to minimize the number of colors for which respecting that threshold is possible. As the main theoretical results, we prove tight upper bounds for the solutions to each problem. Since both problems turn out to be NP-hard, we complete the scene with experimental results. We propose a DSATUR-based heuristic and study its performance to minimize the maximum vertex interference in Wi-Fi channel assignment, both for randomly-generated graphs and for a real-world scenario. Further, for all these graphs, we experimentally check the goodness of the theoretical bounds.

  3. Friend-to-friend short message service with opportunistic Wi-Fi beacons

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    This study introduces Oppline, an ad hoc opportunistic short message service that can be collaboratively used by everyone who has a smart mobile device. The data exchange method of Oppline is built on top of the universal Wi-Fi standard, thus expedites platform-independent integration of related

  4. Investigating the Attitudes and Views of the Librarians and Faculty members of Shiraz University over deploying Wi-Fi in Academic Libraries

    Directory of Open Access Journals (Sweden)

    Jafar Mehrad

    2009-01-01

    Full Text Available Given the importance and wide scope of Wi-Fi applications within academic environs in developed countries and its use in library services, its utilization within academic libraries in Iran is felt. While presenting Wi-Fi networks, the present study employed a survey of librarians and faculty members in Shiraz University to investigate their the outlook and viewpoints regarding the deployment of such networks in academic libraries. Findings demonstrated that librarians are very inclined to use Wi-Fi in library services such as listing, shelf-reading and OPAC and demand comprehensive network coverage throughout the entire library spaces. Meanwhile, faculty members expressed the necessity of increasing use of such networks all over the campus and remote access to library resources. Generally given the outcome of the present investigation, although Wi-Fi application in libraries is a novel and emerging phenomenon yet to catch on in Iran, librarians, researchers and professors are very keen about its use and application within academic environments.

  5. Design and Development of Multi-Transceiver Lorafi Board consisting LoRa and ESP8266-Wifi Communication Module

    Science.gov (United States)

    Azmi, Noraini; Sudin, Sukhairi; Munirah Kamarudin, Latifah; Zakaria, Ammar; Visvanathan, Retnam; Chew Cheik, Goh; Mamduh Syed Zakaria, Syed Muhammad; Abdullah Alfarhan, Khudhur; Badlishah Ahmad, R.

    2018-03-01

    The advancement of Micro-Electro-Mechanical-Systems (MEMS), microcontroller technologies and the idea of Internet of Things (IoT) motivates the development of wireless modules (e.g. WiFi, Bluetooth, Zigbee, and LoRa) that are small and affordable. This paper aims to provide detailed information on the development of the LoRaFi board. The LoRaFi 1.0 is a multi-protocol communication board developed by Centre of Excellence for Advanced Sensor Technology (CEASTech). The board was developed for but not limited to monitor the indoor air quality. The board comprises two different wireless communication modules namely, Long-range technology (LoRa) and WiFi (using ESP8266). The board can be configured to communicate either using LoRa or WiFi or both. The board has been tested and the wireless communication operates successfully. Apart from LoRa, WiFi enables data to be forwarded to the cloud/server where the data can be stored for further data analysis. This helps provide users with real-time information on their smartphones or other applications. In the future, researchers will conduct tests to investigate the communication link quality. Newer version with reduced board size and additional wireless communication module will be developed in the future as to increase board flexibility and widen the range of applications that can use the board.

  6. Video Sharing System Based on Wi-Fi Camera

    OpenAIRE

    Qidi Lin; Hewei Yu; Jinbin Huang; Weile Liang

    2015-01-01

    This paper introduces a video sharing platform based on WiFi, which consists of camera, mobile phone and PC server. This platform can receive wireless signal from the camera and show the live video on the mobile phone captured by camera. In addition, it is able to send commands to camera and control the camera's holder to rotate. The platform can be applied to interactive teaching and dangerous area's monitoring and so on. Testing results show that the platform can share ...

  7. Inferring Person-to-person Proximity Using WiFi Signals

    OpenAIRE

    Sapiezynski, Piotr; Stopczynski, Arkadiusz; Wind, David Kofoed; Leskovec, Jure; Lehmann, Sune

    2016-01-01

    Today's societies are enveloped in an ever-growing telecommunication infrastructure. This infrastructure offers important opportunities for sensing and recording a multitude of human behaviors. Human mobility patterns are a prominent example of such a behavior which has been studied based on cell phone towers, Bluetooth beacons, and WiFi networks as proxies for location. However, while mobility is an important aspect of human behavior, understanding complex social systems requires studying no...

  8. Mobile Sensing of Pedestrian Flocks in Indoor Environments using WiFi Signals

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun; Wirz, Martin; Roggen, Daniel

    2012-01-01

    a cohesive whole - specifically flocks - with clustering approaches operating on three different feature sets derived from WiFi signals which are comparatively analysed. Automatic detection of flocks has several important applications, including social and psychological sensing and emergency research studies...

  9. Enabling LTE and WiFi Coexisting in 5 GHz for Efficient Spectrum Utilization

    Directory of Open Access Journals (Sweden)

    Hongyu Sun

    2017-01-01

    Full Text Available Due to the increasing mobile traffic demands in cellular network, researchers have proposed the coexistence of LTE and WiFi technologies in 5 GHz unlicensed bands. Therefore, how to efficiently utilize the spectrum in 5 GHz becomes extremely important. To avoid the channel access conflicts, current LTE Unlicensed (LTE-U technology introduces the duty cycle of LTE, while License-Assisted Access (LAA technology introduces Listen-Before-Talk (LBT mechanism. While these two technologies improve the spectrum utilization by using time division access schema, we believe that more efficient spectrum utilization can be achieved by enabling simultaneous transmissions from LTE and WiFi. In this paper, we propose a novel method (i.e., Low Amplitude Stream Injection (LASI method to enable the simultaneous transmissions of WiFi and LTE frames in the same channel and recover the data from the conflicts. To further utilize the LASI method, we introduce the Conflict-Tolerant Channel Allocation (CTCA algorithm to optimize the channel allocation and achieve more efficient spectrum utilization in 5 GHz. Extensive simulation results show that our approach achieves lower latency and higher throughput. Compared with the state-of-the-art LTE-U and LAA technologies, our approach can improve the spectrum efficiency 2.9 times.

  10. SKIN - Embodied Navigation Through WiFi Traffic Using Vibro-Tactile Feedback

    DEFF Research Database (Denmark)

    van den Boogaard, Bas; Orsted Jensen, Louise; Nielsen, Stefan Engelbrecht

    2018-01-01

    In today’s world, radio waves are an integral element of our daily lives but they are mostly hidden to human perception. In this paper we present SKIN, a wireless wearable system that creates a new interface between the human and WiFi signals employing sensory augmentation. SKIN translates nearby...

  11. STUDY & SURVEY ON TRASH BIN USING WI-FI TECHNOLOGY

    OpenAIRE

    Yash Kumar Gadwal*, Siddharth Kumar Gupta, VedikaTiwari, Yash Raj Rao, Vedant Bakliwal

    2016-01-01

    India is a country where people love to break the rules, We see it on the roads where no one is driving in their lane. We see it in the way people disrespect public spaces by throwing garbage anywhere that they want to.So the people from THINKSCREAM came up with this idea and invented a trash can that rewards people with 15 minutes of free Wi-Fi every time they throw something away.

  12. Experiences, challenges and lessons from rolling out a rural WiFi mesh network

    CSIR Research Space (South Africa)

    Rey-Moreno, C

    2013-01-01

    Full Text Available The computing for development community knows that technology interventions involve consideration of social, technical and environmental factors. Research into WiFi solutions has fallen off as ubiquitous mobile solutions penetrate even the deepest...

  13. Design and development of plasma antenna for wi-fi application | Ja ...

    African Journals Online (AJOL)

    In this work the commercial fluorescent lamp was chosen because it was low cost to produce plasma element. The plasma antenna in this research was made from fluorescent lamp that functioned as a radiating element with target frequency at 2.4 GHz for Wi-Fi application. The commercial fluorescent lamp consisted of ...

  14. An adaptive weighting algorithm for accurate radio tomographic image in the environment with multipath and WiFi interference

    OpenAIRE

    Wang, M.; Wang, Zhonglei; Bu, X.; Ding, E.

    2017-01-01

    Radio frequency device-free localization based on wireless sensor network has proved its feasibility in buildings. With this technique, a target can be located relying on the changes of received signal strengths caused by the moving object. However, the accuracy of many such systems deteriorates seriously in the environment with WiFi and the multipath interference. State-of-the-art methods do not efficiently solve the WiFi and multipath interference problems at the same time. In this article,...

  15. I/O Standard Based Thermal/Energy Efficient Green Communication For Wi-Fi Protected Access on FPGA

    DEFF Research Database (Denmark)

    Kumar, Tanesh; Pandey, Bishwajeet; Das, Teerath

    2014-01-01

    In this paper, we analyzed how does life and reliability of an integrated circuit is affected when it is operated in different regions under different temperatures. We have taken Fibonacci generator as our target circuit and LVCMOS as I/O standards. WPA and WPA2 (Wi-Fi Protected Access) key can...... be generated with Fibonacci generator. Here, thermal efficient green Fibonacci Generator is used to generate key for Wi-Fi Protected Access in order to make green communication possible under different room temperature. By analysis it is observed that at standard normal temperature (21degrees C), LVCMOS12 have...

  16. Realistic Indoor Wi-Fi and Femto deployment Study as the Offloading Solutions to LTE Macro Network

    DEFF Research Database (Denmark)

    Hu, Liang; Coletti, Claudio; Nguyen, Huan Cong

    2012-01-01

    that, in a dual-carrier LTE macro case, Wi-Fi access point density of 230/km2 is required to meet the Key Performance Indicator (KPI) - less than 10% of users have a throughput below 1 Mbps whereas out-band Femto access point density of 1200/km2 is required. Furthermore, we show that in-band Femto cell...... cannot meet the network KPI even at a very high access point density. We also show that Wi-Fi and Femto cell offload the same amount of traffic when they are deployed at the same access point density....

  17. Načrtovanje in optimizacija brezžičnega merilnega sistema z Wi-Fi modulom

    OpenAIRE

    RAŽMAN, ROK

    2015-01-01

    Namen tega dela je opisati načrtovanje in optimizacijo delovanja brezžičnega merilnega sistema, ki zajema mikrokrmnilnik, Wi-Fi modul in napajalno vezje, in je priključen na ciljni senzor. Umeščen bo v zelo omejen prostor in to predstavlja precejšno težavo z vidika načrtovanja. Vir napajanja je omrežna izmenična napetost, kar pomeni, da mora sistem vključevati majhen, a dovolj zmogljiv AC-DC pretvornik. Največji porabnik toka v sistemu je Wi-Fi modul. Vse omejitve morajo biti upoštevane in vs...

  18. INDOOR LOCALIZATION USING WI-FI BASED FINGERPRINTING AND TRILATERATION TECHIQUES FOR LBS APPLICATIONS

    Directory of Open Access Journals (Sweden)

    S. Chan

    2012-06-01

    Full Text Available The past few years have seen wide spread adoption of outdoor positioning services, mainly GPS, being incorporated into everyday devices such as smartphones and tablets. While outdoor positioning has been well received by the public, its indoor counterpart has been mostly limited to private use due to its higher costs and complexity for setting up the proper environment. The objective of this research is to provide an affordable mean for indoor localization using wireless local area network (WLAN Wi-Fi technology. We combined two different Wi-Fi approaches to locate a user. The first method involves the use of matching the pre-recorded received signal strength (RSS from nearby access points (AP, to the data transmitted from the user on the fly. This is commonly known as "fingerprint matching". The second approach is a distance-based trilateration approach using three known AP coordinates detected on the user's device to derive the position. The combination of the two steps enhances the accuracy of the user position in an indoor environment allowing location-based services (LBS such as mobile augmented reality (MAR to be deployed more effectively in the indoor environment. The mapping of the RSS map can also prove useful to IT planning personnel for covering locations with no Wi-Fi coverage (ie. dead spots. The experiments presented in this research helps provide a foundation for the integration of indoor with outdoor positioning to create a seamless transition experience for users.

  19. Indoor Localization Using Wi-Fi Based Fingerprinting and Trilateration Techiques for Lbs Applications

    Science.gov (United States)

    Chan, S.; Sohn, G.

    2012-06-01

    The past few years have seen wide spread adoption of outdoor positioning services, mainly GPS, being incorporated into everyday devices such as smartphones and tablets. While outdoor positioning has been well received by the public, its indoor counterpart has been mostly limited to private use due to its higher costs and complexity for setting up the proper environment. The objective of this research is to provide an affordable mean for indoor localization using wireless local area network (WLAN) Wi-Fi technology. We combined two different Wi-Fi approaches to locate a user. The first method involves the use of matching the pre-recorded received signal strength (RSS) from nearby access points (AP), to the data transmitted from the user on the fly. This is commonly known as "fingerprint matching". The second approach is a distance-based trilateration approach using three known AP coordinates detected on the user's device to derive the position. The combination of the two steps enhances the accuracy of the user position in an indoor environment allowing location-based services (LBS) such as mobile augmented reality (MAR) to be deployed more effectively in the indoor environment. The mapping of the RSS map can also prove useful to IT planning personnel for covering locations with no Wi-Fi coverage (ie. dead spots). The experiments presented in this research helps provide a foundation for the integration of indoor with outdoor positioning to create a seamless transition experience for users.

  20. Moderate Dose of Trolox Preventing the Deleterious Effects of Wi-Fi Radiation on Spermatozoa In vitro through Reduction of Oxidative Stress Damage

    Science.gov (United States)

    Ding, Shang-Shu; Sun, Ping; Zhang, Zhou; Liu, Xiang; Tian, Hong; Huo, Yong-Wei; Wang, Li-Rong; Han, Yan; Xing, Jun-Ping

    2018-01-01

    Background: The worsening of semen quality, due to the application of Wi-Fi, can be ameliorated by Vitamin E. This study aimed to demonstrate whether a moderate dose of trolox, a new Vitamin E, inhibits oxidative damage on sperms in vitro after exposure to Wi-Fi radiation. Methods: Each of the twenty qualified semen, gathered from June to October 2014 in eugenics clinic, was separated into four aliquots, including sham, Wi-Fi-exposed, Wi-Fi plus 5 mmol/L trolox, and Wi-Fi plus 10 mmol/L trolox groups. At 0 min, all baseline parameters of the 20 samples were measured in sequence. Reactive oxygen species, glutathione, and superoxide dismutase were evaluated in the four aliquots at 45 and 90 min, as were sperm DNA fragments, sperm mitochondrial potential, relative amplification of sperm mitochondrial DNA, sperm vitality, and progressive and immotility sperm. The parameters were analyzed by one-way analysis of variance and Tukey's posttest. Results: Among Wi-Fi plus 5 mmol/L trolox, Wi-Fi-exposed and Wi-Fi plus 10 mmol/L trolox groups, reactive oxygen species levels (45 min: 3.80 ± 0.41 RLU·10−6·ml−1 vs. 7.50 ± 0.35 RLU·10−6·ml−1 vs. 6.70 ± 0.47 RLU·10−6·ml−1, P Fi plus 5 mmol/L trolox group at 45 and 90 min, respectively. Other parameters were not affected, while the sham group maintained the baseline. Conclusion: This study found that 5 mmol/L trolox protected the Wi-Fi-exposed semen in vitro from the damage of electromagnetic radiation-induced oxidative stress. PMID:29451144

  1. Using Wi-Fi to Save Energy via P2P Remote Execution

    DEFF Research Database (Denmark)

    Kristensen, Mads Darø; Bouvin, Niels Olof

    2010-01-01

    tasks. This paper presents energy measurements of a modern mobile computing device, showing that utilising the relatively large CPU of such a device is very expensive - even more so than using Wi-Fi. Experiments performed with the Scavenger cyber foraging system are presented; a system enabling easy...

  2. Design of flood early warning system with wifi network based on smartphone

    Science.gov (United States)

    Supani, Ahyar; Andriani, Yuli; Taqwa, Ahmad

    2017-11-01

    Today, the development using internet of things enables activities surrounding us to be monitored, controlled, predicted and calculated remotely through connections to the internet network such as monitoring activities of long-distance flood warning with information technology. Applying an information technology in the field of flood early warning has been developed in the world, either connected to internet network or not. The internet network that has been done in this paper is the design of WiFi network to access data of rainfall, water level and flood status at any time with a smartphone coming from flood early warning system. The results obtained when test of data accessing with smartphone are in form of rainfall and water level graphs against time and flood status indicators consisting of 3 flood states: Standby 2, Standby 1 and Flood. It is concluded that data are from flood early warning system has been able to accessed and displayed on smartphone via WiFi network in any time and real time.

  3. Seismic design margin evaluation of systems and equipment required for safe shutdown of North Anna, Units 1 and 2, following an SSE (safe-shutdown earthquake) event. Technical report

    International Nuclear Information System (INIS)

    Desai, K.D.

    1981-06-01

    The Advisory Committee on Reactor Safeguards recommended that the NRC staff review in detail the capability and available seismic design margin of fluid systems and equipment used in North Anna, Units 1 and 2 to achieve safe shutdown following a site-design safe-shutdown earthquake (SSE). The staff conducted a series of plant visits and meetings with the licensee to view and discuss the seismic design methodology used for systems, equipment and their supports. The report is a description and evaluation of the seismic design criteria, design conservatisms and seismic design margin for North Anna, Units 1 and 2

  4. LI-FI Has Just Been Tested In The Real World And It Is 100 Times Faster Than WI-FI

    Directory of Open Access Journals (Sweden)

    Praneethkumar

    2015-08-01

    Full Text Available Light Fidelity refers to Visible Light Communication systems using light-emitting diodes as a medium to high-speed communication in a similar manner as WI-FI. Now a days where internet has become a major demand people are in a search for WI-FI hotspots. LI-FI is New Life of data communication is a better alternative to WI-FI in wireless communication. This paper proposes a survey on LI-FI Technology and analyzes its performance with respect to existing technology. The concept of LI-FI is data communication on fast flickering of light which is not detected by human eye but it is focused on photo detector which converts the on-off state into binary digital data. It has gained a huge popularity in two years of its invention. Such technology has brought not only greener but safer and cheaper future of communication.

  5. Effects of spatial and spectral frequencies on wide-field functional imaging (wifi) characterization of preclinical breast cancer models

    Science.gov (United States)

    Moy, Austin; Kim, Jae G.; Lee, Eva Y. H. P.; Choi, Bernard

    2010-02-01

    A common strategy to study breast cancer is the use of the preclinical model. These models provide a physiologically relevant and controlled environment in which to study both response to novel treatments and the biology of the cancer. Preclinical models, including the spontaneous tumor model and mammary window chamber model, are very amenable to optical imaging and to this end, we have developed a wide-field functional imaging (WiFI) instrument that is perfectly suited to studying tumor metabolism in preclinical models. WiFI combines two optical imaging modalities, spatial frequency domain imaging (SFDI) and laser speckle imaging (LSI). Our current WiFI imaging protocol consists of multispectral imaging in the near infrared (650-980 nm) spectrum, over a wide (7 cm x 5 cm) field of view. Using SFDI, the spatially-resolved reflectance of sinusoidal patterns projected onto the tissue is assessed, and optical properties of the tissue are determined, which are then used to extract tissue chromophore concentrations in the form of oxy-, deoxy-, and total hemoglobin concentrations, and percentage of lipid and water. In the current study, we employ Monte Carlo simulations of SFDI light propagation in order to characterize the penetration depth of light in both the spontaneous tumor model and mammary window chamber model. Preliminary results suggest that different spatial frequency and wavelength combinations have different penetration depths, suggesting the potential depth sectioning capability of the SFDI component of WiFI.

  6. To localise or to be localised with Wifi in the Hubei museum?

    NARCIS (Netherlands)

    Verbree, E.; Zlatanova, S.; Van Winden, K.; Van der Laan, E.B.; Makri, A.; Taizhou, L.; Haojun, A.

    2013-01-01

    Indoor localisation is in demand for a variety of applications within the built environment. An overall solution based on a single technology has not yet been determined. The aim of this paper is to gain insight on Signal Strength monitoring by a special kind of WiFi Monitors in comparison to the

  7. Effects of Wi-Fi (2.45 GHz) Exposure on Apoptosis, Sperm Parameters and Testicular Histomorphometry in Rats: A Time Course Study.

    Science.gov (United States)

    Shokri, Saeed; Soltani, Aiob; Kazemi, Mahsa; Sardari, Dariush; Mofrad, Farshid Babapoor

    2015-01-01

    In today's world, 2.45-GHz radio-frequency radiation (RFR) from industrial, scientific, medical, military and domestic applications is the main part of indoor-outdoor electromagnetic field exposure. Long-term effects of 2.45-GHz Wi-Fi radiation on male reproductive system was not known completely. Therefore, this study aimed to investigate the major cause of male infertility during short- and long-term exposure of Wi-Fi radiation. This is an animal experimental study, which was conducted in the Department of Anatomical Sciences, Faculty of Medicine, Zanjan University of Medical Sciences, Zanjan, IRAN, from June to August 2014. Three-month-old male Wistar rats (n=27) were exposed to the 2.45 GHz radiation in a chamber with two Wi-Fi antennas on opposite walls. Animals were divided into the three following groups: I. control group (n=9) including healthy animals without any exposure to the antenna, II. 1-hour group (n=9) exposed to the 2.45 GHz Wi-Fi radiation for 1 hour per day during two months and III.7-hour group (n=9) exposed to the 2.45 GHz Wi-Fi radiation for 7 hours per day during 2 months. Sperm parameters, caspase-3 concentrations, histomorphometric changes of testis in addition to the apoptotic indexes were evaluated in the exposed and control animals. Both 1-hour and 7-hour groups showed a decrease in sperm parameters in a time dependent pattern. In parallel, the number of apoptosis-positive cells and caspase-3 activity increased in the seminiferous tubules of exposed rats. The seminal vesicle weight reduced significantly in both1-hour or 7-hour groups in comparison to the control group. Regarding to the progressive privilege of 2.45 GHz wireless networks in our environment, we concluded that there should be a major concern regarding the timedependent exposure of whole-body to the higher frequencies of Wi-Fi networks existing in the vicinity of our living places.

  8. Cooperation Techniques between LTE in Unlicensed Spectrum and Wi-Fi towards Fair Spectral Efficiency.

    Science.gov (United States)

    Maglogiannis, Vasilis; Naudts, Dries; Shahid, Adnan; Giannoulis, Spilios; Laermans, Eric; Moerman, Ingrid

    2017-08-31

    On the road towards 5G, a proliferation of Heterogeneous Networks (HetNets) is expected. Sensor networks are of great importance in this new wireless era, as they allow interaction with the environment. Additionally, the establishment of the Internet of Things (IoT) has incredibly increased the number of interconnected devices and consequently the already massive wirelessly transmitted traffic. The exponential growth of wireless traffic is pushing the wireless community to investigate solutions that maximally exploit the available spectrum. Recently, 3rd Generation Partnership Project (3GPP) announced standards that permit the operation of Long Term Evolution (LTE) in the unlicensed spectrum in addition to the exclusive use of the licensed spectrum owned by a mobile operator. Alternatively, leading wireless technology developers examine standalone LTE operation in the unlicensed spectrum without any involvement of a mobile operator. In this article, we present a classification of different techniques that can be applied on co-located LTE and Wi-Fi networks. Up to today, Wi-Fi is the most widely-used wireless technology in the unlicensed spectrum. A review of the current state of the art further reveals the lack of cooperation schemes among co-located networks that can lead to more optimal usage of the available spectrum. This article fills this gap in the literature by conceptually describing different classes of cooperation between LTE and Wi-Fi. For each class, we provide a detailed presentation of possible cooperation techniques that can provide spectral efficiency in a fair manner.

  9. CBRS Spectrum Sharing between LTE-U and WiFi: A Multiarmed Bandit Approach

    Directory of Open Access Journals (Sweden)

    Imtiaz Parvez

    2016-01-01

    Full Text Available The surge of mobile devices such as smartphone and tablets requires additional capacity. To achieve ubiquitous and high data rate Internet connectivity, effective spectrum sharing and utilization of the wireless spectrum carry critical importance. In this paper, we consider the use of unlicensed LTE (LTE-U technology in the 3.5 GHz Citizens Broadband Radio Service (CBRS band and develop a multiarmed bandit (MAB based spectrum sharing technique for a smooth coexistence with WiFi. In particular, we consider LTE-U to operate as a General Authorized Access (GAA user; hereby MAB is used to adaptively optimize the transmission duty cycle of LTE-U transmissions. Additionally, we incorporate downlink power control which yields a high energy efficiency and interference suppression. Simulation results demonstrate a significant improvement in the aggregate capacity (approximately 33% and cell-edge throughput of coexisting LTE-U and WiFi networks for different base station densities and user densities.

  10. Chernobyl new safe confinement

    International Nuclear Information System (INIS)

    Dodd, L.

    2011-01-01

    The author presents the new safe confinement that will be commissioned at Unit 4 of the Chernobyl NPP in 2015. The confinement will ensure that Chernobyl Unit 4 will be placed in an environmentally safe condition for at least next 100 years. The article highlights the current work status, future perspectives and the feasibility of confinement concept [ru

  11. In-building Unlicensed WiFi Band OFDM Signal Distribution over MMF&BIF Using VCSEL

    DEFF Research Database (Denmark)

    Deng, Lei; Jensen, Jesper Bevensee; Yu, Xianbin

    2011-01-01

    For in-building applications, an OFDM-VCSEL RoF system operating in unlicensed WiFi band is experimentally tested using MMF and bend insensitive fiber (BIF). A spectral efficiency of 4.32 bit/s/Hz with 0.9 Gbps data rate is achieved....

  12. Models of information exchange between radio interfaces of Wi-Fi group of standards

    Science.gov (United States)

    Litvinskaya, O. S.

    2018-05-01

    This paper offers models of information exchange between radio interfaces of the Wi-Fi group of standards by the example of a real facility management system for the oil and gas industry. Interaction between the MU-MIMO and MIMO technologies is analyzed. An optimal variant of information exchange is proposed.

  13. Cooperation Techniques between LTE in Unlicensed Spectrum and Wi-Fi towards Fair Spectral Efficiency

    Directory of Open Access Journals (Sweden)

    Vasilis Maglogiannis

    2017-08-01

    Full Text Available On the road towards 5G, a proliferation of Heterogeneous Networks (HetNets is expected. Sensor networks are of great importance in this new wireless era, as they allow interaction with the environment. Additionally, the establishment of the Internet of Things (IoT has incredibly increased the number of interconnected devices and consequently the already massive wirelessly transmitted traffic. The exponential growth of wireless traffic is pushing the wireless community to investigate solutions that maximally exploit the available spectrum. Recently, 3rd Generation Partnership Project (3GPP announced standards that permit the operation of Long Term Evolution (LTE in the unlicensed spectrum in addition to the exclusive use of the licensed spectrum owned by a mobile operator. Alternatively, leading wireless technology developers examine standalone LTE operation in the unlicensed spectrum without any involvement of a mobile operator. In this article, we present a classification of different techniques that can be applied on co-located LTE and Wi-Fi networks. Up to today, Wi-Fi is the most widely-used wireless technology in the unlicensed spectrum. A review of the current state of the art further reveals the lack of cooperation schemes among co-located networks that can lead to more optimal usage of the available spectrum. This article fills this gap in the literature by conceptually describing different classes of cooperation between LTE and Wi-Fi. For each class, we provide a detailed presentation of possible cooperation techniques that can provide spectral efficiency in a fair manner.

  14. A design of irregular grid map for large-scale Wi-Fi LAN fingerprint positioning systems.

    Science.gov (United States)

    Kim, Jae-Hoon; Min, Kyoung Sik; Yeo, Woon-Young

    2014-01-01

    The rapid growth of mobile communication and the proliferation of smartphones have drawn significant attention to location-based services (LBSs). One of the most important factors in the vitalization of LBSs is the accurate position estimation of a mobile device. The Wi-Fi positioning system (WPS) is a new positioning method that measures received signal strength indication (RSSI) data from all Wi-Fi access points (APs) and stores them in a large database as a form of radio fingerprint map. Because of the millions of APs in urban areas, radio fingerprints are seriously contaminated and confused. Moreover, the algorithmic advances for positioning face computational limitation. Therefore, we present a novel irregular grid structure and data analytics for efficient fingerprint map management. The usefulness of the proposed methodology is presented using the actual radio fingerprint measurements taken throughout Seoul, Korea.

  15. A Design of Irregular Grid Map for Large-Scale Wi-Fi LAN Fingerprint Positioning Systems

    Directory of Open Access Journals (Sweden)

    Jae-Hoon Kim

    2014-01-01

    Full Text Available The rapid growth of mobile communication and the proliferation of smartphones have drawn significant attention to location-based services (LBSs. One of the most important factors in the vitalization of LBSs is the accurate position estimation of a mobile device. The Wi-Fi positioning system (WPS is a new positioning method that measures received signal strength indication (RSSI data from all Wi-Fi access points (APs and stores them in a large database as a form of radio fingerprint map. Because of the millions of APs in urban areas, radio fingerprints are seriously contaminated and confused. Moreover, the algorithmic advances for positioning face computational limitation. Therefore, we present a novel irregular grid structure and data analytics for efficient fingerprint map management. The usefulness of the proposed methodology is presented using the actual radio fingerprint measurements taken throughout Seoul, Korea.

  16. Modelo ARIMA para pronosticar valores de tráfico en una red de datos Wi-Fi

    Directory of Open Access Journals (Sweden)

    Cesar Augusto Hernández Suarez

    2009-05-01

    Full Text Available El presente artículo de investigación científica y tecnológica tiene por objetivo demostrar que las series de tiempo son una exce- lente herramienta para el modelamiento de tráfico de datos en redes Wi-Fi. Para lograr este objetivo se utilizó la metodología de Box-Jenkins, la cual se describe. El modelamiento de tráfico Wi-Fi a través de modelos correlacionados como las series de tiem- po, permiten ajustar gran parte de la dinámica del comportamiento de los datos en una ecuación y con base en esto estimar va- lores futuros de tráfico. Lo anterior es una ventaja para la planeación de cobertura, reservación de recursos y la realización de un control más oportuno y eficiente en forma integrada a diferentes niveles de la jerarquía funcional de la red de datos Wi-Fi. Como resultado de la investigación se obtuvo un modelo de tráfico ARIMA de orden 6, el cual realizó pronósticos de tráfico con valores del error cuadrático medio relativamente pequeños, para un periodo de 18 días.

  17. An Efficient Normalized Rank Based SVM for Room Level Indoor WiFi Localization with Diverse Devices

    Directory of Open Access Journals (Sweden)

    Yasmine Rezgui

    2017-01-01

    Full Text Available This paper proposes an efficient and effective WiFi fingerprinting-based indoor localization algorithm, which uses the Received Signal Strength Indicator (RSSI of WiFi signals. In practical harsh indoor environments, RSSI variation and hardware variance can significantly degrade the performance of fingerprinting-based localization methods. To address the problem of hardware variance and signal fluctuation in WiFi fingerprinting-based localization, we propose a novel normalized rank based Support Vector Machine classifier (NR-SVM. Moving from RSSI value based analysis to the normalized rank transformation based analysis, the principal features are prioritized and the dimensionalities of signature vectors are taken into account. The proposed method has been tested using sixteen different devices in a shopping mall with 88 shops. The experimental results demonstrate its robustness with no less than 98.75% correct estimation in 93.75% of the tested cases and 100% correct rate in 56.25% of cases. In the experiments, the new method shows better performance over the KNN, Naïve Bayes, Random Forest, and Neural Network algorithms. Furthermore, we have compared the proposed approach with three popular calibration-free transformation based methods, including difference method (DIFF, Signal Strength Difference (SSD, and the Hyperbolic Location Fingerprinting (HLF based SVM. The results show that the NR-SVM outperforms these popular methods.

  18. Wi-Fi and GSM Based Motion Sensor for Home Security System Apllication

    Science.gov (United States)

    Huzaimy Jusoh, Mohamad; Jamali, Muhammad Firdaus Bin; Zainal Abidin, Ahmad Faizal bin; Asari Sulaiman, Ahmad; Fahmi Hussin, Mohamad

    2015-11-01

    The Wi-Fi and GSM based home security system is a system designed to reduce the high rates of crimes in most personal housing. The overall project consists of three major parts; the input part that consists of sensors, the software part that operates the entire hardware structure, and the output part, which consists of camera, alarm system, and micro secure digital (SD) data storage card. It is based on the principle of infrared radiation generated by a human body heat which trigger the passive infrared (PIR) sensor. The microcontroller processes the received signal, then trigger the buzzer alarm, camera and alerts the home owner through an SMS. Once triggered, the camera will capture the image of the intruder and the image will be saved in SD card. As alert to the user (away), the Global System for Mobile Communication (GSM) will send the Short Message Service (SMS) from the device to the user's mobile phone. The image will be sent to Dropbox data cloud storage via Wi-Fi for further clarification. The prototype was successfully developed, tested and has been installed at residential area in Taman Cahaya Alam, Section U12, Shah Alam, Malaysia.

  19. Design and Implementation of a WiFi Based Home Automation System

    OpenAIRE

    Ahmed ElShafee; Karim Alaa Hamed

    2012-01-01

    This paper presents a design and prototype implementation of new home automation system that uses WiFi technology as a network infrastructure connecting its parts. The proposed system consists of two main components; the first part is the server (web server), which presents system core that manages, controls, and monitors users- home. Users and system administrator can locally (LAN) or remotely (internet) manage and control system code. Second part is hardware interface m...

  20. Brca1/p53 deficient mouse breast tumor hemodynamics during hyperoxic respiratory challenge monitored by a novel wide-field functional imaging (WiFI) system

    Science.gov (United States)

    Moy, Austin; Kim, Jae G.; Lee, Eva Y. H. P.; Tromberg, Bruce; Cerussi, Albert; Choi, Bernard

    2009-02-01

    Current imaging modalities allow precise visualization of tumors but do not enable quantitative characterization of the tumor metabolic state. Such quantitative information would enhance our understanding of tumor progression and response to treatment, and to our overall understanding of tumor biology. To address this problem, we have developed a wide-field functional imaging (WiFI) instrument which combines two optical imaging modalities, spatially modulated imaging (MI) and laser speckle imaging (LSI). Our current WiFI imaging protocol consists of multispectral imaging in the near infrared (650-980 nm) spectrum, over a wide (7 cm × 5 cm) field of view. Using MI, the spatially-resolved reflectance of sinusoidal patterns projected onto the tissue is assessed, and optical properties of the tissue are estimated using a Monte Carlo model. From the spatial maps of local absorption and reduced scattering coefficients, tissue composition information is extracted in the form of oxy-, deoxy-, and total hemoglobin concentrations, and percentage of lipid and water. Using LSI, the reflectance of a 785 nm laser speckle pattern on the tissue is acquired and analyzed to compute maps of blood perfusion in the tissue. Tissue metabolism state is estimated from the values of blood perfusion, volume and oxygenation state. We currently are employing the WiFI instrument to study tumor development in a BRCA1/p53 deficient mice breast tumor model. The animals are monitored with WiFI during hyperoxic respiratory challenge. At present, four tumors have been measured with WiFI, and preliminary data suggest that tumor metabolic changes during hyperoxic respiratory challenge can be determined.

  1. An investigation of scalable anomaly detection techniques for a large network of Wi-Fi hotspots

    CSIR Research Space (South Africa)

    Machaka, P

    2015-01-01

    Full Text Available . The Neural Networks, Bayesian Networks and Artificial Immune Systems were used for this experiment. Using a set of data extracted from a live network of Wi-Fi hotspots managed by an ISP; we integrated algorithms into a data collection system to detect...

  2. A Crowd-Sourcing Indoor Localization Algorithm via Optical Camera on a Smartphone Assisted by Wi-Fi Fingerprint RSSI.

    Science.gov (United States)

    Chen, Wei; Wang, Weiping; Li, Qun; Chang, Qiang; Hou, Hongtao

    2016-03-19

    Indoor positioning based on existing Wi-Fi fingerprints is becoming more and more common. Unfortunately, the Wi-Fi fingerprint is susceptible to multiple path interferences, signal attenuation, and environmental changes, which leads to low accuracy. Meanwhile, with the recent advances in charge-coupled device (CCD) technologies and the processing speed of smartphones, indoor positioning using the optical camera on a smartphone has become an attractive research topic; however, the major challenge is its high computational complexity; as a result, real-time positioning cannot be achieved. In this paper we introduce a crowd-sourcing indoor localization algorithm via an optical camera and orientation sensor on a smartphone to address these issues. First, we use Wi-Fi fingerprint based on the K Weighted Nearest Neighbor (KWNN) algorithm to make a coarse estimation. Second, we adopt a mean-weighted exponent algorithm to fuse optical image features and orientation sensor data as well as KWNN in the smartphone to refine the result. Furthermore, a crowd-sourcing approach is utilized to update and supplement the positioning database. We perform several experiments comparing our approach with other positioning algorithms on a common smartphone to evaluate the performance of the proposed sensor-calibrated algorithm, and the results demonstrate that the proposed algorithm could significantly improve accuracy, stability, and applicability of positioning.

  3. Long-lasting changes in brain activation induced by a single REAC technology pulse in Wi-Fi bands. Randomized double-blind fMRI qualitative study.

    Science.gov (United States)

    Rinaldi, Salvatore; Mura, Marco; Castagna, Alessandro; Fontani, Vania

    2014-07-11

    The aim of this randomized double-blind study was to evaluate in healthy adult subjects, with functional magnetic resonance imaging (fMRI), long lasting changes in brain activation patterns following administration of a single, 250 milliseconds pulse emitted with radio-electric asymmetric conveyer (REAC) technology in the Wi-Fi bands. The REAC impulse was not administered during the scan, but after this, according to a protocol that has previously been demonstrated to be effective in improving motor control and postural balance, in healthy subjects and patients. The study was conducted on 33 healthy volunteers, performed with a 1.5 T unit while operating a motor block task involving cyclical and alternating flexion and extension of one leg. Subsequently subjects were randomly divided into a treatment and a sham treatment control group. Repeated fMRI examinations were performed following the administration of the REAC pulse or sham treatment. The Treated group showed cerebellar and ponto-mesencephalic activation components that disappeared in the second scan, while these activation components persisted in the Sham group. This study shows that a very weak signal, such as 250 milliseconds Wi-Fi pulse, administered with REAC technology, could lead to lasting effects on brain activity modification.

  4. Wi-Fi Walkman : A wireless handhold that shares and recommends music on peer-to-peer networks

    NARCIS (Netherlands)

    Wang, J.; Reinders, M.J.T.; Pouwelse, J.; Lagendijk, R.L.

    2005-01-01

    The Wi-Fi walkman is a mobile multimedia application that we developed to investigate the technological and usability aspects of human-computer interaction with personalized, intelligent and context-aware wearable devices in peer-to-peer wireless environments such as the future home, office, or

  5. "Same Room, Safe Place".

    Science.gov (United States)

    Keene Woods, Nikki

    2017-04-01

    There are many different professional stances on safe sleep and then there is the reality of caring for a newborn. There is a debate among professionals regarding safe sleep recommendations. The continum of recommendations vary from the American Academy of Pediatrics (AAP) Safe Sleep Guidelines to the bed-sharing recommendations from the Mother-Baby Behavioral Sleep Laboratory. The lack of consistent and uniform safe sleep recommendations from health professionals has been confusing for families but has more recently raised a real professional ethical dilemma. Despite years of focused safe sleep community education and interventions, sleep-related infant deaths are on the rise in many communities. This commentary calls for a united safe sleep message from all health professionals to improve health for mothers and infants most at-risk, "Same Room, Safe Place."

  6. Being safe: making the decision to have a planned home birth in the United States.

    Science.gov (United States)

    Lothian, Judith A

    2013-01-01

    Although there is evidence that supports the safety of planned home birth for healthy women, less than 1 percent of women in the United States choose to have their baby at home. An ethnographic study of the experience of planned home birth provided rich descriptions of women's experiences planning, preparing for, and having a home birth.This article describes findings related to how women make the decision to have a planned home birth. For these women, being safe emerged as central in making the decision. For them, being safe included four factors: avoiding technological birth interventions, knowing the midwife and the midwife knowing them, feeling comfortable and protected at home, and knowing that backup hospital medical care was accessible if needed.

  7. Pemanfaatan Mikrotik RB750 Untuk Jaringan Wifi Pada SMK Muhammadiyah Kudus

    Directory of Open Access Journals (Sweden)

    R Rhoedy Setiawan

    2013-06-01

    Full Text Available Abstrak Dengan kendala user yang terbatas dan software pencatatan user yang terdata yang relatif mahal, pendekatan yang dilakukan adalah pembuatan sebuah software yang ke depan bisa menekan biaya.Pengaksesan internet untuk kalangan SMK Muhammadiyah Kudus dibatasi penggunaannya untuk penghematan biaya pembelian bandwidht akses internet.Pengaturan hak akses internet di SMK Muhammadiyah Kudus sekarang ini menggunakan mikrotik RB 750. Diharapkan alat yang digunakan dapat mencapai pengguna yang lebih banyak, diantara alat pilihan lain yang digunakan dalam penelitian jaringan berbasis wifi. Keyword: software, microtic rb750, bandwidht

  8. Evaluation of the Protective Role of Vitamin C on the Metabolic and Enzymatic Activities of the Liver in the Male Rats After Exposure to 2.45 GHz Of Wi-Fi Routers

    Directory of Open Access Journals (Sweden)

    Shekoohi-Shooli F.

    2016-09-01

    Full Text Available Background: The use of devices emitted microwave radiation such as mobile phones, wireless fidelity (Wi-Fi routers, etc. is increased rapidly. It has caused a great concern; the researchers should identify its effects on people’s health. We evaluated the protective role of Vitamin C on the metabolic and enzymatic activities of the liver after exposure to Wi-Fi routers. Material and Methods: 70 male Wistar rats weighing 200-250 g were randomly divided into 7 groups (10 rats in each group.The first stage one –day test: Group A (received vitamin C 250 mg/kg/day orally together with 8- hour/day Wi-Fi exposure. Group B (exposed to Wi-Fi radiation. Group C (received vitamin C. Group D or Control (was neither exposed to radiation of Wi-Fi modem nor did receive vitamin C. The second phase of experiment had done for five consecutive days. It involved Group E (received vitamin C, Group F (exposed to Wi-Fi radiation, Group G (received vitamin C together with Wi-Fi radiation. The distance between animals’ restrainers was 20 cm away from the router antenna. Finally, blood samples were collected and assayed the level of hepatic enzymes including alkaline phosphatase(ALP, alanine amino transferase(ALT aspartate amino transferase (ASL, gamma glutamyl transferase (GGT and the concentration of Blood Glucose, Cholesterol , Triglyceride(TG,High density lipoprotein (HDLand low density lipoprotein (LDL. Results: Data obtained from the One day test showed an increase in concentration of blood glucose, decrease in Triglyceride level and GGT factor (P<0.05, however no observed significant difference on the Cholesterol , HDL , LDL level and hepatic enzymes activities in compare to control group. Groups of the five-day test showed reduction in the amount of blood glucose, elevation of cholesterol level and LDL relative to control group(P<0.05. Conclusion: WiFi exposure may exert alternations on the metabolic parameters and hepatic enzymes activities through stress

  9. PERANCANGAN DAN ANALISA JARINGAN KOMPUTER DENGAN MENGGUNAKAN TEKNOLOGI NIRKABEL BERBASIS WIFI PADA STMIK AMIKOM PURWOKERTO

    Directory of Open Access Journals (Sweden)

    Muhammad Imron

    2010-08-01

    Full Text Available The purpose of this research is to design a computer network-based wireless technolgy with Wi-Fi, especially to overcome problems that occur due to design of computer network are still based on cable technology that is still widely used and inefficient use of bandwidth for file transfer. The  methods used include two main parts namely the design methods amd analytical methods. Design method is used to create a wireless network topology as well as making new applications for file transfer and analytical methods used to analyze system that are running. So that the results achieved is the design of a network that has high mobility and bandwidth savings. Conclusions obtained that by conversion system from Ethernet networks into wireless network to increase the number of clients that can access into the network and could increase employee mobility notebook users. In addition, the addition of a  new file transfer application could reduce traffic to the Internet bandwidth usage. Keywords : wirelless LAN, access point, Wi-Fi topology, File Transfer.

  10. Multi-Radio Mobile Device in Role of Hybrid Node Between WiFi and LTE networks

    Directory of Open Access Journals (Sweden)

    Pavel Masek

    2015-05-01

    Full Text Available With the ubiquitous wireless network coverage, Machine-Type Communications (MTC is emerging to enable data transfers using devices/sensors without need for human interaction. In this paper we, we introduce a comprehensive simulation scenario for modeling and analysis for heterogeneous MTC. We demonstrate the most expected scenario of MTC communication using the IEEE 802.11 standard for direct communication between sensors and for transmitting data between individual sensor and Machine-Type Communication Gateway (MTCG. The MTCG represents the hybrid node serving as bridge between two heterogeneous networks (WiFi and LTE. Following the idea of hybrid node, two active interfaces must be implemented on this node together with mechanism for handling the incoming traffic (from WiFi network to LTE network. As a simulation tool, the Network Simulator 3 (NS-3 with implemented LTE/EPC Network Simulator (LENA framework was used. The major contribution of this paper therefore lies in the implementation of logic for interconnection of two heterogeneous networks in simulation environment NS-3.

  11. SDN-Based Mobile Data Offloading Scheme Using a Femtocell and WiFi Networks

    Directory of Open Access Journals (Sweden)

    Chang-Woo Ahn

    2017-01-01

    Full Text Available Because of the many applications running on smartphones, the load of mobile data traffic on cellular networks is increasing rapidly. A femtocell is a solution to increase the cellular network capacity and coverage. However, because it uses the same frequency bands as a macrocell, interference problems have prevented its widespread adoption. In this paper, we propose a scheme for traffic offloading between femtocells and WiFi networks utilizing software-defined networking (SDN technology. In the proposed offloading scheme, the SDN technology allows a terminal to maintain existing sessions after offloading through a centralized control of the SDN-based equipment. We also propose an offloading target selection scheme based on available bandwidth estimation and an association control mechanism to reduce the femtocell load while ensuring quality of service (QoS in terms of throughput. Experimental results on an actual testbed showed that the proposed offloading scheme provides seamless connectivity and reduces the femtocell load by up to 46% with the aid of the proposed target selection scheme, while ensuring QoS after offloading. We also observed that the proposed target selection scheme offloads 28% more traffic to WiFi networks compared to received signal strength indicator-based target selection in a low background traffic environment.

  12. Diseño e implementación de un nodo con portal cautivo aplicado a redes Wi-fi en software libre

    OpenAIRE

    Roque Tito, Edwin

    2010-01-01

    Un Portal Cautivo es un programa de una red informática que vigila el tráfico HTTP y fuerza a los usuarios de una red a garantizar su acceso a las funciones de la red Wi-Fi, así como navegar por Internet de forma normal; el presente trabajo de investigación aplicada se tituló "Diseño e Implementación de un Nodo con Portal Cautivo Aplicado a Redes Wi-Fi en Software Libre", y se localizó en la ciudad de Puno, con la finalidad de, habilitar acceso seguro a la red para usuarios, mediante un Web B...

  13. Safe and Secure Services Based on NGN

    Science.gov (United States)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  14. The Design and Implementation of a Low Cost and High Security Smart Home System Based on Wi-Fi and SSL Technologies

    Science.gov (United States)

    Xu, Chong-Yao; Zheng, Xin; Xiong, Xiao-Ming

    2017-02-01

    With the development of Internet of Things (IoT) and the popularity of intelligent mobile terminals, smart home system has come into people’s vision. However, due to the high cost, complex installation and inconvenience, as well as network security issues, smart home system has not been popularized. In this paper, combined with Wi-Fi technology, Android system, cloud server and SSL security protocol, a new set of smart home system is designed, with low cost, easy operation, high security and stability. The system consists of Wi-Fi smart node (WSN), Android client and cloud server. In order to reduce system cost and complexity of the installation, each Wi-Fi transceiver, appliance control logic and data conversion in the WSN is setup by a single chip. In addition, all the data of the WSN can be uploaded to the server through the home router, without having to transit through the gateway. All the appliance status information and environmental information are preserved in the cloud server. Furthermore, to ensure the security of information, the Secure Sockets Layer (SSL) protocol is used in the WSN communication with the server. What’s more, to improve the comfort and simplify the operation, Android client is designed with room pattern to control home appliances more realistic, and more convenient.

  15. A Novel Hybrid Intelligent Indoor Location Method for Mobile Devices by Zones Using Wi-Fi Signals.

    Science.gov (United States)

    Castañón-Puga, Manuel; Salazar, Abby Stephanie; Aguilar, Leocundo; Gaxiola-Pacheco, Carelia; Licea, Guillermo

    2015-12-02

    The increasing use of mobile devices in indoor spaces brings challenges to location methods. This work presents a hybrid intelligent method based on data mining and Type-2 fuzzy logic to locate mobile devices in an indoor space by zones using Wi-Fi signals from selected access points (APs). This approach takes advantage of wireless local area networks (WLANs) over other types of architectures and implements the complete method in a mobile application using the developed tools. Besides, the proposed approach is validated by experimental data obtained from case studies and the cross-validation technique. For the purpose of generating the fuzzy rules that conform to the Takagi-Sugeno fuzzy system structure, a semi-supervised data mining technique called subtractive clustering is used. This algorithm finds centers of clusters from the radius map given by the collected signals from APs. Measurements of Wi-Fi signals can be noisy due to several factors mentioned in this work, so this method proposed the use of Type-2 fuzzy logic for modeling and dealing with such uncertain information.

  16. A Novel Hybrid Intelligent Indoor Location Method for Mobile Devices by Zones Using Wi-Fi Signals

    Directory of Open Access Journals (Sweden)

    Manuel Castañón–Puga

    2015-12-01

    Full Text Available The increasing use of mobile devices in indoor spaces brings challenges to location methods. This work presents a hybrid intelligent method based on data mining and Type-2 fuzzy logic to locate mobile devices in an indoor space by zones using Wi-Fi signals from selected access points (APs. This approach takes advantage of wireless local area networks (WLANs over other types of architectures and implements the complete method in a mobile application using the developed tools. Besides, the proposed approach is validated by experimental data obtained from case studies and the cross-validation technique. For the purpose of generating the fuzzy rules that conform to the Takagi–Sugeno fuzzy system structure, a semi-supervised data mining technique called subtractive clustering is used. This algorithm finds centers of clusters from the radius map given by the collected signals from APs. Measurements of Wi-Fi signals can be noisy due to several factors mentioned in this work, so this method proposed the use of Type-2 fuzzy logic for modeling and dealing with such uncertain information.

  17. PENGEMBANGAN VARIATIF RANCANGAN ANTENA PANEL MICROSTRIP TAPERED PATCH DALAM SISTEM KOMUNIKASI WI-FI

    Directory of Open Access Journals (Sweden)

    Putu Artawan

    2013-04-01

    Full Text Available Pada penelitian ini dilakukan pengembangan rancangan antena microstrip tapered patch untuk dilakukan pengukuran parameternya sebagai karakteristik dari antena Microstrip. Penelitian ini sebagai pengembangan variatif rancangan untuk memperoleh hasil yang lebih optimal. Metode eksperiment dilakukan dalam penelitian ini. Tahap pengerjaanya yaitu membuat desain rancangan antena sesuai persamaan yang ada yang kemudian dirancang dengan metode UV Photoresist laminate. Hasil rancangan antena diukur untuk mendapatkan karakteristik sebagai parameter antena meliputi frekuensi (bandwidth, SWR, VSWR, koofesien refleksi, pola radiasi dan penguatan (gain serta nilai HPBW. Nilai-nilai tersebut mencerminkan karakter dari sebuah antena sebagai parameter antena yang layak diimplementasikan dalam sistem komunikasi internet dengan sistem wi-fi. Hasil penelitian ini meliputi: nilai lebar pita (bandwidth = 0.21 GHz, VSWR = 1,23, SWR = 1,79,  return loss = -20,00 dB, koofesien refleksi = 0,10 dan grafik pola radiasi dengan penguatan (gain = 17 dB (polarisasi vertikal, 20 dB (polarisasi horizontal. Nilai Half Power Beamwidth (HPBW 820 untuk pola radiasi vertikal dan pola radiasi horizontal. Kesalahan (error hasil pengukuran 0,12% dengan keseksamaan 99,88%. Hasil ini memberikan indikasi sebagai rancangan antena yang layak untuk sistem komunikasi wi-fi. Penelitian ini sebagai salah satu aplikasi ilmu Fisika dalam dunia teknologi informasi dan diharapkan dapat bermanfaat sebagai dinamika wahana salah satu produk penerapan ilmu Fisika dalam bidang Teknologi Informasi.

  18. Error Analysis for RADAR Neighbor Matching Localization in Linear Logarithmic Strength Varying Wi-Fi Environment

    Directory of Open Access Journals (Sweden)

    Mu Zhou

    2014-01-01

    Full Text Available This paper studies the statistical errors for the fingerprint-based RADAR neighbor matching localization with the linearly calibrated reference points (RPs in logarithmic received signal strength (RSS varying Wi-Fi environment. To the best of our knowledge, little comprehensive analysis work has appeared on the error performance of neighbor matching localization with respect to the deployment of RPs. However, in order to achieve the efficient and reliable location-based services (LBSs as well as the ubiquitous context-awareness in Wi-Fi environment, much attention has to be paid to the highly accurate and cost-efficient localization systems. To this end, the statistical errors by the widely used neighbor matching localization are significantly discussed in this paper to examine the inherent mathematical relations between the localization errors and the locations of RPs by using a basic linear logarithmic strength varying model. Furthermore, based on the mathematical demonstrations and some testing results, the closed-form solutions to the statistical errors by RADAR neighbor matching localization can be an effective tool to explore alternative deployment of fingerprint-based neighbor matching localization systems in the future.

  19. Error Analysis for RADAR Neighbor Matching Localization in Linear Logarithmic Strength Varying Wi-Fi Environment

    Science.gov (United States)

    Tian, Zengshan; Xu, Kunjie; Yu, Xiang

    2014-01-01

    This paper studies the statistical errors for the fingerprint-based RADAR neighbor matching localization with the linearly calibrated reference points (RPs) in logarithmic received signal strength (RSS) varying Wi-Fi environment. To the best of our knowledge, little comprehensive analysis work has appeared on the error performance of neighbor matching localization with respect to the deployment of RPs. However, in order to achieve the efficient and reliable location-based services (LBSs) as well as the ubiquitous context-awareness in Wi-Fi environment, much attention has to be paid to the highly accurate and cost-efficient localization systems. To this end, the statistical errors by the widely used neighbor matching localization are significantly discussed in this paper to examine the inherent mathematical relations between the localization errors and the locations of RPs by using a basic linear logarithmic strength varying model. Furthermore, based on the mathematical demonstrations and some testing results, the closed-form solutions to the statistical errors by RADAR neighbor matching localization can be an effective tool to explore alternative deployment of fingerprint-based neighbor matching localization systems in the future. PMID:24683349

  20. Safe use of nanomaterials

    CERN Multimedia

    2013-01-01

    The use of nanomaterials  is on the increase worldwide, including at CERN. The HSE Unit has established a safety guideline to inform you of the main requirements for the safe handling and disposal of nanomaterials at CERN.   A risk assessment tool has also been developed which guides the user through the process of evaluating the risk for his or her activity. Based on the calculated risk level, the tool provides a list of recommended control measures.   We would therefore like to draw your attention to: Safety Guideline C-0-0-5 - Safe handling and disposal of nanomaterials; and Safety Form C-0-0-2 - Nanomaterial Risk Assessment   You can consult all of CERN’s safety rules and guidelines here. Please contact the HSE Unit for any questions you may have.   The HSE Unit

  1. Dynamic Load Balancing with Handover in Hybrid Li-Fi and Wi-Fi Networks

    OpenAIRE

    Haas, Harald; Wang, Yunlu

    2015-01-01

    In this paper, a hybrid network combining lightfidelity (Li-Fi) with a radio frequency (RF) wireless fidelity(Wi-Fi) network is considered. An additional tier of very smallLi-Fi attocells which utilise the visible light spectrum offers asignificant increase in wireless data throughput in an indoorenvironment while at the same time providing room illumination.Importantly, there is no interference between Li-Fi and Wi-Fi.A Li-Fi attocell covers a significantly smaller area than a Wi-Fi access p...

  2. Leveraging 802.11n frame aggregation to enhance QoS and power consumption in Wi-Fi networks

    NARCIS (Netherlands)

    Camps-Mur, D.; Gomony, M.D.; Perez-Costa, X.; Sallent-Ribes, S.

    2012-01-01

    The Wi-Fi technology, driven by its tremendous success, is expanding into a wide variety of devices and applications. However, many of these new devices, like handheld devices, pose new challenges in terms of QoS and energy efficiency. In order to address these challenges, in this paper we study how

  3. Analysis of bluetooth and wi-fi technology to measure wait times of personal vehicles at Arizona-Mexico ports of entry.

    Science.gov (United States)

    2015-11-01

    Robust travel time data collection is possible using Bluetooth or Wi-Fi technology that : matches anonymous MAC addresses from discoverable electronic devices (e.g., smart phones) : to determine travel time along a roadway segment. Several hundred...

  4. Sistemas de comunicación wifi y efectos sobre la salud. El estado de las evidencias actuales

    Directory of Open Access Journals (Sweden)

    Francisco Vargas Marcos

    2012-08-01

    Full Text Available En algunos medios de comunicación se ha informado sobre supuestos riesgos para la salud, especialmente en el ámbito escolar, derivados de la exposición a las radiofrecuencias (RF emitidas por los sistemas de telecomunicación inalámbricos (wifi, en su abreviatura en inglés. Estas noticias han generado demandas de información que las autoridades sanitarias competentes en salud ambiental deben responder de forma transparente, clara, eficaz y basada en el conocimiento científico actual. En este trabajo se describen las principales características técnicas de estos sistemas, las normas que regulan su funcionamiento, los niveles de emisión autorizados y los niveles observados en algunos estudios específicos.Hasta el momento se han realizado muy pocos trabajos específicos de los efectos sobre la salud derivados de la exposición a las RF que emiten estos sistemas. En este trabajo se describen las principales evaluaciones de riesgo y los estudios más relevantes publicados por agencias internacionales especializadas de reconocido prestigio. Se detalla el estado actual del conocimiento sobre los efectos de las RF sobre la salud y las recomendaciones internacionales formuladas sobre la seguridad de estas tecnologías.Se concluye que no hay evidencia consistente hasta la fecha de que la exposición a señales de radiofrecuencia procedentes de wifi, por debajo de los niveles aceptados internacionalmente, tengan efectos adversos para la salud de la población general. No hay razones que justifiquen que los sistemas wifi deban ser retirados de las escuelas o que no deban ser utilizados por otros grupos de la población.

  5. Design of Pulse Oximeter with WiFi Connectivity and Interoperability with Standard HL7 and IEEE 11073-10404:2008

    Directory of Open Access Journals (Sweden)

    Víctor Ochoa

    2014-12-01

    Full Text Available Given that health is so relevant for global productivity and competitiveness, and that the Information and Communications Technology (ICTs play an important role in all of the productivity factors, this work makes use of the ICTs in health matters proposing the to use a WiFi oximeter. This article describes the operating principles of a Pulse Oximeter (PO which is an opto-electronic non-invasive medical instrument capable of measuring changes in heart rate (HR and SpO2 at the fingertip and its upgrade to the standards; HL7 and IEEE 11073-10404:2008, its design, and its validation against the three existing devices. Variables (SpO2%, Ppm and Temperature were compared, and its performance and impact were discussed the addition of the WiFi technology allows a better communication between devices, causing a greater impact in global competiveness.

  6. Effect of Intrafix® SafeSet infusion apparatus on phlebitis in a neurological intensive care unit: a case-control study.

    Science.gov (United States)

    Liu, F; Chen, D; Liao, Y; Diao, L; Liu, Y; Wu, M; Xue, X; You, C; Kang, Y

    2012-01-01

    To investigate the effect of the Intrafix(®) SafeSet infusion apparatus on the incidence of phlebitis in patients being intravenously infused in a neurological intensive care unit (ICU). Patients aged > 12 years, with no history of diabetes mellitus and no existing phlebitis, requiring a daily peripheral intravenous infusion of ≥ 8 h with the total period lasting ≥ 3 days, were enrolled. Infusions were performed using the Intrafix(®) SafeSet or normal infusion apparatus. Incidence of phlebitis (scored according to the Infusion Nursing Standards of Practice of the American Infusion Nurses Society) was analysed. Patients (n = 1545) were allocated to Intrafix(®) SafeSet (n = 709) or normal infusion (n = 836) groups, matched for age, gender and preliminary diagnosis. Incidence of phlebitis was significantly higher using normal infusion apparatus compared with the Intrafix(®) SafeSet (23.4% versus 17.9%, respectively). Intrafix(®) SafeSet infusion apparatus significantly reduced the incidence of phlebitis in patients in the neurological ICU, compared with normal infusion apparatus, and may be suitable for use in routine clinical practice.

  7. Algoritmo para geolocalización de dispositivos móviles a partir de emisores de WIFI

    Directory of Open Access Journals (Sweden)

    María Portillo Montiel

    2015-04-01

    Full Text Available Esta investigación propone un método para la geolocalización de dispositivos móviles a partir de señales WiFi predeterminadas, prescindiendo del uso del GPS para evitar potenciales problemas de seguridad y malware. El método propuesto, se basa en la técnica conocida como Punto de Triangulación Aproximado (APIT y parte de una discretización del espacio de acción a partir de un conjunto base de emisores de señal WiFi de coordenadas y radios de acción máximos conocidos, para luego construir una rejilla que incluye las zonas de acción conjunta de todos los emisores al momento de activar la aplicación, es posible estimar con gran precisión la ubicación del dispositivo móvil determinando el área de intersección de las señales visibles en el momento. La implementación del algoritmo propuesto exhibe una complejidad temporal cuadrática respecto al tamaño de la rejilla y lineal sobre la cantidad de emisores iniciales.

  8. Modeling of Wi-Fi IEEE 802.11ac Offloading Performance For 1000x Capacity Expansion of LTE-Advanced

    DEFF Research Database (Denmark)

    Hu, Liang; Sanchez, Maria Laura Luque; Maternia, Michael

    2013-01-01

    This paper studies indoor Wi-Fi IEEE 802.11ac deployment as a capacity expansion solution of LTE-A (Long Term Evolution-Advanced) network to achieve 1000 times higher capacity. Besides increasing the traffic volume by a factor of x1000, we also increase the minimum target user data rate to 10Mbit...

  9. Increased Microleakage of Amalgam Restorations after Exposure to 2.4 Ghz Radiofrequency Electromagnetic Fields from Common Wi-Fi Routers

    Directory of Open Access Journals (Sweden)

    Mortazavi SMJ

    2017-09-01

    Full Text Available Statement of Problem: Previous studies have shown that exposure of dental amalgam fillings to MRI and mobile phones can increase microleakage of amalgam restorations. Objectives: The aim of this study was to evaluate the effects of exposure to radiofrequency radiation emitted from indoor Wi-Fi access devices on microleakage of amalgam restorations. Materials and Methods: Standard class V cavities were prepared on the buccal surfaces of 69 extracted human premolar teeth. The samples were divided into two exposure groups and one non-exposed control group of 23 teeth each. The specimens in the experimental groups were exposed to a radiofrequency (RF radiation emitted from a commercial 2.4 GHz Wi Fi router. The distance between the Wi-Fi router and samples was 30 cm and the router was exchanging data with a laptop computer that was placed 20 m away from the router. Teeth samples in the first exposure group (group A were exposed to RF for 3 days while the second exposure group (group B was exposed for 6 days. Then the teeth were sectioned and scored for microleakage under a stereomicroscope. Results: The score of microleakage was significantly higher in the exposure group A compared to that of the control group. However, the score of microleakage was not significantly different between the exposure group B and control group. Furthermore, the scores of microleakage was signifi-cantly higher in the exposure group A than that of the exposure group B. Conclusions: Exposure of patients with amalgam restorations to radiofre-quency waves emitted from commercial Wi-Fi routers can lead to in-creased microleakage of amalgam restorations.

  10. The Society for Vascular Surgery Wound, Ischemia, and foot Infection (WIfI) classification system predicts wound healing but not major amputation in patients with diabetic foot ulcers treated in a multidisciplinary setting.

    Science.gov (United States)

    Mathioudakis, Nestoras; Hicks, Caitlin W; Canner, Joseph K; Sherman, Ronald L; Hines, Kathryn F; Lum, Ying W; Perler, Bruce A; Abularrage, Christopher J

    2017-06-01

    The Society for Vascular Surgery Wound, Ischemia, and foot Infection (WIfI) threatened limb classification has been shown to correlate well with risk of major amputation and time to wound healing in heterogeneous diabetic and nondiabetic populations. Major amputation continues to plague the most severe stage 4 WIfI patients, with 1-year amputation rates of 20% to 64%. Our aim was to determine the association between WIfI stage and wound healing and major amputation among patients with diabetic foot ulcers (DFUs) treated in a multidisciplinary setting. All patients presenting to our multidisciplinary DFU clinic from July 2012 to December 2015 were enrolled in a prospective database. Wound healing and major amputation were compared for patients stratified by WIfI classification. There were 217 DFU patients with 439 wounds (mean age, 58.3 ± 0.8 years; 58% male, 63% black) enrolled, including 28% WIfI stage 1, 11% stage 2, 33% stage 3, and 28% stage 4. Peripheral arterial disease and dialysis were more common in patients with advanced (stage 3 or 4) wounds (P ≤ .05). Demographics of the patients, socioeconomic status, and comorbidities were otherwise similar between groups. There was a significant increase in the number of active wounds per limb at presentation with increasing WIfI stage (stage 1, 1.1 ± 0.1; stage 4, 1.4 ± 0.1; P = .03). Mean wound area (stage 1, 2.6 ± 0.6 cm 2 ; stage 4, 15.3 ± 2.8 cm 2 ) and depth (stage 1, 0.2 ± 0.0 cm; stage 4, 0.8 ± 0.1 cm) also increased progressively with increasing wound stage (P healing (P healing time was 190 ± 17 days, and risk of major amputation at 1 year was 5.7% ± 3.2%. Among patients with DFU, the WIfI classification system correlated well with wound healing but was not associated with risk of major amputation at 1 year. Although further prospective research is warranted, our results suggest that use of a multidisciplinary approach for DFUs may augment healing time and reduce amputation

  11. Sistem Administrasi Proses Belajar Mengajar Di Program Studi Teknik Telekomunikasi PNJ Berbasis Android dengan Transmisi WiFi

    Directory of Open Access Journals (Sweden)

    Toto Supriyanto

    2016-11-01

    Full Text Available Sistem Administrasi Proses Belajar Mengajar di Program Studi Teknik Telekomunikasi PNJ Berbasis Android dengan Transmisi Wifi  merupakan sebuah sistem untuk pencatatan kegiatan belajar mengajar berupa absen mahasiswa dan materi pembelajaran setiap harinya. Web server bertindak sebagai admin dan aplikasi android sebagai user. User dalam hal ini adalah dosen. Aplikasi ini terinstal pada tablet PC dan setiap menggunakan aplikasi ini user akan melakukan login terlebih dahulu dengan memasukkan username dan password sesuai dengan database server. Setelah melakukan login aplikasi akan menampilkan halaman menu. Pada halaman menu berisi  profil dosen, kelas dan mata kuliah yang diajar oleh dosen, kurikulum yang ada di program studi teknik telekomunikasi PNJ dan jadwal mengajar dosen. Pada menu jadwal, dosen dapat melakukan absensi mahasiswa didik. Dosen melakukan absen satu persatu dengan menekan tombol “absen”. Data absensi dikirimkan ke web server dengan transmisi wifi dan masuk ke halaman lembar kontrol kegiatan dimana user diminta untuk mencatatkan judul materi. Web server akan menyimpan seluruh data yang dikirimkan oleh aplikasi android dan mengakumulasi absensi mahasiswa. Jika terdapat mahasiswa yang tidak hadir pada jam belajar dan memiliki masalah pada jumlah absensi sistem akan mengirimkan notifikasi berupa SMS kepada mahasiswa bersangkutan melalui SMS gateway.

  12. Sistem Navigasi Indoor Menggunakan Sinyal Wi-Fi dan Kompas Digital Berbasis Integrasi dengan Smartphone untuk Studi Kasus pada Gedung Bertingkat

    Directory of Open Access Journals (Sweden)

    Alifa Ridho Musthafa

    2017-01-01

    Full Text Available Sistem navigasi menggunakan teknologi GPS saat ini sudah sangat maju ketika digunakan di luar ruangan. Namun, sistem tersebut masih kurang akurat ketika digunakan di dalam ruangan. Hal tersebut disebabkan karena GPS tidak bekerja dengan baik ketika berada di dalam ruangan. Di sisi lain, sudah ada sistem yang dapat menggantikan GPS untuk studi kasus di dalam ruangan, salah satunya yaitu sistem indoor localization berbasis Wi-fi. Memanfaatkan sistem indoor localization berbasis Wi-fi, dibuatlah sistem navigasi yang dapat digunakan di dalam ruangan. Sistem indoor localization digunakan untuk menentukan posisi pengguna. Setelah posisi pengguna diketahui, rute terbaik menuju tujuan pengguna ditentukan dengan bantuan algoritma A* dan kompas digital digunakan untuk menentukan arah kemana pengguna harus pergi. Studi kasus ini dilakukan di kampus Teknik Informatika ITS. Sistem indoor localization yang digunakan untuk menggantikan fungsi GPS dalam menentukan posisi mampu menghasilkan presentase rata-rata akurasi pendeteksian lokasi sebesar 88,953%. Sedangkan untuk uji coba pencarian rute, sistem indoor navigation dapat memberikan rute terpendek pada semua kasus percobaan.

  13. The Society for Vascular Surgery lower extremity threatened limb classification system based on Wound, Ischemia, and foot Infection (WIfI) correlates with risk of major amputation and time to wound healing.

    Science.gov (United States)

    Zhan, Luke X; Branco, Bernardino C; Armstrong, David G; Mills, Joseph L

    2015-04-01

    The purpose of this study was to evaluate whether the new Society for Vascular Surgery (SVS) Wound, Ischemia, and foot Infection (WIfI) classification system correlates with important clinical outcomes for limb salvage and wound healing. A total of 201 consecutive patients with threatened limbs treated from 2010 to 2011 in an academic medical center were analyzed. These patients were stratified into clinical stages 1 to 4 on the basis of the SVS WIfI classification. The SVS objective performance goals of major amputation, 1-year amputation-free survival (AFS) rate, and wound healing time (WHT) according to WIfI clinical stages were compared. The mean age was 58 years (79% male, 93% with diabetes). Forty-two patients required major amputation (21%); 159 (78%) had limb salvage. The amputation group had a significantly higher prevalence of advanced stage 4 patients (P healing. As the clinical stage progresses, the risk of major amputation increases, 1-year AFS declines, and WHT is prolonged. We further demonstrated benefit of revascularization to improve WHT in selected patients, especially those in stage 3. Future efforts are warranted to incorporate the SVS WIfI classification into clinical decision-making algorithms in conjunction with a comorbidity index and anatomic classification. Copyright © 2015 Society for Vascular Surgery. Published by Elsevier Inc. All rights reserved.

  14. Regulatory approaches in the United States of America for safe management and disposal of long-lived radionuclides

    International Nuclear Information System (INIS)

    Greeves, J.T.; Bell, M.J.; Nelson, R.A.

    1998-01-01

    Regulation of the safe management and disposal of commercial, man-made, long-lived radioactive wastes in the United States is the responsibility of the US Nuclear Regulatory Commission (NRC). In some instances, state regulatory authorities have entered into agreements with the NRC to exercise regulatory authority over management and disposal of low-level radioactive wastes and uranium mill tailings within their borders. The legal and regulatory framework employed to achieve safe management and disposal of long-lived radioactive wastes in the US regulatory system is quite detailed, and in many cases the requirements are considerably prescriptive. The NRC has undertaken an initiative to move in the direction of adopting risk-informed, performance-based and risk-informed, less-prescriptive regulations. The current status and future direction of the legal and regulatory framework for management and disposal of commercial long-lived radioactive waste in the US is described. (author)

  15. Perancangan Rectenna (Rectifier Antenna) Sebagai Pengubah Daya Elektromagnetik Menjadi Output DC Pada Frekuensi Wifi 2.4 Ghz

    OpenAIRE

    Ali Mustofa, ST., MT., Ahmad Fauzi., Rudy Yuwono, ST., M.Sc

    2014-01-01

    Penelitian ini membahas tentang perancangan dan pembuatan rectenna (rectifier antenna) sebagai pengubah daya elektromagnetik menjadi output DC yang bekerja pada frekuensi wifi 2.4 Ghz. Pemanenan energi ini merupakan salah satu alternatif konversi energi, di mana melalui proses ini dapat menghasilkan daya listrik yang dapat digunakan pada perangkat yang membutuhkan daya yang kecil. Dalam proses perancangan dan pembuatan rectenna ini dilakukan simulasi dengan menggunakan software Multisim 11 un...

  16. Interventions to Improve Safe Sleep Among Hospitalized Infants at Eight Children's Hospitals.

    Science.gov (United States)

    Kuhlmann, Stephanie; Ahlers-Schmidt, Carolyn R; Lukasiewicz, Gloria; Truong, Therese Macasiray

    2016-02-01

    Within hospital pediatric units, there is a lack of consistent application or modeling of the American Academy of Pediatrics recommendations for safe infant sleep. The purpose of this study was to improve safe sleep practices for infants in nonneonatal pediatric units with implementation of specific interventions. This multi-institutional study was conducted by using baseline observations collected for sleep location, position, and environment (collectively, "safe sleep") of infants admitted to pediatric units. Interventions consisted of: (1) staff education, including a commitment to promote safe sleep; (2) implementing site-generated safe sleep policies; (3) designating supply storage in patient rooms; and/or (4) caregiver education. Postintervention observations of safe sleep were collected. Eight hospitals participated from the Inpatient FOCUS Group of the Children's Hospital Association. Each site received institutional review board approval/exemption. Safe sleep was observed for 4.9% of 264 infants at baseline and 31.2% of 234 infants postintervention (Ppresent in 77% of cribs at baseline and 44% postintervention. However, the mean number of unsafe items observed in each sleeping environment was reduced by >50% (P=.001). Implementation of site-specific interventions seems to improve overall safe sleep in inpatient pediatric units, although continued improvement is needed. Specifically, extra items are persistently left in the sleeping environment. Moving forward, hospitals should evaluate their compliance with American Academy of Pediatrics recommendations and embrace initiatives to improve modeling of safe sleep. Copyright © 2016 by the American Academy of Pediatrics.

  17. Dukovany NPP - Safely 16 TERA

    International Nuclear Information System (INIS)

    Vlcek, J.

    2008-01-01

    In this presentation increasing of power output of the Dukovany NPP is reviewed. To operate all Dukovany Units safely with the perspective of long-term operation (LTO) of 50 - 60 years it is proposed.

  18. Análisis teórico y experimental sobre seguridad en redes Wi-Fi

    OpenAIRE

    Romero Navarro, Fernando Pablo

    2014-01-01

    Este proyecto realiza un minucioso estudio sobre los mecanismos de seguridad que están disponibles para los dispositivos Wi-Fi, conforme a las especificaciones de la versión del estándar IEEE 802.11 publicada en el año 2007, incluyendo también una breve descripción de las debilidades y de los ataques más importantes que han sido descubiertos y que afectan a estos mecanismos de seguridad. En lo que respecta a la parte práctica, se documenta tanto el análisis como el diseño y se discusten cuest...

  19. Safe-haven CDS Premia

    DEFF Research Database (Denmark)

    Klingler, Sven; Lando, David

    We argue that Credit Default Swap (CDS) premia for safe-haven sovereigns, like Germany and the United States, are driven to a large extent by regulatory requirements under which derivatives dealing banks have an incentive to buy CDS to hedge counterparty credit risk of their counterparties. We...

  20. Wifi, WiMax and LTE multi-hop mesh networks basic communication protocols and application areas

    CERN Document Server

    Wei, Hung-Yu; Dixit, Sudhir

    2013-01-01

    Wifi, WiMAX, and Cellular Multihop Networks presents an overview of WiFi-based and WiMAX-based multihop relay networks. As the first text to cover IEEE 802.16j multihop hop relay technology, this revolutionary resource explores the latest advances in multi-hop and ad-hoc networking. Not only does this reference provide the technological aspects, but also the applications for the emerging technology and architectural issues. Ranging from introductory material to advanced topics, this guidebook, plus PowerPoint slides, is essential for engineers, researchers, and students interested in

  1. Predictive ability of the Society for Vascular Surgery Wound, Ischemia, and foot Infection (WIfI) classification system after first-time lower extremity revascularizations

    NARCIS (Netherlands)

    J. Darling (Jeremy); J.C. McCallum (John C.); P.A. Soden (Peter A.); Guzman, R.J. (Raul J.); Wyers, M.C. (Mark C.); Hamdan, A.D. (Allen D.); H.J.M. Verhagen (Hence); M.L. Schermerhorn (Marc)

    2017-01-01

    markdownabstract__Objective:__ The Society for Vascular Surgery (SVS) Wound, Ischemia and foot Infection (WIfI) classification system was proposed to predict 1-year amputation risk and potential benefit from revascularization. Our goal was to evaluate the predictive ability of this scale in a

  2. Evaluation and Critical Technical Study of Li-Fi Compared with Wi-Fi and WiMax Technology

    OpenAIRE

    Md. Biplob Hossain; Md. Selim Hossain; Md. Mahasin Ali; Md. Toufikur Rahman; Rupam Chandro; Farhana Matin; Md. Dulal Haque

    2015-01-01

    Modern life becomes easier and wireless communications play an important role to do so. In computer networking, wireless technology is a modern alternative to networks that use cables. Li-Fi is a wireless communication system in which light is used as a carrier signal instead of traditional radio frequency as in Wi-Fi. Li-Fi is a technology that uses light emitting diodes to transmit data wirelessly. Li-Fi is a form of Visible Light Communication (VLC). VLC uses rapid pulses of light to trans...

  3. An intelligent IoT emergency vehicle warning system using RFID and Wi-Fi technologies for emergency medical services.

    Science.gov (United States)

    Lai, Yeong-Lin; Chou, Yung-Hua; Chang, Li-Chih

    2018-01-01

    Collisions between emergency vehicles for emergency medical services (EMS) and public road users have been a serious problem, impacting on the safety of road users, emergency medical technicians (EMTs), and the patients on board. The aim of this study is to develop a novel intelligent emergency vehicle warning system for EMS applications. The intelligent emergency vehicle warning system is developed by Internet of Things (IoT), radio-frequency identification (RFID), and Wi-Fi technologies. The system consists of three major parts: a system trigger tag, an RFID system in an emergency vehicle, and an RFID system at an intersection. The RFID system either in an emergency vehicle or at an intersection contains a controller, an ultrahigh-frequency (UHF) RFID reader module, a Wi-Fi module, and a 2.4-GHz antenna. In addition, a UHF ID antenna is especially designed for the RFID system in an emergency vehicle. The IoT system provides real-time visual warning at an intersection and siren warning from an emergency vehicle in order to effectively inform road users about an emergency vehicle approaching. The developed intelligent IoT emergency vehicle warning system demonstrates the capabilities of real-time visual and siren warnings for EMS safety.

  4. Evaluation of the Effect of Radiofrequency Radiation Emitted From Wi-Fi Router and Mobile Phone Simulator on the Antibacterial Susceptibility of Pathogenic Bacteria Listeria monocytogenes and Escherichia coli.

    Science.gov (United States)

    Taheri, M; Mortazavi, S M J; Moradi, M; Mansouri, S; Hatam, G R; Nouri, F

    2017-01-01

    Mobile phones and Wi-Fi radiofrequency radiation are among the main sources of the exposure of the general population to radiofrequency electromagnetic fields (RF-EMF). Previous studies have shown that exposure of microorganisms to RF-EMFs can be associated with a wide spectrum of changes ranged from the modified bacterial growth to the alterations of the pattern of antibiotic resistance. Our laboratory at the nonionizing department of the Ionizing and Non-ionizing Radiation Protection Research Center has performed experiments on the health effects of exposure to animal models and humans to different sources of electromagnetic fields such as cellular phones, mobile base stations, mobile phone jammers, laptop computers, radars, dentistry cavitrons, magnetic resonance imaging, and Helmholtz coils. On the other hand, we have previously studied different aspects of the challenging issue of the ionizing or nonionizing radiation-induced alterations in the susceptibility of microorganisms to antibiotics. In this study, we assessed if the exposure to 900 MHz GSM mobile phone radiation and 2.4 GHz radiofrequency radiation emitted from common Wi-Fi routers alters the susceptibility of microorganisms to different antibiotics. The pure cultures of Listeria monocytogenes and Escherichia coli were exposed to RF-EMFs generated either by a GSM 900 MHz mobile phone simulator and a common 2.4 GHz Wi-Fi router. It is also shown that exposure to RF-EMFs within a narrow level of irradiation (an exposure window) makes microorganisms resistant to antibiotics. This adaptive phenomenon and its potential threats to human health should be further investigated in future experiments. Altogether, the findings of this study showed that exposure to Wi-Fi and RF simulator radiation can significantly alter the inhibition zone diameters and growth rate for L monocytogenes and E coli. These findings may have implications for the management of serious infectious diseases.

  5. Design and Development of a Portable WiFi enabled BIA device

    International Nuclear Information System (INIS)

    Kriz'aj, D; Baloh, M; Zagar, T; Brajkovic, R

    2013-01-01

    A bioimpedance device (BIA) for evaluation of sarcopenia – age related muscle mass loss – is designed, developed and evaluated. The requirements were based on lightweight design, flexible and user enabled incorporation of measurement protocols and WiFi protocol for remote device control, full internet integration and fast development and usage of measurement protocols. The current design is based on usage of a microcontroller with integrated AD/DA converters. The prototype system was assembled and the operation and connectivity to different handheld devices and laptop computers was successfully tested. The designed BIA device can be accessed using TCP sockets and once the connection is established the data transfer runs successfully at the specified speed. The accuracy of currently developed prototype is about 5% for the impedance modulus and 5 deg. for the phase for the frequencies below 20 kHz with an unfiltered excitation signal and no additional amplifiers employed.

  6. Restricted Albumin Utilization Is Safe and Cost Effective in a Cardiac Surgery Intensive Care Unit.

    Science.gov (United States)

    Rabin, Joseph; Meyenburg, Timothy; Lowery, Ashleigh V; Rouse, Michael; Gammie, James S; Herr, Daniel

    2017-07-01

    Volume expansion is often necessary after cardiac surgery, and albumin is often administered. Albumin's high cost motivated an attempt to reduce its utilization. This study analyzes the impact limiting albumin infusion in a cardiac surgery intensive care unit. This retrospective study analyzed albumin use between April 2014 and April 2015 in patients admitted to a cardiac surgery intensive care unit. During the first 9 months, there were no restrictions. In January 2015, institutional guidelines limited albumin use to patients requiring more than 3 L crystalloid in the early postoperative period, hypoalbuminemic patients, and to patients considered fluid overloaded. Albumin utilization was obtained from pharmacy records and compared with outcome quality metrics. In all, 1,401 patients were admitted over 13 months. Albumin use, mortality, ventilator days, patients receiving transfusions, and length of stay were compared for 961 patients before and 440 patients after guidelines were initiated. After restrictive guidelines were instituted, albumin utilization was reduced from a mean of 280 monthly doses to a mean of 101 monthly doses (p albumin doses, the cardiac surgery intensive care unit demonstrated more than $45,000 of wholesale savings per month after restrictions were implemented. Albumin restriction in the cardiac surgery intensive care unit was feasible and safe. Significant reductions in utilization and cost with no changes in morbidity or mortality were demonstrated. These findings may provide a strategy for reducing cost while maintaining quality of care. Copyright © 2017 The Society of Thoracic Surgeons. Published by Elsevier Inc. All rights reserved.

  7. The safe transport of radioactive materials

    International Nuclear Information System (INIS)

    Messenger, W. de L.M.

    1979-02-01

    The hazards of radioactive materials in transport are surveyed. The system whereby they are safely transported between nuclear establishments in the United Kingdom and overseas is outlined. Several popular misconceptions are dealt with. (author)

  8. Klebsiella pneumonia, a Microorganism that Approves the Non-linear Responses to Antibiotics and Window Theory after Exposure to Wi-Fi 2.4 GHz Electromagnetic Radiofrequency Radiation

    Directory of Open Access Journals (Sweden)

    Taheri M.

    2015-09-01

    Full Text Available Background: Drug resistance is widely believed to be an increasingly serious threat to global public health. We have previously reported that short term exposure of microorganisms to diagnostic ultrasound waves could significantly alter their sensitivity to antibiotics. In our previous studies, Klebsiella pneumoniae showed major differences in the sensitivity to antibiotics in exposed and non-exposed samples. This study was aimed at investigating the alteration of antibiotic resistance of Klebsiella pneumonia, after exposure to Wi-Fi 2.4 GHz electromagnetic radiofrequency radiation. Materials and Methods: In this in vitro study, three replicate agar plates were used for each test. The antibiotic susceptibility test was carried out using disc diffusion method on Mueller Hinton agar plates and the inhibition zones in both control and exposed groups were measured. A common Wi-Fi router was used in this study as the radiofrequency exposure source. Irradiated samples were exposed to Wi-Fi radiofrequency radiation for 3, 4.5 and 8 hours. Results: Statistically significant variations of sensitivity to antibiotics were found for all studied antibiotics after 4.5 hours of RF exposure, compared to non-exposed bacteria. Interestingly, the mean diameters of the inhibition zones after 3 hours of exposure were less than those exposed for 4.5 hours. Following this rise in the sensitivity to antibiotics, a fall was observed in the bacteria exposed for 8 hours for all studied antibiotics. Conclusion: The findings of this study show a statistically significant rise in the sensitivity of Klebsiella pneumoniae to different antibiotics after 4.5 hours of exposure to 2.4 GHz Wi-Fi radiation, followed by a fall after 8 hours of exposure. These observations can be interpreted by the concept of non-linearity in the responses of Klebsiella pneumoniae to different antibiotics after exposure to electromagnetic radiofrequency radiation. As in this study a minimum level of

  9. Bezpečnostní analýza WiFi sítí

    OpenAIRE

    Butela, Michal

    2007-01-01

    Tento dokument popisuje prehľad bežne dostupných a používaných štandardov a mechanizmov pre zabezpečenie bezdrôtovej siete založenej na protokole Wi-Fi. Pokrýva všetky dôležité oblasti bezpečnosti zahrňujúc utajenie, integritu aj autentifikáciu. Prítomný je detailný rozbor a popis funkcie jednotlivých mechanizmov. Nasleduje popis možných útokov proti jednotlivým druhom zabezpečenia. V ďalších častiach dokumentu je zmeraný vplyv šifrovania na prenosovú rýchlosť. Ďalej sú to útoky na jednotlivé...

  10. Predictive ability of the Society for Vascular Surgery Wound, Ischemia, and foot Infection (WIfI) classification system following infrapopliteal endovascular interventions for critical limb ischemia

    NARCIS (Netherlands)

    J. Darling (Jeremy); J.C. McCallum (John C.); P.A. Soden (Peter A.); Meng, Y. (Yifan); Wyers, M.C. (Mark C.); Hamdan, A.D. (Allen D.); H.J.M. Verhagen (Hence); M.L. Schermerhorn (Marc)

    2016-01-01

    textabstractObjective The Society for Vascular Surgery (SVS) Lower Extremity Guidelines Committee has composed a new threatened lower extremity classification system that reflects the three major factors that impact amputation risk and clinical management: Wound, Ischemia, and foot Infection (WIfI).

  11. Safe cycling!

    CERN Multimedia

    Anaïs Schaeffer

    2012-01-01

    The HSE Unit will be running a cycling safety campaign at the entrances to CERN's restaurants on 14, 15 and 16 May. Pop along to see if they can persuade you to get back in the saddle!   With summer on its way, you might feel like getting your bike out of winter storage. Well, the HSE Unit has come up with some original ideas to remind you of some of the most basic safety rules. This year, the prevention campaign will be focussing on three themes: "Cyclists and their equipment", "The bicycle on the road", and "Other road users". This is an opportunity to think about the condition of your bike as well as how you ride it. From 14 to 16 May, representatives of the Swiss Office of Accident Prevention and the Touring Club Suisse will join members of the HSE Unit at the entrances to CERN's restaurants to give you advice on safe cycling (see box). They will also be organising three activity stands where you can test your knowle...

  12. Design and Deployment of a General Purpose, Open Source LoRa to Wi-Fi Hub and Data Logger

    Science.gov (United States)

    DeBell, T. C.; Udell, C.; Kwon, M.; Selker, J. S.; Lopez Alcala, J. M.

    2017-12-01

    Methods and technologies facilitating internet connectivity and near-real-time status updates for in site environmental sensor data are of increasing interest in Earth Science. However, Open Source, Do-It-Yourself technologies that enable plug and play functionality for web-connected sensors and devices remain largely inaccessible for typical researchers in our community. The Openly Published Environmental Sensing Lab at Oregon State University (OPEnS Lab) constructed an Open Source 900 MHz Long Range Radio (LoRa) receiver hub with SD card data logger, Ethernet and Wi-Fi shield, and 3D printed enclosure that dynamically uploads transmissions from multiple wirelessly-connected environmental sensing devices. Data transmissions may be received from devices up to 20km away. The hub time-stamps, saves to SD card, and uploads all transmissions to a Google Drive spreadsheet to be accessed in near-real-time by researchers and GeoVisualization applications (such as Arc GIS) for access, visualization, and analysis. This research expands the possibilities of scientific observation of our Earth, transforming the technology, methods, and culture by combining open-source development and cutting edge technology. This poster details our methods and evaluates the application of using 3D printing, Arduino Integrated Development Environment (IDE), Adafruit's Open-Hardware Feather development boards, and the WIZNET5500 Ethernet shield for designing this open-source, general purpose LoRa to Wi-Fi data logger.

  13. A plug’n’play WiFi surface-mount dual-loop antenna

    Directory of Open Access Journals (Sweden)

    Pedro Chamorro-Posada

    2017-04-01

    Full Text Available We present the design, modelling and characterization in the 2.4 GHz band of a B-shaped antenna consisting of a dual circular loop over a conductor plane. The proposed design is intrinsically unbalanced and features a very good match to a 50 Ω line at resonance, which makes our device essentially plug’n’play for a coaxial cable feed. Another interesting property of the proposed antenna is its simplicity of construction. The antenna has been modelled using the moment method. A prototype resonant at 2.4 GHz has been built and we have measured its impedance in this spectral region. The radiation pattern and the gain at resonance have also been characterized and the device has been shown to provide 6.31 dBi gain. The overall properties of the device make it an excellent option to provide WiFi connectivity when required in open hardware implementations.

  14. Access for Internet of Things using Smartphone as a Gateway utilizing LTE and WiFi

    DEFF Research Database (Denmark)

    Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2016-01-01

    Communicating the Internet of Things (IoT) data relying on Long-Term Evolution (LTE) and WiFi has been been presented in the relevant literature. However, this necessitates devices to have LTE/WiFi capability of their own, that has limitations in the form of power consumption, and radio access...... the data to the Internet. In this paper we present a system model wherein the smartphone functions as a gateway for the IoT devices operating on NFC, ZigBee and Bluetooth. The smartphone functioning as a gateway for transferring IoT data. The system modelled in the form of a Markov Chain based...

  15. Multiband LTE-A, WiFi ac, and 4-PAM baseband simultaneous transmission over 50 m thick-core POF for in-home network

    NARCIS (Netherlands)

    Forni, F.; Shi, Y.; Van Den Boom, H.P.A.; Tangdiongga, E.; Koonen, A.M.J.

    2017-01-01

    We demonstrated the simultaneous transmission of multiband LTE-A signals, a WiFi IEEE802.11ac and a gigabit/s baseband 4-PAM signal over 1mm core diameter PMMA GI-POF. The optical link used a red light 650 nm laser diode and a p-i-n photodiode with a transimpedance amplifier. The 4-PAM transmission

  16. SIR - small is safe [in reactor design

    International Nuclear Information System (INIS)

    Hayns, M.

    1989-01-01

    A joint USA-UK venture has been initiated to design a small nuclear reactor which offers low capital cost, greater flexibility and a potentially lower environmental impact. Called Safe Integral Reactor (SIR), the lead unit could be built in the United Kingdom Atomic Energy Authority's (UKAEA's) Winfrith site if the design is accepted by the UK Nuclear Installations Inspectorate (NII). This article describes the 320 MWe reactor unit that is the basis of the design being developed. (author)

  17. Safe pill-dispensing.

    Science.gov (United States)

    Testa, Massimiliano; Pollard, John

    2007-01-01

    Each patient is supplied with a smart-card containing a Radio Frequency IDentification (RFID) chip storing a unique identification code. The patient places the Smart-card on a pill-dispenser unit containing an RFID reader. The RFID chip is read and the code sent to a Base-station via a wireless Bluetooth link. A database containing both patient details and treatment information is queried at the Base-station using the RFID as the search key. The patient's treatment data (i.e., drug names, quantities, time, etc.) are retrieved and sent back to the pill-dispenser unit via Bluetooth. Appropriate quantities of the required medications are automatically dispensed, unless the patient has already taken his/her daily dose. Safe, confidential communication and operation is ensured.

  18. Working safely with ionising radiation

    International Nuclear Information System (INIS)

    McDowell, D.J.

    1990-01-01

    A small leaflet provides information on working safely with ionizing radiation. Topics covered include the types of radiation, radiological units, external radiation, contamination and internal radiation, methods of protection form radiation, radiation monitors, protective clothing for contamination, personal dosemeters, radiation dose limits for classified workers and finally the Ionising Radiations Regulations 1985. (UK)

  19. Towards Optimal Buffer Size in Wi-Fi Networks

    KAUST Repository

    Showail, Ahmad J.

    2016-01-19

    Buffer sizing is an important network configuration parameter that impacts the quality of data traffic. Falling memory cost and the fallacy that ‘more is better’ lead to over provisioning network devices with large buffers. Over-buffering or the so called ‘bufferbloat’ phenomenon creates excessive end-to-end delay in today’s networks. On the other hand, under-buffering results in frequent packet loss and subsequent under-utilization of network resources. The buffer sizing problem has been studied extensively for wired networks. However, there is little work addressing the unique challenges of wireless environment. In this dissertation, we discuss buffer sizing challenges in wireless networks, classify the state-of-the-art solutions, and propose two novel buffer sizing schemes. The first scheme targets buffer sizing in wireless multi-hop networks where the radio spectral resource is shared among a set of con- tending nodes. Hence, it sizes the buffer collectively and distributes it over a set of interfering devices. The second buffer sizing scheme is designed to cope up with recent Wi-Fi enhancements. It adapts the buffer size based on measured link characteristics and network load. Also, it enforces limits on the buffer size to maximize frame aggregation benefits. Both mechanisms are evaluated using simulation as well as testbed implementation over half-duplex and full-duplex wireless networks. Experimental evaluation shows that our proposal reduces latency by an order of magnitude.

  20. Pediatric Cardiopulmonary Arrest in the Postanesthesia Care Unit, Rare but Preventable: Analysis of Data From Wake Up Safe, The Pediatric Anesthesia Quality Improvement Initiative.

    Science.gov (United States)

    Christensen, Robert E; Haydar, Bishr; Voepel-Lewis, Terri D

    2017-04-01

    Nearly 20% of anesthesia-related pediatric cardiac arrests (CAs) occur during emergence or recovery. The aims of this case series were to use the Wake Up Safe database to describe the following: (1) the nature of pediatric postanesthesia care unit (PACU) CA and subsequent outcomes and (2) factors associated with harm after pediatric PACU CA. Pediatric CAs in the PACU were identified from the Wake Up Safe Pediatric Anesthesia Quality Improvement Initiative, a multicenter registry of adverse events in pediatric anesthesia. Demographics, underlying conditions, cause of CA, and outcomes were extracted. Descriptive statistics were used to characterize data and to assess risk of harm in those suffering CA. A total of 26 CA events were included: 67% in children anesthesia care providers until emergence from anesthesia may further reduce the preventable arrest rate. The root cause analyses conducted by individual institutions reporting these data to the Wake Up Safe provided only limited insight, so multicenter collaborative approaches may allow for greater insight into effective CA-prevention strategies.

  1. A Test Model in a RF Anechoic Chamber for the Application of Wi-Fi Communication in Korean Operating NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Yong Sik; Kim, Min Seok; Ryu, Ho Sun; Ye, Song Hae; Lee, Gwang Dae [KHNP, Daejeon (Korea, Republic of)

    2014-08-15

    The objective of this study is to make a test model and confirm its effectiveness in a radio frequency (RF) anechoic chamber before conducting a field test in Korean operating NPPs for use of Wi-Fi communication technology. This paper is focused on electromagnetic/radio-frequency interference (EMI/RFI) issue and discusses a methodology and its test result for overcoming that issue. Whenever wireless communication is performed between an access point (AP) and a smart phone, EMI/RFI problem always happens around those devices. It is necessary to decide how many wireless devices local workers will use and select what facilities and systems to protect from EMI/RFI, which are so-called EMI/RFI sensitive equipment. The number of wireless devices was decided as many as possible in the area where those devices could be used, and some sensitive equipment that shall not malfunction under electromagnetic environment were chosen. The test bed which considered above mentioned conditions was constructed and an experiment was carried out inside a radio-frequency anechoic chamber. Comparing with the allowable operating envelopes for electromagnetic level from RG-1.180, each maximum level of the test results acquired from a RF anechoic chamber is not over the limit even in case of considering the maximum local workers' usage. This result shows that it is highly likely that Wi-Fi communication can be used without any problem if sensitive equipment has observed the electromagnetic susceptibility limit of RG-1.180.

  2. Safe sex

    Science.gov (United States)

    ... sex; Sexually transmitted - safe sex; GC - safe sex; Gonorrhea - safe sex; Herpes - safe sex; HIV - safe sex; ... contact. STIs include: Chlamydia Genital herpes Genital warts Gonorrhea Hepatitis HIV HPV Syphilis STIs are also called ...

  3. Penentuan Arah Teleskop Digital Melalui Komunikasi Wi-Fi

    Directory of Open Access Journals (Sweden)

    Prima Kurniawan

    2013-09-01

    Full Text Available Teleskop bintang adalah sebuah perangkat instrument yang digunakan untuk melihat benda-benda langit yang jaraknya sangat jauh menjadi terasa dekat. Teleskop yang tersedia pada umumnya belum dilengkapi dengan sistem digital untuk pencitraannya dan otomatisasi untuk penentuan arahnya. Pada tugas akhir ini dibuat suatu sistem digital dan otomatisasi pada teleskop konvensional. Sistem digital digunakan untuk perekaman hasil yang didapatkan oleh teleskop dan ditampilakan pada komputer. Sistem otomatisasi dibuat untuk menentukan pergerakan sudut teleskop dengan sebuah GUI. Mekanik pergerakan teleskop diberikan 2 motor dc sebagai penggerak. Masing-masing motor dc berfungsi untuk menggerakkan tiap sumbu X dan sumbu Y. Digunakan sebuah sistem mikrokontroler menggunakan ATmega 32 sebagai pengolahan data. Fitur ADC mikrokontroler digunakan untuk mengubah data analog perubahan tegangan yang terjadi pada potensiometer menjadi perubahan data digital yang akan dikonversi menjadi nilai pergerakan perubahan sudut. Sistem ini ditambahkan sebuah router yang berfungsi sebagai akses poin untuk jalur pengiriman dan penerimaan data antara komputer dengan mikrokontroler. Ditambahkan sebuah wiznet yang mampu mengkonversi data dari komunikasi serial ke data protokol TCP/IP dan sebaliknya. Pengujian pergerakan sudut sumbu X dilakukan pada sudut 0, 45, 90, 135, 180, 255, 270, 315, dan 360 sedangkan pergerakan sumbu Y dilakukan pada sudut 0, 10, 20, 30, 40, 50, 60, 70, 80, dan 90. Hasil pengujian pada sumbu X dan Y didapatkan beberapa error pada titik-titik tertentu dengan tingkat kesalahan mencapai 3.8% untuk sumbu x dan 2.5% untuk sumbu y. Penentuan pergerakan sudut dilakukan melalui komputer dengan menggunakan komunikasi wi-fi.

  4. WiFi, multiband clipped LTE-A and Gbps 4-PAM simultaneous transmission over 50m Thick-core POF and wireless link for home area networks

    NARCIS (Netherlands)

    Forni, F.; Shi, Y.; van den Boom, H.P.A.; Tangdiongga, E.; Koonen, A.M.J.

    2018-01-01

    An IEEE802.11n-compliant 40MHz WiFi, 9 bands 64-QAM LTE-A with reduced PAPR by clipping and 1.7Gb/s 4-PAM signals were successfully transmitted over 50m PMMA GI-POF and 12m wireless. This proves that POF is suitable for multi-standard wireless-wired in-home networks.

  5. An improved algorithm to generate a Wi-Fi fingerprint database for indoor positioning.

    Science.gov (United States)

    Chen, Lina; Li, Binghao; Zhao, Kai; Rizos, Chris; Zheng, Zhengqi

    2013-08-21

    The major problem of Wi-Fi fingerprint-based positioning technology is the signal strength fingerprint database creation and maintenance. The significant temporal variation of received signal strength (RSS) is the main factor responsible for the positioning error. A probabilistic approach can be used, but the RSS distribution is required. The Gaussian distribution or an empirically-derived distribution (histogram) is typically used. However, these distributions are either not always correct or require a large amount of data for each reference point. Double peaks of the RSS distribution have been observed in experiments at some reference points. In this paper a new algorithm based on an improved double-peak Gaussian distribution is proposed. Kurtosis testing is used to decide if this new distribution, or the normal Gaussian distribution, should be applied. Test results show that the proposed algorithm can significantly improve the positioning accuracy, as well as reduce the workload of the off-line data training phase.

  6. Guidelines for safely changing to S.I. radiological units

    International Nuclear Information System (INIS)

    Canada is adopting the International System of Units (SI) in all sectors of the economy. The basic radiological units formerly in use, the curie, rad, rem, and roentgen are being replaced by the becquerel, gray, sievert, and coulomb per kilogram. During the transition period for conversion to SI units some problems may arise concerning received or administered radiation doses. These guidelines exaiine the occupational safety ramifications of of the change to SI by identifying the major safety concerns and providing guidelines for applying a model method within individual organizations for analyzing safety implicatikns during the changeover period

  7. A Standardized Shift Handover Protocol: Improving Nurses’ Safe Practice in Intensive Care Units

    Directory of Open Access Journals (Sweden)

    Javad Malekzadeh

    2013-08-01

    Full Text Available Introduction: For maintaining the continuity of care and improving the quality of care, effective inter-shift information communication is necessary. Any handover error can endanger patient safety. Despite the importance of shift handover, there is no standard handover protocol in our healthcare settings. Methods In this one-group pretest-posttest quasi-experimental study conducted in spring and summer of 2011, we recruited a convenience sample of 56 ICU nurses. The Nurses’ Safe Practice Evaluation Checklist was used for data collection. The Content Validity Index and the inter-rater correlation coefficient of the checklist was 0.92 and 89, respectively. We employed the SPSS 11.5 software and the Mc Nemar and paired-samples t test for data analysis. Results: Study findings revealed that nurses’ mean score on the Safe Practice Evaluation Checklist increased significantly from 11.6 (2.7 to 17.0 (1.8 (P < 0.001. Conclusion: using a standard handover protocol for communicating patient’s needs and information improves nurses’ safe practice in the area of basic nursing care.

  8. Predictive ability of the Society for Vascular Surgery Wound, Ischemia, and foot Infection (WIfI) classification system after first-time lower extremity revascularizations

    OpenAIRE

    Darling, Jeremy; McCallum, John C.; Soden, Peter A.; Guzman, R.J. (Raul J.); Wyers, M.C. (Mark C.); Hamdan, A.D. (Allen D.); Verhagen, Hence; Schermerhorn, Marc

    2017-01-01

    markdownabstract__Objective:__ The Society for Vascular Surgery (SVS) Wound, Ischemia and foot Infection (WIfI) classification system was proposed to predict 1-year amputation risk and potential benefit from revascularization. Our goal was to evaluate the predictive ability of this scale in a real-world selection of patients undergoing a first-time lower extremity revascularization for chronic limb-threatening ischemia (CLTI). __Methods:__ From 2005 to 2014, 1336 limbs underwent a first-time ...

  9. Disabled Children: The Right to Feel Safe

    Science.gov (United States)

    Mepham, Sarah

    2010-01-01

    This article explores the fundamental right of disabled children to feel safe and be free from bullying, harassment and abuse. The article proposes that, 20 years since the United Nations Convention on the Rights of the Child, disabled children are still facing barriers to securing this right. The article focuses on recent Mencap research that…

  10. An improved IEEE 802.11 protocol for reliable data transmission in power distribution fault diagnosis

    Energy Technology Data Exchange (ETDEWEB)

    Campoccia, F.; Di Silvestre, M.L.; Sanseverino, E.R.; Zizzo, G. [Palermo Univ., Palermo (Italy)

    2010-10-15

    In power systems, on-line transmission between local units and the central unit can be done by means of power line communications or wireless technology. During an electrical fault, the reliability of the distribution system depends on the security of the timely protective and restorative actions on the network. This paper focused on the WiFi system because of its economy and ease of installation. However, WiFi systems are typically managed by the IEEE 802.11 protocol, which is not reliable in terms of security in data communication. In WiFi networks, data is divided into packets and sent in succession to reduce errors within the radio channel. The IEEE 802.11 protocol has high probability for loss of packets or delay in their transmission. In order to ensure the reliability of data transmission times between two terminal units connected by WiFi stations, a new protocol was derived by modifying the IEEE 802.11. The improvements of the new protocol were highlighted and its capability for the diagnostic service was verified. The modified protocol eliminates the danger of collisions between packets and optimizes the transmission time for sending information. 6 refs., 7 tabs., 8 figs.

  11. Residential tornado safe room from commodity wood products – design and development

    Science.gov (United States)

    Robert H. Falk; James J. Bridwell

    2018-01-01

    In the United States, tornadoes cause significant damage and result in many injuries and deaths. Although the development and use of tornado safe rooms have helped decrease the human toll associated with these events, the cost of these structures is often too high for many that could benefit from their use. The development of a nonproprietary residential tornado safe...

  12. HuAc: Human Activity Recognition Using Crowdsourced WiFi Signals and Skeleton Data

    Directory of Open Access Journals (Sweden)

    Linlin Guo

    2018-01-01

    Full Text Available The joint of WiFi-based and vision-based human activity recognition has attracted increasing attention in the human-computer interaction, smart home, and security monitoring fields. We propose HuAc, the combination of WiFi-based and Kinect-based activity recognition system, to sense human activity in an indoor environment with occlusion, weak light, and different perspectives. We first construct a WiFi-based activity recognition dataset named WiAR to provide a benchmark for WiFi-based activity recognition. Then, we design a mechanism of subcarrier selection according to the sensitivity of subcarriers to human activities. Moreover, we optimize the spatial relationship of adjacent skeleton joints and draw out a corresponding relationship between CSI and skeleton-based activity recognition. Finally, we explore the fusion information of CSI and crowdsourced skeleton joints to achieve the robustness of human activity recognition. We implemented HuAc using commercial WiFi devices and evaluated it in three kinds of scenarios. Our results show that HuAc achieves an average accuracy of greater than 93% using WiAR dataset.

  13. Location-Aware POI Recommendation for Indoor Space by Exploiting WiFi Logs

    Directory of Open Access Journals (Sweden)

    Zengwei Zheng

    2017-01-01

    Full Text Available Indoor shopping trajectories provide us with a new approach to understanding user’s behaviour pattern in urban shopping mall, which can be derived from user-generated WiFi logs using indoor localization technology. In this paper, we propose a location-aware Point-of-Interest (POI recommendation service in urban shopping mall that offers a user a set of indoor POIs by considering both personal interest and location preference. The POI recommendation service cannot only improve user’s shopping experience but also help the store owner better understand user’s shopping preference and intent. Specifically, the proposed method consists of two phases: offline modelling and online recommendation. The offline modelling phase is designed to learn user preference by mining his/her historical shopping trajectories. The online recommendation phase automatically produces top-k recommended POIs based on the learnt preference. To demonstrate the utility of our proposed approach, we have performed a comprehensive experiment evaluation on a real-world dataset collected by 468 users over 33 days. The experimental results show that the proposed recommendation service achieves much better recommendation performance than several existing benchmark methods.

  14. Communication of 10 June 2009 received from the Permanent Mission of the United Kingdom with regard to the International Nuclear Fuel Supply Conference: Securing safe access to peaceful power

    International Nuclear Information System (INIS)

    2009-01-01

    The Secretariat has received a communication dated 10 June 2009 from the Permanent Mission of the United Kingdom of Great Britain and Northern Ireland, attaching a note from the United Kingdom and the final remarks of the Chairman of the International Nuclear Fuel Supply Conference: Securing safe access to peaceful power, held in London on 17 and 18 March 2009. As requested in that communication, the note and final remarks are herewith circulated for the information of Member States

  15. Keeping you safe by making machine tools safe

    CERN Multimedia

    2012-01-01

    CERN’s third safety objective for 2012 concerns the safety of equipment - and machine tools in particular.   There are three prerequisites for ensuring that a machine tool can be used safely: ·      the machine tool must comply with Directive 2009/104/EC, ·      the layout of the workshop must be compliant, and ·      everyone who uses the machine tool must be trained. Provided these conditions are met, the workshop head can grant authorisation to use the machine tool. To fulfil this objective, an inventory of the machine tools must be drawn up and the people responsible for them identified. The HSE Unit's Safety Inspection Service produces compliance reports for the machine tools. In order to meet the third objective set by the Director-General, the section has doubled its capacity to carry out inspections: ...

  16. [The Necessity and the Current Status of Safe Handling of Anticancer Drugs].

    Science.gov (United States)

    Kanda, Kiyoko

    2017-07-01

    Number of people who handle anticancer drugs in their profession is increasing. Anticancer drugs, which are hazardous drugs(HD), exert cytocidal effects on cancer cells, but many have also been shown to have mutagenicity, teratogenicity and carcinogenicity; therefore, safe handling of anticancer drugs is necessary. In July 2015, the first Japanese guidelines for exposure control measures, namely, the "Joint Guidelines for Safe Handling of Cancer Chemotherapy Drugs", were published jointly by 3 societies. Our guideline is the creation of the Japanese Society of Cancer Nursing(JSCN), Japanese Society of Medical Oncology(JSMO)and Japanese Society of Pharmaceutical Oncology(JASPO)and has a historical significance. This paper states the necessity of safe handling of anticancer drugs, Japan's recent movement of safe handling, the introduction of joint guidelines of safe handling of anticancer drugs, and new movement of safe handling of USP chapter 800 in the United States.

  17. Saving our backs: safe patient handling and mobility for home care.

    Science.gov (United States)

    Beauvais, Audrey; Frost, Lenore

    2014-01-01

    Predicted work-related injuries for nurses and home healthcare workers are on the rise given the many risk factors in the home environment and the escalating demands for home healthcare workers in the United States. Fortunately, safe patient handling and mobility programs can dramatically decrease injuries. Despite strides being made to promote safe patient handling and mobility programs in acute care, more can be done to establish such initiatives in the home care setting.

  18. Analysis Methods for Extracting Knowledge from Large-Scale WiFi Monitoring to Inform Building Facility Planning

    DEFF Research Database (Denmark)

    Ruiz-Ruiz, Antonio; Blunck, Henrik; Prentow, Thor Siiger

    2014-01-01

    realistic data to inform facility planning. In this paper, we propose analysis methods to extract knowledge from large sets of network collected WiFi traces to better inform facility management and planning in large building complexes. The analysis methods, which build on a rich set of temporal and spatial......The optimization of logistics in large building com- plexes with many resources, such as hospitals, require realistic facility management and planning. Current planning practices rely foremost on manual observations or coarse unverified as- sumptions and therefore do not properly scale or provide....... Spatio-temporal visualization tools built on top of these methods enable planners to inspect and explore extracted information to inform facility-planning activities. To evaluate the methods, we present results for a large hospital complex covering more than 10 hectares. The evaluation is based on Wi...

  19. 76 FR 12719 - Safe Schools/Healthy Students Program; Office of Safe and Drug-Free Schools; Safe Schools/Healthy...

    Science.gov (United States)

    2011-03-08

    ... DEPARTMENT OF EDUCATION Safe Schools/Healthy Students Program; Office of Safe and Drug- Free Schools; Safe Schools/Healthy Students Program; Catalog of Federal Domestic Assistance (CFDA) Numbers: 84... priorities, requirements, and definitions under the Safe Schools/Healthy Students (SS/HS) program. Since...

  20. Into 21 century with the safe 'Ukrittya' shelter

    International Nuclear Information System (INIS)

    Kupnij, V.Yi.; Tovstogan, A.S.

    2002-01-01

    There exists a considerable vagueness in present situation with 'Ukrittya', its main components, and high risk in construction works, as well as nuclear, fire and ecological danger. All these problems are considered and discussed. The final aim consists in complete cleaning of the Unit-4 from nuclear wastes and to make it safe according to international standards

  1. Residential Tornado Safe Rooms from Commodity Wood Products: Wall Development and Impact Testing

    Science.gov (United States)

    Robert H. Falk; James J. Bridwell; John C. Hermanson

    2015-01-01

    In the United States, tornadoes cause significant damage and result in many injuries and deaths. Although the development and use of tornado safe rooms and shelters have helped reduce the human toll associated with these events, the cost of these structures is often too high for many that could benefit from their use. The development of a residential tornado safe room...

  2. Fusing Bluetooth Beacon Data with Wi-Fi Radiomaps for Improved Indoor Localization

    Science.gov (United States)

    Kanaris, Loizos; Kokkinis, Akis; Liotta, Antonio; Stavrou, Stavros

    2017-01-01

    Indoor user localization and tracking are instrumental to a broad range of services and applications in the Internet of Things (IoT) and particularly in Body Sensor Networks (BSN) and Ambient Assisted Living (AAL) scenarios. Due to the widespread availability of IEEE 802.11, many localization platforms have been proposed, based on the Wi-Fi Received Signal Strength (RSS) indicator, using algorithms such as K-Nearest Neighbour (KNN), Maximum A Posteriori (MAP) and Minimum Mean Square Error (MMSE). In this paper, we introduce a hybrid method that combines the simplicity (and low cost) of Bluetooth Low Energy (BLE) and the popular 802.11 infrastructure, to improve the accuracy of indoor localization platforms. Building on KNN, we propose a new positioning algorithm (dubbed i-KNN) which is able to filter the initial fingerprint dataset (i.e., the radiomap), after considering the proximity of RSS fingerprints with respect to the BLE devices. In this way, i-KNN provides an optimised small subset of possible user locations, based on which it finally estimates the user position. The proposed methodology achieves fast positioning estimation due to the utilization of a fragment of the initial fingerprint dataset, while at the same time improves positioning accuracy by minimizing any calculation errors. PMID:28394268

  3. Fusing Bluetooth Beacon Data with Wi-Fi Radiomaps for Improved Indoor Localization.

    Science.gov (United States)

    Kanaris, Loizos; Kokkinis, Akis; Liotta, Antonio; Stavrou, Stavros

    2017-04-10

    Indoor user localization and tracking are instrumental to a broad range of services and applications in the Internet of Things (IoT) and particularly in Body Sensor Networks (BSN) and Ambient Assisted Living (AAL) scenarios. Due to the widespread availability of IEEE 802.11, many localization platforms have been proposed, based on the Wi-Fi Received Signal Strength (RSS) indicator, using algorithms such as K -Nearest Neighbour (KNN), Maximum A Posteriori (MAP) and Minimum Mean Square Error (MMSE). In this paper, we introduce a hybrid method that combines the simplicity (and low cost) of Bluetooth Low Energy (BLE) and the popular 802.11 infrastructure, to improve the accuracy of indoor localization platforms. Building on KNN, we propose a new positioning algorithm (dubbed i-KNN) which is able to filter the initial fingerprint dataset (i.e., the radiomap), after considering the proximity of RSS fingerprints with respect to the BLE devices. In this way, i-KNN provides an optimised small subset of possible user locations, based on which it finally estimates the user position. The proposed methodology achieves fast positioning estimation due to the utilization of a fragment of the initial fingerprint dataset, while at the same time improves positioning accuracy by minimizing any calculation errors.

  4. Fusing Bluetooth Beacon Data with Wi-Fi Radiomaps for Improved Indoor Localization

    Directory of Open Access Journals (Sweden)

    Loizos Kanaris

    2017-04-01

    Full Text Available Indoor user localization and tracking are instrumental to a broad range of services and applications in the Internet of Things (IoT and particularly in Body Sensor Networks (BSN and Ambient Assisted Living (AAL scenarios. Due to the widespread availability of IEEE 802.11, many localization platforms have been proposed, based on the Wi-Fi Received Signal Strength (RSS indicator, using algorithms such as K-Nearest Neighbour (KNN, Maximum A Posteriori (MAP and Minimum Mean Square Error (MMSE. In this paper, we introduce a hybrid method that combines the simplicity (and low cost of Bluetooth Low Energy (BLE and the popular 802.11 infrastructure, to improve the accuracy of indoor localization platforms. Building on KNN, we propose a new positioning algorithm (dubbed i-KNN which is able to filter the initial fingerprint dataset (i.e., the radiomap, after considering the proximity of RSS fingerprints with respect to the BLE devices. In this way, i-KNN provides an optimised small subset of possible user locations, based on which it finally estimates the user position. The proposed methodology achieves fast positioning estimation due to the utilization of a fragment of the initial fingerprint dataset, while at the same time improves positioning accuracy by minimizing any calculation errors.

  5. Cool and Safe: Multiplicity in Safe Innovation at Unilever

    Science.gov (United States)

    Penders, Bart

    2011-01-01

    This article presents the making of a safe innovation: the application of ice structuring protein (ISP) in edible ices. It argues that safety is not the absence of risk but is an active accomplishment; innovations are not "made safe afterward" but "safe innovations are made". Furthermore, there are multiple safeties to be accomplished in the…

  6. Keep Young Riders Safe (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    Motor vehicle-related injuries are a leading cause of death among children in the United States. Adults can prevent many of these tragedies by properly securing children in vehicles. In this podcast, Dr. Erin Sauber-Schatz discusses ways to keep kids safe in vehicles.

  7. Providing safe drinking water to 1.2 billion unserved people

    Energy Technology Data Exchange (ETDEWEB)

    Gadgil, Ashok J.; Derby, Elisabeth A.

    2003-06-01

    Despite substantial advances in the past 100 years in public health, technology and medicine, 20% of the world population, mostly comprised of the poor population segments in developing countries (DCs), still does not have access to safe drinking water. To reach the United Nations (UN) Millennium Goal of halving the number of people without access to safe water by 2015, the global community will need to provide an additional one billion urban residents and 600 million rural residents with safe water within the next twelve years. This paper examines current water treatment measures and implementation methods for delivery of safe drinking water, and offers suggestions for making progress towards the goal of providing a timely and equitable solution for safe water provision. For water treatment, based on the serious limitations of boiling water and chlorination, we suggest an approach based on filtration coupled with ultraviolet (UV) disinfection, combined with public education. Additionally, owing to the capacity limitations for non-governmental organizations (NGOs) to take on this task primarily on their own, we suggest a strategy based on financially sustainable models that include the private sector as well as NGOs.

  8. Physician discretion is safe and may lower stress test utilization in emergency department chest pain unit patients.

    Science.gov (United States)

    Napoli, Anthony M; Arrighi, James A; Siket, Matthew S; Gibbs, Frantz J

    2012-03-01

    Chest pain unit (CPU) observation with defined stress utilization protocols is a common management option for low-risk emergency department patients. We sought to evaluate the safety of a joint emergency medicine and cardiology staffed CPU. Prospective observational trial of consecutive patients admitted to an emergency department CPU was conducted. A standard 6-hour observation protocol was followed by cardiology consultation and stress utilization largely at their discretion. Included patients were at low/intermediate risk by the American Heart Association, had nondiagnostic electrocardiograms, and a normal initial troponin. Excluded patients were those with an acute comorbidity, age >75, and a history of coronary artery disease, or had a coexistent problem restricting 24-hour observation. Primary outcome was 30-day major adverse cardiovascular events-defined as death, nonfatal acute myocardial infarction, revascularization, or out-of-hospital cardiac arrest. A total of 1063 patients were enrolled over 8 months. The mean age of the patients was 52.8 ± 11.8 years, and 51% (95% confidence interval [CI], 48-54) were female. The mean thrombolysis in myocardial infarction and Diamond & Forrester scores were 0.6% (95% CI, 0.51-0.62) and 33% (95% CI, 31-35), respectively. In all, 51% (95% CI, 48-54) received stress testing (52% nuclear stress, 39% stress echocardiogram, 5% exercise, 4% other). In all, 0.9% patients (n = 10, 95% CI, 0.4-1.5) were diagnosed with a non-ST elevation myocardial infarction and 2.2% (n = 23, 95% CI, 1.3-3) with acute coronary syndrome. There was 1 (95% CI, 0%-0.3%) case of a 30-day major adverse cardiovascular events. The 51% stress test utilization rate was less than the range reported in previous CPU studies (P < 0.05). Joint emergency medicine and cardiology management of patients within a CPU protocol is safe, efficacious, and may safely reduce stress testing rates.

  9. Wi-Fi Tags for the Remote and Virtual Laboratory

    Directory of Open Access Journals (Sweden)

    D. Ursutiu

    2008-04-01

    Full Text Available With the advancement of computer technologiesto faster processors and more memory, the WorldWideWeb,wireless communication, and miniaturization of sensortechnology, it is now possible to simulate and executeengineering and science laboratory projects on a remotecomputer. With Internet connection, students have access to"virtual laboratories" via the www, experiment-orientedproblems can be now offered without the overhead incurredwhen maintaining a full laboratory. This paper investigatesthe opportunity that a new wireless sensor technologybrings to remote laboratories.G2 Microsystems of Campbell, California, USA, released in2007 the first ever ultra-low power Wi-Fi System on a Chip(SoC named G2C501. This SoC includes a 32-bit CPU,crypto accelerator, real-time clock and a versatile sensorinterface that can serve as a standalone host subsystem. TheG2C501 goes beyond today’s basic radio frequencyidentification (RFID technology to offer intelligent trackingand sensor capabilities that leverage IEEE 802.11 (Wi-Finetworks. Due to its support for multiple locationtechnologies, small form factor and ultra-low powerconsumption, the G2C502 SoC can be integrated into Wi-Fisensor tags that lower cost of ownership and meet the needsof a variety of industries including consumer electronics,pharmaceuticals, chemical manufacturing, cold chain andmore.A battery powered, small size ultra low-power Wi-Fiwireless measurement node name IP Sensor has been builtusing the G2C501 SoC. Sensors for measurement oftemperature, humidity, light, and vibration or motion arecurrently mounted on the IP Sensor board. The node is ableto read a sensor and send data to the network by using anIP-based application protocol such as UDP.This paper describes the new IP Sensor

  10. Safety Case for Safe-store

    International Nuclear Information System (INIS)

    Woollam, Paul B.

    2002-01-01

    Magnox Electric plc (Magnox), a wholly owned subsidiary of BNFL, owns 26 gas-cooled, graphite-moderated units on 11 sites in the UK. Eight units have been permanently shutdown and the remainder will shut this decade in a currently declared closure programme. The first of these reactors went to power in 1952 and the fleet has generated typically 9% of the UK's electricity during the last five decades. In accordance with UK Government policy, BNFL aims for a systematic and progressive reduction in hazards on its decommissioning sites. The end-point of the decommissioning process is that the reactors will be dismantled and their sites de-licensed. This will be done through minimising both the risks to the public, workers and the environment and also the lifetime cost, consistent with world class safety. There will be passive safe storage during deferment periods and it is BNFL's clear intent that the reactors will not be Safe-stored indefinitely. The main hazard associated with any decommissioned nuclear site is the spent fuel. Hence the reactors will be de-fuelled as soon as practicable after shutdown. After this work is complete, Cs-137 contaminated plant (e.g. fuel pools, effluent plant, and drains) will be dismantled when it is no longer needed. All other plant and buildings will also be dismantled when they are no longer needed, except for the reactor buildings which will be put into passive safe storage. Co-60 contaminated plant, such as steam generators, will be dismantled with the reactors. The reactors will be dismantled in a sequenced programme, with a notional start time around 100 years from shutdown. Magnox Electric is ensuring that the reactors and primary circuits on all its sites are well characterised. We have carried out a detailed, peer reviewed hazard identification on the lead site from which we have generated a rolling 25-year basic safety case. We have then searched for cliff edge effects and possible long-term changes to generate the 100-year

  11. The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Hansson, Hans

    2016-01-01

    This paper presents an overview of the ECSEL project entitled "Safe Cooperating Cyber-Physical Systems using Wireless Communication" (SafeCOP), which runs during the period 2016 -- 2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  12. Safe Kids Worldwide

    Science.gov (United States)

    ... Blog Videos Newsletter facebook twitter instagram pinterest gplus youtube Search Menu Why It Matters Who We Are What We Do Find Your Safe Kids Safe Kids Day Main menu Keeping All Kids Safe Safety Tips Get Involved 4 Star Charity Donate Text Burns and Scalds 4 tips ...

  13. Kalman/Map Filtering-Aided Fast Normalized Cross Correlation-Based Wi-Fi Fingerprinting Location Sensing

    Directory of Open Access Journals (Sweden)

    Yongliang Sun

    2013-11-01

    Full Text Available A Kalman/map filtering (KMF-aided fast normalized cross correlation (FNCC-based Wi-Fi fingerprinting location sensing system is proposed in this paper. Compared with conventional neighbor selection algorithms that calculate localization results with received signal strength (RSS mean samples, the proposed FNCC algorithm makes use of all the on-line RSS samples and reference point RSS variations to achieve higher fingerprinting accuracy. The FNCC computes efficiently while maintaining the same accuracy as the basic normalized cross correlation. Additionally, a KMF is also proposed to process fingerprinting localization results. It employs a new map matching algorithm to nonlinearize the linear location prediction process of Kalman filtering (KF that takes advantage of spatial proximities of consecutive localization results. With a calibration model integrated into an indoor map, the map matching algorithm corrects unreasonable prediction locations of the KF according to the building interior structure. Thus, more accurate prediction locations are obtained. Using these locations, the KMF considerably improves fingerprinting algorithm performance. Experimental results demonstrate that the FNCC algorithm with reduced computational complexity outperforms other neighbor selection algorithms and the KMF effectively improves location sensing accuracy by using indoor map information and spatial proximities of consecutive localization results.

  14. Kalman/Map filtering-aided fast normalized cross correlation-based Wi-Fi fingerprinting location sensing.

    Science.gov (United States)

    Sun, Yongliang; Xu, Yubin; Li, Cheng; Ma, Lin

    2013-11-13

    A Kalman/map filtering (KMF)-aided fast normalized cross correlation (FNCC)-based Wi-Fi fingerprinting location sensing system is proposed in this paper. Compared with conventional neighbor selection algorithms that calculate localization results with received signal strength (RSS) mean samples, the proposed FNCC algorithm makes use of all the on-line RSS samples and reference point RSS variations to achieve higher fingerprinting accuracy. The FNCC computes efficiently while maintaining the same accuracy as the basic normalized cross correlation. Additionally, a KMF is also proposed to process fingerprinting localization results. It employs a new map matching algorithm to nonlinearize the linear location prediction process of Kalman filtering (KF) that takes advantage of spatial proximities of consecutive localization results. With a calibration model integrated into an indoor map, the map matching algorithm corrects unreasonable prediction locations of the KF according to the building interior structure. Thus, more accurate prediction locations are obtained. Using these locations, the KMF considerably improves fingerprinting algorithm performance. Experimental results demonstrate that the FNCC algorithm with reduced computational complexity outperforms other neighbor selection algorithms and the KMF effectively improves location sensing accuracy by using indoor map information and spatial proximities of consecutive localization results.

  15. Reducing the Amount of Data for Creating Routes in a Dynamic DTN via Wi-Fi on the Basis of Static Data

    Directory of Open Access Journals (Sweden)

    Yulia Shichkina

    2017-01-01

    Full Text Available This article presents the results of research on the acceleration of data processing in the construction routing in dynamic DTN, realized through the devices established in moving objects and connected by means of Wi-Fi. The routes are constructed based on the prehistory of the movement of objects, which is stored in the database in the csv format. This database has a large volume and contains unnecessary and incorrect information. The article shows the possibility of speeding up the process of constructing routes using data precleaning. Reducing data volume is proposed by constructing an enlarged grid on the object movement map. This article also demonstrates the use of fuzzy logic and graph theory for constructing routes.

  16. When Your Baby's in the NICU (Neonatal Intensive Care Unit)

    Science.gov (United States)

    ... baby's progress? Is wi-fi access available for smartphones and other devices? Can we use our cellphones ... you also want to allow periods of undisturbed sleep. Let your baby set the pace for your ...

  17. International cooperation on technical support for regulation of safety-related activities on the transformation of the destroyed Chernobyl Nuclear Power Plant Power Unit into an ecologically safe system

    International Nuclear Information System (INIS)

    Groniov, G.; Kondratiev, S.; Kutina, L.; Bachner, D.; Kuechler, L.; Denver, D.

    2010-01-01

    The world's most severe nuclear accident destroyed the fourth unit at the Chernobyl nuclear power plant in 1986. In the six months following the accident, a localizing building was erected over the unit to contain the nuclear materials and provide support services for managing the destroyed reactor. Since 1997, an international project which includes both urgent measures for stabilization and safety upgrading as well as long-term measures for transforming the facility into an ecologically safe system has been under way. This paper discusses an important aspect of this project which has been the cooperation amongst the technical support organizations of the Ukrainian regulatory authorities and the technical support from international organizations. (author)

  18. Can basic life support personnel safely determine that advanced life support is not needed?

    Science.gov (United States)

    Cone, D C; Wydro, G C

    2001-01-01

    To determine whether firefighter/emergency medical technicians-basic (FF/EMT-Bs) staffing basic life support (BLS) ambulances in a two-tiered emergency medical services (EMS) system can safely determine when advanced life support (ALS) is not needed. This was a prospective, observational study conducted in two academic emergency departments (EDs) receiving patients from a large urban fire-based EMS system. Runs were studied to which ALS and BLS ambulances were simultaneously dispatched, with the patient transported by the BLS unit. Prospectively established criteria for potential need for ALS were used to determine whether the FF/EMT-B's decision to cancel the ALS unit was safe, and simple outcomes (admission rate, length of stay, mortality) were examined. In the system studied, BLS crews may cancel responding ALS units at their discretion; there are no protocols or medical criteria for cancellation. A convenience sample of 69 cases was collected. In 52 cases (75%), the BLS providers indicated that they cancelled the responding ALS unit because they did not feel ALS was needed. Of these, 40 (77%) met study criteria for ALS: 39 had potentially serious chief complaints, nine had abnormal vital signs, and ten had physical exam findings that warranted ALS. Forty-five (87%) received an intervention immediately upon ED arrival that could have been provided in the field by an ALS unit, and 16 (31%) were admitted, with a median length of stay of 3.3 days (range 1.1-73.4 days). One patient died. Firefighter/EMT-Bs, working without protocols or medical criteria, cannot always safely determine which patients may require ALS intervention.

  19. Inherently safe in situ uranium recovery

    International Nuclear Information System (INIS)

    Krumhansl, James Lee; Beauheim, Richard Louis; Brady, Patrick Vane; Arnold, Bill Walter; Kanney, Joseph F.; McKenna, Sean Andrew

    2009-01-01

    Expansion of uranium mining in the United States is a concern to some environmental groups and sovereign Native American Nations. An approach which may alleviate some problems is to develop inherently safe in situ uranium recovery ('ISR') technologies. Current ISR technology relies on chemical extraction of trace levels of uranium from aquifers that, once mined, can still contain dissolved uranium and other trace metals that are a health concern. Existing ISR operations are few in number; however, high uranium prices are driving the industry to consider expanding operations nation-wide. Environmental concerns and enforcement of the new 30 ppb uranium drinking water standard may make opening new mining operations more difficult and costly. Here we propose a technological fix: the development of inherently safe in situ recovery (ISISR) methods. The four central features of an ISISR approach are: (1) New 'green' leachants that break down predictably in the subsurface, leaving uranium, and associated trace metals, in an immobile form; (2) Post-leachant uranium/metals-immobilizing washes that provide a backup decontamination process; (3) An optimized well-field design that increases uranium recovery efficiency and minimizes excursions of contaminated water; and (4) A combined hydrologic/geochemical protocol for designing low-cost post-extraction long-term monitoring. ISISR would bring larger amounts of uranium to the surface, leave fewer toxic metals in the aquifer, and cost less to monitor safely - thus providing a 'win-win-win' solution to all stakeholders.

  20. Iatrogenic Hepatitis C Virus Transmission and Safe Injection Practices.

    Science.gov (United States)

    Defendorf, Charles M; Paul, Sindy; Scott, George J

    2018-05-01

    Hepatitis C virus (HCV) infection poses significant adverse health effects. Improper use of vials, needles, syringes, intravenous bags, tubing, and connectors for injections and infusions is a current preventable cause of iatrogenic HCV transmission. Numerous cases have demonstrated the need for continued vigilance and the widespread nature of this iatrogenic infection risk across a variety of medical practice settings in the United States. Failure to implement the evidence-based Centers for Disease Control and Prevention (CDC) infection prevention guidelines exposes patients to preventable harm. The guidelines establish the requirement to notify patients in cases of suspected virus transmission, as well as to screen those patients who would not otherwise have been at risk for HCV seroconversion and other bloodborne pathogens. Legal and regulatory ramifications, including state, criminal, and tort laws, hold physicians and other health care professionals accountable to use safe injection practices. This article reviews the major health risks of HCV infection, significant effects of iatrogenic infection transmission, CDC guidelines for safe injection practices, and legal regulations and ramifications designed to promote safe injection practices.

  1. Keep Young Riders Safe (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2014-02-06

    Motor vehicle-related injuries are a leading cause of death among children in the United States. Adults can prevent many of these tragedies by properly securing children in vehicles. In this podcast, Dr. Erin Sauber-Schatz discusses ways to keep kids safe in vehicles.  Created: 2/6/2014 by MMWR.   Date Released: 2/6/2014.

  2. DroidSafe

    Science.gov (United States)

    2016-12-01

    Massachusetts Avenue, Build E19-750 Cambridge , MA 02139-4307 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS...Activity objects illustrating the challenges of points-to and information flow analysis...measure how many malicious flows Droid- Safe was able to detect). As these results illustrate , DroidSafe implements an analysis of unprece- dented

  3. Maintenance service for major component of PWR plant. Replacement of pressurizer safe end weld

    International Nuclear Information System (INIS)

    Miyoshi, Yoshiyuki; Kobayashi, Yuki; Yamamoto, Kazuhide; Ueda, Takeshi; Suda, Naoki; Shintani, Takashi

    2017-01-01

    In October 2016, MHI completed the replacement of safe end weld of pressurizer (Pz) of Ringhals unit 3, which was the first maintenance work for main component of pressurized water reactor (PWR) plant in Europe. For higher reliability and longer lifetime of PWR plant, MHI has conducted many kinds of maintenance works of main components of PWR plants in Japan against stress corrosion cracking due to aging degradation. Technical process for replacement of Pz safe end weld were established by MHI. MHI has experienced the work for 21 PWR units in Japan. That of Ringhals unit 3 was planned and conducted based on the experiences. In this work, Alloy 600 used for welds of nozzles of Pz was replaced with Alloy 690. Alloy 690 is more corrosive-resistant than Alloy 600. Specially designed equipment and technical process were developed and established by MHI to replace safe end weld of Pz and applied for the Ringhals unit 3 as a first application in Europe. The application had been performed in success and achieved the planned replacement work duration and total radiation dose by using sophisticated machining and welding equipment designed to meet the requirements to be small, lightweight and remote-controlled and operating by well skilled MHI personnel experienced in maintenance activities for major components of PWR plant in Japan. The success shows that the experience, activities and technology developed in Japan for main components of PWR plant shall be applicable to contribute reliable operations of nuclear power plants in Europe and other countries. (author)

  4. Safe havens in Europe

    DEFF Research Database (Denmark)

    Paldam, Martin

    2013-01-01

    Eleven safe havens exist in Europe providing offshore banking and low taxes. Ten of these states are very small while Switzerland is moderately small. All 11 countries are richer than their large neighbors. It is shown that causality is from small to safe haven to wealth, and that theoretically...... equilibriums are likely to exist where a certain regulation is substantially lower in a small country than in its big neighbor. This generates a large capital inflow to the safe havens. The pool of funds that may reach the safe havens is shown to be huge. It is far in excess of the absorptive capacity...... of the safe havens, but it still explains, why they are rich. Microstates offer a veil of anonymity to funds passing through, and Switzerland offers safe storage of funds....

  5. Traveling Safely with Medicines

    Science.gov (United States)

    ... Medications Safely My Medicine List How to Administer Traveling Safely with Medicines Planes, trains, cars – even boats ... your trip, ask your pharmacist about how to travel safely with your medicines. Make sure that you ...

  6. Labour of love yields new maternity unit.

    Science.gov (United States)

    2012-01-01

    Birmingham's City Hospital's new maternity unit is an inspiring departure from conventional units. Contemporary design and the latest technology combine to give mothers a safe, yet relaxed, environment in which to give birth. HEJ reports.

  7. Unique and massive Chernobyl cranes for deconstruction activities in the new safe confinement

    International Nuclear Information System (INIS)

    Parameswaran, N. A. Vijay; Chornyy, Igor; Owen, Rob; Saint Victor, Francois de

    2013-01-01

    On 26 April 1986, the worst nuclear power plant accident in history occurred at the Chernobyl plant in Ukraine (then part of the Soviet Union). The destruction of Unit 4 sent highly radioactive fallout over Belarus, Russia, Ukraine, and Europe. The object shelter-a containment sarcophagus-was built in November 1986 to limit exposure to radiation. However, it has only a planned 25-year lifespan and would probably not survive even a moderate seismic event in a region that has more than its share of such events. It was time to take action. One of the largest tasks that are in progress is the design and construction of the New Safe Confinement (NSC). The NSC is an engineered enclosure for the entire object shelter that includes a suite of process equipment. The process equipment will be used for the dismantling of the destroyed Chernobyl Nuclear Power Plant Unit. One of the major mechanical handling systems to be installed in the new safe confinement is the Main Cranes System. The planned decontamination and decommissioning or dismantling activities will require the handling of heavily shielded waste disposal casks containing nuclear fuel as well as lifting and transporting extremely large structural elements. These activities, to be performed within the new safe confinement, will require large and sophisticated cranes. The article will focus on the current progress of the new safe confinement and of the main cranes system for the decommissioning or dismantling activities. (authors)

  8. Unique and massive Chernobyl cranes for deconstruction activities in the new safe confinement

    Energy Technology Data Exchange (ETDEWEB)

    Parameswaran, N. A. Vijay; Chornyy, Igor [Bechtel Systems and Infrastructure, Inc., Chernobyl Project-SIP-PMU, 7/1, Gvardeyskoy div. Str., Kiev Region, Slavutich, 07101 (Ukraine); Owen, Rob [PaR Systems, Inc., 707 Country Road E West, Shoreview, Minnesota 55126-7007 (United States); Saint Victor, Francois de [Bouygues Travaux Publics Challenger, 1, avenue Eugene Freyssinet, Guyancourt, 78601 St-Quentin-en-Yvelines (France)

    2013-07-01

    On 26 April 1986, the worst nuclear power plant accident in history occurred at the Chernobyl plant in Ukraine (then part of the Soviet Union). The destruction of Unit 4 sent highly radioactive fallout over Belarus, Russia, Ukraine, and Europe. The object shelter-a containment sarcophagus-was built in November 1986 to limit exposure to radiation. However, it has only a planned 25-year lifespan and would probably not survive even a moderate seismic event in a region that has more than its share of such events. It was time to take action. One of the largest tasks that are in progress is the design and construction of the New Safe Confinement (NSC). The NSC is an engineered enclosure for the entire object shelter that includes a suite of process equipment. The process equipment will be used for the dismantling of the destroyed Chernobyl Nuclear Power Plant Unit. One of the major mechanical handling systems to be installed in the new safe confinement is the Main Cranes System. The planned decontamination and decommissioning or dismantling activities will require the handling of heavily shielded waste disposal casks containing nuclear fuel as well as lifting and transporting extremely large structural elements. These activities, to be performed within the new safe confinement, will require large and sophisticated cranes. The article will focus on the current progress of the new safe confinement and of the main cranes system for the decommissioning or dismantling activities. (authors)

  9. Regulatory control for safe usage of radiation sources in India

    International Nuclear Information System (INIS)

    Ghosh, P.K.; Sonawane, A.U.

    1998-01-01

    The widespread applications of radioactive materials and radiation generating equipment in the field of industry, medicine agriculture and research in India necessitated the establishment of an efficient regulatory framework and consequently the Atomic Energy Regulatory Board (AERB) was constituted to exercise regulatory control over the safe usage of the radioactive materials and the radiation generating equipment. The Atomic Energy Act, 1962 and the Radiation Protection Rules, 1971 promulgated under the Act forms the basis of radiation safety in India and Chairman, AERB is the Competent Authority to enforce the regulatory provisions of the Radiation Protection Rules, 1971, for safe use of radiation source in the country. AERB has published a number of documents such as Radiation Surveillance Procedures, Standards, Codes, Guides and Manuals for safe use and handling of radioactive materials and radiation generating equipment. Apart from nuclear fuel cycle documents, these publications pertain to industrial radiography, medical application of radiation, transport of radioactive material, industrial gamma irradiators, X-ray units etc. AERB safety related publications are based on international standards e.g. BSS, IAEA, ICRP, ISO etc. This paper outlines the methodology of regulatory control exercised by AERB for safe use of the radioactive materials and the radiation generating equipment in the country. (author)

  10. ESTUDIO, ANÁLISIS Y OPTIMIZACIÓN DEL TRÁFICO DE LAS REDES WIFI EN LA FACULTAD DE INGENIERÍA EN ELECTRICIDAD Y COMPUTACIÓN

    OpenAIRE

    Prado Bermudez, Gianella Estefania; Armijos De La Vera, Elena Esther

    2015-01-01

    El presente trabajo tiene por objetivo el estudio, análisis y optimización de tráfico de la red WIFI de la Facultad de Ingeniería en Electricidad y Computación (FIEC). Para lo cual se recopiló información relevante para el análisis de la red inalámbrica actual que da acceso a estudiantes, personal docente y administrativo a los diferentes servicios que esta ofrece. La tecnología inalámbrica nos ofrece un sin número de soluciones para la optimización de la red y mejorar la experiencia del usua...

  11. Novel Sample Preparation Method for Safe and Rapid Detection of Bacillus anthracis Spores in Environmental Powders and Nasal Swabs

    OpenAIRE

    Luna, Vicki A.; King, Debra; Davis, Carisa; Rycerz, Tony; Ewert, Matthew; Cannons, Andrew; Amuso, Philip; Cattani, Jacqueline

    2003-01-01

    Bacillus anthracis spores have been used as a biological weapon in the United States. We wanted to develop a safe, rapid method of sample preparation that provided safe DNA for the detection of spores in environmental and clinical specimens. Our method reproducibly detects B. anthracis in samples containing

  12. Calculation of the real states of Ignalina NPP Unit 1 and Unit 2 RBMK-1500 reactors in the verification process of QUABOX/CUBBOX code

    International Nuclear Information System (INIS)

    Bubelis, E.; Pabarcius, R.; Demcenko, M.

    2001-01-01

    Calculations of the main neutron-physical characteristics of RBMK-1500 reactors of Ignalina NPP Unit 1 and Unit 2 were performed, taking real reactor core states as the basis for these calculations. Comparison of the calculation results, obtained using QUABOX/CUBBOX code, with experimental data and the calculation results, obtained using STEPAN code, showed that all the main neutron-physical characteristics of the reactors of Unit 1 and Unit 2 of Ignalina NPP are in the safe deviation range of die analyzed parameters, and that reactors of Ignalina NPP, during the process of the reactor core composition change, are operated in a safe and stable manner. (author)

  13. SAFE Newsletter

    OpenAIRE

    2013-01-01

    The Center of Excellence SAFE – “Sustainable Architecture for Finance in Europe” – is a cooperation of the Center for Financial Studies and Goethe University Frankfurt. It is funded by the LOEWE initiative of the State of Hessen (Landes-Offensive zur Entwicklung wissenschaftlich-ökonomischer Exzellenz). SAFE brings together more than 40 professors and just as many junior researchers who are all dedicated to conducting research in support of a sustainable financial architecture. The Center has...

  14. A Reliable Data Transmission Model for IEEE 802.15.4e Enabled Wireless Sensor Network under WiFi Interference.

    Science.gov (United States)

    Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin

    2017-06-07

    The IEEE 802.15.4e standard proposes Medium Access Control (MAC) to support collision-free wireless channel access mechanisms for industrial, commercial and healthcare applications. However, unnecessary wastage of energy and bandwidth consumption occur due to inefficient backoff management and collisions. In this paper, a new channel access mechanism is designed for the buffer constraint sensor devices to reduce the packet drop rate, energy consumption and collisions. In order to avoid collision due to the hidden terminal problem, a new frame structure is designed for the data transmission. A new superframe structure is proposed to mitigate the problems due to WiFi and ZigBee interference. A modified superframe structure with a new retransmission opportunity for failure devices is proposed to reduce the collisions and retransmission delay with high reliability. Performance evaluation and validation of our scheme indicate that the packet drop rate, throughput, reliability, energy consumption and average delay of the nodes can be improved significantly.

  15. Safe Patient Handling and Mobility: Development and Implementation of a Large-Scale Education Program.

    Science.gov (United States)

    Lee, Corinne; Knight, Suzanne W; Smith, Sharon L; Nagle, Dorothy J; DeVries, Lori

    This article addresses the development, implementation, and evaluation of an education program for safe patient handling and mobility at a large academic medical center. The ultimate goal of the program was to increase safety during patient mobility/transfer and reduce nursing staff injury from lifting/pulling. This comprehensive program was designed on the basis of the principles of prework, application, and support at the point of care. A combination of online learning, demonstration, skill evaluation, and coaching at the point of care was used to achieve the goal. Specific roles and responsibilities were developed to facilitate implementation. It took 17 master trainers, 88 certified trainers, 176 unit-based trainers, and 98 coaches to put 3706 nurses and nursing assistants through the program. Evaluations indicated both an increase in knowledge about safe patient handling and an increased ability to safely mobilize patients. The challenge now is sustainability of safe patient-handling practices and the growth and development of trainers and coaches.

  16. Architecture of security management unit for safe hosting of multiple agents

    Science.gov (United States)

    Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques

    1999-04-01

    In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.

  17. Safe Grid

    Science.gov (United States)

    Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)

    2003-01-01

    The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote

  18. Safe transport of radioactive material. Second edition

    International Nuclear Information System (INIS)

    1991-01-01

    The transport of radioactive material embraces the carriage of radioisotopes for industrial, medical and research uses, and the movement of waste, in addition to consignments of nuclear fuel cycle material. It has been estimated that between eighteen and thirty-eight million package shipments take place each year. On the recommendation of the Standing Advisory Group on the Safe Transport of Radioactive Material (SAGSTRAM), which enjoys wide representations from the Agency's Member States and international organizations, the Secretariat is preparing a training kit comprising this training manual and complementary visual aids. The kit is intended to be the basis for an extensive course on the subject and can be used in whole or in part for inter-regional, regional and even national training purposes. Member States can thus benefit from the material either through training courses sponsored by the Agency, or, alternatively, organized by themselves. As a step towards achieving that goal, the current training manual was compiled using material from the first Inter-Regional Training Course on the Safe Transport of Radioactive material that was held in co-operation with the Nuclear Power Training Centre of the then Central Electricity Generating Board at Bristol, United Kingdom. This Manual was initially published in 1990. On the recommendation of the Agency's Standing Advisory Group on the Safe Transport of Radioactive Material (SAGSTRAM), the Manual has since been expanded and updated in time for the second Inter-Regional Training Course, that will in 1991 similarly be held in Bristol. Refs, figs, tabs

  19. Providing Databases for Different Indoor Positioning Technologies: Pros and Cons of Magnetic Field and Wi-Fi Based Positioning

    Directory of Open Access Journals (Sweden)

    Joaquín Torres-Sospedra

    2016-01-01

    Full Text Available Localization is one of the main pillars for indoor services. However, it is still very difficult for the mobile sensing community to compare state-of-the-art indoor positioning systems due to the scarcity of publicly available databases. To make fair and meaningful comparisons between indoor positioning systems, they must be evaluated in the same situation, or in the same sets of situations. In this paper, two databases are introduced for studying the performance of magnetic field and Wi-Fi fingerprinting based positioning systems in the same environment (i.e., indoor area. The “magnetic” database contains more than 40,000 discrete captures (270 continuous samples, whereas the “Wi-Fi” one contains 1,140 ones. The environment and both databases are fully detailed in this paper. A set of experiments is also presented where two simple but effective baselines have been developed to test the suitability of the databases. Finally, the pros and cons of both types of positioning techniques are discussed in detail.

  20. Monetary benefits of preventing childhood lead poisoning with lead-safe window replacement.

    Science.gov (United States)

    Nevin, Rick; Jacobs, David E; Berg, Michael; Cohen, Jonathan

    2008-03-01

    Previous estimates of childhood lead poisoning prevention benefits have quantified the present value of some health benefits, but not the costs of lead paint hazard control or the benefits associated with housing and energy markets. Because older housing with lead paint constitutes the main exposure source today in the US, we quantify health benefits, costs, market value benefits, energy savings, and net economic benefits of lead-safe window replacement (which includes paint stabilization and other measures). The benefit per resident child from improved lifetime earnings alone is $21,195 in pre-1940 housing and $8685 in 1940-59 housing (in 2005 dollars). Annual energy savings are $130-486 per housing unit, with or without young resident children, with an associated increase in housing market value of $5900-14,300 per housing unit, depending on home size and number of windows replaced. Net benefits are $4490-5,629 for each housing unit built before 1940, and $491-1629 for each unit built from 1940-1959, depending on home size and number of windows replaced. Lead-safe window replacement in all pre-1960 US housing would yield net benefits of at least $67 billion, which does not include many other benefits. These other benefits, which are shown in this paper, include avoided Attention Deficit Hyperactivity Disorder, other medical costs of childhood lead exposure, avoided special education, and reduced crime and juvenile delinquency in later life. In addition, such a window replacement effort would reduce peak demand for electricity, carbon emissions from power plants, and associated long-term costs of climate change.

  1. Safe sleep practices and sudden infant death syndrome risk reduction: NICU and well-baby nursery graduates.

    Science.gov (United States)

    Fowler, Aja J; Evans, Patricia W; Etchegaray, Jason M; Ottenbacher, Allison; Arnold, Cody

    2013-11-01

    Our primary objective was to compare parents of infants cared for in newborn intensive care units (NICUs) and infants cared for in well-baby ("general") nurseries with regard to knowledge and practice of safe sleep practices/sudden infant death syndrome risk reduction measures and guidelines. Our secondary objective was to obtain qualitative data regarding reasons for noncompliance in both populations. Sixty participants (30 from each population) completed our survey measuring safe sleep knowledge and practice. Parents of NICU infants reported using 2 safe sleep practices-(a) always placing baby in crib to sleep and (b) always placing baby on back to sleep-significantly more frequently than parents of well infants. Additional findings and implications for future studies are discussed.

  2. Inherently safe SNR shutdown system with Curie point controlled sensor/switch unit

    International Nuclear Information System (INIS)

    Mueller, K.; Norajitra, P.; Reiser, H.

    1987-02-01

    Inherent shutdown due to increase in the sodium temperature at the core outlet is triggered by interruption of the current supply to the electromagnet coupling of absorber elements via curie point controlled sensor/switch units. These switches are arranged above suitable fuel element positions and spatially independent of the shutdown elements. Compared with other similar systems very short response times are achieved. A prototype switch unit has already undergone extensive testing. These tests have confirmed that switching takes place in a very narrow temperature range. (orig./HP) [de

  3. The United States Naval Nuclear Propulsion Program - Over 151 Million Miles Safely Steamed on Nuclear Power

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2015-03-01

    NNSA’s third mission pillar is supporting the U.S. Navy’s ability to protect and defend American interests across the globe. The Naval Reactors Program remains at the forefront of technological developments in naval nuclear propulsion and ensures a commanding edge in warfighting capabilities by advancing new technologies and improvements in naval reactor performance and reliability. In 2015, the Naval Nuclear Propulsion Program pioneered advances in nuclear reactor and warship design – such as increasing reactor lifetimes, improving submarine operational effectiveness, and reducing propulsion plant crewing. The Naval Reactors Program continued its record of operational excellence by providing the technical expertise required to resolve emergent issues in the Nation’s nuclear-powered fleet, enabling the Fleet to safely steam more than two million miles. Naval Reactors safely maintains, operates, and oversees the reactors on the Navy’s 82 nuclear-powered warships, constituting more than 45 percent of the Navy’s major combatants.

  4. Are Detox Diets Safe?

    Science.gov (United States)

    ... Safe Videos for Educators Search English Español Are Detox Diets Safe? KidsHealth / For Teens / Are Detox Diets ... seguras las dietas de desintoxicación? What Is a Detox Diet? The name sounds reassuring — everyone knows that ...

  5. A dynamic fail-safe approach to the design of computer-based safety systems

    International Nuclear Information System (INIS)

    Smith, I.C.; Miller, M.

    1994-01-01

    For over 30 years AEA Technology has carried out research and development in the field of nuclear instrumentation and protection systems. Throughout the course of this extensive period of research and development the dominant theme has been the achievement of fully fail-safe designs. These are defined as designs in which the failure of any single component will result in the unit output reverting to a demand for trip action status. At an early stage it was recognized that the use of dynamic rather than static logic could ease the difficulties inherent in achieving a fail-safe design. The first dynamic logic systems coupled logic elements magnetically. The paper outlines the evolution from these early concepts of a dynamic fail-safe approach to the design of computer-based safety systems. Details are given of collaboration between AEA Technology and Duke Power Co. to mount an ISAT TM demonstration at Duke's Oconee Nuclear Power Station

  6. Design of an integrated information management system for safe management of radioactive waste

    International Nuclear Information System (INIS)

    Son, Dong Chan; Hong, Suk Young; An, Kyoung Il

    2003-05-01

    An integrated data management system for the safe management of radioactive waste and spent fuel in Korea is developed to collect basic information, provide the framework for national regulation, and improve national competition and efficiency in the management of radioactive waste and spent fuel. This system can also provide public access to information such as a statistical graphs and integrated data from various waste generators to meet increased public needs and interests. Objectives can be summarized as: the five principles (independence, openness, clearance, efficiency and reliance) of safety regulation can be realized. Public understanding and reliance on the safety of spent fuel and radioactive waste management can be promoted by providing reliable information. Ensure an openness within the international nuclear community and efficiently support international agreements among contracting parties by operating safe and efficient management of spent fuel and radioactive waste (IAEA joint convention on the safety of spent fuel management and on the safety of radioactive waste management). The system can compensate for the imperfections in safe regulation of radioactive waste and spent fuel management related to waste generation, storage and disposal, and make it possible to holistic control. Re-organize the basic framework of KINS's intermediate and long term research organization and trends, regarding waste management policy is to integrate safe management and unit safe disposal

  7. Design of an integrated information management system for safe management of radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Son, Dong Chan; Hong, Suk Young; An, Kyoung Il [Daesang Information Technology Co., Ltd., Seoul (Korea, Republic of)] (and others)

    2003-05-15

    An integrated data management system for the safe management of radioactive waste and spent fuel in Korea is developed to collect basic information, provide the framework for national regulation, and improve national competition and efficiency in the management of radioactive waste and spent fuel. This system can also provide public access to information such as a statistical graphs and integrated data from various waste generators to meet increased public needs and interests. Objectives can be summarized as: the five principles (independence, openness, clearance, efficiency and reliance) of safety regulation can be realized. Public understanding and reliance on the safety of spent fuel and radioactive waste management can be promoted by providing reliable information. Ensure an openness within the international nuclear community and efficiently support international agreements among contracting parties by operating safe and efficient management of spent fuel and radioactive waste (IAEA joint convention on the safety of spent fuel management and on the safety of radioactive waste management). The system can compensate for the imperfections in safe regulation of radioactive waste and spent fuel management related to waste generation, storage and disposal, and make it possible to holistic control. Re-organize the basic framework of KINS's intermediate and long term research organization and trends, regarding waste management policy is to integrate safe management and unit safe disposal.

  8. More than a Safe Space: How Schools Can Enable LGBTQ Students to Thrive

    Science.gov (United States)

    Sadowski, Michael

    2017-01-01

    Few educators or philosophers of education would argue that schools' sole purpose is to keep children safe. Yet a particular subset of students in the United States--lesbian, gay, bisexual, transgender, queer, and questioning (LGBTQ) students--are often served by their schools as if their mere safety were a sufficient objective in and of itself.…

  9. The Rainbow Connection: How Music Classrooms Create Safe Spaces for Sexual-Minority Young People

    Science.gov (United States)

    Southerland, William

    2018-01-01

    LGBTQ students in many parts of the United States often experience hostility on the part of other students, teachers, and administrators. This article reviews current terminology, examines present-day attitudes and recent literature, and offers suggestions to educators who want to create safe spaces for all students in their classrooms.

  10. Safe Anesthesia For Every Tot

    DEFF Research Database (Denmark)

    Weiss, Markus; Vutskits, Laszlo; Hansen, Tom G

    2015-01-01

    PURPOSE OF REVIEW: The term 'safe use of anesthesia in children is ill-defined and requires definition of and focus on the 'safe conduct of pediatric anesthesia'. RECENT FINDINGS: The Safe Anesthesia For Every Tot initiative (www.safetots.org) has been set up during the last year to focus...... on the safe conduct of pediatric anesthesia. This initiative aims to provide guidance on markers of quality anesthesia care. The introduction and implementation of national regulations of 'who, where, when and how' are required and will result in an improved perioperative outcome in vulnerable children....... The improvement of teaching, training, education and supervision of the safe conduct of pediatric anesthesia are the main goals of the safetots.org initiative. SUMMARY: This initiative addresses the well known perioperative risks in young children, perioperative causes for cerebral morbidity as well as gaps...

  11. The safe home project.

    Science.gov (United States)

    Arphorn, Sara; Jiraniratisai, Sopaphan; Rungtakul, Rungsri; Phutta, Nikom

    2011-12-01

    The Thai Health Promotion Foundation supported the Improvement of Quality of Life of Informal Workers project in Ban Luang District, Amphur Photaram, Ratchaburi Province. There were many informal workers in Ban Luang District. Sweet-crispy fish producers in Ban Luang were the largest group among the sweet-crispy fish producers in Thailand. This project was aimed at improving living and working conditions of informal workers, with a focus on the sweet-crispy fish group. Good practices of improved living and working conditions were used to help informal workers build safe, healthy and productive work environments. These informal workers often worked in substandard conditions and were exposed to various hazards in the working area. These hazards included risk of exposure to hot work environment, ergonomics-related injuries, chemical hazards, electrical hazards etc. Ergonomics problems were commonly in the sweet-crispy fish group. Unnatural postures such as prolonged sitting were performed dominantly. One hundred and fifty informal workers participated in this project. Occupational health volunteers were selected to encourage occupational health and safety in four groups of informal workers in 2009. The occupational health volunteers trained in 2008 were farmers, beauty salon workers and doll makers. The occupational health and safety knowledge is extended to a new informal worker group: sweet-crispy fish producer, in 2009. The occupational health and safety training for sweet-crispy fish group is conducted by occupational health volunteers. The occupational health volunteers increased their skills and knowledge assist in to make safe home and safe community through participatory oriented training. The improvement of living and working condition is conducted by using a modified WISH, Work Improvement for Safe Home, checklist. The plans of improvement were recorded. The informal workers showed improvement mostly on material handling and storage. The safe uses and safe

  12. Reliable JavaScript how to code safely in the world's most dangerous language

    CERN Document Server

    Spencer, Lawrence

    2015-01-01

    Create more robust applications with a test-first approach to JavaScript Reliable JavaScript, How to Code Safely in the World's Most Dangerous Language demonstrates how to create test-driven development for large-scale JavaScript applications that will stand the test of time and stay accurate through long-term use and maintenance. Taking a test-first approach to software architecture, this book walks you through several patterns and practices and explains what they are supposed to do by having you write unit tests. Write the code to pass the unit tests, so you not only develop your technique

  13. The safe use of radiation sources

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-12-01

    As a means of promoting safety in the use of radiation sources, as well as encouraging consistency in regulatory control, the IAEA has from time to time organized training courses with the co-operation of Member State governments and organizations, to inform individuals from developing countries with appropriate responsibilities on the provisions for the safe use and regulation of radiation sources. Three such courses on the safe use of radiation sources have been held in both the USA, with the co-operation of the United States Government, and in Dublin, Ireland, with the co-operation of the Irish Government. The Training Course on the Safe Use and Regulation of Radiation Sources has been successfully given to over 77 participants from over 30 countries during the last years. The course is aimed at providing a basis of radiation protection knowledge in all aspects of the uses of radiation and of radiation sources that are used today. It is the intention of this course to provide a systematic enhancement of radioisotope safety in countries with developing radiological programmes through a core group of national authorities. The IAEA's training programmes provide an excellent opportunity for direct contact with lecturers that have extensive experience in resolving issues faced by developing countries and in providing guidance documents useful in addressing their problems. This document uses this collective experience and provides valuable technical information regarding the safety aspects of the uses not only of sealed and unsealed sources of radiation, but also for those machines that produce ionizing radiation. The first of these training courses, 'Safety and Regulation of Unsealed Sources' was held in Dublin, Ireland, June through July 1989 with the co-operation of the Nuclear Energy Board and Trinity College. This was an interregional training course, the participants came from all over the world. The second and third interregional courses, 'Safety and Regulation

  14. The safe use of radiation sources

    International Nuclear Information System (INIS)

    1995-01-01

    As a means of promoting safety in the use of radiation sources, as well as encouraging consistency in regulatory control, the IAEA has from time to time organized training courses with the co-operation of Member State governments and organizations, to inform individuals from developing countries with appropriate responsibilities on the provisions for the safe use and regulation of radiation sources. Three such courses on the safe use of radiation sources have been held in both the USA, with the co-operation of the United States Government, and in Dublin, Ireland, with the co-operation of the Irish Government. The Training Course on the Safe Use and Regulation of Radiation Sources has been successfully given to over 77 participants from over 30 countries during the last years. The course is aimed at providing a basis of radiation protection knowledge in all aspects of the uses of radiation and of radiation sources that are used today. It is the intention of this course to provide a systematic enhancement of radioisotope safety in countries with developing radiological programmes through a core group of national authorities. The IAEA's training programmes provide an excellent opportunity for direct contact with lecturers that have extensive experience in resolving issues faced by developing countries and in providing guidance documents useful in addressing their problems. This document uses this collective experience and provides valuable technical information regarding the safety aspects of the uses not only of sealed and unsealed sources of radiation, but also for those machines that produce ionizing radiation. The first of these training courses, 'Safety and Regulation of Unsealed Sources' was held in Dublin, Ireland, June through July 1989 with the co-operation of the Nuclear Energy Board and Trinity College. This was an interregional training course, the participants came from all over the world. The second and third interregional courses, 'Safety and Regulation

  15. Proposal for a new normalization reference in LCA based on “safe operating space”: presentation of framework and global factors at midpoint level

    DEFF Research Database (Denmark)

    Bjørn, Anders; Hauschild, Michael Zwicky

    Planetary boundaries have been suggested for a range of environmental impacts,such as climate change, eutrophying nutrients and land use. The boundaries demarcate the safe operating space of humanity: Staying within the space ensures environmental sustainability, while exceeding it risks pushing...... ecosystems into alternative regimes, leading to adverse effects for humanity. Planetary boundaries can be applied as policy targets. To promote a societal development in the direction of these targets, an indicator system is needed that measures the fraction of the safe operating space that a given activity...... normalization factors in units compatible with characterized results at midpoint level in LCA. Our suggested framework allows expressing normalized results in units of “sustainable person years”. Normalization factors are derived by dividing the safe operating space by the global population. The proposed...

  16. SAFE/SNAP application to shipboard security

    International Nuclear Information System (INIS)

    Grady, L.M.; Walker, J.L.; Polito, J.

    1981-11-01

    An application of the combined Safeguards Automated Facility Evaluation/Safeguards Network Analysis Procedure (SAFE/SNAP) modeling technique to a physical protection system (PPS) aboard a generic ship is described. This application was performed as an example of how the SAFE and SNAP techniques could be used. Estimates of probability of interruption and neutralization for the example shipboard PPS are provided by SAFE as well as an adversary scenario, which serves as input to SNAP. This adversary scenario is analyzed by SNAP through four cases which incorporate increasingly detailed security force tactics. Comparisons between the results of the SAFE and SNAP analyses are made and conclusions drawn on the validity of each technique. Feedback from SNAP to SAFE is described, and recommendations for upgrading the ship based on the results of the SAFE/SNAP application are also discussed

  17. Safe new reactor for radionuclide production

    International Nuclear Information System (INIS)

    Gray, P.L.

    1995-01-01

    In late 1995, DOE is schedule to announce a new tritium production unit. Near the end of the last NPR (New Production Reactors) program, work was directed towards eliminating risks in current designs and reducing effects of accidents. In the Heavy Water Reactor Program at Savannah River, the coolant was changed from heavy to light water. An alternative, passively safe concept uses a heavy-water-filled, zircaloy reactor calandria near the bottom of a swimming pool; the calandria is supported on a light-water-coolant inlet plenum and has upflow through assemblies in the calandria tubes. The reactor concept eliminates or reduces significantly most design basis and severe accidents that plague other deigns. The proven, current SRS tritium cycle remains intact; production within the US of medical isotopes such as Mo-99 would also be possible

  18. Coexistence of Cognitive Small Cell and WiFi System: A Traffic Balancing Dual-Access Resource Allocation Scheme

    Directory of Open Access Journals (Sweden)

    Xiaoge Huang

    2018-01-01

    Full Text Available We consider a holistic approach for dual-access cognitive small cell (DACS networks, which uses the LTE air interface in both licensed and unlicensed bands. In the licensed band, we consider a sensing-based power allocation scheme to maximize the sum data rate of DACSs by jointly optimizing the cell selection, the sensing operation, and the power allocation under the interference constraint to macrocell users. Due to intercell interference and the integer nature of the cell selection, the resulting optimization problems lead to a nonconvex integer programming. We reformulate the problem to a nonconvex power allocation game and find the relaxed equilibria, quasi-Nash equilibrium. Furthermore, in order to guarantee the fairness of the whole system, we propose a dynamic satisfaction-based dual-band traffic balancing (SDTB algorithm over licensed and unlicensed bands for DACSs which aims at maximizing the overall satisfaction of the system. We obtain the optimal transmission time in the unlicensed band to ensure the proportional fair coexistence with WiFi while guaranteeing the traffic balancing of DACSs. Simulation results demonstrate that the SDTB algorithm could achieve a considerable performance improvement relative to the schemes in literature, while providing a tradeoff between maximizing the total data rate and achieving better fairness among networks.

  19. Super-compactor and grouting. Efficient and safe treatment of nuclear waste

    International Nuclear Information System (INIS)

    Li, Hongyou; Starke, Holger; Muetzel, Wolfgang; Winter, Marc

    2014-01-01

    The conditioning and volume reduction of nuclear waste are increasingly important factors throughout the world. Efficient and safe treatment of nuclear waste therefore plays a decisive role. Babcock Noell designed, manufactured and supplied a complete waste treatment facility for conditioning of the solid radioactive waste of a nuclear power plant to China. This facility consists of a Sorting Station, a Super-Compactor, a Grouting Unit with Capping Device and other auxiliary equipment which is described in more detail in the following article. This article gives an overview of the efficient and safe treatment of nuclear waste. Babcock Noell is a subsidiary of the Bilfinger Power Systems and has 40 years of experience in the field of design, engineering, construction, static and dynamic calculations, manufacturing, installation, commissioning, as well as in the service and operation of a wide variety of nuclear components and facilities worldwide.

  20. Asymptotically Safe Dark Matter

    DEFF Research Database (Denmark)

    Sannino, Francesco; Shoemaker, Ian M.

    2015-01-01

    We introduce a new paradigm for dark matter (DM) interactions in which the interaction strength is asymptotically safe. In models of this type, the coupling strength is small at low energies but increases at higher energies, and asymptotically approaches a finite constant value. The resulting...... searches are the primary ways to constrain or discover asymptotically safe dark matter....

  1. 75 FR 1734 - Children’s Online Privacy Protection Rule Safe Harbor Proposed Self-Regulatory Guidelines; i-SAFE...

    Science.gov (United States)

    2010-01-13

    ... Proposed Self-Regulatory Guidelines; i-SAFE, Inc. Application for Safe Harbor AGENCY: Federal Trade... for public comment concerning proposed self-regulatory guidelines submitted by i-SAFE, Inc. under the... approval self-regulatory guidelines that would implement the Rule's protections.\\3\\ \\1\\ 64 FR 59888 (1999...

  2. Safeness of radiological machinery

    International Nuclear Information System (INIS)

    Yokoyama, Shun

    1979-01-01

    The human factors affecting the safeness of radiological machinery, which are often very big and complicated machines, are described from the stand point of handling. 20 to 50% of the troubles on equipments seem to be caused by men. This percentage will become even higher in highly developed equipments. Human factors have a great influence on the safeness of radiological equipments. As the human factors, there are sensory factors and knowledge factors as well as psychological factors, and the combination of these factors causes mishandling and danger. Medical services at present are divided in various areas, and consist of the teamwork of the people in various professions. Good human relationship, education and control are highly required to secure the safeness. (Kobatake, H.)

  3. Safety Goal, Multi-unit Risk and PSA Uncertainty

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Joon-Eon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2015-10-15

    The safety goal is an answer of each country to the question 'How safe is safe enough?'. Table 1 shows some examples of the safety goal. However, many countries including Korea do not have the official safety goal for NPPs up to now since the establishment of safety goal is not just a technical issue but a very complex socio-technical issue. In establishing the safety goal for nuclear facilities, we have to consider various factors including not only technical aspects but also social, cultural ones. Recently, Korea is trying to establish the official safety goal. In this paper, we will review the relationship between the safety goal and Probabilistic Safety Assessment (PSA). We will also address some important technical issues to be considered in establishing the safety goal for NPPs from PSA point of view, i.e. a multi-unit risk issue and the uncertainty of PSA. In this paper, we reviewed some issues related to the safety goal and PSA. We believe that the safety goal is to be established in Korea considering the multi-unit risk. In addition, the relationship between the safety goal and PSA should be also defined clearly since PSA is the only way to answer to the question 'How safe is safe enough?'.

  4. "From safe source to safe sink" development of colorimetric assay for gabapentin in bulk drug and capsules using naturally derived genipin.

    Science.gov (United States)

    Winotapun, Weerapath; Kongpakwattana, Khachen; Dejpittayanunt, Sirirat; Pathomcharoensukchai, Suwaparp; Suksaran, Udomluck; Nuntharatanapong, Nopparat; Rojanarata, Theerasak

    2012-09-15

    A novel colorimetric assay for gabapentin in bulk drug and capsules has been developed via a safety-and-sustainability concerning concept. The method relied on the reaction of primary amino group of drug with non-toxic and eco-friendly genipin in totally aqueous medium to form the blue product which was subsequently measured by visible spectrophotometry at 590 nm. Under the optimized conditions, Beer's law was obeyed in the concentration range of 0.15-0.50 mM (r(2)=0.9998). It was accurate, precise and insensitive to the interferences from all related compounds specified in the United States Pharmacopeia as well as commonly used excipients. Furthermore, it gave the assay results in agreement with the pharmacopeial chromatographic method. Owing to the environmental concern and responsibility, a fast and facile method was also proposed for the treatment of waste generated from the assay based on the decoloration by using gypsum as a cheap and commonly available adsorbent. After the treatment, more than 95% of the initial blue product was removed from the waste solution and the treated waste was proven to be safe for aquatic organisms, as studied in brine shrimp and guppy fishes. Therefore, this work not only reports for the first time the application of naturally derived genipin to drug analysis, but also presents a new and contemporary paradigm that illustrates the fully benign-by-design development of the analytical methodologies in the era of Green Chemistry, starting from the safe source of reagents toward the safe sink when waste is released into the environment. Copyright © 2012 Elsevier B.V. All rights reserved.

  5. Safe Environment Training: Effects on Catholic Schoolteachers' and Administrators' School Security and Satisfaction

    Science.gov (United States)

    Teague, James Brian

    2013-01-01

    In 2002, in light of the sexual abuse crisis in the Catholic church, The United States Conference of Catholic Bishops established "The charter for the Protection of Children and Young People" that mandated safe environment training for clergy personnel, and volunteers working in the Catholic church. In this study, under the auspices of a…

  6. The role of internationally educated nurses in a quality, safe workforce.

    Science.gov (United States)

    D Sherwood, Gwen; Shaffer, Franklin A

    2014-01-01

    Migration and globalization of the nursing workforce affect source countries and destination countries. Policies and regulations governing the movement of nurses from one country to another safeguard the public by ensuring educational comparability and competence. The global movement of nurses and other health care workers calls for quality and safety competencies that meet standards such as those defined by the Institute of Medicine. This article examines nurse migration and employment of internationally educated nurses (IENs) in the context of supporting and maintaining safe, quality patient care environments. Migration to the United States is featured as an exemplar to consider the following key factors: the impact of nurse migration on the nursing workforce; issues in determining educational comparability of nursing programs between countries; quality and safety concerns in transitioning IENs into the workforce; and strategies for helping IENs transition as safe, qualified members of the nursing workforce in the destination country. Copyright © 2014 Elsevier Inc. All rights reserved.

  7. Safe Cooperating Cyber-Physical Systems using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Sljivo, Irfan

    2017-01-01

    This paper presents an overview of the ECSEL project entitled ―Safe Cooperating Cyber-Physical Systems using Wireless Communication‖ (SafeCOP), which runs during the period 2016–2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  8. InaSAFE applications in disaster preparedness

    Science.gov (United States)

    Pranantyo, Ignatius Ryan; Fadmastuti, Mahardika; Chandra, Fredy

    2015-04-01

    Disaster preparedness activities aim to reduce the impact of disasters by being better prepared to respond when a disaster occurs. In order to better anticipate requirements during a disaster, contingency planning activities can be undertaken prior to a disaster based on a realistic disaster scenario. InaSAFE is a tool that can inform this process. InaSAFE is a free and open source software that estimates the impact to people and infrastructure from potential hazard scenarios. By using InaSAFE, disaster managers can develop scenarios of disaster impacts (people and infrastructures affected) to inform their contingency plan and emergency response operation plan. While InaSAFE provides the software framework exposure data and hazard data are needed as inputs to run this software. Then InaSAFE can be used to forecast the impact of the hazard scenario to the exposure data. InaSAFE outputs include estimates of the number of people, buildings and roads are affected, list of minimum needs (rice and clean water), and response checklist. InaSAFE is developed by Indonesia's National Disaster Management Agency (BNPB) and the Australian Government, through the Australia-Indonesia Facility for Disaster Reduction (AIFDR), in partnership with the World Bank - Global Facility for Disaster Reduction and Recovery (GFDRR). This software has been used in many parts of Indonesia, including Padang, Maumere, Jakarta, and Slamet Mountain for emergency response and contingency planning.

  9. Development and design of an integrated information management system for safe management of radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Son, Dong Chan; Hong, Suk Young; An, Kyoung Il [Daesang Information Technology Co., Ltd., Seoul (Korea, Republic of)

    2004-05-15

    An integrated data management system for the safe management of radioactive waste and spent fuel in Korea is developed to collect basic information, provide the framework for national regulation, and improve national competition and efficiency in the management of radioactive waste and spent fuel. This system can also provide public access to information such as a statistical graphs and integrated data from various waste generators to meet increased public needs and interests. Objectives can be summarized as; the five principles (independence, openness, clearance, efficiency and reliance) of safety regulation can be realized. Public understanding and reliance on the safety of spent fuel and radioactive waste management can be promoted by providing reliable information. Ensure an openness within the international nuclear community and efficiently support international agreements among contracting parties by operating safe and efficient management of spent fuel and radioactive waste (IAEA joint convention on the safety of spent fuel management and on the safety of radioactive waste management). The system can compensate for the imperfections In safe regulation of radioactive waste and spent fuel management related to waste generation, storage and disposal, and make it possible to holistic control. Re-organize the basic framework of KINS's intermediate and long term research organization and trends, regarding waste management policy is to integrate safe management and unit safe disposal.

  10. Development and design of an integrated information management system for safe management of radioactive waste

    International Nuclear Information System (INIS)

    Son, Dong Chan; Hong, Suk Young; An, Kyoung Il

    2004-05-01

    An integrated data management system for the safe management of radioactive waste and spent fuel in Korea is developed to collect basic information, provide the framework for national regulation, and improve national competition and efficiency in the management of radioactive waste and spent fuel. This system can also provide public access to information such as a statistical graphs and integrated data from various waste generators to meet increased public needs and interests. Objectives can be summarized as; the five principles (independence, openness, clearance, efficiency and reliance) of safety regulation can be realized. Public understanding and reliance on the safety of spent fuel and radioactive waste management can be promoted by providing reliable information. Ensure an openness within the international nuclear community and efficiently support international agreements among contracting parties by operating safe and efficient management of spent fuel and radioactive waste (IAEA joint convention on the safety of spent fuel management and on the safety of radioactive waste management). The system can compensate for the imperfections In safe regulation of radioactive waste and spent fuel management related to waste generation, storage and disposal, and make it possible to holistic control. Re-organize the basic framework of KINS's intermediate and long term research organization and trends, regarding waste management policy is to integrate safe management and unit safe disposal

  11. Progress and future direction for the interim safe storage and disposal of Hanford high level waste (HLW)

    International Nuclear Information System (INIS)

    Wodrich, D.D.

    1996-01-01

    This paper describes the progress made at the largest environmental cleanup program in the United States. Substantial advances in methods to start interim safe storage of Hanford Site high-level wastes, waste characterization to support both safety- and disposal-related information needs, and proceeding with cost-effective disposal by the US DOE and its Hanford Site contractors, have been realized. Challenges facing the Tank Waste Remediation System Program, which is charged with the dual and parallel missions of interim safe storage and disposal of the high-level tank waste stored at the Hanford Site, are described

  12. Safe Minimum Internal Temperature Chart

    Science.gov (United States)

    ... Internal Temperature Chart Safe steps in food handling, cooking, and storage are essential in preventing foodborne illness. You can't see, smell, or taste harmful bacteria that may cause illness. In every step of food preparation, follow the four guidelines to keep food safe: ...

  13. Safe Harbor Legislation for Juvenile Victims of Sex Trafficking: A Myopic View of Improvements in Practice

    Directory of Open Access Journals (Sweden)

    Kimberly Mehlman-Orozco

    2015-02-01

    Full Text Available Current social and political realties have focused attention on human trafficking in the United States. Although new mechanisms for criminalizing offenders and protecting victims are increasingly funded and implemented across the country, empirical exploration into the efficacy of these interventions is lacking. This article uses yearly count data on juvenile prostitution arrests aggregated at the state level to explore the criminalization of commercial sexually exploited children post safe harbor policy implementation. Preliminary data from four states suggests that the passage of safe harbor laws may not reduce the number of juveniles arrested for prostitution crimes. Implications for future research are discussed.

  14. Indoor Smartphone Navigation Using a Combination of Wi-Fi and Inertial Navigation with Intelligent Checkpoints

    Science.gov (United States)

    Hofer, H.; Retscher, G.

    2017-09-01

    For Wi-Fi positioning location fingerprinting is one of the most commonly employed localization technique. To achieve an acceptable level of positioning accuracy on the few meter level, i.e., to provide at least room resolution in buildings, such an approach is very labour consuming as it requires a high density of reference points. Thus, the novel approach developed aims at a significant reduction of workload for the training phase. The basic idea is to intelligently choose waypoints along possible users' trajectories in the indoor environment. These waypoints are termed intelligent checkpoints (iCPs) and serve as reference points for the fingerprinting localization approach. They are selected along the trajectories in such a way that they define a logical sequence with their ascending order. Thereby, the iCPs are located, for instance, at doors at entrances to buildings, rooms, along corridors, etc., or in low density along the trajectory to provide a suitable absolute user localization. Continuous positioning between these iCPs is obtained with the help of the smartphones' inertial sensors. While walking along a selected trajectory to the destination a dynamic recognition of the iCPs is performed and the drift of the inertial sensors is reduced as the iCP recognition serves as absolute position update. Conducted experiments in a multi-storey office building have shown that positioning accuracy of around 2.0 m are achievable which goes along with a reduction of workload by three quarter using this novel approach. The iCP concept and performance are presented and demonstrated in this paper.

  15. Safe affordable fission engine (SAFE 30) module conductivity test thermal model correlation

    International Nuclear Information System (INIS)

    Roman, Jose

    2001-01-01

    The SAFE 30 is a simple, robust space fission power system that is comprised of several independent modules. Each module contains 4 fuel tubes bonded to a central heatpipe. Fission energy is conducted from the fuel tubes to the heatpipe, which in turn transfers the energy to a power conversion system. This paper benchmarks a thermal model of the SAFE 30 with actual test data from simulated SAFE 30 module tests. Two 'dummy' SAFE 30 modules were fabricated - each consisted of 4 1-inch dia. tubes (simulating the fuel tubes) bonded to a central '1' dia. tube (simulating the heatpipe). In the first module the fuel tubes were simply brazed to the heatpipe along the line of contact (leaving void space in the interstices), and in the second module the tubes and heatpipe were brazed via tri-cusps that completely fill the interstices between the tubes. In these tests, fission energy is simulated by placing resistance heaters within each of the 4 fuel tubes. The tests were conducted in a vacuum chamber in 4 configurations: tri-cusps filled with and without an outer insulation wrap, and no tri-cusps with and without an outer insulation wrap. The baseline SAFE 30 configuration uses the brazed tri-cusps. During the tests, the power applied to the heaters was varied in a stepwise fashion, until a steady-state temperature profile was reached. These temperature levels varied between 773 K and 1073 K. To benchmark the thermal model, the input energy and chamber surface temperature were used as boundary conditions for the model. The analytical results from the nodes at the same location as the test thermocouples were plotted again test data to determinate the accuracy of the analysis. The unknown variables on the analysis are the radiation emissivity of the pipe and chamber and the radiation view factor between the module and the chamber. A correlation was determined using a parametric analysis by varying the surface emissivity and view factor until a good match was reached. This

  16. Safe and effective error rate monitors for SS7 signaling links

    Science.gov (United States)

    Schmidt, Douglas C.

    1994-04-01

    This paper describes SS7 error monitor characteristics, discusses the existing SUERM (Signal Unit Error Rate Monitor), and develops the recently proposed EIM (Error Interval Monitor) for higher speed SS7 links. A SS7 error monitor is considered safe if it ensures acceptable link quality and is considered effective if it is tolerant to short-term phenomena. Formal criteria for safe and effective error monitors are formulated in this paper. This paper develops models of changeover transients, the unstable component of queue length resulting from errors. These models are in the form of recursive digital filters. Time is divided into sequential intervals. The filter's input is the number of errors which have occurred in each interval. The output is the corresponding change in transmit queue length. Engineered EIM's are constructed by comparing an estimated changeover transient with a threshold T using a transient model modified to enforce SS7 standards. When this estimate exceeds T, a changeover will be initiated and the link will be removed from service. EIM's can be differentiated from SUERM by the fact that EIM's monitor errors over an interval while SUERM's count errored messages. EIM's offer several advantages over SUERM's, including the fact that they are safe and effective, impose uniform standards in link quality, are easily implemented, and make minimal use of real-time resources.

  17. Steering teens safe: a randomized trial of a parent-based intervention to improve safe teen driving.

    Science.gov (United States)

    Peek-Asa, Corinne; Cavanaugh, Joseph E; Yang, Jingzhen; Chande, Vidya; Young, Tracy; Ramirez, Marizen

    2014-07-31

    Crashes are the leading cause of death for teens, and parent-based interventions are a promising approach. We assess the effectiveness of Steering Teens Safe, a parent-focused program to increase safe teen driving. Steering Teens Safe aimed to improve parental communication with teens about safe driving using motivational interviewing techniques in conjunction with 19 safe driving lessons. A randomized controlled trial involved 145 parent-teen dyads (70 intervention and 75 control). Intervention parents received a 45-minute session to learn the program with four follow-up phone sessions, a DVD, and a workbook. Control parents received a standard brochure about safe driving. Scores were developed to measure teen-reported quantity and quality of parental communication about safe driving. The main outcome measure was a previously validated Risky Driving Score reported by teens. Because the Score was highly skewed, a generalized linear model based on a gamma distribution was used for analysis. Intervention teens ranked their parent's success in talking about driving safety higher than control teens (p = 0.035) and reported that their parents talked about more topics (non-significant difference). The Risky Driving Score was 21% lower in intervention compared to control teens (85% CI = 0.60, 1.00). Interaction between communication quantity and the intervention was examined. Intervention teens who reported more successful communication had a 42% lower Risky Driving Score (95% CI = 0.37, 0.94) than control parents with less successful communication. This program had a positive although not strong effect, and it may hold the most promise in partnership with other programs, such as Driver's Education or Graduated Driver's License policies. ClinicalTrials.gov NCT01014923. Registered Nov. 16, 2009.

  18. Staying Safe in the Water

    Centers for Disease Control (CDC) Podcasts

    In this podcast, Dr. Julie Gilchrist, a pediatrician and medical epidemiologist from CDC’s Injury Center, talks about staying safe in the water. Tips are for all audiences, with a focus on preventing drownings and keeping children safe in and around the pool, lake, or ocean.

  19. Safe biodegradable fluorescent particles

    Science.gov (United States)

    Martin, Sue I [Berkeley, CA; Fergenson, David P [Alamo, CA; Srivastava, Abneesh [Santa Clara, CA; Bogan, Michael J [Dublin, CA; Riot, Vincent J [Oakland, CA; Frank, Matthias [Oakland, CA

    2010-08-24

    A human-safe fluorescence particle that can be used for fluorescence detection instruments or act as a safe simulant for mimicking the fluorescence properties of microorganisms. The particle comprises a non-biological carrier and natural fluorophores encapsulated in the non-biological carrier. By doping biodegradable-polymer drug delivery microspheres with natural or synthetic fluorophores, the desired fluorescence can be attained or biological organisms can be simulated without the associated risks and logistical difficulties of live microorganisms.

  20. Safe Haven.

    Science.gov (United States)

    Bush, Gail

    2003-01-01

    Discusses school libraries as safe havens for teenagers and considers elements that foster that atmosphere, including the physical environment, lack of judgments, familiarity, leisure, and a welcoming nature. Focuses on the importance of relationships, and taking the time to listen to teens and encourage them. (LRW)

  1. More than a Safe Space

    Science.gov (United States)

    Sadowski, Michael

    2016-01-01

    Over the past three decades, much of the conversation about LGBTQ students in schools has centered on safety--anti-bullying policies, the "safe space" of gay-straight alliances, and "safe zones" marked by rainbow-colored stickers on classroom doors. In this article, Michael Sadowski argues that it's time to move beyond safety…

  2. Safe injection procedures, injection practices, and needlestick ...

    African Journals Online (AJOL)

    Results: Safe injection procedures regarding final waste disposal were sufficiently adopted, while measures regarding disposable injection equipment, waste containers, hand hygiene, as well as injection practices were inadequately carried out. Lack of job aid posters that promote safe injection and safe disposal of ...

  3. Managing Cassini Safe Mode Attitude at Saturn

    Science.gov (United States)

    Burk, Thomas A.

    2010-01-01

    The Cassini spacecraft was launched on October 15, 1997 and arrived at Saturn on June 30, 2004. It has performed detailed observations and remote sensing of Saturn, its rings, and its satellites since that time. In the event safe mode interrupts normal orbital operations, Cassini has flight software fault protection algorithms to detect, isolate, and recover to a thermally safe and commandable attitude and then wait for further instructions from the ground. But the Saturn environment is complex, and safety hazards change depending on where Cassini is in its orbital trajectory around Saturn. Selecting an appropriate safe mode attitude that insures safe operation in the Saturn environment, including keeping the star tracker field of view clear of bright bodies, while maintaining a quiescent, commandable attitude, is a significant challenge. This paper discusses the Cassini safe table management strategy and the key criteria that must be considered, especially during low altitude flybys of Titan, in deciding what spacecraft attitude should be used in the event of safe mode.

  4. Inherently safe light water reactors

    International Nuclear Information System (INIS)

    Ise, Takeharu

    1987-01-01

    Today's large nuclear power reactors of world-wise use have been designed based on the philosophy. It seems that recent less electricity demand rates, higher capital cost and the TMI accident let us acknowledge relative small and simplified nuclear plants with safer features, and that Chernobyl accident in 1983 underlines the needs of intrinsic and passive safety characteristics. In such background, several inherently safe reactor concepts have been presented abroad and domestically. First describing 'Can inherently safe reactors be designed,' then I introduce representative reactor concepts of inherently safe LWRs advocated abroad so far. All of these innovative reactors employ intrinsic and passive features in their design, as follows: (1) PIUS, an acronym for Process Inherent Ultimate Safety, or an integral PWR with passive heat sink and passive shutdown mechanism, advocated by ASEA-ATOM of Sweden. (2) MAP(Minimum Attention Plant), or a self-pressurized, natural circulation integral PWR, promoted by CE Inc. of the U.S. (3) TPS(TRIGA Power System), or a compact PWR with passive heat sink and inherent fuel characteristics of large prompt temperature coefficient, prompted by GA Technologies Inc. of the U.S. (4) PIUS-BWR, or an inherently safe BWR employing passively actuated fluid valves, in competition with PIUS, prompted by ORNL of the U.S. Then, I will describe the domestic trends in Japan and the innovative inherently safe LWRs presented domestically so far. (author)

  5. Dementia - keeping safe in the home

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000031.htm Dementia - keeping safe in the home To use the ... make sure the homes of people who have dementia are safe for them. Safety Tips for the ...

  6. Safeguards Automated Facility Evaluation (SAFE) methodology

    International Nuclear Information System (INIS)

    Chapman, L.D.; Grady, L.M.; Bennett, H.A.; Sasser, D.W.; Engi, D.

    1978-01-01

    The SAFE procedure is an efficient method of evaluating the physical protection system of a nuclear facility. Since the algorithms used in SAFE for path generation and evaluation are analytical, many paths can be evaluated with a modest investment in computer time. SAFE is easy to use because the information required is well-defined and the interactive nature of this procedure lends itself to straightforward operation. The modular approach that has been taken allows other functionally equivalent modules to be substituted as they become available. The SAFE procedure has broad applications in the nuclear facility safeguards field as well as in the security field in general. Any fixed facility containing valuable materials or components to be protected from theft or sabotage could be analyzed using this same automated evaluation technique

  7. Breastfeeding FAQs: Safely Storing Breast Milk

    Science.gov (United States)

    ... Search English Español Breastfeeding FAQs: Safely Storing Breast Milk KidsHealth / For Parents / Breastfeeding FAQs: Safely Storing Breast ... may have. How do I store my breast milk? You can freeze and/or refrigerate your pumped ( ...

  8. Curiosity's Autonomous Surface Safing Behavior Design

    Science.gov (United States)

    Neilson, Tracy A.; Manning, Robert M.

    2013-01-01

    The safing routines on all robotic deep-space vehicles are designed to put the vehicle in a power and thermally safe configuration, enabling communication with the mission operators on Earth. Achieving this goal is made a little more difficult on Curiosity because the power requirements for the core avionics and the telecommunication equipment exceed the capability of the single power source, the Multi-Mission Radioisotope Thermoelectric Generator. This drove the system design to create an operational mode, called "sleep mode", where the vehicle turns off most of the loads in order to charge the two Li-ion batteries. The system must keep the vehicle safe from over-heat and under-heat conditions, battery cell failures, under-voltage conditions, and clock failures, both while the computer is running and while the system is sleeping. The other goal of a safing routine is to communicate. On most spacecraft, this simply involves turning on the receiver and transmitter continuously. For Curiosity, Earth is above the horizon only a part of the day for direct communication to the Earth, and the orbiter overpass opportunities only occur a few times a day. The design must robustly place the Rover in a communicable condition at the correct time. This paper discusses Curiosity's autonomous safing behavior and describes how the vehicle remains power and thermally safe while sleeping, as well as a description of how the Rover communicates with the orbiters and Earth at specific times.

  9. Safe transport of radioactive material. 3. ed

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-12-01

    The IAEA has developed a standardized approach to transport safety training as a means of helping Member States to implement the Transport Regulations. The training manual is an anchor of this standardized approach to training: it contains all the topics presented in the sequential order recommended by the IAEA for the student to gain a thorough understanding of the body of knowledge that is needed to ensure that radioactive material ranked as Class 7 in the United Nations' nomenclature for dangerous goods - is transported safely. The explanations in the text refer, where needed, to the appropriate requirements in the IAEA's Transport Regulations; additional useful information is also provided. Thus, the training manual in addition to the Transport Regulations and their supporting documents is used by the IAEA as the basis for delivering all of its training courses on the safe transport of radioactive material. Enclosed with the training manual is a CD-ROM that contains the text of the manual as well as the visual aids that are used at the IAEA's training courses. The following topics are covered: review of radioactivity and radiation; review of radiation protection principles; regulatory terminology; basic safety concepts: materials and packages; activity limits and material restrictions; selection of optimal package type; test procedures: material and packages; requirements for transport; control of material in transport; fissile material: regulatory requirements and operational aspects; quality assurance; national competent authority; additional regulatory constraints for transport; international liability and insurance; emergency planning and preparedness; training; services provided by the IAEA.

  10. Safe transport of radioactive material. 3. ed

    International Nuclear Information System (INIS)

    2002-01-01

    The IAEA has developed a standardized approach to transport safety training as a means of helping Member States to implement the Transport Regulations. The training manual is an anchor of this standardized approach to training: it contains all the topics presented in the sequential order recommended by the IAEA for the student to gain a thorough understanding of the body of knowledge that is needed to ensure that radioactive material ranked as Class 7 in the United Nations' nomenclature for dangerous goods - is transported safely. The explanations in the text refer, where needed, to the appropriate requirements in the IAEA's Transport Regulations; additional useful information is also provided. Thus, the training manual in addition to the Transport Regulations and their supporting documents is used by the IAEA as the basis for delivering all of its training courses on the safe transport of radioactive material. Enclosed with the training manual is a CD-ROM that contains the text of the manual as well as the visual aids that are used at the IAEA's training courses. The following topics are covered: review of radioactivity and radiation; review of radiation protection principles; regulatory terminology; basic safety concepts: materials and packages; activity limits and material restrictions; selection of optimal package type; test procedures: material and packages; requirements for transport; control of material in transport; fissile material: regulatory requirements and operational aspects; quality assurance; national competent authority; additional regulatory constraints for transport; international liability and insurance; emergency planning and preparedness; training; services provided by the IAEA

  11. Removing Hair Safely

    Science.gov (United States)

    ... For Consumers Home For Consumers Consumer Updates Removing Hair Safely Share Tweet Linkedin Pin it More sharing ... related to common methods of hair removal. Laser Hair Removal In this method, a laser destroys hair ...

  12. Stigma and abortion complications in the United States.

    Science.gov (United States)

    Harris, Lisa H

    2012-12-01

    Abortion is highly stigmatized in the United States and elsewhere. As a result, many women who seek or undergo abortion keep their decision a secret. In many regions of the world, stigma is a recognized contributor to maternal morbidity and mortality from unsafe abortion, even when abortion is legal. Women may self-induce abortion in ways that are dangerous, or seek unsafe clandestine abortion from inadequately trained health care providers out of fear that their sexual activity, pregnancy, or abortion will be exposed if they present to a safe, licensed facility. However, unsafe abortion rarely occurs in the United States, and accordingly, stigma as a cause of unsafe abortion in the United States context has not been described. I consider the relationship of stigma to two serious abortion complications experienced by U.S. patients. Both patients wished to keep their abortion decision a secret from family and friends, and in both cases, their inability to disclose their abortion contributed to life-threatening complications. The experiences of these patients suggest that availability of legal abortion services in the United States may not be enough to keep all women safe. The cases also challenge the rhetoric that "abortion hurts women," suggesting instead that abortion stigma hurts women.

  13. Wireless remote monitoring system for sleep apnea

    Science.gov (United States)

    Oh, Sechang; Kwon, Hyeokjun; Varadan, Vijay K.

    2011-04-01

    Sleep plays the important role of rejuvenating the body, especially the central nervous system. However, more than thirty million people suffer from sleep disorders and sleep deprivation. That can cause serious health consequences by increasing the risk of hypertension, diabetes, heart attack and so on. Apart from the physical health risk, sleep disorders can lead to social problems when sleep disorders are not diagnosed and treated. Currently, sleep disorders are diagnosed through sleep study in a sleep laboratory overnight. This involves large expenses in addition to the inconvenience of overnight hospitalization and disruption of daily life activities. Although some systems provide home based diagnosis, most of systems record the sleep data in a memory card, the patient has to face the inconvenience of sending the memory card to a doctor for diagnosis. To solve the problem, we propose a wireless sensor system for sleep apnea, which enables remote monitoring while the patient is at home. The system has 5 channels to measure ECG, Nasal airflow, body position, abdominal/chest efforts and oxygen saturation. A wireless transmitter unit transmits signals with Zigbee and a receiver unit which has two RF modules, Zigbee and Wi-Fi, receives signals from the transmitter unit and retransmits signals to the remote monitoring system with Zigbee and Wi-Fi, respectively. By using both Zigbee and Wi-Fi, the wireless sensor system can achieve a low power consumption and wide range coverage. The system's features are presented, as well as continuous monitoring results of vital signals.

  14. Developing Safe Schools Partnerships with Law Enforcement

    Science.gov (United States)

    Rosiak, John

    2009-01-01

    Safe schools are the concern of communities throughout the world. If a school is safe, and if children feel safe, students "are better able to learn. But what are the steps to make" this happen? First, it is important to understand the problem: What are the threats to school safety? These include crime-related behaviors that find their way to…

  15. Towards Safe Robotic Surgical Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer; Wisniewski, Rafael

    2015-01-01

    a controller for motion compensation in beating-heart surgery, and prove that it is safe, i.e., the surgical tool is kept within an allowable distance and orientation of the heart. We solve the problem by simultaneously finding a control law and a barrier function. The motion compensation system is simulated...... from several initial conditions to demonstrate that the designed control system is safe for every admissible initial condition....

  16. Safe use of ionizing radiations

    Energy Technology Data Exchange (ETDEWEB)

    1973-01-01

    Based on the ''Code of Practice for the protection of persons against ionizing radiations arising from medical and dental use'' (CIS 74-423), this handbook shows how hospital staff can avoid exposing themselves and others to these hazards. It is designed particularly for junior and student nurses. Contents: ionizing radiations, their types and characteristics; their uses and dangers; basic principles in their safe use; safe use in practice; explanation of terms.

  17. Staying Safe in the Water

    Centers for Disease Control (CDC) Podcasts

    2008-05-15

    In this podcast, Dr. Julie Gilchrist, a pediatrician and medical epidemiologist from CDC’s Injury Center, talks about staying safe in the water. Tips are for all audiences, with a focus on preventing drownings and keeping children safe in and around the pool, lake, or ocean.  Created: 5/15/2008 by National Center for Injury Prevention and Control (NCIPC).   Date Released: 5/19/2008.

  18. Safe operating envelope

    Energy Technology Data Exchange (ETDEWEB)

    Oliva, N [Ontario Hydro, Toronto, ON (Canada)

    1997-12-01

    Safe Operating Envelope is described representing: The outer bound of plant conditions within which day-to-day plant operation must be maintained in order to comply with regulatory requirements, associated safety design criteria and corporate nuclear safety goals. Figs.

  19. Safe operating envelope

    International Nuclear Information System (INIS)

    Oliva, N.

    1997-01-01

    Safe Operating Envelope is described representing: The outer bound of plant conditions within which day-to-day plant operation must be maintained in order to comply with regulatory requirements, associated safety design criteria and corporate nuclear safety goals. Figs

  20. An Automated Safe-to-Mate (ASTM) Tester

    Science.gov (United States)

    Nguyen, Phuc; Scott, Michelle; Leung, Alan; Lin, Michael; Johnson, Thomas

    2013-01-01

    Safe-to-mate testing is a common hardware safety practice where impedance measurements are made on unpowered hardware to verify isolation, continuity, or impedance between pins of an interface connector. A computer-based instrumentation solution has been developed to resolve issues. The ASTM is connected to the circuit under test, and can then quickly, safely, and reliably safe-to-mate the entire connector, or even multiple connectors, at the same time.

  1. High Flow Nasal Cannula Oxygen Therapy can be used safely in the general paediatric ward using Paediatric Early Warning Scores

    NARCIS (Netherlands)

    Morsing, IE; Tinnevelt, Marcel; Jansen, Nicolaas J.G.; Koomen, E

    2015-01-01

    High Flow Nasal Cannula oxygen therapy (HFNC) is nowadays widely used at paediatric intensive care units (PICU) to provide a safe and comfortable (warm and humidified) oxygen delivery in children with respiratory distress. At general paediatric wards HFNC is hardly used because intensive observation

  2. Effects of the Smartphone Application "Safe Patients" on Knowledge of Patient Safety Issues Among Surgical Patients.

    Science.gov (United States)

    Cho, Sumi; Lee, Eunjoo

    2017-12-01

    Recently, the patient's role in preventing adverse events has been emphasized. Patients who are more knowledgeable about safety issues are more likely to engage in safety initiatives. Therefore, nurses need to develop techniques and tools that increase patients' knowledge in preventing adverse events. For this reason, an educational smartphone application for patient safety called "Safe Patients" was developed through an iterative process involving a literature review, expert consultations, and pilot testing of the application. To determine the effect of "Safe Patients," it was implemented for patients in surgical units in a tertiary hospital in South Korea. The change in patients' knowledge about patient safety was measured using seven true/false questions developed in this study. A one-group pretest and posttest design was used, and a total of 123 of 190 possible participants were tested. The percentage of correct answers significantly increased from 64.5% to 75.8% (P effectively improve patients' knowledge of safety issues. This will ultimately empower patients to engage in safe practices and prevent adverse events related to surgery.

  3. USING THE SAFE SYSTEM APPROACH TO KEEP OLDER DRIVERS SAFELY MOBILE

    Directory of Open Access Journals (Sweden)

    Jim LANGFORD

    2006-01-01

    Full Text Available In 2003, Australian road transport jurisdictions collectively accepted that the greatest road safety gains would be achieved through adopting a Safe System approach, derived from Sweden's Vision Zero and the Netherlands' Sustainable Safety strategies. A key objective of all three approaches is to manage vehicles, the road infrastructure, speeds, road users and the interactions between these components, to ensure that in the event of crashes, crash energies will remain at levels that minimize the probability of death and serious injury. Older drivers pose a particular challenge to the Safe System approach, given particularly their greater physical frailty, their driving patterns and for some at least, their reduced fitness to drive. This paper has analyzed the so-called ‘older driver problem’ and identified a number of key factors underpinning their crash levels, for which countermeasures can be identified and implemented within a Safe System framework. The recommended countermeasures consist of: (1 safer roads, through a series of design improvements particularly governing urban intersections; (2 safer vehicles, through both the promotion of crashworthiness as a critical consideration when purchasing a vehicle and the wide use of developed and developing ITS technologies; (3 safer speeds especially at intersections; and (4 safer road users, through both improved assessment procedures to identify the minority of older drivers with reduced fitness to drive and educational efforts to encourage safer driving habits particularly but not only through self-regulation.

  4. Feeling safe during an inpatient hospitalization: a concept analysis.

    Science.gov (United States)

    Mollon, Deene

    2014-08-01

    This paper aims to explore the critical attributes of the concept feeling safe. The safe delivery of care is a high priority; however; it is not really known what it means to the patient to 'feel safe' during an inpatient hospitalization. This analysis explores the topic of safety from the patient's perspective. Concept analysis. The data bases of CINAHL, Medline, PsychInfo and Google Scholar for the years 1995-2012 were searched using the terms safe and feeling safe. The eight-step concept analysis method of Walker and Avant was used to analyse the concept of feeling safe. Uses and defining attributes, as well as identified antecedents, consequences and empirical referents, are presented. Case examples are provided to assist in the understanding of defining attributes. Feeling safe is defined as an emotional state where perceptions of care contribute to a sense of security and freedom from harm. Four attributes were identified: trust, cared for, presence and knowledge. Relationship, environment and suffering are the antecedents of feeling safe, while control, hope and relaxed or calm are the consequences. Empirical referents and early development of a theory of feeling safe are explored. This analysis begins the work of synthesizing qualitative research already completed around the concept of feeling safe by defining the key attributes of the concept. Support for the importance of developing patient-centred models of care and creating positive environments where patients receive high-quality care and feel safe is provided. © 2014 John Wiley & Sons Ltd.

  5. Creating Safe Spaces for Music Learning

    Science.gov (United States)

    Hendricks, Karin S.; Smith, Tawnya D.; Stanuch, Jennifer

    2014-01-01

    This article offers a practical model for fostering emotionally safe learning environments that instill in music students a positive sense of self-belief, freedom, and purpose. The authors examine the implications for music educators of creating effective learning environments and present recommendations for creating a safe space for learning,…

  6. Keeping Food Safe

    Centers for Disease Control (CDC) Podcasts

    2009-05-27

    This CDC Kidtastics podcast discusses things kids and parents can do to help prevent illness by keeping food safe.  Created: 5/27/2009 by National Center for Zoonotic, Vector-Borne, and Enteric Diseases (NCZVED).   Date Released: 5/27/2009.

  7. Plutonium safe handling

    International Nuclear Information System (INIS)

    Tvehlov, Yu.

    2000-01-01

    The abstract, prepared on the basis of materials of the IAEA new leadership on the plutonium safe handling and its storage (the publication no. 9 in the Safety Reports Series), aimed at presenting internationally acknowledged criteria on the radiation danger evaluation and summarizing the experience in the safe management of great quantities of plutonium, accumulated in the nuclear states, is presented. The data on the weapon-class and civil plutonium, the degree of its danger, the measures for provision of its safety, including the data on accident radiation consequences with the fission number 10 18 , are presented. The recommendations, making it possible to eliminate the super- criticality danger, as well as ignition and explosion, to maintain the tightness of the facility, aimed at excluding the radioactive contamination and the possibility of internal irradiation, to provide for the plutonium security, physical protection and to reduce irradiation are given [ru

  8. Guidance notes : safe practice for the use of nuclear density meters

    International Nuclear Information System (INIS)

    2000-06-01

    These 'Guidance notes' have been written to provide information for owners and users on the safe care and use of instruments containing radioactive materials used for the measurement of moisture content and/or density of materials. They give practical guidance on compliance with the requirements of radiation protection legislation and the 'Code of safe practice for the use of nuclear density meters, NRL C15'. Some of these instruments have been known as 'soil moisture gauges' and others as 'nuclear density meters' or just 'NDMs'. For simplicity, these 'Guidance notes' will follow industry terminology and use the term 'nuclear density meter'. Some parts of these 'Guidance notes' and of the 'Code, NRL C15' are relevant for users of asphalt gauges containing radioactive sources. These are normally laboratory bench instruments, and are not portable field instruments. Nevertheless, the radioactive sources used are similar to those used for moisture measurement and the safety implications are similar. The units of measurement of radioactivity and radiation dose are discussed in Appendix 1. Appendix 2 contains consent application forms while sample transport forms can be found in Appendix 3. (author). 10 refs

  9. Implementation of an Integrated Neuroscience Unit.

    Science.gov (United States)

    Breslin, Rory P; Franker, Lauren; Sterchi, Suzanne; Sani, Sepehr

    2016-02-01

    Many challenges exist in today's health care delivery system, and much focus and research are invested into ways to improve care with cost-effective measures. Specialty-specific dedicated care units are one solution for inpatient hospital care because they improve outcomes and decrease mortality. The neuroscience population encompasses a wide variety of diagnoses of spinal to cranial issues with a wide spectrum of needs varying from one patient to the next. Neuroscience care must be patient-specific during the course of frequent acuity changes, and one way to achieve this is through a neuroscience-focused unit. Few resources are available on how to implement this type of unit. Advanced practice nurses are committed to providing high-quality, safe, and cost-effective care and are instrumental in the success of instituting a unit dedicated to the care of neuroscience patients.

  10. Decommissioning project management unit started its activities

    International Nuclear Information System (INIS)

    Medeliene, D.

    2002-01-01

    The Decommissioning Project Management Unit team comprises western experts as well as experts from INPP Decommissioning Service who all work as a single team. The DPMU will develop the Final Decommissioning Plan and a more detailed Decommissioning Project, which will describe how the plant will be removed from service and safely decommissioned

  11. Acute medical complications in patients admitted to a stroke unit and safe transfer to rehabilitation.

    Science.gov (United States)

    Bonaiuti, Donatella; Sioli, Paolo; Fumagalli, Lorenzo; Beghi, Ettore; Agostoni, Elio

    2011-08-01

    Acute medical complications often prevent patients with stroke from being transferred from stroke units to rehabilitation units, prolonging the occupation of hospital beds and delaying the start of intensive rehabilitation. This study defined incidence, timing, duration and risk factors of these complications during the acute phase of stroke. A retrospective case note review was made of hospital admissions of patients with stroke not associated with other disabling conditions, admitted to a stroke unit over 12 months and requiring rehabilitation for gait impairment. In this cohort, a search was made of hypertension, oxygen de-saturation, fever, and cardiac and pulmonary symptoms requiring medical intervention. Included were 135 patients. Hypertension was the most common complication (16.3%), followed by heart disease (14.8%), oxygen de-saturation (7.4%), fever (6.7%) and pulmonary disease (5.2%). Heart disease was the earliest and shortest complication. Most complications occurred during the first week. Except for hypertension, all complications resolved within 2 weeks.

  12. Estimate of safe human exposure levels for lunar dust based on comparative benchmark dose modeling.

    Science.gov (United States)

    James, John T; Lam, Chiu-Wing; Santana, Patricia A; Scully, Robert R

    2013-04-01

    Brief exposures of Apollo astronauts to lunar dust occasionally elicited upper respiratory irritation; however, no limits were ever set for prolonged exposure to lunar dust. The United States and other space faring nations intend to return to the moon for extensive exploration within a few decades. In the meantime, habitats for that exploration, whether mobile or fixed, must be designed to limit human exposure to lunar dust to safe levels. Herein we estimate safe exposure limits for lunar dust collected during the Apollo 14 mission. We instilled three respirable-sized (∼2 μ mass median diameter) lunar dusts (two ground and one unground) and two standard dusts of widely different toxicities (quartz and TiO₂) into the respiratory system of rats. Rats in groups of six were given 0, 1, 2.5 or 7.5 mg of the test dust in a saline-Survanta® vehicle, and biochemical and cellular biomarkers of toxicity in lung lavage fluid were assayed 1 week and one month after instillation. By comparing the dose--response curves of sensitive biomarkers, we estimated safe exposure levels for astronauts and concluded that unground lunar dust and dust ground by two different methods were not toxicologically distinguishable. The safe exposure estimates were 1.3 ± 0.4 mg/m³ (jet-milled dust), 1.0 ± 0.5 mg/m³ (ball-milled dust) and 0.9 ± 0.3 mg/m³ (unground, natural dust). We estimate that 0.5-1 mg/m³ of lunar dust is safe for periodic human exposures during long stays in habitats on the lunar surface.

  13. Safe injection practice among health care workers, Gharbiya, Egypt.

    Science.gov (United States)

    Ismail, Nanees A; Aboul Ftouh, Aisha M; El Shoubary, Waleed H

    2005-01-01

    A cross-sectional study was conducted in 25 health care facilities in Gharbiya governorate to assess safe injection practices among health care workers (HCWs). Two questionnaires, one to collect information about administrative issues related to safe injection and the other to collect data about giving injections, exposure to needle stick injuries, hepatitis B vaccination status and safe injection training. Practices of injections were observed using a standardized checklist. The study revealed that there was lack of both national and local infection control policies and lack of most of the supplies needed for safe injection practices. Many safe practices were infrequent as proper needle manipulation before disposal (41%), safe needle disposal (47.5%), reuse of used syringe & needle (13.2%) and safe syringe disposal (0%). Exposure to needle stick injuries were common among the interviewed HCWs (66.2%) and hand washing was the common post exposure prophylaxis measure (63.4%). Only 11.3% of HCWs had full course hepatitis B vaccination. Infection control -including safe injections- training programs should be afforded to all HCWs.

  14. SafeNet: a methodology for integrating general-purpose unsafe devices in safe-robot rehabilitation systems.

    Science.gov (United States)

    Vicentini, Federico; Pedrocchi, Nicola; Malosio, Matteo; Molinari Tosatti, Lorenzo

    2014-09-01

    Robot-assisted neurorehabilitation often involves networked systems of sensors ("sensory rooms") and powerful devices in physical interaction with weak users. Safety is unquestionably a primary concern. Some lightweight robot platforms and devices designed on purpose include safety properties using redundant sensors or intrinsic safety design (e.g. compliance and backdrivability, limited exchange of energy). Nonetheless, the entire "sensory room" shall be required to be fail-safe and safely monitored as a system at large. Yet, sensor capabilities and control algorithms used in functional therapies require, in general, frequent updates or re-configurations, making a safety-grade release of such devices hardly sustainable in cost-effectiveness and development time. As such, promising integrated platforms for human-in-the-loop therapies could not find clinical application and manufacturing support because of lacking in the maintenance of global fail-safe properties. Under the general context of cross-machinery safety standards, the paper presents a methodology called SafeNet for helping in extending the safety rate of Human Robot Interaction (HRI) systems using unsafe components, including sensors and controllers. SafeNet considers, in fact, the robotic system as a device at large and applies the principles of functional safety (as in ISO 13489-1) through a set of architectural procedures and implementation rules. The enabled capability of monitoring a network of unsafe devices through redundant computational nodes, allows the usage of any custom sensors and algorithms, usually planned and assembled at therapy planning-time rather than at platform design-time. A case study is presented with an actual implementation of the proposed methodology. A specific architectural solution is applied to an example of robot-assisted upper-limb rehabilitation with online motion tracking. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  15. Implicit attitudes towards risky and safe driving

    DEFF Research Database (Denmark)

    Martinussen, Laila Marianne; Sømhovd, Mikael Julius; Møller, Mette

    ; further, self-reports of the intention to drive safely (or not) are socially sensitive. Therefore, we examined automatic preferences towards safe and risky driving with a Go/No-go Association Task (GNAT). The results suggest that (1) implicit attitudes towards driving behavior can be measured reliably...... with the GNAT; (2) implicit attitudes towards safe driving versus towards risky driving may be separable constructs. We propose that research on driving behavior may benefit from routinely including measures of implicit cognition. A practical advantage is a lesser susceptibility to social desirability biases......, compared to self-report methods. Pending replication in future research, the apparent dissociation between implicit attitudes towards safe versus risky driving that we observed may contribute to a greater theoretical understanding of the causes of unsafe and risky driving behavior....

  16. Assessment of Clinical Practices for Crushing Medication in Geriatric Units.

    Science.gov (United States)

    Fodil, M; Nghiem, D; Colas, M; Bourry, S; Poisson-Salomon, A-S; Rezigue, H; Trivalle, C

    2017-01-01

    To assess the modification of the form of medication and evaluate staff observance of good clinical practices. One-day assessment of clinical practices. 17 geriatrics units in the 3 Teaching Hospitals of Paris-Sud (APHP), France. Elderly in-patients with difficulties swallowing capsules and tablets. Assessment of target-patient prescriptions and direct observation of nurses' medical rounds. 155/526 in-patients (29.5%) were unable to swallow tablets or capsules: 98 (40.3%) in long-term care, 46 patients (23.8%) in the rehabilitation unit and 11 (12.2%) in the acute care unit (p = .005). In thirty-nine (27.3%) of the 143 prescriptions studied all tablets were safe to crush and all capsules were safe to open. In 104 cases, at least one medication could not be safely modified, including 26 cases (18.2%) in which none of the prescribed drugs were safe to crush or open. In 48.2% of the 110 medications that were crushed, crushing was forbidden, and presented a potential threat in 12.7% of cases or a reduced efficacy in 8.2% of cases. Crushing methods were rarely appropriate: no specific protective equipment was used (81.8%), crushing equipment was shared between patients without cleaning (95.1%), medications were spilled or lost (69.9%). The method of administration was appropriate (water, jellified water) in 25% of the cases, questionable (soup, coffee, compote, juice, cream) in 55% of the cases and unacceptable (laxative) in 21% of the cases. Management of drug prescriptions in patients with swallowing difficulties is not optimal, and may even have iatrogenic effects. In this study, 12.7% of the modifications of the drug form could have been harmful. Doctors, pharmacists and nurses need to reevaluate their practices.

  17. Unit Testing for Command and Control Systems

    Science.gov (United States)

    Alexander, Joshua

    2018-01-01

    Unit tests were created to evaluate the functionality of a Data Generation and Publication tool for a command and control system. These unit tests are developed to constantly evaluate the tool and ensure it functions properly as the command and control system grows in size and scope. Unit tests are a crucial part of testing any software project and are especially instrumental in the development of a command and control system. They save resources, time and costs associated with testing, and catch issues before they become increasingly difficult and costly. The unit tests produced for the Data Generation and Publication tool to be used in a command and control system assure the users and stakeholders of its functionality and offer assurances which are vital in the launching of spacecraft safely.

  18. Prospects for inherently safe reactors

    International Nuclear Information System (INIS)

    Barkenbus, J.N.

    1988-01-01

    Public fears over nuclear safety have led some within the nuclear community to investigate the possibility of producing inherently safe nuclear reactors; that is, reactors that are transparently incapable of producing a core melt. While several promising designs of such reactors have been produced, support for large-scale research and development efforts has not been forthcoming. The prospects for commercialization of inherently safe reactors, therefore, are problematic; possible events such as further nuclear reactor accidents and superpower summits, could alter the present situation significantly. (author)

  19. 50 CFR 216.91 - Dolphin-safe labeling standards.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Dolphin-safe labeling standards. 216.91... MAMMALS Dolphin Safe Tuna Labeling § 216.91 Dolphin-safe labeling standards. (a) It is a violation of... include on the label of those products the term “dolphin-safe” or any other term or symbol that claims or...

  20. A Foot-Mounted Inertial Measurement Unit (IMU) Positioning Algorithm Based on Magnetic Constraint.

    Science.gov (United States)

    Wang, Yan; Li, Xin; Zou, Jiaheng

    2018-03-01

    With the development of related applications, indoor positioning techniques have been more and more widely developed. Based on Wi-Fi, Bluetooth low energy (BLE) and geomagnetism, indoor positioning techniques often rely on the physical location of fingerprint information. The focus and difficulty of establishing the fingerprint database are in obtaining a relatively accurate physical location with as little given information as possible. This paper presents a foot-mounted inertial measurement unit (IMU) positioning algorithm under the loop closure constraint based on magnetic information. It can provide relatively reliable position information without maps and geomagnetic information and provides a relatively accurate coordinate for the collection of a fingerprint database. In the experiment, the features extracted by the multi-level Fourier transform method proposed in this paper are validated and the validity of loop closure matching is tested with a RANSAC-based method. Moreover, the loop closure detection results show that the cumulative error of the trajectory processed by the graph optimization algorithm is significantly suppressed, presenting a good accuracy. The average error of the trajectory under loop closure constraint is controlled below 2.15 m.

  1. A Foot-Mounted Inertial Measurement Unit (IMU Positioning Algorithm Based on Magnetic Constraint

    Directory of Open Access Journals (Sweden)

    Yan Wang

    2018-03-01

    Full Text Available With the development of related applications, indoor positioning techniques have been more and more widely developed. Based on Wi-Fi, Bluetooth low energy (BLE and geomagnetism, indoor positioning techniques often rely on the physical location of fingerprint information. The focus and difficulty of establishing the fingerprint database are in obtaining a relatively accurate physical location with as little given information as possible. This paper presents a foot-mounted inertial measurement unit (IMU positioning algorithm under the loop closure constraint based on magnetic information. It can provide relatively reliable position information without maps and geomagnetic information and provides a relatively accurate coordinate for the collection of a fingerprint database. In the experiment, the features extracted by the multi-level Fourier transform method proposed in this paper are validated and the validity of loop closure matching is tested with a RANSAC-based method. Moreover, the loop closure detection results show that the cumulative error of the trajectory processed by the graph optimization algorithm is significantly suppressed, presenting a good accuracy. The average error of the trajectory under loop closure constraint is controlled below 2.15 m.

  2. Medications: Using Them Safely

    Science.gov (United States)

    ... to Safely Give Ibuprofen Childproofing and Preventing Household Accidents Medicines for Diabetes Complementary and Alternative Medicine How Do Pain Relievers Work? What Medicines Are and What They Do Medicines ...

  3. Safety And Promotion in the Federal Aviation Administration- Enabling Safe and Successful Commercial Space Transportation

    Science.gov (United States)

    Repcheck, Randall J.

    2010-09-01

    The United States Federal Aviation Administration’s Office of Commercial Space Transportation(AST) authorizes the launch and reentry of expendable and reusable launch vehicles and the operation of launch and reentry sites by United States citizens or within the United States. It authorizes these activities consistent with public health and safety, the safety of property, and the national security and foreign policy interests of the United States. In addition to its safety role, AST has the role to encourage, facilitate, and promote commercial space launches and reentries by the private sector. AST’s promotional role includes, among other things, the development of information of interest to industry, the sharing of information of interest through a variety of methods, and serving as an advocate for Commercial Space Transportation within the United States government. This dual safety and promotion role is viewed by some as conflicting. AST views these two roles as complementary, and important for the current state of commercial space transportation. This paper discusses how maintaining a sound safety decision-making process, maintaining a strong safety culture, and taking steps to avoid complacency can together enable safe and successful commercial space transportation.

  4. Biblis 1,300 MW unit B in operation for thirty years

    International Nuclear Information System (INIS)

    Lauer, H.

    2006-01-01

    Over the past thirty years, unit B of the Biblis nuclear power station has contributed towards safe, reliable and non-polluting electricity generation. Unit B was the first 1,300 MW unit in the world confirming the good experience accumulated in the construction and operation of plants this size. It laid the foundation for the advanced development of nuclear power plants up to the convoy line. The good availability this plant has achieved in its operating cycles proves the mature state of technology and the high level of qualification and motivation of the power plant staff and the personnel of external firms contracted to work for Biblis. Biblis B has served as a reference plant in German nuclear safety research, demonstrating that units this size can be operated safely. Unit B is also living proof of the possibility to raise nuclear power plants built in the seventies to the current state of the art by implementing the appropriate backfitting and modernization measures. Today, Biblis B is operated at a safety level clearly higher than that to be achieved for new plants internationally. This is also evident from comparison with the guiding values for the safety of new facilities as published by the International Atomic Energy Agency (IAEA). (orig.)

  5. Implementation of Safe-by-Design for Nanomaterial Development and Safe Innovation: Why We Need a Comprehensive Approach.

    Science.gov (United States)

    Kraegeloh, Annette; Suarez-Merino, Blanca; Sluijters, Teun; Micheletti, Christian

    2018-04-14

    Manufactured nanomaterials (MNMs) are regarded as key components of innovations in various fields with high potential impact (e.g., energy generation and storage, electronics, photonics, diagnostics, theranostics, or drug delivery agents). Widespread use of MNMs raises concerns about their safety for humans and the environment, possibly limiting the impact of the nanotechnology-based innovation. The development of safe MNMs and nanoproducts has to result in a safe as well as functional material or product. Its safe use, and disposal at the end of its life cycle must be taken into account too. However, not all MNMs are similarly useful for all applications, some might bear a higher hazard potential than others, and use scenarios could lead to different exposure probabilities. To improve both safety and efficacy of nanotechnology, we think that a new proactive approach is necessary, based on pre-regulatory safety assessment and dialogue between stakeholders. On the basis of the work carried out in different European Union (EU) initiatives, developing and integrating MNMs Safe-by-Design and Trusted Environments (NANoREG, ProSafe, and NanoReg2), we present our point of view here. This concept, when fully developed, will allow for cost effective industrial innovation, and an exchange of key information between regulators and innovators. Regulators are thus informed about incoming innovations in good time, supporting a proactive regulatory action. The final goal is to contribute to the nanotechnology governance, having faster, cheaper, effective, and safer nano-products on the market.

  6. Cernavoda - Unit 2. A strategic project for Romania

    International Nuclear Information System (INIS)

    Saroudis, J.I.; Chirica, T.; Villabruna, G.

    1999-01-01

    The paper presents some key aspects of the Romanian nuclear program, focusing on Cernavoda NPP Unit No. 2 and the partnership with Atomic Energy of Canada Ltd. (AECL) and ANSALDO Italy for completion of this project. A brief historical presentation of the Romanian nuclear program is included. The success of Cernavoda NPP Unit 1 represents an important element in finalizing Unit 2 in an advanced state of equipment installation and more than 40 % complete. Also, the national infrastructure, including the legal framework and new Electricity Law represents a positive element for Project completion. The Romanian Nuclear Regulatory Body represents the guarantee for the safe operation of CANDU reactors in Romania.(author)

  7. AREVA Logistics Business Unit Transportation Risk Management Initiative

    International Nuclear Information System (INIS)

    Anne, C.

    2009-01-01

    A safe, secure and reliable transportation organization is a key component for the success of the nuclear industry. With the forecasted increase of radioactive material transport flows in future and the changing environment, AREVA Logistic Business Unit (L-BU) must ensure that safety and security risks are minimized but also ensure of the chain supply for its various facilities (mines, conversion, enrichment, fuel manufacturing, reprocessing, etc). AREVA L-BU Unit is implementing a transportation risk management initiative for the radioactive shipments of the AREVA group across all the Business Unit involved in shipments of radioactive and nuclear materials. The paper will present the four main components of the risk management. (authors)

  8. Safe havens in Europe: Switzerland and the ten dwarfs

    Directory of Open Access Journals (Sweden)

    Martin Paldam

    2013-12-01

    Full Text Available Eleven safe havens exist in Europe providing offshore banking and low taxes. Ten of these states are very small while Switzerland is moderately small. All 11countries are richer than their large neighbors. It is shown that causality is from small to safe haven towealth, and that theoretically equilibriums are likely to exist where a certain regulation is substantially lower in a small country than in its big neighbor. This generates a large capital inflow to the safe havens. The pool of funds that may reach the safe havens is shown to be huge. It is far in excess of the absorptive capacity of the safe havens, but it still explains, why they are rich. Microstates offer a veil of anonymity to funds passing through, and Switzerland offers safe storage of funds.

  9. Safe and Liquid Mortgage Bonds

    DEFF Research Database (Denmark)

    Dick-Nielsen, Jens; Gyntelberg, Jacob; Lund, Jesper

    This paper shows that strict match pass-through funding of covered bonds provides safe and liquid mortgage bonds. Despite a 30% drop in house prices during the 2008 global crisis Danish mortgage bonds remained as liquid as most European government bonds. The Danish pass-through system effectively...... eliminates credit risk from the investor's perspective. Similar to other safe bonds, funding liquidity becomes the main driver of mortgage bond liquidity and this creates commonality in liquidity across markets and countries. These findings have implications for how to design a robust mortgage bond system...

  10. Implementation of an Improved Safe Operating Envelope

    International Nuclear Information System (INIS)

    Prime, Robyn; McIntyre, Mark; Reeves, David

    2008-01-01

    This paper is a continuation of the paper presented at IYNC 2004 on 'The Definition of a Safe Operating Envelope'. The current paper concentrates on the implementation process of the Safe Operating Envelope employed at the Point Lepreau Generating Station. (authors)

  11. Safe intravenous administration in pediatrics: A 5-year Pediatric Intensive Care Unit experience with smart pumps.

    Science.gov (United States)

    Manrique-Rodríguez, S; Sánchez-Galindo, A C; Fernández-Llamazares, C M; Calvo-Calvo, M M; Carrillo-Álvarez, Á; Sanjurjo-Sáez, M

    2016-10-01

    To estimate the impact of smart pump implementation in a pediatric intensive care unit in terms of number and type of administration errors intercepted. Observational, prospective study carried out from January 2010 to March 2015 with syringe and great volumen infusion pumps available in the hospital. A tertiary level hospital pediatric intensive care unit. Infusions delivered with infusion pumps in all pediatric intensive care unit patients. Design of a drug library with safety limits for all intravenous drugs prescribed. Users' compliance with drug library as well as number and type of errors prevented were analyzed. Two hundred and eighty-three errors were intercepted during 62 months of study. A high risk drug was involved in 58% of prevented errors, such as adrenergic agonists and antagonists, sedatives, analgesics, neuromuscular blockers, opioids, potassium and insulin. Users' average compliance with the safety software was 84%. Smart pumps implementation has proven effective in intercepting high risk drugs programming errors. These results might be exportable to other critical care units, involving pediatric or adult patients. Interdisciplinary colaboration is key to succeed in this process. Copyright © 2016 Elsevier España, S.L.U. y SEMICYUC. All rights reserved.

  12. Limited Blood Transfusions Are Safe in Orthopaedic Trauma Patients.

    Science.gov (United States)

    Dolenc, Andrea J; Morris, William Z; Como, John J; Wagner, Karl G; Vallier, Heather A

    2016-12-01

    Controversy exists over association of blood transfusions with complications. The purpose was to assess effects of limited transfusions on complication rates and hospital course. Level 1 trauma center. Three hundred seventy-one consecutive patients with Injury Severity Score ≥16 underwent fixation of fractures of spine (n = 111), pelvis (n = 72), acetabulum (n = 57), and/or femur (n = 179). Those receiving >3 units of packed red blood cell were excluded. Fracture type, associated injuries, treatment details, ventilation time, complications, and hospital stay were prospectively recorded. Ninety-eight patients with 107 fractures received limited transfusion, and 119 patients with 123 fractures were not transfused. The groups did not differ in age, fracture types, time to fixation, or associated injuries. Lowest hematocrit was lower in the transfused group (22.8 vs. 30.0, P < 0.0001). Surgical duration (3:23 vs. 2:28) and estimated blood loss (462 vs. 211 mL) were higher in transfused patients (all P < 0.003). Pulmonary complications occurred in 12% of transfused and 4% of nontransfused, (P = 0.10). Mean days of mechanical ventilation (2.51 vs. 0.45), intensive care unit days (4.5 vs. 1.5) and total hospital stay (8.8 vs. 5.7) were higher in transfused patients (all P ≤ 0.006). After multivariate analysis, limited transfusion was associated with increased hospital and intensive care unit stays and mechanical ventilation time, but not with complications. Patients receiving ≤3 units of packed red blood cell had lower hematocrit and greater surgical burden, but no difference in complications versus the nontransfused group. Limited blood transfusions are likely safe, excepting a possible association with longer mechanical ventilation times and hospital stays. Therapeutic level III. See Instructions for Authors for a complete description of levels of evidence.

  13. Implementation of an Improved Safe Operating Envelope

    Energy Technology Data Exchange (ETDEWEB)

    Prime, Robyn; McIntyre, Mark [NB Power Nuclear, P.O. Box 600, Lepreau, NB (Canada); Reeves, David [Atlantic Nuclear Services Ltd., PO Box 1268 Fredericton, NB (Canada)

    2008-07-01

    This paper is a continuation of the paper presented at IYNC 2004 on 'The Definition of a Safe Operating Envelope'. The current paper concentrates on the implementation process of the Safe Operating Envelope employed at the Point Lepreau Generating Station. (authors)

  14. Self-Contained Portable Data Acquisition/Control System Unit for Hydrogen Environments

    Data.gov (United States)

    National Aeronautics and Space Administration — The platform is designed to be a self-contained unit that is built to support a wide variety of electrical equipment, and constructed so that it can be safely...

  15. From Safe Systems to Patient Safety

    DEFF Research Database (Denmark)

    Aarts, J.; Nøhr, C.

    2010-01-01

    for the third conference with the theme: The ability to design, implement and evaluate safe, useable and effective systems within complex health care organizations. The theme for this conference was "Designing and Implementing Health IT: from safe systems to patient safety". The contributions have reflected...... and implementation of safe systems and thus contribute to the agenda of patient safety? The contributions demonstrate how the health informatics community has contributed to the performance of significant research and to translating research findings to develop health care delivery and improve patient safety......This volume presents the papers from the fourth International Conference on Information Technology in Health Care: Socio-technical Approaches held in Aalborg, Denmark in June 2010. In 2001 the first conference was held in Rotterdam, The Netherlands with the theme: Sociotechnical' approaches...

  16. The first safe country

    Directory of Open Access Journals (Sweden)

    Raffaela Puggioni

    2012-06-01

    Full Text Available The Dublin II Regulation makes the first safe country of refuge solelyresponsible for refugees and asylum seekers. In the case of Italy, thefirst responsible country has not been acting responsibly.

  17. Karate: Keep It Safe.

    Science.gov (United States)

    Jordan, David

    1981-01-01

    Safety guidelines for each phase of a karate practice session are presented to provide an accident-free and safe environment for teaching karate in a physical education or traditional karate training program. (JMF)

  18. Prepare to protect: Operating and maintaining a tornado safe room.

    Science.gov (United States)

    Herseth, Andrew; Goldsmith-Grinspoon, Jennifer; Scott, Pataya

    2017-06-01

    Operating and maintaining a tornado safe room can be critical to the effective continuity of business operations because a firm's most valuable asset is its people. This paper describes aspects of operations and maintenance (O&M) for existing tornado safe rooms as well as a few planning and design aspects that affect the ultimate operation of a safe room for situations where a safe room is planned, but not yet constructed. The information is based on several Federal Emergency Management Agency safe room publications that provide guidance on emergency management and operations, as well as the design and construction of tornado safe rooms.

  19. Safe actinide disposition in molten salt reactors

    International Nuclear Information System (INIS)

    Gat, U.

    1997-01-01

    Safe molten salt reactors (MSR) can readily accommodate the burning of all fissile actinides. Only minor compromises associated with plutonium are required. The MSRs can dispose safely of actinides and long lived isotopes to result in safer and simpler waste. Disposing of actinides in MSRs does increase the source term of a safety optimized MSR. It is concluded that the burning and transmutation of actinides in MSRs can be done in a safe manner. Development is needed for the processing to handle and separate the actinides. Calculations are needed to establish the neutron economy and the fuel management. 9 refs

  20. Safe Sleep for Babies

    Science.gov (United States)

    ... 5 MB] Read the MMWR Science Clips Safe Sleep for Babies Eliminating hazards Recommend on Facebook Tweet ... Page Problem Every year, there are thousands of sleep-related deaths among babies. View large image and ...

  1. Escola segura Safe school

    Directory of Open Access Journals (Sweden)

    Edson Ferreira Liberal

    2005-11-01

    Full Text Available OBJETIVO: Revisão das estratégias para tornar o ambiente escolar seguro. Inicialmente os autores contextualizam a violência e os acidentes no ambiente escolar e fazem recomendações, baseadas em dados da literatura, para a implantação de escolas seguras. FONTE DE DADOS: Artigos publicados entre 1993 e 2005 na base de dados MEDLINE. Dados nacionais epidemiológicos e da literatura também foram pesquisados. SÍNTESE DOS DADOS: Há evidência crescente de que a intervenção tem múltiplos componentes. O foco político é a prática em educação em saúde com o envolvimento de toda a comunidade. O norte dessas intervenções é ajudar estudantes e toda a comunidade a adotar um comportamento seguro e saudável. As escolas estão assumindo um envolvimento crescente na promoção da saúde, prevenção de doenças e prevenção de trauma. Nesse contexto de prevenção de causas externas de morbimortalidade, é importante reconhecer o risco ambiental, locais e comportamentos de risco como favoráveis ao trauma e à violência, além de um novo conceito de acidentes como algo que possa ser evitado. CONCLUSÃO: A implementação da escola segura representa uma nova direção promissora para o trabalho preventivo baseado na escola. É importante notar que uma escola segura deve intervir não meramente na sua estrutura física, mas também torná-la tão segura quanto possível, trabalhando com a comunidade escolar por meio de educação em saúde, discutindo principalmente o comportamento saudável.OBJECTIVE: To review the strategies to make school a safe environment. The paper first addresses the social context of accidents and violence in the school environment, and makes recommendations, based on the literature data, for the implementation of safe schools. SOURCE OF DATA: Articles published between 1993 and 2005 in the MEDLINE database. Brazilian epidemiological and literature data have also been searched. SUMMARY OF THE FINDINGS: There is

  2. Buying & Using Medicine Safely

    Science.gov (United States)

    ... Reducers Safe Daily Use of Aspirin Medication Health Fraud Resources for You FDA Consumer Updates (Drugs) Page ... feeds Follow FDA on Twitter Follow FDA on Facebook View FDA videos on YouTube View FDA photos ...

  3. Compilation and analysis of national and international OPEX for Safe Enclosure prior to decommissioning

    International Nuclear Information System (INIS)

    Dinner, Paul J.C.; Heimlich, Karel

    2016-01-01

    Around the world, a large number of aging nuclear plants are approaching final shutdown. While this is largely driven by plants reaching the end of their design life, economic factors such as low gas prices (in North America) and the smaller unit size of early commercial reactors are important contributors to this trend. In several instances, economic pressures have resulted in a need for a more rapid transition to Safe Enclosure than originally anticipated. Thus plans for this transition taking into account experience with Safe Enclosure periods of varying lengths are being actively prepared in many jurisdictions. The IAEA as well as other national and international authorities have long recognized the importance of the topic of Safe Enclosure and provided guidance, and the IAEA has recently undertaken a study of 'Lessons Learned from Deferred Decommissioning of Nuclear Facilities'. Beginning with preliminary experience from Canadian CANDU reactors in extended shutdown or safe enclosure, this paper aims to compare this experience with the larger pool of experience from the international community to: - classify the main issues or themes, - examine means to mitigate these, and - formulate general measures of 'good practice'. Compilation of this experience represents the first steps towards a comprehensive, searchable database potentially of use to many in the decommissioning community. Tabulation and analysis of the complete list (comprising approximately 70 cases) has provided the 'short list' of issues presented in Table 1. Examples of the most important listed issues are discussed. The authors' objective is to stimulate interest in extending this compilation. In this way it will continue to grow and benefit all those preparing for transition to decommissioning. (authors)

  4. Compilation and analysis of national and international OPEX or safe enclosure prior to decommissioning

    International Nuclear Information System (INIS)

    Dinner, Paul J.C.; Heimlich, Karel

    2016-01-01

    Around the world, a large number of aging nuclear plants are approaching final shutdown. While this is largely driven by plants reaching the end of their design life, economic factors such as low gas prices (in North America) and the smaller unit size of early commercial reactors are important contributors to this trend. In several instances, economic pressures have resulted in a need for a more rapid transition to Safe Enclosure than originally anticipated. Thus plans for this transition taking into account experience with Safe Enclosure periods of varying lengths are being actively prepared in many jurisdictions. The IAEA as well as other national and international authorities have long recognized the importance of the topic of Safe Enclosure and provided guidance [1-7], and the IAEA has recently undertaken a study of 'Lessons Learned from Deferred Decommissioning of Nuclear Facilities' [8]. Beginning with preliminary experience from Canadian CANDU reactors in extended shutdown or safe enclosure, this paper aims to compare this experience with the larger pool of experience from the international community to: - classify the main issues or themes, - examine means to mitigate these, and - formulate general measures of 'good practice'. Compilation of this experience represents the first steps towards a comprehensive, searchable database potentially of use to many in the decommissioning community. Tabulation and analysis of the complete list (comprising approximately 70 cases) has provided the 'short list' of issues presented. Examples of the most important listed issues are discussed. The authors' objective is to stimulate interest in extending this compilation. In this way it will continue to grow and benefit all those preparing for transition to decommissioning. (authors)

  5. Drop performance test and evaluation for HANARO shutoff units

    International Nuclear Information System (INIS)

    Jung, Y. H.; Cho, Y. K.; Lee, J. H.; Choi, Y. S.; Woo, J. S.

    2004-01-01

    The function of the shutoff units of the HANARO is to rapidly insert the shutoff rod into the reactor core for safe shutdown of reactor. This paper describes drop performance test and evaluation for a shutoff unit for the technical verification of lifetime extension and localization of the HANARO shutoff units. We have performed preliminary drop performance tests for a shutoff unit at 1/2-core test loop and analyzed through the comparison with the test results performed during design verification test and the results of the periodic performance test in HANARO. It shows that the results of the local fabrication, installation and alignment for the shutoff unit meet the basic performance requirements, Furthermore, the performance evaluation method of the periodic drop test of the HANARO shutoff units is a conservative method comparing with the real drop time

  6. WiFi-Aided Magnetic Matching for Indoor Navigation with Consumer Portable Devices

    Directory of Open Access Journals (Sweden)

    You Li

    2015-06-01

    Full Text Available This paper presents a WiFi-aided magnetic matching (MM algorithm for indoor pedestrian navigation with consumer portable devices. This algorithm reduces both the mismatching rate (i.e., the rate of matching to an incorrect point that is more than 20 m away from the true value and computational load of MM by using WiFi positioning solutions to limit the MM search space. Walking tests with Samsung Galaxy S3 and S4 smartphones in two different indoor environments (i.e., Environment #1 with abundant WiFi APs and significant magnetic features, and Environment #2 with less WiFi and magnetic information were conducted to evaluate the proposed algorithm. It was found that WiFi fingerprinting accuracy is related to the signal distributions. MM provided results with small fluctuations but had a significant mismatch rate; when aided by WiFi, MM’s robustness was significantly improved. The outcome of this research indicates that WiFi and MM have complementary characteristics as the former is a point-by-point matching approach and the latter is based on profile-matching. Furthermore, performance improvement through integrating WiFi and MM depends on the environment (e.g., the signal distributions of magnetic intensity and WiFi RSS: In Environment #1 tests, WiFi-aided MM and WiFi provided similar results; in Environment #2 tests, the former was approximately 41.6% better. Our results supported that the WiFi-aided MM algorithm provided more reliable solutions than both WiFi and MM in the areas that have poor WiFi signal distribution or indistinctive magnetic-gradient features.

  7. Organization and methodology applied to the control of commissioning tests to guarantee safe operation of nuclear units

    International Nuclear Information System (INIS)

    Clausner, J.P.; Jorel, M.

    1990-12-01

    This paper describes the activities of the Safety Analysis Department (DAS), which provides technical support for the French safety authorities in the specific context of analysis and control of startup test programme quality at each of the different stages of the programme. These activities combine to ensure that the objective of the startup tests is reached, in particular that the functions of each safety-related system are guaranteed in all operating configurations, that the performance levels of all components in the system comply with design criteria and that defects revealed during previous tests have been dealt with correctly. The special case of French nuclear facilities, linked to unit standardization, has made it possible to acquire a large amount of experience with the startup of the 900 MWe units and has illustrated the importance of defining a startup test programme. In 1981, a working group, comprising operating organization and safety authority representatives, studied the lessons which had to be learned from 900 MWe unit startup and the improvements which could be made and taken into account in the 1300 MWe unit startup programme. To illustrate the approach adopted by the DAS, we go on to describe the lessons learned from startup of the first 1300 MWe (P4) units

  8. Virus Alert: Ten Steps to Safe Computing.

    Science.gov (United States)

    Gunter, Glenda A.

    1997-01-01

    Discusses computer viruses and explains how to detect them; discusses virus protection and the need to update antivirus software; and offers 10 safe computing tips, including scanning floppy disks and commercial software, how to safely download files from the Internet, avoiding pirated software copies, and backing up files. (LRW)

  9. Safe driving for teens

    Science.gov (United States)

    Driving and teenagers; Teens and safe driving; Automobile safety - teenage drivers ... months before taking friends as passengers. Teenage-related driving deaths occur more often in certain conditions. OTHER SAFETY TIPS FOR TEENS Reckless driving is still a ...

  10. Integral Inherently Safe Light Water Reactor (I2S-LWR)

    International Nuclear Information System (INIS)

    Petrovic, Bojan; Memmott, Matthew; Boy, Guy; Charit, Indrajit; Manera, Annalisa; Downar, Thomas; Lee, John; Muldrow, Lycurgus; Upadhyaya, Belle; Hines, Wesley; Haghighat, Alierza

    2017-01-01

    This final report summarizes results of the multi-year effort performed during the period 2/2013- 12/2016 under the DOE NEUP IRP Project ''Integral Inherently Safe Light Water Reactors (I 2 S-LWR)''. The goal of the project was to develop a concept of a 1 GWe PWR with integral configuration and inherent safety features, at the same time accounting for lessons learned from the Fukushima accident, and keeping in mind the economic viability of the new concept. Essentially (see Figure 1-1) the project aimed to implement attractive safety features, typically found only in SMRs, to a larger power (1 GWe) reactor, to address the preference of some utilities in the US power market for unit power level on the order of 1 GWe.

  11. Better safe than sorry: Increasing safety in radioactive waste management

    International Nuclear Information System (INIS)

    Gaspar, Miklos; Mutluer, Adem

    2015-01-01

    Abderrahim Bouih used to be worried about space. In charge of managing Morocco’s radioactive waste since 2006, he had long projected that the country’s sole radioactive waste facility would fill up by 2019. Thanks to a new methodology he and his colleagues learned through an IAEA project, they can now dismantle smoke detectors, lightning rods and other waste that contains radioactive material, safely separating the radioactive components from the metal, and significantly reducing the amount of radioactive waste they need to store. “We have condensed 60 drums of waste into just two,” said Bouih, Head of the Radioactive Waste Collection, Treatment and Storage Unit at the Moroccan National Centre for Nuclear Energy, Sciences and Technology. “This means our site won’t fill up for another 16 years.”

  12. Safe operation of critical assemblies and research reactors

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1960-09-15

    Some countries have accumulated considerable experience in the operation of these reactors and have in the process developed safe practices. On the other hand, other countries which have recently acquired, or will soon acquire, such reactors do not have sufficient background of experience with them to have developed full knowledge regarding their safe operation. In this situation, the International Atomic Energy Agency has considered that it would be useful to make available to all its Member States a set of recommendations on the safe operation of these reactors, based on the accumulated experience and best practices. The Director General accordingly nominated a Pane Ion Safe Operation of Critical Assemblies and Research Reactors to assist the Agency's Secretariat in drafting such recommendations

  13. Elaboration of Safe Community Assessment System

    Directory of Open Access Journals (Sweden)

    Birutė Mikulskienė

    2013-08-01

    Full Text Available The paper aims to design an assessment system to monitor and evaluate safety parameters and administrative efforts with the purpose to increase safety in municipalities. The safety monitoring system considered is to be the most important tool for creation and development of safe communities in Lithuania. Several methods were applied to achieve this purpose. In order to determine the role of local government in ensuring the safety of people, property and environment at the local level of a meta-analysis of research reports, the Lithuanian national legislation, strategic planning documents of the state and local government were carried out. Analysis of statistical data, structural analysis, comparative analysis and synthesis methods were used while investigating the areas of safety uncertainty, risk groups, identifying safety risk factors, determining their relationship, and creating a safe community assessment system. A safe community assessment system, which consists of two types of criteria, has been elaborated. The assessment system is based on the multi-level criteria for safety monitoring and the multi-level criteria for the evaluation of municipal activities in the field of building safety. Links between the criteria, peculiarities of their application and advantages in the process of safe community creation and development are analyzed. Design and implementation of the safe community assessment system is one of the most important stages to implement the idea of safe communities. The proposed system integrates a variety of risk areas, the safety achievement criteria are linked to the criteria used in the strategic planning. Periodic assessment of the safety situation using the proposed system ensures possibility to monitor current local safety conditions and assess the changes and the trends. A safe community assessment system is proposed to be used as a tool to unified municipalities safety comprehensiveness and compare safety level in

  14. Elaboration of Safe Community Assessment System

    Directory of Open Access Journals (Sweden)

    Algirdas Astrauskas

    2011-12-01

    Full Text Available The paper aims to design an assessment system to monitor and evaluate safety parameters and administrative efforts with the purpose to increase safety in municipalities. The safety monitoring system considered is to be the most important tool for creation anddevelopment of safe communities in Lithuania. Several methods were applied to achieve this purpose. In order to determine the role of local government in ensuring the safety of people, property and environment at the local level of a meta-analysis of research reports,the Lithuanian national legislation, strategic planning documents of the state and local government were carried out. Analysis of statistical data, structural analysis, comparative analysis and synthesis methods were used while investigating the areas of safety uncertainty, risk groups, identifying safety risk factors, determining their relationship, and creating a safe community assessment system.A safe community assessment system, which consists of two types of criteria, has been elaborated. The assessment system is based on the multi-level criteria for safety monitoring and the multi-level criteria for the evaluation of municipal activities in the field of building safety. Links between the criteria, peculiarities of their application and advantages in the process of safe community creation and development are analyzed.Design and implementation of the safe community assessment system is one of the most important stages to implement the idea of safe communities. The proposed system integrates a variety of risk areas, the safety achievement criteria are linked to the criteria used in thestrategic planning. Periodic assessment of the safety situation using the proposed system ensures possibility to monitor current local safety conditions and assess the changes and the trends. A safe community assessment system is proposed to be used as a tool to unified municipalities safety comprehensiveness and compare safety level in

  15. 25 CFR 700.55 - Decent, safe, and sanitary dwelling.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Decent, safe, and sanitary dwelling. 700.55 Section 700... PROCEDURES General Policies and Instructions Definitions § 700.55 Decent, safe, and sanitary dwelling. (a) General. The term decent, safe, and sanitary dwelling means a dwelling which— (1) Meets applicable federal...

  16. Transfer pricing and safe harbours

    Directory of Open Access Journals (Sweden)

    Veronika Solilová

    2013-01-01

    Full Text Available Transfer prices are significant for both taxpayers and tax administrations because they determine in large part taxable profits of associated enterprises in different tax jurisdictions. Moreover, in the context of taxation, transfer prices must be complied with the arm’s length principle. However, Multinational Enterprises have been faced daily by conflicting rules and approaches to applying the arm’s length principle, burdensome documentation requirements, inconsistent audit standards and unpredictable competent authority outcomes. Therefore, the Committee on Fiscal Affairs launched another project on the administrative aspects of transfer pricing in 2010. On 16 May 2013 as a partial solution of this project was approved by the OECD Council the Revised Section E on Safe Harbours in Chapter IV of the Transfer Pricing Guidelines for Multinational Enterprises and Tax Authorities. The paper is focused on significant changes of newly approved chapter IV of the Transfer Pricing Guidelines for Multinational Enterprises and Tax Authorities, further on analysis of practice in this area, on advantages and disadvantages of safe harbours for taxpayers and competent authorities with aim to suggest recommendations on use of safe harbours in the Czech Republic.

  17. Unit-of-Use Versus Traditional Bulk Packaging

    Directory of Open Access Journals (Sweden)

    Tiffany So

    2012-01-01

    Full Text Available Background: The choice between unit-of-use versus traditional bulk packaging in the US has long been a continuous debate for drug manufacturers and pharmacies in order to have the most efficient and safest practices. Understanding the benefits of using unit-of-use packaging over bulk packaging by US drug manufacturers in terms of workflow efficiency, economical costs and medication safety in the pharmacy is sometimes challenging.Methods: A time-saving study comparing the time saved using unit-of-use packaging versus bulk packaging, was examined. Prices between unit-of-use versus bulk packages were compared by using the Red Book: Pharmacy’s Fundamental Reference. Other articles were reviewed on the topics of counterfeiting, safe labeling, and implementation of unit-of-use packaging. Lastly, a cost-saving study was reviewed showing how medication adherence, due to improved packaging, could be cost-effective for patients.Results: When examining time, costs, medication adherence, and counterfeiting arguments, unit-of-use packaging proved to be beneficial for patients in all these terms.

  18. Unit-of-Use Versus Traditional Bulk Packaging

    Directory of Open Access Journals (Sweden)

    Tiffany So

    2012-01-01

    Full Text Available Background: The choice between unit-of-use versus traditional bulk packaging in the US has long been a continuous debate for drug manufacturers and pharmacies in order to have the most efficient and safest practices. Understanding the benefits of using unit-of-use packaging over bulk packaging by US drug manufacturers in terms of workflow efficiency, economical costs and medication safety in the pharmacy is sometimes challenging. Methods: A time-saving study comparing the time saved using unit-of-use packaging versus bulk packaging, was examined. Prices between unit-of-use versus bulk packages were compared by using the Red Book: Pharmacy's Fundamental Reference. Other articles were reviewed on the topics of counterfeiting, safe labeling, and implementation of unit-of-use packaging. Lastly, a cost-saving study was reviewed showing how medication adherence, due to improved packaging, could be cost-effective for patients. Results: When examining time, costs, medication adherence, and counterfeiting arguments, unit-of-use packaging proved to be beneficial for patients in all these terms.   Type: Student Project

  19. Inherently safe technologies-chemical and nuclear

    International Nuclear Information System (INIS)

    Weinberg, A.M.

    1984-01-01

    Probabilistic risk assessments show an inverse relationship between the likelihood and the consequences of nuclear and chemical plant accidents, but the Bhopal accident has change public complacency about the safety of chemical plants to such an extent that public confidence is now at the same low level as with nuclear plants. The nuclear industry's response was to strengthen its institutions and improve its technologies, but the public may not be convinced. One solution is to develop reactors which do not depend upon the active intervention of humans of electromechanical devices to deal with emergencies, but which have physical properties that limit the possible temperature and power of a reactor. The Process Inherent Ultimately Safe and the modular High-Temperature Gas-Cooled reactors are two possibilities. the chemical industry needs to develop its own inherently safe design precepts that incorporate smallness, safe processes, and hardening against sabotage. 5 references

  20. Intrinsically Safe and Economical Reactor (ISER)

    International Nuclear Information System (INIS)

    Wakabayashi, Hiroaki; Asahi, Yoshiro

    1991-01-01

    The Intrinsically Safe and Economical Reactor (ISER) is designed based on the principle of a process inherent ultimate safe reactor, PIUS, a so-called inherently safe reactor (ISR). ISER has been developed joingly by the members of the Kanagawa Institute of Technology, the University of Tokyo, the Japan Atomic Energy Research Institute (JAERI) and several industrial firms in Japan. This paper describes the requirements for the next generation of power reactor, the safety design philosphy of ISR and ISER, the controllability of ISER and the results of analyses of some of the design-based accidents (DBA) of ISER, namely station blackout, accidents in which the pressurizer relief valve becomes jammed and stuck in open position and tube breaks in the steam generator. It is concluded that the ISER can ensure a wide range of contraollabitily and fuel integrity for all the analysed DBAs. (orig.)

  1. Regulations for the safe transport of radioactive material

    International Nuclear Information System (INIS)

    1995-01-01

    Regulations and rules for the safe transport of radioactive materials by all kinds of conveyance are offered. Different types of packages and the conditions associated with the methods of safe packaging are given

  2. THE CONSEQUENCES OF GLOBALIZATION UPON SAFE TOURISM

    Directory of Open Access Journals (Sweden)

    Svetlana Mihić

    2009-11-01

    Full Text Available Globalization, a phenomenon on the rise, is characterized by the free cross-bor- der movement of individuals, technologies, and capital. It has far- reaching consequen- ces for tourism, too, as it implies travel for leisure and business, and correspondingly, financial transfers between various nation states. Startinf from the status quo in the field, the current paper sets out to analyze the consequences and implications of globalization upon safe tourism and conduct a marketing research into the perceptions of consumers upon Serbia as a safe vacation destination for the purpose of safe tourism. Finally the research results will be presented and several solutions will be provided for improving security in tourism zones

  3. Sun Safe Mode Controller Design for LADEE

    Science.gov (United States)

    Fusco, Jesse C.; Swei, Sean S. M.; Nakamura, Robert H.

    2015-01-01

    This paper presents the development of sun safe controllers which are designed to keep the spacecraft power positive and thermally balanced in the event an anomaly is detected. Employed by NASA's Lunar Atmosphere and Dust Environment Explorer (LADEE), the controllers utilize the measured sun vector and the spacecraft body rates for feedback control. To improve the accuracy of sun vector estimation, the least square minimization approach is applied to process the sensor data, which is proven to be effective and accurate. To validate the controllers, the LADEE spacecraft model engaging the sun safe mode was first simulated and then compared with the actual LADEE orbital fight data. The results demonstrated the applicability of the proposed sun safe controllers.

  4. Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.

    Science.gov (United States)

    Keys, Yolanda; Stichler, Jaynelle F

    Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.

  5. Creating a Safe Place in the Midst of Aggression: Music Therapy in Child Psychiatry

    Directory of Open Access Journals (Sweden)

    Marieke Degryse

    2010-01-01

    Full Text Available Working as a music therapist in a psychiatric unit for children with learning disabilities, one is often confronted with a lot of aggression. Most of these children have attachment disorders and severe behavioural problems. By which means can music exist in music therapy within this specific setting? Can we speak of a traumatic nature in music and body? This article will present a case study, where finding a safe place within music therapy is of major importance. Learning and listening to songs can be a necessary way to safeguard control for the client, gain some self-confidence, and create a place for regression. Going through this process in finding a safe and contained place within music therapy, the possibility of playing techniques arises, offering the freedom for exploration and a form of control and predictability. The case study concludes with the importance of playfulness whereby traumatic material can be digested through the music. Also, the role of singing songs in music therapy with this population is highlighted briefly.

  6. Influencing behaviour for safe working environments

    OpenAIRE

    Boer, de, J. (Johannes); Teeuw, W.B. (Wouter)

    2011-01-01

    Safety at work The objective of the project Safety at Work is to increase safety at the workplace by applying and combining state of the art artefacts from personal protective equipment and ambient intelligence technology. In this state of the art document we focus on the developments with respect to how (persuasive) technology can help to influence behaviour in a natural, automatic way in order to make industrial environments safer. We focus on personal safety, safe environments and safe beh...

  7. United States Energy Policy: Security Not Independence

    Science.gov (United States)

    2013-03-01

    on leased land, ensuring fracking is done responsibly, and getting more natural gas and hybrid systems into U.S. mass transit. Internationally, the...fewer environ disturbances -Can store underground -Environ impacts of fracking unknown -uses large amount of water -potential for saline...from shale continues to rise as the United States determines how to drill safely. However, the impact of fracking on the environment is still

  8. Now, It's Your Turn: How You Can Take Medicine Safely

    Science.gov (United States)

    ... turn Javascript on. Feature: Taking Medicines Safely Now, It's Your Turn: How You Can Take Medicine Safely ... medicine. The pharmacist has filled the prescription. Now it's up to you to take the medicine safely. ...

  9. Flight Testing a Real-Time Hazard Detection System for Safe Lunar Landing on the Rocket-Powered Morpheus Vehicle

    Science.gov (United States)

    Trawny, Nikolas; Huertas, Andres; Luna, Michael E.; Villalpando, Carlos Y.; Martin, Keith E.; Carson, John M.; Johnson, Andrew E.; Restrepo, Carolina; Roback, Vincent E.

    2015-01-01

    The Hazard Detection System (HDS) is a component of the ALHAT (Autonomous Landing and Hazard Avoidance Technology) sensor suite, which together provide a lander Guidance, Navigation and Control (GN&C) system with the relevant measurements necessary to enable safe precision landing under any lighting conditions. The HDS consists of a stand-alone compute element (CE), an Inertial Measurement Unit (IMU), and a gimbaled flash LIDAR sensor that are used, in real-time, to generate a Digital Elevation Map (DEM) of the landing terrain, detect candidate safe landing sites for the vehicle through Hazard Detection (HD), and generate hazard-relative navigation (HRN) measurements used for safe precision landing. Following an extensive ground and helicopter test campaign, ALHAT was integrated onto the Morpheus rocket-powered terrestrial test vehicle in March 2014. Morpheus and ALHAT then performed five successful free flights at the simulated lunar hazard field constructed at the Shuttle Landing Facility (SLF) at Kennedy Space Center, for the first time testing the full system on a lunar-like approach geometry in a relevant dynamic environment. During these flights, the HDS successfully generated DEMs, correctly identified safe landing sites and provided HRN measurements to the vehicle, marking the first autonomous landing of a NASA rocket-powered vehicle in hazardous terrain. This paper provides a brief overview of the HDS architecture and describes its in-flight performance.

  10. Explaining Consumer Safe Food Handling Through Behavior-Change Theories: A Systematic Review.

    Science.gov (United States)

    Young, Ian; Reimer, Danielle; Greig, Judy; Meldrum, Richard; Turgeon, Patricia; Waddell, Lisa

    2017-11-01

    Consumers often engage in unsafe food handling behaviors at home. Previous studies have investigated the ability of behavior-change theories to explain and predict these behaviors. The purpose of this review was to determine which theories are most consistently associated with consumers' safe food handling behaviors across the published literature. A standardized systematic review methodology was used, consisting of the following steps: comprehensive search strategy; relevance screening of identified references; confirmation of relevance and characterization of relevant articles; risk-of-bias assessment; data extraction; and descriptive analysis of study results. A total of 20 relevant studies were identified; they were mostly conducted in Australia (40%) and the United States (35%) and used a cross-sectional design (65%). Most studies targeted young adults (65%), and none focused on high-risk consumer groups. The outcomes of 70% of studies received high overall risk-of-bias ratings, largely due to a lack of control for confounding variables. The most commonly applied theory was the Theory of Planned Behavior (45% of studies), which, along with other investigated theories of behavior change, was frequently associated with consumer safe food handling behavioral intentions and behaviors. However, overall, there was wide variation in the specific constructs found to be significantly associated and in the percentage of variance explained in each outcome across studies. The results suggest that multiple theories of behavior change can help to explain consumer safe food handling behaviors and could be adopted to guide the development of future behavior-change interventions. In these contexts, theories should be appropriately selected and adapted to meet the needs of the specific target population and context of interest.

  11. Using drugs in un/safe spaces: Impact of perceived illegality on an underground supervised injecting facility in the United States.

    Science.gov (United States)

    Davidson, Peter J; Lopez, Andrea M; Kral, Alex H

    2018-03-01

    Supervised injection facilities (SIFs) are spaces where people can consume pre-obtained drugs in hygienic circumstances with trained staff in attendance to provide emergency response in the event of an overdose or other medical emergency, and to provide counselling and referral to other social and health services. Over 100 facilities with formal legal sanction exist in ten countries, and extensive research has shown they reduce overdose deaths, increase drug treatment uptake, and reduce social nuisance. No facility with formal legal sanction currently exists in the United States, however one community-based organization has successfully operated an 'underground' facility since September 2014. Twenty three qualitative interviews were conducted with people who used the underground facility, staff, and volunteers to examine the impact of the facility on peoples' lives, including the impact of lack of formal legal sanction on service provision. Participants reported that having a safe space to inject drugs had led to less injections in public spaces, greater ability to practice hygienic injecting practices, and greater protection from fatal overdose. Constructive aspects of being 'underground' included the ability to shape rules and procedures around user need rather than to meet political concerns, and the rapid deployment of the project, based on immediate need. Limitations associated with being underground included restrictions in the size and diversity of the population served by the site, and reduced ability to closely link the service to drug treatment and other health and social services. Unsanctioned supervised injection facilities can provide a rapid and user-driven response to urgent public health needs. This work draws attention to the need to ensure such services remain focused on user-defined need rather than external political concerns in jurisdictions where supervised injection facilities acquire local legal sanction. Copyright © 2017 Elsevier B.V. All

  12. Сравнительный анализ технологий Wi-Fi и Li-Fi

    OpenAIRE

    МАКСИМОВА АЙЫЫНА ЕГОРОВНА; ДЬЯЧКОВСКАЯ САРГЫЛАНА СЕМЕНОВНА; ГАЕНКОВА ИРИНА ВЛАИМИРОВНА

    2015-01-01

    В данной статье приведено сравнение беспроводных технологий связи Wi-Fi и Li-Fi (Light Fidelity). Даны характеристики обеих технологий, их преимущества и недостатки.

  13. Is nuclear power safe enough

    Energy Technology Data Exchange (ETDEWEB)

    Andresen, A F [Institutt for Atomenergi, Kjeller (Norway)

    1979-01-01

    The lecture formed a commentary on the report of the Norwegian Government's Commission on Nuclear power Safety which was published in October 1978. It was introductorily pointed out that 'safe' and 'safety' are not in themselves meaningful terms and that the probability of an occurrence is the real measure. The main items in the Commission's report have been core meltdown, releases during reprocessing, waste disposal, plutonium diversion and environmental impacts. The 21 members of the Commission were unanimous in 7 of the 8 chapters. In chapter 2, 'Summary and Conclusions', 3 members dissented from the majority opinion, that, subject to certain conditions, nuclear power was a safe and acceptable source of energy.

  14. A 'simple anterior fish excluder' (SAFE for mitigating penaeid-trawl bycatch.

    Directory of Open Access Journals (Sweden)

    Matthew J McHugh

    Full Text Available Various plastic strips and sheets (termed 'simple anterior fish excluders'-SAFEs were positioned across the openings of penaeid trawls in attempts at reducing the unwanted bycatches of small teleosts. Initially, three SAFEs (a single wire without, and with small and large plastic panels were compared against a control (no SAFE on paired beam trawls. All SAFEs maintained targeted Metapenaeus macleayi catches, while the largest plastic SAFE significantly reduced total bycatch by 51% and the numbers of Pomatomus saltatrix, Mugil cephalus and Herklotsichthys castelnaui by up to 58%. A redesigned SAFE ('continuous plastic' was subsequently tested (against a control on paired otter trawls, significantly reducing total bycatch by 28% and P. saltatrix and H. castelnaui by up to 42%. The continuous-plastic SAFE also significantly reduced M. macleayi catches by ~7%, but this was explained by ~5% less wing-end spread, and could be simply negated through otter-board refinement. Further work is required to refine the tested SAFEs, and to quantify species-specific escape mechanisms. Nevertheless, the SAFE concept might represent an effective approach for improving penaeid-trawl selectivity.

  15. Unique Chernobyl Cranes for Deconstruction Activities in the New Safe Confinement - 13542

    International Nuclear Information System (INIS)

    Parameswaran, N.A. Vijay; Chornyy, Igor; Owen, Rob; Schmieman, Eric; Kedrowski, Dan

    2013-01-01

    The devastation left behind from the Chernobyl nuclear power plant (ChNPP) Unit 4 accident which occurred on April 26, 1986 presented unparalleled technical challenges to the world engineering and scientific community. One of the largest tasks that are in progress is the design and construction of the New Safe Confinement (NSC). The NSC is an engineered enclosure for the entire object shelter (OS) that includes a suite of process equipment. The process equipment will be used for the dismantling of the destroyed Chernobyl Nuclear Power Plant (ChNPP) Unit. One of the major mechanical handling systems to be installed in the NSC is the Main Cranes System (MCS). The planned decontamination and decommissioning or dismantling (D and D) activities will require the handling of heavily shielded waste disposal casks containing nuclear fuel as well as lifting and transporting extremely large structural elements. These activities, to be performed within the NSC, will require large and sophisticated cranes. The article will focus on the unique design features of the MCS for the D and D activities. (authors)

  16. Unique Chernobyl Cranes for Deconstruction Activities in the New Safe Confinement - 13542

    Energy Technology Data Exchange (ETDEWEB)

    Parameswaran, N.A. Vijay [Bechtel Systems and Infrastructure, Inc. (United States); Chornyy, Igor [Chernobyl NPP-SIP-PMU (Ukraine); Owen, Rob [PaR Systems, Inc. (United States); Schmieman, Eric [Battelle Memorial Institute (United States); Kedrowski, Dan

    2013-07-01

    The devastation left behind from the Chernobyl nuclear power plant (ChNPP) Unit 4 accident which occurred on April 26, 1986 presented unparalleled technical challenges to the world engineering and scientific community. One of the largest tasks that are in progress is the design and construction of the New Safe Confinement (NSC). The NSC is an engineered enclosure for the entire object shelter (OS) that includes a suite of process equipment. The process equipment will be used for the dismantling of the destroyed Chernobyl Nuclear Power Plant (ChNPP) Unit. One of the major mechanical handling systems to be installed in the NSC is the Main Cranes System (MCS). The planned decontamination and decommissioning or dismantling (D and D) activities will require the handling of heavily shielded waste disposal casks containing nuclear fuel as well as lifting and transporting extremely large structural elements. These activities, to be performed within the NSC, will require large and sophisticated cranes. The article will focus on the unique design features of the MCS for the D and D activities. (authors)

  17. The safe transport of radioactive materials

    CERN Document Server

    Gibson, R

    1966-01-01

    The Safe Transport of Radioactive Materials is a handbook that details the safety guidelines in transporting radioactive materials. The title covers the various regulations and policies, along with the safety measures and procedures of radioactive material transport. The text first details the 1963 version of the IAEA regulation for the safe transport of radioactive materials; the regulation covers the classification of radionuclides for transport purposes and the control of external radiation hazards during the transport of radioactive materials. The next chapter deals with concerns in the im

  18. Combined SAFE/SNAP approach to safeguards evaluation

    International Nuclear Information System (INIS)

    Engi, D.; Chapman, L.D.; Grant, F.H.; Polito, J.

    1980-01-01

    Generally, the scope of a safeguards evaluation model can efficiently address one of two issues, (1) global safeguards effectiveness, or (2) vulnerability analysis for individual scenarios. The Safeguards Automated Facility Evaluation (SAFE) focuses on (1) while the Safeguards Network Analysis Procedure (SNAP) is directed at (2). SAFE addresses (1) in that it considers the entire facility, i.e., the composite system of hardware and human components, in one global analysis. SNAP addresses (2) by providing a safeguards modeling symbology sufficiently flexible to represent quite complex scenarios from the standpoint of hardware interfaces while also accounting for a rich variety of human decision making. A combined SAFE/SNAP approach to the problem of safeguards evaluation is described and illustrated through an example

  19. Linn laiendab tasuta traadita interneti ala / Urmas Tooming

    Index Scriptorium Estoniae

    Tooming, Urmas

    2006-01-01

    Tallinna linnavalitsuse tellimusel paigaldab Elion traadita interneti ehk WiFi seadmed kõigisse linnaosadesse, kokku 28 üldkasutatavasse kohta. Projekti maksumuseks on 800 000 krooni. Kaart: Tasuta WiFi Tallinnas. Lisa: Linna rajatud tasuta WiFi alad

  20. LACK OF AWARENESS ABOUT SAFE BLOOD IN PAKISTANI POPULATION

    Directory of Open Access Journals (Sweden)

    Muhammad Usman

    2014-12-01

    Full Text Available Blood transfusion is a life saving procedure in various transfusion-dependent life threatening conditions and donation of safe blood is a prerequisite for achieving this goal. This study was designed to evaluate the awareness regarding “safe blood” in Pakistani population. This study was conducted at a large scale through a population survey. The test population was divided into two groups i.e. general population and students. The Performa was designed for a general and student population and included 20 questions related to awareness of safe blood. A total of 4900 individuals belonging to different ethnic groups were included in this population survey. Results of social survey were analyzed by using Usman and Moin awareness chart. Results of this study revealed profound unawareness about safe blood in Pakistani population. This study found lack of awareness about safe blood as a major factor that is playing a vital role in the propagation of blood borne diseases in Pakistan. To secure the recipients from blood borne complications through blood donation, it is necessary to create effective awareness about safe blood in Pakistani population.

  1. Development of Safe Food Handling Guidelines for Korean Consumers.

    Science.gov (United States)

    Kang, Hee-Jin; Lee, Min-Woo; Hwang, In-Kyeong; Kim, Jeong-Weon

    2015-08-01

    The purpose of this study was to develop guidelines for Korean consumers with regard to safe food handling practices at home by identifying current food handling issues. Korean consumers' behaviors regarding their safe food handling were identified via survey questionnaires that included items on individual hygiene practices, prepreparation steps when cooking, the cooking process, and the storage of leftover foods. The subjects were 417 Korean parents with elementary school children living in Seoul and Gyeonggi Province in the central area of Korea. The survey results revealed gaps between the knowledge or practices of Korean consumers and scientific evidence pertaining to safe food handling practices. Based on these findings, a leaflet on safe food handling guidelines was developed in accordance with Korean food culture. These guidelines suggest personal hygiene practices as well as fundamental principles and procedures for safe food handling from the stage of food purchase to that of keeping leftover dishes. A pilot application study with 50 consumers revealed that the guidelines effectively improved Korean consumers' safe food handling practices, suggesting that they can serve as practical educational material suitable for Korean consumers.

  2. Swimming Safely (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    In the summertime, families will be flocking to pools for relaxation and relief from the heat. A few simple precautions can help ensure a safe day in the water. In this podcast, Michele Hlavsa discusses ways to stay safe at the pool.

  3. How safe are nuclear plants? How safe should they be?

    International Nuclear Information System (INIS)

    Kouts, H.

    1988-01-01

    It has become customary to think about safety of nuclear plants in terms of risk as defined by the WASH-1400 study that some of the implications for the non-specialist escape our attention. Yet it is known that a rational program to understand safety, to identify unsafe events, and to use this kind of information or analysis to improve safety, requires us to use the methods of quantitative risk assessment. How this process can be made more understandable to a broader group of nontechnical people and how can a wider acceptance of the results of the process be developed have been questions under study and are addressed in this report. These are questions that have been struggled with for some time in the world of nuclear plant safety. The Nuclear Regulatory Commission examined them for several years as it moved toward developing a position on safety goals for nuclear plants, a requirement that had been assigned it by Congress. Opinion was sought from a broad spectrum of individuals, within the field of nuclear power and outside it, on the topic that was popularly called, ''How safe is safe enough?'' Views were solicited on the answer to the question and also on the way the answer should be framed when it was adopted. This report discusses the public policy and its implementation

  4. Ergonomics: safe patient handling and mobility.

    Science.gov (United States)

    Hallmark, Beth; Mechan, Patricia; Shores, Lynne

    2015-03-01

    This article reviews and investigates the issues surrounding ergonomics, with a specific focus on safe patient handling and mobility. The health care worker of today faces many challenges, one of which is related to the safety of patients. Safe patient handling and mobility is on the forefront of the movement to improve patient safety. This article reviews the risks associated with patient handling and mobility, and informs the reader of current evidence-based practice relevant to this area of care. Copyright © 2015 Elsevier Inc. All rights reserved.

  5. Be-safe travel, a web-based geographic application to explore safe-route in an area

    Science.gov (United States)

    Utamima, Amalia; Djunaidy, Arif

    2017-08-01

    In large cities in developing countries, the various forms of criminality are often found. For instance, the most prominent crimes in Surabaya, Indonesia is 3C, that is theft with violence (curas), theft by weighting (curat), and motor vehicle theft (curanmor). 3C case most often occurs on the highway and residential areas. Therefore, new entrants in an area should be aware of these kind of crimes. Route Planners System or route planning system such as Google Maps only consider the shortest distance in the calculation of the optimal route. The selection of the optimal path in this study not only consider the shortest distance, but also involves other factors, namely the security level. This research considers at the need for an application to recommend the safest road to be passed by the vehicle passengers while drive an area. This research propose Be-Safe Travel, a web-based application using Google API that can be accessed by people who like to drive in an area, but still lack of knowledge of the pathways which are safe from crime. Be-Safe Travel is not only useful for the new entrants, but also useful for delivery courier of valuables goods to go through the safest streets.

  6. Fail-safe computer-based plant protection systems

    International Nuclear Information System (INIS)

    Keats, A.B.

    1983-01-01

    A fail-safe mode of operation for computers used in nuclear reactor protection systems was first evolved in the UK for application to a sodium cooled fast reactor. The fail-safe properties of both the hardware and the software were achieved by permanently connecting test signals to some of the multiplexed inputs. This results in an unambiguous data pattern, each time the inputs are sequentially scanned by the multiplexer. The ''test inputs'' simulate transient excursions beyond defined safe limits. The alternating response of the trip algorithms to the ''out-of-limits'' test signals and the normal plant measurements is recognised by hardwired pattern recognition logic external to the computer system. For more general application to plant protection systems, a ''Test Signal Generator'' (TSG) is used to compute and generate test signals derived from prevailing operational conditions. The TSG, from its knowledge of the sensitivity of the trip algorithm to each of the input variables, generates a ''test disturbance'' which is superimposed upon each variable in turn, to simulate a transient excursion beyond the safe limits. The ''tripped'' status yielded by the trip algorithm when using data from a ''disturbed'' input forms part of a pattern determined by the order in which the disturbances are applied to the multiplexer inputs. The data pattern formed by the interleaved test disturbances is again recognised by logic external to the protection system's computers. This fail-safe mode of operation of computer-based protection systems provides a powerful defence against common-mode failure. It also reduces the importance of software verification in the licensing procedure. (author)

  7. Safe handling of radiation sources

    International Nuclear Information System (INIS)

    Abd Nasir Ibrahim; Azali Muhammad; Ab Razak Hamzah; Abd Aziz Mohamed; Mohammad Pauzi Ismail

    2004-01-01

    This chapter discussed the subjects related to the safe handling of radiation sources: type of radiation sources, method of use: transport within premises, transport outside premises; Disposal of Gamma Sources

  8. Strategies and challenges for safe injection practice in developing countries.

    Science.gov (United States)

    Gyawali, Sudesh; Rathore, Devendra Singh; Shankar, P Ravi; Kumar, Kc Vikash

    2013-01-01

    Injection is one of the important health care procedures used globally to administer drugs. Its unsafe use can transmit various blood borne pathogens. This article aims to review the history and status of injection practices, its importance, interventions and the challenges for safe injection practice in developing countries. The history of injections started with the discovery of syringe in the early nineteenth century. Safe injection practice in developed countries was initiated in the early twentieth century but has not received adequate attention in developing countries. The establishment of "Safe Injection Global Network (SIGN)" was an milestone towards safe injection practice globally. In developing countries, people perceive injection as a powerful healing tool and do not hesitate to pay more for injections. Unsafe disposal and reuse of contaminated syringe is common. Ensuring safe injection practice is one of the greatest challenges for healthcare system in developing countries. To address the problem, interventions with active involvement of a number of stakeholders is essential. A combination of educational, managerial and regulatory strategies is found to be effective and economically viable. Rational and safe use of injections can save many lives but unsafe practice threatens life. Safe injection practice is crucial in developing countries. Evidence based interventions, with honest commitment and participation from the service provider, recipient and community with aid of policy makers are required to ensure safe injection practice.

  9. Effective and Safe Ships

    DEFF Research Database (Denmark)

    Pedersen, Preben Terndrup; Amdahl, Jørgen; Rutgersson, Olle

    1996-01-01

    A Joint Nordic Research project "Effecive and Safe Ships" is presented. The project is aiming to develop methods and tools for quantitative evaluation fo ship safety. This report is the report of the preliminary phase where the plan for the main project is developed. The objectives of the project...

  10. Pregnant Adolescents Admitted to an Inpatient Child and Adolescent Psychiatric Unit: An Eight-Year Review.

    Science.gov (United States)

    Fletcher, Teresa M; Markley, Laura A; Nelson, Dana; Crane, Stephen S; Fitzgibbon, James J

    2015-12-01

    To assess patient outcomes and describe demographic data of pregnant adolescents admitted to an inpatient child and adolescent psychiatric unit, as well as to determine if it is safe to continue to admit pregnant adolescents to such a unit. A descriptive retrospective chart review conducted at a free-standing pediatric hospital in northeast Ohio of all pregnant adolescents aged 13 to 17 years admitted to the inpatient child and adolescent psychiatric unit from July 2005 to April 2013. Data collection included details on demographic, pregnancy status, and psychiatric diagnoses. Eighteen pregnant adolescents were admitted to the psychiatric unit during the time frame. Sixteen of those were in the first trimester of pregnancy. Pregnancy was found to be a contributing factor to the adolescent's suicidal ideation and admission in 11 of the cases. Admission to an inpatient psychiatric facility did not lead to adverse effects in pregnancy. Pregnant adolescents did not have negative pregnancy outcomes related to admission to an inpatient psychiatric unit. Results of this study suggest that it is safe to continue to admit uncomplicated pregnant adolescents in their first trimester to an inpatient child and adolescent psychiatric unit for an acute stay. Copyright © 2015 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  11. Analysis of Methods of Determining the Safe Ship Trajectory

    Directory of Open Access Journals (Sweden)

    Jozef Lisowski

    2016-07-01

    Full Text Available The paper describes six methods of optimal and game theory and artificial neural network for synthesis of safe control in collision situations at sea. The application of optimal and game control algorithms to determine the own ship safe trajectory during the passing of other encountered ships in good and restricted visibility at sea is presented. The comparison of the safe ship control in collision situation: multi-step matrix non-cooperative and cooperative games, multi-stage positional non-cooperative and cooperative games have been introduced. The considerations have been illustrated with examples of computer simulation of the algorithms to determine safe of own ship trajectories in a navigational situation during passing of eight met ships.

  12. Local Safety Toolkit: Enabling safe communities of opportunity

    CSIR Research Space (South Africa)

    Holtmann, B

    2010-08-31

    Full Text Available remain inadequate to achieve safety. The Local Safety Toolkit supports a strategy for a Safe South Africa through the implementation of a model for a Safe Community of Opportunity. The model is the outcome of work undertaken over the course of the past...

  13. A Pilot Project Demonstrating that Combat Medics Can Safely Administer Parenteral Medications in the Emergency Department.

    Science.gov (United States)

    Schauer, Steven G; Cunningham, Cord W; Fisher, Andrew D; DeLorenzo, Robert A

    2017-12-01

    Introduction Select units in the military have improved combat medic training by integrating their functions into routine clinical care activities with measurable improvements in battlefield care. This level of integration is currently limited to special operations units. It is unknown if regular Army units and combat medics can emulate these successes. The goal of this project was to determine whether US Army combat medics can be integrated into routine emergency department (ED) clinical care, specifically medication administration. Project Design This was a quality assurance project that monitored training of combat medics to administer parenteral medications and to ensure patient safety. Combat medics were provided training that included direct supervision during medication administration. Once proficiency was demonstrated, combat medics would prepare the medications under direct supervision, followed by indirect supervision during administration. As part of the quality assurance and safety processes, combat medics were required to document all medication administrations, supervising provider, and unexpected adverse events. Additional quality assurance follow-up occurred via complete chart review by the project lead. Data During the project period, the combat medics administered the following medications: ketamine (n=13), morphine (n=8), ketorolac (n=7), fentanyl (n=5), ondansetron (n=4), and other (n=6). No adverse events or patient safety events were reported by the combat medics or discovered during the quality assurance process. In this limited case series, combat medics safely administered parenteral medications under indirect provider supervision. Future research is needed to further develop this training model for both the military and civilian setting. Schauer SG , Cunningham C W, Fisher AD , DeLorenzo RA . A pilot project demonstrating that combat medics can safely administer parenteral medications in the emergency department. Prehosp Disaster Med. 2017;32(6):679-681.

  14. Are EU Banks Safe?

    NARCIS (Netherlands)

    R.J. Theissen (Roel)

    2013-01-01

    markdownabstract__Abstract__ What exactly are the rules banks are subject to, and are they fit for purpose? These are the two questions addressed in this book ‘Are EU banks safe?’ and its descriptive companion book ‘EU banking supervision’. The full rulebook on banks is difficult to find

  15. Combined SAFE/SNAP approach to safeguards evaluation

    International Nuclear Information System (INIS)

    Engi, D.; Chapman, L.D.; Grant, F.H.; Polito, J.

    1980-01-01

    The scope of a safeguards evaluation model can efficiently address one of two issues: (1) global safeguards effectiveness or (2) vulnerability analysis for individual scenarios. The Safeguards Automated Facility Evaluation (SAFE) focuses on the first issue, while the Safeguards Network Analysis Procedure (SNAP) is directed towards the second. A combined SAFE/SNAP approach to the problem of safeguards evaluation is described and illustrated through an example. 4 refs

  16. A Privacy Analysis of Google and Yandex Safe Browsing

    OpenAIRE

    Gerbet , Thomas; Kumar , Amrit; Lauradoux , Cédric

    2015-01-01

    Google and Yandex Safe Browsing are popular services included in many webbrowsers to prevent users from visiting phishing or malware website links. If Safe Browsing servicesprotect their users from losing private information, they also require that their servers receivebrowsing information on the very same users. In this paper, we present an analysis of Googleand Yandex Safe Browsing services from a privacy perspective. We quantify the privacy providedby these services by analyzing the possib...

  17. Safe corridors for K-wiring in phalangeal fractures

    Directory of Open Access Journals (Sweden)

    C Rex

    2015-01-01

    Conclusion: K-wiring through the safe corridor has proved to yield the best clinical results because of least tethering of soft tissues as evidenced by performing "on-table active finger movement test" at the time of surgery. We strongly recommend K-wiring through safe portals in all phalangeal fractures.

  18. Premiering SAFE for Safety Added Fuel Element - 15020

    International Nuclear Information System (INIS)

    Bhowmik, P.K.; Shamim, J.A.; Suh, K.Y.; Suh, K.S.

    2015-01-01

    The impact of the Fukushima accident has been the willingness to implement passive safety measures in reactor design and to simplify reactor design itself. Within this framework, a new fuel element, named SAFE (Safety Added Fuel Element) based on the concept of accident tolerant fuel, is presented. SAFE is a new type of fuel element cooled internally and externally by light water and with stainless steel as the cladding material. The removal of boron may trigger a series of changes which may simplify the system greatly. A simplified thermal analysis of SAFE shows that the fuel centerline temperature is well below the maximal limit during the normal operation of the plant

  19. Alcohol use and safe drinking

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/001944.htm Alcohol use and safe drinking To use the sharing features on this page, please enable JavaScript. Alcohol use involves drinking beer, wine, or hard liquor. ...

  20. Setting priorities for safe motherhood interventions in resource-scarce settings.

    Science.gov (United States)

    Prata, Ndola; Sreenivas, Amita; Greig, Fiona; Walsh, Julia; Potts, Malcolm

    2010-01-01

    Guide policy-makers in prioritizing safe motherhood interventions. Three models (LOW, MED, HIGH) were constructed based on 34 sub-Saharan African countries to assess the relative cost-effectiveness of available safe motherhood interventions. Cost and effectiveness data were compiled and inserted into the WHO Mother Baby Package Costing Spreadsheet. For each model we assessed the percentage in maternal mortality reduction after implementing all interventions, and optimal combinations of interventions given restricted budgets of US$ 0.50, US$ 1.00, US$ 1.50 per capital maternal health expenditures respectively for LOW, MED, and HIGH models. The most cost-effective interventions were family planning and safe abortion (fpsa), antenatal care including misoprostol distribution for postpartum hemorrhage prevention at home deliveries (anc-miso), followed by sepsis treatment (sepsis) and facility-based postpartum hemorrhage management (pph). The combination of interventions that avert the greatest number of maternal deaths should be prioritized and expanded to cover the greatest number of women at risk. Those which save the most number of lives in each model are 'fpsa, anc-miso' and 'fpsa, sepsis, safe delivery' for LOW; 'fpsa, anc-miso' and 'fpsa, sepsis, safe delivery' for MED; and 'fpsa, anc-miso, sepsis, eclampsia treatment, safe delivery' for HIGH settings. Safe motherhood interventions save a significant number of newborn lives.

  1. Vitamin D status, bone mineral density and mental health in young Australian women: the Safe-D study

    Directory of Open Access Journals (Sweden)

    Emma T. Callegari

    2015-11-01

    Full Text Available Background. Vitamin D deficiency has been associated with both poor bone health and mental ill-health. More recently, a number of studies have found individuals with depressive symptoms tend to have reduced bone mineral density. To explore the interrelationships between vitamin D status, bone mineral density and mental-ill health we are assessing a range of clinical, behavioural and lifestyle factors in young women (Part A of the Safe-D study. Design and methods. Part A of the Safe-D study is a cross-sectional study aiming to recruit 468 young females aged 16-25 years living in Victoria, Australia, through Facebook advertising. Participants are required to complete an extensive, online questionnaire, wear an ultra-violet dosimeter for 14 consecutive days and attend a study site visit. Outcome measures include areal bone mineral measures at the lumbar spine, total hip and whole body, as well as soft tissue composition using dual energy x-ray absorptiometry. Trabecular and cortical volumetric bone density at the tibia is measured using peripheral quantitative computed tomography. Other tests include serum 25-hydroxyvitamin D, serum biochemistry and a range of health markers. Details of mood disorder/s and depressive and anxiety symptoms are obtained by self-report. Cutaneous melanin density is measured by spectrophotometry. Expected impact. The findings of this cross-sectional study will have implications for health promotion in young women and for clinical care of those with vitamin D deficiency and/or mental ill-health. Optimising both vitamin D status and mental health may protect against poor bone health and fractures in later life.

  2. How safe is safe?

    International Nuclear Information System (INIS)

    Hughes, C.F.; Flood, M.

    1996-01-01

    60 and 70 degree convexo-concave valve. Nine hundred and one valves were implanted in Australia. Twelve strut fractures were reported. Two other patients have been explanted and have demonstrated 'single leg separation'. This particular problem was only investigated when two patients died of a fractured valve in the same hospital on the same day. A retrospective study of all known patients in Australia has shown poor follow up, lack of knowledge and indeed lack of interest in device failure modes. Consequently, the Australian and New Zealand Heart Valve Registry was established to track all implanted valves and to notify physicians of any new information. This is perhaps the first device-specific register in Australia. The safety of individual devices is often not known by manufacturers, regulators and clinicians alike. No follow up is available and large volume long term studies are yet to be implemented for the majority of devices. Without such studies and without mandatory problem reporting, the relative safety of medical devices will continue to be measured by banner headlines, sensational TV 'grabs' and protracted law suits. At present, only schemes such as the Problem Reporting Scheme can tell us (albeit vaguely) 'how safe is safe'

  3. Safe motherhood at risk?

    Science.gov (United States)

    Thompson, A

    1996-12-01

    Health professionals' negative attitudes toward clients often exacerbate the problems women face in terms of health status and access to health care. Thus, the health professionals can themselves be obstacles to women seeking the health care they need. A key challenge to midwives, in addition to providing technically competent services, is gaining insight into the people for whom they are responsible so that childbirth traditions are treated with respect and women are offered dignity. Safe motherhood requires intersectoral collaboration. Many innovative approaches to safe motherhood are based on the community's participation in planning services that meet the needs of women. Other approaches are based on decentralization of services. For example, a large university teaching hospital in Lusaka, Zambia, set up birthing centers around the city to take the pressure off the hospital. Midwives head up these centers, which are close to the women's homes. Decentralization of delivery services has improved the physical and emotional outcomes for mothers and newborns. Midwives must be prepared to articulate concerns about inequalities and deficiencies in the health care system in order to persuade the government to change. Women, including midwives, need to form multidisciplinary alliances to work together to effect change. The front-line workers in maternity care are midwives. They should adopt the following strategies to become even more effective in their efforts to make motherhood safer. They should listen to what women say about their needs. They should scale services to a manageable, human scale. They should learn the skills to become politically active advocates. They should work with other midwives, women, leaders, and other professional groups. Motherhood can be safe when women have more control over their own decision making, the education to liberate themselves to make their own decisions, and access to skilled care.

  4. Design and Implementation of Mobile Car with Wireless Video Monitoring System Based on STC89C52

    Directory of Open Access Journals (Sweden)

    Yang Hong

    2014-05-01

    Full Text Available With the rapid development of wireless networks and image acquisition technology, wireless video transmission technology has been widely applied in various communication systems. The traditional video monitoring technology is restricted by some conditions such as layout, environmental, the relatively large volume, cost, and so on. In view of this problem, this paper proposes a method that the mobile car can be equipped with wireless video monitoring system. The mobile car which has some functions such as detection, video acquisition and wireless data transmission is developed based on STC89C52 Micro Control Unit (MCU and WiFi router. Firstly, information such as image, temperature and humidity is processed by the MCU and communicated with the router, and then returned by the WiFi router to the host computer phone. Secondly, control information issued by the host computer phone is received by WiFi router and sent to the MCU, and then the MCU sends relevant instructions. Lastly, the wireless transmission of video images and the remote control of the car are realized. The results prove that the system has some features such as simple operation, high stability, fast response, low cost, strong flexibility, widely application, and so on. The system has certain practical value and popularization value.

  5. Kozloduy NPP units 3 and 4 rest life time program execution

    International Nuclear Information System (INIS)

    Genov, S.

    2005-01-01

    In this paper the following tasks are considered: Kozloduy NPP units 3 and 4 life time evaluation; programme for the units life time assuring; units 3 and 4 renewals. The main activities for the programme implementation are described and the obtained results are presented. In conclusion, the executed activities of program for assuring the life time of units 3 and 4 of Kozloduy NPP, cogently prove that the lifetime of structures, systems and components, is assured duly and those structures, systems and components will be in service safely, economically effectively and mostly reliable till the end of the 30 years design lifetime. For some of them it has been proved even for 35 and 40 years. Program activities continue during 2005, although the early shutdown of units 3 and 4 is possible

  6. Letter to the Editor. Comments on Karipidis, K. K., Henderson, A. S., Wijayasinghe, D., Tjong, L. and Tinker, R. Exposure to radiofrequency electromagnetic fields from WiFi in Australian schools. Radiat. Prot. Dosim. 1-8 (2017)

    International Nuclear Information System (INIS)

    Leach, Victor A.; Weller, Steven; Redmayne, Mary

    2017-01-01

    The measurement and collection of radiofrequency (RF) exposure data in Australian classrooms is important and ARPANSA should be applauded for undertaking the much-needed research reported in the above paper. However, the paper presented is very misleading and demonstrates how more care should have been taken when planning and designing the Wi-Fi survey. The survey results presented by Karipidis et al. are of little practical use and are misleading when it comes to determining what RF power density levels are realistically experienced by students in a 'typical' classroom setting. We would also like to highlight the opening sentence of the discussion section; the authors refer to this being a 'comprehensive' survey. We believe this claim is overstated as shown in this letter

  7. Classrooms as ‘safe houses’? The ethical and emotional implications of digital storytelling in a university writing classroom

    OpenAIRE

    Kristian D Stewart

    2017-01-01

    This paper reports the findings of a digital storytelling praxis within a higher education classroom located outside of Metro Detroit in the United States. Drawing on Zembylas’s (2006, 2008) scholarship on emotion in the production of knowledge and the teacher’s role, adjacent to literature surrounding personal writing and safe houses for learning, an investigation of student perceptions of digital storytelling within a writing classroom took place during the 2016 and 2017 academic years. Dat...

  8. Safe medication management in specialized home healthcare - an observational study.

    Science.gov (United States)

    Lindblad, Marléne; Flink, Maria; Ekstedt, Mirjam

    2017-08-24

    Medication management is a complex, error-prone process. The aim of this study was to explore what constitutes the complexity of the medication management process (MMP) in specialized home healthcare and how healthcare professionals handle this complexity. The study is theoretically based in resilience engineering. Data were collected during the MMP at three specialized home healthcare units in Sweden using two strategies: observation of workplaces and shadowing RNs in everyday work, including interviews. Transcribed material was analysed using grounded theory. The MMP in home healthcare was dynamic and complex with unclear boundaries of responsibilities, inadequate information systems and fluctuating work conditions. Healthcare professionals adapted their everyday clinical work by sharing responsibility and simultaneously being authoritative and preserving patients' active participation, autonomy and integrity. To promote a safe MMP, healthcare professionals constantly re-prioritized goals, handled gaps in communication and information transmission at a distance by creating new bridging solutions. Trade-offs and workarounds were necessary elements, but also posed a threat to patient safety, as these interim solutions were not systematically evaluated or devised learning strategies. To manage a safe medication process in home healthcare, healthcare professionals need to adapt to fluctuating conditions and create bridging strategies through multiple parallel activities distributed over time, space and actors. The healthcare professionals' strategies could be integrated in continuous learning, while preserving boundaries of safety, instead of being more or less interim solutions. Patients' and family caregivers' as active partners in the MMP may be an underestimated resource for a resilient home healthcare.

  9. Standards for safe operation of research reactors

    International Nuclear Information System (INIS)

    1996-01-01

    The safety of research reactors is based on many factors such as suitable choice of location, design and construction according to the international standards, it also depends on well trained and qualified operational staff. These standards determine the responsibilities of all who are concerned with the research reactors safe operation, and who are responsible of all related activities in all the administrative and technical stages in a way that insures the safe operation of the reactor

  10. Asymptotically Safe Standard Model Extensions arXiv

    CERN Document Server

    Pelaggi, Giulio Maria; Salvio, Alberto; Sannino, Francesco; Smirnov, Juri; Strumia, Alessandro

    We consider theories with a large number NF of charged fermions and compute the renormalisation group equations for the gauge, Yukawa and quartic couplings resummed at leading order in NF. We construct extensions of the Standard Model where SU(2) and/or SU(3) are asymptotically safe. When the same procedure is applied to the Abelian U(1) factor, we find that the Higgs quartic can not be made asymptotically safe and stay perturbative at the same time.

  11. Licensing issues for inherently safe fast reactors

    International Nuclear Information System (INIS)

    Kastenberg, W.E.; Lee, S.; Okrent, D.

    1986-01-01

    There has been considerable interest recently in a new generation of liquid metal reactor (LMR) concepts in the US. Some significant changes in regulatory philosophy will be required if the anticipated cost advantages of inherently safe designs are to be achieved. The defense in depth philosophy will need to be significantly re-evaluated in the context of inherently safe reactors. It is the purpose of this paper to begin such a re-evaluation of this regulatory philosophy

  12. arXiv Asymptotically Safe Standard Model Extensions?

    CERN Document Server

    Pelaggi, Giulio Maria; Salvio, Alberto; Sannino, Francesco; Smirnov, Juri; Strumia, Alessandro

    2018-05-15

    We consider theories with a large number NF of charged fermions and compute the renormalization group equations for the gauge, Yukawa and quartic couplings resummed at leading order in 1/NF. We construct extensions of the standard model where SU(2) and/or SU(3) are asymptotically safe. When the same procedure is applied to the Abelian U(1) factor, we find that the Higgs quartic can not be made asymptotically safe and stay perturbative at the same time.

  13. Examination of a University-Affiliated Safe Ride Program

    Science.gov (United States)

    Gieck, D. Joseph; Slagle, David M.

    2010-01-01

    A university-affiliated safe ride program was evaluated to determine whether these programs can reduce drunk-driving related costs. Data was collected from 187 safe ride passengers during three nights of operation. Among the passengers, 93% were enrolled at a local University, 31% were younger than 21, and 40% reported a prior alcohol-related…

  14. Safe drinking during cancer treatment

    Science.gov (United States)

    ... ency/patientinstructions/000060.htm Drinking water safely during cancer treatment To use the sharing features on this page, please enable JavaScript. During and right after your cancer treatment, your body may not be able to protect ...

  15. Implications of inherent safe nuclear power system

    International Nuclear Information System (INIS)

    Song, Yo-Taik

    1987-01-01

    The safety of present day nuclear power reactors and research reactors depends on a combination of design features of passive and active systems, and the alert judgement of their operators. A few inherently safe designs of nuclear reactors for power plants are currently under development. In these designs, the passive systems are emphasized, and the active systems are minimized. Also efforts are made to eliminate the potential for human failures that initiate the series of accidents. If a major system fails in these designs, the core is flooded automatically with coolants that flow by gravity, not by mechanical pumps or electromagnetic actuators. Depending on the choice of the coolants--water, liquid metal and helium gas--there are three principal types of inherently safe reactors. In this paper, these inherently safe reactor designs are reviewed and their implications are discussed. Further, future perspectives of their acceptance by nuclear industries are discussed. (author)

  16. Landscape planning for a safe city

    Directory of Open Access Journals (Sweden)

    M. Ishikawa

    2002-06-01

    Full Text Available To create a safe city free from natural disasters has been one of the important criteria in city planning. Since large cities have suffered from large fires caused by earthquakes, the planning of open spaces to prevent the spread of fires is part of the basic structure of city planning in Japan. Even in the feudal city of Edo, the former name of Tokyo, there had been open spaces to prevent fire disasters along canals and rivers. This paper discusses the historical evolution of open space planning, that we call landscape planning, through the experiences in Tokyo, and clarifies the characteristics and problems for achieving a safe city.

  17. Radioactive acid digestion test unit nonradioactive startup operations

    International Nuclear Information System (INIS)

    Allen, C.R.; Cowan, R.G.; Crippen, M.D.; Divine, J.R.

    1978-05-01

    The Radioactive Acid Digestion Test Unit (RADTU) will process 5 kg/hour of combustible solid waste and is designed to handle almost all solid combustible waste found in plutonium processing with plutonium contamination levels up to scrap. The RADTU is designed with special safety features to safely contain high masses of fissile materials and to safely handle unusual materials and reactive chemicals which may find their way into the waste. Nonradioactive operating experience to date has been very satisfactory. RADTU has been operated for extended runs on both a 24-hour per day basis as well as on a one shift per day basis. Some minor operating problems have been encountered as expected in a shakedown operation. In general, solutions to these have been readily found. 12 figures

  18. Swimming Safely (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2014-05-22

    In the summertime, families will be flocking to pools for relaxation and relief from the heat. A few simple precautions can help ensure a safe day in the water. In this podcast, Michele Hlavsa discusses ways to stay safe at the pool.  Created: 5/22/2014 by MMWR.   Date Released: 5/22/2014.

  19. Safe delivery practices: experience from cross-sectional data of Bangladeshi women.

    Science.gov (United States)

    Kabir, M A; Goh, Kim-Leng; Khan, M M H; Al-Amin, Abul Quasem; Azam, Mohammad Nurul

    2015-03-01

    This study examines the safe delivery practices of Bangladeshi women using data on 4905 ever-married women aged 15 to 49 years from the 2007 Bangladesh Demographic and Health Survey. Variables that included age, region of origin, education level of respondent and spouse, residence, working status, religion, involvement in NGOs, mass media exposure, and wealth index were analyzed to find correlates of safe delivery practices. More than 80% of the deliveries took place at home, and only 18% were under safe and hygienic conditions. The likelihood of safe deliveries was significantly lower among younger and older mothers than middle-aged mothers and higher among educated mothers and those living in urban areas. Economically better-off mothers and those with greater exposure to mass media had a significantly higher incidence of safe delivery practices. A significant association with religion and safe delivery practices was revealed. Demographic, socioeconomic, cultural, and programmatic factors that are strongly associated with safe delivery practices should be considered in the formulation of reproductive health policy. © 2012 APJPH.

  20. High-flow, low-head pumps provide safe passage for Pacific salmon

    International Nuclear Information System (INIS)

    Anon

    2004-01-01

    The installation of 29 ultra-low head, high capacity submersible pump and auxiliary equipment at the Rocky Reach Dam in Washington State to allow juvenile salmon safe passage on their journey down the Columbia River to the Pacific Ocean is described. The reputed cost of the project is US$160 million; its purpose is to get juvenile salmon safely around the Rocky Reach Dam without interfering with the dam's original mission of generating electric power. The project is the most expensive fish bypass on any Columbia River dam. Getting the salmon safely around the dam is intended to reduce the impact of hydroelectric power projects on the basin's salmon stocks which are now estimated at less than 10 per cent of their historic size, despite major hatchery programs. The Columbia River has the second largest volume flow of any river in the United States, and millions of people depend on it for employment in water-related industries, and for transportation. The new horizontally installed propeller pump was developed by ITT Flygt; it utilizes planetary gear reduced to match the motor speed with the propeller rpm. Each 90 kW propeller pump has a flow rate of seven cubic meters per second at a head of 0.55 metres. The auxiliary equipment includes 10 racks of flap gates to prevent reverse flow, electric controls, remote supervision, testing, installation and maintenance facilities. It is anticipated that the new bypass will allow the Chelan County Public Utility Department, owners of the facility, to phase out all current spills, except for a 16 per cent spill for 40 days each spring for Sockeye salmon which tend to travel too deep to use the bypass. Prior to installation of this new facility, 60 to 70 per cent of average daily flow in the spring and summer had to be sacrificed to accommodate all species of salmon and steelhead, with corresponding losses of power generating capacity

  1. Indoor Tanning Is Not Safe

    Science.gov (United States)

    ... the sun is by using these tips for skin cancer prevention. Indoor tanning is not a safe way to get vitamin ... to previous findings on the association between indoor tanning and skin cancer. Only a small number of people reported ...

  2. Staying Safe on the Water

    Centers for Disease Control (CDC) Podcasts

    2008-06-05

    In this podcast for all audiences, Dr. Julie Gilchrist from CDC's Injury Center outlines tips for safe boating.  Created: 6/5/2008 by National Center for Injury Prevention and Control (NCIPC).   Date Released: 6/8/2008.

  3. International conference on safe decommissioning for nuclear activities: Assuring the safe termination of practices involving radioactive materials. Contributed papers

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    Thousands of operations involving the use of radioactive substances will end during the current century. While there is considerable regulatory experience in the 'front end' of the regulatory system for practices, the experience at the back end is more limited as fewer practices have actually been terminated. When a practice is terminated because the facility has reached the end of its useful life, action has to betaken to ensure the safe shutdown of the facility and allow the removal of regulatory controls. There are many issues involved in the safe termination of practices. These include setting criteria for the release of material and sites from regulatory control; determining the suitability of the various options for decommissioning nuclear facilities, managing the waste and material released from control (recycling, reuse or disposal), and the eventual remediation of the site. Some countries have put in place regulatory infrastructures and have developed programmes to manage the associated decommissioning and remediation activities. Other countries are at the stage of assessing what is involved in terminating such practices. The purpose of this Conference is to foster an information exchange on the safe an orderly termination of practices that involve the use of radioactive substances, including both decommissioning and environmental remediation, and to promote improved coherence internationally on strategies and criteria for the safe termination of practices.

  4. International conference on safe decommissioning for nuclear activities: Assuring the safe termination of practices involving radioactive materials. Contributed papers

    International Nuclear Information System (INIS)

    2002-01-01

    Thousands of operations involving the use of radioactive substances will end during the current century. While there is considerable regulatory experience in the 'front end' of the regulatory system for practices, the experience at the back end is more limited as fewer practices have actually been terminated. When a practice is terminated because the facility has reached the end of its useful life, action has to betaken to ensure the safe shutdown of the facility and allow the removal of regulatory controls. There are many issues involved in the safe termination of practices. These include setting criteria for the release of material and sites from regulatory control; determining the suitability of the various options for decommissioning nuclear facilities, managing the waste and material released from control (recycling, reuse or disposal), and the eventual remediation of the site. Some countries have put in place regulatory infrastructures and have developed programmes to manage the associated decommissioning and remediation activities. Other countries are at the stage of assessing what is involved in terminating such practices. The purpose of this Conference is to foster an information exchange on the safe an orderly termination of practices that involve the use of radioactive substances, including both decommissioning and environmental remediation, and to promote improved coherence internationally on strategies and criteria for the safe termination of practices

  5. Train-to-Ground communications of a Train Control and Monitoring Systems: A simulation platform modelling approach

    DEFF Research Database (Denmark)

    Bouaziz, Maha; Yan, Ying; Kassab, Mohamed

    2018-01-01

    wireless technologies, e.g. Wi-Fi and LTE. Different T2G scenarios are defined in order to evaluate the performances of the Mobile Communication Gateway (managing train communications) and Quality of Services (QoS) offered to TCMS applications in the context of various environments (regular train lines......Under the SAFE4RAIL project, we are developing a simulation platform based on a discrete-events network simulator. This platform models the Train-to-Ground (T2G) link in the framework of a system-level simulation of Train Control Management System (TCMS). The modelled T2G link is based on existing...

  6. Study of the efficiency of some water treatment unit that present in houses in Erbil city-Iraq

    Science.gov (United States)

    Toma, Janan. Jabbar.; Hanna, Aveen. Matti.

    2017-09-01

    Many people in Erbil city started more than two decade to put special treatment units in their houses to purified water to become safer for drinking uses. The aim of this study was determine the efficiency of six kind water treatment units which include (two replicate of Crystal Water Purifier, So-Safe Water Filter, R O Water Purifier, Kontec Water Purified and Al-Kawther Purified Water). Water samples were collected in two sites one before and other after treatment unit. Each sample was collect with three replication during May to October-2016. Analyzed for Major cations concentration (calcium, magnesium, sodium and potassium), anions concentration (nitrate and chloride) and hydrogen ion concentration (pH), electrical conductivity (EC), total dissolved solids (TDS), alkalinity and total hardness by using standard methods. The water quality index values for all raw water sample befor and after treatment was good and excellent respectively for drinking purposes. Efficiency of So-Safe Water Filter was 66.32% it means was more efficiency than others special water treatment units while in RO Water Purifier was 27.14%, means less efficiency than other water purifier water under this study. Values for major cations, anions and others chemicals characteristics in the water samples after treatment became lower concentrations than befor treatment, likely an indication that these were removed by treatment. According to guideline of world health organization all of variables except total hardness befor treatment are safe and suitable for drinking purposes.

  7. Beyond Safe Operating Space: Finding Chemical Footprinting Feasible

    DEFF Research Database (Denmark)

    Posthuma, Leo; Bjørn, Anders; Zijp, Michiel C.

    2014-01-01

    undefined boundary in their selection of planetary boundaries delineating the “safe operating space for humanity”. Can we use the well-known concept of “ecological footprints” to express a chemical pollution boundary aimed at preventing the overshoot of the Earth’s capacity to assimilate environmental...... scenarios that allow us to avoid “chemical overshoot” beyond the Earth’s safe operating space....

  8. Safety and security considerations for the transport of spent teletherapy units

    International Nuclear Information System (INIS)

    Mallaupoma, Mario; Paez, Jose; Huatay, Luis; Cruz, Walter

    2008-01-01

    Among the applications of nuclear technology, a practice widely used and generates many benefits to society are teletherapy applications. Many of the teletherapy units used contain a source of cobalt-60 and after their useful life they have to be dismantled and transported to a safe place. In this case were transported two units with an activity of more than 75 TBq . This paper presents safety and security considerations for the transport of the teletherapy units according to the recommendations of actual state of art. It is described all facets of safe transport by means of a set of technical and administrative safety requirements and controls, including the actions required by the consignor and carrier. The main emphasis was put on the stages of transport operations that give rise to exposure to radiation like packing, preparation, loading, handling, storage in transit and movement of packages of radioactive material. On the other side some security actions were considered in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport of high activity radioactive material. (author)

  9. LEADIR-PS: the path to a safe and economic SMR

    Energy Technology Data Exchange (ETDEWEB)

    Hart, R.S. [Nothern Nuclear Industries Inc., Cambridge, Ontario (Canada)

    2014-07-01

    Northern Nuclear Industries Incorporated (N{sup 2} I{sup 2}) is developing a family of Small Modular Reactors (SMRs) called LEADIR-PS, an acronym for LEAD-cooled Integral Reactor-Passively Safe. LEADIR-PS plants under development, focused on process heat applications and the energy demands of Canada, are the LEADIR-PS100 with an output of 100 MWth and LEADIR-PS300 with an output of 300 MWth. A plant consisting of six LEADIR-PS300 reactor modules serving a common turbine-generator, called the LEADIR-PS Six-Pack, is focused on serving areas with higher energy demands. LEADIR-PS integrates the inherent safety features of the Modular High Temperature Gas Reactor and molten lead coolant in an integral pool type reactor configuration. Molten lead coolant, which boils at 1750 {sup o}C,avoids the cost of a reactor pressure vessel and high pressure/high temperature reactor coolant systems, and the safety concerns regarding pressure vessel and large capacity reactor coolant system piping rupture and precludes evaporation of the coolant. Molten lead does not chemically react with air, water, or graphite. The Gen IV+ LEADIR-PS plants are inherently/passively safe. There are no active systems required for safe shutdown and decay heat removal. Safety is assured without active or stored energy power supply, without a requirement to reposition valves or other devices and operator intervention or action. The unprecedented safety achieved by LEADIR-PS reactors avoids requirements for a large exclusion radius and demanding evacuation plan requirements. LEADIR-PS, with steam conditions of 370 {sup o}C and 12 MPa (more than twice that of water cooled reactors), can serve over 85% of the world's non-transportation process heat demands and is ideally suited to serving Combined Heat and Electricity demands and industrial parks. Energy utilization of over 95% is feasible in process heat and Combined Heat and Electricity applications. The simple robust design of LEADIR-PS plants in

  10. Promoting job safety for workers with intellectual disabilities: the staying safe at work training curriculum.

    Science.gov (United States)

    Dewey, Robin

    2011-01-01

    In the United States, approximately 125,000 people with disabilities are employed through Community Rehabilitation Programs in manufacturing, assembly, and service jobs. These jobs have significant hazards and, consequently, the workers are at risk of injury. Training that empowers workers to participate in prevention efforts can help reduce work-related injuries. In general this kind of health and safety training in the United States is limited. It is even more so for workers with intellectual disabilities, in part because there have not been programs for teaching individuals with cognitive challenges health and safety skills, adapted to their learning needs. This paper describes the development and promotion of the Staying Safe at Work curriculum of UC Berkeley's Labor Occupational Health Program, which is designed for use by support agencies and employers of workers with intellectual disabilities. The goal of this program is to teach these workers essential occupational safety and health skills in a manner they can understand.

  11. Do nurses provide a safe sleep environment for infants in the hospital setting? An integrative review.

    Science.gov (United States)

    Patton, Carla; Stiltner, Denise; Wright, Kelly Barnhardt; Kautz, Donald D

    2015-02-01

    Sudden infant death syndrome (SIDS) may be the most preventable cause of death for infants 0 to 6 months of age. The American Academy of Pediatrics (AAP) first published safe sleep recommendations for parents and healthcare professionals in 1992. In 1994, new guidelines were published and they became known as the "Back to Sleep" campaign. After this, a noticeable decline occurred in infant deaths from SIDS. However, this number seems to have plateaued with no continuing significant improvements in infant deaths. The objective of this review was to determine whether nurses provide a safe sleep environment for infants in the hospital setting. Research studies that dealt with nursing behaviors and nursing knowledge in the hospital setting were included in the review. A search was conducted of Google Scholar, CINAHL, PubMed, and Cochrane, using the key words "NICU," "newborn," "SIDS," "safe sleep environment," "nurse," "education," "supine sleep," "prone sleep," "safe sleep," "special care nursery," "hospital policy for safe sleep," "research," "premature," "knowledge," "practice," "health care professionals," and "parents." The review included research reports on nursing knowledge and behaviors as well as parental knowledge obtained through education and role modeling of nursing staff. Only research studies were included to ensure that our analysis was based on rigorous research-based findings. Several international studies were included because they mirrored findings noted in the United States. All studies were published between 1999 and 2012. Healthcare professionals and parents were included in the studies. They were primarily self-report surveys, designed to determine what nurses, other healthcare professionals, and parents knew or had been taught about SIDS. Integrative review. Thirteen of the 16 studies included in the review found that some nurses and some mothers continued to use nonsupine positioning. Four of the 16 studies discussed nursing knowledge and

  12. Integral Inherently Safe Light Water Reactor (I2S-LWR)

    Energy Technology Data Exchange (ETDEWEB)

    Petrovic, Bojan [Georgia Inst. of Technology, Atlanta, GA (United States); Memmott, Matthew [Brigham Young Univ., Provo, UT (United States); Boy, Guy [Florida Inst. of Technology, Melbourne, FL (United States); Charit, Indrajit [Univ. of Idaho, Moscow, ID (United States); Manera, Annalisa [Univ. of Michigan, Ann Arbor, MI (United States); Downar, Thomas [Univ. of Michigan, Ann Arbor, MI (United States); Lee, John [Univ. of Michigan, Ann Arbor, MI (United States); Muldrow, Lycurgus [Morehouse College, Atlanta, GA (United States); Upadhyaya, Belle [Univ. of Tennessee, Knoxville, TN (United States); Hines, Wesley [Univ. of Tennessee, Knoxville, TN (United States); Haghighat, Alierza [Virginia Polytechnic Inst. and State Univ. (Virginia Tech), Blacksburg, VA (United States)

    2017-10-02

    This final report summarizes results of the multi-year effort performed during the period 2/2013- 12/2016 under the DOE NEUP IRP Project “Integral Inherently Safe Light Water Reactors (I2S-LWR)”. The goal of the project was to develop a concept of a 1 GWe PWR with integral configuration and inherent safety features, at the same time accounting for lessons learned from the Fukushima accident, and keeping in mind the economic viability of the new concept. Essentially (see Figure 1-1) the project aimed to implement attractive safety features, typically found only in SMRs, to a larger power (1 GWe) reactor, to address the preference of some utilities in the US power market for unit power level on the order of 1 GWe.

  13. Safe handling of tritium

    International Nuclear Information System (INIS)

    1991-01-01

    The main objective of this publication is to provide practical guidance and recommendations on operational radiation protection aspects related to the safe handling of tritium in laboratories, industrial-scale nuclear facilities such as heavy-water reactors, tritium removal plants and fission fuel reprocessing plants, and facilities for manufacturing commercial tritium-containing devices and radiochemicals. The requirements of nuclear fusion reactors are not addressed specifically, since there is as yet no tritium handling experience with them. However, much of the material covered is expected to be relevant to them as well. Annex III briefly addresses problems in the comparatively small-scale use of tritium at universities, medical research centres and similar establishments. However, the main subject of this publication is the handling of larger quantities of tritium. Operational aspects include designing for tritium safety, safe handling practice, the selection of tritium-compatible materials and equipment, exposure assessment, monitoring, contamination control and the design and use of personal protective equipment. This publication does not address the technologies involved in tritium control and cleanup of effluents, tritium removal, or immobilization and disposal of tritium wastes, nor does it address the environmental behaviour of tritium. Refs, figs and tabs

  14. Rapid Prototyping High-Performance MR Safe Pneumatic Stepper Motors

    NARCIS (Netherlands)

    Groenhuis, Vincent; Stramigioli, Stefano

    2018-01-01

    In this paper we show that pneumatic stepper motors for MR safe robots can be constructed using rapid prototyping techniques such as 3-D printing and laser-cutting. The designs are lightweight, completely metal-free and fully customizable. Besides MR safe robotic systems, other potential

  15. Technique for unit testing of safety software verification and validation

    International Nuclear Information System (INIS)

    Li Duo; Zhang Liangju; Feng Junting

    2008-01-01

    The key issue arising from digitalization of the reactor protection system for nuclear power plant is how to carry out verification and validation (V and V), to demonstrate and confirm the software that performs reactor safety functions is safe and reliable. One of the most important processes for software V and V is unit testing, which verifies and validates the software coding based on concept design for consistency, correctness and completeness during software development. The paper shows a preliminary study on the technique for unit testing of safety software V and V, focusing on such aspects as how to confirm test completeness, how to establish test platform, how to develop test cases and how to carry out unit testing. The technique discussed here was successfully used in the work of unit testing on safety software of a digital reactor protection system. (authors)

  16. Safely yours

    CERN Multimedia

    CERN Bulletin

    2010-01-01

    Not just a facelift but a real change in the way that safety at CERN is supported by the Organization: the Safety Commission becomes the occupational Health & Safety and Environmental protection (HSE) Unit. The new name reflects a profound change in terms of vision, mission and, above all, effectiveness.   Safety is a broad term that incorporates many concepts and related issues. In the vision of the HSE Unit, safety is built on two pillars: occupational health & safety and environmental protection, both comprising conventional and radiological aspects. “Ensuring safety in these two areas is a matter of highest importance for the Organization”, says Ralf Trant, head of the HSE Unit. “Our vision focuses on improving our efficiency in serving the Organization in all matters of safety. For example, by enhancing the collaboration with the Departmental Safety Officers”. “Safety at CERN builds on international norms and standards, best practi...

  17. Automatic feedback to promote safe walking and speech loudness control in persons with multiple disabilities: two single-case studies.

    Science.gov (United States)

    Lancioni, Giulio E; Singh, Nirbhay N; O'Reilly, Mark F; Green, Vanessa A; Alberti, Gloria; Boccasini, Adele; Smaldone, Angela; Oliva, Doretta; Bosco, Andrea

    2014-08-01

    Assessing automatic feedback technologies to promote safe travel and speech loudness control in two men with multiple disabilities, respectively. The men were involved in two single-case studies. In Study I, the technology involved a microprocessor, two photocells, and a verbal feedback device. The man received verbal alerting/feedback when the photocells spotted an obstacle in front of him. In Study II, the technology involved a sound-detecting unit connected to a throat and an airborne microphone, and to a vibration device. Vibration occurred when the man's speech loudness exceeded a preset level. The man included in Study I succeeded in using the automatic feedback in substitution of caregivers' alerting/feedback for safe travel. The man of Study II used the automatic feedback to successfully reduce his speech loudness. Automatic feedback can be highly effective in helping persons with multiple disabilities improve their travel and speech performance.

  18. Bruce NGS A Unit 4 preheater divider plate failure

    International Nuclear Information System (INIS)

    Landridge, M.; McInnes, D.

    1995-01-01

    On May 19, 1995, without any prior operational indications, Bruce A discovered preheater divider plate damage in Unit 4 that had the potential to have a major impact on the continued safe operation of the station. Further investigations indicated that Unit 4 may have been operating with this damage for as long as ten years. In the two months following the discovery, Bruce A has procured and replaced the 4 divider plates, located most of the missing pieces, retrieved pieces from the PHT system, investigated historical operational information, performed detailed analytical investigations, investigated root cause, performed in-situ and mock-up testing, updated operational procedures and installed DP monitoring equipment

  19. High Speed Rail (HSR) in the United States

    Science.gov (United States)

    2009-12-08

    announced that it will expand the capacity on its aging high speed line between Tokyo and Osaka, the most heavily traveled intercity rail segment in the...United States, in most of these countries intercity rail travel (including both conventional and high speed rail) represents less than 10% of all...that is sometimes mentioned by its advocates. Intercity passenger rail transport is relatively safe, at least compared with highway travel . And HSR in

  20. On the safe use of verify-and-record systems in external beam radiation therapy

    International Nuclear Information System (INIS)

    Seelantag, W.W.; Davis, J.B.

    1997-01-01

    Verify-and-record (V and R) systems are being used increasingly, not only for verification, but also for computer aided setup and chart printing. The close intercorrelation between V and R system and treatment routine requires new ideas for quality assurance (QA): pure ''machine checking'' as with treatment units is not sufficient anymore. The level of QA obviously depends on the tasks of the V and R system: the most advanced case of the system being used for computer aided setup and for chart printing is discussed -both are indispensable for an efficient use of V and R systems. Seven propositions are defined to make this not only efficient but safe. (author)

  1. Thermodynamics of asymptotically safe theories

    DEFF Research Database (Denmark)

    Rischke, Dirk H.; Sannino, Francesco

    2015-01-01

    We investigate the thermodynamic properties of a novel class of gauge-Yukawa theories that have recently been shown to be completely asymptotically safe, because their short-distance behaviour is determined by the presence of an interacting fixed point. Not only do all the coupling constants freeze...

  2. How Safe Are Our Libraries?

    Science.gov (United States)

    St. Lifer, Evan

    1994-01-01

    Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…

  3. Patient Involvement in Safe Delivery: A Qualitative Study

    OpenAIRE

    Olfati, Forozun; Asefzadeh, Saeid; Changizi, Nasrin; Keramat, Afsaneh; Yunesian, Masud

    2015-01-01

    Introduction: Patient involvement in safe delivery planning is considered important yet not widely practiced. The present study aimed at identifythe factors that affect patient involvementin safe delivery, as recommended by parturient women. Methods: This study was part of a qualitative research conducted by content analysis method and purposive sampling in 2013. The data were collected through 63 semi-structured interviews in4 hospitalsand analyzed using thematic content analysis. The partic...

  4. Spent fuel pool cooling system upgrade for Kori Unit 1

    International Nuclear Information System (INIS)

    Sun Park, Jong; In Shin, Kyung

    2014-01-01

    Following Fukushima nuclear power plant accident, the needs for reliable performance of its own safety functions of Spent Fuel Pool Cooling System (SFPCS) has risen significantly to maintain the plant in a safe condition. Regulatory Guide 1.13 of United States Nuclear Regulatory Commission (USNRC) requires the SFPCS shall be designed safety related as Quality Group C and Seismic Category 1. However, the existing Spent Fuel Pool (SFP) of KORI Unit 1 was not designed as a safety system. In order to comply with the above licensing requirement for the extended operational life of KORI Unit 1, it has been decided to add a safety related Seismic Category 1 Makeup System to KORI Unit 1 and the existing SFPCS to be modified in dedicated channels with safety related equipment to enhance system's reliability as a means of providing diversity. This paper focuses on describing the relevant design requirements, applications, and supplemental facilities to the SFPCS of KORI Unit 1. (authors)

  5. Safe transport of radioactive materials in Egypt

    International Nuclear Information System (INIS)

    El-Shinawy, R.M.K.

    1994-01-01

    In Egypt the national regulations for safe transport of radioactive materials (RAM) are based on the International Atomic Energy Agency (IAEA) regulations. In addition, regulations for the safe transport of these materials through the Suez Canal (SC) were laid down by the Egyptian Atomic Energy Authority (EAEA) and the Suez Canal Authority (SCA). They are continuously updated to meet the increased knowledge and the gained experience. The technical and protective measures taken during transport of RAM through SC are mentioned. Assessment of the impact of transporting radioactive materials through the Suez Canal using the INTERTRAN computer code was carried out in cooperation with IAEA. The transported activities and empty containers, the number of vessels carrying RAM through the canal from 1963 and 1991 and their nationalities are also discussed. The protective measures are mentioned. A review of the present situation of the radioactive wastes storage facilities at the Atomic Energy site at Inshas is given along with the regulation for safe transportation and disposal of radioactive wastes. (Author)

  6. Can the Ignalina NPP be safe?

    International Nuclear Information System (INIS)

    Kutas, S.

    1999-01-01

    Many countries started using nuclear power before Lithuania, the IAEA and NEA were established and have been functioning efficiently, numerous conventions have been signed that control nuclear activities, nuclear safety regulations and standards have been set. Lithuania which is striving to integrate into the West European structures and to become a member of the 'club' of the world's nuclear states, has become a full and equal member of the IAEA and recognises its recommendations. Furthermore, it has signed or joined international conventions and is doing its best to introduce the practice of controlling nuclear safety applied in western countries. Nuclear safety cannot be taken as something finite that does not change. The requirements of nuclear and radiation safety are continuously redefined taking into consideration scientific discoveries and inventions as well as technical progress. Safety assurance can be the only criterion that should determine whether the nuclear power plant can be operated in Lithuania. The safety analysis report confirmed that the Ignalina NPP can be safely operated until the channel-graphite gap closes. The experiments conducted to date have convincingly shown that by the year 2000 the gap will not close in any of the fuel channels of unit 1. It can be hoped that the submitted studies, analyses and assessments will confirm that the Ignalina NPP meets Lithuania's nuclear safety requirements that have been drawn up in compliance with the recommendations of IAEA

  7. This is my neighborhood: comparing United States and Australian Oxford House Neighborhoods.

    Science.gov (United States)

    Ferrari, Joseph R; Jason, Leonard A; Blake, Ron; Davis, Margaret I; Olson, Bradley D

    2006-01-01

    The number of Oxford Houses, communal-living, mutual help settings for persons in recovery of alcohol and substance abuse, has spread across the United States and recently in and around Melbourne, Australia. In this study 55 US and 6 AU Houses were compared descriptively for their neighborhood characteristics. Across settings, there were greater similarities than significant differences in the locations. Results imply that Australian Oxford Houses are "safe and sober" settings for persons in recovery consistent with the original United States model in physical dwelling settings.

  8. Adapting Certified Safe Farm to North Carolina Agriculture: An Implementation Study.

    Science.gov (United States)

    Storm, Julia F; LePrevost, Catherine E; Tutor-Marcom, Robin; Cope, W Gregory

    2016-01-01

    Certified Safe Farm (CSF) is a multimodal safety and health program developed and assessed through multiple controlled intervention studies in Iowa. Although developed with the intent to be broadly applicable to agriculture, CSF has not been widely implemented outside the midwestern United States. This article describes the CSF implementation process in North Carolina (NC), as piloted on a large-scale in three agriculturally diverse and productive counties of NC, and reports its effectiveness using the Reach Effectiveness Adoption Implementation Maintenance (RE-AIM) framework. Implementation involved (1) capacity building through safety and health training, (2) adaptation of components of Iowa's CSF model to NC agriculture, (3) marketing and recruitment, and (4) formative evaluation, including an online survey and focus group discussion. From 2009 to 2012, 113 farms participated in at least one component of the CSF intervention, representing a NC farm participation rate of 3.1% in the study area. A major adaptation of NC implementation was the utilization of NC Cooperative Extension as the local driver of implementation in contrast to local AgriSafe clinics in Iowa. The most innovative adaptation to CSF components was the development of a defined economic incentive in the form of a cost-share program. The RE-AIM framework was found to be useful and relevant to the field of agricultural health and safety translational research. This study provides effectiveness measures and implementation alternatives useful for those considering implementing CSF. It informs current efforts to move CSF from research to practice through the National Sustainable Model CSF Program initiative.

  9. Factors influencing oncology nurses' use of hazardous drug safe-handling precautions.

    Science.gov (United States)

    Polovich, Martha; Clark, Patricia C

    2012-05-01

    To examine relationships among factors affecting nurses' use of hazardous drug (HD) safe-handling precautions, identify factors that promote or interfere with HD precaution use, and determine managers' perspectives on the use of HD safe-handling precautions. Cross-sectional, mixed methods; mailed survey to nurses who handle chemotherapy and telephone interviews with managers. Mailed invitation to oncology centers across the United States. 165 nurses who reported handling chemotherapy and 20 managers of nurses handling chemotherapy. Instruments measured the use of HD precautions and individual and organizational factors believed to influence precaution use. Data analysis included descriptive statistics and hierarchical regression. Manager interview data were analyzed using content analysis. Chemotherapy exposure knowledge, self-efficacy, perceived barriers, perceived risk, interpersonal influences, and workplace safety climate. Nurses were well educated, experienced, and certified in oncology nursing. The majority worked in outpatient settings and administered chemotherapy to an average of 6.8 patients per day. Exposure knowledge, self-efficacy for using personal protective equipment, and perceived risk of harm from HD exposure were high; total precaution use was low. Nurse characteristics did not predict HD precaution use. Fewer barriers, better workplace safety climate, and fewer patients per day were independent predictors of higher HD precaution use. HD handling policies were present, but many did not reflect current recommendations. Few managers formally monitored nurses' HD precaution use. Circumstances in the workplace interfere with nurses' use of HD precautions. Interventions should include fostering a positive workplace safety climate, reducing barriers, and providing appropriate nurse-patient ratios.

  10. Commercial experience with facility deactivation to safe storage

    Energy Technology Data Exchange (ETDEWEB)

    Sype, T.T. [Sandia National Labs., Albuquerque, NM (United States); Fischer, S.R. [Los Alamos National Lab., NM (United States); Lee, J.H. Jr.; Sanchez, L.C.; Ottinger, C.A.; Pirtle, G.J. [Sandia National Labs., Albuquerque, NM (United States)

    1995-09-01

    The Department of Energy (DOE) has shutdown many production reactors; the Department has begun a major effort to also shutdown a wide variety of other nuclear facilities. Because so many facilities are being closed, it is necessary to place many of them into a safe- storage status, i.e., deactivation, before conducting decommissioning- for perhaps as long as 20 years. The challenge is to achieve this safe-storage condition in a cost-effective manner while remaining in compliance with applicable regulations. The DOE Office of Environmental Management, Office of Transition and Management, commissioned a lessons-learned study of commercial experience with safe storage and decommissioning. Although the majority of the commercial experience has been with reactors, many of the lessons learned presented in this document can provide insight into transitioning challenges that Will be faced by the DOE weapons complex.

  11. Commercial experience with facility deactivation to safe storage

    International Nuclear Information System (INIS)

    Sype, T.T.; Fischer, S.R.; Lee, J.H. Jr.; Sanchez, L.C.; Ottinger, C.A.; Pirtle, G.J.

    1995-09-01

    The Department of Energy (DOE) has shutdown many production reactors; the Department has begun a major effort to also shutdown a wide variety of other nuclear facilities. Because so many facilities are being closed, it is necessary to place many of them into a safe- storage status, i.e., deactivation, before conducting decommissioning- for perhaps as long as 20 years. The challenge is to achieve this safe-storage condition in a cost-effective manner while remaining in compliance with applicable regulations. The DOE Office of Environmental Management, Office of Transition and Management, commissioned a lessons-learned study of commercial experience with safe storage and decommissioning. Although the majority of the commercial experience has been with reactors, many of the lessons learned presented in this document can provide insight into transitioning challenges that Will be faced by the DOE weapons complex

  12. Reactive, Safe Navigation for Lunar and Planetary Robots

    Science.gov (United States)

    Utz, Hans; Ruland, Thomas

    2008-01-01

    When humans return to the moon, Astronauts will be accompanied by robotic helpers. Enabling robots to safely operate near astronauts on the lunar surface has the potential to significantly improve the efficiency of crew surface operations. Safely operating robots in close proximity to astronauts on the lunar surface requires reactive obstacle avoidance capabilities not available on existing planetary robots. In this paper we present work on safe, reactive navigation using a stereo based high-speed terrain analysis and obstacle avoidance system. Advances in the design of the algorithms allow it to run terrain analysis and obstacle avoidance algorithms at full frame rate (30Hz) on off the shelf hardware. The results of this analysis are fed into a fast, reactive path selection module, enforcing the safety of the chosen actions. The key components of the system are discussed and test results are presented.

  13. Organizing Chaos: The Tactical Assault Kit Collaborative Mission Planner

    Science.gov (United States)

    2018-12-01

    varied communication methods. Units primarily communicated to HQ via existing commercial encrypted chat tools over cellular or wifi. Each country...wants to use existing commercial cell towers, Wave Relay or ANW2 technology. This permits SOF operators to choose the best mean of communication for...in Iraq and Syria, highlight the vast potential for this emerging technology. Enhancing TAK from a situational awareness tool and communications

  14. Implementation of real-time duplex synthetic aperture ultrasonography

    DEFF Research Database (Denmark)

    Hemmsen, Martin Christian; Larsen, Lee; Kjeldsen, Thomas

    2015-01-01

    This paper presents a real-time duplex synthetic aperture imaging system, implemented on a commercially available tablet. This includes real-time wireless reception of ultrasound signals and GPU processing for B-mode and Color Flow Imaging (CFM). The objective of the work is to investigate the im...... and that the required bandwidth between the probe and processing unit is within the current Wi-Fi standards....

  15. Procedures for the Safe Transport of Radioactive Material

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jang Lyul; Chung, K. K.; Lee, J. I.; Chang, S. Y.; Lee, T. Y

    2007-11-15

    This technical report describes the procedure and work responsibility along with the regulation and standard necessary for the safe transport of radioactive or contaminated materials. This report, therefore, can be effectively used to secure the public safety as well as to prevent the disastrous event which might be resulted from the transport process of radioactive materials by establishing a procedure and method on the safe packing, handling and transport of radioactive materials.

  16. "Safe Zone" Classrooms: The Individual Student versus the Community

    Science.gov (United States)

    Kruk, Amber

    2013-01-01

    Independence Day School is a small college preparatory school serving grades 9-12, in rural Illinois. As part of its commitment to creating a safe school for all students, it adopted a "safe zone" classrooms policy. The policy states that classrooms where conversation about homosexuality is permitted are marked with inverted pink…

  17. Modelling Energy Consumption in Embedded Systems with VDM-RT

    DEFF Research Database (Denmark)

    Esparza Isasa, Jose Antonio; Jørgensen, Peter Würtz Vinther; Nielsen, Claus Ballegård

    2014-01-01

    Indoor positioning systems are increasingly being deployed to enable indoor navigation and other indoor location-based services. Systems based on Wi-Fi and video cameras rely on different technologies and techniques and have so far been developed independently by different research communities; we...... show that integrating information provided by a video system into a Wi-Fi based system increases its maintainability and avoid drops in accuracy over time. Specifically, we consider a Wi-Fi system that uses fingerprints measurements collected in the space for positioning. We improve the system's room......-level accuracy by means of automatic, video-driven collection of fingerprints. Our method is able to relate a Wi-Fi user to unidentified movements detected by cameras by exploiting the existing Wi-Fi system, thus generating fingerprints automatically. This use of video for fingerprint collection reduces the need...

  18. Pretty Easy Pervasive Positioning

    DEFF Research Database (Denmark)

    Hansen, Rene; Wind, Rico; Jensen, Christian Søndergaard

    2009-01-01

    With the increasing availability of positioning based on GPS, Wi-Fi, and cellular technologies and the proliferation of mobile devices with GPS, Wi-Fi and cellular connectivity, ubiquitous positioning is becoming a reality. While offerings by companies such as Google, Skyhook, and Spotigo render...... positioning possible in outdoor settings, including urban environments with limited GPS coverage, they remain unable to offer accurate indoor positioning. We will demonstrate a software infrastructure that makes it easy for anybody to build support for accurate Wi-Fi based positioning in buildings. All...... that is needed is a building with Wi-Fi coverage, access to the building, a floor plan of the building, and a Wi-Fi enabled device. Specifically, we will explain the software infrastructure and the steps that must be completed to obtain support for positioning. And we will demonstrate the positioning obtained...

  19. Electricity and generator availability in LMIC hospitals: improving access to safe surgery.

    Science.gov (United States)

    Chawla, Sagar; Kurani, Shaheen; Wren, Sherry M; Stewart, Barclay; Burnham, Gilbert; Kushner, Adam; McIntyre, Thomas

    2018-03-01

    Access to reliable energy has been identified as a global priority and codified within United Nations Sustainable Goal 7 and the Electrify Africa Act of 2015. Reliable hospital access to electricity is necessary to provide safe surgical care. The current state of electrical availability in hospitals in low- and middle-income countries (LMICs) throughout the world is not well known. This study aimed to review the surgical capacity literature and document the availability of electricity and generators. Using Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines, a systematic search for surgical capacity assessments in LMICs in MEDLINE, PubMed, and World Health Organization Global Health Library was performed. Data regarding electricity and generator availability were extracted. Estimated percentages for individual countries were calculated. Of 76 articles identified, 21 reported electricity availability, totaling 528 hospitals. Continuous electricity availability at hospitals providing surgical care was 312/528 (59.1%). Generator availability was 309/427 (72.4%). Estimated continuous electricity availability ranged from 0% (Sierra Leone and Malawi) to 100% (Iran); estimated generator availability was 14% (Somalia) to 97.6% (Iran). Less than two-thirds of hospitals providing surgical care in 21 LMICs have a continuous electricity source or have an available generator. Efforts are needed to improve electricity infrastructure at hospitals to assure safe surgical care. Future research should look at the effect of energy availability on surgical care and patient outcomes and novel methods of powering surgical equipment. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Inherently safe reactors

    International Nuclear Information System (INIS)

    Maartensson, Anders

    1992-01-01

    A rethinking of nuclear reactor safety has created proposals for new designs based on inherent and passive safety principles. Diverging interpretations of these concepts can be found. This article reviews the key features of proposed advanced power reactors. An evaluation is made of the degree of inherent safety for four different designs: the AP-600, the PIUS, the MHTGR and the PRISM. The inherent hazards of today's most common reactor principles are used as reference for the evaluation. It is concluded that claims for the new designs being inherently, naturally or passively safe are not substantiated by experience. (author)