WorldWideScience

Sample records for digital protection settings

  1. MATLAB-SIMULINK BASED INFORMATION SUPPORT FOR DIGITAL OVERCURRENT PROTECTION TEST SETS

    Directory of Open Access Journals (Sweden)

    I. V. Novash

    2017-01-01

    Full Text Available The implementation of information support for PC-based and hardware-software based sets for digital overcurrent protection devices and their models testing using MatLab-Simulink environment is considered. It is demonstrated that the mathematical modeling of a part of the power system – viz. of the generalized electric power object – could be based on rigid and flexible models. Rigid models implemented on the basis of mathematical description of electrical and magnetic circuits of a power system can be considered as a reference model for the simulation results that have been obtained with the aid of another simulation system to be compared with. It is proposed to implement flexible models for generalized electric power object in the MatLabSimulink environment that includes the SimPowerSystems component library targeted to power system modeling. The features of the parameters calculation of the SimPowerSystems component library blocks that the power system model is formed of are considered. Out of the Simulink standard blocks the models of a wye-connected current transformers were composed as well as the digital overcurrent protection, missing in the component library. A comparison of simulation results of one and the same generalized electric power object implemented in various PC-based software packages was undertaken. The divergence of simulation results did not exceed 3 %; the latter allows us to recommend the MatLab-Simulink environment for information support creation for hardware-software based sets for digital overcurrent protection devices testing. The structure of the hardware-software based set for digital overcurrent protection device testing using the Omicron CMC 356 has been suggested. Time to trip comparison between the real digital protection device МР 801 and the model with the parameters which are exactly match the parameters of the prototype device was carried out using the identical test inputs. The results of the tests

  2. Digital integrated protection system

    International Nuclear Information System (INIS)

    Savornin, M.; Furet, M.

    1978-01-01

    As a result of technological progress it is now possible to achieve more elaborate protection functions able to follow more closely the phenomena to be supervised. For this reason the CEA, Framatome and Merlin/Gerin/CERCI have undertaken in commonn to develop a Digital Integrated Protection System (D.I.P.S.). This system is designed with the following aims: to improve the safety of the station, . to improve its availability, . to facilitate installation, . to facilitate tests and maintenance. The main characteristics adopted are: . possibilities of obtaining more elaborate monitoring and protection algorithm treatments, . order 4 redundancy of transducers, associated instruments and signal processing, . possibility of inhibiting part of the protection system, . standardisation of equipment, physical and electrical separation of redundant units, . use of multiplexed connections, . automation of tests. Four flow charts are presented: - DIPS with four APUP (Acquisition and Processing Unit for Protection) - APUP - LSU (Logic Safeguard Unit), number LSU corresponding to number fluidic safeguard circuits, - structure of a function unit, - main functions of the APUP [fr

  3. Digital protection in power plants. Electrical unit and line protection. Digital protection systems for NPP

    International Nuclear Information System (INIS)

    Kaczmarek, A.

    2000-01-01

    In this presentation author deals with the digital protection systems for nuclear power plants. The evolution of protection devices, protection concept for power plants, concept of functional redundancy, references for digital protection, benefits for the customer well as concept fault recorder are presented. (author)

  4. Digital signal processing in power system protection and control

    CERN Document Server

    Rebizant, Waldemar; Wiszniewski, Andrzej

    2011-01-01

    Digital Signal Processing in Power System Protection and Control bridges the gap between the theory of protection and control and the practical applications of protection equipment. Understanding how protection functions is crucial not only for equipment developers and manufacturers, but also for their users who need to install, set and operate the protection devices in an appropriate manner. After introductory chapters related to protection technology and functions, Digital Signal Processing in Power System Protection and Control presents the digital algorithms for signal filtering, followed

  5. DIGITAL DATA PROTECTION USING STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    R. Rejani

    2016-03-01

    Full Text Available In today’s digital world applications from a computer or a mobile device consistently used to get every kind of work done for professional as well as entertainment purpose. However, one of the major issue that a software publisher will face is the issue of piracy. Throughout the last couple of decades, almost all-major or minor software has been pirated and freely circulated across the internet. The impact of the rampant software piracy has been huge and runs into billions of dollars every year. For an independent developer or a programmer, the impact of piracy will be huge. Huge companies that make specialized software often employ complex hardware methods such as usage of dongles to avoid software piracy. However, this is not possible to do for a normal independent programmer of a small company. As part of the research, a new method of software protection that does not need proprietary hardware and other complex methods are proposed in this paper. This method uses a combination of inbuilt hardware features as well as steganography and encryption to protect the software against piracy. The properties or methods used include uniqueness of hardware, steganography, strong encryption like AES and geographic location. To avoid hacking the proposed framework also makes use of self-checks in a random manner. The process is quite simple to implement for any developer and is usable on both traditional PCs as well as mobile environments.

  6. JPEG digital watermarking for copyright protection

    Directory of Open Access Journals (Sweden)

    Vitaliy G. Ivanenko

    2018-05-01

    Full Text Available With the rapid growth of the multimedia technology, copyright protection has become a very important issue, especially for images. The advantages of easy photo distribution are discarded by their possible theft and unauthorized usage on different websites. Therefore, there is a need in securing information with technical methods, for example digital watermarks. This paper reviews digital watermark embedding methods for image copyright protection, advantages and disadvantages of digital watermark usage are produced. Different watermarking algorithms are analyzed. Based on analysis results most effective algorithm is chosen – differential energy watermarking. It is noticed that the method excels at providing image integrity. Digital watermark embedding system should prevent illegal access to the digital watermark and its container. Requirements for digital watermark are produced. Possible image attacks are reviewed. Modern modifications of embedding algorithms are studied. Robustness of the differential energy watermark is investigated. Robustness is a special value, which formulae is given further in the article. DEW method modification is proposed, it’s advantages over original algorithm are described. Digital watermark serves as an additional layer of defense which is in most cases unknown to the violator. Scope of studied image attacks includes compression, filtration, scaling. In conclusion, it’s possible to use DEW watermarking in copyright protection, violator can easily be detected if images with embedded information are exchanged.

  7. Consumer protection act for digital products

    Science.gov (United States)

    Hampel, Viktor E.

    1996-03-01

    This report proposes a `Consumer Protection Act for Digital Products' to support electronic commerce and to control the increasing abuse and lack of security on the national information highways. Patterned after the `Food and Drug Act of 1906 (21 USC)' and subsequent legislation, a new agency similar to that of the FDA would have the authority `to develop administrative policy with regard to the safety, effectiveness, and labeling of digital products and their communications for human use, and to review and evaluate new applications of such products.' Specifically, it is proposed that standards, originally developed by the defense industry for the labeling, enveloping, and authentication of digital products delivered to the Government, be extended to promote global electronic commerce by protecting the intellectual property rights of producers, establishing their liability for the end-use of digital products, and give consumers means for informed decision making and purchase.

  8. Testing Digital Electronic Protection Systems

    CERN Document Server

    Gabourin, S

    2011-01-01

    This paper outlines the core concepts and realisation of the Safe Machine Parameters Controller (SMPC) testbench, based on a VME crate and LabVIEW program. Its main goal is to ensure the correct function of the SMPC for the protection of the CERN accelerator complex. To achieve this, the tester has been built to replicate the machine environment and operation, in order to ensure that the chassis under test is completely exercised. The complexity of the task increases with the number of input combinations. This paper also outlines the benefits and weaknesses of developing a test suite independently of the hardware being tested, using the “V” approach.

  9. Protected interoperability of telecommunications and digital products

    Science.gov (United States)

    Hampel, Viktor E.; Cartier, Gene N.; Craft, James P.

    1994-11-01

    New federal standards for the protection of sensitive data now make it possible to ensure the authenticity, integrity and confidentiality of digital products, and non-repudiation of digital telecommunications. Under review and comment since 1991, the new Federal standards were confirmed this year and provide standard means for the protection of voice and data communications from accidental and wilful abuse. The standards are initially tailored to protect only `sensitive-but-unclassified' (SBU) data in compliance with the Computer Security Act of 1987. These data represent the majority of transactions in electronic commerce, including sensitive procurement information, trade secrets, financial data, product definitions, and company-proprietary information classified as `intellectual property.' Harmonization of the new standards with international requirements is in progress. In the United States, the confirmation of the basic standards marks the beginning of a long-range program to assure discretionary and mandatory access controls to digital resources. Upwards compatibility into the classified domain with multi-level security is a core requirement of the National Information Infrastructure. In this report we review the powerful capabilities of standard Public-Key-Cryptology, the availability of commercial and Federal products for data protection, and make recommendations for their cost-effective use to assure reliable telecommunications and process controls.

  10. Protection coordination: Determination of break point set

    NARCIS (Netherlands)

    Madani, S.M.; Rijanto, H.

    1998-01-01

    Modern power system networks are often multiloop structured. The co-ordinated setting of overcurrent and distance protective relays in such networks is tedious and time consuming. The complicated part of this problem is the determination of a proper minimum set of relays, the so-called minimum

  11. Full Digital Short Circuit Protection for Advanced IGBTs

    OpenAIRE

    谷村, 拓哉; 湯浅, 一史; 大村, 一郎

    2011-01-01

    A full digital short circuit protection method for advanced IGBTs has been proposed and experimentally demonstrated for the first time. The method employs combination of digital circuit, the gate charge sense instead of the conventional sense IGBT and analog circuit configuration. Digital protection scheme has significant advantages in thevprotection speed and flexibility.

  12. Radiation protection and fuzzy set theory

    International Nuclear Information System (INIS)

    Nishiwaki, Y.

    1993-01-01

    In radiation protection we encounter a variety of sources of uncertainties which are due to fuzziness in our cognition or perception of objects. For systematic treatment of this type of uncertainty, the concepts of fuzzy sets or fuzzy measures could be applied to construct system models, which may take into consideration both subjective or intrinsic fuzziness and objective or extrinsic fuzziness. The theory of fuzzy sets and fuzzy measures is still in a developing stage, but its concept may be applied to various problems of subjective perception of risk, nuclear safety, radiation protection and also to the problems of man-machine interface and human factor engineering or ergonomic

  13. 47 CFR 74.706 - Digital TV (DTV) station protection.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital TV (DTV) station protection. 74.706... EXPERIMENTAL RADIO, AUXILIARY, SPECIAL BROADCAST AND OTHER PROGRAM DISTRIBUTIONAL SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.706 Digital TV (DTV) station protection. (a) For purposes of this...

  14. Interference and protection of electromagnetic pulse to digital signal processor

    International Nuclear Information System (INIS)

    Wang Yan; Jiao Hongling; He Shanhong; Pan Chao; Feng Deren; Che Wenquan; Xiong Ying

    2013-01-01

    The effective electromagnetic pulse protection is studied in this paper, first the interference of electromagnetic pulse simulator path is analyzed, including the digital signal processor (DSP) and the discharge circuit of coupling interference and net electricity coupling interference. Using the structure optimization design, the hardware block reinforcement measurement and the setting of open software trap, and the watchdog anti-jamming measures, the interference test is completed such as the central processor core voltage of DSP, input/output (I/O) ports of DSP and the display screen. The experimental results show that the combination of hardware and software protection reinforcement technology is effective, and the interference pulse amplitude of DSP board I/O port and the kernel work voltage are reduced, and the interference duration is reduced from 2 μs to 400 ns. The interference pulse is effectively restrained. (authors)

  15. Adoption of digital safety protection system in Japan

    International Nuclear Information System (INIS)

    Ogiso, Z.

    1998-01-01

    The application of micro-processor-based digital controllers has been widely propagated among various industries in recent years. While in the nuclear power plant industry, the application of them has also been expanding gradually starting from non-safety related systems, taking advantage of their reliability and maintainability over the conventional analog devices. Based on the careful study of the feasibility of digital controllers to the safety protection system, the Tokyo Electric Power Company proposed on May 1989 the adoption of digital controllers to the safety protection system in the Application for Permission of Establishment of Kashiwazaki-Kariwa units 6 and 7 (ABWR-1350Mwe each). MITI, Ministry of International Trade and Industry, the Japanese regulatory body for electric power generating facilities, had approved this application after careful review. This paper describes a series of supporting activities leading to the MITI's approval of the digital safety protection system and the MITI's licensing activities. (author)

  16. Protecting Digital Evidence Integrity by Using Smart Cards

    Science.gov (United States)

    Saleem, Shahzad; Popov, Oliver

    RFC 3227 provides general guidelines for digital evidence collection and archiving, while the International Organization on Computer Evidence offers guidelines for best practice in the digital forensic examination. In the light of these guidelines we will analyze integrity protection mechanism provided by EnCase and FTK which is mainly based on Message Digest Codes (MDCs). MDCs for integrity protection are not tamper proof, hence they can be forged. With the proposed model for protecting digital evidence integrity by using smart cards (PIDESC) that establishes a secure platform for digitally signing the MDC (in general for a whole range of cryptographic services) in combination with Public Key Cryptography (PKC), one can show that this weakness might be overcome.

  17. Digital Technology in the protection of cultural heritage Bao Fan Temple mural digital mapping survey

    Directory of Open Access Journals (Sweden)

    Y. Zheng

    2015-08-01

    Full Text Available Peng Xi county, Sichuan province, the Bao Fan temple mural digitization survey mapping project: we use three-dimensional laserscanning, multi-baseline definition digital photography, multi-spectral digital image acquisition and other technologies for digital survey mapping. The purpose of this project is to use modern mathematical reconnaissance mapping means to obtain accurate mural shape, color, quality and other data. Combined with field investigation and laboratory analysis results, and based on a comprehensive survey and study, a comprehensive analysis of the historical Bao Fan Temple mural artistic and scientific value was conducted. A study of the mural’s many qualities (structural, material, technique, preservation environment, degradation, etc. reveal all aspects of the information carried by the Bao Fan Temple mural. From multiple angles (archeology, architecture, surveying, conservation science and other disciplines an assessment for the Bao Fan Temple mural provides basic data and recommendations for conservation of the mural. In order to achieve the conservation of cultural relics in the Bao Fan Temple mural digitization survey mapping process, we try to apply the advantages of three-dimensional laser scanning equipment. For wall murals this means obtaining three-dimensional scale data from the scan of the building and through the analysis of these data to help determine the overall condition of the settlement as well as the deformation of the wall structure. Survey analysis provides an effective set of conclusions and suggestions for appropriate mural conservation. But before data collection, analysis and research need to first to select the appropriate scanning equipment, set the appropriate scanning accuracy and layout position of stations necessary to determine the scope of required data. We use the fine features of the three-dimensional laser scanning measuring arm to scan the mural surface deformation degradation to reflect

  18. Digital Technology in the protection of cultural heritage Bao Fan Temple mural digital mapping survey

    Science.gov (United States)

    Zheng, Y.

    2015-08-01

    Peng Xi county, Sichuan province, the Bao Fan temple mural digitization survey mapping project: we use three-dimensional laserscanning, multi-baseline definition digital photography, multi-spectral digital image acquisition and other technologies for digital survey mapping. The purpose of this project is to use modern mathematical reconnaissance mapping means to obtain accurate mural shape, color, quality and other data. Combined with field investigation and laboratory analysis results, and based on a comprehensive survey and study, a comprehensive analysis of the historical Bao Fan Temple mural artistic and scientific value was conducted. A study of the mural's many qualities (structural, material, technique, preservation environment, degradation, etc.) reveal all aspects of the information carried by the Bao Fan Temple mural. From multiple angles (archeology, architecture, surveying, conservation science and other disciplines) an assessment for the Bao Fan Temple mural provides basic data and recommendations for conservation of the mural. In order to achieve the conservation of cultural relics in the Bao Fan Temple mural digitization survey mapping process, we try to apply the advantages of three-dimensional laser scanning equipment. For wall murals this means obtaining three-dimensional scale data from the scan of the building and through the analysis of these data to help determine the overall condition of the settlement as well as the deformation of the wall structure. Survey analysis provides an effective set of conclusions and suggestions for appropriate mural conservation. But before data collection, analysis and research need to first to select the appropriate scanning equipment, set the appropriate scanning accuracy and layout position of stations necessary to determine the scope of required data. We use the fine features of the three-dimensional laser scanning measuring arm to scan the mural surface deformation degradation to reflect the actual state of

  19. Localization of equipment for digital plant protection system

    Energy Technology Data Exchange (ETDEWEB)

    Koo, I. S.; Park, H. Y.; Lee, C. K. and others

    2000-10-01

    The objective of this project lies on the development of design requirements, establishment of structure and manufacture procedures, development of the software verification and validation(V and V) techniques of the digital plant protection system. The functional requirements based on the analog protection system and digital design requirements are introduced, the processor and system bus for safety grade equipment are selected and the interface requirements and the design specification have been developed in order to manufacture the quick prototype of the digital plant protection system. The selection guidelines of parts, software development and coding and testing for digital plant protection system have been performed through manufacturing the quick prototype based on the developed design specification. For the software verification and validation, the software review plan and techniques of verification and validation have been researched. The digital validation system is developed in order to verify the quick prototype. The digital design requirements are reviewed by the software safety plan and V and V plans. The formal methods for verifying the safety-grade software are researched, then the methodology of formal analysis and testing have been developed.

  20. Localization of equipment for digital plant protection system

    International Nuclear Information System (INIS)

    Koo, I. S.; Park, H. Y.; Lee, C. K. and others

    2000-10-01

    The objective of this project lies on the development of design requirements, establishment of structure and manufacture procedures, development of the software verification and validation(V and V) techniques of the digital plant protection system. The functional requirements based on the analog protection system and digital design requirements are introduced, the processor and system bus for safety grade equipment are selected and the interface requirements and the design specification have been developed in order to manufacture the quick prototype of the digital plant protection system. The selection guidelines of parts, software development and coding and testing for digital plant protection system have been performed through manufacturing the quick prototype based on the developed design specification. For the software verification and validation, the software review plan and techniques of verification and validation have been researched. The digital validation system is developed in order to verify the quick prototype. The digital design requirements are reviewed by the software safety plan and V and V plans. The formal methods for verifying the safety-grade software are researched, then the methodology of formal analysis and testing have been developed

  1. Setting new protection standards for radiation

    International Nuclear Information System (INIS)

    Clarke, R.H.

    1991-01-01

    The new recommendations of the International Commission on Radiological Protection for dose limits will be published this spring. The recommendations represent a comprehensive review of the state of knowledge of the effects of ionizing radiation, and incorporate this knowledge into a conceptual framework for radiological protection. The background to the recommendations is discussed. (author)

  2. DIGITAL FILTERS IMPLEMENTATION IN MICROPROCESSOR-BASED RELAY PROTECTION

    Directory of Open Access Journals (Sweden)

    Yu. V. Rumiantsev

    2016-01-01

    Full Text Available This article presents the implementation of digital filters used in digital relay protection current measuring elements. Mathematical descriptions of the considered digital filters as well as the computer programs for their coefficients calculation are described. It has been shown that in order to reliable estimate the digital filter performance its input signals waveforms must be close to the actual secondary current waveform of the current transformer to which the digital protection with the estimated digital filter is connected. For these purposes in MatLab–Simulink dynamic simulation environment the power system and the current measuring element models were developed. Performed calculations allowed to reveal that the exponentially decaying DC component which in some cases contains in primary fault current drives the current transformer core into saturation even when its nominal parameters are not exceeded. This results in distortion of the current transformer secondary current which in this case contains higher and inter-harmonics. Moreover, such harmonic content is not completely taking into account during coefficients calculation of the considered digital filters what results in signal magnitude estimation inaccuracy. Comparison of the digital filters response to the above-mentioned input signals allowed to find out such digital filter implementations which enable signal magnitude estimation with a minimum error. Ways of filtering quality improvement concerned with the window functions are proposed. Thus, the joint usage of digital filter and Hamming window allows to achieve the zero value of the signal magnitude gain factor in high-frequency range and substantially suppress all spectral components above 100 Hz. The increasing of the signal magnitude settling time in this case can be reduced by choosing the most optimal parameters of the all components of the current measuring element.

  3. 47 CFR 73.6018 - Digital Class A TV station protection of DTV stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital Class A TV station protection of DTV... TV station protection of DTV stations. Digital Class A TV stations must protect the DTV service that... application for digital operation of an existing Class A TV station or to change the facilities of a digital...

  4. NSTX-U Digital Coil Protection System Software Detailed Design

    Energy Technology Data Exchange (ETDEWEB)

    None

    2014-06-01

    The National Spherical Torus Experiment (NSTX) currently uses a collection of analog signal processing solutions for coil protection. Part of the NSTX Upgrade (NSTX-U) entails replacing these analog systems with a software solution running on a conventional computing platform. The new Digital Coil Protection System (DCPS) will replace the old systems entirely, while also providing an extensible framework that allows adding new functionality as desired.

  5. Digital System Reliability Test for the Evaluation of safety Critical Software of Digital Reactor Protection System

    Directory of Open Access Journals (Sweden)

    Hyun-Kook Shin

    2006-08-01

    Full Text Available A new Digital Reactor Protection System (DRPS based on VME bus Single Board Computer has been developed by KOPEC to prevent software Common Mode Failure(CMF inside digital system. The new DRPS has been proved to be an effective digital safety system to prevent CMF by Defense-in-Depth and Diversity (DID&D analysis. However, for practical use in Nuclear Power Plants, the performance test and the reliability test are essential for the digital system qualification. In this study, a single channel of DRPS prototype has been manufactured for the evaluation of DRPS capabilities. The integrated functional tests are performed and the system reliability is analyzed and tested. The results of reliability test show that the application software of DRPS has a very high reliability compared with the analog reactor protection systems.

  6. Semantically transparent fingerprinting for right protection of digital cinema

    Science.gov (United States)

    Wu, Xiaolin

    2003-06-01

    Digital cinema, a new frontier and crown jewel of digital multimedia, has the potential of revolutionizing the science, engineering and business of movie production and distribution. The advantages of digital cinema technology over traditional analog technology are numerous and profound. But without effective and enforceable copyright protection measures, digital cinema can be more susceptible to widespread piracy, which can dampen or even prevent the commercial deployment of digital cinema. In this paper we propose a novel approach of fingerprinting each individual distribution copy of a digital movie for the purpose of tracing pirated copies back to their source. The proposed fingerprinting technique presents a fundamental departure from the traditional digital watermarking/fingerprinting techniques. Its novelty and uniqueness lie in a so-called semantic or subjective transparency property. The fingerprints are created by editing those visual and audio attributes that can be modified with semantic and subjective transparency to the audience. Semantically-transparent fingerprinting or watermarking is the most robust kind among all existing watermarking techniques, because it is content-based not sample-based, and semantically-recoverable not statistically-recoverable.

  7. Climate-conscious citizenship in a digital urban setting

    Directory of Open Access Journals (Sweden)

    Sophie Esmann Andersen

    2011-06-01

    Full Text Available Climate change has challenged urban life, and as an omnipresent force, Nature sets the agenda for urban living. Using stakeholder theory to conceptualise urban life, we approach Nature as both an omnipresent stakeholder and an issue to be continuously addressed and related to. Adapting the stakeholder focus to relations, stakes and values, we conceptually analyse the digital installation entitled CO2mmitment/CO2nfessions, which was a prominent part of the Aarhus CO2030 exhibition launching the vision of the Danish city of Aarhus to become carbon neutral by the year 2030. In the analysis, we explore how the citizen is framed and invited to enact his/her responsibilities to the natural environment in an urban setting and how the digital mediation facilitates various forms of relations and climate conscious positions, incorporating both narcissistic desires, universal anxiety, moral obligations, ethical virtue and image performance. Statements from the actual confessors/committers exemplify this. Thus, the paper provides insight into understanding the complexity of climate-conscious citizenship as a complex configuration of paradoxical, co-existing ethics and arguments.

  8. Climate-conscious citizenship in a digital urban setting

    Directory of Open Access Journals (Sweden)

    Sophie Esmann Andersen

    2010-12-01

    Full Text Available Climate change has challenged urban life, and as an omnipresent force, Nature sets the agenda for urban living. Using stakeholder theory to conceptualise urban life, we approach Nature as both an omnipresent stakeholder and an issue to be continuously addressed and related to. Adapting the stakeholder focus to relations, stakes and values, we conceptually analyse the digital installation entitled CO2mmitment/CO2nfessions, which was a prominent part of the Aarhus CO2030 exhibition launching the vision of the Danish city of Aarhus to become carbon neutral by the year 2030. In the analysis, we explore how the citizen is framed and invited to enact his/her responsibilities to the natural environment in an urban setting and how the digital mediation facilitates various forms of relations and climate conscious positions, incorporating both narcissistic desires, universal anxiety, moral obligations, ethical virtue and image performance. Statements from the actual confessors/committers exemplify this. Thus, the paper provides insight into understanding the complexity of climate-conscious citizenship as a complex configuration of paradoxical, co-existing ethics and arguments.

  9. Digital breast tomosynthesis (DBT): initial experience in a clinical setting

    International Nuclear Information System (INIS)

    Skaane, Per; Gullien, Randi; Eben, Ellen B.; Haakenaasen, Unni; Naess Jebsen, Ingvild; Krager, Mona; Bjoerndal, Hilde; Ekseth, Ulrika; Jahr, Gunnar

    2012-01-01

    Background: Digital breast tomosynthesis (DBT) is a promising new technology. Some experimental clinical studies have shown positive results, but the future role and indications of this new technique, whether in a screening or clinical setting, need to be evaluated. Purpose: To compare digital mammography and DBT in a side-by-side feature analysis for cancer conspicuity, and to assess whether there is a potential additional value of DBT to standard state-of-the-art conventional imaging work-up with respect to detection of additional malignancies. Material and Methods: The study had ethics committee approval. A total of 129 women underwent 2D digital mammography including supplementary cone-down and magnification views and breast ultrasonography if indicated, as well as digital breast tomosynthesis. The indication for conventional imaging in the clinical setting included a palpable lump in 30 (23%), abnormal mammographic screening findings in 54 (42%), and surveillance in 45 (35%) of the women. The women were examined according to present guidelines, including spot-magnification views, ultrasonography, and needle biopsies, if indicated. The DBT examinations were interpreted several weeks after the conventional imaging without knowledge of the conventional imaging findings. In a later session, three radiologists performed a side-by-side feature analysis for cancer conspicuity in a sample of 50 cases. Results: State-of-the-art conventional imaging resulted in needle biopsy of 45 breasts, of which 20 lesions were benign and a total of 25 cancers were diagnosed. The remaining 84 women were dismissed with a normal/definitely benign finding and without indication for needle biopsy. The subsequent DBT interpretation found suspicious findings in four of these 84 women, and these four women had to be called back for repeated work-up with knowledge of the tomosynthesis findings. These delayed work-ups resulted in two cancers (increasing the cancer detection by 8%) and two

  10. Software V ampersand V methods for digital plant protection system

    International Nuclear Information System (INIS)

    Kim, Hung-Jun; Han, Jai-Bok; Chun, Chong-Son; Kim, Sung; Kim, Kern-Joong.

    1997-01-01

    Careful thought must be given to software design in the development of digital based systems that play a critical role in the successful operation of nuclear power plants. To evaluate the software verification and validation methods as well as to verify its system performance capabilities for the upgrade instrumentation and control system in the Korean future nuclear power plants, the prototype Digital Plant, Protection System (DPPS) based on the Programmable Logic Controller (PLC) has been constructed. The system design description and features are briefly presented, and the software design and software verification and validation methods are focused. 6 refs., 2 figs

  11. Relay protection coordination with generator capability curve, excitation system limiters and power system relay protections settings

    OpenAIRE

    Buha Danilo; Buha Boško; Jačić Dušan; Gligorov Saša; Božilov Marko; Marinković Savo; Milosavljević Srđan

    2016-01-01

    The relay protection settings performed in the largest thermal powerplant (TE "Nikola Tesla B") are reffered and explained in this paper. The first calculation step is related to the coordination of the maximum stator current limiter settings, the overcurrent protection with inverse characteristics settings and the permitted overload of the generator stator B1. In the second calculation step the settings of impedance generator protection are determined, and the methods and criteria according ...

  12. Optimal testing input sets for reduced diagnosis time of nuclear power plant digital electronic circuits

    International Nuclear Information System (INIS)

    Kim, D.S.; Seong, P.H.

    1994-01-01

    This paper describes the optimal testing input sets required for the fault diagnosis of the nuclear power plant digital electronic circuits. With the complicated systems such as very large scale integration (VLSI), nuclear power plant (NPP), and aircraft, testing is the major factor of the maintenance of the system. Particularly, diagnosis time grows quickly with the complexity of the component. In this research, for reduce diagnosis time the authors derived the optimal testing sets that are the minimal testing sets required for detecting the failure and for locating of the failed component. For reduced diagnosis time, the technique presented by Hayes fits best for the approach to testing sets generation among many conventional methods. However, this method has the following disadvantages: (a) it considers only the simple network (b) it concerns only whether the system is in failed state or not and does not provide the way to locate the failed component. Therefore the authors have derived the optimal testing input sets that resolve these problems by Hayes while preserving its advantages. When they applied the optimal testing sets to the automatic fault diagnosis system (AFDS) which incorporates the advanced fault diagnosis method of artificial intelligence technique, they found that the fault diagnosis using the optimal testing sets makes testing the digital electronic circuits much faster than that using exhaustive testing input sets; when they applied them to test the Universal (UV) Card which is a nuclear power plant digital input/output solid state protection system card, they reduced the testing time up to about 100 times

  13. Relay protection coordination with generator capability curve, excitation system limiters and power system relay protections settings

    Directory of Open Access Journals (Sweden)

    Buha Danilo

    2016-01-01

    Full Text Available The relay protection settings performed in the largest thermal powerplant (TE "Nikola Tesla B" are reffered and explained in this paper. The first calculation step is related to the coordination of the maximum stator current limiter settings, the overcurrent protection with inverse characteristics settings and the permitted overload of the generator stator B1. In the second calculation step the settings of impedance generator protection are determined, and the methods and criteria according to which the calculations are done are described. Criteria used to provide the protection to fulfill the backup protection role in the event of malfunction of the main protection of the transmission system. are clarified. The calculation of all protection functions (32 functions of generator B1 were performed in the project "Coordination of relay protection blocks B1 and B2 with the system of excitation and power system protections -TENT B".

  14. Climate conscious citizenship in a digital urban setting

    DEFF Research Database (Denmark)

    Andersen, Sophie Esmann; Nielsen, Anne Ellerup

    2011-01-01

    Climate change has challenged urban life, and as an omnipresent force, Nature sets the agenda for urban living. Using stakeholder theory to conceptualise urban life, we approach Nature as both an omnipresent stakeholder and an issue to be continuously addressed and related to. Adapting the stakeh......Climate change has challenged urban life, and as an omnipresent force, Nature sets the agenda for urban living. Using stakeholder theory to conceptualise urban life, we approach Nature as both an omnipresent stakeholder and an issue to be continuously addressed and related to. Adapting...... explore how the citizen is framed and invited to enact his/her responsibilities to the natural environment in an urban setting and how the digital mediation facilitates various forms of relations and climate conscious positions, incorporating both narcissistic desires, universal anxiety, moral obligations......, ethical virtue and image performance. Statements from the actual confessors/committers exemplify this. Thus, the paper provides insight into understanding the complexity of climate-conscious citizenship as a complex configuration of paradoxical, co-existing ethics and arguments....

  15. Associated diacritical watermarking approach to protect sensitive arabic digital texts

    Science.gov (United States)

    Kamaruddin, Nurul Shamimi; Kamsin, Amirrudin; Hakak, Saqib

    2017-10-01

    Among multimedia content, one of the most predominant medium is text content. There have been lots of efforts to protect and secure text information over the Internet. The limitations of existing works have been identified in terms of watermark capacity, time complexity and memory complexity. In this work, an invisible digital watermarking approach has been proposed to protect and secure the most sensitive text i.e. Digital Holy Quran. The proposed approach works by XOR-ing only those Quranic letters that has certain diacritics associated with it. Due to sensitive nature of Holy Quran, diacritics play vital role in the meaning of the particular verse. Hence, securing letters with certain diacritics will preserve the original meaning of Quranic verses in case of alternation attempt. Initial results have shown that the proposed approach is promising with less memory complexity and time complexity compared to existing approaches.

  16. Testing methodology of embedded software in digital plant protection system

    International Nuclear Information System (INIS)

    Seong, Ah Young; Choi, Bong Joo; Lee, Na Young; Hwang, Il Soon

    2001-01-01

    It is necessary to assure the reliability of software in order to digitalize RPS(Reactor Protection System). Since RPS causes fatal damage on accidental cases, it is classified as Safety 1E class. Therefore we propose the effective testing methodology to assure the reliability of embedded software in the DPPS(Digital Plant Protection System). To test the embedded software effectively in DPPS, our methodology consists of two steps. The first is the re-engineering step that extracts classes from structural source program, and the second is the level of testing step which is composed of unit testing, Integration Testing and System Testing. On each testing step we test the embedded software with selected test cases after the test item identification step. If we use this testing methodology, we can test the embedded software effectively by reducing the cost and the time

  17. Application of fault tree methodology to modeling of the AP1000 plant digital reactor protection system

    International Nuclear Information System (INIS)

    Teolis, D.S.; Zarewczynski, S.A.; Detar, H.L.

    2012-01-01

    The reactor trip system (RTS) and engineered safety features actuation system (ESFAS) in nuclear power plants utilizes instrumentation and control (IC) to provide automatic protection against unsafe and improper reactor operation during steady-state and transient power operations. During normal operating conditions, various plant parameters are continuously monitored to assure that the plant is operating in a safe state. In response to deviations of these parameters from pre-determined set points, the protection system will initiate actions required to maintain the reactor in a safe state. These actions may include shutting down the reactor by opening the reactor trip breakers and actuation of safety equipment based on the situation. The RTS and ESFAS are represented in probabilistic risk assessments (PRAs) to reflect the impact of their contribution to core damage frequency (CDF). The reactor protection systems (RPS) in existing nuclear power plants are generally analog based and there is general consensus within the PRA community on fault tree modeling of these systems. In new plants, such as AP1000 plant, the RPS is based on digital technology. Digital systems are more complex combinations of hardware components and software. This combination of complex hardware and software can result in the presence of faults and failure modes unique to a digital RPS. The United States Nuclear Regulatory Commission (NRC) is currently performing research on the development of probabilistic models for digital systems for inclusion in PRAs; however, no consensus methodology exists at this time. Westinghouse is currently updating the AP1000 plant PRA to support initial operation of plants currently under construction in the United States. The digital RPS is modeled using fault tree methodology similar to that used for analog based systems. This paper presents high level descriptions of a typical analog based RPS and of the AP1000 plant digital RPS. Application of current fault

  18. Reliability Analysis Study of Digital Reactor Protection System in Nuclear Power Plant

    International Nuclear Information System (INIS)

    Guo, Xiao Ming; Liu, Tao; Tong, Jie Juan; Zhao, Jun

    2011-01-01

    The Digital I and C systems are believed to improve a plants safety and reliability generally. The reliability analysis of digital I and C system has become one research hotspot. Traditional fault tree method is one of means to quantify the digital I and C system reliability. Review of advanced nuclear power plant AP1000 digital protection system evaluation makes clear both the fault tree application and analysis process to the digital system reliability. One typical digital protection system special for advanced reactor has been developed, which reliability evaluation is necessary for design demonstration. The typical digital protection system construction is introduced in the paper, and the process of FMEA and fault tree application to the digital protection system reliability evaluation are described. Reliability data and bypass logic modeling are two points giving special attention in the paper. Because the factors about time sequence and feedback not exist in reactor protection system obviously, the dynamic feature of digital system is not discussed

  19. Advanced digital video surveillance for safeguard and physical protection

    International Nuclear Information System (INIS)

    Kumar, R.

    2002-01-01

    Full text: Video surveillance is a very crucial component in safeguard and physical protection. Digital technology has revolutionized the surveillance scenario and brought in various new capabilities like better image quality, faster search and retrieval of video images, less storage space for recording, efficient transmission and storage of video, better protection of recorded video images, and easy remote accesses to live and recorded video etc. The basic safeguard requirement for verifiably uninterrupted surveillance has remained largely unchanged since its inception. However, changes to the inspection paradigm to admit automated review and remote monitoring have dramatically increased the demands on safeguard surveillance system. Today's safeguard systems can incorporate intelligent motion detection with very low rate of false alarm and less archiving volume, embedded image processing capability for object behavior and event based indexing, object recognition, efficient querying and report generation etc. It also demands cryptographically authenticating, encrypted, and highly compressed video data for efficient, secure, tamper indicating and transmission. In physical protection, intelligent on robust video motion detection, real time moving object detection and tracking from stationary and moving camera platform, multi-camera cooperative tracking, activity detection and recognition, human motion analysis etc. is going to play a key rote in perimeter security. Incorporation of front and video imagery exploitation tools like automatic number plate recognition, vehicle identification and classification, vehicle undercarriage inspection, face recognition, iris recognition and other biometric tools, gesture recognition etc. makes personnel and vehicle access control robust and foolproof. Innovative digital image enhancement techniques coupled with novel sensor design makes low cost, omni-directional vision capable, all weather, day night surveillance a reality

  20. A development of digital plant protection system architecture

    International Nuclear Information System (INIS)

    Seong, S. H.; Park, H. Y.; Kim, D. H.; Seo, Y. S.; Gu, I. S.

    2000-01-01

    The digital plant protection system (DPPS) which have a large number of advantages compared to current analog protection system has been developed in various field. The major disadvantages of digital system are, however, vulnerable to faults of processor and software. To overcome the disadvantages, the concept of segment and partition in a channel has been developed. Each segment in a channel is divided from sensor to reactor trip and engineered safety features, which is based on the functional diversity of input signals against the various plant transient phenomena. Each partition allocates the function module to an independent processing module in order to process and isolate the faults of each module of a segment. A communication system based on the deterministic protocol with the predictable and hard real-time characteristics has been developed in order to link the various modules within a segment. The self-diagnostics including online test and periodic test procedures are developed in order to increase the safety, reliability and availability of DPPS. The developed DPPS uses the off-the-shelf DSP (digital signal processor) and adopts VME bus architecture, which have sufficient operation experience in the industry. The verification and validation and quality assurance of software has been developed and the architecture and protocol of deterministic communication system has been researched

  1. Safety aspect of digital reactor protection system in Japan

    International Nuclear Information System (INIS)

    Ogiso, Zen-Ichi

    1998-01-01

    It was early in 1980's that the digital controllers were first applied to nuclear power plant in japan. After that, their application area had been expanding gradually, reaching to the overall integrated digital system including the safety system in Kashiwazaki-Kariwa units 6 and 7. The software for computer-based systems has been produced using the graphical language ''POL'' in Japanese nuclear power plants. It is the fundamental principle that the reliability of the software should be assured through the properly managed quality assurance. The POL-based system is fitted to this principle. In applying POL-based systems to safety system, the MITI, Ministry of International Trade and Industry, identified the licensing issues as the regulatory body, while the utilities had developed the digital technology feasible to the safety application. Through the activities, a specific industrial design guide for the software important to safety was established and the adequacy of the technology was certified through the demonstration tests of the integrated system. In the safety examination of the digital reactor protection system of K-6/7, the application of POL were approved. The POL-based systems in nuclear power plants were successful design and production process of the POL-based systems. This paper describes the activities in licensing and maintaining the computer-based systems by the utilities and manufacturers as well as the MITI. (author)

  2. Digital twins of human robot collaboration in a production setting

    DEFF Research Database (Denmark)

    Malik, Ali Ahmad; Bilberg, Arne

    2018-01-01

    This paper aims to present a digital twin framework to support the design, build and control of human-machine cooperation. In this study, computer simulations are used to develop a digital counterpart of a human-robot collaborative work environment for assembly work. The digital counterpart remains...... updated during the life cycle of the production system by continuously mirroring the physical system for quick and safe embed for continuous improvements. The case of a manufacturing company with human-robot work teams is presented for developing and validating the digital twin framework....

  3. Two-step digit-set-restricted modified signed-digit addition-subtraction algorithm and its optoelectronic implementation.

    Science.gov (United States)

    Qian, F; Li, G; Ruan, H; Jing, H; Liu, L

    1999-09-10

    A novel, to our knowledge, two-step digit-set-restricted modified signed-digit (MSD) addition-subtraction algorithm is proposed. With the introduction of the reference digits, the operand words are mapped into an intermediate carry word with all digits restricted to the set {1, 0} and an intermediate sum word with all digits restricted to the set {0, 1}, which can be summed to form the final result without carry generation. The operation can be performed in parallel by use of binary logic. An optical system that utilizes an electron-trapping device is suggested for accomplishing the required binary logic operations. By programming of the illumination of data arrays, any complex logic operations of multiple variables can be realized without additional temporal latency of the intermediate results. This technique has a high space-bandwidth product and signal-to-noise ratio. The main structure can be stacked to construct a compact optoelectronic MSD adder-subtracter.

  4. Formal Verification of Digital Protection Logic and Automatic Testing Software

    Energy Technology Data Exchange (ETDEWEB)

    Cha, S. D.; Ha, J. S.; Seo, J. S. [KAIST, Daejeon (Korea, Republic of)

    2008-06-15

    - Technical aspect {center_dot} It is intended that digital I and C software have safety and reliability. Project results help the software to acquire license. Software verification technique, which results in this project, can be to use for digital NPP(Nuclear power plant) in the future. {center_dot} This research introduces many meaningful results of verification on digital protection logic and suggests I and C software testing strategy. These results apply to verify nuclear fusion device, accelerator, nuclear waste management and nuclear medical device that require dependable software and high-reliable controller. Moreover, These can be used for military, medical or aerospace-related software. - Economical and industrial aspect {center_dot} Since safety of digital I and C software is highly import, It is essential for the software to be verified. But verification and licence acquisition related to digital I and C software face high cost. This project gives economic profit to domestic economy by using introduced verification and testing technique instead of foreign technique. {center_dot} The operation rate of NPP will rise, when NPP safety critical software is verified with intellectual V and V tool. It is expected that these software substitute safety-critical software that wholly depend on foreign. Consequently, the result of this project has high commercial value and the recognition of the software development works will be able to be spread to the industrial circles. - Social and cultural aspect People expect that nuclear power generation contributes to relieving environmental problems because that does not emit more harmful air pollution source than other power generations. To give more trust and expectation about nuclear power generation to our society, we should make people to believe that NPP is highly safe system. In that point of view, we can present high-reliable I and C proofed by intellectual V and V technique as evidence

  5. 47 CFR 74.708 - Class A TV and digital Class A TV station protection.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Class A TV and digital Class A TV station... SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.708 Class A TV and digital Class A TV station protection. (a) The Class A TV and digital Class A TV station protected contours are specified in...

  6. 47 CFR 74.792 - Digital low power TV and TV translator station protected contour.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital low power TV and TV translator station... SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.792 Digital low power TV and TV translator station protected contour. (a) A digital low power TV or TV translator will be protected from...

  7. Digital integrated protection system: Quantitative methods for dependability evaluation

    International Nuclear Information System (INIS)

    Krotoff, H.; Benski, C.

    1986-01-01

    The inclusion of programmed digital techniques in the SPIN system provides the used with the capability of performing sophisticated processing operations. However, it causes the quantitative evaluation of the overall failure probabilities to become somewhat more intricate by reason that: A single component may be involved in several functions; Self-tests may readily be incorporated for the purpose of monitoring the dependable operation of the equipment at all times. This paper describes the methods as implemented by MERLIN GERIN for the purpose of evaluating: The probabilities for the protective actions not to be initiated (dangerous failures); The probabilities for such protective actions to be initiated accidentally. Although the communication is focused on the programmed portion of the SPIN (UAIP) it will also deal with the evaluation performed within the scope of study works that do not exclusively cover the UAIPs

  8. Staged-Fault Testing of Distance Protection Relay Settings

    Science.gov (United States)

    Havelka, J.; Malarić, R.; Frlan, K.

    2012-01-01

    In order to analyze the operation of the protection system during induced fault testing in the Croatian power system, a simulation using the CAPE software has been performed. The CAPE software (Computer-Aided Protection Engineering) is expert software intended primarily for relay protection engineers, which calculates current and voltage values during faults in the power system, so that relay protection devices can be properly set up. Once the accuracy of the simulation model had been confirmed, a series of simulations were performed in order to obtain the optimal fault location to test the protection system. The simulation results were used to specify the test sequence definitions for the end-to-end relay testing using advanced testing equipment with GPS synchronization for secondary injection in protection schemes based on communication. The objective of the end-to-end testing was to perform field validation of the protection settings, including verification of the circuit breaker operation, telecommunication channel time and the effectiveness of the relay algorithms. Once the end-to-end secondary injection testing had been completed, the induced fault testing was performed with three-end lines loaded and in service. This paper describes and analyses the test procedure, consisting of CAPE simulations, end-to-end test with advanced secondary equipment and staged-fault test of a three-end power line in the Croatian transmission system.

  9. A comprehensive Software Copy Protection and Digital Rights Management platform

    Directory of Open Access Journals (Sweden)

    Ayman Mohammad Bahaa-Eldin

    2014-09-01

    Full Text Available This article proposes a Powerful and Flexible System for Software Copy Protection (SCP and Digital Rights Management (DRM based on Public Key Infrastructure (PKI standards. Software protection is achieved through a multi-phase methodology with both static and dynamic processing of the executable file. The system defeats most of the attacks and cracking techniques and makes sure that the protected software is never in a flat form, with a suitable portion of it always being encrypted during execution. A novel performance-tuning algorithm is proposed to lower the overhead of the protection process to its minimum depending on the software dynamic execution behavior. All system calls to access resources and objects such as files, and input/output devices are intercepted and encapsulated with secure rights management code to enforce the required license model. The system can be integrated with hardware authentication techniques (like dongles, and to Internet based activation and DRM servers over the cloud. The system is flexible to apply any model of licensing including state-based license such as expiration dates and number of trials. The usage of a standard markup language (XrML to describe the license makes it easier to apply new licensing operations like re-sale and content rental.

  10. Skin protection creams in medical settings: successful or evil?

    Directory of Open Access Journals (Sweden)

    Charlier Corinne

    2008-07-01

    Full Text Available Abstract Background Chronic exposure to mild irritants including cleansing and antiseptic products used for hand hygiene generates insults to the skin. To avoid unpleasant reactions, skin protection creams are commonly employed, but some fail to afford protection against a variety of xenobiotics. In this study, two skin protection creams were assayed comparatively looking for a protective effect if any against a liquid soap and an alcohol-based gel designed for hand hygiene in medical settings. Methods Corneosurfametry and corneoxenometry are two in vitro bioessays which were selected for their good reproducibility, sensitivity and ease of use. A Kruskal-Wallis ANOVA test followed by the Dunn test was realized to compare series of data obtained. Results Significant differences in efficacy were obtained between the two assayed skin protection creams. One of the two tested creams showed a real protective effect against mild irritants, but the other tested cream presented an irritant potential in its application with mild irritants. Conclusion The differences observed for the two tested skin protection creams were probably due to their galenic composition and their possible interactions with the offending products. As a result, the present in vitro bioassays showed contrasted effects of the creams corresponding to either a protective or an irritant effect on human stratum corneum.

  11. 47 CFR 73.6016 - Digital Class A TV station protection of TV broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital Class A TV station protection of TV... Class A TV station protection of TV broadcast stations. Digital Class A TV stations must protect authorized TV broadcast stations, applications for minor changes in authorized TV broadcast stations filed on...

  12. Recent digital control and protection retrofits in power plants

    International Nuclear Information System (INIS)

    Fournier, R.D.; Hammer, M.; Smith, J.E.

    1987-01-01

    Digital computers are now being retrofitted to all types of power plants, replacing analog equipment and solving problems such as equipment obsolescence and low reliability. Three diverse examples of retrofits are presented in this paper, representing trends in man/machine interface design at an oil-fired plant, protection system in pressurized heavy-water reactors, and control systems in light water reactors (LWRs). The examples have been chosen to illustrate diverse reasons for the retrofits and the benefits derived. The cases presented report retrofits at Northern States Power's Monticello boiling water reactor, New Brunswick Electric Power Commission's (NBEPC's) Point Lepreau Nuclear Generating Station, and finally NBEPC's oil-fired plant at Courtney Bay

  13. 47 CFR 73.6017 - Digital Class A TV station protection of Class A TV and digital Class A TV stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital Class A TV station protection of Class A TV and digital Class A TV stations. 73.6017 Section 73.6017 Telecommunication FEDERAL... Broadcast Stations § 73.6017 Digital Class A TV station protection of Class A TV and digital Class A TV...

  14. Insights from a reliability review of digital plant protection system

    International Nuclear Information System (INIS)

    Kim, I.S.; Hwang, S.W.; Kim, B.S.; Jeong, C.H.; Oh, S.H.

    2001-01-01

    The full text follows: As part of the design efforts for Ulchin nuclear power plant units 5 and 6 of Korea, a reliability analysis of digital plant protection system (DPPS) was performed by ABB-CE. An independent review of the DPPS reliability analysis was undertaken by Hanyang University to assist Korea Institute of Nuclear Safety (KINS), the nuclear regulatory body of Korea, in evaluating the design acceptability of the digital system. The DPPS is designed to encompass both reactor trip function and ESFAS (engineered safety feature actuation system) initiation function. The major methods used by the ABB-CE to assess the Ulchin 5-6 DPPS reliability are failure mode and effect analysis (FMEA) and fault tree analysis. Hence, our independent review was conducted focusing on: -) the establishment of review criteria based on various sources, such as the standard review plan of KINS, 10CFR50 Appendix A, IEEE standards 279, 577, and 603; -) the suitability of the FMEA and fault tree analysis for the Ulchin 5-6 DPPS, including the specific methods used (e.g., for human reliability analysis and common-cause failure analysis), the assumptions made (e.g., with respect to test frequency and watchdog timer coverage), and the data employed (e.g., CCF parameter, human error probability, and processor failure rate); and -) the design acceptability of the DPPS especially as compared to the analog plant protection system from a reliability and safety perspective. The paper shall also discuss key issues requiring further in-depth investigation, such as reliability of programmable logic controllers (PLCs), coverage factor of watchdog timers, and susceptibility of redundant digital units to common cause failure. Sensitivity analyses were carried out to investigate the impact of several parameters of special interest, like the coverage factor of watchdog timer and human error probability (e.g. an operator error to manually trip the reactor, or to mis-calibrate the trip parameters) on

  15. 56-Day Complete Set of all of the Digital Enroute Charts - Aeronautical Information Services Digital Products

    Data.gov (United States)

    Department of Transportation — The following ZIP files contain all of the Digital Enroute charts, except for Caribbean charts, for a given effective date range. Due to the large file sizes, it is...

  16. 47 CFR 73.6014 - Protection of digital Class A TV stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Protection of digital Class A TV stations. 73... Class A TV stations. An application to change the facilities of an existing Class A TV station will not be accepted if it fails to protect authorized digital Class A TV stations and applications for...

  17. Digital privacy in Asia: Setting the agenda | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-06-09

    Jun 9, 2016 ... The report, A New Dawn: Privacy in Asia, summarizes the findings of the research. ... among citizens about protecting their personal data and Internet privacy. ... A study on mobile phone use by the poor has resulted in the ...

  18. A COMPREHENSIVE MODEL FOR THE POWER TRANSFORMER DIGITAL DIFFERENTIAL PROTECTION FUNCTIONING RESEARCH

    Directory of Open Access Journals (Sweden)

    Yu. V. Rumiantsev

    2016-01-01

    Full Text Available This article presents a comprehensive model for the two-winding power transformer digital differential protection functioning research. Considered comprehensive model is developed in MatLab-Simulink dynamic simulation environment with the help of SimPowerSystems component library and includes the following elements: power supply, three-phase power transformer, wye-connected current transformers and two-winding power transformer digital differential protection model. Each element of the presented model is described in the degree sufficient for its implementation in the dynamic simulation environment. Particular attention is paid to the digital signal processing principles and to the ways of differential and restraining currents forming of the considered comprehensive model main element – power transformer digital differential protection. With the help of this model the power transformer digital differential protection functioning was researched during internal and external faults: internal short-circuit, external short-circuit with and without current transformers saturation on the power transformer low-voltage side. Each experiment is illustrated with differential and restraining currents waveforms of the digital differential protection under research. Particular attention was paid to the digital protection functioning analysis during power transformer abnormal modes: overexcitation and inrush current condition. Typical current waveforms during these modes were showed and their harmonic content was investigated. The causes of these modes were analyzed in details. Digital differential protection blocking algorithms based on the harmonic content were considered. Drawbacks of theses algorithms were observed and the need of their further technical improvement was marked.

  19. A New GPS-based Digital Protection System for Smart Grids in Loop Structure

    Directory of Open Access Journals (Sweden)

    X. Liu

    2014-12-01

    Full Text Available This paper presents a new digital protection system to solve the protection challenges in future smart grids, i.e., fast protection and fault isolation in a loop-structured system with limited magnitude of fault current. The new system combines two protection algorithms, i.e., a differential protection as the primary algorithm and an overcurrent protection as the backup one. The new system uses real-time Ethernet and digital data acquisition techniques to overcome the restriction on data transmission over large grids. The current measurements at different locations are time-synchronized by GPS clocks, and then transmitted to a central computer via the Ethernet. As opposed to digital relays which often contain PMU functionality nowadays, this approach uses time stamps on the instantaneous current values. We build a prototype of the new system on a test-bed. The results from simulations and experiments have demonstrated that the protection system achieves fast and accurate protection.

  20. 47 CFR 73.6019 - Digital Class A TV station protection of low power TV, TV translator, digital low power TV and...

    Science.gov (United States)

    2010-10-01

    ... power TV, TV translator, digital low power TV and digital TV translator stations. 73.6019 Section 73... low power TV, TV translator, digital low power TV and digital TV translator stations. An application... A TV station will not be accepted if it fails to protect authorized low power TV, TV translator...

  1. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of digital computer and communication systems and networks. 73.54 Section 73.54 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION... security program as a component of the physical protection program. (c) The cyber security program must be...

  2. Software reliability evaluation of digital plant protection system development process using V and V

    International Nuclear Information System (INIS)

    Lee, Na Young; Hwang, Il Soon; Seong, Seung Hwan; Oh, Seung Rok

    2001-01-01

    In the nuclear power industry, digital technology has been introduced recently for the Instrumentation and Control (I and C) of reactor systems. For its application to the safety critical system such as Reactor Protection System(RPS), a reliability assessment is indispensable. Unlike traditional reliability models, software reliability is hard to evaluate, and should be evaluated throughout development lifecycle. In the development process of Digital Plant Protection System(DPPS), the concept of verification and validation (V and V) was introduced to assure the quality of the product. Also, test should be performed to assure the reliability. Verification procedure with model checking is relatively well defined, however, test is labor intensive and not well organized. In this paper, we developed the methodological process of combining the verification with validation test case generation. For this, we used PVS for the table specification and for the theorem proving. As a result, we could not only save time to design test case but also get more effective and complete verification related test case set. Add to this, we could extract some meaningful factors useful for the reliability evaluation both from the V and V and verification combined tests

  3. Copy Protection in Jet Set Willy: developing methodology for retrogame archaeology

    Directory of Open Access Journals (Sweden)

    John Aycock

    2017-04-01

    Full Text Available Video games, and more generally computer games, are unquestionably technological artefacts that have cultural significance. Old computer games in particular had to function under technical constraints that would be alien to many modern programmers, while at the same time providing something novel and at first foreign to consumers. How did their creators accomplish their technical feats, and what impact did that have for the player-consumer? The study of 'retro' computer games' implementation is one topic within the nascent area of archaeogaming. Digital rights management (DRM continues to be a major issue in the protection and distribution of content in electronic form. In this article, we study an early example of the implementation of copy protection in the 1984 game Jet Set Willy, something that comprises both physical and digital artefacts. It acts as a vehicle to illustrate a number of methods that we used to understand game implementation, culminating in a full reconstruction of the technique. The methods we cover include: 'traditional' research, along with its limitations in this context; code and data analysis; hypothesis testing; reconstruction. Through this positivist experimental approach, our results are both independently verifiable and repeatable. We also approach the complex context of early DRM, its hacks and workarounds by the player community, and what precipitated the design choices made for this particular game.

  4. Influence of settings management and protection status on recreational uses and pressures in marine protected areas.

    Science.gov (United States)

    Gonson, Charles; Pelletier, Dominique; Alban, Frederique; Giraud-Carrier, Charlotte; Ferraris, Jocelyne

    2017-09-15

    Coastal populations and tourism are growing worldwide. Consequently outdoor recreational activity is increasing and diversifying. While Marine Protected Areas (MPAs) are valuable for mitigating anthropogenic impacts, recreational uses are rarely monitored and studied, resulting in a lack of knowledge on users' practices, motivation and impacts. Based on boat counts and interview data collected in New Caledonia, we i) explored factors affecting user practices and motivations, ii) constructed fine-scale pressure indices covering activities and associated behaviors, and iii) assessed the relationships between user practices and site selection. User practices were found to depend on protection status, boat type and user characteristics. Pressure indices were higher within no-take MPAs, except for fishing. We found significant relationships between user practices and settings characteristics. In the context of increasing recreational uses, these results highlight options for managing such uses through settings management without jeopardizing the social acceptance of MPAs or the attainment of conservation goals. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. 47 CFR 74.710 - Digital low power TV and TV translator station protection.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital low power TV and TV translator station... SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.710 Digital low power TV and TV translator station protection. (a) An application to construct a new low power TV, TV translator, or TV...

  6. Integrated, digital experiment transient control and safety protection of an in-pile test

    International Nuclear Information System (INIS)

    Thomas, R.W.; Whitacre, R.F.; Klingler, W.B.

    1982-01-01

    The Sodium Loop Safety Facility experimental program has demonstrated that in-pile loop fuel failure transient tests can be digitally controlled and protected with reliability and precision. This was done in four nuclear experiments conducted in the Engineering Test Reactor operated by EG and G Idaho, Inc., at the Idaho National Engineering Laboratory. Loop sodium flow and reactor power transients can be programmed to sponsor requirements and verified prior to the test. Each controller has redundancy, which reduces the effect of single failures occurring during test transients. Feedback and reject criteria are included in the reactor power control. Timed sequencing integrates the initiation of the controllers, programmed safety set-points, and other experiment actions (e.g., planned scram). Off-line and on-line testing is included. Loss-of-flow, loss-of-piping-integrity, boiling-window, transient-overpower, and local fault tests have been successfully run using this system

  7. Using geographical and taxonomic metadata to set priorities in specimen digitization

    Directory of Open Access Journals (Sweden)

    Walter G. Berendsohn

    2010-10-01

    Full Text Available Digitizing the information carried by specimens in natural history collections is a key endeavor providing falsifiable information about past and present biodiversity on a global scale, for application in a variety of research fields far beyond the current application in biosystematics. Existing digitization efforts are driven by individual institutional necessities and are not coordinated on a global scale. This led to an over-all information resource that is patchy in taxonomic and geographic coverage as well as in quality. Digitizing all specimens is not an achievable aim at present, so that priorities need to be set. Most biodiversity studies are both taxonomically and geographically restricted, but access to non-digitized collection information is almost exclusively by taxon name. Creating a “Geotaxonomic Index” providing metadata on the number of specimens from a specific geographic region belonging to a specific higher taxonomic category may provide a means to attract the attention of researchers and governments towards relevant non-digitized holdings of the collections and set priorities for their digitization according to the needs of information users outside the taxonomic community.

  8. Robust watermarking on copyright protection of digital originals

    Energy Technology Data Exchange (ETDEWEB)

    Gu, C; Hu, X Y, E-mail: guchong527@gmail.co, E-mail: emma_huxy@yahoo.com.c [College of Packaging and Printing Engineering, Tianjin University of Science and Technology, Tianjin, 300222 (China)

    2010-06-01

    The issues about the difference between digital vector originals and raster originals were discussed. A new algorithm based on displacing vertices to realize the embedding and extracting of digital watermarking in vector data was proposed after that. The results showed that the watermark produced by the method is resistant against translation, scaling, rotation, additive random noise; it is also resistant, to some extent, against cropping. This paper also modified the DCT raster image watermarking algorithm, using a bitmap image as watermark embedded into target images, instead of some meaningless serial numbers or simple symbols. The embedding and extraction part of these two digital watermark systems achieved with software. Experiments proved that both algorithms are not only imperceptible, but also have strong resistance against the common attracts, which can prove the copyright more effectively.

  9. Common Cause Failure Analysis for the Digital Plant Protection System

    International Nuclear Information System (INIS)

    Kagn, Hyun Gook; Jang, Seung Cheol

    2005-01-01

    Safety-critical systems such as nuclear power plants adopt the multiple-redundancy design in order to reduce the risk from the single component failure. The digitalized safety-signal generation system is also designed based on the multiple-redundancy strategy which consists of more redundant components. The level of the redundant design of digital systems is usually higher than those of conventional mechanical systems. This higher redundancy would clearly reduce the risk from the single failure of components, but raise the importance of the common cause failure (CCF) analysis. This research aims to develop the practical and realistic method for modeling the CCF in digital safety-critical systems. We propose a simple and practical framework for assessing the CCF probability of digital equipment. Higher level of redundancy causes the difficulty of CCF analysis because it results in impractically large number of CCF events in the fault tree model when we use conventional CCF modeling methods. We apply the simplified alpha-factor (SAF) method to the digital system CCF analysis. The precedent study has shown that SAF method is quite realistic but simple when we consider carefully system success criteria. The first step for using the SAF method is the analysis of target system for determining the function failure cases. That is, the success criteria of the system could be derived from the target system's function and configuration. Based on this analysis, we can calculate the probability of single CCF event which represents the CCF events resulting in the system failure. In addition to the application of SAF method, in order to accommodate the other characteristics of digital technology, we develop a simple concept and several equations for practical use

  10. 30 CFR 75.601-1 - Short circuit protection; ratings and settings of circuit breakers.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Short circuit protection; ratings and settings... Trailing Cables § 75.601-1 Short circuit protection; ratings and settings of circuit breakers. Circuit breakers providing short circuit protection for trailing cables shall be set so as not to exceed the...

  11. Tennessee Valley Authority becomes first to install digital process protection system

    International Nuclear Information System (INIS)

    Miller, W.; Doyle, J.

    1991-01-01

    Westinghouse Pressurized Water Reactors were originally furnished with analog process protection equipment of various vintages. The older equipment is quickly reaching the point of obsolescence, becoming costly to maintain and operate, its qualification increasingly difficult to achieve. Newer digital-based systems offer improved performance, automatic calibration, and streamlined surveillance test features, as discussed here. For these reasons, the Tennessee Valley Authority installed the world's first digital process protection system, complete with automatic test and calibration features, in its Sequoyah units 1 and 2 last year. The US utility replaced its ageing analog system with Westinghouse Electric's Eagle 21 Process Protection System during a routine maintenance shutdown in a record 23 days. (author)

  12. Development of digital power measuring and protecting equipment for SPRR-300 reactor

    International Nuclear Information System (INIS)

    Wang Xuejie; Li Xi'an; Zhu Shilei

    2005-01-01

    A measuring and protecting equipment of reactor power based on Single-Chip Microcomputer is introduced in this paper. The composition of hardware and the major control idea about the software for the equipment are presented. Digitizing the measuring data from nuclear instruments is precondition of reactor control and protection system which would be computerizing, and it is also an application of redundancy and variety of reactor protection system in nuclear measuring instruments. At last the working state is described. (authors)

  13. KFUPM-KAUST Red Sea model: Digital viscoelastic depth model and synthetic seismic data set

    KAUST Repository

    Al-Shuhail, Abdullatif A.; Mousa, Wail A.; Alkhalifah, Tariq Ali

    2017-01-01

    The Red Sea is geologically interesting due to its unique structures and abundant mineral and petroleum resources, yet no digital geologic models or synthetic seismic data of the Red Sea are publicly available for testing algorithms to image and analyze the area's interesting features. This study compiles a 2D viscoelastic model of the Red Sea and calculates a corresponding multicomponent synthetic seismic data set. The models and data sets are made publicly available for download. We hope this effort will encourage interested researchers to test their processing algorithms on this data set and model and share their results publicly as well.

  14. KFUPM-KAUST Red Sea model: Digital viscoelastic depth model and synthetic seismic data set

    KAUST Repository

    Al-Shuhail, Abdullatif A.

    2017-06-01

    The Red Sea is geologically interesting due to its unique structures and abundant mineral and petroleum resources, yet no digital geologic models or synthetic seismic data of the Red Sea are publicly available for testing algorithms to image and analyze the area\\'s interesting features. This study compiles a 2D viscoelastic model of the Red Sea and calculates a corresponding multicomponent synthetic seismic data set. The models and data sets are made publicly available for download. We hope this effort will encourage interested researchers to test their processing algorithms on this data set and model and share their results publicly as well.

  15. Information Storage and Management Storing, Managing, and Protecting Digital Information

    CERN Document Server

    EMC

    2009-01-01

    The spiraling growth of digital information makes the ISM book a "must have" addition to your IT reference library. This exponential growth has driven information management technology to new levels of sophistication and complexity, exposing a skills gap that challenge IT managers and professionals alike. The ISM book, written by storage professionals from EMC Corporation, takes an ' open' approach to teaching information storage and management, focusing on concepts and principles – rather that product specifics – that can be applied in all IT environments. The book enables existing

  16. Improvement of the Cubic Spline Function Sets for a Synthesis of the Axial Power Distribution of a Core Protection System

    International Nuclear Information System (INIS)

    Koo, Bon-Seung; Lee, Chung-Chan; Zee, Sung-Quun

    2006-01-01

    Online digital core protection system(SCOPS) for a system-integrated modular reactor is being developed as a part of a plant protection system at KAERI. SCOPS calculates the minimum CHFR and maximum LPD based on several online measured system parameters including 3-level ex-core detector signals. In conventional ABB-CE digital power plants, cubic spline synthesis technique has been used in online calculations of the core axial power distributions using ex-core detector signals once every 1 second in CPC. In CPC, pre-determined cubic spline function sets are used depending on the characteristics of the ex-core detector responses. But this method shows an unnegligible power distribution error for the extremely skewed axial shapes by using restrictive function sets. Therefore, this paper describes the cubic spline method for the synthesis of an axial power distribution and it generates several new cubic spline function sets for the application of the core protection system, especially for the severely distorted power shapes needed reactor type

  17. An evaluation method of fault-tolerance for digital plant protection system in nuclear power plants

    International Nuclear Information System (INIS)

    Lee, Jun Seok; Kim, Man Cheol; Seong, Poong Hyun; Kang, Hyun Gook; Jang, Seung Cheol

    2005-01-01

    In recent years, analog based nuclear power plant (NPP) safety related instrumentation and control (I and C) systems have been replaced to modern digital based I and C systems. NPP safety related I and C systems require very high design reliability compare to the conventional digital systems so that reliability assessment is very important. In the reliability assessment of the digital system, fault tolerance evaluation is one of the crucial factors. However, the evaluation is very difficult because the digital system in NPP is very complex. In this paper, the simulation based fault injection technique on simplified processor is used to evaluate the fault-tolerance of the digital plant protection system (DPPS) with high efficiency with low cost

  18. SPIN. First Digital Protection System Feedback of experience ... ... after 30 years

    International Nuclear Information System (INIS)

    Kosicki, M.; Pacuta, J.; Kamga, J.; Burel, J.-P.

    2010-01-01

    In this lecture Mr Burel presents experience with the software SPIN - the first digital protection system feedback. After thirty years of operation, the results are positive: - System is in correct operation and still maintained with spare parts available; - No spurious trip or actuation due to the system itself. A project for modernization is prepared to replace the digital part with a new digital technology designed with today's: - Components (SPINLINE 3); - methods and tools (Software development); - Standards (EMI/RFI - qualification), in order to allow customer to add some new functional needs and to keep the system in operation for thirty more years.

  19. Geological settings of the protected Selisoo mire (northeastern Estonia threatened by oil shale mining

    Directory of Open Access Journals (Sweden)

    Helen Hiiemaa

    2014-05-01

    Full Text Available The protected Selisoo mire in northeastern Estonia is located above valuable oil shale resources, partly in the permitted mining area. We describe in detail the geomorphology and geological setting of the mire to understand the natural preconditions for its formation, development and preservation. We used the LiDAR-based digital elevation model for relief analysis, mapped the peat thickness with ground-penetrating radar and described the Quaternary cover through corings. Ridges, oriented perpendicular to the generally southward-sloping terrain, and shallow depressions at the surface of mineral soil have influenced mire formation and its spatio-temporal dynamics. The Quaternary cover under the mire is thin and highly variable. Therefore the mire is hydro­geologically insufficiently isolated from the limestone bedrock that is drained by the nearby oil shale mine and consequently the mining activities approaching the mire may have a negative influence on the wetland and proposed Natura 2000 site. Natura 2000 type wetlands, both protected or currently outside the nature reserves, cover a significant portion of the prospective oil shale mining areas. The distribution and resilience of those sites may significantly influence further utilization of oil shale resources.

  20. Protecting the Goodies in the Digital Candy Store.

    Science.gov (United States)

    Wasch, Kenneth

    1994-01-01

    Discussion of the protection of intellectual property on the Internet suggests strong regulation of content. Topics addressed include economic losses; access control; encryption; educating the public on copyright law; illegal bulletin board systems; software piracy; copyright infringement; downloading copyrighted material; fair use; and copyright…

  1. Developing Archive Information Packages for Data Sets: Early Experiments with Digital Library Standards

    Science.gov (United States)

    Duerr, R. E.; Yang, M.; Gooyabadi, M.; Lee, C.

    2008-12-01

    The key to interoperability between systems is often metadata, yet metadata standards in the digital library and data center communities have evolved separately. In the data center world NASA's Directory Interchange Format (DIF), the Content Standard for Digital Geospatial Metadata (CSDGM), and most recently the international Geographic Information: Metadata (ISO 19115:2003) are used for descriptive metadata at the data set level to allow catalog interoperability; but use of anything other than repository- based metadata standards for the individual files that comprise a data set is rare, making true interoperability, at the data rather than data set level, across archives difficult. While the Open Archival Information Systems (OAIS) Reference Model with its call for creating Archive Information Packages (AIP) containing not just descriptive metadata but also preservation metadata is slowly being adopted in the community, the PREservation Metadata Implementation Strategies (PREMIS) standard, the only extant OAIS- compliant preservation metadata standard, has scarcely even been recognized as being applicable to the community. The digital library community in the meantime has converged upon the Metadata Encoding and Transmission Standard (METS) for interoperability between systems as evidenced by support for the standard by digital library systems such as Fedora and Greenstone. METS is designed to allow inclusion of other XML-based standards as descriptive and administrative metadata components. A recent Stanford study suggests that a combination of METS with included FGDC and PREMIS metadata could work well for individual granules of a data set. However, some of the lessons learned by the data center community over the last 30+ years of dealing with digital data are 1) that data sets as a whole need to be preserved and described and 2) that discovery and access mechanisms need to be hierarchical. Only once a user has reviewed a data set description and determined

  2. A Design and Research on Protection of Architectural Heritage Based on Digital Technology

    Directory of Open Access Journals (Sweden)

    Hou Shuang Qing

    2016-01-01

    Full Text Available In the era of digital information, how to reasonably use new-tech and idea for the architectural heritage protection remains urgent. In terms of digital protection, 3D laser scanning technology can perfectly remedy the manual measurement limitation thus correctly obtaining the relevant data. Via analysis, we find that the architectural heritage bears in itself the parameterized characteristic. As Building Information Modeling (BIM can help realize the parametric design, we proposed a feasible Architectural Heritage Information Model with the BIM “family” connecting architectural heritage and BIM. Finally, the parameter-induced graphic driving is achieved based on the relation between the two.

  3. The digital reactor protection system for the instrumentation and control of reactor TRIGA PUSPATI (RTP)

    International Nuclear Information System (INIS)

    Nurfarhana Ayuni Joha; Izhar Abu Hussin; Mohd Idris Taib; Zareen Khan Abdul Jalil Khan

    2010-01-01

    Reactor Protection System (RPS) is important for Reactor Instrumentation and Control System. The RPS comprises all redundant electrical devices and circuitry involved in the generation of those initiating signals associated to the trip protective function. The instrumentation system for the RPS provides automatic protection signals against unsafe and improper reactor operation. The physical separation is provided for all of the redundant instrumentation systems to preserve redundancy. The safety protection systems using circuits composed of analog instruments and relays with relay contacts is difficult to realize from various reasons. Therefore, an application of digital technology can be said a logical conclusion also in the light of its functional superiority. (author)

  4. Measuring relais as an alternative to digital protective systems; Messende Relais als Alternative zu digitalen Schutzsystemen

    Energy Technology Data Exchange (ETDEWEB)

    Wolf, Rainer [Ingenieurgemeinschaft Energieversorgung GbR, Meiningen (Germany)

    2011-07-15

    In order to keep the occasionally severe consequences of electrical faults in switchgear, cables and transformers as low as possible, to reduce the risk to persons and to continue the operation of the not disturbed grid, measuring relays provide for fast and selective fault detection and fault shutdown. In general, it is thought at digital protection systems which are designed for example as a differential protection, distance protection and overcurrent protection. Some applications, however, get along with a lower level of equipment technology, and can be realized more cost-effectively.

  5. REALIZING LEGAL PROTECTION FOR OUTSOURCING WORKERS THROUGH EMPLOYMENT SETTING SYNCHRONIZATION

    Directory of Open Access Journals (Sweden)

    Khairani

    2015-10-01

    Full Text Available Debating on the outsourcing existence in Law No.13 of 2003 regarding to Labor, is still continuing even though there has been a decision of Indonesia Constitutional Court (MK who stated the rules that the content of Article 65 paragraph (7 and Article 66 paragraph (2 has been outlawed. The problems of this research are: How is the outsourcing concept of regulating in the labor law and the regulation of the labor minister No. 19 of 2012; and What effort to keep the outsourcing arrangement can provide legal protection for workers? This research use juridical normative method. The research finds that some of the concept is in contradiction with the 1945 constitution and another Law which is related to the protection of labor, and even with the other articles that exists in the Labor Law itself so thats the norm contains contradictio adconceptio. Therefore, the system of outsourcing that will be regulated should consider the principles of goof outsourcing governance. They are: legal protection, non-discrimination, worker as the subject not as an object, benefit and welfare, sustainable working relation, and the shifting of protection to the labor.

  6. Consumers` Attitude towards Consumer Protection in the Digital Single Market, as Reflected by European Barometers

    Directory of Open Access Journals (Sweden)

    Doru Alexandru Pleşea

    2014-05-01

    Full Text Available The European Single Market is an ongoing project that will continue to further develop and adapt to changing realities. Traditional economic activities, and the administrative rules governing them, face the challenge of adapting to developments that blur the dividing lines, for example, between shop and online sales or between traditional media and Internet communication. Convergence of this type will lead to a European Digital Single Market. A genuine Digital Single Market would generate new types of growth and also sustainable economic and social benefits for all European citizens. There are still a number of barriers which impose obstacles for the development of the digital market in Europe. Obstacles which can be identified include national differences regarding data protection rules, e-commerce rules, consumer protection rules and other legislation pertaining to information flows. The paper brings in discussion the advantages of a Digital Single Market, the obstacles in developing it in connection with e-commerce regulations, consumer protection and information flows legislation and also the premises for implementing a Digital Single Market. Consumers’ trust in on-line commerce results as one of the driving factors in implementing a Digital Single Market. These are some of the main obstacles for the boosting consumers’ confidence in the European Single Market. Improving consumer confidence in cross-border shopping online by taking appropriate policy action could provide a major boost to economic growth in Europe. Empowered and confident consumers can drive forward the European economy. Starting from the results of the Flash Euro-barometer survey „Consumer attitudes towards cross-border trade and consumer protection this study analyzes consumer`s readiness for the European Digital Single Market

  7. Implementation of digital control and protection systems of China advanced research reactor

    International Nuclear Information System (INIS)

    Zeng Hai; Jin Huajin; Xu Qiguo; Zhang Mingkui

    2005-01-01

    China Advanced Research Reactor (CARR), a reactor of the 21st century with high performance is being constructed in China. The requirements of reliability and stability on the control and protection (c and p) system are the main points raised. Especially, with the development of digital technology, the c and p system of CARR is demanded to match the trend of digitization in the field of reactor control. The c and p system, including reactor protection system, reactor monitoring and control system, reactor power regulating system, and the mitigation system for ATWS (Anticipate Transient Without Scram), adopts digital technology, and the digital display screen will replace the analog panels in the main control room. The c and p system of CARR adopts redundant technology with 2 or 3 redundant channels to improve the system reliability. The 10/100 Mbps self-adaptive redundant optic fiber industry Ethernet ring network is used to interlink operator workstations, supervisor workstation, and I/O control stations. Commercial grade equipment with mature experience in industrial application are applied to the c and p system of CARR, which have high reliability, good interchangeability, and is easily purchased, the software-developing tools fully match the international industry standards. The realization of digital c and p system of CARR will promote the progress of digital control technology for reactors in China, and certainly become a technical basic platform for developing informational and intelligent reactors in China. (authors)

  8. Advanced digital instrumentation and control system for nuclear power plant protection

    Energy Technology Data Exchange (ETDEWEB)

    Sabino, D [VVER Engineering, Westinghouse Electric Corporation (United States)

    1998-12-31

    The Diverse Protection System is a back-up to the Primary Reactor Protection System developed for use at the Temelin nuclear power plant. The DPS is a digital system which provides a wealth of benefits from today`s advanced technology. These benefits include a compact hardware design with high performance microprocessors and a structured software design using a high level language. An overview of the DPS functions, hardware and software is provided. (author). 1 fig., 1 tab.

  9. Development of Reactor Protection System (RPS) in Reactor Digital Instrumentation and Control System (ReDICS)

    International Nuclear Information System (INIS)

    Mohd Khairulezwan Abdul Manan; Mohd Sabri Minhat; Ridzuan Abdul Mutalib

    2013-01-01

    RTP Research Reactor are in the process upgraded from analogue control console system to a digital control console system . Upgrade process requires a statistical study to improve safety during reactor operation. RPS was developed to meet the needs of operational safety and at the same time comply with the guidelines set by the IAEA. RPS is in analog and hardware with industry standard interfaced with digital DAC (Data Acquisition and Control) and OWS (Operator Work Station). (author)

  10. 47 CFR 74.793 - Digital low power TV and TV translator station protection of broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital low power TV and TV translator station... DISTRIBUTIONAL SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.793 Digital low power TV and TV translator station protection of broadcast stations. (a) An application to construct a new digital low power...

  11. The application of high voltage digital and analogue unit protections to utility telecommunications systems

    Energy Technology Data Exchange (ETDEWEB)

    Farthing, H. [SNC Group, Montreal, PQ (Canada); Verzosa, Q.R.; Care, J.M. [SNC Group, Montreal, PQ (Canada)

    1996-08-01

    The use of fibre optic and digital microwave systems, both within and without utility communications networks was discussed. Their availability has led to the development of phase comparison and differential current relaying systems which provide enhanced protective features for transmission circuits. The application of fibre optic cable or microwave radio data links overcomes problems caused by ground potential rise and transferred potential damage in metallic pilot wire schemes. Some problems were encountered when installing digital differential current and analogue phase comparison relaying systems to a 220 kV power transmission system where a mix of analog microwave, digital microwave radio and multiplexed fibre optic channels were available. However, the relays were successfully installed with the application of digital pilot differential relays to the power system which enabled fast fault clearance to be achieved. 7 refs., 1 tab., 1 fig.

  12. The role of digitization on data protection and recovery in libraries ...

    African Journals Online (AJOL)

    This study investigated the role of digitization on data protection and recovery in different types of libraries at a global level. The survey research design was adopted to elicit data for this research work. Four different types of libraries were purposively chosen from thirteen countries and questionnaire was designed as ...

  13. Developing a digital photography-based method for dietary analysis in self-serve dining settings.

    Science.gov (United States)

    Christoph, Mary J; Loman, Brett R; Ellison, Brenna

    2017-07-01

    Current population-based methods for assessing dietary intake, including food frequency questionnaires, food diaries, and 24-h dietary recall, are limited in their ability to objectively measure food intake. Digital photography has been identified as a promising addition to these techniques but has rarely been assessed in self-serve settings. We utilized digital photography to examine university students' food choices and consumption in a self-serve dining hall setting. Research assistants took pre- and post-photos of students' plates during lunch and dinner to assess selection (presence), servings, and consumption of MyPlate food groups. Four coders rated the same set of approximately 180 meals for inter-rater reliability analyses; approximately 50 additional meals were coded twice by each coder to assess intra-rater agreement. Inter-rater agreement on the selection, servings, and consumption of food groups was high at 93.5%; intra-rater agreement was similarly high with an average of 95.6% agreement. Coders achieved the highest rates of agreement in assessing if a food group was present on the plate (95-99% inter-rater agreement, depending on food group) and estimating the servings of food selected (81-98% inter-rater agreement). Estimating consumption, particularly for items such as beans and cheese that were often in mixed dishes, was more challenging (77-94% inter-rater agreement). Results suggest that the digital photography method presented is feasible for large studies in real-world environments and can provide an objective measure of food selection, servings, and consumption with a high degree of agreement between coders; however, to make accurate claims about the state of dietary intake in all-you-can-eat, self-serve settings, researchers will need to account for the possibility of diners taking multiple trips through the serving line. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. Use of digital computers in the protection system for Savannah River reactors

    International Nuclear Information System (INIS)

    Gimmy, K.L.

    1977-06-01

    Each production reactor at the Savannah River Plant has recently been provided with a protective system using dual digital computers. The dual ''safety computers'' monitor coolant temperature and flow in each of the 600 fuel assemblies in the reactor. The system provides alarms and automatic reactor shutdown (SCRAM) if these variables exceed predetermined setpoints. The system provides the primary protection for unwanted local or general power increase or assembly coolant flow reduction. Standard process control computers are used and all scanning, data output, and protective action are controlled by software prepared by Du Pont

  15. Advanced digital instrumentation and control system for nuclear power plant protection

    International Nuclear Information System (INIS)

    Sabino, D.

    1997-01-01

    The Diverse Protection System (DPS) is described. The DPS is a state-of-the-art digital protection system developed as a back-up to the primary reactor protection system at the Temelin nuclear power plant, featuring a compact hardware design based on VMEbus technology. This technology allows for ease in adding or modifying the number and type of input modules and processors. The DPS software is written in a high level language suitable for safety critical applications. The software is both modular and configurable allowing for potential future modifications and software reuse

  16. DNBR calculation in digital core protection system by a subchannel analysis code

    International Nuclear Information System (INIS)

    In, W. K.; Yoo, Y. J.; Hwang, T. H.; Ji, S. K.

    2001-01-01

    The DNBR calculation uncertainty and DNBR margin were evaluated in digital core protection system by a thermal-hydrualic subchannel analysis code MATRA. A simplified thermal-hydraulic code CETOP is used to calculate on-line DNBR in core protection system at a digital PWR. The DNBR tuning process against a best-estimate subchannel analysis code is required for CETOP to ensure accurate and conservative DNBR calculation but not necessary for MATRA. The DNBR calculations by MATRA and CETOP were performed for a large number of operating condition in Yonggwang nulcear units 3-4 where the digitial core protection system is initially implemented in Korea. MATRA resulted in a less negative mean value (i.e., reduce the overconservatism) and a somewhat larger standard deviation of the DNBR error. The uncertainty corrected minimum DNBR by MATRA was shown to be higher by 1.8% -9.9% that the CETOP DNBR

  17. Setting Component Priorities in Protecting NPPs against Cyber-Attacks Using Reliability Analysis Techniques

    International Nuclear Information System (INIS)

    Choi, Moon Kyoung; Seong, Poong Hyun; Son, Han Seong

    2017-01-01

    The digitalization of infrastructure makes systems vulnerable to cyber threats and hybrid attacks. According to ICS-CERT report, as time goes by, the number of vulnerabilities in ICS industries increases rapidly. Digital I and C systems have been developed and installed in nuclear power plants, and due to installation of the digital I and C systems, cyber security concerns are increasing in nuclear industry. However, there are too many critical digital assets to be inspected in digitalized NPPs. In order to reduce the inefficiency of regulation in nuclear facilities, the critical components that are directly related to an accident are elicited by using the reliability analysis techniques. Target initial events are selected, and their headings are analyzed through event tree analysis about whether the headings can be affected by cyber-attacks or not. Among the headings, the headings that can be proceeded directly to the core damage by the cyber-attack when they are fail are finally selected as the target of deriving the minimum cut-sets. We analyze the fault trees and derive the minimum set-cuts. In terms of original PSA, the value of probability for the cut-sets is important but the probability is not important in terms of cyber security of NPPs. The important factors is the number of basic events consisting of the minimal cut-sets that is proportional to vulnerability.

  18. A PLC platform-independent structural analysis on FBD programs for digital reactor protection systems

    International Nuclear Information System (INIS)

    Jung, Sejin; Yoo, Junbeom; Lee, Young-Jun

    2017-01-01

    Highlights: • FBD has been widely used to implement safety-critical software for PLC-based systems. • The safety-critical software should be developed strictly with safety programming guidelines. • There are no argued rules that have specific links to higher guidelines NUREG/CR-6463 PLC platform-independently. • This paper proposes a set of rules on the structure of FBD programs with providing specific links to higher guidelines. • This paper also provides CASE tool ‘FBD Checker’ for analyzing the structure of FBD. - Abstract: FBD (function block diagram) has been widely used to implement safety-critical software for PLC (programmable logic controller)-based digital nuclear reactor protection systems. The software should be developed strictly in accordance with safety programming guidelines such as NUREG/CR-6463. Software engineering tools of PLC vendors enable us to present structural analyses using FBD programs, but specific rules pertaining to the guidelines are enclosed within the commercial tools, and specific links to the guidelines are not clearly communicated. This paper proposes a set of rules on the structure of FBD programs in accordance with guidelines, and we develop an automatic analysis tool for FBD programs written in the PLCopen TC6 format. With the proposed tool, any FBD program that is transformed into an open format can be analyzed the PLC platform-independently. We consider a case study on FBD programs obtained from a preliminary version of a Korean nuclear power plant, and we demonstrate the effectiveness and potential of the proposed rules and analysis tool.

  19. REDEN: Named Entity Linking in Digital Literary Editions Using Linked Data Sets

    Directory of Open Access Journals (Sweden)

    Carmen Brando

    2016-07-01

    Full Text Available This paper proposes a graph-based Named Entity Linking (NEL algorithm named REDEN for the disambiguation of authors’ names in French literary criticism texts and scientific essays from the 19th and early 20th centuries. The algorithm is described and evaluated according to the two phases of NEL as reported in current state of the art, namely, candidate retrieval and candidate selection. REDEN leverages knowledge from different Linked Data sources in order to select candidates for each author mention, subsequently crawls data from other Linked Data sets using equivalence links (e.g., owl:sameAs, and, finally, fuses graphs of homologous individuals into a non-redundant graph well-suited for graph centrality calculation; the resulting graph is used for choosing the best referent. The REDEN algorithm is distributed in open-source and follows current standards in digital editions (TEI and semantic Web (RDF. Its integration into an editorial workflow of digital editions in Digital humanities and cultural heritage projects is entirely plausible. Experiments are conducted along with the corresponding error analysis in order to test our approach and to help us to study the weaknesses and strengths of our algorithm, thereby to further improvements of REDEN.

  20. Preliminary Uncertainty Analysis for SMART Digital Core Protection and Monitoring System

    International Nuclear Information System (INIS)

    Koo, Bon Seung; In, Wang Kee; Hwang, Dae Hyun

    2012-01-01

    The Korea Atomic Energy Research Institute (KAERI) developed on-line digital core protection and monitoring systems, called SCOPS and SCOMS as a part of SMART plant protection and monitoring system. SCOPS simplified the protection system by directly connecting the four RSPT signals to each core protection channel and eliminated the control element assembly calculator (CEAC) hardware. SCOMS adopted DPCM3D method in synthesizing core power distribution instead of Fourier expansion method being used in conventional PWRs. The DPCM3D method produces a synthetic 3-D power distribution by coupling a neutronics code and measured in-core detector signals. The overall uncertainty analysis methodology which is used statistically combining uncertainty components of SMART core protection and monitoring system was developed. In this paper, preliminary overall uncertainty factors for SCOPS/SCOMS of SMART initial core were evaluated by applying newly developed uncertainty analysis method

  1. Ethical Issues for Direct-to-Consumer Digital Psychotherapy Apps: Addressing Accountability, Data Protection, and Consent.

    Science.gov (United States)

    Martinez-Martin, Nicole; Kreitmair, Karola

    2018-04-23

    This paper focuses on the ethical challenges presented by direct-to-consumer (DTC) digital psychotherapy services that do not involve oversight by a professional mental health provider. DTC digital psychotherapy services can potentially assist in improving access to mental health care for the many people who would otherwise not have the resources or ability to connect with a therapist. However, the lack of adequate regulation in this area exacerbates concerns over how safety, privacy, accountability, and other ethical obligations to protect an individual in therapy are addressed within these services. In the traditional therapeutic relationship, there are ethical obligations that serve to protect the interests of the client and provide warnings. In contrast, in a DTC therapy app, there are no clear lines of accountability or associated ethical obligations to protect the user seeking mental health services. The types of DTC services that present ethical challenges include apps that use a digital platform to connect users to minimally trained nonprofessional counselors, as well as services that provide counseling steered by artificial intelligence and conversational agents. There is a need for adequate oversight of DTC nonprofessional psychotherapy services and additional empirical research to inform policy that will provide protection to the consumer. ©Nicole Martinez-Martin, Karola Kreitmair. Originally published in JMIR Mental Health (http://mental.jmir.org), 23.04.2018.

  2. Refurbishing the reactor protection systems of VVER-440/230 and VVER-1000/320 nuclear power plants with exclusively digital IandC systems

    International Nuclear Information System (INIS)

    Martin, M.

    1997-01-01

    The refurbishment of reactor protection systems of nuclear power plants is based on two sets of requirements: engineering aspects such as performance, qualification and licensing, as well as interfaces to other systems; and cost-benefit relationships, ease of service and maintenance as well as installation during scheduled outages. A number of WWER-440 and WWER-1000 nuclear plants have announced their intention to refurbish their protection systems. Since 1994, these plants have been placing orders with Siemens for new protection systems, including the neutron flux monitoring system utilizing the advanced system TELEPERM XS. This exclusively digital IandC system provides an excellent foundation for the remaining plant service life

  3. Safety Evaluation of Full Digital Plant Protection System of Shin-Kori 3 and 4 in Korea

    International Nuclear Information System (INIS)

    Koh, J. S.; Kim, D. I.; Jeong, C. H.; Park, H. S.; Ji, S. H.; Kang, Y. D.; Park, G. Y.

    2009-01-01

    Keeping pace with the emerging trend of digital computer technologies, KHNP has utilized full digital plant protection system into the design of I and C systems at SKN 3 and 4. This paper presents safety review activities and results related to digital plant protection systems during the licensing of construction permit for the Shin-Kori 3 and 4(SKN 3 and 4) in Korea. The major licensing issues regarding the digital systems were software quality and cyber security during planning stage, system integrity with fail-safe design, EMI equipment qualification of digital systems, FPGA qualification and communication independence between safety and non-safety System. This paper addresses our approach to evaluate full digital protection systems with revised safety review guidelines and the resulting discussion to resolve the licensing issues

  4. Suitability review of FMEA and reliability analysis for digital plant protection system and digital engineered safety features actuation system

    Energy Technology Data Exchange (ETDEWEB)

    Kim, I. S.; Kim, T. K.; Kim, M. C.; Kim, B. S.; Hwang, S. W.; Ryu, K. C. [Hanyang Univ., Seoul (Korea, Republic of)

    2000-11-15

    Of the many items that should be checked out during a review stage of the licensing application for the I and C system of Ulchin 5 and 6 units, this report relates to a suitability review of the reliability analysis of Digital Plant Protection System (DPPS) and Digital Engineered Safety Features Actuation System (DESFAS). In the reliability analysis performed by the system designer, ABB-CE, fault tree analysis was used as the main methods along with Failure Modes and Effect Analysis (FMEA). However, the present regulatory technique dose not allow the system reliability analysis and its results to be appropriately evaluated. Hence, this study was carried out focusing on the following four items ; development of general review items by which to check the validity of a reliability analysis, and the subsequent review of suitability of the reliability analysis for Ulchin 5 and 6 DPPS and DESFAS L development of detailed review items by which to check the validity of an FMEA, and the subsequent review of suitability of the FMEA for Ulchin 5 and 6 DPPS and DESFAS ; development of detailed review items by which to check the validity of a fault tree analysis, and the subsequent review of suitability of the fault tree for Ulchin 5 and 6 DPPS and DESFAS ; an integrated review of the safety and reliability of the Ulchin 5 and 6 DPPS and DESFAS based on the results of the various reviews above and also of a reliability comparison between the digital systems and the comparable analog systems, i.e., and analog Plant Protection System (PPS) and and analog Engineered Safety Features Actuation System (ESFAS). According to the review mentioned above, the reliability analysis of Ulchin 5 and 6 DPPS and DESFAS generally satisfies the review requirements. However, some shortcomings of the analysis were identified in our review such that the assumed test periods for several equipment were not properly incorporated in the analysis, and failures of some equipment were not included in the

  5. Application of the voltage biased digital relay for the optimal protection of high inertia drive induction motors

    International Nuclear Information System (INIS)

    Choi, D. B.

    1999-01-01

    This paper describes typical protection schemes for large-size high inertia drive motor that are generally rotor thermal limited. Difficult and variable starting conditions of the large-size high inertia drive motor and compromises in the selection and setting of the protective devices are frequently encountered. The motors that typically encounter severe starting duty and present difficulties in achieving full motor protection are reactor coolant pumps (RCPs), blowers and compressors. For difficult starting conditions that are encountered by the large-size high inertia drive motors, state-of-the-art computer based calculations are capable of providing realistic predictions of the band of margin available for applying the protective relay. Based on the analysis of starting characteristics of large-size high inertia drive motors, this paper recommends that the optimal protection scheme for high inertia drive motors for nuclear power plants can be achieved by using the voltage biased digital relay instead of a speed switch and conventional overcurrent relays. (author)

  6. Method and practice on safety software verification and validation for digital reactor protection system

    International Nuclear Information System (INIS)

    Li Duo; Zhang Liangju; Feng Junting

    2010-01-01

    The key issue arising from digitalization of reactor protection system for Nuclear Power Plant (NPP) is in essence, how to carry out Verification and Validation (V and V), to demonstrate and confirm the software is reliable enough to perform reactor safety functions. Among others the most important activity of software V and V process is unit testing. This paper discusses the basic concepts on safety software V and V and the appropriate technique for software unit testing, focusing on such aspects as how to ensure test completeness, how to establish test platform, how to develop test cases and how to carry out unit testing. The technique discussed herein was successfully used in the work of unit testing on safety software of a digital reactor protection system. (author)

  7. Signal-Noise Ratio Control Subsystem of Digital Equipment for Transmission of "Strela" Relay Protection Commands

    Directory of Open Access Journals (Sweden)

    I. I. Zabenkov

    2012-01-01

    Full Text Available Continuous measurement function of relative noise and interference level in the information transmission channel is considered as an important one for controlling parameters of high-frequency signal. The present paper simulates an algorithm for measuring signal-noise ratio in the transmission channel of high-voltage lines which is used in the digital equipment for transmission of relay protection and emergency automation commands of "Strela" complex.

  8. Research and Development of Protection OPC server for China advanced research reactor digital monitoring system

    International Nuclear Information System (INIS)

    Jia Yuwen; Xu Qiguo

    2012-01-01

    OPC server was developed as I/O driver to communicate the digital monitoring system of China Advanced Research Reactor iFIX and protection system. The framework and working principle of the OPC server were researched, and an effective method was developed to resolve the special communication protocol. After commissioning and testing, the results show that this method is reliable and stable, makes the system easy to configure, and can reduce the complexity of the system. (authors)

  9. Correlates of protection against human rotavirus disease and the factors influencing protection in low-income settings.

    Science.gov (United States)

    Clarke, E; Desselberger, U

    2015-01-01

    Rotaviruses (RV) are the leading cause of gastroenteritis in infants and children worldwide and are associated with high mortality predominately in low-income settings. The virus is classified into G and P serotypes and further into P genotypes based on differences in the surface-exposed proteins VP7 and VP4, respectively. Infection results in a variable level of protection from subsequent reinfection and disease. This protection is predominantly homotypic in some settings, whereas broader heterotypic protection is reported in other cohorts. Two antigenically distinct oral RV vaccines are licensed and are being rolled out widely, including in resource-poor setting, with funding provided by the GAVI alliance. First is a monovalent vaccine derived from a live-attenuated human RV strain, whereas the second is a pentavalent bovine-human reassortment vaccine. Both vaccines are highly efficacious in high-income settings, but greatly reduced levels of protection are reported in low-income countries. Here, the current challenges facing mucosal immunologists and vaccinologists aiming to define immunological correlates and to understand the variable levels of protection conferred by these vaccines in humans is considered. Such understanding is critical to maximize the public health impact of the current vaccines and also to the development of the next generation of RV vaccines, which are needed.

  10. Software Safety Analysis of Digital Protection System Requirements Using a Qualitative Formal Method

    International Nuclear Information System (INIS)

    Lee, Jang-Soo; Kwon, Kee-Choon; Cha, Sung-Deok

    2004-01-01

    The safety analysis of requirements is a key problem area in the development of software for the digital protection systems of a nuclear power plant. When specifying requirements for software of the digital protection systems and conducting safety analysis, engineers find that requirements are often known only in qualitative terms and that existing fault-tree analysis techniques provide little guidance on formulating and evaluating potential failure modes. A framework for the requirements engineering process is proposed that consists of a qualitative method for requirements specification, called the qualitative formal method (QFM), and a safety analysis method for the requirements based on causality information, called the causal requirements safety analysis (CRSA). CRSA is a technique that qualitatively evaluates causal relationships between software faults and physical hazards. This technique, extending the qualitative formal method process and utilizing information captured in the state trajectory, provides specific guidelines on how to identify failure modes and the relationship among them. The QFM and CRSA processes are described using shutdown system 2 of the Wolsong nuclear power plants as the digital protection system example

  11. Development of Youth Digital Citizenship Scale and Implication for Educational Setting

    Science.gov (United States)

    Kim, Minjeong; Choi, Dongyeon

    2018-01-01

    Digital citizens need comprehensive knowledge and technological accessibility to the internet and digital world and teachers have a responsibility to lead them to become digital citizens. However, existing Digital Citizenship Scales contain too broad ranges and do not precisely focus on the target students, so teachers do not have clear criteria…

  12. Development and use of a genitourinary pathology digital teaching set for trainee education

    Directory of Open Access Journals (Sweden)

    Li Li

    2010-01-01

    Full Text Available Background : Automated, high-speed, high-resolution whole slide imaging (WSI robots are becoming increasingly robust and capable. This technology has started to have a significant impact on pathology practice in various aspects including resident education. To be sufficient and adequate, training in pathology requires gaining broad exposure to various diagnostic patterns through teaching sets, which are traditionally composed of glass slides. Methods: A teaching set of over 295 glass slides has been used for resident training at the Division of Genitourinary Pathology, Department of Pathology, University of Pittsburgh Medical Center. Whole slide images were prepared from these slides using an Aperio ScanScope CS scanner. These images and case-related information were uploaded on a web-based digital teaching model. Results: The web site is available at: https://www.secure.opi.upmc.edu/genitourinary/index.cfm. Once logged in, users can view the list of cases, or search cases with or without diagnoses shown. Each case can be accessed through an option button, where the clinical history, gross findings are initially shown. Whole slide images can be accessed through the links on the page, which allows users to make diagnoses on their own. More information including final diagnosis will display when the diagnosis-button is clicked. Conclusion: The web-based digital study set provides additional educational benefits to using glass slides. Residents or other users can remotely access whole slide images and related information at their convenience. Searching and sorting functions and self-testing mode allow a more targeted study. It would also prepare residents with competence to work with whole slide images. Further, the model can be expanded to include pre-rotation and post-rotation exams, and/or a virtual rotation system, which may potentially make standardization of pathology resident training possible in the future.

  13. Quantum Digital Signatures for Unconditional Safe Authenticity Protection of Medical Documentation

    Directory of Open Access Journals (Sweden)

    Arkadiusz Liber

    2015-12-01

    Full Text Available Modern medical documentation appears most often in an online form which requires some digital methods to ensure its confidentiality, integrity and authenticity. The document authenticity may be secured with the use of a signature. A classical handwritten signature is directly related to its owner by his/her psychomotor character traits. Such a signature is also connected with the material it is written on, and a writing tool. Because of these properties, a handwritten signature reflects certain close material bonds between the owner and the document. In case of modern digital signatures, the document authentication has a mathematical nature. The verification of the authenticity becomes the verification of a key instead of a human. Since 1994 it has been known that classical digital signature algorithms may not be safe because of the Shor’s factorization algorithm. To implement the modern authenticity protection of medical data, some new types of algorithms should be used. One of the groups of such algorithms is based on the quantum computations. In this paper, the analysis of the current knowledge status of Quantum Digital Signature protocols, with its basic principles, phases and common elements such as transmission, comparison and encryption, was outlined. Some of the most promising protocols for signing digital medical documentation, that fulfill the requirements for QDS, were also briefly described. We showed that, a QDS protocol with QKD components requires the equipment similar to the equipment used for a QKD, for its implementation, which is already commercially available. If it is properly implemented, it provides the shortest lifetime of qubits in comparison to other protocols. It can be used not only to sign classical messages but probably it could be well adopted to implement unconditionally safe protection of medical documentation in the nearest future, as well.

  14. Development of Uncertainty Analysis Method for SMART Digital Core Protection and Monitoring System

    International Nuclear Information System (INIS)

    Koo, Bon Seung; In, Wang Kee; Hwang, Dae Hyun

    2012-01-01

    The Korea Atomic Energy Research Institute has developed a system-integrated modular advanced reactor (SMART) for a seawater desalination and electricity generation. Online digital core protection and monitoring systems, called SCOPS and SCOMS respectively were developed. SCOPS calculates minimum DNBR and maximum LPD based on the several online measured system parameters. SCOMS calculates the variables of limiting conditions for operation. KAERI developed overall uncertainty analysis methodology which is used statistically combining uncertainty components of SMART core protection and monitoring system. By applying overall uncertainty factors in on-line SCOPS/SCOMS calculation, calculated LPD and DNBR are conservative with a 95/95 probability/confidence level. In this paper, uncertainty analysis method is described for SMART core protection and monitoring system

  15. A new digital ground-fault protection system for generator-transformer unit

    Energy Technology Data Exchange (ETDEWEB)

    Zielichowski, Mieczyslaw; Szlezak, Tomasz [Institute of Electrical Power Engineering, Wroclaw University of Technology, Wybrzeze Wyspianskiego 27, 50370 Wroclaw (Poland)

    2007-08-15

    Ground faults are one of most often reasons of damages in stator windings of large generators. Under certain conditions, as a result of ground-fault protection systems maloperation, ground faults convert into high-current faults, causing severe failures in power system. Numerous publications in renowned journals and magazines testify about ground-fault matter importance and problems reported by exploitators confirm opinions, that some issues concerning ground-fault protection of large generators have not been solved yet or have been solved insufficiently. In this paper a new conception of a digital ground-fault protection system for stator winding of large generator was proposed. The process of intermittent arc ground fault in stator winding has been briefly discussed and actual ground-fault voltage waveforms were presented. A new relaying algorithm, based on third harmonic voltage measurement was also drawn and the methods of its implementation and testing were described. (author)

  16. Reliability modeling of digital component in plant protection system with various fault-tolerant techniques

    International Nuclear Information System (INIS)

    Kim, Bo Gyung; Kang, Hyun Gook; Kim, Hee Eun; Lee, Seung Jun; Seong, Poong Hyun

    2013-01-01

    Highlights: • Integrated fault coverage is introduced for reflecting characteristics of fault-tolerant techniques in the reliability model of digital protection system in NPPs. • The integrated fault coverage considers the process of fault-tolerant techniques from detection to fail-safe generation process. • With integrated fault coverage, the unavailability of repairable component of DPS can be estimated. • The new developed reliability model can reveal the effects of fault-tolerant techniques explicitly for risk analysis. • The reliability model makes it possible to confirm changes of unavailability according to variation of diverse factors. - Abstract: With the improvement of digital technologies, digital protection system (DPS) has more multiple sophisticated fault-tolerant techniques (FTTs), in order to increase fault detection and to help the system safely perform the required functions in spite of the possible presence of faults. Fault detection coverage is vital factor of FTT in reliability. However, the fault detection coverage is insufficient to reflect the effects of various FTTs in reliability model. To reflect characteristics of FTTs in the reliability model, integrated fault coverage is introduced. The integrated fault coverage considers the process of FTT from detection to fail-safe generation process. A model has been developed to estimate the unavailability of repairable component of DPS using the integrated fault coverage. The new developed model can quantify unavailability according to a diversity of conditions. Sensitivity studies are performed to ascertain important variables which affect the integrated fault coverage and unavailability

  17. Software hazard analysis for nuclear digital protection system by Colored Petri Net

    International Nuclear Information System (INIS)

    Bai, Tao; Chen, Wei-Hua; Liu, Zhen; Gao, Feng

    2017-01-01

    Highlights: •A dynamic hazard analysis method is proposed for the safety-critical software. •The mechanism relies on Colored Petri Net. •Complex interactions between software and hardware are captured properly. •Common failure mode in software are identified effectively. -- Abstract: The software safety of a nuclear digital protection system is critical for the safety of nuclear power plants as any software defect may result in severe damage. In order to ensure the safety and reliability of safety-critical digital system products and their applications, software hazard analysis is required to be performed during the lifecycle of software development. The dynamic software hazard modeling and analysis method based on Colored Petri Net is proposed and applied to the safety-critical control software of the nuclear digital protection system in this paper. The analysis results show that the proposed method can explain the complex interactions between software and hardware and identify the potential common cause failure in software properly and effectively. Moreover, the method can find the dominant software induced hazard to safety control actions, which aids in increasing software quality.

  18. Digitization

    DEFF Research Database (Denmark)

    Finnemann, Niels Ole

    2014-01-01

    what a concept of digital media might add to the understanding of processes of mediatization and what the concept of mediatization might add to the understanding of digital media. It is argued that digital media open an array of new trajectories in human communication, trajectories which were...

  19. The challenge of objective scar colour assessment in a clinical setting: using digital photography.

    Science.gov (United States)

    Anderson, J C; Hallam, M-J; Nduka, C; Osorio, D

    2015-08-01

    Scar assessment in the clinical setting is typically impeded by a lack of quantitative data and most systems rely on subjective rating scales which are user dependant and show considerable variability between raters. The growing use of digital photography in medicine suggests a more objective approach to scar evaluation. Our objective was to determine if cameras could be of practical use for measuring colour in a clinical setting. The measurement of colour and reflectance spectra in photographs faces two difficulties: firstly the effects of variable illumination spectra, and secondly to recover accurate colour and spectral information from the sparse red, green and blue (RGB) camera signals. As a result the colour rendition is often inaccurate, and spectral information is lost. To deal with variable illumination and other factors that systematically affect all reflectance spectra ColourWorker (a method for image-based colour measurement implemented in software) calibrates the spectral responses of the camera's RGB sensors using a colour standard in the image. To make best use of the calibrated signals, it takes advantage of the fact that although a given RGB signal can be caused by an infinite number of spectra, most natural reflectance spectra vary smoothly and have predictable forms. This means given a set of examples of spectra produced by the materials of interest, it is possible to estimate the specific spectrum that produced a given RGB signal once corrected for the illumination. We describe a method for recovering spectral and chromatic information relating to surface reflectance from ordinary digital images and apply this to analyse photographs of surgical scars, taken as part of a clinical trial, in an attempt to better quantify clinical scar assessment. It should be noted the pre-existing trial protocol did not allow for a comprehensive evaluation of the accuracy of the method which would require the spectrophotometric measurement of skin regions

  20. A digital phantom of the axilla based on the Visible Human Project data set

    Science.gov (United States)

    McCallum, S. J.; Welch, A. E.; Baker, L.

    2001-08-01

    In this paper, we describe the development of a new digital phantom designed for Monte Carlo simulations of breast cancer and particularly positron emission tomography (PET) imaging of the axillary lymph nodes. The phantom was based on data from the Visible Human Project female data set. The phantom covers the head-to-diaphragm regions; 17 major tissue types were segmented and 66 individual lymph nodes were identified. The authors have used the phantom in Monte Carlo simulations to model a reduced field-of-view PET imager based on two flat plate arrays placed on either side of the shoulder. Images used a simple single angle set of projections. The authors have conducted two preliminary studies: one modeling a single-frame PET acquisition 60 min after FDG injection and the other modeling a dynamic PET acquisition simulating four time frames after FDG injection. The dynamic results were processed into parametric images using the Patlak method and show the advantage to be gained by including the temporal information for legion detection. The authors' preliminary results indicate that the performance of such an imager forming projection images is not sufficient for axillary node PET imaging.

  1. New digital control and power protection system of VR 1 training reactor

    International Nuclear Information System (INIS)

    Kropik, M.; Matejka, K.; Juoeickova, M.

    2005-01-01

    The contribution describes the new VR-1 training reactor control and power protection system at the Czech Technical University in Prague. The control system provides safety and control functions, calculates average values of the important variables and sends data and system status to the human-machine interface. The upgraded control system is based on a high quality industrial PC. The operating system of the PC is the Microsoft Windows XP with the real time support RTX of the VentureCom Company. The software was developed according to requirements in MS Visual C. The independent power protection system is a component of the reactor safety (protection) system with high quality and reliability requirements. The digital system is redundant; each channel evaluates the reactor power and the velocity of power changes and provides safety functions. The digital part of the channel is multiprocessor-based. The software was developed with respect to nuclear standards. The software design was coded in the C language regarding the NRC restrictions. Configuration management, verification and validation accompanied the software development. Both systems were thoroughly tested. Firstly, the non active tests were carried out. During these tests, the active core of the reactor was subcritical; the input signals were generated from HPIB and VXI controlled instruments to simulate different operational and safety events. The software for instruments control and tests evaluation utilized Agilent VEE development system. After the successful non active checking, the active tests followed. (author)

  2. Functional issues and environmental qualification of digital protection systems of advanced light-water nuclear reactors

    Energy Technology Data Exchange (ETDEWEB)

    Korsah, K.; Clark, R.L.; Wood, R.T. [Oak Ridge National Lab., TN (United States)

    1994-04-01

    Issues of obsolescence and lack of infrastructural support in (analog) spare parts, coupled with the potential benefits of digital systems, are driving the nuclear industry to retrofit analog instrumentation and control (I&C) systems with digital and microprocessor-based systems. While these technologies have several advantages, their application to safety-related systems in nuclear power plants raises key issues relating to the systems` environmental qualification and functional reliability. To bound the problem of new I&C system functionality and qualification, the authors focused this study on protection systems proposed for use in ALWRs. Specifically, both functional and environmental qualification issues for ALWR protection system I&C were addressed by developing an environmental, functional, and aging data template for a protection division of each proposed ALWR design. By using information provided by manufacturers, environmental conditions and stressors to which I&C equipment in reactor protection divisions may be subjected were identified. The resulting data were then compared to a similar template for an instrument string typically found in an analog protection division of a present-day nuclear power plant. The authors also identified fiber-optic transmission systems as technologies that are relatively new to the nuclear power plant environment and examined the failure modes and age-related degradation mechanisms of fiber-optic components and systems. One reason for the exercise of caution in the introduction of software into safety-critical systems is the potential for common-cause failure due to the software. This study, however, approaches the functionality problem from a systems point of view. System malfunction scenarios are postulated to illustrate the fact that, when dealing with the performance of the overall integrated system, the real issues are functionality and fault tolerance, not hardware vs. software.

  3. Functional issues and environmental qualification of digital protection systems of advanced light-water nuclear reactors

    International Nuclear Information System (INIS)

    Korsah, K.; Clark, R.L.; Wood, R.T.

    1994-04-01

    Issues of obsolescence and lack of infrastructural support in (analog) spare parts, coupled with the potential benefits of digital systems, are driving the nuclear industry to retrofit analog instrumentation and control (I ampersand C) systems with digital and microprocessor-based systems. While these technologies have several advantages, their application to safety-related systems in nuclear power plants raises key issues relating to the systems' environmental qualification and functional reliability. To bound the problem of new I ampersand C system functionality and qualification, the authors focused this study on protection systems proposed for use in ALWRs. Specifically, both functional and environmental qualification issues for ALWR protection system I ampersand C were addressed by developing an environmental, functional, and aging data template for a protection division of each proposed ALWR design. By using information provided by manufacturers, environmental conditions and stressors to which I ampersand C equipment in reactor protection divisions may be subjected were identified. The resulting data were then compared to a similar template for an instrument string typically found in an analog protection division of a present-day nuclear power plant. The authors also identified fiber-optic transmission systems as technologies that are relatively new to the nuclear power plant environment and examined the failure modes and age-related degradation mechanisms of fiber-optic components and systems. One reason for the exercise of caution in the introduction of software into safety-critical systems is the potential for common-cause failure due to the software. This study, however, approaches the functionality problem from a systems point of view. System malfunction scenarios are postulated to illustrate the fact that, when dealing with the performance of the overall integrated system, the real issues are functionality and fault tolerance, not hardware vs. software

  4. Development of digital plant protection system for Korean Next Generation Reactor

    International Nuclear Information System (INIS)

    Suk-Joon Park

    1998-01-01

    A Digital Plant Protection System (DPPS) for Korean Next Generation Reactor (KNGR) is being developed using the Programmable Logic Controller (PLC) technology. For the design verification, the development of the DPPS prototype is progressing at this time. The prototype hardware equipment is installed and software coding is started. DPPS software is being coded by strict software V and V activities and function block language that uses simple graphical symbols. By adopting the PLC technology, the design of DPPS is possible to take full advantages in areas such as automatic testing, simplified calibration, improved isolation between redundant channels, reduced internal and external wiring and increased plant availability. (author)

  5. Development of digital plant protection system for Korean Next Generation Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Park, Suk-Joon [NSSS Engineering and Development Division, Korea Power Engineering Company, Taejon (Korea, Republic of)

    1998-10-01

    A Digital Plant Protection System (DPPS) for Korean Next Generation Reactor (KNGR) is being developed using the Programmable Logic Controller (PLC) technology. For the design verification, the development of the DPPS prototype is progressing at this time. The prototype hardware equipment is installed and software coding is started. DPPS software is being coded by strict software V and V activities and function block language that uses simple graphical symbols. By adopting the PLC technology, the design of DPPS is possible to take full advantages in areas such as automatic testing, simplified calibration, improved isolation between redundant channels, reduced internal and external wiring and increased plant availability. (author) 8 refs, 4 figs, 3 tabs

  6. Estimation of digital protection devices applicability on basis of multiple characterizing parameters

    Directory of Open Access Journals (Sweden)

    Dimitar Bogdanov

    2018-01-01

    Full Text Available The contemporary electrical power systems (EPS impose increased requirements for the functionality of the protection systems. The necessity of improved EPS stability is in some extent resulting of the increased integration of renewable sources of electrical energy. The future grid development gives perspective for connection of more converter based generations. The power electronic schemes and associated functional requirements impose necessity of high speed, sensitive, selective and reliable operation of the protection devices. These requirements have always been target of the protection equipment producers and grid operators. The electronic converting schemes specifics impose these requirements for the protection devices in more straightened way, as the converter connected generator may need to trip in shorter time than classical machine generator. In the article is presented a generalized overview of some of the characteristics of the digital “relay” protection devices, and approach for device selection is proposed. Investment planning may utilize such approach in order to have an optimal design from financial point of view.

  7. Data protection for the digital age: comprehensive effects of the evolving law of accountability

    Directory of Open Access Journals (Sweden)

    Nina GUMZEJ

    2012-12-01

    Full Text Available The law of personal data protection has for years been lagging behind technology, which is evolving propulsively and with high speed. A number of new challenges arising from the post-modern digital age have been identified for rights and freedoms of individuals with respect to processing of their personal data and thus a need for adapting the relevant legal-regulatory regime and ensuring a workable and systematic data protection system for the third millennium. After examination of the current legal framework and supporting systems at the level of European Union law, this paper focuses on recently proposed reforms. Proposed new EU legal-regulatory regime towards a potent data protection ecosystem is strongly supported by stricter accountability of those who are responsible for personal data. As one of the core legal principles supporting the new regime, accountability denotes, in a nutshell, a number of legally enforceable duties to implement and verify measures and procedures that can ensure operative and demonstrable data protection compliance. Selected highlights of the proposed accountability measures are therefore examined in this paper and arguments provided for a shift towards organizational data protection management and governance already today.

  8. Impact of general data protection regulation on children's rights in digital environment

    Directory of Open Access Journals (Sweden)

    Krivokapić Đorđe

    2016-01-01

    Full Text Available Raising the age of consent to data processing to 16 and allowing member states to set it at a lower age, was one of the major points of argument in the wake of passing the new EU General Data Protection Regulation (GDPR, otherwise hailed for introducing the Article 8 that recognizes children as a vulnerable group. This paper analyzes legal grounds for concerns raised over the provisions related to personal data protection of minors, possible ramifications and remedies within the given framework. It also highlights innovations and positive solutions set in the GDPR, with respect to privacy risks and opportunities for children in the information society.

  9. Design and realization of a fast digital system for the protection of a linear accelerator

    International Nuclear Information System (INIS)

    Hamdi, A.

    2004-07-01

    The new generation of light sources based on SASE Free-Electron-Lasers driven by LINACs operate with electron beams with high beam currents and duty cycles. This is especially true for the superconducting machines like TTF 2 and the X-RAY FEL, under construction or planning at DESY. Elaborate fast protections systems are required not only to protect the machine from electron beams hitting and destroying the vacuum chamber, but also to prevent the machine from running at high loss levels, dangerous for components like the FEL undulator. This document presents the different protection systems currently under construction for TTF 2. The very fast systems, based on transmission measurements and distributed loss detection monitors, are described in detail. This description includes the fast electronics to collect and to transmit the different interlock and status signals: analog to digital converters, DSP and FPGA, interfaces, toroid protection system (TPS) card. The implementation and validation (simulation and tests) of the TPS card at DESY is presented

  10. Challenges and opportunities in providing a digital protection system for the PBMR - HTR2008-58173

    International Nuclear Information System (INIS)

    Marais, J.; Ridolfo, C. F.

    2008-01-01

    The Republic of South Africa is currently developing the Pebble Bed Modular Reactor (PBMR); an advanced, fourth-generation reactor that incorporates inherent safety features, which require no human intervention and which provide an unprecedented level of nuclear safety. In addition to electrical power generation, the reactor is uniquely suited for a variety of non-traditional nuclear applications including oil sands extraction, desalination, and hydrogen production. A state-of-the-art digital Protection System for the PBMR is currently being developed in conjunction with Westinghouse Electric Company (WEC). The Protection System provides for: reactor shutdown using two different reactor trip methodologies (dropping of the control rods and insertion of Small Absorber Spheres (SASs) which are composed of boron carbide); post-event monitoring; and manual reactor shutdown, which is independent of software-based systems. The reactor shutdown and post-event instrumentation monitoring components of the Protection System are being implemented utilizing the WEC 'Common Q' platform, which is comprised of 'commercially dedicated' Programmable Logic Controllers (PLCs), colour-graphic Flat Panel Displays (FPDs) with integral touch screens, and high-speed data communication links. High reliability and availability are achieved through component redundancy, continuous automatic self-testing which is run online in a background mode, and implementation of a multi-channel system design which is tolerant to failures. The Protection System is also designed to support periodic surveillance testing through a suite of built- in computer-aided test facilities that are accessible via an FPD interface. These allow various system surveillance requirements to be readily performed in a convenient and systematic manner. This paper discusses the following topics with regard to the PBMR Protection System: development strategy, functional requirements, selection of applicable Codes and Standards

  11. Evaluation of digital soil mapping approaches with large sets of environmental covariates

    Science.gov (United States)

    Nussbaum, Madlene; Spiess, Kay; Baltensweiler, Andri; Grob, Urs; Keller, Armin; Greiner, Lucie; Schaepman, Michael E.; Papritz, Andreas

    2018-01-01

    The spatial assessment of soil functions requires maps of basic soil properties. Unfortunately, these are either missing for many regions or are not available at the desired spatial resolution or down to the required soil depth. The field-based generation of large soil datasets and conventional soil maps remains costly. Meanwhile, legacy soil data and comprehensive sets of spatial environmental data are available for many regions. Digital soil mapping (DSM) approaches relating soil data (responses) to environmental data (covariates) face the challenge of building statistical models from large sets of covariates originating, for example, from airborne imaging spectroscopy or multi-scale terrain analysis. We evaluated six approaches for DSM in three study regions in Switzerland (Berne, Greifensee, ZH forest) by mapping the effective soil depth available to plants (SD), pH, soil organic matter (SOM), effective cation exchange capacity (ECEC), clay, silt, gravel content and fine fraction bulk density for four soil depths (totalling 48 responses). Models were built from 300-500 environmental covariates by selecting linear models through (1) grouped lasso and (2) an ad hoc stepwise procedure for robust external-drift kriging (georob). For (3) geoadditive models we selected penalized smoothing spline terms by component-wise gradient boosting (geoGAM). We further used two tree-based methods: (4) boosted regression trees (BRTs) and (5) random forest (RF). Lastly, we computed (6) weighted model averages (MAs) from the predictions obtained from methods 1-5. Lasso, georob and geoGAM successfully selected strongly reduced sets of covariates (subsets of 3-6 % of all covariates). Differences in predictive performance, tested on independent validation data, were mostly small and did not reveal a single best method for 48 responses. Nevertheless, RF was often the best among methods 1-5 (28 of 48 responses), but was outcompeted by MA for 14 of these 28 responses. RF tended to over

  12. Technological problems connected with execution of the protection sheets for nuclear power sets WWER-1000

    International Nuclear Information System (INIS)

    Hajutin, J.G.; Kriczewskij, A.Z.

    1977-01-01

    The choice of the structure and the prestressing system of the R.C. protection sheet for nuclear power sets WWER-1000 is motivated. The technological problems arised during the execution stage, as well as the technological line producing the tendons to prestress the structure by up winding are presented. (author)

  13. NEWLIN: A digital computer program for the linearisation of sets of algebraic and first order differential equations

    International Nuclear Information System (INIS)

    Hopkinson, A.

    1969-05-01

    The techniques normally used for linearisation of equations are not amenable to general treatment by digital computation. This report describes a computer program for linearising sets of equations by numerical evaluations of partial derivatives. The program is written so that the specification of the non-linear equations is the same as for the digital simulation program, FIFI, and the linearised equations can be punched out in form suitable for input to the frequency response program FRP2 and the poles and zeros program ZIP. Full instructions for the use of the program are given and a sample problem input and output are shown. (author)

  14. DIGITAL

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — The Digital Flood Insurance Rate Map (DFIRM) Database depicts flood risk information and supporting data used to develop the risk data. The primary risk...

  15. Galaxy Evolution Insights from Spectral Modeling of Large Data Sets from the Sloan Digital Sky Survey

    Energy Technology Data Exchange (ETDEWEB)

    Hoversten, Erik A. [Johns Hopkins Univ., Baltimore, MD (United States)

    2007-10-01

    This thesis centers on the use of spectral modeling techniques on data from the Sloan Digital Sky Survey (SDSS) to gain new insights into current questions in galaxy evolution. The SDSS provides a large, uniform, high quality data set which can be exploited in a number of ways. One avenue pursued here is to use the large sample size to measure precisely the mean properties of galaxies of increasingly narrow parameter ranges. The other route taken is to look for rare objects which open up for exploration new areas in galaxy parameter space. The crux of this thesis is revisiting the classical Kennicutt method for inferring the stellar initial mass function (IMF) from the integrated light properties of galaxies. A large data set (~ 105 galaxies) from the SDSS DR4 is combined with more in-depth modeling and quantitative statistical analysis to search for systematic IMF variations as a function of galaxy luminosity. Galaxy Hα equivalent widths are compared to a broadband color index to constrain the IMF. It is found that for the sample as a whole the best fitting IMF power law slope above 0.5 M is Γ = 1.5 ± 0.1 with the error dominated by systematics. Galaxies brighter than around Mr,0.1 = -20 (including galaxies like the Milky Way which has Mr,0.1 ~ -21) are well fit by a universal Γ ~ 1.4 IMF, similar to the classical Salpeter slope, and smooth, exponential star formation histories (SFH). Fainter galaxies prefer steeper IMFs and the quality of the fits reveal that for these galaxies a universal IMF with smooth SFHs is actually a poor assumption. Related projects are also pursued. A targeted photometric search is conducted for strongly lensed Lyman break galaxies (LBG) similar to MS1512-cB58. The evolution of the photometric selection technique is described as are the results of spectroscopic follow-up of the best targets. The serendipitous discovery of two interesting blue compact dwarf galaxies is reported. These

  16. Copyright protection of remote sensing imagery by means of digital watermarking

    Science.gov (United States)

    Barni, Mauro; Bartolini, Franco; Cappellini, Vito; Magli, Enrico; Olmo, Gabriella; Zanini, R.

    2001-12-01

    The demand for remote sensing data has increased dramatically mainly due to the large number of possible applications capable to exploit remotely sensed data and images. As in many other fields, along with the increase of market potential and product diffusion, the need arises for some sort of protection of the image products from unauthorized use. Such a need is a very crucial one even because the Internet and other public/private networks have become preferred and effective means of data exchange. An important issue arising when dealing with digital image distribution is copyright protection. Such a problem has been largely addressed by resorting to watermarking technology. Before applying watermarking techniques developed for multimedia applications to remote sensing applications, it is important that the requirements imposed by remote sensing imagery are carefully analyzed to investigate whether they are compatible with existing watermarking techniques. On the basis of these motivations, the contribution of this work is twofold: (1) assessment of the requirements imposed by the characteristics of remotely sensed images on watermark-based copyright protection; (2) discussion of a case study where the performance of two popular, state-of-the-art watermarking techniques are evaluated by the light of the requirements at the previous point.

  17. Organisational aspects of mammography screening in digital settings: First experiences of Luxembourg

    International Nuclear Information System (INIS)

    Shannoun, F.; Schanck, J. M.; Scharpantgen, A.; Wagnon, M. C.; Ben Daoud, M.; Back, C.

    2008-01-01

    Luxembourg has been conducting a breast cancer screening programme since 1992, like a large number of other European countries, as early detection and treatment of breast cancer have been proven to reduce mortality. The majority of these screening programmes are based on analogue X-ray technology and have optimised their organisation of transporting, archiving and reading with respect to films. Last decade is marked by enormous developments in digital mammography. Different technologies such as flat panel-, computed radiography- and scanning systems became available. Digital mammography is expected to have a major impact on quality and organisation of breast cancer screening programmes. Screening programmes are now faced with a huge challenge of incorporating the digital technology, including implementation of electronic image exchange, conception of new electronic work-flow, establishing adapted quality assurance programmes and training of radiologists and technical personnel. Initial experiences of the Luxembourg approach in organising digital mammography screening and its quality assurance are reported. (authors)

  18. A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography.

    Science.gov (United States)

    Devi, B Pushpa; Singh, Kh Manglem; Roy, Sudipta

    2016-01-01

    This paper proposes a new watermarking algorithm based on the shuffled singular value decomposition and the visual cryptography for copyright protection of digital images. It generates the ownership and identification shares of the image based on visual cryptography. It decomposes the image into low and high frequency sub-bands. The low frequency sub-band is further divided into blocks of same size after shuffling it and then the singular value decomposition is applied to each randomly selected block. Shares are generated by comparing one of the elements in the first column of the left orthogonal matrix with its corresponding element in the right orthogonal matrix of the singular value decomposition of the block of the low frequency sub-band. The experimental results show that the proposed scheme clearly verifies the copyright of the digital images, and is robust to withstand several image processing attacks. Comparison with the other related visual cryptography-based algorithms reveals that the proposed method gives better performance. The proposed method is especially resilient against the rotation attack.

  19. Protecting Oak Flat: Narratives Of Survivance As Observed Through Digital Activism

    Directory of Open Access Journals (Sweden)

    Nicholet Deschine Parkhurst

    2017-07-01

    Full Text Available American Indians are increasingly using social media/social network platforms as a tool to influence policy through social change. The activist group Apache Stronghold represents a case of American Indians utilising social media tools to protect Oak Flat and influence federal Indian policy. Oak Flat is sacred Apache land located in Superior, Arizona. United States legislators transferred Oak Flat to the mining company Resolution Copper as part of the omnibus National Defense Authorization Act of 2015. Qualitative analysis of social media content and advocacy tactics – specifically through use of timeline and digital ethnography – of Apache Stronghold from 2015-2016 reveal the interrelated nature of on-the-ground efforts, online efforts, solidarity efforts, and legislative support efforts. In sum, these efforts express narratives of survivance, healing, and a future orientation, as a unique dimension of social change.

  20. Initial mechanical ventilator settings and lung protective ventilation in the ED.

    Science.gov (United States)

    Wilcox, Susan R; Richards, Jeremy B; Fisher, Daniel F; Sankoff, Jeffrey; Seigel, Todd A

    2016-08-01

    Mechanical ventilation with low tidal volumes has been shown to improve outcomes for patients both with and without acute respiratory distress syndrome. This study aims to characterize mechanically ventilated patients in the emergency department (ED), describe the initial ED ventilator settings, and assess for associations between lung protective ventilation strategies in the ED and outcomes. This was a multicenter, prospective, observational study of mechanical ventilation at 3 academic EDs. We defined lung protective ventilation as a tidal volume of less than or equal to 8 mL/kg of predicted body weight and compared outcomes for patients ventilated with lung protective vs non-lung protective ventilation, including inhospital mortality, ventilator days, intensive care unit length of stay, and hospital length of stay. Data from 433 patients were analyzed. Altered mental status without respiratory pathology was the most common reason for intubation, followed by trauma and respiratory failure. Two hundred sixty-one patients (60.3%) received lung protective ventilation, but most patients were ventilated with a low positive end-expiratory pressure, high fraction of inspired oxygen strategy. Patients were ventilated in the ED for a mean of 5 hours and 7 minutes but had few ventilator adjustments. Outcomes were not significantly different between patients receiving lung protective vs non-lung protective ventilation. Nearly 40% of ED patients were ventilated with non-lung protective ventilation as well as with low positive end-expiratory pressure and high fraction of inspired oxygen. Despite a mean ED ventilation time of more than 5 hours, few patients had adjustments made to their ventilators. Copyright © 2016 Elsevier Inc. All rights reserved.

  1. Literacy Development in Multicultural Settings with Digital Dual-language Books

    Directory of Open Access Journals (Sweden)

    Yıldız Turgut

    2011-10-01

    Full Text Available Problem Statement: Providing a story in two languages, digital dual-language storybooks can play an important role in supporting EFL students‟ cultural awareness, language and literacy skills. Based on constructivist theoretical framework, this study investigates the impact of digital dual-language storybooks on bilingual learners‟ vocabulary knowledge and reading comprehension skills.Methods: The participants of the study were ten seventh and eighth grade students who were bilingual in Arabic and Turkish, studying English at an elementary level as a compulsory course at a primary school in Turkey. In order to determine the impact of digital dual-language storybooks, the students read two different digital dual-language storybooks individually at different times. Through the process, think aloud procedures, observations and semi-structured interviews were conducted. Transcriptions of observations and interviews were analyzed through discourse analysis.Findings and Results: The results of the study indicated that the use of dual language books have a significant impact on learners‟ vocabulary knowledge growth. Using digital dual-language storybooks, learners can develop some strategies for learning new words, make use of images in comprehending the story and engage eagerly to the stories as they reflect and value their own culture and heritage.Conclusions and Recommendations: Awareness about new language systems, diversity and multiculturality in learners‟ immediate environment can be raised.

  2. Determination of settings in the protection system for Tokamak-15 superconducting magnet

    International Nuclear Information System (INIS)

    Chudnovsky, A.N.; Khvostenko, P.P.; Posadsky, I.A.

    1996-01-01

    The calculations results of the maximal temperature heating of Tokamak-15 superconducting magnet (T-15 SM) under energy removal dependent on the current through the coil are given in paper. The calculations of SM thermomechanical strength have shown that the maximal coil heating temperature should not exceed 150--160 K. The range of the settings level in SM protection system for currents 1 ≤ 4 kA has been determined

  3. Refining Measures for Assessing Problematic/Addictive Digital Gaming Use in Clinical and Research Settings

    Directory of Open Access Journals (Sweden)

    Kyle Faust

    2015-08-01

    Full Text Available Problematic or addictive digital gaming (including all types of electronic devices can and has had extremely adverse impacts on the lives of many individuals across the world. The understanding of this phenomenon, and the effectiveness of treatment design and monitoring, can be improved considerably by continuing refinement of assessment tools. The present article briefly overviews tools designed to measure problematic or addictive use of digital gaming, the vast majority of which are founded on the Diagnostic and Statistical Manual of Mental Disorders (DSM criteria for other addictive disorders, such as pathological gambling. Although adapting DSM content and strategies for measuring problematic digital gaming has proven valuable, there are some potential issues with this approach. We discuss the strengths and limitations of current methods for measuring problematic or addictive gaming and provide various recommendations that might help in enhancing or supplementing existing tools, or in developing new and even more effective tools.

  4. Refining Measures for Assessing Problematic/Addictive Digital Gaming Use in Clinical and Research Settings.

    Science.gov (United States)

    Faust, Kyle; Faust, David

    2015-08-12

    Problematic or addictive digital gaming (including all types of electronic devices) can and has had extremely adverse impacts on the lives of many individuals across the world. The understanding of this phenomenon, and the effectiveness of treatment design and monitoring, can be improved considerably by continuing refinement of assessment tools. The present article briefly overviews tools designed to measure problematic or addictive use of digital gaming, the vast majority of which are founded on the Diagnostic and Statistical Manual of Mental Disorders (DSM) criteria for other addictive disorders, such as pathological gambling. Although adapting DSM content and strategies for measuring problematic digital gaming has proven valuable, there are some potential issues with this approach. We discuss the strengths and limitations of current methods for measuring problematic or addictive gaming and provide various recommendations that might help in enhancing or supplementing existing tools, or in developing new and even more effective tools.

  5. Functional needs which led to the use of digital computing devices in the protection system of 1300 MW units

    International Nuclear Information System (INIS)

    Dalle, H.

    1986-01-01

    After a review of classical protection functions used in 900 MW power plants, it is concluded that in order to have functioning margins it is useful to calculate more finely the controled parameters. These calculating needs lead to the use of digital computing devices. Drawing profit from the new possibilities one can improve the general performances of the protection system with regard to availability, safety and maintenance. These options in the case of PALUEL led to the realization of SPIN, described here

  6. Evaluation of DNBR calculation methods for advanced digital core protection system

    International Nuclear Information System (INIS)

    Ihn, W. K.; Hwang, D. H.; Pak, Y. H.; Yoon, T. Y.

    2003-01-01

    This study evaluated the on-line DNBR calculation methods for an advanced digital core protection system in PWR, i.e., subchannel analysis and group-channel analysis. The subchannel code MATRA and the four-channel codes CETOP-D and CETOP2 were used here. CETOP2 is most simplified DNBR analysis code which is implemented in core protection calculator in Korea standard nuclear power plants. The detailed subchannel code TORC was used as a reference calculation of DNBR. The DNBR uncertainty and margin were compared using allowable operating conditions at Yonggwang nuclear units 3-4. The MATRA code using a nine lumping-channel model resulted in smaller mean and larger standard deviation of the DNBR error distribution. CETOP-D and CETOP2 showed conservatively biased mean and relatively smaller standard deviation of the DNBR error distribution. MATRA and CETOP-D w.r.t CETOP2 showed significant increase of the DNBR available margin at normal operating condition. Taking account for the DNBR uncertainty, MATRA and CETOP-D over CETOP2 were estimated to increase the DNBR net margin by 2.5%-9.8% and 2.5%-3.3%, respectively

  7. Setting value optimization method in integration for relay protection based on improved quantum particle swarm optimization algorithm

    Science.gov (United States)

    Yang, Guo Sheng; Wang, Xiao Yang; Li, Xue Dong

    2018-03-01

    With the establishment of the integrated model of relay protection and the scale of the power system expanding, the global setting and optimization of relay protection is an extremely difficult task. This paper presents a kind of application in relay protection of global optimization improved particle swarm optimization algorithm and the inverse time current protection as an example, selecting reliability of the relay protection, selectivity, quick action and flexibility as the four requires to establish the optimization targets, and optimizing protection setting values of the whole system. Finally, in the case of actual power system, the optimized setting value results of the proposed method in this paper are compared with the particle swarm algorithm. The results show that the improved quantum particle swarm optimization algorithm has strong search ability, good robustness, and it is suitable for optimizing setting value in the relay protection of the whole power system.

  8. A study of digital hardware architectures for nuclear reactors protection systems applications - reliability and safety analysis methods

    International Nuclear Information System (INIS)

    Benko, Pedro Luiz

    1997-01-01

    A study of digital hardware architectures, including experience in many countries, topologies and solutions to interface circuits for protection systems of nuclear reactors is presented. Methods for developing digital systems architectures based on fault tolerant and safety requirements is proposed. Directives for assessing such conditions are suggested. Techniques and the most common tools employed in reliability, safety evaluation and modeling of hardware architectures is also presented. Markov chain modeling is used to evaluate the reliability of redundant architectures. In order to estimate software quality, several mechanisms to be used in design, specification, and validation and verification (V and V) procedures are suggested. A digital protection system architecture has been analyzed as a case study. (author)

  9. An integrated model for reliability estimation of digital nuclear protection system based on fault tree and software control flow methodologies

    International Nuclear Information System (INIS)

    Kim, Man Cheol; Seong, Poong Hyun

    2000-01-01

    In the nuclear industry, the difficulty of proving the reliabilities of digital systems prohibits the widespread use of digital systems in various nuclear application such as plant protection system. Even though there exist a few models which are used to estimate the reliabilities of digital systems, we develop a new integrated model which is more realistic than the existing models. We divide the process of estimating the reliability of a digital system into two phases, a high-level phase and a low-level phase, and the boundary of two phases is the reliabilities of subsystems. We apply software control flow method to the low-level phase and fault tree analysis to the high-level phase. The application of the model to Dynamic Safety System(DDS) shows that the estimated reliability of the system is quite reasonable and realistic

  10. An integrated model for reliability estimation of digital nuclear protection system based on fault tree and software control flow methodologies

    International Nuclear Information System (INIS)

    Kim, Man Cheol; Seong, Poong Hyun

    2000-01-01

    In nuclear industry, the difficulty of proving the reliabilities of digital systems prohibits the widespread use of digital systems in various nuclear application such as plant protection system. Even though there exist a few models which are used to estimate the reliabilities of digital systems, we develop a new integrated model which is more realistic than the existing models. We divide the process of estimating the reliability of a digital system into two phases, a high-level phase and a low-level phase, and the boundary of two phases is the reliabilities of subsystems. We apply software control flow method to the low-level phase and fault tree analysis to the high-level phase. The application of the model of dynamic safety system (DSS) shows that the estimated reliability of the system is quite reasonable and realistic. (author)

  11. Minor protection or major injustice? – Children's rights and digital preventions directed at youth in the Dutch justice system

    NARCIS (Netherlands)

    La Fors, Karolina

    2015-01-01

    The United Nations Convention on the Rights of the Child (CRC) is the most essential place-holder for protecting children's rights internationally. In support of its leading principle: “the best interest of the child” (Art. 3) a growing number of digital technologies are employed in different

  12. Digital Educational Games and Mathematics. Results of a Case Study in Primary School Settings

    Science.gov (United States)

    Fokides, Emmanuel

    2018-01-01

    The study presents the results of a project in which a series of digital games were used for teaching Mathematics to first, fourth, and sixth-grade primary school students (ages 6-7, 8-9, and 11-12). Mathematics was selected as the teaching subject because of the difficulties students face in understanding basic math concepts. Although digital…

  13. Developing a free and easy to use digital goal setting tool for busy mums

    Directory of Open Access Journals (Sweden)

    Babs Evans

    2015-09-01

    Using data, research and the expertise of commercial and charity partners was an effective way to design a digital product to support behavioural change. By understanding the target audience from the beginning and involving them in the planning stages, the organisations were able to develop a tool the users want with a strong focus on user experience.

  14. DOPA, a Digital Observatory for Protected Areas including Monitoring and Forecasting Services

    Science.gov (United States)

    Dubois, Gregoire; Hartley, Andrew; Peedell, Stephen; de Jesus, Jorge; Ó Tuama, Éamonn; Cottam, Andrew; May, Ian; Fisher, Ian; Nativi, Stefano; Bertrand, Francis

    2010-05-01

    The Digital Observatory for Protected Areas (DOPA) is a biodiversity information system currently developed as an interoperable web service at the Joint Research Centre of the European Commission in collaboration with other international organizations, including GBIF, UNEP-WCMC, Birdlife International and RSPB. DOPA is designed to assess the state and pressure of Protected Areas (PAs) and to prioritize them accordingly, in order to support decision making and fund allocation processes. To become an operational web service allowing the automatic monitoring of protected areas, DOPA needs to be able to capture the dynamics of spatio-temporal changes in habitats and anthropogenic pressure on PAs as well as the changes in the species distributions. Because some of the most valuable natural ecosystems and species on the planet cover large areas making field monitoring methods very difficult for a large scale assessment, the automatic collection and processing of remote sensing data are processes at the heart of the problem. To further be able to forecast changes due to climate change, DOPA has to rely on an architecture that enables it to communicate with the appropriate modeling web services. The purpose of this presentation is to present the architecture of the DOPA with special attention to e-Habitat, its web processing service designed for assessing the irreplaceability of habitats as well as for the modeling of habitats under different climate change scenarios. The use of open standards for spatial data and of open source programming languages for the development of the core functionalities of the system are expected to encourage the participation of the scientific community beyond the current partnerships and to favour the sharing of such an observatory which could be installed at any other location. Acknowledgement: Part of this work is funded under the 7th Framework Programme by the EuroGEOSS (www.eurogeoss.eu) project of the European Commission. The views

  15. Software Unit Testing during the Development of Digital Reactor Protection System of HTR-PM

    International Nuclear Information System (INIS)

    Guo Chao; Xiong Huasheng; Li Duo; Zhou Shuqiao; Li Jianghai

    2014-01-01

    Reactor Protection System (RPS) of High Temperature Gas-Cooled Reactor - Pebble bed Module (HTR-PM) is the first digital RPS designed and to be operated in the Nuclear Power Plant (NPP) of China, and its development process has receives a lot of concerns around the world. As a 1E-level safety system, the RPS has to be designed and developed following a series of nuclear laws and technical disciplines including software verification and validation (software V&V). Software V&V process demonstrates whether all stages during the software development are performed correctly, completely, accurately, and consistently, and the results of each stage are testable. Software testing is one of the most significant and time-consuming effort during software V&V. In this paper, we give a comprehensive introduction to the software unit testing during the development of RPS in HTR-PM. We first introduce the objective of the testing for our project in the aspects of static testing, black-box testing, and white-box testing. Then the testing techniques, including static testing and dynamic testing, are explained, and the testing strategy we employed is also introduced. We then introduce the principles of three kinds of coverage criteria we used including statement coverage, branch coverage, and the modified condition/decision coverage. As a 1E-level safety software, testing coverage needs to be up to 100% mandatorily. Then we talk the details of safety software testing during software development in HTR-PM, including the organization, methods and tools, testing stages, and testing report. The test result and experiences are shared and finally we draw a conclusion for the unit testing process. The introduction of this paper can contribute to improve the process of unit testing and software development for other digital instrumentation and control systems in NPPs. (author)

  16. Personal protective equipment and improving compliance among healthcare workers in high-risk settings.

    Science.gov (United States)

    Honda, Hitoshi; Iwata, Kentaro

    2016-08-01

    Personal protective equipment (PPE) protects healthcare workers (HCWs) from infection by highly virulent pathogens via exposure to body fluids and respiratory droplets. Given the recent outbreaks of contagious infectious diseases worldwide, including Ebola virus and Middle Eastern respiratory syndrome, there is urgent need for further research to determine optimal PPE use in high-risk settings. This review intends to provide a general understanding of PPE and to provide guidelines for appropriate use based on current evidence. Although previous studies have focused on the efficacy of PPE in preventing transmission of pathogens, recent studies have examined the dangers to HCWs during removal of PPE when risk of contamination is highest. Access to adequate PPE supplies is crucial to preventing transmission of pathogens, especially in resource-limited settings. Adherence to appropriate PPE use is a challenge due to inadequate education on its usage, technical difficulties, and tolerability of PPE in the workplace. Future projects aim at ameliorating this situation, including redesigning PPE which is crucial to improving the safety of HCWs. PPE remains the most important strategy for protecting HCW from potentially fatal pathogens. Further research into optimal PPE design and use to improve the safety of HCWs is urgently needed.

  17. Development of an Advanced Digital Reactor Protection System Using Diverse Dual Processors to Prevent Common-Mode Failure

    International Nuclear Information System (INIS)

    Shin, Hyun Kook; Nam, Sang Ku; Sohn, Se Do; Chang, Hoon Seon

    2003-01-01

    The advanced digital reactor protection system (ADRPS) with diverse dual processors has been developed to prevent common-mode failure (CMF). The principle of diversity is applied to both hardware design and software design. For hardware diversity, two different types of CPUs are used for the bistable processor and local coincidence logic (LCL) processor. The Versa Module Eurocard-based single board computers are used for the CPU hardware platforms. The QNX operating system and the VxWorks operating system were selected for software diversity. Functional diversity is also applied to the input and output modules, and to the algorithm in the bistable processors and LCL processors. The characteristics of the newly developed digital protection system are described together with the preventive capability against CMF. Also, system reliability analysis is discussed. The evaluation results show that the ADRPS has a good preventive capability against the CMF and is a highly reliable reactor protection system

  18. An Open-Source Tool Set Enabling Analog-Digital-Software Co-Design

    Directory of Open Access Journals (Sweden)

    Michelle Collins

    2016-02-01

    Full Text Available This paper presents an analog-digital hardware-software co-design environment for simulating and programming reconfigurable systems. The tool simulates, designs, as well as enables experimental measurements after compiling to configurable systems in the same integrated design tool framework. High level software in Scilab/Xcos (open-source programs similar to MATLAB/Simulink that converts the high-level block description by the user to blif format (sci2blif, which acts as an input to the modified VPR tool, including the code v p r 2 s w c s , encoding the specific platform through specific architecture files, resulting in a targetable switch list on the resulting configurable analog–digital system. The resulting tool uses an analog and mixed-signal library of components, enabling users and future researchers access to the basic analog operations/computations that are possible.

  19. Digital broadcasting set to transform communication landscape by 2015: RRC-06

    CERN Multimedia

    2006-01-01

    "The conclusion of ITU's Regional Radiocommuncation Conference (RRC-06) in Geneva saw the signing of a treaty agreement that is a major step in implementing World Summit on the Information Society objectives. The digitalization of broadcasting in Europe, Africa, Middle East and the Islamic Republic of Iran by 2015 represents a major landmark towards establishing a more equitable, just and people-centred Information Society." (2 pages)

  20. Voltage protection scheme for MG sets used to drive inductive energy storage systems

    International Nuclear Information System (INIS)

    Campen, G.L.; Easter, R.B.

    1977-01-01

    A recent tokamak proposal at ORNL called for MG (motor-generator) sets to drive the ohmic heating (OH] coil, which was to be subjected to 20 kV immediately after coil charge-up to initiate the experiment. Since most rotating machinery is inherently low voltage, including the machines available at ORNL, a mechanism was necessary to isolate the generators from the high voltage portions of the circuit before the appearance of this voltage. It is not the expected 20 kV at the coil that causes difficulty, because the main interrupting switch handles this. The voltage induced in the armature due to di/dt and the possibility of faults are the greatest causes for concern and are responsible for the complexity of the voltage protection scheme, which must accommodate any possible combination of fault time and location. Such a protection scheme is presented in this paper

  1. Estimation of reliability on digital plant protection system in nuclear power plants using fault simulation with self-checking

    International Nuclear Information System (INIS)

    Lee, Jun Seok; Kim, Suk Joon; Seong, Poong Hyun

    2004-01-01

    Safety-critical digital systems in nuclear power plants require high design reliability. Reliable software design and accurate prediction methods for the system reliability are important problems. In the reliability analysis, the error detection coverage of the system is one of the crucial factors, however, it is difficult to evaluate the error detection coverage of digital instrumentation and control system in nuclear power plants due to complexity of the system. To evaluate the error detection coverage for high efficiency and low cost, the simulation based fault injections with self checking are needed for digital instrumentation and control system in nuclear power plants. The target system is local coincidence logic in digital plant protection system and a simplified software modeling for this target system is used in this work. C++ based hardware description of micro computer simulator system is used to evaluate the error detection coverage of the system. From the simulation result, it is possible to estimate the error detection coverage of digital plant protection system in nuclear power plants using simulation based fault injection method with self checking. (author)

  2. Performance Improvement of the Core Protection Calculator System (CPCS) by Introducing Optimal Function Sets

    International Nuclear Information System (INIS)

    Won, Byung Hee; Kim, Kyung O; Kim, Jong Kyung; Kim, Soon Young

    2012-01-01

    The Core Protection Calculator System (CPCS) is an automated device which is adopted to inspect the safety parameters such as Departure from Nuclear Boiling Ratio (DNBR) and Local Power Density (LPD) during normal operation. One function of the CPCS is to predict the axial power distributions using function sets in cubic spline method. Another function of that is to impose penalty when the estimated distribution by the spline method disagrees with embedded data in CPCS (i.e., over 8%). In conventional CPCS, restricted function sets are used to synthesize axial power shape, whereby it occasionally can draw a disagreement between synthesized data and the embedded data. For this reason, the study on improvement for power distributions synthesis in CPCS has been conducted in many countries. In this study, many function sets (more than 18,000 types) differing from the conventional ones were evaluated in each power shape. Matlab code was used for calculating/arranging the numerous cases of function sets. Their synthesis performance was also evaluated through error between conventional data and consequences calculated by new function sets

  3. Artificial neural networks applied to DNBR calculation in digital core protection systems

    International Nuclear Information System (INIS)

    Lee, H. C.; Chang, S. H.

    2003-01-01

    The nuclear power plant has to be operated with sufficient margin from the specified DNBR limit for assuring its safety. The digital core protection system calculates on-line real-time DNBR by using a complex subchannel analysis program, and triggers a reliable reactor shutdown if the calculated DNBR approaches the specified limit. However, it takes relatively long calculation time even for a steady state condition, which may have an adverse effect on the operation flexibility. To overcome the drawback, a method using artificial neural networks is studied in this paper. Nonparametric training approach is utilized, which shows dramatic reduction of the training time, no tedious heuristic process for optimizing parameters, and no local minima problem during the training. The test results show that the predicted DNBR is within about ±2% deviation from the target DNBR for the fixed axial flux shape case. For the variable axial flux case including severely skewed shapes appeared during accidents, the deviation is about ±10∼15%. The suggested method could be the alternative that can calculate DNBR very quickly while increasing the plant availability

  4. Radial basis function networks applied to DNBR calculation in digital core protection systems

    International Nuclear Information System (INIS)

    Lee, Gyu-Cheon; Heung Chang, Soon

    2003-01-01

    The nuclear power plant has to be operated with sufficient margin from the specified DNBR limit for assuring its safety. The digital core protection system calculates on-line real-time DNBR by using a complex subchannel analysis program, and triggers a reliable reactor shutdown if the calculated DNBR approaches the specified limit. However, it takes a relatively long calculation time even for a steady state condition, which may have an adverse effect on the operation flexibility. To overcome the drawback, a new method using a radial basis function network is presented in this paper. Nonparametric training approach is utilized, which shows dramatic reduction of the training time, no tedious heuristic process for optimizing parameters, and no local minima problem during the training. The test results show that the predicted DNBR is within about ±2% deviation from the target DNBR for the fixed axial flux shape case. For the variable axial flux case including severely skewed shapes that appeared during accidents, the deviation is within about ±10%. The suggested method could be the alternative that can calculate DNBR very quickly while guaranteeing the plant safety

  5. Protecting human health and security in digital Europe: how to deal with the "privacy paradox"?

    Science.gov (United States)

    Büschel, Isabell; Mehdi, Rostane; Cammilleri, Anne; Marzouki, Yousri; Elger, Bernice

    2014-09-01

    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to shed light on the tension between secrecy and transparency in the digital era. A special focus is put from the perspectives of psychology, medical ethics and European law on the contradiction between individuals' motivations for consented processing of personal data and their fears about unknown disclosure, transferal and sharing of personal data via information and communication technologies (named the "privacy paradox"). Potential benefits and harms for the individual and society resulting from the use of computers, mobile phones, the Internet and social media are being discussed. Furthermore, the authors point out the ethical and legal limitations inherent to the processing of personal data in a democratic society governed by the rule of law. Finally, they seek to demonstrate that the impact of information and communication technology use on the individuals' well-being, the latter being closely correlated with a high level of fundamental rights protection in Europe, is a promising feature of the socalled "e-democracy" as a new way to collectively attribute meaning to large-scale online actions, motivations and ideas.

  6. Improved methodology for generation of axial flux shapes in digital core protection systems

    International Nuclear Information System (INIS)

    Lee, G.-C.; Baek, W.-P.; Chang, S.H.

    2002-01-01

    An improved method of axial flux shape (AFS) generation for digital core protection systems of pressurized water reactors is presented in this paper using an artificial neural network (ANN) technique - a feedforward network trained by backpropagation. It generates 20-node axial power shapes based on the information from three ex-core detectors. In developing the method, a total of 7173 axial flux shapes are generated from ROCS code simulation for training and testing of the ANN. The ANN trained 200 data predicts the remaining data with the average root mean square error of about 3%. The developed method is also tested with the real plant data measured during normal operation of Yonggwang Unit 4. The RMS errors in the range of 0.9∼2.1% are about twice as accurate as the cubic spline approximation method currently used in the plant. The developed method would contribute to solve the drawback of the current method as it shows reasonable accuracy over wide range of core conditions

  7. Formal verification and validation of the safety-critical software in a digital reactor protection system

    International Nuclear Information System (INIS)

    Kwon, K. C.; Park, G. Y.

    2006-01-01

    This paper describes the Verification and Validation (V and V) activities for the safety-critical software in a Digital Reactor Protection System (DRPS) that is being developed through the Korea nuclear instrumentation and control system project. The main activities of the DRPS V and V process are a preparation of the software planning documentation, a verification of the software according to the software life cycle, a software safety analysis and a software configuration management. The verification works for the Software Requirement Specification (SRS) of the DRPS consist of a technical evaluation, a licensing suitability evaluation, a inspection and traceability analysis, a formal verification, and preparing a test plan and procedure. Especially, the SRS is specified by the formal specification method in the development phase, and the formal SRS is verified by a formal verification method. Through these activities, we believe we can achieve the functionality, performance, reliability, and safety that are the major V and V objectives of the nuclear safety-critical software in a DRPS. (authors)

  8. Digital filtering techniques applied to electric power systems protection; Tecnicas de filtragem digital aplicadas a protecao de sistemas eletricos de potencia

    Energy Technology Data Exchange (ETDEWEB)

    Brito, Helio Glauco Ferreira

    1996-12-31

    This work introduces an analysis and a comparative study of some of the techniques for digital filtering of the voltage and current waveforms from faulted transmission lines. This study is of fundamental importance for the development of algorithms applied to digital protection of electric power systems. The techniques studied are based on the Discrete Fourier Transform theory, the Walsh functions and the Kalman filter theory. Two aspects were emphasized in this study: Firstly, the non-recursive techniques were analysed with the implementation of filters based on Fourier theory and the Walsh functions. Secondly, recursive techniques were analyzed, with the implementation of the filters based on the Kalman theory and once more on the Fourier theory. (author) 56 refs., 25 figs., 16 tabs.

  9. Digital immunohistochemistry wizard: image analysis-assisted stereology tool to produce reference data set for calibration and quality control.

    Science.gov (United States)

    Plancoulaine, Benoît; Laurinaviciene, Aida; Meskauskas, Raimundas; Baltrusaityte, Indra; Besusparis, Justinas; Herlin, Paulette; Laurinavicius, Arvydas

    2014-01-01

    Digital image analysis (DIA) enables better reproducibility of immunohistochemistry (IHC) studies. Nevertheless, accuracy of the DIA methods needs to be ensured, demanding production of reference data sets. We have reported on methodology to calibrate DIA for Ki67 IHC in breast cancer tissue based on reference data obtained by stereology grid count. To produce the reference data more efficiently, we propose digital IHC wizard generating initial cell marks to be verified by experts. Digital images of proliferation marker Ki67 IHC from 158 patients (one tissue microarray spot per patient) with an invasive ductal carcinoma of the breast were used. Manual data (mD) were obtained by marking Ki67-positive and negative tumour cells, using a stereological method for 2D object enumeration. DIA was used as an initial step in stereology grid count to generate the digital data (dD) marks by Aperio Genie and Nuclear algorithms. The dD were collected into XML files from the DIA markup images and overlaid on the original spots along with the stereology grid. The expert correction of the dD marks resulted in corrected data (cD). The percentages of Ki67 positive tumour cells per spot in the mD, dD, and cD sets were compared by single linear regression analysis. Efficiency of cD production was estimated based on manual editing effort. The percentage of Ki67-positive tumor cells was in very good agreement in the mD, dD, and cD sets: regression of cD from dD (R2=0.92) reflects the impact of the expert editing the dD as well as accuracy of the DIA used; regression of the cD from the mD (R2=0.94) represents the consistency of the DIA-assisted ground truth (cD) with the manual procedure. Nevertheless, the accuracy of detection of individual tumour cells was much lower: in average, 18 and 219 marks per spot were edited due to the Genie and Nuclear algorithm errors, respectively. The DIA-assisted cD production in our experiment saved approximately 2/3 of manual marking. Digital IHC wizard

  10. Power Trip Set-points of Reactor Protection System for New Research Reactor

    International Nuclear Information System (INIS)

    Lee, Byeonghee; Yang, Soohyung

    2013-01-01

    This paper deals with the trip set-point related to the reactor power considering the reactivity induced accident (RIA) of new research reactor. The possible scenarios of reactivity induced accidents were simulated and the effects of trip set-point on the critical heat flux ratio (CHFR) were calculated. The proper trip set-points which meet the acceptance criterion and guarantee sufficient margins from normal operation were then determined. The three different trip set-points related to the reactor power are determined based on the RIA of new research reactor during FP condition, over 0.1%FP and under 0.1%FP. Under various reactivity insertion rates, the CHFR are calculated and checked whether they meet the acceptance criterion. For RIA at FP condition, the acceptance criterion can be satisfied even if high power set-point is only used for reactor trip. Since the design of the reactor is still progressing and need a safety margin for possible design changes, 18 MW is recommended as a high power set-point. For RIA at 0.1%FP, high power setpoint of 18 MW and high log rate of 10%pp/s works well and acceptance criterion is satisfied. For under 0.1% FP operations, the application of high log rate is necessary for satisfying the acceptance criterion. Considering possible decrease of CHFR margin due to design changes, the high log rate is suggested to be 8%pp/s. Suggested trip set-points have been identified based on preliminary design data for new research reactor; therefore, these trip set-points will be re-established by considering design progress of the reactor. The reactor protection system (RPS) of new research reactor is designed for safe shutdown of the reactor and preventing the release of radioactive material to environment. The trip set point of RPS is essential for reactor safety, therefore should be determined to mitigate the consequences from accidents. At the same time, the trip set-point should secure margins from normal operational condition to avoid

  11. Compliance-Free, Digital SET and Analog RESET Synaptic Characteristics of Sub-Tantalum Oxide Based Neuromorphic Device.

    Science.gov (United States)

    Abbas, Yawar; Jeon, Yu-Rim; Sokolov, Andrey Sergeevich; Kim, Sohyeon; Ku, Boncheol; Choi, Changhwan

    2018-01-19

    A two terminal semiconducting device like a memristor is indispensable to emulate the function of synapse in the working memory. The analog switching characteristics of memristor play a vital role in the emulation of biological synapses. The application of consecutive voltage sweeps or pulses (action potentials) changes the conductivity of the memristor which is considered as the fundamental cause of the synaptic plasticity. In this study, a neuromorphic device using an in-situ growth of sub-tantalum oxide switching layer is fabricated, which exhibits the digital SET and analog RESET switching with an electroforming process without any compliance current (compliance free). The process of electroforming and SET is observed at the positive sweeps of +2.4 V and +0.86 V, respectively, while multilevel RESET is observed with the consecutive negative sweeps in the range of 0 V to -1.2 V. The movement of oxygen vacancies and gradual change in the anatomy of the filament is attributed to digital SET and analog RESET switching characteristics. For the Ti/Ta 2 O 3-x /Pt neuromorphic device, the Ti top and Pt bottom electrodes are considered as counterparts of the pre-synaptic input terminal and a post-synaptic output terminal, respectively.

  12. Minimising farm crop protection pressure supported by the multiple functionalities of the DISCUSS indicator set.

    Science.gov (United States)

    Wustenberghs, Hilde; Fevery, Davina; Lauwers, Ludwig; Marchand, Fleur; Spanoghe, Pieter

    2018-03-15

    Sustainable crop protection (SCP) has many facets. Farmers may therefore perceive transition to SCP as very complex. The Dual Indicator Set for Crop Protection Sustainability (DISCUSS) can handle this complexity. To provide targeted support throughout the transition to SCP, complexity capture must be synchronised with the time course of on-farm decision-making. Tool use must be tuned to farmer awareness and appropriate level of data in consecutive stages. This paper thus explores the potential functionalities of DISCUSS in relation to both complexity and time. Results from apple and potato crop protection show three potential functions: DISCUSS can be used as (1) a simulation tool for communication and decision support, (2) an assessment and monitoring tool, and (3) a discussion support tool for farmer groups. Analysis of these functionalities using a framework for guiding on-farm sustainability assessment and strategic decision-making shows how each functionality can support the consecutive steps of transition to SCP, i.e. using the right tool functionality at the right time. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. A questionnaire on the use of digital denture impressions in a preclinical setting.

    Science.gov (United States)

    Wegner, Kerstin; Michel, Karin; Seelbach, Paul Henryk; Wöstmann, Bernd

    Since February 2010, intraoral scanning (Lava COS system, 3M ESPE, Seefeld, Germany) has been integrated into the preclinical curriculum at the Department of Prosthodontics of the Justus Liebig University. All students were given a lecture and were trained using a guided scan exercise. After preparing three teeth (mandibular first premolars and mandibular first molar in the 4th quadrant) for cast crowns, the students were asked to scan the maxillary and mandibular teeth. Their acceptance of the new module, "Scanning," was analyzed with the use of a questionnaire (n = 108). The evaluation showed that 63.9% of the students perceived the digital impression to be informative, and had an overall positive opinion of this new digital technology. Concerning the difficulty of the scanning process, approximately 60.2% considered it to be manageable, while 55.6% reported that the magnified view of their preparations improved their understanding of preparing chamfer finish lines. Altogether, the majority of students appreciated this intraoral scanning device as an enhancement of their education. They indicated that this method contributes to a better understanding of crown preparations. In conclusion, the implementation of intraoral scanning seems promising in preclinical education and will be continued in the curriculum.

  14. Privacy in Digital Age: Dead or Alive?! Regarding the New EU Data Protection Regulations

    Directory of Open Access Journals (Sweden)

    Seyed Ebrahim Dorraji

    2015-02-01

    Full Text Available Purpose – To review and critically discuss the current state of privacy in the context of constant technological changes and to emphasize the pace of technological advancements and developments reached over the time when the last EU data protection laws came into effect. These facts inevitably affect the perception of privacy and raise the question of whether privacy is dead or takes the last breath in the digital age? This paper is an attempt to address this question.Design/Methodology/Approach – Based on the comparison and systematic analysis of scientific literature, the authors discuss problematic issues related to privacy and data protection in the technology era – where these issues are too complicated to be clearly regulated by laws and rules since “laws move as a function of years and technology moves as a function of months” (Ron Rivest. Therefore, this analytical approach towards the issue may help to facilitate reaching the best-fit decision in this area.Findings – The authors emphasize the change of perception of privacy, which originated and grew on the idea of “an integral part of our humanity”, the “heart of our liberty” and “the beginning of all freedoms” (Solove, 2008, leading to the recently raised idea that privacy is severely hanging with threat. The authors are of the opinion that legislation and regulation may be one of the best and effective techniques for protecting privacy in the twenty-first century, but it is not currently adequate (Wacks, 2012. One of the solutions lies in technology design.Research limitations/implications – The aspects of privacy and data protection in the European Union have been widely discussed recently because of their broad applicability. Therefore, it is hardly possible to review and cover all the important aspects of the issue. This article focuses on the roles of technology and legislation in securing privacy. The authors examine and provide their own views based on

  15. First year university student engagement using digital curation and career goal setting

    Directory of Open Access Journals (Sweden)

    Amy Antonio

    2015-10-01

    Full Text Available The engagement of students is one of the most pressing issues facing higher education in the 21st century. Around the world, participation rates in tertiary education are on the rise and one of the key challenges facing educators is finding ways to engage these students. We present the results of a project that assesses the impact of an engagement strategy in which a cohort of students entering their first year of university (1 establish and maintain a clear goal of their ideal future career and (2 make use of a web-based digital curation tool to research and present their findings. The results demonstrate the effectiveness of the strategy, which could arguably be applied to a broad range of disciplines given that the majority of students today are technologically literate.

  16. Software verification and validation methodology for advanced digital reactor protection system using diverse dual processors to prevent common mode failure

    International Nuclear Information System (INIS)

    Son, Ki Chang; Shin, Hyun Kook; Lee, Nam Hoon; Baek, Seung Min; Kim, Hang Bae

    2001-01-01

    The Advanced Digital Reactor Protection System (ADRPS) with diverse dual processors is being developed by the National Research Lab of KOPEC for ADRPS development. One of the ADRPS goals is to develop digital Plant Protection System (PPS) free of Common Mode Failure (CMF). To prevent CMF, the principle of diversity is applied to both hardware design and software design. For the hardware diversity, two different types of CPUs are used for Bistable Processor and Local Coincidence Logic Processor. The VME based Single Board Computers (SBC) are used for the CPU hardware platforms. The QNX Operating System (OS) and the VxWorks OS are used for software diversity. Rigorous Software Verification and Validation (V and V) is also required to prevent CMF. In this paper, software V and V methodology for the ADRPS is described to enhance the ADRPS software reliability and to assure high quality of the ADRPS software

  17. Ionizing secondary radiation generated by analog radiological and digital coronary cine angiographic equipment. Influence of external protection devices

    International Nuclear Information System (INIS)

    Ramirez N, Alfredo; Farias Ch, Eric; Silva J, Ana Maria; Leyton L, Fernando; Oyarzun C, Carlos; Ugalde P, Hector; Dussaillant, Gaston; Cumsille G, Angel

    2000-01-01

    Exposure to ionizing radiation is a know hazard of radiological procedures. Aim: to compare the emission of secondary ionizing radiation from two coronary angiographic equipments, one with digital and the other with analog image generation. To evaluate the effectiveness of external radiological protection devices. Material and methods: environmental and fluoroscopy generated radiation in the cephalic region of the patient was measured during diagnostic coronary angiographies. Ionizing radiation generated in anterior left oblique protection (ALO) and anterior right oblique protection (ARO) were measured with and without leaded protections. In 19 patients (group 1), a digital equipment was used and in 21 (group 2), an analog equipment. Results: header radiation for group 1 and 2 was 1194±337 and 364±222 μGray/h respectively (p≤0.001). During fluoroscopy and with leaded protection generated radiation for groups 1 and 2 was 612±947 and 70±61μGray/h respectively (p≤0.001). For ALO projection, generated for groups 1 and 2 was 105±47 and 71±192 μGray/h respectively (p≤0.001). During filming the radiation for ALO projection for groups 1 and 2 was 7252±9569 and 1671±2038 μGray/h respectively (p=0.03). Out of the protection zone, registered radiation during fluoroscopy for groups 1 and 2 was 2800±1741 and 1318±954 μGray/h respectively (p≤0.001); during filming, the figures were 15500±5840 and 18961±10599 μGray/h respectively (NS). Conclusions: digital radiological equipment has a lower level of ionizing radiation emission than the analog equipment

  18. Multi-Level Data-Security and Data-Protection in a Distributed Search Infrastructure for Digital Medical Samples.

    Science.gov (United States)

    Witt, Michael; Krefting, Dagmar

    2016-01-01

    Human sample data is stored in biobanks with software managing digital derived sample data. When these stand-alone components are connected and a search infrastructure is employed users become able to collect required research data from different data sources. Data protection, patient rights, data heterogeneity and access control are major challenges for such an infrastructure. This dissertation will investigate concepts for a multi-level security architecture to comply with these requirements.

  19. Human error probability evaluation as part of reliability analysis of digital protection system of advanced pressurized water reactor - APR 1400

    International Nuclear Information System (INIS)

    Varde, P. V.; Lee, D. Y.; Han, J. B.

    2003-03-01

    A case of study on human reliability analysis has been performed as part of reliability analysis of digital protection system of the reactor automatically actuates the shutdown system of the reactor when demanded. However, the safety analysis takes credit for operator action as a diverse mean for tripping the reactor for, though a low probability, ATWS scenario. Based on the available information two cases, viz., human error in tripping the reactor and calibration error for instrumentations in protection system, have been analyzed. Wherever applicable a parametric study has also been performed

  20. Global digital data sets of soil type, soil texture, surface slope and other properties: Documentation of archived data tape

    Science.gov (United States)

    Staub, B.; Rosenzweig, C.; Rind, D.

    1987-01-01

    The file structure and coding of four soils data sets derived from the Zobler (1986) world soil file is described. The data were digitized on a one-degree square grid. They are suitable for large-area studies such as climate research with general circulation models, as well as in forestry, agriculture, soils, and hydrology. The first file is a data set of codes for soil unit, land-ice, or water, for all the one-degree square cells on Earth. The second file is a data set of codes for texture, land-ice, or water, for the same soil units. The third file is a data set of codes for slope, land-ice, or water for the same units. The fourth file is the SOILWRLD data set, containing information on soil properties of land cells of both Matthews' and Food and Agriculture Organization (FAO) sources. The fourth file reconciles land-classification differences between the two and has missing data filled in.

  1. VI Congress of Spanish Radiation Protection Society, Cordoba, 24-27 Set 1996

    International Nuclear Information System (INIS)

    1996-01-01

    This special issue of the journal Radioprotection compiles the sessions of VI Congress of Spanish Radiation Protection Society. The sessions were: 1.- Radiation protection and the environment. 2.- Radiation protection of the workers. 3.- Natural radiation. 4.- Biological effects of the radiations. 5.- Radiation protection of patients. 6.- Dosimetry. 7.- Quality control. 8.- Training on radiation protection. 9.- Legislation. (Author)

  2. Determination of the protection set-points lines for the Angra-1 reactor core

    International Nuclear Information System (INIS)

    Furieri, E.B.

    1980-03-01

    In this work several thermo-hidraulic calculation were performed to obtain Protection set-points lines for the Angra-1 reactor core in order to compare with the values presented by the vendor in the FSAR. These lines are the locus of points where DNBR min = 1,3 and power = 1,18 x P nominal as a function of ΔT m and T m , the temperature difference and the average coolant temperature between hot and cold legs. A computation scheme was developed using COBRA-IIIF as a subroutine of a new main program and adding new subroutines in order to obtain the desired DNBR. The solution is obtained through a convergentce procedure using parameters estimated in a sensivity study. (author) [pt

  3. Legislations set out to protect workers against ionizing radiations in the European Community

    International Nuclear Information System (INIS)

    Grivelet-Denais, M.-F.

    1975-01-01

    A physical review on ionizing radiations and a biological survey of their possible effects on exposed workers are followed by a study, first general and then analytical, of the various legislations set out to protect these workers in the European Community. In the light of this study a few comments are called for. In all member States the rules are particularly strict for everything to do with approval and homologation of plants and equipment, technical qualifications of users, safety measures, physical protection control, atmospheric checks and individual dosimetry. Reservations must be made as to the exact organization of controls and the interdependence between supervisory and user bodies, these points generally remaining rather vague. France more than the other member States has made an effort at precision which deserves credit but is disappointing in practice where medical supervision of exposed workers is concerned. This inadequacy of the medical examination is due mainly to the lack of any significant symptom betraying a biological overdose. The hematological examination is also disparaged for its lack of sensitivity and above all specificity [fr

  4. Digital Discourse Markers in an ESL Learning Setting: The Case of Socialisation Forums

    Directory of Open Access Journals (Sweden)

    Alireza Shakarami

    2016-08-01

    Full Text Available Analysis of the linguistic discourse plays an important role in the social, cultural, ethnographic, and comparative studies of languages. Discourse markers as indispensable parts of this analysis are reportedly more common in informal speech than in written language. They could be used at different levels, i.e. as „linking words‟, „linking phrases‟, or „sentence connectors‟ to bind together pieces of a text like „glue‟. The objective of the study is to ascertain the discourse markers employed in synchronous online interactions and networking through constant comparison of discourse markers used in the discussion forums (DF with the discourse markers already reported in the literature. The study maintains discourse markers (DMs used in the formal written discourse in order to identify any probable pragmatic, or discoursal level differences in the DMs used in the two modes of writing (formal writing and typing in online communication. The findings indicate that the written language that students use in their electronic posts is to a great extent similar to that of the process view of writing. Specifically, the written language used in a digital socialisation forum is at times, monitored, reviewed, revised, and corrected by the students themselves and their peers.

  5. Digital Immigrants: An Exploration of Their Technological Knowledge and Skill Sets

    Science.gov (United States)

    Walker, Benjamin

    2012-01-01

    This instrumental case study explored the knowledge and skill set levels of adult learners over the age of 35 with an emphasis in emerging educational technologies. The case study focused on EdD students in four cohorts at the Drexel University Center for Graduate Studies in Sacramento, CA. This research sought to answer the following research…

  6. A guideline to medical photography: a perspective on digital photography in an orthopaedic setting.

    Science.gov (United States)

    de Meijer, P P G; Karlsson, J; LaPrade, R F; Verhaar, J A N; Wijdicks, C A

    2012-12-01

    Quality photographs are essential for clinical documentation, research, and publication in scientific journals and teaching. Oftentimes, non-ideal lighting and a sterile environment restrict the medical photographer, resulting in lower-quality photographs. This article aims to provide a clear and comprehensible guideline for medical photography in an orthopaedic setting. This article is based on extensive photographic involvement in operating and laboratory settings, in close collaboration with medical professionals from the Steadman Clinic (Vail, Colorado, USA), Gothenburg University (Göteborg, Sweden) and Erasmus MC (Rotterdam, the Netherlands). Background literature was searched through Google Scholar and PubMed. Three relevant journal articles, and one book on medical photography, were used to write this paper. Seventeen Internet articles were used for background information. A relevant, up-to-date and comprehensive guideline to medical photography for medical professionals, with or without photographic experience, is provided. Expert opinion, Level V.

  7. Digital dental surface registration with laser scanner for orthodontics set-up planning

    Science.gov (United States)

    Alcaniz-Raya, Mariano L.; Albalat, Salvador E.; Grau Colomer, Vincente; Monserrat, Carlos A.

    1997-05-01

    We present an optical measuring system based on laser structured light suitable for its diary use in orthodontics clinics that fit four main requirements: (1) to avoid use of stone models, (2) to automatically discriminate geometric points belonging to teeth and gum, (3) to automatically calculate diagnostic parameters used by orthodontists, (4) to make use of low cost and easy to use technology for future commercial use. Proposed technique is based in the use of hydrocolloids mould used by orthodontists for stone model obtention. These mould of the inside of patient's mouth are composed of very fluent materials like alginate or hydrocolloids that reveal fine details of dental anatomy. Alginate mould are both very easy to obtain and very low costly. Once captured, alginate moulds are digitized by mean of a newly developed and patented 3D dental scanner. Developed scanner is based in the optical triangulation method based in the projection of a laser line on the alginate mould surface. Line deformation gives uncalibrated shape information. Relative linear movements of the mould with respect to the sensor head gives more sections thus obtaining a full 3D uncalibrated dentition model. Developed device makes use of redundant CCD in the sensor head and servocontrolled linear axis for mould movement. Last step is calibration to get a real and precise X, Y, Z image. All the process is done automatically. The scanner has been specially adapted for 3D dental anatomy capturing in order to fulfill specific requirements such as: scanning time, accuracy, security and correct acquisition of 'hidden points' in alginate mould. Measurement realized on phantoms with known geometry quite similar to dental anatomy present errors less than 0,1 mm. Scanning of global dental anatomy is 2 minutes, and generation of 3D graphics of dental cast takes approximately 30 seconds in a Pentium-based PC.

  8. Digital teaching file. Concept, implementation, and experiences in a university setting

    International Nuclear Information System (INIS)

    Trumm, C.; Wirth, S.; Treitl, M.; Lucke, A.; Kuettner, B.; Pander, E.; Clevert, D.-A.; Glaser, C.; Reiser, M.; Dugas, M.

    2005-01-01

    Film-based teaching files require a substantial investment in human, logistic, and financial resources. The combination of computer and network technology facilitates the workflow integration of distributing radiologic teaching cases within an institution (intranet) or via the World Wide Web (Internet). A digital teaching file (DTF) should include the following basic functions: image import from different sources and of different formats, editing of imported images, uniform case classification, quality control (peer review), a controlled access of different user groups (in-house and external), and an efficient retrieval strategy. The portable network graphics image format (PNG) is especially suitable for DTFs because of several features: pixel support, 2D-interlacing, gamma correction, and lossless compression. The American College of Radiology (ACR) ''Index for Radiological Diagnoses'' is hierarchically organized and thus an ideal classification system for a DTF. Computer-based training (CBT) in radiology is described in numerous publications, from supplementing traditional learning methods to certified education via the Internet. Attractiveness of a CBT application can be increased by integration of graphical and interactive elements but makes workflow integration of daily case input more difficult. Our DTF was built with established Internet instruments and integrated into a heterogeneous PACS/RIS environment. It facilitates a quick transfer (DICOM S end) of selected images at the time of interpretation to the DTF and access to the DTF application at any time anywhere within the university hospital intranet employing a standard web browser. A DTF is a small but important building block in an institutional strategy of knowledge management. (orig.) [de

  9. Setting ozone critical levels for protecting horticultural Mediterranean crops: Case study of tomato

    International Nuclear Information System (INIS)

    González-Fernández, I.; Calvo, E.; Gerosa, G.; Bermejo, V.; Marzuoli, R.; Calatayud, V.; Alonso, R.

    2014-01-01

    Seven experiments carried out in Italy and Spain have been used to parameterising a stomatal conductance model and establishing exposure– and dose–response relationships for yield and quality of tomato with the main goal of setting O 3 critical levels (CLe). CLe with confidence intervals, between brackets, were set at an accumulated hourly O 3 exposure over 40 nl l −1 , AOT40 = 8.4 (1.2, 15.6) ppm h and a phytotoxic ozone dose above a threshold of 6 nmol m −2 s −1 , POD6 = 2.7 (0.8, 4.6) mmol m −2 for yield and AOT40 = 18.7 (8.5, 28.8) ppm h and POD6 = 4.1 (2.0, 6.2) mmol m −2 for quality, both indices performing equally well. CLe confidence intervals provide information on the quality of the dataset and should be included in future calculations of O 3 CLe for improving current methodologies. These CLe, derived for sensitive tomato cultivars, should not be applied for quantifying O 3 -induced losses at the risk of making important overestimations of the economical losses associated with O 3 pollution. -- Highlights: • Seven independent experiments from Italy and Spain were analysed. • O 3 critical levels are proposed for the protection of summer horticultural crops. • Exposure- and flux-based O 3 indices performed equally well. • Confidence intervals of the new O 3 critical levels are calculated. • A new method to estimate the degree risk of O 3 damage is proposed. -- Critical levels for tomato yield were set at AOT40 = 8.4 ppm h and POD6 = 2.7 mmol m −2 and confidence intervals should be used for improving O 3 risk assessment

  10. Digital Agenda-Setting:Measuring mainstream and social media influence during the UK 2015 election campaign

    OpenAIRE

    Moore, Martin John Edwards; Ramsay, Gordon Neil

    2016-01-01

    This paper examines the setting up and managing of ‘Election Unspun’, an experimental news content analysis project, and its main findings. In the end, the project collected every tweet from more than 3,000 political actors and influencers, analysed the national newspapers’ coverage and websites of ITV News, Sky News and Channel 4 News and the UK versions of the Huffington Post and Buzzfeed Politics during the 2015 general election campaign in the UK. It concludes that, despite the plethora o...

  11. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    Directory of Open Access Journals (Sweden)

    Omar Tayan

    2014-01-01

    Full Text Available This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints.

  12. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    Science.gov (United States)

    Kabir, Muhammad N.; Alginahi, Yasser M.

    2014-01-01

    This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247

  13. Engineering development of a digital replacement protection system at an operating US PWR nuclear power plant: Installation and operational experiences

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M.H. [Duke Power Co., Seneca, SC (United States)

    1995-04-01

    The existing Reactor Protection Systems (RPSs) at most US PWRs are systems which reflect 25 to 30 year-old designs, components and manufacturing techniques. Technological improvements, especially in relation to modern digital systems, offer improvements in functionality, performance, and reliability, as well as reductions in maintenance and operational burden. The Nuclear power industry and the US nuclear regulators are poised to move forward with the issues that have slowed the transition to modern digital replacements for nuclear power plant safety systems. The electric utility industry is now more than ever being driven by cost versus benefit decisions. Properly designed, engineered, and installed digital systems can provide adequate cost-benefit and allow continued nuclear generated electricity. This paper describes various issues and areas related to an ongoing RPS replacement demonstration project which are pertinant for a typical US nuclear plant to consider cost-effective replacement of an aging analog RPS with a modern digital RPS. The following subject areas relative to the Oconee Nuclear Station ISAT{trademark} Demonstrator project are discussed: Operator Interface Development; Equipment Qualification; Validation and Verification of Software; Factory Testing; Field Changes and Verification Testing; Utility Operational, Engineering and Maintenance; Experiences with Demonstration System; and Ability to operate in parallel with the existing Analog RPS.

  14. Engineering development of a digital replacement protection system at an operating US PWR nuclear power plant: Installation and operational experiences

    International Nuclear Information System (INIS)

    Miller, M.H.

    1995-01-01

    The existing Reactor Protection Systems (RPSs) at most US PWRs are systems which reflect 25 to 30 year-old designs, components and manufacturing techniques. Technological improvements, especially in relation to modern digital systems, offer improvements in functionality, performance, and reliability, as well as reductions in maintenance and operational burden. The Nuclear power industry and the US nuclear regulators are poised to move forward with the issues that have slowed the transition to modern digital replacements for nuclear power plant safety systems. The electric utility industry is now more than ever being driven by cost versus benefit decisions. Properly designed, engineered, and installed digital systems can provide adequate cost-benefit and allow continued nuclear generated electricity. This paper describes various issues and areas related to an ongoing RPS replacement demonstration project which are pertinant for a typical US nuclear plant to consider cost-effective replacement of an aging analog RPS with a modern digital RPS. The following subject areas relative to the Oconee Nuclear Station ISAT trademark Demonstrator project are discussed: Operator Interface Development; Equipment Qualification; Validation and Verification of Software; Factory Testing; Field Changes and Verification Testing; Utility Operational, Engineering and Maintenance; Experiences with Demonstration System; and Ability to operate in parallel with the existing Analog RPS

  15. The feasibility of digital pen and paper technology for vital sign data capture in acute care settings.

    Science.gov (United States)

    Dykes, Patricia C; Benoit, Angela; Chang, Frank; Gallagher, Joan; Li, Qi; Spurr, Cindy; McGrath, E Jan; Kilroy, Susan M; Prater, Marita

    2006-01-01

    The transition from paper to electronic documentation systems in acute care settings is often gradual and characterized by a period in which paper and electronic processes coexist. Intermediate technologies are needed to "bridge" the gap between paper and electronic systems as a means to improve work flow efficiency through data acquisition at the point of care in structured formats to inform decision support and facilitate reuse. The purpose of this paper is to report on the findings of a study conducted on three acute care units at Brigham and Women's Hospital and Massachusetts General Hospital in Boston, MA to evaluate the feasibility of digital pen and paper technology as a means to capture vital sign data in the context of acute care workflows and to make data available in a flow sheet in the electronic medical record.

  16. Print preparation of the logical INIS-character set for a digital LNO3 printer

    International Nuclear Information System (INIS)

    Mueller, M.; Nevyjel, A.

    1987-09-01

    The implementation of the revised INIS-character set (describedin INIS-Circular Letter No.131) made it necessary to develop a print preparation program, which transfers most of the new INIS logical characters to characters, which are printable on a local LNO3 laser printer. The program is written in PL/I and runs under VAX/VMS on a VAX 11/750. It reads a normal print file and replaces the encoded logical characters by special control sequences, which generate the corresponding images on the LNO3 printer. The program is used for print preparation of any INIS-data records, both input preparation and output tape utilisation on the local VAX system. (Author)

  17. Using digital photography in a clinical setting: a valid, accurate, and applicable method to assess food intake.

    Science.gov (United States)

    Winzer, Eva; Luger, Maria; Schindler, Karin

    2018-06-01

    Regular monitoring of food intake is hardly integrated in clinical routine. Therefore, the aim was to examine the validity, accuracy, and applicability of an appropriate and also quick and easy-to-use tool for recording food intake in a clinical setting. Two digital photography methods, the postMeal method with a picture after the meal, the pre-postMeal method with a picture before and after the meal, and the visual estimation method (plate diagram; PD) were compared against the reference method (weighed food records; WFR). A total of 420 dishes from lunch (7 weeks) were estimated with both photography methods and the visual method. Validity, applicability, accuracy, and precision of the estimation methods, and additionally food waste, macronutrient composition, and energy content were examined. Tests of validity revealed stronger correlations for photography methods (postMeal: r = 0.971, p < 0.001; pre-postMeal: r = 0.995, p < 0.001) compared to the visual estimation method (r = 0.810; p < 0.001). The pre-postMeal method showed smaller variability (bias < 1 g) and also smaller overestimation and underestimation. This method accurately and precisely estimated portion sizes in all food items. Furthermore, the total food waste was 22% for lunch over the study period. The highest food waste was observed in salads and the lowest in desserts. The pre-postMeal digital photography method is valid, accurate, and applicable in monitoring food intake in clinical setting, which enables a quantitative and qualitative dietary assessment. Thus, nutritional care might be initiated earlier. This method might be also advantageous for quantitative and qualitative evaluation of food waste, with a resultantly reduction in costs.

  18. A comparison between complete immobilisation and protected active mobilisation in sensory nerve recovery following isolated digital nerve injury.

    LENUS (Irish Health Repository)

    Henry, F P

    2012-06-01

    Post-operative immobilisation following isolated digital nerve repair remains a controversial issue amongst the microsurgical community. Protocols differ from unit to unit and even, as evidenced in our unit, may differ from consultant to consultant. We undertook a retrospective review of 46 patients who underwent isolated digital nerve repair over a 6-month period. Follow-up ranged from 6 to 18 months. Twenty-four were managed with protected active mobilisation over a 4-week period while 22 were immobilised over the same period. Outcomes such as return to work, cold intolerance, two-point discrimination and temperature differentiation were used as indicators of clinical recovery. Our results showed that there was no significant difference noted in either clinical assessment of recovery or return to work following either post-operative protocol, suggesting that either regime may be adopted, tailored to the patient\\'s needs and resources of the unit.

  19. ILK recommendation on the avoidance of dependent failures of digital I and C protection systems

    International Nuclear Information System (INIS)

    Anon.

    2003-01-01

    In German nuclear power plants, the instrumentation and control (I and C) technology with the highest importance to safety is essentially hard-wired. In future, digital I and C systems will be put into use as a result of their manifold and sufficiently known advantages. The German Reactor Safety Commission (RSK) has published guidelines on digital safety instrumentation and control in 1996. The ILK welcomes the approach of NPP licensees to digitalize safety I and C functions with graded importance for safety first to gain experience with this new technology. Beyond the requirements laid out by the RSK-guidelines, the ILK recommends the following approach: - Different approaches should be taken in the definition and validation of I and C functions. - The specifications of a safety I and C system should cover all requirements. - If a safety I and C system (cat. 1) is only partly digitalized, then the remaining hardwired part should ideally remain in function. - If this is not the case, then the I and C functions should have functional diversity. - In case the category 1 safety I and C systems are to be entirely digitalized, then the system should be carried out in a functionally diversified way, or equivalent measures should be taken. - Diversified I and C functions should be processed by physically separate equipment. (orig.) [de

  20. Exploring Professional Development Needs of Digital Immigrant and Digital Native Teachers for the Successful Integration of Technology in a Jewish Elementary Education Setting

    Science.gov (United States)

    Salomon, Anna M.

    2014-01-01

    Today's teachers are tasked with the integration of technology in their curriculum and their classrooms. In order to do that, teachers require professional development/training and support. Further, schools are encountering a unique landscape of teaching with digital natives becoming teachers alongside digital immigrants. This study aimed to…

  1. A risk-based approach to setting priorities in protecting bridges against terrorist attacks.

    Science.gov (United States)

    Leung, Maria; Lambert, James H; Mosenthal, Alexander

    2004-08-01

    This article presents an approach to the problem of terrorism risk assessment and management by adapting the framework of the risk filtering, ranking, and management method. The assessment is conducted at two levels: (1) the system level, and (2) the asset-specific level. The system-level risk assessment attempts to identify and prioritize critical infrastructures from an inventory of system assets. The definition of critical infrastructures offered by Presidential Decision Directive 63 was used to determine the set of attributes to identify critical assets--categorized according to national, regional, and local impact. An example application is demonstrated using information from the Federal Highway Administration National Bridge Inventory for the State of Virginia. Conversely, the asset-specific risk assessment performs an in-depth analysis of the threats and vulnerabilities of a specific critical infrastructure. An illustration is presented to offer some insights in risk scenario identification and prioritization, multiobjective evaluation of management options, and extreme-event analysis for critical infrastructure protection.

  2. Simplified Analytic Approach of Pole-to-Pole Faults in MMC-HVDC for AC System Backup Protection Setting Calculation

    Directory of Open Access Journals (Sweden)

    Tongkun Lan

    2018-01-01

    Full Text Available AC (alternating current system backup protection setting calculation is an important basis for ensuring the safe operation of power grids. With the increasing integration of modular multilevel converter based high voltage direct current (MMC-HVDC into power grids, it has been a big challenge for the AC system backup protection setting calculation, as the MMC-HVDC lacks the fault self-clearance capability under pole-to-pole faults. This paper focused on the pole-to-pole faults analysis for the AC system backup protection setting calculation. The principles of pole-to-pole faults analysis were discussed first according to the standard of the AC system protection setting calculation. Then, the influence of fault resistance on the fault process was investigated. A simplified analytic approach of pole-to-pole faults in MMC-HVDC for the AC system backup protection setting calculation was proposed. In the proposed approach, the derived expressions of fundamental frequency current are applicable under arbitrary fault resistance. The accuracy of the proposed approach was demonstrated by PSCAD/EMTDC (Power Systems Computer-Aided Design/Electromagnetic Transients including DC simulations.

  3. Is Google Trends a reliable tool for digital epidemiology? Insights from different clinical settings.

    Science.gov (United States)

    Cervellin, Gianfranco; Comelli, Ivan; Lippi, Giuseppe

    2017-09-01

    Internet-derived information has been recently recognized as a valuable tool for epidemiological investigation. Google Trends, a Google Inc. portal, generates data on geographical and temporal patterns according to specified keywords. The aim of this study was to compare the reliability of Google Trends in different clinical settings, for both common diseases with lower media coverage, and for less common diseases attracting major media coverage. We carried out a search in Google Trends using the keywords "renal colic", "epistaxis", and "mushroom poisoning", selected on the basis of available and reliable epidemiological data. Besides this search, we carried out a second search for three clinical conditions (i.e., "meningitis", "Legionella Pneumophila pneumonia", and "Ebola fever"), which recently received major focus by the Italian media. In our analysis, no correlation was found between data captured from Google Trends and epidemiology of renal colics, epistaxis and mushroom poisoning. Only when searching for the term "mushroom" alone the Google Trends search generated a seasonal pattern which almost overlaps with the epidemiological profile, but this was probably mostly due to searches for harvesting and cooking rather than to for poisoning. The Google Trends data also failed to reflect the geographical and temporary patterns of disease for meningitis, Legionella Pneumophila pneumonia and Ebola fever. The results of our study confirm that Google Trends has modest reliability for defining the epidemiology of relatively common diseases with minor media coverage, or relatively rare diseases with higher audience. Overall, Google Trends seems to be more influenced by the media clamor than by true epidemiological burden. Copyright © 2017 Ministry of Health, Saudi Arabia. Published by Elsevier Ltd. All rights reserved.

  4. The use of Landsat-4 MSS digital data in temporal data sets and the evaluation of scene-to-scene registration accuracy

    Science.gov (United States)

    Anderson, J. E.

    1985-01-01

    The MSS sensor on Landsat 4 is, in certain performance aspects, diferent from those of Landsats 1 through 3. These differences created some concern in the NASA research community as to whether individual data sets can be registered accurately enough to produce acceptable data sets for multitemporal data analysis. The use of Landsat 4 MSS digital data in temporal data sets is examined and a method is presented for estimating temporal registration accuracy based on the use of an X-Y digitizer and grey tone electrostatic plots. Results indicate that the RMS temporal registration errors are not significantly different from the temporal data sets generated using Landsat 4 and Landsat 2 data (33.35 meters) and the temporal data set constructed from two Landsat 2 data sets (33.61 meters). A derivation of the model used to evaluate the temporal registration is included.

  5. Digital Native Preservice Teachers: An Examination of Their Self-Efficacy Beliefs Regarding Technology Integration in Classroom Settings

    Science.gov (United States)

    Southall, Sarah Parker

    2012-01-01

    The purpose of this mixed-method study was to investigate digital native preservice teachers' self-efficacy beliefs regarding their technology experiences and skills at the beginning and at the end of their field placement semester. Digital natives, as defined by Prensky (2001), are students born after 1980 who have been raised with digital media…

  6. Analysis of lightning fault detection, location and protection on short and long transmission lines using Real Time Digital Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Oliveira, Andre Luiz Pereira de [Siemens Ltda., Sao Paulo, SP (Brazil)], E-mail: andreluiz.oliveira@siemens.com

    2007-07-01

    The purpose of this paper is to present an analysis of lightning fault detection, location and protection using numeric distance relays applied in high voltage transmission lines, more specifically in the 500 kV transmission lines of CEMIG (Brazilian Energy Utility) between the Vespasiano 2 - Neves 1 (short line - 23.9 km) and Vespasiano 2 - Mesquita (long line - 148.6 km) substations. The analysis was based on the simulations results of numeric distance protective relays on power transmission lines, realized in September 02 to 06, 2002, at Siemens AG's facilities (Erlangen - Germany), using Real Time Digital Simulator (RTDS{sup TM}). Several lightning faults simulations were accomplished, in several conditions of the electrical power system where the protective relays would be installed. The results are presented not only with the times of lightning faults elimination, but also all the functionality of a protection system, including the correct detection, location and other advantages that these modern protection devices make possible to the power system. (author)

  7. Digital Collections, Digital Libraries & the Digitization of Cultural Heritage Information.

    Science.gov (United States)

    Lynch, Clifford

    2002-01-01

    Discusses digital collections and digital libraries. Topics include broadband availability; digital rights protection; content, both non-profit and commercial; digitization of cultural content; sustainability; metadata harvesting protocol; infrastructure; authorship; linking multiple resources; data mining; digitization of reference works;…

  8. Digital rights management for digital cinema

    Science.gov (United States)

    Kirovski, Darko; Peinado, Marcus; Petitcolas, Fabien A. P.

    2001-12-01

    There is a wide consensus among the feature film production studios that the Internet era brings a new paradigm for film distribution to cinemas worldwide. The benefits of digital cinema to both producers and cinemas are numerous: significantly lower distribution and maintenance costs, immediate access to film libraries, higher presentation quality, and strong potential for developing new business models. Despite these advantages, the studios are still reluctant to jump into the digital age. The main showstopper for digital cinema is the danger of widespread piracy. Piracy already costs Hollywood an estimated two billion dollars annually and digital cinema without proper copyright enforcement could increase this number. In this paper, we present a copyright management system that aims at providing the set of necessary security tools: standard cryptographic primitives and copyright protection mechanisms that enable a reliable and secure feature film delivery system.

  9. PROBLEMS IN TESTING DIGITAL PROTECTIVE RELAY FOR IMMUNITY TO INTENTIONAL DESTRUCTIVE ELECTROMAGNETIC IMPACTS. CONTINUATION OF THE THEME

    Directory of Open Access Journals (Sweden)

    Vladimir I. Gurevich

    2015-12-01

    Full Text Available The article is the continuation of the theme highlighted in the previous article with same title. The new article evaluates the results of digital protective relays (DPR testing for immunity to the E1 component of High-altitude Electromagnetic Pulse (HEMP and to Intentional Electromagnetic Interferences (IEMI impacts, conducted by some independent American organizations; discusses the features of relay protection devices as well as clarifies and supplements the procedure for testing these devices. Due to methodology errors during the DPR tests conducted by mentioned organizations earlier, they cannot be considered as satisfactory and their results as meaningful. At the moment there are no reliable data on the level of DPR immunity to IDEI, which suggests that the test should be conducted further.

  10. The protection of the right to privacy as the social imperative of digital age: How vulnerable are we?

    Directory of Open Access Journals (Sweden)

    Levakov-Vermezović Tijana

    2016-01-01

    Full Text Available The paper examines various forms of jeopardizing the privacy of individuals in digital world, with specific focus on criminal protection provided by current international and national legal framework and the jurisprudence of European Court of Human Rights. The significance of conducting this scientific research is essential considering that we live in the era of electronic communications in which no one is anonymous. Development of information and communication technologies has brought, among its many advantages, various challenges in all spheres of modern life. Since the Internet has become the global forum, individuals have been increasingly target of countless insults, defamation and threats; moreover, numerous personal information or media get published without consent. The practice shows that effective suppression and control of illegal behavior on the Internet and punishing the perpetrators is at the rudimental level. In order to provide proper protection for the victims of criminal offenses committed against their privacy in the digital world, it is necessary to create new models and approaches to solving this problem.

  11. Closing the protection gap: setting health standards for nuclear power workers

    International Nuclear Information System (INIS)

    Kasperson, R.E.; Lundblad, J.

    1982-01-01

    The article discusses the current and proposed standards for protecting workers from ionizing radiation. It reviews the 1981 EPA proposals put forth to this end, identifying the issues at stake and possible alternatives, and considers whether closing the protection gap is feasible and socially desirable - and, if so, how it best should be accomplished

  12. Cybersafe protecting and empowering kids in the digital world of texting, gaming, and social media

    CERN Document Server

    O'Keeffe, Gwenn

    2014-01-01

    Children today are growing up in a world far different from the one in which their parents were raised. Between the Internet, gaming systems, mp3 players, and cell phones, today's kids are nearly always connected to something digital. And, because it's developing so fast, it's hard for parents to stay on top of the technology—and even harder to figure out how to help their kids make good decisions when it comes to these things. This informative book will guide parents through the landscape of the digital world, helping them better understand things like: • The history and the future of the Internet • Cyberbullying (and how to help kids deal with it if it happens to them) • Social networking sites like Facebook and MySpace • Gaming and virtual worlds • Parental control systems that allow parents to monitor kids' online activities • Digital footprints (and how kids can make sure theirs is a good one) Beyond informing readers on the latest trends in technology, Dr. Gwenn gives provides the tools parents n...

  13. Amendment of the Order of 2 November 1976 setting up an Institute for Protection and Nuclear Safety (29 October 1981)

    International Nuclear Information System (INIS)

    1981-01-01

    The Institute for Protection and Nuclear Safety was set up within the Atomic Energy Commission by an Order of 2 November 1976 now amended by this new Order, which specifies that, in connection with nuclear safety, the Institute provides direct technical support to the Central Service for the Safety of Nuclear Installations. (NEA) [fr

  14. Comparing Effects of TCR and TSC on MHO Distance Protection Setting in 400 kV Algerian Transmission Line

    Directory of Open Access Journals (Sweden)

    Mohamed ZELLAGUI

    2012-11-01

    Full Text Available This paper presents a study on the performances of distance relays setting in 400 kV in Eastern Algerian transmission networks at Sonelgaz Group (Algerian company of Electrical and Gas compensated by shunt Flexible AC Transmission System (FACTS. The facts are used for controlling transmission voltage, power flow, reactive power, and damping of power system oscillations in high power transfer levels. The effects of SVC devices i.e. Thyristor Controlled Reactor (TCR and the Thyristor Switched Capacitors (TSC insertion, on the total impedance of a transmission line protected by MHO distance relay are investigated. The modified setting zones protections for three forward zones (Z1, Z2 and Z3 have been calculated in order to improve the performances of distance relay protection and prevent circuit breaker nuisance tripping.

  15. Setting priorities to avoid deforestation in Amazon protected areas: are we choosing the right indicators?

    Science.gov (United States)

    Nolte, Christoph; Agrawal, Arun; Barreto, Paulo

    2013-03-01

    Cost-effective protected area networks require that decision makers have sufficient information to allocate investments in ways that generate the greatest positive impacts. With applications in more than 50 countries, the Rapid Assessment and Prioritization of Protected Area Management (RAPPAM) method is arguably the tool used most widely to assist such prioritization. The extent to which its indicators provide useful measures of a protected area’s capacity to achieve its conservation objectives, however, has seldom been subject to empirical scrutiny. We use a rich spatial dataset and time series data from 66 forest protected areas in the Brazilian Amazon to examine whether RAPPAM scores are associated with success in avoiding deforestation. We find no statistically significant association between avoided deforestation and indicators that reflect preferential targets of conservation investments, including budget, staff, equipment, management plans and stakeholder collaboration. Instead, we find that the absence of unsettled land tenure conflicts is consistently associated strongly with success in reducing deforestation pressures. Our results underscore the importance of tracking and resolving land tenure in protected area management, and lead us to call for more rigorous assessments of existing strategies for assessing and prioritizing management interventions in protected areas.

  16. Setting priorities to avoid deforestation in Amazon protected areas: are we choosing the right indicators?

    International Nuclear Information System (INIS)

    Nolte, Christoph; Agrawal, Arun; Barreto, Paulo

    2013-01-01

    Cost-effective protected area networks require that decision makers have sufficient information to allocate investments in ways that generate the greatest positive impacts. With applications in more than 50 countries, the Rapid Assessment and Prioritization of Protected Area Management (RAPPAM) method is arguably the tool used most widely to assist such prioritization. The extent to which its indicators provide useful measures of a protected area’s capacity to achieve its conservation objectives, however, has seldom been subject to empirical scrutiny. We use a rich spatial dataset and time series data from 66 forest protected areas in the Brazilian Amazon to examine whether RAPPAM scores are associated with success in avoiding deforestation. We find no statistically significant association between avoided deforestation and indicators that reflect preferential targets of conservation investments, including budget, staff, equipment, management plans and stakeholder collaboration. Instead, we find that the absence of unsettled land tenure conflicts is consistently associated strongly with success in reducing deforestation pressures. Our results underscore the importance of tracking and resolving land tenure in protected area management, and lead us to call for more rigorous assessments of existing strategies for assessing and prioritizing management interventions in protected areas. (letter)

  17. Application of Digital Technology for the Plant Protection System in Ulchin Nuclear Power Plant Units 5 and 6

    International Nuclear Information System (INIS)

    Deucksoo, Lee; Insik, Kim

    2006-01-01

    Since the completion of construction of Ulchin Nuclear Power Plant Units 3 and 4 (UCN 3 and 4), the first units of the OPR (Optimized Power Reactor) series, various advanced design features have been incorporated to the following OPRs. The Ulchin Nuclear Power Plant Units 5 and 6(UCN 5 and 6) which started commercial operation in Korea from 2004 and 2005 respectively, are designed to provide improvements in safety, reliability and costs by applying both advanced proven technology and experiences gained from the construction and operation of the previous OPRs. Among those improvements, the digital plant protection system (DPPS) and the digital engineered safety feature actuation system (DESFAS) are the key elements to the UCN 5 and 6 designs. The DPPS and DESFAS utilizing the digital computer technology offer a solution to the obsolescence problem of analog system. These features also provide the potential for additional benefits such as ease of maintenance, increased performance, reduction of internal and external cross channel wiring, improvement of the surveillance testability and flexibility of control logic programming change. During the initial design stage, the Korean regulatory body had evaluated these design concepts intensively and concluded it to be acceptable for the safety point of view. Also, in-depth review on the detailed design and the special evaluation/audit for the software design process has been performed to secure the quality of the software. As a result, every issue raised during licensing review has been clarified and the operating licenses for the UCN 5 and 6 were issued in October, 2003 and October, 2004 respectively, by the government. In this paper, design characteristics of the UCN 5 and 6 are introduced, and advanced design features and implementation process are presented focused on the DPPS/DESFAS with some benefit analysis results. (authors)

  18. Adaptive settings of distance relay for MOV-protected series compensated line with distributed capacitance considering wind power

    Science.gov (United States)

    Sivov, Oleg Viktorovich

    Series compensated lines are protected from overvoltage by metal-oxide-varistors (MOVs) connected in parallel with the capacitor bank. The nonlinear characteristics of MOV devices add complexity to fault analysis and distance protection operation. During faults, the impedance of the line is modified by an equivalent impedance of the parallel MOV/capacitor circuit, which affects the distance protection. The intermittent wind generation introduces additional complexity to the system performance and distance protection. Wind variation affects the fault current level and equivalent MOV/capacitor impedance during a fault, and hence the distance relay operation. This thesis studies the impact of the intermittent wind power generation on the operation of MOV during faults. For the purpose of simulation, an equivalent wind farm model is proposed to generate a wind generation profile using wind farm generation from California independent system operator (ISO) as a guide for wind power variation to perform the study. The IEEE 12-bus test system is modified to include MOV-protected series capacitor and the equivalent wind farm model. The modified test system is simulated in the MATLAB/Simulink environment. The study has been achieved considering three phase and single line to ground (SLG) faults on the series compensated line to show the effect of wind variation on the MOV operation. This thesis proposes an adaptive setting method for the mho relay distance protection of series compensated line considering effects of wind power variation and MOV operation. The distributed parameters of a transmission line are taken into account to avoid overreaching and underreaching of distance relays. The study shows that variable wind power affects system power flow and fault current in the compensated line during a fault which affects the operation of MOVs for different fault conditions. The equivalent per-phase impedance of the MOV/capacitor circuit has an effect on the system operation

  19. Digital squares

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Kim, Chul E

    1988-01-01

    Digital squares are defined and their geometric properties characterized. A linear time algorithm is presented that considers a convex digital region and determines whether or not it is a digital square. The algorithm also determines the range of the values of the parameter set of its preimages....... The analysis involves transforming the boundary of a digital region into parameter space of slope and y-intercept...

  20. Privacy in the digital world: medical and health data outside of HIPAA protections.

    Science.gov (United States)

    Glenn, Tasha; Monteith, Scott

    2014-11-01

    Increasing quantities of medical and health data are being created outside of HIPAA protection, primarily by patients. Data sources are varied, including the use of credit cards for physician visit and medication co-pays, Internet searches, email content, social media, support groups, and mobile health apps. Most medical and health data not covered by HIPAA are controlled by third party data brokers and Internet companies. These companies combine this data with a wide range of personal information about consumer daily activities, transactions, movements, and demographics. The combined data are used for predictive profiling of individual health status, and often sold for advertising and other purposes. The rapid expansion of medical and health data outside of HIPAA protection is encroaching on privacy and the doctor-patient relationship, and is of particular concern for psychiatry. Detailed discussion of the appropriate handling of this medical and health data is needed by individuals with a wide variety of expertise.

  1. Simulation to aid in interpreting biological relevance and setting of population-level protection goals for risk assessment of pesticides.

    Science.gov (United States)

    Topping, Christopher John; Luttik, Robert

    2017-10-01

    Specific protection goals (SPGs) comprise an explicit expression of the environmental components that need protection and the maximum impacts that can be tolerated. SPGs are set by risk managers and are typically based on protecting populations or functions. However, the measurable endpoints available to risk managers, at least for vertebrates, are typically laboratory tests. We demonstrate, using the example of eggshell thinning in skylarks, how simulation can be used to place laboratory endpoints in context of population-level effects as an aid to setting the SPGs. We develop explanatory scenarios investigating the impact of different assumptions of eggshell thinning on skylark population size, density and distribution in 10 Danish landscapes, chosen to represent the range of typical Danish agricultural conditions. Landscape and timing of application of the pesticide were found to be the most critical factors to consider in the impact assessment. Consequently, a regulatory scenario of monoculture spring barley with an early spray treatment eliciting the eggshell thinning effect was applied using concentrations eliciting effects of zero to 100% in steps of 5%. Setting the SPGs requires balancing scientific, social and political realities. However, the provision of clear and detailed options such as those from comprehensive simulation results can inform the decision process by improving transparency and by putting the more abstract testing data into the context of real-world impacts. Copyright © 2017 Elsevier Inc. All rights reserved.

  2. Advanced digital PWR plant protection system based on optimal estimation theory

    International Nuclear Information System (INIS)

    Tylee, J.L.

    1981-04-01

    An advanced plant protection system for the Loss-of-Fluid Test (LOFT) reactor plant is described and evaluated. The system, based on a Kalman filter estimator, is capable of providing on-line estimates of such critical variables as fuel and cladding temperature, departure from nucleate boiling ratio, and maximum linear heat generation rate. The Kalman filter equations are presented, as is a description of the LOFT plant dynamic model inherent in the filter. Simulation results demonstrate the performance of the advanced system

  3. Nosocomial infection control in healthcare settings: Protection against emerging infectious diseases.

    Science.gov (United States)

    Fu, Chuanxi; Wang, Shengyong

    2016-04-12

    The Middle East respiratory syndrome (MERS) outbreak in Korea in 2015 may be attributable to poor nosocomial infection control procedures implemented. Strict infection control measures were taken in the hospital where an imported case with MERS was treated in southern China and 53 health care workers were confirmed to be MERS-CoV negative. Infection control in healthcare settings, in which patients with emerging infectious diseases such as MERS, Ebola virus disease, and the severe acute respiratory syndrome (SARS) are diagnosed and treated, are often imperfect. When it comes to emerging or unknown infectious diseases, before the imported case was finally identified or community transmission was reported, cases have often occurred in clusters in healthcare settings. Nosocomial infection control measures should be further strengthened among the workers and inpatients in designated healthcare settings that accommodate suspected cases suffering from emerging or unknown infectious diseases.

  4. Legal Protections in Public Accommodations Settings: A Critical Public Health Issue for Transgender and Gender-Nonconforming People.

    Science.gov (United States)

    Reisner, Sari L; Hughto, Jaclyn M White; Dunham, Emilia E; Heflin, Katherine J; Begenyi, Jesse Blue Glass; Coffey-Esquivel, Julia; Cahill, Sean

    2015-09-01

    Since 2012, Massachusetts law has provided legal protections against discrimination on the basis of gender identity in employment, housing, credit, public education, and hate crimes. The law does not protect against discrimination based on gender identity in public accommodations settings such as transportation, retail stores, restaurants, health care facilities, and bathrooms. A 2013 survey of Massachusetts transgender and other gender minority adults found that in the past 12 months, 65% had experienced public accommodations discrimination since the law was passed. This discrimination was associated with a greater risk of adverse emotional and physical symptoms in the past 30 days. Nondiscrimination laws inclusive of gender identity should protect against discrimination in public accommodations settings to support transgender people's health and their ability to access health care. Gender minority people who are transgender or gender nonconforming experience widespread discrimination and health inequities. Since 2012, Massachusetts law has provided protections against discrimination on the basis of gender identity in employment, housing, credit, public education, and hate crimes. The law does not, however, protect against discrimination in public accommodations (eg, hospitals, health centers, transportation, nursing homes, supermarkets, retail establishments). For this article, we examined the frequency and health correlates of public accommodations discrimination among gender minority adults in Massachusetts, with attention to discrimination in health care settings. In 2013, we recruited a community-based sample (n = 452) both online and in person. The respondents completed a 1-time, electronic survey assessing demographics, health, health care utilization, and discrimination in public accommodations venues in the past 12 months. Using adjusted multivariable logistic regression models, we examined whether experiencing public accommodations discrimination in

  5. The Cost-Effectiveness of Alternative Instruments for Environmental Protection in a Second-Best Setting

    OpenAIRE

    Lawrence H. Goulder; Ian W. H. Parry; Roberton C. Williams III; Dallas Burtraw

    1998-01-01

    This paper employs analytical and numerical general equilibrium models to examine the costs of achieving pollution reductions under a range of environmental policy instruments in a second-best setting with pre-existing factor taxes. We compare the costs and overall efficiency impacts of emissions taxes, emissions quotas, fuels taxes, performance standards, and mandated technologies, and explore how costs change with the magnitude of pre-existing taxes and the extent of pollution abatement. We...

  6. Application of Digital Object Identifiers to data sets at the NASA Goddard Earth Sciences Data and Information Services Center (GES DISC)

    Science.gov (United States)

    Vollmer, B.; Ostrenga, D.; Johnson, J. E.; Savtchenko, A. K.; Shen, S.; Teng, W. L.; Wei, J. C.

    2013-12-01

    Digital Object Identifiers (DOIs) are applied to selected data sets at the NASA Goddard Earth Sciences Data and Information Services Center (GES DISC). The DOI system provides an Internet resolution service for unique and persistent identifiers of digital objects. Products assigned DOIs include data from the NASA MEaSUREs Program, the Earth Observing System (EOS) Aqua Atmospheric Infrared Sounder (AIRS) and EOS Aura High Resolution Dynamics Limb Sounder (HIRDLS). DOIs are acquired and registered through EZID, California Digital Library and DataCite. GES DISC hosts a data set landing page associated with each DOI containing information on and access to the data including a recommended data citation when using the product in research or applications. This work includes participation with the earth science community (e.g., Earth Science Information Partners (ESIP) Federation) and the NASA Earth Science Data and Information System (ESDIS) Project to identify, establish and implement best practices for assigning DOIs and managing supporting information, including metadata, for earth science data sets. Future work includes (1) coordination with NASA mission Science Teams and other data providers on the assignment of DOIs for other GES DISC data holdings, particularly for future missions such as Orbiting Carbon Observatory -2 and -3 (OCO-2, OCO-3) and projects (MEaSUREs 2012), (2) construction of landing pages that are both human and machine readable, and (3) pursuing the linking of data and publications with tools such as the Thomson Reuters Data Citation Index.

  7. Setting limits: Using air pollution thresholds to protect and restore U.S. ecosystems

    Science.gov (United States)

    Fenn, M.E.; Lambert, K.F.; Blett, T.F.; Burns, Douglas A.; Pardo, L.H.; Lovett, Gary M.; Haeuber, R. A.; Evers, D.C.; Driscoll, C.T.; Jeffries, D.S.

    2011-01-01

    More than four decades of research provide unequivocal evidence that sulfur, nitrogen, and mercury pollution have altered, and will continue to alter, our nation's lands and waters. The emission and deposition of air pollutants harm native plants and animals, degrade water quality, affect forest productivity, and are damaging to human health. Many air quality policies limit emissions at the source but these control measures do not always consider ecosystem impacts. Air pollution thresholds at which ecological effects are observed, such as critical loads, are effective tools for assessing the impacts of air pollution on essential ecosystem services and for informing public policy. U.S. ecosystems can be more effectively protected and restored by using a combination of emissions-based approaches and science-based thresholds of ecosystem damage. Based on the results of a comprehensive review of air pollution thresholds, we conclude: ??? Ecosystem services such as air and water purification, decomposition and detoxification of waste materials, climate regulation, regeneration of soil fertility, production and biodiversity maintenance, as well as crop, timber and fish supplies are impacted by deposition of nitrogen, sulfur, mercury and other pollutants. The consequences of these changes may be difficult or impossible to reverse as impacts cascade throughout affected ecosystems. ??? The effects of too much nitrogen are common across the U.S. and include altered plant and lichen communities, enhanced growth of invasive species, eutrophication and acidification of lands and waters, and habitat deterioration for native species, including endangered species. ??? Lake, stream and soil acidification is widespread across the eastern United States. Up to 65% of lakes within sensitive areas receive acid deposition that exceeds critical loads. ??? Mercury contamination adversely affects fish in many inland and coastal waters. Fish consumption advisories for mercury exist in all 50

  8. Maximizing protection from use of oral cholera vaccines in developing country settings

    Science.gov (United States)

    Desai, Sachin N; Cravioto, Alejandro; Sur, Dipika; Kanungo, Suman

    2014-01-01

    When oral vaccines are administered to children in lower- and middle-income countries, they do not induce the same immune responses as they do in developed countries. Although not completely understood, reasons for this finding include maternal antibody interference, mucosal pathology secondary to infection, malnutrition, enteropathy, and previous exposure to the organism (or related organisms). Young children experience a high burden of cholera infection, which can lead to severe acute dehydrating diarrhea and substantial mortality and morbidity. Oral cholera vaccines show variations in their duration of protection and efficacy between children and adults. Evaluating innate and memory immune response is necessary to understand V. cholerae immunity and to improve current cholera vaccine candidates, especially in young children. Further research on the benefits of supplementary interventions and delivery schedules may also improve immunization strategies. PMID:24861554

  9. Setting limits: Using air pollution thresholds to protect and restore US ecosystems

    Science.gov (United States)

    Fenn, Mark E.; Lambert, Kathleen F.; Blett, Tamara F.; Burns, Douglas A.; Pardo, Linda H.; Lovett, Gary M.; Haeuber, Richard A.; Evers, David C.; Driscoll, Charles T.; Jeffries, Dean S.

    2011-01-01

    More than four decades of research provide unequivocal evidence that sulfur, nitrogen, and mercury pollution have altered, and will continue to alter, our nation's lands and waters. The emission and deposition of air pollutants harm native plants and animals, degrade water quality, affect forest productivity, and are damaging to human health. Many air quality policies limit emissions at the source but these control measures do not always consider ecosystem impacts. Air pollution thresholds at which ecological effects are observed, such as critical loads, are effective tools for assessing the impacts of air pollution on essential ecosystem services and for informing public policy. U.S. ecosystems can be more effectively protected and restored by using a combination of emissions-based approaches and science-based thresholds of ecosystem damage.

  10. Legal Protections in Public Accommodations Settings: A Critical Public Health Issue for Transgender and Gender-Nonconforming People

    Science.gov (United States)

    Reisner, Sari L; Hughto, Jaclyn M White; Dunham, Emilia E; Heflin, Katherine J; Begenyi, Jesse Blue Glass; Coffey-Esquivel, Julia; Cahill, Sean

    2015-01-01

    Context Gender minority people who are transgender or gender nonconforming experience widespread discrimination and health inequities. Since 2012, Massachusetts law has provided protections against discrimination on the basis of gender identity in employment, housing, credit, public education, and hate crimes. The law does not, however, protect against discrimination in public accommodations (eg, hospitals, health centers, transportation, nursing homes, supermarkets, retail establishments). For this article, we examined the frequency and health correlates of public accommodations discrimination among gender minority adults in Massachusetts, with attention to discrimination in health care settings. Methods In 2013, we recruited a community-based sample (n = 452) both online and in person. The respondents completed a 1-time, electronic survey assessing demographics, health, health care utilization, and discrimination in public accommodations venues in the past 12 months. Using adjusted multivariable logistic regression models, we examined whether experiencing public accommodations discrimination in health care was independently associated with adverse self-reported health, adjusting for discrimination in other public accommodations settings. Findings Overall, 65% of respondents reported public accommodations discrimination in the past 12 months. The 5 most prevalent discrimination settings were transportation (36%), retail (28%), restaurants (26%), public gatherings (25%), and health care (24%). Public accommodations discrimination in the past 12 months in health care settings was independently associated with a 31% to 81% increased risk of adverse emotional and physical symptoms and a 2-fold to 3-fold increased risk of postponement of needed care when sick or injured and of preventive or routine health care, adjusting for discrimination in other public accommodations settings (which also conferred an additional 20% to 77% risk per discrimination setting endorsed

  11. The ASDEX upgrade digital video processing system for real-time machine protection

    Energy Technology Data Exchange (ETDEWEB)

    Drube, Reinhard, E-mail: reinhard.drube@ipp.mpg.de [Max-Planck-Institut für Plasmaphysik, EURATOM Association, Boltzmannstr. 2, 85748 Garching (Germany); Neu, Gregor [Max-Planck-Institut für Plasmaphysik, EURATOM Association, Boltzmannstr. 2, 85748 Garching (Germany); Cole, Richard H.; Lüddecke, Klaus [Unlimited Computer Systems GmbH, Seeshaupterstr. 15, 82393 Iffeldorf (Germany); Lunt, Tilmann; Herrmann, Albrecht [Max-Planck-Institut für Plasmaphysik, EURATOM Association, Boltzmannstr. 2, 85748 Garching (Germany)

    2013-11-15

    Highlights: • We present the Real-Time Video diagnostic system of ASDEX Upgrade. • We show the implemented image processing algorithms for machine protection. • The way to achieve a robust operating multi-threading Real-Time system is described. -- Abstract: This paper describes the design, implementation, and operation of the Video Real-Time (VRT) diagnostic system of the ASDEX Upgrade plasma experiment and its integration with the ASDEX Upgrade Discharge Control System (DCS). Hot spots produced by heating systems erroneously or accidentally hitting the vessel walls, or from objects in the vessel reaching into the plasma outer border, show up as bright areas in the videos during and after the reaction. A system to prevent damage to the machine by allowing for intervention in a running discharge of the experiment was proposed and implemented. The VRT was implemented on a multi-core real-time Linux system. Up to 16 analog video channels (color and b/w) are acquired and multiple regions of interest (ROI) are processed on each video frame. Detected critical states can be used to initiate appropriate reactions – e.g. gracefully terminate the discharge. The system has been in routine operation since 2007.

  12. It's time to set some standards: Environmental classification of freshwater wetlands in New Zealand and their protection from eutrophication

    DEFF Research Database (Denmark)

    Sorrell, Brian Keith; Clarkson, Beverly

    Most natural resource plans provide protection for lakes and rivers from catchment activities leading to eutrophication. However, they are often silent about wetlands, due to the lack of information available for setting standards, defining reference conditions, and predicting responses to nutrient...... states in New Zealand wetlands, present an environmental classification based on physico-chemical and nutrient data, compare wetlands in New Zealand with those in other temperate regions, and argue for some catchment land use standards to protect wetlands from nutrient enrichment. Our database reveals...... that New Zealand wetlands, like those in other temperate climates, are defined by specific alkalinity and nutrient gradients and that there is a wide range of fertility levels. Using regression tree analysis, we have identified environmental groups of wetlands with significantly distinct nutrient regimes...

  13. The digital integrated protective scheme for 1,300 MW power stations. Performance in the presence of failures. Survivability

    International Nuclear Information System (INIS)

    Loubet, Jean; Colling, J.M.

    1982-01-01

    The new 1,300 MW nuclear power stations will be provided with a protective system making use of modern technologies, and of microprocessors in particular. One of the primary objectives taken into account at the design stage is the search for means of giving the system the ability to fulfil its duty even in the presence of failures. The characteristics that contribute to the achievement of this objective are tied to the overall architecture adopted, but also to a set of provisions, in the form of both hardware and software, that intervene, on fault occurrences, to limit and control the effects of these faults [fr

  14. Defense-in-depth and diversity evaluation to cope with design bases events concurrent with common mode failure in digital plant protection system for KNGR

    International Nuclear Information System (INIS)

    Shin, Lee Cheol; Park, Chan Eok; Jin, Choi Chul; Tae, Seo Jong

    2001-01-01

    The Korean Next Generation Reactor (KNGR) has been evolved to adopt an advanced design feature, a digital Plant Protection System (PPS) as an effort of enhancing reliability and safety of the plant. Although the digital PPS can be designed with high reliability, it is considered to be vulnerable to the Common Mode Failure (CMF) in the system software resulting in a total loss of the built-in hardware redundancy. Therefore, a comprehensive evaluation has been performed to demonstrate the intrinsic capability of the KNGR design in coping with the design basis events concurrent with CMF in the digital PPS. Instead of the conservative bounding analysis methodology, a best-estimate analysis methodology has been developed and utilized since the design basis events accompanied by CMF in the digital PPS are categorized as beyond design bases events. A variety of diverse means such as Alternate Protection System (APS), process control systems, and timely operator actions have been verified to be effective in mitigating the design basis events with CMF in the digital PPS

  15. Evaluation of novel disposable, light-weight radiation protection devices in an interventional radiology setting: a randomized controlled trial.

    Science.gov (United States)

    Uthoff, Heiko; Peña, Constantino; West, James; Contreras, Francisco; Benenati, James F; Katzen, Barry T

    2013-04-01

    Radiation exposure to interventionalists is increasing. The currently available standard radiation protection devices are heavy and do not protect the head of the operator. The aim of this study was to evaluate the effectiveness and comfort of caps and thyroid collars made of a disposable, light-weight, lead-free material (XPF) for occupational radiation protection in a clinical setting. Up to two interventional operators were randomized to wear a XPF or standard 0.5-mm lead-equivalent thyroid collars in 60 consecutive endovascular procedures requiring fluoroscopy. Simultaneously a XPF cap was worn by all operators. Radiation doses were measured using dosimeters placed outside and underneath the caps and thyroid collars. Wearing comfort was assessed at the end of each procedure on a visual analog scale (0-100 [100 = optimal]). Patient and procedure data did not differ between the XPF and standard protection groups. The cumulative radiation dose measured outside the cap was 15,700 μSv and outside the thyroid collars 21,240 μSv. Measured radiation attenuation provided by the XPF caps (n = 70), XPF thyroid collars (n = 40), and standard thyroid collars (n = 38) was 85.4% ± 25.6%, 79.7% ± 25.8% and 71.9% ± 34.2%, respectively (mean difference XPF vs standard thyroid collars, 7.8% [95% CI, -5.9% to 21.6%]; p = 0.258). The median XPF cap weight was 144 g (interquartile range, 128-170 g), and the XPF thyroid collars were 27% lighter than the standard thyroid collars (p disposable caps and thyroid collars made of XPF were assessed as being comfortable to wear, and they provide radiation protection similar to that of standard 0.5-mm lead-equivalent thyroid collars.

  16. A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT

    Directory of Open Access Journals (Sweden)

    Guoyin Zhang

    2017-01-01

    Full Text Available Since its introduction, IoT (Internet of Things has enjoyed vigorous support from governments and research institutions around the world, and remarkable achievements have been obtained. The perception layer of IoT plays an important role as a link between the IoT and the real world; the security has become a bottleneck restricting the further development of IoT. The perception layer is a self-organizing network system consisting of various resource-constrained sensor nodes through wireless communication. Accordingly, the costly encryption mechanism cannot be applied to the perception layer. In this paper, a novel lightweight data integrity protection scheme based on fragile watermark is proposed to solve the contradiction between the security and restricted resource of perception layer. To improve the security, we design a position random watermark (PRW strategy to calculate the embedding position by temporal dynamics of sensing data. The digital watermark is generated by one-way hash function SHA-1 before embedding to the dynamic computed position. In this way, the security vulnerabilities introduced by fixed embedding position can not only be solved effectively, but also achieve zero disturbance to the data. The security analysis and simulation results show that the proposed scheme can effectively ensure the integrity of the data at low cost.

  17. Protection set-points lines for the reactor core and considerations about power distribution and peak factors

    International Nuclear Information System (INIS)

    Furieri, E.B.

    1981-01-01

    In order to assure the reactor core integrity during the slow operational transients (power excursion above the nominal value and the high coolant temperature), the formation of a steam film (DNB-Departure from Nucleate Boiling) in the control rods must be avoided. The protection set points lines presents the points where DNBR (relation between critical heat flux-q sub(DNB) and the local heat flux-q' sub(local) is equal to 1.30, corrected by peak factors and uncertainty in function of ΔTr and T sub(R), respectively coolant elevation and medium coolant temperature in reactor pressure vessel. The curve set-points were determined using a new version of COBRA-IIIF (CUPRO) computer code, implemented with new subroutines and linearized convergence scheme. Pratical results for Angra-1 core were obtained and its were compared with the results from the fabricator. (E.G.) [pt

  18. Impact of protection settings of the distributed generation frequency under 1MW in the national electric system

    International Nuclear Information System (INIS)

    Alpizar Chavarria, Oscar

    2013-01-01

    A literature review is conducted to understand the distributed generation, the reason for the introduction into modern power systems and other distributed generation technologies based on renewable energies that have been installed around the country. The frequency protections of distributed generation equipment under 1MW are studied according to international standards like IEEE-1547 and specifications of equipment manufacturers. The influence of the recommended international standards settings are investigated for systems of distributed generation, the performance in frequency that have presented under some frequency perturbation, as well as the influence that can have on the national and regional electrical system, with different amounts of technologies included in the national system. The recommended settings are evaluated through simulations in PSSE program in the context of the behavior of the frequency in the national electric system [es

  19. Digital radiography: are the manufacturers' settings too high? Optimisation of the Kodak digital radiography system with aid of the computed radiography dose index

    International Nuclear Information System (INIS)

    Peters, Sinead E.; Brennan, Patrick C.

    2002-01-01

    Manufacturers offer exposure indices as a safeguard against overexposure in computed radiography, but the basis for recommended values is unclear. This study establishes an optimum exposure index to be used as a guideline for a specific CR system to minimise radiation exposures for computed mobile chest radiography, and compares this with manufacturer guidelines and current practice. An anthropomorphic phantom was employed to establish the minimum milliamperes consistent with acceptable image quality for mobile chest radiography images. This was found to be 2 mAs. Consecutively, 10 patients were exposed with this optimised milliampere value and 10 patients were exposed with the 3.2 mAs routinely used in the department of the study. Image quality was objectively assessed using anatomical criteria. Retrospective analyses of 717 exposure indices recorded over 2 months from mobile chest examinations were performed. The optimised milliampere value provided a significant reduction of the average exposure index from 1840 to 1570 (p<0.0001). This new ''optimum'' exposure index is substantially lower than manufacturer guidelines of 2000 and significantly lower than exposure indices from the retrospective study (1890). Retrospective data showed a significant increase in exposure indices if the examination was performed out of hours. The data provided by this study emphasise the need for clinicians and personnel to consider establishing their own optimum exposure indices for digital investigations rather than simply accepting manufacturers' guidelines. Such an approach, along with regular monitoring of indices, may result in a substantial reduction in patient exposure. (orig.)

  20. Protecting the health of medical students on international electives in low-resource settings.

    Science.gov (United States)

    Johnston, Niall; Sandys, Nichola; Geoghegan, Rosemary; O'Donovan, Diarmuid; Flaherty, Gerard

    2018-01-01

    Increasingly, medical students from developed countries are undertaking international medical electives in developing countries. Medical students understand the many benefits of these electives, such as the opportunity to develop clinical skills, to gain insight into global health issues and to travel to interesting regions of the world. However, they may be much less aware of the risk to their health and wellbeing while abroad. Compounding this problem, medical students may not seek advice from travel medicine practitioners and often receive inadequate or no information from their medical school prior to departure. The PubMed database was searched for relevant literature relating to the health of medical elective students. Combinations of the following key words were used as search terms: 'international health elective', 'medical student' and 'health risks'. Articles were restricted to those published in English from 1997 through June 2017. A secondary review of the reference lists of these articles was performed. The grey literature was also searched for relevant material. This narrative literature review outlines the risks of clinical electives in resource-poor settings which include exposure to infectious illness, trauma, sexual health problems, excessive sun exposure, mental health issues and crime. Medical students may mitigate these health risks by being informed and well prepared for high-risk situations. The authors provide evidence-based travel advice which aims to improve pre-travel preparation and maximize student traveller safety. A safer and more enjoyable elective may be achieved if students follow road safety advice, take personal safety measures, demonstrate cultural awareness, attend to their psychological wellbeing and avoid risk-taking behaviours. This article may benefit global health educators, international elective coordinators and travel medicine practitioners. For students, a comprehensive elective checklist, an inventory of health kit

  1. Maintenance of influenza virus infectivity on the surfaces of personal protective equipment and clothing used in healthcare settings.

    Science.gov (United States)

    Sakaguchi, Hiroko; Wada, Koji; Kajioka, Jitsuo; Watanabe, Mayumi; Nakano, Ryuichi; Hirose, Tatsuko; Ohta, Hiroshi; Aizawa, Yoshiharu

    2010-11-01

    The maintenance of infectivity of influenza viruses on the surfaces of personal protective equipment and clothing is an important factor in terms of controlling viral cross-infection in the environment and preventing contact infection. The aim of this study was to determine if laboratory-grown influenza A (H1N1) virus maintained infectivity on the surfaces of personal protective equipment and clothing used in healthcare settings. Influenza A virus (0.5 mL) was deposited on the surface of a rubber glove, an N95 particulate respirator, a surgical mask made of non-woven fabric, a gown made of Dupont Tyvek, a coated wooden desk, and stainless steel. Each sample was left for 1, 8, and 24 h, and hemagglutination (HA) and 50% tissue culture infective dose (TCID(50))/mL were measured. The HA titer of this influenza A virus did not decrease in any of the materials tested even after 24 h. The infectivity of influenza A virus measured by TCID(50) was maintained for 8 h on the surface of all materials, with the exception of the rubber glove for which virus infectivity was maintained for 24 h. Our results indicate that the replacement/renewal of personal protective equipment and clothing by healthcare professionals in cases of exposure to secretions and droplets containing viruses spread by patients is an appropriate procedure to prevent cross-infection.

  2. Arnold Roosendaal, Digital Personae and Profiles in Law. Protecting Individuals’ Rights in Online Contexts [Bespreking van: Digital Personae and Profiles in Law

    NARCIS (Netherlands)

    Lodder, A.R.

    2014-01-01

    Op 21 mei 2013 verdedigde Arnold Roosendaal aan de Universiteit Tilburg zijn proefschrift Digital Personae and Profiles in Law, promotoren waren Ronald Leenes en Bert-Jaap Koops. In de openingszin wordt het belang van het proefschrift direct duidelijk: “Personal data is the new oil of the Internet

  3. Functional utilization of control and digital protection systems in distribution substations; Aproveitamento funcional de sistemas de controle e protecao digitais em subestacoes de distribuicao

    Energy Technology Data Exchange (ETDEWEB)

    Brittes, Jose Luiz Pereira

    1996-07-01

    The application of Digital Protection and Control Systems (DPCS) in Utilities substations is a fundamental part for their Information System. Technological progress in Telematics provides nowadays, the implementation of open digital systems. But it is the wide exploitation of its potentiality that will be one of the survival factor in the competitive and multi-affair environment dictated by the new worldwide economical order. This exploitation is carried out in three levels inside the substation: at bay level, with inherent technological benefits, such as more efficient and reliable protection, data acquisition and registration, and smart control; at central level (substation), by the implantation of automatics with enormous operational and management profits; and a remote level, to whom DPCS's transpire like a very sophisticated large frame remote terminal units. (author)

  4. Functional utilization of control and digital protection systems in distribution substations; Aproveitamento funcional de sistemas de controle e protecao digitais em subestacoes de distribuicao

    Energy Technology Data Exchange (ETDEWEB)

    Brittes, Jose Luiz Pereira

    1996-07-01

    The application of Digital Protection and Control Systems (DPCS) in Utilities substations is a fundamental part for their Information System. Technological progress in Telematics provides nowadays, the implementation of open digital systems. But it is the wide exploitation of its potentiality that will be one of the survival factor in the competitive and multi-affair environment dictated by the new worldwide economical order. This exploitation is carried out in three levels inside the substation: at bay level, with inherent technological benefits, such as more efficient and reliable protection, data acquisition and registration, and smart control; at central level (substation), by the implantation of automatics with enormous operational and management profits; and a remote level, to whom DPCS's transpire like a very sophisticated large frame remote terminal units. (author)

  5. Design concepts for the reactor protection and control process instrumentation digital upgrade project at the Donald C. Cook Nuclear Plant units 1 and 2

    International Nuclear Information System (INIS)

    Carruth, R.C.; Sotos, W.G.

    1996-01-01

    As the nation's nuclear power plants age, the need to consider upgrading of their electronic protection and control systems becomes more urgent. Hardware obsolescence and mechanical wear out resulting from frequent calibration and surveillance play a major role in defining their useful life. At Cook Nuclear Plant, a decision was made to replace a major portion of the plant's protection and control systems with newer technology. This paper describes the engineering processes involved in this successful upgrade and explains the basis for many decisions made while performing the digital upgrade

  6. Mammography image quality and evidence based practice: Analysis of the demonstration of the inframammary angle in the digital setting.

    Science.gov (United States)

    Spuur, Kelly; Webb, Jodi; Poulos, Ann; Nielsen, Sharon; Robinson, Wayne

    2018-03-01

    The aim of this study is to determine the clinical rates of the demonstration of the inframammary angle (IMA) on the mediolateral oblique (MLO) view of the breast on digital mammograms and to compare the outcomes with current accreditation standards for compliance. Relationships between the IMA, age, the posterior nipple line (PNL) and compressed breast thickness will be identified and the study outcomes validated using appropriate analyses of inter-reader and inter-rater reliability and variability. Differences in left versus right data were also investigated. A quantitative retrospective study of 2270 randomly selected paired digital mammograms performed by BreastScreen NSW was undertaken. Data was collected by direct measurement and visual analysis. Intra-class correlation analyses were used to evaluate inter- and intra-rater reliability. The IMA was demonstrated on 52.4% of individual and 42.6% of paired mammograms. A linear relationship was found between the posterior nipple line (PNL) and age (p-value PNL was predicted to increase by 0.48 mm for every one year increment in age. The odds of demonstrating the IMA reduced by 2% for every one year increase in age (p-value = 0.001); are 0.4% higher for every 1 mm increase in PNL (p-value = 0.001) and 1.6% lower for every 1 mm increase in compressed breast thickness, (p-valuePNL while there was 100% agreement for the demonstration of the IMA. Analysis of the demonstration of the IMA indicates clinically achievable rates (42.6%) well below that required for compliance (50%-75%) to known worldwide accreditation standards for screening mammography. These standards should be aligned to the reported evidence base. Visualisation of the IMA is impacted negatively by increasing age and compressed breast thickness but positively by breast size (PNL). Copyright © 2018 Elsevier B.V. All rights reserved.

  7. EXTRA: a digital computer program for the solution of stiff sets of ordinary initial value, first order differential equations

    International Nuclear Information System (INIS)

    Sidell, J.

    1976-08-01

    EXTRA is a program written for the Winfrith KDF9 enabling the user to solve first order initial value differential equations. In this report general numerical integration methods are discussed with emphasis on their application to the solution of stiff sets of equations. A method of particular applicability to stiff sets of equations is described. This method is incorporated in the program EXTRA and full instructions for its use are given. A comparison with other methods of computation is included. (author)

  8. ''Low dose'' and/or ''high dose'' in radiation protection: A need to setting criteria for dose classification

    International Nuclear Information System (INIS)

    Sohrabi, M.

    1997-01-01

    The ''low dose'' and/or ''high dose'' of ionizing radiation are common terms widely used in radiation applications, radiation protection and radiobiology, and natural radiation environment. Reading the title, the papers of this interesting and highly important conference and the related literature, one can simply raise the question; ''What are the levels and/or criteria for defining a low dose or a high dose of ionizing radiation?''. This is due to the fact that the criteria for these terms and for dose levels between these two extreme quantities have not yet been set, so that the terms relatively lower doses or higher doses are usually applied. Therefore, setting criteria for classification of radiation doses in the above mentioned areas seems a vital need. The author while realizing the existing problems to achieve this important task, has made efforts in this paper to justify this need and has proposed some criteria, in particular for the classification of natural radiation areas, based on a system of dose limitation. (author)

  9. Digital radiography

    International Nuclear Information System (INIS)

    Kusano, Shoichi

    1993-01-01

    Firstly, from an historic point of view, fundamental concepts on digital imaging were reviewed to provide a foundation for discussion of digital radiography. Secondly, this review summarized the results of ongoing research in computed radiography that replaces the conventional film-screen system with a photo-stimulable phosphor plate; and thirdly, image quality, radiation protection, and image processing techniques were discussed with emphasis on picture archiving and communication system environment as our final goal. Finally, future expansion of digital radiography was described based on the present utilization of computed tomography at the National Defense Medical College Hospital. (author) 60 refs

  10. Digital quantum simulation, Schrödinger cat state spectroscopy and setting up a linear ion trap

    International Nuclear Information System (INIS)

    Hempel, C.

    2014-01-01

    This PhD thesis reports on two experiments in the field of quantum information processing using trapped calcium ions. In addition, the text covers the setup and characterization of a new linear Paul trap accompanied by a novel implementation of single-ion addressing using an acousto-optic deflector. The first of the two experiments is concerned with the proof-of-principle implementation of digital quantum simulations using up to 6 ions and 100 gate operations. It investigates the scaling behavior of simulations of elementary models of magnetism in terms of the number of involved spins and the complexity of their mutual interactions. The second experiment introduces the application of a Schroedinger cat state in the indirect detection of photon scattering events on a broad electronic transition. The method is shown to have a sensitivity down to the single photon level in a proof-of-principle demonstration using a mixed-isotope crystal of 40Ca+ and 44Ca+. A brief outlook towards future experiments and extensions of the experimental setup concludes the manuscript.(author) [de

  11. Different Modes of Digital Learning Object Use in School Settings: Do We Design for Individual or Collaborative Learning?

    Science.gov (United States)

    Akpinar, Yavuz

    2014-01-01

    The aim of the studies reported in this paper is to gain classroom based empirical evidence on the learning effectiveness of learning objects used in two types of study settings: Collaborative and individual. A total of 127 seventh and ninth grade students participated in the experiments. They were assigned into one of the study modes and worked…

  12. Indicators of Consumer Protection and Empowerment in the Digital World

    DEFF Research Database (Denmark)

    Thorun, Christian; Vetter, Max; Reisch, Lucia A.

    The process of digitalisation has changed the lives of consumers around the world. Digitalisation makes it easier for consumers to access and process information, potentially increases choice and competition, as well as encouraging innovation. At the same time, however, consumers also face barriers...... of the digital economy: When consumers mistrust businesses, they are discouraged from using new digital products and services. Hence, growth on the supply-side of the digital market presupposes consumer trust on the demand-side of the market. As a result, governments around the world have put the task...... confidence and trust. The G20 Initiative also encourages efforts to develop better metrics, inter alia, for important policy issues like trust in the digital economy. The objective of the present study is to contribute to such a development of better metrics. It aims at testing the feasibility and making...

  13. Digital watermark

    Directory of Open Access Journals (Sweden)

    Jasna Maver

    2000-01-01

    Full Text Available The huge amount of multimedia contents available on the World-Wide-Web is beginning to raise the question of their protection. Digital watermarking is a technique which can serve various purposes, including intellectual property protection, authentication and integrity verification, as well as visible or invisible content labelling of multimedia content. Due to the diversity of digital watermarking applicability, there are many different techniques, which can be categorised according to different criteria. A digital watermark can be categorised as visible or invisible and as robust or fragile. In contrast to the visible watermark where a visible pattern or image is embedded into the original image, the invisible watermark does not change the visual appearance of the image. The existence of such a watermark can be determined only through a watermark ex¬traction or detection algorithm. The robust watermark is used for copyright protection, while the fragile watermark is designed for authentication and integrity verification of multimedia content. A watermark must be detectable or extractable to be useful. In some watermarking schemes, a watermark can be extracted in its exact form, in other cases, we can detect only whether a specific given watermarking signal is present in an image. Digital libraries, through which cultural institutions will make multimedia contents available, should support a wide range of service models for intellectual property protection, where digital watermarking may play an important role.

  14. COMBATING DIGITAL PIRACY IN NIGERIA. AN ANALYSIS OF TECHNOLOGICAL PROTECTIVE MEASURES AND RIGHTS MANAGEMENT INFORMATION UNDER THE COPYRIGHT BILL

    OpenAIRE

    Kuti, Aishat Obadunni

    2016-01-01

    The adoption of digital technologies and creation of global internet infrastructure for the vast array of companies and individuals offering products and services that leverage its connectivity has transformed our world over the past two decades. The Internet has grown from a resource platform for individuals to an essential omnichannel medium for more than 2 billion users worldwide and with each facet of growth comes unprecedented challenges. The impact of digital technology on Nigerian crea...

  15. Parcels and Land Ownership, This data set consists of digital map files containing parcel-level cadastral information obtained from property descriptions. Cadastral features contained in the data set include real property boundary lines, rights-of-way boundaries, property dimensions, Published in Not Provided, 1:2400 (1in=200ft) scale, Racine County Government.

    Data.gov (United States)

    NSGIC Local Govt | GIS Inventory — Parcels and Land Ownership dataset current as of unknown. This data set consists of digital map files containing parcel-level cadastral information obtained from...

  16. Contribution to the aid to computer-aided design. Simulation of digital and logical sets. The CHAMBOR software

    International Nuclear Information System (INIS)

    Mansuy, Guy

    1973-01-01

    This report presents a simulation software which belongs to a set of software aimed at the design, analysis, test and tracing of electronic and logical assemblies. This software simulates the operation in time, and considers the propagation of signals through the network elements, with taking the delay created by each of them into account. The author presents some generalities (modules, description, library, simulation of a network in function of time), proposes a general and then a detailed description of the software: data interpretation, processing of dynamic data and network simulation, display of results on a graphical workstation

  17. Patients with uninjured lungs may also benefit from lung-protective ventilator settings [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Roger Alencar

    2017-11-01

    Full Text Available Although mechanical ventilation is a life-saving strategy in critically ill patients and an indispensable tool in patients under general anesthesia for surgery, it also acts as a double-edged sword. Indeed, ventilation is increasingly recognized as a potentially dangerous intrusion that has the potential to harm lungs, in a condition known as ‘ventilator-induced lung injury’ (VILI. So-called ‘lung-protective’ ventilator settings aiming at prevention of VILI have been shown to improve outcomes in patients with acute respiratory distress syndrome (ARDS, and, over the last few years, there has been increasing interest in possible benefit of lung-protective ventilation in patients under ventilation for reasons other than ARDS. Patients without ARDS could benefit from tidal volume reduction during mechanical ventilation. However, it is uncertain whether higher levels of positive end-expiratory pressure could benefit these patients as well. Finally, recent evidence suggests that patients without ARDS should receive low driving pressures during ventilation.

  18. The cost utility of a multi-disciplinary foot protection clinic (MDFPC) in an Irish hospital setting.

    LENUS (Irish Health Repository)

    Nason, G J

    2012-04-21

    BACKGROUND: Foot ulceration which may result in lower limb amputation is one of the most feared complications among patients with diabetes and the prevention of both ulceration and amputation is a major challenge facing the health service. Many studies have proposed dedicated diabetic foot teams as the future of diabetic foot care. AIMS: We aimed to quantify the cost benefit and sustainability of a multi-disciplinary foot protection clinic (MDFPC) in an Irish university hospital setting. METHODS: A dedicated bi-weekly consultant-led MDFPC including Vascular Surgery, Endocrinology, Orthopaedic Surgery, Podiatry, Orthotics and Tissue Viability was established in June 2008. RESULTS: Between 2006 and 2010, a total of 221 lower limb procedures (major\\/minor amputations and debridement) were performed. The number of major amputations decreased from 12 during the control period (2 years before the clinic) to 7 in the study period (2 years after the clinic). After costing all activity associated with the clinic, there was an overall saving of 114,063 per year associated with the introduction of the MDFPC. CONCLUSION: This is the first study in an Irish context, and one of few international studies, to demonstrate that an aggressive-coordinated approach to diabetic foot care is both cost effective and clinically efficient in reducing the burden of foot-related complications in a diabetic population.

  19. Understanding the digital divide in the clinical setting: the technology knowledge gap experienced by US safety net patients during teleretinal screening.

    Science.gov (United States)

    George, Sheba; Moran, Erin; Fish, Allison; Ogunyemi, Lola

    2013-01-01

    Differential access to everyday technology and healthcare amongst safety net patients is associated with low technological and health literacies, respectively. These low rates of literacy produce a complex patient "knowledge gap" that influences the effectiveness of telehealth technologies. To understand this "knowledge gap", six focus groups (2 African-American and 4 Latino) were conducted with patients who received teleretinal screenings in U.S. urban safety-net settings. Findings indicate that patients' "knowledge gap" is primarily produced at three points: (1) when patients' preexisting personal barriers to care became exacerbated in the clinical setting; (2) through encounters with technology during screening; and (3) in doctor-patient follow-up. This "knowledge gap" can produce confusion and fear, potentially affecting patients' confidence in quality of care and limiting their disease management ability. In rethinking the digital divide to include the consequences of this knowledge gap faced by patients in the clinical setting, we suggest that patient education focus on both their disease and specific telehealth technologies deployed in care delivery.

  20. Analysis of the criteria used by the International Commission on Radiological Protection to justify the setting of numerical protection level values.

    Science.gov (United States)

    2006-01-01

    This report compiles the various numerical protection level values published by the International Commission on Radiological Protection (ICRP) since its 1990 Recommendations (Publication 60). Several terms are used to denominate the protection levels: individual dose limit, 'maximum' individual dose, dose constraint, exemption level, exclusion level, action level, or intervention level. The reasons provided by the Commission for selecting the associated numerical values is quoted as far as available. In some cases the rationale is not totally explicit in the original ICRP report concerned; in such cases the Task Group that prepared the present report have proposed their own interpretation. Originally, this report was prepared by a Task Group at CEPN, a French research and development center, in behalf of IRSN, a French public expert body engaged in radiological protection and nuclear safety. It is published here with kind permission by CEPN and IRSN.

  1. Is an ecosystem services-based approach developed for setting specific protection goals for plant protection products applicable to other chemicals?

    Science.gov (United States)

    Maltby, Lorraine; Jackson, Mathew; Whale, Graham; Brown, A Ross; Hamer, Mick; Solga, Andreas; Kabouw, Patrick; Woods, Richard; Marshall, Stuart

    2017-02-15

    Clearly defined protection goals specifying what to protect, where and when, are required for designing scientifically sound risk assessments and effective risk management of chemicals. Environmental protection goals specified in EU legislation are defined in general terms, resulting in uncertainty in how to achieve them. In 2010, the European Food Safety Authority (EFSA) published a framework to identify more specific protection goals based on ecosystem services potentially affected by plant protection products. But how applicable is this framework to chemicals with different emission scenarios and receptor ecosystems? Four case studies used to address this question were: (i) oil refinery waste water exposure in estuarine environments; (ii) oil dispersant exposure in aquatic environments; (iii) down the drain chemicals exposure in a wide range of ecosystems (terrestrial and aquatic); (iv) persistent organic pollutant exposure in remote (pristine) Arctic environments. A four-step process was followed to identify ecosystems and services potentially impacted by chemical emissions and to define specific protection goals. Case studies demonstrated that, in principle, the ecosystem services concept and the EFSA framework can be applied to derive specific protection goals for a broad range of chemical exposure scenarios. By identifying key habitats and ecosystem services of concern, the approach offers the potential for greater spatial and temporal resolution, together with increased environmental relevance, in chemical risk assessments. With modifications including improved clarity on terminology/definitions and further development/refinement of the key concepts, we believe the principles of the EFSA framework could provide a methodical approach to the identification and prioritization of ecosystems, ecosystem services and the service providing units that are most at risk from chemical exposure. Copyright © 2016 The Authors. Published by Elsevier B.V. All rights

  2. Digital versus traditional: are diagnostic accuracy rates similar for glass slides versus whole slide images in a non-gynaecological external quality assurance setting?

    Science.gov (United States)

    Ross, Jennifer; Greaves, Janelle; Earls, Peter; Shulruf, Boaz; Van Es, Simone L

    2018-04-17

    The Royal College of Pathologists of Australasia Quality Assurance Programs introduced virtual microscopy cases into its cytopathology non-gynaecological program after a short pilot phase, to address the challenges of providing a purely glass slide-based external quality assurance program to multiple participants both locally and internationally. The use of whole slide image (WSI) cases has facilitated a more robust program in relation to standardised material and statistical analysis, with access to a wider variety of specimen types and diagnostic entities. Diagnostic accuracy rates on 56 WSI were assessed against the reference diagnosis. A portion (12) of these WSI slides had been used in glass slide format in previous EQA surveys, and the results of these were compared to the responses received as glass slide cases. Overall diagnostic accuracy for the 56 WSI cases was acceptable in comparison to the reference diagnosis. When these 12 cases were analysed individually, for seven of the twelve cases, virtual format was found to be not inferior to glass slides for diagnostic accuracy. For one case, accuracy using WSI for diagnosis was superior to glass format. Diagnostic accuracy, using WSI for cases in our external quality assurance program is acceptable. As the use of digital microscopy in a large scale external quality assurance program (eQAP) offers extensive advantages over a glass slide-based format, our results encourage future comparison of diagnostic accuracy for virtual compared to glass slide format at a point in time where pathologists are becoming increasingly familiar with virtual microscopy in everyday practice. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  3. A Novel Approach for Microgrid Protection Based upon Combined ANFIS and Hilbert Space-Based Power Setting

    Directory of Open Access Journals (Sweden)

    Ali Hadi Abdulwahid

    2016-12-01

    Full Text Available Nowadays, the use of distributed generation (DG has increased because of benefits such as increased reliability, reduced losses, improvement in the line capacity, and less environmental pollution. The protection of microgrids, which consist of generation sources, is one of the most crucial concerns of basic distribution operators. One of the key issues in this field is the protection of microgrids against permanent and temporary failures by improving the safety and reliability of the network. The traditional method has a number of disadvantages. The reliability and stability of a power system in a microgrid depend to a great extent on the efficiency of the protection scheme. The application of Artificial Intelligence approaches was introduced recently in the protection of distribution networks. The fault detection method depends on differential relay based on Hilbert Space-Based Power (HSBP theory to achieve fastest primary protection. It is backed up by a total harmonic distortion (THD detection method that takes over in case of a failure in the primary method. The backup protection would be completely independent of the main protection. This is rarely attained in practice. This paper proposes a new algorithm to improve protection performance by adaptive network-based fuzzy inference system (ANFIS. The protection can be obtained in a novel way based on this theory. An advantage of this algorithm is that the protection system operates in fewer than two cycles after the occurrence of the fault. Another advantage is that the error detection is not dependent on the selection of threshold values, and all types of internal fault can identify and show that the algorithm operates correctly for all types of faults while preventing unwanted tripping, even if the data were distorted by current transformer (CT saturation or by data mismatches. The simulation results show that the proposed circuit can identify the faulty phase in the microgrid quickly and

  4. Enabling Digital Literacy

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Georgsen, Marianne

    2010-01-01

    There are some tensions between high-level policy definitions of “digital literacy” and actual teaching practice. We need to find workable definitions of digital literacy; obtain a better understanding of what digital literacy might look like in practice; and identify pedagogical approaches, which...... support teachers in designing digital literacy learning. We suggest that frameworks such as Problem Based Learning (PBL) are approaches that enable digital literacy learning because they provide good settings for engaging with digital literacy. We illustrate this through analysis of a case. Furthermore......, these operate on a meso-level mediating between high-level concepts of digital literacy and classroom practice....

  5. Protective

    Directory of Open Access Journals (Sweden)

    Wessam M. Abdel-Wahab

    2013-10-01

    Full Text Available Many active ingredients extracted from herbal and medicinal plants are extensively studied for their beneficial effects. Antioxidant activity and free radical scavenging properties of thymoquinone (TQ have been reported. The present study evaluated the possible protective effects of TQ against the toxicity and oxidative stress of sodium fluoride (NaF in the liver of rats. Rats were divided into four groups, the first group served as the control group and was administered distilled water whereas the NaF group received NaF orally at a dose of 10 mg/kg for 4 weeks, TQ group was administered TQ orally at a dose of 10 mg/kg for 5 weeks, and the NaF-TQ group was first given TQ for 1 week and was secondly administered 10 mg/kg/day NaF in association with 10 mg/kg TQ for 4 weeks. Rats intoxicated with NaF showed a significant increase in lipid peroxidation whereas the level of reduced glutathione (GSH and the activity of superoxide dismutase (SOD, catalase (CAT, glutathione S-transferase (GST and glutathione peroxidase (GPx were reduced in hepatic tissues. The proper functioning of the liver was also disrupted as indicated by alterations in the measured liver function indices and biochemical parameters. TQ supplementation counteracted the NaF-induced hepatotoxicity probably due to its strong antioxidant activity. In conclusion, the results obtained clearly indicated the role of oxidative stress in the induction of NaF toxicity and suggested hepatoprotective effects of TQ against the toxicity of fluoride compounds.

  6. Design and realization of a fast digital system for the protection of a linear accelerator; Conception et realisation d'un systeme numerique rapide pour la protection d'un accelerateur lineaire

    Energy Technology Data Exchange (ETDEWEB)

    Hamdi, A

    2004-07-01

    The new generation of light sources based on SASE Free-Electron-Lasers driven by LINACs operate with electron beams with high beam currents and duty cycles. This is especially true for the superconducting machines like TTF 2 and the X-RAY FEL, under construction or planning at DESY. Elaborate fast protections systems are required not only to protect the machine from electron beams hitting and destroying the vacuum chamber, but also to prevent the machine from running at high loss levels, dangerous for components like the FEL undulator. This document presents the different protection systems currently under construction for TTF 2. The very fast systems, based on transmission measurements and distributed loss detection monitors, are described in detail. This description includes the fast electronics to collect and to transmit the different interlock and status signals: analog to digital converters, DSP and FPGA, interfaces, toroid protection system (TPS) card. The implementation and validation (simulation and tests) of the TPS card at DESY is presented.

  7. Digital piracy : theory

    OpenAIRE

    BELLEFLAMME, Paul; PEITZ, Martin

    2010-01-01

    This article reviews recent theoretical contributions on digital piracy. It starts by elaborating on the reasons for intellectual property protection, by reporting a few facts about copyright protection, and by examining reasons to become a digital pirate. Next, it provides an exploration of the consequences of digital piracy, using a base model and several extensions (with consumer sampling, network effects, and indirect appropriation). A closer look at market-structure implications of end-u...

  8. 10 CFR 73.55 - Requirements for physical protection of licensed activities in nuclear power reactors against...

    Science.gov (United States)

    2010-01-01

    ... protection of digital computer and communication systems and networks. (ii) Site-specific conditions that... criteria set forth in § 73.54 “Protection of Digital Computer and Communication systems and Networks” of... visitors shall register their name, date, time, purpose of visit, employment affiliation, citizenship, and...

  9. Intraoral radiology in general dental practices - a comparison of digital and film-based X-ray systems with regard to radiation protection and dose reduction.

    Science.gov (United States)

    Anissi, H D; Geibel, M A

    2014-08-01

    The purpose of this study was to gain insight into the distribution and application of digital intraoral radiographic techniques within general dental practices and to compare these with film-based systems in terms of patient dose reduction. 1100 questionnaires were handed out to general dental practitioners. Data was analyzed with respect to the type of system by using descriptive statistics and nonparametric tests, i.e. Kruskal-Wallis, Mann-Whitney and chi-square test (SPSS 20). 64% of the questioned dentists still use film-based radiology, 23% utilize storage phosphor plate (SPP) systems and 13% use a charge-coupled device (CCD). A strong correlation between the number of dentists working in a practice and the use of digital dental imaging was observed. Almost 3/4 of the film users work with E- or F-speed film. 45% of them refuse to change to a digital system. The use of lead aprons was popular, while only a minority preferred thyroid shields and rectangular collimators. A fourfold reduction of exposure time from D-speed film to CCD systems was observed. Due to detector size and positioning errors, users of CCD systems take significantly more single-tooth radiographs in total. Considering the number of radiographs per patient, there is only a slight tendency towards more X-rays with CCD systems. Up to image generation, digital systems seem to be as or even more difficult to handle than film-based systems, while their handling was favored after radiographic exposure. Despite a slight increase of radiographs taken with CCD systems, there is a significant dosage reduction. Corresponding to the decrease in exposure time, the patient dose for SPP systems is reduced to one half compared to film. The main issues in CCD technology are positioning errors and the size of the X-ray detectors which are difficult to eliminate. The usage of radiation protection measures still needs to be improved. ► Responsible use of digital intraoral radiology results in a significant

  10. A comparison between the first-fit settings of two multichannel digital signal-processing strategies: music quality ratings and speech-in-noise scores.

    Science.gov (United States)

    Higgins, Paul; Searchfield, Grant; Coad, Gavin

    2012-06-01

    The aim of this study was to determine which level-dependent hearing aid digital signal-processing strategy (DSP) participants preferred when listening to music and/or performing a speech-in-noise task. Two receiver-in-the-ear hearing aids were compared: one using 32-channel adaptive dynamic range optimization (ADRO) and the other wide dynamic range compression (WDRC) incorporating dual fast (4 channel) and slow (15 channel) processing. The manufacturers' first-fit settings based on participants' audiograms were used in both cases. Results were obtained from 18 participants on a quick speech-in-noise (QuickSIN; Killion, Niquette, Gudmundsen, Revit, & Banerjee, 2004) task and for 3 music listening conditions (classical, jazz, and rock). Participants preferred the quality of music and performed better at the QuickSIN task using the hearing aids with ADRO processing. A potential reason for the better performance of the ADRO hearing aids was less fluctuation in output with change in sound dynamics. ADRO processing has advantages for both music quality and speech recognition in noise over the multichannel WDRC processing that was used in the study. Further evaluations of which DSP aspects contribute to listener preference are required.

  11. Can the synthetic C view images be used in isolation for diagnosing breast malignancy without reviewing the entire digital breast tomosynthesis data set?

    Science.gov (United States)

    Murphy, Mark C; Coffey, Louise; O'Neill, Ailbhe C; Quinn, Cecily; Prichard, Ruth; McNally, Sorcha

    2018-02-09

    The aim of this study was to determine if the synthetic C view acquired at digital breast tomosynthesis (DBT) would give adequate information to confirm a malignancy and could obviate the need to review all the tomosynthesis image data set. All patients with biopsy-proven breast cancer recalled from screening mammograms between May and September 2016 were included for review. For each patient, the screening 2D mammogram, the synthetic C view, and the DBT images were reviewed by three breast radiologists and each assigned a BIRADS code. Any discrepancies were reviewed and resolved by consensus. A total of 92 patients were diagnosed with breast cancer in this time period. Fourteen were excluded because they did not have DBT performed. Five women were recalled for evaluation of two lesions. In total, 83 lesions were assessed. In 27 cases, the BIRADS code remained unchanged in the three modalities. In 16 cases, the lesions appeared more concerning on C view and DBT that on the original mammogram but were not definitive for malignancy (BIRADS 4). In 29 cases, a BIRADS 5 code was assigned on C view and tomosynthesis but not on 2D. For 11 lesions, a BIRADS 5 code was assigned only on DBT. Four women had BIRADS 5 lesions seen on both the C view and DBT that were not seen on the screening 2D mammogram. One was multifocal. While the synthetic C view gives additional information when compared to a screening 2D mammogram, the full DBT tomosynthesis data set needs to be reviewed to diagnose a breast malignancy.

  12. Baseline Survey of Sun-Protection Knowledge, Practices and Policy in Early Childhood Settings in Queensland, Australia

    Science.gov (United States)

    Harrison, Simone L.; Saunders, V.; Nowak, M.

    2007-01-01

    Excessive exposure to sunlight during early childhood increases the risk of developing skin cancer. Self-administered questionnaires exploring sun-protection knowledge, practices and policy were mailed to the directors/co-ordinators/senior teachers of all known early childhood services in Queensland, Australia, in 2002 (n = 1383; 56.5% response).…

  13. Moving into Protected Areas? Setting Conservation Priorities for Romanian Reptiles and Amphibians at Risk from Climate Change

    Science.gov (United States)

    Popescu, Viorel D.; Rozylowicz, Laurenţiu; Cogălniceanu, Dan; Niculae, Iulian Mihăiţă; Cucu, Adina Livia

    2013-01-01

    Rapid climate change represents one of the top threats to biodiversity, causing declines and extinctions of many species. Range shifts are a key response, but in many cases are incompatible with the current extent of protected areas. In this study we used ensemble species distribution models to identify range changes for 21 reptile and 16 amphibian species in Romania for the 2020s and 2050s time horizons under three emission scenarios (A1B = integrated world, rapid economic growth, A2A = divided world, rapid economic growth [realistic scenario], B2A = regional development, environmentally-friendly scenario) and no- and limited-dispersal assumptions. We then used irreplaceability analysis to test the efficacy of the Natura 2000 network to meet conservation targets. Under all scenarios and time horizons, 90% of the species suffered range contractions (greatest loses under scenarios B2A for 2020s, and A1B for 2050s), and four reptile species expanded their ranges. Two reptile and two amphibian species are predicted to completely lose climate space by 2050s. Currently, 35 species do not meet conservation targets (>40% representation in protected areas), but the target is predicted to be met for 4 - 14 species under future climate conditions, with higher representation under the limited-dispersal scenario. The Alpine and Steppic-Black Sea biogeographic regions have the highest irreplaceability value, and act as climate refugia for many reptiles and amphibians. The Natura 2000 network performs better for achieving herpetofauna conservation goals in the future, owing to the interaction between drastic range contractions, and range shifts towards existing protected areas. Thus, conservation actions for herpetofauna in Romania need to focus on: (1) building institutional capacity of protected areas in the Alpine and Steppic-Black Sea biogeographic regions, and (2) facilitating natural range shifts by improving the conservation status of herpetofauna outside protected areas

  14. Moving into protected areas? Setting conservation priorities for Romanian reptiles and amphibians at risk from climate change.

    Directory of Open Access Journals (Sweden)

    Viorel D Popescu

    Full Text Available Rapid climate change represents one of the top threats to biodiversity, causing declines and extinctions of many species. Range shifts are a key response, but in many cases are incompatible with the current extent of protected areas. In this study we used ensemble species distribution models to identify range changes for 21 reptile and 16 amphibian species in Romania for the 2020s and 2050s time horizons under three emission scenarios (A1B = integrated world, rapid economic growth, A2A = divided world, rapid economic growth [realistic scenario], B2A = regional development, environmentally-friendly scenario and no- and limited-dispersal assumptions. We then used irreplaceability analysis to test the efficacy of the Natura 2000 network to meet conservation targets. Under all scenarios and time horizons, 90% of the species suffered range contractions (greatest loses under scenarios B2A for 2020s, and A1B for 2050s, and four reptile species expanded their ranges. Two reptile and two amphibian species are predicted to completely lose climate space by 2050s. Currently, 35 species do not meet conservation targets (>40% representation in protected areas, but the target is predicted to be met for 4 - 14 species under future climate conditions, with higher representation under the limited-dispersal scenario. The Alpine and Steppic-Black Sea biogeographic regions have the highest irreplaceability value, and act as climate refugia for many reptiles and amphibians. The Natura 2000 network performs better for achieving herpetofauna conservation goals in the future, owing to the interaction between drastic range contractions, and range shifts towards existing protected areas. Thus, conservation actions for herpetofauna in Romania need to focus on: (1 building institutional capacity of protected areas in the Alpine and Steppic-Black Sea biogeographic regions, and (2 facilitating natural range shifts by improving the conservation status of herpetofauna outside

  15. Moving into protected areas? Setting conservation priorities for Romanian reptiles and amphibians at risk from climate change.

    Science.gov (United States)

    Popescu, Viorel D; Rozylowicz, Laurenţiu; Cogălniceanu, Dan; Niculae, Iulian Mihăiţă; Cucu, Adina Livia

    2013-01-01

    Rapid climate change represents one of the top threats to biodiversity, causing declines and extinctions of many species. Range shifts are a key response, but in many cases are incompatible with the current extent of protected areas. In this study we used ensemble species distribution models to identify range changes for 21 reptile and 16 amphibian species in Romania for the 2020s and 2050s time horizons under three emission scenarios (A1B = integrated world, rapid economic growth, A2A = divided world, rapid economic growth [realistic scenario], B2A = regional development, environmentally-friendly scenario) and no- and limited-dispersal assumptions. We then used irreplaceability analysis to test the efficacy of the Natura 2000 network to meet conservation targets. Under all scenarios and time horizons, 90% of the species suffered range contractions (greatest loses under scenarios B2A for 2020s, and A1B for 2050s), and four reptile species expanded their ranges. Two reptile and two amphibian species are predicted to completely lose climate space by 2050s. Currently, 35 species do not meet conservation targets (>40% representation in protected areas), but the target is predicted to be met for 4 - 14 species under future climate conditions, with higher representation under the limited-dispersal scenario. The Alpine and Steppic-Black Sea biogeographic regions have the highest irreplaceability value, and act as climate refugia for many reptiles and amphibians. The Natura 2000 network performs better for achieving herpetofauna conservation goals in the future, owing to the interaction between drastic range contractions, and range shifts towards existing protected areas. Thus, conservation actions for herpetofauna in Romania need to focus on: (1) building institutional capacity of protected areas in the Alpine and Steppic-Black Sea biogeographic regions, and (2) facilitating natural range shifts by improving the conservation status of herpetofauna outside protected areas

  16. When Losing Means Winning: The Impact of Conflict in a Digital Game on Young Adults' Intentions to Get Protected from Cancer.

    Science.gov (United States)

    Khalil, Georges E

    2012-08-01

    Despite the improved survival rate for patients with cancer in the United States, there is a need for successful intervention programs that can raise awareness about cancer risks among healthy young adults. This research experimentally examines how conflict in a digital game called "Re-Mission™" (HopeLab, Redwood City, CA) may influence young adults' perception of cancer risk, their motivation to get protected from cancer, and their intention to seek cancer-related information from their doctors. "Re-Mission" is a game in which players control a nanorobot that goes inside patients' virtual bodies to fight cancer cells. Two days after completing a baseline survey, participants (n=48) played "Re-Mission" at either low or high conflict (i.e., low or high level of obstacles and challenges in the game). Then, participants completed a post-experience survey. Participants in the high conflict condition experienced an increase in perceived susceptibility to and severity of cancer. They also increased their intentions to seek information by talking with a physician. Conflict also blocked any decrease in protective motivation. This study suggests that by virtually experiencing the consequences of cancer cell behavior, young adult players of "Re-Mission" increased in perception of cancer risks, protective motivation, and intentions to seek cancer-related information. In practice, health interventions should not only disseminate visual information about cancer, but also give the public the opportunity to virtually experience the consequences of cancer in order to understand the risks and become motivated to get protected. Implications for future research are also discussed.

  17. Intraoral radiology in general dental practices. A comparison of digital and film-based X-ray systems with regard to radiation protection and dose reduction

    Energy Technology Data Exchange (ETDEWEB)

    Anissi, H.D. [Ulm Univ. (Germany). Dentistry; Geibel, M.A. [Ulm Univ. (Germany). Dept. of Dentomaxillofacial Surgery

    2014-08-15

    Purpose: The purpose of this study was to gain insight into the distribution and application of digital intraoral radiographic techniques within general dental practices and to compare these with film-based systems in terms of patient dose reduction. Materials and Methods: 1100 questionnaires were handed out to general dental practitioners. Data was analyzed with respect to the type of system by using descriptive statistics and nonparametric tests, i.e. Kruskal-Wallis, Mann-Whitney and chi-square test (SPSS 20). Results: 64% of the questioned dentists still use film-based radiology, 23% utilize storage phosphor plate (SPP) systems and 13% use a charge-coupled device (CCD). A strong correlation between the number of dentists working in a practice and the use of digital dental imaging was observed. Almost 3/4 of the film users work with E- or F-speed film. 45% of them refuse to change to a digital system. The use of lead aprons was popular, while only a minority preferred thyroid shields and rectangular collimators. A fourfold reduction of exposure time from D-speed film to CCD systems was observed. Due to detector size and positioning errors, users of CCD systems take significantly more single-tooth radiographs in total. Considering the number of radiographs per patient, there is only a slight tendency towards more X-rays with CCD systems. Up to image generation, digital systems seem to be as or even more difficult to handle than film-based systems, while their handling was favored after radiographic exposure. Conclusion: Despite a slight increase of radiographs taken with CCD systems, there is a significant dosage reduction. Corresponding to the decrease in exposure time, the patient dose for SPP systems is reduced to one half compared to film. The main issues in CCD technology are positioning errors and the size of the X-ray detectors which are difficult to eliminate. The usage of radiation protection measures still needs to be improved. (orig.)

  18. Intraoral radiology in general dental practices. A comparison of digital and film-based X-ray systems with regard to radiation protection and dose reduction

    International Nuclear Information System (INIS)

    Anissi, H.D.; Geibel, M.A.

    2014-01-01

    Purpose: The purpose of this study was to gain insight into the distribution and application of digital intraoral radiographic techniques within general dental practices and to compare these with film-based systems in terms of patient dose reduction. Materials and Methods: 1100 questionnaires were handed out to general dental practitioners. Data was analyzed with respect to the type of system by using descriptive statistics and nonparametric tests, i.e. Kruskal-Wallis, Mann-Whitney and chi-square test (SPSS 20). Results: 64% of the questioned dentists still use film-based radiology, 23% utilize storage phosphor plate (SPP) systems and 13% use a charge-coupled device (CCD). A strong correlation between the number of dentists working in a practice and the use of digital dental imaging was observed. Almost 3/4 of the film users work with E- or F-speed film. 45% of them refuse to change to a digital system. The use of lead aprons was popular, while only a minority preferred thyroid shields and rectangular collimators. A fourfold reduction of exposure time from D-speed film to CCD systems was observed. Due to detector size and positioning errors, users of CCD systems take significantly more single-tooth radiographs in total. Considering the number of radiographs per patient, there is only a slight tendency towards more X-rays with CCD systems. Up to image generation, digital systems seem to be as or even more difficult to handle than film-based systems, while their handling was favored after radiographic exposure. Conclusion: Despite a slight increase of radiographs taken with CCD systems, there is a significant dosage reduction. Corresponding to the decrease in exposure time, the patient dose for SPP systems is reduced to one half compared to film. The main issues in CCD technology are positioning errors and the size of the X-ray detectors which are difficult to eliminate. The usage of radiation protection measures still needs to be improved. (orig.)

  19. Digital Data Set of Orchards Where Arsenical Pesticides Were Likely Used in Clarke and Frederick Counties, Virginia, and Berkeley and Jefferson Counties, West Virginia

    Science.gov (United States)

    Reed, Bradley W.; Larkins, Peter; Robinson, Gilpin R.

    2006-01-01

    of this past arsenical pesticide use is not known in the region. Based on estimates from other areas (D'Angelo et al., 1996), cumulate application over the period of arsenical pesticide use may have been as much as 22.4 g/m2 of arsenic and 100 g/m2 of lead in orchard areas. In minimally disturbed orchard soils, arsenic and lead are largely retained in the top few centimeters of the soil horizon; intra-soil redistribution of these metals occurs but appears to be limited (Veneman et al. 1983; Peryea, 1998). Surface concentrations of arsenic and lead in undisturbed orchard soils where arsenical pesticides were used commonly exceed 20 mg/kg As and 100 mg/kg Pb (Veneman et al., 1983; Jones and Hatch, 1937). The digital data set of orchard locations was used to aid assessment of the likely occurrence and distribution of arsenical pesticide residues in surface soils. Most areas of orchard cultivation were sited in areas overlying carbonate bedrock in the Valley and Ridge province. This data set needed to be created since there was no reliable and complete land cover data set identifying areas under orchard cultivation during the time period of extensive use of arsenical pesticides in the study area as of the time of the study. The spatial database of orchard areas was compiled using twenty-seven USGS 7.5 minute series topographical maps covering the study area of Clarke and Frederick Counties, Virginia, and Berkeley and Jefferson Counties, West Virginia. These maps were published between 1943 and 1972 at 1:24,000 scale, with the oldest topographic map available from the US Geological Survey map archive for each area being chosen, going back only as far as the 1920s when use of arsenical pesticides started. Orchard areas on the topographic maps were traced in order to aid in the digitization of the sites. The topographic maps were then scanned and geographically referenced using ERDAS Imagine version 8.7, a raster editing program, turning them into rectifi

  20. Sun Protection and Skin Examination Practices in a Setting of High Ambient Solar Radiation: A Population-Based Cohort Study.

    Science.gov (United States)

    Olsen, Catherine M; Thompson, Bridie S; Green, Adèle C; Neale, Rachel E; Whiteman, David C

    2015-09-01

    Primary prevention and early detection are integral strategies to reduce the burden of skin cancer. To describe the prevalence of sun protection and skin examination practices in a population exposed to high levels of ambient solar radiation and to identify associated factors. Cross-sectional analyses of baseline data from a prospective cohort of 40,172 adults aged 40 through 69 years from Queensland, Australia, recruited in 2011. We obtained data on all melanoma diagnoses through 2009 via record linkage with the Queensland Cancer Registry (notifications have been mandatory since 1982). We calculated prevalence proportion ratios to compare prevalence of sun protection and skin examination practices in 3 separate groups: those with a history of melanoma (group 1), those with a self-reported history of treated actinic lesions (group 2), and those without either (group 3). We used multivariate generalized linear models to identify factors associated with each practice. Participants with a previously confirmed melanoma (group 1; n = 1433) and/or treated actinic lesions (group 2; n = 24,006) were more likely than those without (group 3; n = 14,733) to report sun protection practices, including regular use of sunscreen (53.3%, 45.1%, and 38.1%, respectively) and wearing hats (74.7%, 68.2%, and 58.2%, respectively). They were also more likely to have had a whole-body skin examination by a physician in the past 3 years (93.7%, 83.4%, and 52.1%, respectively). Within all 3 groups, the strongest association with sun protection practices was with sun-sensitive skin type. Within group 3 (no history of treated skin lesions), the strongest factor associated with clinical skin examinations was self-reported nevus density at 21 years of age, whereas a family history of melanoma was a significant factor in groups 2 and 3. In this large sample exposed to high levels of ambient solar radiation, sun protection and skin examination practices were most frequent among those

  1. Software safety analysis techniques for developing safety critical software in the digital protection system of the LMR

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jang Soo; Cheon, Se Woo; Kim, Chang Hoi; Sim, Yun Sub

    2001-02-01

    This report has described the software safety analysis techniques and the engineering guidelines for developing safety critical software to identify the state of the art in this field and to give the software safety engineer a trail map between the code and standards layer and the design methodology and documents layer. We have surveyed the management aspects of software safety activities during the software lifecycle in order to improve the safety. After identifying the conventional safety analysis techniques for systems, we have surveyed in details the software safety analysis techniques, software FMEA(Failure Mode and Effects Analysis), software HAZOP(Hazard and Operability Analysis), and software FTA(Fault Tree Analysis). We have also surveyed the state of the art in the software reliability assessment techniques. The most important results from the reliability techniques are not the specific probability numbers generated, but the insights into the risk importance of software features. To defend against potential common-mode failures, high quality, defense-in-depth, and diversity are considered to be key elements in digital I and C system design. To minimize the possibility of CMFs and thus increase the plant reliability, we have provided D-in-D and D analysis guidelines.

  2. Software safety analysis techniques for developing safety critical software in the digital protection system of the LMR

    International Nuclear Information System (INIS)

    Lee, Jang Soo; Cheon, Se Woo; Kim, Chang Hoi; Sim, Yun Sub

    2001-02-01

    This report has described the software safety analysis techniques and the engineering guidelines for developing safety critical software to identify the state of the art in this field and to give the software safety engineer a trail map between the code and standards layer and the design methodology and documents layer. We have surveyed the management aspects of software safety activities during the software lifecycle in order to improve the safety. After identifying the conventional safety analysis techniques for systems, we have surveyed in details the software safety analysis techniques, software FMEA(Failure Mode and Effects Analysis), software HAZOP(Hazard and Operability Analysis), and software FTA(Fault Tree Analysis). We have also surveyed the state of the art in the software reliability assessment techniques. The most important results from the reliability techniques are not the specific probability numbers generated, but the insights into the risk importance of software features. To defend against potential common-mode failures, high quality, defense-in-depth, and diversity are considered to be key elements in digital I and C system design. To minimize the possibility of CMFs and thus increase the plant reliability, we have provided D-in-D and D analysis guidelines

  3. Digital broadcasting

    International Nuclear Information System (INIS)

    Park, Ji Hyeong

    1999-06-01

    This book contains twelve chapters, which deals with digitization of broadcast signal such as digital open, digitization of video signal and sound signal digitization of broadcasting equipment like DTPP and digital VTR, digitization of equipment to transmit such as digital STL, digital FPU and digital SNG, digitization of transmit about digital TV transmit and radio transmit, digital broadcasting system on necessity and advantage, digital broadcasting system abroad and Korea, digital broadcasting of outline, advantage of digital TV, ripple effect of digital broadcasting and consideration of digital broadcasting, ground wave digital broadcasting of DVB-T in Europe DTV in U.S.A and ISDB-T in Japan, HDTV broadcasting, satellite broadcasting, digital TV broadcasting in Korea, digital radio broadcasting and new broadcasting service.

  4. Protecting and Promoting Mental Health of Nurses in the Hospital Setting: Is It Cost-Effective from An Employer'S Perspective?

    NARCIS (Netherlands)

    Noben, C.; evers, s.; Nieuwenhuijsen, K.; Ketelaar, S.; Gartner, F.; Sluiter, J.; Smit, H.F.E.

    2015-01-01

    Objectives: Nurses are at elevated risk of burnout, anxiety and depressive disorders, and may then become less productive. This begs the question if a preventive intervention in the work setting might be cost-saving from a business perspective. Material and Methods: A cost-benefit analysis was

  5. A study of digital hardware architectures for nuclear reactors protection systems applications - reliability and safety analysis methods; Um estudo de arquiteturas de hardware para aplicacao em sistemas digitais de protecao de reatores nucleares - metodos de analise de confiabilidade e seguranca

    Energy Technology Data Exchange (ETDEWEB)

    Benko, Pedro Luiz

    1997-07-01

    A study of digital hardware architectures, including experience in many countries, topologies and solutions to interface circuits for protection systems of nuclear reactors is presented. Methods for developing digital systems architectures based on fault tolerant and safety requirements is proposed. Directives for assessing such conditions are suggested. Techniques and the most common tools employed in reliability, safety evaluation and modeling of hardware architectures is also presented. Markov chain modeling is used to evaluate the reliability of redundant architectures. In order to estimate software quality, several mechanisms to be used in design, specification, and validation and verification (V and V) procedures are suggested. A digital protection system architecture has been analyzed as a case study. (author)

  6. Analysis of the criteria used by the international commission on radiological protection (ICRP) to justify the setting of numerical reference values. Report No. 277

    International Nuclear Information System (INIS)

    Schieber, C.; Schneider, T.; Lochard, J.; Crouail, P.

    2005-05-01

    Following its Publication 60, ICRP has proposed nine reports specifying quantified values for dose constraints, action levels, etc. Some 25 values have been identified in all these publications. Since a few years, ICRP is preparing new recommendations in order to provide 'a more coherent and comprehensible system'. The objective of ICRP is to propose to select among the existing quantified values, a few values that could encompass all the other ones. These values are not intended to replace the currently recommended values which remain valid. In this perspective, IRSN has asked CEPN to make a review of all the values introduced in the ICRP publications in order to obtain a broad view of the rationalities proposed by ICRP in the determination of these values. The following Publications of ICRP have been reviewed: - ICRP 60 - 1990 - 1990 Recommendations of ICRP, - ICRP 62 - 1992 - Radiological protection in biomedical research, - ICRP 63 - 1992 - Principles for intervention for protection of the public in a radiological emergency, - ICRP 64 - 1993 - Protection from potential exposure: a conceptual framework, - ICRP 65 - 1993 - Protection against radon-222 at home and at work, - ICRP 68 - 1994 - Dose coefficients for intakes of radionuclides by workers, - ICRP 75 - 1997 - General principles for the radiation protection of workers, - ICRP 77 - 1997 - Radiological protection policy for the disposal of radioactive waste, - ICRP 81 - 2000 - Radiation protection recommendations as applied to the disposal of long-lived solid radioactive waste, - ICRP 82 - 2000 - Protection of the public in situations of prolonged radiation exposure. The different quantitative values found in these publications are presented in this report, grouped by type of value: individual dose limits, 'maximum' individual dose, dose constraints, exemption, action and intervention levels. The rationalities proposed by ICRP for setting these values are presented, mainly based on the quotation of ICRP

  7. Newborn health benefits or financial risk protection? An ethical analysis of a real-life dilemma in a setting without universal health coverage.

    Science.gov (United States)

    Onarheim, Kristine Husøy; Norheim, Ole Frithjof; Miljeteig, Ingrid

    2018-03-30

    High healthcare costs make illness precarious for both patients and their families' economic situation. Despite the recent focus on the interconnection between health and financial risk at the systemic level, the ethical conflict between concerns for potential health benefits and financial risk protection at the household level in a low-income setting is less understood. Using a seven-step ethical analysis, we examine a real-life dilemma faced by families and health workers at the micro level in Ethiopia and analyse the acceptability of limiting treatment for an ill newborn to protect against financial risk. We assess available evidence and ethical issues at stake and discuss the dilemma with respect to three priority setting criteria: health maximisation, priority to the worse-off and financial risk protection. Giving priority to health maximisation and extra priority to the worse-off suggests, in this particular case, that limiting treatment is not acceptable even if the total well-being gain from reduced financial risk is taken into account. Our conclusion depends on the facts of the case and the relative weight assigned to these criteria. However, there are problematic aspects with the premise of this dilemma. The most affected parties-the newborn, family members and health worker-cannot make free choices about whether to limit treatment or not, and we thereby accept deprivations of people's substantive freedoms. In settings where healthcare is financed largely out-of-pocket, families and health workers face tragic trade-offs. As countries move towards universal health coverage, financial risk protection for high-priority services is necessary to promote fairness, improve health and reduce poverty. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  8. A reference gene set for sex pheromone biosynthesis and degradation genes from the diamondback moth, Plutella xylostella, based on genome and transcriptome digital gene expression analyses.

    Science.gov (United States)

    He, Peng; Zhang, Yun-Fei; Hong, Duan-Yang; Wang, Jun; Wang, Xing-Liang; Zuo, Ling-Hua; Tang, Xian-Fu; Xu, Wei-Ming; He, Ming

    2017-03-01

    Female moths synthesize species-specific sex pheromone components and release them to attract male moths, which depend on precise sex pheromone chemosensory system to locate females. Two types of genes involved in the sex pheromone biosynthesis and degradation pathways play essential roles in this important moth behavior. To understand the function of genes in the sex pheromone pathway, this study investigated the genome-wide and digital gene expression of sex pheromone biosynthesis and degradation genes in various adult tissues in the diamondback moth (DBM), Plutella xylostella, which is a notorious vegetable pest worldwide. A massive transcriptome data (at least 39.04 Gb) was generated by sequencing 6 adult tissues including male antennae, female antennae, heads, legs, abdomen and female pheromone glands from DBM by using Illumina 4000 next-generation sequencing and mapping to a published DBM genome. Bioinformatics analysis yielded a total of 89,332 unigenes among which 87 transcripts were putatively related to seven gene families in the sex pheromone biosynthesis pathway. Among these, seven [two desaturases (DES), three fatty acyl-CoA reductases (FAR) one acetyltransferase (ACT) and one alcohol dehydrogenase (AD)] were mainly expressed in the pheromone glands with likely function in the three essential sex pheromone biosynthesis steps: desaturation, reduction, and esterification. We also identified 210 odorant-degradation related genes (including sex pheromone-degradation related genes) from seven major enzyme groups. Among these genes, 100 genes are new identified and two aldehyde oxidases (AOXs), one aldehyde dehydrogenase (ALDH), five carboxyl/cholinesterases (CCEs), five UDP-glycosyltransferases (UGTs), eight cytochrome P450 (CYP) and three glutathione S-transferases (GSTs) displayed more robust expression in the antennae, and thus are proposed to participate in the degradation of sex pheromone components and plant volatiles. To date, this is the most

  9. A new method for setting guidelines to protect human health from agricultural exposure by using chlorpyrifos as an example

    Directory of Open Access Journals (Sweden)

    Dung Tri Phung

    2015-05-01

    Full Text Available Introduction and objectives. Guidelines set by various agencies for the control and management of chlorpyrifos cover a wide range of values reflecting difficulties in the procedures for their development. To overcome these difficulties a new method to set guidelines would be developed. Published data derived from epidemiological investigations on human populations would be used to develop a dose-response relationship for chlorpyrifos allowing the calculation of threshold values which can be used as guidelines. Materials and Method. Data from the scientific literature on human populations were collected to evaluate the adverse response doses for a range of health effects. The Cumulative Frequency Distribution (CFD for the minimum levels of adverse effects measured in terms of the Lifetime Average Daily Dose (LADD[sub]D[/sub] and the Absorbed Daily Dose for neurological (ADD[sub]DN[/sub] and non-neurological effects were used. Results. Linear regression equations were fitted to the CFD plots giving R 2 values of 0.93 and 0.86 indicating a normal distribution of the data. Using these CFD plots, the chronic and acute threshold values were calculated at the 5% cumulative frequency level for chlorpyrifos exposure giving values at 0.5 µg/kg/d and 3 µg/kg/d respectively. Conclusions. Guidelines set using this technique at the values at 0.5 µg/kg/d and 3 µg/kg/d for chronic and acute exposure respectively provide an alternative to the currently used biological endpoint and safety factor method.

  10. Digital positron annihilation spectrometer

    International Nuclear Information System (INIS)

    Cheng Bin; Weng Huimin; Han Rongdian; Ye Bangjiao

    2010-01-01

    With the high speed development of digital signal process, the technique of the digitization and processing of signals was applied in the domain of a broad class of nuclear technique. The development of digital positron lifetime spectrometer (DPLS) is more promising than the conventional positron lifetime spectrometer equipped with nuclear instrument modules. And digital lifetime spectrometer has many advantages, such as low noise, long term stability, flexible online or offline digital processing, simple setup, low expense, easy to setting, and more physical information. Digital constant fraction discrimination is for timing. And a new method of optimizing energy windows setting for digital positron lifetime spectrometer is also developed employing the simulated annealing for the convenient use. The time resolution is 220ps and the count rate is 200cps. (authors)

  11. Large Data Set Mining

    NARCIS (Netherlands)

    Leemans, I.B.; Broomhall, Susan

    2017-01-01

    Digital emotion research has yet to make history. Until now large data set mining has not been a very active field of research in early modern emotion studies. This is indeed surprising since first, the early modern field has such rich, copyright-free, digitized data sets and second, emotion studies

  12. Legal and ethical standards for protecting women's human rights and the practice of conscientious objection in reproductive healthcare settings.

    Science.gov (United States)

    Zampas, Christina

    2013-12-01

    The practice of conscientious objection by healthcare workers is growing across the globe. It is most common in reproductive healthcare settings because of the religious or moral values placed on beliefs as to when life begins. It is often invoked in the context of abortion and contraceptive services, including the provision of information related to such services. Few states adequately regulate the practice, leading to denial of access to lawful reproductive healthcare services and violations of fundamental human rights. International ethical, health, and human rights standards have recently attempted to address these challenges by harmonizing the practice of conscientious objection with women's right to sexual and reproductive health services. FIGO ethical standards have had an important role in influencing human rights development in this area. They consider regulation of the unfettered use of conscientious objection essential to the realization of sexual and reproductive rights. Under international human rights law, states have a positive obligation to act in this regard. While ethical and human rights standards regarding this issue are growing, they do not yet exhaustively cover all the situations in which women's health and human rights are in jeopardy because of the practice. The present article sets forth existing ethical and human rights standards on the issue and illustrates the need for further development and clarity on balancing these rights and interests. Copyright © 2013 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  13. Latino Adolescents’ Perceived Discrimination in Online and Offline Settings: An Examination of Cultural Risk and Protective Factors

    Science.gov (United States)

    Umaña-Taylor, Adriana J.; Tynes, Brendesha M.; Toomey, Russell B.; Williams, David R.; Mitchell, Kimberly J.

    2015-01-01

    Guided by a risk and resilience framework, the current study examined the associations between Latino adolescents’ (n = 219; Mage 14.35; SD = 1.75) perceptions of ethnic discrimination in multiple settings (e.g., online, school) and several domains of adjustment (e.g., mental health, academic), and tested whether developmentally salient cultural assets (i.e., ethnic identity) directly promoted youth adjustment or moderated the negative impact of discrimination on adjustment. Each of the 3 ethnic identity components (i.e., exploration, resolution, affirmation) demonstrated evidence of promoting positive outcomes among Latino youth; furthermore, there was some evidence that the promotive effects of affirmation and resolution were significantly stronger for older versus younger adolescents. In addition, with the exception of experiences with discrimination from adults outside of the school setting, there was evidence of ethnic identity interacting with each type of discrimination to predict Latino adolescents’ self-esteem, depressive symptoms, and externalizing problems. Findings suggest directions for future research and identify potential targets for intervention that may prove fruitful in programming efforts with Latino adolescents. PMID:25546597

  14. Digital Rights Management

    NARCIS (Netherlands)

    Koster, P.; Jonker, Willem; Blanken, Henk; de Vries, A.P.; Blok, H.E.; Feng, L.

    2007-01-01

    Digital Rights Management, or DRM for short, is a much-discussed topic nowadays. The main reason for this is that DRM technology is often mentioned in the context of protection of digital audio and video content, for example to avoid large scale copying of CDs and DVDs via peer-to-peer networks in

  15. The solution to avoid protection fuses' failure of the driving motor of the turbine-generator set during its startup in Daya Bay Nuclear Power Station

    International Nuclear Information System (INIS)

    Chen Jisheng

    2005-01-01

    Based on a detailed analysis of the inter-relationship in the current, voltage, electromagnetic torque and ratio of the difference between the speed of rotor and the speed of rotary magnetic field to the later in the motor, the root cause was point out, which leads to the protection fuses' failure of the motor in the starting stage, which drives the turbine-generator set to rotate at low speed before its startup. Two solutions to avoid the situation are proposed, too. (authors)

  16. Digital Resource Use and Non‐Use in the Humanities and Social Sciences Academic Settings is Multifaceted. A review of: Harley, Diane. “Why Study Users? An Environmental Scan of Use and Users of Digital Resources in Humanities and Social Sciences Undergraduate Education.” First Monday 12.1 (Jan. 2007. 7 May 2007 .

    Directory of Open Access Journals (Sweden)

    Lotta Haglund

    2007-06-01

    Full Text Available Objective – (1 To map the digital resources available to undergraduate educators in the humanities and the social sciences, (2 to survey faculty about their use of digital resources, and (3 to examine how understanding use and users can benefit the integration of resources into teaching.Design – A mixed‐methods approach, which included a survey, conducting discussion groups, and in‐depth interviews.Setting – Academic institutions in the United States.Subjects – (1 “Various stakeholders”; (2 31 instructors from three institutions, and 4500 full‐time and part‐time faculty and graduate students (at California public research universities, liberal arts colleges and community colleges; and (3 13 digital resource providers and two other stakeholders, and 16 site owners or user researchers.Methods – (1 A literature review, combined with discussions with various stakeholders. (2 Four sessions of discussion groups with 31 instructors from three institutions formed the basis for developing a faculty surveyi nstrument. The survey was distributed both on paper and online. (3 Collection of data on cost and collaborative development strategies, in‐depth interviews with 13 digital resource providers and two other stakeholders, combined with a two day workshop with 16 experts, both on the subject of online educational resources.Main results – (1 Concerning the humanities and social sciences digital resource landscape, the main results of the literature study were the conclusions that the field of online education studies is complicated by a lack of common vocabulary, definitions, and analyses; and that different stakeholder interests and agendas also influence the understanding of how digital resources are used. With the help of discussion groups, an attempt at creating a typology for digital resources available to undergraduates was made, looking at type of resource, origin, and typeo f role of the provider or site owner. From the

  17. The Relative Effectiveness of Digital Game-Based Learning Types in English as a Foreign Language Setting: A Meta-Analysis

    Science.gov (United States)

    Chiu, Yi-hui; Kao, Chian-wen; Reynolds, Barry Lee

    2012-01-01

    During the past 10 years, the number of digital game-based learning (DGBL) studies has significantly increased (Hwang & Wu, 2012). DGBL is generally found to be positive over traditional instruction (Liao, 2010) and it has had great impact on education (Prensky, 2001). The DGBL effectiveness, however, might vary according to subjects taught or…

  18. Photogrammetry and Remote Sensing: New German Standards (din) Setting Quality Requirements of Products Generated by Digital Cameras, Pan-Sharpening and Classification

    Science.gov (United States)

    Reulke, R.; Baltrusch, S.; Brunn, A.; Komp, K.; Kresse, W.; von Schönermark, M.; Spreckels, V.

    2012-08-01

    10 years after the first introduction of a digital airborne mapping camera in the ISPRS conference 2000 in Amsterdam, several digital cameras are now available. They are well established in the market and have replaced the analogue camera. A general improvement in image quality accompanied the digital camera development. The signal-to-noise ratio and the dynamic range are significantly better than with the analogue cameras. In addition, digital cameras can be spectrally and radiometrically calibrated. The use of these cameras required a rethinking in many places though. New data products were introduced. In the recent years, some activities took place that should lead to a better understanding of the cameras and the data produced by these cameras. Several projects, like the projects of the German Society for Photogrammetry, Remote Sensing and Geoinformation (DGPF) or EuroSDR (European Spatial Data Research), were conducted to test and compare the performance of the different cameras. In this paper the current DIN (Deutsches Institut fuer Normung - German Institute for Standardization) standards will be presented. These include the standard for digital cameras, the standard for ortho rectification, the standard for classification, and the standard for pan-sharpening. In addition, standards for the derivation of elevation models, the use of Radar / SAR, and image quality are in preparation. The OGC has indicated its interest in participating that development. The OGC has already published specifications in the field of photogrammetry and remote sensing. One goal of joint future work could be to merge these formerly independent developments and the joint development of a suite of implementation specifications for photogrammetry and remote sensing.

  19. Digital watermarking techniques and trends

    CERN Document Server

    Nematollahi, Mohammad Ali; Rosales, Hamurabi Gamboa

    2017-01-01

    This book presents the state-of-the-arts application of digital watermarking in audio, speech, image, video, 3D mesh graph, text, software, natural language, ontology, network stream, relational database, XML, and hardware IPs. It also presents new and recent algorithms in digital watermarking for copyright protection and discusses future trends in the field. Today, the illegal manipulation of genuine digital objects and products represents a considerable problem in the digital world. Offering an effective solution, digital watermarking can be applied to protect intellectual property, as well as fingerprinting, enhance the security and proof-of-authentication through unsecured channels.

  20. Use of an Intra-Arterial Catheter as a Provisional Conduit for Regulated Outflow Management in the Setting of Artery-Only Digital Replantation.

    Science.gov (United States)

    DeFazio, Michael V; Han, Kevin D; Paryavi, Ebrahim

    2017-12-01

    Successful replantation of distal digital segments necessitates the establishment of sufficient outflow to minimize congestion and progressive tissue necrosis. In cases where only arterial anastomosis is feasible, an artificial outlet must be provided to maintain physiological requirements until microvenous circulation regenerates. This can be accomplished using any number of "exsanguination techniques" designed to facilitate egress through ongoing passive blood loss. Although reportedly effective, these measures are imprecise and carry a substantial risk of infection, scarring, and/or uncontrolled hemorrhage. Herein, we describe a preemptive alternative for provisional venous drainage, whereby direct catheterization of a distal arterial branch is used to enhance the precision of outflow management following artery-only digital replantation. The establishment of intravascular access, using the technique described, permits remote manipulation of the microcirculatory environment through timed administration of heparinized saline and regulated removal of controlled volumes of blood.

  1. A reference gene set for sex pheromone biosynthesis and degradation genes from the diamondback moth, Plutella xylostella, based on genome and transcriptome digital gene expression analyses

    OpenAIRE

    He, Peng; Zhang, Yun-Fei; Hong, Duan-Yang; Wang, Jun; Wang, Xing-Liang; Zuo, Ling-Hua; Tang, Xian-Fu; Xu, Wei-Ming; He, Ming

    2017-01-01

    Background Female moths synthesize species-specific sex pheromone components and release them to attract male moths, which depend on precise sex pheromone chemosensory system to locate females. Two types of genes involved in the sex pheromone biosynthesis and degradation pathways play essential roles in this important moth behavior. To understand the function of genes in the sex pheromone pathway, this study investigated the genome-wide and digital gene expression of sex pheromone biosynthesi...

  2. The contribution of audio recording using portable digital voice recorders to the development of reflective practice with trainee teachers in a Further Education setting

    OpenAIRE

    Knill, Marta; Samuels, Mary

    2011-01-01

    Developing reflective skills and habits during initial teacher education and progressing to deeper and more critical reflection are challenges for trainee teachers. This small-scale action research study investigates how two structured tasks using Digital Voice Recorders (DVRs) initiated, sustained and improved reflection and reflective practice. Trainee teachers reported benefits in increased understanding of reflection, development of reflective skills, deepening of reflection and improveme...

  3. Digital radiographic complexes for traumatological department

    International Nuclear Information System (INIS)

    Sudakevich, Y.; Kovalenko, V.; Miroshnichenko, S.; Balashov, S.; Nevgasimy, A.

    2013-01-01

    The paper deals with a budget digital X-ray equipment in operating trauma unit. The proposed set of equipment lets receive X-ray images of required quality at a significantly reduced requirements for radiation protection in the operating room, and to protect the personnel. We consider two variants of the equipment: for operating rooms in the traumatological department in the central district hospitals on the basis of portable X-ray unit and pediatric trauma unit on the basis of micro focus X-ray generator. (authors)

  4. Pengembangan Sistem Proteksi Digital Arus Lebih Berbasis Logika Fuzzy sebagai Pengaman PLTMH

    Directory of Open Access Journals (Sweden)

    Cahayahati

    2013-09-01

    Full Text Available In this paper discussed digital overcurrent protection system fuzzy logic on plant systems or Micro Hydro Power Plants with fuzzy logic approach to the identification of the signal changes due to interference overcurrent short circuit the lifeboat station on the system. A digital overcurrent protection with a fuzzy logic-based method and the rules set if-then, fuzzification and defazzification which has 2 inputs are crisp and delta error and error the actual fault current has a crisp output 1 to input changes in current to drive the relay breaker. This system consists of a hardware system with microcontroller (mc ATMega8535 and other series as well as software that helps in the protection process performance Delpi 7 computer using fuzzy logic and program using C language and dicompel with CodeVisionAVR software and uploaded to the microcontroller using ponyprog2000 ATMega8535. The success of a prototype digital overcurrent protection system was tested on a fuzzy logic system voltage of 220 volts with a simple system technique burdened beyond any current settings and calculated over a given working time protection relay. After testing and calculations, then the inverse Characteristics of digital protection between the current disruption to the working time protection can be envisaged that a larger fault current less time working to secure protection from interference generating systems.

  5. Aerial Photography and Imagery, Ortho-Corrected, This data set includes georectified, 4 -band digital orthophotos for 213.7 square miles of the Blackwater National Wildlife Refuge and Fishing Bay WMA in Dorchester County, MD., Published in 2010, 1:2400 (1in=200ft) scale, Eastern Shore Regional GIS Cooperative.

    Data.gov (United States)

    NSGIC Regional | GIS Inventory — Aerial Photography and Imagery, Ortho-Corrected dataset current as of 2010. This data set includes georectified, 4 -band digital orthophotos for 213.7 square miles...

  6. Aerial Photography and Imagery, Ortho-Corrected, Digital Orthophotographs are orthorectified aerial photographs. In this data set all of Johnson County Kansas was flown in color at an altitude of 4800' AMT and orthorectified with a resolution of 0.5 feet (1"=800'). Areas of Lake Quivira and Spring Hil, Published in 2006, Johnson County Government.

    Data.gov (United States)

    NSGIC Local Govt | GIS Inventory — Aerial Photography and Imagery, Ortho-Corrected dataset current as of 2006. Digital Orthophotographs are orthorectified aerial photographs. In this data set all of...

  7. The contribution of audio recording using portable digital voice recorders to the development of reflective practice with trainee teachers in a Further Education setting

    Directory of Open Access Journals (Sweden)

    Knill, Marta

    2011-06-01

    Full Text Available Developing reflective skills and habits during initial teacher education and progressing to deeper and more critical reflection are challenges for trainee teachers. This small-scale action research study investigates how two structured tasks using Digital Voice Recorders (DVRs initiated, sustained and improved reflection and reflective practice. Trainee teachers reported benefits in increased understanding of reflection, development of reflective skills, deepening of reflection and improvements in practice through joint reflection with Teacher Educators on specific aspects of teaching and learning. The structuring of the tasks with prompts and dialogue clearly contributed to the positive outcomes. The study suggests that use of the small, convenient and relatively low cost DVR technology has a place in learning to reflect.

  8. Digital Components in Swedish NPP Power Systems

    International Nuclear Information System (INIS)

    Karlsson, Mattias; Eriksson, Tage

    2015-01-01

    Swedish nuclear power plants have over the last 20 years of operation modernised or exchanged several systems and components of the electrical power system. Within these works, new components based on digital technology have been employed in order to realize functionality that was previously achieved by using electro-mechanical or analogue technology. Components and systems such as relay protection, rectifiers, inverters, variable speed drives and diesel-generator sets are today equipped with digital components. Several of the systems and components fulfil functions with a safety-role in the NPP. Recently, however, a number of incidents have occurred which highlight deficiencies in the design or HMI of the equipment, which warrants questions whether there are generic problems with some applications of digital components that needs to be addressed. The use of digital components has presented cost effective solutions, or even the only available solution on the market enabling a modernisation. The vast majority of systems using digital components have been operating without problems and often contribute to improved safety but the challenge of non-detectable, or non-identifiable, failure modes remain. In this paper, the extent to which digital components are used in Swedish NPP power systems will be presented including a description of typical applications. Based on data from maintenance records and fault reports, as well as interviews with designers and maintenance personnel, the main areas where problems have been encountered and where possible risks have been identified will be described. The paper intends to investigate any 'tell-tales' that could give signals of unwanted behaviour. Furthermore, particular benefits experienced by using digital components will be highlighted. The paper will also discuss the safety relevance of these findings and suggest measures to improve safety in the application of digital components in power systems. (authors)

  9. Health protection of health care workers from the prospective of ethics, science and good medical practice. Opinions from stakeholders in health care settings.

    Science.gov (United States)

    Porru, S; Cannatelli, P; Cerioli, Beloyanna; Flor, L; Gramegna, Maria; Polato, R; Rodriguez, D

    2012-01-01

    Fitness for work (FFW) in health care workers poses multidisciplinary challenges because of management problems scientific and ethical implications and the implementation of preventive interventions in health care settings. All the relevant stakeholders, including the General Manager, Medical Director, worker's representative, the person responsible for prevention and protection, forensic medicine expert, the person responsible for prevention and health safety at public administration level, commented on: danger to third parties; FFW formulation; human resource management; stress; professional independence; role of the person responsible for prevention and protection and of the person responsible for prevention at public administration level; professional responsibilities. Opinions are reported regarding the main problems related to the role of the Occupational Physician in FFW formulation, such as the difficult balance between autonomy and independence, limited turnover and aging of workforce, need of confidentiality and respect for professional status of the HCW prevalence of susceptibility conditions, rights and duties of stakeholders. The most significant result was the request by the Lombardy Region for more quality in risk assessment and health surveillance; to maintain uniform conduct over all the local health authorities, to allow the board in charge of examining appeals against FFW to fully cooperate with the occupational physician; due attention to the person/worker; the opportunity to convene referral boards for complex FFW management; the challenge of stress management and the need for an observatory for psychological discomforts; the importance of the ICOH Code of Ethics and avoidance of conflicts of interests; the need for individual risk assessment and risk management; the concept of sharing responsibilities and of a real multidisciplinary approach.

  10. The Data Big Bang and the Expanding Digital Universe: High-Dimensional, Complex and Massive Data Sets in an Inflationary Epoch

    Directory of Open Access Journals (Sweden)

    Meyer Z. Pesenson

    2010-01-01

    Full Text Available Recent and forthcoming advances in instrumentation, and giant new surveys, are creating astronomical data sets that are not amenable to the methods of analysis familiar to astronomers. Traditional methods are often inadequate not merely because of the size in bytes of the data sets, but also because of the complexity of modern data sets. Mathematical limitations of familiar algorithms and techniques in dealing with such data sets create a critical need for new paradigms for the representation, analysis and scientific visualization (as opposed to illustrative visualization of heterogeneous, multiresolution data across application domains. Some of the problems presented by the new data sets have been addressed by other disciplines such as applied mathematics, statistics and machine learning and have been utilized by other sciences such as space-based geosciences. Unfortunately, valuable results pertaining to these problems are mostly to be found in publications outside of astronomy. Here we offer brief overviews of a number of concepts, techniques and developments that are vital to the analysis and visualization of complex datasets and images. One of the goals of this paper is to help bridge the gap between applied mathematics and artificial intelligence on the one side and astronomy on the other.

  11. Introduction to digital communication systems

    CERN Document Server

    Wesolowski, Krzysztof

    2009-01-01

    Combining theoretical knowledge and practical applications, this advanced-level textbook covers the most important aspects of contemporary digital communication systems. Introduction to Digital Communication Systems focuses on the rules of functioning digital communication system blocks, starting with the performance limits set by the information theory. Drawing on information relating to turbo codes and LDPC codes, the text presents the basic methods of error correction and detection, followed by baseband transmission methods, and single- and multi-carrier digital modulations. The basi

  12. Research on Methodology to Prioritize Critical Digital Assets based on Nuclear Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Wonjik; Kwon, Kookheui; Kim, Hyundoo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-10-15

    Digital systems are used in nuclear facilities to monitor and control various types of field devices, as well as to obtain and store vital information. Therefore, it is getting important for nuclear facilities to protect digital systems from cyber-attack in terms of safety operation and public health since cyber compromise of these systems could lead to unacceptable radiological consequences. Based on KINAC/RS-015 which is a cyber security regulatory standard, regulatory activities for cyber security at nuclear facilities generally focus on critical digital assets (CDAs) which are safety, security, and emergency preparedness related digital assets. Critical digital assets are estimated over 60% among all digital assets in a nuclear power plant. Therefore, it was required to prioritize critical digital assets to improve efficiency of regulation and implementation. In this paper, the research status on methodology development to prioritize critical digital assets based on nuclear risk assessment will be introduced. In this paper, to derive digital asset directly affect accident, PRA results (ET, FT, and minimal cut set) are analyzed. According to result of analysis, digital systems related to CD are derived ESF-CCS (safety-related component control system) and Process-CCS (non-safety-related component control system) as well as Engineered Safety Features Actuation System (ESFAS). These digital assets can be identified Vital Digital Asset (VDA). Hereafter, to develop general methodology which was identified VDA related to accident among CDAs, (1) method using result of minimal cut set in PRA model will be studied and (2) method quantifying result of Digital I and C PRA which is performed to reflect all digital cabinet related to system in FT will be studied.

  13. Research on Methodology to Prioritize Critical Digital Assets based on Nuclear Risk Assessment

    International Nuclear Information System (INIS)

    Kim, Wonjik; Kwon, Kookheui; Kim, Hyundoo

    2016-01-01

    Digital systems are used in nuclear facilities to monitor and control various types of field devices, as well as to obtain and store vital information. Therefore, it is getting important for nuclear facilities to protect digital systems from cyber-attack in terms of safety operation and public health since cyber compromise of these systems could lead to unacceptable radiological consequences. Based on KINAC/RS-015 which is a cyber security regulatory standard, regulatory activities for cyber security at nuclear facilities generally focus on critical digital assets (CDAs) which are safety, security, and emergency preparedness related digital assets. Critical digital assets are estimated over 60% among all digital assets in a nuclear power plant. Therefore, it was required to prioritize critical digital assets to improve efficiency of regulation and implementation. In this paper, the research status on methodology development to prioritize critical digital assets based on nuclear risk assessment will be introduced. In this paper, to derive digital asset directly affect accident, PRA results (ET, FT, and minimal cut set) are analyzed. According to result of analysis, digital systems related to CD are derived ESF-CCS (safety-related component control system) and Process-CCS (non-safety-related component control system) as well as Engineered Safety Features Actuation System (ESFAS). These digital assets can be identified Vital Digital Asset (VDA). Hereafter, to develop general methodology which was identified VDA related to accident among CDAs, (1) method using result of minimal cut set in PRA model will be studied and (2) method quantifying result of Digital I and C PRA which is performed to reflect all digital cabinet related to system in FT will be studied

  14. Protecting Healthcare Personnel in Outpatient Settings: The Influence of Mandatory Versus Nonmandatory Influenza Vaccination Policies on Workplace Absenteeism During Multiple Respiratory Virus Seasons.

    Science.gov (United States)

    Frederick, John; Brown, Alexandria C; Cummings, Derek A; Gaydos, Charlotte A; Gibert, Cynthia L; Gorse, Geoffrey J; Los, Jenna G; Nyquist, Ann-Christine; Perl, Trish M; Price, Connie S; Radonovich, Lewis J; Reich, Nicholas G; Rodriguez-Barradas, Maria C; Bessesen, Mary T; Simberkoff, Michael S

    2018-04-01

    OBJECTIVE To determine the effect of mandatory and nonmandatory influenza vaccination policies on vaccination rates and symptomatic absenteeism among healthcare personnel (HCP). DESIGN Retrospective observational cohort study. SETTING This study took place at 3 university medical centers with mandatory influenza vaccination policies and 4 Veterans Affairs (VA) healthcare systems with nonmandatory influenza vaccination policies. PARTICIPANTS The study included 2,304 outpatient HCP at mandatory vaccination sites and 1,759 outpatient HCP at nonmandatory vaccination sites. METHODS To determine the incidence and duration of absenteeism in outpatient settings, HCP participating in the Respiratory Protection Effectiveness Clinical Trial at both mandatory and nonmandatory vaccination sites over 3 viral respiratory illness (VRI) seasons (2012-2015) reported their influenza vaccination status and symptomatic days absent from work weekly throughout a 12-week period during the peak VRI season each year. The adjusted effects of vaccination and other modulating factors on absenteeism rates were estimated using multivariable regression models. RESULTS The proportion of participants who received influenza vaccination was lower each year at nonmandatory than at mandatory vaccination sites (odds ratio [OR], 0.09; 95% confidence interval [CI], 0.07-0.11). Among HCP who reported at least 1 sick day, vaccinated HCP had lower symptomatic days absent compared to unvaccinated HCP (OR for 2012-2013 and 2013-2014, 0.82; 95% CI, 0.72-0.93; OR for 2014-2015, 0.81; 95% CI, 0.69-0.95). CONCLUSIONS These data suggest that mandatory HCP influenza vaccination policies increase influenza vaccination rates and that HCP symptomatic absenteeism diminishes as rates of influenza vaccination increase. These findings should be considered in formulating HCP influenza vaccination policies. Infect Control Hosp Epidemiol 2018;39:452-461.

  15. Development and application of a set of mesh-based and age-dependent Chinese family phantoms for radiation protection dosimetry: Preliminary Data for external photon beams

    Science.gov (United States)

    Pi, Yifei; Zhang, Lian; Huo, Wanli; Feng, Mang; Chen, Zhi; Xu, X. George

    2017-09-01

    A group of mesh-based and age-dependent family phantoms for Chinese populations were developed in this study. We implemented a method for deforming original RPI-AM and RPI-AF models into phantoms of different ages: 5, 10 ,15 and adult. More than 120 organs for each model were processed to match with the values of the Chinese reference parameters within 0.5%. All of these phantoms were then converted to voxel format for Monte Carlo simulations. Dose coefficients for adult models were counted to compare with those of RPI-AM and RPI-AF. The results show that there are significant differences between absorbed doses of RPI phantoms and these of our adult phantoms at low energies. Comparisons for the dose coefficients among different ages and genders were also made. it was found that teenagers receive more radiation doses than adults under the same irradiation condition. This set of phantoms can be utilized to estimate dosimetry for Chinese population for radiation protection, medical imaging, and radiotherapy.

  16. FIFI 3: A digital computer code for the solution of sets of first order differential equations and the analysis of process plant dynamics

    International Nuclear Information System (INIS)

    Sumner, H.M.

    1965-11-01

    FIFI 3 is a FORTRAN Code embodying a technique for the analysis of process plant dynamics. As such, it is essentially a tool for the integration of sets of first order ordinary differential equations, either linear or non-linear; special provision is made for the inclusion of time-delayed variables in the mathematical model of the plant. The method of integration is new and is centred on a stable multistep predictor-corrector algorithm devised by the late Mr. F.G. Chapman, of the UKAEA, Winfrith. The theory on which the Code is based and detailed rules for using it are described in Parts I and II respectively. (author)

  17. On the simulation of transients and accidents in PWRs with digital instrumentation and control using an LQR digital controller

    International Nuclear Information System (INIS)

    Alvarenga, M.A.B.; Melo, P.F. Frutuoso e; Medeiros, J.A.C.C.; Oliva, J.J. Rivero

    2015-01-01

    New nuclear power plant designs are including integrated I and C digital systems for protection, control, alarming and monitoring. Existing operating nuclear power plants, as is the case of Angra 1 nuclear power plant, have to consider the replacement of their I and C analog systems by digital systems for retrofitting their facilities. However, before replacing the analog control loops by digital ones it is necessary to design and evaluate their performance, which requires modeling of the plant and its control system with extensive simulations under several normal and abnormal operation conditions. This paper discusses the use of a linear quadratic regulator (LQR) digital controller for evaluating the plant stability behavior before the actuation of the reactor protection system. The objective is to evaluate the effect of digital controllers on plant behavior for several transients and accident conditions. For this purpose, a numerical model was developed and implemented as a MatlabTM tool. This paper discusses an adequate framework in order to simulate a set of transients and accidents that constitute the design basis in the final safety analysis report of PWR power plants to evaluate the performance of digital controllers such as LQR regulators.(author)

  18. Digital radiography

    International Nuclear Information System (INIS)

    Brody, W.R.

    1984-01-01

    Digital Radiography begins with an orderly introduction to the fundamental concepts of digital imaging. The entire X-ray digital imagining system is described, from an overall characterization of image quality to specific components required for a digital radiographic system. Because subtraction is central to digital radiographic systems, the author details the use of various subtraction methods for image enhancement. Complex concepts are illustrated with numerous examples and presented in terms that can readily be understood by physicians without an advanced mathematics background. The second part of the book discusses implementations and applications of digital imagining systems based on area and scanned detector technologies. This section includes thorough coverage of digital fluoroscopy, scanned projection radiography, and film-based digital imaging systems, and features a state-of-the-art synopsis of the applications of digital subtraction angiography. The book concludes with a timely assessment of anticipated technological advances

  19. The Court of Justice and The Data Retention Directive in Digital Rights Ireland: Telling Off The EU Legislator and Teaching a Lesson in Privacy and Data Protection

    NARCIS (Netherlands)

    Granger, M.-P.; Irion, K.

    2014-01-01

    In Digital Rights Ireland, the Court of Justice invalidated the 2006 Data Retention Directive, which required private providers to retain for a considerable period electronic communication metadata for law enforcement purposes. In this landmark ruling, the EU judiciary introduced a strict scrutiny

  20. Focus stacking: Comparing commercial top-end set-ups with a semi-automatic low budget approach. A possible solution for mass digitization of type specimens.

    Science.gov (United States)

    Brecko, Jonathan; Mathys, Aurore; Dekoninck, Wouter; Leponce, Maurice; VandenSpiegel, Didier; Semal, Patrick

    2014-01-01

    In this manuscript we present a focus stacking system, composed of commercial photographic equipment. The system is inexpensive compared to high-end commercial focus stacking solutions. We tested this system and compared the results with several different software packages (CombineZP, Auto-Montage, Helicon Focus and Zerene Stacker). We tested our final stacked picture with a picture obtained from two high-end focus stacking solutions: a Leica MZ16A with DFC500 and a Leica Z6APO with DFC290. Zerene Stacker and Helicon Focus both provided satisfactory results. However, Zerene Stacker gives the user more possibilities in terms of control of the software, batch processing and retouching. The outcome of the test on high-end solutions demonstrates that our approach performs better in several ways. The resolution of the tested extended focus pictures is much higher than those from the Leica systems. The flash lighting inside the Ikea closet creates an evenly illuminated picture, without struggling with filters, diffusers, etc. The largest benefit is the price of the set-up which is approximately € 3,000, which is 8 and 10 times less than the LeicaZ6APO and LeicaMZ16A set-up respectively. Overall, this enables institutions to purchase multiple solutions or to start digitising the type collection on a large scale even with a small budget.

  1. Focus stacking: Comparing commercial top-end set-ups with a semi-automatic low budget approach. A possible solution for mass digitization of type specimens

    Directory of Open Access Journals (Sweden)

    Jonathan Brecko

    2014-12-01

    Full Text Available In this manuscript we present a focus stacking system, composed of commercial photographic equipment. The system is inexpensive compared to high-end commercial focus stacking solutions. We tested this system and compared the results with several different software packages (CombineZP, Auto-Montage, Helicon Focus and Zerene Stacker. We tested our final stacked picture with a picture obtained from two high-end focus stacking solutions: a Leica MZ16A with DFC500 and a Leica Z6APO with DFC290. Zerene Stacker and Helicon Focus both provided satisfactory results. However, Zerene Stacker gives the user more possibilities in terms of control of the software, batch processing and retouching. The outcome of the test on high-end solutions demonstrates that our approach performs better in several ways. The resolution of the tested extended focus pictures is much higher than those from the Leica systems. The flash lighting inside the Ikea closet creates an evenly illuminated picture, without struggling with filters, diffusers, etc. The largest benefit is the price of the set-up which is approximately € 3,000, which is 8 and 10 times less than the LeicaZ6APO and LeicaMZ16A set-up respectively. Overall, this enables institutions to purchase multiple solutions or to start digitising the type collection on a large scale even with a small budget.

  2. Digital Technology Entrepreneurship

    DEFF Research Database (Denmark)

    Giones, Ferran; Brem, Alexander

    2017-01-01

    Technology entrepreneurship is an established concept in academia. However, recent developments in the context of digital entrepreneurship call for revision and advance- ment. The multiple possible combinations of technology and entrepreneurship have res- ulted in a diversity of phenomena...... with significantly different characteristics and socio-economic impact. This article is focused on the identification and description of technology entrepreneurship in times of digitization. Based on current examples, we identify and describe characterizations of technology entrepreneurship, digital techno- logy...... entrepreneurship, and digital entrepreneurship. With this new delineation of terms, we would like to foster discussion between researchers, entrepreneurs, and policy makers on the impact of digitization on entrepreneurship, and set a future research agenda....

  3. Digital Culture and Digital Library

    Directory of Open Access Journals (Sweden)

    Yalçın Yalçınkaya

    2016-12-01

    Full Text Available In this study; digital culture and digital library which have a vital connection with each other are examined together. The content of the research consists of the interaction of culture, information, digital culture, intellectual technologies, and digital library concepts. The study is an entry work to integrity of digital culture and digital library theories and aims to expand the symmetry. The purpose of the study is to emphasize the relation between the digital culture and digital library theories acting intersection of the subjects that are examined. Also the perspective of the study is based on examining the literature and analytical evaluation in both studies (digital culture and digital library. Within this context, the methodology of the study is essentially descriptive and has an attribute for the transmission and synthesis of distributed findings produced in the field of the research. According to the findings of the study results, digital culture is an inclusive term that describes the effects of intellectual technologies in the field of information and communication. Information becomes energy and the spectrum of the information is expanding in the vertical rise through the digital culture. In this context, the digital library appears as a new living space of a new environment. In essence, the digital library is information-oriented; has intellectual technology support and digital platform; is in a digital format; combines information resources and tools in relationship/communication/cooperation by connectedness, and also it is the dynamic face of the digital culture in time and space independence. Resolved with the study is that the digital libraries are active and effective in the formation of global knowing and/or mass wisdom in the process of digital culture.

  4. Cost Model for Digital Curation: Cost of Digital Migration

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad; Nielsen, Anders Bo; Thirifays, Alex

    2009-01-01

    The Danish Ministry of Culture is currently funding a project to set up a model for costing preservation of digital materials held by national cultural heritage institutions. The overall objective of the project is to provide a basis for comparing and estimating future financial requirements...... for digital preservation and to increase cost effectiveness of digital preservation activities. In this study we describe an activity based costing methodology for digital preservation based on the OAIS Reference Model. In order to estimate the cost of digital migrations we have identified cost critical...

  5. Digital watermarks in electronic document circulation

    Directory of Open Access Journals (Sweden)

    Vitaliy Grigorievich Ivanenko

    2017-07-01

    Full Text Available This paper reviews different protection methods for electronic documents, their good and bad qualities. Common attacks on electronic documents are analyzed. Digital signature and ways of eliminating its flaws are studied. Different digital watermark embedding methods are described, they are divided into 2 types. The solution to protection of electronic documents is based on embedding digital watermarks. Comparative analysis of this methods is given. As a result, the most convenient method is suggested – reversible data hiding. It’s remarked that this technique excels at securing the integrity of the container and its digital watermark. Digital watermark embedding system should prevent illegal access to the digital watermark and its container. Digital watermark requirements for electronic document protection are produced. Legal aspect of copyright protection is reviewed. Advantages of embedding digital watermarks in electronic documents are produced. Modern reversible data hiding techniques are studied. Distinctive features of digital watermark use in Russia are highlighted. Digital watermark serves as an additional layer of defense, that is in most cases unknown to the violator. With an embedded digital watermark, it’s impossible to misappropriate the authorship of the document, even if the intruder signs his name on it. Therefore, digital watermarks can act as an effective additional tool to protect electronic documents.

  6. Digital mammography; Mamografia digital

    Energy Technology Data Exchange (ETDEWEB)

    Chevalier, M.; Torres, R.

    2010-07-01

    Mammography represents one of the most demanding radiographic applications, simultaneously requiring excellent contrast sensitivity, high spatial resolution, and wide dynamic range. Film/screen is the most widely extended image receptor in mammography due to both its high spatial resolution and contrast. The film/screen limitations are related with its narrow latitude, structural noise and that is at the same time the medium for the image acquisition, storage and presentation. Several digital detector made with different technologies can overcome these difficulties. Here, these technologies as well as their main advantages and disadvantages are analyzed. Also it is discussed its impact on the mammography examinations, mainly on the breast screening programs. (Author).

  7. Measuring set: Reactor Power Meter (type of SG-8), Reactor Energy Meter (type of SG-11) and Digital Dose Meter (type of SG-9) for reactor rigs operation. Zestaw pomiarowy: miernik mocy reaktora (typ SG-8), miernik energii reaktora (typ SG-11) oraz cyfrowy miernik dawki (typ SG-9) dla potrzeb eksploatacji sond reaktorowych

    Energy Technology Data Exchange (ETDEWEB)

    Glowacki, S W

    1982-01-01

    A measuring set consisting of the Reactor Power Meter, Reactor Energy Meter and Digital Dose Meter is described. The gamma radiation of water in the reactor primary cooling circuit reaches the ionisation chamber and involves the output current, driving the Reactor Power Meter and Reactor Energy Meter. The Digital Dose Meter is controlled by the output current of the self-powered detector mounted inside the reactor rig.

  8. Digital Tectonics

    DEFF Research Database (Denmark)

    Christiansen, Karl; Borup, Ruben; Søndergaard, Asbjørn

    2014-01-01

    Digital Tectonics treats the architectonical possibilities in digital generation of form and production. The publication is the first volume of a series, in which aspects of the strategic focus areas of the Aarhus School of Architecture will be disseminated.......Digital Tectonics treats the architectonical possibilities in digital generation of form and production. The publication is the first volume of a series, in which aspects of the strategic focus areas of the Aarhus School of Architecture will be disseminated....

  9. Digital skrivedidaktik

    DEFF Research Database (Denmark)

    Digital skrivedidaktik består af to dele. Første del præsenterer teori om skrivekompetence og digital skrivning. Digital skrivning er karakteriseret ved at tekster skrives på computer og med digitale værktøjer, hvilket ændrer skrivningens traditionelle praksis, produkt og processer. Hvad er digital...... om elevens skriveproces) og Blogskrivning (der styrker eleverne i at bruge blogs i undervisningen)....

  10. IT Security in the Age of Digitalization – Toward an Understanding of Risk Perceptions and Protective Behaviors of Private Individuals and Managers in Organizations

    OpenAIRE

    Sonnenschein, Katja Rabea

    2018-01-01

    Nowadays, information technology (IT) has become an integral part of our everyday life. In both the private and business context, we extensively use different IT systems for data production, data organization, data analysis, and communication with others. Due to the extensive usage of IT, the amount of digitalized personal and organizational information is rapidly and incessantly rising — making both private individuals and organizations attractive targets for attackers. The necessity to effe...

  11. Digital Citizenship

    Science.gov (United States)

    Isman, Aytekin; Canan Gungoren, Ozlem

    2014-01-01

    Era in which we live is known and referred as digital age.In this age technology is rapidly changed and developed. In light of these technological advances in 21st century, schools have the responsibility of training "digital citizen" as well as a good citizen. Digital citizens must have extensive skills, knowledge, Internet and …

  12. An enhanced feature set for pattern recognition based contrast enhancement of contact-less captured latent fingerprints in digitized crime scene forensics

    Science.gov (United States)

    Hildebrandt, Mario; Kiltz, Stefan; Dittmann, Jana; Vielhauer, Claus

    2014-02-01

    In crime scene forensics latent fingerprints are found on various substrates. Nowadays primarily physical or chemical preprocessing techniques are applied for enhancing the visibility of the fingerprint trace. In order to avoid altering the trace it has been shown that contact-less sensors offer a non-destructive acquisition approach. Here, the exploitation of fingerprint or substrate properties and the utilization of signal processing techniques are an essential requirement to enhance the fingerprint visibility. However, especially the optimal sensory is often substrate-dependent. An enhanced generic pattern recognition based contrast enhancement approach for scans of a chromatic white light sensor is introduced in Hildebrandt et al.1 using statistical, structural and Benford's law2 features for blocks of 50 micron. This approach achieves very good results for latent fingerprints on cooperative, non-textured, smooth substrates. However, on textured and structured substrates the error rates are very high and the approach thus unsuitable for forensic use cases. We propose the extension of the feature set with semantic features derived from known Gabor filter based exemplar fingerprint enhancement techniques by suggesting an Epsilon-neighborhood of each block in order to achieve an improved accuracy (called fingerprint ridge orientation semantics). Furthermore, we use rotation invariant Hu moments as an extension of the structural features and two additional preprocessing methods (separate X- and Y Sobel operators). This results in a 408-dimensional feature space. In our experiments we investigate and report the recognition accuracy for eight substrates, each with ten latent fingerprints: white furniture surface, veneered plywood, brushed stainless steel, aluminum foil, "Golden-Oak" veneer, non-metallic matte car body finish, metallic car body finish and blued metal. In comparison to Hildebrandt et al.,1 our evaluation shows a significant reduction of the error rates

  13. Nuclear safety and (cyber)security at the heart of the digital revolution

    International Nuclear Information System (INIS)

    Kueny, L.; Levesque, J.

    2017-01-01

    The on-going digital revolution implies the sharing of data beyond the company walls, the development of connected objects and the setting of more and more complex digital networks. All of this increases the risk of being attacked by cyber-criminal and the probability is all the higher because new kinds of cyber-attacks appear every year. Originally nuclear industry has a culture of safety and has implemented numerous mechanisms of physical protection that slow down cyber-attacks. The humane factor is very often an important point for the success of a cyber-attack but the automation of repetitive tasks can reduce this risk. A cyber-attack can stay undetected if regularly overhauls of computer systems are not performed or if they are not adequately monitored. The reliability of digital tools for instance digital archives is a point that hinders the implementation of a total digital certification in the nuclear industry. (A.C.)

  14. Digital subtraktion

    DEFF Research Database (Denmark)

    Mussmann, Bo Redder

    2004-01-01

    Digital subtraktion er en metode til at fjerne uønskede oplysninger i et røntgenbillede. Subtraktionsteknikken bruges primært i forbindelse med angiografi hvor man kun er interesseret i at se selve karret. Derfor er digital subtraktion i daglig tale synonymt med DSA eller DVI – hhv. Digital...... Subtraction Angiography eller Digital Vascular Imaging. Benævnelserne er to røntgenfirmaers navn for den samme teknik. Digital subtraktion kræver speciel software, samt at apparaturet kan eksponere i serier....

  15. Digital preservation

    CERN Document Server

    Deegan, Marilyn

    2013-01-01

    Digital preservation is an issue of huge importance to the library and information profession right now. With the widescale adoption of the internet and the rise of the world wide web, the world has been overwhelmed by digital information. Digital data is being produced on a massive scale by individuals and institutions: some of it is born, lives and dies only in digital form, and it is the potential death of this data, with its impact on the preservation of culture, that is the concern of this book. So how can information professionals try to remedy this? Digital preservation is a complex iss

  16. Digital Elevation Model (DEM) 24K

    Data.gov (United States)

    Kansas Data Access and Support Center — Digital Elevation Model (DEM) is the terminology adopted by the USGS to describe terrain elevation data sets in a digital raster form. The standard DEM consists of a...

  17. Digital Natives or Digital Tribes?

    Science.gov (United States)

    Watson, Ian Robert

    2013-01-01

    This research builds upon the discourse surrounding digital natives. A literature review into the digital native phenomena was undertaken and found that researchers are beginning to identify the digital native as not one cohesive group but of individuals influenced by other factors. Primary research by means of questionnaire survey of technologies…

  18. Digital mammography

    International Nuclear Information System (INIS)

    Bick, Ulrich; Diekmann, Felix

    2010-01-01

    This state-of-the-art reference book provides in-depth coverage of all aspects of digital mammography, including detector technology, image processing, computer-aided diagnosis, soft-copy reading, digital workflow, and PACS. Specific advantages and disadvantages of digital mammography in comparison to screen-film mammography are thoroughly discussed. By including authors from both North America and Europe, the book is able to outline variations in the use, acceptance, and quality assurance of digital mammography between the different countries and screening programs. Advanced imaging techniques and future developments such as contrast mammography and digital breast tomosynthesis are also covered in detail. All of the chapters are written by internationally recognized experts and contain numerous high-quality illustrations. This book will be of great interest both to clinicians who already use or are transitioning to digital mammography and to basic scientists working in the field. (orig.)

  19. Digital Insights

    DEFF Research Database (Denmark)

    Knudsen, Gry Høngsmark

    , by incorporating media as both channel, frame, and apparatus for advertising response, the dissertation brings into attention that more aspects than the text-reader relationship influence ad response. Finally, the dissertation proposes the assemblage approach for exploring big data in consumer culture research...... and practices with digital media, when they meet and interpret advertising. Through studies of advertising response on YouTube and experiments with consumers’ response to digitally manipulated images, the dissertation shows how digital media practices facilitate polysemic and socially embedded advertising......This dissertation forwards the theory of digital consumer-response as a perspective to examine how digital media practices influence consumers’ response to advertising. Digital consumer-response is a development of advertising theory that encompasses how consumers employ their knowledge...

  20. Digital Signage

    OpenAIRE

    Fischer, Karl Peter

    2011-01-01

    Digital Signage for in-store advertising at gas stations/retail stores in Germany: A field study Digital Signage networks provide a novel means of advertising with the advantage of easily changeable and highly customizable animated content. Despite the potential and increasing use of these media empirical research is scarce. In a field study at 8 gas stations (with integrated convenience stores) we studied the effect of digital signage advertising on sales for different products and servi...

  1. Sports Digitalization

    DEFF Research Database (Denmark)

    Xiao, Xiao; Hedman, Jonas; Tan, Felix Ter Chian

    2017-01-01

    evolution, as digital technologies are increasingly entrenched in a wide range of sporting activities and for applications beyond mere performance enhancement. Despite such trends, research on sports digitalization in the IS discipline is surprisingly still nascent. This paper aims at establishing...... a discourse on sports digitalization within the discipline. Toward this, we first provide an understanding of the institutional characteristics of the sports industry, establishing its theoretical importance and relevance in our discipline; second, we reveal the latest trends of digitalization in the sports...

  2. Digital printing

    Science.gov (United States)

    Sobotka, Werner K.

    1997-02-01

    Digital printing is described as a tool to replace conventional printing machines completely. Still this goal was not reached until now with any of the digital printing technologies to be described in the paper. Productivity and costs are still the main parameters and are not really solved until now. Quality in digital printing is no problem anymore. Definition of digital printing is to transfer digital datas directly on the paper surface. This step can be carried out directly or with the use of an intermediate image carrier. Keywords in digital printing are: computer- to-press; erasable image carrier; image carrier with memory. Digital printing is also the logical development of the new digital area as it is pointed out in Nicholas Negropotes book 'Being Digital' and also the answer to networking and Internet technologies. Creating images text and color in one country and publishing the datas in another country or continent is the main advantage. Printing on demand another big advantage and last but not least personalization the last big advantage. Costs and being able to coop with this new world of prepress technology is the biggest disadvantage. Therefore the very optimistic growth rates for the next few years are really nonexistent. The development of complete new markets is too slow and the replacing of old markets is too small.

  3. Fully Digital Chaotic Differential Equation-based Systems And Methods

    KAUST Repository

    Radwan, Ahmed Gomaa Ahmed

    2012-09-06

    Various embodiments are provided for fully digital chaotic differential equation-based systems and methods. In one embodiment, among others, a digital circuit includes digital state registers and one or more digital logic modules configured to obtain a first value from two or more of the digital state registers; determine a second value based upon the obtained first values and a chaotic differential equation; and provide the second value to set a state of one of the plurality of digital state registers. In another embodiment, a digital circuit includes digital state registers, digital logic modules configured to obtain outputs from a subset of the digital shift registers and to provide the input based upon a chaotic differential equation for setting a state of at least one of the subset of digital shift registers, and a digital clock configured to provide a clock signal for operating the digital shift registers.

  4. Fully Digital Chaotic Differential Equation-based Systems And Methods

    KAUST Repository

    Radwan, Ahmed Gomaa Ahmed; Zidan, Mohammed A.; Salama, Khaled N.

    2012-01-01

    Various embodiments are provided for fully digital chaotic differential equation-based systems and methods. In one embodiment, among others, a digital circuit includes digital state registers and one or more digital logic modules configured to obtain a first value from two or more of the digital state registers; determine a second value based upon the obtained first values and a chaotic differential equation; and provide the second value to set a state of one of the plurality of digital state registers. In another embodiment, a digital circuit includes digital state registers, digital logic modules configured to obtain outputs from a subset of the digital shift registers and to provide the input based upon a chaotic differential equation for setting a state of at least one of the subset of digital shift registers, and a digital clock configured to provide a clock signal for operating the digital shift registers.

  5. Fish Habitat Utilization Patterns and Evaluation of the Efficacy of Marine Protected Areas in Hawaii: Integration of NOAA Digital Benthic Habitat Mapping and Coral Reef Ecological Studies

    OpenAIRE

    Friedlander, Alan M.; Brown, Eric; Monaco, Mark E.; Clarke, Athline

    2006-01-01

    Over the past four decades, the state of Hawaii has developed a system of eleven Marine Life Conservation Districts (MLCDs) to conserve and replenish marine resources around the state. Initially established to provide opportunities for public interaction with the marine environment, these MLCDs vary in size, habitat quality, and management regimes, providing an excellent opportunity to test hypotheses concerning marine protected area (MPA) design and function using multiple discreet sampling ...

  6. Digital Audiobooks

    DEFF Research Database (Denmark)

    Have, Iben; Pedersen, Birgitte Stougaard

    Audiobooks are rapidly gaining popularity with widely accessible digital downloading and streaming services. The paper is framing how the digital audiobook expands and changes the target groups for book publications and how it as an everyday activity is creating new reading experiences, places...

  7. Digital TMI

    Science.gov (United States)

    Rios, Joseph

    2012-01-01

    Presenting the current status of the Digital TMI project to visiting members of the FAA Command Center. Digital TMI is an effort to store national-level traffic management initiatives in a standards-compliant manner. Work is funded by the FAA.

  8. Cost Model for Digital Preservation: Cost of Digital Migration

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad; Nielsen, Anders Bo; Thirifays, Alex

    2011-01-01

    The Danish Ministry of Culture has funded a project to set up a model for costing preservation of digital materials held by national cultural heritage institutions. The overall objective of the project was to increase cost effectiveness of digital preservation activities and to provide a basis...... for comparing and estimating future cost requirements for digital preservation. In this study we describe an activity-based costing methodology for digital preservation based on the Open Archice Information System (OAIS) Reference Model. Within this framework, which we denote the Cost Model for Digital...... Preservation (CMDP), the focus is on costing the functional entity Preservation Planning from the OAIS and digital migration activities. In order to estimate these costs we have identified cost-critical activities by analysing the functions in the OAIS model and the flows between them. The analysis has been...

  9. The role of neutron activation analysis and radioanalytical methods in dose-effect relationship studies for the setting of trace metal protection criteria

    International Nuclear Information System (INIS)

    Sabbioni, E.; Pietra, R.; Edel, J.; Goetz, L.

    1986-01-01

    In order to prepare a scientifically accurate health protection criteria documents for trace metals integrated multidisciplinary research is necessary. In particular, the rational for structuring the documents should be based primarily on the two major questions of exposure and response. Unfortunately, in a majority of cases there is a paucity of relevant data to the establishment of dose-effect relationships. This work intends to show the role that neutron activation analysis and radiotracers with very high specific radioactivity have in solving problems relevant for establishment dose-effect relationships for trace metals. Typical applications in the different research areas involved in the preparation of the protection criteria, from source and exposure to levels and forms of trace metals in humans, are presented. (author)

  10. Digital displacements

    DEFF Research Database (Denmark)

    Pors, Anja Svejgaard

    2014-01-01

    In recent years digital reforms are being introduced in the municipal landscape of Denmark. The reforms address the interaction between citizen and local authority. The aim is, that by 2015 at least 80 per cent of all correspondence between citizens and public authority will be transmitted through...... digital interface. However, the transformation of citizen services from traditional face-to-face interaction to digital self-service gives rise to new practices; some citizens need support to be able to manage self-service through digital tools. A mixture of support and teaching, named co......-service, is a new task in public administration, where street level bureaucrats assist citizens in using the new digital solutions. The paper is based on a case study conducted primarily in a citizen service centre in Copenhagen, Denmark. Based on ethnography the paper gives an empirical account of the ongoing...

  11. Digitized mammograms

    International Nuclear Information System (INIS)

    Bruneton, J.N.; Balu-Maestro, C.; Rogopoulos, A.; Chauvel, C.; Geoffray, A.

    1988-01-01

    Two observers conducted a blind evaluation of 100 mammography files, including 47 malignant cases. Films were read both before and after image digitization at 50 μm and 100 μm with the FilmDRSII. Digitization permitted better analysis of the normal anatomic structures and moderately improved diagnostic sensitivity. Searches for microcalcifications before and after digitization at 100 μm and 50 μm showed better analysis of anatomic structures after digitization (especially for solitary microcalcifications). The diagnostic benefit, with discovery of clustered microcalcifications, was more limited (one case at 100 μm, nine cases at 50 μm). Recognition of microcalcifications was clearly improved in dense breasts, which can benefit from reinterpretation after digitization at 50 μm rather 100μm

  12. Comparative evaluation of image quality of various digital radiology systems and quality control and optimization of radiation protection at the Amiens university hospital

    International Nuclear Information System (INIS)

    Foro, Saturnin Didace L.

    2004-01-01

    This study was centered on two axes: the first is the comparative evaluation of image quality of various numerical radiology system, the second is the quality control and the optimization of protection against radiation. The publication of directive 97/43 Euratom from council of June 30, 1997 and consequently, the decree of February 12, 2004 founded a strict lawful framework that is engaged to respect the University Hospital of Amiens by the installation of a operational dosimetry system and the application of February 12, 2004 decree. (author) [fr

  13. Digitalization and Public Sector Transformations

    DEFF Research Database (Denmark)

    Schou, Jannick; Hjelholt, Morten

    This book provides a study of governmental digitalization, an increasingly important area of policymaking within advanced capitalist states. It dives into a case study of digitalization efforts in Denmark, fusing a national policy study with local institutional analysis. Denmark is often framed....... Digitalization and Public Sector Transformations pushes for a renewed approach to governmental digitalization and will be of interest to scholars working in the intersections of critical political economy, state theory and policy studies....... as an international forerunner in terms of digitalizing its public sector and thus provides a particularly instructive setting for understanding this new political instrument. Advancing a cultural political economic approach, Schou and Hjelholt argue that digitalization is far from a quick technological fix. Instead...

  14. Digital Ethics/Going Digital.

    Science.gov (United States)

    Wilson, Bradley

    1996-01-01

    Finds that the recent National Press Photographers Association code of ethics can serve as a model for any photography staff. Discusses how digital imaging is becoming commonplace in classrooms, due to decreasing costs and easier software. Explains digital terminology. Concludes that time saved in the darkroom and at the printer is now spent on…

  15. Setting an ecological baseline prior to the bottom-up establishment of a marine protected area in Santorini island, Aegean Sea

    Directory of Open Access Journals (Sweden)

    M. SALOMIDI

    2016-08-01

    Full Text Available Since 2010, a bottom-up initiative has been launched in Santorini Island (Aegean Sea, Eastern Mediterranean for the establishment of the first fully-protected marine protected area in the Cyclades, aiming at improving fisheries and enhancing responsible recreational uses at sea. Following discussions with local small-scale fishers and divers, two sites along the southern and southeastern coasts of the island were suggested as suitable to this end. In 2012, a baseline study was conducted at these areas to assess their state and provide an ecological snapshot that would enable sound designation and monitoring. Several ad hoc indices and metrics were applied, taking into account structural and functional features of the upper infralittoral algae and Posidonia oceanica beds. An integrated assessment of the infralittoral fish assemblages and their associated benthic communities was also performed. Our most important findings were: (i the low total fish biomass and the absence of adult top predators, indicating overfishing; (ii the overgrazing effects of the overabundant alien herbivore spinefoot fishes (Siganus spp., as reflected by the abnormal structure of the algal communities; (iii the scarcity of signs of pollution or other direct anthropogenic pressures, as indicated by the good environmental status of the P. oceanica meadows and the upper infralittoral vegetation; and (iv the presence of a rich diversity of species and habitats, especially along the Akrotiri Peninsula and the wider volcanic Caldera. These findings provide useful insights on strengths and weaknesses of the study area and are discussed together with their implications for protection and management.

  16. Digital radiography

    International Nuclear Information System (INIS)

    Coulomb, M.; Dal Soglio, S.; Pittet-Barbier, L.; Ranchoup, Y.; Thony, F.; Ferretti, G.; Robert, F.

    1992-01-01

    Digital projection radiography may replace conventional radiography some day, provided it can meet several requirements: equal or better diagnostic effectiveness of the screen-film systems; reasonable image cost; real improvement in the productivity of the Departments of Imaging. All digital radiographic systems include an X-ray source, an image acquisition and formatting sub-system, a display and manipulation sub-system, and archiving subsystem and a laser editing system, preferably shared by other sources of digital images. Three digitization processes are available: digitization of the radiographic film, digital fluorography and phospholuminescent detectors with memory. The advantages of digital fluoroscopy are appealing: real-time image acquisition, suppression of cassettes; but its disadvantages are far from negligible: it cannot be applied to bedside radiography, the field of examination is limited, and the wide-field spatial resolution is poor. Phospholuminescent detectors with memory have great advantages: they can be used for bedside radiographs and on all the common radiographic systems; spatial resolution is satisfactory; its current disadvantages are considerable. These two systems, have common properties making up the entire philosophy of digital radiology and specific features that must guide our choice according to the application. Digital fluorography is best applied in pediatric radiology. However, evaluation works have showed that it was applicable with sufficient quality to many indications of general radiology in which a fluoroscopic control and fast acquisition of the images are essential; the time gained on the examination may be considerable, as well as the savings on film. Detectors with memory are required for bedside radiographs, in osteoarticular and thoracic radiology, in all cases of traumatic emergency and in the resuscitation and intensive care departments

  17. Digital breast tomosynthesis

    International Nuclear Information System (INIS)

    Haegele, Julian; Barkhausen, Joerg; Pursche, Telja; Schaefer, Fritz K.W.

    2015-01-01

    In digital breast tomosynthesis a digital tomographic data set with a very high spatial resolution is reconstructed from low-dose projections collected over a limited rotation angle. This allows a very detailed assessment of e. g. masses and architectural distortions. The average glandular dose is comparable to 2 D mammography. First clinical studies demonstrated that tomosynthesis is able to supply important additional information in suspicious mammographic findings. In comparison to projection mammography, tomosynthesis shows an at least comparable diagnostic accuracy. In everyday practice, tomosynthesis is currently mostly used for further evaluation of suspicious findings in mammography.

  18. Becoming digital

    DEFF Research Database (Denmark)

    Pors, Anja Svejgaard

    2015-01-01

    . An ethnographic account of how digital reforms are implemented in practice shows how street-level bureaucrat’s classic tasks such as specialized casework are being reconfigured into educational tasks that promote the idea of “becoming digital”. In the paper, the author argues that the work of “becoming digital....... Originality/value: The study contributes to ethnographic research in public administration by combining two separate subfields, e-government and street-level bureaucracy, to discern recent transformations in public service delivery. In the digital era, tasks, control and equality are distributed in ways...

  19. Digital Humanities

    DEFF Research Database (Denmark)

    Brügger, Niels

    2016-01-01

    , and preserving material to study, as an object of study in its own right, as an analytical tool, or for collaborating, and for disseminating results. The term "digital humanities" was coined around 2001, and gained currency within academia in the following years. However, computers had been used within......Digital humanities is an umbrella term for theories, methodologies, and practices related to humanities scholarship that use the digital computer as an integrated and essential part of its research and teaching activities. The computer can be used for establishing, finding, collecting...

  20. Digital Snaps

    DEFF Research Database (Denmark)

    Sandbye, Mette; Larsen, Jonas

    . Distance as the New Punctum / Mikko Villi -- pt. II. FAMILY ALBUMS IN TRANSITION -- ch. 4. How Digital Technologies Do Family Snaps, Only Better / Gillian Rose -- ch. 5. Friendship Photography: Memory, Mobility and Social Networking / Joanne Garde-Hansen -- ch. 6. Play, Process and Materiality in Japanese...... -- ch. 9. Retouch Yourself: The Pleasures and Politics of Digital Cosmetic Surgery / Tanya Sheehan -- ch. 10. Virtual Selves: Art and Digital Autobiography / Louise Wolthers -- ch. 11. Mobile-Media Photography: New Modes of Engagement / Michael Shanks and Connie Svabo....

  1. Digital electronics

    CERN Document Server

    Morris, John

    2013-01-01

    An essential companion to John C Morris's 'Analogue Electronics', this clear and accessible text is designed for electronics students, teachers and enthusiasts who already have a basic understanding of electronics, and who wish to develop their knowledge of digital techniques and applications. Employing a discovery-based approach, the author covers fundamental theory before going on to develop an appreciation of logic networks, integrated circuit applications and analogue-digital conversion. A section on digital fault finding and useful ic data sheets completes th

  2. Digital Leadership

    DEFF Research Database (Denmark)

    Zupancic, Tadeja; Verbeke, Johan; Achten, Henri

    2016-01-01

    Leadership is an important quality in organisations. Leadership is needed to introduce change and innovation. In our opinion, in architectural and design practices, the role of leadership has not yet been sufficiently studied, especially when it comes to the role of digital tools and media....... With this paper we intend to initiate a discussion in the eCAADe community to reflect and develop ideas in order to develop digital leadership skills amongst the membership. This paper introduces some important aspects, which may be valuable to look into when developing digital leadership skills....

  3. Digital radiography

    International Nuclear Information System (INIS)

    Zani, M.L.

    2002-01-01

    X-ray radiography is a very common technique used to check the homogeneity of a material or the inside of a mechanical part. Generally the radiation that goes through the material to check, produced an image on a sensitized film. This method requires time because the film needs to be developed, digital radiography has no longer this inconvenient. In digital radiography the film is replaced by digital data and can be processed as any computer file. This new technique is promising but its main inconvenient is that today its resolution is not so good as that of film radiography. (A.C.)

  4. Caspase 1 activation is protective against hepatocyte cell death by up-regulating beclin 1 protein and mitochondrial autophagy in the setting of redox stress.

    Science.gov (United States)

    Sun, Qian; Gao, Wentao; Loughran, Patricia; Shapiro, Rick; Fan, Jie; Billiar, Timothy R; Scott, Melanie J

    2013-05-31

    Caspase 1 activation can be induced by oxidative stress, which leads to the release of the proinflammatory cytokines IL1β and IL18 in myeloid cells and a potentially damaging inflammatory response. However, little is known about the role of caspase 1 in non-immune cells, such as hepatocytes, that express and activate the inflammasome but do not produce a significant amount of IL1β/IL18. Here we demonstrate that caspase 1 activation protects against cell death after redox stress induced by hypoxia/reoxygenation in hepatocytes. Mechanistically, we show that caspase 1 reduces mitochondrial respiration and reactive oxygen species by increasing mitochondrial autophagy and subsequent clearance of mitochondria in hepatocytes after hypoxia/reoxygenation. Caspase 1 increases autophagic flux through up-regulating autophagy initiator beclin 1 during redox stress and is an important cell survival factor in hepatocytes. We find that during hemorrhagic shock with resuscitation, an in vivo mouse model associated with severe hepatic redox stress, caspase 1 activation is also protective against liver injury and excessive oxidative stress through the up-regulation of beclin 1. Our findings suggest an alternative role for caspase 1 activation in promoting adaptive responses to oxidative stress and, more specifically, in limiting reactive oxygen species production and damage in cells and tissues where IL1β/IL18 are not highly expressed.

  5. Caspase 1 Activation Is Protective against Hepatocyte Cell Death by Up-regulating Beclin 1 Protein and Mitochondrial Autophagy in the Setting of Redox Stress*

    Science.gov (United States)

    Sun, Qian; Gao, Wentao; Loughran, Patricia; Shapiro, Rick; Fan, Jie; Billiar, Timothy R.; Scott, Melanie J.

    2013-01-01

    Caspase 1 activation can be induced by oxidative stress, which leads to the release of the proinflammatory cytokines IL1β and IL18 in myeloid cells and a potentially damaging inflammatory response. However, little is known about the role of caspase 1 in non-immune cells, such as hepatocytes, that express and activate the inflammasome but do not produce a significant amount of IL1β/IL18. Here we demonstrate that caspase 1 activation protects against cell death after redox stress induced by hypoxia/reoxygenation in hepatocytes. Mechanistically, we show that caspase 1 reduces mitochondrial respiration and reactive oxygen species by increasing mitochondrial autophagy and subsequent clearance of mitochondria in hepatocytes after hypoxia/reoxygenation. Caspase 1 increases autophagic flux through up-regulating autophagy initiator beclin 1 during redox stress and is an important cell survival factor in hepatocytes. We find that during hemorrhagic shock with resuscitation, an in vivo mouse model associated with severe hepatic redox stress, caspase 1 activation is also protective against liver injury and excessive oxidative stress through the up-regulation of beclin 1. Our findings suggest an alternative role for caspase 1 activation in promoting adaptive responses to oxidative stress and, more specifically, in limiting reactive oxygen species production and damage in cells and tissues where IL1β/IL18 are not highly expressed. PMID:23589298

  6. Digital fabrication

    CERN Document Server

    2012-01-01

    The Winter 2012 (vol. 14 no. 3) issue of the Nexus Network Journal features seven original papers dedicated to the theme “Digital Fabrication”. Digital fabrication is changing architecture in fundamental ways in every phase, from concept to artifact. Projects growing out of research in digital fabrication are dependent on software that is entirely surface-oriented in its underlying mathematics. Decisions made during design, prototyping, fabrication and assembly rely on codes, scripts, parameters, operating systems and software, creating the need for teams with multidisciplinary expertise and different skills, from IT to architecture, design, material engineering, and mathematics, among others The papers grew out of a Lisbon symposium hosted by the ISCTE-Instituto Universitario de Lisboa entitled “Digital Fabrication – A State of the Art”. The issue is completed with four other research papers which address different mathematical instruments applied to architecture, including geometric tracing system...

  7. Digital Relationships

    DEFF Research Database (Denmark)

    Ledborg Hansen, Richard

    -­rich information and highly interesting communication are sky-­high and rising. With a continuous increase in digitized communication follows a decrease in face-­to-­face encounters and our ability to engage in inter-­personal relationships are suffering for it (Davis, 2013). The behavior described in this paper......-­‐Jones, 2011) for increases in effectiveness and efficiency we indiscriminately embrace digital communication and digitized information dissemination with enthusiasm – at the risk of ignoring the potentially dark side of technology. However, technology also holds a promise for better understanding precisely...... for the same reasons – that the growing amount of digitized communication “out there” represents data waiting to be sifted, analyzed and decoded. In this paper “Facebook behavior” refers to a particular behavior characterized by presenting your self and representations of selected self in the hope of getting...

  8. Digital Discretion

    DEFF Research Database (Denmark)

    Busch, Peter Andre; Zinner Henriksen, Helle

    2018-01-01

    discretion is suggested to reduce this footprint by influencing or replacing their discretionary practices using ICT. What is less researched is whether digital discretion can cause changes in public policy outcomes, and under what conditions such changes can occur. Using the concept of public service values......This study reviews 44 peer-reviewed articles on digital discretion published in the period from 1998 to January 2017. Street-level bureaucrats have traditionally had a wide ability to exercise discretion stirring debate since they can add their personal footprint on public policies. Digital......, we suggest that digital discretion can strengthen ethical and democratic values but weaken professional and relational values. Furthermore, we conclude that contextual factors such as considerations made by policy makers on the macro-level and the degree of professionalization of street...

  9. Digital Social Science Lab

    DEFF Research Database (Denmark)

    Svendsen, Michael; Lauersen, Christian Ulrich

    2015-01-01

    At the Faculty Library of Social Sciences (part of Copenhagen University Library) we are currently working intensely towards the establishment of a Digital Social Science Lab (DSSL). The purpose of the lab is to connect research, education and learning processes with the use of digital tools...... at the Faculty of Social Sciences. DSSL will host and facilitate an 80 m2 large mobile and intelligent study- and learning environment with a focus on academic events, teaching and collaboration. Besides the physical settings DSSL has two primary functions: 1. To implement relevant social scientific software...... and hardware at the disposal for students and staff at The Faculty of Social Sciences along with instruction and teaching in the different types of software, e.g. Stata, Nvivo, Atlas.ti, R Studio, Zotero and GIS-software. 2. To facilitate academic events focusing on use of digital tools and analytic software...

  10. Numerical differential protection

    CERN Document Server

    Ziegler, Gerhard

    2012-01-01

    Differential protection is a fast and selective method of protection against short-circuits. It is applied in many variants for electrical machines, trans?formers, busbars, and electric lines.Initially this book covers the theory and fundamentals of analog and numerical differential protection. Current transformers are treated in detail including transient behaviour, impact on protection performance, and practical dimensioning. An extended chapter is dedicated to signal transmission for line protection, in particular, modern digital communication and GPS timing.The emphasis is then pla

  11. Protective Behavior in Games

    OpenAIRE

    Fiestras-Janeiro, G.; Borm, P.E.M.; van Megen, F.J.C.

    1996-01-01

    This paper introduces the notion of protective equilibrium in the context of fin ite games in strategic form.It shows that for matrix games the set of protective equilibria equals the set of proper equilibria.Moreover, in the context of bima trix games, the notion of protective behaviour is used as a refinement tool.

  12. Protective Behavior in Games

    NARCIS (Netherlands)

    Fiestras-Janeiro, G.; Borm, P.E.M.; van Megen, F.J.C.

    1996-01-01

    This paper introduces the notion of protective equilibrium in the context of fin ite games in strategic form.It shows that for matrix games the set of protective equilibria equals the set of proper equilibria.Moreover, in the context of bima trix games, the notion of protective behaviour is used as

  13. digital natives and digital immigrants

    OpenAIRE

    Cardina, Bruno; Francisco, Jerónimo; Reis, Pedro; trad. Silva, Fátima

    2011-01-01

    This article focuses on the generational gaps in school learning. Initially, we have tried to provide the framework in relation to the term digital native in order to understand the key aspects of the generation born after the advent and the global use of the Internet. They were found to be “multitasking” people, linked to technology and connectivity, as opposed to digital immigrants, born in an earlier period and seeking to adapt to the technological world. We also present some r...

  14. An image adaptive, wavelet-based watermarking of digital images

    Science.gov (United States)

    Agreste, Santa; Andaloro, Guido; Prestipino, Daniela; Puccio, Luigia

    2007-12-01

    In digital management, multimedia content and data can easily be used in an illegal way--being copied, modified and distributed again. Copyright protection, intellectual and material rights protection for authors, owners, buyers, distributors and the authenticity of content are crucial factors in solving an urgent and real problem. In such scenario digital watermark techniques are emerging as a valid solution. In this paper, we describe an algorithm--called WM2.0--for an invisible watermark: private, strong, wavelet-based and developed for digital images protection and authenticity. Using discrete wavelet transform (DWT) is motivated by good time-frequency features and well-matching with human visual system directives. These two combined elements are important in building an invisible and robust watermark. WM2.0 works on a dual scheme: watermark embedding and watermark detection. The watermark is embedded into high frequency DWT components of a specific sub-image and it is calculated in correlation with the image features and statistic properties. Watermark detection applies a re-synchronization between the original and watermarked image. The correlation between the watermarked DWT coefficients and the watermark signal is calculated according to the Neyman-Pearson statistic criterion. Experimentation on a large set of different images has shown to be resistant against geometric, filtering and StirMark attacks with a low rate of false alarm.

  15. Validity of the linear no-threshold (LNT) hypothesis in setting radiation protection regulations for the inhabitants in high level natural radiation areas of Ramsar, Iran

    International Nuclear Information System (INIS)

    Mortazavi, S.M.J.; Atefi, M.; Razi, Z.; Mortazavi Gh

    2010-01-01

    Some areas in Ramsar, a city in northern Iran, have long been known as inhabited areas with the highest levels of natural radiation. Despite the fact that the health effects of high doses of ionizing radiation are well documented, biological effects of above the background levels of natural radiation are still controversial and the validity of the LNT hypothesis in this area, has been criticized by many investigators around the world. The study of the health effects of high levels of natural radiation in areas such as Ramsar, help scientists to investigate the biological effects without the need for extrapolating the observations either from high doses of radiation to low dose region or from laboratory animals to humans. Considering the importance of these studies, National Radiation Protection Department (NRPD) of the Iranian Nuclear Regulatory Authority has started an integrative research project on the health effects of long-term exposure to high levels of natural radiation. This paper reviews findings of the studies conducted on the plants and humans living or laboratory animals kept in high level natural radiation areas of Ramsar. In human studies, different end points such as DNA damage, chromosome aberrations, blood cells and immunological alterations are discussed. This review comes to the conclusion that no reproducible detrimental health effect has been reported so far. In this paper the validity of LNT hypothesis in the assessment of the health effects of high levels of natural radiation is discussed. (author)

  16. Creating opportunities through mentorship, parental involvement, and safe spaces (COMPASS) program: multi-country study protocol to protect girls from violence in humanitarian settings.

    Science.gov (United States)

    Falb, Kathryn L; Tanner, Sophie; Ward, Leora; Erksine, Dorcas; Noble, Eva; Assazenew, Asham; Bakomere, Theresita; Graybill, Elizabeth; Lowry, Carmen; Mallinga, Pamela; Neiman, Amy; Poulton, Catherine; Robinette, Katie; Sommer, Marni; Stark, Lindsay

    2016-03-05

    Violence against adolescent girls in humanitarian settings is of urgent concern given their additional vulnerabilities to violence and unique health and well-being needs that have largely been overlooked by the humanitarian community. In order to understand what works to prevent violence against adolescent girls, a multi-component curriculum-based safe spaces program (Creating Opportunities through Mentorship, Parental involvement and Safe Spaces - COMPASS) will be implemented and evaluated. The objectives of this multi-country study are to understand the feasibility, acceptability and effectiveness of COMPASS programming to prevent violence against adolescent girls in diverse humanitarian settings. Two wait-listed cluster-randomized controlled trials are being implemented in conflict-affected communities in eastern Democratic Republic of Congo (N = 886 girls aged 10-14 years) and in refugee camps in western Ethiopia (N = 919 girls aged 13-19 years). The intervention consists of structured facilitated sessions delivered in safe spaces by young female mentors, caregiver discussion groups, capacity-building activities with service providers, and community engagement. In Ethiopia, the research centers on the overall impact of COMPASS compared to a wait-list group. In DRC, the research objective is to understand the incremental effectiveness of the caregiver component in addition to the other COMPASS activities as compared to a wait-list group. The primary outcome is change in sexual violence. Secondary outcomes include decreased physical and emotional abuse, reduced early marriage, improved gender norms, and positive interpersonal relationships, among others. Qualitative methodologies seek to understand girls' perceptions of safety within their communities, key challenges they face, and to identify potential pathways of change. These trials will add much needed evidence for the humanitarian community to meet the unique needs of adolescent girls and to promote

  17. Creating opportunities through mentorship, parental involvement, and safe spaces (COMPASS program: multi-country study protocol to protect girls from violence in humanitarian settings

    Directory of Open Access Journals (Sweden)

    Kathryn L. Falb

    2016-03-01

    Full Text Available Abstract Background Violence against adolescent girls in humanitarian settings is of urgent concern given their additional vulnerabilities to violence and unique health and well-being needs that have largely been overlooked by the humanitarian community. In order to understand what works to prevent violence against adolescent girls, a multi-component curriculum-based safe spaces program (Creating Opportunities through Mentorship, Parental involvement and Safe Spaces – COMPASS will be implemented and evaluated. The objectives of this multi-country study are to understand the feasibility, acceptability and effectiveness of COMPASS programming to prevent violence against adolescent girls in diverse humanitarian settings. Methods/design Two wait-listed cluster-randomized controlled trials are being implemented in conflict-affected communities in eastern Democratic Republic of Congo (N = 886 girls aged 10–14 years and in refugee camps in western Ethiopia (N = 919 girls aged 13–19 years. The intervention consists of structured facilitated sessions delivered in safe spaces by young female mentors, caregiver discussion groups, capacity-building activities with service providers, and community engagement. In Ethiopia, the research centers on the overall impact of COMPASS compared to a wait-list group. In DRC, the research objective is to understand the incremental effectiveness of the caregiver component in addition to the other COMPASS activities as compared to a wait-list group. The primary outcome is change in sexual violence. Secondary outcomes include decreased physical and emotional abuse, reduced early marriage, improved gender norms, and positive interpersonal relationships, among others. Qualitative methodologies seek to understand girls’ perceptions of safety within their communities, key challenges they face, and to identify potential pathways of change. Discussion These trials will add much needed evidence for the humanitarian

  18. Cellular Mechanism Underlying Hypothermia-Induced VT/VF in the Setting of Early Repolarization and the Protective Effect of Quinidine, Cilostazol and Milrinone

    Science.gov (United States)

    Gurabi, Zsolt; Koncz, István; Patocskai, Bence; Nesterenko, Vladislav V.; Antzelevitch, Charles

    2014-01-01

    Background Hypothermia has been reported to induce ventricular tachycardia and fibrillation (VT/VF) in patients with early repolarization (ER) pattern. This study examines the cellular mechanisms underlying VT/VF associated with hypothermia in an experimental model of ER syndrome (ERS) and examines the effectiveness of quinidine, cilostazol and milrinone to prevent hypothermia-induced arrhythmias. Method and Results Transmembrane action potentials (AP) were simultaneously recorded from 2 epicardial and 1 endocardial site of coronary-perfused canine left-ventricular wedge preparations, together with a pseudo-ECG. A combination of NS5806 (3–10 µM) and verapamil (1µM) was used to pharmacologically model the genetic mutations responsible for ERS. Acetylcholine (3µM) was used to simulate increased parasympathetic tone, which is known to promote ER. In control, lowering the temperature of the coronary perfusate to induce mild hypothermia (32°C-34°C) resulted in increased J wave area on the ECG and accentuated epicardial AP notch but no arrhythmic activity. In the setting of ER, hypothermia caused further accentuation of the epicardial AP notch, leading to loss of the AP dome at some sites but not others, thus creating the substrate for development of phase-2-reentry and VT/VF. Addition of the Ito antagonist quinidine (5 µM) or the phosphodiesterase III inhibitors cilostazol (10 µM) or milrinone (5 µM), diminished the ER manifestations and prevented the hypothermia-induced phase 2 reentry and VT/VF. Conclusions Hypothermia leads to VT/VF in the setting of ER by exaggerating repolarization abnormalities, leading to development of phase-2-reentry. Quinidine, cilostazol and milrinone suppress the hypothermia-induced VT/VF by reversing the repolarization abnormalities. PMID:24429494

  19. Cellular mechanism underlying hypothermia-induced ventricular tachycardia/ventricular fibrillation in the setting of early repolarization and the protective effect of quinidine, cilostazol, and milrinone.

    Science.gov (United States)

    Gurabi, Zsolt; Koncz, István; Patocskai, Bence; Nesterenko, Vladislav V; Antzelevitch, Charles

    2014-02-01

    Hypothermia has been reported to induce ventricular tachycardia and fibrillation (VT/VF) in patients with early repolarization (ER) pattern. This study examines the cellular mechanisms underlying VT/VF associated with hypothermia in an experimental model of ER syndrome and examines the effectiveness of quinidine, cilostazol, and milrinone to prevent hypothermia-induced arrhythmias. Transmembrane action potentials were simultaneously recorded from 2 epicardial and 1 endocardial site of coronary-perfused canine left ventricular wedge preparations, together with a pseudo-ECG. A combination of NS5806 (3-10 μmol/L) and verapamil (1 μmol/L) was used to pharmacologically model the genetic mutations responsible for ER syndrome. Acetylcholine (3 μmol/L) was used to simulate increased parasympathetic tone, which is known to promote ER. In controls, lowering the temperature of the coronary perfusate to induce mild hypothermia (32°C-34°C) resulted in increased J-wave area on the ECG and accentuated epicardial action potential notch but no arrhythmic activity. In the setting of ER, hypothermia caused further accentuation of the epicardial action potential notch, leading to loss of the action potential dome at some sites but not others, thus creating the substrate for development of phase 2 reentry and VT/VF. Addition of the transient outward current antagonist quinidine (5 μmol/L) or the phosphodiesterase III inhibitors cilostazol (10 μmol/L) or milrinone (5 μmol/L) diminished the ER manifestations and prevented the hypothermia-induced phase 2 reentry and VT/VF. Hypothermia leads to VT/VF in the setting of ER by exaggerating repolarization abnormalities, leading to development of phase 2 reentry. Quinidine, cilostazol, and milrinone suppress the hypothermia-induced VT/VF by reversing the repolarization abnormalities.

  20. Digital evidence

    Directory of Open Access Journals (Sweden)

    Lukić Tatjana

    2012-01-01

    Full Text Available Although computer makes human activities faster and easier, innovating and creating new forms of work and other kinds of activities, it also influenced the criminal activity. The development of information technology directly affects the development of computer forensics without which, it can not even imagine the discovering and proving the computer offences and apprehending the perpetrator. Information technology and computer forensic allows us to detect and prove the crimes committed by computer and capture the perpetrators. Computer forensics is a type of forensics which can be defined as a process of collecting, preserving, analyzing and presenting digital evidence in court proceedings. Bearing in mind, that combat against crime, in which computers appear as an asset or object of the offense, requires knowledge of digital evidence as well as specific rules and procedures, the author in this article specifically addresses the issues of digital evidence, forensic (computer investigation, specific rules and procedures for detecting, fixing and collecting digital evidence and use of this type of evidence in criminal proceedings. The author also delas with international standards regarding digital evidence and cyber-space investigation.

  1. Interest and limits of epidemiology for the evaluation of radiation induced cancer risks and the setting up of radiation protection standards

    International Nuclear Information System (INIS)

    Hubert, D.

    1990-01-01

    Epidemiological studies allow to confirm that a risk does exist for some types of cancer following high-dose exposures often at high dose-rates. However, no conclusion can be drawn for low doses and low dose-rates. Therefore we have to extrapolate from known high-dose risks to low doses and low dose-rates by various dose-response patterns. Another difficulty in assessing radiation cancer risks comes from the long latency time, which explains that all excess cancers have not yet been observed in the irradiated population studied. Once more, mathematical models are used to project excess lifetime cancer mortality. The estimations of radiation cancer risks are therefore marked by a great number of uncertainties, since they change accordingly to the model used. Other uncertainties come from the data, especially the dose estimates and are heightened when extrapolating to other populations. In 1988, UNSCEAR assessed new estimates for excess lifetime cancer mortality in the range of 4 to 11% per gray. These values mean a revaluation of the previous estimates by a 1.6 to 4.4 factor, which is mainly consecutive to the use of different projection models. Besides, they are solely based on the Hiroshima and Nagasaki survivors, whereas patient studies assess a lower risk. Finally UNSCEAR does not precisely state what is the available reduction factor to modify risks for low doses and low dose rates which should lie between 2 and 10. Due to a number of persistent uncertainties, we should not consider it justified to revise protection standards presently. 9 tabs.; 45 refs [fr

  2. Transcoding the digital : how metaphors matter in new media

    NARCIS (Netherlands)

    van den Boomen, M.V.T.

    2014-01-01

    This study traces the role of metaphors in digital praxis. Digital praxis refers to a more or less coherent set of everyday practices – acts, habits, routines – that involve the manipulation, modification, and construction of digital-symbolical objects. Examples of these digital-symbolical objects

  3. Digital mammography screening: average glandular dose and first performance parameters

    International Nuclear Information System (INIS)

    Weigel, S.; Girnus, R.; Czwoydzinski, J.; Heindel, W.; Decker, T.; Spital, S.

    2007-01-01

    Purpose: The Radiation Protection Commission demanded structured implementation of digital mammography screening in Germany. The main requirements were the installation of digital reference centers and separate evaluation of the fully digitized screening units. Digital mammography screening must meet the quality standards of the European guidelines and must be compared to analog screening results. We analyzed early surrogate indicators of effective screening and dosage levels for the first German digital screening unit in a routine setting after the first half of the initial screening round. Materials and Methods: We used three digital mammography screening units (one full-field digital scanner [DR] and two computed radiography systems [CR]). Each system has been proven to fulfill the requirements of the National and European guidelines. The radiation exposure levels, the medical workflow and the histological results were documented in a central electronic screening record. Results: In the first year 11,413 women were screened (participation rate 57.5 %). The parenchymal dosages for the three mammographic X-ray systems, averaged for the different breast sizes, were 0.7 (DR), 1.3 (CR), 1.5 (CR) mGy. 7 % of the screened women needed to undergo further examinations. The total number of screen-detected cancers was 129 (detection rate 1.1 %). 21 % of the carcinomas were classified as ductal carcinomas in situ, 40 % of the invasive carcinomas had a histological size ≤ 10 mm and 61 % < 15 mm. The frequency distribution of pT-categories of screen-detected cancer was as follows: pTis 20.9 %, pT1 61.2 %, pT2 14.7 %, pT3 2.3 %, pT4 0.8 %. 73 % of the invasive carcinomas were node-negative. (orig.)

  4. Endangered Species Protection Bulletins

    Science.gov (United States)

    Endangered Species Protection Bulletins set forth geographically specific pesticide use limitations for the protection of threatened and endangered (listed) species and their designated critical habitat. Find out how to get and use Bulletins.

  5. Digital Creativity

    DEFF Research Database (Denmark)

    Petersson Brooks, Eva; Brooks, Anthony Lewis

    2014-01-01

    This paper reports on a study exploring the outcomes from children’s play with technology in early childhood learning practices. The paper addresses questions related to how digital technology can foster creativity in early childhood learning environments. It consists of an analysis of children......’s interaction with the KidSmart furniture focusing on digital creativity potentials and play values suggested by the technology. The study applied a qualitative approach and included125 children (aged three to five), 10 pedagogues, and two librarians. The results suggests that educators should sensitively...... consider intervening when children are interacting with technology, and rather put emphasize into the integration of the technology into the environment and to the curriculum in order to shape playful structures for children’s digital creativity....

  6. Digital radiography

    International Nuclear Information System (INIS)

    Rath, M.; Lissner, J.; Rienmueller, R.; Haendle, J.; Siemens A.G., Erlangen

    1984-01-01

    Using a prototype of an electronic, universal examination unit equipped with a special X-ray TV installation, spotfilm exposures and digital angiographies with high spatial resolution and wide-range contrast could be made in the clinic for the first time. With transvenous contrast medium injection, the clinical results of digital angiography show excellent image quality in the region of the carotids and renal arteries as well as the arteries of the extremities. The electronic series exposures have an image quality almost comparable to the quality obtained with cutfilm changers in conventional angiography. There are certain limitations due to the input field of 25 cm X-ray image intensified used. In respect of the digital angiography imaging technique, the electronic universal unit is fully suitable for clinical application. (orig.) [de

  7. Emergent Principles for Digital Documentary

    Directory of Open Access Journals (Sweden)

    Richard Lachman

    2016-12-01

    Full Text Available Digital Documentaries are an area of rapid invention and experimentation at all levels, including creative content, production techniques, and business models.  As with many forms of digital storytelling, a focus on technologies can be distracting; platforms change rapidly, and are dependent on external commercial forces rather than creative potential.  This article presents several design strategies for driving experimentation in digital documentary above and beyond the specific of platform and technology. The core focus is on treating digital docs as experiences, with an expanded range of designable moments, as well as a strategic approach to designing interactions for their unique set of challenges.  The discussion is not intended to fully define digital documentary design factors, but rather, defines a useful subset of methods that can lead emerging practitioners to new innovations in their approach.

  8. Project AccessIT, Digitalization in Museums and Europeana (European Digital Library Project

    Directory of Open Access Journals (Sweden)

    Latif Özen

    2011-03-01

    Full Text Available This article emphasizes the importance of digitizing museum inventory records and establishing a data set in solving the problems of collection management in the museums of Turkey. Besides, the museum staff is encouraged to share the already existing digital content at the Europeana Digital Culture Portal by means of AccessIT project.

  9. Protecting and promoting mental health of nurses in the hospital setting: Is it cost-effective from an employer’s perspective?

    Directory of Open Access Journals (Sweden)

    Cindy Noben

    2015-10-01

    Full Text Available Objectives: Nurses are at elevated risk of burnout, anxiety and depressive disorders, and may then become less productive. This begs the question if a preventive intervention in the work setting might be cost-saving from a business perspective. Material and Methods: A cost-benefit analysis was conducted to evaluate the balance between the costs of a preventive intervention among nurses at elevated risk of mental health complaints and the cost offsets stemming from improved productivity. This evaluation was conducted alongside a cluster-randomized trial in a Dutch academic hospital. The control condition consisted of screening without feedback and unrestricted access to usual care (N = 206. In the experimental condition screen-positive nurses received personalized feedback and referral to the occupational physician (N = 207. Results: Subtracting intervention costs from the cost offsets due to reduced absenteeism and presenteeism resulted in net-savings of 244 euros per nurse when only absenteeism is regarded, and 651 euros when presenteeism is also taken into account. This corresponds to a return-on-investment of 5 euros up to 11 euros for every euro invested. Conclusions: Within half a year, the cost of offering the preventive intervention was more than recouped. Offering the preventive intervention represents a favorable business case as seen from the employer’s perspective.

  10. Implementation of Digital Watermarking Using MATLAB Software

    OpenAIRE

    Karnpriya Vyas; Kirti Sethiya; Sonu Jain

    2012-01-01

    Digital watermarking holds significant promise as one of the keys to protecting proprietary digital content in the coming years. It focuses on embedding information inside a digital object such that the embedded information is in separable bound to the object. The proposed scheme has been implemented on MATLAB, as it is a high level technical computing language and interactive environment for algorithm development, data visualization, data analysis, and numerical computation. We w...

  11. Digital Model of Railway Electric Traction Lines

    Science.gov (United States)

    Garg, Rachana; Mahajan, Priya; Kumar, Parmod

    2017-08-01

    The characteristic impedance and propagation constant define the behavior of signal propagation over the transmission lines. The digital model for railway traction lines which includes railway tracks is developed, using curve fitting technique in MATLAB. The sensitivity of this model has been computed with respect to frequency. The digital sensitivity values are compared with the values of analog sensitivity. The developed model is useful for digital protection, integrated operation, control and planning of the system.

  12. Digital photogrammetry

    CERN Document Server

    Egels, Yves

    2003-01-01

    Photogrammetry is the use of photography for surveying primarily and is used for the production of maps from aerial photographs. Along with remote sensing, it represents the primary means of generating data for Geographic Information Systems (GIS). As technology develops, it is becoming easier to gain access to it. The cost of digital photogrammetric workstations are falling quickly and these new tools are therefore becoming accessible to more and more users. Digital Photogrammetry is particularly useful as a text for graduate students in geomantic and is also suitable for people with a good basic scientific knowledge who need to understand photogrammetry, and who wish to use the book as a reference.

  13. Digital Marketing

    OpenAIRE

    Jerry Wind; Vijay Mahajan

    2002-01-01

    The digital revolution has shaken marketing to its core with consumers being offered greater price transparency and often even the chance to dictate the price. What does pricing mean in a world in which customers propose their own prices (as at priceline.com) or buyers and sellers haggle independently in auctions (as at e-Bay)? The most significant changes in the digital marketing show the emergence of 'cyber consumers', the cyber business-to-business world and the changing reality of an incr...

  14. Digital "X"

    DEFF Research Database (Denmark)

    Baiyere, Abayomi; Grover, Varun; Gupta, Alok

    2017-01-01

    Interest in using digital before existing research concepts seem to be on the rise in the IS field. This panel is positioned to explore what value lies in labelling our research as digital “x” as opposed to the well established IT “x” (where “x” can be strategy, infrastructure, innovation, artifa...... between this stream of research and existing research. Central among the expected output of the panel is the advancement of suggestions for future research and the critical pitfalls to avoid in doing so....

  15. Digital Radiography

    Science.gov (United States)

    1986-01-01

    System One, a digital radiography system, incorporates a reusable image medium (RIM) which retains an image. No film is needed; the RIM is read with a laser scanner, and the information is used to produce a digital image on an image processor. The image is stored on an optical disc. System allows the radiologist to "dial away" unwanted images to compare views on three screens. It is compatible with existing equipment and cost efficient. It was commercialized by a Stanford researcher from energy selective technology developed under a NASA grant.

  16. Digital filters

    CERN Document Server

    Hamming, Richard W

    1997-01-01

    Digital signals occur in an increasing number of applications: in telephone communications; in radio, television, and stereo sound systems; and in spacecraft transmissions, to name just a few. This introductory text examines digital filtering, the processes of smoothing, predicting, differentiating, integrating, and separating signals, as well as the removal of noise from a signal. The processes bear particular relevance to computer applications, one of the focuses of this book.Readers will find Hamming's analysis accessible and engaging, in recognition of the fact that many people with the s

  17. Digital voltmeter

    International Nuclear Information System (INIS)

    Yohannes Kamadi; Soekarno.

    1976-01-01

    The electrical voltage measuring equipment with digital display has been made. This equipment uses four digits display with single polarity measurement and integrating system. Pulses from the oscillator will be counted and converted to the staircase voltages, and compared to the voltage measured. When the balance is already achieved, the pulse will appear at the comparator circuit. This pulse will be used to trigger univibrator circuit. The univibrator output is used as signal for stopping the counting, and when reading time T already stops, the counting system will be reset. (authors)

  18. Digital communication

    CERN Document Server

    Das, Apurba

    2010-01-01

    ""Digital Communications"" presents the theory and application of the philosophy of Digital Communication systems in a unique but lucid form. This book inserts equal importance to the theory and application aspect of the subject whereby the authors selected a wide class of problems. The Salient features of the book are: the foundation of Fourier series, Transform and wavelets are introduces in a unique way but in lucid language; the application area is rich and resemblance to the present trend of research, as we are attached with those areas professionally; a CD is included which contains code

  19. Digital literacies

    CERN Document Server

    Hockly, Nicky; Pegrum, Mark

    2014-01-01

    Dramatic shifts in our communication landscape have made it crucial for language teaching to go beyond print literacy and encompass the digital literacies which are increasingly central to learners' personal, social, educational and professional lives. By situating these digital literacies within a clear theoretical framework, this book provides educators and students alike with not just the background for a deeper understanding of these key 21st-century skills, but also the rationale for integrating these skills into classroom practice. This is the first methodology book to address not jus

  20. Digital Kildebeskyttelse. Udfordringer. Idealer. Dilemmaer.

    OpenAIRE

    Eggers, Camilla Høj

    2015-01-01

    In journalism, the challenges concerning the protection of confidential sources have grown alongside the increase in surveillance. Almost every individual lays out a digital track by using a cell phone, browsing the Internet and sending e-mails, and this track can be used to hunt down and expose sources. Through qualitative interviews with a focus on everyday practices this thesis examines how ten investigative journalists from five of the largest national media outlets attempt to protect the...

  1. P-20 Model of Digital Citizenship.

    Science.gov (United States)

    Curran, Marialice B F X; Ribble, Mike

    2017-03-01

    This chapter explores a P-20 digital citizenship model that builds upon the respect, educate, and protect REP model beginning with our earliest learners through elementary, middle, high school, and college. © 2017 Wiley Periodicals, Inc., A Wiley Company.

  2. Digital random-number generator

    Science.gov (United States)

    Brocker, D. H.

    1973-01-01

    For binary digit array of N bits, use N noise sources to feed N nonlinear operators; each flip-flop in digit array is set by nonlinear operator to reflect whether amplitude of generator which feeds it is above or below mean value of generated noise. Fixed-point uniform distribution random number generation method can also be used to generate random numbers with other than uniform distribution.

  3. Transforming Artefacts into Digital Heritage

    DEFF Research Database (Denmark)

    Otto, Ton; Hardy, Dianna

    2016-01-01

    a genuine transformation of the artefacts that opens up new possibilities of use. These include providing access to and facilitating the reappropriation of cultural knowledge stored elsewhere, maintaining and developing a living digital cultural heritage, and gathering, sharing and transferring knowledge...... that is available within Aboriginal communities. In this paper we examine different types of digital repositories and we assess their suitability for use by Aboriginal communities. We classify a number of institutional archiving systems and analyse in some detail two interactive systems that were specifically...... designed for use by Aboriginal communities. The paper ends with a set of recommendations for designing digital databases for Indigenous usage....

  4. Digital media labs in libraries

    CERN Document Server

    Goodman, Amanda L

    2014-01-01

    Families share stories with each other and veterans reconnect with their comrades, while teens edit music videos and then upload them to the web: all this and more can happen in the digital media lab (DML), a gathering of equipment with which people create digital content or convert content that is in analog formats. Enabling community members to create digital content was identified by The Edge Initiative, a national coalition of leading library and local government organizations, as a library technology benchmark. Surveying academic and public libraries in a variety of settings and sharing a

  5. Digital delicacies

    OpenAIRE

    Holley, Rose

    2001-01-01

    This presentation outlines the purpose and work of the newly appointed Digital Projects Librarian at the University of Auckland. It gives a brief overview of what digitisation is, the benefits, the stages of a digitisation project and also samples of interesting international digitisation projects and new University of Auckland Library Digitisation projects.

  6. Digital Forensics

    Science.gov (United States)

    Harron, Jason; Langdon, John; Gonzalez, Jennifer; Cater, Scott

    2017-01-01

    The term forensic science may evoke thoughts of blood-spatter analysis, DNA testing, and identifying molds, spores, and larvae. A growing part of this field, however, is that of digital forensics, involving techniques with clear connections to math and physics. This article describes a five-part project involving smartphones and the investigation…

  7. Digital Disruption

    DEFF Research Database (Denmark)

    Rosenstand, Claus Andreas Foss

    det digitale domæne ud over det niveau, der kendetegner den nuværende debat, så præsenteres der ny viden om digital disruption. Som noget nyt udlægges Clayton Christens teori om disruptiv innovation med et særligt fokus på små organisationers mulighed for eksponentiel vækst. Specielt udfoldes...... forholdet mellem disruption og den stadig accelererende digitale udvikling i konturerne til ny teoridannelse om digital disruption. Bogens undertitel ”faretruende og fascinerende forandringer” peger på, at der er behov for en nuanceret debat om digital disruption i modsætning til den tone, der er slået an i...... videre kalder et ”disruption-råd”. Faktisk er rådet skrevet ind i 2016 regeringsgrundlaget for VLK-regeringen. Disruption af organisationer er ikke et nyt fænomen; men hastigheden, hvormed det sker, er stadig accelererende. Årsagen er den globale mega-trend: Digitalisering. Og derfor er specielt digital...

  8. Digital books.

    Science.gov (United States)

    Wink, Diane M

    2011-01-01

    In this bimonthly series, the author examines how nurse educators can use the Internet and Web-based computer technologies such as search, communication, and collaborative writing tools; social networking and social bookmarking sites; virtual worlds; and Web-based teaching and learning programs. This article describes digital books.

  9. Digital forvaltning

    DEFF Research Database (Denmark)

    Remmen, Arne; Larsen, Torben; Mosgaard, Mette

    2004-01-01

    Større effektivitet, bedre service og mere demokrai er blot nogle af forventningerne til indførelse af digital forveltning i kommunerne. Kapitlet giver bland andet svar på spørgsmålene : Hvordan lever kommunerne op hertil i dagligdagen? hvilke virkemidler anvender de? Hvilke barrierer har der været...

  10. Digital Methods

    NARCIS (Netherlands)

    Rogers, R.

    2013-01-01

    In Digital Methods, Richard Rogers proposes a methodological outlook for social and cultural scholarly research on the Web that seeks to move Internet research beyond the study of online culture. It is not a toolkit for Internet research, or operating instructions for a software package; it deals

  11. Improved protection system for phase faults on marine vessels based on ratio between negative sequence and positive sequence of the fault current

    DEFF Research Database (Denmark)

    Ciontea, Catalin-Iosif; Hong, Qiteng; Booth, Campbell

    2018-01-01

    algorithm is implemented in a programmable digital relay embedded in a hardware-in-the-loop (HIL) test set-up that emulates a typical maritime feeder using a real-time digital simulator. The HIL set-up allows testing of the new protection method under a wide range of faults and network conditions......This study presents a new method to protect the radial feeders on marine vessels. The proposed protection method is effective against phase–phase (PP) faults and is based on evaluation of the ratio between the negative sequence and positive sequence of the fault currents. It is shown...... that the magnitude of the introduced ratio increases significantly during the PP fault, hence indicating the fault presence in an electric network. Here, the theoretical background of the new method of protection is firstly discussed, based on which the new protection algorithm is described afterwards. The proposed...

  12. Digital Humanities and networked digital media

    DEFF Research Database (Denmark)

    Finnemann, Niels Ole

    2014-01-01

    This article discusses digital humanities and the growing diversity of digital media, digital materials and digital methods. The first section describes the humanities computing tradition formed around the interpretation of computation as a rule-based process connected to a concept of digital...... materials centred on the digitisation of non-digital, finite works, corpora and oeuvres. The second section discusses “the big tent” of contemporary digital humanities. It is argued that there can be no unifying interpretation of digital humanities above the level of studying digital materials with the help...... of software-supported methods. This is so, in part, because of the complexity of the world and, in part, because digital media remain open to the projection of new epistemologies onto the functional architecture of these media. The third section discusses the heterogeneous character of digital materials...

  13. Library management for the digital age a new paradigm

    CERN Document Server

    Todaro, Julie

    2014-01-01

    This revolutionary introduction to library management is the first conceived in and written for a digital age. Library Management for the Digital Age covers hierarchies, policies, communication, working relationships, facilities, human resources, settings, customer services, budgeting, and emergency management.

  14. Digital Materia

    OpenAIRE

    Lindgren, Marcus; Richey, Emma

    2014-01-01

    Med tankar från pedagogen Montessori och filosoferna Platon och Baudrillard har detta arbete behandlat frågor om datorn och dess betydelse för en grafiker. Frågeställningen formulerades efter hand och lydde tillslut: ”Hur kan materia te sig i digital form?” Forskningen resulterade i en hypotes för hur digital materia skulle födas i datorn: genom att blanda två uppsättningar av data, såsom två genuppsättningar tillsammans skapar en ny organism. Under produktionen utvecklades därmed en metod fö...

  15. Becoming digital

    DEFF Research Database (Denmark)

    Pors, Anja Svejgaard

    2015-01-01

    government, and draws on empirical material generated through observations, field notes, interviews and policy documents. The material is documenting how service is performed by frontline agents in the ‘bureaucratic encounter’ with citizens, who needs assistance to use digital self-service in order to apply...... online for a public benefit. Findings: The paper shows that e-government technology changes the mode of professionalism in citizen service from service to support. The paper gives an empirical account of recent Danish digital reforms and shows how the reforms both enable and constrain the work...... of ‘becoming digital’ by frontline agents. Overall the street-level bureaucrat’s classical tasks such as specialized casework are being displaced into promoting and educational tasks. An implication of this is blurred distinctions between professional skills and personal competences of the frontline agent...

  16. Digital resources

    Directory of Open Access Journals (Sweden)

    Redazione Reti Medievali (a cura di

    2005-12-01

    Full Text Available Bibliotheca Latinitatis Mediaevalis (circa VII sec. - XIV sec. IntraText Digital Library [01/06] Corpus Scriptorum Latinorum. A digital library of Latin literature by David Camden [01/06] Fonti disponibili online concernenti la vita religiosa medievale Rete Vitae Religiosae Mediaevalis Studia Conectens [01/06] Fuentes del Medievo Hispanico Instituto de Historia, Consejo Superior de Investigaciones Científicas [01/06] Latin Literature Forum Romanum [01/06] Ludovico Antonio Muratori, Dissertazioni sopra le antichità italiane, 1751 Biblioteca dei Classici Italiani di Giuseppe Bonghi [01/06] Medieval Latin The Latin Library [01/06] Médiévales Presses Universitaires de Vincennes - Revues.org [01/06] Regesta imperii Deutsche Kommission für die Bearbeitung der Regesta Imperii e.V. [01/06] Suda On Line Byzantine Lexicography [01/06

  17. Digital teenagers

    Directory of Open Access Journals (Sweden)

    Rafael Conde Melguizo

    2011-12-01

    Full Text Available Espín, Manuel (Coord.(2011 Adolescentes Digitales.  Revista Estudios de Juventud, Nº 92. Marzo 2011. INJUVE, Madrid."Adolescentes digitales" se nos muestra como una obra que pretende explorar desde distintos puntos de vista la realidad de la generación conocida como “nativos digitales” (Prensky, la generación actual de adolescentes que ha crecido con internet y el mundo digital como su entorno normal de socialización.

  18. Digital Flora

    OpenAIRE

    Bunnell, Katie

    2007-01-01

    This research is concerned with developing a new business model for flexible small scale ceramic production that exploits the customisation capabilities of digital manufacturing technologies and the market potential and global connectivity of the world wide web. It is arguably of particular relevance to regional economic development in remote areas (Amin, Tomaney, Sabel) such as Cornwall where there is a culture of high quality small scale production, limited market and manufacturing opportun...

  19. Protecting digital rights in Pakistan | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-02-13

    Feb 13, 2017 ... The annual prize is awarded by the Dutch government to human rights ... a growing social conservatism that prizes whatever form of stability is promised. ... is difficult, made worse by increasing social and political instability.

  20. Superconducting coil protection

    International Nuclear Information System (INIS)

    Woods, E.L.

    1975-01-01

    The protection system is based on a two-phase construction program. Phase I is the development of a reliable hardwired relay control system with a digital loop utilizing firmware and a microprocessor controller. Phase II is an expansion of the digital loop to include many heretofore unmonitored coil variables. These new monitored variables will be utilized to establish early quench detection and to formulate confirmation techniques of the quench detection mechanism. Established quench detection methods are discussed and a new approach to quench detection is presented. The new circuit is insensitive to external pulsed magnetic fields and the associated induced voltages. Reliability aspects of the coil protection system are discussed with respect to shutdowns of superconducting coil systems. Redundance and digital system methods are presented as related topics

  1. New concept of microprocessor protective devices design

    Directory of Open Access Journals (Sweden)

    Gurevich Vladimir

    2010-01-01

    Full Text Available Transition from electromechanical to digital protective relays is accompanied with serious technical problems. The author offers a new approach in designing the digital relays capable of solving these problems. It is proposed to construct digital relays in the form of standard modules from which it would be possible to assemble the digital relay in the same way as now a personal computer.

  2. Counting SET-free sets

    OpenAIRE

    Harman, Nate

    2016-01-01

    We consider the following counting problem related to the card game SET: How many $k$-element SET-free sets are there in an $n$-dimensional SET deck? Through a series of algebraic reformulations and reinterpretations, we show the answer to this question satisfies two polynomiality conditions.

  3. Digital optical computer II

    Science.gov (United States)

    Guilfoyle, Peter S.; Stone, Richard V.

    1991-12-01

    OptiComp is currently completing a 32-bit, fully programmable digital optical computer (DOC II) that is designed to operate in a UNIX environment running RISC microcode. OptiComp's DOC II architecture is focused toward parallel microcode implementation where data is input in a dual rail format. By exploiting the physical principals inherent to optics (speed and low power consumption), an architectural balance of optical interconnects and software code efficiency can be achieved including high fan-in and fan-out. OptiComp's DOC II program is jointly sponsored by the Office of Naval Research (ONR), the Strategic Defense Initiative Office (SDIO), NASA space station group and Rome Laboratory (USAF). This paper not only describes the motivational basis behind DOC II but also provides an optical overview and architectural summary of the device that allows the emulation of any digital instruction set.

  4. Smartphone adapters for digital photomicrography.

    Science.gov (United States)

    Roy, Somak; Pantanowitz, Liron; Amin, Milon; Seethala, Raja R; Ishtiaque, Ahmed; Yousem, Samuel A; Parwani, Anil V; Cucoranu, Ioan; Hartman, Douglas J

    2014-01-01

    Photomicrographs in Anatomic Pathology provide a means of quickly sharing information from a glass slide for consultation, education, documentation and publication. While static image acquisition historically involved the use of a permanently mounted camera unit on a microscope, such cameras may be expensive, need to be connected to a computer, and often require proprietary software to acquire and process images. Another novel approach for capturing digital microscopic images is to use smartphones coupled with the eyepiece of a microscope. Recently, several smartphone adapters have emerged that allow users to attach mobile phones to the microscope. The aim of this study was to test the utility of these various smartphone adapters. We surveyed the market for adapters to attach smartphones to the ocular lens of a conventional light microscope. Three adapters (Magnifi, Skylight and Snapzoom) were tested. We assessed the designs of these adapters and their effectiveness at acquiring static microscopic digital images. All adapters facilitated the acquisition of digital microscopic images with a smartphone. The optimal adapter was dependent on the type of phone used. The Magnifi adapters for iPhone were incompatible when using a protective case. The Snapzoom adapter was easiest to use with iPhones and other smartphones even with protective cases. Smartphone adapters are inexpensive and easy to use for acquiring digital microscopic images. However, they require some adjustment by the user in order to optimize focus and obtain good quality images. Smartphone microscope adapters provide an economically feasible method of acquiring and sharing digital pathology photomicrographs.

  5. Digital citizens Digital nations: the next agenda

    NARCIS (Netherlands)

    A.W. (Bert) Mulder; M.W. (Martijn) Hartog

    2015-01-01

    DIGITAL CITIZENS CREATE A DIGITAL NATION Citizens will play the lead role as they – in the next phase of the information society – collectively create a digital nation. Personal adoption of information and communication technology will create a digital infrastructure that supports individual and

  6. The digital environment in men's sexual disorders

    DEFF Research Database (Denmark)

    García-Cruz, E; Romero-Otero, J; Fode, M

    2018-01-01

    CONTEXT: The revolution of digital technologies constitutes a new setting for the patient-physician relationship and provides patients with a scenario of privacy and universal access to a vast amount of information. However, there is little information on how digital resources are used and what...... their advantages and disadvantages are. OBJECTIVES: To explore the scope of the scientific research on the use of digital technology related to men's sexual disorders and to analyze the primary sources of digital information related to this field. ACQUISITION OF EVIDENCE: Systematic searches of the scientific...... to predefined indicators. SYNTHESIS OF EVIDENCE: The qualitative analysis of the scientific literature included 116 manuscripts; 47% were clinical studies based on online survey, 9% dealt with digital treatments, 11% with quality/safety of digital healthcare environment, 3% with digital activity, 21...

  7. The future of levies in a digital environment: final report

    NARCIS (Netherlands)

    Hugenholtz, P.B.; Guibault, L.; van Geffen, S.

    2003-01-01

    Copyright levy systems have been premised on the assumption that private copying of protected works cannot be controlled and exploited individually. With the advent of digital rights management (DRM), this assumption must be re-examined. In the digital environment, technical protection measures and

  8. Standards to open and interoperable digital libraries

    Directory of Open Access Journals (Sweden)

    Luís Fernando Sayão

    2007-12-01

    Full Text Available Interoperability is one of the main issues in creating a networked system of digital libraries. However, the interoperability as the way to accomplish data exchange and service collaboration requires adoption of a set of open standards covering all digital repository processes. The aim of this document is to revise the most important standards, protocols and the best pratices that form the framework to an open and fully interoperable digital library.

  9. Methods of digital image processing

    International Nuclear Information System (INIS)

    Doeler, W.

    1985-01-01

    Increasing use of computerized methods for diagnostical imaging of radiological problems will open up a wide field of applications for digital image processing. The requirements set by routine diagnostics in medical radiology point to picture data storage and documentation and communication as the main points of interest for application of digital image processing. As to the purely radiological problems, the value of digital image processing is to be sought in the improved interpretability of the image information in those cases where the expert's experience and image interpretation by human visual capacities do not suffice. There are many other domains of imaging in medical physics where digital image processing and evaluation is very useful. The paper reviews the various methods available for a variety of problem solutions, and explains the hardware available for the tasks discussed. (orig.) [de

  10. Open data and digital morphology

    Science.gov (United States)

    Davies, Thomas G.; Cunningham, John A.; Asher, Robert J.; Bates, Karl T.; Bengtson, Stefan; Benson, Roger B. J.; Boyer, Doug M.; Braga, José; Dong, Xi-Ping; Evans, Alistair R.; Friedman, Matt; Garwood, Russell J.; Goswami, Anjali; Hutchinson, John R.; Jeffery, Nathan S.; Lebrun, Renaud; Martínez-Pérez, Carlos; O'Higgins, Paul M.; Orliac, Maëva; Rowe, Timothy B.; Sánchez-Villagra, Marcelo R.; Shubin, Neil H.; Starck, J. Matthias; Stringer, Chris; Summers, Adam P.; Sutton, Mark D.; Walsh, Stig A.; Weisbecker, Vera; Witmer, Lawrence M.; Wroe, Stephen; Yin, Zongjun

    2017-01-01

    Over the past two decades, the development of methods for visualizing and analysing specimens digitally, in three and even four dimensions, has transformed the study of living and fossil organisms. However, the initial promise that the widespread application of such methods would facilitate access to the underlying digital data has not been fully achieved. The underlying datasets for many published studies are not readily or freely available, introducing a barrier to verification and reproducibility, and the reuse of data. There is no current agreement or policy on the amount and type of data that should be made available alongside studies that use, and in some cases are wholly reliant on, digital morphology. Here, we propose a set of recommendations for minimum standards and additional best practice for three-dimensional digital data publication, and review the issues around data storage, management and accessibility. PMID:28404779

  11. Cyber Threat and vulnerability Analysis for Digital Assets of NPPs

    International Nuclear Information System (INIS)

    Oh, Eun Se; Seo, In Yong; Kim, See Hong

    2009-01-01

    Today's computer and communication technology breakthrough make increase plant floor replacement from analog instrumentation and control systems of nuclear power plants to a full-fledged digital system . The rich functionality and crisp accuracy are one of big advantages of digital technology adaptation, but use of open networks and inherited shared system resources (memory, network, etc.) are well known weak points of digital system. Intended or un-intended cyber attack throughout power plant digital control system's weak point may result to wide area of system failures and that easily defeats system operation and multiple protection safeguards. Well organized cyber security analysis for nuclear plant digital control systems (digital assets) are required

  12. Digital fluorimeter

    International Nuclear Information System (INIS)

    Mello, H.A. de.

    1980-11-01

    The specifications of a digital fluorimeter. That with adequated analytical techniques permits to determine trace amounts of fluorescents materials in samples, are described. The fluorimeter is of the reflection type, and uses fluorescents lamps for the excitation and an optical system which is connected to a photomultiplyer machine and permits the measurement of the light intensity. In the case of IEN (Instituto de Engenharia Nuclear) the equipment is used for to determine the uranium content in sample materials to be exported. The precision of the instrument is about + - 1% in the scale of 0.1 which is the normally one used in the current researchs. (E.G.) [pt

  13. Digital entrepreneurship

    DEFF Research Database (Denmark)

    Brem, Alexander; Richter, Chris; Kraus, Sascha

    2017-01-01

    comprising guided interviews with 14 companies from Germany, Austria and Switzerland provides detailed insights into different aspects of the sharing economy phenomenon. Our results make a direct contribution to sharing economy research, especially regarding the new business models of start-ups. Here, we...... find a clear difference between the relevance of economic and social orientation. The latter appears to be in higher demand among customers than entrepreneurs. The increasingly digitalized environment has led to a changed living situation characterized by urbanity, openness to new solutions, changed...

  14. Focus: Digital

    DEFF Research Database (Denmark)

    Technology has been an all-important and defining element within the arts throughout the 20th century, and it has fundamentally changed the ways in which we produce and consume music. With this Focus we investigate the latest developments in the digital domain – and their pervasiveness and rapid...... production and reception of contemporary music and sound art. With ‘Digital’ we present four composers' very different answers to how technology impact their work. To Juliana Hodkinson it has become an integral part of her sonic writing. Rudiger Meyer analyses the relationships between art and design and how...

  15. DURAND NEIGHBOURHOOD HERITAGE INVENTORY: TOWARD A DIGITAL CITYWIDE SURVEY APPROACH TO HERITAGE PLANNING IN HAMILTON

    Directory of Open Access Journals (Sweden)

    V. Angel

    2017-08-01

    Full Text Available In the face of changing economies and patterns of development, the definition of heritage is diversifying, and the role of inventories in local heritage planning is coming to the fore. The Durand neighbourhood is a layered and complex area located in inner-city Hamilton, Ontario, Canada, and the second subject area in a set of pilot inventory studies to develop a new city-wide inventory strategy for the City of Hamilton,. This paper presents an innovative digital workflow developed to undertake the Durand Built Heritage Inventory project. An online database was developed to be at the centre of all processes, including digital documentation, record management, analysis and variable outputs. Digital tools were employed for survey work in the field and analytical work in the office, resulting in a GIS-based dataset that can be integrated into Hamilton’s larger municipal planning system. Together with digital mapping and digitized historical resources, the Durand database has been leveraged to produce both digital and static outputs to shape recommendations for the protection of Hamilton’s heritage resources.

  16. Durand Neighbourhood Heritage Inventory: Toward a Digital Citywide Survey Approach to Heritage Planning in Hamilton

    Science.gov (United States)

    Angel, V.; Garvey, A.; Sydor, M.

    2017-08-01

    In the face of changing economies and patterns of development, the definition of heritage is diversifying, and the role of inventories in local heritage planning is coming to the fore. The Durand neighbourhood is a layered and complex area located in inner-city Hamilton, Ontario, Canada, and the second subject area in a set of pilot inventory studies to develop a new city-wide inventory strategy for the City of Hamilton,. This paper presents an innovative digital workflow developed to undertake the Durand Built Heritage Inventory project. An online database was developed to be at the centre of all processes, including digital documentation, record management, analysis and variable outputs. Digital tools were employed for survey work in the field and analytical work in the office, resulting in a GIS-based dataset that can be integrated into Hamilton's larger municipal planning system. Together with digital mapping and digitized historical resources, the Durand database has been leveraged to produce both digital and static outputs to shape recommendations for the protection of Hamilton's heritage resources.

  17. Digital LLRF System for RFQ

    International Nuclear Information System (INIS)

    Agashe, Alok; Motiwala, P.D.; Bharade, S.K.; Mohan, Shyam; Joshi, Gopal; Das, D.

    2015-01-01

    A Low level RF (LLRF) system based on digital techniques has been developed for RFQ of Low Energy High Intensity Proton Accelerator (LEHIPA). The basic LLRF system for RFQ is composed of a Front end analog module housed in a 19 inch bin and a 6U cPCI based Digital board having a high speed and high density FPGA onboard, supporting 32 bit/33MHz PCI ver2.0 protocol and housed in a 19 inch cPCI crate. It also has a cPCI based CPU board with QNX operating system. The cPCI crate is connected to control room via Ethernet. Analog module conditions the input field signals from RF cavity and makes it compatible to digital board. It also amplifies RF Drive signal (Modulator output) from digital board, which goes to high power amplifier. The digital board digitally processes the input RF signals, and generates RF drive signal, which after amplification, used for driving the resonant cavity. The main features of digital board are under-sampling of input RF signals, digital in-phase and quadrature detection, and a proportional- integral (PI) controller algorithm implemented in a FPGA. The LLRF system works in CW as well as in PULSE mode. It also has a DDS implemented in VHDL, used for conditioning and tracking/tuning of the cavity. LLRF system operates under QNX based equipment frontend application and client running from control room. One analog module and one digital board set, supports one resonant cavity. The present paper describes the development of an LLRF system and its results with a test cavity. (author)

  18. Certification of digital system software

    International Nuclear Information System (INIS)

    Waclo, J.; Cook, B.; Adomaitis, D.

    1991-01-01

    The activities involved in the successful application of digital systems to Nuclear Protection functions is not achieved through happenstance. At Westinghouse there has been a longstanding program to utilize digital state of the art technology for protection system advancement. Thereby gaining the advantages of increased system reliability, performance, ease of operation and reduced maintenance costs. This paper describes the Westinghouse background and experience in the safety system software development process, including Verification and Validation, and its application to protection system qualification and the successful use for licensing the Eagle 21 Digital Process Protection System Upgrade. In addition, the lessons learned from this experience are discussed from the perspective of improving the development process through applying feedback of the measurements made on the process and the software product quality. The goal of this process optimization is to produce the highest possible software quality while recognizing the real world constraints of available resources, project schedule and the regulatory policies that are customary in the nuclear industry

  19. Digital Humanities

    DEFF Research Database (Denmark)

    Nielsen, Hans Jørn

    2015-01-01

    overgangen fra trykkekultur til digital kultur. For det første problemstillingen omkring digitalisering af litterær kulturarv med fokus på kodning og tagging af teksten samt organisering i hypertekststrukturer. For det andet reorganiseringen af det digitale dokument i dataelementer og database. For det......Artiklen præsenterer først nogle generelle problemstillinger omkring Digital Humanities (DH) med det formål at undersøge dem nærmere i relation til konkrete eksempler på forskellige digitaliseringsmåder og ændringer i dokumentproduktion. I en nærmere afgrænsning vælger artiklen den tendens i DH......, der betragter DH som forbundet med "making" og "building" af digitale objekter og former. Dette kan også karakteriseres som DH som praktisk-produktiv vending. Artiklen har valgt tre typer af digitalisering. De er valgt ud fra, at de skal repræsentere forskellige måder at håndtere digitaliseringen på...

  20. Introduction of the digitization software GDgraph

    International Nuclear Information System (INIS)

    Chen Guochang; Jin Yongli; Wang Jimin

    2015-01-01

    The evaluators and experimenters always desire to have full and latest experimental data sets. However, the data are often published as figures without any numerical values for some publications or journals. Furthermore, the quality of figures is not always good enough, especially for some figures scanned from the hard copy of old publications. On the other hand, the researchers would like to retrieve the data directly from EXFOR database. Digitization of figures is only one method to obtain the numerical data and correlative uncertainty, when there are only figures available from publications. Therefore we need a digitization tool to fit the requirements from evaluation, measurement and EXFOR compilation in CNDC. Before 2000, there have no common software to digitize experimental and evaluated data. And the quality of digitization results can not fit the requirements of evaluation and measurement using the traditional coordinate paper or rule. The end of twenty century, the PC was developed so quickly that to develop a software for digitization purpose become possible. Since 1997, CNDC devotes to design and develop a software for digitization. Four years later, the first version of digitization software GDGraph was developed using VC++ and released in CNDC. Although, the functions of the 1 st version of GDGraph is fit the basic requirements of digitization only, in which can digitize one group data excluding data error, BMP image format only, and it can not randomly delete digitizing data points. However, it obtains higher quality digitizing results and efficiency than the traditional method

  1. Childhood and fantasy game in the digital world

    Directory of Open Access Journals (Sweden)

    Lluís Andreu Bertran

    2015-04-01

    Full Text Available We begin with questions that offer multiple answers and open a debate which will give a more complete answer with richer content when possible. Who sets the rules to play in the Children’s digital world? Who sets the limits of this digital world for a child to play learn or communicate? The child interacts with the digital world: games, social networks, web surfing,... with rules that establish a commitment with those who do not agree with them, they lead to a "free" associative, cognitive and emotional movement. Thereby, does the child play with computers or does he grow up with them? Since there are no explicit rules we would be wrong to think that this implies the absence of any mandatory rule. This universal rule which we believe to exist in every child, could be included either in its "Self" or in his fantasy in very distinct ways and different consequences. Would it be risky to state that for a child "to play is to play" regardless of origin of the rules? Are we therefore facing the dilemma of objective and subjective rules in their development and understanding? Should we offer them as many objectivity inputs as possible in order to neutralize, redirect or ban the subjectivity and fantasy the interaction involves with the digital world, which can be even perverse in the worst case scenario? It is essential for us to think that the child’s protection towards the digital world will happen in all the situations where he can understand and assume as a rule from his "Self". We have to take on count that from his "Self” and his "Not-Self" there is a fantasy open space that can bring wealth but also a lot of danger for him. If he is abandoned to his fate and the interaction is performed from the position of "Not-Self", the danger of being alone in the digital world with nothing protects him, can have consequences during his development with incalculable damages.

  2. Land Treatment Digital Library

    Science.gov (United States)

    Pilliod, David S.; Welty, Justin L.

    2013-01-01

    The Land Treatment Digital Library (LTDL) was created by the U.S. Geological Survey to catalog legacy land treatment information on Bureau of Land Management lands in the western United States. The LTDL can be used by federal managers and scientists for compiling information for data-calls, producing maps, generating reports, and conducting analyses at varying spatial and temporal scales. The LTDL currently houses thousands of treatments from BLM lands across 10 states. Users can browse a map to find information on individual treatments, perform more complex queries to identify a set of treatments, and view graphs of treatment summary statistics.

  3. The politics of digits

    DEFF Research Database (Denmark)

    Olsen, Asmus Leth

    2013-01-01

    -endings data. Second, nine-ending and other higher-end decimals are found to be over-represented which echoes odd pricing research. It suggests that incumbents take voters’ biases into account and apply odd taxes to minimize the political costs of taxation while maximizing revenue. Attention should be given......From the concept of odd pricing, i.e., setting rightmost price digits below a whole number, this paper advances the political counterpart of odd taxation using a panel of Danish municipal taxes. First, the distribution of tax decimals is non-uniform and resembles the distribution of price...

  4. Automatic sets and Delone sets

    International Nuclear Information System (INIS)

    Barbe, A; Haeseler, F von

    2004-01-01

    Automatic sets D part of Z m are characterized by having a finite number of decimations. They are equivalently generated by fixed points of certain substitution systems, or by certain finite automata. As examples, two-dimensional versions of the Thue-Morse, Baum-Sweet, Rudin-Shapiro and paperfolding sequences are presented. We give a necessary and sufficient condition for an automatic set D part of Z m to be a Delone set in R m . The result is then extended to automatic sets that are defined as fixed points of certain substitutions. The morphology of automatic sets is discussed by means of examples

  5. Digital stereoscopic imaging

    Science.gov (United States)

    Rao, A. Ravishankar; Jaimes, Alejandro

    1999-05-01

    The convergence of inexpensive digital cameras and cheap hardware for displaying stereoscopic images has created the right conditions for the proliferation of stereoscopic imagin applications. One application, which is of growing importance to museums and cultural institutions, consists of capturing and displaying 3D images of objects at multiple orientations. In this paper, we present our stereoscopic imaging system and methodology for semi-automatically capturing multiple orientation stereo views of objects in a studio setting, and demonstrate the superiority of using a high resolution, high fidelity digital color camera for stereoscopic object photography. We show the superior performance achieved with the IBM TDI-Pro 3000 digital camera developed at IBM Research. We examine various choices related to the camera parameters, image capture geometry, and suggest a range of optimum values that work well in practice. We also examine the effect of scene composition and background selection on the quality of the stereoscopic image display. We will demonstrate our technique with turntable views of objects from the IBM Corporate Archive.

  6. Foundations of hardware IP protection

    CERN Document Server

    Torres, Lionel

    2017-01-01

    This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection. · Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP; · Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security; · Introduce designers to the concept of salutar...

  7. Business models for digital repositories

    CERN Document Server

    CERN. Geneva; Bjørnshauge, Lars

    2007-01-01

    Those setting up, or planning to set up, a digital repository may be interested to know more about what has gone before them. What is involved, what is the cost, how many people are needed, how have others made the case to their institution, and how do you get anything into it once it is built? I have recently undertaken a study of European repository business models for the DRIVER project and will present an overview of the findings.

  8. Reactor protection systems of 500 MWe PHWRs

    Energy Technology Data Exchange (ETDEWEB)

    Mallik, G; Kelkar, M G; Apte, Ravindra [C and I Group, Nuclear Power Corporation, Mumbai (India)

    1997-03-01

    The 500 MWe PHWR has two totally independent, diverse, fast acting shutdown system called Shutdown System 1 (SDS 1) and Shutdown System 2 (SDS 2). The trip generation circuitry of SDS 1 and SDS 2 are known as Reactor Protection System 1 (RPS 1) and Reactor Protection System 2 (RPS 2) respectively. Some of the features specific to 500 MWe reactors are Core Over Power Protection System (COPPS) based upon in core Self Powered Neutron Detector (SPND) signals, use of local two out of three coincidence logic and adoption of overlap testing for RPS 2, use of Fine Impulse Testing (FIT) in RPS 2, testing of the final control elements namely electro-magnetic clutch of individual Shutoff Rods (SRs) of SDS 1 and all the fast acting valves of SDS 2, etc. The two shutdown systems have totally separate sets of sensors and associated signal processing circuitry as well as physical arrangements. A separate computerised test and monitoring unit is used for each of the two shutdown systems. Use of Programmable Digital Comparator (PDC) unit exclusively for reactor protection systems, has been adopted. The capability of PDC unit is enhanced and communication links are provided for its integration in over all system. The paper describes the design features of reactor protection systems. (author). 3 refs., 7 figs., 3 tabs.

  9. Soldier Flexible Personal Digital Assistant Program

    National Research Council Canada - National Science Library

    Price, Mark; Woytowich, Jason; Carlson, Marc

    2008-01-01

    The main goal of the Soldier Flexible Personal Digital Assistant Program was to develop prototypes of a novel flexible display technology device for demonstration in a laboratory setting and use in Future Force Warrior (FFW) demonstrations...

  10. USDA-FSA-APFO Digital Ortho Mosaic

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — This data set contains imagery from the National Agricultural Imagery Program (NAIP). NAIP acquires digital ortho imagery during the agricultural growing seasons in...

  11. Chromatic Dispersion Estimation in Digital Coherent Receivers

    DEFF Research Database (Denmark)

    Soriano, Ruben Andres; Hauske, Fabian N.; Guerrero Gonzalez, Neil

    2011-01-01

    Polarization-diverse coherent demodulation allows to compensate large values of accumulated linear distortion by digital signal processing. In particular, in uncompensated links without optical dispersion compensation, the parameter of the residual chromatic dispersion (CD) is vital to set...

  12. NAIP Digital Ortho Photo Image 2010

    Data.gov (United States)

    Kansas Data Access and Support Center — This data set contains imagery from the National Agriculture Imagery Program (NAIP). NAIP acquires digital ortho imagery during the agricultural growing seasons in...

  13. Digital radiography

    DEFF Research Database (Denmark)

    Precht, H; Gerke, O; Rosendahl, K

    2012-01-01

    BACKGROUND: New developments in processing of digital radiographs (DR), including multi-frequency processing (MFP), allow optimization of image quality and radiation dose. This is particularly promising in children as they are believed to be more sensitive to ionizing radiation than adults....... OBJECTIVE: To examine whether the use of MFP software reduces the radiation dose without compromising quality at DR of the femur in 5-year-old-equivalent anthropomorphic and technical phantoms. MATERIALS AND METHODS: A total of 110 images of an anthropomorphic phantom were imaged on a DR system (Canon DR...... with CXDI-50 C detector and MLT[S] software) and analyzed by three pediatric radiologists using Visual Grading Analysis. In addition, 3,500 images taken of a technical contrast-detail phantom (CDRAD 2.0) provide an objective image-quality assessment. RESULTS: Optimal image-quality was maintained at a dose...

  14. Fokus: Digital

    DEFF Research Database (Denmark)

    2014-01-01

    i det digitale domæne – udviklinger, der foregår hastigt og er gennemgribende, og som derfor kræver et nærmere blik på forholdet mellem kunsten og teknologien. Komponistens forståelse af sin metier udfordres – samtidig med at befæstede ideer om kunstværket møder modstand fra nye mediemæssige...... sammenhænge og fra forandrede distributionsformer. Dette betyder ændrede betingelser for både produktion og reception af kunstmusik og lydkunst. Med Digital tager vi udgangspunkt i fire komponisters meget forskellige bud på hvordan teknologien spiller en rolle i arbejdet. Juliana Hodkinson beskriver hvordan...

  15. Digital atlas of Oklahoma

    Science.gov (United States)

    Rea, A.H.; Becker, C.J.

    1997-01-01

    This compact disc contains 25 digital map data sets covering the State of Oklahoma that may be of interest to the general public, private industry, schools, and government agencies. Fourteen data sets are statewide. These data sets include: administrative boundaries; 104th U.S. Congressional district boundaries; county boundaries; latitudinal lines; longitudinal lines; geographic names; indexes of U.S. Geological Survey 1:100,000, and 1:250,000-scale topographic quadrangles; a shaded-relief image; Oklahoma State House of Representatives district boundaries; Oklahoma State Senate district boundaries; locations of U.S. Geological Survey stream gages; watershed boundaries and hydrologic cataloging unit numbers; and locations of weather stations. Eleven data sets are divided by county and are located in 77 county subdirectories. These data sets include: census block group boundaries with selected demographic data; city and major highways text; geographic names; land surface elevation contours; elevation points; an index of U.S. Geological Survey 1:24,000-scale topographic quadrangles; roads, streets and address ranges; highway text; school district boundaries; streams, river and lakes; and the public land survey system. All data sets are provided in a readily accessible format. Most data sets are provided in Digital Line Graph (DLG) format. The attributes for many of the DLG files are stored in related dBASE(R)-format files and may be joined to the data set polygon attribute or arc attribute tables using dBASE(R)-compatible software. (Any use of trade names in this publication is for descriptive purposes only and does not imply endorsement by the U.S. Government.) Point attribute tables are provided in dBASE(R) format only, and include the X and Y map coordinates of each point. Annotation (text plotted in map coordinates) are provided in AutoCAD Drawing Exchange format (DXF) files. The shaded-relief image is provided in TIFF format. All data sets except the shaded

  16. The Apparatus of Digital Archaeology

    Directory of Open Access Journals (Sweden)

    Jeremy Huggett

    2017-06-01

    Full Text Available Digital Archaeology is predicated upon an ever-changing set of apparatuses – technological, methodological, software, hardware, material, immaterial – which in their own ways and to varying degrees shape the nature of Digital Archaeology. Our attention, however, is perhaps inevitably more closely focused on research questions, choice of data, and the kinds of analyses and outputs. In the process we tend to overlook the effects the tools themselves have on the archaeology we do beyond the immediate consequences of the digital. This article introduces cognitive artefacts as a means of addressing the apparatus more directly within the context of the developing archaeological digital ecosystem. It argues that a critical appreciation of our computational cognitive artefacts is key to understanding their effects on both our own cognition and on the creation of archaeological knowledge. In the process, it defines a form of cognitive digital archaeology in terms of four distinct methods for extracting cognition from the digital apparatus layer by layer.

  17. Hausdorff dimension of certain sets arising in Engel expansions

    Science.gov (United States)

    Fang, Lulu; Wu, Min

    2018-05-01

    The present paper is concerned with the Hausdorff dimension of certain sets arising in Engel expansions. In particular, the Hausdorff dimension of the set is completely determined, where A n (x) can stand for the digit, gap and ratio between two consecutive digits in the Engel expansion of x and ϕ is a positive function defined on natural numbers. These results significantly extend the existing results of Galambos’ open problems on the Hausdorff dimension of sets related to the growth rate of digits.

  18. Digital Modeling Phenomenon Of Surface Ground Movement

    Directory of Open Access Journals (Sweden)

    Ioan Voina

    2016-11-01

    Full Text Available With the development of specialized software applications it was possible to approach and resolve complex problems concerning automating and process optimization for which are being used field data. Computerized representation of the shape and dimensions of the Earth requires a detailed mathematical modeling, known as "digital terrain model". The paper aims to present the digital terrain model of Vulcan mining, Hunedoara County, Romania. Modeling consists of a set of mathematical equations that define in detail the surface of Earth and has an approximate surface rigorously and mathematical, that calculated the land area. Therefore, the digital terrain model means a digital representation of the earth's surface through a mathematical model that approximates the land surface modeling, which can be used in various civil and industrial applications in. To achieve the digital terrain model of data recorded using linear and nonlinear interpolation method based on point survey which highlights the natural surface studied. Given the complexity of this work it is absolutely necessary to know in detail of all topographic elements of work area, without the actions to be undertaken to project and manipulate would not be possible. To achieve digital terrain model, within a specialized software were set appropriate parameters required to achieve this case study. After performing all steps we obtained digital terrain model of Vulcan Mine. Digital terrain model is the complex product, which has characteristics that are equivalent to the specialists that use satellite images and information stored in a digital model, this is easier to use.

  19. Digital work in a digitally challenged organization

    NARCIS (Netherlands)

    Davison, R.M.; Ou, Carol

    Digitally literate employees are accustomed to having free access to digital media technologies. However, some organizations enact information technology (IT) governance structures that explicitly proscribe access to these technologies, resulting in considerable tension between employees and the

  20. Curve Digitizer – A software for multiple curves digitizing

    Directory of Open Access Journals (Sweden)

    Florentin ŞPERLEA

    2010-06-01

    Full Text Available The Curve Digitizer is software that extracts data from an image file representing a graphicand returns them as pairs of numbers which can then be used for further analysis and applications.Numbers can be read on a computer screen stored in files or copied on paper. The final result is adata set that can be used with other tools such as MSEXCEL. Curve Digitizer provides a useful toolfor any researcher or engineer interested in quantifying the data displayed graphically. The image filecan be obtained by scanning a document

  1. Demonstrating DREAM: A Digital Resource Exchange about Music

    Science.gov (United States)

    Upitis, Rena; Boese, Karen; Abrami, Philip C.

    2015-01-01

    The Digital Resource Exchange About Music (DREAM) is an online tool for exchanging information about digital learning tools for music education. DREAM was designed by our team to encourage music teachers to learn about digital resources related to learning to play a musical instrument, both in classroom and independent music studio settings. In…

  2. From Realities to Values: A Strategy Framework for Digital Natives

    Science.gov (United States)

    Blowers, Helene

    2010-01-01

    For many Digital Natives, text messaging or SMS is the communication channel of choice, but preferences in communication channels aren't the only distinguishing traits of Digital Natives. Attitudes and perceptions related to digital privacy, identity, creativity, piracy, and advocacy also help to set younger generations apart. So how does one take…

  3. USNA DIGITAL FORENSICS LAB

    Data.gov (United States)

    Federal Laboratory Consortium — To enable Digital Forensics and Computer Security research and educational opportunities across majors and departments. Lab MissionEstablish and maintain a Digital...

  4. Can We Teach Digital Natives Digital Literacy?

    Science.gov (United States)

    Ng, Wan

    2012-01-01

    In recent years, there has been much debate about the concept of digital natives, in particular the differences between the digital natives' knowledge and adoption of digital technologies in informal versus formal educational contexts. This paper investigates the knowledge about educational technologies of a group of undergraduate students…

  5. Influence of digitalization on labour relations

    Directory of Open Access Journals (Sweden)

    Jašarević Senad R.

    2016-01-01

    Full Text Available Modern information technology has brought a real revolution in all areas of life and work. The degree of 'digitization' is so great that some authors call this process 'digital revolution', and modern economy - 'digitized economy.' Although it is not so obvious, gradualy is forming a new society - 'digital capitalism'. For 'virtual employers', in the new - 'virtual economy', work 'digital workers' who are mainly invisible and deprived of their labour rights. That's why some call them - 'digital proletariat'. Labour law is slowly adapting to the new circumstances. An increasing number of people remain unprotected or poorly protected. It is necessary to completely re-examine and update the traditional concept of labor law, by expanding access of the labour law to the 'digital workers', modernizing the concept of employment, of an employee, worker, self-employee and employer. Digital technology should be converted into a 'fellow worker' (worker friendly and not a tool of a new form of exploitation. Otherwise, modern 'digitalized society' will turn into a 'community of rightless,' without social and economic perspective.

  6. Digital radiography in space.

    Science.gov (United States)

    Hart, Rob; Campbell, Mark R

    2002-06-01

    With the permanent habitation of the International Space Station, the planning of longer duration exploration missions, and the possibility of space tourism, it is likely that digital radiography will be needed in the future to support medical care in space. Ultrasound is currently the medical imaging modality of choice for spaceflight. Digital radiography in space is limited because of prohibitive launch costs (in the region of $20,000/kg) that severely restrict the volume, weight, and power requirements of medical care hardware. Technological increases in radiography, a predicted ten-fold decrease in future launch costs, and an increasing clinical need for definitive medical care in space will drive efforts to expand the ability to provide medical care in space including diagnostic imaging. Normal physiological responses to microgravity, in conjunction with the high-risk environment of spaceflight, increase the risk of injury and could imply an extended recovery period for common injuries. The advantages of gravity on Earth, such as the stabilization of patients undergoing radiography and the drainage of fluids, which provide radiographic contrast, are unavailable in space. This creates significant difficulties in patient immobilization and radiographic positioning. Gravity-dependent radiological signs, such as lipohemarthrosis in knee and shoulder trauma, air or fluid levels in pneumoperitoneum, pleural effusion, or bowel obstruction, and the apical pleural edge in pneumothorax become unavailable. Impaired healing processes such as delayed callus formation following fracture will have implications on imaging, and recovery time lines are unknown. The confined nature of spacecraft and the economic impossibility of launching lead-based personal protective equipment present significant challenges to crew radiation safety. A modified, free-floating radiographic C-arm device equipped with a digital detector and utilizing teleradiology support is proposed as a

  7. [Challenges of Digital Medicine].

    Science.gov (United States)

    Blaser, Jürg

    2018-06-01

    Challenges of Digital Medicine Abstract. Digitization is increasingly covering more and more sectors, including medicine. To ensure medical operation 365 × 24 hours, progressively more human and financial resources are necessary. The transformation of patient histories from paper into electronic patient records focused initially on documentation. Today, hospital information systems are increasingly used as a platform for the communication of all professionals involved in the patient process - in Switzerland, however, so far without providing patients direct access to their data. Digititizing processes intend to increase efficiency, but also to enhance clinical and administrative decision support and quality assurance. The introduction of the electronic patient record in Switzerland in 2020 is expected to provide cross-company, more complete documentation of patient care. Multimorbid patients, often treated in different institutions and by different specialists, should benefit from this in particular. Advances in artificial intelligence offer new opportunities in medicine. Challenges include ensuring reliable data protection, and better interoperability of the systems involved. Semantically structured, machine-readable data exchange is a necessity for both networked services and internationally competitive research.

  8. Digital reactivity meter

    International Nuclear Information System (INIS)

    Copie, M.; Valantic, B.

    1978-01-01

    Digital reactivity meters (DRM) are mostly used as measuring instruments, e.g. for calibration of control rods, and there are only a few cases of their incorporation into the control systems of the reactors. To move in this direction there is more development work needed. First of all, fast algorithms are needed for inverse kinetics equations to relieve the computer for more important tasks of reactor model solving in real time. The next problem, currently under investigation, is the incorporation of the reactor thermal-hydraulic model into the DRM so that it can be used in the power range. Such an extension of DHM allows presentation not only of the instantaneous reactivity of the system, but also the inserted reactivity can be estimated from the temperature reactivity feed-backs. One of the applications of this concept is the anomalous digital reactivity monitor (ADRN) as part of the reactor protection system. As a solution of the first problem, a fast algorithm for solving the inverse kinetics equations has been implemented in the off-line program RODCAL on CDC 1700 computer and tested for its accuracy by performing different control rod calibrations on the reactor TRIGA

  9. Column: The Science of Digital Forensics: Analysis of Digital Traces

    Directory of Open Access Journals (Sweden)

    Fred Cohen

    2012-09-01

    Full Text Available In part 1 of this series (Cohen, 2011a, Analysis of digital traces is a foundational process by which the examiner, typically using computer software tools, comes to understand and answer basic questions regarding digital traces.“Input sequences to digital systems produce outputs and state changes as a function of the previous state. To the extent that the state or outputs produce stored and/or captured bit sequences, these form traces of the event sequences that caused them. Thus the definition of a trace may be stated as: "A set of bit sequences produced from the execution of a finite state machine."(see PDF for full column

  10. Digital produktion

    DEFF Research Database (Denmark)

    Bogen sætter fokus på digital produktion, som er en stærk læringsform, der faciliterer elevernes læreprocesser og kvalificerer elevernes faglige læringsresultater. Det sker når lærerne udarbejder didaktiske rammedesign, hvor eleverne arbejder selvstændigt inden for dette rammedesign, og hvor mål og...... procesevaluering stilladserer elevernes faglige proces. I digitale produktionsprocesser arbejder eleverne iterativt, de udvikler ejerskab til produktionen og fastholder selv deres læreprocesser. It’s multimodalitet, elevernes kollaborative tilgange, videndeling mellem eleverne og elevernes uformelle lege- og...... elevernes digitale produktion er lærernes didaktiske rammesætning og stilladserende tilgange. Her lægger lærerne op til, at eleverne som didaktiske designere i relation til rammesætningen skal organisere og planlægge deres læreprocesser, inddrages i målsætning, evaluering og valg af digitale ressourcer...

  11. Digital dannelse

    DEFF Research Database (Denmark)

    Bundsgaard, Jeppe

    2012-01-01

    I al vores iver efter at få presset nogle flere digitale dimser ind i skolen, er vi i fare for at glemme hvad det er vi skal med disse dimser. Der er store forventninger til at de kan gøre det lettere at være lærer (og dermed billigere), og det kan det måske. Men der er jo også et dannelsesspørgs......I al vores iver efter at få presset nogle flere digitale dimser ind i skolen, er vi i fare for at glemme hvad det er vi skal med disse dimser. Der er store forventninger til at de kan gøre det lettere at være lærer (og dermed billigere), og det kan det måske. Men der er jo også et...... dannelsesspørgsmål knyttet til it. Hvad er egentlig digital dannelse? Og hvad betyder det for danskfaget?...

  12. Digital forensics digital evidence in criminal investigations

    CERN Document Server

    Marshall, Angus McKenzie

    2009-01-01

    The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements "traditional" scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations. Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in s

  13. The Challenges of Designing Digital Services for Multiple Mobile Platforms

    DEFF Research Database (Denmark)

    Ghazawneh, Ahmad

    2016-01-01

    on a multiple case study of three mobile application development firms from Sweden, Denmark and Norway, we synthesize the digital service design taxonomy to understand the challenges faced by third-party developers. Our study identifies a set of challenges in four different levels: user level, platform level...... to tap into and join the digital ecosystem. However, while there is an emerging literature on designing digital services, little empirical evidence exists about challenges faced by third-party developers while designing digital services, and in particular for multiple mobile platforms. Drawing......The value of digital services is increasingly recognized by owners of digital platforms. These services have central role in building and sustaining the business of the digital platform. In order to sustain the design of digital services, owners of digital platforms encourage third-party developers...

  14. DIGITAL LIBRARIES IN INDONESIA WITH SPECIAL EMPHASIS TO ACADEMIC LIBRARIES

    OpenAIRE

    Sulistiyo Basuki

    2012-01-01

    There are many definitions about digital library, however, this paper used the definition taken from Digital Library Federation which stated that digital library as organizations that provide the resources, including the specialized staff, to select, structure, offer intellectual access to interpret, distribute, preserve the integrity of, and ensure the persistence over time of collections of digital works so that they are readily and economically available for use by defined community or set...

  15. Digital platforms as enablers for digital transformation

    DEFF Research Database (Denmark)

    Hossain, Mokter; Lassen, Astrid Heidemann

    transformation is crucial. This study aims at exploring how organizations are driven towards transformation in various ways to embrace digital platforms for ideas, technologies, and knowledge. It shows the opportunities and challenges digital platforms bring in organizations. It also highlights underlying......Digital platforms offer new ways for organizations to collaborate with the external environment for ideas, technologies, and knowledge. They provide new possibilities and competence but they also bring new challenges for organizations. Understanding the role of these platforms in digital...... mechanisms and potential outcomes of various digital platforms. The contribution of the submission is valuable for scholars to understand and further explore this area. It provides insight for practitioners to capture value through digital platforms and accelerate the pace of organizations’ digital...

  16. Digitizing the Non-Digital: Creating a Global Context for Events, Artifacts, Ideas, and Information

    Directory of Open Access Journals (Sweden)

    Deborah L. MacPherson

    2006-06-01

    Full Text Available This paper discusses some of the problems associated with search and digital-rights management in the emerging age of interconnectivity. An open-source system called Context Driven Topologies (CDT is proposed to create one global context of geography, knowledge domains, and Internet addresses, using centralized spatial databases, geometry, and maps. The same concept can be described by different words, the same image can be interpreted a thousand ways by every viewer, but mathematics is a set of rules to ensure that certain relationships or sequences will be precisely regenerated. Therefore, unlike most of today’s digital records, CDTs are based on mathematics first, images second, words last. The aim is to permanently link the highest quality events, artifacts, ideas, and information into one record documenting the quickest paths to the most relevant information for specific data, users, and tasks. A model demonstration project using CDT to organize, search, and place information in new contexts while protecting the authors’ intent is also introduced.

  17. Could digital imaging be an alternative for digital colorimeters?

    Science.gov (United States)

    Caglar, Alper; Yamanel, Kivanc; Gulsahi, Kamran; Bagis, Bora; Ozcan, Mutlu

    2010-12-01

    This study evaluated the colour parameters of composite and ceramic shade guides determined using a colorimeter and digital imaging method with illuminants at different colour temperatures. Two different resin composite shade guides, namely Charisma (Heraeus Kulzer) and Premise (Kerr Corporation), and two different ceramic shade guides, Vita Lumin Vacuum (VITA Zahnfabrik) and Noritake (Noritake Co.), were evaluated at three different colour temperatures (2,700 K, 2,700-6,500 K, and 6500 K) of illuminants. Ten shade tabs were selected (A1, A2, A3, A3,5, A4, B1, B2, B3, C2 and C3) from each shade guide. CIE Lab values were obtained using digital imaging and a colorimeter (ShadeEye NCC Dental Chroma Meter, Shofu Inc.). The data were analysed using two-way ANOVA, and Pearson's correlation. While mean L* values of both composite and ceramic shade guides were not affected from the colour temperature, L* values obtained with the colorimeter showed significantly lower values than those of the digital imaging (p colorimeter and digital imaging did not show significant differences (p > 0.05). For both composite and ceramic shade guides, L* and b* values obtained from colorimeter and digital imaging method presented a high level of correlation. High-level correlations were also acquired for a* values in all shade guides except for the Charisma composite shade guide. Digital imaging method could be an alternative for the colorimeters unless the proper object-camera distance, digital camera settings and suitable illumination conditions could be supplied. However, variations in shade guides, especially for composites, may affect the correlation.

  18. Digital readout alpha survey instrument

    International Nuclear Information System (INIS)

    Jacobs, M.E.

    1976-01-01

    A prototype solid-state digital readout alpha particle survey instrument has been designed and constructed. The meter incorporates a Ludlum alpha scintillator as a detector, digital logic circuits for control and timing, and a Digilin counting module with reflective liquid crystal display. The device is used to monitor alpha radiation from a surface. Sample counts are totalized over 10-second intervals and displayed digitally in counts per minute up to 19,999. Tests over source samples with counts to 15,600 cpm have shown the device to be rapid, versatile and accurate. The instrument can be fabricated in one man-week and requires about $835 in material costs. A complete set of drawings is included

  19. H. Sapiens Digital: From Digital Immigrants and Digital Natives to Digital Wisdom

    Science.gov (United States)

    Prensky, Marc

    2009-01-01

    As we move further into the 21st century, the digital native/digital immigrant paradigm created by Marc Prensky in 2001 is becoming less relevant. In this article, Prensky suggests that we should focus instead on the development of what he calls "digital wisdom." Arguing that digital technology can make us not just smarter but truly wiser, Prensky…

  20. Dual beam vidicon digitizer

    International Nuclear Information System (INIS)

    Evans, T.L.

    1976-01-01

    A vidicon waveform digitizer which can simultaneously digitize two independent signals has been developed. Either transient or repetitive waveforms can be digitized with this system. A dual beam oscilloscope is used as the signal input device. The light from the oscilloscope traces is optically coupled to a television camera, where the signals are temporarily stored prior to digitizing

  1. Digital Natives, Digital Immigrants: An Analysis of Age and ICT Competency in Teacher Education

    Science.gov (United States)

    Guo, Ruth Xiaoqing; Dobson, Teresa; Petrina, Stephen

    2008-01-01

    This article examines the intersection of age and ICT (information and communication technology) competency and critiques the "digital natives versus digital immigrants" argument proposed by Prensky (2001a, 2001b). Quantitative analysis was applied to a statistical data set collected in the context of a study with over 2,000 pre-service…

  2. Digitalization in a Mandatory Implementation Context : How digitalization is achieved in practice and the elements that affect it

    OpenAIRE

    Velsberg, Ott

    2016-01-01

    Healthcare around the world is facing strenuous times, whereby there is a need for reduced costs, improved efficiency, and effectiveness. Digitalization is a transformational phenomenon argued to solve the many problems of healthcare. As of such, this thesis studies digitalization in a healthcare setting - considering how digitalization is achieved in practice, and what elements hamper and enable sociotechnical changes required for digitalization. To study these aspects, a qualitative case st...

  3. Progress in digital radiography

    International Nuclear Information System (INIS)

    Cappelle, A.

    2016-01-01

    Because of its practical aspect digital radiography is more and more used in the industrial sector. There are 2 kinds of digital radiography. First, the 'computed radiography' that uses a photon-stimulated screen, and after radiation exposure this screen must be read by an analyser to get a digit image. The second type is the 'direct radiography' that allows one to get a digit radiograph of the object directly. Digital radiography uses the same radioactive nuclides as radiography with silver films: cobalt, iridium or selenium. The spatial resolution of digital radiography is less good than with classical silver film radiography but digital radiography offers a better visual contrast. (A.C.)

  4. Power system protection

    International Nuclear Information System (INIS)

    Venkata, S.S.; Damborg, M.J.; Jampala, A.K.

    1991-01-01

    Power systems of the 21st century will be more modern, and complex, utilizing the latest available technologies. At the same time, generating plants will have to operate with minimal spinning margins and energy transportation has to take place at critical levels due to environmental and economical constraints. These factors dictate that the power systems be protected with optimum sensitivity, selectivity and time of operation to assure maximum reliability, and security at minimal cost. With an increasing role played by digital computers in every aspect of protection, it is important to take a critical and fresh look at the art and science of relaying and protection. The main objective of this paper is to review the past, present and future of power system protection from a software point of view

  5. Validation of reactor core protection system

    International Nuclear Information System (INIS)

    Lee, Sang-Hoon; Bae, Jong-Sik; Baeg, Seung-Yeob; Cho, Chang-Ho; Kim, Chang-Ho; Kim, Sung-Ho; Kim, Hang-Bae; In, Wang-Kee; Park, Young-Ho

    2008-01-01

    Reactor COre Protection System (RCOPS), an advanced core protection calculator system, is a digitized one which provides core protection function based on two reactor core operation parameters, Departure from Nucleate Boiling Ratio (DNBR) and Local Power Density (LPD). It generates a reactor trip signal when the core condition exceeds the DNBR or LPD design limit. It consists of four independent channels adapted a two-out-of-four trip logic. System configuration, hardware platform and an improved algorithm of the newly designed core protection calculator system are described in this paper. One channel of RCOPS was implemented as a single channel facility for this R and D project where we performed final integration software testing. To implement custom function blocks, pSET is used. Software test is performed by two methods. The first method is a 'Software Module Test' and the second method is a 'Software Unit Test'. New features include improvement of core thermal margin through a revised on-line DNBR algorithm, resolution of the latching problem of control element assembly signal and addition of the pre-trip alarm generation. The change of the on-line DNBR calculation algorithm is considered to improve the DNBR net margin by 2.5%-3.3%. (author)

  6. Digital Sensor Technology

    Energy Technology Data Exchange (ETDEWEB)

    Ted Quinn; Jerry Mauck; Richard Bockhorst; Ken Thomas

    2013-07-01

    The nuclear industry has been slow to incorporate digital sensor technology into nuclear plant designs due to concerns with digital qualification issues. However, the benefits of digital sensor technology for nuclear plant instrumentation are substantial in terms of accuracy, reliability, availability, and maintainability. This report demonstrates these benefits in direct comparisons of digital and analog sensor applications. It also addresses the qualification issues that must be addressed in the application of digital sensor technology.

  7. Digital preservation for heritages

    CERN Document Server

    Lu, Dongming

    2011-01-01

    ""Digital Preservation for Heritages: Technologies and Applications"" provides a comprehensive and up-to-date coverage of digital technologies in the area of cultural heritage preservation, including digitalization, research aiding, conservation aiding, digital exhibition, and digital utilization. Processes, technical frameworks, key technologies, as well as typical systems and applications are discussed in the book. It is intended for researchers and students in the fields of computer science and technology, museology, and archaeology. Dr. Dongming Lu is a professor at College of Computer Sci

  8. Radiological protection act, 1991

    International Nuclear Information System (INIS)

    1991-01-01

    This Act provides for the establishment of the Radiological Protection Institute of Ireland and dissolves An Bord Fuinnimh Nuicleigh (the Board), transferring its assets and liabilities to the Institute. It sets out a range of radiation protection measures to be taken by various Ministers in the event of a radiological emergency and gives effect at national level to the Assistance Convention, the Early Notification Convention and the Physical Protection Convention. The Institute is the competent Irish authority for the three Conventions. (NEA) [fr

  9. Cost Model for Digital Preservation: Cost of Digital Migration

    Directory of Open Access Journals (Sweden)

    Ulla Bøgvad Kejser

    2011-03-01

    Full Text Available The Danish Ministry of Culture has funded a project to set up a model for costing preservation of digital materials held by national cultural heritage institutions. The overall objective of the project was to increase cost effectiveness of digital preservation activities and to provide a basis for comparing and estimating future cost requirements for digital preservation. In this study we describe an activity-based costing methodology for digital preservation based on the Open Archice Information System (OAIS Reference Model. Within this framework, which we denote the Cost Model for Digital Preservation (CMDP, the focus is on costing the functional entity Preservation Planning from the OAIS and digital migration activities. In order to estimate these costs we have identified cost-critical activities by analysing the functions in the OAIS model and the flows between them. The analysis has been supplemented with findings from the literature, and our own knowledge and experience. The identified cost-critical activities have subsequently been deconstructed into measurable components, cost dependencies have been examined, and the resulting equations expressed in a spreadsheet. Currently the model can calculate the cost of different migration scenarios for a series of preservation formats for text, images, sound, video, geodata, and spreadsheets. In order to verify the model it has been tested on cost data from two different migration projects at the Danish National Archives (DNA. The study found that the OAIS model provides a sound overall framework for the cost breakdown, but that some functions need additional detailing in order to cost activities accurately. Running the two sets of empirical data showed among other things that the model underestimates the cost of manpower-intensive migration projects, while it reinstates an often underestimated cost, which is the cost of developing migration software. The model has proven useful for estimating the

  10. Agenda digital: e-Servicios sociales

    Directory of Open Access Journals (Sweden)

    M. Pilar Munuera Gomez

    2016-12-01

    Full Text Available Se presentan las líneas marcadas por la Agenda Digital Europea que pueden incorporarse en el sistema público de servicios sociales a través de la utilización de las Tecnologías de la Información y las Comunicaciones (TIC. Los objetivos marcados en sus planes pretenden mejorar las relaciones de los ciudadanos con las diferentes administraciones públicas. Los sistemas de protección social (seguridad social, educación, sanidad y empleo han iniciado este proceso alcanzado grandes mejoras en la atención de las necesidades de los ciudadanos. En España existen experiencias aisladas que pueden ser tomadas como referentes en la utilización de las nuevas tecnologías para mejorar el bienestar social desde la implementación de la atención que reciben los ciudadanos. Las TIC están transformado los sistemas de producción creando un mundo más globalizado sin fronteras, e incluso pueden facilitar la inclusión social de las personas a través del acceso a la información, la educación, el empleo, etc., y especialmente de las personas con discapacidad o situación de dependencia tanto a nivel nacional como internacional. Digital agenda: e-Social services The guidelines set by the European Digital Agenda that can be incorporated into the public social services system through the use of Information and Communication Technology (TIC are presented. The objectives set in their plans intend to improve relations between citizens and the different public administrations. The social protection systems (social security, education, health and employment have started this process making great improvements in care of the citizens needs. In Spain there are isolated experiences that can be taken as reference in the use of new technologies to improve social welfare with the implementation of care received by citizens. The TIC are transforming production systems creating a more globalized world without borders, and may even facilitate the social integration of

  11. The Effects of Activities for Digital Citizenship on Students’ Attitudes toward Digital Citizenship and Their Reflections on Students’ Understanding about Digital Citizenship

    Directory of Open Access Journals (Sweden)

    Hıdır KARADUMAN

    2014-05-01

    Full Text Available Advances in info-communication technologies have brought many social, cultural, and economic changes along across the world. Recent reflections of these changes over citizenship studies are noteworthy. One of the relevant concepts, digital citizenship can be defined as applying and advocating behaviors necessary for legal, ethical, safe, and responsible use of info-communication technologies in online settings (ISTE, 2007. Day by day, individuals are becoming more and more digital citizens with the spread of the Internet and digital communication devices. However, this gives rise to discussions about problems related with ethics, privacy and security, health, communication, and etc. (Symantec, 2010; Deniz, 2010; Kadll, Kumba & Kanamad, 2010; Gunduz & Ozdinc, 2008; Kabakci & Can, 2009. All these hot issues, debates, and current technological competence standards point that teachers should teach this concept to their students as efficiently as possible by adopting digital citizenship (Greenhow, 2010. Ribble (2006 states that this education can be carried out through 9 dimensions such as digital ethics, digital communication, digital literacy, digital access, digital commerce, digital rights and law, digital privacy and security, digital responsibility, and digital health & wellness.

  12. Zika Virus: Protecting Pregnant Women and Babies

    Science.gov (United States)

    ... Digital Press Kit Read the MMWR Science Clips Zika Virus Protecting Pregnant Women and Babies Language: English (US) ... Spanish) Recommend on Facebook Tweet Share Compartir Overview Zika virus infection (Zika) during pregnancy can cause damage to ...

  13. Cognitive Hacking and Digital Government: Digital Identity

    OpenAIRE

    Paul Thompson

    2004-01-01

    Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation syst...

  14. Digital Materialisms: Frameworks for Digital Media Studies

    OpenAIRE

    Casemajor, Nathalie

    2015-01-01

    Since the 1980s, digital materialism has received increasing interest in the field of media studies. Materialism as a theoretical paradigm assumes that all things in the world are tied to physical processes and matter. Yet within digital media studies, the understanding of what should be the core object of a materialist analysis is debated. This paper proposes to untangle some of the principal theoretical propositions that compose the field of digital materialism. It outlines six frameworks t...

  15. Research for the Influence of Distribution Network Line Reclosing Current on Line Protection

    Directory of Open Access Journals (Sweden)

    Yu Kansheng

    2016-01-01

    Full Text Available According to the distribution network line structure and reclosing control strategy, the system simulation model of distribution network lines has established based on the real-time digital simulation RTDS. Based on this, distribution network switching impulse current characteristic has researched with different capacity, different distribution and different load power factor under the different voltage switching angles. The results of the study provide a scientific basis for distribution network line protection setting, in order to further lay the foundation for improvement the validity and reliability of distribution network line protection action.

  16. BETA digital beta radiometer

    International Nuclear Information System (INIS)

    Borovikov, N.V.; Kosinov, G.A.; Fedorov, Yu.N.

    1989-01-01

    Portable transportable digital beta radiometer providing for measuring beta-decay radionuclide specific activity in the range from 5x10 -9 up to 10 -6 Cu/kg (Cu/l) with error of ±25% is designed and introduced into commercial production for determination of volume and specific water and food radioactivity. The device specifications are given. Experience in the BETA radiometer application under conditions of the Chernobyl' NPP 30-km zone has shown that it is convenient for measuring specific activity of the order of 10 -8 Cu/kg, and application of a set of different beta detectors gives an opportunity to use it for surface contamination measurement in wide range of the measured value

  17. A digital teslameter

    International Nuclear Information System (INIS)

    Brand, K.; Brun, G.

    1979-01-01

    A self-contained instrument for the measurement of magnetic fields is described which consists of a command module and a thermally stabilized Hall plate mounted in a probe. The command module contains the circuitry for the temperature stabilization and the current source for the probe, an analog-to-digital converter and a microprocessor-based control circuitry for the command of the measuring sequences. A read-only memory contains a calibration table for the relation between Hall voltage and magnetic field. The measured field strength can be directly displayed in units of induction (tesla). The teslameter is provided with a serial teletype input-output port for remote control. An addressing scheme allows up to 16 modules to be connected in parallel and to be controlled via a single teletype channel. This is especially useful if several teslameters are used in a complex measuring set-up. (Auth.)

  18. Ethics in Digital Research

    DEFF Research Database (Denmark)

    Tiidenberg, Katrin

    2017-01-01

    This chapter joins the voices that consider research ethics to be a matter of situated, responsible judgment, rather than a matter of universal principles and rigid guidelines. When collecting data about or in digitally saturated contexts, we need to consciously choose between what is available......, findable and collectable, and what should be found, collected and used for research. Thus, this chapter will not offer a set of rules; rather, it advocates for systematic (self) reflexivity in ethical qualitative inquiry. In the following I outline some of the persistent ethical issues that scholars...... involved in internet research are faced with. Classical ethical concepts like informed consent, confidentiality, anonymity, privacy, publicity and harm are difficult to operationalize in a socio-technical context that is persistent, replicable, scalable, and searchable. Examples from my own work...

  19. Radiation protection in dental X-ray surgeries--still rooms for improvement.

    Science.gov (United States)

    Hart, G; Dugdale, M

    2013-03-01

    To illustrate the authors' experience in the provision of radiation protection adviser (RPA)/medical physics expert (MPE) services and critical examination/radiation quality assurance (QA) testing, to demonstrate any continuing variability of the compliance of X-ray sets with existing guidance and of compliance of dental practices with existing legislation. Data was collected from a series of critical examination and routine three-yearly radiation QA tests on 915 intra-oral X-ray sets and 124 panoramic sets. Data are the result of direct measurements on the sets, made using a traceably calibrated Unfors Xi meter. The testing covered the measurement of peak kilovoltage (kVp); filtration; timer accuracy and consistency; X-ray beam size; and radiation output, measured as the entrance surface dose in milliGray (mGy) for intra-oral sets and dose-area product (DAP), measured in mGy.cm(2) for panoramic sets. Physical checks, including mechanical stability, were also included as part of the testing process. The Health and Safety Executive has expressed concern about the poor standards of compliance with the regulations during inspections at dental practices. Thirty-five percent of intra-oral sets exceeded the UK adult diagnostic reference level on at least one setting, as did 61% of those with child dose settings. There is a clear advantage of digital radiography and rectangular collimation in dose terms, with the mean dose from digital sets 59% that of film-based sets and a rectangular collimator 76% that of circular collimators. The data shows the unrealised potential for dose saving in many digital sets and also marked differences in dose between sets. Provision of radiation protection advice to over 150 general dental practitioners raised a number of issues on the design of surgeries with X-ray equipment and critical examination testing. There is also considerable variation in advice given on the need (or lack of need) for room shielding. Where no radiation protection

  20. Summary of: radiation protection in dental X-ray surgeries--still rooms for improvement.

    Science.gov (United States)

    Walker, Anne

    2013-03-01

    To illustrate the authors' experience in the provision of radiation protection adviser (RPA)/medical physics expert (MPE) services and critical examination/radiation quality assurance (QA) testing, to demonstrate any continuing variability of the compliance of X-ray sets with existing guidance and of compliance of dental practices with existing legislation. Data was collected from a series of critical examination and routine three-yearly radiation QA tests on 915 intra-oral X-ray sets and 124 panoramic sets. Data are the result of direct measurements on the sets, made using a traceably calibrated Unfors Xi meter. The testing covered the measurement of peak kilovoltage (kVp); filtration; timer accuracy and consistency; X-ray beam size; and radiation output, measured as the entrance surface dose in milliGray (mGy) for intra-oral sets and dose-area product (DAP), measured in mGy.cm(2) for panoramic sets. Physical checks, including mechanical stability, were also included as part of the testing process. The Health and Safety Executive has expressed concern about the poor standards of compliance with the regulations during inspections at dental practices. Thirty-five percent of intra-oral sets exceeded the UK adult diagnostic reference level on at least one setting, as did 61% of those with child dose settings. There is a clear advantage of digital radiography and rectangular collimation in dose terms, with the mean dose from digital sets 59% that of film-based sets and a rectangular collimator 76% that of circular collimators. The data shows the unrealised potential for dose saving in many digital sets and also marked differences in dose between sets. Provision of radiation protection advice to over 150 general dental practitioners raised a number of issues on the design of surgeries with X-ray equipment and critical examination testing. There is also considerable variation in advice given on the need (or lack of need) for room shielding. Where no radiation protection