WorldWideScience

Sample records for securing and joining equipment

  1. Loosening and damage mechanism of thread-joined structures in nuclear power equipment

    International Nuclear Information System (INIS)

    Tang Hui

    1999-01-01

    The author proposes a loosening mechanism of thread-joined structures under vibrate environments in the nuclear power equipment and structures, which is on the base of the macro and imperceptible-mechanics analysis. It has answered the problems on the seizing, the adhesive wearing, the generation of cracks, the thread-tooth fracture. So it has a conclusion that the loosening of thread-joined structures is essential trend, in other words, the locking property of thread-pair is failure under vibrate environments

  2. 33 CFR 105.250 - Security systems and equipment maintenance.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... include procedures for identifying and responding to security system and equipment failures or...

  3. 33 CFR 104.260 - Security systems and equipment maintenance.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... procedures for identifying and responding to security system and equipment failures or malfunctions. ...

  4. 33 CFR 106.255 - Security systems and equipment maintenance.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance. (a) Security systems and equipment must be in good working order and inspected, tested, calibrated, and...

  5. MICROWAVE JOINING OF ALUMINA CERAMIC AND HYDROXYLAPATITE BIOCERAMIC

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    Microwave joining is a rapid developmental new techniqu e in recent years.This paper introduces a new microwave joining equipment which was made by our lab,succeeds in alumina ceramic-hydroxylapatite bioceramic j o in in the equipment, and analyzes the join situation of join boundary by using s canni ng electron microscope(SEM),this paper analyzes the mechanism of microwave joini ng also.

  6. Equipment for radiography in Yugoslavia - security and radiation protection

    International Nuclear Information System (INIS)

    Dobrijevic, R.; Vucina, J.

    1998-01-01

    Nondestructive method of material control by using radioisotopes is developed in Yugoslavia. This method of quality control is professionally performed by 30 firms. This paper presents the overview of the equipment used in the industrial radiography by using radioisotopes. Special attention was devoted to the security during the work and to the radiation protection of the operator and other personnel around the working place. In general it could be concluded that the main drawback which influences the security is the fact that most cases old and whom out equipment is in use. Other factors influencing the security are also discussed. (author)

  7. Lack of security of networked medical equipment in radiology.

    Science.gov (United States)

    Moses, Vinu; Korah, Ipeson

    2015-02-01

    OBJECTIVE. There are few articles in the literature describing the security and safety aspects of networked medical equipment in radiology departments. Most radiologists are unaware of the security issues. We review the security of the networked medical equipment of a typical radiology department. MATERIALS AND METHODS. All networked medical equipment in a radiology department was scanned for vulnerabilities with a port scanner and a network vulnerability scanner, and the vulnerabilities were classified using the Common Vulnerability Scoring System. A network sniffer was used to capture and analyze traffic on the radiology network for exposure of confidential patient data. We reviewed the use of antivirus software and firewalls on the networked medical equipment. USB ports and CD and DVD drives in the networked medical equipment were tested to see whether they allowed unauthorized access. Implementation of the virtual private network (VPN) that vendors use to access the radiology network was reviewed. RESULTS. Most of the networked medical equipment in our radiology department used vulnerable software with open ports and services. Of the 144 items scanned, 64 (44%) had at least one critical vulnerability, and 119 (83%) had at least one high-risk vulnerability. Most equipment did not encrypt traffic and allowed capture of confidential patient data. Of the 144 items scanned, two (1%) used antivirus software and three (2%) had a firewall enabled. The USB ports were not secure on 49 of the 58 (84%) items with USB ports, and the CD or DVD drive was not secure on 17 of the 31 (55%) items with a CD or DVD drive. One of three vendors had an insecure implementation of VPN access. CONCLUSION. Radiologists and the medical industry need to urgently review and rectify the security issues in existing networked medical equipment. We hope that the results of our study and this article also raise awareness among radiologists about the security issues of networked medical equipment.

  8. Face recognition in securing optical telecom network equipment

    International Nuclear Information System (INIS)

    Ali, N.M.

    2015-01-01

    In this paper, face recognition is used with a microcontroller based hardware module to secure the telecommunication equipments like ONU (optical network units) or any other telecommunication equipment. The face recognition classifier value optimization adaption is deployed and in this scheme by increasing or decreasing the number of images in the database will automatically generate and adopt the classifier value for recognition of known and unknown persons. On recognizing and unknown persons. On recognizing an unknown person, the hardware module will send an SMS to the concerned security personnel for security preventive measures. (author)

  9. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  10. Precision Joining Center

    Science.gov (United States)

    Powell, J. W.; Westphal, D. A.

    1991-08-01

    A workshop to obtain input from industry on the establishment of the Precision Joining Center (PJC) was held on July 10-12, 1991. The PJC is a center for training Joining Technologists in advanced joining techniques and concepts in order to promote the competitiveness of U.S. industry. The center will be established as part of the DOE Defense Programs Technology Commercialization Initiative, and operated by EG&G Rocky Flats in cooperation with the American Welding Society and the Colorado School of Mines Center for Welding and Joining Research. The overall objectives of the workshop were to validate the need for a Joining Technologists to fill the gap between the welding operator and the welding engineer, and to assure that the PJC will train individuals to satisfy that need. The consensus of the workshop participants was that the Joining Technologist is a necessary position in industry, and is currently used, with some variation, by many companies. It was agreed that the PJC core curriculum, as presented, would produce a Joining Technologist of value to industries that use precision joining techniques. The advantage of the PJC would be to train the Joining Technologist much more quickly and more completely. The proposed emphasis of the PJC curriculum on equipment intensive and hands-on training was judged to be essential.

  11. 41 CFR 101-26.507 - Security equipment.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Security equipment. 101-26.507 Section 101-26.507 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 26-PROCUREMENT SOURCES AND...

  12. Research and Development Opportunities for Joining Technologies in HVAC&R

    Energy Technology Data Exchange (ETDEWEB)

    Goetzler, William [Navigant Consulting, Burlington, MA (United States); Guernsey, Matt [Navigant Consulting, Burlington, MA (United States); Young, Jim [Navigant Consulting, Burlington, MA (United States)

    2015-10-01

    The Building Technologies Office (BTO) works with researchers and industry partners to develop and deploy technologies that can substantially reduce energy consumption and greenhouse gas (GHG) emissions in residential and commercial buildings. This opportunity assessment aims to advance BTO’s energy savings, GHG reduction, and other program goals by identifying research and development (R&D) initiatives for joining technologies in heating, ventilation, air-conditioning, and refrigeration (HVAC&R) systems. Improving joining technologies for HVAC&R equipment has the potential to increase lifetime equipment operating efficiency, decrease equipment and project cost, and most importantly reduce hydroflourocarbon (HFC) refrigerant leakage to support HFC phasedown and GHG reduction goals.

  13. 40 CFR 1068.225 - What are the provisions for exempting engines/equipment for national security?

    Science.gov (United States)

    2010-07-01

    ... engines/equipment for national security? 1068.225 Section 1068.225 Protection of Environment ENVIRONMENTAL...) Manufacturers may request a national security exemption for engines/equipment not meeting the conditions of... applicable): (i) “THIS ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1068.225.” (ii) “THIS...

  14. 48 CFR 252.239-7016 - Telecommunications security equipment, devices, techniques, and services.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Telecommunications... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions And Clauses 252.239-7016 Telecommunications... clause: Telecommunications Security Equipment, Devices, Techniques, and Services (DEC 1991) (a...

  15. The MCNP simulation of the X-ray leakage of X-ray security inspection equipment

    International Nuclear Information System (INIS)

    Wang Kai; Liu Bin; Hu Wenchao; Zhao Wei

    2011-01-01

    Objective: To simulate the radiation leakage of the X-ray security inspection equipment used in the subways stations. Methods: We use the MCNP4C code to simulate the X-ray leakage of the equipment during the working process. Result: the biggest amount of radiation received by the body is 8.26 μSv/a, however, if the Lead screens of the X-ray security equipment is intact, the amount of radiation received by the body is only 0.0727 μSv/a. The final. Conclusions: When the baggage get in /out the X-ray security inspection equipment, the gas in Lead screens was made, and then the amount of radiation received by human body increased; The amount of radiation received by the body is close to but still below 10 μSv/a which is the exemption criteria set by the 'safety of radiation sources of ionizing radiation protection and basic standards'(GB18871-2002). (authors)

  16. The research on information security technology for the industrial control system of special equipment

    International Nuclear Information System (INIS)

    Chen Ligang; Liu Hongye; Zhang Wei; Sun Jianying; Lan Peng; Dai Sidan

    2014-01-01

    With the rapid development of information technology in enterprise application, industrial control network and management network is becoming more and more closely linked. Development and application of special equipment control system from the traditional industrial control system, not considered when designing communication security problem mainly, therefore, the industrial control system opened at the same time, isolation control system and the outside was weakened, the safety problems of industrial control system had become more and more serious. The practical application combined with the special equipment control system, analysis and elaboration in view of security problems for the control network, also, provide appropriate security solutions for professional characteristics of industrial control network, design on process control system specially, provide security partition protection scheme, in order to improve security ability of industrial control system information. (authors)

  17. Hardware Module for the Security Enhancement of Optical Telecom Network Equipment

    International Nuclear Information System (INIS)

    Nadeem; Ali, M.

    2015-01-01

    The telecommunication equipment physical security threats have increased not only in Pakistan but also anywhere in the world and hence, reducing the revenue. This new challenging and alarming situation is created for the telecom network provider. The main focus of this paper is to provide a low cost economical design for reducing the theft of the costly telecommunication equipment like optical network units (ONU). This system is based on instant messaging on the mobile in the event of theft through GSM modem. The proposed security module is dynamic, flexible and can also be integrated in the existing networks and separately having its own independent low power consumption source. The module will continuously work successfully under different scenarios such as completely isolated from other devices by power break down or by fibre cut. (author)

  18. Effectiveness of Taxicab Security Equipment in Reducing Driver Homicide Rates

    Science.gov (United States)

    Menéndez, Cammie K.C.; Amandus, Harlan E.; Damadi, Parisa; Wu, Nan; Konda, Srinivas; Hendricks, Scott A.

    2015-01-01

    Background Taxicab drivers historically have had one of the highest work-related homicide rates of any occupation. In 2010 the taxicab driver homicide rate was 7.4 per 100,000 drivers, compared to the overall rate of 0.37 per 100,000 workers. Purpose Evaluate the effectiveness of taxicab security cameras and partitions on citywide taxicab driver homicide rates. Methods Taxicab driver homicide rates were compared in 26 major cities in the U.S. licensing taxicabs with security cameras (n=8); bullet-resistant partitions (n=7); and cities where taxicabs were not equipped with either security cameras or partitions (n=11). News clippings of taxicab driver homicides and the number of licensed taxicabs by city were used to construct taxicab driver homicide rates spanning 15 years (1996–2010). Generalized estimating equations were constructed to model the Poisson-distributed homicide rates on city-specific safety equipment installation status, controlling for city homicide rate and the concurrent decline of homicide rates over time. Data were analyzed in 2012. Results Cities with cameras experienced a threefold reduction in taxicab driver homicides compared with control cities (RR=0.27; 95% CI=0.12, 0.61; p=0.002). There was no difference in homicide rates for cities with partitions compared with control cities (RR=1.15; 95% CI=0.80, 1.64; p=0.575). Conclusions Municipal ordinances and company policies mandating security cameras appear to be highly effective in reducing taxicab driver deaths due to workplace violence. PMID:23790983

  19. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  20. Development of ion/proton beam equipment for industrial uses

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Byung Ho; Lee, J. H.; Cho, Y. S.; Joo, P. K.; Kang, S. S.; Song, W. S.; Kim, H. J.; Chang, G. H.; Bang, S. W

    1999-12-01

    KAERI has possessed design and fabrication technologies of various ion sources including Duoplasmatron and DuoPiGatron developed by R and D projects of the long-term nuclear technology development program. In order to industrialize ion beam equipments utilizing these ion sources, a technology transfer project for a technology transfer project for a domestic firm has been performed. Under this project, engineers of the firm have been trained through classroom lectures of ion beam principles and OJT, an ion/proton beam equipment (DEMO equipment) has been designed, assembled and commissioned jointly with the engineers. Quality of the ion sources has been quantified, and technologies for ion beam equipment construction, functional test and application research have been developed. The DEMO equipment, which consists of an ion source, power supplies, vacuum, cooling and target systems, has been fabricated and tested to secure stability and reliability for industrial uses. Various characteristic tests including high voltage insulation, beam extraction, beam current measuring, etc. have been performed. This DEMO can be utilized for ion sources development as well as ion beam process development for various industrial products. Engineers of the firm have been trained for the industrialization of ion beam equipment and joined in beam application technology development to create industrial needs of beam equipment. (author)

  1. 46 CFR 56.75-30 - Pipe joining details.

    Science.gov (United States)

    2010-10-01

    ... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PIPING SYSTEMS AND... cut or machined square and the edges shall be held closely together to insure a satisfactory joint. (b... satisfactory for the brazing alloy to be employed, method of heating, and material to be joined. The annular...

  2. Fast and scalable inequality joins

    KAUST Repository

    Khayyat, Zuhair

    2016-09-07

    Inequality joins, which is to join relations with inequality conditions, are used in various applications. Optimizing joins has been the subject of intensive research ranging from efficient join algorithms such as sort-merge join, to the use of efficient indices such as (Formula presented.)-tree, (Formula presented.)-tree and Bitmap. However, inequality joins have received little attention and queries containing such joins are notably very slow. In this paper, we introduce fast inequality join algorithms based on sorted arrays and space-efficient bit-arrays. We further introduce a simple method to estimate the selectivity of inequality joins which is then used to optimize multiple predicate queries and multi-way joins. Moreover, we study an incremental inequality join algorithm to handle scenarios where data keeps changing. We have implemented a centralized version of these algorithms on top of PostgreSQL, a distributed version on top of Spark SQL, and an existing data cleaning system, Nadeef. By comparing our algorithms against well-known optimization techniques for inequality joins, we show our solution is more scalable and several orders of magnitude faster. © 2016 Springer-Verlag Berlin Heidelberg

  3. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  4. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  5. Current state of commercial radiation detection equipment for homeland security applications

    International Nuclear Information System (INIS)

    Klann, R.T.; Shergur, J.; Mattesich, G.

    2009-01-01

    With the creation of the U.S. Department of Homeland Security (DHS) came the increased concern that terrorist groups would attempt to manufacture and use an improvised nuclear device or radiological dispersal device. As such, a primary mission of DHS is to protect the public against the use of these devices and to assist state and local responders in finding, locating, and identifying these types of devices and materials used to manufacture these devices. This assistance from DHS to state and local responders comes in the form of grant money to procure radiation detection equipment. In addition to this grant program, DHS has supported the development of American National Standards Institute standards for radiation detection equipment and has conducted testing of commercially available instruments. This paper identifies the types and kinds of commercially available equipment that can be used to detect and identify radiological material - for use in traditional search applications as well as primary and secondary screening of personnel, vehicles, and cargo containers. In doing so, key considerations for the conduct of operations are described as well as critical features of the instruments for specific applications. The current state of commercial instruments is described for different categories of detection equipment including personal radiation detectors, radioisotope identifiers, man-portable detection equipment, and radiation portal monitors. In addition, emerging technologies are also discussed, such as spectroscopic detectors and advanced spectroscopic portal monitors

  6. Secure videoconferencing equipment switching system and method

    Science.gov (United States)

    Hansen, Michael E [Livermore, CA

    2009-01-13

    A switching system and method are provided to facilitate use of videoconference facilities over a plurality of security levels. The system includes a switch coupled to a plurality of codecs and communication networks. Audio/Visual peripheral components are connected to the switch. The switch couples control and data signals between the Audio/Visual peripheral components and one but nor both of the plurality of codecs. The switch additionally couples communication networks of the appropriate security level to each of the codecs. In this manner, a videoconferencing facility is provided for use on both secure and non-secure networks.

  7. Mobile Real-time Tracking of Acute Stroke Patients and Instant, Secure Inter-team Communication - the Join App.

    Science.gov (United States)

    Munich, Stephan A; Tan, Lee A; Nogueira, Danilo M; Keigher, Kiffon M; Chen, Michael; Crowley, R Webster; Conners, James J; Lopes, Demetrius K

    2017-09-01

    The primary correlate to survival and preservation of neurologic function in patients suffering from an acute ischemic stroke is time from symptom onset to initiation of therapy and reperfusion. Communication and coordination among members of the stroke team are essential to maximizing efficiency and subsequently early reperfusion. In this work, we aim to describe our preliminary experience using the Join mobile application as a means to improve interdisciplinary team communication and efficiency. We describe our pilot experience with the initiation of the Join mobile application between July 2015 and July 2016. With this application, a mobile beacon is transported with the patient on the ambulance. Transportation milestone timestamps and geographic coordinates are transmitted to the treating facility and instantly communicated to all treatment team members. The transport team / patient can be tracked en route to the treating facility. During our pilot study, 62 patients were triaged and managed using the Join application. Automated time-stamping of critical events, geographic tracking of patient transport and summary documents were obtained for all patients. Treatment team members had an overall favorable impression of the Join application and recommended its continued use. The Join application is one of several components of a multi-institutional, interdisciplinary effort to improve the treatment of patients with acute ischemic stroke. The ability of the treatment team to track patient transport and communicate with the transporting team may improve reperfusion time and, therefore, improve neurologic outcomes.

  8. Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home

    NARCIS (Netherlands)

    Wolthuis, R.; Broenink, E.G.; Fransen, F.; Schultz, S.; Vries, A. de

    2010-01-01

    This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more

  9. Lightning Fast and Space Efficient Inequality Joins

    KAUST Repository

    Khayyat, Zuhair

    2015-09-01

    Inequality joins, which join relational tables on inequality conditions, are used in various applications. While there have been a wide range of optimization methods for joins in database systems, from algorithms such as sort-merge join and band join, to various indices such as B+-tree,R*-tree and Bitmap, inequality joins have received little attention and queries containing such joins are usually very slow. In this paper, we introduce fast inequality join algorithms. We put columns to be joined in sorted arrays and we use permutation arrays to encode positions of tuples in one sorted array w.r.t. the other sorted array. In contrast to sort-merge join, we use space effcient bit-arrays that enable optimizations, such as Bloom filter indices, for fast computation of the join results. We have implemented a centralized version of these algorithms on top of PostgreSQL, and a distributed version on top of Spark SQL. We have compared against well known optimization techniques for inequality joins and show that our solution is more scalable and several orders of magnitude faster.

  10. Lightning fast and space efficient inequality joins

    KAUST Repository

    Khayyat, Zuhair

    2015-09-01

    Inequality joins, which join relational tables on inequality conditions, are used in various applications. While there have been a wide range of optimization methods for joins in database systems, from algorithms such as sort-merge join and band join, to various indices such as B+-tree, R*-tree and Bitmap, inequality joins have received little attention and queries containing such joins are usually very slow. In this paper, we introduce fast inequality join algorithms. We put columns to be joined in sorted arrays and we use permutation arrays to encode positions of tuples in one sorted array w.r.t. the other sorted array. In contrast to sort-merge join, we use space efficient bit-arrays that enable optimizations, such as Bloom filter indices, for fast computation of the join results. We have implemented a centralized version of these algorithms on top of PostgreSQL, and a distributed version on top of Spark SQL. We have compared against well known optimization techniques for inequality joins and show that our solution is more scalable and several orders of magnitude faster.

  11. Lightning fast and space efficient inequality joins

    KAUST Repository

    Khayyat, Zuhair; Lucia, William; Singh, Meghna; Ouzzani, Mourad; Papotti, Paolo; Quiané -Ruiz, Jorge-Arnulfo; Tang, Nan; Kalnis, Panos

    2015-01-01

    Inequality joins, which join relational tables on inequality conditions, are used in various applications. While there have been a wide range of optimization methods for joins in database systems, from algorithms such as sort-merge join and band join, to various indices such as B+-tree, R*-tree and Bitmap, inequality joins have received little attention and queries containing such joins are usually very slow. In this paper, we introduce fast inequality join algorithms. We put columns to be joined in sorted arrays and we use permutation arrays to encode positions of tuples in one sorted array w.r.t. the other sorted array. In contrast to sort-merge join, we use space efficient bit-arrays that enable optimizations, such as Bloom filter indices, for fast computation of the join results. We have implemented a centralized version of these algorithms on top of PostgreSQL, and a distributed version on top of Spark SQL. We have compared against well known optimization techniques for inequality joins and show that our solution is more scalable and several orders of magnitude faster.

  12. The Use of Explosive Forming for Fastening and Joining Structural and Pressure Components

    Science.gov (United States)

    Schroeder, J. W.

    1985-01-01

    Explosive expansion of tubes into tubesheets has been used for over 20 years in the fabrication and repair of shell and tube heat exchangers. The use of explosives to perform these expansions has offered several distinct advantages over other methods. First, the process is fast and economical and can be performed with minimal training of personnel. Secondly, explosive forming does not cause the deleterious metallurgical effects which often result from other forming operations. In addition, the process can be performed remotely without the need for sophisticated handling equipment. The expansion of tubes into tubesheets is only one of many possible fastening and joining applications for which explosive forming can be used to achieve highly successful results. The explosive forming process and where it has been used are described. In addition, some possible adaptations to other joining applications are identified and discussed.

  13. Welding and Joining of Titanium Aluminides

    Science.gov (United States)

    Cao, Jian; Qi, Junlei; Song, Xiaoguo; Feng, Jicai

    2014-01-01

    Welding and joining of titanium aluminides is the key to making them more attractive in industrial fields. The purpose of this review is to provide a comprehensive overview of recent progress in welding and joining of titanium aluminides, as well as to introduce current research and application. The possible methods available for titanium aluminides involve brazing, diffusion bonding, fusion welding, friction welding and reactive joining. Of the numerous methods, solid-state diffusion bonding and vacuum brazing have been most heavily investigated for producing reliable joints. The current state of understanding and development of every welding and joining method for titanium aluminides is addressed respectively. The focus is on the fundamental understanding of microstructure characteristics and processing–microstructure–property relationships in the welding and joining of titanium aluminides to themselves and to other materials. PMID:28788113

  14. Welding and Joining of Titanium Aluminides

    Directory of Open Access Journals (Sweden)

    Jian Cao

    2014-06-01

    Full Text Available Welding and joining of titanium aluminides is the key to making them more attractive in industrial fields. The purpose of this review is to provide a comprehensive overview of recent progress in welding and joining of titanium aluminides, as well as to introduce current research and application. The possible methods available for titanium aluminides involve brazing, diffusion bonding, fusion welding, friction welding and reactive joining. Of the numerous methods, solid-state diffusion bonding and vacuum brazing have been most heavily investigated for producing reliable joints. The current state of understanding and development of every welding and joining method for titanium aluminides is addressed respectively. The focus is on the fundamental understanding of microstructure characteristics and processing–microstructure–property relationships in the welding and joining of titanium aluminides to themselves and to other materials.

  15. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  16. Joining of advanced materials

    CERN Document Server

    Messler, Robert W

    1993-01-01

    Provides an unusually complete and readable compilation of the primary and secondary options for joining conventional materials in non-conventional ways. Provides unique coverage of adhesive bonding using both organic and inorganic adhesives, cements and mortars. Focuses on materials issues without ignoring issues related to joint design, production processing, quality assurance, process economics, and joining performance in service.Joining of advanced materials is a unique treatment of joining of both conventional and advanced metals andalloys, intermetallics, ceramics, glasses, polymers, a

  17. National security and the constitutional right to join military trade ...

    African Journals Online (AJOL)

    The unionisation of the South African Military Forces has tested both lawyers and the South African legal system. However, there is very little academic commentary on this important subject. In this article, the policy, which allowed the unionisation of the South African military, the influence of the policy on national security, ...

  18. Joining by plastic deformation

    DEFF Research Database (Denmark)

    Mori, Ken-ichiro; Bay, Niels; Fratini, Livan

    2013-01-01

    As the scale and complexity of products such as aircraft and cars increase, demand for new functional processes to join mechanical parts grows. The use of plastic deformation for joining parts potentially offers improved accuracy, reliability and environmental safety as well as creating opportuni......As the scale and complexity of products such as aircraft and cars increase, demand for new functional processes to join mechanical parts grows. The use of plastic deformation for joining parts potentially offers improved accuracy, reliability and environmental safety as well as creating...

  19. Data Center Equipment Location and Monitoring System

    DEFF Research Database (Denmark)

    2013-01-01

    Abstract: Data center equipment location systems include hardware and software to provide information on the location, monitoring, and security of servers and other equipment in equipment racks. The systems provide a wired alternative to the wireless RFID tag system by using electronic ID tags...... connected to each piece of equipment, each electronic ID tag connected directly by wires to an equipment rack controller on the equipment rack. The equipment rack controllers link to a central control computer that provides an operator ...

  20. Ceramic joining

    Energy Technology Data Exchange (ETDEWEB)

    Loehman, R.E. [Sandia National Lab., Albuquerque, NM (United States)

    1996-04-01

    This paper describes the relation between reactions at ceramic-metal interfaces and the development of strong interfacial bonds in ceramic joining. Studies on a number of systems are described, including silicon nitrides, aluminium nitrides, mullite, and aluminium oxides. Joints can be weakened by stresses such as thermal expansion mismatch. Ceramic joining is used in a variety of applications such as solid oxide fuel cells.

  1. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  2. Education and training for security personnel

    International Nuclear Information System (INIS)

    Chida, Toshiya

    2015-01-01

    It is said that Physical Protection (PP) has two purposes. One is to prevent from occurring risks of threat and terrorism and the other is to minimize damages which will be happened in case of unusual conditions or emergency situation. To achieve this goal, personnel who perform their duties should have professional knowledge and skills concerning security. However, since newcomers rarely satisfy their knowledge and skill for nuclear security in most cases. Therefore, we have to provide adequate education and training after they joined to our company. To this end, our company, located in Aomori Prefecture focused on security and physical protection for nuclear related facilities. In this paper, personnel training and challenges in order to bring up security personnel at our company will be introduced. (author)

  3. Chrysler Upset Protrusion Joining Techniques for Joining Dissimilar Metals

    Energy Technology Data Exchange (ETDEWEB)

    Logan, Stephen [FCA US LLC, Auburn Hills, MI (United States)

    2017-09-28

    The project goal was to develop and demonstrate a robust, cost effective, and versatile joining technique, known as Upset Protrusion Joining (UPJ), for joining challenging dissimilar metal com-binations, especially those where one of the metals is a die cast magnesium (Mg) component. Since two of the key obstacles preventing more widespread use of light metals (especially in high volume automotive applications) are 1) a lack of robust joining techniques and 2) susceptibility to galvanic corrosion, and since the majority of the joint combinations evaluated in this project include die cast Mg (the lightest structural metal) as one of the two materials being joined, and since die casting is the most common and cost effective process for producing Mg components, then successful project completion provides a key enabler to high volume application of lightweight materials, thus potentially leading to reduced costs, and encouraging implementation of lightweight multi-material vehicles for significant reductions in energy consumption and reduced greenhouse gas emissions. Eco-nomic benefits to end-use consumers are achieved primarily via the reduction in fuel consumption. Unlike currently available commercial processes, the UPJ process relies on a very robust mechanical joint rather than intermetallic bonding, so the more cathodic material can be coated prior to joining, thus creating a robust isolation against galvanic attack on the more anodic material. Additionally, since the UPJ protrusion is going through a hole that can be pre-drilled or pre-punched prior to coating, the UPJ process is less likely to damage the coating when the joint is being made. Further-more, since there is no additional cathodic material (such as a steel fastener) used to create the joint, there is no joining induced galvanic activity beyond that of the two parent materials. In accordance with its originally proposed plan, this project has successfully developed process variants of UPJ to enable

  4. Kuwait: Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-09-29

    Gulf Cooperation Council (GCC: Saudi Arabia, Kuwait, UAE, Qatar, Bahrain, and Oman). In March 2011, Kuwait joined a GCC military intervention to...before the start of [2013]”—a statement that furthered Iraq’s argument that the U.N. Security Council should remove any remaining “Chapter 7” (of the...with alternative mechanisms, as discussed below. On December 15, 2010, the U.N. Security Council passed three resolutions—1956, 1957, and 1958—that

  5. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  6. Generic data base for security equipment and its utility in the safeguards inspection process. Final report 8151-79-FR-16

    International Nuclear Information System (INIS)

    Scala, S.

    1979-01-01

    This report contains material presented at the Nuclear Regulatory Commission (NRC) conference of regional inspectors in Atlanta, Georgia, on January 17, 1979. It describes the contents of the generic data base for security equipment, which was developed by SRI for NRC under a Sandia Laboratories' subcontract, and examines its potential utility in the process of inspection of NRC-licensed facilities

  7. Join Operations in Temporal Databases

    DEFF Research Database (Denmark)

    Gao, D.; Jensen, Christian Søndergaard; Snodgrass, R.T.

    2005-01-01

    Joins are arguably the most important relational operators. Poor implementations are tantamount to computing the Cartesian product of the input relations. In a temporal database, the problem is more acute for two reasons. First, conventional techniques are designed for the evaluation of joins...... with equality predicates rather than the inequality predicates prevalent in valid-time queries. Second, the presence of temporally varying data dramatically increases the size of a database. These factors indicate that specialized techniques are needed to efficiently evaluate temporal joins. We address...... this need for efficient join evaluation in temporal databases. Our purpose is twofold. We first survey all previously proposed temporal join operators. While many temporal join operators have been defined in previous work, this work has been done largely in isolation from competing proposals, with little...

  8. Conjoint Forming - Technologies for Simultaneous Forming and Joining

    International Nuclear Information System (INIS)

    Groche, P; Wohletz, S; Mann, A; Krech, M; Monnerjahn, V

    2016-01-01

    The market demand for new products optimized for e. g. lightweight applications or smart components leads to new challenges in production engineering. Hybrid structures represent one promising approach. They aim at higher product performance by using a suitable combination of different materials. The developments of hybrid structures stimulate the research on joining of dissimilar materials. Since they allow for joining dissimilar materials without external heating technologies based on joining by plastic deformation seem to be of special attractiveness. The paper at hand discusses the conjoint forming approach. This approach combines forming and joining in one process. Two or more workpieces are joined while at least one workpiece is plastically deformed. After presenting the fundamental joining mechanisms, the conjoint forming approach is discussed comprehensively. Examples of conjoint processes demonstrate the effectiveness and reveal the underlying phenomena. (paper)

  9. Blind-date Conversation Joining

    Directory of Open Access Journals (Sweden)

    Luca Cesari

    2013-07-01

    Full Text Available We focus on a form of joining conversations among multiple parties in service-oriented applications where a client may asynchronously join an existing conversation without need to know in advance any information about it. More specifically, we show how the correlation mechanism provided by orchestration languages enables a form of conversation joining that is completely transparent to clients and that we call 'blind-date joining'. We provide an implementation of this strategy by using the standard orchestration language WS-BPEL. We then present its formal semantics by resorting to COWS, a process calculus specifically designed for modelling service-oriented applications. We illustrate our approach by means of a simple, but realistic, case study from the online games domain.

  10. 46 CFR 121.702 - Pollution prevention equipment and procedures.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Pollution prevention equipment and procedures. 121.702 Section 121.702 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS... CONTROL AND MISCELLANEOUS SYSTEMS AND EQUIPMENT Miscellaneous § 121.702 Pollution prevention equipment and...

  11. 46 CFR 184.702 - Pollution prevention equipment and procedures.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Pollution prevention equipment and procedures. 184.702 Section 184.702 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS... Pollution prevention equipment and procedures. A vessel must comply with the applicable design, equipment...

  12. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner\\'s signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  13. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin; Papadias, Dimitris; Papadopoulos, Stavros; Kalnis, Panos

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  14. Joining uranium to steel

    International Nuclear Information System (INIS)

    Perkins, M.A.

    1976-05-01

    A method has been devised which will allow the joining of uranium to steel by fusion welding through the use of an intermediate material. Uranium-0.5 titanium was joined to AISI 304L stainless steel by using a vanadium insert. Also, a method is now available for selecting possible filler metals when two entirely dissimilar metals need to be joined. This method allows a quantitative ranking to be made of the possible filler metals and thus the most likely candidate can be selected

  15. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  16. 46 CFR 197.454 - First aid and treatment equipment.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false First aid and treatment equipment. 197.454 Section 197.454 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE OCCUPATIONAL SAFETY AND... Equipment § 197.454 First aid and treatment equipment. The diving supervisor shall ensure that medical kits...

  17. Symmetric bends how to join two lengths of cord

    CERN Document Server

    Miles, Roger E

    1995-01-01

    A bend is a knot securely joining together two lengths of cord (or string or rope), thereby yielding a single longer length. There are many possible different bends, and a natural question that has probably occurred to many is: "Is there a 'best' bend and, if so, what is it?"Most of the well-known bends happen to be symmetric - that is, the two constituent cords within the bend have the same geometric shape and size, and interrelationship with the other. Such 'symmetric bends' have great beauty, especially when the two cords bear different colours. Moreover, they have the practical advantage o

  18. Data center equipment location and monitoring system

    DEFF Research Database (Denmark)

    2011-01-01

    A data center equipment location system includes both hardware and software to provide for location, monitoring, security and identification of servers and other equipment in equipment racks. The system provides a wired alternative to the wireless RFID tag system by using electronic ID tags...... connected to each piece of equipment, each electronic ID tag connected directly by wires to a equipment rack controller on the equipment rack. The equipment rack controllers then link over a local area network to a central control computer. The central control computer provides an operator interface......, and runs a software application program that communicates with the equipment rack controllers. The software application program of the central control computer stores IDs of the equipment rack controllers and each of its connected electronic ID tags in a database.; The software application program...

  19. Parallel trajectory similarity joins in spatial networks

    KAUST Repository

    Shang, Shuo

    2018-04-04

    The matching of similar pairs of objects, called similarity join, is fundamental functionality in data management. We consider two cases of trajectory similarity joins (TS-Joins), including a threshold-based join (Tb-TS-Join) and a top-k TS-Join (k-TS-Join), where the objects are trajectories of vehicles moving in road networks. Given two sets of trajectories and a threshold θ, the Tb-TS-Join returns all pairs of trajectories from the two sets with similarity above θ. In contrast, the k-TS-Join does not take a threshold as a parameter, and it returns the top-k most similar trajectory pairs from the two sets. The TS-Joins target diverse applications such as trajectory near-duplicate detection, data cleaning, ridesharing recommendation, and traffic congestion prediction. With these applications in mind, we provide purposeful definitions of similarity. To enable efficient processing of the TS-Joins on large sets of trajectories, we develop search space pruning techniques and enable use of the parallel processing capabilities of modern processors. Specifically, we present a two-phase divide-and-conquer search framework that lays the foundation for the algorithms for the Tb-TS-Join and the k-TS-Join that rely on different pruning techniques to achieve efficiency. For each trajectory, the algorithms first find similar trajectories. Then they merge the results to obtain the final result. The algorithms for the two joins exploit different upper and lower bounds on the spatiotemporal trajectory similarity and different heuristic scheduling strategies for search space pruning. Their per-trajectory searches are independent of each other and can be performed in parallel, and the mergings have constant cost. An empirical study with real data offers insight in the performance of the algorithms and demonstrates that they are capable of outperforming well-designed baseline algorithms by an order of magnitude.

  20. Parallel trajectory similarity joins in spatial networks

    KAUST Repository

    Shang, Shuo; Chen, Lisi; Wei, Zhewei; Jensen, Christian S.; Zheng, Kai; Kalnis, Panos

    2018-01-01

    The matching of similar pairs of objects, called similarity join, is fundamental functionality in data management. We consider two cases of trajectory similarity joins (TS-Joins), including a threshold-based join (Tb-TS-Join) and a top-k TS-Join (k-TS-Join), where the objects are trajectories of vehicles moving in road networks. Given two sets of trajectories and a threshold θ, the Tb-TS-Join returns all pairs of trajectories from the two sets with similarity above θ. In contrast, the k-TS-Join does not take a threshold as a parameter, and it returns the top-k most similar trajectory pairs from the two sets. The TS-Joins target diverse applications such as trajectory near-duplicate detection, data cleaning, ridesharing recommendation, and traffic congestion prediction. With these applications in mind, we provide purposeful definitions of similarity. To enable efficient processing of the TS-Joins on large sets of trajectories, we develop search space pruning techniques and enable use of the parallel processing capabilities of modern processors. Specifically, we present a two-phase divide-and-conquer search framework that lays the foundation for the algorithms for the Tb-TS-Join and the k-TS-Join that rely on different pruning techniques to achieve efficiency. For each trajectory, the algorithms first find similar trajectories. Then they merge the results to obtain the final result. The algorithms for the two joins exploit different upper and lower bounds on the spatiotemporal trajectory similarity and different heuristic scheduling strategies for search space pruning. Their per-trajectory searches are independent of each other and can be performed in parallel, and the mergings have constant cost. An empirical study with real data offers insight in the performance of the algorithms and demonstrates that they are capable of outperforming well-designed baseline algorithms by an order of magnitude.

  1. On the Expressiveness of Joining

    Directory of Open Access Journals (Sweden)

    Thomas Given-Wilson

    2015-08-01

    Full Text Available The expressiveness of communication primitives has been explored in a common framework based on the pi-calculus by considering four features: synchronism (asynchronous vs synchronous, arity (monadic vs polyadic data, communication medium (shared dataspaces vs channel-based, and pattern-matching (binding to a name vs testing name equality vs intensionality. Here another dimension coordination is considered that accounts for the number of processes required for an interaction to occur. Coordination generalises binary languages such as pi-calculus to joining languages that combine inputs such as the Join Calculus and general rendezvous calculus. By means of possibility/impossibility of encodings, this paper shows coordination is unrelated to the other features. That is, joining languages are more expressive than binary languages, and no combination of the other features can encode a joining language into a binary language. Further, joining is not able to encode any of the other features unless they could be encoded otherwise.

  2. 46 CFR 184.210 - Heating equipment.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Heating equipment. 184.210 Section 184.210 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) VESSEL CONTROL AND MISCELLANEOUS SYSTEMS AND EQUIPMENT Cooking and Heating § 184.210 Heating equipment...

  3. Boolean Operations, Joins, and the Extended Low Hierarchy

    OpenAIRE

    Hemaspaandra, Lane A.; Jiang, Zhigen; Rothe, Joerg; Watanabe, Osamu

    1999-01-01

    We prove that the join of two sets may actually fall into a lower level of the extended low hierarchy than either of the sets. In particular, there exist sets that are not in the second level of the extended low hierarchy, EL_2, yet their join is in EL_2. That is, in terms of extended lowness, the join operator can lower complexity. Since in a strong intuitive sense the join does not lower complexity, our result suggests that the extended low hierarchy is unnatural as a complexity measure. We...

  4. Join or be excluded from biomedicine? JOINS and Post-colonial Korea.

    Science.gov (United States)

    Ma, Eunjeong

    2015-04-01

    This paper discusses re-emergence of Korean medicine(s) in the global context with a focus on a natural drug JOINS, a highly contentious drug regarding its legal status. By following through its life world, the paper contends that the drug is the embodiment of the postcolonial anxiety that crosses the intersections between the aspiring nation and globalizing strategies of the bio-pharmaceutical industry. JOINS is a natural drug prescribed to alleviate the symptoms of degenerative arthritis. SK Chemicals, Ltd., a giant domestic pharmaceutical company developed the drug by utilizing the knowledge of traditional pharmacopeia and put it on the market in 2001. In the domestic market, the drug is treated as a prescription drug, implying that Western medicine-trained doctors (as opposed to Korean medicine doctors) are entitled to prescribe drugs. It also indicates that the drug has undergone a series of lab tests such as toxicity, efficacy, and clinical trials in compliance with regulatory guidelines. However, the domestic standards are not rigorous enough to satisfy international standards, so that it is exported as a nutritional supplement abroad. The government, the pharmaceutical industry, and the Western medicine profession are happy with how the drug stands domestically and internationally. Rather, it is Korean doctors who try to disrupt the status quo and reclaim their rights to traditional knowledge, who have been alienated from the pharmaceuticalization of traditional knowledge. Thus, the JOINS tablet embodies the complex web of modern Korean society, professional interests, the pharmaceutical industry, and globalization.

  5. 46 CFR 121.210 - Heating equipment.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Heating equipment. 121.210 Section 121.210 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS CARRYING MORE THAN 150... SYSTEMS AND EQUIPMENT Cooking and Heating § 121.210 Heating equipment. (a) Each heater must be so...

  6. Common Influence Join

    DEFF Research Database (Denmark)

    Yiu, Man Lung; Mamoulis, Nikos; Karras, Panagiotis

    2008-01-01

    We identify and formalize a novel join operator for two spatial pointsets P and Q. The common influence join (CIJ) returns the pairs of points (p,q),p isin P,q isin Q, such that there exists a location in space, being closer to p than to any other point in P and at the same time closer to q than ......-demand, is very efficient in practice, incurring only slightly higher I/O cost than the theoretical lower bound cost for the problem....

  7. 46 CFR 169.677 - Equipment protection and enclosure.

    Science.gov (United States)

    2010-10-01

    ... Vessels of Less Than 100 Gross Tons § 169.677 Equipment protection and enclosure. (a) Except as provided... 46 Shipping 7 2010-10-01 2010-10-01 false Equipment protection and enclosure. 169.677 Section 169.677 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL...

  8. Speeding Up Neighbour-Joining Tree Construction

    DEFF Research Database (Denmark)

    Brodal, Gerth Stølting; Fagerberg, Rolf; Mailund, Thomas

    A widely used method for constructing phylogenetic trees is the neighbour-joining method of Saitou and Nei. We develope heuristics for speeding up the neighbour-joining method which generate the same phylogenetic trees as the original method. All heuristics are based on using a quad-tree to guide...... the search for the next pair of nodes to join, but di#er in the information stored in quad-tree nodes, the way the search is performed, and in the way the quad-tree is updated after a join. We empirically evaluate the performance of the heuristics on distance matrices obtained from the Pfam collection...... of alignments, and compare the running time with that of the QuickTree tool, a well-known and widely used implementation of the standard neighbour-joining method. The results show that the presented heuristics can give a significant speed-up over the standard neighbour-joining method, already for medium sized...

  9. Efficient string similarity join in multi-core and distributed systems.

    Directory of Open Access Journals (Sweden)

    Cairong Yan

    Full Text Available In big data area a significant challenge about string similarity join is to find all similar pairs more efficiently. In this paper, we propose a parallel processing framework for efficient string similarity join. First, the input is split into some disjoint small subsets according to the joint frequency distribution and the interval distribution of strings. Then the filter-verification strategy is adopted in the computation of string similarity for each subset so that the number of candidate pairs is reduced before an effective pruning strategy is used to improve the performance. Finally, the operation of string join is executed in parallel. Para-Join algorithm based on the multi-threading technique is proposed to implement the framework in a multi-core system while Pada-Join algorithm based on Spark platform is proposed to implement the framework in a cluster system. We prove that Para-Join and Pada-Join cannot only avoid reduplicate computation but also ensure the completeness of the result. Experimental results show that Para-Join can achieve high efficiency and significantly outperform than state-of-the-art approaches, meanwhile, Pada-Join can work on large datasets.

  10. Computer Security: Cryptography and authentication (2/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Remi Mollon studied computer security at University and he first worked on Grids, with the EGEE project, for a French Bioinformatics institute. Information security being crucial in that field, he developed an encrypted file management system on top of Grid middleware, and he contributed in integrating legacy applications with Grids. Then, he was hired by CERN as a Grid Data Management developer, and he joined the Grid Operational Security Coordination Team. Remi has now moved to CERN Computer Security Team. Remi is involved in the daily security operations, in addition to be responsible to design Team's computer infrastructure, and to participate to several projects, like multi-factor authentication at CERN. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have s...

  11. Efficient Joins with Compressed Bitmap Indexes

    Energy Technology Data Exchange (ETDEWEB)

    Computational Research Division; Madduri, Kamesh; Wu, Kesheng

    2009-08-19

    We present a new class of adaptive algorithms that use compressed bitmap indexes to speed up evaluation of the range join query in relational databases. We determine the best strategy to process a join query based on a fast sub-linear time computation of the join selectivity (the ratio of the number of tuples in the result to the total number of possible tuples). In addition, we use compressed bitmaps to represent the join output compactly: the space requirement for storing the tuples representing the join of two relations is asymptotically bounded by min(h; n . cb), where h is the number of tuple pairs in the result relation, n is the number of tuples in the smaller of the two relations, and cb is the cardinality of the larger column being joined. We present a theoretical analysis of our algorithms, as well as experimental results on large-scale synthetic and real data sets. Our implementations are efficient, and consistently outperform well-known approaches for a range of join selectivity factors. For instance, our count-only algorithm is up to three orders of magnitude faster than the sort-merge approach, and our best bitmap index-based algorithm is 1.2x-80x faster than the sort-merge algorithm, for various query instances. We achieve these speedups by exploiting several inherent performance advantages of compressed bitmap indexes for join processing: an implicit partitioning of the attributes, space-efficiency, and tolerance of high-cardinality relations.

  12. Effect of epoxy resin on bending momentum in L type corner joins

    Directory of Open Access Journals (Sweden)

    Mehmet Nuri Yıldırım

    2017-11-01

    Full Text Available In the furniture industry, the joining points of frame and box construction furniture according to the loads to be affected by the use place is important for the security of the user and service life of the furniture element. In this direction, it is aimed to determine the diagonal compression and diagonal tensile moment values of "L" type corner joints of box framed construction furniture prepared from solid wood materials. The Pinus Nigra, Fagus Orientalis L and Populus Nigra were used as solid wood materials. Wood-based biscuit joining elements were used in corner joints of the test construction and epoxy resin was used as glue for materials. The static loads were applied to construction according to ASTM-D1037. The results show that, the highest tensile and compression values were obtained from Fagus Orientalis L and the lowest values were obtained from Populus Nigra specimens. In the statistical study, the difference between the tensile and compressive bending moment values of the biscuit connection element was found to be statistically significant. This study indicates that, it is suggested to use of L type joints prepared from Fagus Orientalis L by using epoxy resin and wood based biscuit joining element in frame constructions.

  13. An experimental study on joining of severe plastic deformed aluminium materials with friction welding method

    Energy Technology Data Exchange (ETDEWEB)

    Sahin, Mumin [Mechanical Engineering Department, Trakya University, 22030 Edirne (Turkey)], E-mail: mumins@trakya.edu.tr; Erol Akata, H.; Ozel, Kaan [Mechanical Engineering Department, Trakya University, 22030 Edirne (Turkey)

    2008-07-01

    In this study, 5083 aluminium alloys, which were exposed to severe plastic deformation, were joined with friction welding method and the variation in mechanical properties of the joints was experimentally investigated. Severe plastic deformation methods can be classified as equal channel angular pressing (ECAP) (in other words, equal cross section lateral extrusion - ECSLE) and cyclic extrusion-compression. Aluminium alloy as test material 5083 and square cross-sectional equal channel angular pressing die for severe plastic deformation were used in the study. Firstly 5083 alloys, as purchased, were joined with friction welding method. The optimum parameters for friction time, upset time, friction pressure and upset pressure, which are necessary for welding, were obtained. Afterwards, 5083 aluminium materials as purchased were prepared as square cross-section and then 1-pass severe plastic deformation was applied to specimen by equal channel angular pressing die. The obtained parts as square form were prepared as cylindrical form by machining and then the parts were joined by continuous drive friction welding equipment that was designed and produced in laboratory conditions before. Later, the tensile strengths of the parts, obtained at optimum conditions, were compared with those of the joined parts as purchased form. Then, hardness variations and microstructures of joints were examined. Finally, the obtained results were commented on.

  14. Potentials of Industrie 4.0 and Machine Learning for Mechanical Joining

    OpenAIRE

    Jäckel, Mathias

    2017-01-01

    -Sensitivity analysis of the influence of component properties and joining parameters on the joining result for self-pierce riveting -Possibilities to link mechanical joining technologies with the automotive process chain for quality and flexibility improvements -Potential of using machine learning to reduce automotive product development cycles in relation to mechanical joining -Datamining for machine learning at mechanical joining

  15. Microwave joining of SiC ceramics and composites

    Energy Technology Data Exchange (ETDEWEB)

    Ahmad, I.; Silberglitt, R.; Tian, Y.L. [FM Technologies, Inc., Fairfax, VA (United States); Katz, J.D. [Los Alamos National Lab., NM (United States)

    1997-04-01

    Potential applications of SiC include components for advanced turbine engines, tube assemblies for radiant burners and petrochemical processing and heat exchangers for high efficiency electric power generation systems. Reliable methods for joining SiC are required in order to cost-effectively fabricate components for these applications from commercially available shapes and sizes. This manuscript reports the results of microwave joining experiments performed using two different types of SiC materials. The first were on reaction bonded SiC, and produced joints with fracture toughness equal to or greater than that of the base material over an extended range of joining temperatures. The second were on continuous fiber-reinforced SiC/SiC composite materials, which were successfully joined with a commercial active brazing alloy, as well as by using a polymer precursor.

  16. Ring-constrained Join

    DEFF Research Database (Denmark)

    Yiu, Man Lung; Karras, Panagiotis; Mamoulis, Nikos

    2008-01-01

    . This new operation has important applications in decision support, e.g., placing recycling stations at fair locations between restaurants and residential complexes. Clearly, RCJ is defined based on a geometric constraint but not on distances between points. Thus, our operation is fundamentally different......We introduce a novel spatial join operator, the ring-constrained join (RCJ). Given two sets P and Q of spatial points, the result of RCJ consists of pairs (p, q) (where p ε P, q ε Q) satisfying an intuitive geometric constraint: the smallest circle enclosing p and q contains no other points in P, Q...

  17. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  18. Advances in appendage joining techniques for PHWR fuel cladding

    International Nuclear Information System (INIS)

    Desai, P.B.; Ray, T.K.; Date, V.G.; Purushotham, D.S.C.

    1995-01-01

    This paper describes work carried out at the BARC on the development of a technique to join tiny appendages (spacers and bearing pads) to thin cladding (before loading of UO 2 pellets) by resistance welding for PHWR fuel assemblies. The work includes qualifying the process for production environment, designing prototype equipment for regular production and quality monitoring. In the first phase of development, welding of appendages on UO 2 loaded elements was successfully developed, and is being used in production. Welding of appendages on to empty clad tubes is a superior technique for several reasons. Many problems associated with development of welding on empty tubes were resolved. work was initiated, in the second phase of the development task, to select a suitable technique to join appendages on empty clad tubes without any collapse of thin clad. Several alternatives were reviewed and assessed such as laser, full face welding, shim welding and shrink fitting ring spacers. Selection of a method using a mandrel and a modified electrode geometry was fully developed. Results were optimized and process development successfully completed. Appropriate weld monitoring techniques were also reviewed for their adaptation. This technique is useful for 19, 22 as well as 37 element assemblies. (author)

  19. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    International Nuclear Information System (INIS)

    Pollet, J.

    2006-01-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-critical networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)

  20. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    Energy Technology Data Exchange (ETDEWEB)

    Pollet, J. [PlantData Technologies, Inc., 1201 Louisiana Street, Houston, TX 77002 (United States)

    2006-07-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-critical networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)

  1. Joining technologies for the 1990s: Welding, brazing, soldering, mechanical, explosive, solid-state, adhesive

    Science.gov (United States)

    Buckley, John D. (Editor); Stein, Bland A. (Editor)

    1986-01-01

    A compilation of papers presented in a joint NASA, American Society for Metals, The George Washington University, American Welding Society, and Society of Manufacturing Engineers Conference on Welding, Bonding, and Fastening at Langley Research Center, Hampton, VA, on October 23 to 25, 1984 is given. Papers were presented on technology developed in current research programs relevant to welding, bonding, and fastening of structural materials required in fabricating structures and mechanical systems used in the aerospace, hydrospace, and automotive industries. Topics covered in the conference included equipment, hardware and materials used when welding, brazing, and soldering, mechanical fastening, explosive welding, use of unique selected joining techniques, adhesives bonding, and nondestructive evaluation. A concept of the factory of the future was presented, followed by advanced welding techniques, automated equipment for welding, welding in a cryogenic atmosphere, blind fastening, stress corrosion resistant fasteners, fastening equipment, explosive welding of different configurations and materials, solid-state bonding, electron beam welding, new adhesives, effects of cryogenics on adhesives, and new techniques and equipment for adhesive bonding.

  2. Synthesis of securement device options and strategies

    Science.gov (United States)

    2002-03-01

    The Americans with Disabilities Act of 1990 (ADA) requires that public transit vehicles be equipped with securement location(s) and device(s) that are able to secure common wheelchairs," as defined in the ADA regulations. The definition and size spec...

  3. Research on the security of nuclear power equipment

    International Nuclear Information System (INIS)

    Zhao Jiong; Wu Jinzong

    2008-06-01

    Recently, the rapidly growing economy in conflict with the lack of power in the whole country become more and more seriously in our country. In other hand, there is also various kind of problems such as greenhouse effect and the oil price rising conditions. It greatly promote our country's development of Nuclear power project. As forecast, the number of Nuclear Power Plant will increase greatly in the future. However, the security of the Nuclear Power Plant is one of the topics that people always pay more attention to. Combining with the practice experience of Nuclear Power Plant in Japanese, the security of Nuclear Power Plant in multi-angles is discussed. It is pointed that the risk assesment and management system of nuclear power plant are effective measure for security of the development of nuclear power. (authors)

  4. International Nuclear Security Education Network (INSEN) and the Nuclear Security Training and Support Centre (NSSC) Network

    International Nuclear Information System (INIS)

    Nikonov, Dmitriy

    2013-01-01

    International Nuclear Security Education Network established in 2010: A partnership between the IAEA and universities, research institutions and other stakeholders - •Promotion of nuclear security education; • Development of educational materials; • Professional development for faculty members; • Collaborative research and resource sharing. Currently over 90 members from 38 member states. Mission: to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. Nuclear Security Support Centre: Primary objectives are: • Develop human resources through the implementation of a tailored training programme; • Develop a network of experts; • Provide technical support for lifecycle equipment management and scientific support for the detection of and the response to nuclear security events

  5. Trajectory similarity join in spatial networks

    KAUST Repository

    Shang, Shuo

    2017-09-07

    The matching of similar pairs of objects, called similarity join, is fundamental functionality in data management. We consider the case of trajectory similarity join (TS-Join), where the objects are trajectories of vehicles moving in road networks. Thus, given two sets of trajectories and a threshold θ, the TS-Join returns all pairs of trajectories from the two sets with similarity above θ. This join targets applications such as trajectory near-duplicate detection, data cleaning, ridesharing recommendation, and traffic congestion prediction. With these applications in mind, we provide a purposeful definition of similarity. To enable efficient TS-Join processing on large sets of trajectories, we develop search space pruning techniques and take into account the parallel processing capabilities of modern processors. Specifically, we present a two-phase divide-and-conquer algorithm. For each trajectory, the algorithm first finds similar trajectories. Then it merges the results to achieve a final result. The algorithm exploits an upper bound on the spatiotemporal similarity and a heuristic scheduling strategy for search space pruning. The algorithm\\'s per-trajectory searches are independent of each other and can be performed in parallel, and the merging has constant cost. An empirical study with real data offers insight in the performance of the algorithm and demonstrates that is capable of outperforming a well-designed baseline algorithm by an order of magnitude.

  6. Resistance welding equipment manufacturing capability for exports

    Energy Technology Data Exchange (ETDEWEB)

    Sastry, V.S.; Raju, Y.S.; Somani, A.K.; Setty, D.S.; Rameswara Raw, A.; Hermantha Rao, G.V.S.; Jayaraj, R.N. [Nuclear Fuel Complex, Dept. of Atomic Energy, Hyderbad (India)

    2010-07-01

    Indian Pressurised Heavy Water Reactor (PHWR) fuel bundle is fully welded and is unique in its design. Appendage welding, end closure welding, and end plate welding is carried out using resistance welding technique. Out of many joining processes available, resistance-welding process is reliable, environment friendly and best suitable for mass production applications. Nuclear Fuel Complex (NFC), an industrial unit is established in Hyderabad, under the aegis of the Dept of Atomic Energy to manufacture fuel for Pressurised Heavy Water Reactors. From inception, NFC has given importance for self-reliance and indigenization with respect to manufacturing process and equipment. Sintering furnaces, centreless grinders, appendage-welding machines, end-closure welding equipment and end-plate welding equipments, which were initially imported, are either indigenized or designed and manufactured in house. NFC has designed, manufactured a new appendage-welding machine for manufacturing 37 element fuel bundles. Recently NFC has bagged an order from IAEA through international bidding for design, manufacture, supply, erection and commissioning of end-closure welding equipment. The paper gives in detail the salient features of these welding equipment. (author)

  7. Willmore energy for joining of carbon nanostructures

    Science.gov (United States)

    Sripaturad, P.; Alshammari, N. A.; Thamwattana, N.; McCoy, J. A.; Baowan, D.

    2018-06-01

    Numerous types of carbon nanostructure have been found experimentally, including nanotubes, fullerenes and nanocones. These structures have applications in various nanoscale devices and the joining of these structures may lead to further new configurations with more remarkable properties and applications. The join profile between different carbon nanostructures in a symmetric configuration may be modelled using the calculus of variations. In previous studies, carbon nanostructures were assumed to deform according to perfect elasticity, thus the elastic energy, depending only on the axial curvature, was used to determine the join profile consisting of a finite number of discrete bonds. However, one could argue that the relevant energy should also involve the rotational curvature, especially when its size is comparable to the axial curvature. In this paper, we use the Willmore energy, a natural generalisation of the elastic energy that depends on both the axial and rotational curvatures. Catenoids are absolute minimisers of this energy and pieces of these may be used to join various nanostructures. We focus on the cases of joining a fullerene to a nanotube and joining two fullerenes along a common axis. By comparing our results with the earlier work, we find that both energies give similar joining profiles. Further work on other configurations may reveal which energy provides a better model.

  8. Microstructure and properties of ceramics and composites joined by plastic deformation.

    Energy Technology Data Exchange (ETDEWEB)

    Goretta, K. C.; Singh, D.; Chen, N.; Gutierrez-Mora, F.; Lorenzo-Martin, M. de la, Cinta; Dominguez-Rodriguez, A.; Routbort, J. L.; Energy Systems; Univ. of Seville

    2008-12-01

    A review is presented of the design of suitable materials systems for joining by high-temperature plastic deformation, details of the joining techniques, microstructures and properties of the resulting composite bodies, and prospects and limitation for this type of joining technology. Joining parameters and resulting forms are discussed for Al{sub 2}O{sub 3}/mullite particulate composites, Y{sub 2}O{sub 3}-stabilized ZrO{sub 2} particulate/Al{sub 2}O{sub 3} particulate and whisker-reinforced composites, hydroxyapatite bioceramics, La{sub 0.85}Sr{sub 0.15}MnO{sub 3} electronic ceramics, MgF{sub 2} optical ceramics, and Ni{sub 3}Al intermetallics. Results are contrasted with those obtained by other methods of joining brittle, high-temperature materials, with special focus on durability and mechanical properties.

  9. Microstructure and properties of ceramics and composites joined by plastic deformation

    Energy Technology Data Exchange (ETDEWEB)

    Goretta, K.C. [Argonne National Laboratory, Argonne, IL 60439-4838 (United States)], E-mail: ken.goretta@aoard.af.mil; Singh, D.; Chen Nan [Argonne National Laboratory, Argonne, IL 60439-4838 (United States); Gutierrez-Mora, F.; Cinta Lorenzo-Martin, M. de la [Argonne National Laboratory, Argonne, IL 60439-4838 (United States); University of Seville, Seville 41080 (Spain); Dominguez-Rodriguez, A. [University of Seville, Seville 41080 (Spain); Routbort, J.L. [Argonne National Laboratory, Argonne, IL 60439-4838 (United States)

    2008-12-20

    A review is presented of the design of suitable materials systems for joining by high-temperature plastic deformation, details of the joining techniques, microstructures and properties of the resulting composite bodies, and prospects and limitation for this type of joining technology. Joining parameters and resulting forms are discussed for Al{sub 2}O{sub 3}/mullite particulate composites, Y{sub 2}O{sub 3}-stabilized ZrO{sub 2} particulate/Al{sub 2}O{sub 3} particulate and whisker-reinforced composites, hydroxyapatite bioceramics, La{sub 0.85}Sr{sub 0.15}MnO{sub 3} electronic ceramics, MgF{sub 2} optical ceramics, and Ni{sub 3}Al intermetallics. Results are contrasted with those obtained by other methods of joining brittle, high-temperature materials, with special focus on durability and mechanical properties.

  10. Network Security Visualization

    Science.gov (United States)

    1999-09-27

    performing SQL generation and result-set binding, inserting acquired security events into the database and gathering the requested data for Console scene...objects is also auto-generated by a VBA script. Built into the auto-generated table access objects are the preferred join paths between tables. This...much of the Server itself) never have to deal with SQL directly. This is one aspect of laying the groundwork for supporting RDBMSs from multiple vendors

  11. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    Science.gov (United States)

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  12. Recrafting the neighbor-joining method

    Directory of Open Access Journals (Sweden)

    Pedersen Christian NS

    2006-01-01

    Full Text Available Abstract Background The neighbor-joining method by Saitou and Nei is a widely used method for constructing phylogenetic trees. The formulation of the method gives rise to a canonical Θ(n3 algorithm upon which all existing implementations are based. Results In this paper we present techniques for speeding up the canonical neighbor-joining method. Our algorithms construct the same phylogenetic trees as the canonical neighbor-joining method. The best-case running time of our algorithms are O(n2 but the worst-case remains O(n3. We empirically evaluate the performance of our algoritms on distance matrices obtained from the Pfam collection of alignments. The experiments indicate that the running time of our algorithms evolve as Θ(n2 on the examined instance collection. We also compare the running time with that of the QuickTree tool, a widely used efficient implementation of the canonical neighbor-joining method. Conclusion The experiments show that our algorithms also yield a significant speed-up, already for medium sized instances.

  13. Prospects of joining multi-material structures

    Science.gov (United States)

    Sankaranarayanan, R.; Hynes, N. Rajesh Jesudoss

    2018-05-01

    Spring up trends and necessities make the pipelines for the brand new Technologies. The same way, Multimaterial structures emerging as fruitful alternatives for the conventional structures in the manufacturing sector. Especially manufacturing of transport vehicles is placing a perfect platform for these new structures. Bonding or joining technology plays a crucial role in the field of manufacturing for sustainability. These latest structures are purely depending on such joining technologies so that multi-material structuring can be possible practically. The real challenge lies on joining dissimilar materials of different properties and nature. Escalation of thermoplastic usage in large structural components also faces similar ambiguity for joining multi-material structures. Adhesive bonding, mechanical fastening and are the answering technologies for multi-material structures. This current paper analysis the prospects of these bonding technologies to meet the challenges of tomorrow.

  14. Changes in security systems and manufacture equipment and inspection

    International Nuclear Information System (INIS)

    Paloma, J. J.; Moraga, J. L.

    2015-01-01

    From the beginning of its industrial activity 30 years ago, the Juzbado factory of Enusa Group has maintained a strong commitment to safety and technological innovation. As a result, we have development new equipment and constantly improving the existing ones, as well as the facilities of the factory in accordance with the internal procedures, with multidisciplinary design teams and review teams. (Author)

  15. Dod physical security equipment application experience

    International Nuclear Information System (INIS)

    Dixon, H.M.

    1978-01-01

    In the Department of Defense, the subject of physical security is very broad in scope. Its application ranges from countering the shoplifters in the post exchange facilities to the sophisticated terrorist who may attempt to obtain access to one of our nuclear weapons. This paper focuses on the area of specific interest to the members of INMM which is the protection of nuclear devices and the classified information associated with them

  16. Fast and scalable inequality joins

    KAUST Repository

    Khayyat, Zuhair; Lucia, William; Singh, Meghna; Ouzzani, Mourad; Papotti, Paolo; Quiané -Ruiz, Jorge Arnulfo; Tang, Nan; Kalnis, Panos

    2016-01-01

    an incremental inequality join algorithm to handle scenarios where data keeps changing. We have implemented a centralized version of these algorithms on top of PostgreSQL, a distributed version on top of Spark SQL, and an existing data cleaning system, Nadeef

  17. Applications for cyber security - System and application monitoring

    International Nuclear Information System (INIS)

    Marron, J. E.

    2006-01-01

    Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

  18. Process Control Security in the Cybercrime Information Exchange NICC

    OpenAIRE

    Luiijf, H.A.M.

    2009-01-01

    Detecting, investigating and prosecuting cybercrime? Extremely important, but not really the solution for the problem. Prevention is better! The sectors that have joined the Cybercrime Information Exchange have accepted the challenge of ensuring the effectiveness of the (information) security of process control systems (PCS), including SCADA. This publication makes it clear why it is vital that organizations establish and maintain control over the security of the information and communication...

  19. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  20. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  1. Superplasticity and joining of zirconia-based ceramics

    International Nuclear Information System (INIS)

    Dominguez-Rodriguez, A.; Gutierrez-Mora, F.; Jimenez-Melendo, M.; Chaim, R.; Routbort, J. L.

    1999-01-01

    Steady-state creep and joining of alumina/zirconia composites containing alumina volume fractions of 20, 60, and 85% have been investigated between 1,250 and 1,350 C. Superplasticity of these compounds is controlled by grain-boundary sliding and the creep rate is a function of alumina volume fraction, not grain size. Using the principles of superplasticity, pieces of the composite have been joined by applying the stress required to achieve 5 to 10% strain to form a strong interface at temperatures as low as 1,200 C

  2. Superplasticity and joining of zirconia-based ceramics

    International Nuclear Information System (INIS)

    Gutierrez-Mora, F.; Dominguez-Rodriguez, A.; Jimenez-Melendo, M.; Chaim, R.; Ravi, G.B.; Routbort, J.L.

    2000-01-01

    Steady-state creep and joining of alumina/zirconia composites containing alumina volume fractions of 20, 60 and 85% have been investigated between 1,250 and 1,350 C. Superplasticity of these compounds is controlled by grain-boundary sliding and the creep rate is a function of alumina volume fraction, not grain size. Using the principles of superplasticity, pieces of the composite have been joined by applying the stress required to achieve 5 to 10% strain to form a strong interface at temperatures as low as 1,200 C

  3. 24 CFR 232.525 - Note and security form.

    Science.gov (United States)

    2010-04-01

    ... URBAN DEVELOPMENT MORTGAGE AND LOAN INSURANCE PROGRAMS UNDER NATIONAL HOUSING ACT AND OTHER AUTHORITIES MORTGAGE INSURANCE FOR NURSING HOMES, INTERMEDIATE CARE FACILITIES, BOARD AND CARE HOMES, AND ASSISTED... Fire Safety Equipment Eligible Security Instruments § 232.525 Note and security form. The lender shall...

  4. Thin layer joining by gas adsorption

    Energy Technology Data Exchange (ETDEWEB)

    Taga, Yasunori, E-mail: y-taga@isc.chubu.ac.jp; Fukumura, Toshio

    2014-10-01

    Highlights: • We report thin layer molecular joining between glass and COP by gas adsorption. Thickness of joining layer is 1–2 nm and joining process was carried out at low temperature at about 100 °C. • Adhesion strength measured by 180 degree peel test revealed to be 1–10 N/25 mm and the joined stack showed high durability for practical use. - Abstract: Attempt has been made to join borosilicate glass and cycloolefin (COP) polymer film by using gas adsorption method. After corona plasma treat, COP was exposed to (3-glycidoxypropyl) trimethoxysilane (GPS) and glass to (3-aminopropyl) triethoxysilane (APS) both in air atmosphere, resulting in co-adsorption of water vapor in the atmosphere and organosilane gases. Surface characterization of plasma treated and gas adsorbed surfaces was carried out by X-ray photoelectron spectroscopy (XPS) using Mg Kα X-ray source. Joining was carried out by a roll laminator after contact of both surfaces at room temperature, followed by annealing at 130 °C for 10 min. Adhesion strength was evaluated by 180 degree peel test based on ASTM D-903 and durability was examined under the conditions of 60 °C and 95% RH. It was found that after plasma treatment, complex functional groups such as C-H, C-O, C=O, O-C=O and CO{sub 3} were found on COP and O-H on glass. Thickness of GPS gas adsorption layer on COP was evaluated by the XPS to be at least 1.1 nm by taking inelastic mean free path of Si{sub 2p} photoelectron into consideration. Joining force was found to be more than 5 N/25 mm corresponding to almost equal to COP bulk tensile strength. In addition, durability of this adhesion strength remained unchanged over 2000 h even after exposure to the durability test conditions of 60 °C and 95% RH. The results can be explained in terms of formation of H-H hydrogen bonding and Si-O covalent bonding via silanols will be made at the interface as a result of lamination and annealing processes. In conclusion, ultrathin joining method

  5. Process Control Security in the Cybercrime Information Exchange NICC

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2009-01-01

    Detecting, investigating and prosecuting cybercrime? Extremely important, but not really the solution for the problem. Prevention is better! The sectors that have joined the Cybercrime Information Exchange have accepted the challenge of ensuring the effectiveness of the (information) security of

  6. Spatio-temporal joins on symbolic indoor tracking data

    DEFF Research Database (Denmark)

    Lu, Hua; Yang, Bin; Jensen, Christian S.

    2011-01-01

    and studies probabilistic, spatio-temporal joins on historical indoor tracking data. Two meaningful types of join are defined. They return object pairs that satisfy spatial join predicates either at a time point or during a time interval. The predicates considered include “same X,” where X is a semantic...

  7. Fastening, coupling and joining technique between diaspora and irredenta

    Science.gov (United States)

    Bauer, C.-O.

    1980-06-01

    The problem of eliminating the present divergence and shattering (diaspora) in the treatment of problems of the fastening, coupling, and joining technique on different technical branches is examined. It is shown that by an appropriate independence the fastening, coupling and joining techniques can recognize and consequently utilize the numerous performance reserves which are concealed by the present organization and action due to the lack of systematically tended works.

  8. Joining elements of silicon carbide

    International Nuclear Information System (INIS)

    Olson, B.A.

    1979-01-01

    A method of joining together at least two silicon carbide elements (e.g.in forming a heat exchanger) is described, comprising subjecting to sufficiently non-oxidizing atmosphere and sufficiently high temperature, material placed in space between the elements. The material consists of silicon carbide particles, carbon and/or a precursor of carbon, and silicon, such that it forms a joint joining together at least two silicon carbide elements. At least one of the elements may contain silicon. (author)

  9. Needs for Development of Nuclear Security Culture in Korea

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yoo, Ho Sik; Kwack, Sung Woo; Lee, Ho Jin; Lee, Jong Uk

    2005-01-01

    Over the past several years, the growing international threat of terrorism has necessitated strengthening of physical protection and security of nuclear materials and facilities. A number of countries have made efforts in improving their physical protection system especially in the field of hardware such as security equipment. While security hardware is important, the efficient use of the equipment is yet another important issue, which depends on the operating personnel and their attitudes in performing their duties. Therefore, Security experts said that the nuclear security would not be completed without security culture. However, Nuclear Security Culture has not been introduced and developed in Korea. This paper introduces the concept and model of Nuclear Security Culture and raises awareness of the needs to develop the Nuclear Security Culture in Korea

  10. Recrafting the Neighbor-Joining Method

    DEFF Research Database (Denmark)

    Mailund; Brodal, Gerth Stølting; Fagerberg, Rolf

    2006-01-01

    Background: The neighbor-joining method by Saitou and Nei is a widely used method for constructing phylogenetic trees. The formulation of the method gives rise to a canonical Θ(n3) algorithm upon which all existing implementations are based. Methods: In this paper we present techniques for speeding...... up the canonical neighbor-joining method. Our algorithms construct the same phylogenetic trees as the canonical neighbor-joining method. The best-case running time of our algorithms are O(n2) but the worst-case remains O(n3). We empirically evaluate the performance of our algoritms on distance...... matrices obtained from the Pfam collection of alignments. Results: The experiments indicate that the running time of our algorithms evolve as Θ(n2) on the examined instance collection. We also compare the running time with that of the QuickTree tool, a widely used efficient implementation of the canonical...

  11. US8,994,532 "Data Center Equipment Location and Monitoring System"

    DEFF Research Database (Denmark)

    2014-01-01

    A data center equipment location system includes both hardware and software to provide for location, monitoring, security and identification of servers and other equipment in equipment racks. The system provides a wired alternative to the wireless RFID tag system by using electronic ID tags...... connected to each piece of equipment, each electronic ID tag connected directly by wires to a equipment rack controller on the equipment rack. The equipment rack controllers then link over a local area network to a central control computer. The central control computer provides an operator interface......, and runs a software application program that communicates with the equipment rack controllers. The software application program of the central control computer stores IDs of the equipment rack controllers and each of its connected electronic ID tags in a database. The software application program...

  12. Joining Dissimilar Materials Using Friction Stir Scribe Technique

    Energy Technology Data Exchange (ETDEWEB)

    Upadhyay, Piyush [Pacific Northwest National Laboratory, Richland 99352, WA e-mail: piyush.upadhyay@pnnl.gov; Hovanski, Yuri [Pacific Northwest National Laboratory, Richland 99352, WA; Jana, Saumyadeep [Pacific Northwest National Laboratory, Richland 99352, WA; Fifield, Leonard S. [Pacific Northwest National Laboratory, Richland 99352, WA

    2016-10-03

    Development of a robust and cost-effective method of joining dissimilar materials could provide a critical pathway to enable widespread use of multi-material designs and components in mainstream industrial applications. The use of multi-material components such as steel-aluminum and aluminum-polymer would allow design engineers to optimize material utilization based on service requirements and could often lead to weight and cost reductions. However, producing an effective joint between materials with vastly different thermal, microstructural, and deformation responses is highly problematic using conventional joining and/or fastening methods. This is especially challenging in cost sensitive, high volume markets that largely rely on low cost joining solutions. Friction stir scribe technology was developed to meet the demands of joining materials with drastically different properties and melting regimes. The process enables joining of light metals like magnesium and aluminum to high temperature materials like steel and titanium. Viable joints between polymer composites and metal can also be made using this method. This paper will present the state of the art, progress made, and challenges associated with this innovative derivative of friction stir welding in reference to joining dissimilar metals and polymer/metal combinations.

  13. JOINING DISSIMILAR MATERIALS USING FRICTION STIR SCRIBE TECHNIQUE

    Energy Technology Data Exchange (ETDEWEB)

    Upadhyay, Piyush; Hovanski, Yuri; Jana, Saumyadeep; Fifield, Leonard S.

    2016-09-01

    Development of robust and cost effective method of joining dissimilar materials can provide a critical pathway to enable widespread use of multi-material design and components in mainstream industrial applications. The use of multi-material components such as Steel-Aluminum, Aluminum-Polymer allows design engineers to optimize material utilization based on service requirements and often lead weight and cost reductions. However producing an effective joint between materials with vastly different thermal, microstructural and deformation response is highly problematic using conventional joining and /or fastening methods. This is especially challenging in cost sensitive high volume markets that largely rely on low–cost joining solutions. Friction Stir Scribe technology was developed to meet the demands of joining materials with drastically different properties and melting regimes. The process enables joining of light metals like Magnesium and Aluminum to high temperature materials like Steels and Titanium. Additionally viable joints between polymer composites and metal can also be made using this method. This paper will present state of the art, progress made and challenges associated with this innovative derivative of Friction Stir welding in reference to joining dissimilar metals and polymer/metal combinations.

  14. Recent progress in micro and nano-joining

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Y; Hu, A; Khan, M I; Wu, W; Tam, B; Yavuz, M [Centre for Advanced Materials Joining Department of Mechanical and Mechatronics Engineering, University of Waterloo 200 University Avenue West, Waterloo, N2L 3G1 (Canada)], E-mail: nzhou@uwaterloo.ca

    2009-05-01

    Micro and nano-joining has been identified as a key enabling technology in the construction of micromechanical and microelectronic devices. The current article reviews recent progress in micro and nano-joining. In particular, laser micro-welding (LMW) of crossed 316 LVM stainless steel (SS) wire was compared to conventional resistance micro-welding (RMW) and was successfully employed in welding a Pt-Ir /SS dissimilar combination. Welding of Au nanoparticles was realized using femtosecond laser irradiation and its application in the surface enhanced Raman spectroscopy was investigated. Brazing between carbon nanotube (CNT) bundles and Ni electrodes was attained in vacuum, resulting in the development of a novel CNT filament of incandescent lamps.

  15. Joining of thin thickness SiCf/SiC composites: research of a joining composition and of an associated elaboration process

    International Nuclear Information System (INIS)

    Jacques, E.

    2012-01-01

    The present work is part of the Fourth Generation Fast Reactors program. One of the key issues is the joining of the SiC f /SiC ceramic matrix composites (CMC) to seal the combustible cladding. At the present time, no chemical composition as a joint is refractive enough to face the expected operating temperatures. The aims of this study are the following: (1) the identification of a joining composition and its associated elaboration process answering the specifications, (2) the validation of a local and fast heating process and (3) the definition of mechanical tests to characterise these joinings. We describe the methodology and the results for joining SiC and SiC f /SiC substrates at solid and liquid state using metallic silicides. Joint integrity and joint strength can be improved by adding small SiC particles to the silicides powders. Chemical reactivity, wettability tests and thermomechanical properties analysis have been carried out on the joints. Cross sections of the assembly were prepared to study the joint/substrate chemical bonding, the cracking and the crack deflection in the vicinity of the interface. Also, one of the challenge consists in using a local heating at a high temperature (around 1800 C) for a short time to avoid the degradation of the composite structure. The assemblies have been then performed in an inductive furnace but in order to prepare the joining technology, trials of local heating have also been investigated with a CO 2 laser beam and a microwave generator. Finally, descriptions of the 4-points bending mechanical test used and the associated results are presented. (author) [fr

  16. Joining of porous silicon carbide bodies

    Science.gov (United States)

    Bates, Carl H.; Couhig, John T.; Pelletier, Paul J.

    1990-05-01

    A method of joining two porous bodies of silicon carbide is disclosed. It entails utilizing an aqueous slip of a similar silicon carbide as was used to form the porous bodies, including the sintering aids, and a binder to initially join the porous bodies together. Then the composite structure is subjected to cold isostatic pressing to form a joint having good handling strength. Then the composite structure is subjected to pressureless sintering to form the final strong bond. Optionally, after the sintering the structure is subjected to hot isostatic pressing to further improve the joint and densify the structure. The result is a composite structure in which the joint is almost indistinguishable from the silicon carbide pieces which it joins.

  17. A Modeling Approach for Plastic-Metal Laser Direct Joining

    Science.gov (United States)

    Lutey, Adrian H. A.; Fortunato, Alessandro; Ascari, Alessandro; Romoli, Luca

    2017-09-01

    Laser processing has been identified as a feasible approach to direct joining of metal and plastic components without the need for adhesives or mechanical fasteners. The present work sees development of a modeling approach for conduction and transmission laser direct joining of these materials based on multi-layer optical propagation theory and numerical heat flow simulation. The scope of this methodology is to predict process outcomes based on the calculated joint interface and upper surface temperatures. Three representative cases are considered for model verification, including conduction joining of PBT and aluminum alloy, transmission joining of optically transparent PET and stainless steel, and transmission joining of semi-transparent PA 66 and stainless steel. Conduction direct laser joining experiments are performed on black PBT and 6082 anticorodal aluminum alloy, achieving shear loads of over 2000 N with specimens of 2 mm thickness and 25 mm width. Comparison with simulation results shows that consistently high strength is achieved where the peak interface temperature is above the plastic degradation temperature. Comparison of transmission joining simulations and published experimental results confirms these findings and highlights the influence of plastic layer optical absorption on process feasibility.

  18. SOR/84-81, Physical Security Regulations, amendment

    International Nuclear Information System (INIS)

    1984-01-01

    The Physical Security Regulations of 14 January 1983 which establish regulations concerning security systems, equipment and procedures at nuclear installations were amended in particular to take account of Canada's Charter of Rights and to provide for the security of certain information. (NEA)

  19. Radiological security of portable equipment used in the industry

    International Nuclear Information System (INIS)

    Cateriano, M.A.

    2006-01-01

    The industrial meters with encapsulated sources are used intensely in the present time due to the economic benefits that generate. Their use in all the one world has been reflected in an improvement of the quality of the analyzed product and of one optimization of the production process, allowing to carry out these measurements and controls without interrupting the process and in non destructive form generating an energy saving in turn and of materials. Although these industrial meters are intrinsically safe for design in the portable meters their safety also is strongly governed in the strict pursuit of procedures and in the adequate personnel's training that operate these equipment. In the Argentine Republic in 2005 the Nuclear Regulatory Authority (RNA) had registered a quantity of 160 portable equipment. In the period 1995-2003, 2 incidents took place with these equipment one of them used to measure soils humidity of Troxler trademark containing a source of Am-241(Be) of 370 MBq and the remaining one also of Troxler trademark used to measure density and humidity of soils containing 2 sources of Cs-137 of 296 MBq and Am-241(Be) of 1.48 GBq respectively. The incidents were developed without relevant radiological implications had taken place. In this work those mentioned incidents are analyzed in order to determining the causes that originated the same ones, for this way to be able to elaborate recommendations with the purpose of to correct errors and to diminish the recurrence probability improving the safety in the use of these equipment. From the analyses of these incidents result that should put on more emphasis in the personnel training and the invigoration of the safety culture in the use of the industrial meters. Also a present panorama of the inventory of equipment, sources and users that possess these portable meters in the Argentine Republic is also presented. (Author)

  20. One health security: an important component of the global health security agenda.

    Science.gov (United States)

    Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle

    2014-01-01

    The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.

  1. AP1000 Design for Security

    International Nuclear Information System (INIS)

    Long, L.B.; Cummins, W.E.; Winters, J.W.

    2006-01-01

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000

  2. [Food and nutritional security: situation analysis of decentralization in the national public policy].

    Science.gov (United States)

    Vasconcellos, Ana Beatriz Pinto de Almeida; Moura, Leides Barroso Azevedo de

    2018-03-01

    The aim of this study was to analyze the situation with the decentralization of the Brazilian National System of Food and Nutritional Security (SISAN), created in 2006 under the Brazilian National Food and Nutritional Security Act (LOSAN). Based on the criteria for joining SISAN, as set out in Decree 7,272 of August 25, 2010, the authors analyzed data from the basic information surveys of the Brazilian Institute of Geography and Statistics, 2014 (Estadic e Munic/2014). The results show that decentralization of SISAN is still incipient at the municipal level, although all the states of Brazil have already joined the system. The social assistance sector has played an outstanding role in coordinating SISAN at the state and municipal levels, while in the latter the health sector has also played a relevant role. The analysis of food and nutritional security activities conducted to date, based on the sources of federal, state, and municipal funds, further shows that the federal sphere has still not played a strong inductive role capable of leading the expansion of SISAN. More effective funding mechanisms and the assignment of responsibilities to the states and municipalities are relevant factors for consolidating the system's state-level base and expanding the municipal base in the search for an identity and capillarity for SISAN.

  3. Comparative analysis of the practice of China and Russia joining the WTO

    Directory of Open Access Journals (Sweden)

    Anastasia Sergeyevna Loginova

    2015-09-01

    Full Text Available Objective to examine the positive and negative experience of China39s joining the World Trade Organization WTO that joined it on terms similar to the Russian ones for the best understanding of the advantages and disadvantages of joining and building the appropriate policy. Methods the objective of the work has been achieved through the application of both general and specific scientific methods. In particular the analysis and synthesis allowed to study the social and economic context of the state in the framework of joining the WTO the consequences of such membership and to identify the key areas for improvement of this step for Russia. Statistical techniques were used in the process of gathering information about the key economic indicators. The fundamental method was comparativelegal which made it possible to draw parallels in joining the WTO by various states. Results basing on the measures taken by China both before and after joining the WTO as well as evaluation of their implication the conclusion was made about its successful experience. The actions before joining were very effective. In particular they are applicable to the fields of agriculture automotive industry investment policy etc. The measures of nonaddress subsidizing maintaining the socioeconomic stability in the country the export orientation of the economy along with functioning of special economic zones with joint ventures are in the authors39 opinion constructive actions for Russiarsquos adaptation to the WTO. Scientific novelty for the first time the thesis is put forward about the similarity of the Russia and China conditions when joining the WTO. The analysis is made of the complex measures preceding and following the joining. The necessity is grounded of reflecting the China39s positive and negative experiences in the Russian policy. Practical significance the main provisions and conclusions can be used in the research activity in addressing the issues of Russiarsquos

  4. RESUME-95: Results of an International Field Test of Mobile Equipment for Emergency Response

    DEFF Research Database (Denmark)

    Hovgaard, Jens; Scott, Marian

    1997-01-01

    In 1995 the exercise RESUME-95 (Rapid Environmental Surveying Using Mobile Equipment) took place in Finland. Groups from 8 European countries joined the exercise. The methods used were airborne gamma-ray measurements, car-borne measurements and in situ stationary measurements. The results of the ...

  5. Joining of aluminum sheet and glass fiber reinforced polymer using extruded pins

    Science.gov (United States)

    Conte, Romina; Buhl, Johannes; Ambrogio, Giuseppina; Bambach, Markus

    2018-05-01

    The present contribution proposes a new approach for joining sheet metal and fiber reinforced composites. The joining process draws upon a Friction Stir Forming (FSF) process, which is performed on the metal sheet to produce slender pins. These pins are used to pierce through the composite. Joining is complete by forming a locking head out of the part if the pin sticks out of the composite. Pins of different diameters and lengths were produced from EN AW-1050 material, which were joined to glass fiber reinforced polyamide-6. The strength of the joint has been experimentally tested in order to understand the effect of the process temperature on the pins strength and therefore on the joining. The results demonstrate the feasibility of this new technique, which uses no excess material.

  6. Fermilab Friends for Science Education | Join Us

    Science.gov (United States)

    Fermilab Friends for Science Education FFSE Home About Us Join Us Support Us Contact Us Join Us improving science (science, technology, engineering and mathematics) education. Your donation allows us to membership dues allow us to create new, innovative science education programs, making the best use of unique

  7. The Firewall and Security of Information Systems

    OpenAIRE

    Radut Carmen; Albici Mihaela; Tenovici Cristina Otilia

    2010-01-01

    Information security is a broader concept which refers to ensuring the integrity, confidentiality and availability of information. The dynamics of information technology to induce new risks to which organizations must implement new measures of control. Technological development has been accompanied by security solutions, equipment manufacturers and applications including technical methods of protection performance. However, while in information technology change is exponential, the human comp...

  8. Rhenium Mechanical Properties and Joining Technology

    Science.gov (United States)

    Reed, Brian D.; Biaglow, James A.

    1996-01-01

    Iridium-coated rhenium (Ir/Re) provides thermal margin for high performance and long life radiation cooled rockets. Two issues that have arisen in the development of flight Ir/Re engines are the sparsity of rhenium (Re) mechanical property data (particularly at high temperatures) required for engineering design, and the inability to directly electron beam weld Re chambers to C103 nozzle skirts. To address these issues, a Re mechanical property database is being established and techniques for creating Re/C103 transition joints are being investigated. This paper discusses the tensile testing results of powder metallurgy Re samples at temperatures from 1370 to 2090 C. Also discussed is the evaluation of Re/C103 transition pieces joined by both, explosive and diffusion bonding. Finally, the evaluation of full size Re transition pieces, joined by inertia welding, as well as explosive and diffusion bonding, is detailed.

  9. Performance of electro-plated and joined components for divertor application

    International Nuclear Information System (INIS)

    Krauss, Wolfgang; Lorenz, Julia; Konys, Jürgen

    2013-01-01

    Highlights: • Active interlayers of Ni and Pd were electroplated on W to assist joining. • Demonstrator types of W-steel and W–W joints were successfully fabricated. • Diffusion processes increase operation temperature above brazing temperature. • Ni electro-plating is less sensitive to variation of deposition parameters than Pd. • Shear tests showed values in resistance comparable to those of commercial fillers. -- Abstract: A general challenge in divertor development, independently of design type and cooling medium water or helium, is the reliable and adapted joining of components. Depending on the design variants, the characteristics of the joints will be focused on functional or structural behavior to guarantee e.g. good thermal conductivity and sufficient mechanical strength. All variants will have in common that tungsten is the plasma facing material. Thus, material combinations to be joined will range from Cu base over steel to tungsten. Especially tungsten shows lacks in adapted joining due to its metallurgical behavior ranging from immiscibility over bad wetting up to brittle intermetallic phase formation. Joining assisted by electro-chemical deposition of functional and filler layers showed that encouraging progress was achieved in wetting applying nickel interlayers. Nickel proved to be a good reference material but alternative elements (e.g. Pd, Fe) may be more attractive in fusion to manufacture suitable joints. Replacing of Ni as activator element by Pd for W/W or W/steel joints was achieved and joining with Cu-filler was successfully performed. Manufactured joints were characterized applying metallurgical testing and SEM/EDX analyses demonstrating the applicability of Pd activator. First shear tests showed that the joints exhibit mechanical stability sufficient for technical application

  10. New Joining Technology for Optimized Metal/Composite Assemblies

    Directory of Open Access Journals (Sweden)

    Holger Seidlitz

    2014-01-01

    Full Text Available The development of a new joining technology, which is used to manufacture high strength hybrid constructions with thermoplastic composites (FRP and metals, is introduced. Similar to natural regulation effects at trees, fibers around the FRP joint become aligned along the lines of force and will not be destroyed by the joining process. This is achieved by the local utilization of the specific plastic flow properties of the FRT and metal component. Compared with usual joining methods—such as flow drill screws, blind and self-piercing rivets—noticeably higher tensile properties can be realized through the novel process management. The load-bearing capability increasing effect could be proved on hybrid joints with hot-dip galvanized steel HX420LAD and orthotropic glass—as well as carbon—fiber reinforced plastics. The results, which were determined in tensile-shear and cross-shear tests according to DIN EN ISO 14273 and DIN EN ISO 14272, are compared with holding loads of established joining techniques with similar joining point diameter and material combinations.

  11. Aluminum and stainless steel tubes joined by simple ring and welding process

    Science.gov (United States)

    Townhill, A.

    1967-01-01

    Duranel ring is used to join aluminum and stainless steel tubing. Duranel is a bimetal made up of roll-bonded aluminum and stainless steel. This method of joining the tubing requires only two welding operations.

  12. Lecture 13: Control System Cyber Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Today, the industralized world lives in symbiosis with control systems: it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and outline why the presenter is still waiting for a change in paradigm. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and...

  13. Cohesive delamination and frictional contact on joining surface via XFEM

    Directory of Open Access Journals (Sweden)

    Francesco Parrinello

    2018-02-01

    Full Text Available In the present paper, the complex mechanical behaviour of the surfaces joining two differentbodies is analysed by a cohesive-frictional interface constitutive model. The kinematical behaviouris characterized by the presence of discontinuous displacement fields, that take place at the internalconnecting surfaces, both in the fully cohesive phase and in the delamination one. Generally, in order tocatch discontinuous displacement fields, internal connecting surfaces (adhesive layers are modelled bymeans of interface elements, which connect, node by node, the meshes of the joined bodies, requiringthe mesh to be conforming to the geometry of the single bodies and to the relevant connecting surface.In the present paper, the Extended Finite Element Method (XFEM is employed to model, both fromthe geometrical and from the kinematical point of view, the whole domain, including the connectedbodies and the joining surface. The joining surface is not discretized by specific finite elements, butit is defined as an internal discontinuity surface, whose spatial position inside the mesh is analyticallydefined. The proposed approach is developed for two-dimensional composite domains, formed by twoor more material portions joined together by means of a zero thickness adhesive layer. The numericalresults obtained with the proposed approach are compared with the results of the classical interfacefinite element approach. Some examples of delamination and frictional contact are proposed withlinear, circular and curvilinear adhesive layer.

  14. Equipment for capping drums, especially with radioactive waste

    International Nuclear Information System (INIS)

    Bednarik, F.

    1987-01-01

    The equipment consists of a pneumatic cylinder, lever systems with jaws, guide bars, and of securing pins. The top cylinder lid and the bottom cylinder lid provided with openings are slidably attached to a shaft firmly connected to a piston and a support plate. Firmly attached to the bottom lid using brackets are pins holding connecting rods controlling the double-arm levers pivoted on pins, featuring jaws pivoted on forks firmly attached to the support plate and provided with a replaceable spacer insert. The guide bars are firmly attached to the support plate via braces and stiffeners. The securing pins are loaded with springs seated in the braces. The benefits of the equipment include that the lid closing levers with jaws, mechanically controlled using one pneumatic cylinder, thanks to their number and configuration, close the lid around the drum border provided with small recesses which do not reach above the circumference of the drum being closed. The equipment can also be used for carrying closed drums, this also during compressed air failures because the levers with jaws are secured in position with the pneumatic cylinder leg. (J.B.). 1 fig

  15. Maritime energy and security: Synergistic maximization or necessary tradeoffs?

    International Nuclear Information System (INIS)

    Nyman, Elizabeth

    2017-01-01

    Offshore energy is big business. The traditional source of maritime energy, offshore petroleum and gas, has been on the rise since a reliable method of extraction was discovered in the mid-20th century. Lately, it has been joined by offshore wind and tidal power as alternative “green” sources of maritime energy. Yet all of this has implications for maritime environmental regimes as well, as maritime energy extraction/generation can have a negative effect on the ocean environment. This paper considers two major questions surrounding maritime energy and environmental concerns. First, how and why do these two concerns, maritime energy and environmental protection, play against each other? Second, how can states both secure their energy and environmental securities in the maritime domain? Maximizing maritime energy output necessitates some environmental costs and vice versa, but these costs vary with the type of offshore energy technology used and with the extent to which states are willing to expend effort to protect both environmental and energy security. - Highlights: • Security is a complicated concept with several facets including energy and environmental issues. • Offshore energy contributes to energy supply but can have environmental and monitoring costs. • Understanding the contribution of offshore energy to security depends on which security facet is deemed most important.

  16. Enabling Dissimilar Material Joining Using Friction Stir Scribe Technology

    Energy Technology Data Exchange (ETDEWEB)

    Hovanski, Yuri; Upadyay, Piyush; Kleinbaum, Sarah; Carlson, Blair; Boettcher, Eric; Ruokolainen, Robert

    2017-04-05

    One challenge in adapting welding processes to dissimilar material joining is the diversity of melting temperatures of the different materials. Although the use of mechanical fasteners and adhesives have mostly paved the way for near-term implementation of dissimilar material systems, these processes only accentuate the need for low-cost welding processes capable of joining dissimilar material components regardless of alloy, properties, or melting temperature. Friction stir scribe technology was developed to overcome the challenges of joining dissimilar material components where melting temperatures vary greatly, and properties and/or chemistry are not compatible with more traditional welding processes. Although the friction stir scribe process is capable of joining dissimilar metals and metal/polymer systems, a more detailed evaluation of several aluminum/steel joints is presented herein to demonstrate the ability to both chemically and mechanically join dissimilar materials.

  17. 27 CFR 18.19 - Security.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Security. 18.19 Section 18.19 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE... Provisions Document Requirements § 18.19 Security. The concentrate plant and equipment will be so constructed...

  18. Physical protection equipment study. Final report

    International Nuclear Information System (INIS)

    Haberman, W.

    1977-06-01

    This report summarizes the work performed by MITRE for the U.S. Nuclear Regulatory Commission. The major products of this effort are a Catalog of Physical Protection Equipment, a Guide for Evaluation of Physical Protection Equipment, a book of Reference Materials, and a set of guidelines for use in the development of a methodology for measuring levels of security system effectiveness. A summary of recommendations resulting from this study is also presented

  19. QuickJoin—Fast Neighbour-Joining Tree Reconstruction

    DEFF Research Database (Denmark)

    Mailund; Pedersen, Christian N. Storm

    2004-01-01

    We have built a tool for fast construction of very large phylogenetic trees. The tool uses heuristics for speeding up the neighbour-joining algorithm—while still constructing the same tree as the original neighbour-joining algorithm—making it possible to construct trees for ~8000 species in less...

  20. Effects of processing parameters on Be/CuCrZr joining

    International Nuclear Information System (INIS)

    Park, Jeong-Yong; Lee, Jung-Suk; Choi, Byung-Kwon; Park, Sang-Yun; Hong, Bong Guen; Jeong, Yong Hwan; Jung, Ki-Jung

    2007-01-01

    A joining of Be/CuCrZr has been considered as the key technology for the fabrication of the ITER first wall. Among the joining methods, Hot isostatic pressing (HIP), which is one of the diffusion bonding methods, is the most feasible method to join the Be and CuCrZr alloy. In the HIP joining of Be and CuCrZr, the interlayer was used to prevent the formation of brittle intermetallic compounds in the interface. Therefore, it is crucial to select a suitable interlayer for a joining of Be and CuCrZr. On the other hand, the diffusion between Be and CuCrZr would be enhanced with an increase of the HIP joining temperature, thereby increasing the joint strength. However, the HIP joining temperature is limited by the mechanical properties of CuCrZr. During the fabrication process of the ITER first wall, CuCrZr is subjected to several thermal cycles including a solution annealing, a cooling and an aging. The HIP joining of Be and CuCrZr corresponds to the aging of CuCrZr. The HIP joining at a higher temperature would cause a degradation of the mechanical properties of CuCrZr by an overaging effect although it is preferable for an improvement of the joint strength. In this study, the effect of the cooling rate on the mechanical properties of aged CuCrZr was investigated to find the maximum HIP temperature without a degradation of the mechanical properties of CuCrZr

  1. Transport of bundles and equipment which contain radioactive material

    International Nuclear Information System (INIS)

    1987-01-01

    This norm settles down: 1) The requirements that should be completed in relation to safety precautions and protection against ionizing radiations during the transport radioactive material and/or equipment containing it, in order to avoid risks to the collective and the environment. 2) The basic information on procedures that will be completed in the event of happening accidents during the transport or the transit storage of radioactive material and/or equipment that contain it. 3) The measures of security and physical protection during the transport of radioactive material and/or equipment containing it. This norm is applied: 1) To all the ways of transport (by air, by ground and by ship, fluvial and marine) of radioactive material and/or equipment that contain it. 2) To all natural or legal, public or private person, devoted to install, produce, trade, market, import or export radioactive materials and/or equipment containing it, and that needs to transport them as main or secondary activity [es

  2. The Advantages and Disadvantages of Seeking Commonality in Military Equipment

    Science.gov (United States)

    2011-01-01

    RAND ReseARch AReAs Children and Families eduCation and the arts energy and environment health and health Care inFrastruCture and transportation... international aFFairs law and Business national seCurity population and aging puBliC saFety sCienCe and teChnology terrorism and homeland seCurity this...rand 2011 www.rand.org The Advantages and Disadvantages of Seeking Commonality in Military Equipment I ncreasingly, the Army and the Department

  3. On the Complexity of Inner Product Similarity Join

    DEFF Research Database (Denmark)

    Ahle, Thomas Dybdahl; Pagh, Rasmus; Razenshteyn, Ilya

    2016-01-01

    A number of tasks in classification, information retrieval, recommendation systems, and record linkage reduce to the core problem of inner product similarity join (IPS join): identifying pairs of vectors in a collection that have a sufficiently large inner product. IPS join is well understood when...... bounds for (A)LSH-based algorithms. In particular, we show that asymmetry can be avoided by relaxing the LSH definition to only consider the collision probability of distinct elements. A new indexing method for IPS based on linear sketches, implying that our hardness results are not far from being tight...

  4. 27 CFR 19.281 - Security.

    Science.gov (United States)

    2010-04-01

    ... tanks containing spirits, denatured spirits, or wine shall be individually locked or locked within an... wines or the rooms or buildings in which they are housed, shall be equipped so that they may be secured... lights, alarm systems, guard services) or changes in construction, arrangement, or equipment shall be...

  5. Secure vendor environment (SVE) for PACS

    Science.gov (United States)

    Honeyman-Buck, Janice; Frost, Meryll

    2005-04-01

    A Secure Vendor Environment (SVE) was created to protect radiology modalities from network intrusion, worms, viruses, and other forms of damaging attacks. Many vendors do not attempt any form of network security and if an institution demands a non-standard and secure installation, a future system upgrade could and frequently does eliminate any security measures installed during the initial installation. The SVE isolates the vendor equipment behind a virtual firewall on a private network that is invisible to the outside world. All interactions must go though a device containing two network interface cards called an Application Processor that acts as a store-and forward router, performs DICOM repair, proxies modality worklist, and isolates the vendor modalities. A small VPN appliance can open the device temporarily for remote access by vendor engineers. Prior to the routine installation of the SVE, vendor equipment was often attacked by hostile network intruders and viruses or worms, sometimes rendering the equipment unusable until the vendor could reload the system. The resulted in considerable clinical downtime and loss of revenue. Since the relatively low cost SVE solution has routinely been installed with all new equipment, no intrusions have occurred, although our network sniffers and intrusion detectors indicate that we are constantly being scanned for vulnerability. Purpose: To provide a secure network for vendor equipment in a PACS environment while allowing vendor access for upgrades and system repairs. Method: The network administrators at our university believe that network security should be implemented at the machine level rather than relying on a firewall. A firewall solution could conceivably block unwanted intrusion from outside the university network, but would still allow literally thousands of potential network users to get through to the PACS network. All the PACS archive, display and routing systems are individually protected from intrusion, but

  6. Report on Security 82

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    The 1982 trade fair Security 82 presented a variety of equipment and systems for protection and security in general. Apart from physical protection devices to prevent theft, a great number of fire protection devices, transmitting apparatus, locator systems, metal detectors, protective devices against signal interception, and complete alarm systems were exhibited and explained. By means of specifications and brief descriptions, sometimes with figures, predominantly passive and active infrared sensors, light and microwave sensors, ultrasound and microwave Doppler effect devices for indoor and outdoor physical protection, as well as other alarm systems and fire alarm systems or entry control systems are presented in this report. Design and functioning mode of the equipment presented are illustrated by explaining the fields of employment. (orig.) [de

  7. Joining of Gamma Titanium Aluminides

    National Research Council Canada - National Science Library

    Baeslack, William

    2002-01-01

    .... Although organized and presented by joining process, many of the observations made and relationships developed, particularly those regarding the weldability and welding metallurgy of gamma titanium...

  8. Test and Analysis of Metallurgical Converter Equipment

    Directory of Open Access Journals (Sweden)

    Shan Pang

    2013-05-01

    Full Text Available Oxygen top-blow converter is the main equipment in steel making, and its work reliability decides the security and economy of steel production. Therefore, how to design and test analysis of convertor has been an important subject of industry research. Geometric modelling and structure analysis of converter tilting device by using Pro/E program .The design Principle, basic design structure were analyzed in detail. The computer simulation software of metallurgical converter equipment and how to use it were introduced .It developed by VC++ software. The position of barycentre and moment curve in No.3 and No.4 are calculated. The converter acceleration down dip can be resolved by comparing the moment curve and center curve.

  9. 49 CFR 393.130 - What are the rules for securing heavy vehicles, equipment and machinery?

    Science.gov (United States)

    2010-10-01

    ... heavy vehicles, equipment and machinery? (a) Applicability. The rules in this section apply to the transportation of heavy vehicles, equipment and machinery which operate on wheels or tracks, such as front end... heavy vehicles, equipment or machinery with crawler tracks or wheels. (1) In addition to the...

  10. MOBILE DEVICES AND EFFECTIVE INFORMATION SECURITY

    Directory of Open Access Journals (Sweden)

    Igor Bernik

    2013-05-01

    Full Text Available Rapidly increasing numbers of sophisticated mobile devices (smart phones, tab computers, etc. all over the world mean that ensuring information security will only become a more pronounced problem for individuals and organizations. It’s important to effectively protect data stored on or accessed by mobile devices, and also during transmission of data between devices and between device and information system. Technological and other trends show, that the cyber threats are also rapidly developing and spreading. It's crucial to educate users about safe usage and to increase their awareness of security issues. Ideally, users should keep-up with technological trends and be well equipped with knowledge otherwise mobile technology will significantly increase security risks. Most important is that we start educating youth so that our next generations of employees will be part of a culture of data and information security awareness.

  11. Security Controls for NPP I and C Systems

    International Nuclear Information System (INIS)

    Kim, Y. M.; Jeong, C. H.; Kim, T. H.

    2014-01-01

    In Korea, regulatory body have required cyber security plan for nuclear I and C system. Also, all I and C systems and equipment must be classified according to cyber security level and technical, operational and managerial security controls must be provided based on each level. It is necessary to determine the best set of security controls for NPP I and C system. In our research, selection, implementation and verification process of security controls which can be used for I and C systems has developed. For establishing the cyber security of the nuclear I and C system, special cyber security system which consider the difference between general IT system and nuclear I and C system is needed. This research, we developed security improvement methodology for NPP I and C system through establishing security control, applying and verifying activity. Also, the cyber security activities which are needed during development are defined. It is expected that the methodology which has been developed by this research can be used for establish, implement, evaluate the security controls for protecting nuclear I and C system from cyber-attacks

  12. Security Controls for NPP I and C Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Y. M.; Jeong, C. H. [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Kim, T. H. [Formal Works Inc., Seoul (Korea, Republic of)

    2014-05-15

    In Korea, regulatory body have required cyber security plan for nuclear I and C system. Also, all I and C systems and equipment must be classified according to cyber security level and technical, operational and managerial security controls must be provided based on each level. It is necessary to determine the best set of security controls for NPP I and C system. In our research, selection, implementation and verification process of security controls which can be used for I and C systems has developed. For establishing the cyber security of the nuclear I and C system, special cyber security system which consider the difference between general IT system and nuclear I and C system is needed. This research, we developed security improvement methodology for NPP I and C system through establishing security control, applying and verifying activity. Also, the cyber security activities which are needed during development are defined. It is expected that the methodology which has been developed by this research can be used for establish, implement, evaluate the security controls for protecting nuclear I and C system from cyber-attacks.

  13. Joining NbTi superconductors by ultrasonic welding

    International Nuclear Information System (INIS)

    Hafstrom, J.W.; Killpatrick, D.H.; Niemann, R.C.; Purcell, J.R.; Thresh, H.R.

    1976-01-01

    An important consideration in the design and construction of large, high-field, superconducting magnets is the capability to fabricate reliable, high-strength, low-resistance joints. A process for joining NbTi, copper stabilized, superconducting composites by ultrasonic welding is described. This process yields a joint strength comparable to that of the superconducting composite and a resistivity significantly lower than achieved by conventional soft soldering. The superconducting properties of the composite are not affected by the joining process. Scarfing the joint to maintain a constant conductor cross section does not degrade its electrical or mechanical properties. The application of the ultrasonic joining process, including process control, scarfing, and NDT procedures, in the construction of the superconducting magnet (U.S. SCMS) for the joint U. S. -- Soviet MHD program is described

  14. Cooperative Wireless Communications and Physical Layer Security : State of the Art

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    in the mobile equipment is not feasible due to resource constraints. Cooperative wireless communication (CWC) is the upcoming virtual MIMO technique to combat fading and achieve diversity through user cooperation. Physical layer security (PLS) is the imminent security guarantee for the cooperative communication....

  15. [Early prenatal diagnosis of diprosopic syncephalic joined twins].

    Science.gov (United States)

    Picaud, A; Nlome-Nze, A R; Engongha-Beka, T; Ogowet-Igumu, N

    1990-06-01

    The authors summarize the case of diprosopic syncephalic joined twins diagnosed at 22 weeks of pregnancy by ultrasonography performed because of hydramnios. The rate of separation anomalies of monozygotic twins is assessed by a review of the literature: from 1 to twenty to fifty thousands for joined twins to 1 per cent fifty thousand to fifteen millions for diprosopus. The etiology is the result of a late division of the egg between D12 and D16. Often an encephalic diprosopic joined twins cause elevated levels of maternal serum alpha protein. Early ultrasonography permits to consider a vaginal therapeutic abortion.

  16. Establishing a National Nuclear Security Support Centre

    International Nuclear Information System (INIS)

    2014-02-01

    The responsibility for creating and sustaining a nuclear security regime for the protection of nuclear and other radiological material clearly belongs to the State. The nuclear security regime resembles the layers of an onion, with the equipment and personnel securing the borders and ports representing the outer layer, and nuclear power, research reactors and nuclear medicine facilities representing the inner layers, and the actual target material representing the core. Components of any nuclear security regime include not only technological systems, but the human resources needed to manage, operate, administer and maintain equipment, including hardware and software. This publication provides practical guidance on the establishment and maintenance of a national nuclear security support centre (NSSC) as a means to ensure nuclear security sustainability in a State. An NSSC's basic purpose is to provide a national focal point for passing ownership of nuclear security knowledge and associated technical skills to the competent authorities involved in nuclear security. It describes processes and methodologies that can be used by a State to analyse the essential elements of information in a manner that allows several aspects of long term, systemic sustainability of nuclear security to be addressed. Processes such as the systematic approach to training, sometimes referred to as instructional system design, are the cornerstone of the NSSC concept. Proper analysis can provide States with data on the number of personnel requiring training and instructors needed, scale and scope of training, technical and scientific support venues, and details on the type and number of training aids or simulators required so that operational systems are not compromised in any way. Specific regulatory guidance, equipment or technology lists, or specifications/design of protection systems are not included in this publication. For such details, the following IAEA publications should be consulted

  17. Wireless Local Area Network (WLAN) Vulnerability Assessment and Security

    National Research Council Canada - National Science Library

    Kessel, Adam; Goodwin, Shane

    2005-01-01

    The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC...

  18. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  19. The tendency of medical electrical equipment - IEC 60601-2-54: Particular requirements for the basic safety and essential performance of x-ray equipment for radiography and radioscopy

    International Nuclear Information System (INIS)

    Roh, Young Hoon; Kim, Jung Min

    2015-01-01

    Medical electrical equipment - Part 1: General requirement for basic safety and essential performance of MFDS was revised as 3th edition and Medical electrical equipment Part 2-54: Particular requirements for the basic safety and essential performance of X-ray equipment will be expected to be announced as notification. Therefore this technical report was written to introduce provision of the particular requirements, replacement, addition, amendment. The purpose of this particular requirements is to secure requirements for basic safety and essential performance of X-ray equipment for radiography and radioscopy. X-ray high voltage generator, mechanical protective device, protection against radiation is included in this particular requirements. Medical electrical equipment - Part 1, Part 1-2, Part 1-3 is applied to this particular requirements. If the requirements is announced as notification, It is expected to widen understanding for basic safety and essential performance of X-ray equipment for radiography and radioscopy and play a part to internationalize of medical equipment

  20. Machining, joining and modifications of advanced materials

    CERN Document Server

    Altenbach, Holm

    2016-01-01

    This book presents the latest advances in mechanical and materials engineering applied to the machining, joining and modification of modern engineering materials. The contributions cover the classical fields of casting, forming and injection moulding as representative manufacturing methods, whereas additive manufacturing methods (rapid prototyping and laser sintering) are treated as more innovative and recent technologies that are paving the way for the manufacturing of shapes and features that traditional methods are unable to deliver. The book also explores water jet cutting as an innovative cutting technology that avoids the heat build-up typical of classical mechanical cutting. It introduces readers to laser cutting as an alternative technology for the separation of materials, and to classical bonding and friction stir welding approaches in the context of joining technologies. In many cases, forming and machining technologies require additional post-treatment to achieve the required level of surface quali...

  1. Transition piece for joining together tubular pieces

    International Nuclear Information System (INIS)

    Holko, K.H.

    1981-01-01

    A transition piece for joining together tubular pieces formed respectively from a low alloy or carbon steel and a high temperature alloy containing at least 16% chromium includes a plurality of tubular parts welded together and formed from materials of selected composition with a maximum chromium content difference of 5% between adjacent parts when the chromium content of each part is below 10% and a maximum chromium difference of 7% between adjacent parts when the chromium content of either part is above 10%. The transition parts are also graded as to such characteristics as thermal expansion coefficient. The transition parts at opposite ends of the transition joint have chromium percentages similar to the tubular pieces to which they are to be joined. The parts may be joined by fusion and/or friction welding and parts may be formed by fusion weld deposition. (author)

  2. chemical safety and chemical security overview

    African Journals Online (AJOL)

    IICBA01

    Wafaa M. Abdou. Chemical Industries Division, National Research Centre, ... substances to attain an acceptably low risk of exposure. Security is: ... Sharing locations of chemicals can publicize targets for theft .... D. Personal Protective Equipments (PPE): ... E. Lighting & Noise Levels ... PPE. ➢ Autoclave or sterilize wastes.

  3. Enabling secure and privacy preserving communications in smart grids

    CERN Document Server

    Li, Hongwei

    2014-01-01

    This brief focuses on the current research on security and privacy preservation in smart grids. Along with a review of the existing works, this brief includes fundamental system models, possible frameworks, useful performance, and future research directions. It explores privacy preservation demand response with adaptive key evolution, secure and efficient Merkle tree based authentication, and fine-grained keywords comparison in the smart grid auction market. By examining the current and potential security and privacy threats, the author equips readers to understand the developing issues in sma

  4. History-based joins : semantics, soundness and implementation

    NARCIS (Netherlands)

    Hee, van K.M.; Oanea, O.I.; Serebrenik, A.; Sidorova, N.; Voorhoeve, M.; Dustdar, S.; Fiadeiro, J.L.; Sheth, A.

    2006-01-01

    In this paper we study the use of case history for control structures in workflow processes. In particular we introduce a historydependent join. History dependent control offers much more modeling power than classical control structures and it solves several semantical problems of industrial

  5. Summary of Dissimilar Metal Joining Trials Conducted by Edison Welding Institute

    Energy Technology Data Exchange (ETDEWEB)

    MJ Lambert

    2005-11-18

    Under the direction of the NASA-Glenn Research Center, the Edison Welding Institute (EWI) in Columbus, OH performed a series of non-fusion joining experiments to determine the feasibility of joining refractory metals or refractory metal alloys to Ni-based superalloys. Results, as reported by EWI, can be found in the project report for EWI Project 48819GTH (Attachment A, at the end of this document), dated October 10, 2005. The three joining methods used in this investigation were inertia welding, magnetic pulse welding, and electro-spark deposition joining. Five materials were used in these experiments: Mo-47Re, T-111, Hastelloy X, Mar M-247 (coarse-grained, 0.5 mm to several millimeter average grain size), and Mar M-247 (fine-grained, approximately 50 {micro}m average grain size). Several iterative trials of each material combination with each joining method were performed to determine the best practice joining method. Mo-47Re was found to be joined easily to Hastelloy X via inertia welding, but inertia welding of the Mo-alloy to both Mar M-247 alloys resulted in inconsistent joint strength and large reaction layers between the two metals. T-111 was found to join well to Hastelloy X and coarse-grained Mar M-247 via inertia welding, but joining to fine-grained Mar M-247 resulted in low joint strength. Magnetic pulse welding (MPW) was only successful in joining T-111 tubing to Hastelloy X bar stock. The joint integrity and reaction layer between the metals were found to be acceptable. This single joining trial, however, caused damage to the electromagnetic concentrators used in this process. Subsequent design efforts to eliminate the problem resulted in a loss of power imparted to the accelerating work piece, and results could not be reproduced. Welding trials of Mar M-247 to T-111 resulted in catastrophic failure of the bar stock, even at lower power. Electro-spark deposition joining of Mo-47Re, in which the deposited material was Hastelloy X, did not have a

  6. Summary of Dissimilar Metal Joining Trials Conducted by Edison Welding Institute

    International Nuclear Information System (INIS)

    MJ Lambert

    2005-01-01

    Under the direction of the NASA-Glenn Research Center, the Edison Welding Institute (EWI) in Columbus, OH performed a series of non-fusion joining experiments to determine the feasibility of joining refractory metals or refractory metal alloys to Ni-based superalloys. Results, as reported by EWI, can be found in the project report for EWI Project 48819GTH (Attachment A, at the end of this document), dated October 10, 2005. The three joining methods used in this investigation were inertia welding, magnetic pulse welding, and electro-spark deposition joining. Five materials were used in these experiments: Mo-47Re, T-111, Hastelloy X, Mar M-247 (coarse-grained, 0.5 mm to several millimeter average grain size), and Mar M-247 (fine-grained, approximately 50 (micro)m average grain size). Several iterative trials of each material combination with each joining method were performed to determine the best practice joining method. Mo-47Re was found to be joined easily to Hastelloy X via inertia welding, but inertia welding of the Mo-alloy to both Mar M-247 alloys resulted in inconsistent joint strength and large reaction layers between the two metals. T-111 was found to join well to Hastelloy X and coarse-grained Mar M-247 via inertia welding, but joining to fine-grained Mar M-247 resulted in low joint strength. Magnetic pulse welding (MPW) was only successful in joining T-111 tubing to Hastelloy X bar stock. The joint integrity and reaction layer between the metals were found to be acceptable. This single joining trial, however, caused damage to the electromagnetic concentrators used in this process. Subsequent design efforts to eliminate the problem resulted in a loss of power imparted to the accelerating work piece, and results could not be reproduced. Welding trials of Mar M-247 to T-111 resulted in catastrophic failure of the bar stock, even at lower power. Electro-spark deposition joining of Mo-47Re, in which the deposited material was Hastelloy X, did not have a

  7. Digital I and C: Safety, Security and Availability

    International Nuclear Information System (INIS)

    Liebhart, E.

    2012-01-01

    When planning to use digital I and C equipment in nuclear facilities (such as nuclear power plants or research reactors) the main concern is how to manage and control the aspect of 'software as part of digital I and C equipment'. Advantages, possible implications and risks of using digital signal processing channels, especially regarding the two key aspects of operational safety and cyber security are addressed, including examples of today's electronics such as Mirion's digital signal processing system Model proTK (or TK 250). (author)

  8. 40 CFR 205.5-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2... PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security... a national security exemption is required. (c) For purposes of section 11(d) of the Act, any...

  9. Development of Joining Technologies for the ITER Blanket First Wall

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Byoung Kwon; Jung, Yang Il; Park, Dong Jun; Kim, Hyun Gil; Park, Sang Yoon; Park, Jeong Yong; Jeong, Yong Hwan; Lee, Dong Won; Kim, Suk Kwon [KAERI, Daejeon (Korea, Republic of)

    2011-01-15

    The design of the ITER blanket first wall includes the Beryllium amour tiles joined to CuCrZr heat sink with stainless steel cooling tubes. For the ITER application, the Be/CuCrZr/SS joint was proposed as a first wall material. The joining of Be/CuCrZr as well as CuCrZr/SS was generally carried out by using a hot isostatic pressing (CuC) in many countries. The joining strength for Be/CuCrZr is relatively lower than that for CuCrZr/SS, since we usually forms surface oxides (BeO) and brittle a metallics with Cu. Therefore, the joining technology for the Be/CuCrZr joint has been investigated. Be is apt to adsorb oxygen in an air atmosphere, so we should be etched to eliminate the surface pre-oxide using a chemical solution and Ar ions in a vacuum chamber. Then we is coated with a first was to prevent further oxidation. The kinds of a first we are chosen to be able to enhance the joining strength as inhibiting excessive be diffusion. The performance of the Be/CuCrZr/SS joint used for the ITER first wall is primarily dependent on the joining strength of the Be/CuCrZr interface. The Cr/Cu and Ti/Cr/Cu interlayers enabled the successful joining of be tile to CuCrZr plate. Moreover, ion-beam assisted deposition (IBAD) increased joining strength of the Be/CuCrZr joint mock-ups. IBAD induced the increased packing of depositing atoms, which resulted in denser and more adhesive interlayers. The interlayers formed by IBAD process revealed about 40% improved resistance to the scratch test. It is suggested that the improved adhesion of coating interlayers enabled tight joining of Be and CuCrZr blocks. As compared to without IBAD coating, the shear strength as well as the 4-point bend strength were increased more than 20% depending on interlayer types and coating conditions

  10. Development of Joining Technologies for the ITER Blanket First Wall

    International Nuclear Information System (INIS)

    Choi, Byoung Kwon; Jung, Yang Il; Park, Dong Jun; Kim, Hyun Gil; Park, Sang Yoon; Park, Jeong Yong; Jeong, Yong Hwan; Lee, Dong Won; Kim, Suk Kwon

    2011-01-01

    The design of the ITER blanket first wall includes the Beryllium amour tiles joined to CuCrZr heat sink with stainless steel cooling tubes. For the ITER application, the Be/CuCrZr/SS joint was proposed as a first wall material. The joining of Be/CuCrZr as well as CuCrZr/SS was generally carried out by using a hot isostatic pressing (CuC) in many countries. The joining strength for Be/CuCrZr is relatively lower than that for CuCrZr/SS, since we usually forms surface oxides (BeO) and brittle a metallics with Cu. Therefore, the joining technology for the Be/CuCrZr joint has been investigated. Be is apt to adsorb oxygen in an air atmosphere, so we should be etched to eliminate the surface pre-oxide using a chemical solution and Ar ions in a vacuum chamber. Then we is coated with a first was to prevent further oxidation. The kinds of a first we are chosen to be able to enhance the joining strength as inhibiting excessive be diffusion. The performance of the Be/CuCrZr/SS joint used for the ITER first wall is primarily dependent on the joining strength of the Be/CuCrZr interface. The Cr/Cu and Ti/Cr/Cu interlayers enabled the successful joining of be tile to CuCrZr plate. Moreover, ion-beam assisted deposition (IBAD) increased joining strength of the Be/CuCrZr joint mock-ups. IBAD induced the increased packing of depositing atoms, which resulted in denser and more adhesive interlayers. The interlayers formed by IBAD process revealed about 40% improved resistance to the scratch test. It is suggested that the improved adhesion of coating interlayers enabled tight joining of Be and CuCrZr blocks. As compared to without IBAD coating, the shear strength as well as the 4-point bend strength were increased more than 20% depending on interlayer types and coating conditions

  11. HITACHI security concept for industrial control systems

    International Nuclear Information System (INIS)

    Endoh, H.; Yamada, T.; Okubo, S.; Nakano, T.

    2012-01-01

    Security is a necessary factor for the safe and efficient operation of today's control systems. To ensure safe operation of control systems throughout their lifetime, security measures must be carefully planned in the development phase and then maintained continuously during the operation phase and other following phases. To ensure operation within the system's safe states, Hitachi proposes security concept processes (1) to derive security measures rationally and (2) to maintain the security model over the system life cycle. Hitachi also proposes security development programs which support the integration of standards-compliant systems and development of robust control equipment. (author)

  12. Physical security of nuclear facilities

    International Nuclear Information System (INIS)

    Dixon, H.

    1987-01-01

    A serious problem with present security systems at nuclear facilities is that the threats and standards prepared by the NRC and DOE are general, and the field offices are required to develop their own local threats and, on that basis, to prepared detailed specifications for security systems at sites in their jurisdiction. As a result, the capabilities of the systems vary across facilities. Five steps in particular are strongly recommended as corrective measures: 1. Those agencies responsible for civil nuclear facilities should jointly prepare detailed threat definitions, operational requirements, and equipment specifications to protect generic nuclear facilities, and these matters should be issued as policy. The agencies should provide sufficient detail to guide the design of specific security systems and to identify candidate components. 2. The DOE, NRC, and DOD should explain to Congress why government-developed security and other military equipment are not used to upgrade existing security systems and to stock future ones. 3. Each DOE and NRC facility should be assessed to determine the impact on the size of the guard force and on warning time when personnel-detecting radars and ground point sensors are installed. 4. All security guards and technicians should be investigated for the highest security clearance, with reinvestigations every four years. 5. The processes and vehicles used in intrafacility transport of nuclear materials should be evaluated against a range of threats and attack scenarios, including violent air and vehicle assaults. All of these recommendations are feasible and cost-effective. The appropriate congressional subcommittees should direct that they be implemented as soon as possible

  13. Overview of the use and radiological protection of body scanner equipment in Brazil

    International Nuclear Information System (INIS)

    Souza, D.A.P.; Nascimento, C.S.; Silva, F.C.A. da

    2017-01-01

    After security incidents in recent years, there is a growing need for security at airports, ports and prisons. In the fight against terrorism, smuggling and illegal entry of material, X-rays are used for non-invasive inspection of people. Traditionally, surveillance has been done exclusively on people by metal detection techniques or by intimate search. But in today's globalized world, and given concern for international security, governments are considering introducing a new series of technologies at airports and prisons, which reveal what an individual can carry under their clothes when traveling or entering visitation in prisons. Body inspection equipment, also called body scanners or 'body scanner', which can detect metallic and non-metallic objects hidden in a person's body, such as weapons, drugs, precious stones, cell phones, etc. This work shows the types of body inspection equipment, the radiation doses involved, and the radiation protection aspects that are critical to maintaining the safety of all users

  14. Controlling radioactive sources. Stronger 'cradle-to-grave' security needed, IAEA says

    International Nuclear Information System (INIS)

    2002-01-01

    This article highlights the IAEA activities in the field of radiation safety and security of radiation sources and other radioactive materials in its Member States. The IAEA has been active in lending its expertise to search out and secure orphaned sources in several countries. Additionally more than 70 States have joined with the IAEA to collect and share information on trafficking incidents and other unauthorized movements of radioactive sources and other radioactive materials. In March 2002 the IAEA Board of Governors approved a multi-faceted Action plan to Combat Nuclear Terrorism that includes upgrading radiation safety and security. One programme is designed to ensure that significant, uncontrolled radioactive sources are brought under regulatory control and properly secured by providing assistance to Member States in their efforts to identify, locate and secure or dispose of orphan sources

  15. Personal messages reduce vandalism and theft of unattended scientific equipment.

    Science.gov (United States)

    Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R

    2014-02-01

    Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal , neutral or threatening , for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c . 40-60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure.

  16. Glass-ceramic joint and method of joining

    Science.gov (United States)

    Meinhardt, Kerry D [Richland, WA; Vienna, John D [West Richland, WA; Armstrong, Timothy R [Clinton, TN; Pederson, Larry R [Kennewick, WA

    2003-03-18

    The present invention is a glass-ceramic material and method of making useful for joining a solid ceramic component and at least one other solid component. The material is a blend of M1-M2-M3, wherein M1 is BaO, SrO, CaO, MgO, or combinations thereof, M2 is Al.sub.2 O.sub.3, present in the blend in an amount from 2 to 15 mol %, M3 is SiO.sub.2 with up to 50 mol % B.sub.2 O.sub.3 that substantially matches a coefficient of thermal expansion of the solid electrolyte. According to the present invention, a series of glass ceramics in the M1-Al.sub.2 O.sub.3 -M3 system can be used to join or seal both tubular and planar solid oxide fuel cells, oxygen electrolyzers, and membrane reactors for the production of syngas, commodity chemicals and other products.

  17. 40 CFR 204.5-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 204.5-2... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act, any...

  18. A Low-Cost and Secure Solution for e-Commerce

    Science.gov (United States)

    Pasquet, Marc; Vacquez, Delphine; Rosenberger, Christophe

    We present in this paper a new architecture for remote banking and e-commerce applications. The proposed solution is designed to be low cost and provides some good guarantees of security for a client and his bank issuer. Indeed, the main problem for an issuer is to identify and authenticate one client (a cardholder) using his personal computer through the web when this client wants to access to remote banking services or when he wants to pay on a e-commerce site equipped with 3D-secure payment solution. The proposed solution described in this paper is MasterCard Chip Authentication Program compliant and was experimented in the project called SOPAS. The main contribution of this system consists in the use of a smartcard with a I2C bus that pilots a terminal only equipped with a screen and a keyboard. During the use of services, the user types his PIN code on the keyboard and all the security part of the transaction is performed by the chip of the smartcard. None information of security stays on the personal computer and a dynamic token created by the card is sent to the bank and verified by the front end. We present first the defined methodology and we analyze the main security aspects of the proposed solution.

  19. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  20. Inference of Large Phylogenies Using Neighbour-Joining

    DEFF Research Database (Denmark)

    Simonsen, Martin; Mailund, Thomas; Pedersen, Christian Nørgaard Storm

    2011-01-01

    The neighbour-joining method is a widely used method for phylogenetic reconstruction which scales to thousands of taxa. However, advances in sequencing technology have made data sets with more than 10,000 related taxa widely available. Inference of such large phylogenies takes hours or days using...... the Neighbour-Joining method on a normal desktop computer because of the O(n^3) running time. RapidNJ is a search heuristic which reduce the running time of the Neighbour-Joining method significantly but at the cost of an increased memory consumption making inference of large phylogenies infeasible. We present...... two extensions for RapidNJ which reduce the memory requirements and \\makebox{allows} phylogenies with more than 50,000 taxa to be inferred efficiently on a desktop computer. Furthermore, an improved version of the search heuristic is presented which reduces the running time of RapidNJ on many data...

  1. Five reasons to join local Chamber of Commerce and Industry

    OpenAIRE

    Verbovskii, Vladislav; Kosov, Vladimir; Chaika (Chayka), Yuliya Aleksandrovna

    2016-01-01

    The article describes five useful things that Chamber of Commerce and Industry membership may give to business owners after joining it. These things are the reasons to become a part of business community formed by Chambers of Commerce that may be considered by those business owner who are deciding whether to join Chamber of Commerce or not. Mentioned reasons are given with examples related to Tomsk Chamber of Commerce and Industry and are relevant to any Chamber of Commerce located in Russian...

  2. 47 CFR 80.277 - Ship Security Alert System (SSAS).

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Ship Security Alert System (SSAS). 80.277... Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety..., “RTCM Standard 11020.0—Ship Security Alert Systems (SSAS) using the Cospas-Sarsat System,” Version 1.0...

  3. Research on Application of FMECA in Missile Equipment Maintenance Decision

    Science.gov (United States)

    Kun, Wang

    2018-03-01

    Fault mode effects and criticality analysis (FMECA) is a method widely used in engineering. Studying the application of FMEA technology in military equipment maintenance decision-making, can help us build a better equipment maintenance support system, and increase the using efficiency of weapons and equipment. Through Failure Modes, Effects and Criticality Analysis (FMECA) of equipment, known and potential failure modes and their causes are found out, and the influence on the equipment performance, operation success, personnel security are determined. Furthermore, according to the synthetical effects of the severity of effects and the failure probability, possible measures for prevention and correction are put forward. Through replacing or adjusting the corresponding parts, corresponding maintenance strategy is decided for preventive maintenance of equipment, which helps improve the equipment reliability.

  4. An active micro joining mechanism for 3D assembly

    International Nuclear Information System (INIS)

    Mayyas, Mohammad; Zhang Ping; Lee, Woo Ho; Popa, Dan; Chiao, J C

    2009-01-01

    An active joining mechanism for the construction of microstructures, comprising detethered microparts and locking actuators fabricated on a wafer, has been implemented. An active locking mechanism is a system on chip (SOC) type of actuator which is designed to control the socket's opening to allow insertion of a micropart with zero force. This allows the delicate micropart to be secured without the need of substantial forces that could cause damage to the micropart or the socket. Moreover, it enhances the assembly throughput, tolerance and yield due to the frictionless self-alignment of the micropart. The design concept, assembly and extensive characterization have been illustrated for 100 µm thick microstructures made of SOI wafers and patterned by deep reactive ion etching. Single-sided and double-sided electrothermal bent beam actuators are utilized for the socket to actively open during assembly and close to lock the micropart against the locking mechanism. Finally, the mechanical and electrical characteristics of the joints can be further enhanced by reflow of the deposited layers of the 80Au–20Sn solder alloy at the contact areas

  5. News Release: USDA Joins Fair Food Network, State and Local Partners to

    Science.gov (United States)

    vitamin C, calcium, and iron. The Food Bank of Eastern Michigan in Flint is distributing those USDA Foods Joins Fair Food Network, State and Local Partners to Promote Nutrition Resources for Lead-Affected Flint Residents News Release: USDA Joins Fair Food Network, State and Local Partners to Promote Nutrition

  6. Welding and joining of single crystals of BCC refractory metals

    International Nuclear Information System (INIS)

    Hiraoka, Yutaka; Fujii, Tadayuki

    1989-01-01

    Welding and joining is one of key technologies for the wider utilizations of a material. In the present work, the applicability of welding and joining for a single crystal of BCC refractory metal was investigated. Electron-beam welding and tungsten-inert-gas welding by a melt-run technique, and high-temperature brazing by using brazing metals such as Mo-40%Ru alloy, vanadium or platinum were conducted for molybdenum single crystal which had been prepared by means of secondary recrystallization. 12 refs.,12 figs., 2 tabs. (Author)

  7. Joining of Aluminium Alloy Sheets by Rectangular Mechanical Clinching

    International Nuclear Information System (INIS)

    Abe, Y.; Mori, K.; Kato, T.

    2011-01-01

    A mechanical clinching has the advantage of low running costs. However, the joint strength is not high. To improve the maximum load of the joined sheets by a mechanical clinching, square and rectangular mechanical clinching were introduced. In the mechanical clinching, the two sheets are mechanically joined by forming an interlock between the lower and upper sheets by the punch and die. The joined length with the interlock was increased by the rectangular punch and die. The deforming behaviours of the sheets in the mechanical clinching were investigated, and then the interlock in the sheets had distribution in the circumference of the projection. Although the interlocks were formed in both projection side and diagonal, the interlock in the diagonal was smaller because of the long contact length between the lower sheet and the die cavity surface. The maximum load of the joined sheets by the rectangular mechanical clinching was two times larger than the load by the round mechanical clinching.

  8. 46 CFR 111.50-1 - Protection of equipment.

    Science.gov (United States)

    2010-10-01

    ... Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS... electric equipment must meet the following listed subparts of this chapter: (a) Appliances, Subpart 111.77...) Transformers, Subpart 111.20. ...

  9. Effect of Ti and Si interlayer materials on the joining of SiC ceramics

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Yang Il; Park, Jung Hwan; Kim, Hyun Gil; Park, Dong Jun; Park, Jeong Yong; Kim, Weon Ju [LWR Fuel Technology Division, Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-08-15

    SiC-based ceramic composites are currently being considered for use in fuel cladding tubes in light-water reactors. The joining of SiC ceramics in a hermetic seal is required for the development of ceramic-based fuel cladding tubes. In this study, SiC monoliths were diffusion bonded using a Ti foil interlayer and additional Si powder. In the joining process, a very low uniaxial pressure of ∼0.1 MPa was applied, so the process is applicable for joining thin-walled long tubes. The joining strength depended strongly on the type of SiC material. Reaction-bonded SiC (RB-SiC) showed a higher joining strength than sintered SiC because the diffusion reaction of Si was promoted in the former. The joining strength of sintered SiC was increased by the addition of Si at the Ti interlayer to play the role of the free Si in RB-SiC. The maximum joint strength obtained under torsional stress was ∼100 MPa. The joint interface consisted of TiSi{sub 2}, Ti{sub 3}SiC{sub 2}, and SiC phases formed by a diffusion reaction of Ti and Si.

  10. Nuclear security at the summer 2004 Olympic Games

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: The International Atomic Energy Agency (IAEA) today announced an unprecedented joint action plan to help ensure a high level of nuclear security at the 2004 Olympic Games. Cooperation between the IAEA, the Greek Atomic Energy Commission and the Greek Olympics Games Security Division to provide expert advice and technical assistance followed a request for assistance from the two Greek authorities to the IAEA last summer. The action plan is designed to protect facilities and materials, to detect illicit trafficking and malicious use of radioactive materials, and to ensure that emergency response forces are effective and efficient. Much of the work in Greece has been undertaken in co-operation with some IAEA Member States - with substantial support provided by the United States and France in the fields of equipment, training and technical advice. The physical protection of the Demokritos nuclear research reactor, in a suburb of Athens, has been upgraded and the security of radioactive sources used at medical and industrial facilities in six Greek cities has been tightened. Radiation detection equipment has been installed at borders and other entry points into Greece, and mobile detection equipment will be deployed elsewhere. Hand-held radiation monitors are being distributed amongst the thousands of security personnel and customs officials who are involved in the security for the Games. The equipment is being deployed to detect radioactive materials that might be used as a weapon by terrorists in a radiological dispersal device, a so-called 'dirty bomb'. Detailed information on the steps that have been taken cannot be disclosed for reasons of security. 'There has been good cooperation with the Greek Atomic Energy Commission and with the other international partners in developing and implementing this work' said Mohamed ElBaradei, Director General of the IAEA. 'We are collectively striving for a high measure of security and the work being undertaken should

  11. Development of a procedure for forming assisted thermal joining of tubes

    Science.gov (United States)

    Chen, Hui; Löbbe, Christian; Staupendahl, Daniel; Tekkaya, A. Erman

    2018-05-01

    With the demand of lightweight design in the automotive industry, not only the wall-thicknesses of tubular components of the chassis or spaceframe are continuously decreased. Also the thicknesses of exhaust system parts are reduced to save material and mass. However, thinner tubular parts bring about additional challenges in joining. Welding or brazing methods, which are utilized in joining tubes with specific requirements concerning leak tightness, are sensitive to the gap between the joining partners. Furthermore, a large joining area is required to ensure the durability of the joint. The introduction of a forming step in the assembled state prior to thermal joining can define and control the gap for subsequent brazing or welding. The mechanical pre-joint resulting from the previously described calibration step also results in easier handling of the tubes prior to thermal joining. In the presented investigation, a spinning process is utilized to produce force-fit joints of varying lengths and diameter reduction and form-fit joints with varying geometrical attributes. The spinning process facilitates a high formability and geometrical flexibility, while at the achievable precision is high and the process forces are low. The strength of the joints is used to evaluate the joint quality. Finally, a comparison between joints produced by forming with subsequent brazing and original tube is conducted, which presents the high performance of the developed procedure for forming assisted thermal joining.

  12. Trend and Development of Semisolid Metal Joining Processing

    Directory of Open Access Journals (Sweden)

    M. N. Mohammed

    2015-01-01

    Full Text Available The semisolid metal joining (SSMJ process or thixojoining process has recently been developed based on the principles of SSM processing, which is a technology that involves the formation of metal alloys between solidus and liquidus temperatures. Thixojoining has many potential benefits, which has encouraged researchers to carry out feasibility studies on various materials that could be utilized in this process and which could transform the production of metal components. This paper reviews the findings in the literature to date in this evolving field, specifically, the experimental details, technology considerations for industrialization, and advantages and disadvantages of the various types of SSMJ methods that have been proposed. It also presents details of the range of materials that have been joined by using the SSMJ process. Furthermore, it highlights the huge potential of this process and future directions for further research.

  13. 46 CFR 160.031-4 - Equipment for shoulder gun type line-throwing appliance.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 6 2010-10-01 2010-10-01 false Equipment for shoulder gun type line-throwing appliance... Appliance, Shoulder Gun Type (and Equipment) § 160.031-4 Equipment for shoulder gun type line-throwing... the gun. The line canister shall be secured by clamps or brackets below the barrel of the gun. (c) One...

  14. Security Alarm for Motorcycle

    Directory of Open Access Journals (Sweden)

    Ismail Ismail

    2015-11-01

    Full Text Available A security alarm for motorcycle has been developed. This equipment consists of two parts. Part one is as a remote control, where it produces a radio signal with frequency of 37.5 MHz to turn on (activate or to turn off alarm. Part two consists of sensor, receiver to receive signal from part one, and alarm. This part two will be attached to motorcycle while part one will be kept as a key by the owner of motorcycle. This equipment has been tested in the laboratory and it worked well. When part two is activated by pushing the “set button” in part one, then any movement of part two (as a movement of motor cycle by about 20 cm from initial position will cause the alarm sounds continuously. The alarm will be off whenever the “reset button” in part one is pushed. Part one (a remote control can activate part two with a maximum of twelve meter separation apart. This shows that the equipment can be used as a security alarm to prevent the motorcycle to be stolen in the future.

  15. Model Checking Processes Specified In Join-Calculus Algebra

    Directory of Open Access Journals (Sweden)

    Sławomir Piotr Maludziński

    2014-01-01

    Full Text Available This article presents a model checking tool used to verify concurrent systems specified in join-calculus algebra. The temporal properties of systems under verification are expressed in CTL logic. Join-calculus algebra with its operational semantics defined by the chemical abstract machine serves as the basic method for the specification of concurrent systems and their synchronization mechanisms, and allows the examination of more complex systems.

  16. Study of international published experiences in joining copper and copper-alloys

    International Nuclear Information System (INIS)

    Dahlgren, Aa.

    1997-04-01

    This study has revealed a number of joining processes to be used when manufacturing copper-canisters for the final storage of high level nuclear waste. However, the decision on which material and which joining process to be used has to be based on the design criterions. The welding procedure has to be qualified, i.e. it shall be demonstrated whether the procedure is capable of fulfilling specified requirements. 32 refs

  17. What happens during a Join? - Dissecting CPU and Memory Optimization Effects

    OpenAIRE

    Manegold, Stefan; Boncz, Peter; Kersten, Martin

    2000-01-01

    textabstractPerformance of modern hardware increasingly depends on proper utilization of both the memory cache hierarchy and parallel execution possibilities in todays super-scalar CPUs. Recent database research has demonstrated that database system performance severely suffers from poor utilization of these resources. In previous work, we presented join algorithms that strongly accelerate large equi-join by tuning the memory access pattern to match the characteristics of the memory cache sub...

  18. Glass-Metal Joining in Nuclear Environment: the State of the Art

    International Nuclear Information System (INIS)

    Jacobs, M.

    2007-01-01

    Full text of publication follows: In the ITER fusion machine and in material testing fission reactors, it is not possible to avoid the use of non-metallic materials like glass for example. There is therefore a need to apply metal to glass joints. This problem arose already at the beginning of the 19. century when the electric light bulb was invented. Nowadays this type of glass-metal joint is very successful and widely used in the electronic industry. In the case of ITER and material testing reactors, glass-metal joints are necessary for the fixation of the optical windows and optical fibres to a metal structure to perform diagnostics. These types of joints are still difficult to make and their behaviour is not fully understood. A joint between glass and metal for a nuclear or fusion application has indeed to resist high temperatures and high neutron fluences, while keeping a good mechanical strength and remaining leak tight. These characteristics are difficult to obtain under these severe conditions. This paper presents an overview of the different joining technologies that can be used to join glass to metal in a severe nuclear environment. The working mechanism of the technologies are explained, together with their respective advantages and drawbacks. Three different types of joining are discussed: fastening, liquid phase joining and solid phase joining. Fastening is a mechanical attachment technique, not achieving easily hermetic seals. Liquid and solid phase joining on the other hand form a real bond, what makes the joint much stronger. The most important technologies using liquid phase joining are adhesive bonding, fusion welding and brazing. In the case of the solid phase joining the choices are ultrasonic torsion welding, diffusion bonding and electrostatic bonding. If it is usually not possible to join the glass directly to the metal, an interlayer must be used. One speaks then of indirect joining. The paper will conclude with a discussion on the best

  19. Thermally joining and/or coating or thermally separating the workpieces having heat-sensitive coating, comprises restoring coating by thermally coating the coating material after thermally joining and/or coating or thermally separating

    OpenAIRE

    Riedel, Frank; Winkelmann, Ralf; Puschmann, Markus

    2011-01-01

    The method for thermally joining and/or coating or thermally separating the workpieces (1), which have a heat-sensitive coating (2), comprises restoring the coating by thermally coating a coating material (3) after thermally joining and/or coating or thermally separating the workpieces. A part of the thermal energy introduced in the workpiece for joining and/or coating or separating or in the workpieces is used for thermally coating the coating material. Two workpieces are welded or soldered ...

  20. Numerical modelling in friction lap joining of aluminium alloy and carbon-fiber-reinforced-plastic sheets

    Science.gov (United States)

    Das, A.; Bang, H. S.; Bang, H. S.

    2018-05-01

    Multi-material combinations of aluminium alloy and carbon-fiber-reinforced-plastics (CFRP) have gained attention in automotive and aerospace industries to enhance fuel efficiency and strength-to-weight ratio of components. Various limitations of laser beam welding, adhesive bonding and mechanical fasteners make these processes inefficient to join metal and CFRP sheets. Friction lap joining is an alternative choice for the same. Comprehensive studies in friction lap joining of aluminium to CFRP sheets are essential and scare in the literature. The present work reports a combined theoretical and experimental study in joining of AA5052 and CFRP sheets using friction lap joining process. A three-dimensional finite element based heat transfer model is developed to compute the temperature fields and thermal cycles. The computed results are validated extensively with the corresponding experimentally measured results.

  1. Efficient algorithms for factorization and join of blades

    NARCIS (Netherlands)

    Fontijne, D.; Dorst, L.; Bayro-Corrochano, E.; Scheuermann, G.

    2010-01-01

    Subspaces are powerful tools for modeling geometry. In geometric algebra, they are represented using blades and constructed using the outer product. Producing the actual geometrical intersection (meet) and union (join) of subspaces, rather than the simplified linearizations often used in

  2. Efficient algorithms for factorization and join of blades

    NARCIS (Netherlands)

    Fontijne, D.

    2008-01-01

    Subspaces are powerful tools for modeling geometry. In geometric algebra, they are represented using blades and constructed using the outer product. To produce the actual geometrical intersection (Meet) and union (Join) of subspaces, rather than the simplified linearizations often used in

  3. Calculation of force and time of contact formation at diffusion metal joining

    Energy Technology Data Exchange (ETDEWEB)

    Sukhanov, V E [Tsentral' nyj Nauchno-Issledovatel' skij Inst. Chernoj Metallurgii, Moscow (USSR); Grushevskij, A V [Moskovskij Stankoinstrumental' nyj Inst., Moscow (USSR); Surovtsev, A P

    1989-03-01

    An analytical model of contact for mation at diffusion joining is suggested. It is based on the introduction of a rough surface with roughnesses in the form of absolutely rigid spherical segnunts into a smooth laminar body. Mathematical expressions, permitting to calculate maximum welding force (pressure) providing close contact of the surfaces welded and time for contact formation between rough surfaces joined, are obtained. Divergence of calculational and experimental data does not exceed 20%. It is confirmed that the most intensive formation of joining occurs in the initial period of welding -the stage of formation of a physical contact, when deformation processes proceed in tensively. Finite formation of a strength joint occurs at the stage of diffusion interaction.

  4. Children with physical disability: gaps in service provision, problems joining in.

    Science.gov (United States)

    Clark, Phillipa; Macarthur, Jude

    2008-01-01

    To describe the reported experiences of the estimated 14 500 New Zealand children with a physical disability and those of their families and whanau (extended families). We have used data from the Household Disability Survey conducted in 2002 to obtain this information. These children and their carers reported a number of perceived unmet needs in all areas covered in the survey: service and assistance, transport, accommodation and education. Thus an estimated 24% reported an unmet need for equipment, and 10% an unmet need for home modification. Around 9% reported having to fund respite care themselves. Of particular note was the proportion of children who had difficulties joining in games and sport at school (59%), going on school outings or camps (28%), playing at school (47%), and or making friends (35%). In all, an estimated 67% of children had one or more problems taking part at school. More could be done to help such families and to facilitate the full participation of these children.

  5. Nuclear security: Then and now

    International Nuclear Information System (INIS)

    Weinstein, A.A.

    1992-01-01

    The evolution of computerized security systems at nuclear power plants has been driven by both the enhancements in computer technology and the changes in regulatory requirements over time. Technical advancements have simplified the essential nature of these systems in both real-time and data processing operations. Regulatory developments have caused a similar trend in simplification. This article addresses the computer and data acquisition portions of a security system and not the access control hardware, intrusion detection sensors, or surveillance equipment, other than to indicate how functional improvements in these areas have been achieved as systems have developed. The state of technology today includes the availability of fault-tolerant computers, the practice of networking multiple computers, and the standardization of real-time data network communications. These factors make two things possible in a plant security system. One is distributed processing, with rapid alarm annunciation (less than 1 second), essentially immediate response to access requests (less than 1 second), and an expeditious and comprehensive reporting capability. The other is permitting different plant operations (security, radiation protection, operator tours) to achieve economies by sharing the same network while using independent computers and avoiding operational conflicts

  6. Equipment Obsolescence Management Program

    Energy Technology Data Exchange (ETDEWEB)

    Redmond, J.

    2014-07-01

    Nuclear Power Plant (NPP) Operators are challenged with securing reliable supply channels for safety related equipment due to equipment obsolescence. Many Original Equipment Manufacturers (OEMs) have terminated production of spare parts and product life-cycle support. The average component life cycles are much shorter than the NPP design life, which means that replacement components and parts for the original NPP systems are not available for the complete design life of the NPPs. The lack or scarcity of replacement parts adversely affects plant reliability and ultimately the profitability of the affected NPPs. This problem is further compounded when NPPs pursue license renewal and approval for plant-life extension. A reliable and predictable supply of replacement co components is necessary for NPPs to remain economically competitive and meet regulatory requirements and guidelines. Electrical and I and C components, in particular, have short product life cycles and obsolescence issues must be managed pro actively and not reactively in order to mitigate the risk to the NPP to ensure reliable and economic NPP operation. (Author)

  7. High-energy electron beams for ceramic joining

    Science.gov (United States)

    Turman, Bob N.; Glass, S. J.; Halbleib, J. A.; Helmich, D. R.; Loehman, Ron E.; Clifford, Jerome R.

    1995-03-01

    Joining of structural ceramics is possible using high melting point metals such as Mo and Pt that are heated with a high energy electron beam, with the potential for high temperature joining. A 10 MeV electron beam can penetrate through 1 cm of ceramic, offering the possibility of buried interface joining. Because of transient heating and the lower heat capacity of the metal relative to the ceramic, a pulsed high power beam has the potential for melting the metal without decomposing or melting the ceramic. We have demonstrated the feasibility of the process with a series of 10 MeV, 1 kW electron beam experiments. Shear strengths up to 28 MPa have been measured. This strength is comparable to that reported in the literature for bonding silicon nitride (Si3N4) to molybdenum with copper-silver-titanium braze, but weaker than that reported for Si3N4 - Si3N4 with gold-nickel braze. The bonding mechanism appears to be formation of a thin silicide layer. Beam damage to the Si3N4 was also assessed.

  8. Compatibility of safety and security

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2013-01-01

    Nuclear safety means the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation hazards while nuclear security means the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear safety and nuclear security present large similarities in their aim as in their methods and are mutually complementary in the field of protection with regard to the risk of sabotage. However they show specific attributes in certain areas which leads to differences in their implementation. For instance security culture must integrate deterrence and confidentiality while safety culture implies transparency and open dialogue. Two important design principles apply identically for safety and security: the graded approach and the defense in depth. There are also strong similarities in operating provisions: -) a same need to check the availability of the equipment, -) a same need to treat the experience feedback, or -) a same need to update the basic rules. There are also strong similarities in emergency management, for instance the elaboration of emergency plans and the performance of periodic exercises. Activities related to safety of security of an installation must be managed by a quality management system. For all types of nuclear activities and facilities, a well shared safety culture and security culture is the guarantee of a safe and secure operation. The slides of the presentation have been added at the end of the paper

  9. References and arrow notation instead of join operation in query languages

    Directory of Open Access Journals (Sweden)

    Alexandr Savinov

    2012-10-01

    Full Text Available We study properties of the join operation in query languages and describe some of its major drawbacks. We provide strong arguments against using joins as a main construct for retrieving related data elements in general purpose query languages and argue for using references instead. Since conventional references are quite restrictive when applied to data modeling and query languages, we propose to use generalized references as they are defined in the concept-oriented model (COM. These references are used by two new operations, called projection and de-projection, which are denoted by right and left arrows and therefore this access method is referred to as arrow notation. We demonstrate advantages of the arrow notation in comparison to joins and argue that it makes queries simpler, more natural, easier to understand, and the whole query writing process more productive and less error-prone.

  10. 46 CFR 32.20-1 - Equipment installations on vessels during World War II-TB/ALL.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Equipment installations on vessels during World War II-TB/ALL. 32.20-1 Section 32.20-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL REQUIREMENTS Equipment Installations § 32.20-1 Equipment installations on vessels during World War II—TB/ALL....

  11. Why join the Staff Association

    CERN Multimedia

    Association du personnel

    2011-01-01

    Becoming a member of the Staff Association (SA) is above all a personal choice, showing that the joining person’s commitment and adherence to values such as solidarity, social cohesion, etc.In September, the SA launches a membership campaign to convince a maximum number to join, to inform, arouse interest and support. Posters, emails and individual contacts are part of the campaign programme, just like this editorial. As far as individual contacts are concerned, we ask you to give time and lend an ear to the delegates of your department in the Staff Council, who will approach you, in order to make an open and constructive discussion possible. Do not hesitate to ask questions and let them know your thoughts about the SA, as (constructive) criticism enables us to progress. The Staff Association and its role of collective representation The Staff Association, via its delegates, represents collectively all staff of the Organization before the Director-General and Member States. To do this, staff rep...

  12. ROMANIA'S MACROECONOMIC ACHIEVEMENTS FOR JOINING THE UNIQUE EUROPEAN CURENCY

    Directory of Open Access Journals (Sweden)

    SILVIA POPESCU

    2011-04-01

    Full Text Available The Romanian government has announced plans to join the eurozone by 2015. Currently, the leu is not yet part of ERM II but plans to join in 2010-2012. The economic advantages of the monetary union grow with expansion of the Euro zone. There is also a high level of skepticism; the main fear about the Euro is the inflation –that is considerable promoted by the Euro currency’s exchange rate in comparison with 2002; another restraint is due to member states inability to establish their own interest rates. The IMF arose the option of joining the Euro zone criteria relaxing. A one-sided Euro’s joining was suggested by International Monetary Fund on March-April 2009, in a confidential report mentioned by The Financial Times as the emergent states in Central and Eastern Europe to be able to pass to the unique currency, but not being represented in the Central European Bank Board. By its side, CEB considers that emergent states of the European Union must not pass to the unique currency unilaterally, because such a fact could under-mine the trust in Euro currency worldwide. This option would hardly deepen the macroeconomic controversies inside the Euro zone and would contradict the previous conditions already imposed. An acceptable solution could be the fastening of emergent countries joining the Exchange Rate Mechanism 2, after they are aware of risks arisen by such a step. The European Commission endorses in the Convergence Report on 2010 that Romania doesn’t meet any criteria needed by passing to the unique European currency, respectively: prices stability; budget position of the government; stability of exchange rate; interest convergence on long run and there are also law impediments. Our paper discusses arguments for a faster passing to the Euro currency versus arguments for a late joining the Euro currency in Romania.

  13. Top scientists join Stephen Hawking at Perimeter Institute

    Science.gov (United States)

    Banks, Michael

    2009-03-01

    Nine leading researchers are to join Stephen Hawking as visiting fellows at the Perimeter Institute for Theoretical Physics in Ontario, Canada. The researchers, who include string theorists Leonard Susskind from Stanford University and Asoka Sen from the Harisch-Chandra Research Institute in India, will each spend a few months of the year at the institute as "distinguished research chairs". They will be joined by another 30 scientists to be announced at a later date.

  14. Flexible Friction Stir Joining Technology

    Energy Technology Data Exchange (ETDEWEB)

    Feng, Zhili [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Lim, Yong Chae [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Mahoney, Murray [MegaStir Technologies LLC, Orem, UT (United States); Sanderson, Samuel [MegaStir Technologies LLC, Orem, UT (United States); Larsen, Steve [MegaStir Technologies LLC, Orem, UT (United States); Steel, Russel [MegaStir Technologies LLC, Orem, UT (United States); Fleck, Dale [MegaStir Technologies LLC, Orem, UT (United States); Fairchild, Doug P [ExxonMobil, Upstream Research Company (URC), Houston, TX (United States); Wasson, Andrew J [ExxonMobil, Upstream Research Company (URC), Houston, TX (United States); Babb, Jon [MegaStir Technologies LLC, Orem, UT (United States); Higgins, Paul [MegaStir Technologies LLC, Orem, UT (United States)

    2015-07-23

    Reported herein is the final report on a U.S. Department of Energy (DOE) Advanced Manufacturing Office (AMO) project with industry cost-share that was jointly carried out by Oak Ridge National Laboratory (ORNL), ExxonMobil Upstream Research Company (ExxonMobil), and MegaStir Technologies (MegaStir). The project was aimed to advance the state of the art of friction stir welding (FSW) technology, a highly energy-efficient solid-state joining process, for field deployable, on-site fabrications of large, complex and thick-sectioned structures of high-performance and high-temperature materials. The technology innovations developed herein attempted to address two fundamental shortcomings of FSW: 1) the inability for on-site welding and 2) the inability to weld thick section steels, both of which have impeded widespread use of FSW in manufacturing. Through this work, major advance has been made toward transforming FSW technology from a “specialty” process to a mainstream materials joining technology to realize its pervasive energy, environmental, and economic benefits across industry.

  15. Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

    OpenAIRE

    Jinsoo Shin; Hanseong Son; Gyunyoung Heo

    2017-01-01

    Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluatio...

  16. Securing Major Events

    International Nuclear Information System (INIS)

    Loeoef, Susanna

    2013-01-01

    When asked why the IAEA should provide nuclear security support to countries that organize large public events, Nuclear Security Officer Sophia Miaw answers quickly and without hesitation. ''Imagine any major public event such as the Olympics, a football championship, or an Expo. If a dirty bomb were to be exploded at a site where tens of thousands of people congregate, the radioactive contamination would worsen the effects of the bomb, increase the number of casualties, impede a rapid emergency response, and cause long term disruption in the vicinity,'' she said. Avoiding such nightmarish scenarios is the driving purpose behind the assistance the IAEA offers States that host major sporting or other public events. The support can range from a single training course to a comprehensive programme that includes threat assessment, training, loaned equipment and exercises. The type and scope of assistance depends on the host country's needs. ''We incorporate nuclear security measures into their security plan. We don't create anything new,'' Miaw said

  17. ADP Security Plan, Math Building, Room 1139

    Energy Technology Data Exchange (ETDEWEB)

    Melton, R.

    1985-08-27

    This document provides the draft copy of an updated (ADP) Security Plan for an IBM Personal Computer to be used in the Math Building at PNL for classified data base management. Using the equipment specified in this document and implementing the administrative and physical procedures as outlined will provide the secure environment necessary for this work to proceed.

  18. 49 CFR 192.283 - Plastic pipe: Qualifying joining procedures.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Plastic pipe: Qualifying joining procedures. 192... Materials Other Than by Welding § 192.283 Plastic pipe: Qualifying joining procedures. (a) Heat fusion... for making plastic pipe joints by a heat fusion, solvent cement, or adhesive method, the procedure...

  19. On a possible empirical meaning of meets and joins for quantum propositions

    Science.gov (United States)

    Herbut, Fedor

    1984-09-01

    Following up an idea of Jauch, an empirical basis is worked out for the meets (and joins) of quantum propositions through approximate measurement to an arbitrary degree of accuracy of special yes-no effects constructed from chains of yes-no measurements. This is done with a view to interpreting the meets (and joins) as Dedekind's cuts in analogy with irrationals.

  20. On a possible empirical meaning of meets and joins for quantum propositions

    International Nuclear Information System (INIS)

    Herbut, F.

    1984-01-01

    Following up an idea of Jauch, an empirical basis is worked out for the meets (and joins) of quantum propositions through approximate measurement to an arbitrary degree of accuracy of special yes-no effects constructed from chains of yes-no measurements. This is done with a view to interpreting the meets (and joins) as Dedekind's cuts in analogy with irrationals. (orig.)

  1. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  2. Microwave joining of SiC

    Energy Technology Data Exchange (ETDEWEB)

    Silberglitt, R.; Ahmad, I. [FM Technologies, Inc., Fairfax, VA (United States); Black, W.M. [George Mason Univ., Fairfax, VA (United States)] [and others

    1995-05-01

    The purpose of this work is to optimize the properties of SiC-SiC joints made using microwave energy. The current focus is on optimization of time-temperature profiles, production of SiC from chemical precursors, and design of new applicators for joining of long tubes.

  3. Development of reconstitution method for surveillance specimens using surface activated joining

    Energy Technology Data Exchange (ETDEWEB)

    Nakamura, Terumi; Kaihara, Shoichiro; Yoshida, Kazuo; Sato, Akira [Ishikawajima-Harima Heavy Industries Co. Ltd., Tokyo (Japan); Onizawa, Kunio; Nishiyama, Yutaka; Fukaya, Kiyoshi; Suzuki, Masahide

    1996-03-01

    Evaluation of embrittlement of reactor vessel steel due to irradiation requires surveillance tests. However, many surveillance specimens are necessary for nuclear plants life extension. Therefore, a specimen reconstitution technique has become important to provide the many specimens for continued surveillance. A surface activated joining (SAJ) method has been developed to join various materials together at low temperatures with little deformation, and is useful to bond irradiated specimens. To assess the validity of this method, Charpy impact tests were carried out, and the characteristics caused by heating during joining were measured. The test results showed the Charpy impact values were almost the same as base materials, and surface activated joining reduced heat affected zone to less than 2 mm. (author).

  4. Joining of SiCf/SiC composites for thermonuclear fusion reactors

    International Nuclear Information System (INIS)

    Ferraris, M.; Badini, C.; Montorsi, M.; Appendino, P.; Scholz, H.W.

    1994-01-01

    Due to their favourable radiological behaviour, SiC f /SiC composites are promising structural materials for future use in fusion reactors. A problem to cope with is the joining of the ceramic composite material (CMC) to itself for more complex structures. Maintenance concepts for a reactor made of SiC f /SiC will demand a method of joining. The joining agents should comply with the low-activation approach of the base material. With the acceptable elements Si and Mg, sandwich structures of composite/metal/composite were prepared in Ar atmosphere at temperatures just above the melting points of the metals. Another promising route is the use of joining agents of boro-silicate glasses: their composition can be tailored to obtain softening temperatures of interest for fusion applications. The glassy joint can be easily ceramised to improve thermomechanical properties. The joining interfaces were investigated by SEM-EDS, XRD and mechanical tests. ((orig.))

  5. Electronic security systems better ways to crime prevention

    CERN Document Server

    Walker, Philip

    2013-01-01

    Electronic Security Systems: Better Ways to Crime Prevention teaches the reader about the application of electronics for security purposes through the use of case histories, analogies, anecdotes, and other related materials. The book is divided into three parts. Part 1 covers the concepts behind security systems - its objectives, limitations, and components; the fundamentals of space detection; detection of intruder movement indoors and outdoors; surveillance; and alarm communication and control. Part 2 discusses equipments involved in security systems such as the different types of sensors,

  6. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Science.gov (United States)

    2010-07-01

    ... evacuation routes and assembly stations; and (viii) Existing security and safety equipment for protection of... protection systems; (iv) Procedural policies; (v) Radio and telecommunication systems, including computer... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Facility Security Assessment (FSA...

  7. Joining of parts via magnetic heating of metal aluminum powders

    Science.gov (United States)

    Baker, Ian

    2013-05-21

    A method of joining at least two parts includes steps of dispersing a joining material comprising a multi-phase magnetic metal-aluminum powder at an interface between the at least two parts to be joined and applying an alternating magnetic field (AMF). The AMF has a magnetic field strength and frequency suitable for inducing magnetic hysteresis losses in the metal-aluminum powder and is applied for a period that raises temperature of the metal-aluminum powder to an exothermic transformation temperature. At the exothermic transformation temperature, the metal-aluminum powder melts and resolidifies as a metal aluminide solid having a non-magnetic configuration.

  8. [Joining WHO of Republic of Korea and the projects in the 1950s].

    Science.gov (United States)

    Lee, Sun Ho

    2014-04-01

    The Republic of Korea(ROK) and the World Health Organization(WHO) have done many projects successfully from 1949, in which the government of First Republic joined the WHO. However the relation between the ROK and the WHO have not been studied very much so far. The main purpose of this research, which could be done by the support of WHO, is connected with three questions. First research point would be "how could the ROK joined WHO in 1949 and what's the meaning of it? And the what's the difference in the process for the WHO between the ROK of 1949 and the DPRK(Democratic People's Republic of Korea) of 1973?" The first president of the ROK, Rhee Syngman, who had received his Ph. D.(about international politics) from Princeton University in 1910, was strongly interested in joining international institutes like UN, WHO. The ROK that could join WHO on 17 August 1949, with the approval of Assembly on 25 May 1949, was one of the founder members of the Western Pacific Region. By joining WHO, the ROK could get chance to increase the level of public health and its administration in 1950's. But the DPRK manage to became a member of WHO on 19 May 1973 and joined the South-East Asia Region. The joining of DPRK was influenced by the easing of the cold war after the Nixon Doctrine and the joining of the China(People's Republic of China). Second research point would be "What kind of roll did the WHO take in the First Republic?" Yet the public health administration of the First Republic that had been made in the period of US army military government was been strongly influenced by USA, the roll of WHO was also important in the 1950's. Last research point would be "What kind of the projects did the ROK and the WHO take part in during the period of he First Republic? How could evaluate the results?" The ROK and the WHO handled the projects including health services, communicable disease prevention and control, control of noncommunicable diseases, and protection of health. Specially

  9. Joining method for pressure tube and martensitic stainless steel tube

    International Nuclear Information System (INIS)

    Kimoto, Hiroshi; Koike, Hiromitsu.

    1993-01-01

    In a joining portion of zirconium alloy and a stainless steel, the surface of martensitic stainless steel being in contact with Zr and Zr alloy is applied with a laser quenching solidification treatment before expanding joining of them to improve the surface. This can provide the surface with refined coagulated cell tissues and make deposits and impurities homogeneous and solubilized. As a result, the surface of the martensitic stainless steel has highly corrosion resistance, to suppress contact corrosion with Zr and Zr alloy. Accordingly, even if it is exposed to high temperature water of 200 to 350degC, failures of Zr and Zr alloy can be suppressed. (T.M.)

  10. Taiwan university joins search for antimatter

    CERN Multimedia

    Chiu, Y

    2002-01-01

    National Cheng Kung University announced yesterday that it will be joining the Alpha Magnetic Spectrometer, an international scientific research project aimed at looking for antimatter in space (1 page).

  11. Excavating and loading equipment for peat mining

    Science.gov (United States)

    Mikhailov, A. V.; Zhigulskaya, A. I.; Yakonovskaya, T. B.

    2017-10-01

    Recently, the issues of sustainable development of Russian regions, related to ensuring energy security, are more urgent than ever. To achieve sustainable development, an integrated approach to the use of local natural resources is needed. Practically in all north regions of the Russian Federation, peat as a local natural resource is widespread, which has a practical application in the area of housing services. The paper presents the evaluation of technologies for open-pit peat mining, as well as analysis of technological equipment for peat production. Special attention is paid to a question of peat materials excavating and loading. The problem of equipment selection in a peat surface mine is complex. Many features, restrictions and criteria need to be considered. Use of low and ultra-low ground pressure excavators and low ground pressure front-end loaders with full-range tires to provide the necessary floatation in the peat bog environment is offered.

  12. Protection of data carriers using secure optical codes

    Science.gov (United States)

    Peters, John A.; Schilling, Andreas; Staub, René; Tompkin, Wayne R.

    2006-02-01

    Smartcard technologies, combined with biometric-enabled access control systems, are required for many high-security government ID card programs. However, recent field trials with some of the most secure biometric systems have indicated that smartcards are still vulnerable to well equipped and highly motivated counterfeiters. In this paper, we present the Kinegram Secure Memory Technology which not only provides a first-level visual verification procedure, but also reinforces the existing chip-based security measures. This security concept involves the use of securely-coded data (stored in an optically variable device) which communicates with the encoded hashed information stored in the chip memory via a smartcard reader device.

  13. Regional cooperation to reduce the safety and security risks of Orphan radioactive sources

    International Nuclear Information System (INIS)

    Howard, Geoffrey; Hacker, Celia; Murray, Allan; Romallosa, Kristine; Caseria, Estrella; Africa del Castillo, Lorena

    2008-01-01

    ANSTO's Regional Security of Radioactive Sources (RSRS) Project, in cooperation with the Philippine Nuclear Research Institute (PNRI), has initiated a program to reduce the safety and security risks of orphan radioactive sources in the Philippines. Collaborative work commenced in February 2006 during the Regional Orphan Source Search and Methods Workshop, co-hosted by ANSTO and the US National Nuclear Security Administration. Further professional development activities have occurred following requests by PNRI to ANSTO to support improvements in PNRI's capability and training programs to use a range of radiation survey equipment and on the planning and methods for conducting orphan source searches. The activities, methods and outcomes of the PNRI-ANSTO cooperative program are described, including: i.) Delivering a training workshop which incorporates use of source search and nuclide identification equipment and search methodology; and train-the-trainer techniques for effective development and delivery of custom designed training in the Philippines; ii.) Support and peer review of course work on Orphan Source Search Equipment and Methodology developed by PNRI Fellows; iii.) Supporting the delivery of the inaugural National Training Workshop on Orphan Source Search hosted by PNRI in the Philippines; iv.) Partnering in searching for orphan sources in Luzon, Philippines, in May 2007. The methods employed during these international cooperation activities are establishing a new model of regional engagement that emphasises sustainability of outcomes for safety and security of radioactive sources. (author)

  14. New security and privacy laws require basic changes in professional practice

    Science.gov (United States)

    Sykes, David M.

    2005-09-01

    Everybody knows about HIPAA-but what about GLBA? FIPA? The Patriot Act? Homeland Security? NCLB? FCRA? CASB1? PIPEDA? All of these are recent laws that impact acoustical design. Throw in the American Hospital Association/ASHE and AIA's about-to-be-released ``Guidelines for the Design of Healthcare Facilities'' as well as the redrafting of DCID 6/9 and it looks like time for careful examination of some professional practices relating to security and privacy. Should INCE members join with and endorse the ASA's recently formed Joint TCAA/TCN Subcommittee which aims to fill a policy vacuum in Washington and Ottawa relating to the fundamental protection of citizens' rights to privacy? This group will formulate consistent guidelines to enable federal and state agencies in the US and Canada to enforce and monitor their laws-will their guidelines affect INCE members? Those who advise or give expert testimony to government agencies, defense/security organizations, courts, and large institutions in financial services, healthcare or education likely find themselves in a rapidly shifting landscape and recognize the need to respond with new research and professional practices.

  15. Thermal fatigue equipment to test joints of materials for high heat flux components

    International Nuclear Information System (INIS)

    Visca, E.; Libera, S.; Orsini, A.; Riccardi, B.; Sacchetti, M.

    2000-01-01

    The activity, carried out in the framework of an ITER divertor task, was aimed at defining a suitable method in order to qualify junctions between armour materials and heat sink of plasma-facing components (PFCs) mock-ups. An equipment able to perform thermal fatigue testing by electrical heating and active water-cooling was constructed and a standard for the sample was defined. In this equipment, during operation cycles, two samples are heated by thermal contact up to a relevant temperature value (350 deg. C) and then the water flow is switched on, thus producing fast cooling with time constants and gradients close to the real operating conditions. The equipment works with a test cycle of about 60 s and is suitable for continuous operation. A complete test consists of about 10000 cycles. After the assembling, the equipment and the control software were optimized to obtain a good reliability. Preliminary tests on mock-ups with flat CFC tiles joined to copper heat sink were performed. Finite-elements calculations were carried out in order to estimate the value of the thermal stresses arising close to the joint under the transient conditions that are characteristic of this equipment

  16. A New KFOR: Changes for International Security in Kosovo

    Science.gov (United States)

    2006-03-15

    Prime Minister Rexhepi plunged into the crowd at Veterinik to urge an end, and PDK leader Thaci made a strong television appeal. The hysterical energy of...particular -- actually feel less secure. Ibid, 12. 16 Prime Minister Rexhepi joined a delegation from the World Bank for lunch at a North Mitrovica...restaurant from both sides. Neither the local police nor KFOR came to the rescue. Rexhepi escaped, but the melee continued, with the World Bank delegation

  17. Method of and apparatus for use in joining tubular components and tube assemblies made thereby

    International Nuclear Information System (INIS)

    Percival, S.R.

    1979-01-01

    A method of joining difficult to weld materials involves the forming of a rolled joint. A particular application is the joining of zirconium alloy calandria tubes to stainless steel tube-plates in a SGHWR. (UK)

  18. International Symposium on Interfacial Joining and Surface Technology (IJST2013)

    International Nuclear Information System (INIS)

    Takahashi, Yasuo

    2014-01-01

    Interfacial joining (bonding) is a widely accepted welding process and one of the environmentally benign technologies used in industrial production. As the bonding temperature is lower than the melting point of the parent materials, melting of the latter is kept to a minimum. The process can be based on diffusion bonding, pressure welding, friction welding, ultrasonic bonding, or brazing-soldering, all of which offer many advantages over fusion welding. In addition, surface technologies such as surface modification, spraying, coating, plating, and thin-film formation are necessary for advanced manufacturing, fabrication, and electronics packaging. Together, interfacial joining and surface technology (IJST) will continue to be used in various industrial fields because IJST is a very significant form of environmentally conscious materials processing. The international symposium of IJST 2013 was held at Icho Kaikan, Osaka University, Japan from 27–29 November, 2013. A total of 138 participants came from around the world to attend 56 oral presentations and 36 posters presented at the symposium, and to discuss the latest research and developments on interfacial joining and surface technologies. This symposium was also held to commemorate the 30th anniversary of the Technical Commission on Interfacial Joining of the Japan Welding Society. On behalf of the chair of the symposium, it is my great pleasure to present this volume of IOP Conference Series: Materials Science and Engineering (MSE). Among the presentations, 43 papers are published here, and I believe all of the papers have provided the welding community with much useful information. I would like to thank the authors for their enthusiastic and excellent contributions. Finally, I would like to thank all members of the committees, secretariats, participants, and everyone who contributed to this symposium through their support and invaluable effort for the success of IJST 2013. Yasuo Takahashi Chair of IJST 2013

  19. International Symposium on Interfacial Joining and Surface Technology (IJST2013)

    Science.gov (United States)

    Takahashi, Yasuo

    2014-08-01

    Interfacial joining (bonding) is a widely accepted welding process and one of the environmentally benign technologies used in industrial production. As the bonding temperature is lower than the melting point of the parent materials, melting of the latter is kept to a minimum. The process can be based on diffusion bonding, pressure welding, friction welding, ultrasonic bonding, or brazing-soldering, all of which offer many advantages over fusion welding. In addition, surface technologies such as surface modification, spraying, coating, plating, and thin-film formation are necessary for advanced manufacturing, fabrication, and electronics packaging. Together, interfacial joining and surface technology (IJST) will continue to be used in various industrial fields because IJST is a very significant form of environmentally conscious materials processing. The international symposium of IJST 2013 was held at Icho Kaikan, Osaka University, Japan from 27-29 November, 2013. A total of 138 participants came from around the world to attend 56 oral presentations and 36 posters presented at the symposium, and to discuss the latest research and developments on interfacial joining and surface technologies. This symposium was also held to commemorate the 30th anniversary of the Technical Commission on Interfacial Joining of the Japan Welding Society. On behalf of the chair of the symposium, it is my great pleasure to present this volume of IOP Conference Series: Materials Science and Engineering (MSE). Among the presentations, 43 papers are published here, and I believe all of the papers have provided the welding community with much useful information. I would like to thank the authors for their enthusiastic and excellent contributions. Finally, I would like to thank all members of the committees, secretariats, participants, and everyone who contributed to this symposium through their support and invaluable effort for the success of IJST 2013. Yasuo Takahashi Chair of IJST 2013

  20. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  1. 75 FR 35444 - Safety and Security Equipment and Services Trade Mission To Brazil

    Science.gov (United States)

    2010-06-22

    ... and the host cities. In private security alone, Brazil spent over US$ 17 billion in 2008. In... intelligence, as well as an overview of the country's economic and political environment. A networking...-users and partners. Follow-on business meetings in other cities in the region can be set up before or...

  2. Environmentally friendly joining of tubes by their ends

    DEFF Research Database (Denmark)

    Silva, Carlos M.A.; Nielsen, Chris Valentin; Alves, Luis M.

    2015-01-01

    This paper proposes an environmentally friendly joining process for connecting tubes by their ends that has the potential to replace current solutions based on fastened, crimped, welded, brazed or adhesive bonded joints. The process is based on a new type of tubular lap joint produced by local...... of deformation and the process feasibility window, and destructive testing to establish the working limits of tubular lap joints under different type of loading conditions. Results demonstrate that the proposed joining process is a flexible and cost-effective technology for connecting tubes by their ends...

  3. Status of Joining Thin Sheet and Thin Wall Tubes of 14YWT

    Energy Technology Data Exchange (ETDEWEB)

    Hoelzer, David T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Unocic, Kinga A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Tang, Wei [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Feng, Zhili [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-09-18

    Beginning this fiscal year, the FCRD research project initiated an investigation on joining thin sections of the advanced ODS 14YWT ferritic alloy. Friction stir welding (FSW) was investigated as a method to join thin plate and tubing of 14YWT since it is a solid state joining method that has been shown in past studies to be a promising method for joining plates of ODS alloys, such as 14YWT. However, this study will attempt to be the first to demonstrate if FSW can successfully join thin plates and thin wall tubing of 14YWT. In the first FSW attempt, a 1.06 cm thick plate of 14YWT (SM13 heat) was successfully rolled at 1000ºC to the target thickness of 0.1 cm with no edge cracking. This achievement is a highlight since previous attempts to roll 14YWT plates have resulted in extensive cracking. For the FSW run, a pin tool being developed by the ORNL FSW Process Development effort was used. The first FSW run successfully produced a bead-on-plate weld in the 0.1 cm thick plate. The quality of the weld zone appears very good with no evidence of large defects such as cavities. The microstructural characterization study of the bead-on-plate weld zone has been initiated to compare the results of the microstructure analysis with those obtained in the reference microstructural analysis of the 14YWT (SM13 heat) that showed ultra-fine grain size of 0.43 μm and a high number density of ~2-5 nm sizes oxygen-enriched nanoclusters.

  4. Procuring, maintaining and using equipment: the key issues in controlling exposure to patients

    International Nuclear Information System (INIS)

    Hendra, I.R.F.

    1989-01-01

    Not only are acceptance criteria directly related to the design of medical x-ray equipment and quality assurance exercised during its manufacture, but also its performance, safety and reliability must feature in requirements for procuring new equipment. In the UK this issue is dealt with under the Department of Health and Social Security Manufacturer Registration Scheme for Medical Equipment in its application to radiological equipment. In the UK quality of maintenance services has been considered by one of our Working Parties commissioned by the South-East Thames Regional Health Authority who are the ''Centre of Responsibility'' for diagnostic imaging equipment in the National Health Service. The report prepared from the first phase of activity of this working group describes features of a procurement specification for maintenance services and prescribes complementary duties of contractors and customers. Radiograph reject analysis has indicated human error outweighs unsatisfactory equipment performance as the reason for rejecting poor radiographs. The use in X-ray departments of the kind of manufacturing quality system used by most reputable equipment manufacturers has the potential for a dramatic reduction in exposure. (author)

  5. THE NEED FOR A NEW JOINING TECHNOLOGY FOR THE CLOSURE WELDING OF RADIOACTIVE MATERIALS CONTAINERS

    International Nuclear Information System (INIS)

    CANNELL GR; HILL BE; GRANT GJ

    2008-01-01

    One of the activities associated with cleanup throughout the Department of Energy (DOE) complex is packaging radioactive materials into storage containers. Much of this work will be performed in high-radiation environments requiring fully remote operations, for which existing, proven systems do not currently exist. These conditions demand a process that is capable of producing acceptable (defect-free) welds on a consistent basis; the need to perform weld repair, under fully-remote operations, can be extremely costly and time consuming. Current closure welding technology (fusion welding) is not well suited for this application and will present risk to cleanup cost and schedule. To address this risk, Fluor and the Pacific Northwest National Laboratory (PNNL), are proposing that a new and emerging joining technology, Friction Stir Welding (FSW), be considered for this work. FSW technology has been demonstrated in other industries (aerospace and marine) to produce near flaw-free welds on a consistent basis. FSW is judged capable of providing the needed performance for fully-remote closure welding of containers for radioactive materials for the following reasons: FSW is a solid-state process; material is not melted. As such, FSW does not produce the type of defects associated with fusion welding, e.g., solidification-induced porosity, cracking, distortion due to weld shrinkage, and residual stress. In addition, because FSW is a low-heat input process, material properties (mechanical, corrosion and environmental) are preserved and not degraded as can occur with 'high-heat' fusion welding processes. When compared to fusion processes, FSW produces extremely high weld quality. FSW is performed using machine-tool technology. The equipment is simple and robust and well-suited for high radiation, fully-remote operations compared to the relatively complex equipment associated with the fusion-welding processes. Additionally, for standard wall thicknesses of radioactive materials

  6. Materials for the information security education

    International Nuclear Information System (INIS)

    Yashiro, Shigeo; Aoki, Kazuhisa; Sato, Tomohiko; Tanji, Kazuhiro

    2014-01-01

    With the rapid progress of the utilization of Information Technology (IT), IT infrastructure (network environment and information system) became crucial as a lifeline for promoting business. At the same time, changes in the circumstances surrounding the IT infrastructure globalize the threat of cyber attacks and increase the risk of the information security such as unlawful access to an information system, viral infection, an alteration of a website, disclosure of subtlety information, destruction of an information system and so on. Information security measure is an important issue in Japan Atomic Energy Agency (JAEA). In order to protect the information property of JAEA from the threat, Center for Computational Science and e-Systems (CCSE) has been taking triadic measures for information security: (1) to lay down a set of information security rules, (2) to introduce security equipments to backbone network and (3) to provide information security education. This report is a summary of the contents of the information security education by e-learning. (author)

  7. GRAPH-BASED POST INCIDENT INTERNAL AUDIT METHOD OF COMPUTER EQUIPMENT

    Directory of Open Access Journals (Sweden)

    I. S. Pantiukhin

    2016-05-01

    Full Text Available Graph-based post incident internal audit method of computer equipment is proposed. The essence of the proposed solution consists in the establishing of relationships among hard disk damps (image, RAM and network. This method is intended for description of information security incident properties during the internal post incident audit of computer equipment. Hard disk damps receiving and formation process takes place at the first step. It is followed by separation of these damps into the set of components. The set of components includes a large set of attributes that forms the basis for the formation of the graph. Separated data is recorded into the non-relational database management system (NoSQL that is adapted for graph storage, fast access and processing. Damps linking application method is applied at the final step. The presented method gives the possibility to human expert in information security or computer forensics for more precise, informative internal audit of computer equipment. The proposed method allows reducing the time spent on internal audit of computer equipment, increasing accuracy and informativeness of such audit. The method has a development potential and can be applied along with the other components in the tasks of users’ identification and computer forensics.

  8. Management of Information Technology Equipment, Office of the Secretary of Defense

    National Research Council Canada - National Science Library

    2001-01-01

    ...) inventory records for information technology equipment, such as personal computers. In addition, the investigation identified security issues concerning the disposal of personal computer hard drives...

  9. Certified training for nuclear and radioactive source security management

    International Nuclear Information System (INIS)

    Johnson, Daniel

    2017-01-01

    Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. (author)

  10. The mechanism of non-homologous end-joining: a synopsis of synapsis.

    Science.gov (United States)

    Weterings, Eric; van Gent, Dik C

    2004-11-02

    Repair of DNA double-strand breaks (DSBs) by non-homologous end-joining (NHEJ) is required for resistance to genotoxic agents, such as ionizing radiation, but also for proper development of the vertebrate immune system. Much progress has been made in identifying the factors that are involved in this repair pathway. We are now entering the phase in which we begin to understand basic concepts of the reaction mechanism and regulation of non-homologous end-joining. This review concentrates on novel insights into damage recognition and subsequent tethering, processing and joining of DNA ends.

  11. A Cluster Based Group Signature Mechanism For Secure Vanet Communication

    Directory of Open Access Journals (Sweden)

    Navjot Kaur

    2015-08-01

    Full Text Available Vehicular adhoc network is one of the recent area of research to administer safety to human lives controlling of messages and in disposal of messages to users and passengers. VANETs allows communication of moving vehicular nodes. Movement of nodes leads in changing network size and scenario. Whenever a new node joins the network there is a threat of malicious node attack. So we need an environment that is secure and trust worthy. Therefore a new cluster based secure technique is proposed where cluster head is responsible for providing communication between the vehicular nodes. Performance parameters used in this paper are message drop ratio packet delay ratio and verification time.

  12. Cores, Joins and the Fano-Flow Conjectures

    Directory of Open Access Journals (Sweden)

    Jin Ligang

    2018-02-01

    Full Text Available The Fan-Raspaud Conjecture states that every bridgeless cubic graph has three 1-factors with empty intersection. A weaker one than this conjecture is that every bridgeless cubic graph has two 1-factors and one join with empty intersection. Both of these two conjectures can be related to conjectures on Fano-flows. In this paper, we show that these two conjectures are equivalent to some statements on cores and weak cores of a bridgeless cubic graph. In particular, we prove that the Fan-Raspaud Conjecture is equivalent to a conjecture proposed in [E. Steffen, 1-factor and cycle covers of cubic graphs, J. Graph Theory 78 (2015 195–206]. Furthermore, we disprove a conjecture proposed in [G. Mazzuoccolo, New conjectures on perfect matchings in cubic graphs, Electron. Notes Discrete Math. 40 (2013 235–238] and we propose a new version of it under a stronger connectivity assumption. The weak oddness of a cubic graph G is the minimum number of odd components (i.e., with an odd number of vertices in the complement of a join of G. We obtain an upper bound of weak oddness in terms of weak cores, and thus an upper bound of oddness in terms of cores as a by-product.

  13. Five Performance Enhancements for Hybrid Hash Join

    National Research Council Canada - National Science Library

    Graefe, Goetz

    1992-01-01

    .... We discuss five performance enhancements for hybrid hash join algorithms, namely data compression, large cluster sizes and multi-level recursion, role reversal of build and probe inputs, histogram...

  14. Development of a double beam process for joining aluminum and steel

    Science.gov (United States)

    Frank, Sascha

    2014-02-01

    Multi-material structures pose an attractive option for overcoming some of the central challenges in lightweight design. An exceptionally high potential for creating cost-effective lightweight solutions is attributed to the combination of steel and aluminum. However, these materials are also particularly difficult to join due to their tendency to form intermetallic compounds (IMCs). The growth of these compounds is facilitated by high temperatures and long process times. Due to their high brittleness, IMCs can severely weaken a joint. Thus, it is only possible to create durable steel-aluminum joints when the formation of IMCs can be limited to a non-critical level. To meet this goal, a new joining method has been designed. The method is based on the combination of a continuous wave (pw) and a pulsed laser (pw) source. Laser beams from both sources are superimposed in a common process zone. This makes it possible to apply the advantages of laser brazing to mixed-metal joints without requiring the use of chemical fluxes. The double beam technology was first tested in bead-on-plate experiments using different filler wire materials. Based on the results of these tests, a process for joining steel and aluminum in a double-flanged configuration is now being developed. The double flanged seams are joined using zinc- or aluminum-based filler wires. Microsections of selected seams show that it is possible to achieve good base material wetting while limiting the growth of IMCs to acceptable measures. In addition, the results of tensile tests show that high joint strengths can be achieved.

  15. Using Negotiated Joining to Construct and Fill Open-ended Roles in Elite Culinary Groups.

    Science.gov (United States)

    Tan, Vaughn

    2015-03-01

    This qualitative study examines membership processes in groups operating in an uncertain environment that prevents them from fully predefining new members' roles. I describe how nine elite high-end, cutting-edge culinary groups in the U.S. and Europe, ranging from innovative restaurants to culinary R&D groups, use negotiated joining-a previously undocumented process-to systematically construct and fill these emergent, open-ended roles. I show that negotiated joining is a consistently patterned, iterative process that begins with a role that both aspirant and target group explicitly understand to be provisional. This provisional role is then jointly modified and constructed by the aspirant and target group through repeated iterations of proposition, validation through trial and evaluation, and selective integration of validated role components. The initially provisional role stabilizes and the aspirant achieves membership if enough role components are validated; otherwise the negotiated joining process is abandoned. Negotiated joining allows the aspirant and target group to learn if a mutually desirable role is likely and, if so, to construct such a role. In addition, the provisional roles in negotiated joining can support absorptive capacity by allowing novel role components to enter target groups through aspirants' efforts to construct stable roles for themselves, while the internal adjustment involved in integrating newly validated role components can have the unintended side effect of supporting adaptation by providing opportunities for the groups to use these novel role components to modify their role structure and goals to suit a changing and uncertain environment. Negotiated joining thus reveals role ambiguity's hitherto unexamined beneficial consequences and provides a foundation for a contingency theory of new-member acquisition.

  16. 76 FR 46907 - Ammonium Nitrate Security Program

    Science.gov (United States)

    2011-08-03

    ... Maritime Transportation Security Act NAICS North American Industrial Classification System NPRM Notice of.... Commenters noted, for example, that equipment used for transporting bulk ammonium nitrate, such as hoppers...

  17. Advanced fusion welding processes, solid state joining and a successful marriage. [production of aerospace structures

    Science.gov (United States)

    Miller, F. R.

    1972-01-01

    Joining processes for aerospace systems combine fusion welding and solid state joining during production of metal structures. Detailed characteristics of electron beam welding, plasma arc welding, diffusion welding, inertia welding and weldbond processes are discussed.

  18. Physical security technology base programs for physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Sandia National Laboratories is the US Department of Energy's lead laboratory for physical security research and development (R and D). In support of this mission, Sandia has maintained for several years an R and D program in each of the following technology areas: Intrusion Detection, Entry Control, CCTV Assessment, Access Delay, Alarm Display, and Guard Equipment and Training. The purpose of the technology base programs is to maintain cognizance of the capabilities of the commercial market, identify improvements and transfer technology to industry and facilities. The output of these programs supports the development of new equipment and advanced system concepts, demonstrations of proof-of-principles and system implementation. This paper will review the status of current developments and discuss trends in new technologies which are being explored for future applications, i.e., artificial intelligence, expert systems, robotics, and more automated systems

  19. Infrared transient-liquid-phase joining of SCS-6/{beta}21S titanium matrix composite

    Energy Technology Data Exchange (ETDEWEB)

    Blue, C.A.; Sikka, V.K. [Oak Ridge National Lab., TN (United States). Materials Processing Group; Blue, R.A.; Lin, R.Y. [Univ. of Cincinnati, OH (United States). Dept. of Materials Science and Engineering

    1996-02-01

    Fiber-reinforced titanium matrix composites (TMCs) are among the advanced materials being considered for use in the aerospace industry due to their light weight, high strength, and high modulus. A rapid infrared joining process has been developed for the joining of composites and advanced materials. Rapid infrared joining has been shown not to have many of the problems associated with conventional joining methods. Two models were utilized to predict the joint evolution and fiber reaction zone growth. TMC, 16-ply SCS-6/{beta}21S, has been successfully joined with total processing times of under 2 min utilizing the rapid infrared joining technique. The process utilizes a 50 C/sec ramping rate, 17-{micro}m Ti-15Cu-15Ni wt % filler material between the faying surfaces; a joining temperature of 1,100 C; and 120 sec of time to join the composite material. Joint shear strength testing of the rapid infrared joints at temperatures as high as 800 C has revealed no joint failures. Also, due to the rapid cooling of the process, no poststabilization of the matrix material is necessary to prevent the formation of a brittle omega phase during subsequent use of the TMC at intermediate temperatures, 270 to 430 C, for up to 20 h.

  20. The role of the media in establishing international security regimes

    Directory of Open Access Journals (Sweden)

    Chanan Naveh

    2005-04-01

    Full Text Available This article focuses primarily on the media's impact on international security regimes. It explores the ways in which the media affect the lifecycles of international regimes, from the time they are first conceived of, through their establishment, consolidation and stabilization, up until their ultimate demise. Although this paper highlights the media's role in the evolution of security regimes, it is clear that, regardless of the regime in question, media play a role throughout the lifecycle of all international regimes, whatever their character. In order to analyze the relationships of the media with security regimes in general, and specifically their contribution to each stage in their development, the article utilizes methodologies from the field of communication studies. It examines the media's agenda, "news values" and various functions, and their ability to mobilize public support for the particular issue of the regime. To date, most studies have explored the interaction between media communication patterns and global developments at the state level, or in relation to the formulation of foreign policy, while largely ignoring the international dimension of the relationship. This article attempts to remedy this situation, and the relevant processes are analysed in a case study of the anti-Iraq international security regime. It should be noted that although the paper focuses on the specific anti-Iraqi regime, it is part of a more general Anti-Rogue actors regime which includes the war against global terrorism. The study of the development of the anti-Iraq press-security regime teaches us that during international crises the media mobilize and unanimously support the regime fighting the "bad guys." But, when the regime develops and enters disputed turfs and begins to lose its legitimacy, media support diminishes, and the media may even develop into an opposing force and may join the actors fighting against this regime. Moreover, the study of

  1. Optimizing and joining future safeguards efforts by 'remote inspections'

    International Nuclear Information System (INIS)

    Zendel, M.; Khlebnikov, N.

    2009-01-01

    Full-text: Remote inspections have a large potential to save inspection effort in future routine safeguards implementation. Such inspections involve remote activities based on the analysis of data acquired in the field without the physical presence of an inspector, shifting the inspectors' priorities further toward unannounced inspections, complementary access activities and data evaluation. Large, automated and complex facilities require facility resident and specific safeguards equipment systems with features for unattended and remotely controlled operation as well as being integrated in the nuclear process. In many instances the use of such equipment jointly with the SSAC/RSAC and the operator is foreseen to achieve affordable effectiveness with a minimum level of intrusiveness to the facility operation. Where it becomes possible to achieve independent conclusions by this approach, the IAEA would make full use of the SSAC/RSAC, involving State inspectors and/or facility operators to operate inspection systems under remotely controlled IAEA mechanisms. These mechanisms would include documented procedures for routine joint-use, defining arrangements for data sharing, physical security and authentication mechanisms, recalibration and use of standards and software, maintenance, repair, storage and transportation. The level of cooperation and willingness of a State to implement such measures requested and properly justified by the IAEA will demonstrate its commitment to full transparency in its nuclear activities. Examples of existing remote inspection activities, including joint-use activities will be discussed. The future potential of remote inspections will be assessed considering technical developments and increased needs for process monitoring. Enhanced cooperation with SSAC/RSAC within the framework of remote inspections could further optimize the IAEA's inspection efforts while at the same time maintaining effective safeguards implementation. (author)

  2. 46 CFR 159.005-15 - Approval of equipment or material: Suspensions, withdrawals, and terminations.

    Science.gov (United States)

    2010-10-01

    ..., withdrawals, and terminations. 159.005-15 Section 159.005-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL APPROVAL OF..., withdrawals, and terminations. (a) The Commandant suspends an approval issued under this subchapter in...

  3. Use of Friction Stir Welding and Friction Stir Processing for Advanced Nuclear Fuels and Materials Joining Applications

    International Nuclear Information System (INIS)

    J. I. Cole; J. F. Jue

    2006-01-01

    Application of the latest developments in materials technology may greatly aid in the successful pursuit of next generation reactor and transmutation technologies. One such area where significant progress is needed is joining of advanced fuels and materials. Rotary friction welding, also referred to as friction stir welding (FSW), has shown great promise as a method for joining traditionally difficult to join materials such as aluminum alloys. This relatively new technology, first developed in 1991, has more recently been applied to higher melting temperature alloys such as steels, nickel-based and titanium alloys. An overview of the FSW technology is provided and two specific nuclear fuels and materials applications where the technique may be used to overcome limitations of conventional joining technologies are highlighted

  4. Procuring, maintaining and using equipment: the key issues in controlling exposure to patients

    International Nuclear Information System (INIS)

    Hendra, I.R.F.

    1989-01-01

    Radiological equipment is not purpose-built for each individual application. Thus, not only are acceptance criteria directly related to the design of equipment and the quality assurance exercised during its manufacture, but also the performance, safety and reliability of equipment must feature in the requirements for procuring new equipment. In the UK this issue is dealt with under the Department of Health and Social Security Manufacturer Registration Scheme for Medical Equipment in its application to radiological equipment. Similarly the continuing reliability of equipment in service is directly related to the quality of maintenance services. This is determined largely by the manner in which such services are procured. In the UK this issue has been considered by one of four Working Parties commissioned by the South-East Thames Regional Health Authority who are the ''Centre of Responsibility'' for diagnostic imaging equipment. The report prepared from the first phase of activity of this working group describes features of a procurement specification for maintenance services and prescribes the complementary duties of contractors and customers. The use in X-ray departments of the kind of manufacturing quality system that is used by most reputable equipment manufacturers has the potential for a dramatic reduction in exposure to patients. (author)

  5. Laser direct joining of metal and plastic

    International Nuclear Information System (INIS)

    Katayama, Seiji; Kawahito, Yousuke

    2008-01-01

    We have developed an innovative rapid laser direct joining process of metal and plastic lap plates without adhesives or glues. The joints made between a Type 304 stainless steel plate and a polyethylene terephthalate (PET) plastic sheet of 30 mm width possessed tensile shear loads of about 3000 N. Transmission electron microscope photographs of the joint demonstrated that Type 304 and the PET were bonded on the atomic, molecular or nanostructural level through a Cr oxide film

  6. Staying Secure for School Safety

    Science.gov (United States)

    Youngkin, Minu

    2012-01-01

    Proper planning and preventive maintenance can increase school security and return on investment. Preventive maintenance begins with planning. Through careful planning, education institutions can determine what is working and if any equipment, hardware or software needs to be replaced or upgraded. When reviewing a school's safety and security…

  7. Supporting non proliferation and global security efforts

    International Nuclear Information System (INIS)

    Pochon, E.

    2013-01-01

    CEA contributes as a major actor of France's action against nuclear proliferation and to the strengthening of nuclear security at national level as European and International levels, in particular through the support of the IAEA activities in nuclear non proliferation with the French Support Programme for the IAEA safeguards system and security with the contribution to the IAEA Nuclear Security Plan and cooperation projects with the European Commission. The CEA is a French government funded technological research organization, organized around 5 branches: Nuclear Energy, Technological Researches, Defence (DAM), Material Sciences and Life Sciences. Within the scope of its activities, CEA covers most of the research areas and techniques in nuclear non-proliferation and security. The CEA is also the advisor of the French Government on nuclear policy. Treaty monitoring and the development and implementation of non proliferation and global security programs is an important mission of DAM which rely on nuclear weapons manufacture and past testing experience. The programmes on non proliferation and global security carried out to fulfil DAM's mission cover the following areas: development of monitoring and detection methods and equipments, country profiles and nuclear stockpiles assessment, arms control instruments, proliferation resistance of nuclear fuel cycle, monitoring of nuclear tests, operation and maintenance of national detection capabilities and contribution to CTBT verification systems. (A.C.)

  8. Tungsten foil laminate for structural divertor applications - Joining of tungsten foils

    Science.gov (United States)

    Reiser, Jens; Rieth, Michael; Möslang, Anton; Dafferner, Bernhard; Hoffmann, Jan; Mrotzek, Tobias; Hoffmann, Andreas; Armstrong, D. E. J.; Yi, Xiaoou

    2013-05-01

    This paper is the fourth in our series on tungsten laminates. The aim of this paper is to discuss laminate synthesis, meaning the joining of tungsten foils. It is obvious that the properties of the tungsten laminate strongly depend on the combination of (i) interlayer and (ii) joining technology, as this combination defines (i) the condition of the tungsten foil after joining (as-received or recrystallised) as well as (ii) the characteristics of the interface between the tungsten foil and the interlayer (wettability or diffusion leading to a solid solution or the formation of intermetallics). From the example of tungsten laminates joined by brazing with (i) an eutectic silver copper brazing filler, (ii) copper, (iii) titanium, and (iv) zirconium, the microstructure will be discussed, with special focus on the interface. Based on our assumptions of the mechanism of the extraordinary ductility of tungsten foil we present three syntheses strategies and make recommendations for the synthesis of high temperature tungsten laminates.

  9. Factors affecting occupational therapists' decision to join their regional professional association: Facteurs influençant la décision des ergothérapeutes de joindre les rangs de leur association professionnelle régionale.

    Science.gov (United States)

    Reyes, Angelica N; Brown, Cary A

    2018-01-01

    Voluntary occupational therapy organizations fill an important role. However, recruitment and retention can be problematic. Little is known about factors influencing occupational therapists to join/maintain membership in professional associations. This study investigated factors influencing occupational therapists' decision to join/remain members of their association. An electronic survey was carried out and data were analyzed using SPSS software and manual categorization of open-ended comments. Two hundred and fifty-four therapists responded. Generation of new ideas, opportunities for professional development, self-improvement, maintenance of standards, improvement of the profession, and discounts on equipment/educational opportunities were significant factors in deciding to join the organization. The factors perceived as priorities varied in relation to participants' year of graduation. More-customized strategies, reflecting priorities that vary during a therapist's career path, may need to be employed to best address recruitment and retention across the range of therapists' needs and goals.

  10. 46 CFR 108.223 - Guards on exposed equipment.

    Science.gov (United States)

    2010-10-01

    ... have hand covers, guards, or rails installed on all belts, gears, shafts, pulleys, sprockets, spindles... 46 Shipping 4 2010-10-01 2010-10-01 false Guards on exposed equipment. 108.223 Section 108.223 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN...

  11. An Adaptive Genetic Algorithm with Dynamic Population Size for Optimizing Join Queries

    OpenAIRE

    Vellev, Stoyan

    2008-01-01

    The problem of finding the optimal join ordering executing a query to a relational database management system is a combinatorial optimization problem, which makes deterministic exhaustive solution search unacceptable for queries with a great number of joined relations. In this work an adaptive genetic algorithm with dynamic population size is proposed for optimizing large join queries. The performance of the algorithm is compared with that of several classical non-determinis...

  12. Mechanical and microstructural integrity of nickel-titanium and stainless steel laser joined wires

    International Nuclear Information System (INIS)

    Vannod, J.; Bornert, M.; Bidaux, J.-E.; Bataillard, L.; Karimi, A.; Drezet, J.-M.; Rappaz, M.; Hessler-Wyser, A.

    2011-01-01

    The biomedical industry shows increasing interest in the joining of dissimilar metals, especially with the aim of developing devices that combine different mechanical and corrosive properties. As an example, nickel-titanium shape memory alloys joined to stainless steel are very promising for new invasive surgery devices, such as guidewires. A fracture mechanics study of such joined wires was carried out using in situ tensile testing and scanning electron microscopy imaging combined with chemical analysis, and revealed an unusual fracture behaviour at superelastic stress. Nanoindentation was performed to determine the mechanical properties of the welded area, which were used as an input for mechanical computation in order to understand this unexpected behaviour. Automated image correlation allowed verification of the mechanical modelling and a reduced stress-strain model is proposed to explain the special fracture mechanism. This study reveals the fact that tremendous property changes at the interface between the NiTi base wire and the weld area have more impact on the ultimate tensile strength than the chemical composition variation across the welded area.

  13. Certified Training for Nuclear and Radioactive Source Security Management.

    Science.gov (United States)

    Johnson, Daniel

    2017-04-01

    Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  14. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    International Nuclear Information System (INIS)

    Rogers, E.; deBoer, G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-01-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC and A). Though MPC and A systems can significantly upgrade nuclear security, they do not eliminate the 'human factor.' Gen. Eugene Habiger, a former 'Assistant Secretary for Safeguards and Security' at the U.S. Department of Energy's (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that 'good security is 20% equipment and 80% people.' Although eliminating the 'human factor' is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  15. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  16. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  17. Software for security event management: Development and utilization

    Directory of Open Access Journals (Sweden)

    Aleksandr V. Kuznetcov

    2017-11-01

    Full Text Available We address the challenge to the information security coming from the lack of algorithmic machinery for managing the security events. We start with a mathematical formulation of the problem for a tabular processor by introducing an appropriate target function. Details of corresponding algorithm can be found by following the provided links. We describe our original software module that implements the algorithm for determining the registered security events. The module is based on the tabular processor certified by the Russian Federal Service for Technical and Export Control. We present a control sample for testing the developed module. The sample has the dimension 30x20 and contains 14 choices for threshold values of security events number. The results of the tests comply with the specified boundary conditions and demonstrate a nonlinear dependence of the objective function on the number of registered security events, as well as a nonlinear dependence of the percentage of the detected security event on the total initial number of security events to be registered at the event source. The performance of the module specifically, the central processing unit usage is found acceptable (not exceeding 33%, which allows one to use the software for typical automated workplaces equipped with appropriate tabular processors. Our approach is universal with respect to the application areas.

  18. Methodology for Applying Cyber Security Risk Evaluation from BN Model to PSA Model

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jin Soo; Heo, Gyun Young [Kyung Hee University, Youngin (Korea, Republic of); Kang, Hyun Gook [KAIST, Dajeon (Korea, Republic of); Son, Han Seong [Joongbu University, Chubu (Korea, Republic of)

    2014-08-15

    There are several advantages to use digital equipment such as cost, convenience, and availability. It is inevitable to use the digital I and C equipment replaced analog. Nuclear facilities have already started applying the digital system to I and C system. However, the nuclear facilities also have to change I and C system even though it is difficult to use digital equipment due to high level of safety, irradiation embrittlement, and cyber security. A cyber security which is one of important concerns to use digital equipment can affect the whole integrity of nuclear facilities. For instance, cyber-attack occurred to nuclear facilities such as the SQL slammer worm, stuxnet, DUQU, and flame. The regulatory authorities have published many regulatory requirement documents such as U.S. NRC Regulatory Guide 5.71, 1.152, IAEA guide NSS-17, IEEE Standard, and KINS Regulatory Guide. One of the important problem of cyber security research for nuclear facilities is difficulty to obtain the data through the penetration experiments. Therefore, we make cyber security risk evaluation model with Bayesian network (BN) for nuclear reactor protection system (RPS), which is one of the safety-critical systems to trip the reactor when the accident is happened to the facilities. BN can be used for overcoming these problems. We propose a method to apply BN cyber security model to probabilistic safety assessment (PSA) model, which had been used for safety assessment of system, structure and components of facility. The proposed method will be able to provide the insight of safety as well as cyber risk to the facility.

  19. Methodology for Applying Cyber Security Risk Evaluation from BN Model to PSA Model

    International Nuclear Information System (INIS)

    Shin, Jin Soo; Heo, Gyun Young; Kang, Hyun Gook; Son, Han Seong

    2014-01-01

    There are several advantages to use digital equipment such as cost, convenience, and availability. It is inevitable to use the digital I and C equipment replaced analog. Nuclear facilities have already started applying the digital system to I and C system. However, the nuclear facilities also have to change I and C system even though it is difficult to use digital equipment due to high level of safety, irradiation embrittlement, and cyber security. A cyber security which is one of important concerns to use digital equipment can affect the whole integrity of nuclear facilities. For instance, cyber-attack occurred to nuclear facilities such as the SQL slammer worm, stuxnet, DUQU, and flame. The regulatory authorities have published many regulatory requirement documents such as U.S. NRC Regulatory Guide 5.71, 1.152, IAEA guide NSS-17, IEEE Standard, and KINS Regulatory Guide. One of the important problem of cyber security research for nuclear facilities is difficulty to obtain the data through the penetration experiments. Therefore, we make cyber security risk evaluation model with Bayesian network (BN) for nuclear reactor protection system (RPS), which is one of the safety-critical systems to trip the reactor when the accident is happened to the facilities. BN can be used for overcoming these problems. We propose a method to apply BN cyber security model to probabilistic safety assessment (PSA) model, which had been used for safety assessment of system, structure and components of facility. The proposed method will be able to provide the insight of safety as well as cyber risk to the facility

  20. Laboratory research irradiators with enhanced security features

    International Nuclear Information System (INIS)

    Srivastava, Piyush

    2016-01-01

    Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There is a number of such equipment in use at different institutions and are found to be very useful. (author)

  1. Laboratory research irradiators with enhanced security features

    International Nuclear Information System (INIS)

    Srivastava, Piyush

    2014-01-01

    Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There are a number of such equipment in use at different institutions and are found to be very useful. (author)

  2. Joining and Integration of Silicon Nitride Ceramics for Aerospace and Energy Systems

    Science.gov (United States)

    Singh, M.; Asthana, R.

    2009-01-01

    Light-weight, creep-resistant silicon nitride ceramics possess excellent high-temperature strength and are projected to significantly raise engine efficiency and performance when used as turbine components in the next-generation turbo-shaft engines without the extensive cooling that is needed for metallic parts. One key aspect of Si3N4 utilization in such applications is its joining response to diverse materials. In an ongoing research program, the joining and integration of Si3N4 ceramics with metallic, ceramic, and composite materials using braze interlayers with the liquidus temperature in the range 750-1240C is being explored. In this paper, the self-joining behavior of Kyocera Si3N4 and St. Gobain Si3N4 using a ductile Cu-based active braze (Cu-ABA) containing Ti will be presented. Joint microstructure, composition, hardness, and strength as revealed by optical microscopy, scanning electron microscopy (SEM), energy dispersive spectroscopy (EDS), Knoop microhardness test, and offset compression shear test will be presented. Additionally, microstructure, composition, and joint strength of Si3N4/Inconel 625 joints made using Cu-ABA, will be presented. The results will be discussed with reference to the role of chemical reactions, wetting behavior, and residual stresses in joints.

  3. Joining of SiC ceramics and SiC/SiC composites

    Energy Technology Data Exchange (ETDEWEB)

    Rabin, B.H. [Idaho National Engineering Lab., Idaho Falls, ID (United States)

    1996-08-01

    This project has successfully developed a practical and reliable method for fabricating SiC ceramic-ceramic joints. This joining method will permit the use of SiC-based ceramics in a variety of elevated temperature fossil energy applications. The technique is based on a reaction bonding approach that provides joint interlayers compatible with SiC, and excellent joint mechanical properties at temperatures exceeding 1000{degrees}C. Recent emphasis has been given to technology transfer activities, and several collaborative research efforts are in progress. Investigations are focusing on applying the joining method to sintered {alpha}-SiC and fiber-reinforced SiC/SiC composites for use in applications such as heat exchangers, radiant burners and gas turbine components.

  4. Achieving National Security Strategy: An Effective Process?

    National Research Council Canada - National Science Library

    Mullery, Brian W

    2008-01-01

    The purpose of this research paper is two-fold: 1) to examine whether the U.S. government is properly organized and equipped at the Executive level, to achieve the goals of the President's National Security Strategy and 2...

  5. Using and joining a franchised private sector provider network in Myanmar.

    Directory of Open Access Journals (Sweden)

    Kathryn O'Connell

    Full Text Available BACKGROUND: Quality is central to understanding provider motivations to join and remain within a social franchising network. Quality also appears as a key issue from the client's perspective, and may influence why a client chooses to use a franchised provider over another type of provider. The dynamic relationships between providers of social franchising clinics and clients who use these services have not been thoroughly investigated in the context of Myanmar, which has an established social franchising network. This study examines client motivations to use a Sun Quality Health network provider and provider motivations to join and remain in the Sun Quality Health network. Taken together, these two aims provide an opportunity to explore the symbiotic relationship between client satisfaction and provider incentives to increase the utilization of reproductive health care services. METHODS AND FINDINGS: Results from a series of focus group discussions with clients of reproductive health services and franchised providers shows that women chose health services provided by franchised private sector general practitioners because of its perceived higher quality, associated with the availability of effective, affordable, drugs. A key finding of the study is associated with providers. Provider focus group discussions indicate that a principle determinate for joining and remaining in the Sun Quality Health Network was serving the poor.

  6. Using and Joining a Franchised Private Sector Provider Network in Myanmar

    Science.gov (United States)

    O'Connell, Kathryn; Hom, Mo; Aung, Tin; Theuss, Marc; Huntington, Dale

    2011-01-01

    Background Quality is central to understanding provider motivations to join and remain within a social franchising network. Quality also appears as a key issue from the client's perspective, and may influence why a client chooses to use a franchised provider over another type of provider. The dynamic relationships between providers of social franchising clinics and clients who use these services have not been thoroughly investigated in the context of Myanmar, which has an established social franchising network. This study examines client motivations to use a Sun Quality Health network provider and provider motivations to join and remain in the Sun Quality Health network. Taken together, these two aims provide an opportunity to explore the symbiotic relationship between client satisfaction and provider incentives to increase the utilization of reproductive health care services. Methods and Findings Results from a series of focus group discussions with clients of reproductive health services and franchised providers shows that women chose health services provided by franchised private sector general practitioners because of its perceived higher quality, associated with the availability of effective, affordable, drugs. A key finding of the study is associated with providers. Provider focus group discussions indicate that a principle determinate for joining and remaining in the Sun Quality Health Network was serving the poor. PMID:22180781

  7. Why do people join trade unions?

    DEFF Research Database (Denmark)

    Toubøl, Jonas; Jensen, Carsten Strøby

    level on union recruitment, which is not done before. Workplace union density is taken to measure the strength of the workplace’s custom of being union member creating an instrumental incentive to join the union. Self-placement on a political left-right scale measures political attitude taken...

  8. Using and joining a franchised private sector provider network in Myanmar.

    Science.gov (United States)

    O'Connell, Kathryn; Hom, Mo; Aung, Tin; Theuss, Marc; Huntington, Dale

    2011-01-01

    Quality is central to understanding provider motivations to join and remain within a social franchising network. Quality also appears as a key issue from the client's perspective, and may influence why a client chooses to use a franchised provider over another type of provider. The dynamic relationships between providers of social franchising clinics and clients who use these services have not been thoroughly investigated in the context of Myanmar, which has an established social franchising network. This study examines client motivations to use a Sun Quality Health network provider and provider motivations to join and remain in the Sun Quality Health network. Taken together, these two aims provide an opportunity to explore the symbiotic relationship between client satisfaction and provider incentives to increase the utilization of reproductive health care services. Results from a series of focus group discussions with clients of reproductive health services and franchised providers shows that women chose health services provided by franchised private sector general practitioners because of its perceived higher quality, associated with the availability of effective, affordable, drugs. A key finding of the study is associated with providers. Provider focus group discussions indicate that a principle determinate for joining and remaining in the Sun Quality Health Network was serving the poor.

  9. Joining and Performance of Alkali Metal Thermal-to-electric Converter (AMTEC)

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Min-Soo; Lee, Wook-Hyun; Woo, Sang-Kuk [Korea Institute of Energy Research, Daejeon (Korea, Republic of)

    2017-07-15

    The alkali-Metal Thermal-to-electric Converter (AMTEC) is one of the promising static energy conversion technologies for the direct conversion of thermal energy to electrical energy. The advantages over a conventional energy converter are its high theoretical conversion efficiency of 40% and power density of 500 W/kg. The working principle of an AMTEC battery is the electrochemical reaction of the sodium through an ion conducting electrolyte. Sodium ion pass through the hot side of the beta”-alumina solid electrolyte (BASE) primarily as a result of the pressure difference. This pressure difference across the BASE has a significant effect on the overall performance of the AMTEC system. In order to build the high pressure difference across the BASE, hermeticity is required for each joined components for high temperature range of 900°C. The AMTEC battery was manufactured by utilizing robust joining technology of BASE/insulator/metal flange interfaces of the system for both structural and electrical stability. The electrical potential difference between the anode and cathode sides, where the electrons emitted from sodium ionization and recombined into sodium, was characterized as the open-circuit voltage. The efforts of technological improvement were concentrated on a high-power output and conversion efficiency. This paper discusses about the joining and performance of the AMTEC systems.

  10. Mexico: Failing State or Emerging Democracy?

    Science.gov (United States)

    2011-03-01

    were dominated by The Institutional Revolutionary Party, or PRI. Mexican politics largely resembled the subliminally oppressive conditions... communications equipment, while Mexican security forces have only austere capabilities.27 The Mexican Federal Police and the Mexican Army killed...economic and government institutions. Mexico joins a community U.S. Defense Secretary Robert M. Gates, Chairman of the Joint Chiefs of Staff Admiral

  11. Trilateral Initiative: IAEA authentication and national certification of verification equipment for facilities with classified forms of fissile material

    International Nuclear Information System (INIS)

    Haas, Eckard; Sukhanov, Alexander; Murphy, John

    2001-01-01

    Full text: Within the framework of the Trilateral Initiative, technical challenges have arisen due to the potential of the International Atomic Energy Agency (IAEA) monitoring fissile material with classified characteristics, as well as the IAEA using facility or host country supplied monitoring equipment. In monitoring material with classified characteristics, it is recognized that the host country needs to assure that classified information is not made available to the IAEA inspectors. Thus, any monitoring equipment used to monitor material with classified characteristics has to contain information security capabilities, such as information barriers. But likewise in using host-country-supplied monitoring equipment, regarding the material being monitored the IAEA has to have confidence that the information provided by the equipment is genuine and can be used by the IAEA in fulfilling its obligation to derive conclusions based on independent verification measures. Thus the IAEA needs to go through the process of authenticating the monitoring equipment. In the same way the host country needs to go through the process to assure itself that the monitoring equipment integrated with an information barrier will not divulge any classified information about an inspected sensitive item. Both processes require on large extent identical measures, but partially also may conflict with each other. The fact that monitoring equipment needs to exhibit information security throughout its lifecycle while at the same time be capable of being authenticated necessitates the need for creative technical approaches to be pursued. (author)

  12. Performance Comparison of the Optimized Inverted Joined Wing Airplane Concept and Classical Configuration Airplanes

    Directory of Open Access Journals (Sweden)

    Sieradzki Adam

    2016-09-01

    Full Text Available The joined wing concept is an unconventional airplane configuration, known since the mid-twenties of the last century. It has several possible advantages, like reduction of the induced drag and weight due to the closed wing concept. The inverted joined wing variant is its rarely considered version, with the front wing being situated above the aft wing. The following paper presents a performance prediction of the recently optimized configuration of this airplane. Flight characteristics obtained numerically were compared with the performance of two classical configuration airplanes of similar category. Their computational fluid dynamics (CFD models were created basing on available documentation, photographs and some inverse engineering methods. The analysis included simulations performed for a scale of 3-meter wingspan inverted joined wing demonstrator and also for real-scale manned airplanes. Therefore, the results of CFD calculations allowed us to assess the competitiveness of the presented concept, as compared to the most technologically advanced airplanes designed and manufactured to date. At the end of the paper, the areas where the inverted joined wing is better than conventional airplane were predicted and new research possibilities were described.

  13. Joining of thermoplastic substrates by microwaves

    Science.gov (United States)

    Paulauskas, Felix L.; Meek, Thomas T.

    1997-01-01

    A method for joining two or more items having surfaces of thermoplastic material includes the steps of depositing an electrically-conductive material upon the thermoplastic surface of at least one of the items, and then placing the other of the two items adjacent the one item so that the deposited material is in intimate contact with the surfaces of both the one and the other items. The deposited material and the thermoplastic surfaces contacted thereby are then exposed to microwave radiation so that the thermoplastic surfaces in contact with the deposited material melt, and then pressure is applied to the two items so that the melted thermoplastic surfaces fuse to one another. Upon discontinuance of the exposure to the microwave energy, and after permitting the thermoplastic surfaces to cool from the melted condition, the two items are joined together by the fused thermoplastic surfaces. The deposited material has a thickness which is preferably no greater than a skin depth, .delta..sub.s, which is related to the frequency of the microwave radiation and characteristics of the deposited material in accordance with an equation.

  14. The effectiveness of online gaming as part of a security awareness program

    CSIR Research Space (South Africa)

    Labuschagne, WA

    2014-07-01

    Full Text Available the human element whose actions can be considered as erratic and unpredictable thus posing a threat to the security of the organization. Security awareness programs aim to equip users of cyberspace with the necessary knowledge to identify and mitigate...

  15. Alternative end-joining pathway(s): bricolage at DNA breaks.

    Science.gov (United States)

    Frit, Philippe; Barboule, Nadia; Yuan, Ying; Gomez, Dennis; Calsou, Patrick

    2014-05-01

    To cope with DNA double strand break (DSB) genotoxicity, cells have evolved two main repair pathways: homologous recombination which uses homologous DNA sequences as repair templates, and non-homologous Ku-dependent end-joining involving direct sealing of DSB ends by DNA ligase IV (Lig4). During the last two decades a third player most commonly named alternative end-joining (A-EJ) has emerged, which is defined as any Ku- or Lig4-independent end-joining process. A-EJ increasingly appears as a highly error-prone bricolage on DSBs and despite expanding exploration, it still escapes full characterization. In the present review, we discuss the mechanism and regulation of A-EJ as well as its biological relevance under physiological and pathological situations, with a particular emphasis on chromosomal instability and cancer. Whether or not it is a genuine DSB repair pathway, A-EJ is emerging as an important cellular process and understanding A-EJ will certainly be a major challenge for the coming years. Copyright © 2014 The Authors. Published by Elsevier B.V. All rights reserved.

  16. An integrated approach to validation of safeguards and security program performance

    International Nuclear Information System (INIS)

    Altman, W.D.; Hunt, J.S.; Hockert, J.W.

    1988-01-01

    Department of Energy (DOE) requirements for safeguards and security programs are becoming increasingly performance oriented. Master Safeguards and Security Agreemtns specify performance levels for systems protecting DOE security interests. In order to measure and validate security system performance, Lawrence Livermore National Laboratory (LLNL) has developed cost effective validation tools and a comprehensive validation approach that synthesizes information gained from different activities such as force on force exercises, limited scope performance tests, equipment testing, vulnerability analyses, and computer modeling; into an overall assessment of the performance of the protection system. The analytic approach employs logic diagrams adapted from the fault and event trees used in probabilistic risk assessment. The synthesis of the results from the various validation activities is accomplished using a method developed by LLNL, based upon Bayes' theorem

  17. Teens join the MoEDAL collaboration

    CERN Multimedia

    Stephanie Hills

    2013-01-01

    The principal investigator for any institute joining an experimental collaboration is generally a self-assured researcher with evident leadership skills and an in-depth knowledge of their subject gained over many years. Katherine Evans fits the brief in every respect, except that she is 17 years old and her research institute is the Langton Star Centre, based at the Simon Langton Grammar School for Boys. The school has just joined the MoEDAL experiment.   Teacher Becky Parker (left) with two students from the Simon Langton Grammar School for Boys in the MoEDAL experimental area. MoEDAL, the latest LHC experiment has detectors located close to the interaction point of the LHCb experiment. This new experiment is designed to search for the highly ionizing avatars of new physics at the LHC, specifically the magnetic monopole or dyon and other highly ionizing stable massive particles from a number of beyond-the-Standard-Model scenarios. MoEDAL was approved in 2010 and is due to start taking data i...

  18. Equipment for application of irradiation techniques, especially in cable making industry

    International Nuclear Information System (INIS)

    Ondrejcek, J.

    1981-01-01

    Equipment is described for turning electric conductors during irradiation of their insulation with a longitudinally sweeping beam of accelerated electrons. The equipment secures homogeneous radiation curing of the silicone insulation along the whole conductor periphery with a dose of 30 to 80 kJ.kg -1 . Preliminary tests showed the feasibility of continuous turning with the conductor moving at 20 to 50 m.min -1 and satisfactory strength of the joint between the insulation and the conductor core. (Ha)

  19. Joining of metals to structural ceramics

    Energy Technology Data Exchange (ETDEWEB)

    Sistiaga, J M; Salvador, J M

    1988-01-01

    A wide review is made on metal-ceramics joining by brazing, mainly by active metal containing brazing filler alloys and solid state welding that is diffusion welding and hot isostatic pressure (HIP). Both the basic aspects of the processes and the mechanisms involved are considsered. At last, different joint testing ands evaluation procedures are presented. (Author)

  20. Joining of metals to structural ceramics

    International Nuclear Information System (INIS)

    Sistiaga, J.M.; Salvador, J.M.

    1988-01-01

    A wide review is made on metal-ceramics joining by brazing, mainly by active metal containing brazing filler alloys and solid state welding that is diffusion welding and hot isostatic pressure (HIP). Both the basic aspects of the processes and the mechanisms involved are considered. At last, different joint testing and evaluation procedures are presented. (Author)

  1. Influence of Hub Parameters on Joining Forces and Torque Transmission Output of Plastically-Joined Shaft-Hub-Connections with a Knurled Contact Surface

    Directory of Open Access Journals (Sweden)

    Lukáš Suchý

    2018-04-01

    Full Text Available A knurled interference fit is a machine part connection made by a plastic joining, which includes the advantages of commonly-used shaft-hub-connections. The combination of the friction and form fit, which are responsible for torque transmission, results in a higher power density than conventional connections. In this paper, parameter gaps are bridged with the aim of enhance the design calculation of the knurled interference fit. Experimental investigations on the shaft chamfer angle (100Cr6 and hub-diameter-ratio (AlSi1MgMn were performed. The analytical approaches are developed for calculating the joining force and maximal torque capacity by accounting for experimentally investigated loss of load transmission at high hub-diameter-ratios and high shaft chamfer angles. The presented calculation approach is an accurate tool for the assessment of early machine designs of the knurled interference fit and helps to save from having to perform time-extensive tests.

  2. Business processes in the RFID-equipped restricted access administrative office

    Directory of Open Access Journals (Sweden)

    Robert Waszkowski

    2016-01-01

    Full Text Available The paper presents business processes in the RFID-equipped restricted access administrative office. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialist, security systems specialists and employees of the secret office. The presented models include the fact that the facilities in the secret office (cabinet, sluice, photocopier, desks are equipped with the RFID reader, which allows to immediately read the documents that are within their reach.

  3. 75 FR 18819 - Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart Grid Cyber Security Strategy and...

    Science.gov (United States)

    2010-04-13

    ... a cyber attack. 2. It is essential that those parts or equipment of the Smart Grid that optimize the...-0143-01] Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart Grid Cyber Security Strategy and... (NIST) seeks comments on the second draft of NISTIR 7628, Smart Grid Cyber Security Strategy and...

  4. A survey of current and anticipated use of standard and specialist equipment by UK optometrists.

    Science.gov (United States)

    Dabasia, Priya L; Edgar, David F; Garway-Heath, David F; Lawrenson, John G

    2014-09-01

    To investigate current and anticipated use of equipment and information technology (IT) in community optometric practice in the UK, and to elicit optometrists' views on adoption of specialist equipment and IT. An anonymous online questionnaire was developed, covering use of standard and specialist diagnostic equipment, and IT. The survey was distributed to a random sample of 1300 UK College of Optometrists members. Four hundred and thirty-two responses were received (response rate = 35%). Enhanced (locally commissioned) or additional/separately contracted services were provided by 73% of respondents. Services included glaucoma repeat measures (30% of respondents), glaucoma referral refinement (22%), fast-track referral for wet age-related macular degeneration (48%), and direct cataract referral (40%). Most respondents (88%) reported using non-contact/pneumo tonometry for intra-ocular pressure measurement, with 81% using Goldmann or Perkins tonometry. The most widely used item of specialist equipment was the fundus camera (74% of respondents). Optical Coherence Tomography (OCT) was used by 15% of respondents, up from 2% in 2007. Notably, 43% of those anticipating purchasing specialist equipment in the next 12 months planned to buy an OCT. 'Paperless' records were used by 39% of respondents, and almost 80% of practices used an electronic patient record/practice management system. Variations in responses between parts of the UK reflect differences in the provision of the General Ophthalmic Services contract or community enhanced services. There was general agreement that specialised equipment enhances clinical care, permits increased involvement in enhanced services, promotes the practice and can be used as a defence in clinico-legal cases, but initial costs and ongoing maintenance can be a financial burden. Respondents generally agreed that IT facilitates administrative flow and secure exchange of health information, and promotes a state-of-the-art practice image

  5. Radiation Detection for Homeland Security Applications

    Science.gov (United States)

    Ely, James

    2008-05-01

    In the past twenty years or so, there have been significant changes in the strategy and applications for homeland security. Recently there have been significant at deterring and interdicting terrorists and associated organizations. This is a shift in the normal paradigm of deterrence and surveillance of a nation and the `conventional' methods of warfare to the `unconventional' means that terrorist organizations resort to. With that shift comes the responsibility to monitor international borders for weapons of mass destruction, including radiological weapons. As a result, countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments at land, rail, air, and sea ports of entry in the US and in European and Asian countries. Radioactive signatures of concern include radiation dispersal devices (RDD), nuclear warheads, and special nuclear material (SNM). Radiation portal monitors (RPMs) are used as the main screening tool for vehicles and cargo at borders, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. This talk will present an overview of radiation detection equipment with emphasis on radiation portal monitors. In the US, the deployment of radiation detection equipment is being coordinated by the Domestic Nuclear Detection Office within the Department of Homeland Security, and a brief summary of the program will be covered. Challenges with current generation systems will be discussed as well as areas of investigation and opportunities for improvements. The next generation of radiation portal monitors is being produced under the Advanced Spectroscopic Portal program and will be available for deployment in the near future. Additional technologies, from commercially available to experimental, that provide additional information for radiation screening, such as density imaging equipment, will

  6. Tungsten foil laminate for structural divertor applications – Joining of tungsten foils

    Energy Technology Data Exchange (ETDEWEB)

    Reiser, Jens, E-mail: jens.reiser@kit.edu [Karlsruhe Institute of Technology (KIT), Institute for Applied Materials (IAM-AWP) (Germany); Rieth, Michael; Möslang, Anton; Dafferner, Bernhard; Hoffmann, Jan [Karlsruhe Institute of Technology (KIT), Institute for Applied Materials (IAM-AWP) (Germany); Mrotzek, Tobias; Hoffmann, Andreas [PLANSEE SE, Reutte (Austria); Armstrong, D.E.J.; Yi, Xiaoou [University of Oxford, Department of Materials (United Kingdom)

    2013-05-15

    This paper is the fourth in our series on tungsten laminates. The aim of this paper is to discuss laminate synthesis, meaning the joining of tungsten foils. It is obvious that the properties of the tungsten laminate strongly depend on the combination of (i) interlayer and (ii) joining technology, as this combination defines (i) the condition of the tungsten foil after joining (as-received or recrystallised) as well as (ii) the characteristics of the interface between the tungsten foil and the interlayer (wettability or diffusion leading to a solid solution or the formation of intermetallics). From the example of tungsten laminates joined by brazing with (i) an eutectic silver copper brazing filler, (ii) copper, (iii) titanium, and (iv) zirconium, the microstructure will be discussed, with special focus on the interface. Based on our assumptions of the mechanism of the extraordinary ductility of tungsten foil we present three syntheses strategies and make recommendations for the synthesis of high temperature tungsten laminates.

  7. An Overview of Global Nuclear Security Regime and Its Introduction into the Nigerian Educational System

    International Nuclear Information System (INIS)

    Jonah, S.A.

    2013-01-01

    Nuclear security is the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material, other radioactive substances or their associated facilities. The responsibility for creating and sustaining a nuclear security regime for the protection of nuclear and other radiological material clearly belongs to the respective country. Within a State the nuclear security regime resembles layers of an onion with equipment and personnel securing the borders and ports representing the outer layer. Nuclear power, research reactor and nuclear medicine facilities constitute the various inner layers down to the actual target materials. Components of any nuclear security regime include not only technological systems, but the human resources needed to manage, operate, administer and maintain equipment, hardware and software. Nigeria is a non-nuclear weapons state and without a large-scale nuclear industry, but have a major role to play in preventing nuclear terrorism globally. It is pertinent to know that as the Fukushima accident and other nuclear accidents have demonstrated, nuclear crises do not respect borders. Therefore, nuclear threats must be addressed by all nations. Furthermore, to set the groundwork for the safe, peaceful and stable use of nuclear energy in Nigeria and all over the world, efforts must be made to enhance nuclear safety and security. This paper discusses the present international nuclear security regime and possibility of integrating it into the Nigerian educational system in view of current global perspectives and nuclear renaissance.

  8. Joining of HHF materials applying electroplating technology

    Energy Technology Data Exchange (ETDEWEB)

    Krauss, Wolfgang, E-mail: wolfgang.krauss@kit.edu; Lorenz, Julia; Konys, Jürgen

    2014-10-15

    Highlights: • Electroplating of fillers is industrially relevant for brazing in fusion. • Interlayers (Ni or Pd) improve adherence and reduce failure risks. • Tungsten and Eurofer joints successfully fabricated by electroplating. • Mechanical and non-destructive testing integrated into qualification. • Shear strength of W joints comparable with conventionally brazed steel. - Abstract: Tungsten will be used as armor material for blanket shielding and is designated as high heat flux material for divertors, beyond application of improved W composite alloys as structural material. Independent from design (water- or helium-cooled), a successful development is inherently correlated with joining of tungsten with functional components. Depending on the design variants, the fabricated joints have to guarantee specific functional or structural properties, e.g., good thermal conductivity or mechanical load transmission. Tungsten shows lacks in adapted joining due to its metallurgical behavior ranging from immiscibility over bad wetting to brittle intermetallic phase formation. Electroplating has shown to overcome such drawbacks and that homogeneous functional (e.g., Ni or Pd) and filler (e.g., Cu) layers can be deposited. In this paper the progress achieved in development of electroplating processes for joining W to W or steel to steel will be shown. The main focus will be the characterization of the processed joints applying metallurgical investigations including SEM/EDX analyses and non-destructive testing. The mechanical stability of the produced joints is demonstrated by presenting recent shear test data. The W–W joints failed due to cracking in W, whereas the steel–steel joints cracked in the brazing zone at about 200 N/mm{sup 2} load.

  9. Understanding the Perils of our Power Grid Security

    OpenAIRE

    Unton, Chris

    2016-01-01

    Our nation depends on electric power to support daily conveniences as well as critical functions like street lights, hospitals, and 911 phone calls. As the equipment to operate the bulk electric system becomes increasingly computerized and connected, we face an increasing risk of Cyber Security breach disabling or damaging the grid. Regulators have devised Critical Infrastructure Protection standards to enforce a minimum level of Cyber Security protection at utilities and other companies resp...

  10. The study on joining carbon/carbon composites using Ti–Ni–Si compound

    International Nuclear Information System (INIS)

    Wang Jie; Li Kezhi; Song Xinrui; Guo Lingjun; Li Wei; Li Zhaoqian

    2012-01-01

    Highlights: ► First study to join C/C composites using Ti–Ni–Si compound. ► The average joint shear strength can reach up to 23.58 MPa. ► Strong joints are apt to fracture through interlayer, interfaces and C/C matrix. ► Phase compositions in joints are varied with increasing joining temperature. - Abstract: 2D carbon/carbon (C/C) composites have been successfully joined by partial transient liquid phase (PTLP) bonding using Ti–Ni–Si compound as interlayer. The shear strengths of C/C joints were found to be affected observably by joining temperature, joining pressure and holding time. The optimum process parameters were determined at 1150 °C, 30 MPa, 45 min, and the maximum joint shear strength was obtained under this optimum process condition with an average value of 23.58 MPa. Microstructures and compositions of joints were analyzed by scanning electronic microscopy (SEM), energy disperse spectroscopy (EDS) and X-ray diffraction (XRD). Results showed that element interdiffusions and chemical reactions took place in the joining zone and various compounds including Ni 4 Si 7 Ti 4 , TiSi 2 , SiC and TiC were produced, by which compact interlayer and strong interface were formed in C/C joints. The shear morphology indicated there were three fracture modes in C/C joints and the fracture was apt to occur through interlayer, interface and C/C matrix in strong joints. Thermal shock resistance experimental results revealed that joint shear strength has a rapid drop after 5 thermal cycles and then reduces gradually with the increase of thermal cycles between room temperature and 1000 °C.

  11. Evaluation of the feasibility of joining titanium alloy to heavymet tungsten alloy

    Energy Technology Data Exchange (ETDEWEB)

    1978-06-07

    Information is presented on a program to select and evaluate methods of brazing and/or explosively welding Ti-6Al-4V titanium alloy to Heavymet, a tungsten-base metal containing up to about 20% alloying elements (nickel, copper, etc.) to improve its ductility and other mechanical properties. Designs permitting the reliable production of joints between these base metals were of interest too. While this investigation was primarily concerned with an engineering study of the problems associated with joining these base metals in the required configuration, limited experimental studies were conducted also. The joining methods are reviewed individually. Recommendations for developing a viable titanium-tungsten joining procedure are discussed.

  12. Evaluation of the feasibility of joining titanium alloy to heavymet tungsten alloy

    International Nuclear Information System (INIS)

    1978-01-01

    Information is presented on a program to select and evaluate methods of brazing and/or explosively welding Ti-6Al-4V titanium alloy to Heavymet, a tungsten-base metal containing up to about 20% alloying elements (nickel, copper, etc.) to improve its ductility and other mechanical properties. Designs permitting the reliable production of joints between these base metals were of interest too. While this investigation was primarily concerned with an engineering study of the problems associated with joining these base metals in the required configuration, limited experimental studies were conducted also. The joining methods are reviewed individually. Recommendations for developing a viable titanium-tungsten joining procedure are discussed

  13. 15 CFR Notes Applicable to State... - Notes applicable to State of Understanding related to Medical Equipment:

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Notes applicable to State of Understanding related to Medical Equipment: applicable Notes applicable to State of Understanding related to Medical Equipment: Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY,...

  14. Development of information security and vulnerability risk management system for J-PARC

    International Nuclear Information System (INIS)

    Ishikawa, Hiroyuki; Tate, Akihiro; Murakami, Tadashi

    2012-02-01

    In J-PARC (Japan Proton Accelerator Research Complex) we have set up intra-network (internal network, we will abbreviate it as JLAN, below) to support research activity and communication among users. In JLAN, we set up various kinds of security devices to keep JLAN secure. However, the servers which provide information or service to public are still in danger of being accessed illegally. If there is an illegal access, that may cause defacement of data or information leak. Furthermore, the victim servers are manipulated by the malicious attackers, and they themselves attack the external information equipments. Vulnerability of servers enables unauthorized access. So, vulnerability test with use of a vulnerability tool is one of the most effective ways to take measures for vulnerability of the equipments. However, it is not enough to just conduct a vulnerability test. It is also essential for information security to take measures to cover constantly for the vulnerability of servers. We focused on the points above, and developed the vulnerability testing system for security. It is not only a testing tool for the vulnerability of servers, but also management system which enables the server administrators in charge of taking measures for vulnerabilities to manage risks and handles PDCA (Plan-Do-Check-Action) cycles as countermeasure for vulnerability. In this paper, we report the technologies and ingenuities for the development of the above system. (author)

  15. Improving industrial process control systems security

    CERN Document Server

    Epting, U; CERN. Geneva. TS Department

    2004-01-01

    System providers are today creating process control systems based on remote connectivity using internet technology, effectively exposing these systems to the same threats as corporate computers. It is becoming increasingly difficult and costly to patch/maintain the technical infrastructure monitoring and control systems to remove these vulnerabilities. A strategy including risk assessment, security policy issues, service level agreements between the IT department and the controls engineering groups must be defined. In addition an increased awareness of IT security in the controls system engineering domain is needed. As consequence of these new factors the control system architectures have to take into account security requirements, that often have an impact on both operational aspects as well as on the project and maintenance cost. Manufacturers of industrial control system equipment do however also propose progressively security related solutions that can be used for our active projects. The paper discusses ...

  16. Analysis and solutions of security issues in Ethernet PON

    Science.gov (United States)

    Meng, Yu; Jiang, Tao; Xiao, Dingzhong

    2005-02-01

    Ethernet Passive Optical Network (EPON), which combines the low cost Ethernet equipment and economic fiber infrastructure, is being considered as a promising solution for Fiber-To-The-Home (FTTH). However, since EPON is an optical shared medium network, some unique features make it more vulnerable to security attacks. In this paper, the key security threats of EPON are firstly analyzed. And then, considering some specific properties which might be utilized for security, such as the safety of transmissions in upstream direction, some novel methods are presented to solve security problems. Firstly, based on some modification about registration, the mechanism of access control is achieved. Secondly, we implement an AES-128 symmetrical encryption and decryption in the EPON system. The AES-128 algorithm can process data blocks of 128 bits, but the length of Ethernet frame is variable. How to deal with the last block, which is not up to 128 bits, is discussed in detail. Finally, key update is accomplished through a vendor specific OAM frame in order to enhance the level of security. The proposed mechanism will remain in conformance with P2MP specification defined by 802.3ah TF, and can supply a complete security solution for EPON.

  17. The man in the business of nuclear security. Most important link - Yes or no?

    International Nuclear Information System (INIS)

    Nikčević, Marko

    2016-01-01

    How to attract and prepare a man to be a strong link in the system of nuclear safety and security and contribute to their development and social awareness? Why is this difficult task related to securing the funds from which the harmonization of regulations, technical equipment, equipment maintenance and systems will be financed? Do you sometimes make a mistake by dealing with individual partner organizations in attempts to establish an effective system of nuclear safety and security? The user has to be addressed in direct communication in to help him be faster, more efficient and to have the overall process less costly. This is fine when the inefficiency of some partner organizations only results of its internal organizational factors (management, size, strategy development, equipment, organizational culture). But what if this is not the case and if you neglect external factors (economic system in the country, institutional conditions, level of technology) and, finally, the culture of society as a critical factor? What are the problems then that arise in the system of nuclear safety and security in the country? Is a man again in the center of those problems and how can he deal with them? (author)

  18. Medicare program; replacement of reasonable charge methodology by fee schedules for parenteral and enteral nutrients, equipment, and supplies. Final rule.

    Science.gov (United States)

    2001-08-28

    This final rule implements fee schedules for payment of parenteral and enteral nutrition (PEN) items and services furnished under the prosthetic device benefit, defined in section 1861(s)(8) of the Social Security Act. The authority for establishing these fee schedules is provided by the Balanced Budget Act of 1997, which amended the Social Security Act at section 1842(s). Section 1842(s) of the Social Security Act specifies that statewide or other area wide fee schedules may be implemented for the following items and services still subject to the reasonable charge payment methodology: medical supplies; home dialysis supplies and equipment; therapeutic shoes; parenteral and enteral nutrients, equipment, and supplies; electromyogram devices; salivation devices; blood products; and transfusion medicine. This final rule describes changes made to the proposed fee schedule payment methodology for these items and services and provides that the fee schedules for PEN items and services are effective for all covered items and services furnished on or after January 1, 2002. Fee schedules will not be implemented for electromyogram devices and salivation devices at this time since these items are not covered by Medicare. In addition, fee schedules will not be implemented for medical supplies, home dialysis supplies and equipment, therapeutic shoes, blood products, and transfusion medicine at this time since the data required to establish these fee schedules are inadequate.

  19. Installation equipment for a glove box

    International Nuclear Information System (INIS)

    Loriot, P.

    1993-01-01

    The equipment uses a hollow support on which the glove to be replaced is mounted. It carries two grooves to ensure that the edges of the new and used glove are securely held in position. The new glove is temporarily fitted to a mounting ring using a mounting jig which stretches the edge of the new glove around its rim. The mounting ring is then positioned over the hollow support and the edge of the glove transferred onto it. (author)

  20. A review of video security training and assessment-systems and their applications

    International Nuclear Information System (INIS)

    Cellucci, J.; Hall, R.J.

    1991-01-01

    This paper reports that during the last 10 years computer-aided video data collection and playback systems have been used as nuclear facility security training and assessment tools with varying degrees of success. These mobile systems have been used by trained security personnel for response force training, vulnerability assessment, force-on-force exercises and crisis management. Typically, synchronous recordings from multiple video cameras, communications audio, and digital sensor inputs; are played back to the exercise participants and then edited for training and briefing. Factors that have influence user acceptance include: frequency of use, the demands placed on security personnel, fear of punishment, user training requirements and equipment cost. The introduction of S-VHS video and new software for scenario planning, video editing and data reduction; should bring about a wider range of security applications and supply the opportunity for significant cost sharing with other user groups

  1. Joining Dental Ceramic Layers With Glass

    Science.gov (United States)

    Saied, MA; Lloyd, IK; Haller, WK; Lawn, BR

    2011-01-01

    Objective Test the hypothesis that glass-bonding of free-form veneer and core ceramic layers can produce robust interfaces, chemically durable and aesthetic in appearance and, above all, resistant to delamination. Methods Layers of independently produced porcelains (NobelRondo™ Press porcelain, Nobel BioCare AB and Sagkura Interaction porcelain, Elephant Dental) and matching alumina or zirconia core ceramics (Procera alumina, Nobel BioCare AB, BioZyram yttria stabilized tetragonal zirconia polycrystal, Cyrtina Dental) were joined with designed glasses, tailored to match thermal expansion coefficients of the components and free of toxic elements. Scanning electron microprobe analysis was used to characterize the chemistry of the joined interfaces, specifically to confirm interdiffusion of ions. Vickers indentations were used to drive controlled corner cracks into the glass interlayers to evaluate the toughness of the interfaces. Results The glass-bonded interfaces were found to have robust integrity relative to interfaces fused without glass, or those fused with a resin-based adhesive. Significance The structural integrity of the interfaces between porcelain veneers and alumina or zirconia cores is a critical factor in the longevity of all-ceramic dental crowns and fixed dental prostheses. PMID:21802131

  2. Nuclear security personnel for power plants. Content and review procedures for a security training and qualification program

    International Nuclear Information System (INIS)

    1978-06-01

    The applicant and licensee training and qualification plans will outline the process by which guard, watchman, armed response persons and other members of the security organization will be selected, trained, equipped and qualified. This plan should contain: (1) job descriptions for all security positions; (2) duties defined for all positions; (3) critical tasks defined for all duties; (4) skills, knowledge and abilities defined for all critical tasks; (5) performance objectives stated for all critical tasks; and (6) training and qualification plans to train and test to appropriate performance objectives. The document gives guidance on the preparation of this training and qualification plan and contains three parts: (1) an introduction to and brief explanation of job analysis and performance objectives; (2) a statement of the information that should be submitted in response to the requirements and the NRR review procedures; and (3) a sample qualification submittal

  3. Microstructure and mechanical properties of low-activation glass-ceramic joining and coating for SiC/SiC composites

    International Nuclear Information System (INIS)

    Katoh, Yutai; Kotani, M.; Kohyama, A.; Montorsi, M.; Salvo, M.; Ferraris, M.

    2000-01-01

    Calcia-alumina (CA) glass-ceramic was studied as a candidate low-activation joining and sealing material for SiC/SiC components for fusion blanket and diverter structures, in terms of microstructural stability and mechanical properties. The CA glass-ceramic joining and seal coating were applied to the Hi-Nicalon TM SiC fiber-reinforced SiC matrix composites in which the matrix had been formed through chemical vapor infiltration and polymer impregnation and pyrolysis methods. Microstructural characterization was carried out for the joined and coated materials by optical and scanning electron microscopy (SEM). The mechanical property of the joint was evaluated through a shear test on sandwich joints. The average shear strength of the joined structures was 28 MPa at room temperature. Fractography revealed that the fracture occurred in the glass phase and the shear strength may be improved by reduction of the glass fraction

  4. Performance Comparison of the Optimized Inverted Joined Wing Airplane Concept and Classical Configuration Airplanes

    OpenAIRE

    Sieradzki Adam; Dziubiński Adam; Galiński Cezary

    2016-01-01

    The joined wing concept is an unconventional airplane configuration, known since the mid-twenties of the last century. It has several possible advantages, like reduction of the induced drag and weight due to the closed wing concept. The inverted joined wing variant is its rarely considered version, with the front wing being situated above the aft wing. The following paper presents a performance prediction of the recently optimized configuration of this airplane. Flight characteristics obtaine...

  5. Secure Coding for Safety I and C Systems on Nuclear Power Plants

    International Nuclear Information System (INIS)

    Kim, Y. M.; Park, H. S.; Kim, T. H.

    2015-01-01

    This paper addresses secure coding technologies which can reduce the software vulnerabilities and provides secure coding application guidelines for nuclear safety I and C systems. The use of digital equipment may improve their reliability and reduce maintenance costs. But, the design characteristics of nuclear I and C systems are becoming more complex and the possibility of cyber-attacks using software vulnerabilities has been increased. Software defects, bugs and logic flaws have been consistently the primary causes of software vulnerabilities which can introduce security vulnerabilities. In this study, we described a applying methods for secure coding which can reduce the software vulnerabilities. Software defects lists, countermeasures for each defect and coding rules can be applied properly depending on target system's condition. We expect that the results of this study can help developing the secure coding guidelines and significantly reducing or eliminating vulnerabilities in nuclear safety I and C software

  6. Secure Coding for Safety I and C Systems on Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Y. M.; Park, H. S. [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Kim, T. H. [Formal Works Inc., Seoul (Korea, Republic of)

    2015-10-15

    This paper addresses secure coding technologies which can reduce the software vulnerabilities and provides secure coding application guidelines for nuclear safety I and C systems. The use of digital equipment may improve their reliability and reduce maintenance costs. But, the design characteristics of nuclear I and C systems are becoming more complex and the possibility of cyber-attacks using software vulnerabilities has been increased. Software defects, bugs and logic flaws have been consistently the primary causes of software vulnerabilities which can introduce security vulnerabilities. In this study, we described a applying methods for secure coding which can reduce the software vulnerabilities. Software defects lists, countermeasures for each defect and coding rules can be applied properly depending on target system's condition. We expect that the results of this study can help developing the secure coding guidelines and significantly reducing or eliminating vulnerabilities in nuclear safety I and C software.

  7. Joining of silicon carbide using interlayer with matching coefficient of thermal expansion

    International Nuclear Information System (INIS)

    Perham, T.

    1996-11-01

    The primary objective of this study is to develop a technique for joining a commercially available Silicon Carbide that gives good room temperature strength and the potential for good high temperature strength. One secondary objective is that the joining technique be adaptable to SiC f /SiC composites and/or Nickel based superalloys, and another secondary objective is that the materials provide good neutron irradiation resistance and low activation for potential application inside nuclear fusion reactors. The joining techniques studied here are: (1) reaction bonding with Al-Si/Si/SiC/C; (2) reaction/infiltration with calcium aluminum silicate; (3) ion exchange mechanism to form calcium hexaluminate (a refractory cement); and (4) oxide frit brazing with cordierite

  8. Design of Helical Self-Piercing Rivet for Joining Aluminum Alloy and High-Strength Steel Sheets

    International Nuclear Information System (INIS)

    Kim, W. Y.; Kim, D. B.; Park, J. G; Kim, D. H.; Kim, K. H.; Lee, I. H.; Cho, H. Y.

    2014-01-01

    A self-piercing rivet (SPR) is a mechanical component for joining dissimilar material sheets such as those of aluminum alloy and steel. Unlike conventional rivets, the SPR directly pierces sheets without the need for drilling them beforehand. However, the regular SPR can undergo buckling when it pierces a high-strength steel sheet, warranting the design of a helical SPR. In this study, the joining and forging processes using the helical SPR were simulated using the commercial FEM code, DEFORM-3D. High-tensile-strength steel sheets of different strengths were joined with aluminum alloy sheets using the designed helical SPR. The simulation results were found to agree with the experimental results, validating the optimal design of a helical SPR that can pierce high-strength steel sheets

  9. Design of Helical Self-Piercing Rivet for Joining Aluminum Alloy and High-Strength Steel Sheets

    Energy Technology Data Exchange (ETDEWEB)

    Kim, W. Y.; Kim, D. B.; Park, J. G; Kim, D. H.; Kim, K. H.; Lee, I. H.; Cho, H. Y. [Chungbuk National University, Cheongju (Korea, Republic of)

    2014-07-15

    A self-piercing rivet (SPR) is a mechanical component for joining dissimilar material sheets such as those of aluminum alloy and steel. Unlike conventional rivets, the SPR directly pierces sheets without the need for drilling them beforehand. However, the regular SPR can undergo buckling when it pierces a high-strength steel sheet, warranting the design of a helical SPR. In this study, the joining and forging processes using the helical SPR were simulated using the commercial FEM code, DEFORM-3D. High-tensile-strength steel sheets of different strengths were joined with aluminum alloy sheets using the designed helical SPR. The simulation results were found to agree with the experimental results, validating the optimal design of a helical SPR that can pierce high-strength steel sheets.

  10. Safeguards techniques and equipment. 2003 ed

    International Nuclear Information System (INIS)

    2003-01-01

    The 1990s saw significant non-proliferation related developments in the world, resulting in a new period of safeguards development. Over several years an assessment was made of how to strengthen the effectiveness and improve the efficiency of IAEA safeguards. In May 1997 this culminated in the adoption by the IAEA Board of Governors of a Protocol Additional to Safeguards Agreements which significantly broadens the role of IAEA safeguards. As a consequence, the IAEA safeguards system entered a new era. In 1997 the IAEA began to publish a new series of booklets on safeguards, called the International Nuclear Verification Series (NVS). The objective of these booklets was to help in explaining IAEA safeguards, especially the new developments in safeguards, particularly for facility operators and government officers involved with these topics. The current booklet, which is a revision and update of IAEA/NVS/1, is intended to give a full and balanced description of the techniques and equipment used for both nuclear material accountancy and containment and surveillance measures, and for the new safeguards measure of environmental sampling. A completely new section on data security has been added to describe the specific features that are included in installed equipment systems in order to ensure the authenticity and confidentiality of information. As new verification measures continue to be developed the material in this booklet will be periodically reviewed and updated versions issued. The basic verification measure used by the IAEA is nuclear material accountancy. In applying nuclear material accountancy, IAEA safeguards inspectors make independent measurements to verify quantitatively the amount of nuclear material presented in the State's accounts. For this purpose, inspectors count items (e.g. fuel assemblies, bundles or rods, or containers of powdered compounds of uranium or plutonium) and measure attributes of these items during their inspections using non

  11. Pakistan’s national Centre of Excellence contributes to sustaining nuclear security

    International Nuclear Information System (INIS)

    Dixit, Aabha

    2016-01-01

    Pakistani front line officers and first responders are in a better position to fight illicit trafficking in nuclear and other radioactive materials, as well as to use advanced radiation detection and monitoring equipment, thanks to training they have received at the country’s Centre of Excellence for Nuclear Security. This is just one of the benefits the country has reaped from the Centre, which is collaborating with the growing International Network for Nuclear Security Training and Support Centres (NSSC Network), building national capacity through training and strengthening technical and scientific support programmes. Since the establishment of the Centre of Excellence, Pakistan has organized training courses on nuclear security for personnel from national and regional organizations. The Centre of Excellence also offers technical support to personnel involved in the maintenance and upgrade of facilities, with a focus on enhancing technical and scientific skills and quality control of equipment.

  12. Regulatory aspects of the enforcement policy applied to teletherapy equipment obsolescence (1995-2002)

    International Nuclear Information System (INIS)

    Truppa, Walter A.; Rey, Hugo L.; Rojas, Carlos A.

    2004-01-01

    The paper describes the way in which the Nuclear Regulatory Authority (ARN) has implemented an 'enforcement' policy for the services of radiotherapy that operated obsolete cobalt therapy units. Without doubt one of the greater advances has been the simulation and planning of the treatment, indispensable tools in a system of quality in radiotherapy where the equipment acquires a preponderant paper. In Argentina the distribution of equipment was inhomogeneous, and within it coexisted, as primary and unique units, great amount with a technology today already obsolete. The Nuclear Regulatory Authority (ARN) took a strong regulatory attitude directed to change or to retire many of the units, as its characteristics of design and antiquity did not fulfill the criteria of radiological security established in the norms (optimization of the dose, distances source to skin, yield in surface, adequate maintenance, etc.). On this matter a policy was applied to impose within suitable terms, the change of the obsolete equipment for this practice, particularly those distances source to skin minor than 80 cm. As result of the applied coercive measures at this moment, 28 equipment of cobalt therapy in advanced degree of obsolescence were retired by regulatory decision. Part of these equipment were replaced by their owners by more modern equipment whose operation adjusts to the requirements of the radiological security norm, whereas the majority was replaced by linear accelerators. At the moment there are 86 of cobalt therapy units and 52 accelerators operating in our country, against 104 and 32 respectively, that operated in 1995. (author)

  13. Increasing FSW join strength by optimizing feed rate, rotating speed and pin angle

    Science.gov (United States)

    Darmadi, Djarot B.; Purnowidodo, Anindito; Siswanto, Eko

    2017-10-01

    Principally the join in Friction Stir Welding (FSW) is formed due to mechanical bonding. At least there are two factors determines the quality of this join, first is the temperature in the area around the interface and secondly the intense of mixing forces in nugget zone to create the mechanical bonding. The adequate temperature creates good flowability of the nugget zone and an intensive mixing force produces homogeneous strong bonding. Based on those two factors in this research the effects of feed rate, rotating speed and pin angle of the FSW process to the tensile strength of resulted join are studied. The true experimental method was used. Feed rate was varied at 24, 42, 55 and 74 mm/minutes and from the experimental results, it can be concluded that the higher feed rate decreases the tensile strength of weld join and it is believed due to the lower heat embedded in the material. Inversely, the higher rotating speed increases the join’s tensile strength as a result of higher heat embedded in base metal and higher mixing force in the nugget zone. The rotating speed were 1842, 2257 and 2904 RPMs. The pin angle determines the direction of mixing force. With variation of pin angle: 0°, 4°, 8° and 12° the higher pin angle generally increases the tensile strength because of more intensive mixing force. For 12° pin angle the lower tensile strength is found since the force tends to push out the nugget area from the joint gap.

  14. Risk assessment techniques for civil aviation security

    Energy Technology Data Exchange (ETDEWEB)

    Tamasi, Galileo, E-mail: g.tamasi@enac.rupa.i [Ente Nazionale per l' Aviazione Civile-Direzione Progetti, Studi e Ricerche, Via di Villa Ricotti, 42, 00161 Roma (Italy); Demichela, Micaela, E-mail: micaela.demichela@polito.i [SAfeR-Centro Studi su Sicurezza, Affidabilita e Rischi, Dipartimento di Scienza dei Materiali e Ingegneria Chimica, Politecnico di Torino, Corso Duca degli Abruzzi, 24, 10129 Torino (Italy)

    2011-08-15

    Following the 9/11 terrorists attacks in New York a strong economical effort was made to improve and adapt aviation security, both in infrastructures as in airplanes. National and international guidelines were promptly developed with the objective of creating a security management system able to supervise the identification of risks and the definition and optimization of control measures. Risk assessment techniques are thus crucial in the above process, since an incorrect risk identification and quantification can strongly affect both the security level as the investments needed to reach it. The paper proposes a set of methodologies to qualitatively and quantitatively assess the risk in the security of civil aviation and the risk assessment process based on the threats, criticality and vulnerabilities concepts, highlighting their correlation in determining the level of risk. RAMS techniques are applied to the airport security system in order to analyze the protection equipment for critical facilities located in air-side, allowing also the estimation of the importance of the security improving measures vs. their effectiveness.

  15. Risk assessment techniques for civil aviation security

    International Nuclear Information System (INIS)

    Tamasi, Galileo; Demichela, Micaela

    2011-01-01

    Following the 9/11 terrorists attacks in New York a strong economical effort was made to improve and adapt aviation security, both in infrastructures as in airplanes. National and international guidelines were promptly developed with the objective of creating a security management system able to supervise the identification of risks and the definition and optimization of control measures. Risk assessment techniques are thus crucial in the above process, since an incorrect risk identification and quantification can strongly affect both the security level as the investments needed to reach it. The paper proposes a set of methodologies to qualitatively and quantitatively assess the risk in the security of civil aviation and the risk assessment process based on the threats, criticality and vulnerabilities concepts, highlighting their correlation in determining the level of risk. RAMS techniques are applied to the airport security system in order to analyze the protection equipment for critical facilities located in air-side, allowing also the estimation of the importance of the security improving measures vs. their effectiveness.

  16. NOTICE OF ELECTRICAL CUT - TEST OF THE SECURED NETWORK

    CERN Multimedia

    Electrical Service ST/EL

    2001-01-01

    The electrical service ST/EL will test the switching sequence between the secured network and the diesel generators on January 8, 2002. The normal network, general services of the sites Meyrin, Prevessin, SPS, Zone Nord, LHC1 and LHC18 will be cut between 6:00am and 6:10am. The secured network will be resupplied by the diesel generators after approximately 1 minute. The UPS network will not be affected. To facilitate the restart of the electrical network and to minimize the impact of the tests on critical equipment, we would like to ask you to stop any equipment that might suffer major inconveniences during the tests (e.g. computers). For any further information, please do not hesitate to contact the Technical Control Room TCR (72201) or G. Cumer (160592).

  17. Dependence and power in healthcare equipment supply chains.

    Science.gov (United States)

    de Jong, Jurriaan L; Benton, W C

    2018-03-05

    Most healthcare organizations (HCOs) engage Group Purchasing Organizations (GPOs) as an outsourcing strategy to secure their supplies and materials. When an HCO outsources the procurement function to a GPO, this GPO will directly interact with the HCO's supplier on the HCO's behalf. This study investigates how an HCO's dependence on a GPO affects supply chain relationships and power in the healthcare medical equipment supply chain. Hypotheses are tested through factor analysis and structural equation modeling, using primary survey data from HCO procurement managers. An HCO's dependence on a GPO is found to be positively associated with a GPO's reliance on mediated power, but, surprisingly, negatively associated with a GPO's mediated power. Furthermore, analysis indicates that an HCO's dependence on a GPO is positively associated with an HCO's dependence on a GPO-contracted Original Equipment Manufacturer (OEM). HCO reliance on GPOs may lead to a buyer's dependence trap, where HCOs are increasingly dependent on GPOs and OEMs. Implications for HCO procurement managers and recommended steps for mitigation are offered. Power-dependence relationships in the medical equipment supply chain are not consistent with relationships in other, more traditional, supply chains. While dependence in a supply chain relationship typically leads to an increase in reliance on mediated power, GPO-dependent HCOs instead perceive a decrease in GPO mediated power. Furthermore, HCOs that rely on procurement service from GPOs are increasingly dependent on the OEMs.

  18. Development of Cyber Security Scheme for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Choi, Y. S.; Cho, J. W. (and others)

    2009-12-15

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures.

  19. Development of Cyber Security Scheme for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Choi, Y. S.; Cho, J. W.

    2009-12-01

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures

  20. Plan for radiological security at a university health center

    International Nuclear Information System (INIS)

    Huiaman Mendoza, G.M.; Sanchez Riojas, M.M.; Felix JImenez, D.

    1998-01-01

    This work shows a radiological security plan applied to a Basic Radiological Service at a university health center. Factors taken into account were installation designs, equipment operation parameters, work procedures, image system and responsibilities

  1. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    Energy Technology Data Exchange (ETDEWEB)

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  2. Joining of aluminum and stainless steel using AlSi10 brazing filler: Microstructure and mechanical properties

    Science.gov (United States)

    Fedorov, Vasilii; Uhlig, Thomas; Wagner, Guntram

    2017-07-01

    Joining of dissimilar materials like stainless steel and aluminum is of special interest for automotive applications. Due to the different properties of these materials, suitable joining techniques are required. Brazing offers the possibilities to manufacture high performance joints in one step and at low joining temperatures. However, these joints often need to withstand a high number of high cyclic loads during application. Therefore, in addition to the monotonic properties, the fatigue behavior of the produced joints must be considered and evaluated. In the present work, specimens are manufactured by induction brazing using an AlSi10 filler and a non-corrosive flux. The mechanical properties are determined by tensile shear tests as well as in fatigue tests at ambient and elevated temperatures. The microstructure of the brazed joints and the fracture surfaces of the tested samples are investigated by SEM.

  3. L-038: EPR-First Responders: Forces / safety equipment. Action Guides

    International Nuclear Information System (INIS)

    2011-01-01

    This conference is about the actions carry out by the forces and the safety equipment in a radiological emergency. The security area, the victims, the hospitals, the police vehicles area, the safety cordon, the evacuation, the contamination level and the risk of life are important aspects to be considered by the first responders.

  4. ALARA issues arising for safety and security of radiation sources and security screening devices - Summary and recommendations of the 12. European ALARA network workshop

    International Nuclear Information System (INIS)

    Shaw, P.; Crouail, P.; Drouet, F.

    2010-01-01

    The 12. European ALARA Network (EAN) workshop on 'ALARA issues arising for safety and security of radiation sources and security screening devices' took place in Vienna (Austria) in October 2009. The aim of that workshop was to consider how the implementation of ALARA3, in terms of planned and emergency situations, involving worker and public doses, is affected by the introduction of security-related measures. In the case of new equipment and procedures, there was also the question of whether exposures arising from security screening devices can be justified and optimised. This workshop consisted of invited oral presentations, which highlighted the main issues, and half of the programme was devoted to discussions within working groups on specific topics. During their discussions, the working groups identified recommendations dealing with the following topics: the implementation of the Code of Conduct and HASS4 - ensuring ALARA; balancing security and safety - how to achieve an optimum solution; the management of an emergency exposure situation from an ALARA perspective; the justification and optimisation of the use of security devices. The objective of this paper is to present the main conclusions and recommendations produced during the workshop. Individual presentations (papers and slides) as well as the reports from the working groups are available to download on the EAN web site (http://www.eu-alara.net). (authors)

  5. An Approach to Building Capacity for Nuclear Security and Safeguards in Thailand and the Southeast Asian Region

    International Nuclear Information System (INIS)

    Pengvanich, P.; Chanyotha, S.; Nilsuwankosit, S.

    2016-01-01

    Full text: A master’s degree programme in nuclear security and safeguards has been developed and offered at Chulalongkorn University for the first time in 2013 in order to develop necessary human resources in the fields of nuclear security and safeguards who can continue to work, conduct research, or serve as educators in these fields in Thailand and the Southeast Asian region. The first group of 20 students joined the programme in 2013 and recently graduated. The programme was one-of-its-kind, as there have not been many similar specialized programmes in nuclear security and safeguards in the past. In this paper, challenges and lessons learned throughout the programme are reported. Experience from the pilot programme will be used to improve the next round of the programme which is expected to start in 2017. With this program, more nuclear knowledge can be shared and maintained among the Association of South East Asian Nations (ASEAN) countries to ensure the peaceful utilization of nuclear technology in the region. (author

  6. Start up testing for the secure automated fabrication line

    International Nuclear Information System (INIS)

    Gerber, E.W.; Benson, E.M.; Dahl, R.E.

    1987-01-01

    The secure automated fabrication (SAF) line is a remotely operated, liquid metal reactor fuel fabrication process being built by Westinghouse Hanford Company for the Department of Energy. All process and control equipment is installed and start up testing has been initiated. Start up testing is comprised of five phases, each incorporating higher degrees of equipment integration, automation, and remote control. Testing methodology for SAF line start up is described in this report

  7. Biosynthesis of amidated joining peptide from pro-adrenocorticotropin-endorphin

    Energy Technology Data Exchange (ETDEWEB)

    Cullen, E.I.; Mains, R.E. (Johns Hopkins Univ. School of Medicine, Baltimore, MD (USA))

    1987-09-01

    Joining peptide is the major alpha-amidated product of pro-ACTH/endorphin (PAE) in AtT-20 corticotropic tumor cells. To study intracellular joining peptide synthesis, affinity purified antibodies directed against gamma-MSH, joining peptide, and ACTH were used to immunoprecipitate extracts from biosynthetically labeled AtT-20 cells. Immunoprecipitates were analyzed by sodium dodecyl sulfate-polyacrylamide gel electrophoresis and by tryptic peptide mapping on HPLC. In steady labeling experiments, radioactivity in amidated joining peptide (JP) increased roughly linearly with time, in the manner of a final product, whereas radioactivity associated with PAE (1-94)NH2 reached a constant value after 2-4 h, indicating that PAE(1-94)NH2 is an intermediate in the biosynthesis of JP. Radioactivity appeared in ACTH(1-39) well before JP, consistent with a cleavage order in which ACTH is cleaved from PAE(1-95) before JP sequences are cleaved from PAE(1-74). This conclusion was supported by tryptic peptide analyses of immunoprecipitates, which indicated that less than 5% of JP-related material is cleaved from PAE(1-74) before being cleaved from ACTH-related sequences. After a pulse label, radioactivity in PAE(1-94)NH2 reached a peak value after 1 h of chase and declined with a half-life of less than 1 h. Amidated JP increased to a constant level after 2 h of chase. Enough radiolabeled PAE(1-94)NH2 was detected to account for about half of the radioactivity found in amidated JP, indicating that about half of JP-related material is first cleaved from PAE(1-95) before being amidated. This result was corroborated using HPLC purification to determine both amidated and glycine-extended forms of JP.

  8. Biosynthesis of amidated joining peptide from pro-adrenocorticotropin-endorphin

    International Nuclear Information System (INIS)

    Cullen, E.I.; Mains, R.E.

    1987-01-01

    Joining peptide is the major alpha-amidated product of pro-ACTH/endorphin (PAE) in AtT-20 corticotropic tumor cells. To study intracellular joining peptide synthesis, affinity purified antibodies directed against gamma-MSH, joining peptide, and ACTH were used to immunoprecipitate extracts from biosynthetically labeled AtT-20 cells. Immunoprecipitates were analyzed by sodium dodecyl sulfate-polyacrylamide gel electrophoresis and by tryptic peptide mapping on HPLC. In steady labeling experiments, radioactivity in amidated joining peptide (JP) increased roughly linearly with time, in the manner of a final product, whereas radioactivity associated with PAE (1-94)NH2 reached a constant value after 2-4 h, indicating that PAE(1-94)NH2 is an intermediate in the biosynthesis of JP. Radioactivity appeared in ACTH(1-39) well before JP, consistent with a cleavage order in which ACTH is cleaved from PAE(1-95) before JP sequences are cleaved from PAE(1-74). This conclusion was supported by tryptic peptide analyses of immunoprecipitates, which indicated that less than 5% of JP-related material is cleaved from PAE(1-74) before being cleaved from ACTH-related sequences. After a pulse label, radioactivity in PAE(1-94)NH2 reached a peak value after 1 h of chase and declined with a half-life of less than 1 h. Amidated JP increased to a constant level after 2 h of chase. Enough radiolabeled PAE(1-94)NH2 was detected to account for about half of the radioactivity found in amidated JP, indicating that about half of JP-related material is first cleaved from PAE(1-95) before being amidated. This result was corroborated using HPLC purification to determine both amidated and glycine-extended forms of JP

  9. Joining dissimilar materials using Friction Stir scribe technique

    Energy Technology Data Exchange (ETDEWEB)

    Upadhyay, Piyush; Hovanski, Yuri; Jana, Saumyadeep; Fifield, Leonard S.

    2016-10-03

    The ability to effectively join materials with vastly different melting points like Aluminum-Steel, Polymer composites - metals has been one of the road blocks in realizing multi-material components for light weighting efforts. Friction stir scribe (FSS) technique is a promising method that produces continuous overlap joint between materials with vastly different melting regimes and high temperature flow characteristics. FSS uses an offset cutting tool at the tip of the FSW pin to create an insitu mechanical interlock between material interfaces. With investments from Vehicle Technology office, US DOE and several automotive manufacturers and suppliers PNNL is developing the FSS process and has demonstrated viability of joining several material combinations. Details of welding trails, unique challenges and mitigation strategies in different material combinations will be discussed. Joint characterization including mechanical tests and joint performances will also be presented.

  10. Analytical and experimental evaluation of joining silicon carbide to silicon carbide and silicon nitride to silicon nitride for advanced heat engine applications Phase 2. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Sundberg, G.J.; Vartabedian, A.M.; Wade, J.A.; White, C.S. [Norton Co., Northboro, MA (United States). Advanced Ceramics Div.

    1994-10-01

    The purpose of joining, Phase 2 was to develop joining technologies for HIP`ed Si{sub 3}N{sub 4} with 4wt% Y{sub 2}O{sub 3} (NCX-5101) and for a siliconized SiC (NT230) for various geometries including: butt joins, curved joins and shaft to disk joins. In addition, more extensive mechanical characterization of silicon nitride joins to enhance the predictive capabilities of the analytical/numerical models for structural components in advanced heat engines was provided. Mechanical evaluation were performed by: flexure strength at 22 C and 1,370 C, stress rupture at 1,370 C, high temperature creep, 22 C tensile testing and spin tests. While the silicon nitride joins were produced with sufficient integrity for many applications, the lower join strength would limit its use in the more severe structural applications. Thus, the silicon carbide join quality was deemed unsatisfactory to advance to more complex, curved geometries. The silicon carbide joining methods covered within this contract, although not entirely successful, have emphasized the need to focus future efforts upon ways to obtain a homogeneous, well sintered parent/join interface prior to siliconization. In conclusion, the improved definition of the silicon carbide joining problem obtained by efforts during this contract have provided avenues for future work that could successfully obtain heat engine quality joins.

  11. A Secure and Stable Multicast Overlay Network with Load Balancing for Scalable IPTV Services

    Directory of Open Access Journals (Sweden)

    Tsao-Ta Wei

    2012-01-01

    Full Text Available The emerging multimedia Internet application IPTV over P2P network preserves significant advantages in scalability. IPTV media content delivered in P2P networks over public Internet still preserves the issues of privacy and intellectual property rights. In this paper, we use SIP protocol to construct a secure application-layer multicast overlay network for IPTV, called SIPTVMON. SIPTVMON can secure all the IPTV media delivery paths against eavesdroppers via elliptic-curve Diffie-Hellman (ECDH key exchange on SIP signaling and AES encryption. Its load-balancing overlay tree is also optimized from peer heterogeneity and churn of peer joining and leaving to minimize both service degradation and latency. The performance results from large-scale simulations and experiments on different optimization criteria demonstrate SIPTVMON's cost effectiveness in quality of privacy protection, stability from user churn, and good perceptual quality of objective PSNR values for scalable IPTV services over Internet.

  12. High-temperature stability of laser-joined silicon carbide components

    Energy Technology Data Exchange (ETDEWEB)

    Herrmann, Marion, E-mail: marion.herrmann@tu-dresden.de; Lippmann, Wolfgang; Hurtado, Antonio

    2013-11-15

    Silicon carbide is recommended for applications in energy technology due to its good high-temperature corrosion resistance, mechanical durability, and abrasion resistance. The prerequisite for use is often the availability of suitable technologies for joining or sealing the components. A laser-induced process using fillers and local heating of the components represents a possible low-cost option. Investigations in which yttrium aluminosilicate glass was used for laser-induced brazing of SiC components of varying geometry are presented. A four-point bending strength of 112 MPa was found for these joints. In burst tests, laser-joined components were found to withstand internal pressures of up to 54 MPa. Helium leak tests yielded leak rates of less than 10{sup –8} mbar l s{sup −1}, even after 300 h at 900 °C. In contrast, the assemblies showed an increased leak rate after annealing at 1050 °C. The short process time of the laser technique – in the range of a few seconds to a few minutes – results in high temperature gradients and transients. SEM analysis showed that the filler in the seam predominantly solidifies in a glassy state. Crystallization occurred during later thermal loading of the joined components, with chemical equilibrium being established. Differences in seam structures yielded from different cooling rates in the laser process could not be equalized by annealing. The results demonstrated the long-term stability of laser-brazed SiC assemblies to temperatures in the range of glass transformation (900 °C) of the yttrium aluminosilicate filler. In technological investigations, the suitability of the laser joining technique for sealing of SiC components with a geometry approximating that of a fuel element sleeve pin (pin) in a gas-cooled fast reactor was proven.

  13. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-06-01

    The Southwest Surety Institute was formed in 1996 to create unique, science-based educational programs in security engineering. The programs will integrate business, technology, and criminal justice elements to educate a new generation of security professionals. Graduates of the programs will better understand basic security system design and evaluation and contribute to strengthening of the body of knowledge in the area of security. A systematic approach incorporating people, procedures, and equipment will be taught that will emphasize basic security principles and establish the science of security engineering. The use of performance measures in the analysis of designed systems will enable effective decisions by an enterprise and provide the rationale for investment in security systems. Along with educational programs, Institute members will conduct original research and development built on existing relationships with sponsors from government and industry in areas such as counterterroism, microelectronics, banking, aviation, and sensor development. Additional information and updates on the Southwest Surety Institute are available via the Institute home page at www.emrtc.nmt.edu/ssi.

  14. A New Approach to Joining Dissimilar Ceramic Oxides for Chemical Sensors

    International Nuclear Information System (INIS)

    Zhuiykov, Serge

    2009-01-01

    Conventional joining of dissimilar oxides for sensing electrodes (SE) of chemical sensors has been pivotal to the development of various sensors and is vital to their further development. However, it is shown that the uncertainty (of a fundamental nature) in the properties of dissimilar oxides in SE causes the determination of their sensing characteristics to be ambiguous. Characteristics are different for such controlled parameters as pyrolysis temperature, crystal structure, particle's morphology and size, chemical and phase composition, the coefficient of thermal expansion (CTE), surface architecture, the bulk and surface stoichiometry and type and conductivity of additives. Here, we provide an alternative approach for joining dissimilar metal-oxides for chemical sensors SE. The approach relies on the development of at least one transient liquid oxide phase on the ceramic-SE interface. These results constitute key points relevant to selection oxides for joining, sintering temperatures and heating/cooling temperature rates.

  15. Security scanning at 35 GHz

    Science.gov (United States)

    Anderton, Rupert N.; Appleby, Roger; Coward, Peter R.; Kent, P. J.; Price, Sean; Sinclair, Gordon N.; Wasley, Matthew R. M.

    2001-08-01

    It has been known for some time that millimeter waves can pas through clothing. In short range applications such as in the scanning of people for security purposes, operating at Ka band can be an advantage. The penetration through clothing is increased and the cost of the equipment when compared to operation at W band. In this paper a Ka band mechanically scanned imager designed for security scanning is discussed. This imager is based on the folded conical scan technology previously reported. It is constructed from low cost materials such as polystyrene and printed circuit board. The trade off between image spatial resolution and the number of receivers will be described and solutions, which minimize this number discussed.

  16. In-Network Processing of an Iceberg Join Query in Wireless Sensor Networks Based on 2-Way Fragment Semijoins

    Directory of Open Access Journals (Sweden)

    Hyunchul Kang

    2015-03-01

    Full Text Available We investigate the in-network processing of an iceberg join query in wireless sensor networks (WSNs. An iceberg join is a special type of join where only those joined tuples whose cardinality exceeds a certain threshold (called iceberg threshold are qualified for the result. Processing such a join involves the value matching for the join predicate as well as the checking of the cardinality constraint for the iceberg threshold. In the previous scheme, the value matching is carried out as the main task for filtering non-joinable tuples while the iceberg threshold is treated as an additional constraint. We take an alternative approach, meeting the cardinality constraint first and matching values next. In this approach, with a logical fragmentation of the join operand relations on the aggregate counts of the joining attribute values, the optimal sequence of 2-way fragment semijoins is generated, where each fragment semijoin employs a Bloom filter as a synopsis of the joining attribute values. This sequence filters non-joinable tuples in an energy-efficient way in WSNs. Through implementation and a set of detailed experiments, we show that our alternative approach considerably outperforms the previous one.

  17. In-Network Processing of an Iceberg Join Query in Wireless Sensor Networks Based on 2-Way Fragment Semijoins

    Science.gov (United States)

    Kang, Hyunchul

    2015-01-01

    We investigate the in-network processing of an iceberg join query in wireless sensor networks (WSNs). An iceberg join is a special type of join where only those joined tuples whose cardinality exceeds a certain threshold (called iceberg threshold) are qualified for the result. Processing such a join involves the value matching for the join predicate as well as the checking of the cardinality constraint for the iceberg threshold. In the previous scheme, the value matching is carried out as the main task for filtering non-joinable tuples while the iceberg threshold is treated as an additional constraint. We take an alternative approach, meeting the cardinality constraint first and matching values next. In this approach, with a logical fragmentation of the join operand relations on the aggregate counts of the joining attribute values, the optimal sequence of 2-way fragment semijoins is generated, where each fragment semijoin employs a Bloom filter as a synopsis of the joining attribute values. This sequence filters non-joinable tuples in an energy-efficient way in WSNs. Through implementation and a set of detailed experiments, we show that our alternative approach considerably outperforms the previous one. PMID:25774710

  18. Distinct DNA repair pathways involving RecA and nonhomologous end joining in Mycobacterium smegmatis.

    OpenAIRE

    Korycka-Machala, M; Brzostek, A; Rozalska, S; Rumijowska-Galewicz, A; Dziedzic, R; Bowater, R; Dziadek, J

    2006-01-01

    Mycobacterium smegmatis was used to study the relationship between DNA repair processes involving RecA and nonhomologous end joining (NHEJ). The effect of gene deletions in recA and/or in two genes involved in NHEJ (ku and ligD) was tested on the ability of bacteria to join breaks in plasmids transformed into them and in their response to chemicals that damage DNA. The results provide in vivo evidence that only NHEJ is required for the repair of noncompatible DNA ends. By contrast, the respon...

  19. Transweb and trafficking in illicit nuclear materials: beyond the borders of physical security

    International Nuclear Information System (INIS)

    Ballard, J.D.; Dilger, F.

    2005-01-01

    Full text: Transweb is a developing threat assessment analytical protocol that uses real time GIS based assessments (a.k.a., GTA for GIS Threat Assessment) to better understand potential trafficking in illicit nuclear materials that may come from energy related sites and/or weapons production facilities. This is not a physical security protocol nor is this program a border check format like the DOE's Second Line of Defense which is designed to detect special nuclear fuels. Transweb is a tool that allows the user to look at surreptitious transportation pathways that may be used to move illicit nuclear materials after they have already breached traditional physical security barriers and allows for movement prediction and potential mitigation/intervention if they are not traveling on the highways or railways, traversing the waterways, or entering ports equipped with detecting equipment like that deployed in Second Line of Defense program. Transweb is for the real world, a world where physical security may be breached and the smugglers that capture these materials do not follow the most traveled highways, railways, or waterways in a given society. Transweb focuses on the less obvious transportation routes that may be the most likely ways that illicit nuclear materials will be transported. Thus this program offers an additional layer of security analysis not currently in use as physical protection or as border mitigation. (author)

  20. Developments in welding and joining methods of metallic materials

    International Nuclear Information System (INIS)

    Pilarczyk, J.

    2007-01-01

    The impact of the welding technology on the economy development. The welding and joining methods review. The particular role of the laser welding and its interesting applications: with filler metal, twin spot laser welding, hybrid welding process, remote welding. The fiber lasers. The high intensity electron beams applications for surface modification. The TIG welding with the use of the active flux. Friction welding, friction stir welding and friction linear welding. (author)

  1. Lipofection and nucleofection of substrate plasmid can generate widely different readings of DNA end-joining efficiency in different cell lines.

    Science.gov (United States)

    Magin, Simon; Saha, Janapriya; Wang, Minli; Mladenova, Veronika; Coym, Nadine; Iliakis, George

    2013-02-01

    In vivo plasmid end-joining assays are valuable tools for dissecting important qualitative and quantitative aspects of non-homologous end-joining (NHEJ)--a key mechanism for the repair of DNA double-strand breaks (DSBs) in higher eukaryotes. They enable the use of defined DNA ends as substrates for end-joining and the analysis by sequencing of the resulting junctions to identify the repair pathways engaged. Yet, plasmid assays have generated divergent results of end-joining capacity in the same DSB repair mutants when used under different conditions, which implies contributions from undefined and therefore uncontrolled parameters. To help standardize these assays, we searched for parameters underpinning these variations and identified transfection method as an important determinant. Here, we compare a lipid-based transfection method, lipofection, with an electroporation method, nucleofection, and find large, unanticipated and cell line-dependent differences in percent end-joining without recognizable trends. For example, in rodent cells, transfection using lipofection gives nearly WT end-joining in DNA-PKcs mutants and only mildly inhibited end-joining in Lig4 and Ku mutants. In contrast, transfection using nucleofection shows marked end-joining inhibition in all NHEJ mutants tested as compared to the WT. In human HCT116 cells, end-joining after nucleofection is strongly suppressed even in the WT and the differences to the mutants are small. After lipofection, in contrast, end-joining is high in WT cells and markedly suppressed in the mutants. We conclude that better understanding and control of the physicochemical/biological and analytical parameters underpinning these differences will be required to generate with plasmid assays results with quantitative power comparable to that of well-established methods of DSB analysis such as pulsed-field gel electrophoresis or γ-H2AX foci scoring. Until then, caution is needed in the interpretation of the results obtained

  2. Nuclear security - New challenge to the safety of nuclear power plants

    International Nuclear Information System (INIS)

    Li Ganjie

    2008-01-01

    The safety of nuclear power plants involves two aspects: one is to prevent nuclear accidents resulted from systems and equipments failure or human errors; the other is to refrain nuclear accidents from external intended attack. From this point of view, nuclear security is an organic part of the nuclear safety of power plants since they have basically the same goals and concrete measures with each other. In order to prevent malicious attacks; the concept of physical protection of nuclear facilities has been put forward. In many years, a series of codes and regulations as well as technical standard systems on physical protection had been developed at international level. The United Nations passed No. 1540 resolution as well as 'Convention on the Suppression of Acts of Nuclear terrorism', and revised 'Convention on Physical Protection of Nuclear Materials', which has enhanced a higher level capacity of preparedness by international community to deal with security issues of nuclear facilities. In China, in order to improve the capability of nuclear power plants on preventing and suppressing the external attacks, the Chinese government consecutively developed the related codes and standards as well as technical documents based on the existing laws and regulations, including 'Guide for the Nuclear Security of Nuclear Power Plants' and 'Guide for the Physical Protection of Nuclear Materials', so as to upgrade the legislative requirements for nuclear security in power plants. The government also made greater efforts to support the scientific research and staff training on physical protection, and satisfying the physical protection standards for newly-built nuclear facilities such as large scale nuclear power plants to meet requirement at international level. At the same time old facilities were renovated and the Chinese government established a nuclear emergency preparedness coordination mechanism, developed corresponding emergency preparedness plans, intensified the

  3. 77 FR 71607 - Mobile Offshore Drilling Unit (MODU) Electrical Equipment Certification Guidance

    Science.gov (United States)

    2012-12-03

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0839] Mobile Offshore Drilling... hazardous areas on foreign-flagged Mobile Offshore Drilling Units (MODUs) that have never operated, but... International Maritime Organization (IMO) Code for the Construction and Equipment of Mobile Offshore Drilling...

  4. Nuclear Security in Action at Facilities in Ghana

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    Nuclear security is a national responsibility. An Integrated Nuclear Security Support Plan (INSSP) is a tool that enables States to address nuclear security in a comprehensive way and to strengthen its national nuclear security regime, beginning with the legislative and regulatory framework within a State. Operating areas in nuclear facilities like research reactors which use highly enriched uranium, require additional physical protection measures to ensure the security of the nuclear material and prevent acts of sabotage. Other radioactive materials, like sealed radioactive sources used in radiotherapy machines in hospitals for cancer treatment, need to be protected so that they are not stolen and used with malicious intent. Nuclear and other radioactive material needs to be kept in safe and secure storage, which incorporates various types of physical barriers to prevent theft and unauthorized access. Intrusion detection and assessment systems, like cameras and sensors, help to ensure timely and adequate responses to any security incident. Responding to a nuclear security incident, and mitigating its consequences, requires specialized equipment like isotope identifiers, and competent and well trained personnel. Nuclear Security Support Centres (NSSCs) focus on human resource development as well as technical and scientific support which contribute to the sustainability of nuclear security in a State

  5. Coincident In Vitro Analysis of DNA-PK-Dependent and -Independent Nonhomologous End Joining

    Directory of Open Access Journals (Sweden)

    Cynthia L. Hendrickson

    2010-01-01

    Full Text Available In mammalian cells, DNA double-strand breaks (DSBs are primarily repaired by nonhomologous end joining (NHEJ. The current model suggests that the Ku 70/80 heterodimer binds to DSB ends and recruits DNA-PKcs to form the active DNA-dependent protein kinase, DNA-PK. Subsequently, XRCC4, DNA ligase IV, XLF and most likely, other unidentified components participate in the final DSB ligation step. Therefore, DNA-PK plays a key role in NHEJ due to its structural and regulatory functions that mediate DSB end joining. However, recent studies show that additional DNA-PK-independent NHEJ pathways also exist. Unfortunately, the presence of DNA-PKcs appears to inhibit DNA-PK-independent NHEJ, and in vitro analysis of DNA-PK-independent NHEJ in the presence of the DNA-PKcs protein remains problematic. We have developed an in vitro assay that is preferentially active for DNA-PK-independent DSB repair based solely on its reaction conditions, facilitating coincident differential biochemical analysis of the two pathways. The results indicate the biochemically distinct nature of the end-joining mechanisms represented by the DNA-PK-dependent and -independent NHEJ assays as well as functional differences between the two pathways.

  6. Joining of Tungsten Armor Using Functional Gradients

    International Nuclear Information System (INIS)

    John Scott O'Dell

    2006-01-01

    The joining of low thermal expansion armor materials such as tungsten to high thermal expansion heat sink materials has been a major problem in plasma facing component (PFC) development. Conventional planar bonding techniques have been unable to withstand the high thermal induced stresses resulting from fabrication and high heat flux testing. During this investigation, innovative functional gradient joints produced using vacuum plasma spray forming techniques have been developed for joining tungsten armor to copper alloy heat sinks. A model was developed to select the optimum gradient architecture. Based on the modeling effort, a 2mm copper rich gradient was selected. Vacuum plasma pray parameters and procedures were then developed to produce the functional gradient joint. Using these techniques, dual cooling channel, medium scale mockups (32mm wide x 400mm length) were produced with vacuum plasma spray formed tungsten armor. The thickness of the tungsten armor was up to 5mm thick. No evidence of debonding at the interface between the heat sink and the vacuum plasma sprayed material was observed.

  7. Equipment Sustainment Data in Standard Army Management Information Systems: Needs, Gaps, and Opportunities

    Science.gov (United States)

    2012-01-01

    DRMO Defense Reutilization and Marketing Service DS Direct Support ECR Equipment Control Record ERP Enterprise Resource Planning ESA Enterprise...and content. The Global Combat Support System-Army (GCSS-A) is an automated logistics system that uses the SAP Defense Forces and Public Security...DFPS) software platform to provide Enterprise Resource Planning ( ERP ). It is designed to integrate tactical logistics data and functions as related

  8. Joining Silicon Carbide Components for Space Propulsion, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — This SBIR Phase I program will identify the joining materials and demonstrate the processes that are suited for construction of advanced ceramic matrix composite...

  9. Fabrication and characterization of joined silicon carbide cylindrical components for nuclear applications

    Science.gov (United States)

    Khalifa, H. E.; Deck, C. P.; Gutierrez, O.; Jacobsen, G. M.; Back, C. A.

    2015-02-01

    The use of silicon carbide (SiC) composites as structural materials in nuclear applications necessitates the development of a viable joining method. One critical application for nuclear-grade joining is the sealing of fuel within a cylindrical cladding. This paper demonstrates cylindrical joint feasibility using a low activation nuclear-grade joint material comprised entirely of β-SiC. While many papers have considered joining material, this paper takes into consideration the joint geometry and component form factor, as well as the material performance. Work focused specifically on characterizing the strength and permeability performance of joints between cylindrical SiC-SiC composites and monolithic SiC endplugs. The effects of environment and neutron irradiation were not evaluated in this study. Joint test specimens of different geometries were evaluated in their as-fabricated state, as well as after being subjected to thermal cycling and partial mechanical loading. A butted scarf geometry supplied the best combination of high strength and low permeability. A leak rate performance of 2 × 10-9 mbar l s-1 was maintained after thermal cycling and partial mechanical loading and sustained applied force of 3.4 kN, or an apparent strength of 77 MPa. This work shows that a cylindrical SiC-SiC composite tube sealed with a butted scarf endplug provides out-of-pile strength and permeability performance that meets light water reactor design requirements.

  10. Contribution to the joining technique of SiC-ceramic using metallic interlayers

    International Nuclear Information System (INIS)

    Gottselig, B.; Gyarmati, E.; Naoumidis, A.; Nickel, H.

    1989-07-01

    For ceramics to be feasible for technical uses suitable joining techniques must be developed that allow reliable ceramic-ceramic and ceramic-metal connections. As yet such procedures exist, based only on empirical studies omitting the reaction behaviour of the joining materials and the specific properties of the reaction products. For this reason the reaction behaviour of silicon carbide with selected metals and subsequently the compatibility of these reaction layers with the ceramic substrate were investigated. The results gained were then applied to silicon carbide joints using intermediate metallic layers. With the reaction phase Ti 3 SiC 2 , found to be the most suitable in basic experiments, joining strengths could be obtained relative tc the mean strength and Weibull modulus comparable to those of the ceramic starting material. (orig.) [de

  11. Combustion Joining for Composite Fabrication

    Science.gov (United States)

    2009-10-25

    Inert preheating Process beginning T e m p e r a t u r e , o C Time, s I = 600 Amps D = 10 mm Joule preheating only up to Tig UNCLASSIFIED • C...Honeywell Corp (South Bend, IN) • Currently build aircraft brake disks from carbon fibers • use a long (~ 100 day) CVD process to densify • Brake wear...oxidation with every landing A380 -rejected take off test C-C brakes UNCLASSIFIED Joining C-Based Materials • Difficult task – Carbon cannot be welded

  12. 9 CFR 590.502 - Equipment and utensils; PCB-containing equipment.

    Science.gov (United States)

    2010-01-01

    ... Sanitary Standards and accepted practices currently in effect for such equipment. (c) New or replacement equipment or machinery (including any replacement parts) brought onto the premises of any official plant... equipment and machinery, and any replacement parts for such equipment and machinery. Totally enclosed...

  13. Cyber security risk evaluation of a nuclear I and C using BN and ET

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jin Soo; Heo, Gyun Young [Dept. of Nuclear Engineering, Kyung Hee University, Yongin (Korea, Republic of); Son, Han Seong [Computer and Game Science, Joongbu University, Geumsan (Korea, Republic of)

    2017-04-15

    Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

  14. Cyber security risk evaluation of a nuclear I and C using BN and ET

    International Nuclear Information System (INIS)

    Shin, Jin Soo; Heo, Gyun Young; Son, Han Seong

    2017-01-01

    Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks

  15. Process Control Systems in the Chemical Industry: Safety vs. Security

    Energy Technology Data Exchange (ETDEWEB)

    Jeffrey Hahn; Thomas Anderson

    2005-04-01

    Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nation’s critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

  16. Report: EPA’s National Security Information Program Could Be Improved

    Science.gov (United States)

    Report #12-P-0543, June 18, 2012. Under its classified NSI program, EPA has assigned responsibilities and provided guidance, training, and oversight. EPA program offices provide secure equipment and space, following NSI program specifications.

  17. DSCu/SS joining techniques development and testing

    International Nuclear Information System (INIS)

    Sato, Satoshi; Hatano, Toshihisa; Furuya, Kazuyuki; Kuroda, Toshimasa; Enoeda, Mikio; Takatsu, Hideyuki

    1998-01-01

    Joining techniques of alumina dispersion strengthened copper alloy (DSCu) and type 316L stainless steel (SS) has been investigated aiming at applying to the fabrication of the ITER first wall/blanket. As the joining method, Hot Isostatic Pressing (HIP) of solid plates and/or blocks has been pursued. By a screening test including HIP temperatures of 980-1050degC, it was concluded that the HIP temperature of 1050degC would be optimum for the simultaneous HIPping of DSCu/DSCu, DSCu/SS and SS/SS. With DSCu/SS joint specimens HIPped at 1050degC, tensile, impact, fatigue, crack propagation, and fracture toughness tests were performed as well as mechanical test of structural model with one SS circular tube embedded. Typically, the properties of the joints were almost the same as those of DSCu or SS base metal with the same heat treatment of the HIP process, thus good joints were obtained, though parts of properties were decreased at elevated test temperature. Typical results of the mechanical test of structural mode indicated that a crack initiated at the inner surface of the SS tube under cyclic operation, and the lifetime of the first wall structure could be evaluated by existing SS fatigue data. Two HIPped first wall panel mock-ups were successfully fabricated with built-in coolant tubes: one was 300 mm long and the other 800 mm long. The former was thermo-mechanically tested with high heat fluxes corresponding to the ITER operation conditions. The mock-up showed good heat removal performance during the high heat flux tests. In addition, there were no cracks and delaminations found at HIPped interfaces by microscopic observation after all tests. Ultrasonic testing have been tried as a non-destructive examination method, and detectable defect size at SS/SS, DSCu/DSCu and DSCu/SS joint interfaces were estimated. (author)

  18. e-Commerce security – A life cycle approach

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    hardware components are needed to provide the required support structure: database ... based systems there exists a time delay due to the requirement of human ..... insight to system implementation or equipment configuration. ... requirements of the e-commerce organization by the corresponding security policy and the.

  19. Concepts and applications of wireless security systems for tactical, portable, and fixed sites

    International Nuclear Information System (INIS)

    Harrington, J.J.

    1997-01-01

    Intrusion detection systems sometimes use radio signals to convey sensor status in areas that wire conduits do not service or as a redundant path to wired systems. Some applications benefit from radio technology by minimizing setup time and reducing installation and operation costs. In recent years with the explosion in wireless communications, these radio-based security systems have become more capable while lowering costs, size, and power consumption. However, the very nature of radio communication raises issues regarding setup, operation, and security of these systems. Sandia National Laboratories, in cooperation with government and industry, has addressed many of these issues through the analysis and development of security systems, communications protocols, and operational procedures. Message encryption and frequent channel supervision are used to enhance security. Installation and maintenance of these systems are simplified by incorporating built-in radio link analysis, menu-driven configuration equipment, and other techniques. Commercial communications satellites and spread-spectrum radios are also being integrated to provide unique capabilities to the security community. The status of this work is presented here along with details of its development

  20. Effect of material flow on joint strength in activation spot joining of Al alloy and steel sheets

    International Nuclear Information System (INIS)

    Watanabe, Goro; Yogo, Yasuhiro; Takao, Hisaaki

    2014-01-01

    A new joining method for dissimilar metal sheets was developed where a rotated consumable rod of Al alloy is pressed onto an Al alloy sheet at the part overlapped with a mild steel sheet. The metal flow in the joining region is increased by the through-hole in the Al sheet and consumable Al rod. The rod creates the joint interface and pads out of the thinly joined parts through pressing. This produces a higher joint strength than that of conventional friction stir spot welding. Measurements of the joint interface showed the presence of a 5-10 nm thick amorphous layer consisting of Al and Mg oxides

  1. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.

    Science.gov (United States)

    Khan, Muhammad Khurram; Alghathbar, Khaled

    2010-01-01

    User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.

  2. Joining technology development summary, 189a OH024

    International Nuclear Information System (INIS)

    Edmonds, D.P.

    1978-01-01

    Joining technology is discussed for Breeder Reactor technology including welding development and mechanical properties of weldments for austenitic stainless steels, high-temperature structural design data for austenitic stainless steel weldments and advanced transition joints is discussed. Technology developed in this program is briefly reviewed

  3. Design, manufacture and installation of measuring and control equipments for the advanced thermal prototype reactor 'Fugen'

    International Nuclear Information System (INIS)

    Hirota, Shigeo; Kawabata, Yoshinori

    1979-01-01

    The advanced thermal prototype reactor ''Fugen'' attained the criticality on March 20, 1978, and 100% output operation on November 13, 1978. On March 20, 1979, it passed the final inspection, and since then, it has continued the smooth operation up to now. The measuring and control equipments are provided for grasping the operational conditions of the plant and operating it safely and efficiently. At the time of designing, manufacturing and installing the measuring and control equipments for Fugen, it was required to clarify the requirements of the plant design, to secure the sufficient functions, and to improve the operational process, maintainability and the reliability and accuracy of the equipments. Many design guidelines and criteria were decided in order to coordinate the conditions among five manufacturers and give the unified state as one plant. The outline of the instrumentations for neutrons, radiation monitoring and process data, the control systems for reactivity, reactor output, pressure and water supply, the safety protection system, and the process computer are described. Finally, the installations and tests of the measuring and control equipments are explained. The aseismatic capability of the equipments was confirmed. (Kako, I.)

  4. International Conference SES 2006. Secure Energy Supply

    International Nuclear Information System (INIS)

    2006-01-01

    The International Conference SES 2006 (Secure Energy Supply, Bezpecna dodavka energie) was realised in Bratislava, during September 26 - 29, 2006 in the hotel Crowne Plaza and deals with most important problems of world and Slovak energetics. In work of Conference took part 108 slovak and 33 foreign participant from 11 countries of the world. Negotiations were realised in five sessions. First two days were devoted to lectures and second two days were visits of selected slovak energetic equipment. On the Conference has resounded matter of fact, that secure energy supply is extremely important subject for economy, but also for population

  5. Abolishing the Security Dilemma: Why we need to integrate the militaries

    Directory of Open Access Journals (Sweden)

    Anna Cornelia Beyer

    2018-01-01

    Full Text Available This article argues that the Security Dilemma can in fact be abolished by integrating the militaries into one common global organisation, possibly under one common command. The existence and workings of North Atlantic Treaty Organization (NATO are an approximate example of this ideal in a geographically limited space. For illustrating this argument, this article discusses the logic of the Prisoners Dilemma, as the intellectual model underlying the Security Dilemma, and proposes an alternative version of the Prisoners Dilemma. It is then argued that the Security Dilemma only persists in a politically and economically ever farther integrated world because the international militaries are not integrated and hence partial anarchy persists at least in the military realm. The solution to remaining international conflicts, such as arguably one between NATO and Russia recently, would be to expand NATO to include “threatening” states’ militaries until all militaries are joined in a global organisation, a truly global NATO. Finally, revised non-violent functions for NATO, as well as a global welfare state and an early warning system for civil wars, are proposed and discussed.

  6. Joining of Aluminium Alloy and Steel by Laser Assisted Reactive Wetting

    Science.gov (United States)

    Liedl, Gerhard; Vázquez, Rodrigo Gómez; Murzin, Serguei P.

    2018-03-01

    Compounds of dissimilar materials, like aluminium and steel offer an interesting opportunity for the automotive industry to reduce the weight of a car body. Thermal joining of aluminium and steel leads to the formation of brittle intermetallic compounds, which negatively affects the properties of the welded joint. Amongst others, growth of such intermetallic compounds depends on maximum temperature and on the time at certain temperatures. Laser welding with its narrow well seam and its fast heating and cooling cycles provides an excellent opportunity to obtain an ultrathin diffusion zone. Joining of sheet metal DC01 with aluminium alloy AW6016 has been chosen for research. The performed experimental studies showed that by a variation of the beam power and scanning speed it is possible to obtain an ultrathin diffusion zone with narrow intermetallic interlayers. With the aim of supporting further investigation of laser welding of the respective and other dissimilar pairings a multi-physical simulation model has been developed.

  7. Bad Luck When Joining the Shortest Queue

    NARCIS (Netherlands)

    Blanc, J.P.C.

    2008-01-01

    A frequent observation in service systems with queues in parallel is that customers in other queues tend to be served faster than those in one’s own queue. This paper quantifies the probability that one’s service would have started earlier if one had joined another queue than the queue that was

  8. Alternative electro-chemically based processing routes for joining of plasma facing components

    Energy Technology Data Exchange (ETDEWEB)

    Krauss, Wolfgang, E-mail: wolfgang.krauss@kit.edu [Karlsruhe Institute of Technology (KIT), Institute for Materials Research III, Hermann-von-Helmholtz-Platz 1 76344 Eggenstein-Leopoldshafen (Germany); Lorenz, Julia; Holstein, Nils; Konys, Juergen [Karlsruhe Institute of Technology (KIT), Institute for Materials Research III, Hermann-von-Helmholtz-Platz 1 76344 Eggenstein-Leopoldshafen (Germany)

    2011-10-15

    Tungsten is considered in fusion technology as functional and structural material in the area of blanket and divertor for future application in DEMO. The KIT design of a He-cooled divertor includes joints between W and W-alloys as well as of W with Eurofer-steel. The main challenges range from expansion mismatch problem for tungsten/steel joints over metallurgical reactions with brittle phase formation to crack stopping ability and excellent surface wetting. These requirements were only met partly and insufficiently in the past e.g. by direct Cu-casting of tungsten onto steel. Both, the joining needs and the observed failure scenarios of conventionally joined components initiated the development of improved joining technologies based on electro-chemical processing routes. As electrolytes aqueous and aprotic, water free, system are integrated into this development line. In the first step principle requirements are presented to guarantee a reproducible and adherent deposition of scales based on Ni and Cu acting as inter layers and filler, respectively, to generate a real metallurgical bonding as demonstrate by 1100 deg. C joining tests. The development field aprotic systems based on ionic liquids is discussed with respect to enable development of refractory metal based fillers with focus high temperature W-W brazing.

  9. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  10. COMPETITIVENESS ОF CHINESE ECONOMY AFTER JOINING WORLD TRADE ORGANIZATION

    Directory of Open Access Journals (Sweden)

    V. S. Shlik

    2008-01-01

    Full Text Available The paper contains analysis of the China’s membership in the World Trade Organization (WTO. The advantages and disadvantages of WTO joining and also prospects and unforeseen difficulties are given in the paper. The People’s Republic of China has already been a full-member of WTO for 6 years. The Chinese Government has mainly fulfilled all the conditions which were imposed for WTO joining. They concerned customs legislation that presupposed a considerable reduction of custom duties, an access to the service market for foreign investors, an increase of responsibility for violation of intellectual property rights. Many of these conditions have been fulfilled in advance.

  11. Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    2018-01-19

    The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection. Data Available through the TSDC: Maintained by the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) in partnership with the U.S. Department of Transportation (DOT), the TSDC houses data from travel surveys and studies conducted using global positioning system (GPS) devices. It features millions of data points - second-by-second GPS readings, vehicle characteristics (if applicable), and demographics - for all modes of travel. NREL screens the initial data for quality control, translates each data set into a consistent format, and interprets the data for spatial analysis. NREL's processing routines add information on vehicle fuel economy and road grades and join data points to the road network.

  12. Joining and fabrication techniques for high temperature structures including the first wall in fusion reactor

    International Nuclear Information System (INIS)

    Lee, Ho Jin; Lee, B. S.; Kim, K. B.

    2003-09-01

    The materials for PFC's (Plasma Facing Components) in a fusion reactor are severely irradiated with fusion products in facing the high temperature plasma during the operation. The refractory materials can be maintained their excellent properties in severe operating condition by lowering surface temperature by bonding them to the high thermal conducting materials of heat sink. Hence, the joining and bonding techniques between dissimilar materials is considered to be important in case of the fusion reactor or nuclear reactor which is operated at high temperature. The first wall in the fusion reactor is heated to approximately 1000 .deg. C and irradiated severely by the plasma. In ITER, beryllium is expected as the primary armour candidate for the PFC's; other candidates including W, Mo, SiC, B4C, C/C and Si 3 N 4 . Since the heat affected zones in the PFC's processed by conventional welding are reported to have embrittlement and degradation in the sever operation condition, both brazing and diffusion bonding are being considered as prime candidates for the joining technique. In this report, both the materials including ceramics and the fabrication techniques including joining technique between dissimilar materials for PFC's are described. The described joining technique between the refractory materials and the dissimilar materials may be applicable for the fusion reactor and Generation-4 future nuclear reactor which are operated at high temperature and high irradiation

  13. Technical obstacles to nuclear security - Russian perspective

    International Nuclear Information System (INIS)

    Pshakin, G.

    2005-01-01

    Full text: Present political, economical and social development the world - wide and in particular countries and regions facilitate number of serious and dangerous challenges for people responsible for security of materials and facilities, which could be used as a threat to the humankind in case of unauthorized approach. A number of factors have impact on the security including political, social, financial and technical nature. The security of nuclear materials and facilities where nuclear materials located and under processing is facing a number of problems such as control of the personnel who is handling the materials, access to the materials and the facilities, accounting and control of the materials storage, transportation, transactions, processing, physical protection of the materials. Each aspect of those problems must be taken into account for establishing most efficient way to keep the nuclear materials out of hands of the terrorists. Technical aspects which require serious and intent relation from political and technical communities in Russia (as example) are the following: legal base for nuclear materials protection, control and accounting and export control; personnel for nuclear materials control and accounting - skill, reliability, responsibility, training and new generation education; personnel for physical protection - skill, reliability, responsibility, training; structure of the system and equipment for materials control, verification, accountability; structure of the system and equipment for physical protection; regulatory supervision of the MPC+A system effectiveness. (author)

  14. A review of the US joining technologies for plasma facing components in the ITER fusion reactor

    International Nuclear Information System (INIS)

    Odegard, B.C. Jr.; Cadden, C.H.; Watson, R.D.; Slattery, K.T.

    1998-02-01

    This paper is a review of the current joining technologies for plasma facing components in the US for the International Thermonuclear Experimental Reactor (ITER) project. Many facilities are involved in this project. Many unique and innovative joining techniques are being considered in the quest to join two candidate armor plate materials (beryllium and tungsten) to a copper base alloy heat sink (CuNiBe, OD copper, CuCrZr). These techniques include brazing and diffusion bonding, compliant layers at the bond interface, and the use of diffusion barrier coatings and diffusion enhancing coatings at the bond interfaces. The development and status of these joining techniques will be detailed in this report

  15. SPCC- Software Elements for Security Partition Communication Controller

    Science.gov (United States)

    Herpel, H. J.; Willig, G.; Montano, G.; Tverdyshev, S.; Eckstein, K.; Schoen, M.

    2016-08-01

    Future satellite missions like Earth Observation, Telecommunication or any other kind are likely to be exposed to various threats aiming at exploiting vulnerabilities of the involved systems and communications. Moreover, the growing complexity of systems coupled with more ambitious types of operational scenarios imply increased security vulnerabilities in the future. In the paper we will describe an architecture and software elements to ensure high level of security on-board a spacecraft. First the threats to the Security Partition Communication Controller (SPCC) will be addressed including the identification of specific vulnerabilities to the SPCC. Furthermore, appropriate security objectives and security requirements are identified to be counter the identified threats. The security evaluation of the SPCC will be done in accordance to the Common Criteria (CC). The Software Elements for SPCC has been implemented on flight representative hardware which consists of two major elements: the I/O board and the SPCC board. The SPCC board provides the interfaces with ground while the I/O board interfaces with typical spacecraft equipment busses. Both boards are physically interconnected by a high speed spacewire (SpW) link.

  16. Women's Heart Disease: Join the Heart Truth Community

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Join The Heart Truth Community Past Issues / Winter 2014 Table of Contents National Symbol The centerpiece of The Heart Truth ® is The Red Dress ® which was introduced ...

  17. Processing of pro-opiomelanocortin-derived amidated joining peptide and glycine-extended precursor in monkey pituitary

    DEFF Research Database (Denmark)

    Fenger, M

    1991-01-01

    The molecular forms of proopiomelanocortin (POMC) derived amidated and C-terminal glycine-extended joining peptide from monkey (Macaca mulatta) pituitary were determined. The predominant forms of joining peptide found were the low molecular peptides POMC(76-105) and POMC(76-106), respectively...... sequence of monkey and human POMC extremely conserved, but also the processing patterns are similar. The monkey therefore serves as a suitable model for studying regulation of the processing of POMC and the hypothalamus-pituitary-adrenal axis in man....

  18. Cyber security for greater service reliability

    Energy Technology Data Exchange (ETDEWEB)

    Vickery, P. [N-Dimension Solutions Inc., Richmond Hill, ON (Canada)

    2008-05-15

    Service reliability in the electricity transmission and distribution (T and D) industry is being challenged by increased equipment failures, harsher climatic conditions, and computer hackers who aim to disrupt services by gaining access to transmission and distribution resources. This article discussed methods of ensuring the cyber-security of T and D operators. Weak points in the T and D industry include remote terminal units; intelligent electronic devices; distributed control systems; programmable logic controllers; and various intelligent field devices. An increasing number of interconnection points exist between an operator's service control system and external systems. The North American Electric Reliability Council (NERC) standards specify that cyber security strategies should ensure that all cyber assets are protected, and that access points must be monitored to detect intrusion attempts. The introduction of new advanced metering initiatives must also be considered. Comprehensive monitoring systems should be available to support compliance with cyber security standards. It was concluded that senior management should commit to a periodic cyber security re-assessment program in order to keep up-to-date.

  19. Distinct DNA repair pathways involving RecA and nonhomologous end joining in Mycobacterium smegmatis.

    Science.gov (United States)

    Korycka-Machala, Malgorzata; Brzostek, Anna; Rozalska, Sylwia; Rumijowska-Galewicz, Anna; Dziedzic, Renata; Bowater, Richard; Dziadek, Jaroslaw

    2006-05-01

    Mycobacterium smegmatis was used to study the relationship between DNA repair processes involving RecA and nonhomologous end joining (NHEJ). The effect of gene deletions in recA and/or in two genes involved in NHEJ (ku and ligD) was tested on the ability of bacteria to join breaks in plasmids transformed into them and in their response to chemicals that damage DNA. The results provide in vivo evidence that only NHEJ is required for the repair of noncompatible DNA ends. By contrast, the response of mycobacteria to mitomycin C preferentially involved a RecA-dependent pathway.

  20. Load Balancing Issues with Constructing Phylogenetic Trees using Neighbour-Joining Algorithm

    International Nuclear Information System (INIS)

    Al Mamun, S M

    2012-01-01

    Phylogenetic tree construction is one of the most important and interesting problems in bioinformatics. Constructing an efficient phylogenetic tree has always been a research issue. It needs to consider both the correctness and the speed of the tree construction. In this paper, we implemented the neighbour-joining algorithm, using Message Passing Interface (MPI) for constructing the phylogenetic tree. Performance is efficacious, comparing to the best sequential algorithm. From this paper, it would be clear to the researchers that how load balance can make a great effect for constructing phylogenetic trees using neighbour-joining algorithm.

  1. Implantable Medical Devices; Networking Security Survey

    Directory of Open Access Journals (Sweden)

    Siamak Aram

    2016-08-01

    Full Text Available The industry of implantable medical devices (IMDs is constantly evolving, which is dictated by the pressing need to comprehensively address new challenges in the healthcare field. Accordingly, IMDs are becoming more and more sophisticated. Not long ago, the range of IMDs’ technical capacities was expanded, making it possible to establish Internet connection in case of necessity and/or emergency situation for the patient. At the same time, while the web connectivity of today’s implantable devices is rather advanced, the issue of equipping the IMDs with sufficiently strong security system remains unresolved. In fact, IMDs have relatively weak security mechanisms which render them vulnerable to cyber-attacks that compromise the quality of IMDs’ functionalities. This study revolves around the security deficiencies inherent to three types of sensor-based medical devices; biosensors, insulin pump systems and implantable cardioverter defibrillators. Manufacturers of these devices should take into consideration that security and effectiveness of the functionality of implants is highly dependent on the design. In this paper, we present a comprehensive study of IMDs’ architecture and specifically investigate their vulnerabilities at networking interface.

  2. Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World

    Directory of Open Access Journals (Sweden)

    Jong Hyuk Park

    2016-10-01

    Full Text Available Long Term Evolution (LTE and Long Term Evolution-Advanced (LTE-A support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI and Radio Network Temporary Identities (RNTI are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME. The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards.

  3. On Secure Workflow Decentralisation on the Internet

    Directory of Open Access Journals (Sweden)

    Petteri Kaskenpalo

    2010-06-01

    Full Text Available Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach, and consider, from the perspective of available security building blocks, how security can be implemented and what new opportunities are presented when empowering the decentralised environment with modern distributed security protocols. Our research is motivated by a more general question of how to combine the positive enablers that email exchange enjoys, with the general benefits of workflow systems, and more specifically with the benefits that can be introduced in a decentralised environment. This aims to equip email users with a set of tools to manage the semantics of a message exchange, contents, participants and their roles in the exchange in an environment that provides inherent assurances of security and privacy. This work is based on a survey of contemporary distributed security protocols, and considers how these protocols could be used in implementing a distributed workflow management system with decentralised control . We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow, data, and resource patterns in a distributed workflow environment.

  4. People's Republic of China joins ITER

    International Nuclear Information System (INIS)

    Huo Yuping

    2003-01-01

    The People's Republic of China is the largest developing country with a projected population of 1.6 - 2 billion people and an energy consumption growing from the current 1.3 Billion Tons Coal Equivalent (TCE) to more than 4 Billion TCE by 2050. This large demand needs to be accommodated in a sustainable way, requiring energy generation in an environmentally friendly way. Fusion is one of the most promising candidates to solve this important issue. This explains why in the second half of 2002, the ITER Participants' delegations to the ITER Negotiations received expression of interest from the People's Republic of China in the possibility of Chinese participation in ITER, including joining the ongoing Negotiations. The speed with which the Chinese authorities had made their decision to participate in the ITER Negotiations was impressive. The Prime Minister and the State Council had already confirmed their decision to apply to join ITER as soon as possible, and Mr. Xu Guanhua, Chinese Minister of Science and Technology, wrote on behalf of his government, on 10 January 2003, to the four heads of delegation in the ITER Negotiations, requesting that China participate in the present ITER Negotiations, pointing out that China intends to provide a substantial contribution to the Project, comparable to what is currently envisaged by some of the participants in the present Negotiations

  5. Basic security measures for IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Oscar P. Sarmiento

    2008-05-01

    Full Text Available This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnera-bilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educational simulation tool written in C++ Builder for facilitating the unders-tanding of this protocol at academic level. Two practical cases of wireless security configurations using Cisco net-working equipment are also presented: configuring and enabling WPA-Personal and WPA2-Personal (these being security options used by TKIP and AES, respectively.

  6. Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

    Directory of Open Access Journals (Sweden)

    Jinsoo Shin

    2017-04-01

    Full Text Available Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

  7. Borated stainless steel joining technology. Final report

    International Nuclear Information System (INIS)

    Smith, R.J.

    1994-12-01

    EPRI had continued investigating the application of borated stainless steel products within the US commercial nuclear power industry through participation in a wide range of activities. This effort provides the documentation of the data obtained in the development of the ASTM-A887 Specification preparation effort conducted by Applied Science and Technology and the most recent efforts for the development of joining technologies conducted under a joint effort by EPRI, Carpenter Technologies and Sandia National Laboratory under a US DOE CRADA program. The data presented in this report provides the basis for the ASTM specification which has been previously unpublished by EPRI and the data generated in support of the Joining Technology research effort conducted at Sandia. The results of the Sandia research, although terminated prior to the completion, confirms earlier data that the degradation of material properties in fusion welded borated stainless steels occurs in the heat affected zone of the weld area and not in the base material. The data obtained also supports the conclusion that the degradation of material properties can be overcome by post weld heat treatment which can result in material properties near the original unwelded metal

  8. Governing Bodies That Consider Joining or Creating Federations

    Science.gov (United States)

    Howarth, Eleanor

    2015-01-01

    This article reports the findings of a research study exploring what motivates governing bodies to consider joining or creating a federation, their experiences of the process and the barriers faced. The research methodology involved semi-structured telephone interviews, face-to-face interviews and analysis of relevant documentation. The varied…

  9. Joining Forces: The Case of Alliant International University

    Science.gov (United States)

    Leslie, Heather

    2013-01-01

    Mergers and acquisitions are a prevalent force in higher education as more colleges and universities are joining forces to expand resources, enhance missions, or prevent closures. This study examines the merger of Alliant University (formerly California School of Professional Psychology) with United States International University to create what…

  10. Testbed diversity as a fundamental principle for effective ICS security research

    OpenAIRE

    Green, Benjamin; Frey, Sylvain Andre Francis; Rashid, Awais; Hutchison, David

    2016-01-01

    The implementation of diversity in testbeds is essential to understanding and improving the security and resilience of Industrial Control Systems (ICS). Employing a wide spec- trum of equipment, diverse networks, and business processes, as deployed in real-life infrastructures, is particularly diffi- cult in experimental conditions. However, this level of di- versity is key from a security perspective, as attackers can exploit system particularities and process intricacies to their advantage....

  11. The Mechanism of Solid State Joining THA with AlMg3Mn Alloy

    Directory of Open Access Journals (Sweden)

    Kaczorowski M.

    2014-06-01

    Full Text Available The results of experimental study of solid state joining of tungsten heavy alloy (THA with AlMg3Mn alloy are presented. The aim of these investigations was to study the mechanism of joining two extremely different materials used for military applications. The continuous rotary friction welding method was used in the experiment. The parameters of friction welding process i.e. friction load and friction time in whole studies were changed in the range 10 to 30kN and 0,5 to 10s respectively while forging load and time were constant and equals 50kN and 5s. The results presented here concerns only a small part whole studies which were described elsewhere. These are focused on the mechanism of joining which can be adhesive or diffusion controlled. The experiment included macro- and microstructure observations which were supplemented with SEM investigations. The goal of the last one was to reveal the character of fracture surface after tensile test and to looking for anticipated diffusion of aluminum into THA matrix. The results showed that joining of THA with AlMg2Mn alloy has mainly adhesive character, although the diffusion cannot be excluded.

  12. The development of joining doped graphite to copper for first wall application in HT-7 tokamak

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Zhangjian, E-mail: zhouzhj@mater.ustb.edu.cn [School of Materials Science and Engineering, University of Science and Technology Beijing, Beijing 100083 (China); Zhong Zhihong [School of Materials Science and Engineering, University of Science and Technology Beijing, Beijing 100083 (China); Chen Junling [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui 230031 (China); Ge Changchun [School of Materials Science and Engineering, University of Science and Technology Beijing, Beijing 100083 (China)

    2010-12-15

    Two joining methods have been developed for joining carbon based plasma facing material to copper based heat sink material for the potential application in HT-7 and EAST tokamak. The first joining method is based on brazing technique by using a rapidly solidified foil-type Ti-Zr based amorphous filler with a melting temperature of 850 deg. C. The other joining method is direct active metal casting-casting the premixed powders of copper and active transition metals on the mechanical machined carbon surface directly. SEM observations demonstrate high quality of joining surface for both joints. The brazing technique is more promising for fabrication joint with larger size compared with the direct active alloy casting method. High heat flux test using an e-beam device was performed on the actively cooled C/Cu joint fabricated by brazing method. There has no damage occurred on the joint after heat loading at 6 MW/m{sup 2}.

  13. Designing and implementing the logical security framework for e-commerce based on service oriented architecture

    OpenAIRE

    Luhach, Ashish Kr.; Dwivedi, Sanjay K; Jha, C K

    2014-01-01

    Rapid evolution of information technology has contributed to the evolution of more sophisticated E- commerce system with the better transaction time and protection. The currently used E-commerce models lack in quality properties such as logical security because of their poor designing and to face the highly equipped and trained intruders. This editorial proposed a security framework for small and medium sized E-commerce, based on service oriented architecture and gives an analysis of the emin...

  14. Analytical and Experimental Evaluation of Joining Silicon Carbide to Silicon Carbide and Silicon Nitride to Silicon Nitride for Advanced Heat Engine Applications Phase II

    Energy Technology Data Exchange (ETDEWEB)

    Sundberg, G.J.

    1994-01-01

    Techniques were developed to produce reliable silicon nitride to silicon nitride (NCX-5101) curved joins which were used to manufacture spin test specimens as a proof of concept to simulate parts such as a simple rotor. Specimens were machined from the curved joins to measure the following properties of the join interlayer: tensile strength, shear strength, 22 C flexure strength and 1370 C flexure strength. In parallel, extensive silicon nitride tensile creep evaluation of planar butt joins provided a sufficient data base to develop models with accurate predictive capability for different geometries. Analytical models applied satisfactorily to the silicon nitride joins were Norton's Law for creep strain, a modified Norton's Law internal variable model and the Monkman-Grant relationship for failure modeling. The Theta Projection method was less successful. Attempts were also made to develop planar butt joins of siliconized silicon carbide (NT230).

  15. Servitization in a Security Business: Changing the Logic of Value Creation

    Directory of Open Access Journals (Sweden)

    Arto Rajala

    2013-08-01

    Full Text Available How can a firm change its value-creation logic from providing technology to selling technology-based services? This is a question many security companies face today when trying to apply a solutions-based business model in response to recent macro- and microeconomic trends. The fact that customers increasingly demand security as a service, rather than technical equipment, challenges the basis of a security firm's value provision and alters the logic of its operation. In this article, we investigate a technology- and product-oriented security business that is now rapidly transforming into a service business. We use data from a case study to propose a 4C model (conceptualization, calculation, communication, and co-creation of value that can help security providers to objectify their service offerings and succeed in the servitization of their security businesses.

  16. What then do we do about computer security?

    Energy Technology Data Exchange (ETDEWEB)

    Suppona, Roger A.; Mayo, Jackson R.; Davis, Christopher Edward; Berg, Michael J.; Wyss, Gregory Dane

    2012-01-01

    This report presents the answers that an informal and unfunded group at SNL provided for questions concerning computer security posed by Jim Gosler, Sandia Fellow (00002). The primary purpose of this report is to record our current answers; hopefully those answers will turn out to be answers indeed. The group was formed in November 2010. In November 2010 Jim Gosler, Sandia Fellow, asked several of us several pointed questions about computer security metrics. Never mind that some of the best minds in the field have been trying to crack this nut without success for decades. Jim asked Campbell to lead an informal and unfunded group to answer the questions. With time Jim invited several more Sandians to join in. We met a number of times both with Jim and without him. At Jim's direction we contacted a number of people outside Sandia who Jim thought could help. For example, we interacted with IBM's T.J. Watson Research Center and held a one-day, videoconference workshop with them on the questions.

  17. Joining and fabrication techniques for high temperature structures including the first wall in fusion reactor

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Ho Jin; Lee, B. S.; Kim, K. B

    2003-09-01

    The materials for PFC's (Plasma Facing Components) in a fusion reactor are severely irradiated with fusion products in facing the high temperature plasma during the operation. The refractory materials can be maintained their excellent properties in severe operating condition by lowering surface temperature by bonding them to the high thermal conducting materials of heat sink. Hence, the joining and bonding techniques between dissimilar materials is considered to be important in case of the fusion reactor or nuclear reactor which is operated at high temperature. The first wall in the fusion reactor is heated to approximately 1000 .deg. C and irradiated severely by the plasma. In ITER, beryllium is expected as the primary armour candidate for the PFC's; other candidates including W, Mo, SiC, B4C, C/C and Si{sub 3}N{sub 4}. Since the heat affected zones in the PFC's processed by conventional welding are reported to have embrittlement and degradation in the sever operation condition, both brazing and diffusion bonding are being considered as prime candidates for the joining technique. In this report, both the materials including ceramics and the fabrication techniques including joining technique between dissimilar materials for PFC's are described. The described joining technique between the refractory materials and the dissimilar materials may be applicable for the fusion reactor and Generation-4 future nuclear reactor which are operated at high temperature and high irradiation.

  18. DNA double-strand break response factors influence end-joining features of IgH class switch and general translocation junctions.

    Science.gov (United States)

    Panchakshari, Rohit A; Zhang, Xuefei; Kumar, Vipul; Du, Zhou; Wei, Pei-Chi; Kao, Jennifer; Dong, Junchao; Alt, Frederick W

    2018-01-23

    Ig heavy chain (IgH) class switch recombination (CSR) in B lymphocytes switches IgH constant regions to change antibody functions. CSR is initiated by DNA double-strand breaks (DSBs) within a donor IgH switch (S) region and a downstream acceptor S region. CSR is completed by fusing donor and acceptor S region DSB ends by classical nonhomologous end-joining (C-NHEJ) and, in its absence, by alternative end-joining that is more biased to use longer junctional microhomologies (MHs). Deficiency for DSB response (DSBR) factors, including ataxia telangiectasia-mutated (ATM) and 53BP1, variably impair CSR end-joining, with 53BP1 deficiency having the greatest impact. However, studies of potential impact of DSBR factor deficiencies on MH-mediated CSR end-joining have been technically limited. We now use a robust DSB joining assay to elucidate impacts of deficiencies for DSBR factors on CSR and chromosomal translocation junctions in primary mouse B cells and CH12F3 B-lymphoma cells. Compared with wild-type, CSR and c-myc to S region translocation junctions in the absence of 53BP1, and, to a lesser extent, other DSBR factors, have increased MH utilization; indeed, 53BP1-deficient MH profiles resemble those associated with C-NHEJ deficiency. However, translocation junctions between c-myc DSB and general DSBs genome-wide are not MH-biased in ATM-deficient versus wild-type CH12F3 cells and are less biased in 53BP1- and C-NHEJ-deficient cells than CSR junctions or c-myc to S region translocation junctions. We discuss potential roles of DSBR factors in suppressing increased MH-mediated DSB end-joining and features of S regions that may render their DSBs prone to MH-biased end-joining in the absence of DSBR factors.

  19. 33 CFR 106.215 - Company or OCS facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... a TWIC, and must have knowledge, through training or equivalent job experience, in the following, as... security equipment and systems; (i) Inspection, control, and monitoring techniques; (j) Methods of physical...

  20. Joining of Ni-TiC FGM and Ni-Al Intermetallics by Centrifugal Combustion Synthesis

    International Nuclear Information System (INIS)

    Ohmi, Tatsuya; Matsuura, Kiyotaka; Iguchi, Manabu; Mizuma, Kiminori

    2008-01-01

    A centrifugal combustion synthesis (CCS) process has been investigated to join a Ni-Al intermetallic compound and a Ni-TiC cermet. The cermet, a tubular graphite mold, and a green compact of reactants consisting of Al, Ni and NiO were set in a centrifugal caster. When the combustion synthesis reaction was induced in the centrifugal force field, a synthesized molten Ni-Al alloy flowed into the graphite mold and joined to the cermet. The soundness of the joint interface depended on the volume percentage of TiC phase in the cermet. A lot of defects were formed near the interface between the Ni-TiC cermet and the cast Ni-Al alloy when the volume percentage of TiC was 50% or higher. For this kind of cermet system, using a functionally graded cermet such as Ni-10 vol.%TiC/Ni-25 vol.%TiC/Ni-50 vol.%TiC overcame this difficulty. The four-point bending strength of the joined specimen consisting of the three-layered FGM cermet and cast Ni-29 mol%Al alloy was 1010 MPa which is close to the result for a Ni-29 mol%Al alloy specimen

  1. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    Full text: Nuclear terrorism has been a great threat against the safety and security of the world. It has been reached the consensus by international community to strengthen the nuclear security regime to protect the nuclear and other radiological materials and related facilities. Protection of the security of nuclear and other radiological materials in use, storage and transport and related facilities is always a important issue faced by each country and it depends on the technologies, funds and human resources can be utilized. As nuclear technology has been widely used in different area, China competent authorities have issued a series of regulations, implementation rules and guidelines on security of nuclear and radioactive materials and related facilities. China supports and has taken an active part in the international efforts to strengthen the international nuclear security regime to combat nuclear terrorism. China has paid great importance on international cooperations on nuclear security with IAEA and other countries. More than 10 various national workshops and training courses on nuclear security and physical protection were delivered per year, which provided a communication platform for Chinese facility operators and managers to know the international technology-development and share the research achievements. In cooperation with the IAEA, China has held a great number of regional and national training courses on physical protection and nuclear security since 1998. Different types of training, such as training on awareness, Design Basis Threat (DBT), physical security system design, equipments operation and vulnerability analysis, benefited the administrators, facility operators, engineers and technical staff in charge of physical security system design, operation and maintenance from China and regional countries. Under the framework of the bilateral agreement on Peaceful Use of Nuclear Technology (PUNT), China and U.S. jointly conducted a Technical Demo

  2. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’

    Directory of Open Access Journals (Sweden)

    Muhammad Khurram Khan

    2010-03-01

    Full Text Available User authentication in wireless sensor networks (WSN is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.

  3. Secure firmware updates for point of sale terminals

    CSIR Research Space (South Africa)

    Tsague, HD

    2015-03-01

    Full Text Available of the equipment. In particular, there is an important cost related to the deployment of new software upgrades for the point of sale terminals, since in most cases human intervention is required. In this paper, we present a lightweight protocol for secure firmware...

  4. Understanding the spark plasma sintering from the view of materials joining

    International Nuclear Information System (INIS)

    Dong, Peng; Wang, Zhe; Wang, Wenxian; Chen, Shaoping; Zhou, Jun

    2016-01-01

    Spark plasma sintering (SPS) is an attractive consolidation process. However, the mechanism behind this process is still an open topic for debate. This paper presents the first attempt to understand the SPS mechanism from perspective of materials joining. For this, TiNi_f/Al composites were fabricated by SPS, and the interfacial microstructures were investigated using field emission scanning electron microscopy and transmission electron microscopy. According to the experimental results, several joining processes were reflected well during SPS, involving micro-arc welding, electric resistance welding and diffusion welding. The proposed understanding of SPS will be helpful to the control of sintering quality.

  5. Trainer module for security control center operations

    International Nuclear Information System (INIS)

    Bernard, E.A.

    1982-01-01

    An operator trainer module has been developed to be used with the security control center equipment to be installed as part of a safeguards physical protection system. The module is designed to provide improved training and testing capabilities for control center operators through the use of simulations for perimeter equipment operations. Operators, through the trainer module, can be challenged with a variety of realistic situations which require responsive action identical to that needed in an actual system. This permits a consistent evaluation and confirmation of operator capabilities prior to assignment as an operator and allows for periodic retesting to verify that adequate performance levels are maintained

  6. Requirement for XLF/Cernunnos in alignment-based gap filling by DNA polymerases ? and ? for nonhomologous end joining in human whole-cell extracts

    OpenAIRE

    Akopiants, Konstantin; Zhou, Rui-Zhe; Mohapatra, Susovan; Valerie, Kristoffer; Lees-Miller, Susan P.; Lee, Kyung-Jong; Chen, David J.; Revy, Patrick; de Villartay, Jean-Pierre; Povirk, Lawrence F.

    2009-01-01

    XLF/Cernunnos is a core protein of the nonhomologous end-joining pathway of DNA double-strand break repair. To better define the role of Cernunnos in end joining, whole-cell extracts were prepared from Cernunnos-deficient human cells. These extracts effected little joining of DNA ends with cohesive 5? or 3? overhangs, and no joining at all of partially complementary 3? overhangs that required gap filling prior to ligation. Assays in which gap-filled but unligated intermediates were trapped us...

  7. Integrating QoS and security functions in an IP-VPN gateway

    Science.gov (United States)

    Fan, Kuo-Pao; Chang, Shu-Hsin; Lin, Kuan-Ming; Pen, Mau-Jy

    2001-10-01

    IP-based Virtual Private Network becomes more and more popular. It can not only reduce the enterprise communication cost but also increase the revenue of the service provider. The common IP-VPN application types include Intranet VPN, Extranet VPN, and remote access VPN. For the large IP-VPN market, some vendors develop dedicated IP-VPN devices; while some vendors add the VPN functions into their existing network equipment such as router, access gateway, etc. The functions in the IP-VPN device include security, QoS, and management. The common security functions supported are IPSec (IP Security), IKE (Internet Key Exchange), and Firewall. The QoS functions include bandwidth control and packet scheduling. In the management component, policy-based network management is under standardization in IETF. In this paper, we discuss issues on how to integrate the QoS and security functions in an IP-VPN Gateway. We propose three approaches to do this. They are (1) perform Qos first (2) perform IPSec first and (3) reserve fixed bandwidth for IPSec. We also compare the advantages and disadvantages of the three proposed approaches.

  8. The security of medical and industrial radioactive sources

    International Nuclear Information System (INIS)

    Bielefeld, Tom; Fischer, Helmut W.

    2008-01-01

    Recent foiled and successful terrorist plots in Europe and the US (including two cases in the UK and Germany which included plans to design radiological dispersal devices in 2004 and 2005), clearly demonstrate that domestic or locally acting terrorist cells have become an important part of the terrorist threat picture. The uncovered 'dirty bomb'-plots involved radioactive material of type or quantity that would not have caused much damage. Still, these observations underscore the necessity to revisit the issue of radioactive sources security in countries which may become the target of a radiological attack. This includes in particular countries in Europe, many of which in the past relied on sophisticated - but safety centred - regulations and functioning oversight institutions. In a pilot study, we have developed plausible attack scenarios involving medical and industrial sources used in Germany. Special emphasis was put on how such sources could be obtained by a locally acting terrorist group using criminal tactics and non-specialized equipment only. To this end, sources storage and handling as well as daily work procedures in hospitals and companies have been analysed to find weak points which could be discovered and exploited by terrorist groups. Publicly available technical information has been used to assess under which circumstances terrorists could obtain various types of sources or whole instruments. Calculations have been performed to estimate the radiation burden to a person handling these sources with improvised equipment. Our study shows that, even in a country with already high regulatory standards, hospitals and industrial facilities still need to introduce improvements to sources security. We therefore discuss and propose a number of affordable security upgrades. Many of our findings in Germany apply to other western countries as well. Hence, we call for a change of mentality of users and manufacturers to take into account not only the safety but

  9. Meet and Join Matrices in the Poset of Exponential Divisors

    Indian Academy of Sciences (India)

    ... exponential divisor ( G C E D ) and the least common exponential multiple ( L C E M ) do not always exist. In this paper we embed this poset in a lattice. As an application we study the G C E D and L C E M matrices, analogues of G C D and L C M matrices, which are both special cases of meet and join matrices on lattices.

  10. A Perspective on Equipment Design for Fusion Remote Handling

    International Nuclear Information System (INIS)

    Mills, S.; Haist, B.; Hamilton, D.

    2006-01-01

    basis. To foresee and therefore prevent equipment failure technologies such as online condition monitoring and self-diagnosis will be essential. The economics of future fusion projects will demand that commercial off-the-shelf equipment be used in the remote handling system wherever possible and that the integration and support of the systems are as simple as possible. The modularization and standardisation of components and software is therefore essential. The paper will discuss possible methods for addressing these needs of the preparation, maintenance and support of remote operations. If ignored, this aspect has significant potential to inflate costs and reduce operational effectiveness. The paper will also discuss innovations and developments which have the potential for improving some of the key technologies required for fusion machines such as in pipe joining techniques and actuator developments. (author)

  11. Fluid Mechanics and Homeland Security

    Science.gov (United States)

    Settles, Gary S.

    2006-01-01

    Homeland security involves many applications of fluid mechanics and offers many opportunities for research and development. This review explores a wide selection of fluids topics in counterterrorism and suggests future directions. Broad topics range from preparedness and deterrence of impending terrorist attacks to detection, response, and recovery. Specific topics include aircraft hardening, blast mitigation, sensors and sampling, explosive detection, microfluidics and labs-on-a-chip, chemical plume dispersal in urban settings, and building ventilation. Also discussed are vapor plumes and standoff detection, nonlethal weapons, airborne disease spread, personal protective equipment, and decontamination. Involvement in these applications requires fluid dynamicists to think across the traditional boundaries of the field and to work with related disciplines, especially chemistry, biology, aerosol science, and atmospheric science.

  12. An Agile Enterprise Regulation Architecture for Health Information Security Management

    Science.gov (United States)

    Chen, Ying-Pei; Hsieh, Sung-Huai; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie

    2010-01-01

    Abstract Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital. PMID:20815748

  13. An agile enterprise regulation architecture for health information security management.

    Science.gov (United States)

    Chen, Ying-Pei; Hsieh, Sung-Huai; Cheng, Po-Hsun; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie

    2010-09-01

    Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital.

  14. Characterization of joining sites of a viral histone H4 on host insect chromosomes.

    Directory of Open Access Journals (Sweden)

    Sunil Kumar

    Full Text Available A viral histone H4 (CpBV-H4 is encoded in a polydnavirus, Cotesia plutellae bracovirus (CpBV. It plays a crucial role in parasitism of an endoparasitoid wasp, C. plutellae, against diamondback moth, Plutella xylostella, by altering host gene expression in an epigenetic mode by its N-terminal tail after joining host nucleosomes. Comparative transcriptomic analysis between parasitized and nonparasitized P. xylostella by RNA-Seq indicated that 1,858 genes were altered at more than two folds in expression levels at late parasitic stage, including 877 up-regulated genes and 981 down-regulated genes. Among parasitic factors altering host gene expression, CpBV-H4 alone explained 16.3% of these expressional changes. To characterize the joining sites of CpBV-H4 on host chromosomes, ChIP-Seq (chromatin immunoprecipitation followed by deep sequencing was applied to chromatins extracted from parasitized larvae. It identified specific 538 ChIP targets. Joining sites were rich (60.2% in AT sequence. Almost 40% of ChIP targets included short nucleotide repeat sequences presumably recognizable by transcriptional factors and chromatin remodeling factors. To further validate these CpBV-H4 targets, CpBV-H4 was transiently expressed in nonparasitized host at late larval stage and subjected to ChIP-Seq. Two kinds of ChIP-Seqs shared 51 core joining sites. Common targets were close (within 1 kb to genes regulated at expression levels by CpBV-H4. However, other host genes not close to CpBV-H4 joining sites were also regulated by CpBV-H4. These results indicate that CpBV-H4 joins specific chromatin regions of P. xylostella and controls about one sixth of the total host genes that were regulated by C. plutellae parasitism in an epigenetic mode.

  15. Secure and documented screwing down of Castor containers

    International Nuclear Information System (INIS)

    Yilmaz, Asir; Junkers, Patrick

    2011-01-01

    The castor container is sealed using a multiple lid system comprising a primary lid and a secondary lid. The two lids are positioned one above the other and screwed securely to the body of the container. In addition, the tightness of the lids is guaranteed by a special metal seal. A further steel plate is screwed securely over the lids providing additional protection for the lids from moisture and various influences. The central element connecting the lids to the container comprises fixed threaded connections which must be accurately tightened with a torque of 900 Nm, 1500 Nm or more. The basic function of a threaded connection, in terms of a positive fit and detachable joint, is to join together two or more parts in such a way that they always behave as a single part whatever operational forces are present. This can only be achieved by means of an accurate and sufficient pre-tensioning force. This pretensioning force is transferred to the threaded connection with the help of a particular torque and presses the components together. This loading brought about by the pretensioning force is referred to as the prestress. In order to create a correct and high quality connection, this prestress must be arrived at in an optimum manner. The prestress must therefore be high enough to withstand the full loading for which the connection is designed. In addition the connection should not come loose unintentionally if it is exposed to externally acting forces. Since under no circumstances should threaded connections on a castor container fail, a suitable screwing process must guarantee that this does not happen. The securing of threaded joints can only be ensured by introducing and maintaining a constant and accurate prestress. VDI Guideline 2230, Part 1, mentions various threaded connection or tightening processes, including torque-controlled tightening, angle-controlled tightening and yield-controlled tightening. (orig.)

  16. Secure and documented screwing down of Castor containers

    Energy Technology Data Exchange (ETDEWEB)

    Yilmaz, Asir; Junkers, Patrick [HYTORC - Barbarino und Kilp GmbH, Krailling (Germany)

    2011-07-01

    The castor container is sealed using a multiple lid system comprising a primary lid and a secondary lid. The two lids are positioned one above the other and screwed securely to the body of the container. In addition, the tightness of the lids is guaranteed by a special metal seal. A further steel plate is screwed securely over the lids providing additional protection for the lids from moisture and various influences. The central element connecting the lids to the container comprises fixed threaded connections which must be accurately tightened with a torque of 900 Nm, 1500 Nm or more. The basic function of a threaded connection, in terms of a positive fit and detachable joint, is to join together two or more parts in such a way that they always behave as a single part whatever operational forces are present. This can only be achieved by means of an accurate and sufficient pre-tensioning force. This pretensioning force is transferred to the threaded connection with the help of a particular torque and presses the components together. This loading brought about by the pretensioning force is referred to as the prestress. In order to create a correct and high quality connection, this prestress must be arrived at in an optimum manner. The prestress must therefore be high enough to withstand the full loading for which the connection is designed. In addition the connection should not come loose unintentionally if it is exposed to externally acting forces. Since under no circumstances should threaded connections on a castor container fail, a suitable screwing process must guarantee that this does not happen. The securing of threaded joints can only be ensured by introducing and maintaining a constant and accurate prestress. VDI Guideline 2230, Part 1, mentions various threaded connection or tightening processes, including torque-controlled tightening, angle-controlled tightening and yield-controlled tightening. (orig.)

  17. 46 CFR 31.40-10 - Cargo Ship Safety Equipment Certificate-T/ALL.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Cargo Ship Safety Equipment Certificate-T/ALL. 31.40-10 Section 31.40-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS INSPECTION AND CERTIFICATION Certificates Under International Convention for Safety of Life at Sea, 1974 § 31.40-10 Cargo Ship...

  18. Laser beam joining of non-oxidic ceramics for ultra high temperature resistant joints

    International Nuclear Information System (INIS)

    Lippmann, W.; Knorr, J.; Wolf, R.; Reinecke, A.M.; Rasper, R.

    2004-01-01

    The excellent technical properties of silicon carbide (SiC) and silicon nitride (Si 3 N 4 ) ceramics, such as resistance to extreme temperatures, oxidation, mechanical wear, aggressive chemical substances and radioactive radiation and also its high thermal conductivity and good temperature-shock resistance, make these ceramics ideally suited for use in the field of nuclear technology. However, their practical use has been limited so far because of the unavailability of effective joining techniques for these ceramics, especially for high temperature applications. A new joining technology (CERALINK registered ) has been developed in a network project which allowed high temperature resistant and vacuum-tight joining of SiC or Si 3 N 4 ceramics. A power laser is used as heat source, which makes it possible to join ceramic components in free atmosphere in combination with a pure oxidic braze filler. As no furnace is necessary, there are no limitations on the component dimensions by the furnace-geometry. During the joining process, the heated area can be limited to the seam area so that this technology can also be used to encapsulate materials with a low melting point. The seam has a high mechanical strength, it is resistant to a wide range of chemicals and radiation and it is also vacuum-tight. The temperature resistance can be varied by variation of the braze filler composition - usually between 1,400 C and >1,600 C. Beside the optimum filler it is also important to select the suitable laser wavelength. The paper will demonstrate the influence of different wave lengths, i. e. various laser types, on the seam quality. Examples are chosen to illustrate the strengths and limitations of the new technology

  19. Influence of pulse electromagnetic fields on electronic equipment and systems in smart buildings

    Directory of Open Access Journals (Sweden)

    Jacek Paś

    2016-07-01

    Full Text Available The article presents information about the impact of electromagnetic fields’ impulses on technical infrastructure of electronic equipment and systems in intelligent buildings. The use of modern technical solutions in intelligent building management, i.e., human resources control and automation systems, efficient building space management, requires a large number of integrated electronic systems. Impulse interference, lightning or electricity as natural phenomena are among the most responsible for the occurrence of interference in buses, transmission lines systems, electrical installations, equipment and electronic systems used in intelligent buildings. To a large extent, it is associated with catastrophic damages that may occur in electronic devices or in completed systems such as intelligent building, e.g. ICT, security, etc. under the influence of induced voltages and interfering signals’ currents. Keywords: noise, static electricity, lightning

  20. Joining-Splitting Interaction of Noncritical String

    Science.gov (United States)

    Hadasz, Leszek; Jaskólski, Zbigniew

    The joining-splitting interaction of noncritical bosonic string is analyzed in the light-cone formulation. The Mandelstam method of constructing tree string amplitudes is extended to the bosonic massive string models of the discrete series. The general properties of the Liouville longitudinal excitations which are necessary and sufficient for the Lorentz covariance of the light-cone amplitudes are derived. The results suggest that the covariant and the light-cone approach are equivalent also in the noncritical dimensions. Some aspects of unitarity of interacting noncritical massive string theory are discussed.

  1. Equipment for measuring torque and diagnostic data on control rod drive of nuclear reactor

    International Nuclear Information System (INIS)

    Simka, K.; Sneberger, J.; Tater, V.

    1991-01-01

    The equipment comprises an electric drive, a measuring unit and a device securing the movable parts of the drive. It can be used to measure the torque and diagnostic data of the control facility drive with the desired accuracy without having to dismantle the facility during decoupling or coupling the control component to the drive, during programming the movable parts in the transporting position. (Z.S.). 1 fig

  2. Joining SiC/SiC composites for fusion applications

    International Nuclear Information System (INIS)

    Henager, C.J.

    2007-01-01

    Full text of publication follows: The use of SiC-reinforced composites for fusion reactors or other nuclear applications will likely require some form of joining in order to form large structural or functional sections. Joints must be able to allow load transfer to the composite material so that the fiber reinforcements are able to carry their designed loads and the joint should not fail in a brittle manner. In addition, joints must be tolerant of radiation damage similar to the composite material to maintain the structural integrity of the joined section. Other requirements of interest are low activation joints and ease of joining application and processing, which are a difficult set of criteria to meet. Research at PNNL has been directed at high-strength joints using solid-state displacement reactions and pre-ceramic polymer joints that are easy to apply and that could be used in field repair situations. This research will report on the further development and testing of such joints using a double notch shear (DNS) specimen that is suitable for in-reactor testing. The results reveal that the solid-state joints are stronger than the polymer-based joints but require high-temperature, high-pressure processing. The polymer-based joints can be applied with reduced pressure and temperature processing compared to the solid-state joints. The polymer-based joints may have adequate strength for some applications where ease of application and in situ processing are required. Although irradiation testing is not reported in this study the use of the DNS specimen is discussed with regard to future neutron irradiations. (authors)

  3. Frequency of joined disabilities of children with cerebral palsy in Tuzla canton

    Directory of Open Access Journals (Sweden)

    Mirela Babajić

    2013-12-01

    Full Text Available Introduction: Cerebral palsy (CP connotes a group of non-progressive, but often variable symptoms of motor impairment of movement and posture, as well as other impairments which are a consequenceof anomalies or brain impairment in different phases of its development. CP is a pathological condition characterised in the fi rst place by motor function impairment to which other disorders such as: visual andhearing impairment, intellectual defi cit, emotional problems, behaviour disorder, speech disorder, epileptic seizure and similar can join. The aim of this study is to determine frequency of joined disabilities ofchildren with cerebral palsy in Tuzla Canton.Methods: The research covers a total sample of 48 examinees, chronological age from 2-19 years, in Tuzla Canton. Research instrument was a Structural Questionnaire for the parents of children and adolescentswith cerebral palsy. Research data were processed by nonparametric statistics method. Basic statistical parameters of frequency and percentages were calculated, and tabular presentation was made.Results: After classification of examinees as per frequency of joined disabilities was done, work results have shown that speech impairment occurred with 35.4 % of children, visual impairment 33.3 %, epilepsy29.3 %, whereas hearing impairment occurred with 2 % of children.Conclusion: In research of frequency of joined disabilities of children with cerebral palsy in Tuzla Canton, most expressed are speech and visual disorders with children, then epilepsy, whereas a small percentageof children are with hearing disorder.

  4. Virtual-Reality training system for nuclear security

    International Nuclear Information System (INIS)

    Nonaka, Nobuyuki

    2012-01-01

    At the Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency, the virtual reality (VR) training system is under development for providing a practical training environment to implement experience-oriented and interactive lessons on nuclear security for wide range of participants in human resource development assistance program mainly to Asian emerging nuclear-power countries. This system electrically recreates and visualizes nuclear facilities and training conditions in stereoscopic (3D) view on a large-scale display (CAVE system) as virtual reality training facility (VR facility) and it provides training participants with effective environments to learn installation and layout of security equipment in the facility testing and verifying visually the protection performances under various situations such as changes in day-night lighting and weather conditions, which may lead to practical exercise in the design and evaluation of the physical protection system. This paper introduces basic concept of the system and outline of training programs as well as featured aspects in using the VR technology for the nuclear security. (author)

  5. Study on the Joining Strength of Spot Welding using POMISPOT Device

    International Nuclear Information System (INIS)

    Mohd Azhar Ahmad; Siti Aiasah Hashim; Mohd Rizal Chulan

    2015-01-01

    Welding is a process to join metals. Spot welding is commonly used for specific purposes such joining in small areas or making temporary joints. POMISPOT is a spot welder that was designed and built by the ADC group, using capacitive resistance method. This study was made to obtain the welding strength that can be made by this spot welder. The study used stainless steel pieces of different thickness and by varying the applied voltage. The strength of welded pieces is tested by applying loads. The relationship between the thickness, voltage and welding strength will be used as the basis of specifications of this tool. (author)

  6. A REGIONAL PARTNERSHIP ON RADIOLOGICAL SECURITY

    International Nuclear Information System (INIS)

    Morris, Fred A.; Murray, A.; Dickerson, S.; Tynan, Douglas M.; Rawl, Richard R.; Hoo, Mark S.

    2007-01-01

    In 2004, Australia, through the Australian Nuclear Science and Technology Organisation (ANSTO) created the Regional Security of Radioactive Sources (RSRS) project and partnered with the U.S. Department of Energy's National Nuclear Security Administration (NNSA) and the International Atomic Energy Agency (IAEA) to form the Southeast Asian Regional Radiological Security Partnership (RRSP). The intent of the RRSP/RSRS partnership is to cooperate with regional neighbors in Southeast Asia to improve the security of their radioactive sources. This Southeast Asian Partnership supports NNSA and IAEA objectives to improve the security of high risk radioactive sources by raising awareness of the need, and developing national programs, to: protect and control such materials; improve the security of such materials and recover and condition the materials no longer in use. To date, agreed upon joint activities have included assistance with the improvement of regulatory infrastructure for the control of radioactive sources, training on the physical protection of radioactive sources, training and assistance with the search, location, identification and securing of orphan radioactive sources and overall assistance with implementing the IAEA Code of Conduct on the Safety and Security of Radioactive Sources. Since the inception of the partnership, ten Southeast Asian nations have participated in a range of activities from receiving general training on the security of radioactive sources to receiving specialized equipment and training to locate orphan or abandoned radioactive sources. By having a shared vision and objectives for radioactive source security in the Southeast Asian region, ANSTO and NNSA have been able to develop a successful partnership which has effectively utilized the technical, financial and political resources of each contributing partner. An example of how this partnership works is the cooperation with the Nuclear Energy Regulatory Agency, Indonesia (BAPETEN) to

  7. Methodology for safety and security of radioactive sources and materials. The Israeli approach

    International Nuclear Information System (INIS)

    Keren, M.

    1998-01-01

    About 10 Radioactive incidents occurred in Israel during 1996-1997. Some of them were theft or lost of Radioactive equipment or sources, some happened because misuse of Radioactive equipment and some of other reasons. Part of them could be eliminated if a better methodological attitude to the subject existed. A new methodology for notification, registration and licensing is described. Hopefully this methodology will increase defense in depth and the Safety and Security of Radioactive sources and materials. Information on the inventory of Radioactive sources and materials is essential. Where they are situated, what is the supply rate or all history from berth to grave. Persons involved are important: Who are the Radiation Safety Officers (RSO), what is their training and updating programs. As much as possible information on the site and places where those Radioactive sources and materials are used. Procedures for security of sources and materials is part of site information, beside safety precautions. Users are obliged to inform on any changes and to ask for confirmation to those changes. The same is when high activity sources are moved across the country. (author)

  8. Accelerating foreign-key joins using asymmetric memory channels

    NARCIS (Netherlands)

    Pirk, H.; Manegold, S.; Kersten, M.

    2011-01-01

    Indexed Foreign-Key Joins expose a very asymmetric access pattern: the Foreign-Key Index is sequentially scanned whilst the Primary-Key table is target of many quasi-random lookups which is the dominant cost factor. To reduce the costs of the random lookups the fact-table can be (re-) partitioned at

  9. European integration and cooperation, basic vectors of European space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ion Balaceanu

    2013-03-01

    Full Text Available European integration and cooperation, basic vectors of European space of freedom, security and justiceAbstract: The European countries joining to the Schengen area had the effect elimination of internal border controls between Schengen member countries, that use permenent provisions of the Schengen acquis, being a single external border where operational checks are carried out according to a set of clear rules on immigration, visas, the asylum, as well as some decisions concerning police cooperation, judicial or customs. This means that the border crossing can be made at any time through many places, and citizens of member countries who are traveling in the Schengen area must present a valid ID. Overcoming internal border can be equated with a journey through the country.

  10. Cyber Security Vulnerability Impact on I and C Reliability

    International Nuclear Information System (INIS)

    Hadley, Mark D.; McBride, Justin B.

    2006-01-01

    We present a discussion of the cyber security vulnerability impact on instrument and control reliability. In the discussion we demonstrate the likely vector of attack and vulnerabilities associated with commodity hardware, protocols and communication media. The current fleet of nuclear power plants in the United States utilizes aging analog instrument and control systems which are more frequently suffering from obsolescence and failure. The commodity equipment available now and in the near future incorporates features from information technology systems which compound cyber vulnerabilities

  11. Activities of HIP joining of plasma-facing armors in the blanket first-wall in Korea

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Yang-Il, E-mail: yijung@kaeri.re.kr [Korea Atomic Energy Research Institute, Daedeok-daero, Daejeon 34057 (Korea, Republic of); Park, Jeong-Yong; Choi, Byoung-Kwon; Lee, Jung-Suk; Kim, Hyun-Gil; Park, Dong-Jun; Park, Jung-Hwan; Kim, Suk-Kwon; Lee, Dong-Won [Korea Atomic Energy Research Institute, Daedeok-daero, Daejeon 34057 (Korea, Republic of); Cho, Seungyon [National Fusion Research Institute, Gwahak-ro, Yuseong, Daejeon 34133 (Korea, Republic of)

    2016-11-01

    Highlights: • HIP joints of Be/CuCrZr, Be/FMS, W/FMS were demonstrated. • The process conditions for HIP joining were developed. • For the joining of Be, coating interlayers as well as thick diffusion barrier was developed. • For the joining of W, double-staged HIP was applied for the joint integrity. • No significant defects nor a brittle failure were observed along the joint interface. - Abstract: Joining technology for dissimilar materials was developed for the fabrication of an ITER blanket first-wall, which consisted of Be, CuCrZr, and stainless steel (SS). The Be/CuCrZr/SS joint was fabricated using a hot isostatic pressing (HIP) method. Beryllium armor was joined to the CuCrZr/SS block at 580 °C under 100 MPa. The optimal interlayer coatings of Cr/Cu and Ti/Cr/Cu were developed using an ion-beam assisted physical vapor deposition. Beryllium is also a candidate armor material for the TBM first-wall. Successful joining of Be to ferritic-martensitic steel (FMS) was accomplished using an HIP method by introducing the thick diffusion barrier. A thick diffusion barrier of a Cu foil(10 μm) limited the excessive diffusion and prevented the formation of brittle phases at the Be/FMS interface. Be and FMS were bonded at 650–850 °C; however, a temperature of lower than 750 °C was recommended to avoid material degradation of FMS. In addition, the joining of W to FMS has been developed. Tungsten is another armor material applicable to more severe plasma conditions. The large difference in the thermal expansion between W and FMS was resolved by introducing the Ti interlayer and Mo separator. Moreover, the double-staged HIP (the first stage at 900 °C and 100 MPa and the second stage at 750 °C and 70 MPa) was applied to suppress the edge delamination of W/FMS joints during thermal history.

  12. Joining Forces for Food Security - Linking Earth Observation and Crowd-sourcing for improved Decision-support

    Science.gov (United States)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Papp, A.

    2014-12-01

    Droughts statistically exceed all other natural disasters in complexity, spatio-temporal extent and number of people affected. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. We will present the first results of the SATIDA (Satellite Technologies for Improved Drought-Risk Assessment) project, which advances three complementary developments. First, an existing drought indicator is enhanced by replacing in-situ measurements on rainfall and surface air temperature with satellite-derived datasets. We identify the vegetation status via a new noise-corrected and gap-filled vegetation index. In addition, we introduce a soil moisture component to close the gap between rainfall deficiencies, extreme temperature and the first visible impacts of atmospheric anomalies on vegetation. Second, once calibrated, the index is forced with seasonal forecasts to quantify their uncertainty and added value in the regions of interest. Third, a mobile application is developed to disseminate relevant visualizations to decision-makers in affected areas, to collect additional information about socio-economic conditions and to validate the output of the drought index in real conditions. Involving Doctors without Borders (MSF) as a key user, SATIDA aims at decreasing uncertainties in decision-making via a more holistic risk framework, resulting in longer lead times for disaster logistics in the preparedness phase.

  13. A Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication

    Directory of Open Access Journals (Sweden)

    Susan Gottschlich

    2017-12-01

    Full Text Available Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the user is authorized to access. While multiple authentication steps, known as multifactor authentication, are being used more widely throughout the military, government, businesses, and consumer sectors, the selection and implementation of which authentication factors to require is typically defined by security policy. Security policy is in turn typically established by a security organization that may have no formal metrics or means to guide its selection of authentication factors. This paper will present a taxonomy for describing authentication factors including important attributes that characterize authentication robustness to aid in the selection of factors that are consistent with the user’s mission. One particular authentication factor that I have developed will be discussed in the context of this taxonomy to motivate the need to broaden current definitions and security policies. The ultimate goal of this paper is to inspire the development of standards for authentication technologies to both support mission aware authentication innovation and to inform decision making about security policies concerning user authentication and authorization. Further, this paper aims to demonstrate that such an approach will fundamentally enhance both security and usability of increasingly networked, software-defined devices, equipment and software applications.

  14. The Ku80 carboxy terminus stimulates joining and artemis-mediated processing of DNA ends.

    Science.gov (United States)

    Weterings, Eric; Verkaik, Nicole S; Keijzers, Guido; Florea, Bogdan I; Wang, Shih-Ya; Ortega, Laura G; Uematsu, Naoya; Chen, David J; van Gent, Dik C

    2009-03-01

    Repair of DNA double-strand breaks (DSBs) is predominantly mediated by nonhomologous end joining (NHEJ) in mammalian cells. NHEJ requires binding of the Ku70-Ku80 heterodimer (Ku70/80) to the DNA ends and subsequent recruitment of the DNA-dependent protein kinase catalytic subunit (DNA-PK(CS)) and the XRCC4/ligase IV complex. Activation of the DNA-PK(CS) serine/threonine kinase requires an interaction with Ku70/80 and is essential for NHEJ-mediated DSB repair. In contrast to previous models, we found that the carboxy terminus of Ku80 is not absolutely required for the recruitment and activation of DNA-PK(CS) at DSBs, although cells that harbored a carboxy-terminal deletion in the Ku80 gene were sensitive to ionizing radiation and showed reduced end-joining capacity. More detailed analysis of this repair defect showed that DNA-PK(CS) autophosphorylation at Thr2647 was diminished, while Ser2056 was phosphorylated to normal levels. This resulted in severely reduced levels of Artemis nuclease activity in vivo and in vitro. We therefore conclude that the Ku80 carboxy terminus is important to support DNA-PK(CS) autophosphorylation at specific sites, which facilitates DNA end processing by the Artemis endonuclease and the subsequent joining reaction.

  15. The Ku80 Carboxy Terminus Stimulates Joining and Artemis-Mediated Processing of DNA Ends▿

    Science.gov (United States)

    Weterings, Eric; Verkaik, Nicole S.; Keijzers, Guido; Florea, Bogdan I.; Wang, Shih-Ya; Ortega, Laura G.; Uematsu, Naoya; Chen, David J.; van Gent, Dik C.

    2009-01-01

    Repair of DNA double-strand breaks (DSBs) is predominantly mediated by nonhomologous end joining (NHEJ) in mammalian cells. NHEJ requires binding of the Ku70-Ku80 heterodimer (Ku70/80) to the DNA ends and subsequent recruitment of the DNA-dependent protein kinase catalytic subunit (DNA-PKCS) and the XRCC4/ligase IV complex. Activation of the DNA-PKCS serine/threonine kinase requires an interaction with Ku70/80 and is essential for NHEJ-mediated DSB repair. In contrast to previous models, we found that the carboxy terminus of Ku80 is not absolutely required for the recruitment and activation of DNA-PKCS at DSBs, although cells that harbored a carboxy-terminal deletion in the Ku80 gene were sensitive to ionizing radiation and showed reduced end-joining capacity. More detailed analysis of this repair defect showed that DNA-PKCS autophosphorylation at Thr2647 was diminished, while Ser2056 was phosphorylated to normal levels. This resulted in severely reduced levels of Artemis nuclease activity in vivo and in vitro. We therefore conclude that the Ku80 carboxy terminus is important to support DNA-PKCS autophosphorylation at specific sites, which facilitates DNA end processing by the Artemis endonuclease and the subsequent joining reaction. PMID:19103741

  16. Nuclear security. IAEA: Working to build a global response to a global threat

    International Nuclear Information System (INIS)

    2010-04-01

    The IAEA helps to ensure that measures are taken to control and protect nuclear and radioactive materials from falling into the wrong hands. The IAEA delivers training, technical assistance, and equipment to States, and provides international guidance on improving nuclear security. IAEA nuclear security activities include: · Risk reduction (such as repatriating research reactor fuel and strengthening border monitoring) · International legal instruments and supporting their implementation · Internationally accepted guidance and benchmarks for nuclear security · Information exchange · Human Resource Development programmes · Research and development

  17. ICT security- aspects important for nuclear facilities; Information and Communication Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thunem, Atoosa P-J.

    2005-09-15

    Rapid application growth of complex Information and Communication Technologies (ICT) in every society and state infrastructure as well as industry has revealed vulnerabilities that eventually have given rise to serious security breaches. These vulnerabilities together with the course of the breaches from cause to consequence are gradually about to convince the field experts that ensuring the security of ICT-driven systems is no longer possible by only relying on the fundaments of computer science, IT, or telecommunications. Appropriating knowledge from other disciplines is not only beneficial, but indeed very necessary. At the same time, it is a common observation today that ICT-driven systems are used everywhere, from the nuclear, aviation, commerce and healthcare domains to camera-equipped web-enabled cellular phones. The increasing interdisciplinary and inter-sectoral aspects of ICT security worldwide have been providing updated and useful information to the nuclear domain, as one of the emerging users of ICT-driven systems. Nevertheless, such aspects have also contributed to new and complicated challenges, as ICT security for the nuclear domain is in a much more delicate manner than for any other domains related to the concept of safety, at least from the public standpoint. This report addresses some important aspects of ICT security that need to be considered at nuclear facilities. It deals with ICT security and the relationship between security and safety from a rather different perspective than usually observed and applied. The report especially highlights the influence on the security of ICT-driven systems by all other dependability factors, and on that basis suggests a framework for ICT security profiling, where several security profiles are assumed to be valid and used in parallel for each ICT-driven system, sub-system or unit at nuclear facilities. The report also covers a related research topic of the Halden Project with focus on cyber threats and

  18. Cut-and-join operators and N=4 super Yang-Mills

    International Nuclear Information System (INIS)

    Brown, T.W.

    2010-02-01

    We show which multi-trace structures are compatible with the symmetrisation of local operators in N=4 super Yang-Mills when they are organised into representations of the global symmetry group. Cut-and-join operators give the non-planar expansion of correlation functions of these operators in the free theory. Using these techniques we find the 1/N corrections to the quarter-BPS operators which remain protected at weak coupling. We also present a new way of counting these chiral ring operators using the Weyl group S N . (orig.)

  19. Cut-and-join operators and N=4 super Yang-Mills

    Energy Technology Data Exchange (ETDEWEB)

    Brown, T W [DESY, Hamburg (Germany). Theory Group

    2010-02-15

    We show which multi-trace structures are compatible with the symmetrisation of local operators in N=4 super Yang-Mills when they are organised into representations of the global symmetry group. Cut-and-join operators give the non-planar expansion of correlation functions of these operators in the free theory. Using these techniques we find the 1/N corrections to the quarter-BPS operators which remain protected at weak coupling. We also present a new way of counting these chiral ring operators using the Weyl group S{sub N}. (orig.)

  20. Summary of Prior Work on Joining of Oxide Dispersion-Strengthened Alloys

    Energy Technology Data Exchange (ETDEWEB)

    Wright, Ian G [ORNL; Tatlock, Gordon J [ORNL; Badairy, H. [University of Liverpool; Chen, C-L. [University of Liverpool

    2009-08-01

    There is a range of joining techniques available for use with ODS alloys, but care should be exercised in matching the technique to the final duty requirements of the joint. The goal for joining ODS alloys is a joint with no local disruption of the distribution of the oxide dispersion, and no significant change in the size and orientation of the alloy microstructure. Not surprisingly, the fusion welding processes typically employed with wrought alloys produce the least satisfactory results with ODS alloys, but some versions, such as fusion spot welding, and the laser and electron-beam welding technologies, have demonstrated potential for producing sound joints. Welds made using solid-state spot welding reportedly have exhibited parent metal properties. Thus, it is possible to employ processes that result in significant disruption of the alloy microstructure, as long as the processing parameters are adjustment to minimize the extent of or influence of the changes in the alloy microstructure. Selection among these joining approaches largely depends on the particular application and component configuration, and an understanding of the relationships among processing, alloy microstructure, and final properties is key. Recent developments have resulted in friction welding evolving to be a prime method for joining ODS sheet products, and variants of brazing/diffusion bonding have shown excellent promise for use with tubes and pipes. The techniques that come closest to the goal defined above involve solid-state diffusion bonding and, in particular, it has been found that secondary recrystallization of joints made by pulsed plasma-assisted diffusion can produce the desired, continuous, large alloy grain structure through the joint. Such joints have exhibited creep rupture failure at >82% of the load needed to fail the monolithic parent alloy at 1000 C.

  1. Joining technology—A challenge for the use of SiC components in HTRs

    Energy Technology Data Exchange (ETDEWEB)

    Herrmann, M., E-mail: marion.herrmann@tu-dresden.de; Meisel, P.; Lippmann, W.; Hurtado, A.

    2016-09-15

    The availability of suitable joining technologies is paramount to the further advancement of ceramic components and their use in HTRs. Among other joining technologies, a modified brazing technology using a laser beam for heating the components to be joined has been developed at TU Dresden. The laser-induced heating behavior of the ceramic material is determined by the interactions between the material and the laser beam. This was shown in two different silicon carbide materials (SSiC and SiC{sub f}-reinforced ceramic material) using a diode laser with wavelengths 808 nm and 940 nm. The laser-based technique was illustrated by three different examples: sealing of monolithic SiC with a pin configuration for fuel claddings, sealing of SiC heat pipes with a length of 1 m, and demonstration of the transferability of the laser technique to fiber-reinforced components by means of a SiC{sub f}/SiCN material. Because the covalent bonding of SiC does not allow conventional welding, much research has been devoted to developing alternative filler systems. Glass or glass–ceramic fillers enable the tailoring of properties such as CTE and viscosity. Glasses are thermally stable up to their glass transition temperatures. It was shown that the crystallization of the yttrium aluminosilicate glass composition of the present work allows it to be used at 1050 °C without any significant changes occurring in braze tightness. For the SiC heat pipes with sodium as the working fluid, a sodium-resistant metal braze consisting of Ni–Ti–Si was formed. The long-term resistance of this filler to sodium at 800 °C was proven. The results demonstrate the possibility of using the laser-based joining technique for the joining of different SiC materials as well as for different brazing materials.

  2. Requirement for XLF/Cernunnos in alignment-based gap filling by DNA polymerases lambda and mu for nonhomologous end joining in human whole-cell extracts.

    Science.gov (United States)

    Akopiants, Konstantin; Zhou, Rui-Zhe; Mohapatra, Susovan; Valerie, Kristoffer; Lees-Miller, Susan P; Lee, Kyung-Jong; Chen, David J; Revy, Patrick; de Villartay, Jean-Pierre; Povirk, Lawrence F

    2009-07-01

    XLF/Cernunnos is a core protein of the nonhomologous end-joining pathway of DNA double-strand break repair. To better define the role of Cernunnos in end joining, whole-cell extracts were prepared from Cernunnos-deficient human cells. These extracts effected little joining of DNA ends with cohesive 5' or 3' overhangs, and no joining at all of partially complementary 3' overhangs that required gap filling prior to ligation. Assays in which gap-filled but unligated intermediates were trapped using dideoxynucleotides revealed that there was no gap filling on aligned DSB ends in the Cernunnos-deficient extracts. Recombinant Cernunnos protein restored gap filling and end joining of partially complementary overhangs, and stimulated joining of cohesive ends more than twentyfold. XLF-dependent gap filling was nearly eliminated by immunodepletion of DNA polymerase lambda, but was restored by addition of either polymerase lambda or polymerase mu. Thus, Cernunnos is essential for gap filling by either polymerase during nonhomologous end joining, suggesting that it plays a major role in aligning the two DNA ends in the repair complex.

  3. Development and characterization of HIP joining techniques for Si3N4 materials

    International Nuclear Information System (INIS)

    Sun Woo, J.

    1991-09-01

    The report deals with the development and optimization of reproducible techniques for joining Si 3 N 4 with Si 3 N 4 without interlayers consisting of other materials, applying hot isostatic pressing and vacuum plasma spraying. Furthermore, experiments are reported that have been performed in addition to the above-mentioned, for preparing Si 3 N 4 sintered specimens without sintering additives, applying the HIP technique. The resulting specimens have been tested for their joining characteristics, which are reported. All reported experiments have been performed varying essential parameters such as HIP temperature, pressure, holding time, surface roughness, and heat treatment. Every parameter has been examined individually for its effect on the bonding strength of the prepared Si 3 N 4 -Si 3 N 4 joint, applying 4P bending tests at room temperature and at 1200deg C. (orig./MM) [de

  4. Influence of reduced glutathione on end-joining of DNA double-strand breaks: Cytogenetical and molecular approach

    Energy Technology Data Exchange (ETDEWEB)

    Ghoshal, Nitin [Molecular Genetics Laboratory, Department of Biotechnology & Bioinformatics, North-Eastern Hill University, Shillong, Meghalaya-793022 (India); Sharma, Sheetal [Department of Biochemistry, Indian Institute of Science, Bangalore, 560 012 (India); Banerjee, Atanu; Kurkalang, Sillarine [Molecular Genetics Laboratory, Department of Biotechnology & Bioinformatics, North-Eastern Hill University, Shillong, Meghalaya-793022 (India); Raghavan, Sathees C. [Department of Biochemistry, Indian Institute of Science, Bangalore, 560 012 (India); Chatterjee, Anupam, E-mail: chatterjeeanupam@hotmail.com [Molecular Genetics Laboratory, Department of Biotechnology & Bioinformatics, North-Eastern Hill University, Shillong, Meghalaya-793022 (India)

    2017-01-15

    Highlights: • DNA lesions induced by Blem and radiation interact well and form higher frequency of exchange aberrations. • Cellular level of glutathione does influence such interaction of DNA lesions. • Oligomer-based cell-free assay system demonstrated better end-joining efficiency at higher level of endogenous GSH. - Abstract: Radiation induced DNA double-strand breaks (DSB) are the major initial lesions whose misrejoining may lead to exchange aberrations. However, the role of glutathione (GSH), a major cellular thiol, in regulating cell’s sensitivity to DNA damaging agents is not well understood. Influence of endogenous GSH on the efficiency of X-rays and bleomycin (Blem) induced DNA DSBs end-joining has been tested here cytogenetically, in human lymphocytes and Hct116 cells. In another approach, oligomeric DNA (75 bp) containing 5′-compatible and non-compatible overhangs mimicking the endogenous DSB were for rejoining in presence of cell-free extracts from cells having different endogenous GSH levels. Frequency of aberrations, particularly exchange aberrations, was significantly increased when Blem was combined with radiation. The exchange aberration frequency was further enhanced when combined treatment was given at 4 °C since DNA lesions are poorly repaired at 4 °C so that a higher number of DNA breaks persist and interact when shifted from 4 °C to 37 °C. The exchange aberrations increased further when the combined treatment was given to Glutathione-ester (GE) pre-treated cells, indicating more frequent rejoining of DNA lesions in presence of higher cellular GSH. This is further supported by the drastic reduction in frequency of exchange aberrations but significant increase in incidences of deletions when combined treatment was given to GSH-depleted cells. End-joining efficiency of DNA DSBs with compatible ends was better than for non-compatible ends. End-joining efficiency of testicular and MCF7 cell extracts was better than that of lungs and

  5. Selection of equipment for equipment qualification

    International Nuclear Information System (INIS)

    Torr, K.G.

    1989-01-01

    This report describes the methodology applied in selecting equipment in the special safety systems for equipment qualification in the CANDU 600 MW nuclear generating stations at Gentilly 2 and Point Lepreau. Included is an explanation of the selection procedure adopted and the rationale behind the criteria used in identifying the equipment. The equipment items on the list have been grouped into three priority categories as a planning aid to AECB staff for a review of the qualification status of the special safety systems

  6. Identifying and changing the normative beliefs about aggression which lead young Muslim adults to join extremist anti-Semitic groups in Pakistan.

    Science.gov (United States)

    Amjad, Naumana; Wood, Alex M

    2009-01-01

    Two studies investigated the role of beliefs about the acceptability of aggression ("normative beliefs") against Jews in determining who would join an extremist group. In Study 1, students in a university in Pakistan (N=144) completed self-report attitude measures, and were subsequently approached by a confederate who asked whether they wanted to join an extremist anti-Semitic organization. Normative beliefs about aggression against Jews were very strong predictors of whether participants agreed to join. In Study 2, participants (N=92) were experimentally assigned to either a brief educational intervention, designed to improve inter-group relations, or to a control group. They also filled in self-report attitude measures pre and post intervention. Participants in the intervention group were much less likely to agree to join the extremist group, and this effect of the intervention on joining was mediated by changes in normative beliefs about aggression against Jews. The results have implications for theories of inter-group aggression and interventions to prevent people from being recruited into extremist groups.

  7. Georneys joins AGU's blog network

    Science.gov (United States)

    Viñas, Maria-José

    2011-07-01

    A blog on geological musings, wanderings, and adventures, called Georneys, has joined AGU's network of Earth and space science blogs. With the addition of Georneys, on 11 July, the AGU Blogosphere (http://blogs.agu.org), as the network is known, has grown to showcase eight independent blogs since its launch last fall. “One reason I write this blog is to maintain my sanity as I finish up my Ph.D. In the midst of much stress, long days in lab, and long nights writing thesis chapters, I write to remind myself of why I love geology,” says Georneys blogger Evelyn Mervine. “I also write to document some of my geological adventures and to share my love of geology with others.”

  8. CODE ACCEPTANCE OF A NEW JOINING TECHNOLOGY FOR STORAGE CONTAINMENTS (REISSUE)

    International Nuclear Information System (INIS)

    Cannel, G.R.; Grant, G.J.; Hill, B.E.

    2009-01-01

    One of the activities associated with cleanup throughout the Department of Energy (DOE) complex is packaging radioactive materials into storage containers. Much of this work will be performed in high-radiation environments requiring fully remote operations, for which existing, proven systems do not currently exist. These conditions require a process that is capable of producing acceptable (defect-free) welds on a consistent basis; the need to perform weld repair, under fully-remote operations, can be extremely costly and time consuming. Current closure-welding technologies (fusion welding) are not well suited for this application and will present risk to cleanup cost and schedule. To address this risk, Fluor and the Pacific Northwest National Laboratory (PNNL) are proposing that a new and emerging joining technology, Friction Stir Welding (FSW), be considered for this work. FSW technology has been demonstrated in other industries (aerospace and marine) to produce near flaw-free welds on a consistent basis. FSW is judged capable of providing the needed performance for fully-remote closure welding of containers for radioactive materials for the following reasons: FSW is a solid-state process; material is not melted. FSW does not produce the type of defects associated with fusion welding, e.g., solidification-induced porosity, cracking, and distortion due to weld shrinkage. In addition, because FSW is a low-heat input process, material properties (mechanical, corrosion and environmental) experience less degradation in the heat affected zones than do fusion welds. When compared to fusion processes, FSW produces extremely high weld quality. FSW is performed using machine-tool technology. The equipment is simple and robust and well-suited for high radiation, fully-remote operations compared to the relatively complex equipment associated with fusion-welding processes. Additionally, for standard wall thicknesses of radioactive materials containers, the FSW process can

  9. The development of mobile robot for security application and nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, B. S.; Lee, Y. B.; Choi, Y. S.; Seo, Y. C.; Park, Y. M

    1999-12-01

    The use of a mobile robot system in nuclear radioactive environments has the advantage of watching and inspecting the NPP safety-related equipment systematically and repairing damaged parts efficiently, thereby enhancing the safe operations of NPPs as well as reducing significantly personnel's dose rate to radioactive environment. Key technology achieved through the development of such robotic system can be used for security application and can offer new approaches to many of the tasks faced to the industry as well. The mobile robot system was composed of a mobile subsystem, a manipulator subsystem, a control subsystem, and a sensor subsystem to use in security application and nuclear radioactive environments. The mobile subsystem was adopted to synchro-drive method to improve the mobility of it. And the manipulator subsystem was developed to minimize the weight and easy to control at remote site. Finally, we developed the USB-based robot control system considering the expandability and modularity. The developed mobile robot for inspection and security was experimented for the collision avoidance and autonomous algorithm, and then it was confirmed that the mobile robot was very effective to the security application and inspection of nuclear facilities. (author)

  10. The development of mobile robot for security application and nuclear facilities

    International Nuclear Information System (INIS)

    Kim, B. S.; Lee, Y. B.; Choi, Y. S.; Seo, Y. C.; Park, Y. M.

    1999-12-01

    The use of a mobile robot system in nuclear radioactive environments has the advantage of watching and inspecting the NPP safety-related equipment systematically and repairing damaged parts efficiently, thereby enhancing the safe operations of NPPs as well as reducing significantly personnel's dose rate to radioactive environment. Key technology achieved through the development of such robotic system can be used for security application and can offer new approaches to many of the tasks faced to the industry as well. The mobile robot system was composed of a mobile subsystem, a manipulator subsystem, a control subsystem, and a sensor subsystem to use in security application and nuclear radioactive environments. The mobile subsystem was adopted to synchro-drive method to improve the mobility of it. And the manipulator subsystem was developed to minimize the weight and easy to control at remote site. Finally, we developed the USB-based robot control system considering the expandability and modularity. The developed mobile robot for inspection and security was experimented for the collision avoidance and autonomous algorithm, and then it was confirmed that the mobile robot was very effective to the security application and inspection of nuclear facilities. (author)

  11. Smells familiar: group-joining decisions of predatory mites are mediated by olfactory cues of social familiarity.

    Science.gov (United States)

    Muleta, Muluken G; Schausberger, Peter

    2013-09-01

    Group-living animals frequently have to trade off the costs and benefits of leaving an established group and joining another group. Owing to their high fitness relevance, group-joining decisions are commonly nonrandom and may be based on traits of both individual members and the group such as life stage, body size, social status and group density or size, respectively. Many group-living animals are able to recognize and to associate preferentially with familiar individuals, i.e. those encountered before. Hence, after dispersing from established groups, animals commonly have to decide whether to join a new familiar or unfamiliar group. Using binary choice situations we assessed the effects of social familiarity on group-joining behaviour of the plant-inhabiting predatory mite Phytoseiulus persimilis . Group living in P. persimilis is brought about by the patchy distribution of its spider mite prey and mutual conspecific attraction. In the first experiment, gravid predator females given a choice between spider mite patches occupied by unfamiliar and familiar groups of females strongly preferred to join familiar groups and to deposit their eggs in these patches. Preference for socially familiar groups was robust across biases of spider mite prey densities between choice options. The second experiment revealed that the predatory mite females can smell social familiarity from a distance. Females subjected to odour choice situations in artificial cages were more strongly attracted to the odour of familiar than unfamiliar groups. We argue that P. persimilis females preferentially join socially familiar groups because a familiar social environment relaxes competition and optimizes foraging and reproduction.

  12. Smells familiar: group-joining decisions of predatory mites are mediated by olfactory cues of social familiarity☆

    Science.gov (United States)

    Muleta, Muluken G.; Schausberger, Peter

    2013-01-01

    Group-living animals frequently have to trade off the costs and benefits of leaving an established group and joining another group. Owing to their high fitness relevance, group-joining decisions are commonly nonrandom and may be based on traits of both individual members and the group such as life stage, body size, social status and group density or size, respectively. Many group-living animals are able to recognize and to associate preferentially with familiar individuals, i.e. those encountered before. Hence, after dispersing from established groups, animals commonly have to decide whether to join a new familiar or unfamiliar group. Using binary choice situations we assessed the effects of social familiarity on group-joining behaviour of the plant-inhabiting predatory mite Phytoseiulus persimilis. Group living in P. persimilis is brought about by the patchy distribution of its spider mite prey and mutual conspecific attraction. In the first experiment, gravid predator females given a choice between spider mite patches occupied by unfamiliar and familiar groups of females strongly preferred to join familiar groups and to deposit their eggs in these patches. Preference for socially familiar groups was robust across biases of spider mite prey densities between choice options. The second experiment revealed that the predatory mite females can smell social familiarity from a distance. Females subjected to odour choice situations in artificial cages were more strongly attracted to the odour of familiar than unfamiliar groups. We argue that P. persimilis females preferentially join socially familiar groups because a familiar social environment relaxes competition and optimizes foraging and reproduction. PMID:24027341

  13. Retrieval of Spatial Join Pattern Instances from Sensor Networks

    DEFF Research Database (Denmark)

    Yiu, Man Lung; Mamoulis, Nikos; Bakiras, Spiridon

    2009-01-01

    We study the continuous evaluation of spatial join queries and extensions thereof, defined by interesting combinations of sensor readings (events) that co-occur in a spatial neighborhood. An example of such a pattern is "a high temperature reading in the vicinity of at least four high-pressure re...

  14. Design and Implementation of Equipment for Enhanced Safeguards of a Plutonium Storage in a Reprocessing Plant

    International Nuclear Information System (INIS)

    Richir, P.; Dechamp, L.; Buchet, P.; Dransart, P.; Dzbikowicz, Z.; Peerani, P.; ); Pierssens, L.; Persson, L.; Ancius, D.; Synetos, S.; ); Edmonds, N.; Homer, A.; Benn, K.-A.; Polkey, A.

    2015-01-01

    The Nuclear Security unit (NUSEC) of the Institute for Transuranium Elements (ITU, JRC) was entrusted by DG ENER to design and implement equipment in order to achieve enhanced safeguards of a plutonium dioxide storage located on the MAGNOX reprocessing plant in Sellafield (UK). Enhanced safeguards must lead to a win-win situation for all parties involved. In this case the DG ENER inspectorate will save inspection time, manpower and future financial resources and the operator will have the right to access its storage without the need for inspector presence. To reach this goal, while at the same time taking into account current budget constraints, NUSEC developed applications that use equipment commonly used in the safety and security fields but so far have not been used in safeguards. For instance, two laser scanners are used to detect entry/exit events into and out of the store and to provide the necessary information to an algorithm in order to categorize objects/people passing the scanners, e.g., a Fork Lift Truck, a trolley used to bring in PuO 2 containers, a system used for the dispatch of cans, people, etc. An RFID reader is used to identify equipment duly authorized to access the store. All PuO 2 containers arriving from the production line must be weighed, identified and measured using gamma and neutron detectors before they can be transferred to the store. For this purpose an Unattended Combined Measurement System (UCMS) was designed and manufactured by the JRC in order to do all verification activities using a single instrument. This paper describes the design features of the equipment and its implementation with the support of the Sellafield Ltd. in the framework of the MAGNOX store project. (author)

  15. Optimizing main-memory join on modern hardware

    OpenAIRE

    Boncz, Peter; Manegold, Stefan; Kersten, Martin

    2002-01-01

    textabstractIn the past decade, the exponential growth in commodity CPUs speed has far outpaced advances in memory latency. A second trend is that CPU performance advances are not only brought by increased clock rate, but also by increasing parallelism inside the CPU. Current database systems have not yet adapted to these trends, and show poor utilization of both CPU and memory resources on current hardware. In this article, we show how these resources can be optimized for large joins and tra...

  16. [Airport security check of medical substances used during patient repatriation].

    Science.gov (United States)

    Felkai, Péter

    2012-09-16

    During airport security check of passenger luggage, hazardous items and substances are prohibited to be taken into the restricted safety zone of the airport and the aircraft. Among equipment of the medical staff escorting the patient, there are several devices and materials which are considered hazardous for security reasons. However, medical equipment and substances are indispensable for treating patients during the flight. The aim of the author was to present his experience obtained with the use of an instrument developed for testing liquids, aerosols and gels for security reasons. An instrument based on Raman spectroscopy was used for the identification of medical substances. The results confirmed that the instrument was able to recognize the tested medical substances. The non-destructive testing maintained sample integrity and asepsis. The data indicate that the instrument has a promising utility for the identification of medical substances. It seems important that during repatriation medical substances should be selected not only on the ground of their medical necessity, but their packaging should be also taken into consideration. It is necessary to perform more tests on different medical substances used in emergency care in order to make the database of medical substances stored in the library of instrument more complete.

  17. Safety, security and safeguard

    International Nuclear Information System (INIS)

    Zakariya, Nasiru Imam; Kahn, M.T.E.

    2015-01-01

    Highlights: • The 3S interface in the design of PPS is hereby proposed. • The 3S synergy enhances the reduction in vulnerability and terrorism. • Highlighted were concept of detection, delay and response. - Abstract: A physical protection system (PPS) integrates people, procedures, and equipment for the protection of assets or facilities against theft, sabotage and terrorist attacks. Therefore, this paper proposes the use of a systematic and measurable approach to the design of PPS and its emphases on the concept of detection, delay and response. The proposed performance based PPS has the capability of defeating adversaries thereby achieving its targets. Therefore, timely detection of intrusion – based on the use of sensors, signal lines and alarm systems – is a major principle in the proposed system. Also the need for deterrence such as barriers in form of guards, access control, close circuit television (CCTV), strong policy and procedures, then the security culture amongst the facility workers was appropriately discussed. Since nuclear power is considered the only source that can provide large scale electricity with comparatively minimal impact on the environment, the paper also considered base guidelines for the application of PPS in any nuclear and radioactive facilities, followed with the necessity to incorporate inherent safety, security and safeguard (3S) synergy innovation in the physical protection system design and other characteristics that will enhance to reduce the vulnerability of nuclear facilities and materials to theft sabotage and terrorist attacks

  18. Influence of friction stir welding parameters on titanium-aluminum heterogeneous lap joining configuration

    Science.gov (United States)

    Picot, Florent; Gueydan, Antoine; Hug, Éric

    2017-10-01

    Lap joining configuration for Friction Stir Welding process is a methodology mostly dedicated to heterogeneous bonding. This welding technology was applied to join pure titanium with pure aluminum by varying the rotation speed and the movement speed of the tool. Regardless of the process parameters, it was found that the maximum strength of the junction remains almost constant. Microstructural observations by means of Scanning Electron Microscopy and Energy Dispersive Spectrometry analysis enable to describe the interfacial join and reveal asymmetric Cold Lap Defects on the sides of the junction. Chemical analysis shows the presence of one exclusive intermetallic compound through the interface identified as TiAl3. This compound is responsible of the crack spreading of the junction during the mechanical loading. The original version of this article supplied to AIP Publishing contained an accidental inversion of the authors, names. An updated version of this article, with the authors names formatted correctly was published on 20 October 2017.

  19. ICT security- aspects important for nuclear facilities

    International Nuclear Information System (INIS)

    Thunem, Atoosa P-J.

    2005-09-01

    Rapid application growth of complex Information and Communication Technologies (ICT) in every society and state infrastructure as well as industry has revealed vulnerabilities that eventually have given rise to serious security breaches. These vulnerabilities together with the course of the breaches from cause to consequence are gradually about to convince the field experts that ensuring the security of ICT-driven systems is no longer possible by only relying on the fundaments of computer science, IT, or telecommunications. Appropriating knowledge from other disciplines is not only beneficial, but indeed very necessary. At the same time, it is a common observation today that ICT-driven systems are used everywhere, from the nuclear, aviation, commerce and healthcare domains to camera-equipped web-enabled cellular phones. The increasing interdisciplinary and inter-sectoral aspects of ICT security worldwide have been providing updated and useful information to the nuclear domain, as one of the emerging users of ICT-driven systems. Nevertheless, such aspects have also contributed to new and complicated challenges, as ICT security for the nuclear domain is in a much more delicate manner than for any other domains related to the concept of safety, at least from the public standpoint. This report addresses some important aspects of ICT security that need to be considered at nuclear facilities. It deals with ICT security and the relationship between security and safety from a rather different perspective than usually observed and applied. The report especially highlights the influence on the security of ICT-driven systems by all other dependability factors, and on that basis suggests a framework for ICT security profiling, where several security profiles are assumed to be valid and used in parallel for each ICT-driven system, sub-system or unit at nuclear facilities. The report also covers a related research topic of the Halden Project with focus on cyber threats and

  20. Security in the data link layer of the OSI model on LANs wired Cisco

    Directory of Open Access Journals (Sweden)

    María Genoveva Moreira Santos

    2018-02-01

    Full Text Available There are no technologies or protocols completely secure in network infrastructures, for this reason, this document aims to demonstrate the importance of configuring security options on network equipments. On this occasion we will focus on the data link layer of the OSI model, which is where controls have begun to be implemented at level of protocols. The tools that are used in the research facilitate the implementation of a virtual laboratory, which consists of a base operating system (windows in which virtualbox is installed to mount linux mint, which will generate attacks; while in VMware, we installed a virtual machine that allows you to add the image of a switch to our network simulation software (GNS3, which integrates all the components. The tests were able to identify the vulnerabilities in MAC, ARP, VLAN and STP, and then to proceed to patch these security aws. Keeping the setting by default or ignoring the characteristics of network equipment are usually the reasons why these vulnerabilities exist. Finally, it was proved how easy it can be to run an attack and at the same time to implement security measures on the layer 2 of the OSI.

  1. Comparative analysis of different joining techniques to improve the passive fit of cobalt-chromium superstructures.

    Science.gov (United States)

    Barbi, Francisco C L; Camarini, Edevaldo T; Silva, Rafael S; Endo, Eliana H; Pereira, Jefferson R

    2012-12-01

    The influence of different joining techniques on passive fit at the interface structure/abutment of cobalt-chromium (Co-Cr) superstructures has not yet been clearly established. The purpose of this study was to compare 3 different techniques of joining Co-Cr superstructures by measuring the resulting marginal misfit in a simulated prosthetic assembly. A specially designed metal model was used for casting, sectioning, joining, and measuring marginal misfit. Forty-five cast bar-type superstructures were fabricated in a Co-Cr alloy and randomly assigned by drawing lots to 3 groups (n=15) according to the joining method used: conventional gas-torch brazing (G-TB), laser welding (LW), and tungsten inert gas welding (TIG). Joined specimens were assembled onto abutment analogs in the metal model with the 1-screw method. The resulting marginal misfit was measured with scanning electron microscopy (SEM) at 3 different points: distal (D), central (C), and mesial (M) along the buccal aspect of both abutments: A (tightened) and B (without screw). The Levene test was used to evaluate variance homogeneity and then the Welsch ANOVA for heteroscedastic data (α=.05). Significant differences were found on abutment A between groups G-TB and LW (P=.013) measured mesially and between groups G-TB and TIG (P=.037) measured centrally. On abutment B, significant differences were found between groups G-TB and LW (Plaser method. Copyright © 2012 The Editorial Council of the Journal of Prosthetic Dentistry. Published by Mosby, Inc. All rights reserved.

  2. Fork-join and data-driven execution models on multi-core architectures: Case study of the FMM

    KAUST Repository

    Amer, Abdelhalim

    2013-01-01

    Extracting maximum performance of multi-core architectures is a difficult task primarily due to bandwidth limitations of the memory subsystem and its complex hierarchy. In this work, we study the implications of fork-join and data-driven execution models on this type of architecture at the level of task parallelism. For this purpose, we use a highly optimized fork-join based implementation of the FMM and extend it to a data-driven implementation using a distributed task scheduling approach. This study exposes some limitations of the conventional fork-join implementation in terms of synchronization overheads. We find that these are not negligible and their elimination by the data-driven method, with a careful data locality strategy, was beneficial. Experimental evaluation of both methods on state-of-the-art multi-socket multi-core architectures showed up to 22% speed-ups of the data-driven approach compared to the original method. We demonstrate that a data-driven execution of FMM not only improves performance by avoiding global synchronization overheads but also reduces the memory-bandwidth pressure caused by memory-intensive computations. © 2013 Springer-Verlag.

  3. AVIATION SECURITY AS AN OBJECT OF MATHEMATICAL MODELING

    Directory of Open Access Journals (Sweden)

    N. Elisov Lev

    2017-01-01

    Full Text Available The paper presents a mathematical formulation of the problem formalization of the subject area related to aviation security in civil aviation. The formalization task is determined by the modern issue of providing aviation security. Aviationsecurity in modern systems is based upon organizational standard of security control. This standard doesn’t require calcu- lating the security level. It allows solving the aviation security task without estimating the solution and evaluating the per- formance of security facilities. The issue of acceptable aviation security level stays unsolved, because its control lies in inspections that determine whether the object security facilities meet the requirements or not. The pending problem is also in whether the requirements are calculable and the evaluation is subjective.Lately, there has been determined quite a certain tendency to consider aviation security issues from the perspective of its level optimal control with the following identification, calculation and evaluation problems solving and decision mak- ing. The obtained results analysis in this direction shows that it’s strongly recommended to move to object formalization problem, which provides a mathematical modeling for aviation security control optimization.In this case, the authors assume to find the answer in the process of object formalization. Therefore aviation secu- rity is presented as some security environment condition, which defines the parameters associated with the object protec-tion system quality that depends on the use of protective equipment in conditions of counteraction to factors of external andinternal threats. It is shown that the proposed model belongs to a class of boundary value problems described by differential equations in partial derivatives. The classification of boundary value problems is presented.

  4. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    Science.gov (United States)

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  5. Joining of polymer-metal lightweight structures using self-piercing riveting (SPR) technique: Numerical approach and simulation results

    Science.gov (United States)

    Amro, Elias; Kouadri-Henni, Afia

    2018-05-01

    Restrictions in pollutant emissions dictated at the European Commission level in the past few years have urged mass production car manufacturers to engage rapidly several strategies in order to reduce significantly the energy consumption of their vehicles. One of the most relevant taken action is light-weighting of body in white (BIW) structures, concretely visible with the increased introduction of polymer-based composite materials reinforced by carbon/glass fibers. However, the design and manufacturing of such "hybrid" structures is limiting the use of conventional assembly techniques like resistance spot welding (RSW) which are not transferable as they are for polymer-metal joining. This research aims at developing a joining technique that would eventually enable the assembly of a sheet molding compound (SMC) polyester thermoset-made component on a structure composed of several high strength steel grades. The state of the art of polymer-metal joining techniques highlighted the few ones potentially able to respond to the industrial challenge, which are: structural bonding, self-piercing riveting (SPR), direct laser joining and friction spot welding (FSpW). In this study, the promising SPR technique is investigated. Modelling of SPR process in the case of polymer-metal joining was performed through the building of a 2D axisymmetric FE model using the commercial code Abaqus CAE 6.10-1. Details of the numerical approach are presented with a particular attention to the composite sheet for which Mori-Tanaka's homogenization method is used in order to estimate overall mechanical properties. Large deformations induced by the riveting process are enabled with the use of a mixed finite element formulation ALE (arbitrary Lagrangian-Eulerian). FE model predictions are compared with experimental data followed by a discussion.

  6. Alternative end-joining catalyzes robust IgH locus deletions and translocations in the combined absence of ligase 4 and Ku70.

    Science.gov (United States)

    Boboila, Cristian; Jankovic, Mila; Yan, Catherine T; Wang, Jing H; Wesemann, Duane R; Zhang, Tingting; Fazeli, Alex; Feldman, Lauren; Nussenzweig, Andre; Nussenzweig, Michel; Alt, Frederick W

    2010-02-16

    Class switch recombination (CSR) in B lymphocytes is initiated by introduction of multiple DNA double-strand breaks (DSBs) into switch (S) regions that flank immunoglobulin heavy chain (IgH) constant region exons. CSR is completed by joining a DSB in the donor S mu to a DSB in a downstream acceptor S region (e.g., S gamma1) by end-joining. In normal cells, many CSR junctions are mediated by classical nonhomologous end-joining (C-NHEJ), which employs the Ku70/80 complex for DSB recognition and XRCC4/DNA ligase 4 for ligation. Alternative end-joining (A-EJ) mediates CSR, at reduced levels, in the absence of C-NHEJ, even in combined absence of Ku70 and ligase 4, demonstrating an A-EJ pathway totally distinct from C-NHEJ. Multiple DSBs are introduced into S mu during CSR, with some being rejoined or joined to each other to generate internal switch deletions (ISDs). In addition, S-region DSBs can be joined to other chromosomes to generate translocations, the level of which is increased by absence of a single C-NHEJ component (e.g., XRCC4). We asked whether ISD and S-region translocations occur in the complete absence of C-NHEJ (e.g., in Ku70/ligase 4 double-deficient B cells). We found, unexpectedly, that B-cell activation for CSR generates substantial ISD in both S mu and S gamma1 and that ISD in both is greatly increased by the absence of C-NHEJ. IgH chromosomal translocations to the c-myc oncogene also are augmented in the combined absence of Ku70 and ligase 4. We discuss the implications of these findings for A-EJ in normal and abnormal DSB repair.

  7. Experience in industrial radiography equipment into carry out inspections in Brazil

    International Nuclear Information System (INIS)

    Lopes, Valdir Maciel; Silva, Joao

    2008-01-01

    The Nuclear and Energy Research Institute (IPEN), in accordance with the attributions given by the National Commission of Nuclear Energy (CNEN), has been supplying the market with radioactive sealed sources of Iridium 192 ( 192 Ir), for Brazil and some South America Countries, for more than 24 years. In this period, the experience acquired in the accompanied of the technological improvement in the industrial gammagraphy equipment; into Sealed Sources Production Laboratory (LPFS) will be show. Of the set of operations carry out in the LPFS, since the assemblies, tests of qualification of the sources also inspection at of the equipment for posterior applications in field, it is intended to demonstrate to the technological improvement associate to the radiological and operational security. In this work, the data base of the system of the LPFS will be used, as well as the professional experience of the laboratory team in the daily relationship with the companies responsible for the equipment operation. (author)

  8. Farm Equipment Leasing. A New Financial Strategy. Staff Report No. AGES870302.

    Science.gov (United States)

    Serletis, William S.

    For farmers with high debt/asset ratios, leasing is an attractive option for securing the use of farm machinery. Under the current tax laws, financial leasing carries lower after-tax costs than loan purchasing. By size, farms with more than $500,000 in sales had the highest proportion of U.S. expenditures for farm equipment leasing. By region, the…

  9. A 21st Century Science, Technology, and Innovation Strategy for Americas National Security

    Science.gov (United States)

    2016-05-01

    economic value, and allow entrepreneurs and industry to share facilities, equipment, and production capacity? In some cases, efforts similar to the Army...means to build community relations, maintain employee morale , and impact broad STEM education and national security STEM workforce efforts...acquisition and intellectual property create opportunities for U.S. entrepreneurs and companies while furthering the mission of the enterprise. Non

  10. Combustion Joining of Regolith Tiles for In-Situ Fabrication of Launch/Landing Pads on the Moon and Mars

    Science.gov (United States)

    Ferguson, Robert E.; Shafirovich, Evgeny; Mantovani, James G.

    2017-01-01

    To mitigate dust problems during launch/landing operations in lunar and Mars missions, it is desired to build solid pads on the surface. Recently, strong tiles have been fabricated from lunar regolith simulants using high-temperature sintering. The present work investigates combustion joining of these tiles through the use of exothermic intermetallic reactions. Specifically, nickel/aluminum (1:1 mole ratio) mixture was placed in a gap between the tiles sintered from JSC-1A lunar regolith simulant. Upon ignition by a laser, a self-sustained propagation of the combustion front over the mixture occurred. Joining was improved with increasing the tile thickness from 6.3 mm to 12.7 mm. The temperatures sufficient for melting the glass phase of JSC-1A were recorded for 12.7-mm tiles, which explains the observed better joining.

  11. Sorting by Cuts, Joins, and Whole Chromosome Duplications.

    Science.gov (United States)

    Zeira, Ron; Shamir, Ron

    2017-02-01

    Genome rearrangement problems have been extensively studied due to their importance in biology. Most studied models assumed a single copy per gene. However, in reality, duplicated genes are common, most notably in cancer. In this study, we make a step toward handling duplicated genes by considering a model that allows the atomic operations of cut, join, and whole chromosome duplication. Given two linear genomes, [Formula: see text] with one copy per gene and [Formula: see text] with two copies per gene, we give a linear time algorithm for computing a shortest sequence of operations transforming [Formula: see text] into [Formula: see text] such that all intermediate genomes are linear. We also show that computing an optimal sequence with fewest duplications is NP-hard.

  12. Turbo Charge CPU Utilization in Fork/Join Using the ManagedBlocker

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Fork/Join is a framework for parallelizing calculations using recursive decomposition, also called divide and conquer. These algorithms occasionally end up duplicating work, especially at the beginning of the run. We can reduce wasted CPU cycles by implementing a reserved caching scheme. Before a task starts its calculation, it tries to reserve an entry in the shared map. If it is successful, it immediately begins. If not, it blocks until the other thread has finished its calculation. Unfortunately this might result in a significant number of blocked threads, decreasing CPU utilization. In this talk we will demonstrate this issue and offer a solution in the form of the ManagedBlocker. Combined with the Fork/Join, it can keep parallelism at the desired level.

  13. Development of System Regulating and Support for Nuclear Security in Belarus

    International Nuclear Information System (INIS)

    Lobach, D.; Astashka, R.; Lugovskaya, O.

    2015-01-01

    A safeguards strengthening in Belarus is realized as complex for measures of legal authorities building, advance staff education and international cooperation. The main scope of complex coordinated activities is to provide the sustainable development of national regulatory system and support for current and future challenges in a more globalized world to assure relevant safeguards measures and implements, to get the sustainable international and regional cooperation. Collected and implemented information and knowledge, analytical thinking of involved specialists will improve cooperation between IAEA and States to optimize technical support and experience exchange. Some authorities are responsible in regulating and oversighting for nuclear security in Belarus. The main challenge of national system development is realization the conception of effective coordination. The nuclear regulatory authority (the Ministry for Emergency Situations/ Gosatomnadzor) has the responsibility either to build up own technical capabilities for detailed review and assessment of processes and activities of the NPP operator or to make sure that a technical support organization equipped with sufficient knowledge and structural capabilities is involved in assessment and analysis of processes at all phases of the NPP use. There is developed the conception for creation of analytical and technical support laboratory including both stationary and mobile equipment and techniques for nuclear security prevention and control measures and arrangements. It is actually the realization of conception the Joint Center for Nuclear Security Competence in Belarus for national and cooperational purposes. The implementation of strengthening plans and put-up arrangements will lead to integrated regulatory activities in order to allow practical optimization of the resources to get benefits from exchange of experience and issues from safety analysis and oversighting as synergy effect. (author)

  14. Surface plasmon resonance assisted rapid laser joining of glass

    Energy Technology Data Exchange (ETDEWEB)

    Zolotovskaya, Svetlana A.; Tang, Guang; Abdolvand, Amin, E-mail: a.abdolvand@dundee.ac.uk [School of Engineering, Physics and Mathematics, University of Dundee, Dundee DD1 4HN (United Kingdom); Wang, Zengbo [School of Electronic Engineering, Bangor University, Bangor LL57 1UT (United Kingdom)

    2014-08-25

    Rapid and strong joining of clear glass to glass containing randomly distributed embedded spherical silver nanoparticles upon nanosecond pulsed laser irradiation (∼40 ns and repetition rate of 100 kHz) at 532 nm is demonstrated. The embedded silver nanoparticles were ∼30–40 nm in diameter, contained in a thin surface layer of ∼10 μm. A joint strength of 12.5 MPa was achieved for a laser fluence of only ∼0.13 J/cm{sup 2} and scanning speed of 10 mm/s. The bonding mechanism is discussed in terms of absorption of the laser energy by nanoparticles and the transfer of the accumulated localised heat to the surrounding glass leading to the local melting and formation of a strong bond. The presented technique is scalable and overcomes a number of serious challenges for a widespread adoption of laser-assisted rapid joining of glass substrates, enabling applications in the manufacture of microelectronic devices, sensors, micro-fluidic, and medical devices.

  15. A Secure Network Coding Based on Broadcast Encryption in SDN

    Directory of Open Access Journals (Sweden)

    Yue Chen

    2016-01-01

    Full Text Available By allowing intermediate nodes to encode the received packets before sending them out, network coding improves the capacity and robustness of multicast applications. But it is vulnerable to the pollution attacks. Some signature schemes were proposed to thwart such attacks, but most of them need to be homomorphic that the keys cannot be generated and managed easily. In this paper, we propose a novel fast and secure switch network coding multicast (SSNC on the software defined networks (SDN. In our scheme, the complicated secure multicast management was separated from the fast data transmission based on the SDN. Multiple multicasts will be aggregated to one multicast group according to the requirements of services and the network status. Then, the controller will route aggregated multicast group with network coding; only the trusted switch will be allowed to join the network coding by using broadcast encryption. The proposed scheme can use the traditional cryptography without homomorphy, which greatly reduces the complexity of the computation and improves the efficiency of transmission.

  16. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  17. Electrically conductive ceramics and new joining technology for applications in HTR engineering

    International Nuclear Information System (INIS)

    Hille, Carmen; Lippmann, Wolfgang; Hurtado, Antonio

    2012-01-01

    Ceramic constructional components are quite extensively required for operation of high-temperature nuclear reactors. Functional ceramics, in addition to constructional ceramics, are increasingly coming into the focus of research. Ceramic materials are predestined for use at high temperatures and in corrosive atmospheres. Modification of silicon carbide (SiC) by targeted doping, for instance, produces a suitable material for the production of heating conductors and thermoelectric generators. As a construction material, silicon carbide (SiC) is especially interesting due to its very good thermal, mechanical and radiological properties. SiC, furthermore, performs well when activated by neutron irradiation, with the induced activation subsiding after only a few hours (). This property vector makes it an ideal starting material for use in a wide range of functional elements in high-temperature power engineering, particularly in high-temperature nuclear reactor engineering (e.g. V/HTR) including thermochemical plants for hydrogen generation or Synfuel production. In principle, it is possible to produce all-ceramic assemblies consisting of a thermoelectric generator and a sensor that can provide reliable measurement signals under extreme conditions in the high-temperature range without external power supply. This paper explains the feasibility of laser-joining such modified non-oxide ceramics, how to make electrically conductive joints, and thus, how to design complex assemblies. The parameters required for an optimal laser process to join ceramic materials were determined in extensive preliminary experiments. These investigations focused on the specific electrical resistances and optical properties. Specifically developed brazing fillers were fine-tuned so that the joints of the ceramics improved in terms of their physical interactions, chemical reactions and ability to bond or key chemically and mechanically with the ceramic surfaces. Thereby, the electrical

  18. Electrically conductive ceramics and new joining technology for applications in HTR engineering

    Energy Technology Data Exchange (ETDEWEB)

    Hille, Carmen, E-mail: carmen.hille@ilkdresden.de [Dresden University of Technology (TU Dresden), Institute of Power Engineering, Chair of Hydrogen Technology and Nuclear Power Engineering, George-Baehr-Str. 3b, D-01062 Dresden (Germany); Lippmann, Wolfgang, E-mail: wolfgang.lippmann@tu-dresden.de [Dresden University of Technology (TU Dresden), Institute of Power Engineering, Chair of Hydrogen Technology and Nuclear Power Engineering, George-Baehr-Str. 3b, D-01062 Dresden (Germany); Hurtado, Antonio, E-mail: antonio.hurtado@tu-dresden.de [Dresden University of Technology (TU Dresden), Institute of Power Engineering, Chair of Hydrogen Technology and Nuclear Power Engineering, George-Baehr-Str. 3b, D-01062 Dresden (Germany)

    2012-10-15

    Ceramic constructional components are quite extensively required for operation of high-temperature nuclear reactors. Functional ceramics, in addition to constructional ceramics, are increasingly coming into the focus of research. Ceramic materials are predestined for use at high temperatures and in corrosive atmospheres. Modification of silicon carbide (SiC) by targeted doping, for instance, produces a suitable material for the production of heating conductors and thermoelectric generators. As a construction material, silicon carbide (SiC) is especially interesting due to its very good thermal, mechanical and radiological properties. SiC, furthermore, performs well when activated by neutron irradiation, with the induced activation subsiding after only a few hours (). This property vector makes it an ideal starting material for use in a wide range of functional elements in high-temperature power engineering, particularly in high-temperature nuclear reactor engineering (e.g. V/HTR) including thermochemical plants for hydrogen generation or Synfuel production. In principle, it is possible to produce all-ceramic assemblies consisting of a thermoelectric generator and a sensor that can provide reliable measurement signals under extreme conditions in the high-temperature range without external power supply. This paper explains the feasibility of laser-joining such modified non-oxide ceramics, how to make electrically conductive joints, and thus, how to design complex assemblies. The parameters required for an optimal laser process to join ceramic materials were determined in extensive preliminary experiments. These investigations focused on the specific electrical resistances and optical properties. Specifically developed brazing fillers were fine-tuned so that the joints of the ceramics improved in terms of their physical interactions, chemical reactions and ability to bond or key chemically and mechanically with the ceramic surfaces. Thereby, the electrical

  19. Advanced manufacturing technologies modern machining, advanced joining, sustainable manufacturing

    CERN Document Server

    2017-01-01

    This book provides details and collective information on working principle, process mechanism, salient features, and unique applications of various advanced manufacturing techniques and processes belong. The book is divided in three sessions covering modern machining methods, advanced repair and joining techniques and, finally, sustainable manufacturing. The latest trends and research aspects of those fields are highlighted.

  20. Feasibility of ceramic joining with high energy electron beams

    International Nuclear Information System (INIS)

    Turman, B.N.; Glass, S.J.; Halbleib, J.A.; Helmich, D.R.; Loehman, R.E.; Clifford, J.R.

    1995-01-01

    Joining structural ceramics is possible using high melting point metals such as Mo and Pt that are heated with a high energy electron beam, with the potential for producing joints with high temperature capability. A 10 MeV electron beam can penetrate through 1 cm of ceramic, offering the possibility of buried interface joining. Because of transient heating and the lower heat capacity of the metal relative to the ceramic, a pulsed high power beam has the potential for melting the metal without decomposing or melting the adjacent ceramic. The authors have demonstrated the feasibility of the process with a series of 10 MeV, 1 kW electron beam experiments. Shear strengths up to 28 NTa have been measured for Si 3 N 4 -Mo-Si 3 N 4 . These modest strengths are due to beam non-uniformity and the limited area of bonding. The bonding mechanism appears to be a thin silicide reaction layer. Si 3 N 4 -Si 3 N 4 joints with no metal layer were also produced, apparently bonded an yttrium apatite grain boundary phase