WorldWideScience

Sample records for digital protection settings

  1. MATLAB-SIMULINK BASED INFORMATION SUPPORT FOR DIGITAL OVERCURRENT PROTECTION TEST SETS

    Directory of Open Access Journals (Sweden)

    I. V. Novash

    2017-01-01

    Full Text Available The implementation of information support for PC-based and hardware-software based sets for digital overcurrent protection devices and their models testing using MatLab-Simulink environment is considered. It is demonstrated that the mathematical modeling of a part of the power system – viz. of the generalized electric power object – could be based on rigid and flexible models. Rigid models implemented on the basis of mathematical description of electrical and magnetic circuits of a power system can be considered as a reference model for the simulation results that have been obtained with the aid of another simulation system to be compared with. It is proposed to implement flexible models for generalized electric power object in the MatLabSimulink environment that includes the SimPowerSystems component library targeted to power system modeling. The features of the parameters calculation of the SimPowerSystems component library blocks that the power system model is formed of are considered. Out of the Simulink standard blocks the models of a wye-connected current transformers were composed as well as the digital overcurrent protection, missing in the component library. A comparison of simulation results of one and the same generalized electric power object implemented in various PC-based software packages was undertaken. The divergence of simulation results did not exceed 3 %; the latter allows us to recommend the MatLab-Simulink environment for information support creation for hardware-software based sets for digital overcurrent protection devices testing. The structure of the hardware-software based set for digital overcurrent protection device testing using the Omicron CMC 356 has been suggested. Time to trip comparison between the real digital protection device МР 801 and the model with the parameters which are exactly match the parameters of the prototype device was carried out using the identical test inputs. The results of the tests

  2. Digital signal processing in power system protection and control

    CERN Document Server

    Rebizant, Waldemar; Wiszniewski, Andrzej

    2011-01-01

    Digital Signal Processing in Power System Protection and Control bridges the gap between the theory of protection and control and the practical applications of protection equipment. Understanding how protection functions is crucial not only for equipment developers and manufacturers, but also for their users who need to install, set and operate the protection devices in an appropriate manner. After introductory chapters related to protection technology and functions, Digital Signal Processing in Power System Protection and Control presents the digital algorithms for signal filtering, followed

  3. Digital protection in power plants. Electrical unit and line protection. Digital protection systems for NPP

    International Nuclear Information System (INIS)

    Kaczmarek, A.

    2000-01-01

    In this presentation author deals with the digital protection systems for nuclear power plants. The evolution of protection devices, protection concept for power plants, concept of functional redundancy, references for digital protection, benefits for the customer well as concept fault recorder are presented. (author)

  4. JPEG digital watermarking for copyright protection

    Directory of Open Access Journals (Sweden)

    Vitaliy G. Ivanenko

    2018-05-01

    Full Text Available With the rapid growth of the multimedia technology, copyright protection has become a very important issue, especially for images. The advantages of easy photo distribution are discarded by their possible theft and unauthorized usage on different websites. Therefore, there is a need in securing information with technical methods, for example digital watermarks. This paper reviews digital watermark embedding methods for image copyright protection, advantages and disadvantages of digital watermark usage are produced. Different watermarking algorithms are analyzed. Based on analysis results most effective algorithm is chosen – differential energy watermarking. It is noticed that the method excels at providing image integrity. Digital watermark embedding system should prevent illegal access to the digital watermark and its container. Requirements for digital watermark are produced. Possible image attacks are reviewed. Modern modifications of embedding algorithms are studied. Robustness of the differential energy watermark is investigated. Robustness is a special value, which formulae is given further in the article. DEW method modification is proposed, it’s advantages over original algorithm are described. Digital watermark serves as an additional layer of defense which is in most cases unknown to the violator. Scope of studied image attacks includes compression, filtration, scaling. In conclusion, it’s possible to use DEW watermarking in copyright protection, violator can easily be detected if images with embedded information are exchanged.

  5. Full Digital Short Circuit Protection for Advanced IGBTs

    OpenAIRE

    谷村, 拓哉; 湯浅, 一史; 大村, 一郎

    2011-01-01

    A full digital short circuit protection method for advanced IGBTs has been proposed and experimentally demonstrated for the first time. The method employs combination of digital circuit, the gate charge sense instead of the conventional sense IGBT and analog circuit configuration. Digital protection scheme has significant advantages in thevprotection speed and flexibility.

  6. Protecting Digital Evidence Integrity by Using Smart Cards

    Science.gov (United States)

    Saleem, Shahzad; Popov, Oliver

    RFC 3227 provides general guidelines for digital evidence collection and archiving, while the International Organization on Computer Evidence offers guidelines for best practice in the digital forensic examination. In the light of these guidelines we will analyze integrity protection mechanism provided by EnCase and FTK which is mainly based on Message Digest Codes (MDCs). MDCs for integrity protection are not tamper proof, hence they can be forged. With the proposed model for protecting digital evidence integrity by using smart cards (PIDESC) that establishes a secure platform for digitally signing the MDC (in general for a whole range of cryptographic services) in combination with Public Key Cryptography (PKC), one can show that this weakness might be overcome.

  7. Localization of equipment for digital plant protection system

    Energy Technology Data Exchange (ETDEWEB)

    Koo, I. S.; Park, H. Y.; Lee, C. K. and others

    2000-10-01

    The objective of this project lies on the development of design requirements, establishment of structure and manufacture procedures, development of the software verification and validation(V and V) techniques of the digital plant protection system. The functional requirements based on the analog protection system and digital design requirements are introduced, the processor and system bus for safety grade equipment are selected and the interface requirements and the design specification have been developed in order to manufacture the quick prototype of the digital plant protection system. The selection guidelines of parts, software development and coding and testing for digital plant protection system have been performed through manufacturing the quick prototype based on the developed design specification. For the software verification and validation, the software review plan and techniques of verification and validation have been researched. The digital validation system is developed in order to verify the quick prototype. The digital design requirements are reviewed by the software safety plan and V and V plans. The formal methods for verifying the safety-grade software are researched, then the methodology of formal analysis and testing have been developed.

  8. Localization of equipment for digital plant protection system

    International Nuclear Information System (INIS)

    Koo, I. S.; Park, H. Y.; Lee, C. K. and others

    2000-10-01

    The objective of this project lies on the development of design requirements, establishment of structure and manufacture procedures, development of the software verification and validation(V and V) techniques of the digital plant protection system. The functional requirements based on the analog protection system and digital design requirements are introduced, the processor and system bus for safety grade equipment are selected and the interface requirements and the design specification have been developed in order to manufacture the quick prototype of the digital plant protection system. The selection guidelines of parts, software development and coding and testing for digital plant protection system have been performed through manufacturing the quick prototype based on the developed design specification. For the software verification and validation, the software review plan and techniques of verification and validation have been researched. The digital validation system is developed in order to verify the quick prototype. The digital design requirements are reviewed by the software safety plan and V and V plans. The formal methods for verifying the safety-grade software are researched, then the methodology of formal analysis and testing have been developed

  9. Consumer protection act for digital products

    Science.gov (United States)

    Hampel, Viktor E.

    1996-03-01

    This report proposes a `Consumer Protection Act for Digital Products' to support electronic commerce and to control the increasing abuse and lack of security on the national information highways. Patterned after the `Food and Drug Act of 1906 (21 USC)' and subsequent legislation, a new agency similar to that of the FDA would have the authority `to develop administrative policy with regard to the safety, effectiveness, and labeling of digital products and their communications for human use, and to review and evaluate new applications of such products.' Specifically, it is proposed that standards, originally developed by the defense industry for the labeling, enveloping, and authentication of digital products delivered to the Government, be extended to promote global electronic commerce by protecting the intellectual property rights of producers, establishing their liability for the end-use of digital products, and give consumers means for informed decision making and purchase.

  10. Reliability Analysis Study of Digital Reactor Protection System in Nuclear Power Plant

    International Nuclear Information System (INIS)

    Guo, Xiao Ming; Liu, Tao; Tong, Jie Juan; Zhao, Jun

    2011-01-01

    The Digital I and C systems are believed to improve a plants safety and reliability generally. The reliability analysis of digital I and C system has become one research hotspot. Traditional fault tree method is one of means to quantify the digital I and C system reliability. Review of advanced nuclear power plant AP1000 digital protection system evaluation makes clear both the fault tree application and analysis process to the digital system reliability. One typical digital protection system special for advanced reactor has been developed, which reliability evaluation is necessary for design demonstration. The typical digital protection system construction is introduced in the paper, and the process of FMEA and fault tree application to the digital protection system reliability evaluation are described. Reliability data and bypass logic modeling are two points giving special attention in the paper. Because the factors about time sequence and feedback not exist in reactor protection system obviously, the dynamic feature of digital system is not discussed

  11. Adoption of digital safety protection system in Japan

    International Nuclear Information System (INIS)

    Ogiso, Z.

    1998-01-01

    The application of micro-processor-based digital controllers has been widely propagated among various industries in recent years. While in the nuclear power plant industry, the application of them has also been expanding gradually starting from non-safety related systems, taking advantage of their reliability and maintainability over the conventional analog devices. Based on the careful study of the feasibility of digital controllers to the safety protection system, the Tokyo Electric Power Company proposed on May 1989 the adoption of digital controllers to the safety protection system in the Application for Permission of Establishment of Kashiwazaki-Kariwa units 6 and 7 (ABWR-1350Mwe each). MITI, Ministry of International Trade and Industry, the Japanese regulatory body for electric power generating facilities, had approved this application after careful review. This paper describes a series of supporting activities leading to the MITI's approval of the digital safety protection system and the MITI's licensing activities. (author)

  12. 47 CFR 74.706 - Digital TV (DTV) station protection.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital TV (DTV) station protection. 74.706... EXPERIMENTAL RADIO, AUXILIARY, SPECIAL BROADCAST AND OTHER PROGRAM DISTRIBUTIONAL SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.706 Digital TV (DTV) station protection. (a) For purposes of this...

  13. Digital integrated protection system

    International Nuclear Information System (INIS)

    Savornin, M.; Furet, M.

    1978-01-01

    As a result of technological progress it is now possible to achieve more elaborate protection functions able to follow more closely the phenomena to be supervised. For this reason the CEA, Framatome and Merlin/Gerin/CERCI have undertaken in commonn to develop a Digital Integrated Protection System (D.I.P.S.). This system is designed with the following aims: to improve the safety of the station, . to improve its availability, . to facilitate installation, . to facilitate tests and maintenance. The main characteristics adopted are: . possibilities of obtaining more elaborate monitoring and protection algorithm treatments, . order 4 redundancy of transducers, associated instruments and signal processing, . possibility of inhibiting part of the protection system, . standardisation of equipment, physical and electrical separation of redundant units, . use of multiplexed connections, . automation of tests. Four flow charts are presented: - DIPS with four APUP (Acquisition and Processing Unit for Protection) - APUP - LSU (Logic Safeguard Unit), number LSU corresponding to number fluidic safeguard circuits, - structure of a function unit, - main functions of the APUP [fr

  14. Protected interoperability of telecommunications and digital products

    Science.gov (United States)

    Hampel, Viktor E.; Cartier, Gene N.; Craft, James P.

    1994-11-01

    New federal standards for the protection of sensitive data now make it possible to ensure the authenticity, integrity and confidentiality of digital products, and non-repudiation of digital telecommunications. Under review and comment since 1991, the new Federal standards were confirmed this year and provide standard means for the protection of voice and data communications from accidental and wilful abuse. The standards are initially tailored to protect only `sensitive-but-unclassified' (SBU) data in compliance with the Computer Security Act of 1987. These data represent the majority of transactions in electronic commerce, including sensitive procurement information, trade secrets, financial data, product definitions, and company-proprietary information classified as `intellectual property.' Harmonization of the new standards with international requirements is in progress. In the United States, the confirmation of the basic standards marks the beginning of a long-range program to assure discretionary and mandatory access controls to digital resources. Upwards compatibility into the classified domain with multi-level security is a core requirement of the National Information Infrastructure. In this report we review the powerful capabilities of standard Public-Key-Cryptology, the availability of commercial and Federal products for data protection, and make recommendations for their cost-effective use to assure reliable telecommunications and process controls.

  15. 47 CFR 73.6018 - Digital Class A TV station protection of DTV stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital Class A TV station protection of DTV... TV station protection of DTV stations. Digital Class A TV stations must protect the DTV service that... application for digital operation of an existing Class A TV station or to change the facilities of a digital...

  16. A COMPREHENSIVE MODEL FOR THE POWER TRANSFORMER DIGITAL DIFFERENTIAL PROTECTION FUNCTIONING RESEARCH

    Directory of Open Access Journals (Sweden)

    Yu. V. Rumiantsev

    2016-01-01

    Full Text Available This article presents a comprehensive model for the two-winding power transformer digital differential protection functioning research. Considered comprehensive model is developed in MatLab-Simulink dynamic simulation environment with the help of SimPowerSystems component library and includes the following elements: power supply, three-phase power transformer, wye-connected current transformers and two-winding power transformer digital differential protection model. Each element of the presented model is described in the degree sufficient for its implementation in the dynamic simulation environment. Particular attention is paid to the digital signal processing principles and to the ways of differential and restraining currents forming of the considered comprehensive model main element – power transformer digital differential protection. With the help of this model the power transformer digital differential protection functioning was researched during internal and external faults: internal short-circuit, external short-circuit with and without current transformers saturation on the power transformer low-voltage side. Each experiment is illustrated with differential and restraining currents waveforms of the digital differential protection under research. Particular attention was paid to the digital protection functioning analysis during power transformer abnormal modes: overexcitation and inrush current condition. Typical current waveforms during these modes were showed and their harmonic content was investigated. The causes of these modes were analyzed in details. Digital differential protection blocking algorithms based on the harmonic content were considered. Drawbacks of theses algorithms were observed and the need of their further technical improvement was marked.

  17. Two-step digit-set-restricted modified signed-digit addition-subtraction algorithm and its optoelectronic implementation.

    Science.gov (United States)

    Qian, F; Li, G; Ruan, H; Jing, H; Liu, L

    1999-09-10

    A novel, to our knowledge, two-step digit-set-restricted modified signed-digit (MSD) addition-subtraction algorithm is proposed. With the introduction of the reference digits, the operand words are mapped into an intermediate carry word with all digits restricted to the set {1, 0} and an intermediate sum word with all digits restricted to the set {0, 1}, which can be summed to form the final result without carry generation. The operation can be performed in parallel by use of binary logic. An optical system that utilizes an electron-trapping device is suggested for accomplishing the required binary logic operations. By programming of the illumination of data arrays, any complex logic operations of multiple variables can be realized without additional temporal latency of the intermediate results. This technique has a high space-bandwidth product and signal-to-noise ratio. The main structure can be stacked to construct a compact optoelectronic MSD adder-subtracter.

  18. 47 CFR 73.6017 - Digital Class A TV station protection of Class A TV and digital Class A TV stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital Class A TV station protection of Class A TV and digital Class A TV stations. 73.6017 Section 73.6017 Telecommunication FEDERAL... Broadcast Stations § 73.6017 Digital Class A TV station protection of Class A TV and digital Class A TV...

  19. Improvement of the Cubic Spline Function Sets for a Synthesis of the Axial Power Distribution of a Core Protection System

    International Nuclear Information System (INIS)

    Koo, Bon-Seung; Lee, Chung-Chan; Zee, Sung-Quun

    2006-01-01

    Online digital core protection system(SCOPS) for a system-integrated modular reactor is being developed as a part of a plant protection system at KAERI. SCOPS calculates the minimum CHFR and maximum LPD based on several online measured system parameters including 3-level ex-core detector signals. In conventional ABB-CE digital power plants, cubic spline synthesis technique has been used in online calculations of the core axial power distributions using ex-core detector signals once every 1 second in CPC. In CPC, pre-determined cubic spline function sets are used depending on the characteristics of the ex-core detector responses. But this method shows an unnegligible power distribution error for the extremely skewed axial shapes by using restrictive function sets. Therefore, this paper describes the cubic spline method for the synthesis of an axial power distribution and it generates several new cubic spline function sets for the application of the core protection system, especially for the severely distorted power shapes needed reactor type

  20. Optimal testing input sets for reduced diagnosis time of nuclear power plant digital electronic circuits

    International Nuclear Information System (INIS)

    Kim, D.S.; Seong, P.H.

    1994-01-01

    This paper describes the optimal testing input sets required for the fault diagnosis of the nuclear power plant digital electronic circuits. With the complicated systems such as very large scale integration (VLSI), nuclear power plant (NPP), and aircraft, testing is the major factor of the maintenance of the system. Particularly, diagnosis time grows quickly with the complexity of the component. In this research, for reduce diagnosis time the authors derived the optimal testing sets that are the minimal testing sets required for detecting the failure and for locating of the failed component. For reduced diagnosis time, the technique presented by Hayes fits best for the approach to testing sets generation among many conventional methods. However, this method has the following disadvantages: (a) it considers only the simple network (b) it concerns only whether the system is in failed state or not and does not provide the way to locate the failed component. Therefore the authors have derived the optimal testing input sets that resolve these problems by Hayes while preserving its advantages. When they applied the optimal testing sets to the automatic fault diagnosis system (AFDS) which incorporates the advanced fault diagnosis method of artificial intelligence technique, they found that the fault diagnosis using the optimal testing sets makes testing the digital electronic circuits much faster than that using exhaustive testing input sets; when they applied them to test the Universal (UV) Card which is a nuclear power plant digital input/output solid state protection system card, they reduced the testing time up to about 100 times

  1. DIGITAL FILTERS IMPLEMENTATION IN MICROPROCESSOR-BASED RELAY PROTECTION

    Directory of Open Access Journals (Sweden)

    Yu. V. Rumiantsev

    2016-01-01

    Full Text Available This article presents the implementation of digital filters used in digital relay protection current measuring elements. Mathematical descriptions of the considered digital filters as well as the computer programs for their coefficients calculation are described. It has been shown that in order to reliable estimate the digital filter performance its input signals waveforms must be close to the actual secondary current waveform of the current transformer to which the digital protection with the estimated digital filter is connected. For these purposes in MatLab–Simulink dynamic simulation environment the power system and the current measuring element models were developed. Performed calculations allowed to reveal that the exponentially decaying DC component which in some cases contains in primary fault current drives the current transformer core into saturation even when its nominal parameters are not exceeded. This results in distortion of the current transformer secondary current which in this case contains higher and inter-harmonics. Moreover, such harmonic content is not completely taking into account during coefficients calculation of the considered digital filters what results in signal magnitude estimation inaccuracy. Comparison of the digital filters response to the above-mentioned input signals allowed to find out such digital filter implementations which enable signal magnitude estimation with a minimum error. Ways of filtering quality improvement concerned with the window functions are proposed. Thus, the joint usage of digital filter and Hamming window allows to achieve the zero value of the signal magnitude gain factor in high-frequency range and substantially suppress all spectral components above 100 Hz. The increasing of the signal magnitude settling time in this case can be reduced by choosing the most optimal parameters of the all components of the current measuring element.

  2. Digital System Reliability Test for the Evaluation of safety Critical Software of Digital Reactor Protection System

    Directory of Open Access Journals (Sweden)

    Hyun-Kook Shin

    2006-08-01

    Full Text Available A new Digital Reactor Protection System (DRPS based on VME bus Single Board Computer has been developed by KOPEC to prevent software Common Mode Failure(CMF inside digital system. The new DRPS has been proved to be an effective digital safety system to prevent CMF by Defense-in-Depth and Diversity (DID&D analysis. However, for practical use in Nuclear Power Plants, the performance test and the reliability test are essential for the digital system qualification. In this study, a single channel of DRPS prototype has been manufactured for the evaluation of DRPS capabilities. The integrated functional tests are performed and the system reliability is analyzed and tested. The results of reliability test show that the application software of DRPS has a very high reliability compared with the analog reactor protection systems.

  3. 47 CFR 73.6014 - Protection of digital Class A TV stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Protection of digital Class A TV stations. 73... Class A TV stations. An application to change the facilities of an existing Class A TV station will not be accepted if it fails to protect authorized digital Class A TV stations and applications for...

  4. Interference and protection of electromagnetic pulse to digital signal processor

    International Nuclear Information System (INIS)

    Wang Yan; Jiao Hongling; He Shanhong; Pan Chao; Feng Deren; Che Wenquan; Xiong Ying

    2013-01-01

    The effective electromagnetic pulse protection is studied in this paper, first the interference of electromagnetic pulse simulator path is analyzed, including the digital signal processor (DSP) and the discharge circuit of coupling interference and net electricity coupling interference. Using the structure optimization design, the hardware block reinforcement measurement and the setting of open software trap, and the watchdog anti-jamming measures, the interference test is completed such as the central processor core voltage of DSP, input/output (I/O) ports of DSP and the display screen. The experimental results show that the combination of hardware and software protection reinforcement technology is effective, and the interference pulse amplitude of DSP board I/O port and the kernel work voltage are reduced, and the interference duration is reduced from 2 μs to 400 ns. The interference pulse is effectively restrained. (authors)

  5. A New GPS-based Digital Protection System for Smart Grids in Loop Structure

    Directory of Open Access Journals (Sweden)

    X. Liu

    2014-12-01

    Full Text Available This paper presents a new digital protection system to solve the protection challenges in future smart grids, i.e., fast protection and fault isolation in a loop-structured system with limited magnitude of fault current. The new system combines two protection algorithms, i.e., a differential protection as the primary algorithm and an overcurrent protection as the backup one. The new system uses real-time Ethernet and digital data acquisition techniques to overcome the restriction on data transmission over large grids. The current measurements at different locations are time-synchronized by GPS clocks, and then transmitted to a central computer via the Ethernet. As opposed to digital relays which often contain PMU functionality nowadays, this approach uses time stamps on the instantaneous current values. We build a prototype of the new system on a test-bed. The results from simulations and experiments have demonstrated that the protection system achieves fast and accurate protection.

  6. Digital Technology in the protection of cultural heritage Bao Fan Temple mural digital mapping survey

    Directory of Open Access Journals (Sweden)

    Y. Zheng

    2015-08-01

    Full Text Available Peng Xi county, Sichuan province, the Bao Fan temple mural digitization survey mapping project: we use three-dimensional laserscanning, multi-baseline definition digital photography, multi-spectral digital image acquisition and other technologies for digital survey mapping. The purpose of this project is to use modern mathematical reconnaissance mapping means to obtain accurate mural shape, color, quality and other data. Combined with field investigation and laboratory analysis results, and based on a comprehensive survey and study, a comprehensive analysis of the historical Bao Fan Temple mural artistic and scientific value was conducted. A study of the mural’s many qualities (structural, material, technique, preservation environment, degradation, etc. reveal all aspects of the information carried by the Bao Fan Temple mural. From multiple angles (archeology, architecture, surveying, conservation science and other disciplines an assessment for the Bao Fan Temple mural provides basic data and recommendations for conservation of the mural. In order to achieve the conservation of cultural relics in the Bao Fan Temple mural digitization survey mapping process, we try to apply the advantages of three-dimensional laser scanning equipment. For wall murals this means obtaining three-dimensional scale data from the scan of the building and through the analysis of these data to help determine the overall condition of the settlement as well as the deformation of the wall structure. Survey analysis provides an effective set of conclusions and suggestions for appropriate mural conservation. But before data collection, analysis and research need to first to select the appropriate scanning equipment, set the appropriate scanning accuracy and layout position of stations necessary to determine the scope of required data. We use the fine features of the three-dimensional laser scanning measuring arm to scan the mural surface deformation degradation to reflect

  7. Digital Technology in the protection of cultural heritage Bao Fan Temple mural digital mapping survey

    Science.gov (United States)

    Zheng, Y.

    2015-08-01

    Peng Xi county, Sichuan province, the Bao Fan temple mural digitization survey mapping project: we use three-dimensional laserscanning, multi-baseline definition digital photography, multi-spectral digital image acquisition and other technologies for digital survey mapping. The purpose of this project is to use modern mathematical reconnaissance mapping means to obtain accurate mural shape, color, quality and other data. Combined with field investigation and laboratory analysis results, and based on a comprehensive survey and study, a comprehensive analysis of the historical Bao Fan Temple mural artistic and scientific value was conducted. A study of the mural's many qualities (structural, material, technique, preservation environment, degradation, etc.) reveal all aspects of the information carried by the Bao Fan Temple mural. From multiple angles (archeology, architecture, surveying, conservation science and other disciplines) an assessment for the Bao Fan Temple mural provides basic data and recommendations for conservation of the mural. In order to achieve the conservation of cultural relics in the Bao Fan Temple mural digitization survey mapping process, we try to apply the advantages of three-dimensional laser scanning equipment. For wall murals this means obtaining three-dimensional scale data from the scan of the building and through the analysis of these data to help determine the overall condition of the settlement as well as the deformation of the wall structure. Survey analysis provides an effective set of conclusions and suggestions for appropriate mural conservation. But before data collection, analysis and research need to first to select the appropriate scanning equipment, set the appropriate scanning accuracy and layout position of stations necessary to determine the scope of required data. We use the fine features of the three-dimensional laser scanning measuring arm to scan the mural surface deformation degradation to reflect the actual state of

  8. 47 CFR 73.6016 - Digital Class A TV station protection of TV broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital Class A TV station protection of TV... Class A TV station protection of TV broadcast stations. Digital Class A TV stations must protect authorized TV broadcast stations, applications for minor changes in authorized TV broadcast stations filed on...

  9. 47 CFR 74.792 - Digital low power TV and TV translator station protected contour.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital low power TV and TV translator station... SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.792 Digital low power TV and TV translator station protected contour. (a) A digital low power TV or TV translator will be protected from...

  10. 47 CFR 74.708 - Class A TV and digital Class A TV station protection.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Class A TV and digital Class A TV station... SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.708 Class A TV and digital Class A TV station protection. (a) The Class A TV and digital Class A TV station protected contours are specified in...

  11. Application of fault tree methodology to modeling of the AP1000 plant digital reactor protection system

    International Nuclear Information System (INIS)

    Teolis, D.S.; Zarewczynski, S.A.; Detar, H.L.

    2012-01-01

    The reactor trip system (RTS) and engineered safety features actuation system (ESFAS) in nuclear power plants utilizes instrumentation and control (IC) to provide automatic protection against unsafe and improper reactor operation during steady-state and transient power operations. During normal operating conditions, various plant parameters are continuously monitored to assure that the plant is operating in a safe state. In response to deviations of these parameters from pre-determined set points, the protection system will initiate actions required to maintain the reactor in a safe state. These actions may include shutting down the reactor by opening the reactor trip breakers and actuation of safety equipment based on the situation. The RTS and ESFAS are represented in probabilistic risk assessments (PRAs) to reflect the impact of their contribution to core damage frequency (CDF). The reactor protection systems (RPS) in existing nuclear power plants are generally analog based and there is general consensus within the PRA community on fault tree modeling of these systems. In new plants, such as AP1000 plant, the RPS is based on digital technology. Digital systems are more complex combinations of hardware components and software. This combination of complex hardware and software can result in the presence of faults and failure modes unique to a digital RPS. The United States Nuclear Regulatory Commission (NRC) is currently performing research on the development of probabilistic models for digital systems for inclusion in PRAs; however, no consensus methodology exists at this time. Westinghouse is currently updating the AP1000 plant PRA to support initial operation of plants currently under construction in the United States. The digital RPS is modeled using fault tree methodology similar to that used for analog based systems. This paper presents high level descriptions of a typical analog based RPS and of the AP1000 plant digital RPS. Application of current fault

  12. Copy Protection in Jet Set Willy: developing methodology for retrogame archaeology

    Directory of Open Access Journals (Sweden)

    John Aycock

    2017-04-01

    Full Text Available Video games, and more generally computer games, are unquestionably technological artefacts that have cultural significance. Old computer games in particular had to function under technical constraints that would be alien to many modern programmers, while at the same time providing something novel and at first foreign to consumers. How did their creators accomplish their technical feats, and what impact did that have for the player-consumer? The study of 'retro' computer games' implementation is one topic within the nascent area of archaeogaming. Digital rights management (DRM continues to be a major issue in the protection and distribution of content in electronic form. In this article, we study an early example of the implementation of copy protection in the 1984 game Jet Set Willy, something that comprises both physical and digital artefacts. It acts as a vehicle to illustrate a number of methods that we used to understand game implementation, culminating in a full reconstruction of the technique. The methods we cover include: 'traditional' research, along with its limitations in this context; code and data analysis; hypothesis testing; reconstruction. Through this positivist experimental approach, our results are both independently verifiable and repeatable. We also approach the complex context of early DRM, its hacks and workarounds by the player community, and what precipitated the design choices made for this particular game.

  13. Semantically transparent fingerprinting for right protection of digital cinema

    Science.gov (United States)

    Wu, Xiaolin

    2003-06-01

    Digital cinema, a new frontier and crown jewel of digital multimedia, has the potential of revolutionizing the science, engineering and business of movie production and distribution. The advantages of digital cinema technology over traditional analog technology are numerous and profound. But without effective and enforceable copyright protection measures, digital cinema can be more susceptible to widespread piracy, which can dampen or even prevent the commercial deployment of digital cinema. In this paper we propose a novel approach of fingerprinting each individual distribution copy of a digital movie for the purpose of tracing pirated copies back to their source. The proposed fingerprinting technique presents a fundamental departure from the traditional digital watermarking/fingerprinting techniques. Its novelty and uniqueness lie in a so-called semantic or subjective transparency property. The fingerprints are created by editing those visual and audio attributes that can be modified with semantic and subjective transparency to the audience. Semantically-transparent fingerprinting or watermarking is the most robust kind among all existing watermarking techniques, because it is content-based not sample-based, and semantically-recoverable not statistically-recoverable.

  14. Using geographical and taxonomic metadata to set priorities in specimen digitization

    Directory of Open Access Journals (Sweden)

    Walter G. Berendsohn

    2010-10-01

    Full Text Available Digitizing the information carried by specimens in natural history collections is a key endeavor providing falsifiable information about past and present biodiversity on a global scale, for application in a variety of research fields far beyond the current application in biosystematics. Existing digitization efforts are driven by individual institutional necessities and are not coordinated on a global scale. This led to an over-all information resource that is patchy in taxonomic and geographic coverage as well as in quality. Digitizing all specimens is not an achievable aim at present, so that priorities need to be set. Most biodiversity studies are both taxonomically and geographically restricted, but access to non-digitized collection information is almost exclusively by taxon name. Creating a “Geotaxonomic Index” providing metadata on the number of specimens from a specific geographic region belonging to a specific higher taxonomic category may provide a means to attract the attention of researchers and governments towards relevant non-digitized holdings of the collections and set priorities for their digitization according to the needs of information users outside the taxonomic community.

  15. 47 CFR 73.6019 - Digital Class A TV station protection of low power TV, TV translator, digital low power TV and...

    Science.gov (United States)

    2010-10-01

    ... power TV, TV translator, digital low power TV and digital TV translator stations. 73.6019 Section 73... low power TV, TV translator, digital low power TV and digital TV translator stations. An application... A TV station will not be accepted if it fails to protect authorized low power TV, TV translator...

  16. Tennessee Valley Authority becomes first to install digital process protection system

    International Nuclear Information System (INIS)

    Miller, W.; Doyle, J.

    1991-01-01

    Westinghouse Pressurized Water Reactors were originally furnished with analog process protection equipment of various vintages. The older equipment is quickly reaching the point of obsolescence, becoming costly to maintain and operate, its qualification increasingly difficult to achieve. Newer digital-based systems offer improved performance, automatic calibration, and streamlined surveillance test features, as discussed here. For these reasons, the Tennessee Valley Authority installed the world's first digital process protection system, complete with automatic test and calibration features, in its Sequoyah units 1 and 2 last year. The US utility replaced its ageing analog system with Westinghouse Electric's Eagle 21 Process Protection System during a routine maintenance shutdown in a record 23 days. (author)

  17. A development of digital plant protection system architecture

    International Nuclear Information System (INIS)

    Seong, S. H.; Park, H. Y.; Kim, D. H.; Seo, Y. S.; Gu, I. S.

    2000-01-01

    The digital plant protection system (DPPS) which have a large number of advantages compared to current analog protection system has been developed in various field. The major disadvantages of digital system are, however, vulnerable to faults of processor and software. To overcome the disadvantages, the concept of segment and partition in a channel has been developed. Each segment in a channel is divided from sensor to reactor trip and engineered safety features, which is based on the functional diversity of input signals against the various plant transient phenomena. Each partition allocates the function module to an independent processing module in order to process and isolate the faults of each module of a segment. A communication system based on the deterministic protocol with the predictable and hard real-time characteristics has been developed in order to link the various modules within a segment. The self-diagnostics including online test and periodic test procedures are developed in order to increase the safety, reliability and availability of DPPS. The developed DPPS uses the off-the-shelf DSP (digital signal processor) and adopts VME bus architecture, which have sufficient operation experience in the industry. The verification and validation and quality assurance of software has been developed and the architecture and protocol of deterministic communication system has been researched

  18. NSTX-U Digital Coil Protection System Software Detailed Design

    Energy Technology Data Exchange (ETDEWEB)

    None

    2014-06-01

    The National Spherical Torus Experiment (NSTX) currently uses a collection of analog signal processing solutions for coil protection. Part of the NSTX Upgrade (NSTX-U) entails replacing these analog systems with a software solution running on a conventional computing platform. The new Digital Coil Protection System (DCPS) will replace the old systems entirely, while also providing an extensible framework that allows adding new functionality as desired.

  19. Safety Evaluation of Full Digital Plant Protection System of Shin-Kori 3 and 4 in Korea

    International Nuclear Information System (INIS)

    Koh, J. S.; Kim, D. I.; Jeong, C. H.; Park, H. S.; Ji, S. H.; Kang, Y. D.; Park, G. Y.

    2009-01-01

    Keeping pace with the emerging trend of digital computer technologies, KHNP has utilized full digital plant protection system into the design of I and C systems at SKN 3 and 4. This paper presents safety review activities and results related to digital plant protection systems during the licensing of construction permit for the Shin-Kori 3 and 4(SKN 3 and 4) in Korea. The major licensing issues regarding the digital systems were software quality and cyber security during planning stage, system integrity with fail-safe design, EMI equipment qualification of digital systems, FPGA qualification and communication independence between safety and non-safety System. This paper addresses our approach to evaluate full digital protection systems with revised safety review guidelines and the resulting discussion to resolve the licensing issues

  20. Software reliability evaluation of digital plant protection system development process using V and V

    International Nuclear Information System (INIS)

    Lee, Na Young; Hwang, Il Soon; Seong, Seung Hwan; Oh, Seung Rok

    2001-01-01

    In the nuclear power industry, digital technology has been introduced recently for the Instrumentation and Control (I and C) of reactor systems. For its application to the safety critical system such as Reactor Protection System(RPS), a reliability assessment is indispensable. Unlike traditional reliability models, software reliability is hard to evaluate, and should be evaluated throughout development lifecycle. In the development process of Digital Plant Protection System(DPPS), the concept of verification and validation (V and V) was introduced to assure the quality of the product. Also, test should be performed to assure the reliability. Verification procedure with model checking is relatively well defined, however, test is labor intensive and not well organized. In this paper, we developed the methodological process of combining the verification with validation test case generation. For this, we used PVS for the table specification and for the theorem proving. As a result, we could not only save time to design test case but also get more effective and complete verification related test case set. Add to this, we could extract some meaningful factors useful for the reliability evaluation both from the V and V and verification combined tests

  1. Digital rights management for digital cinema

    Science.gov (United States)

    Kirovski, Darko; Peinado, Marcus; Petitcolas, Fabien A. P.

    2001-12-01

    There is a wide consensus among the feature film production studios that the Internet era brings a new paradigm for film distribution to cinemas worldwide. The benefits of digital cinema to both producers and cinemas are numerous: significantly lower distribution and maintenance costs, immediate access to film libraries, higher presentation quality, and strong potential for developing new business models. Despite these advantages, the studios are still reluctant to jump into the digital age. The main showstopper for digital cinema is the danger of widespread piracy. Piracy already costs Hollywood an estimated two billion dollars annually and digital cinema without proper copyright enforcement could increase this number. In this paper, we present a copyright management system that aims at providing the set of necessary security tools: standard cryptographic primitives and copyright protection mechanisms that enable a reliable and secure feature film delivery system.

  2. Climate-conscious citizenship in a digital urban setting

    Directory of Open Access Journals (Sweden)

    Sophie Esmann Andersen

    2010-12-01

    Full Text Available Climate change has challenged urban life, and as an omnipresent force, Nature sets the agenda for urban living. Using stakeholder theory to conceptualise urban life, we approach Nature as both an omnipresent stakeholder and an issue to be continuously addressed and related to. Adapting the stakeholder focus to relations, stakes and values, we conceptually analyse the digital installation entitled CO2mmitment/CO2nfessions, which was a prominent part of the Aarhus CO2030 exhibition launching the vision of the Danish city of Aarhus to become carbon neutral by the year 2030. In the analysis, we explore how the citizen is framed and invited to enact his/her responsibilities to the natural environment in an urban setting and how the digital mediation facilitates various forms of relations and climate conscious positions, incorporating both narcissistic desires, universal anxiety, moral obligations, ethical virtue and image performance. Statements from the actual confessors/committers exemplify this. Thus, the paper provides insight into understanding the complexity of climate-conscious citizenship as a complex configuration of paradoxical, co-existing ethics and arguments.

  3. Climate-conscious citizenship in a digital urban setting

    Directory of Open Access Journals (Sweden)

    Sophie Esmann Andersen

    2011-06-01

    Full Text Available Climate change has challenged urban life, and as an omnipresent force, Nature sets the agenda for urban living. Using stakeholder theory to conceptualise urban life, we approach Nature as both an omnipresent stakeholder and an issue to be continuously addressed and related to. Adapting the stakeholder focus to relations, stakes and values, we conceptually analyse the digital installation entitled CO2mmitment/CO2nfessions, which was a prominent part of the Aarhus CO2030 exhibition launching the vision of the Danish city of Aarhus to become carbon neutral by the year 2030. In the analysis, we explore how the citizen is framed and invited to enact his/her responsibilities to the natural environment in an urban setting and how the digital mediation facilitates various forms of relations and climate conscious positions, incorporating both narcissistic desires, universal anxiety, moral obligations, ethical virtue and image performance. Statements from the actual confessors/committers exemplify this. Thus, the paper provides insight into understanding the complexity of climate-conscious citizenship as a complex configuration of paradoxical, co-existing ethics and arguments.

  4. Radiation protection and fuzzy set theory

    International Nuclear Information System (INIS)

    Nishiwaki, Y.

    1993-01-01

    In radiation protection we encounter a variety of sources of uncertainties which are due to fuzziness in our cognition or perception of objects. For systematic treatment of this type of uncertainty, the concepts of fuzzy sets or fuzzy measures could be applied to construct system models, which may take into consideration both subjective or intrinsic fuzziness and objective or extrinsic fuzziness. The theory of fuzzy sets and fuzzy measures is still in a developing stage, but its concept may be applied to various problems of subjective perception of risk, nuclear safety, radiation protection and also to the problems of man-machine interface and human factor engineering or ergonomic

  5. Relay protection coordination with generator capability curve, excitation system limiters and power system relay protections settings

    Directory of Open Access Journals (Sweden)

    Buha Danilo

    2016-01-01

    Full Text Available The relay protection settings performed in the largest thermal powerplant (TE "Nikola Tesla B" are reffered and explained in this paper. The first calculation step is related to the coordination of the maximum stator current limiter settings, the overcurrent protection with inverse characteristics settings and the permitted overload of the generator stator B1. In the second calculation step the settings of impedance generator protection are determined, and the methods and criteria according to which the calculations are done are described. Criteria used to provide the protection to fulfill the backup protection role in the event of malfunction of the main protection of the transmission system. are clarified. The calculation of all protection functions (32 functions of generator B1 were performed in the project "Coordination of relay protection blocks B1 and B2 with the system of excitation and power system protections -TENT B".

  6. Testing methodology of embedded software in digital plant protection system

    International Nuclear Information System (INIS)

    Seong, Ah Young; Choi, Bong Joo; Lee, Na Young; Hwang, Il Soon

    2001-01-01

    It is necessary to assure the reliability of software in order to digitalize RPS(Reactor Protection System). Since RPS causes fatal damage on accidental cases, it is classified as Safety 1E class. Therefore we propose the effective testing methodology to assure the reliability of embedded software in the DPPS(Digital Plant Protection System). To test the embedded software effectively in DPPS, our methodology consists of two steps. The first is the re-engineering step that extracts classes from structural source program, and the second is the level of testing step which is composed of unit testing, Integration Testing and System Testing. On each testing step we test the embedded software with selected test cases after the test item identification step. If we use this testing methodology, we can test the embedded software effectively by reducing the cost and the time

  7. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of digital computer and communication systems and networks. 73.54 Section 73.54 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION... security program as a component of the physical protection program. (c) The cyber security program must be...

  8. Application of the voltage biased digital relay for the optimal protection of high inertia drive induction motors

    International Nuclear Information System (INIS)

    Choi, D. B.

    1999-01-01

    This paper describes typical protection schemes for large-size high inertia drive motor that are generally rotor thermal limited. Difficult and variable starting conditions of the large-size high inertia drive motor and compromises in the selection and setting of the protective devices are frequently encountered. The motors that typically encounter severe starting duty and present difficulties in achieving full motor protection are reactor coolant pumps (RCPs), blowers and compressors. For difficult starting conditions that are encountered by the large-size high inertia drive motors, state-of-the-art computer based calculations are capable of providing realistic predictions of the band of margin available for applying the protective relay. Based on the analysis of starting characteristics of large-size high inertia drive motors, this paper recommends that the optimal protection scheme for high inertia drive motors for nuclear power plants can be achieved by using the voltage biased digital relay instead of a speed switch and conventional overcurrent relays. (author)

  9. SPIN. First Digital Protection System Feedback of experience ... ... after 30 years

    International Nuclear Information System (INIS)

    Kosicki, M.; Pacuta, J.; Kamga, J.; Burel, J.-P.

    2010-01-01

    In this lecture Mr Burel presents experience with the software SPIN - the first digital protection system feedback. After thirty years of operation, the results are positive: - System is in correct operation and still maintained with spare parts available; - No spurious trip or actuation due to the system itself. A project for modernization is prepared to replace the digital part with a new digital technology designed with today's: - Components (SPINLINE 3); - methods and tools (Software development); - Standards (EMI/RFI - qualification), in order to allow customer to add some new functional needs and to keep the system in operation for thirty more years.

  10. Advanced digital video surveillance for safeguard and physical protection

    International Nuclear Information System (INIS)

    Kumar, R.

    2002-01-01

    Full text: Video surveillance is a very crucial component in safeguard and physical protection. Digital technology has revolutionized the surveillance scenario and brought in various new capabilities like better image quality, faster search and retrieval of video images, less storage space for recording, efficient transmission and storage of video, better protection of recorded video images, and easy remote accesses to live and recorded video etc. The basic safeguard requirement for verifiably uninterrupted surveillance has remained largely unchanged since its inception. However, changes to the inspection paradigm to admit automated review and remote monitoring have dramatically increased the demands on safeguard surveillance system. Today's safeguard systems can incorporate intelligent motion detection with very low rate of false alarm and less archiving volume, embedded image processing capability for object behavior and event based indexing, object recognition, efficient querying and report generation etc. It also demands cryptographically authenticating, encrypted, and highly compressed video data for efficient, secure, tamper indicating and transmission. In physical protection, intelligent on robust video motion detection, real time moving object detection and tracking from stationary and moving camera platform, multi-camera cooperative tracking, activity detection and recognition, human motion analysis etc. is going to play a key rote in perimeter security. Incorporation of front and video imagery exploitation tools like automatic number plate recognition, vehicle identification and classification, vehicle undercarriage inspection, face recognition, iris recognition and other biometric tools, gesture recognition etc. makes personnel and vehicle access control robust and foolproof. Innovative digital image enhancement techniques coupled with novel sensor design makes low cost, omni-directional vision capable, all weather, day night surveillance a reality

  11. Consumers` Attitude towards Consumer Protection in the Digital Single Market, as Reflected by European Barometers

    Directory of Open Access Journals (Sweden)

    Doru Alexandru Pleşea

    2014-05-01

    Full Text Available The European Single Market is an ongoing project that will continue to further develop and adapt to changing realities. Traditional economic activities, and the administrative rules governing them, face the challenge of adapting to developments that blur the dividing lines, for example, between shop and online sales or between traditional media and Internet communication. Convergence of this type will lead to a European Digital Single Market. A genuine Digital Single Market would generate new types of growth and also sustainable economic and social benefits for all European citizens. There are still a number of barriers which impose obstacles for the development of the digital market in Europe. Obstacles which can be identified include national differences regarding data protection rules, e-commerce rules, consumer protection rules and other legislation pertaining to information flows. The paper brings in discussion the advantages of a Digital Single Market, the obstacles in developing it in connection with e-commerce regulations, consumer protection and information flows legislation and also the premises for implementing a Digital Single Market. Consumers’ trust in on-line commerce results as one of the driving factors in implementing a Digital Single Market. These are some of the main obstacles for the boosting consumers’ confidence in the European Single Market. Improving consumer confidence in cross-border shopping online by taking appropriate policy action could provide a major boost to economic growth in Europe. Empowered and confident consumers can drive forward the European economy. Starting from the results of the Flash Euro-barometer survey „Consumer attitudes towards cross-border trade and consumer protection this study analyzes consumer`s readiness for the European Digital Single Market

  12. Associated diacritical watermarking approach to protect sensitive arabic digital texts

    Science.gov (United States)

    Kamaruddin, Nurul Shamimi; Kamsin, Amirrudin; Hakak, Saqib

    2017-10-01

    Among multimedia content, one of the most predominant medium is text content. There have been lots of efforts to protect and secure text information over the Internet. The limitations of existing works have been identified in terms of watermark capacity, time complexity and memory complexity. In this work, an invisible digital watermarking approach has been proposed to protect and secure the most sensitive text i.e. Digital Holy Quran. The proposed approach works by XOR-ing only those Quranic letters that has certain diacritics associated with it. Due to sensitive nature of Holy Quran, diacritics play vital role in the meaning of the particular verse. Hence, securing letters with certain diacritics will preserve the original meaning of Quranic verses in case of alternation attempt. Initial results have shown that the proposed approach is promising with less memory complexity and time complexity compared to existing approaches.

  13. Implementation of digital control and protection systems of China advanced research reactor

    International Nuclear Information System (INIS)

    Zeng Hai; Jin Huajin; Xu Qiguo; Zhang Mingkui

    2005-01-01

    China Advanced Research Reactor (CARR), a reactor of the 21st century with high performance is being constructed in China. The requirements of reliability and stability on the control and protection (c and p) system are the main points raised. Especially, with the development of digital technology, the c and p system of CARR is demanded to match the trend of digitization in the field of reactor control. The c and p system, including reactor protection system, reactor monitoring and control system, reactor power regulating system, and the mitigation system for ATWS (Anticipate Transient Without Scram), adopts digital technology, and the digital display screen will replace the analog panels in the main control room. The c and p system of CARR adopts redundant technology with 2 or 3 redundant channels to improve the system reliability. The 10/100 Mbps self-adaptive redundant optic fiber industry Ethernet ring network is used to interlink operator workstations, supervisor workstation, and I/O control stations. Commercial grade equipment with mature experience in industrial application are applied to the c and p system of CARR, which have high reliability, good interchangeability, and is easily purchased, the software-developing tools fully match the international industry standards. The realization of digital c and p system of CARR will promote the progress of digital control technology for reactors in China, and certainly become a technical basic platform for developing informational and intelligent reactors in China. (authors)

  14. Relay protection coordination with generator capability curve, excitation system limiters and power system relay protections settings

    OpenAIRE

    Buha Danilo; Buha Boško; Jačić Dušan; Gligorov Saša; Božilov Marko; Marinković Savo; Milosavljević Srđan

    2016-01-01

    The relay protection settings performed in the largest thermal powerplant (TE "Nikola Tesla B") are reffered and explained in this paper. The first calculation step is related to the coordination of the maximum stator current limiter settings, the overcurrent protection with inverse characteristics settings and the permitted overload of the generator stator B1. In the second calculation step the settings of impedance generator protection are determined, and the methods and criteria according ...

  15. Software Safety Analysis of Digital Protection System Requirements Using a Qualitative Formal Method

    International Nuclear Information System (INIS)

    Lee, Jang-Soo; Kwon, Kee-Choon; Cha, Sung-Deok

    2004-01-01

    The safety analysis of requirements is a key problem area in the development of software for the digital protection systems of a nuclear power plant. When specifying requirements for software of the digital protection systems and conducting safety analysis, engineers find that requirements are often known only in qualitative terms and that existing fault-tree analysis techniques provide little guidance on formulating and evaluating potential failure modes. A framework for the requirements engineering process is proposed that consists of a qualitative method for requirements specification, called the qualitative formal method (QFM), and a safety analysis method for the requirements based on causality information, called the causal requirements safety analysis (CRSA). CRSA is a technique that qualitatively evaluates causal relationships between software faults and physical hazards. This technique, extending the qualitative formal method process and utilizing information captured in the state trajectory, provides specific guidelines on how to identify failure modes and the relationship among them. The QFM and CRSA processes are described using shutdown system 2 of the Wolsong nuclear power plants as the digital protection system example

  16. DNBR calculation in digital core protection system by a subchannel analysis code

    International Nuclear Information System (INIS)

    In, W. K.; Yoo, Y. J.; Hwang, T. H.; Ji, S. K.

    2001-01-01

    The DNBR calculation uncertainty and DNBR margin were evaluated in digital core protection system by a thermal-hydrualic subchannel analysis code MATRA. A simplified thermal-hydraulic code CETOP is used to calculate on-line DNBR in core protection system at a digital PWR. The DNBR tuning process against a best-estimate subchannel analysis code is required for CETOP to ensure accurate and conservative DNBR calculation but not necessary for MATRA. The DNBR calculations by MATRA and CETOP were performed for a large number of operating condition in Yonggwang nulcear units 3-4 where the digitial core protection system is initially implemented in Korea. MATRA resulted in a less negative mean value (i.e., reduce the overconservatism) and a somewhat larger standard deviation of the DNBR error. The uncertainty corrected minimum DNBR by MATRA was shown to be higher by 1.8% -9.9% that the CETOP DNBR

  17. 47 CFR 74.710 - Digital low power TV and TV translator station protection.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital low power TV and TV translator station... SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.710 Digital low power TV and TV translator station protection. (a) An application to construct a new low power TV, TV translator, or TV...

  18. Software V ampersand V methods for digital plant protection system

    International Nuclear Information System (INIS)

    Kim, Hung-Jun; Han, Jai-Bok; Chun, Chong-Son; Kim, Sung; Kim, Kern-Joong.

    1997-01-01

    Careful thought must be given to software design in the development of digital based systems that play a critical role in the successful operation of nuclear power plants. To evaluate the software verification and validation methods as well as to verify its system performance capabilities for the upgrade instrumentation and control system in the Korean future nuclear power plants, the prototype Digital Plant, Protection System (DPPS) based on the Programmable Logic Controller (PLC) has been constructed. The system design description and features are briefly presented, and the software design and software verification and validation methods are focused. 6 refs., 2 figs

  19. Advanced digital instrumentation and control system for nuclear power plant protection

    International Nuclear Information System (INIS)

    Sabino, D.

    1997-01-01

    The Diverse Protection System (DPS) is described. The DPS is a state-of-the-art digital protection system developed as a back-up to the primary reactor protection system at the Temelin nuclear power plant, featuring a compact hardware design based on VMEbus technology. This technology allows for ease in adding or modifying the number and type of input modules and processors. The DPS software is written in a high level language suitable for safety critical applications. The software is both modular and configurable allowing for potential future modifications and software reuse

  20. Protection coordination: Determination of break point set

    NARCIS (Netherlands)

    Madani, S.M.; Rijanto, H.

    1998-01-01

    Modern power system networks are often multiloop structured. The co-ordinated setting of overcurrent and distance protective relays in such networks is tedious and time consuming. The complicated part of this problem is the determination of a proper minimum set of relays, the so-called minimum

  1. Setting Component Priorities in Protecting NPPs against Cyber-Attacks Using Reliability Analysis Techniques

    International Nuclear Information System (INIS)

    Choi, Moon Kyoung; Seong, Poong Hyun; Son, Han Seong

    2017-01-01

    The digitalization of infrastructure makes systems vulnerable to cyber threats and hybrid attacks. According to ICS-CERT report, as time goes by, the number of vulnerabilities in ICS industries increases rapidly. Digital I and C systems have been developed and installed in nuclear power plants, and due to installation of the digital I and C systems, cyber security concerns are increasing in nuclear industry. However, there are too many critical digital assets to be inspected in digitalized NPPs. In order to reduce the inefficiency of regulation in nuclear facilities, the critical components that are directly related to an accident are elicited by using the reliability analysis techniques. Target initial events are selected, and their headings are analyzed through event tree analysis about whether the headings can be affected by cyber-attacks or not. Among the headings, the headings that can be proceeded directly to the core damage by the cyber-attack when they are fail are finally selected as the target of deriving the minimum cut-sets. We analyze the fault trees and derive the minimum set-cuts. In terms of original PSA, the value of probability for the cut-sets is important but the probability is not important in terms of cyber security of NPPs. The important factors is the number of basic events consisting of the minimal cut-sets that is proportional to vulnerability.

  2. A Design and Research on Protection of Architectural Heritage Based on Digital Technology

    Directory of Open Access Journals (Sweden)

    Hou Shuang Qing

    2016-01-01

    Full Text Available In the era of digital information, how to reasonably use new-tech and idea for the architectural heritage protection remains urgent. In terms of digital protection, 3D laser scanning technology can perfectly remedy the manual measurement limitation thus correctly obtaining the relevant data. Via analysis, we find that the architectural heritage bears in itself the parameterized characteristic. As Building Information Modeling (BIM can help realize the parametric design, we proposed a feasible Architectural Heritage Information Model with the BIM “family” connecting architectural heritage and BIM. Finally, the parameter-induced graphic driving is achieved based on the relation between the two.

  3. Refurbishing the reactor protection systems of VVER-440/230 and VVER-1000/320 nuclear power plants with exclusively digital IandC systems

    International Nuclear Information System (INIS)

    Martin, M.

    1997-01-01

    The refurbishment of reactor protection systems of nuclear power plants is based on two sets of requirements: engineering aspects such as performance, qualification and licensing, as well as interfaces to other systems; and cost-benefit relationships, ease of service and maintenance as well as installation during scheduled outages. A number of WWER-440 and WWER-1000 nuclear plants have announced their intention to refurbish their protection systems. Since 1994, these plants have been placing orders with Siemens for new protection systems, including the neutron flux monitoring system utilizing the advanced system TELEPERM XS. This exclusively digital IandC system provides an excellent foundation for the remaining plant service life

  4. Software hazard analysis for nuclear digital protection system by Colored Petri Net

    International Nuclear Information System (INIS)

    Bai, Tao; Chen, Wei-Hua; Liu, Zhen; Gao, Feng

    2017-01-01

    Highlights: •A dynamic hazard analysis method is proposed for the safety-critical software. •The mechanism relies on Colored Petri Net. •Complex interactions between software and hardware are captured properly. •Common failure mode in software are identified effectively. -- Abstract: The software safety of a nuclear digital protection system is critical for the safety of nuclear power plants as any software defect may result in severe damage. In order to ensure the safety and reliability of safety-critical digital system products and their applications, software hazard analysis is required to be performed during the lifecycle of software development. The dynamic software hazard modeling and analysis method based on Colored Petri Net is proposed and applied to the safety-critical control software of the nuclear digital protection system in this paper. The analysis results show that the proposed method can explain the complex interactions between software and hardware and identify the potential common cause failure in software properly and effectively. Moreover, the method can find the dominant software induced hazard to safety control actions, which aids in increasing software quality.

  5. Digital Collections, Digital Libraries & the Digitization of Cultural Heritage Information.

    Science.gov (United States)

    Lynch, Clifford

    2002-01-01

    Discusses digital collections and digital libraries. Topics include broadband availability; digital rights protection; content, both non-profit and commercial; digitization of cultural content; sustainability; metadata harvesting protocol; infrastructure; authorship; linking multiple resources; data mining; digitization of reference works;…

  6. Development of digital power measuring and protecting equipment for SPRR-300 reactor

    International Nuclear Information System (INIS)

    Wang Xuejie; Li Xi'an; Zhu Shilei

    2005-01-01

    A measuring and protecting equipment of reactor power based on Single-Chip Microcomputer is introduced in this paper. The composition of hardware and the major control idea about the software for the equipment are presented. Digitizing the measuring data from nuclear instruments is precondition of reactor control and protection system which would be computerizing, and it is also an application of redundancy and variety of reactor protection system in nuclear measuring instruments. At last the working state is described. (authors)

  7. Advanced digital instrumentation and control system for nuclear power plant protection

    Energy Technology Data Exchange (ETDEWEB)

    Sabino, D [VVER Engineering, Westinghouse Electric Corporation (United States)

    1998-12-31

    The Diverse Protection System is a back-up to the Primary Reactor Protection System developed for use at the Temelin nuclear power plant. The DPS is a digital system which provides a wealth of benefits from today`s advanced technology. These benefits include a compact hardware design with high performance microprocessors and a structured software design using a high level language. An overview of the DPS functions, hardware and software is provided. (author). 1 fig., 1 tab.

  8. Quantum Digital Signatures for Unconditional Safe Authenticity Protection of Medical Documentation

    Directory of Open Access Journals (Sweden)

    Arkadiusz Liber

    2015-12-01

    Full Text Available Modern medical documentation appears most often in an online form which requires some digital methods to ensure its confidentiality, integrity and authenticity. The document authenticity may be secured with the use of a signature. A classical handwritten signature is directly related to its owner by his/her psychomotor character traits. Such a signature is also connected with the material it is written on, and a writing tool. Because of these properties, a handwritten signature reflects certain close material bonds between the owner and the document. In case of modern digital signatures, the document authentication has a mathematical nature. The verification of the authenticity becomes the verification of a key instead of a human. Since 1994 it has been known that classical digital signature algorithms may not be safe because of the Shor’s factorization algorithm. To implement the modern authenticity protection of medical data, some new types of algorithms should be used. One of the groups of such algorithms is based on the quantum computations. In this paper, the analysis of the current knowledge status of Quantum Digital Signature protocols, with its basic principles, phases and common elements such as transmission, comparison and encryption, was outlined. Some of the most promising protocols for signing digital medical documentation, that fulfill the requirements for QDS, were also briefly described. We showed that, a QDS protocol with QKD components requires the equipment similar to the equipment used for a QKD, for its implementation, which is already commercially available. If it is properly implemented, it provides the shortest lifetime of qubits in comparison to other protocols. It can be used not only to sign classical messages but probably it could be well adopted to implement unconditionally safe protection of medical documentation in the nearest future, as well.

  9. Developing Archive Information Packages for Data Sets: Early Experiments with Digital Library Standards

    Science.gov (United States)

    Duerr, R. E.; Yang, M.; Gooyabadi, M.; Lee, C.

    2008-12-01

    The key to interoperability between systems is often metadata, yet metadata standards in the digital library and data center communities have evolved separately. In the data center world NASA's Directory Interchange Format (DIF), the Content Standard for Digital Geospatial Metadata (CSDGM), and most recently the international Geographic Information: Metadata (ISO 19115:2003) are used for descriptive metadata at the data set level to allow catalog interoperability; but use of anything other than repository- based metadata standards for the individual files that comprise a data set is rare, making true interoperability, at the data rather than data set level, across archives difficult. While the Open Archival Information Systems (OAIS) Reference Model with its call for creating Archive Information Packages (AIP) containing not just descriptive metadata but also preservation metadata is slowly being adopted in the community, the PREservation Metadata Implementation Strategies (PREMIS) standard, the only extant OAIS- compliant preservation metadata standard, has scarcely even been recognized as being applicable to the community. The digital library community in the meantime has converged upon the Metadata Encoding and Transmission Standard (METS) for interoperability between systems as evidenced by support for the standard by digital library systems such as Fedora and Greenstone. METS is designed to allow inclusion of other XML-based standards as descriptive and administrative metadata components. A recent Stanford study suggests that a combination of METS with included FGDC and PREMIS metadata could work well for individual granules of a data set. However, some of the lessons learned by the data center community over the last 30+ years of dealing with digital data are 1) that data sets as a whole need to be preserved and described and 2) that discovery and access mechanisms need to be hierarchical. Only once a user has reviewed a data set description and determined

  10. 47 CFR 74.793 - Digital low power TV and TV translator station protection of broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital low power TV and TV translator station... DISTRIBUTIONAL SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.793 Digital low power TV and TV translator station protection of broadcast stations. (a) An application to construct a new digital low power...

  11. Pengembangan Sistem Proteksi Digital Arus Lebih Berbasis Logika Fuzzy sebagai Pengaman PLTMH

    Directory of Open Access Journals (Sweden)

    Cahayahati

    2013-09-01

    Full Text Available In this paper discussed digital overcurrent protection system fuzzy logic on plant systems or Micro Hydro Power Plants with fuzzy logic approach to the identification of the signal changes due to interference overcurrent short circuit the lifeboat station on the system. A digital overcurrent protection with a fuzzy logic-based method and the rules set if-then, fuzzification and defazzification which has 2 inputs are crisp and delta error and error the actual fault current has a crisp output 1 to input changes in current to drive the relay breaker. This system consists of a hardware system with microcontroller (mc ATMega8535 and other series as well as software that helps in the protection process performance Delpi 7 computer using fuzzy logic and program using C language and dicompel with CodeVisionAVR software and uploaded to the microcontroller using ponyprog2000 ATMega8535. The success of a prototype digital overcurrent protection system was tested on a fuzzy logic system voltage of 220 volts with a simple system technique burdened beyond any current settings and calculated over a given working time protection relay. After testing and calculations, then the inverse Characteristics of digital protection between the current disruption to the working time protection can be envisaged that a larger fault current less time working to secure protection from interference generating systems.

  12. Use of digital computers in the protection system for Savannah River reactors

    International Nuclear Information System (INIS)

    Gimmy, K.L.

    1977-06-01

    Each production reactor at the Savannah River Plant has recently been provided with a protective system using dual digital computers. The dual ''safety computers'' monitor coolant temperature and flow in each of the 600 fuel assemblies in the reactor. The system provides alarms and automatic reactor shutdown (SCRAM) if these variables exceed predetermined setpoints. The system provides the primary protection for unwanted local or general power increase or assembly coolant flow reduction. Standard process control computers are used and all scanning, data output, and protective action are controlled by software prepared by Du Pont

  13. Safety aspect of digital reactor protection system in Japan

    International Nuclear Information System (INIS)

    Ogiso, Zen-Ichi

    1998-01-01

    It was early in 1980's that the digital controllers were first applied to nuclear power plant in japan. After that, their application area had been expanding gradually, reaching to the overall integrated digital system including the safety system in Kashiwazaki-Kariwa units 6 and 7. The software for computer-based systems has been produced using the graphical language ''POL'' in Japanese nuclear power plants. It is the fundamental principle that the reliability of the software should be assured through the properly managed quality assurance. The POL-based system is fitted to this principle. In applying POL-based systems to safety system, the MITI, Ministry of International Trade and Industry, identified the licensing issues as the regulatory body, while the utilities had developed the digital technology feasible to the safety application. Through the activities, a specific industrial design guide for the software important to safety was established and the adequacy of the technology was certified through the demonstration tests of the integrated system. In the safety examination of the digital reactor protection system of K-6/7, the application of POL were approved. The POL-based systems in nuclear power plants were successful design and production process of the POL-based systems. This paper describes the activities in licensing and maintaining the computer-based systems by the utilities and manufacturers as well as the MITI. (author)

  14. Staged-Fault Testing of Distance Protection Relay Settings

    Science.gov (United States)

    Havelka, J.; Malarić, R.; Frlan, K.

    2012-01-01

    In order to analyze the operation of the protection system during induced fault testing in the Croatian power system, a simulation using the CAPE software has been performed. The CAPE software (Computer-Aided Protection Engineering) is expert software intended primarily for relay protection engineers, which calculates current and voltage values during faults in the power system, so that relay protection devices can be properly set up. Once the accuracy of the simulation model had been confirmed, a series of simulations were performed in order to obtain the optimal fault location to test the protection system. The simulation results were used to specify the test sequence definitions for the end-to-end relay testing using advanced testing equipment with GPS synchronization for secondary injection in protection schemes based on communication. The objective of the end-to-end testing was to perform field validation of the protection settings, including verification of the circuit breaker operation, telecommunication channel time and the effectiveness of the relay algorithms. Once the end-to-end secondary injection testing had been completed, the induced fault testing was performed with three-end lines loaded and in service. This paper describes and analyses the test procedure, consisting of CAPE simulations, end-to-end test with advanced secondary equipment and staged-fault test of a three-end power line in the Croatian transmission system.

  15. DIGITAL DATA PROTECTION USING STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    R. Rejani

    2016-03-01

    Full Text Available In today’s digital world applications from a computer or a mobile device consistently used to get every kind of work done for professional as well as entertainment purpose. However, one of the major issue that a software publisher will face is the issue of piracy. Throughout the last couple of decades, almost all-major or minor software has been pirated and freely circulated across the internet. The impact of the rampant software piracy has been huge and runs into billions of dollars every year. For an independent developer or a programmer, the impact of piracy will be huge. Huge companies that make specialized software often employ complex hardware methods such as usage of dongles to avoid software piracy. However, this is not possible to do for a normal independent programmer of a small company. As part of the research, a new method of software protection that does not need proprietary hardware and other complex methods are proposed in this paper. This method uses a combination of inbuilt hardware features as well as steganography and encryption to protect the software against piracy. The properties or methods used include uniqueness of hardware, steganography, strong encryption like AES and geographic location. To avoid hacking the proposed framework also makes use of self-checks in a random manner. The process is quite simple to implement for any developer and is usable on both traditional PCs as well as mobile environments.

  16. The role of digitization on data protection and recovery in libraries ...

    African Journals Online (AJOL)

    This study investigated the role of digitization on data protection and recovery in different types of libraries at a global level. The survey research design was adopted to elicit data for this research work. Four different types of libraries were purposively chosen from thirteen countries and questionnaire was designed as ...

  17. Preliminary Uncertainty Analysis for SMART Digital Core Protection and Monitoring System

    International Nuclear Information System (INIS)

    Koo, Bon Seung; In, Wang Kee; Hwang, Dae Hyun

    2012-01-01

    The Korea Atomic Energy Research Institute (KAERI) developed on-line digital core protection and monitoring systems, called SCOPS and SCOMS as a part of SMART plant protection and monitoring system. SCOPS simplified the protection system by directly connecting the four RSPT signals to each core protection channel and eliminated the control element assembly calculator (CEAC) hardware. SCOMS adopted DPCM3D method in synthesizing core power distribution instead of Fourier expansion method being used in conventional PWRs. The DPCM3D method produces a synthetic 3-D power distribution by coupling a neutronics code and measured in-core detector signals. The overall uncertainty analysis methodology which is used statistically combining uncertainty components of SMART core protection and monitoring system was developed. In this paper, preliminary overall uncertainty factors for SCOPS/SCOMS of SMART initial core were evaluated by applying newly developed uncertainty analysis method

  18. An evaluation method of fault-tolerance for digital plant protection system in nuclear power plants

    International Nuclear Information System (INIS)

    Lee, Jun Seok; Kim, Man Cheol; Seong, Poong Hyun; Kang, Hyun Gook; Jang, Seung Cheol

    2005-01-01

    In recent years, analog based nuclear power plant (NPP) safety related instrumentation and control (I and C) systems have been replaced to modern digital based I and C systems. NPP safety related I and C systems require very high design reliability compare to the conventional digital systems so that reliability assessment is very important. In the reliability assessment of the digital system, fault tolerance evaluation is one of the crucial factors. However, the evaluation is very difficult because the digital system in NPP is very complex. In this paper, the simulation based fault injection technique on simplified processor is used to evaluate the fault-tolerance of the digital plant protection system (DPPS) with high efficiency with low cost

  19. Climate conscious citizenship in a digital urban setting

    DEFF Research Database (Denmark)

    Andersen, Sophie Esmann; Nielsen, Anne Ellerup

    2011-01-01

    Climate change has challenged urban life, and as an omnipresent force, Nature sets the agenda for urban living. Using stakeholder theory to conceptualise urban life, we approach Nature as both an omnipresent stakeholder and an issue to be continuously addressed and related to. Adapting the stakeh......Climate change has challenged urban life, and as an omnipresent force, Nature sets the agenda for urban living. Using stakeholder theory to conceptualise urban life, we approach Nature as both an omnipresent stakeholder and an issue to be continuously addressed and related to. Adapting...... explore how the citizen is framed and invited to enact his/her responsibilities to the natural environment in an urban setting and how the digital mediation facilitates various forms of relations and climate conscious positions, incorporating both narcissistic desires, universal anxiety, moral obligations......, ethical virtue and image performance. Statements from the actual confessors/committers exemplify this. Thus, the paper provides insight into understanding the complexity of climate-conscious citizenship as a complex configuration of paradoxical, co-existing ethics and arguments....

  20. Correlates of protection against human rotavirus disease and the factors influencing protection in low-income settings.

    Science.gov (United States)

    Clarke, E; Desselberger, U

    2015-01-01

    Rotaviruses (RV) are the leading cause of gastroenteritis in infants and children worldwide and are associated with high mortality predominately in low-income settings. The virus is classified into G and P serotypes and further into P genotypes based on differences in the surface-exposed proteins VP7 and VP4, respectively. Infection results in a variable level of protection from subsequent reinfection and disease. This protection is predominantly homotypic in some settings, whereas broader heterotypic protection is reported in other cohorts. Two antigenically distinct oral RV vaccines are licensed and are being rolled out widely, including in resource-poor setting, with funding provided by the GAVI alliance. First is a monovalent vaccine derived from a live-attenuated human RV strain, whereas the second is a pentavalent bovine-human reassortment vaccine. Both vaccines are highly efficacious in high-income settings, but greatly reduced levels of protection are reported in low-income countries. Here, the current challenges facing mucosal immunologists and vaccinologists aiming to define immunological correlates and to understand the variable levels of protection conferred by these vaccines in humans is considered. Such understanding is critical to maximize the public health impact of the current vaccines and also to the development of the next generation of RV vaccines, which are needed.

  1. A study of digital hardware architectures for nuclear reactors protection systems applications - reliability and safety analysis methods

    International Nuclear Information System (INIS)

    Benko, Pedro Luiz

    1997-01-01

    A study of digital hardware architectures, including experience in many countries, topologies and solutions to interface circuits for protection systems of nuclear reactors is presented. Methods for developing digital systems architectures based on fault tolerant and safety requirements is proposed. Directives for assessing such conditions are suggested. Techniques and the most common tools employed in reliability, safety evaluation and modeling of hardware architectures is also presented. Markov chain modeling is used to evaluate the reliability of redundant architectures. In order to estimate software quality, several mechanisms to be used in design, specification, and validation and verification (V and V) procedures are suggested. A digital protection system architecture has been analyzed as a case study. (author)

  2. Ethical Issues for Direct-to-Consumer Digital Psychotherapy Apps: Addressing Accountability, Data Protection, and Consent.

    Science.gov (United States)

    Martinez-Martin, Nicole; Kreitmair, Karola

    2018-04-23

    This paper focuses on the ethical challenges presented by direct-to-consumer (DTC) digital psychotherapy services that do not involve oversight by a professional mental health provider. DTC digital psychotherapy services can potentially assist in improving access to mental health care for the many people who would otherwise not have the resources or ability to connect with a therapist. However, the lack of adequate regulation in this area exacerbates concerns over how safety, privacy, accountability, and other ethical obligations to protect an individual in therapy are addressed within these services. In the traditional therapeutic relationship, there are ethical obligations that serve to protect the interests of the client and provide warnings. In contrast, in a DTC therapy app, there are no clear lines of accountability or associated ethical obligations to protect the user seeking mental health services. The types of DTC services that present ethical challenges include apps that use a digital platform to connect users to minimally trained nonprofessional counselors, as well as services that provide counseling steered by artificial intelligence and conversational agents. There is a need for adequate oversight of DTC nonprofessional psychotherapy services and additional empirical research to inform policy that will provide protection to the consumer. ©Nicole Martinez-Martin, Karola Kreitmair. Originally published in JMIR Mental Health (http://mental.jmir.org), 23.04.2018.

  3. Integrated, digital experiment transient control and safety protection of an in-pile test

    International Nuclear Information System (INIS)

    Thomas, R.W.; Whitacre, R.F.; Klingler, W.B.

    1982-01-01

    The Sodium Loop Safety Facility experimental program has demonstrated that in-pile loop fuel failure transient tests can be digitally controlled and protected with reliability and precision. This was done in four nuclear experiments conducted in the Engineering Test Reactor operated by EG and G Idaho, Inc., at the Idaho National Engineering Laboratory. Loop sodium flow and reactor power transients can be programmed to sponsor requirements and verified prior to the test. Each controller has redundancy, which reduces the effect of single failures occurring during test transients. Feedback and reject criteria are included in the reactor power control. Timed sequencing integrates the initiation of the controllers, programmed safety set-points, and other experiment actions (e.g., planned scram). Off-line and on-line testing is included. Loss-of-flow, loss-of-piping-integrity, boiling-window, transient-overpower, and local fault tests have been successfully run using this system

  4. Method and practice on safety software verification and validation for digital reactor protection system

    International Nuclear Information System (INIS)

    Li Duo; Zhang Liangju; Feng Junting

    2010-01-01

    The key issue arising from digitalization of reactor protection system for Nuclear Power Plant (NPP) is in essence, how to carry out Verification and Validation (V and V), to demonstrate and confirm the software is reliable enough to perform reactor safety functions. Among others the most important activity of software V and V process is unit testing. This paper discusses the basic concepts on safety software V and V and the appropriate technique for software unit testing, focusing on such aspects as how to ensure test completeness, how to establish test platform, how to develop test cases and how to carry out unit testing. The technique discussed herein was successfully used in the work of unit testing on safety software of a digital reactor protection system. (author)

  5. Digital integrated protection system: Quantitative methods for dependability evaluation

    International Nuclear Information System (INIS)

    Krotoff, H.; Benski, C.

    1986-01-01

    The inclusion of programmed digital techniques in the SPIN system provides the used with the capability of performing sophisticated processing operations. However, it causes the quantitative evaluation of the overall failure probabilities to become somewhat more intricate by reason that: A single component may be involved in several functions; Self-tests may readily be incorporated for the purpose of monitoring the dependable operation of the equipment at all times. This paper describes the methods as implemented by MERLIN GERIN for the purpose of evaluating: The probabilities for the protective actions not to be initiated (dangerous failures); The probabilities for such protective actions to be initiated accidentally. Although the communication is focused on the programmed portion of the SPIN (UAIP) it will also deal with the evaluation performed within the scope of study works that do not exclusively cover the UAIPs

  6. Geological settings of the protected Selisoo mire (northeastern Estonia threatened by oil shale mining

    Directory of Open Access Journals (Sweden)

    Helen Hiiemaa

    2014-05-01

    Full Text Available The protected Selisoo mire in northeastern Estonia is located above valuable oil shale resources, partly in the permitted mining area. We describe in detail the geomorphology and geological setting of the mire to understand the natural preconditions for its formation, development and preservation. We used the LiDAR-based digital elevation model for relief analysis, mapped the peat thickness with ground-penetrating radar and described the Quaternary cover through corings. Ridges, oriented perpendicular to the generally southward-sloping terrain, and shallow depressions at the surface of mineral soil have influenced mire formation and its spatio-temporal dynamics. The Quaternary cover under the mire is thin and highly variable. Therefore the mire is hydro­geologically insufficiently isolated from the limestone bedrock that is drained by the nearby oil shale mine and consequently the mining activities approaching the mire may have a negative influence on the wetland and proposed Natura 2000 site. Natura 2000 type wetlands, both protected or currently outside the nature reserves, cover a significant portion of the prospective oil shale mining areas. The distribution and resilience of those sites may significantly influence further utilization of oil shale resources.

  7. On the simulation of transients and accidents in PWRs with digital instrumentation and control using an LQR digital controller

    International Nuclear Information System (INIS)

    Alvarenga, M.A.B.; Melo, P.F. Frutuoso e; Medeiros, J.A.C.C.; Oliva, J.J. Rivero

    2015-01-01

    New nuclear power plant designs are including integrated I and C digital systems for protection, control, alarming and monitoring. Existing operating nuclear power plants, as is the case of Angra 1 nuclear power plant, have to consider the replacement of their I and C analog systems by digital systems for retrofitting their facilities. However, before replacing the analog control loops by digital ones it is necessary to design and evaluate their performance, which requires modeling of the plant and its control system with extensive simulations under several normal and abnormal operation conditions. This paper discusses the use of a linear quadratic regulator (LQR) digital controller for evaluating the plant stability behavior before the actuation of the reactor protection system. The objective is to evaluate the effect of digital controllers on plant behavior for several transients and accident conditions. For this purpose, a numerical model was developed and implemented as a MatlabTM tool. This paper discusses an adequate framework in order to simulate a set of transients and accidents that constitute the design basis in the final safety analysis report of PWR power plants to evaluate the performance of digital controllers such as LQR regulators.(author)

  8. The application of high voltage digital and analogue unit protections to utility telecommunications systems

    Energy Technology Data Exchange (ETDEWEB)

    Farthing, H. [SNC Group, Montreal, PQ (Canada); Verzosa, Q.R.; Care, J.M. [SNC Group, Montreal, PQ (Canada)

    1996-08-01

    The use of fibre optic and digital microwave systems, both within and without utility communications networks was discussed. Their availability has led to the development of phase comparison and differential current relaying systems which provide enhanced protective features for transmission circuits. The application of fibre optic cable or microwave radio data links overcomes problems caused by ground potential rise and transferred potential damage in metallic pilot wire schemes. Some problems were encountered when installing digital differential current and analogue phase comparison relaying systems to a 220 kV power transmission system where a mix of analog microwave, digital microwave radio and multiplexed fibre optic channels were available. However, the relays were successfully installed with the application of digital pilot differential relays to the power system which enabled fast fault clearance to be achieved. 7 refs., 1 tab., 1 fig.

  9. Estimation of digital protection devices applicability on basis of multiple characterizing parameters

    Directory of Open Access Journals (Sweden)

    Dimitar Bogdanov

    2018-01-01

    Full Text Available The contemporary electrical power systems (EPS impose increased requirements for the functionality of the protection systems. The necessity of improved EPS stability is in some extent resulting of the increased integration of renewable sources of electrical energy. The future grid development gives perspective for connection of more converter based generations. The power electronic schemes and associated functional requirements impose necessity of high speed, sensitive, selective and reliable operation of the protection devices. These requirements have always been target of the protection equipment producers and grid operators. The electronic converting schemes specifics impose these requirements for the protection devices in more straightened way, as the converter connected generator may need to trip in shorter time than classical machine generator. In the article is presented a generalized overview of some of the characteristics of the digital “relay” protection devices, and approach for device selection is proposed. Investment planning may utilize such approach in order to have an optimal design from financial point of view.

  10. Digital breast tomosynthesis (DBT): initial experience in a clinical setting

    International Nuclear Information System (INIS)

    Skaane, Per; Gullien, Randi; Eben, Ellen B.; Haakenaasen, Unni; Naess Jebsen, Ingvild; Krager, Mona; Bjoerndal, Hilde; Ekseth, Ulrika; Jahr, Gunnar

    2012-01-01

    Background: Digital breast tomosynthesis (DBT) is a promising new technology. Some experimental clinical studies have shown positive results, but the future role and indications of this new technique, whether in a screening or clinical setting, need to be evaluated. Purpose: To compare digital mammography and DBT in a side-by-side feature analysis for cancer conspicuity, and to assess whether there is a potential additional value of DBT to standard state-of-the-art conventional imaging work-up with respect to detection of additional malignancies. Material and Methods: The study had ethics committee approval. A total of 129 women underwent 2D digital mammography including supplementary cone-down and magnification views and breast ultrasonography if indicated, as well as digital breast tomosynthesis. The indication for conventional imaging in the clinical setting included a palpable lump in 30 (23%), abnormal mammographic screening findings in 54 (42%), and surveillance in 45 (35%) of the women. The women were examined according to present guidelines, including spot-magnification views, ultrasonography, and needle biopsies, if indicated. The DBT examinations were interpreted several weeks after the conventional imaging without knowledge of the conventional imaging findings. In a later session, three radiologists performed a side-by-side feature analysis for cancer conspicuity in a sample of 50 cases. Results: State-of-the-art conventional imaging resulted in needle biopsy of 45 breasts, of which 20 lesions were benign and a total of 25 cancers were diagnosed. The remaining 84 women were dismissed with a normal/definitely benign finding and without indication for needle biopsy. The subsequent DBT interpretation found suspicious findings in four of these 84 women, and these four women had to be called back for repeated work-up with knowledge of the tomosynthesis findings. These delayed work-ups resulted in two cancers (increasing the cancer detection by 8%) and two

  11. 10 CFR 73.55 - Requirements for physical protection of licensed activities in nuclear power reactors against...

    Science.gov (United States)

    2010-01-01

    ... protection of digital computer and communication systems and networks. (ii) Site-specific conditions that... criteria set forth in § 73.54 “Protection of Digital Computer and Communication systems and Networks” of... visitors shall register their name, date, time, purpose of visit, employment affiliation, citizenship, and...

  12. Estimation of reliability on digital plant protection system in nuclear power plants using fault simulation with self-checking

    International Nuclear Information System (INIS)

    Lee, Jun Seok; Kim, Suk Joon; Seong, Poong Hyun

    2004-01-01

    Safety-critical digital systems in nuclear power plants require high design reliability. Reliable software design and accurate prediction methods for the system reliability are important problems. In the reliability analysis, the error detection coverage of the system is one of the crucial factors, however, it is difficult to evaluate the error detection coverage of digital instrumentation and control system in nuclear power plants due to complexity of the system. To evaluate the error detection coverage for high efficiency and low cost, the simulation based fault injections with self checking are needed for digital instrumentation and control system in nuclear power plants. The target system is local coincidence logic in digital plant protection system and a simplified software modeling for this target system is used in this work. C++ based hardware description of micro computer simulator system is used to evaluate the error detection coverage of the system. From the simulation result, it is possible to estimate the error detection coverage of digital plant protection system in nuclear power plants using simulation based fault injection method with self checking. (author)

  13. 30 CFR 75.601-1 - Short circuit protection; ratings and settings of circuit breakers.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Short circuit protection; ratings and settings... Trailing Cables § 75.601-1 Short circuit protection; ratings and settings of circuit breakers. Circuit breakers providing short circuit protection for trailing cables shall be set so as not to exceed the...

  14. Formal Verification of Digital Protection Logic and Automatic Testing Software

    Energy Technology Data Exchange (ETDEWEB)

    Cha, S. D.; Ha, J. S.; Seo, J. S. [KAIST, Daejeon (Korea, Republic of)

    2008-06-15

    - Technical aspect {center_dot} It is intended that digital I and C software have safety and reliability. Project results help the software to acquire license. Software verification technique, which results in this project, can be to use for digital NPP(Nuclear power plant) in the future. {center_dot} This research introduces many meaningful results of verification on digital protection logic and suggests I and C software testing strategy. These results apply to verify nuclear fusion device, accelerator, nuclear waste management and nuclear medical device that require dependable software and high-reliable controller. Moreover, These can be used for military, medical or aerospace-related software. - Economical and industrial aspect {center_dot} Since safety of digital I and C software is highly import, It is essential for the software to be verified. But verification and licence acquisition related to digital I and C software face high cost. This project gives economic profit to domestic economy by using introduced verification and testing technique instead of foreign technique. {center_dot} The operation rate of NPP will rise, when NPP safety critical software is verified with intellectual V and V tool. It is expected that these software substitute safety-critical software that wholly depend on foreign. Consequently, the result of this project has high commercial value and the recognition of the software development works will be able to be spread to the industrial circles. - Social and cultural aspect People expect that nuclear power generation contributes to relieving environmental problems because that does not emit more harmful air pollution source than other power generations. To give more trust and expectation about nuclear power generation to our society, we should make people to believe that NPP is highly safe system. In that point of view, we can present high-reliable I and C proofed by intellectual V and V technique as evidence

  15. A new digital ground-fault protection system for generator-transformer unit

    Energy Technology Data Exchange (ETDEWEB)

    Zielichowski, Mieczyslaw; Szlezak, Tomasz [Institute of Electrical Power Engineering, Wroclaw University of Technology, Wybrzeze Wyspianskiego 27, 50370 Wroclaw (Poland)

    2007-08-15

    Ground faults are one of most often reasons of damages in stator windings of large generators. Under certain conditions, as a result of ground-fault protection systems maloperation, ground faults convert into high-current faults, causing severe failures in power system. Numerous publications in renowned journals and magazines testify about ground-fault matter importance and problems reported by exploitators confirm opinions, that some issues concerning ground-fault protection of large generators have not been solved yet or have been solved insufficiently. In this paper a new conception of a digital ground-fault protection system for stator winding of large generator was proposed. The process of intermittent arc ground fault in stator winding has been briefly discussed and actual ground-fault voltage waveforms were presented. A new relaying algorithm, based on third harmonic voltage measurement was also drawn and the methods of its implementation and testing were described. (author)

  16. Development of Uncertainty Analysis Method for SMART Digital Core Protection and Monitoring System

    International Nuclear Information System (INIS)

    Koo, Bon Seung; In, Wang Kee; Hwang, Dae Hyun

    2012-01-01

    The Korea Atomic Energy Research Institute has developed a system-integrated modular advanced reactor (SMART) for a seawater desalination and electricity generation. Online digital core protection and monitoring systems, called SCOPS and SCOMS respectively were developed. SCOPS calculates minimum DNBR and maximum LPD based on the several online measured system parameters. SCOMS calculates the variables of limiting conditions for operation. KAERI developed overall uncertainty analysis methodology which is used statistically combining uncertainty components of SMART core protection and monitoring system. By applying overall uncertainty factors in on-line SCOPS/SCOMS calculation, calculated LPD and DNBR are conservative with a 95/95 probability/confidence level. In this paper, uncertainty analysis method is described for SMART core protection and monitoring system

  17. Recent digital control and protection retrofits in power plants

    International Nuclear Information System (INIS)

    Fournier, R.D.; Hammer, M.; Smith, J.E.

    1987-01-01

    Digital computers are now being retrofitted to all types of power plants, replacing analog equipment and solving problems such as equipment obsolescence and low reliability. Three diverse examples of retrofits are presented in this paper, representing trends in man/machine interface design at an oil-fired plant, protection system in pressurized heavy-water reactors, and control systems in light water reactors (LWRs). The examples have been chosen to illustrate diverse reasons for the retrofits and the benefits derived. The cases presented report retrofits at Northern States Power's Monticello boiling water reactor, New Brunswick Electric Power Commission's (NBEPC's) Point Lepreau Nuclear Generating Station, and finally NBEPC's oil-fired plant at Courtney Bay

  18. New digital control and power protection system of VR 1 training reactor

    International Nuclear Information System (INIS)

    Kropik, M.; Matejka, K.; Juoeickova, M.

    2005-01-01

    The contribution describes the new VR-1 training reactor control and power protection system at the Czech Technical University in Prague. The control system provides safety and control functions, calculates average values of the important variables and sends data and system status to the human-machine interface. The upgraded control system is based on a high quality industrial PC. The operating system of the PC is the Microsoft Windows XP with the real time support RTX of the VentureCom Company. The software was developed according to requirements in MS Visual C. The independent power protection system is a component of the reactor safety (protection) system with high quality and reliability requirements. The digital system is redundant; each channel evaluates the reactor power and the velocity of power changes and provides safety functions. The digital part of the channel is multiprocessor-based. The software was developed with respect to nuclear standards. The software design was coded in the C language regarding the NRC restrictions. Configuration management, verification and validation accompanied the software development. Both systems were thoroughly tested. Firstly, the non active tests were carried out. During these tests, the active core of the reactor was subcritical; the input signals were generated from HPIB and VXI controlled instruments to simulate different operational and safety events. The software for instruments control and tests evaluation utilized Agilent VEE development system. After the successful non active checking, the active tests followed. (author)

  19. Insights from a reliability review of digital plant protection system

    International Nuclear Information System (INIS)

    Kim, I.S.; Hwang, S.W.; Kim, B.S.; Jeong, C.H.; Oh, S.H.

    2001-01-01

    The full text follows: As part of the design efforts for Ulchin nuclear power plant units 5 and 6 of Korea, a reliability analysis of digital plant protection system (DPPS) was performed by ABB-CE. An independent review of the DPPS reliability analysis was undertaken by Hanyang University to assist Korea Institute of Nuclear Safety (KINS), the nuclear regulatory body of Korea, in evaluating the design acceptability of the digital system. The DPPS is designed to encompass both reactor trip function and ESFAS (engineered safety feature actuation system) initiation function. The major methods used by the ABB-CE to assess the Ulchin 5-6 DPPS reliability are failure mode and effect analysis (FMEA) and fault tree analysis. Hence, our independent review was conducted focusing on: -) the establishment of review criteria based on various sources, such as the standard review plan of KINS, 10CFR50 Appendix A, IEEE standards 279, 577, and 603; -) the suitability of the FMEA and fault tree analysis for the Ulchin 5-6 DPPS, including the specific methods used (e.g., for human reliability analysis and common-cause failure analysis), the assumptions made (e.g., with respect to test frequency and watchdog timer coverage), and the data employed (e.g., CCF parameter, human error probability, and processor failure rate); and -) the design acceptability of the DPPS especially as compared to the analog plant protection system from a reliability and safety perspective. The paper shall also discuss key issues requiring further in-depth investigation, such as reliability of programmable logic controllers (PLCs), coverage factor of watchdog timers, and susceptibility of redundant digital units to common cause failure. Sensitivity analyses were carried out to investigate the impact of several parameters of special interest, like the coverage factor of watchdog timer and human error probability (e.g. an operator error to manually trip the reactor, or to mis-calibrate the trip parameters) on

  20. A comprehensive Software Copy Protection and Digital Rights Management platform

    Directory of Open Access Journals (Sweden)

    Ayman Mohammad Bahaa-Eldin

    2014-09-01

    Full Text Available This article proposes a Powerful and Flexible System for Software Copy Protection (SCP and Digital Rights Management (DRM based on Public Key Infrastructure (PKI standards. Software protection is achieved through a multi-phase methodology with both static and dynamic processing of the executable file. The system defeats most of the attacks and cracking techniques and makes sure that the protected software is never in a flat form, with a suitable portion of it always being encrypted during execution. A novel performance-tuning algorithm is proposed to lower the overhead of the protection process to its minimum depending on the software dynamic execution behavior. All system calls to access resources and objects such as files, and input/output devices are intercepted and encapsulated with secure rights management code to enforce the required license model. The system can be integrated with hardware authentication techniques (like dongles, and to Internet based activation and DRM servers over the cloud. The system is flexible to apply any model of licensing including state-based license such as expiration dates and number of trials. The usage of a standard markup language (XrML to describe the license makes it easier to apply new licensing operations like re-sale and content rental.

  1. Measuring relais as an alternative to digital protective systems; Messende Relais als Alternative zu digitalen Schutzsystemen

    Energy Technology Data Exchange (ETDEWEB)

    Wolf, Rainer [Ingenieurgemeinschaft Energieversorgung GbR, Meiningen (Germany)

    2011-07-15

    In order to keep the occasionally severe consequences of electrical faults in switchgear, cables and transformers as low as possible, to reduce the risk to persons and to continue the operation of the not disturbed grid, measuring relays provide for fast and selective fault detection and fault shutdown. In general, it is thought at digital protection systems which are designed for example as a differential protection, distance protection and overcurrent protection. Some applications, however, get along with a lower level of equipment technology, and can be realized more cost-effectively.

  2. The digital reactor protection system for the instrumentation and control of reactor TRIGA PUSPATI (RTP)

    International Nuclear Information System (INIS)

    Nurfarhana Ayuni Joha; Izhar Abu Hussin; Mohd Idris Taib; Zareen Khan Abdul Jalil Khan

    2010-01-01

    Reactor Protection System (RPS) is important for Reactor Instrumentation and Control System. The RPS comprises all redundant electrical devices and circuitry involved in the generation of those initiating signals associated to the trip protective function. The instrumentation system for the RPS provides automatic protection signals against unsafe and improper reactor operation. The physical separation is provided for all of the redundant instrumentation systems to preserve redundancy. The safety protection systems using circuits composed of analog instruments and relays with relay contacts is difficult to realize from various reasons. Therefore, an application of digital technology can be said a logical conclusion also in the light of its functional superiority. (author)

  3. Digital radiographic complexes for traumatological department

    International Nuclear Information System (INIS)

    Sudakevich, Y.; Kovalenko, V.; Miroshnichenko, S.; Balashov, S.; Nevgasimy, A.

    2013-01-01

    The paper deals with a budget digital X-ray equipment in operating trauma unit. The proposed set of equipment lets receive X-ray images of required quality at a significantly reduced requirements for radiation protection in the operating room, and to protect the personnel. We consider two variants of the equipment: for operating rooms in the traumatological department in the central district hospitals on the basis of portable X-ray unit and pediatric trauma unit on the basis of micro focus X-ray generator. (authors)

  4. Digital watermarks in electronic document circulation

    Directory of Open Access Journals (Sweden)

    Vitaliy Grigorievich Ivanenko

    2017-07-01

    Full Text Available This paper reviews different protection methods for electronic documents, their good and bad qualities. Common attacks on electronic documents are analyzed. Digital signature and ways of eliminating its flaws are studied. Different digital watermark embedding methods are described, they are divided into 2 types. The solution to protection of electronic documents is based on embedding digital watermarks. Comparative analysis of this methods is given. As a result, the most convenient method is suggested – reversible data hiding. It’s remarked that this technique excels at securing the integrity of the container and its digital watermark. Digital watermark embedding system should prevent illegal access to the digital watermark and its container. Digital watermark requirements for electronic document protection are produced. Legal aspect of copyright protection is reviewed. Advantages of embedding digital watermarks in electronic documents are produced. Modern reversible data hiding techniques are studied. Distinctive features of digital watermark use in Russia are highlighted. Digital watermark serves as an additional layer of defense, that is in most cases unknown to the violator. With an embedded digital watermark, it’s impossible to misappropriate the authorship of the document, even if the intruder signs his name on it. Therefore, digital watermarks can act as an effective additional tool to protect electronic documents.

  5. Developing a digital photography-based method for dietary analysis in self-serve dining settings.

    Science.gov (United States)

    Christoph, Mary J; Loman, Brett R; Ellison, Brenna

    2017-07-01

    Current population-based methods for assessing dietary intake, including food frequency questionnaires, food diaries, and 24-h dietary recall, are limited in their ability to objectively measure food intake. Digital photography has been identified as a promising addition to these techniques but has rarely been assessed in self-serve settings. We utilized digital photography to examine university students' food choices and consumption in a self-serve dining hall setting. Research assistants took pre- and post-photos of students' plates during lunch and dinner to assess selection (presence), servings, and consumption of MyPlate food groups. Four coders rated the same set of approximately 180 meals for inter-rater reliability analyses; approximately 50 additional meals were coded twice by each coder to assess intra-rater agreement. Inter-rater agreement on the selection, servings, and consumption of food groups was high at 93.5%; intra-rater agreement was similarly high with an average of 95.6% agreement. Coders achieved the highest rates of agreement in assessing if a food group was present on the plate (95-99% inter-rater agreement, depending on food group) and estimating the servings of food selected (81-98% inter-rater agreement). Estimating consumption, particularly for items such as beans and cheese that were often in mixed dishes, was more challenging (77-94% inter-rater agreement). Results suggest that the digital photography method presented is feasible for large studies in real-world environments and can provide an objective measure of food selection, servings, and consumption with a high degree of agreement between coders; however, to make accurate claims about the state of dietary intake in all-you-can-eat, self-serve settings, researchers will need to account for the possibility of diners taking multiple trips through the serving line. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Ionizing secondary radiation generated by analog radiological and digital coronary cine angiographic equipment. Influence of external protection devices

    International Nuclear Information System (INIS)

    Ramirez N, Alfredo; Farias Ch, Eric; Silva J, Ana Maria; Leyton L, Fernando; Oyarzun C, Carlos; Ugalde P, Hector; Dussaillant, Gaston; Cumsille G, Angel

    2000-01-01

    Exposure to ionizing radiation is a know hazard of radiological procedures. Aim: to compare the emission of secondary ionizing radiation from two coronary angiographic equipments, one with digital and the other with analog image generation. To evaluate the effectiveness of external radiological protection devices. Material and methods: environmental and fluoroscopy generated radiation in the cephalic region of the patient was measured during diagnostic coronary angiographies. Ionizing radiation generated in anterior left oblique protection (ALO) and anterior right oblique protection (ARO) were measured with and without leaded protections. In 19 patients (group 1), a digital equipment was used and in 21 (group 2), an analog equipment. Results: header radiation for group 1 and 2 was 1194±337 and 364±222 μGray/h respectively (p≤0.001). During fluoroscopy and with leaded protection generated radiation for groups 1 and 2 was 612±947 and 70±61μGray/h respectively (p≤0.001). For ALO projection, generated for groups 1 and 2 was 105±47 and 71±192 μGray/h respectively (p≤0.001). During filming the radiation for ALO projection for groups 1 and 2 was 7252±9569 and 1671±2038 μGray/h respectively (p=0.03). Out of the protection zone, registered radiation during fluoroscopy for groups 1 and 2 was 2800±1741 and 1318±954 μGray/h respectively (p≤0.001); during filming, the figures were 15500±5840 and 18961±10599 μGray/h respectively (NS). Conclusions: digital radiological equipment has a lower level of ionizing radiation emission than the analog equipment

  7. Digital piracy : theory

    OpenAIRE

    BELLEFLAMME, Paul; PEITZ, Martin

    2010-01-01

    This article reviews recent theoretical contributions on digital piracy. It starts by elaborating on the reasons for intellectual property protection, by reporting a few facts about copyright protection, and by examining reasons to become a digital pirate. Next, it provides an exploration of the consequences of digital piracy, using a base model and several extensions (with consumer sampling, network effects, and indirect appropriation). A closer look at market-structure implications of end-u...

  8. Development of an Advanced Digital Reactor Protection System Using Diverse Dual Processors to Prevent Common-Mode Failure

    International Nuclear Information System (INIS)

    Shin, Hyun Kook; Nam, Sang Ku; Sohn, Se Do; Chang, Hoon Seon

    2003-01-01

    The advanced digital reactor protection system (ADRPS) with diverse dual processors has been developed to prevent common-mode failure (CMF). The principle of diversity is applied to both hardware design and software design. For hardware diversity, two different types of CPUs are used for the bistable processor and local coincidence logic (LCL) processor. The Versa Module Eurocard-based single board computers are used for the CPU hardware platforms. The QNX operating system and the VxWorks operating system were selected for software diversity. Functional diversity is also applied to the input and output modules, and to the algorithm in the bistable processors and LCL processors. The characteristics of the newly developed digital protection system are described together with the preventive capability against CMF. Also, system reliability analysis is discussed. The evaluation results show that the ADRPS has a good preventive capability against the CMF and is a highly reliable reactor protection system

  9. Skin protection creams in medical settings: successful or evil?

    Directory of Open Access Journals (Sweden)

    Charlier Corinne

    2008-07-01

    Full Text Available Abstract Background Chronic exposure to mild irritants including cleansing and antiseptic products used for hand hygiene generates insults to the skin. To avoid unpleasant reactions, skin protection creams are commonly employed, but some fail to afford protection against a variety of xenobiotics. In this study, two skin protection creams were assayed comparatively looking for a protective effect if any against a liquid soap and an alcohol-based gel designed for hand hygiene in medical settings. Methods Corneosurfametry and corneoxenometry are two in vitro bioessays which were selected for their good reproducibility, sensitivity and ease of use. A Kruskal-Wallis ANOVA test followed by the Dunn test was realized to compare series of data obtained. Results Significant differences in efficacy were obtained between the two assayed skin protection creams. One of the two tested creams showed a real protective effect against mild irritants, but the other tested cream presented an irritant potential in its application with mild irritants. Conclusion The differences observed for the two tested skin protection creams were probably due to their galenic composition and their possible interactions with the offending products. As a result, the present in vitro bioassays showed contrasted effects of the creams corresponding to either a protective or an irritant effect on human stratum corneum.

  10. Digital filtering techniques applied to electric power systems protection; Tecnicas de filtragem digital aplicadas a protecao de sistemas eletricos de potencia

    Energy Technology Data Exchange (ETDEWEB)

    Brito, Helio Glauco Ferreira

    1996-12-31

    This work introduces an analysis and a comparative study of some of the techniques for digital filtering of the voltage and current waveforms from faulted transmission lines. This study is of fundamental importance for the development of algorithms applied to digital protection of electric power systems. The techniques studied are based on the Discrete Fourier Transform theory, the Walsh functions and the Kalman filter theory. Two aspects were emphasized in this study: Firstly, the non-recursive techniques were analysed with the implementation of filters based on Fourier theory and the Walsh functions. Secondly, recursive techniques were analyzed, with the implementation of the filters based on the Kalman theory and once more on the Fourier theory. (author) 56 refs., 25 figs., 16 tabs.

  11. KFUPM-KAUST Red Sea model: Digital viscoelastic depth model and synthetic seismic data set

    KAUST Repository

    Al-Shuhail, Abdullatif A.; Mousa, Wail A.; Alkhalifah, Tariq Ali

    2017-01-01

    The Red Sea is geologically interesting due to its unique structures and abundant mineral and petroleum resources, yet no digital geologic models or synthetic seismic data of the Red Sea are publicly available for testing algorithms to image and analyze the area's interesting features. This study compiles a 2D viscoelastic model of the Red Sea and calculates a corresponding multicomponent synthetic seismic data set. The models and data sets are made publicly available for download. We hope this effort will encourage interested researchers to test their processing algorithms on this data set and model and share their results publicly as well.

  12. KFUPM-KAUST Red Sea model: Digital viscoelastic depth model and synthetic seismic data set

    KAUST Repository

    Al-Shuhail, Abdullatif A.

    2017-06-01

    The Red Sea is geologically interesting due to its unique structures and abundant mineral and petroleum resources, yet no digital geologic models or synthetic seismic data of the Red Sea are publicly available for testing algorithms to image and analyze the area\\'s interesting features. This study compiles a 2D viscoelastic model of the Red Sea and calculates a corresponding multicomponent synthetic seismic data set. The models and data sets are made publicly available for download. We hope this effort will encourage interested researchers to test their processing algorithms on this data set and model and share their results publicly as well.

  13. Reliability modeling of digital component in plant protection system with various fault-tolerant techniques

    International Nuclear Information System (INIS)

    Kim, Bo Gyung; Kang, Hyun Gook; Kim, Hee Eun; Lee, Seung Jun; Seong, Poong Hyun

    2013-01-01

    Highlights: • Integrated fault coverage is introduced for reflecting characteristics of fault-tolerant techniques in the reliability model of digital protection system in NPPs. • The integrated fault coverage considers the process of fault-tolerant techniques from detection to fail-safe generation process. • With integrated fault coverage, the unavailability of repairable component of DPS can be estimated. • The new developed reliability model can reveal the effects of fault-tolerant techniques explicitly for risk analysis. • The reliability model makes it possible to confirm changes of unavailability according to variation of diverse factors. - Abstract: With the improvement of digital technologies, digital protection system (DPS) has more multiple sophisticated fault-tolerant techniques (FTTs), in order to increase fault detection and to help the system safely perform the required functions in spite of the possible presence of faults. Fault detection coverage is vital factor of FTT in reliability. However, the fault detection coverage is insufficient to reflect the effects of various FTTs in reliability model. To reflect characteristics of FTTs in the reliability model, integrated fault coverage is introduced. The integrated fault coverage considers the process of FTT from detection to fail-safe generation process. A model has been developed to estimate the unavailability of repairable component of DPS using the integrated fault coverage. The new developed model can quantify unavailability according to a diversity of conditions. Sensitivity studies are performed to ascertain important variables which affect the integrated fault coverage and unavailability

  14. Digital watermark

    Directory of Open Access Journals (Sweden)

    Jasna Maver

    2000-01-01

    Full Text Available The huge amount of multimedia contents available on the World-Wide-Web is beginning to raise the question of their protection. Digital watermarking is a technique which can serve various purposes, including intellectual property protection, authentication and integrity verification, as well as visible or invisible content labelling of multimedia content. Due to the diversity of digital watermarking applicability, there are many different techniques, which can be categorised according to different criteria. A digital watermark can be categorised as visible or invisible and as robust or fragile. In contrast to the visible watermark where a visible pattern or image is embedded into the original image, the invisible watermark does not change the visual appearance of the image. The existence of such a watermark can be determined only through a watermark ex¬traction or detection algorithm. The robust watermark is used for copyright protection, while the fragile watermark is designed for authentication and integrity verification of multimedia content. A watermark must be detectable or extractable to be useful. In some watermarking schemes, a watermark can be extracted in its exact form, in other cases, we can detect only whether a specific given watermarking signal is present in an image. Digital libraries, through which cultural institutions will make multimedia contents available, should support a wide range of service models for intellectual property protection, where digital watermarking may play an important role.

  15. Radiation protection in dental X-ray surgeries--still rooms for improvement.

    Science.gov (United States)

    Hart, G; Dugdale, M

    2013-03-01

    To illustrate the authors' experience in the provision of radiation protection adviser (RPA)/medical physics expert (MPE) services and critical examination/radiation quality assurance (QA) testing, to demonstrate any continuing variability of the compliance of X-ray sets with existing guidance and of compliance of dental practices with existing legislation. Data was collected from a series of critical examination and routine three-yearly radiation QA tests on 915 intra-oral X-ray sets and 124 panoramic sets. Data are the result of direct measurements on the sets, made using a traceably calibrated Unfors Xi meter. The testing covered the measurement of peak kilovoltage (kVp); filtration; timer accuracy and consistency; X-ray beam size; and radiation output, measured as the entrance surface dose in milliGray (mGy) for intra-oral sets and dose-area product (DAP), measured in mGy.cm(2) for panoramic sets. Physical checks, including mechanical stability, were also included as part of the testing process. The Health and Safety Executive has expressed concern about the poor standards of compliance with the regulations during inspections at dental practices. Thirty-five percent of intra-oral sets exceeded the UK adult diagnostic reference level on at least one setting, as did 61% of those with child dose settings. There is a clear advantage of digital radiography and rectangular collimation in dose terms, with the mean dose from digital sets 59% that of film-based sets and a rectangular collimator 76% that of circular collimators. The data shows the unrealised potential for dose saving in many digital sets and also marked differences in dose between sets. Provision of radiation protection advice to over 150 general dental practitioners raised a number of issues on the design of surgeries with X-ray equipment and critical examination testing. There is also considerable variation in advice given on the need (or lack of need) for room shielding. Where no radiation protection

  16. REDEN: Named Entity Linking in Digital Literary Editions Using Linked Data Sets

    Directory of Open Access Journals (Sweden)

    Carmen Brando

    2016-07-01

    Full Text Available This paper proposes a graph-based Named Entity Linking (NEL algorithm named REDEN for the disambiguation of authors’ names in French literary criticism texts and scientific essays from the 19th and early 20th centuries. The algorithm is described and evaluated according to the two phases of NEL as reported in current state of the art, namely, candidate retrieval and candidate selection. REDEN leverages knowledge from different Linked Data sources in order to select candidates for each author mention, subsequently crawls data from other Linked Data sets using equivalence links (e.g., owl:sameAs, and, finally, fuses graphs of homologous individuals into a non-redundant graph well-suited for graph centrality calculation; the resulting graph is used for choosing the best referent. The REDEN algorithm is distributed in open-source and follows current standards in digital editions (TEI and semantic Web (RDF. Its integration into an editorial workflow of digital editions in Digital humanities and cultural heritage projects is entirely plausible. Experiments are conducted along with the corresponding error analysis in order to test our approach and to help us to study the weaknesses and strengths of our algorithm, thereby to further improvements of REDEN.

  17. Development of Reactor Protection System (RPS) in Reactor Digital Instrumentation and Control System (ReDICS)

    International Nuclear Information System (INIS)

    Mohd Khairulezwan Abdul Manan; Mohd Sabri Minhat; Ridzuan Abdul Mutalib

    2013-01-01

    RTP Research Reactor are in the process upgraded from analogue control console system to a digital control console system . Upgrade process requires a statistical study to improve safety during reactor operation. RPS was developed to meet the needs of operational safety and at the same time comply with the guidelines set by the IAEA. RPS is in analog and hardware with industry standard interfaced with digital DAC (Data Acquisition and Control) and OWS (Operator Work Station). (author)

  18. Suitability review of FMEA and reliability analysis for digital plant protection system and digital engineered safety features actuation system

    Energy Technology Data Exchange (ETDEWEB)

    Kim, I. S.; Kim, T. K.; Kim, M. C.; Kim, B. S.; Hwang, S. W.; Ryu, K. C. [Hanyang Univ., Seoul (Korea, Republic of)

    2000-11-15

    Of the many items that should be checked out during a review stage of the licensing application for the I and C system of Ulchin 5 and 6 units, this report relates to a suitability review of the reliability analysis of Digital Plant Protection System (DPPS) and Digital Engineered Safety Features Actuation System (DESFAS). In the reliability analysis performed by the system designer, ABB-CE, fault tree analysis was used as the main methods along with Failure Modes and Effect Analysis (FMEA). However, the present regulatory technique dose not allow the system reliability analysis and its results to be appropriately evaluated. Hence, this study was carried out focusing on the following four items ; development of general review items by which to check the validity of a reliability analysis, and the subsequent review of suitability of the reliability analysis for Ulchin 5 and 6 DPPS and DESFAS L development of detailed review items by which to check the validity of an FMEA, and the subsequent review of suitability of the FMEA for Ulchin 5 and 6 DPPS and DESFAS ; development of detailed review items by which to check the validity of a fault tree analysis, and the subsequent review of suitability of the fault tree for Ulchin 5 and 6 DPPS and DESFAS ; an integrated review of the safety and reliability of the Ulchin 5 and 6 DPPS and DESFAS based on the results of the various reviews above and also of a reliability comparison between the digital systems and the comparable analog systems, i.e., and analog Plant Protection System (PPS) and and analog Engineered Safety Features Actuation System (ESFAS). According to the review mentioned above, the reliability analysis of Ulchin 5 and 6 DPPS and DESFAS generally satisfies the review requirements. However, some shortcomings of the analysis were identified in our review such that the assumed test periods for several equipment were not properly incorporated in the analysis, and failures of some equipment were not included in the

  19. Digital watermarking techniques and trends

    CERN Document Server

    Nematollahi, Mohammad Ali; Rosales, Hamurabi Gamboa

    2017-01-01

    This book presents the state-of-the-arts application of digital watermarking in audio, speech, image, video, 3D mesh graph, text, software, natural language, ontology, network stream, relational database, XML, and hardware IPs. It also presents new and recent algorithms in digital watermarking for copyright protection and discusses future trends in the field. Today, the illegal manipulation of genuine digital objects and products represents a considerable problem in the digital world. Offering an effective solution, digital watermarking can be applied to protect intellectual property, as well as fingerprinting, enhance the security and proof-of-authentication through unsecured channels.

  20. Setting value optimization method in integration for relay protection based on improved quantum particle swarm optimization algorithm

    Science.gov (United States)

    Yang, Guo Sheng; Wang, Xiao Yang; Li, Xue Dong

    2018-03-01

    With the establishment of the integrated model of relay protection and the scale of the power system expanding, the global setting and optimization of relay protection is an extremely difficult task. This paper presents a kind of application in relay protection of global optimization improved particle swarm optimization algorithm and the inverse time current protection as an example, selecting reliability of the relay protection, selectivity, quick action and flexibility as the four requires to establish the optimization targets, and optimizing protection setting values of the whole system. Finally, in the case of actual power system, the optimized setting value results of the proposed method in this paper are compared with the particle swarm algorithm. The results show that the improved quantum particle swarm optimization algorithm has strong search ability, good robustness, and it is suitable for optimizing setting value in the relay protection of the whole power system.

  1. Functional issues and environmental qualification of digital protection systems of advanced light-water nuclear reactors

    Energy Technology Data Exchange (ETDEWEB)

    Korsah, K.; Clark, R.L.; Wood, R.T. [Oak Ridge National Lab., TN (United States)

    1994-04-01

    Issues of obsolescence and lack of infrastructural support in (analog) spare parts, coupled with the potential benefits of digital systems, are driving the nuclear industry to retrofit analog instrumentation and control (I&C) systems with digital and microprocessor-based systems. While these technologies have several advantages, their application to safety-related systems in nuclear power plants raises key issues relating to the systems` environmental qualification and functional reliability. To bound the problem of new I&C system functionality and qualification, the authors focused this study on protection systems proposed for use in ALWRs. Specifically, both functional and environmental qualification issues for ALWR protection system I&C were addressed by developing an environmental, functional, and aging data template for a protection division of each proposed ALWR design. By using information provided by manufacturers, environmental conditions and stressors to which I&C equipment in reactor protection divisions may be subjected were identified. The resulting data were then compared to a similar template for an instrument string typically found in an analog protection division of a present-day nuclear power plant. The authors also identified fiber-optic transmission systems as technologies that are relatively new to the nuclear power plant environment and examined the failure modes and age-related degradation mechanisms of fiber-optic components and systems. One reason for the exercise of caution in the introduction of software into safety-critical systems is the potential for common-cause failure due to the software. This study, however, approaches the functionality problem from a systems point of view. System malfunction scenarios are postulated to illustrate the fact that, when dealing with the performance of the overall integrated system, the real issues are functionality and fault tolerance, not hardware vs. software.

  2. Functional issues and environmental qualification of digital protection systems of advanced light-water nuclear reactors

    International Nuclear Information System (INIS)

    Korsah, K.; Clark, R.L.; Wood, R.T.

    1994-04-01

    Issues of obsolescence and lack of infrastructural support in (analog) spare parts, coupled with the potential benefits of digital systems, are driving the nuclear industry to retrofit analog instrumentation and control (I ampersand C) systems with digital and microprocessor-based systems. While these technologies have several advantages, their application to safety-related systems in nuclear power plants raises key issues relating to the systems' environmental qualification and functional reliability. To bound the problem of new I ampersand C system functionality and qualification, the authors focused this study on protection systems proposed for use in ALWRs. Specifically, both functional and environmental qualification issues for ALWR protection system I ampersand C were addressed by developing an environmental, functional, and aging data template for a protection division of each proposed ALWR design. By using information provided by manufacturers, environmental conditions and stressors to which I ampersand C equipment in reactor protection divisions may be subjected were identified. The resulting data were then compared to a similar template for an instrument string typically found in an analog protection division of a present-day nuclear power plant. The authors also identified fiber-optic transmission systems as technologies that are relatively new to the nuclear power plant environment and examined the failure modes and age-related degradation mechanisms of fiber-optic components and systems. One reason for the exercise of caution in the introduction of software into safety-critical systems is the potential for common-cause failure due to the software. This study, however, approaches the functionality problem from a systems point of view. System malfunction scenarios are postulated to illustrate the fact that, when dealing with the performance of the overall integrated system, the real issues are functionality and fault tolerance, not hardware vs. software

  3. Development of digital plant protection system for Korean Next Generation Reactor

    International Nuclear Information System (INIS)

    Suk-Joon Park

    1998-01-01

    A Digital Plant Protection System (DPPS) for Korean Next Generation Reactor (KNGR) is being developed using the Programmable Logic Controller (PLC) technology. For the design verification, the development of the DPPS prototype is progressing at this time. The prototype hardware equipment is installed and software coding is started. DPPS software is being coded by strict software V and V activities and function block language that uses simple graphical symbols. By adopting the PLC technology, the design of DPPS is possible to take full advantages in areas such as automatic testing, simplified calibration, improved isolation between redundant channels, reduced internal and external wiring and increased plant availability. (author)

  4. Copyright protection of remote sensing imagery by means of digital watermarking

    Science.gov (United States)

    Barni, Mauro; Bartolini, Franco; Cappellini, Vito; Magli, Enrico; Olmo, Gabriella; Zanini, R.

    2001-12-01

    The demand for remote sensing data has increased dramatically mainly due to the large number of possible applications capable to exploit remotely sensed data and images. As in many other fields, along with the increase of market potential and product diffusion, the need arises for some sort of protection of the image products from unauthorized use. Such a need is a very crucial one even because the Internet and other public/private networks have become preferred and effective means of data exchange. An important issue arising when dealing with digital image distribution is copyright protection. Such a problem has been largely addressed by resorting to watermarking technology. Before applying watermarking techniques developed for multimedia applications to remote sensing applications, it is important that the requirements imposed by remote sensing imagery are carefully analyzed to investigate whether they are compatible with existing watermarking techniques. On the basis of these motivations, the contribution of this work is twofold: (1) assessment of the requirements imposed by the characteristics of remotely sensed images on watermark-based copyright protection; (2) discussion of a case study where the performance of two popular, state-of-the-art watermarking techniques are evaluated by the light of the requirements at the previous point.

  5. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    Science.gov (United States)

    Kabir, Muhammad N.; Alginahi, Yasser M.

    2014-01-01

    This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247

  6. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    Directory of Open Access Journals (Sweden)

    Omar Tayan

    2014-01-01

    Full Text Available This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints.

  7. Summary of: radiation protection in dental X-ray surgeries--still rooms for improvement.

    Science.gov (United States)

    Walker, Anne

    2013-03-01

    To illustrate the authors' experience in the provision of radiation protection adviser (RPA)/medical physics expert (MPE) services and critical examination/radiation quality assurance (QA) testing, to demonstrate any continuing variability of the compliance of X-ray sets with existing guidance and of compliance of dental practices with existing legislation. Data was collected from a series of critical examination and routine three-yearly radiation QA tests on 915 intra-oral X-ray sets and 124 panoramic sets. Data are the result of direct measurements on the sets, made using a traceably calibrated Unfors Xi meter. The testing covered the measurement of peak kilovoltage (kVp); filtration; timer accuracy and consistency; X-ray beam size; and radiation output, measured as the entrance surface dose in milliGray (mGy) for intra-oral sets and dose-area product (DAP), measured in mGy.cm(2) for panoramic sets. Physical checks, including mechanical stability, were also included as part of the testing process. The Health and Safety Executive has expressed concern about the poor standards of compliance with the regulations during inspections at dental practices. Thirty-five percent of intra-oral sets exceeded the UK adult diagnostic reference level on at least one setting, as did 61% of those with child dose settings. There is a clear advantage of digital radiography and rectangular collimation in dose terms, with the mean dose from digital sets 59% that of film-based sets and a rectangular collimator 76% that of circular collimators. The data shows the unrealised potential for dose saving in many digital sets and also marked differences in dose between sets. Provision of radiation protection advice to over 150 general dental practitioners raised a number of issues on the design of surgeries with X-ray equipment and critical examination testing. There is also considerable variation in advice given on the need (or lack of need) for room shielding. Where no radiation protection

  8. Childhood and fantasy game in the digital world

    Directory of Open Access Journals (Sweden)

    Lluís Andreu Bertran

    2015-04-01

    Full Text Available We begin with questions that offer multiple answers and open a debate which will give a more complete answer with richer content when possible. Who sets the rules to play in the Children’s digital world? Who sets the limits of this digital world for a child to play learn or communicate? The child interacts with the digital world: games, social networks, web surfing,... with rules that establish a commitment with those who do not agree with them, they lead to a "free" associative, cognitive and emotional movement. Thereby, does the child play with computers or does he grow up with them? Since there are no explicit rules we would be wrong to think that this implies the absence of any mandatory rule. This universal rule which we believe to exist in every child, could be included either in its "Self" or in his fantasy in very distinct ways and different consequences. Would it be risky to state that for a child "to play is to play" regardless of origin of the rules? Are we therefore facing the dilemma of objective and subjective rules in their development and understanding? Should we offer them as many objectivity inputs as possible in order to neutralize, redirect or ban the subjectivity and fantasy the interaction involves with the digital world, which can be even perverse in the worst case scenario? It is essential for us to think that the child’s protection towards the digital world will happen in all the situations where he can understand and assume as a rule from his "Self". We have to take on count that from his "Self” and his "Not-Self" there is a fantasy open space that can bring wealth but also a lot of danger for him. If he is abandoned to his fate and the interaction is performed from the position of "Not-Self", the danger of being alone in the digital world with nothing protects him, can have consequences during his development with incalculable damages.

  9. The use of Landsat-4 MSS digital data in temporal data sets and the evaluation of scene-to-scene registration accuracy

    Science.gov (United States)

    Anderson, J. E.

    1985-01-01

    The MSS sensor on Landsat 4 is, in certain performance aspects, diferent from those of Landsats 1 through 3. These differences created some concern in the NASA research community as to whether individual data sets can be registered accurately enough to produce acceptable data sets for multitemporal data analysis. The use of Landsat 4 MSS digital data in temporal data sets is examined and a method is presented for estimating temporal registration accuracy based on the use of an X-Y digitizer and grey tone electrostatic plots. Results indicate that the RMS temporal registration errors are not significantly different from the temporal data sets generated using Landsat 4 and Landsat 2 data (33.35 meters) and the temporal data set constructed from two Landsat 2 data sets (33.61 meters). A derivation of the model used to evaluate the temporal registration is included.

  10. Data protection for the digital age: comprehensive effects of the evolving law of accountability

    Directory of Open Access Journals (Sweden)

    Nina GUMZEJ

    2012-12-01

    Full Text Available The law of personal data protection has for years been lagging behind technology, which is evolving propulsively and with high speed. A number of new challenges arising from the post-modern digital age have been identified for rights and freedoms of individuals with respect to processing of their personal data and thus a need for adapting the relevant legal-regulatory regime and ensuring a workable and systematic data protection system for the third millennium. After examination of the current legal framework and supporting systems at the level of European Union law, this paper focuses on recently proposed reforms. Proposed new EU legal-regulatory regime towards a potent data protection ecosystem is strongly supported by stricter accountability of those who are responsible for personal data. As one of the core legal principles supporting the new regime, accountability denotes, in a nutshell, a number of legally enforceable duties to implement and verify measures and procedures that can ensure operative and demonstrable data protection compliance. Selected highlights of the proposed accountability measures are therefore examined in this paper and arguments provided for a shift towards organizational data protection management and governance already today.

  11. Impact of general data protection regulation on children's rights in digital environment

    Directory of Open Access Journals (Sweden)

    Krivokapić Đorđe

    2016-01-01

    Full Text Available Raising the age of consent to data processing to 16 and allowing member states to set it at a lower age, was one of the major points of argument in the wake of passing the new EU General Data Protection Regulation (GDPR, otherwise hailed for introducing the Article 8 that recognizes children as a vulnerable group. This paper analyzes legal grounds for concerns raised over the provisions related to personal data protection of minors, possible ramifications and remedies within the given framework. It also highlights innovations and positive solutions set in the GDPR, with respect to privacy risks and opportunities for children in the information society.

  12. Design and realization of a fast digital system for the protection of a linear accelerator

    International Nuclear Information System (INIS)

    Hamdi, A.

    2004-07-01

    The new generation of light sources based on SASE Free-Electron-Lasers driven by LINACs operate with electron beams with high beam currents and duty cycles. This is especially true for the superconducting machines like TTF 2 and the X-RAY FEL, under construction or planning at DESY. Elaborate fast protections systems are required not only to protect the machine from electron beams hitting and destroying the vacuum chamber, but also to prevent the machine from running at high loss levels, dangerous for components like the FEL undulator. This document presents the different protection systems currently under construction for TTF 2. The very fast systems, based on transmission measurements and distributed loss detection monitors, are described in detail. This description includes the fast electronics to collect and to transmit the different interlock and status signals: analog to digital converters, DSP and FPGA, interfaces, toroid protection system (TPS) card. The implementation and validation (simulation and tests) of the TPS card at DESY is presented

  13. Development of digital plant protection system for Korean Next Generation Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Park, Suk-Joon [NSSS Engineering and Development Division, Korea Power Engineering Company, Taejon (Korea, Republic of)

    1998-10-01

    A Digital Plant Protection System (DPPS) for Korean Next Generation Reactor (KNGR) is being developed using the Programmable Logic Controller (PLC) technology. For the design verification, the development of the DPPS prototype is progressing at this time. The prototype hardware equipment is installed and software coding is started. DPPS software is being coded by strict software V and V activities and function block language that uses simple graphical symbols. By adopting the PLC technology, the design of DPPS is possible to take full advantages in areas such as automatic testing, simplified calibration, improved isolation between redundant channels, reduced internal and external wiring and increased plant availability. (author) 8 refs, 4 figs, 3 tabs

  14. Influence of settings management and protection status on recreational uses and pressures in marine protected areas.

    Science.gov (United States)

    Gonson, Charles; Pelletier, Dominique; Alban, Frederique; Giraud-Carrier, Charlotte; Ferraris, Jocelyne

    2017-09-15

    Coastal populations and tourism are growing worldwide. Consequently outdoor recreational activity is increasing and diversifying. While Marine Protected Areas (MPAs) are valuable for mitigating anthropogenic impacts, recreational uses are rarely monitored and studied, resulting in a lack of knowledge on users' practices, motivation and impacts. Based on boat counts and interview data collected in New Caledonia, we i) explored factors affecting user practices and motivations, ii) constructed fine-scale pressure indices covering activities and associated behaviors, and iii) assessed the relationships between user practices and site selection. User practices were found to depend on protection status, boat type and user characteristics. Pressure indices were higher within no-take MPAs, except for fishing. We found significant relationships between user practices and settings characteristics. In the context of increasing recreational uses, these results highlight options for managing such uses through settings management without jeopardizing the social acceptance of MPAs or the attainment of conservation goals. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Digital twins of human robot collaboration in a production setting

    DEFF Research Database (Denmark)

    Malik, Ali Ahmad; Bilberg, Arne

    2018-01-01

    This paper aims to present a digital twin framework to support the design, build and control of human-machine cooperation. In this study, computer simulations are used to develop a digital counterpart of a human-robot collaborative work environment for assembly work. The digital counterpart remains...... updated during the life cycle of the production system by continuously mirroring the physical system for quick and safe embed for continuous improvements. The case of a manufacturing company with human-robot work teams is presented for developing and validating the digital twin framework....

  16. A PLC platform-independent structural analysis on FBD programs for digital reactor protection systems

    International Nuclear Information System (INIS)

    Jung, Sejin; Yoo, Junbeom; Lee, Young-Jun

    2017-01-01

    Highlights: • FBD has been widely used to implement safety-critical software for PLC-based systems. • The safety-critical software should be developed strictly with safety programming guidelines. • There are no argued rules that have specific links to higher guidelines NUREG/CR-6463 PLC platform-independently. • This paper proposes a set of rules on the structure of FBD programs with providing specific links to higher guidelines. • This paper also provides CASE tool ‘FBD Checker’ for analyzing the structure of FBD. - Abstract: FBD (function block diagram) has been widely used to implement safety-critical software for PLC (programmable logic controller)-based digital nuclear reactor protection systems. The software should be developed strictly in accordance with safety programming guidelines such as NUREG/CR-6463. Software engineering tools of PLC vendors enable us to present structural analyses using FBD programs, but specific rules pertaining to the guidelines are enclosed within the commercial tools, and specific links to the guidelines are not clearly communicated. This paper proposes a set of rules on the structure of FBD programs in accordance with guidelines, and we develop an automatic analysis tool for FBD programs written in the PLCopen TC6 format. With the proposed tool, any FBD program that is transformed into an open format can be analyzed the PLC platform-independently. We consider a case study on FBD programs obtained from a preliminary version of a Korean nuclear power plant, and we demonstrate the effectiveness and potential of the proposed rules and analysis tool.

  17. Defense-in-depth and diversity evaluation to cope with design bases events concurrent with common mode failure in digital plant protection system for KNGR

    International Nuclear Information System (INIS)

    Shin, Lee Cheol; Park, Chan Eok; Jin, Choi Chul; Tae, Seo Jong

    2001-01-01

    The Korean Next Generation Reactor (KNGR) has been evolved to adopt an advanced design feature, a digital Plant Protection System (PPS) as an effort of enhancing reliability and safety of the plant. Although the digital PPS can be designed with high reliability, it is considered to be vulnerable to the Common Mode Failure (CMF) in the system software resulting in a total loss of the built-in hardware redundancy. Therefore, a comprehensive evaluation has been performed to demonstrate the intrinsic capability of the KNGR design in coping with the design basis events concurrent with CMF in the digital PPS. Instead of the conservative bounding analysis methodology, a best-estimate analysis methodology has been developed and utilized since the design basis events accompanied by CMF in the digital PPS are categorized as beyond design bases events. A variety of diverse means such as Alternate Protection System (APS), process control systems, and timely operator actions have been verified to be effective in mitigating the design basis events with CMF in the digital PPS

  18. Development of Youth Digital Citizenship Scale and Implication for Educational Setting

    Science.gov (United States)

    Kim, Minjeong; Choi, Dongyeon

    2018-01-01

    Digital citizens need comprehensive knowledge and technological accessibility to the internet and digital world and teachers have a responsibility to lead them to become digital citizens. However, existing Digital Citizenship Scales contain too broad ranges and do not precisely focus on the target students, so teachers do not have clear criteria…

  19. Signal-Noise Ratio Control Subsystem of Digital Equipment for Transmission of "Strela" Relay Protection Commands

    Directory of Open Access Journals (Sweden)

    I. I. Zabenkov

    2012-01-01

    Full Text Available Continuous measurement function of relative noise and interference level in the information transmission channel is considered as an important one for controlling parameters of high-frequency signal. The present paper simulates an algorithm for measuring signal-noise ratio in the transmission channel of high-voltage lines which is used in the digital equipment for transmission of relay protection and emergency automation commands of "Strela" complex.

  20. Compliance-Free, Digital SET and Analog RESET Synaptic Characteristics of Sub-Tantalum Oxide Based Neuromorphic Device.

    Science.gov (United States)

    Abbas, Yawar; Jeon, Yu-Rim; Sokolov, Andrey Sergeevich; Kim, Sohyeon; Ku, Boncheol; Choi, Changhwan

    2018-01-19

    A two terminal semiconducting device like a memristor is indispensable to emulate the function of synapse in the working memory. The analog switching characteristics of memristor play a vital role in the emulation of biological synapses. The application of consecutive voltage sweeps or pulses (action potentials) changes the conductivity of the memristor which is considered as the fundamental cause of the synaptic plasticity. In this study, a neuromorphic device using an in-situ growth of sub-tantalum oxide switching layer is fabricated, which exhibits the digital SET and analog RESET switching with an electroforming process without any compliance current (compliance free). The process of electroforming and SET is observed at the positive sweeps of +2.4 V and +0.86 V, respectively, while multilevel RESET is observed with the consecutive negative sweeps in the range of 0 V to -1.2 V. The movement of oxygen vacancies and gradual change in the anatomy of the filament is attributed to digital SET and analog RESET switching characteristics. For the Ti/Ta 2 O 3-x /Pt neuromorphic device, the Ti top and Pt bottom electrodes are considered as counterparts of the pre-synaptic input terminal and a post-synaptic output terminal, respectively.

  1. Digital squares

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Kim, Chul E

    1988-01-01

    Digital squares are defined and their geometric properties characterized. A linear time algorithm is presented that considers a convex digital region and determines whether or not it is a digital square. The algorithm also determines the range of the values of the parameter set of its preimages....... The analysis involves transforming the boundary of a digital region into parameter space of slope and y-intercept...

  2. Evaluation of DNBR calculation methods for advanced digital core protection system

    International Nuclear Information System (INIS)

    Ihn, W. K.; Hwang, D. H.; Pak, Y. H.; Yoon, T. Y.

    2003-01-01

    This study evaluated the on-line DNBR calculation methods for an advanced digital core protection system in PWR, i.e., subchannel analysis and group-channel analysis. The subchannel code MATRA and the four-channel codes CETOP-D and CETOP2 were used here. CETOP2 is most simplified DNBR analysis code which is implemented in core protection calculator in Korea standard nuclear power plants. The detailed subchannel code TORC was used as a reference calculation of DNBR. The DNBR uncertainty and margin were compared using allowable operating conditions at Yonggwang nuclear units 3-4. The MATRA code using a nine lumping-channel model resulted in smaller mean and larger standard deviation of the DNBR error distribution. CETOP-D and CETOP2 showed conservatively biased mean and relatively smaller standard deviation of the DNBR error distribution. MATRA and CETOP-D w.r.t CETOP2 showed significant increase of the DNBR available margin at normal operating condition. Taking account for the DNBR uncertainty, MATRA and CETOP-D over CETOP2 were estimated to increase the DNBR net margin by 2.5%-9.8% and 2.5%-3.3%, respectively

  3. An image adaptive, wavelet-based watermarking of digital images

    Science.gov (United States)

    Agreste, Santa; Andaloro, Guido; Prestipino, Daniela; Puccio, Luigia

    2007-12-01

    In digital management, multimedia content and data can easily be used in an illegal way--being copied, modified and distributed again. Copyright protection, intellectual and material rights protection for authors, owners, buyers, distributors and the authenticity of content are crucial factors in solving an urgent and real problem. In such scenario digital watermark techniques are emerging as a valid solution. In this paper, we describe an algorithm--called WM2.0--for an invisible watermark: private, strong, wavelet-based and developed for digital images protection and authenticity. Using discrete wavelet transform (DWT) is motivated by good time-frequency features and well-matching with human visual system directives. These two combined elements are important in building an invisible and robust watermark. WM2.0 works on a dual scheme: watermark embedding and watermark detection. The watermark is embedded into high frequency DWT components of a specific sub-image and it is calculated in correlation with the image features and statistic properties. Watermark detection applies a re-synchronization between the original and watermarked image. The correlation between the watermarked DWT coefficients and the watermark signal is calculated according to the Neyman-Pearson statistic criterion. Experimentation on a large set of different images has shown to be resistant against geometric, filtering and StirMark attacks with a low rate of false alarm.

  4. Development and use of a genitourinary pathology digital teaching set for trainee education

    Directory of Open Access Journals (Sweden)

    Li Li

    2010-01-01

    Full Text Available Background : Automated, high-speed, high-resolution whole slide imaging (WSI robots are becoming increasingly robust and capable. This technology has started to have a significant impact on pathology practice in various aspects including resident education. To be sufficient and adequate, training in pathology requires gaining broad exposure to various diagnostic patterns through teaching sets, which are traditionally composed of glass slides. Methods: A teaching set of over 295 glass slides has been used for resident training at the Division of Genitourinary Pathology, Department of Pathology, University of Pittsburgh Medical Center. Whole slide images were prepared from these slides using an Aperio ScanScope CS scanner. These images and case-related information were uploaded on a web-based digital teaching model. Results: The web site is available at: https://www.secure.opi.upmc.edu/genitourinary/index.cfm. Once logged in, users can view the list of cases, or search cases with or without diagnoses shown. Each case can be accessed through an option button, where the clinical history, gross findings are initially shown. Whole slide images can be accessed through the links on the page, which allows users to make diagnoses on their own. More information including final diagnosis will display when the diagnosis-button is clicked. Conclusion: The web-based digital study set provides additional educational benefits to using glass slides. Residents or other users can remotely access whole slide images and related information at their convenience. Searching and sorting functions and self-testing mode allow a more targeted study. It would also prepare residents with competence to work with whole slide images. Further, the model can be expanded to include pre-rotation and post-rotation exams, and/or a virtual rotation system, which may potentially make standardization of pathology resident training possible in the future.

  5. Simplified Analytic Approach of Pole-to-Pole Faults in MMC-HVDC for AC System Backup Protection Setting Calculation

    Directory of Open Access Journals (Sweden)

    Tongkun Lan

    2018-01-01

    Full Text Available AC (alternating current system backup protection setting calculation is an important basis for ensuring the safe operation of power grids. With the increasing integration of modular multilevel converter based high voltage direct current (MMC-HVDC into power grids, it has been a big challenge for the AC system backup protection setting calculation, as the MMC-HVDC lacks the fault self-clearance capability under pole-to-pole faults. This paper focused on the pole-to-pole faults analysis for the AC system backup protection setting calculation. The principles of pole-to-pole faults analysis were discussed first according to the standard of the AC system protection setting calculation. Then, the influence of fault resistance on the fault process was investigated. A simplified analytic approach of pole-to-pole faults in MMC-HVDC for the AC system backup protection setting calculation was proposed. In the proposed approach, the derived expressions of fundamental frequency current are applicable under arbitrary fault resistance. The accuracy of the proposed approach was demonstrated by PSCAD/EMTDC (Power Systems Computer-Aided Design/Electromagnetic Transients including DC simulations.

  6. An integrated model for reliability estimation of digital nuclear protection system based on fault tree and software control flow methodologies

    International Nuclear Information System (INIS)

    Kim, Man Cheol; Seong, Poong Hyun

    2000-01-01

    In the nuclear industry, the difficulty of proving the reliabilities of digital systems prohibits the widespread use of digital systems in various nuclear application such as plant protection system. Even though there exist a few models which are used to estimate the reliabilities of digital systems, we develop a new integrated model which is more realistic than the existing models. We divide the process of estimating the reliability of a digital system into two phases, a high-level phase and a low-level phase, and the boundary of two phases is the reliabilities of subsystems. We apply software control flow method to the low-level phase and fault tree analysis to the high-level phase. The application of the model to Dynamic Safety System(DDS) shows that the estimated reliability of the system is quite reasonable and realistic

  7. An integrated model for reliability estimation of digital nuclear protection system based on fault tree and software control flow methodologies

    International Nuclear Information System (INIS)

    Kim, Man Cheol; Seong, Poong Hyun

    2000-01-01

    In nuclear industry, the difficulty of proving the reliabilities of digital systems prohibits the widespread use of digital systems in various nuclear application such as plant protection system. Even though there exist a few models which are used to estimate the reliabilities of digital systems, we develop a new integrated model which is more realistic than the existing models. We divide the process of estimating the reliability of a digital system into two phases, a high-level phase and a low-level phase, and the boundary of two phases is the reliabilities of subsystems. We apply software control flow method to the low-level phase and fault tree analysis to the high-level phase. The application of the model of dynamic safety system (DSS) shows that the estimated reliability of the system is quite reasonable and realistic. (author)

  8. Improved protection system for phase faults on marine vessels based on ratio between negative sequence and positive sequence of the fault current

    DEFF Research Database (Denmark)

    Ciontea, Catalin-Iosif; Hong, Qiteng; Booth, Campbell

    2018-01-01

    algorithm is implemented in a programmable digital relay embedded in a hardware-in-the-loop (HIL) test set-up that emulates a typical maritime feeder using a real-time digital simulator. The HIL set-up allows testing of the new protection method under a wide range of faults and network conditions......This study presents a new method to protect the radial feeders on marine vessels. The proposed protection method is effective against phase–phase (PP) faults and is based on evaluation of the ratio between the negative sequence and positive sequence of the fault currents. It is shown...... that the magnitude of the introduced ratio increases significantly during the PP fault, hence indicating the fault presence in an electric network. Here, the theoretical background of the new method of protection is firstly discussed, based on which the new protection algorithm is described afterwards. The proposed...

  9. Research and Development of Protection OPC server for China advanced research reactor digital monitoring system

    International Nuclear Information System (INIS)

    Jia Yuwen; Xu Qiguo

    2012-01-01

    OPC server was developed as I/O driver to communicate the digital monitoring system of China Advanced Research Reactor iFIX and protection system. The framework and working principle of the OPC server were researched, and an effective method was developed to resolve the special communication protocol. After commissioning and testing, the results show that this method is reliable and stable, makes the system easy to configure, and can reduce the complexity of the system. (authors)

  10. Digital positron annihilation spectrometer

    International Nuclear Information System (INIS)

    Cheng Bin; Weng Huimin; Han Rongdian; Ye Bangjiao

    2010-01-01

    With the high speed development of digital signal process, the technique of the digitization and processing of signals was applied in the domain of a broad class of nuclear technique. The development of digital positron lifetime spectrometer (DPLS) is more promising than the conventional positron lifetime spectrometer equipped with nuclear instrument modules. And digital lifetime spectrometer has many advantages, such as low noise, long term stability, flexible online or offline digital processing, simple setup, low expense, easy to setting, and more physical information. Digital constant fraction discrimination is for timing. And a new method of optimizing energy windows setting for digital positron lifetime spectrometer is also developed employing the simulated annealing for the convenient use. The time resolution is 220ps and the count rate is 200cps. (authors)

  11. NEWLIN: A digital computer program for the linearisation of sets of algebraic and first order differential equations

    International Nuclear Information System (INIS)

    Hopkinson, A.

    1969-05-01

    The techniques normally used for linearisation of equations are not amenable to general treatment by digital computation. This report describes a computer program for linearising sets of equations by numerical evaluations of partial derivatives. The program is written so that the specification of the non-linear equations is the same as for the digital simulation program, FIFI, and the linearised equations can be punched out in form suitable for input to the frequency response program FRP2 and the poles and zeros program ZIP. Full instructions for the use of the program are given and a sample problem input and output are shown. (author)

  12. Multi-Level Data-Security and Data-Protection in a Distributed Search Infrastructure for Digital Medical Samples.

    Science.gov (United States)

    Witt, Michael; Krefting, Dagmar

    2016-01-01

    Human sample data is stored in biobanks with software managing digital derived sample data. When these stand-alone components are connected and a search infrastructure is employed users become able to collect required research data from different data sources. Data protection, patient rights, data heterogeneity and access control are major challenges for such an infrastructure. This dissertation will investigate concepts for a multi-level security architecture to comply with these requirements.

  13. Research on Methodology to Prioritize Critical Digital Assets based on Nuclear Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Wonjik; Kwon, Kookheui; Kim, Hyundoo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-10-15

    Digital systems are used in nuclear facilities to monitor and control various types of field devices, as well as to obtain and store vital information. Therefore, it is getting important for nuclear facilities to protect digital systems from cyber-attack in terms of safety operation and public health since cyber compromise of these systems could lead to unacceptable radiological consequences. Based on KINAC/RS-015 which is a cyber security regulatory standard, regulatory activities for cyber security at nuclear facilities generally focus on critical digital assets (CDAs) which are safety, security, and emergency preparedness related digital assets. Critical digital assets are estimated over 60% among all digital assets in a nuclear power plant. Therefore, it was required to prioritize critical digital assets to improve efficiency of regulation and implementation. In this paper, the research status on methodology development to prioritize critical digital assets based on nuclear risk assessment will be introduced. In this paper, to derive digital asset directly affect accident, PRA results (ET, FT, and minimal cut set) are analyzed. According to result of analysis, digital systems related to CD are derived ESF-CCS (safety-related component control system) and Process-CCS (non-safety-related component control system) as well as Engineered Safety Features Actuation System (ESFAS). These digital assets can be identified Vital Digital Asset (VDA). Hereafter, to develop general methodology which was identified VDA related to accident among CDAs, (1) method using result of minimal cut set in PRA model will be studied and (2) method quantifying result of Digital I and C PRA which is performed to reflect all digital cabinet related to system in FT will be studied.

  14. Research on Methodology to Prioritize Critical Digital Assets based on Nuclear Risk Assessment

    International Nuclear Information System (INIS)

    Kim, Wonjik; Kwon, Kookheui; Kim, Hyundoo

    2016-01-01

    Digital systems are used in nuclear facilities to monitor and control various types of field devices, as well as to obtain and store vital information. Therefore, it is getting important for nuclear facilities to protect digital systems from cyber-attack in terms of safety operation and public health since cyber compromise of these systems could lead to unacceptable radiological consequences. Based on KINAC/RS-015 which is a cyber security regulatory standard, regulatory activities for cyber security at nuclear facilities generally focus on critical digital assets (CDAs) which are safety, security, and emergency preparedness related digital assets. Critical digital assets are estimated over 60% among all digital assets in a nuclear power plant. Therefore, it was required to prioritize critical digital assets to improve efficiency of regulation and implementation. In this paper, the research status on methodology development to prioritize critical digital assets based on nuclear risk assessment will be introduced. In this paper, to derive digital asset directly affect accident, PRA results (ET, FT, and minimal cut set) are analyzed. According to result of analysis, digital systems related to CD are derived ESF-CCS (safety-related component control system) and Process-CCS (non-safety-related component control system) as well as Engineered Safety Features Actuation System (ESFAS). These digital assets can be identified Vital Digital Asset (VDA). Hereafter, to develop general methodology which was identified VDA related to accident among CDAs, (1) method using result of minimal cut set in PRA model will be studied and (2) method quantifying result of Digital I and C PRA which is performed to reflect all digital cabinet related to system in FT will be studied

  15. Certification of digital system software

    International Nuclear Information System (INIS)

    Waclo, J.; Cook, B.; Adomaitis, D.

    1991-01-01

    The activities involved in the successful application of digital systems to Nuclear Protection functions is not achieved through happenstance. At Westinghouse there has been a longstanding program to utilize digital state of the art technology for protection system advancement. Thereby gaining the advantages of increased system reliability, performance, ease of operation and reduced maintenance costs. This paper describes the Westinghouse background and experience in the safety system software development process, including Verification and Validation, and its application to protection system qualification and the successful use for licensing the Eagle 21 Digital Process Protection System Upgrade. In addition, the lessons learned from this experience are discussed from the perspective of improving the development process through applying feedback of the measurements made on the process and the software product quality. The goal of this process optimization is to produce the highest possible software quality while recognizing the real world constraints of available resources, project schedule and the regulatory policies that are customary in the nuclear industry

  16. Functional needs which led to the use of digital computing devices in the protection system of 1300 MW units

    International Nuclear Information System (INIS)

    Dalle, H.

    1986-01-01

    After a review of classical protection functions used in 900 MW power plants, it is concluded that in order to have functioning margins it is useful to calculate more finely the controled parameters. These calculating needs lead to the use of digital computing devices. Drawing profit from the new possibilities one can improve the general performances of the protection system with regard to availability, safety and maintenance. These options in the case of PALUEL led to the realization of SPIN, described here

  17. Minor protection or major injustice? – Children's rights and digital preventions directed at youth in the Dutch justice system

    NARCIS (Netherlands)

    La Fors, Karolina

    2015-01-01

    The United Nations Convention on the Rights of the Child (CRC) is the most essential place-holder for protecting children's rights internationally. In support of its leading principle: “the best interest of the child” (Art. 3) a growing number of digital technologies are employed in different

  18. Digital Rights Management

    NARCIS (Netherlands)

    Koster, P.; Jonker, Willem; Blanken, Henk; de Vries, A.P.; Blok, H.E.; Feng, L.

    2007-01-01

    Digital Rights Management, or DRM for short, is a much-discussed topic nowadays. The main reason for this is that DRM technology is often mentioned in the context of protection of digital audio and video content, for example to avoid large scale copying of CDs and DVDs via peer-to-peer networks in

  19. Cost Model for Digital Curation: Cost of Digital Migration

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad; Nielsen, Anders Bo; Thirifays, Alex

    2009-01-01

    The Danish Ministry of Culture is currently funding a project to set up a model for costing preservation of digital materials held by national cultural heritage institutions. The overall objective of the project is to provide a basis for comparing and estimating future financial requirements...... for digital preservation and to increase cost effectiveness of digital preservation activities. In this study we describe an activity based costing methodology for digital preservation based on the OAIS Reference Model. In order to estimate the cost of digital migrations we have identified cost critical...

  20. The protection of the right to privacy as the social imperative of digital age: How vulnerable are we?

    Directory of Open Access Journals (Sweden)

    Levakov-Vermezović Tijana

    2016-01-01

    Full Text Available The paper examines various forms of jeopardizing the privacy of individuals in digital world, with specific focus on criminal protection provided by current international and national legal framework and the jurisprudence of European Court of Human Rights. The significance of conducting this scientific research is essential considering that we live in the era of electronic communications in which no one is anonymous. Development of information and communication technologies has brought, among its many advantages, various challenges in all spheres of modern life. Since the Internet has become the global forum, individuals have been increasingly target of countless insults, defamation and threats; moreover, numerous personal information or media get published without consent. The practice shows that effective suppression and control of illegal behavior on the Internet and punishing the perpetrators is at the rudimental level. In order to provide proper protection for the victims of criminal offenses committed against their privacy in the digital world, it is necessary to create new models and approaches to solving this problem.

  1. Robust watermarking on copyright protection of digital originals

    Energy Technology Data Exchange (ETDEWEB)

    Gu, C; Hu, X Y, E-mail: guchong527@gmail.co, E-mail: emma_huxy@yahoo.com.c [College of Packaging and Printing Engineering, Tianjin University of Science and Technology, Tianjin, 300222 (China)

    2010-06-01

    The issues about the difference between digital vector originals and raster originals were discussed. A new algorithm based on displacing vertices to realize the embedding and extracting of digital watermarking in vector data was proposed after that. The results showed that the watermark produced by the method is resistant against translation, scaling, rotation, additive random noise; it is also resistant, to some extent, against cropping. This paper also modified the DCT raster image watermarking algorithm, using a bitmap image as watermark embedded into target images, instead of some meaningless serial numbers or simple symbols. The embedding and extraction part of these two digital watermark systems achieved with software. Experiments proved that both algorithms are not only imperceptible, but also have strong resistance against the common attracts, which can prove the copyright more effectively.

  2. Digital cultural heritage and its applications: case studies of Digital Mogao Grottos and Chi Lin Nunnery reconstruction

    Science.gov (United States)

    Li, Deren; Du, Zhiqiang; Zhu, Yixuan; Wang, Tingsong

    2010-11-01

    Considerable damage has been done to the cultural heritage sites around the world ranging from natural erosion to artificial destruction. With the development of information sciences, frontier technologies are actively introduced to help protect cultural heritage sites. The new concept of a Digital Cultural Heritage has been presented for culture protection and is gradually becoming an efficient method to solve or to remit various difficult problems. This paper puts forward a digitalization method for cultural heritage sites which rationally integrates and utilizes multiform surveying measurements. These techniques have been successfully implemented into two projects, namely the Digital Mogao Grottos and the Chi Lin Nunnery reconstruction. Our results prove that the concept of and the techniques utilized in Digital Cultural Heritage can not only contribute to research, preservation, management, interpretation, and representation of cultural heritages but can also help resolve the conflicts between tourism and protection.

  3. Software verification and validation methodology for advanced digital reactor protection system using diverse dual processors to prevent common mode failure

    International Nuclear Information System (INIS)

    Son, Ki Chang; Shin, Hyun Kook; Lee, Nam Hoon; Baek, Seung Min; Kim, Hang Bae

    2001-01-01

    The Advanced Digital Reactor Protection System (ADRPS) with diverse dual processors is being developed by the National Research Lab of KOPEC for ADRPS development. One of the ADRPS goals is to develop digital Plant Protection System (PPS) free of Common Mode Failure (CMF). To prevent CMF, the principle of diversity is applied to both hardware design and software design. For the hardware diversity, two different types of CPUs are used for Bistable Processor and Local Coincidence Logic Processor. The VME based Single Board Computers (SBC) are used for the CPU hardware platforms. The QNX Operating System (OS) and the VxWorks OS are used for software diversity. Rigorous Software Verification and Validation (V and V) is also required to prevent CMF. In this paper, software V and V methodology for the ADRPS is described to enhance the ADRPS software reliability and to assure high quality of the ADRPS software

  4. Protecting Oak Flat: Narratives Of Survivance As Observed Through Digital Activism

    Directory of Open Access Journals (Sweden)

    Nicholet Deschine Parkhurst

    2017-07-01

    Full Text Available American Indians are increasingly using social media/social network platforms as a tool to influence policy through social change. The activist group Apache Stronghold represents a case of American Indians utilising social media tools to protect Oak Flat and influence federal Indian policy. Oak Flat is sacred Apache land located in Superior, Arizona. United States legislators transferred Oak Flat to the mining company Resolution Copper as part of the omnibus National Defense Authorization Act of 2015. Qualitative analysis of social media content and advocacy tactics – specifically through use of timeline and digital ethnography – of Apache Stronghold from 2015-2016 reveal the interrelated nature of on-the-ground efforts, online efforts, solidarity efforts, and legislative support efforts. In sum, these efforts express narratives of survivance, healing, and a future orientation, as a unique dimension of social change.

  5. Digital radiography

    International Nuclear Information System (INIS)

    Kusano, Shoichi

    1993-01-01

    Firstly, from an historic point of view, fundamental concepts on digital imaging were reviewed to provide a foundation for discussion of digital radiography. Secondly, this review summarized the results of ongoing research in computed radiography that replaces the conventional film-screen system with a photo-stimulable phosphor plate; and thirdly, image quality, radiation protection, and image processing techniques were discussed with emphasis on picture archiving and communication system environment as our final goal. Finally, future expansion of digital radiography was described based on the present utilization of computed tomography at the National Defense Medical College Hospital. (author) 60 refs

  6. Nuclear safety and (cyber)security at the heart of the digital revolution

    International Nuclear Information System (INIS)

    Kueny, L.; Levesque, J.

    2017-01-01

    The on-going digital revolution implies the sharing of data beyond the company walls, the development of connected objects and the setting of more and more complex digital networks. All of this increases the risk of being attacked by cyber-criminal and the probability is all the higher because new kinds of cyber-attacks appear every year. Originally nuclear industry has a culture of safety and has implemented numerous mechanisms of physical protection that slow down cyber-attacks. The humane factor is very often an important point for the success of a cyber-attack but the automation of repetitive tasks can reduce this risk. A cyber-attack can stay undetected if regularly overhauls of computer systems are not performed or if they are not adequately monitored. The reliability of digital tools for instance digital archives is a point that hinders the implementation of a total digital certification in the nuclear industry. (A.C.)

  7. Literacy Development in Multicultural Settings with Digital Dual-language Books

    Directory of Open Access Journals (Sweden)

    Yıldız Turgut

    2011-10-01

    Full Text Available Problem Statement: Providing a story in two languages, digital dual-language storybooks can play an important role in supporting EFL students‟ cultural awareness, language and literacy skills. Based on constructivist theoretical framework, this study investigates the impact of digital dual-language storybooks on bilingual learners‟ vocabulary knowledge and reading comprehension skills.Methods: The participants of the study were ten seventh and eighth grade students who were bilingual in Arabic and Turkish, studying English at an elementary level as a compulsory course at a primary school in Turkey. In order to determine the impact of digital dual-language storybooks, the students read two different digital dual-language storybooks individually at different times. Through the process, think aloud procedures, observations and semi-structured interviews were conducted. Transcriptions of observations and interviews were analyzed through discourse analysis.Findings and Results: The results of the study indicated that the use of dual language books have a significant impact on learners‟ vocabulary knowledge growth. Using digital dual-language storybooks, learners can develop some strategies for learning new words, make use of images in comprehending the story and engage eagerly to the stories as they reflect and value their own culture and heritage.Conclusions and Recommendations: Awareness about new language systems, diversity and multiculturality in learners‟ immediate environment can be raised.

  8. Digital immunohistochemistry wizard: image analysis-assisted stereology tool to produce reference data set for calibration and quality control.

    Science.gov (United States)

    Plancoulaine, Benoît; Laurinaviciene, Aida; Meskauskas, Raimundas; Baltrusaityte, Indra; Besusparis, Justinas; Herlin, Paulette; Laurinavicius, Arvydas

    2014-01-01

    Digital image analysis (DIA) enables better reproducibility of immunohistochemistry (IHC) studies. Nevertheless, accuracy of the DIA methods needs to be ensured, demanding production of reference data sets. We have reported on methodology to calibrate DIA for Ki67 IHC in breast cancer tissue based on reference data obtained by stereology grid count. To produce the reference data more efficiently, we propose digital IHC wizard generating initial cell marks to be verified by experts. Digital images of proliferation marker Ki67 IHC from 158 patients (one tissue microarray spot per patient) with an invasive ductal carcinoma of the breast were used. Manual data (mD) were obtained by marking Ki67-positive and negative tumour cells, using a stereological method for 2D object enumeration. DIA was used as an initial step in stereology grid count to generate the digital data (dD) marks by Aperio Genie and Nuclear algorithms. The dD were collected into XML files from the DIA markup images and overlaid on the original spots along with the stereology grid. The expert correction of the dD marks resulted in corrected data (cD). The percentages of Ki67 positive tumour cells per spot in the mD, dD, and cD sets were compared by single linear regression analysis. Efficiency of cD production was estimated based on manual editing effort. The percentage of Ki67-positive tumor cells was in very good agreement in the mD, dD, and cD sets: regression of cD from dD (R2=0.92) reflects the impact of the expert editing the dD as well as accuracy of the DIA used; regression of the cD from the mD (R2=0.94) represents the consistency of the DIA-assisted ground truth (cD) with the manual procedure. Nevertheless, the accuracy of detection of individual tumour cells was much lower: in average, 18 and 219 marks per spot were edited due to the Genie and Nuclear algorithm errors, respectively. The DIA-assisted cD production in our experiment saved approximately 2/3 of manual marking. Digital IHC wizard

  9. Initial mechanical ventilator settings and lung protective ventilation in the ED.

    Science.gov (United States)

    Wilcox, Susan R; Richards, Jeremy B; Fisher, Daniel F; Sankoff, Jeffrey; Seigel, Todd A

    2016-08-01

    Mechanical ventilation with low tidal volumes has been shown to improve outcomes for patients both with and without acute respiratory distress syndrome. This study aims to characterize mechanically ventilated patients in the emergency department (ED), describe the initial ED ventilator settings, and assess for associations between lung protective ventilation strategies in the ED and outcomes. This was a multicenter, prospective, observational study of mechanical ventilation at 3 academic EDs. We defined lung protective ventilation as a tidal volume of less than or equal to 8 mL/kg of predicted body weight and compared outcomes for patients ventilated with lung protective vs non-lung protective ventilation, including inhospital mortality, ventilator days, intensive care unit length of stay, and hospital length of stay. Data from 433 patients were analyzed. Altered mental status without respiratory pathology was the most common reason for intubation, followed by trauma and respiratory failure. Two hundred sixty-one patients (60.3%) received lung protective ventilation, but most patients were ventilated with a low positive end-expiratory pressure, high fraction of inspired oxygen strategy. Patients were ventilated in the ED for a mean of 5 hours and 7 minutes but had few ventilator adjustments. Outcomes were not significantly different between patients receiving lung protective vs non-lung protective ventilation. Nearly 40% of ED patients were ventilated with non-lung protective ventilation as well as with low positive end-expiratory pressure and high fraction of inspired oxygen. Despite a mean ED ventilation time of more than 5 hours, few patients had adjustments made to their ventilators. Copyright © 2016 Elsevier Inc. All rights reserved.

  10. Enabling Digital Literacy

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Georgsen, Marianne

    2010-01-01

    There are some tensions between high-level policy definitions of “digital literacy” and actual teaching practice. We need to find workable definitions of digital literacy; obtain a better understanding of what digital literacy might look like in practice; and identify pedagogical approaches, which...... support teachers in designing digital literacy learning. We suggest that frameworks such as Problem Based Learning (PBL) are approaches that enable digital literacy learning because they provide good settings for engaging with digital literacy. We illustrate this through analysis of a case. Furthermore......, these operate on a meso-level mediating between high-level concepts of digital literacy and classroom practice....

  11. Large Data Set Mining

    NARCIS (Netherlands)

    Leemans, I.B.; Broomhall, Susan

    2017-01-01

    Digital emotion research has yet to make history. Until now large data set mining has not been a very active field of research in early modern emotion studies. This is indeed surprising since first, the early modern field has such rich, copyright-free, digitized data sets and second, emotion studies

  12. Analysis of lightning fault detection, location and protection on short and long transmission lines using Real Time Digital Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Oliveira, Andre Luiz Pereira de [Siemens Ltda., Sao Paulo, SP (Brazil)], E-mail: andreluiz.oliveira@siemens.com

    2007-07-01

    The purpose of this paper is to present an analysis of lightning fault detection, location and protection using numeric distance relays applied in high voltage transmission lines, more specifically in the 500 kV transmission lines of CEMIG (Brazilian Energy Utility) between the Vespasiano 2 - Neves 1 (short line - 23.9 km) and Vespasiano 2 - Mesquita (long line - 148.6 km) substations. The analysis was based on the simulations results of numeric distance protective relays on power transmission lines, realized in September 02 to 06, 2002, at Siemens AG's facilities (Erlangen - Germany), using Real Time Digital Simulator (RTDS{sup TM}). Several lightning faults simulations were accomplished, in several conditions of the electrical power system where the protective relays would be installed. The results are presented not only with the times of lightning faults elimination, but also all the functionality of a protection system, including the correct detection, location and other advantages that these modern protection devices make possible to the power system. (author)

  13. Personal protective equipment and improving compliance among healthcare workers in high-risk settings.

    Science.gov (United States)

    Honda, Hitoshi; Iwata, Kentaro

    2016-08-01

    Personal protective equipment (PPE) protects healthcare workers (HCWs) from infection by highly virulent pathogens via exposure to body fluids and respiratory droplets. Given the recent outbreaks of contagious infectious diseases worldwide, including Ebola virus and Middle Eastern respiratory syndrome, there is urgent need for further research to determine optimal PPE use in high-risk settings. This review intends to provide a general understanding of PPE and to provide guidelines for appropriate use based on current evidence. Although previous studies have focused on the efficacy of PPE in preventing transmission of pathogens, recent studies have examined the dangers to HCWs during removal of PPE when risk of contamination is highest. Access to adequate PPE supplies is crucial to preventing transmission of pathogens, especially in resource-limited settings. Adherence to appropriate PPE use is a challenge due to inadequate education on its usage, technical difficulties, and tolerability of PPE in the workplace. Future projects aim at ameliorating this situation, including redesigning PPE which is crucial to improving the safety of HCWs. PPE remains the most important strategy for protecting HCW from potentially fatal pathogens. Further research into optimal PPE design and use to improve the safety of HCWs is urgently needed.

  14. Digitizing the Non-Digital: Creating a Global Context for Events, Artifacts, Ideas, and Information

    Directory of Open Access Journals (Sweden)

    Deborah L. MacPherson

    2006-06-01

    Full Text Available This paper discusses some of the problems associated with search and digital-rights management in the emerging age of interconnectivity. An open-source system called Context Driven Topologies (CDT is proposed to create one global context of geography, knowledge domains, and Internet addresses, using centralized spatial databases, geometry, and maps. The same concept can be described by different words, the same image can be interpreted a thousand ways by every viewer, but mathematics is a set of rules to ensure that certain relationships or sequences will be precisely regenerated. Therefore, unlike most of today’s digital records, CDTs are based on mathematics first, images second, words last. The aim is to permanently link the highest quality events, artifacts, ideas, and information into one record documenting the quickest paths to the most relevant information for specific data, users, and tasks. A model demonstration project using CDT to organize, search, and place information in new contexts while protecting the authors’ intent is also introduced.

  15. Human error probability evaluation as part of reliability analysis of digital protection system of advanced pressurized water reactor - APR 1400

    International Nuclear Information System (INIS)

    Varde, P. V.; Lee, D. Y.; Han, J. B.

    2003-03-01

    A case of study on human reliability analysis has been performed as part of reliability analysis of digital protection system of the reactor automatically actuates the shutdown system of the reactor when demanded. However, the safety analysis takes credit for operator action as a diverse mean for tripping the reactor for, though a low probability, ATWS scenario. Based on the available information two cases, viz., human error in tripping the reactor and calibration error for instrumentations in protection system, have been analyzed. Wherever applicable a parametric study has also been performed

  16. PROBLEMS IN TESTING DIGITAL PROTECTIVE RELAY FOR IMMUNITY TO INTENTIONAL DESTRUCTIVE ELECTROMAGNETIC IMPACTS. CONTINUATION OF THE THEME

    Directory of Open Access Journals (Sweden)

    Vladimir I. Gurevich

    2015-12-01

    Full Text Available The article is the continuation of the theme highlighted in the previous article with same title. The new article evaluates the results of digital protective relays (DPR testing for immunity to the E1 component of High-altitude Electromagnetic Pulse (HEMP and to Intentional Electromagnetic Interferences (IEMI impacts, conducted by some independent American organizations; discusses the features of relay protection devices as well as clarifies and supplements the procedure for testing these devices. Due to methodology errors during the DPR tests conducted by mentioned organizations earlier, they cannot be considered as satisfactory and their results as meaningful. At the moment there are no reliable data on the level of DPR immunity to IDEI, which suggests that the test should be conducted further.

  17. Project AccessIT, Digitalization in Museums and Europeana (European Digital Library Project

    Directory of Open Access Journals (Sweden)

    Latif Özen

    2011-03-01

    Full Text Available This article emphasizes the importance of digitizing museum inventory records and establishing a data set in solving the problems of collection management in the museums of Turkey. Besides, the museum staff is encouraged to share the already existing digital content at the Europeana Digital Culture Portal by means of AccessIT project.

  18. Cost Model for Digital Preservation: Cost of Digital Migration

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad; Nielsen, Anders Bo; Thirifays, Alex

    2011-01-01

    The Danish Ministry of Culture has funded a project to set up a model for costing preservation of digital materials held by national cultural heritage institutions. The overall objective of the project was to increase cost effectiveness of digital preservation activities and to provide a basis...... for comparing and estimating future cost requirements for digital preservation. In this study we describe an activity-based costing methodology for digital preservation based on the Open Archice Information System (OAIS) Reference Model. Within this framework, which we denote the Cost Model for Digital...... Preservation (CMDP), the focus is on costing the functional entity Preservation Planning from the OAIS and digital migration activities. In order to estimate these costs we have identified cost-critical activities by analysing the functions in the OAIS model and the flows between them. The analysis has been...

  19. Foundations of hardware IP protection

    CERN Document Server

    Torres, Lionel

    2017-01-01

    This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection. · Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP; · Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security; · Introduce designers to the concept of salutar...

  20. Digital Components in Swedish NPP Power Systems

    International Nuclear Information System (INIS)

    Karlsson, Mattias; Eriksson, Tage

    2015-01-01

    Swedish nuclear power plants have over the last 20 years of operation modernised or exchanged several systems and components of the electrical power system. Within these works, new components based on digital technology have been employed in order to realize functionality that was previously achieved by using electro-mechanical or analogue technology. Components and systems such as relay protection, rectifiers, inverters, variable speed drives and diesel-generator sets are today equipped with digital components. Several of the systems and components fulfil functions with a safety-role in the NPP. Recently, however, a number of incidents have occurred which highlight deficiencies in the design or HMI of the equipment, which warrants questions whether there are generic problems with some applications of digital components that needs to be addressed. The use of digital components has presented cost effective solutions, or even the only available solution on the market enabling a modernisation. The vast majority of systems using digital components have been operating without problems and often contribute to improved safety but the challenge of non-detectable, or non-identifiable, failure modes remain. In this paper, the extent to which digital components are used in Swedish NPP power systems will be presented including a description of typical applications. Based on data from maintenance records and fault reports, as well as interviews with designers and maintenance personnel, the main areas where problems have been encountered and where possible risks have been identified will be described. The paper intends to investigate any 'tell-tales' that could give signals of unwanted behaviour. Furthermore, particular benefits experienced by using digital components will be highlighted. The paper will also discuss the safety relevance of these findings and suggest measures to improve safety in the application of digital components in power systems. (authors)

  1. Application of Digital Object Identifiers to data sets at the NASA Goddard Earth Sciences Data and Information Services Center (GES DISC)

    Science.gov (United States)

    Vollmer, B.; Ostrenga, D.; Johnson, J. E.; Savtchenko, A. K.; Shen, S.; Teng, W. L.; Wei, J. C.

    2013-12-01

    Digital Object Identifiers (DOIs) are applied to selected data sets at the NASA Goddard Earth Sciences Data and Information Services Center (GES DISC). The DOI system provides an Internet resolution service for unique and persistent identifiers of digital objects. Products assigned DOIs include data from the NASA MEaSUREs Program, the Earth Observing System (EOS) Aqua Atmospheric Infrared Sounder (AIRS) and EOS Aura High Resolution Dynamics Limb Sounder (HIRDLS). DOIs are acquired and registered through EZID, California Digital Library and DataCite. GES DISC hosts a data set landing page associated with each DOI containing information on and access to the data including a recommended data citation when using the product in research or applications. This work includes participation with the earth science community (e.g., Earth Science Information Partners (ESIP) Federation) and the NASA Earth Science Data and Information System (ESDIS) Project to identify, establish and implement best practices for assigning DOIs and managing supporting information, including metadata, for earth science data sets. Future work includes (1) coordination with NASA mission Science Teams and other data providers on the assignment of DOIs for other GES DISC data holdings, particularly for future missions such as Orbiting Carbon Observatory -2 and -3 (OCO-2, OCO-3) and projects (MEaSUREs 2012), (2) construction of landing pages that are both human and machine readable, and (3) pursuing the linking of data and publications with tools such as the Thomson Reuters Data Citation Index.

  2. Functional utilization of control and digital protection systems in distribution substations; Aproveitamento funcional de sistemas de controle e protecao digitais em subestacoes de distribuicao

    Energy Technology Data Exchange (ETDEWEB)

    Brittes, Jose Luiz Pereira

    1996-07-01

    The application of Digital Protection and Control Systems (DPCS) in Utilities substations is a fundamental part for their Information System. Technological progress in Telematics provides nowadays, the implementation of open digital systems. But it is the wide exploitation of its potentiality that will be one of the survival factor in the competitive and multi-affair environment dictated by the new worldwide economical order. This exploitation is carried out in three levels inside the substation: at bay level, with inherent technological benefits, such as more efficient and reliable protection, data acquisition and registration, and smart control; at central level (substation), by the implantation of automatics with enormous operational and management profits; and a remote level, to whom DPCS's transpire like a very sophisticated large frame remote terminal units. (author)

  3. Functional utilization of control and digital protection systems in distribution substations; Aproveitamento funcional de sistemas de controle e protecao digitais em subestacoes de distribuicao

    Energy Technology Data Exchange (ETDEWEB)

    Brittes, Jose Luiz Pereira

    1996-07-01

    The application of Digital Protection and Control Systems (DPCS) in Utilities substations is a fundamental part for their Information System. Technological progress in Telematics provides nowadays, the implementation of open digital systems. But it is the wide exploitation of its potentiality that will be one of the survival factor in the competitive and multi-affair environment dictated by the new worldwide economical order. This exploitation is carried out in three levels inside the substation: at bay level, with inherent technological benefits, such as more efficient and reliable protection, data acquisition and registration, and smart control; at central level (substation), by the implantation of automatics with enormous operational and management profits; and a remote level, to whom DPCS's transpire like a very sophisticated large frame remote terminal units. (author)

  4. Securing Digital Images Integrity using Artificial Neural Networks

    Science.gov (United States)

    Hajji, Tarik; Itahriouan, Zakaria; Ouazzani Jamil, Mohammed

    2018-05-01

    Digital image signature is a technique used to protect the image integrity. The application of this technique can serve several areas of imaging applied to smart cities. The objective of this work is to propose two methods to protect digital image integrity. We present a description of two approaches using artificial neural networks (ANN) to digitally sign an image. The first one is “Direct Signature without learning” and the second is “Direct Signature with learning”. This paper presents the theory of proposed approaches and an experimental study to test their effectiveness.

  5. Legal Protections in Public Accommodations Settings: A Critical Public Health Issue for Transgender and Gender-Nonconforming People.

    Science.gov (United States)

    Reisner, Sari L; Hughto, Jaclyn M White; Dunham, Emilia E; Heflin, Katherine J; Begenyi, Jesse Blue Glass; Coffey-Esquivel, Julia; Cahill, Sean

    2015-09-01

    Since 2012, Massachusetts law has provided legal protections against discrimination on the basis of gender identity in employment, housing, credit, public education, and hate crimes. The law does not protect against discrimination based on gender identity in public accommodations settings such as transportation, retail stores, restaurants, health care facilities, and bathrooms. A 2013 survey of Massachusetts transgender and other gender minority adults found that in the past 12 months, 65% had experienced public accommodations discrimination since the law was passed. This discrimination was associated with a greater risk of adverse emotional and physical symptoms in the past 30 days. Nondiscrimination laws inclusive of gender identity should protect against discrimination in public accommodations settings to support transgender people's health and their ability to access health care. Gender minority people who are transgender or gender nonconforming experience widespread discrimination and health inequities. Since 2012, Massachusetts law has provided protections against discrimination on the basis of gender identity in employment, housing, credit, public education, and hate crimes. The law does not, however, protect against discrimination in public accommodations (eg, hospitals, health centers, transportation, nursing homes, supermarkets, retail establishments). For this article, we examined the frequency and health correlates of public accommodations discrimination among gender minority adults in Massachusetts, with attention to discrimination in health care settings. In 2013, we recruited a community-based sample (n = 452) both online and in person. The respondents completed a 1-time, electronic survey assessing demographics, health, health care utilization, and discrimination in public accommodations venues in the past 12 months. Using adjusted multivariable logistic regression models, we examined whether experiencing public accommodations discrimination in

  6. The future of levies in a digital environment: final report

    NARCIS (Netherlands)

    Hugenholtz, P.B.; Guibault, L.; van Geffen, S.

    2003-01-01

    Copyright levy systems have been premised on the assumption that private copying of protected works cannot be controlled and exploited individually. With the advent of digital rights management (DRM), this assumption must be re-examined. In the digital environment, technical protection measures and

  7. Superconducting coil protection

    International Nuclear Information System (INIS)

    Woods, E.L.

    1975-01-01

    The protection system is based on a two-phase construction program. Phase I is the development of a reliable hardwired relay control system with a digital loop utilizing firmware and a microprocessor controller. Phase II is an expansion of the digital loop to include many heretofore unmonitored coil variables. These new monitored variables will be utilized to establish early quench detection and to formulate confirmation techniques of the quench detection mechanism. Established quench detection methods are discussed and a new approach to quench detection is presented. The new circuit is insensitive to external pulsed magnetic fields and the associated induced voltages. Reliability aspects of the coil protection system are discussed with respect to shutdowns of superconducting coil systems. Redundance and digital system methods are presented as related topics

  8. Common Cause Failure Analysis for the Digital Plant Protection System

    International Nuclear Information System (INIS)

    Kagn, Hyun Gook; Jang, Seung Cheol

    2005-01-01

    Safety-critical systems such as nuclear power plants adopt the multiple-redundancy design in order to reduce the risk from the single component failure. The digitalized safety-signal generation system is also designed based on the multiple-redundancy strategy which consists of more redundant components. The level of the redundant design of digital systems is usually higher than those of conventional mechanical systems. This higher redundancy would clearly reduce the risk from the single failure of components, but raise the importance of the common cause failure (CCF) analysis. This research aims to develop the practical and realistic method for modeling the CCF in digital safety-critical systems. We propose a simple and practical framework for assessing the CCF probability of digital equipment. Higher level of redundancy causes the difficulty of CCF analysis because it results in impractically large number of CCF events in the fault tree model when we use conventional CCF modeling methods. We apply the simplified alpha-factor (SAF) method to the digital system CCF analysis. The precedent study has shown that SAF method is quite realistic but simple when we consider carefully system success criteria. The first step for using the SAF method is the analysis of target system for determining the function failure cases. That is, the success criteria of the system could be derived from the target system's function and configuration. Based on this analysis, we can calculate the probability of single CCF event which represents the CCF events resulting in the system failure. In addition to the application of SAF method, in order to accommodate the other characteristics of digital technology, we develop a simple concept and several equations for practical use

  9. Setting new protection standards for radiation

    International Nuclear Information System (INIS)

    Clarke, R.H.

    1991-01-01

    The new recommendations of the International Commission on Radiological Protection for dose limits will be published this spring. The recommendations represent a comprehensive review of the state of knowledge of the effects of ionizing radiation, and incorporate this knowledge into a conceptual framework for radiological protection. The background to the recommendations is discussed. (author)

  10. [Artificial intelligence] AI for protection systems

    Energy Technology Data Exchange (ETDEWEB)

    Aggarwal, R.; Johns, A.

    1997-12-31

    The reliable operation of large power systems with small stability margins is highly dependent on control systems and protection devices. Progress in the field of microprocessor systems and demanding requirements in respect of the performance of protective relays are the reasons for digital device applications to power system protection. The superiority of numeric protection over its analogue alternatives is attributed to such factors as accurate extraction of the fundamental voltage and current components through filtering, functional benefits resulting from multi-processor design and extensive self-monitoring, etc. However, all these reasons have not led to a major impact on speed, sensitivity and selectivity of primary protective relays, and the gains are only marginal; this is so because conventional digital relays still rely on deterministic signal models and a heuristic approach for decision making, so that only a fraction of the information contained within voltage and current signals as well as knowledge about the plant to be protected is used. The performance of digital relays may be substantially improved if the decision making is based on elements of artificial intelligence (AI). (Author)

  11. DURAND NEIGHBOURHOOD HERITAGE INVENTORY: TOWARD A DIGITAL CITYWIDE SURVEY APPROACH TO HERITAGE PLANNING IN HAMILTON

    Directory of Open Access Journals (Sweden)

    V. Angel

    2017-08-01

    Full Text Available In the face of changing economies and patterns of development, the definition of heritage is diversifying, and the role of inventories in local heritage planning is coming to the fore. The Durand neighbourhood is a layered and complex area located in inner-city Hamilton, Ontario, Canada, and the second subject area in a set of pilot inventory studies to develop a new city-wide inventory strategy for the City of Hamilton,. This paper presents an innovative digital workflow developed to undertake the Durand Built Heritage Inventory project. An online database was developed to be at the centre of all processes, including digital documentation, record management, analysis and variable outputs. Digital tools were employed for survey work in the field and analytical work in the office, resulting in a GIS-based dataset that can be integrated into Hamilton’s larger municipal planning system. Together with digital mapping and digitized historical resources, the Durand database has been leveraged to produce both digital and static outputs to shape recommendations for the protection of Hamilton’s heritage resources.

  12. Durand Neighbourhood Heritage Inventory: Toward a Digital Citywide Survey Approach to Heritage Planning in Hamilton

    Science.gov (United States)

    Angel, V.; Garvey, A.; Sydor, M.

    2017-08-01

    In the face of changing economies and patterns of development, the definition of heritage is diversifying, and the role of inventories in local heritage planning is coming to the fore. The Durand neighbourhood is a layered and complex area located in inner-city Hamilton, Ontario, Canada, and the second subject area in a set of pilot inventory studies to develop a new city-wide inventory strategy for the City of Hamilton,. This paper presents an innovative digital workflow developed to undertake the Durand Built Heritage Inventory project. An online database was developed to be at the centre of all processes, including digital documentation, record management, analysis and variable outputs. Digital tools were employed for survey work in the field and analytical work in the office, resulting in a GIS-based dataset that can be integrated into Hamilton's larger municipal planning system. Together with digital mapping and digitized historical resources, the Durand database has been leveraged to produce both digital and static outputs to shape recommendations for the protection of Hamilton's heritage resources.

  13. Challenges and opportunities in providing a digital protection system for the PBMR - HTR2008-58173

    International Nuclear Information System (INIS)

    Marais, J.; Ridolfo, C. F.

    2008-01-01

    The Republic of South Africa is currently developing the Pebble Bed Modular Reactor (PBMR); an advanced, fourth-generation reactor that incorporates inherent safety features, which require no human intervention and which provide an unprecedented level of nuclear safety. In addition to electrical power generation, the reactor is uniquely suited for a variety of non-traditional nuclear applications including oil sands extraction, desalination, and hydrogen production. A state-of-the-art digital Protection System for the PBMR is currently being developed in conjunction with Westinghouse Electric Company (WEC). The Protection System provides for: reactor shutdown using two different reactor trip methodologies (dropping of the control rods and insertion of Small Absorber Spheres (SASs) which are composed of boron carbide); post-event monitoring; and manual reactor shutdown, which is independent of software-based systems. The reactor shutdown and post-event instrumentation monitoring components of the Protection System are being implemented utilizing the WEC 'Common Q' platform, which is comprised of 'commercially dedicated' Programmable Logic Controllers (PLCs), colour-graphic Flat Panel Displays (FPDs) with integral touch screens, and high-speed data communication links. High reliability and availability are achieved through component redundancy, continuous automatic self-testing which is run online in a background mode, and implementation of a multi-channel system design which is tolerant to failures. The Protection System is also designed to support periodic surveillance testing through a suite of built- in computer-aided test facilities that are accessible via an FPD interface. These allow various system surveillance requirements to be readily performed in a convenient and systematic manner. This paper discusses the following topics with regard to the PBMR Protection System: development strategy, functional requirements, selection of applicable Codes and Standards

  14. Digital Technology Entrepreneurship

    DEFF Research Database (Denmark)

    Giones, Ferran; Brem, Alexander

    2017-01-01

    Technology entrepreneurship is an established concept in academia. However, recent developments in the context of digital entrepreneurship call for revision and advance- ment. The multiple possible combinations of technology and entrepreneurship have res- ulted in a diversity of phenomena...... with significantly different characteristics and socio-economic impact. This article is focused on the identification and description of technology entrepreneurship in times of digitization. Based on current examples, we identify and describe characterizations of technology entrepreneurship, digital techno- logy...... entrepreneurship, and digital entrepreneurship. With this new delineation of terms, we would like to foster discussion between researchers, entrepreneurs, and policy makers on the impact of digitization on entrepreneurship, and set a future research agenda....

  15. A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography.

    Science.gov (United States)

    Devi, B Pushpa; Singh, Kh Manglem; Roy, Sudipta

    2016-01-01

    This paper proposes a new watermarking algorithm based on the shuffled singular value decomposition and the visual cryptography for copyright protection of digital images. It generates the ownership and identification shares of the image based on visual cryptography. It decomposes the image into low and high frequency sub-bands. The low frequency sub-band is further divided into blocks of same size after shuffling it and then the singular value decomposition is applied to each randomly selected block. Shares are generated by comparing one of the elements in the first column of the left orthogonal matrix with its corresponding element in the right orthogonal matrix of the singular value decomposition of the block of the low frequency sub-band. The experimental results show that the proposed scheme clearly verifies the copyright of the digital images, and is robust to withstand several image processing attacks. Comparison with the other related visual cryptography-based algorithms reveals that the proposed method gives better performance. The proposed method is especially resilient against the rotation attack.

  16. Topology of digital images visual pattern discovery in proximity spaces

    CERN Document Server

    Peters, James F

    2014-01-01

    This book carries forward recent work on visual patterns and structures in digital images and introduces a near set-based a topology of digital images. Visual patterns arise naturally in digital images viewed as sets of non-abstract points endowed with some form of proximity (nearness) relation. Proximity relations make it possible to construct uniform topolo- gies on the sets of points that constitute a digital image. In keeping with an interest in gaining an understanding of digital images themselves as a rich source of patterns, this book introduces the basics of digital images from a computer vision perspective. In parallel with a computer vision perspective on digital images, this book also introduces the basics of prox- imity spaces. Not only the traditional view of spatial proximity relations but also the more recent descriptive proximity relations are considered. The beauty of the descriptive proximity approach is that it is possible to discover visual set patterns among sets that are non-overlapping ...

  17. A comparison between complete immobilisation and protected active mobilisation in sensory nerve recovery following isolated digital nerve injury.

    LENUS (Irish Health Repository)

    Henry, F P

    2012-06-01

    Post-operative immobilisation following isolated digital nerve repair remains a controversial issue amongst the microsurgical community. Protocols differ from unit to unit and even, as evidenced in our unit, may differ from consultant to consultant. We undertook a retrospective review of 46 patients who underwent isolated digital nerve repair over a 6-month period. Follow-up ranged from 6 to 18 months. Twenty-four were managed with protected active mobilisation over a 4-week period while 22 were immobilised over the same period. Outcomes such as return to work, cold intolerance, two-point discrimination and temperature differentiation were used as indicators of clinical recovery. Our results showed that there was no significant difference noted in either clinical assessment of recovery or return to work following either post-operative protocol, suggesting that either regime may be adopted, tailored to the patient\\'s needs and resources of the unit.

  18. Determination of settings in the protection system for Tokamak-15 superconducting magnet

    International Nuclear Information System (INIS)

    Chudnovsky, A.N.; Khvostenko, P.P.; Posadsky, I.A.

    1996-01-01

    The calculations results of the maximal temperature heating of Tokamak-15 superconducting magnet (T-15 SM) under energy removal dependent on the current through the coil are given in paper. The calculations of SM thermomechanical strength have shown that the maximal coil heating temperature should not exceed 150--160 K. The range of the settings level in SM protection system for currents 1 ≤ 4 kA has been determined

  19. Engineering development of a digital replacement protection system at an operating US PWR nuclear power plant: Installation and operational experiences

    International Nuclear Information System (INIS)

    Miller, M.H.

    1995-01-01

    The existing Reactor Protection Systems (RPSs) at most US PWRs are systems which reflect 25 to 30 year-old designs, components and manufacturing techniques. Technological improvements, especially in relation to modern digital systems, offer improvements in functionality, performance, and reliability, as well as reductions in maintenance and operational burden. The Nuclear power industry and the US nuclear regulators are poised to move forward with the issues that have slowed the transition to modern digital replacements for nuclear power plant safety systems. The electric utility industry is now more than ever being driven by cost versus benefit decisions. Properly designed, engineered, and installed digital systems can provide adequate cost-benefit and allow continued nuclear generated electricity. This paper describes various issues and areas related to an ongoing RPS replacement demonstration project which are pertinant for a typical US nuclear plant to consider cost-effective replacement of an aging analog RPS with a modern digital RPS. The following subject areas relative to the Oconee Nuclear Station ISAT trademark Demonstrator project are discussed: Operator Interface Development; Equipment Qualification; Validation and Verification of Software; Factory Testing; Field Changes and Verification Testing; Utility Operational, Engineering and Maintenance; Experiences with Demonstration System; and Ability to operate in parallel with the existing Analog RPS

  20. Engineering development of a digital replacement protection system at an operating US PWR nuclear power plant: Installation and operational experiences

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M.H. [Duke Power Co., Seneca, SC (United States)

    1995-04-01

    The existing Reactor Protection Systems (RPSs) at most US PWRs are systems which reflect 25 to 30 year-old designs, components and manufacturing techniques. Technological improvements, especially in relation to modern digital systems, offer improvements in functionality, performance, and reliability, as well as reductions in maintenance and operational burden. The Nuclear power industry and the US nuclear regulators are poised to move forward with the issues that have slowed the transition to modern digital replacements for nuclear power plant safety systems. The electric utility industry is now more than ever being driven by cost versus benefit decisions. Properly designed, engineered, and installed digital systems can provide adequate cost-benefit and allow continued nuclear generated electricity. This paper describes various issues and areas related to an ongoing RPS replacement demonstration project which are pertinant for a typical US nuclear plant to consider cost-effective replacement of an aging analog RPS with a modern digital RPS. The following subject areas relative to the Oconee Nuclear Station ISAT{trademark} Demonstrator project are discussed: Operator Interface Development; Equipment Qualification; Validation and Verification of Software; Factory Testing; Field Changes and Verification Testing; Utility Operational, Engineering and Maintenance; Experiences with Demonstration System; and Ability to operate in parallel with the existing Analog RPS.

  1. Numerical differential protection

    CERN Document Server

    Ziegler, Gerhard

    2012-01-01

    Differential protection is a fast and selective method of protection against short-circuits. It is applied in many variants for electrical machines, trans?formers, busbars, and electric lines.Initially this book covers the theory and fundamentals of analog and numerical differential protection. Current transformers are treated in detail including transient behaviour, impact on protection performance, and practical dimensioning. An extended chapter is dedicated to signal transmission for line protection, in particular, modern digital communication and GPS timing.The emphasis is then pla

  2. Research for the Influence of Distribution Network Line Reclosing Current on Line Protection

    Directory of Open Access Journals (Sweden)

    Yu Kansheng

    2016-01-01

    Full Text Available According to the distribution network line structure and reclosing control strategy, the system simulation model of distribution network lines has established based on the real-time digital simulation RTDS. Based on this, distribution network switching impulse current characteristic has researched with different capacity, different distribution and different load power factor under the different voltage switching angles. The results of the study provide a scientific basis for distribution network line protection setting, in order to further lay the foundation for improvement the validity and reliability of distribution network line protection action.

  3. Organisational aspects of mammography screening in digital settings: First experiences of Luxembourg

    International Nuclear Information System (INIS)

    Shannoun, F.; Schanck, J. M.; Scharpantgen, A.; Wagnon, M. C.; Ben Daoud, M.; Back, C.

    2008-01-01

    Luxembourg has been conducting a breast cancer screening programme since 1992, like a large number of other European countries, as early detection and treatment of breast cancer have been proven to reduce mortality. The majority of these screening programmes are based on analogue X-ray technology and have optimised their organisation of transporting, archiving and reading with respect to films. Last decade is marked by enormous developments in digital mammography. Different technologies such as flat panel-, computed radiography- and scanning systems became available. Digital mammography is expected to have a major impact on quality and organisation of breast cancer screening programmes. Screening programmes are now faced with a huge challenge of incorporating the digital technology, including implementation of electronic image exchange, conception of new electronic work-flow, establishing adapted quality assurance programmes and training of radiologists and technical personnel. Initial experiences of the Luxembourg approach in organising digital mammography screening and its quality assurance are reported. (authors)

  4. The Modified Frequency Algorithm of Digital Watermarking of Still Images Resistant to JPEG Compression

    Directory of Open Access Journals (Sweden)

    V. A. Batura

    2015-01-01

    Full Text Available Digital watermarking is an effective copyright protection for multimedia products (in particular, still images. Digital marking represents process of embedding into object of protection of a digital watermark which is invisible for a human eye. However there is rather large number of the harmful influences capable to destroy the watermark which is embedded into the still image. The most widespread attack is JPEG compression that is caused by efficiency of this format of compression and its big prevalence on the Internet.The new algorithm which is modification of algorithm of Elham is presented in the present article. The algorithm of digital marking of motionless images carries out embedding of a watermark in frequency coefficients of discrete Hadamard transform of the chosen image blocks. The choice of blocks of the image for embedding of a digital watermark is carried out on the basis of the set threshold of entropy of pixels. The choice of low-frequency coefficients for embedding is carried out on the basis of comparison of values of coefficients of discrete cosine transformation with a predetermined threshold, depending on the product of the built-in watermark coefficient on change coefficient.Resistance of new algorithm to compression of JPEG, noising, filtration, change of color, the size and histogram equalization is in details analysed. Research of algorithm consists in comparison of the appearance taken from the damaged image of a watermark with the introduced logo. Ability of algorithm to embedding of a watermark with a minimum level of distortions of the image is in addition analysed. It is established that the new algorithm in comparison by initial algorithm of Elham showed full resistance to compression of JPEG, and also the improved resistance to a noising, change of brightness and histogram equalization.The developed algorithm can be used for copyright protection on the static images. Further studies will be used to study the

  5. Global digital data sets of soil type, soil texture, surface slope and other properties: Documentation of archived data tape

    Science.gov (United States)

    Staub, B.; Rosenzweig, C.; Rind, D.

    1987-01-01

    The file structure and coding of four soils data sets derived from the Zobler (1986) world soil file is described. The data were digitized on a one-degree square grid. They are suitable for large-area studies such as climate research with general circulation models, as well as in forestry, agriculture, soils, and hydrology. The first file is a data set of codes for soil unit, land-ice, or water, for all the one-degree square cells on Earth. The second file is a data set of codes for texture, land-ice, or water, for the same soil units. The third file is a data set of codes for slope, land-ice, or water for the same units. The fourth file is the SOILWRLD data set, containing information on soil properties of land cells of both Matthews' and Food and Agriculture Organization (FAO) sources. The fourth file reconciles land-classification differences between the two and has missing data filled in.

  6. Fully Digital Chaotic Differential Equation-based Systems And Methods

    KAUST Repository

    Radwan, Ahmed Gomaa Ahmed; Zidan, Mohammed A.; Salama, Khaled N.

    2012-01-01

    Various embodiments are provided for fully digital chaotic differential equation-based systems and methods. In one embodiment, among others, a digital circuit includes digital state registers and one or more digital logic modules configured to obtain a first value from two or more of the digital state registers; determine a second value based upon the obtained first values and a chaotic differential equation; and provide the second value to set a state of one of the plurality of digital state registers. In another embodiment, a digital circuit includes digital state registers, digital logic modules configured to obtain outputs from a subset of the digital shift registers and to provide the input based upon a chaotic differential equation for setting a state of at least one of the subset of digital shift registers, and a digital clock configured to provide a clock signal for operating the digital shift registers.

  7. Fully Digital Chaotic Differential Equation-based Systems And Methods

    KAUST Repository

    Radwan, Ahmed Gomaa Ahmed

    2012-09-06

    Various embodiments are provided for fully digital chaotic differential equation-based systems and methods. In one embodiment, among others, a digital circuit includes digital state registers and one or more digital logic modules configured to obtain a first value from two or more of the digital state registers; determine a second value based upon the obtained first values and a chaotic differential equation; and provide the second value to set a state of one of the plurality of digital state registers. In another embodiment, a digital circuit includes digital state registers, digital logic modules configured to obtain outputs from a subset of the digital shift registers and to provide the input based upon a chaotic differential equation for setting a state of at least one of the subset of digital shift registers, and a digital clock configured to provide a clock signal for operating the digital shift registers.

  8. Fuzzy topological digital space and digital fuzzy spline of electroencephalography during epileptic seizures

    Science.gov (United States)

    Shah, Mazlina Muzafar; Wahab, Abdul Fatah

    2017-08-01

    Epilepsy disease occurs because of there is a temporary electrical disturbance in a group of brain cells (nurons). The recording of electrical signals come from the human brain which can be collected from the scalp of the head is called Electroencephalography (EEG). EEG then considered in digital format and in fuzzy form makes it a fuzzy digital space data form. The purpose of research is to identify the area (curve and surface) in fuzzy digital space affected by inside epilepsy seizure in epileptic patient's brain. The main focus for this research is to generalize fuzzy topological digital space, definition and basic operation also the properties by using digital fuzzy set and the operations. By using fuzzy digital space, the theory of digital fuzzy spline can be introduced to replace grid data that has been use previously to get better result. As a result, the flat of EEG can be fuzzy topological digital space and this type of data can be use to interpolate the digital fuzzy spline.

  9. Adaptive settings of distance relay for MOV-protected series compensated line with distributed capacitance considering wind power

    Science.gov (United States)

    Sivov, Oleg Viktorovich

    Series compensated lines are protected from overvoltage by metal-oxide-varistors (MOVs) connected in parallel with the capacitor bank. The nonlinear characteristics of MOV devices add complexity to fault analysis and distance protection operation. During faults, the impedance of the line is modified by an equivalent impedance of the parallel MOV/capacitor circuit, which affects the distance protection. The intermittent wind generation introduces additional complexity to the system performance and distance protection. Wind variation affects the fault current level and equivalent MOV/capacitor impedance during a fault, and hence the distance relay operation. This thesis studies the impact of the intermittent wind power generation on the operation of MOV during faults. For the purpose of simulation, an equivalent wind farm model is proposed to generate a wind generation profile using wind farm generation from California independent system operator (ISO) as a guide for wind power variation to perform the study. The IEEE 12-bus test system is modified to include MOV-protected series capacitor and the equivalent wind farm model. The modified test system is simulated in the MATLAB/Simulink environment. The study has been achieved considering three phase and single line to ground (SLG) faults on the series compensated line to show the effect of wind variation on the MOV operation. This thesis proposes an adaptive setting method for the mho relay distance protection of series compensated line considering effects of wind power variation and MOV operation. The distributed parameters of a transmission line are taken into account to avoid overreaching and underreaching of distance relays. The study shows that variable wind power affects system power flow and fault current in the compensated line during a fault which affects the operation of MOVs for different fault conditions. The equivalent per-phase impedance of the MOV/capacitor circuit has an effect on the system operation

  10. The challenge of objective scar colour assessment in a clinical setting: using digital photography.

    Science.gov (United States)

    Anderson, J C; Hallam, M-J; Nduka, C; Osorio, D

    2015-08-01

    Scar assessment in the clinical setting is typically impeded by a lack of quantitative data and most systems rely on subjective rating scales which are user dependant and show considerable variability between raters. The growing use of digital photography in medicine suggests a more objective approach to scar evaluation. Our objective was to determine if cameras could be of practical use for measuring colour in a clinical setting. The measurement of colour and reflectance spectra in photographs faces two difficulties: firstly the effects of variable illumination spectra, and secondly to recover accurate colour and spectral information from the sparse red, green and blue (RGB) camera signals. As a result the colour rendition is often inaccurate, and spectral information is lost. To deal with variable illumination and other factors that systematically affect all reflectance spectra ColourWorker (a method for image-based colour measurement implemented in software) calibrates the spectral responses of the camera's RGB sensors using a colour standard in the image. To make best use of the calibrated signals, it takes advantage of the fact that although a given RGB signal can be caused by an infinite number of spectra, most natural reflectance spectra vary smoothly and have predictable forms. This means given a set of examples of spectra produced by the materials of interest, it is possible to estimate the specific spectrum that produced a given RGB signal once corrected for the illumination. We describe a method for recovering spectral and chromatic information relating to surface reflectance from ordinary digital images and apply this to analyse photographs of surgical scars, taken as part of a clinical trial, in an attempt to better quantify clinical scar assessment. It should be noted the pre-existing trial protocol did not allow for a comprehensive evaluation of the accuracy of the method which would require the spectrophotometric measurement of skin regions

  11. The Effects of Activities for Digital Citizenship on Students’ Attitudes toward Digital Citizenship and Their Reflections on Students’ Understanding about Digital Citizenship

    Directory of Open Access Journals (Sweden)

    Hıdır KARADUMAN

    2014-05-01

    Full Text Available Advances in info-communication technologies have brought many social, cultural, and economic changes along across the world. Recent reflections of these changes over citizenship studies are noteworthy. One of the relevant concepts, digital citizenship can be defined as applying and advocating behaviors necessary for legal, ethical, safe, and responsible use of info-communication technologies in online settings (ISTE, 2007. Day by day, individuals are becoming more and more digital citizens with the spread of the Internet and digital communication devices. However, this gives rise to discussions about problems related with ethics, privacy and security, health, communication, and etc. (Symantec, 2010; Deniz, 2010; Kadll, Kumba & Kanamad, 2010; Gunduz & Ozdinc, 2008; Kabakci & Can, 2009. All these hot issues, debates, and current technological competence standards point that teachers should teach this concept to their students as efficiently as possible by adopting digital citizenship (Greenhow, 2010. Ribble (2006 states that this education can be carried out through 9 dimensions such as digital ethics, digital communication, digital literacy, digital access, digital commerce, digital rights and law, digital privacy and security, digital responsibility, and digital health & wellness.

  12. A digital phantom of the axilla based on the Visible Human Project data set

    Science.gov (United States)

    McCallum, S. J.; Welch, A. E.; Baker, L.

    2001-08-01

    In this paper, we describe the development of a new digital phantom designed for Monte Carlo simulations of breast cancer and particularly positron emission tomography (PET) imaging of the axillary lymph nodes. The phantom was based on data from the Visible Human Project female data set. The phantom covers the head-to-diaphragm regions; 17 major tissue types were segmented and 66 individual lymph nodes were identified. The authors have used the phantom in Monte Carlo simulations to model a reduced field-of-view PET imager based on two flat plate arrays placed on either side of the shoulder. Images used a simple single angle set of projections. The authors have conducted two preliminary studies: one modeling a single-frame PET acquisition 60 min after FDG injection and the other modeling a dynamic PET acquisition simulating four time frames after FDG injection. The dynamic results were processed into parametric images using the Patlak method and show the advantage to be gained by including the temporal information for legion detection. The authors' preliminary results indicate that the performance of such an imager forming projection images is not sufficient for axillary node PET imaging.

  13. Comparing Effects of TCR and TSC on MHO Distance Protection Setting in 400 kV Algerian Transmission Line

    Directory of Open Access Journals (Sweden)

    Mohamed ZELLAGUI

    2012-11-01

    Full Text Available This paper presents a study on the performances of distance relays setting in 400 kV in Eastern Algerian transmission networks at Sonelgaz Group (Algerian company of Electrical and Gas compensated by shunt Flexible AC Transmission System (FACTS. The facts are used for controlling transmission voltage, power flow, reactive power, and damping of power system oscillations in high power transfer levels. The effects of SVC devices i.e. Thyristor Controlled Reactor (TCR and the Thyristor Switched Capacitors (TSC insertion, on the total impedance of a transmission line protected by MHO distance relay are investigated. The modified setting zones protections for three forward zones (Z1, Z2 and Z3 have been calculated in order to improve the performances of distance relay protection and prevent circuit breaker nuisance tripping.

  14. 56-Day Complete Set of all of the Digital Enroute Charts - Aeronautical Information Services Digital Products

    Data.gov (United States)

    Department of Transportation — The following ZIP files contain all of the Digital Enroute charts, except for Caribbean charts, for a given effective date range. Due to the large file sizes, it is...

  15. Artificial neural networks applied to DNBR calculation in digital core protection systems

    International Nuclear Information System (INIS)

    Lee, H. C.; Chang, S. H.

    2003-01-01

    The nuclear power plant has to be operated with sufficient margin from the specified DNBR limit for assuring its safety. The digital core protection system calculates on-line real-time DNBR by using a complex subchannel analysis program, and triggers a reliable reactor shutdown if the calculated DNBR approaches the specified limit. However, it takes relatively long calculation time even for a steady state condition, which may have an adverse effect on the operation flexibility. To overcome the drawback, a method using artificial neural networks is studied in this paper. Nonparametric training approach is utilized, which shows dramatic reduction of the training time, no tedious heuristic process for optimizing parameters, and no local minima problem during the training. The test results show that the predicted DNBR is within about ±2% deviation from the target DNBR for the fixed axial flux shape case. For the variable axial flux case including severely skewed shapes appeared during accidents, the deviation is about ±10∼15%. The suggested method could be the alternative that can calculate DNBR very quickly while increasing the plant availability

  16. Introduction to digital communication systems

    CERN Document Server

    Wesolowski, Krzysztof

    2009-01-01

    Combining theoretical knowledge and practical applications, this advanced-level textbook covers the most important aspects of contemporary digital communication systems. Introduction to Digital Communication Systems focuses on the rules of functioning digital communication system blocks, starting with the performance limits set by the information theory. Drawing on information relating to turbo codes and LDPC codes, the text presents the basic methods of error correction and detection, followed by baseband transmission methods, and single- and multi-carrier digital modulations. The basi

  17. Design and realization of a fast digital system for the protection of a linear accelerator; Conception et realisation d'un systeme numerique rapide pour la protection d'un accelerateur lineaire

    Energy Technology Data Exchange (ETDEWEB)

    Hamdi, A

    2004-07-01

    The new generation of light sources based on SASE Free-Electron-Lasers driven by LINACs operate with electron beams with high beam currents and duty cycles. This is especially true for the superconducting machines like TTF 2 and the X-RAY FEL, under construction or planning at DESY. Elaborate fast protections systems are required not only to protect the machine from electron beams hitting and destroying the vacuum chamber, but also to prevent the machine from running at high loss levels, dangerous for components like the FEL undulator. This document presents the different protection systems currently under construction for TTF 2. The very fast systems, based on transmission measurements and distributed loss detection monitors, are described in detail. This description includes the fast electronics to collect and to transmit the different interlock and status signals: analog to digital converters, DSP and FPGA, interfaces, toroid protection system (TPS) card. The implementation and validation (simulation and tests) of the TPS card at DESY is presented.

  18. Implementation of Digital Watermarking Using MATLAB Software

    OpenAIRE

    Karnpriya Vyas; Kirti Sethiya; Sonu Jain

    2012-01-01

    Digital watermarking holds significant promise as one of the keys to protecting proprietary digital content in the coming years. It focuses on embedding information inside a digital object such that the embedded information is in separable bound to the object. The proposed scheme has been implemented on MATLAB, as it is a high level technical computing language and interactive environment for algorithm development, data visualization, data analysis, and numerical computation. We w...

  19. Digital Model of Railway Electric Traction Lines

    Science.gov (United States)

    Garg, Rachana; Mahajan, Priya; Kumar, Parmod

    2017-08-01

    The characteristic impedance and propagation constant define the behavior of signal propagation over the transmission lines. The digital model for railway traction lines which includes railway tracks is developed, using curve fitting technique in MATLAB. The sensitivity of this model has been computed with respect to frequency. The digital sensitivity values are compared with the values of analog sensitivity. The developed model is useful for digital protection, integrated operation, control and planning of the system.

  20. Improved methodology for generation of axial flux shapes in digital core protection systems

    International Nuclear Information System (INIS)

    Lee, G.-C.; Baek, W.-P.; Chang, S.H.

    2002-01-01

    An improved method of axial flux shape (AFS) generation for digital core protection systems of pressurized water reactors is presented in this paper using an artificial neural network (ANN) technique - a feedforward network trained by backpropagation. It generates 20-node axial power shapes based on the information from three ex-core detectors. In developing the method, a total of 7173 axial flux shapes are generated from ROCS code simulation for training and testing of the ANN. The ANN trained 200 data predicts the remaining data with the average root mean square error of about 3%. The developed method is also tested with the real plant data measured during normal operation of Yonggwang Unit 4. The RMS errors in the range of 0.9∼2.1% are about twice as accurate as the cubic spline approximation method currently used in the plant. The developed method would contribute to solve the drawback of the current method as it shows reasonable accuracy over wide range of core conditions

  1. DOPA, a Digital Observatory for Protected Areas including Monitoring and Forecasting Services

    Science.gov (United States)

    Dubois, Gregoire; Hartley, Andrew; Peedell, Stephen; de Jesus, Jorge; Ó Tuama, Éamonn; Cottam, Andrew; May, Ian; Fisher, Ian; Nativi, Stefano; Bertrand, Francis

    2010-05-01

    The Digital Observatory for Protected Areas (DOPA) is a biodiversity information system currently developed as an interoperable web service at the Joint Research Centre of the European Commission in collaboration with other international organizations, including GBIF, UNEP-WCMC, Birdlife International and RSPB. DOPA is designed to assess the state and pressure of Protected Areas (PAs) and to prioritize them accordingly, in order to support decision making and fund allocation processes. To become an operational web service allowing the automatic monitoring of protected areas, DOPA needs to be able to capture the dynamics of spatio-temporal changes in habitats and anthropogenic pressure on PAs as well as the changes in the species distributions. Because some of the most valuable natural ecosystems and species on the planet cover large areas making field monitoring methods very difficult for a large scale assessment, the automatic collection and processing of remote sensing data are processes at the heart of the problem. To further be able to forecast changes due to climate change, DOPA has to rely on an architecture that enables it to communicate with the appropriate modeling web services. The purpose of this presentation is to present the architecture of the DOPA with special attention to e-Habitat, its web processing service designed for assessing the irreplaceability of habitats as well as for the modeling of habitats under different climate change scenarios. The use of open standards for spatial data and of open source programming languages for the development of the core functionalities of the system are expected to encourage the participation of the scientific community beyond the current partnerships and to favour the sharing of such an observatory which could be installed at any other location. Acknowledgement: Part of this work is funded under the 7th Framework Programme by the EuroGEOSS (www.eurogeoss.eu) project of the European Commission. The views

  2. IT security standards for the digitalization of the energy transition

    International Nuclear Information System (INIS)

    Laupichler, Dennis

    2016-01-01

    Intelligent measuring systems are important components in the intelligent net and require security and privacy by design in this critical infrastructure. The smart meter gateway as secure communication platform makes the digital sector coupling possible and becomes the driver for innovations of the digitalization. The protection profiles and the technical rules of the BSI as essential part of the law for the digitalization of the energy transition guarantee a great amount of data protection and data security and provide a unique security standard in the future energy supply system. The data -protection concept of the intelligent measuring system regards a calibration-law conformal data processing and star-shaped data dispatch of the gateway. By this both a traceability and a transparency for the final user is guaranteed and the handling of the data in the sense of the data sovereignty is also technically enforced. For the evidences of compliance of the protection profiles and the technical rules correponding tests in approved test centers with final certification by the BSI are performed. The law for the digitalization of the energy transition makes the first important step to an innovative, digital infrastructure of the intelligent net. By the legal framework additionally a base is created, in order to perform a progressive development of the security targets of the BSI both for intelligent measuring systems as for further important system components of the intelligent energy net via a roadmap for the digitalization. In connection with the technical standards of the BSI the law creates the necessary legal certainty and realizes the aim pursued in the coalition treaty to regulate binding framework conditions for the secure and data-protection conformal application of intelligent measuring systems for diversified application cases in the intelligent net.

  3. Digitalization and Public Sector Transformations

    DEFF Research Database (Denmark)

    Schou, Jannick; Hjelholt, Morten

    This book provides a study of governmental digitalization, an increasingly important area of policymaking within advanced capitalist states. It dives into a case study of digitalization efforts in Denmark, fusing a national policy study with local institutional analysis. Denmark is often framed....... Digitalization and Public Sector Transformations pushes for a renewed approach to governmental digitalization and will be of interest to scholars working in the intersections of critical political economy, state theory and policy studies....... as an international forerunner in terms of digitalizing its public sector and thus provides a particularly instructive setting for understanding this new political instrument. Advancing a cultural political economic approach, Schou and Hjelholt argue that digitalization is far from a quick technological fix. Instead...

  4. Influence of digitalization on labour relations

    Directory of Open Access Journals (Sweden)

    Jašarević Senad R.

    2016-01-01

    Full Text Available Modern information technology has brought a real revolution in all areas of life and work. The degree of 'digitization' is so great that some authors call this process 'digital revolution', and modern economy - 'digitized economy.' Although it is not so obvious, gradualy is forming a new society - 'digital capitalism'. For 'virtual employers', in the new - 'virtual economy', work 'digital workers' who are mainly invisible and deprived of their labour rights. That's why some call them - 'digital proletariat'. Labour law is slowly adapting to the new circumstances. An increasing number of people remain unprotected or poorly protected. It is necessary to completely re-examine and update the traditional concept of labor law, by expanding access of the labour law to the 'digital workers', modernizing the concept of employment, of an employee, worker, self-employee and employer. Digital technology should be converted into a 'fellow worker' (worker friendly and not a tool of a new form of exploitation. Otherwise, modern 'digitalized society' will turn into a 'community of rightless,' without social and economic perspective.

  5. Hausdorff dimension of certain sets arising in Engel expansions

    Science.gov (United States)

    Fang, Lulu; Wu, Min

    2018-05-01

    The present paper is concerned with the Hausdorff dimension of certain sets arising in Engel expansions. In particular, the Hausdorff dimension of the set is completely determined, where A n (x) can stand for the digit, gap and ratio between two consecutive digits in the Engel expansion of x and ϕ is a positive function defined on natural numbers. These results significantly extend the existing results of Galambos’ open problems on the Hausdorff dimension of sets related to the growth rate of digits.

  6. EU Digital Regulation Versus Copyright: A Way to Reconcile Digital Economy and Copyright?

    Directory of Open Access Journals (Sweden)

    Yvon Thiec

    2016-12-01

    Full Text Available In September 2016, the European Commission presented a proposal for a Directive on copyright in the Digital Single Market, part of a package that also includes the transposition into European law of the Marrakesh Treaty and its effects on the European Union’s relations with third countries, as well as the regulation on online transmissions of broadcasting organisations. The copyright directive is of major importance in the context of digital regulation as it proposes a new related right for press publishers and a new mechanism aiming to give rightholders better control over the use and remuneration of their works on Internet. The proposal also narrows the liability exemption under the e-commerce directive, which has given platforms that provide access to protected works a way out of concluding licensing agreements with rightholders. The draft directive proposes three exceptions to copyright to reinforce digital use in education, protection of the cultural heritage and text-and-data mining. The aim of this paper is to present and to comment on the copyright directive and offer an overview of the opinions that are starting to emerge among different stakeholders.

  7. Legal Protections in Public Accommodations Settings: A Critical Public Health Issue for Transgender and Gender-Nonconforming People

    Science.gov (United States)

    Reisner, Sari L; Hughto, Jaclyn M White; Dunham, Emilia E; Heflin, Katherine J; Begenyi, Jesse Blue Glass; Coffey-Esquivel, Julia; Cahill, Sean

    2015-01-01

    Context Gender minority people who are transgender or gender nonconforming experience widespread discrimination and health inequities. Since 2012, Massachusetts law has provided protections against discrimination on the basis of gender identity in employment, housing, credit, public education, and hate crimes. The law does not, however, protect against discrimination in public accommodations (eg, hospitals, health centers, transportation, nursing homes, supermarkets, retail establishments). For this article, we examined the frequency and health correlates of public accommodations discrimination among gender minority adults in Massachusetts, with attention to discrimination in health care settings. Methods In 2013, we recruited a community-based sample (n = 452) both online and in person. The respondents completed a 1-time, electronic survey assessing demographics, health, health care utilization, and discrimination in public accommodations venues in the past 12 months. Using adjusted multivariable logistic regression models, we examined whether experiencing public accommodations discrimination in health care was independently associated with adverse self-reported health, adjusting for discrimination in other public accommodations settings. Findings Overall, 65% of respondents reported public accommodations discrimination in the past 12 months. The 5 most prevalent discrimination settings were transportation (36%), retail (28%), restaurants (26%), public gatherings (25%), and health care (24%). Public accommodations discrimination in the past 12 months in health care settings was independently associated with a 31% to 81% increased risk of adverse emotional and physical symptoms and a 2-fold to 3-fold increased risk of postponement of needed care when sick or injured and of preventive or routine health care, adjusting for discrimination in other public accommodations settings (which also conferred an additional 20% to 77% risk per discrimination setting endorsed

  8. New concept of microprocessor protective devices design

    Directory of Open Access Journals (Sweden)

    Gurevich Vladimir

    2010-01-01

    Full Text Available Transition from electromechanical to digital protective relays is accompanied with serious technical problems. The author offers a new approach in designing the digital relays capable of solving these problems. It is proposed to construct digital relays in the form of standard modules from which it would be possible to assemble the digital relay in the same way as now a personal computer.

  9. Digital mammography screening: average glandular dose and first performance parameters

    International Nuclear Information System (INIS)

    Weigel, S.; Girnus, R.; Czwoydzinski, J.; Heindel, W.; Decker, T.; Spital, S.

    2007-01-01

    Purpose: The Radiation Protection Commission demanded structured implementation of digital mammography screening in Germany. The main requirements were the installation of digital reference centers and separate evaluation of the fully digitized screening units. Digital mammography screening must meet the quality standards of the European guidelines and must be compared to analog screening results. We analyzed early surrogate indicators of effective screening and dosage levels for the first German digital screening unit in a routine setting after the first half of the initial screening round. Materials and Methods: We used three digital mammography screening units (one full-field digital scanner [DR] and two computed radiography systems [CR]). Each system has been proven to fulfill the requirements of the National and European guidelines. The radiation exposure levels, the medical workflow and the histological results were documented in a central electronic screening record. Results: In the first year 11,413 women were screened (participation rate 57.5 %). The parenchymal dosages for the three mammographic X-ray systems, averaged for the different breast sizes, were 0.7 (DR), 1.3 (CR), 1.5 (CR) mGy. 7 % of the screened women needed to undergo further examinations. The total number of screen-detected cancers was 129 (detection rate 1.1 %). 21 % of the carcinomas were classified as ductal carcinomas in situ, 40 % of the invasive carcinomas had a histological size ≤ 10 mm and 61 % < 15 mm. The frequency distribution of pT-categories of screen-detected cancer was as follows: pTis 20.9 %, pT1 61.2 %, pT2 14.7 %, pT3 2.3 %, pT4 0.8 %. 73 % of the invasive carcinomas were node-negative. (orig.)

  10. GetData Digitizing Program Code: Description, Testing, Training

    International Nuclear Information System (INIS)

    Taova, S.

    2013-01-01

    90 percents of compilation in our center is obtained by data digitizing. So we are rather interested in the development of different techniques of data digitizing. Plots containing a great amount of points and solid lines are most complicated for digitizing. From our point of view including to the Exfor-Digitizer procedures of automatic or semi-automatic digitizing will allow to simplify significantly this process. We managed to test some free available program codes. Program GETDATA Graph Digitizer (www.getdata- graph-digitizer.com) looks more suitable for our purposes. GetData Graph Digitizer is a program for digitizing graphs, plots and maps. Main features of GetData Graph Digitizer are: - supported graphics formats are TIFF, JPEG, BMP and PCX; - two algorithms for automatic digitizing; - convenient manual digitizing; - reorder tool for easy points reordering; - save/open workspace, which allows to save the work and return to it later; - obtained data can be exported to the clipboard; - export to the formats: TXT (text file), XLS (MS Excel), XML, DXF (AutoCAD) and EPS (PostScript). GetData Graph Digitizer includes two algorithms for automatic digitizing. Auto trace lines: This method is designed to digitize solid lines. Choose the starting point, and the program will trace the line, stopping at it's end. To trace the line use Operations =>Auto trace lines menu or context menu ('Auto trace lines' item). To choose starting point click left mouse button, or click right mouse button to additionally choose direction for line tracing. Digitize area: The second way is to set digitizing area. This method works for any type of lines, including dashed lines. Data points are set at the intersection of grid with the line. You can choose the type of grid (X grid or Y grid), and set the distance between grid lines. You can also make the grid be shifted in such a way, that it will pass through a specific X (or Y) value. To digitize area use Operations →Digitize area menu

  11. Digital Elevation Model (DEM) 24K

    Data.gov (United States)

    Kansas Data Access and Support Center — Digital Elevation Model (DEM) is the terminology adopted by the USGS to describe terrain elevation data sets in a digital raster form. The standard DEM consists of a...

  12. Design concepts for the reactor protection and control process instrumentation digital upgrade project at the Donald C. Cook Nuclear Plant units 1 and 2

    International Nuclear Information System (INIS)

    Carruth, R.C.; Sotos, W.G.

    1996-01-01

    As the nation's nuclear power plants age, the need to consider upgrading of their electronic protection and control systems becomes more urgent. Hardware obsolescence and mechanical wear out resulting from frequent calibration and surveillance play a major role in defining their useful life. At Cook Nuclear Plant, a decision was made to replace a major portion of the plant's protection and control systems with newer technology. This paper describes the engineering processes involved in this successful upgrade and explains the basis for many decisions made while performing the digital upgrade

  13. Performance Improvement of the Core Protection Calculator System (CPCS) by Introducing Optimal Function Sets

    International Nuclear Information System (INIS)

    Won, Byung Hee; Kim, Kyung O; Kim, Jong Kyung; Kim, Soon Young

    2012-01-01

    The Core Protection Calculator System (CPCS) is an automated device which is adopted to inspect the safety parameters such as Departure from Nuclear Boiling Ratio (DNBR) and Local Power Density (LPD) during normal operation. One function of the CPCS is to predict the axial power distributions using function sets in cubic spline method. Another function of that is to impose penalty when the estimated distribution by the spline method disagrees with embedded data in CPCS (i.e., over 8%). In conventional CPCS, restricted function sets are used to synthesize axial power shape, whereby it occasionally can draw a disagreement between synthesized data and the embedded data. For this reason, the study on improvement for power distributions synthesis in CPCS has been conducted in many countries. In this study, many function sets (more than 18,000 types) differing from the conventional ones were evaluated in each power shape. Matlab code was used for calculating/arranging the numerous cases of function sets. Their synthesis performance was also evaluated through error between conventional data and consequences calculated by new function sets

  14. Feasibility study for core protection calculator development

    International Nuclear Information System (INIS)

    In, W. K.; Han, J. B.

    2003-06-01

    This project confirmed the development feasibility of new digital core protection system and established development plan for ITOPS that can replace the CPC system. The development plan and implementation strategy for ITOPS proposed in this project will be useful to successfully develop advanced digital core protection system for the CPC replacement in KSNP plants. YGN units 3 and 4 are expected to replace the CPC system within next ten years and the other KSNP plants are followed. The localization model for advanced digital core protection system, ITOPS, is judged to upgrade the Common Q CPC system in both system configuration and algorithm performance and can reduce the cost for supply and maintenance. Hence, ITOPS is expected to be installed in new Korea nuclear power plants and also useful to export the associated technology in the future

  15. Data Content Protection for Virtual Libraries Heritage

    Directory of Open Access Journals (Sweden)

    Mihai DOINEA

    2016-01-01

    Full Text Available This paper presents aspects of digital content protection in virtual library systems. The legislation aspects are presented to better emphasize the need of new security mechanisms. Integrated library systems architecture is presented with focus on their main purpose, manipulating and rendering digital content to end-users. The cultural heritage stored in such systems is an important asset that needs to be protected against malicious manipulation. The characteristics of a smart virtual library, supported by an integrated library system, are analyzed and a security model is proposed for implementation, based on its particularities. The model aims to be an interface between the interactions of anonymous users with the Online Public Access Catalog of a virtual library that assures the protection of digital content. Conclusions are drawn to better support the idea of cultural persistence by the use of Information Systems.

  16. Power Trip Set-points of Reactor Protection System for New Research Reactor

    International Nuclear Information System (INIS)

    Lee, Byeonghee; Yang, Soohyung

    2013-01-01

    This paper deals with the trip set-point related to the reactor power considering the reactivity induced accident (RIA) of new research reactor. The possible scenarios of reactivity induced accidents were simulated and the effects of trip set-point on the critical heat flux ratio (CHFR) were calculated. The proper trip set-points which meet the acceptance criterion and guarantee sufficient margins from normal operation were then determined. The three different trip set-points related to the reactor power are determined based on the RIA of new research reactor during FP condition, over 0.1%FP and under 0.1%FP. Under various reactivity insertion rates, the CHFR are calculated and checked whether they meet the acceptance criterion. For RIA at FP condition, the acceptance criterion can be satisfied even if high power set-point is only used for reactor trip. Since the design of the reactor is still progressing and need a safety margin for possible design changes, 18 MW is recommended as a high power set-point. For RIA at 0.1%FP, high power setpoint of 18 MW and high log rate of 10%pp/s works well and acceptance criterion is satisfied. For under 0.1% FP operations, the application of high log rate is necessary for satisfying the acceptance criterion. Considering possible decrease of CHFR margin due to design changes, the high log rate is suggested to be 8%pp/s. Suggested trip set-points have been identified based on preliminary design data for new research reactor; therefore, these trip set-points will be re-established by considering design progress of the reactor. The reactor protection system (RPS) of new research reactor is designed for safe shutdown of the reactor and preventing the release of radioactive material to environment. The trip set point of RPS is essential for reactor safety, therefore should be determined to mitigate the consequences from accidents. At the same time, the trip set-point should secure margins from normal operational condition to avoid

  17. Technological problems connected with execution of the protection sheets for nuclear power sets WWER-1000

    International Nuclear Information System (INIS)

    Hajutin, J.G.; Kriczewskij, A.Z.

    1977-01-01

    The choice of the structure and the prestressing system of the R.C. protection sheet for nuclear power sets WWER-1000 is motivated. The technological problems arised during the execution stage, as well as the technological line producing the tendons to prestress the structure by up winding are presented. (author)

  18. Digitalization in a Mandatory Implementation Context : How digitalization is achieved in practice and the elements that affect it

    OpenAIRE

    Velsberg, Ott

    2016-01-01

    Healthcare around the world is facing strenuous times, whereby there is a need for reduced costs, improved efficiency, and effectiveness. Digitalization is a transformational phenomenon argued to solve the many problems of healthcare. As of such, this thesis studies digitalization in a healthcare setting - considering how digitalization is achieved in practice, and what elements hamper and enable sociotechnical changes required for digitalization. To study these aspects, a qualitative case st...

  19. Digital Natives, Digital Immigrants: An Analysis of Age and ICT Competency in Teacher Education

    Science.gov (United States)

    Guo, Ruth Xiaoqing; Dobson, Teresa; Petrina, Stephen

    2008-01-01

    This article examines the intersection of age and ICT (information and communication technology) competency and critiques the "digital natives versus digital immigrants" argument proposed by Prensky (2001a, 2001b). Quantitative analysis was applied to a statistical data set collected in the context of a study with over 2,000 pre-service…

  20. Column: The Science of Digital Forensics: Analysis of Digital Traces

    Directory of Open Access Journals (Sweden)

    Fred Cohen

    2012-09-01

    Full Text Available In part 1 of this series (Cohen, 2011a, Analysis of digital traces is a foundational process by which the examiner, typically using computer software tools, comes to understand and answer basic questions regarding digital traces.“Input sequences to digital systems produce outputs and state changes as a function of the previous state. To the extent that the state or outputs produce stored and/or captured bit sequences, these form traces of the event sequences that caused them. Thus the definition of a trace may be stated as: "A set of bit sequences produced from the execution of a finite state machine."(see PDF for full column

  1. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  2. Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics

    Directory of Open Access Journals (Sweden)

    Nana Rachmana Syambas

    2015-01-01

    Full Text Available In digital forensic investigations, the investigators take digital evidence from computers, laptops or other electronic goods. There are many complications when a suspect or related person does not want to cooperate or has removed digital evidence. A lot of research has been done with the goal of retrieving data from flash memory or other digital storage media from which the content has been deleted. Unfortunately, such methods cannot guarantee that all data will be recovered. Most data can only be recovered partially and sometimes not perfectly, so that some or all files cannot be opened. This paper proposes the development of a new method for the retrieval of digital evidence called the Two-Step Injection method (TSI. It focuses on the prevention of the loss of digital evidence through the deletion of data by suspects or other parties. The advantage of this method is that the system works in secret and can be combined with other digital evidence applications that already exist, so that the accuracy and completeness of the resulting digital evidence can be improved. An experiment to test the effectiveness of the method was set up. The developed TSI system worked properly and had a 100% success rate.

  3. Curve Digitizer – A software for multiple curves digitizing

    Directory of Open Access Journals (Sweden)

    Florentin ŞPERLEA

    2010-06-01

    Full Text Available The Curve Digitizer is software that extracts data from an image file representing a graphicand returns them as pairs of numbers which can then be used for further analysis and applications.Numbers can be read on a computer screen stored in files or copied on paper. The final result is adata set that can be used with other tools such as MSEXCEL. Curve Digitizer provides a useful toolfor any researcher or engineer interested in quantifying the data displayed graphically. The image filecan be obtained by scanning a document

  4. Smartphone adapters for digital photomicrography.

    Science.gov (United States)

    Roy, Somak; Pantanowitz, Liron; Amin, Milon; Seethala, Raja R; Ishtiaque, Ahmed; Yousem, Samuel A; Parwani, Anil V; Cucoranu, Ioan; Hartman, Douglas J

    2014-01-01

    Photomicrographs in Anatomic Pathology provide a means of quickly sharing information from a glass slide for consultation, education, documentation and publication. While static image acquisition historically involved the use of a permanently mounted camera unit on a microscope, such cameras may be expensive, need to be connected to a computer, and often require proprietary software to acquire and process images. Another novel approach for capturing digital microscopic images is to use smartphones coupled with the eyepiece of a microscope. Recently, several smartphone adapters have emerged that allow users to attach mobile phones to the microscope. The aim of this study was to test the utility of these various smartphone adapters. We surveyed the market for adapters to attach smartphones to the ocular lens of a conventional light microscope. Three adapters (Magnifi, Skylight and Snapzoom) were tested. We assessed the designs of these adapters and their effectiveness at acquiring static microscopic digital images. All adapters facilitated the acquisition of digital microscopic images with a smartphone. The optimal adapter was dependent on the type of phone used. The Magnifi adapters for iPhone were incompatible when using a protective case. The Snapzoom adapter was easiest to use with iPhones and other smartphones even with protective cases. Smartphone adapters are inexpensive and easy to use for acquiring digital microscopic images. However, they require some adjustment by the user in order to optimize focus and obtain good quality images. Smartphone microscope adapters provide an economically feasible method of acquiring and sharing digital pathology photomicrographs.

  5. Controlled sharing of personal content using digital rights management

    NARCIS (Netherlands)

    Conrado, C.; Petkovic, M.; Veen, van der M.; Velde, van der W.H.

    2006-01-01

    This paper describes a system which allows controlled distribution of personal digital content by users. The system extends an existing Digital Rights Management system for the protection of commercial copyrighted content by essentially allowing users to become content providers. This fact, however,

  6. Transcoding the digital : how metaphors matter in new media

    NARCIS (Netherlands)

    van den Boomen, M.V.T.

    2014-01-01

    This study traces the role of metaphors in digital praxis. Digital praxis refers to a more or less coherent set of everyday practices – acts, habits, routines – that involve the manipulation, modification, and construction of digital-symbolical objects. Examples of these digital-symbolical objects

  7. DIGITIZATION OF BUSINESS PROCESSES AND TECNOMATIX AS A COMPREHENSIVE PACKAGE INSTRUMENT FOR THE CREATION OF THE DIGITAL FACTORY

    Directory of Open Access Journals (Sweden)

    Marek Kliment

    2014-09-01

    Full Text Available Current trends in the development of a dynamic and turbulent world economy are largely digitization. Once upon the implementation and application of new production, made the setting and testing of variants directly to the production lines for their full operation. First production tested, set its standards and then began the production program. These procedures were but very costly and lengthy and on-going businesses big money and precious time. Gradual deployment of various software techniques, these processes are transferred into digital form. Technology has come to the point that all business and production processes nowadays we can make this into a digital form. In this way we manufacture everything in detail and test plan prior to the launch date line. Such technology is called Digital Factory.

  8. Susceptibility of modern relay protection: Will protection from cyber attacks help?

    Directory of Open Access Journals (Sweden)

    Gurevich Vladimir

    2014-01-01

    Full Text Available Modern trends in relay protection (RP based on the substitution of electromechanical protection relays (EMPR by digital protective relays (DPR have resulted in the emergence of an absolutely new problem, which was not known before. This problem is the possibility of an intentional remote destructive impact (IRDI on relay protection in order to put it out of action or make it perform functions that have nothing to do with the current operational mode of protected electric equipment. Traditional and well-known methods ensuring information safety cannot fully prevent unauthorized actions of RP. The article describes a new way for the problem solution.

  9. Digital random-number generator

    Science.gov (United States)

    Brocker, D. H.

    1973-01-01

    For binary digit array of N bits, use N noise sources to feed N nonlinear operators; each flip-flop in digit array is set by nonlinear operator to reflect whether amplitude of generator which feeds it is above or below mean value of generated noise. Fixed-point uniform distribution random number generation method can also be used to generate random numbers with other than uniform distribution.

  10. US EPA Digital Science: An Evolution

    Science.gov (United States)

    Ziegler, C. R.; Burch, K.; Laniak, G.; Vega, A.; Harten, P.; Kremer, J.; Brookes, A.; Yuen, A.; Subramanian, B.

    2015-12-01

    The United States Environmental Protection Agency's (US EPA) digital science "enterprise" plays a critical role in US EPA's efforts to achieve its mission to protect human health and the environment. This enterprise is an evolving cross-disciplinary research and development construct, with social and institutional dimensions. It has an active development community and produces a portfolio of digital science products including decision support tools, data repositories, Web interfaces, and more. Earth sciences and sustainable development organizations from around the world - including US government agencies - have achieved various levels of success in taking advantage of the rapidly-evolving digital age. Efficiency, transparency and ability to innovate are tied to an organization's digital maturity and related social characteristics. Concepts like participatory web, data and software interoperability, global technology transfer, ontological harmonization, big data, scaling, re-use and open science are no longer "new and emerging." They have emerged and - in some cases - are tied to US government directives. We assess maturity, describe future scenarios, discuss new initiatives and outline steps for better leveraging the information age to more effectively and efficiently achieve US EPA's mission. The views expressed herein are those of the authors and do not necessarily reflect the views or policies of the organizations for which they work and/or represent.

  11. Algorithms evaluation for transformers differential protection; Avaliacao de algoritmos para protecao diferencial de transformadores

    Energy Technology Data Exchange (ETDEWEB)

    Piovesan, Luis Sergio

    1997-07-01

    The appliance of two algorithms is evaluated, one based in Fourier analysis and other based in a rectangular transform technique over Fourier analysis, to be used in digital logical circuits (digital protection relays) for the purpose of differential protection of power transformers (ANSI 87T). The first chapter has a brief introduction about electrical protection. The second chapter discusses the general problems of transform protection, the development of digital technology and, with more detail, the differential protection associated to this technology. In this chapter are presented the particular aspects of transformers differential protection concerning sensibility, inrush current situations and harmonic distortions caused by transformer core saturations and the differential protection algorithms and their applications in a specific relay design. In chapter three, a method to make possible testing the protection performance is developed. This work applies digital simulations using EMTP to generate current signal of transformer operation and fault conditions. Digital simulation using Matlab is used to simulate the protection. The EMTP generated field signals are sent to the relay under test, furnishing data of normal operation, internal and external faults. The relay logic simulator at Matlab will work this data and so, it will be possible to verify and evaluate the algorithm behavior and performance. Chapter 4 shows the protection operation over simulations of several of transformer operation and fault conditions. The last chapter presents a conclusion about the protection performance, discussions about all the methods applied in this work and suggestions for further studies. (author)

  12. Validation of reactor core protection system

    International Nuclear Information System (INIS)

    Lee, Sang-Hoon; Bae, Jong-Sik; Baeg, Seung-Yeob; Cho, Chang-Ho; Kim, Chang-Ho; Kim, Sung-Ho; Kim, Hang-Bae; In, Wang-Kee; Park, Young-Ho

    2008-01-01

    Reactor COre Protection System (RCOPS), an advanced core protection calculator system, is a digitized one which provides core protection function based on two reactor core operation parameters, Departure from Nucleate Boiling Ratio (DNBR) and Local Power Density (LPD). It generates a reactor trip signal when the core condition exceeds the DNBR or LPD design limit. It consists of four independent channels adapted a two-out-of-four trip logic. System configuration, hardware platform and an improved algorithm of the newly designed core protection calculator system are described in this paper. One channel of RCOPS was implemented as a single channel facility for this R and D project where we performed final integration software testing. To implement custom function blocks, pSET is used. Software test is performed by two methods. The first method is a 'Software Module Test' and the second method is a 'Software Unit Test'. New features include improvement of core thermal margin through a revised on-line DNBR algorithm, resolution of the latching problem of control element assembly signal and addition of the pre-trip alarm generation. The change of the on-line DNBR calculation algorithm is considered to improve the DNBR net margin by 2.5%-3.3%. (author)

  13. Voltage protection scheme for MG sets used to drive inductive energy storage systems

    International Nuclear Information System (INIS)

    Campen, G.L.; Easter, R.B.

    1977-01-01

    A recent tokamak proposal at ORNL called for MG (motor-generator) sets to drive the ohmic heating (OH] coil, which was to be subjected to 20 kV immediately after coil charge-up to initiate the experiment. Since most rotating machinery is inherently low voltage, including the machines available at ORNL, a mechanism was necessary to isolate the generators from the high voltage portions of the circuit before the appearance of this voltage. It is not the expected 20 kV at the coil that causes difficulty, because the main interrupting switch handles this. The voltage induced in the armature due to di/dt and the possibility of faults are the greatest causes for concern and are responsible for the complexity of the voltage protection scheme, which must accommodate any possible combination of fault time and location. Such a protection scheme is presented in this paper

  14. License protection with a tamper-resistant token

    NARCIS (Netherlands)

    Chong, C.N.; Ren, Bin; Doumen, J.M.; Etalle, Sandro; Hartel, Pieter H.; Corin, R.J.; Lim, Chae Hoon; Yung, Moti

    Content protection mechanisms are intended to enforce the usage rights on the content. These usage rights are carried by a license. Sometimes, a license even carries the key that is used to unlock the protected content. Unfortunately, license protection is difficult, yet it is important for digital

  15. Competition and Consumer Behavior in the Context of the Digital Economy

    Directory of Open Access Journals (Sweden)

    Elena-Mădălina Vătămănescu

    2017-05-01

    Full Text Available The current paper aims to investigate the relation between competition and online purchasing decision-making, integrating consumer protection awareness and the corresponding consumer behavior as mediators. The focus is on both subjective and objective measures related to the level of consumer awareness and action in a fast-growing competition, potentiated by the digital economy. In order to investigate the relations between the aforementioned concepts, a questionnaire-based survey was conducted, using a sample of 257 students from three top Romanian universities. Based upon the theoretical directions presented in the literature review, a conceptual model was elaborated and tested by employing a partial least squares structural equation modeling technique. As the examination of the structural model indicated, online purchasing decision-making is indirectly influenced by the high competition in the digital economy, by means of consumer protection awareness and consumer protection behavior. At this level, the analyzed factors, namely the competition in the digital economy, the consumer protection awareness and the consumer behavior with respect to the consumer protection policies, explain over 16% in the variance of the online purchasing decision-making.

  16. Frequencies of digits, divergence points, and Schmidt games

    International Nuclear Information System (INIS)

    Olsen, L.

    2009-01-01

    Sets of divergence points, i.e. numbers x (or tuples of numbers) for which the limiting frequency of a given string of N-adic digits of x fails to exist, have recently attracted huge interest in the literature. In this paper we consider sets of simultaneous divergence points, i.e. numbers x (or tuples of numbers) for which the limiting frequencies of all strings of N-adic digits of x fail to exist. We show that many natural sets of simultaneous divergence points are (α, β)-wining sets in the sense of the Schmidt game. As an application we obtain lower bounds for the Hausdorff dimension of these sets.

  17. Using digital photography in a clinical setting: a valid, accurate, and applicable method to assess food intake.

    Science.gov (United States)

    Winzer, Eva; Luger, Maria; Schindler, Karin

    2018-06-01

    Regular monitoring of food intake is hardly integrated in clinical routine. Therefore, the aim was to examine the validity, accuracy, and applicability of an appropriate and also quick and easy-to-use tool for recording food intake in a clinical setting. Two digital photography methods, the postMeal method with a picture after the meal, the pre-postMeal method with a picture before and after the meal, and the visual estimation method (plate diagram; PD) were compared against the reference method (weighed food records; WFR). A total of 420 dishes from lunch (7 weeks) were estimated with both photography methods and the visual method. Validity, applicability, accuracy, and precision of the estimation methods, and additionally food waste, macronutrient composition, and energy content were examined. Tests of validity revealed stronger correlations for photography methods (postMeal: r = 0.971, p < 0.001; pre-postMeal: r = 0.995, p < 0.001) compared to the visual estimation method (r = 0.810; p < 0.001). The pre-postMeal method showed smaller variability (bias < 1 g) and also smaller overestimation and underestimation. This method accurately and precisely estimated portion sizes in all food items. Furthermore, the total food waste was 22% for lunch over the study period. The highest food waste was observed in salads and the lowest in desserts. The pre-postMeal digital photography method is valid, accurate, and applicable in monitoring food intake in clinical setting, which enables a quantitative and qualitative dietary assessment. Thus, nutritional care might be initiated earlier. This method might be also advantageous for quantitative and qualitative evaluation of food waste, with a resultantly reduction in costs.

  18. Cyber Threat and vulnerability Analysis for Digital Assets of NPPs

    International Nuclear Information System (INIS)

    Oh, Eun Se; Seo, In Yong; Kim, See Hong

    2009-01-01

    Today's computer and communication technology breakthrough make increase plant floor replacement from analog instrumentation and control systems of nuclear power plants to a full-fledged digital system . The rich functionality and crisp accuracy are one of big advantages of digital technology adaptation, but use of open networks and inherited shared system resources (memory, network, etc.) are well known weak points of digital system. Intended or un-intended cyber attack throughout power plant digital control system's weak point may result to wide area of system failures and that easily defeats system operation and multiple protection safeguards. Well organized cyber security analysis for nuclear plant digital control systems (digital assets) are required

  19. An Open-Source Tool Set Enabling Analog-Digital-Software Co-Design

    Directory of Open Access Journals (Sweden)

    Michelle Collins

    2016-02-01

    Full Text Available This paper presents an analog-digital hardware-software co-design environment for simulating and programming reconfigurable systems. The tool simulates, designs, as well as enables experimental measurements after compiling to configurable systems in the same integrated design tool framework. High level software in Scilab/Xcos (open-source programs similar to MATLAB/Simulink that converts the high-level block description by the user to blif format (sci2blif, which acts as an input to the modified VPR tool, including the code v p r 2 s w c s , encoding the specific platform through specific architecture files, resulting in a targetable switch list on the resulting configurable analog–digital system. The resulting tool uses an analog and mixed-signal library of components, enabling users and future researchers access to the basic analog operations/computations that are possible.

  20. Digital media labs in libraries

    CERN Document Server

    Goodman, Amanda L

    2014-01-01

    Families share stories with each other and veterans reconnect with their comrades, while teens edit music videos and then upload them to the web: all this and more can happen in the digital media lab (DML), a gathering of equipment with which people create digital content or convert content that is in analog formats. Enabling community members to create digital content was identified by The Edge Initiative, a national coalition of leading library and local government organizations, as a library technology benchmark. Surveying academic and public libraries in a variety of settings and sharing a

  1. Cost Model for Digital Preservation: Cost of Digital Migration

    Directory of Open Access Journals (Sweden)

    Ulla Bøgvad Kejser

    2011-03-01

    Full Text Available The Danish Ministry of Culture has funded a project to set up a model for costing preservation of digital materials held by national cultural heritage institutions. The overall objective of the project was to increase cost effectiveness of digital preservation activities and to provide a basis for comparing and estimating future cost requirements for digital preservation. In this study we describe an activity-based costing methodology for digital preservation based on the Open Archice Information System (OAIS Reference Model. Within this framework, which we denote the Cost Model for Digital Preservation (CMDP, the focus is on costing the functional entity Preservation Planning from the OAIS and digital migration activities. In order to estimate these costs we have identified cost-critical activities by analysing the functions in the OAIS model and the flows between them. The analysis has been supplemented with findings from the literature, and our own knowledge and experience. The identified cost-critical activities have subsequently been deconstructed into measurable components, cost dependencies have been examined, and the resulting equations expressed in a spreadsheet. Currently the model can calculate the cost of different migration scenarios for a series of preservation formats for text, images, sound, video, geodata, and spreadsheets. In order to verify the model it has been tested on cost data from two different migration projects at the Danish National Archives (DNA. The study found that the OAIS model provides a sound overall framework for the cost breakdown, but that some functions need additional detailing in order to cost activities accurately. Running the two sets of empirical data showed among other things that the model underestimates the cost of manpower-intensive migration projects, while it reinstates an often underestimated cost, which is the cost of developing migration software. The model has proven useful for estimating the

  2. Digital Kildebeskyttelse. Udfordringer. Idealer. Dilemmaer.

    OpenAIRE

    Eggers, Camilla Høj

    2015-01-01

    In journalism, the challenges concerning the protection of confidential sources have grown alongside the increase in surveillance. Almost every individual lays out a digital track by using a cell phone, browsing the Internet and sending e-mails, and this track can be used to hunt down and expose sources. Through qualitative interviews with a focus on everyday practices this thesis examines how ten investigative journalists from five of the largest national media outlets attempt to protect the...

  3. Demonstrating DREAM: A Digital Resource Exchange about Music

    Science.gov (United States)

    Upitis, Rena; Boese, Karen; Abrami, Philip C.

    2015-01-01

    The Digital Resource Exchange About Music (DREAM) is an online tool for exchanging information about digital learning tools for music education. DREAM was designed by our team to encourage music teachers to learn about digital resources related to learning to play a musical instrument, both in classroom and independent music studio settings. In…

  4. Equipment line-up developed for structuring programmed digital systems important to safety

    International Nuclear Information System (INIS)

    Remus, L.; Colling, J.M.; Buisson, J.

    1986-01-01

    The use of the programmed digital techniques in systems important to safety led to developing equipment line-ups which allow to procedure, through using a restricted number of sub-assemblies, a variety of facilities capable of performing diversified functions. Upon remembering the requirements that such equipment are required to meet (quality assurance both at the design and production stages, qualification, testing opportunities, etc.) the equipments produced by MERLIN GERIN are described in this paper. Such equipments include a whole set of printed circuit boards, plug-in units with self-engaging connectors and the related cabinets to accomodate them. The following systems are made up of such equipments: Digital integrated protection system; Rod control and monitoring system; Reactor power distribution monitoring equipment. This equipment line-up has been gradually complemented and is still further expanding both as a result of the component further development or for the purpose of meeting new requirements or applications (new digital neutron instrumentation, local area networks). Experience gained thus far provides us with the capability of working out in a short time programmed systems for further applications in the nuclear power field

  5. Synthesis of Axial Power Distribution Using 5-Level Ex-core Detector in a Core Protection System

    International Nuclear Information System (INIS)

    Koo, Bon-Seung; Lee, Chung-Chan; Zee, Sung-Quun

    2007-01-01

    In ABB-CE digital plants, Core Protection Calculator System (CPCS) is used for a core protection based on several online measured system parameters including 3- level safety grade ex-core detector signals. The CPCS provides four independent channels for the departure from a nucleate boiling ratio (DNBR) and local power density (LPD) trip signals to the reactor protection system. Each channel consists of a core protection calculator (CPC) and a control element assembly calculator (CEAC). The cubic spline synthesis technique has been used in online calculations of the core axial power distributions using 3-level ex-core detector signals in CPC. The pre-determined cubic spline function sets are used depending on the characteristics of the ex-core detector responses. But this method shows large power distribution errors for the extremely skewed axial shapes due to restrictive function sets and an incorrect SAM value. Especially thus situation is worse at a higher burnup. To solve these problems, the cubic spline function sets are improved and it is demonstrated that the axial power shapes can be synthesized more accurately with the new function sets than those of a conventional CPC. In this paper, synthesis of an axial power distribution using a 5-level ex-core detector is described and the axial power distributions are compared between 3-level and 5-level ex-core detector systems

  6. Agenda digital: e-Servicios sociales

    Directory of Open Access Journals (Sweden)

    M. Pilar Munuera Gomez

    2016-12-01

    Full Text Available Se presentan las líneas marcadas por la Agenda Digital Europea que pueden incorporarse en el sistema público de servicios sociales a través de la utilización de las Tecnologías de la Información y las Comunicaciones (TIC. Los objetivos marcados en sus planes pretenden mejorar las relaciones de los ciudadanos con las diferentes administraciones públicas. Los sistemas de protección social (seguridad social, educación, sanidad y empleo han iniciado este proceso alcanzado grandes mejoras en la atención de las necesidades de los ciudadanos. En España existen experiencias aisladas que pueden ser tomadas como referentes en la utilización de las nuevas tecnologías para mejorar el bienestar social desde la implementación de la atención que reciben los ciudadanos. Las TIC están transformado los sistemas de producción creando un mundo más globalizado sin fronteras, e incluso pueden facilitar la inclusión social de las personas a través del acceso a la información, la educación, el empleo, etc., y especialmente de las personas con discapacidad o situación de dependencia tanto a nivel nacional como internacional. Digital agenda: e-Social services The guidelines set by the European Digital Agenda that can be incorporated into the public social services system through the use of Information and Communication Technology (TIC are presented. The objectives set in their plans intend to improve relations between citizens and the different public administrations. The social protection systems (social security, education, health and employment have started this process making great improvements in care of the citizens needs. In Spain there are isolated experiences that can be taken as reference in the use of new technologies to improve social welfare with the implementation of care received by citizens. The TIC are transforming production systems creating a more globalized world without borders, and may even facilitate the social integration of

  7. Quality assurance in digital dental imaging: a systematic review.

    Science.gov (United States)

    Metsälä, Eija; Henner, Anja; Ekholm, Marja

    2014-07-01

    Doses induced by individual dental examinations are low. However, dental radiography accounts for nearly one third of the total number of radiological examinations in the European Union. Therefore, special attention is needed with regard to radiation protection. In order to lower patient doses, the staff performing dental examinations must have competence in imaging as well as in radiation protection issues. This paper presents a systematic review about the core competencies needed by the healthcare staff in performing digital dental radiological imaging quality assurance. The following databases were searched: Pubmed, Cinahl, Pro Quest and IEEXplore digital library. Also volumes of some dental imaging journals and doctoral theses of the Finnish universities educating dentists were searched. The search was performed using both MeSH terms and keywords using the option 'search all text'. The original keywords were: dental imaging, digital, x-ray, panoramic, quality, assurance, competence, competency, skills, knowledge, radiographer, radiologist technician, dentist, oral hygienist, radiation protection and their Finnish synonyms. Core competencies needed by the healthcare staff performing digital dental radiological imaging quality assurance described in the selected studies were: management of dental imaging equipment, competence in image quality and factors associated with it, dose optimization and quality assurance. In the future there will be higher doses in dental imaging due to increasing use of CBCT and digital imaging. The staff performing dental imaging must have competence in dental imaging quality assurance issues found in this review. They also have to practice ethical radiation safety culture in clinical practice.

  8. Radial basis function networks applied to DNBR calculation in digital core protection systems

    International Nuclear Information System (INIS)

    Lee, Gyu-Cheon; Heung Chang, Soon

    2003-01-01

    The nuclear power plant has to be operated with sufficient margin from the specified DNBR limit for assuring its safety. The digital core protection system calculates on-line real-time DNBR by using a complex subchannel analysis program, and triggers a reliable reactor shutdown if the calculated DNBR approaches the specified limit. However, it takes a relatively long calculation time even for a steady state condition, which may have an adverse effect on the operation flexibility. To overcome the drawback, a new method using a radial basis function network is presented in this paper. Nonparametric training approach is utilized, which shows dramatic reduction of the training time, no tedious heuristic process for optimizing parameters, and no local minima problem during the training. The test results show that the predicted DNBR is within about ±2% deviation from the target DNBR for the fixed axial flux shape case. For the variable axial flux case including severely skewed shapes that appeared during accidents, the deviation is within about ±10%. The suggested method could be the alternative that can calculate DNBR very quickly while guaranteeing the plant safety

  9. Assessment of core protection and monitoring systems for an advanced reactor SMART

    International Nuclear Information System (INIS)

    In, Wang Kee; Hwang, Dae Hyun; Yoo, Yeon Jong; Zee, Sung Qunn

    2002-01-01

    Analogue and digital core protection/monitoring systems were assessed for the implementation in an advanced reactor. The core thermal margins to nuclear fuel design limits (departure from nucleate boiling and fuel centerline melting) were estimated using the design data for a commercial pressurized water reactor and an advanced reactor. The digital protection system resulted in a greater power margin to the fuel centerline melting by at least 30% of rated power for both commercial and advanced reactors. The DNB margin with the digital system is also higher than that for the analogue system by 8 and 12.1% of rated power for commercial and advanced reactors, respectively. The margin gain with the digital system is largely due to the on-line calculations of DNB ratio and peak local power density from the live sensor signals. The digital core protection and monitoring systems are, therefore, believed to be more appropriate for the advanced reactor

  10. Video copy protection and detection framework (VPD) for e-learning systems

    Science.gov (United States)

    ZandI, Babak; Doustarmoghaddam, Danial; Pour, Mahsa R.

    2013-03-01

    This Article reviews and compares the copyright issues related to the digital video files, which can be categorized as contended based and Digital watermarking copy Detection. Then we describe how to protect a digital video by using a special Video data hiding method and algorithm. We also discuss how to detect the copy right of the file, Based on expounding Direction of the technology of the video copy detection, and Combining with the own research results, brings forward a new video protection and copy detection approach in terms of plagiarism and e-learning systems using the video data hiding technology. Finally we introduce a framework for Video protection and detection in e-learning systems (VPD Framework).

  11. General digitalized system on nuclear power plants

    International Nuclear Information System (INIS)

    Akagi, Katsumi; Kadohara, Hozumi; Taniguchi, Manabu

    2000-01-01

    Hitherto, instrumentation control system in a PWR nuclear power plant has stepwisely adopted digital technology such as application of digital instrumentation control device to ordinary use (primary/secondary system control device, and so on), application of CRT display system to monitoring function, and so forth, to realize load reduction of an operator due to expansion of operation automation range, upgrading of reliability and maintenance due to self-diagnosis function, reduction of mass in cables due to multiple transfer, and upgrading of visual recognition due to information integration. In next term PWR plant instrumentation control system, under consideration of application practice of conventional digital technology, application of general digitalisation system to adopt digitalisation of overall instrumentation control system containing safety protection system, and central instrumentation system (new type of instrumentation system) and to intend to further upgrade economics, maintenance, operability/monitoring under security of reliability/safety is planned. And, together with embodiment of construction program of the next-term plant, verification at the general digitalisation proto-system aiming at establishment of basic technology on the system is carried out. Then, here was described on abstract of the general digitalisation system and characteristics of a digital type safety protection apparatus to be adopted in the next-term plant. (G.K.)

  12. Fast parallel-series analog-to-digital converter

    International Nuclear Information System (INIS)

    Pogosov, A.Yu.

    1987-01-01

    Fast analog-to-digital converters are used in systems for detection of rapid processes, nuclear spectroscopy. A 12-digit analog-to-digital converter with conversion time of 160 ns and conversion frequency of 8.3 MHz is described; a segmented digital-to-analog converter with differential non-linearity of < 0.01% and a differential amplifier-limiter with setting time of 80 ns at the error of 0.2% are utilized in the converter; a control device is based on the chain of flip-flop circuit

  13. The Apparatus of Digital Archaeology

    Directory of Open Access Journals (Sweden)

    Jeremy Huggett

    2017-06-01

    Full Text Available Digital Archaeology is predicated upon an ever-changing set of apparatuses – technological, methodological, software, hardware, material, immaterial – which in their own ways and to varying degrees shape the nature of Digital Archaeology. Our attention, however, is perhaps inevitably more closely focused on research questions, choice of data, and the kinds of analyses and outputs. In the process we tend to overlook the effects the tools themselves have on the archaeology we do beyond the immediate consequences of the digital. This article introduces cognitive artefacts as a means of addressing the apparatus more directly within the context of the developing archaeological digital ecosystem. It argues that a critical appreciation of our computational cognitive artefacts is key to understanding their effects on both our own cognition and on the creation of archaeological knowledge. In the process, it defines a form of cognitive digital archaeology in terms of four distinct methods for extracting cognition from the digital apparatus layer by layer.

  14. Reactor protection systems of 500 MWe PHWRs

    Energy Technology Data Exchange (ETDEWEB)

    Mallik, G; Kelkar, M G; Apte, Ravindra [C and I Group, Nuclear Power Corporation, Mumbai (India)

    1997-03-01

    The 500 MWe PHWR has two totally independent, diverse, fast acting shutdown system called Shutdown System 1 (SDS 1) and Shutdown System 2 (SDS 2). The trip generation circuitry of SDS 1 and SDS 2 are known as Reactor Protection System 1 (RPS 1) and Reactor Protection System 2 (RPS 2) respectively. Some of the features specific to 500 MWe reactors are Core Over Power Protection System (COPPS) based upon in core Self Powered Neutron Detector (SPND) signals, use of local two out of three coincidence logic and adoption of overlap testing for RPS 2, use of Fine Impulse Testing (FIT) in RPS 2, testing of the final control elements namely electro-magnetic clutch of individual Shutoff Rods (SRs) of SDS 1 and all the fast acting valves of SDS 2, etc. The two shutdown systems have totally separate sets of sensors and associated signal processing circuitry as well as physical arrangements. A separate computerised test and monitoring unit is used for each of the two shutdown systems. Use of Programmable Digital Comparator (PDC) unit exclusively for reactor protection systems, has been adopted. The capability of PDC unit is enhanced and communication links are provided for its integration in over all system. The paper describes the design features of reactor protection systems. (author). 3 refs., 7 figs., 3 tabs.

  15. Reliability Quantification Method for Safety Critical Software Based on a Finite Test Set

    International Nuclear Information System (INIS)

    Shin, Sung Min; Kim, Hee Eun; Kang, Hyun Gook; Lee, Seung Jun

    2014-01-01

    Software inside of digitalized system have very important role because it may cause irreversible consequence and affect the whole system as common cause failure. However, test-based reliability quantification method for some safety critical software has limitations caused by difficulties in developing input sets as a form of trajectory which is series of successive values of variables. To address these limitations, this study proposed another method which conduct the test using combination of single values of variables. To substitute the trajectory form of input using combination of variables, the possible range of each variable should be identified. For this purpose, assigned range of each variable, logical relations between variables, plant dynamics under certain situation, and characteristics of obtaining information of digital device are considered. A feasibility of the proposed method was confirmed through an application to the Reactor Protection System (RPS) software trip logic

  16. Emergent Principles for Digital Documentary

    Directory of Open Access Journals (Sweden)

    Richard Lachman

    2016-12-01

    Full Text Available Digital Documentaries are an area of rapid invention and experimentation at all levels, including creative content, production techniques, and business models.  As with many forms of digital storytelling, a focus on technologies can be distracting; platforms change rapidly, and are dependent on external commercial forces rather than creative potential.  This article presents several design strategies for driving experimentation in digital documentary above and beyond the specific of platform and technology. The core focus is on treating digital docs as experiences, with an expanded range of designable moments, as well as a strategic approach to designing interactions for their unique set of challenges.  The discussion is not intended to fully define digital documentary design factors, but rather, defines a useful subset of methods that can lead emerging practitioners to new innovations in their approach.

  17. Could digital imaging be an alternative for digital colorimeters?

    Science.gov (United States)

    Caglar, Alper; Yamanel, Kivanc; Gulsahi, Kamran; Bagis, Bora; Ozcan, Mutlu

    2010-12-01

    This study evaluated the colour parameters of composite and ceramic shade guides determined using a colorimeter and digital imaging method with illuminants at different colour temperatures. Two different resin composite shade guides, namely Charisma (Heraeus Kulzer) and Premise (Kerr Corporation), and two different ceramic shade guides, Vita Lumin Vacuum (VITA Zahnfabrik) and Noritake (Noritake Co.), were evaluated at three different colour temperatures (2,700 K, 2,700-6,500 K, and 6500 K) of illuminants. Ten shade tabs were selected (A1, A2, A3, A3,5, A4, B1, B2, B3, C2 and C3) from each shade guide. CIE Lab values were obtained using digital imaging and a colorimeter (ShadeEye NCC Dental Chroma Meter, Shofu Inc.). The data were analysed using two-way ANOVA, and Pearson's correlation. While mean L* values of both composite and ceramic shade guides were not affected from the colour temperature, L* values obtained with the colorimeter showed significantly lower values than those of the digital imaging (p colorimeter and digital imaging did not show significant differences (p > 0.05). For both composite and ceramic shade guides, L* and b* values obtained from colorimeter and digital imaging method presented a high level of correlation. High-level correlations were also acquired for a* values in all shade guides except for the Charisma composite shade guide. Digital imaging method could be an alternative for the colorimeters unless the proper object-camera distance, digital camera settings and suitable illumination conditions could be supplied. However, variations in shade guides, especially for composites, may affect the correlation.

  18. Formal verification and validation of the safety-critical software in a digital reactor protection system

    International Nuclear Information System (INIS)

    Kwon, K. C.; Park, G. Y.

    2006-01-01

    This paper describes the Verification and Validation (V and V) activities for the safety-critical software in a Digital Reactor Protection System (DRPS) that is being developed through the Korea nuclear instrumentation and control system project. The main activities of the DRPS V and V process are a preparation of the software planning documentation, a verification of the software according to the software life cycle, a software safety analysis and a software configuration management. The verification works for the Software Requirement Specification (SRS) of the DRPS consist of a technical evaluation, a licensing suitability evaluation, a inspection and traceability analysis, a formal verification, and preparing a test plan and procedure. Especially, the SRS is specified by the formal specification method in the development phase, and the formal SRS is verified by a formal verification method. Through these activities, we believe we can achieve the functionality, performance, reliability, and safety that are the major V and V objectives of the nuclear safety-critical software in a DRPS. (authors)

  19. Self-checking in a logic protection system using a redundant computer structure

    International Nuclear Information System (INIS)

    Darier, P.; Lallement, D.

    1978-01-01

    The logic protection system described has a parallel and redundant computer structure. Each assembly consists of an analog and digital acquisition module, a processing unit and a simple and reliable logical decision device adapted to the redundancy of the system (two-out-of-three or two-out-of-four). Each processing unit monitors all the detection units, processes the values received and works out the corresponding decisions. The decisions are collated in the final stage in a majority decision element which sets the protective action in motion. At all levels the quality of data transmission and validity of processing are tested in order that the best strategy may be applied in the event of damage to the system. Several self-checking techniques were used: they include a set of electronic test modules connected to the processing unit, on-line system testing and control software and time control devices which provide a final verification of the overall operation of the system. Self-checking and test operations are performed regularly throughout surveillance cycles. Problems of fault detection and of protection against the effects of faults are examined from the aspect of hardware and software. (author)

  20. Testing Digital Electronic Protection Systems

    CERN Document Server

    Gabourin, S

    2011-01-01

    This paper outlines the core concepts and realisation of the Safe Machine Parameters Controller (SMPC) testbench, based on a VME crate and LabVIEW program. Its main goal is to ensure the correct function of the SMPC for the protection of the CERN accelerator complex. To achieve this, the tester has been built to replicate the machine environment and operation, in order to ensure that the chassis under test is completely exercised. The complexity of the task increases with the number of input combinations. This paper also outlines the benefits and weaknesses of developing a test suite independently of the hardware being tested, using the “V” approach.

  1. A study of digital hardware architectures for nuclear reactors protection systems applications - reliability and safety analysis methods; Um estudo de arquiteturas de hardware para aplicacao em sistemas digitais de protecao de reatores nucleares - metodos de analise de confiabilidade e seguranca

    Energy Technology Data Exchange (ETDEWEB)

    Benko, Pedro Luiz

    1997-07-01

    A study of digital hardware architectures, including experience in many countries, topologies and solutions to interface circuits for protection systems of nuclear reactors is presented. Methods for developing digital systems architectures based on fault tolerant and safety requirements is proposed. Directives for assessing such conditions are suggested. Techniques and the most common tools employed in reliability, safety evaluation and modeling of hardware architectures is also presented. Markov chain modeling is used to evaluate the reliability of redundant architectures. In order to estimate software quality, several mechanisms to be used in design, specification, and validation and verification (V and V) procedures are suggested. A digital protection system architecture has been analyzed as a case study. (author)

  2. Student perceptions of digital versus traditional slide use in undergraduate education.

    Science.gov (United States)

    Solberg, Brooke L

    2012-01-01

    Digitized slides provide a number of intriguing benefits for educators. Before their implementation, however, educators should consider student opinion related to their use. This mixed-methods study directly compared Medical Laboratory Science (MLS) student perceptions of learning experiences in both digital and traditional slide laboratory settings. Results suggested that the majority of students preferred learning with digital slides, and numerous reasons for this preference were identified. Survey responses indicated that students using digital slides tended to view their performances, instructor feedback, and their learning environment more positively than students using traditional slides. Apprehensions about digital slide use were also detected from students preferring traditional slides. These findings provide a guide on how best to exploit both digital and traditional slides in an educational setting.

  3. Software Unit Testing during the Development of Digital Reactor Protection System of HTR-PM

    International Nuclear Information System (INIS)

    Guo Chao; Xiong Huasheng; Li Duo; Zhou Shuqiao; Li Jianghai

    2014-01-01

    Reactor Protection System (RPS) of High Temperature Gas-Cooled Reactor - Pebble bed Module (HTR-PM) is the first digital RPS designed and to be operated in the Nuclear Power Plant (NPP) of China, and its development process has receives a lot of concerns around the world. As a 1E-level safety system, the RPS has to be designed and developed following a series of nuclear laws and technical disciplines including software verification and validation (software V&V). Software V&V process demonstrates whether all stages during the software development are performed correctly, completely, accurately, and consistently, and the results of each stage are testable. Software testing is one of the most significant and time-consuming effort during software V&V. In this paper, we give a comprehensive introduction to the software unit testing during the development of RPS in HTR-PM. We first introduce the objective of the testing for our project in the aspects of static testing, black-box testing, and white-box testing. Then the testing techniques, including static testing and dynamic testing, are explained, and the testing strategy we employed is also introduced. We then introduce the principles of three kinds of coverage criteria we used including statement coverage, branch coverage, and the modified condition/decision coverage. As a 1E-level safety software, testing coverage needs to be up to 100% mandatorily. Then we talk the details of safety software testing during software development in HTR-PM, including the organization, methods and tools, testing stages, and testing report. The test result and experiences are shared and finally we draw a conclusion for the unit testing process. The introduction of this paper can contribute to improve the process of unit testing and software development for other digital instrumentation and control systems in NPPs. (author)

  4. Cyber Threat and vulnerability Analysis for Digital Assets of NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Eun Se; Seo, In Yong [Korea Electric Power research Institute, Daejeon (Korea, Republic of); Kim, See Hong [Korea Hydro and Nuclear Power Co., Seoul (Korea, Republic of)

    2009-10-15

    Today's computer and communication technology breakthrough make increase plant floor replacement from analog instrumentation and control systems of nuclear power plants to a full-fledged digital system . The rich functionality and crisp accuracy are one of big advantages of digital technology adaptation, but use of open networks and inherited shared system resources (memory, network, etc.) are well known weak points of digital system. Intended or un-intended cyber attack throughout power plant digital control system's weak point may result to wide area of system failures and that easily defeats system operation and multiple protection safeguards. Well organized cyber security analysis for nuclear plant digital control systems (digital assets) are required.

  5. Digital Modeling Phenomenon Of Surface Ground Movement

    Directory of Open Access Journals (Sweden)

    Ioan Voina

    2016-11-01

    Full Text Available With the development of specialized software applications it was possible to approach and resolve complex problems concerning automating and process optimization for which are being used field data. Computerized representation of the shape and dimensions of the Earth requires a detailed mathematical modeling, known as "digital terrain model". The paper aims to present the digital terrain model of Vulcan mining, Hunedoara County, Romania. Modeling consists of a set of mathematical equations that define in detail the surface of Earth and has an approximate surface rigorously and mathematical, that calculated the land area. Therefore, the digital terrain model means a digital representation of the earth's surface through a mathematical model that approximates the land surface modeling, which can be used in various civil and industrial applications in. To achieve the digital terrain model of data recorded using linear and nonlinear interpolation method based on point survey which highlights the natural surface studied. Given the complexity of this work it is absolutely necessary to know in detail of all topographic elements of work area, without the actions to be undertaken to project and manipulate would not be possible. To achieve digital terrain model, within a specialized software were set appropriate parameters required to achieve this case study. After performing all steps we obtained digital terrain model of Vulcan Mine. Digital terrain model is the complex product, which has characteristics that are equivalent to the specialists that use satellite images and information stored in a digital model, this is easier to use.

  6. 78 FR 32427 - Notice of Issuance of Final Determination Concerning Multifunctional Digital Imaging Systems

    Science.gov (United States)

    2013-05-30

    ... multifunctional digital imaging systems for purposes of U.S. Government procurement. DATES: The final... Determination Concerning Multifunctional Digital Imaging Systems AGENCY: U.S. Customs and Border Protection... country of origin of certain multifunctional digital imaging systems. Based upon the facts presented, CBP...

  7. Digital Technology in Preservation of Buddist Monastery Treasures

    Science.gov (United States)

    Shaftel, A.

    2017-08-01

    Treasure Caretaker Training (Digital Monastery Project), teaches Buddhist monks, nuns and community cultural caretakers to protect and preserve their own monastery sacred art treasures. Participants learn to create digital inventories by use of their own mobile phones. Included in this documentation is the video interview of elders who hold the oral history of many of the treasures. Risk assessment and disaster mitigation are taught.

  8. P-20 Model of Digital Citizenship.

    Science.gov (United States)

    Curran, Marialice B F X; Ribble, Mike

    2017-03-01

    This chapter explores a P-20 digital citizenship model that builds upon the respect, educate, and protect REP model beginning with our earliest learners through elementary, middle, high school, and college. © 2017 Wiley Periodicals, Inc., A Wiley Company.

  9. An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order

    OpenAIRE

    Groß, Hannes; Mangard, Stefan; Korak, Thomas

    2017-01-01

    Passive physical attacks, like power analysis, pose a serious threat to the security of digital circuits. In this work, we introduce an efficient sidechannel protected Advanced Encryption Standard (AES) hardware design that is completely scalable in terms of protection order. Therefore, we revisit the private circuits scheme of Ishai et al. [13] which is known to be vulnerable to glitches. We demonstrate how to achieve resistance against multivariate higher-order attacks in the presence of gl...

  10. The digital environment in men's sexual disorders

    DEFF Research Database (Denmark)

    García-Cruz, E; Romero-Otero, J; Fode, M

    2018-01-01

    CONTEXT: The revolution of digital technologies constitutes a new setting for the patient-physician relationship and provides patients with a scenario of privacy and universal access to a vast amount of information. However, there is little information on how digital resources are used and what...... their advantages and disadvantages are. OBJECTIVES: To explore the scope of the scientific research on the use of digital technology related to men's sexual disorders and to analyze the primary sources of digital information related to this field. ACQUISITION OF EVIDENCE: Systematic searches of the scientific...... to predefined indicators. SYNTHESIS OF EVIDENCE: The qualitative analysis of the scientific literature included 116 manuscripts; 47% were clinical studies based on online survey, 9% dealt with digital treatments, 11% with quality/safety of digital healthcare environment, 3% with digital activity, 21...

  11. Package Formats for Preserved Digital Material

    DEFF Research Database (Denmark)

    Zierau, Eld

    2012-01-01

    This paper presents an investigation of the best suitable package formats for long term digital preservation. The choice of a package format for preservation is crucial for future access, thus a thorough analysis of choice is important. The investigation presented here covers setting up requireme......This paper presents an investigation of the best suitable package formats for long term digital preservation. The choice of a package format for preservation is crucial for future access, thus a thorough analysis of choice is important. The investigation presented here covers setting up...... requirements for package formats used for long term preserved digital material, and using these requirements as the basis for analysing a range of package formats. The result of the concrete investigation is that the WARC format is the package format best suited for the listed requirements. Fulfilling...

  12. Minimising farm crop protection pressure supported by the multiple functionalities of the DISCUSS indicator set.

    Science.gov (United States)

    Wustenberghs, Hilde; Fevery, Davina; Lauwers, Ludwig; Marchand, Fleur; Spanoghe, Pieter

    2018-03-15

    Sustainable crop protection (SCP) has many facets. Farmers may therefore perceive transition to SCP as very complex. The Dual Indicator Set for Crop Protection Sustainability (DISCUSS) can handle this complexity. To provide targeted support throughout the transition to SCP, complexity capture must be synchronised with the time course of on-farm decision-making. Tool use must be tuned to farmer awareness and appropriate level of data in consecutive stages. This paper thus explores the potential functionalities of DISCUSS in relation to both complexity and time. Results from apple and potato crop protection show three potential functions: DISCUSS can be used as (1) a simulation tool for communication and decision support, (2) an assessment and monitoring tool, and (3) a discussion support tool for farmer groups. Analysis of these functionalities using a framework for guiding on-farm sustainability assessment and strategic decision-making shows how each functionality can support the consecutive steps of transition to SCP, i.e. using the right tool functionality at the right time. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. Exploring Professional Development Needs of Digital Immigrant and Digital Native Teachers for the Successful Integration of Technology in a Jewish Elementary Education Setting

    Science.gov (United States)

    Salomon, Anna M.

    2014-01-01

    Today's teachers are tasked with the integration of technology in their curriculum and their classrooms. In order to do that, teachers require professional development/training and support. Further, schools are encountering a unique landscape of teaching with digital natives becoming teachers alongside digital immigrants. This study aimed to…

  14. Legislations set out to protect workers against ionizing radiations in the European Community

    International Nuclear Information System (INIS)

    Grivelet-Denais, M.-F.

    1975-01-01

    A physical review on ionizing radiations and a biological survey of their possible effects on exposed workers are followed by a study, first general and then analytical, of the various legislations set out to protect these workers in the European Community. In the light of this study a few comments are called for. In all member States the rules are particularly strict for everything to do with approval and homologation of plants and equipment, technical qualifications of users, safety measures, physical protection control, atmospheric checks and individual dosimetry. Reservations must be made as to the exact organization of controls and the interdependence between supervisory and user bodies, these points generally remaining rather vague. France more than the other member States has made an effort at precision which deserves credit but is disappointing in practice where medical supervision of exposed workers is concerned. This inadequacy of the medical examination is due mainly to the lack of any significant symptom betraying a biological overdose. The hematological examination is also disparaged for its lack of sensitivity and above all specificity [fr

  15. Implementation of FPGA-Based Diverse Protection System

    International Nuclear Information System (INIS)

    Hwang, Soo Yun; Lee, Yoon Hee; Shon, Se Do; Baek, Seung Min

    2015-01-01

    Obsolete analog and digital hardware platforms in NPPs are commonly replaced with programmable logic controller (PLC) and distributed control system (DCS). Field programmable gate arrays (FPGAs) are highlighted as an alternative to obsolete hardware platforms. FPGAs are digital integrated circuits (ICs) that contain the configurable (programmable) blocks of logic along with configurable interconnections among these blocks. Designers can configure (program) such devices to perform a tremendous variety of tasks. FPGAs have been evolved from the technology of programmable logic device (PLD). Nowadays, they can contain millions of logic gates by nanotechnology and can be used to implement extremely large and complex functions that previously could be realized only using application specific integrated circuits (ASICs). This paper presents the implementation of an FPGA-based diverse protection system (DPS) which executes the protective functions in NPP when the protective functions of the plant protection system (PPS) fails

  16. Implementation of FPGA-Based Diverse Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Hwang, Soo Yun; Lee, Yoon Hee; Shon, Se Do; Baek, Seung Min [KEPCO Engineering and Construction Company Inc., Daejeon (Korea, Republic of)

    2015-10-15

    Obsolete analog and digital hardware platforms in NPPs are commonly replaced with programmable logic controller (PLC) and distributed control system (DCS). Field programmable gate arrays (FPGAs) are highlighted as an alternative to obsolete hardware platforms. FPGAs are digital integrated circuits (ICs) that contain the configurable (programmable) blocks of logic along with configurable interconnections among these blocks. Designers can configure (program) such devices to perform a tremendous variety of tasks. FPGAs have been evolved from the technology of programmable logic device (PLD). Nowadays, they can contain millions of logic gates by nanotechnology and can be used to implement extremely large and complex functions that previously could be realized only using application specific integrated circuits (ASICs). This paper presents the implementation of an FPGA-based diverse protection system (DPS) which executes the protective functions in NPP when the protective functions of the plant protection system (PPS) fails.

  17. Simulation to aid in interpreting biological relevance and setting of population-level protection goals for risk assessment of pesticides.

    Science.gov (United States)

    Topping, Christopher John; Luttik, Robert

    2017-10-01

    Specific protection goals (SPGs) comprise an explicit expression of the environmental components that need protection and the maximum impacts that can be tolerated. SPGs are set by risk managers and are typically based on protecting populations or functions. However, the measurable endpoints available to risk managers, at least for vertebrates, are typically laboratory tests. We demonstrate, using the example of eggshell thinning in skylarks, how simulation can be used to place laboratory endpoints in context of population-level effects as an aid to setting the SPGs. We develop explanatory scenarios investigating the impact of different assumptions of eggshell thinning on skylark population size, density and distribution in 10 Danish landscapes, chosen to represent the range of typical Danish agricultural conditions. Landscape and timing of application of the pesticide were found to be the most critical factors to consider in the impact assessment. Consequently, a regulatory scenario of monoculture spring barley with an early spray treatment eliciting the eggshell thinning effect was applied using concentrations eliciting effects of zero to 100% in steps of 5%. Setting the SPGs requires balancing scientific, social and political realities. However, the provision of clear and detailed options such as those from comprehensive simulation results can inform the decision process by improving transparency and by putting the more abstract testing data into the context of real-world impacts. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. Digital breast tomosynthesis

    International Nuclear Information System (INIS)

    Haegele, Julian; Barkhausen, Joerg; Pursche, Telja; Schaefer, Fritz K.W.

    2015-01-01

    In digital breast tomosynthesis a digital tomographic data set with a very high spatial resolution is reconstructed from low-dose projections collected over a limited rotation angle. This allows a very detailed assessment of e. g. masses and architectural distortions. The average glandular dose is comparable to 2 D mammography. First clinical studies demonstrated that tomosynthesis is able to supply important additional information in suspicious mammographic findings. In comparison to projection mammography, tomosynthesis shows an at least comparable diagnostic accuracy. In everyday practice, tomosynthesis is currently mostly used for further evaluation of suspicious findings in mammography.

  19. Standards to open and interoperable digital libraries

    Directory of Open Access Journals (Sweden)

    Luís Fernando Sayão

    2007-12-01

    Full Text Available Interoperability is one of the main issues in creating a networked system of digital libraries. However, the interoperability as the way to accomplish data exchange and service collaboration requires adoption of a set of open standards covering all digital repository processes. The aim of this document is to revise the most important standards, protocols and the best pratices that form the framework to an open and fully interoperable digital library.

  20. Investigating the issue of copyright and security measures in digital libraries

    Directory of Open Access Journals (Sweden)

    Sedigheh Ahmadi Fasih

    2013-11-01

    Full Text Available During the past few years, digital libraries have been the primary source of retrieving necessary information. IT helps many scholars have the access to recently published value added researches around the world. However, information security and copyright concerns are among the most important issues and there must be good rules and regulation to protect authors against any sort of copyright violation. In this paper, we present an empirical investigation to find out about the status of copyright issues in one of Iranian libraries. The proposed study of this paper designs a questionnaire in Likert scale and distributes it among 96 librarian experts. Cronbach alpha is equal to 0.76, which is well above the minimum acceptable level. The results of our investigation indicate that although expert believe the status of copyright is in desirable level when the level of significance is five percent, there are some concerns on some issues. In other words, experts believed that all copyrights are not well protected and digital libraries do not follow governmental rules and regulation on fully protecting authors’ rights. In addition, experts believed that the security of sources available on digital libraries is not well protected.

  1. Digital health promotion in sexual health clinics: results of a feasibility trial of the Men’s Safer Sex website

    Directory of Open Access Journals (Sweden)

    Julia V Bailey

    2015-10-01

    The best way to assess the impact of the MenSS website was by recording STI diagnoses from clinical records. Response rates for the online questionnaire were poor despite offers of incentives. There were many challenges to conducting an online trial of a sexual health website including ethical committee concerns about email content, poor reliability of trial-related software, balancing data protection and security protocols against ease of access for participants, barriers to patient access to IT in NHS clinics, and trying to ensure that participants engage with a digital intervention for long enough. Whilst digital interventions have great potential for health promotion, we encountered significant obstacles to online research, and to implementation of an IDI in an NHS clinical setting.

  2. Robust digital controllers for uncertain chaotic systems: A digital redesign approach

    Energy Technology Data Exchange (ETDEWEB)

    Ababneh, Mohammad [Department of Controls, FMC Kongsberg Subsea, FMC Energy Systems, Houston, TX 77067 (United States); Barajas-Ramirez, Juan-Gonzalo [CICESE, Depto. De Electronica y Telecomunicaciones, Ensenada, BC, 22860 (Mexico); Chen Guanrong [Centre for Chaos Control and Synchronization, Department of Electronic Engineering, City University of Hong Kong (China); Shieh, Leang S. [Department of Electrical and Computer Engineering, University of Houston, Houston, TX 77204-4005 (United States)

    2007-03-15

    In this paper, a new and systematic method for designing robust digital controllers for uncertain nonlinear systems with structured uncertainties is presented. In the proposed method, a controller is designed in terms of the optimal linear model representation of the nominal system around each operating point of the trajectory, while the uncertainties are decomposed such that the uncertain nonlinear system can be rewritten as a set of local linear models with disturbed inputs. Applying conventional robust control techniques, continuous-time robust controllers are first designed to eliminate the effects of the uncertainties on the underlying system. Then, a robust digital controller is obtained as the result of a digital redesign of the designed continuous-time robust controller using the state-matching technique. The effectiveness of the proposed controller design method is illustrated through some numerical examples on complex nonlinear systems--chaotic systems.

  3. Design of digital logic control for accelerator magnet power supply

    International Nuclear Information System (INIS)

    Long Fengli; Hu Wei; Cheng Jian

    2008-01-01

    For the accelerator magnet power supply, usually the Programmable Logic Controller (PLC) is used to server as the controller for logic protection and control. Along with the development of modern accelerator technology, it is a trend to use fully-digital control to the magnet power supply. It is possible to integrate the logic control part into the digital control component of the power supply, for example, the Field Programmable Gate Array (FPGA). The paper introduces to different methods which are designed for the logic protection and control for accelerator magnet power supplies with the FPGA as the control component. (authors)

  4. From alginate impressions to digital virtual models: accuracy and reproducibility.

    Science.gov (United States)

    Dalstra, Michel; Melsen, Birte

    2009-03-01

    To compare the accuracy and reproducibility of measurements performed on digital virtual models with those taken on plaster casts from models poured immediately after the impression was taken, the 'gold standard', and from plaster models poured following a 3-5 day shipping procedure of the alginate impression. Direct comparison of two measuring techniques. The study was conducted at the Department of Orthodontics, School of Dentistry, University of Aarhus, Denmark in 2006/2007. Twelve randomly selected orthodontic graduate students with informed consent. Three sets of alginate impressions were taken from the participants within 1 hour. Plaster models were poured immediately from two of the sets, while the third set was kept in transit in the mail for 3-5 days. Upon return a plaster model was poured as well. Finally digital models were made from the plaster models. A number of measurements were performed on the plaster casts with a digital calliper and on the corresponding digital models using the virtual measuring tool of the accompanying software. Afterwards these measurements were compared statistically. No statistical differences were found between the three sets of plaster models. The intra- and inter-observer variability are smaller for the measurements performed on the digital models. Sending alginate impressions by mail does not affect the quality and accuracy of plaster casts poured from them afterwards. Virtual measurements performed on digital models display less variability than the corresponding measurements performed with a calliper on the actual models.

  5. Evaluation of digital soil mapping approaches with large sets of environmental covariates

    Science.gov (United States)

    Nussbaum, Madlene; Spiess, Kay; Baltensweiler, Andri; Grob, Urs; Keller, Armin; Greiner, Lucie; Schaepman, Michael E.; Papritz, Andreas

    2018-01-01

    The spatial assessment of soil functions requires maps of basic soil properties. Unfortunately, these are either missing for many regions or are not available at the desired spatial resolution or down to the required soil depth. The field-based generation of large soil datasets and conventional soil maps remains costly. Meanwhile, legacy soil data and comprehensive sets of spatial environmental data are available for many regions. Digital soil mapping (DSM) approaches relating soil data (responses) to environmental data (covariates) face the challenge of building statistical models from large sets of covariates originating, for example, from airborne imaging spectroscopy or multi-scale terrain analysis. We evaluated six approaches for DSM in three study regions in Switzerland (Berne, Greifensee, ZH forest) by mapping the effective soil depth available to plants (SD), pH, soil organic matter (SOM), effective cation exchange capacity (ECEC), clay, silt, gravel content and fine fraction bulk density for four soil depths (totalling 48 responses). Models were built from 300-500 environmental covariates by selecting linear models through (1) grouped lasso and (2) an ad hoc stepwise procedure for robust external-drift kriging (georob). For (3) geoadditive models we selected penalized smoothing spline terms by component-wise gradient boosting (geoGAM). We further used two tree-based methods: (4) boosted regression trees (BRTs) and (5) random forest (RF). Lastly, we computed (6) weighted model averages (MAs) from the predictions obtained from methods 1-5. Lasso, georob and geoGAM successfully selected strongly reduced sets of covariates (subsets of 3-6 % of all covariates). Differences in predictive performance, tested on independent validation data, were mostly small and did not reveal a single best method for 48 responses. Nevertheless, RF was often the best among methods 1-5 (28 of 48 responses), but was outcompeted by MA for 14 of these 28 responses. RF tended to over

  6. Understanding the digital divide in the clinical setting: the technology knowledge gap experienced by US safety net patients during teleretinal screening.

    Science.gov (United States)

    George, Sheba; Moran, Erin; Fish, Allison; Ogunyemi, Lola

    2013-01-01

    Differential access to everyday technology and healthcare amongst safety net patients is associated with low technological and health literacies, respectively. These low rates of literacy produce a complex patient "knowledge gap" that influences the effectiveness of telehealth technologies. To understand this "knowledge gap", six focus groups (2 African-American and 4 Latino) were conducted with patients who received teleretinal screenings in U.S. urban safety-net settings. Findings indicate that patients' "knowledge gap" is primarily produced at three points: (1) when patients' preexisting personal barriers to care became exacerbated in the clinical setting; (2) through encounters with technology during screening; and (3) in doctor-patient follow-up. This "knowledge gap" can produce confusion and fear, potentially affecting patients' confidence in quality of care and limiting their disease management ability. In rethinking the digital divide to include the consequences of this knowledge gap faced by patients in the clinical setting, we suggest that patient education focus on both their disease and specific telehealth technologies deployed in care delivery.

  7. Phase recovering algorithms for extended objects encoded in digitally recorded holograms

    Directory of Open Access Journals (Sweden)

    Peng Z.

    2010-06-01

    Full Text Available The paper presents algorithms to recover the optical phase of digitally encoded holograms. Algorithms are based on the use of a numerical spherical reconstructing wave. Proof of the validity of the concept is performed through an experimental off axis digital holographic set-up. Two-color digital holographic reconstruction is also investigated. Application of the color set-up and algorithms concerns the simultaneous two-dimensional deformation measurement of an object submitted to a mechanical loading.

  8. Transforming Artefacts into Digital Heritage

    DEFF Research Database (Denmark)

    Otto, Ton; Hardy, Dianna

    2016-01-01

    a genuine transformation of the artefacts that opens up new possibilities of use. These include providing access to and facilitating the reappropriation of cultural knowledge stored elsewhere, maintaining and developing a living digital cultural heritage, and gathering, sharing and transferring knowledge...... that is available within Aboriginal communities. In this paper we examine different types of digital repositories and we assess their suitability for use by Aboriginal communities. We classify a number of institutional archiving systems and analyse in some detail two interactive systems that were specifically...... designed for use by Aboriginal communities. The paper ends with a set of recommendations for designing digital databases for Indigenous usage....

  9. Guidelines for reliability analysis of digital systems in PSA context. Phase 3. Status report

    Energy Technology Data Exchange (ETDEWEB)

    Authen, S. [Risk Pilot AB, Stockholm (Sweden); Holmberg, J.-E. [VTT Technical Research Centre of Finland, Espoo (Finland)

    2013-03-15

    Digital protection and control systems appear as upgrades in older plants, and are commonplace in new nuclear power plants. To assess the risk of nuclear power plant operation and to determine the risk impact of digital systems, there is a need to quantitatively assess the reliability of the digital systems in a justifiable manner. In 2007, the OECD/NEA CSNI directed the Working Group on Risk Assessment (WGRisk) to set up a task group to coordinate an activity in this field. One of the recommendations was to develop a taxonomy of failure modes of digital components for the purposes of probabilistic safety assessment (PSA), resulting in a follow-up task group called DIGREL. The taxonomy will be the basis of future modelling and quantification efforts. It will also help define a structure for data collection and to review PSA studies. This an interim report of the project. A draft guidelines document on the failure modes taxonomy has been developed. The taxonomy is rather complete covering all levels from the system level down to module and basic component level failure modes, including hardware and software aspects. There are still open issues to be resolved by the task group, especially related to I and C unit and module level taxonomy. In a parallel Nordic activity, a comparison of Nordic experiences and a literature review on main international references has been performed. The study showed a wide range of approaches and solutions to the challenges given by digital I and C, and also indicated that no state-of-the-art currently exists. An existing simplified PSA model has been complemented with fault tree models for a four-redundant distributed protection system in order to study and demonstrate the effect of design features and modelling approaches. The model has been used to test the effect of CCF modelling, fail-safe principle and voting logic. A comparison has been made between unit-level and module-level modelling. (Author)

  10. Guidelines for reliability analysis of digital systems in PSA context. Phase 3. Status report

    International Nuclear Information System (INIS)

    Authen, S.; Holmberg, J.-E.

    2013-03-01

    Digital protection and control systems appear as upgrades in older plants, and are commonplace in new nuclear power plants. To assess the risk of nuclear power plant operation and to determine the risk impact of digital systems, there is a need to quantitatively assess the reliability of the digital systems in a justifiable manner. In 2007, the OECD/NEA CSNI directed the Working Group on Risk Assessment (WGRisk) to set up a task group to coordinate an activity in this field. One of the recommendations was to develop a taxonomy of failure modes of digital components for the purposes of probabilistic safety assessment (PSA), resulting in a follow-up task group called DIGREL. The taxonomy will be the basis of future modelling and quantification efforts. It will also help define a structure for data collection and to review PSA studies. This an interim report of the project. A draft guidelines document on the failure modes taxonomy has been developed. The taxonomy is rather complete covering all levels from the system level down to module and basic component level failure modes, including hardware and software aspects. There are still open issues to be resolved by the task group, especially related to I and C unit and module level taxonomy. In a parallel Nordic activity, a comparison of Nordic experiences and a literature review on main international references has been performed. The study showed a wide range of approaches and solutions to the challenges given by digital I and C, and also indicated that no state-of-the-art currently exists. An existing simplified PSA model has been complemented with fault tree models for a four-redundant distributed protection system in order to study and demonstrate the effect of design features and modelling approaches. The model has been used to test the effect of CCF modelling, fail-safe principle and voting logic. A comparison has been made between unit-level and module-level modelling. (Author)

  11. Application of Digital Technology for the Plant Protection System in Ulchin Nuclear Power Plant Units 5 and 6

    International Nuclear Information System (INIS)

    Deucksoo, Lee; Insik, Kim

    2006-01-01

    Since the completion of construction of Ulchin Nuclear Power Plant Units 3 and 4 (UCN 3 and 4), the first units of the OPR (Optimized Power Reactor) series, various advanced design features have been incorporated to the following OPRs. The Ulchin Nuclear Power Plant Units 5 and 6(UCN 5 and 6) which started commercial operation in Korea from 2004 and 2005 respectively, are designed to provide improvements in safety, reliability and costs by applying both advanced proven technology and experiences gained from the construction and operation of the previous OPRs. Among those improvements, the digital plant protection system (DPPS) and the digital engineered safety feature actuation system (DESFAS) are the key elements to the UCN 5 and 6 designs. The DPPS and DESFAS utilizing the digital computer technology offer a solution to the obsolescence problem of analog system. These features also provide the potential for additional benefits such as ease of maintenance, increased performance, reduction of internal and external cross channel wiring, improvement of the surveillance testability and flexibility of control logic programming change. During the initial design stage, the Korean regulatory body had evaluated these design concepts intensively and concluded it to be acceptable for the safety point of view. Also, in-depth review on the detailed design and the special evaluation/audit for the software design process has been performed to secure the quality of the software. As a result, every issue raised during licensing review has been clarified and the operating licenses for the UCN 5 and 6 were issued in October, 2003 and October, 2004 respectively, by the government. In this paper, design characteristics of the UCN 5 and 6 are introduced, and advanced design features and implementation process are presented focused on the DPPS/DESFAS with some benefit analysis results. (authors)

  12. Privacy-preserving digital rights management

    NARCIS (Netherlands)

    Conrado, C.; Petkovic, M.; Jonker, W.; Jonker, W.; Petkovic, M.

    2004-01-01

    DRM systems provide a means for protecting digital content, but at the same time they violate the privacy of users in a number of ways. This paper addresses privacy issues in DRM systems. The main challenge is how to allow a user to interact with the system in an anonymous/pseudonymous way, while

  13. The Automatic Test Features of the IDiPS Reactor Protection System

    International Nuclear Information System (INIS)

    Hur, Seop; Kim, Dong-Hoon; Hwang, In-Koo; Lee, Cheol-Kwon; Lee, Dong-Young

    2007-01-01

    The reactor protection system (RPS) is designed to minimize a propagation of abnormal or accident conditions of nuclear power plants. A digital RPS (Integrated Digital Protection System (IDiPS) RPS) is being developed in the Korea Nuclear Instrumentation and Control System (KNICS) R and D project. To make good use of the advantages of the digital technology, it is necessary to improve the reliability and availability of a system through automatic test features including an on-line testing, a self-diagnostics, an auto calibration, etc. This paper summarizes the system test strategy and the automatic test features of the IDiPS RPS

  14. Gearing up for change: building digital resources in a South African ...

    African Journals Online (AJOL)

    ... new technical infrastructures, development and transfer of digital skills whilst ensuring continued public roles in supporting a public service mission and protecting the rights and identities of individuals are issues that require consideration in moving forward to meet the digital challenge. Innovation Vol. 30 2005: 21-31 ...

  15. Enabling DRM-preserving Digital content Redistribution

    NARCIS (Netherlands)

    Krishnan Nair, S.; Popescu, B.C.; Gamage, C.D.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    Traditionally, the process of online digital content distribution has involved a limited number of centralised distributors selling protected contents and licenses authorising the use of the se contents, to consumers. In this paper, we extend this model by introducing a security scheme that enables

  16. The impact of digital imaging on patient doses during barium studies

    International Nuclear Information System (INIS)

    Broadhead, D.A.; Chapple, C.-L.; Faulkner, K.

    1995-01-01

    Barium studies performed on 10 digital and four non-digital fluoroscopic systems were monitored with dose-area product meters as part of a Regional Patient Dosimetry Audit programme. The data have been collected using a computer to read and reset the dose-area product meter and also to collect patient and examination details. A comparison of dose-area product measurements from digital and non-digital fluoroscopy units on over 10 000 barium studies is presented. The data have been corrected according to patient size. The mean size corrected dose-area product for a barium meal examination was found to be 7.62 Gy cm -2 for a digital set compared with 15.45 Gy cm -2 for a non-digital set with 2462 and 1308 patients included in each measurement series, respectively. Dose-area products were also a factor of approximately two lower for barium enema, barium swallow and barium follow-through examinations performed on digital systems. (author)

  17. Multiagent System-Based Wide-Area Protection and Control Scheme against Cascading Events

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Sun, Haishun

    2015-01-01

    In this paper, a multi agent system (MAS) based wide area protection and control scheme is proposed to deal with the long term voltage instability induced cascading trips. Based on sensitivity analysis between the relay operation margin and power system state variables, an optimal emergency control...... strategy is defined to adjust the emergency states timely and prevent the unexpected relay trips. In order to supervise the control process and further minimize the load loss, an agent based process control is adopted to monitor the states of distributed controllers and adjust the emergency control...... strategy. A hybrid simulation platform based on LabVIEW and real time digital simulator (RTDS) is set up to simulate a blackout case in the power system of Eastern Denmark and to demonstrate the effectiveness of the proposed MAS based protection strategy....

  18. Refining Measures for Assessing Problematic/Addictive Digital Gaming Use in Clinical and Research Settings.

    Science.gov (United States)

    Faust, Kyle; Faust, David

    2015-08-12

    Problematic or addictive digital gaming (including all types of electronic devices) can and has had extremely adverse impacts on the lives of many individuals across the world. The understanding of this phenomenon, and the effectiveness of treatment design and monitoring, can be improved considerably by continuing refinement of assessment tools. The present article briefly overviews tools designed to measure problematic or addictive use of digital gaming, the vast majority of which are founded on the Diagnostic and Statistical Manual of Mental Disorders (DSM) criteria for other addictive disorders, such as pathological gambling. Although adapting DSM content and strategies for measuring problematic digital gaming has proven valuable, there are some potential issues with this approach. We discuss the strengths and limitations of current methods for measuring problematic or addictive gaming and provide various recommendations that might help in enhancing or supplementing existing tools, or in developing new and even more effective tools.

  19. Digital Native Preservice Teachers: An Examination of Their Self-Efficacy Beliefs Regarding Technology Integration in Classroom Settings

    Science.gov (United States)

    Southall, Sarah Parker

    2012-01-01

    The purpose of this mixed-method study was to investigate digital native preservice teachers' self-efficacy beliefs regarding their technology experiences and skills at the beginning and at the end of their field placement semester. Digital natives, as defined by Prensky (2001), are students born after 1980 who have been raised with digital media…

  20. REGION OF NON-INTEREST BASED DIGITAL IMAGE WATERMARKING USING NEURAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Bibi Isac

    2011-11-01

    Full Text Available Copyrights protection of digital data become inevitable in current world. Digital watermarks have been recently proposed as secured scheme for copyright protection, authentication, source tracking, and broadcast monitoring of video, audio, text data and digital images. In this paper a method to embed a watermark in region of non-interest (RONI and a method for adaptive calculation of strength factor using neural network are proposed. The embedding and extraction processes are carried out in the transform domain by using Discrete Wavelet Transform (DWT. Finally, the algorithm robustness is tested against noise addition attacks and geometric distortion attacks. The results authenticate that the proposed watermarking algorithm does not degrade the quality of cover image as the watermark is inserted only in region of non-interest and is resistive to attacks.

  1. Fundamental about energy-efficient set-top boxes; Grundlagen zur Energieeffizienz von Set-Top Boxen

    Energy Technology Data Exchange (ETDEWEB)

    Grieder, T.; Huser, A.

    2004-07-01

    In various countries within Europe, digital television has already achieved a wide distribution. All types of reception are affected by this new technology, cable television, satellite reception and reception with a conventional roof or room aerial. In addition to the television set itself, a separate receiver is required for the digital signals, a so-called set-top box. Instead of one analogue programme, at least 3, or, in extreme cases more than 10, digital programmes are received, with interactive ser-vices also being possible. Up to now, very little of this development has been seen in Switzerland. Thanks to the wide range of programmes available over the cable networks, there is virtually no demand for an improved offer via a conventional aerial. Only in the case of satellite reception has the changeover already taken place in the majority of cases. Attractive additional services, as well as the integration into the international environment, will result in an increasing number of set-top boxes also being used in Switzerland. Over the next 10 to 15 years, the current number of approximately 420,000 units will increase to over 3 million, whereby the total electricity demand within Switzerland will increase by a further 0.5 to 1%. In order to check this increase, the European Union has taken the path of a voluntary agreement with the appliance manufacturers and service providers, and a similar procedure is also recommended for Switzerland. In addition, this study also draws up various recommendations for the importers of set-top boxes and for the service providers. (author)

  2. Integrated fingerprinting in secure digital cinema projection

    Science.gov (United States)

    Delannay, Damien; Delaigle, Jean-Francois; Macq, Benoit M. M.; Quisquater, Jean-Jacques; Mas Ribes, Joan M.; Boucqueau, Jean M.; Nivart, Jean-Francois

    2001-12-01

    This paper describes the functional model of a combined conditional access and fingerprinting copyright (-or projectionright) protection system in a digital cinema framework. In the cinema industry, a large part of early movie piracy comes from copies made in the theater itself with a camera. The evolution towards digital cinema broadcast enables watermark based fingerprinting protection systems. Besides an appropriate fingerprinting technology, a number of well defined security/cryptographic tools are integrated in order to guaranty the integrity of the whole system. The requirements are two-fold: On one side, we must ensure that the media content is only accessible at exhibition time (under specific authorization obtained after an ad-hoc film rental agreement) and contains the related exhibition fingerprint. At the other end, we must prove our ability to retrieve the fingerprint information from an illegal copy of the media.

  3. Physicality and Digitality: Parallelisms at a Material Level

    DEFF Research Database (Denmark)

    Gjerlufsen, Tony; Olsen, Jesper Wolff

    2007-01-01

    What is the striking difference between doing in a purely non-digital world and doing though, on, at and with digitally augmented physical entities? The work described in this article sets out to explore the nature of the physical an digital world at a material level. To contemplate the two world...... and Digitality. Each of which captures the essence of the two worlds, including their individual defining basic qualities. through an increase in understanding of the two terms we hope to inform designers and researchers about the intermixture of the two worlds....

  4. Intermittent pacemaker dysfunction caused by digital mobile telephones.

    Science.gov (United States)

    Naegeli, B; Osswald, S; Deola, M; Burkart, F

    1996-05-01

    This study was designed to evaluate possible interactions between digital mobile telephones and implanted pacemakers. Electromagnetic fields may interfere with normal pacemaker function. Development of bipolar sensing leads and modern noise filtering techniques have lessened this problem. However, it remains unclear whether these features also protect from high frequency noise arising from digital cellular phones. In 39 patients with an implanted pacemaker (14 dual-chamber [DDD], 8 atrial-synchronized ventricular-inhibited [VDD(R)] and 17 ventricular-inhibited [VVI(R)] pacemakers), four mobile phones with different levels of power output (2 and 8 W) were tested in the standby, dialing and operating mode. During continuous electrocardiographic monitoring, 672 tests were performed in each mode with the phones positioned over the pulse generator, the atrial and the ventricular electrode tip. The tests were carried out at different sensitivity settings and, where possible, in the unipolar and bipolar pacing modes as well. In 7 (18%) of 39 patients, a reproducible interference was induced during 26 (3.9%) of 672 tests with the operating phones in close proximity (phone and at maximal sensitivity of the pacemakers (maximal vs. nominal sensitivity, 6% vs. 1.8% positive test results, p = 0.009). When the bipolar and unipolar pacing modes were compared in the same patients, ventricular inhibition was induced only in the unipolar mode (12.5% positive test results, p = 0.0003). Digital mobile phones in close proximity to implanted pacemakers may cause intermittent pacemaker dysfunction with inappropriate ventricular tracking and potentially dangerous pacemaker inhibition.

  5. Methods of digital image processing

    International Nuclear Information System (INIS)

    Doeler, W.

    1985-01-01

    Increasing use of computerized methods for diagnostical imaging of radiological problems will open up a wide field of applications for digital image processing. The requirements set by routine diagnostics in medical radiology point to picture data storage and documentation and communication as the main points of interest for application of digital image processing. As to the purely radiological problems, the value of digital image processing is to be sought in the improved interpretability of the image information in those cases where the expert's experience and image interpretation by human visual capacities do not suffice. There are many other domains of imaging in medical physics where digital image processing and evaluation is very useful. The paper reviews the various methods available for a variety of problem solutions, and explains the hardware available for the tasks discussed. (orig.) [de

  6. Power system protection

    International Nuclear Information System (INIS)

    Venkata, S.S.; Damborg, M.J.; Jampala, A.K.

    1991-01-01

    Power systems of the 21st century will be more modern, and complex, utilizing the latest available technologies. At the same time, generating plants will have to operate with minimal spinning margins and energy transportation has to take place at critical levels due to environmental and economical constraints. These factors dictate that the power systems be protected with optimum sensitivity, selectivity and time of operation to assure maximum reliability, and security at minimal cost. With an increasing role played by digital computers in every aspect of protection, it is important to take a critical and fresh look at the art and science of relaying and protection. The main objective of this paper is to review the past, present and future of power system protection from a software point of view

  7. Refining Measures for Assessing Problematic/Addictive Digital Gaming Use in Clinical and Research Settings

    Directory of Open Access Journals (Sweden)

    Kyle Faust

    2015-08-01

    Full Text Available Problematic or addictive digital gaming (including all types of electronic devices can and has had extremely adverse impacts on the lives of many individuals across the world. The understanding of this phenomenon, and the effectiveness of treatment design and monitoring, can be improved considerably by continuing refinement of assessment tools. The present article briefly overviews tools designed to measure problematic or addictive use of digital gaming, the vast majority of which are founded on the Diagnostic and Statistical Manual of Mental Disorders (DSM criteria for other addictive disorders, such as pathological gambling. Although adapting DSM content and strategies for measuring problematic digital gaming has proven valuable, there are some potential issues with this approach. We discuss the strengths and limitations of current methods for measuring problematic or addictive gaming and provide various recommendations that might help in enhancing or supplementing existing tools, or in developing new and even more effective tools.

  8. Digital tomosynthesis of the chest: A literature review

    International Nuclear Information System (INIS)

    Molk, N.; Seeram, E.

    2015-01-01

    Digital tomosynthesis is a relatively novel imaging modality using limited angle tomography to provide 3D imaging. The purpose of this review is to compare the sensitivity of digital tomosynthesis of the chest and plain film chest imaging in accurately identifying pulmonary nodules and to compare the effective dose between standard chest examinations using digital tomosynthesis and CT. A review of current literature has shown that small scale studies found digital tomosynthesis to be three times more effective in identifying pulmonary nodules compared to conventional radiography and at lower doses compared with routine chest CT examinations. This indicates that tomosynthesis could potentially be a beneficial imaging modality and could be used in a number of ways to detect and monitor pulmonary nodules for cancer. However with limited research, large-scale studies would need to be performed to confirm its benefits and identify where it is best used in the clinical setting. - Highlights: • The detection of pulmonary nodules is compared between tomosynthesis and plain film. • The effective dose of digital chest tomosynthesis and chest CT are compared. • The place of digital tomosynthesis of the chest in the clinical setting is explored. • Three times more pulmonary nodules are seen with tomosynthesis. • The effective dose of tomosynthesis is significantly lower than CT

  9. Digital Transformation, a Question of Survival? : Exploring the Possibility for a Swedish Car Rental Company to Digitally Transform into a Mobility Service Provider

    OpenAIRE

    Enocson, Julia; Söderholm, Linnéa

    2017-01-01

    Background: Due to arising shifts in customers’ digital expectations, businesses need to adapt current strategies to dynamic environments in order to stay competitive in today’s digital era. These shifts, which are to set new directions for entire industries, is also known as a digital transformation. To digitally transform a firm entails both opportunities to thrive and challenges to face. The technological advances create a need for new roles and skills to be mastered. In addition, the rise...

  10. Development and Reliability Analysis of HTR-PM Reactor Protection System

    International Nuclear Information System (INIS)

    Li Duo; Guo Chao; Xiong Huasheng

    2014-01-01

    High Temperature Gas-Cooled Reactor-Pebble bed Module (HTR-PM) digital Reactor Protection System (RPS) is a dedicated system, which is designed and developed according to HTR-PM NPP protection specifications. To decrease the probability of accident trips and increase the system reliability, HTR-PM RPS has such features as a framework of four redundant channels, two diverse sub-systems in each channel, and two level two-out-of-four logic voters. Reliability analysis of HTR-PM RPS is based on fault tree model. A fault tree is built based on HTR-PM RPS Failure Modes and Effects Analysis (FMEA), and special analysis is focused on the sub-tree of redundant channel ''2-out-of-4'' logic and the fault tree under one channel is bypassed. The qualitative analysis of fault tree, such as RPS weakness according to minimal cut sets, is summarized in the paper. (author)

  11. Digital methods for mediated discourse analysis

    DEFF Research Database (Denmark)

    Kjær, Malene; Larsen, Malene Charlotte

    2015-01-01

    , restrictions or privately mediated settings. Having used mediated discourse analysis (Scollon 2002, Scollon & Scollon, 2004) as a framework in two different research projects, we show how the framework, in correlation with digital resources for data gathering, provides new understandings of 1) the daily......In this paper we discuss methodological strategies for collecting multimodal data using digital resources. The aim is to show how digital resources can provide ethnographic insights into mediated actions (Scollon, 2002) that can otherwise be difficult to observe or engage in, due to, for instance......) and online questionnaire data in order to capture mediated actions and discourses in practice....

  12. From Realities to Values: A Strategy Framework for Digital Natives

    Science.gov (United States)

    Blowers, Helene

    2010-01-01

    For many Digital Natives, text messaging or SMS is the communication channel of choice, but preferences in communication channels aren't the only distinguishing traits of Digital Natives. Attitudes and perceptions related to digital privacy, identity, creativity, piracy, and advocacy also help to set younger generations apart. So how does one take…

  13. Digital readout alpha survey instrument

    International Nuclear Information System (INIS)

    Jacobs, M.E.

    1976-01-01

    A prototype solid-state digital readout alpha particle survey instrument has been designed and constructed. The meter incorporates a Ludlum alpha scintillator as a detector, digital logic circuits for control and timing, and a Digilin counting module with reflective liquid crystal display. The device is used to monitor alpha radiation from a surface. Sample counts are totalized over 10-second intervals and displayed digitally in counts per minute up to 19,999. Tests over source samples with counts to 15,600 cpm have shown the device to be rapid, versatile and accurate. The instrument can be fabricated in one man-week and requires about $835 in material costs. A complete set of drawings is included

  14. Library management for the digital age a new paradigm

    CERN Document Server

    Todaro, Julie

    2014-01-01

    This revolutionary introduction to library management is the first conceived in and written for a digital age. Library Management for the Digital Age covers hierarchies, policies, communication, working relationships, facilities, human resources, settings, customer services, budgeting, and emergency management.

  15. A Study on the Exposure Parameter and the Patient Dose for Digital Radiography System in Daegoo

    International Nuclear Information System (INIS)

    Jo, Gwang Ho; Kang, Yeopng Han; Kim, Bu Sun

    2008-01-01

    Digital imaging for general radiography has many advantages over the film/screen systems, including a wider dynamic range and the ability to manipulate the images produced. The wider range means that acceptable images may by acquired at a range of dose levels, and therefore repeat exposures can be reduced. Digital imaging can result in the over use of radiation, however, because there is a tendency can be reduced. Digital imaging can result in the over use of radiation, however, because there is a tendency for images to be acquired at too high a dose. We investigated the actual exposure dose conditions on general radiography and a questionnaire survey was conducted with radiotechnologiest at medical institutions using digital radiology system. As a results, the dose of exposure was not controlled with patient's figure and dose optimization but was controlled by worker's convenience and image quality. Radio-technologiests often set up the exposure dose regardless of patient figure and body part to be examined. Many organizations, such as the International Commission on Radiological Protection, recommend to keep the dose as low as possible. In addition, they strongly recommend to keep the optimal but minimal dosage by proper training programs and constant quality control, including frequent patient dose evaluations and education.

  16. eCTG: an automatic procedure to extract digital cardiotocographic signals from digital images.

    Science.gov (United States)

    Sbrollini, Agnese; Agostinelli, Angela; Marcantoni, Ilaria; Morettini, Micaela; Burattini, Luca; Di Nardo, Francesco; Fioretti, Sandro; Burattini, Laura

    2018-03-01

    Cardiotocography (CTG), consisting in the simultaneous recording of fetal heart rate (FHR) and maternal uterine contractions (UC), is a popular clinical test to assess fetal health status. Typically, CTG machines provide paper reports that are visually interpreted by clinicians. Consequently, visual CTG interpretation depends on clinician's experience and has a poor reproducibility. The lack of databases containing digital CTG signals has limited number and importance of retrospective studies finalized to set up procedures for automatic CTG analysis that could contrast visual CTG interpretation subjectivity. In order to help overcoming this problem, this study proposes an electronic procedure, termed eCTG, to extract digital CTG signals from digital CTG images, possibly obtainable by scanning paper CTG reports. eCTG was specifically designed to extract digital CTG signals from digital CTG images. It includes four main steps: pre-processing, Otsu's global thresholding, signal extraction and signal calibration. Its validation was performed by means of the "CTU-UHB Intrapartum Cardiotocography Database" by Physionet, that contains digital signals of 552 CTG recordings. Using MATLAB, each signal was plotted and saved as a digital image that was then submitted to eCTG. Digital CTG signals extracted by eCTG were eventually compared to corresponding signals directly available in the database. Comparison occurred in terms of signal similarity (evaluated by the correlation coefficient ρ, and the mean signal error MSE) and clinical features (including FHR baseline and variability; number, amplitude and duration of tachycardia, bradycardia, acceleration and deceleration episodes; number of early, variable, late and prolonged decelerations; and UC number, amplitude, duration and period). The value of ρ between eCTG and reference signals was 0.85 (P digital FHR and UC signals from digital CTG images. Copyright © 2018 Elsevier B.V. All rights reserved.

  17. Enhancing Privacy for Digital Rights Management

    NARCIS (Netherlands)

    Petkovic, M.; Conrado, C.; Schrijen, G.J.; Jonker, Willem

    2007-01-01

    This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users. The chapter proposes a privacy-preserving DRM

  18. Design of first reactor protection system prototype for C A R E M reactor

    International Nuclear Information System (INIS)

    Azcona, A; Lorenzo, G.; Maciel, F.; Fittipaldi, A

    2006-01-01

    In this paper we present the design of a prototype of the C A R E M Reactor Protection System, which is implemented on a basis of the digital platform T E L E P E R M X S.The proposed architecture for the Reactor Protection System (R P S) has 4 redundant trains composed by a complete set of sensors, a data acquisition computer and a processing computer.The information from the 4 processing computers goes into to a two voting units with a two out of four (2004) logic and its outputs are combined by a final actuation logic with a voting scheme of one out of two (1002).The prototype is implemented with a unique train.The train inputs are simulated by an Automatic Testing Unit.The pre-established test case or procedure results are fed back into the A T U.The choice of the digital platform T E L E P E R M X S for the R P S implementation allows versatility in the design stage and permits the prototype expansion due to its modular characteristic and the software tools flexibility [es

  19. Development of Protection and Control Unit for Distribution Substation

    Science.gov (United States)

    Iguchi, Fumiaki; Hayashi, Hideyuki; Takeuchi, Motohiro; Kido, Mitsuyasu; Kobayashi, Takashi; Yanaoka, Atsushi

    The Recently, electronics and IT technologies have been rapidly innovated and have been introduced to power system protection & control system to achieve high reliability, maintainability and more functionality. Concerning the distribution substation application, digital relays have been applied for more than 10 years. Because of a number of electronic devices used for it, product cost becomes higher. Also, products installed during the past high-growth period will be at the end of lifetime and will be replaced. Therefore, replacing market is expected to grow and the reduction of cost is demanded. Considering above mentioned background, second generation digital protection and control unit as a successor is designed to have following concepts. Functional integration based on advanced digital technologies, Ethernet LAN based indoor communication network, cost reduction and downsizing. Pondering above concepts, integration of protection and control function is adopted in contrary to the functional segregation applied to the previous system in order to achieve one-unit concept. Also the adoption of Ethernet LAN for inter-unit communication is objective. This report shows the development of second-generation digital relay for distribution substation, which is equipped with control function and Ethernet LAN by reducing the size of auxiliary transformer unit and the same size as previous product is realized.

  20. Digital broadcasting set to transform communication landscape by 2015: RRC-06

    CERN Multimedia

    2006-01-01

    "The conclusion of ITU's Regional Radiocommuncation Conference (RRC-06) in Geneva saw the signing of a treaty agreement that is a major step in implementing World Summit on the Information Society objectives. The digitalization of broadcasting in Europe, Africa, Middle East and the Islamic Republic of Iran by 2015 represents a major landmark towards establishing a more equitable, just and people-centred Information Society." (2 pages)

  1. Development of digital shade guides for color assessment using a digital camera with ring flashes.

    Science.gov (United States)

    Tung, Oi-Hong; Lai, Yu-Lin; Ho, Yi-Ching; Chou, I-Chiang; Lee, Shyh-Yuan

    2011-02-01

    Digital photographs taken with cameras and ring flashes are commonly used for dental documentation. We hypothesized that different illuminants and camera's white balance setups shall influence color rendering of digital images and affect the effectiveness of color matching using digital images. Fifteen ceramic disks of different shades were fabricated and photographed with a digital camera in both automatic white balance (AWB) and custom white balance (CWB) under either light-emitting diode (LED) or electronic ring flash. The Commission Internationale d'Éclairage L*a*b* parameters of the captured images were derived from Photoshop software and served as digital shade guides. We found significantly high correlation coefficients (r² > 0.96) between the respective spectrophotometer standards and those shade guides generated in CWB setups. Moreover, the accuracy of color matching of another set of ceramic disks using digital shade guides, which was verified by ten operators, improved from 67% in AWB to 93% in CWB under LED illuminants. Probably, because of the inconsistent performance of the flashlight and specular reflection, the digital images captured under electronic ring flash in both white balance setups revealed less reliable and relative low-matching ability. In conclusion, the reliability of color matching with digital images is much influenced by the illuminants and camera's white balance setups, while digital shade guides derived under LED illuminants with CWB demonstrate applicable potential in the fields of color assessments.

  2. New modified map for digital image encryption and its performance

    Science.gov (United States)

    Suryadi, MT; Yus Trinity Irsan, Maria; Satria, Yudi

    2017-10-01

    Protection to classified digital data becomes so important in avoiding data manipulation and alteration. The focus of this paper is in data and information protection of digital images form. Protection is provided in the form of encrypted digital image. The encryption process uses a new map, {x}n+1=\\frac{rλ {x}n}{1+λ {(1-{x}n)}2}\\quad ({mod} 1), which is called MS map. This paper will show: the results of digital image encryption using MS map and how the performance is regarding the average time needed for encryption/decryption process; randomness of key stream sequence with NIST test, histogram analysis and goodness of fit test, quality of the decrypted image by PSNR, initial value sensitivity level, and key space. The results show that the average time of the encryption process is relatively same as the decryption process and it depends to types and sizes of the image. Cipherimage (encrypted image) is uniformly distributed since: it passes the goodness of fit test and also the histogram of the cipherimage is flat; key stream, that are generated by MS map, passes frequency (monobit) test, and runs test, which means the key stream is a random sequence; the decrypted image has same quality as the original image; and initial value sensitivity reaches 10-17, and key space reaches 3.24 × 10634. So, that encryption algorithm generated by MS map is more resistant to brute-force attack and known plaintext attack.

  3. The feasibility of digital pen and paper technology for vital sign data capture in acute care settings.

    Science.gov (United States)

    Dykes, Patricia C; Benoit, Angela; Chang, Frank; Gallagher, Joan; Li, Qi; Spurr, Cindy; McGrath, E Jan; Kilroy, Susan M; Prater, Marita

    2006-01-01

    The transition from paper to electronic documentation systems in acute care settings is often gradual and characterized by a period in which paper and electronic processes coexist. Intermediate technologies are needed to "bridge" the gap between paper and electronic systems as a means to improve work flow efficiency through data acquisition at the point of care in structured formats to inform decision support and facilitate reuse. The purpose of this paper is to report on the findings of a study conducted on three acute care units at Brigham and Women's Hospital and Massachusetts General Hospital in Boston, MA to evaluate the feasibility of digital pen and paper technology as a means to capture vital sign data in the context of acute care workflows and to make data available in a flow sheet in the electronic medical record.

  4. SMART core protection system design

    International Nuclear Information System (INIS)

    Lee, J. K.; Park, H. Y.; Koo, I. S.; Park, H. S.; Kim, J. S.; Son, C. H.

    2003-01-01

    SMART COre Protection System(SCOPS) is designed with real-tims Digital Signal Processor(DSP) board and Network Interface Card(NIC) board. SCOPS has a Control Rod POSition (CRPOS) software module while Core Protection Calculator System(CPCS) consists of Core Protection Calculators(CPCs) and Control Element Assembly(CEA) Calculators(CEACs) in the commercial nuclear plant. It's not necessary to have a independent cabinets for SCOPS because SCOPS is physically very small. Then SCOPS is designed to share the cabinets with Plant Protection System(PPS) of SMART. Therefor it's very easy to maintain the system because CRPOS module is used instead of the computer with operating system

  5. Open data and digital morphology

    Science.gov (United States)

    Davies, Thomas G.; Cunningham, John A.; Asher, Robert J.; Bates, Karl T.; Bengtson, Stefan; Benson, Roger B. J.; Boyer, Doug M.; Braga, José; Dong, Xi-Ping; Evans, Alistair R.; Friedman, Matt; Garwood, Russell J.; Goswami, Anjali; Hutchinson, John R.; Jeffery, Nathan S.; Lebrun, Renaud; Martínez-Pérez, Carlos; O'Higgins, Paul M.; Orliac, Maëva; Rowe, Timothy B.; Sánchez-Villagra, Marcelo R.; Shubin, Neil H.; Starck, J. Matthias; Stringer, Chris; Summers, Adam P.; Sutton, Mark D.; Walsh, Stig A.; Weisbecker, Vera; Witmer, Lawrence M.; Wroe, Stephen; Yin, Zongjun

    2017-01-01

    Over the past two decades, the development of methods for visualizing and analysing specimens digitally, in three and even four dimensions, has transformed the study of living and fossil organisms. However, the initial promise that the widespread application of such methods would facilitate access to the underlying digital data has not been fully achieved. The underlying datasets for many published studies are not readily or freely available, introducing a barrier to verification and reproducibility, and the reuse of data. There is no current agreement or policy on the amount and type of data that should be made available alongside studies that use, and in some cases are wholly reliant on, digital morphology. Here, we propose a set of recommendations for minimum standards and additional best practice for three-dimensional digital data publication, and review the issues around data storage, management and accessibility. PMID:28404779

  6. DIGITAL LIBRARIES IN INDONESIA WITH SPECIAL EMPHASIS TO ACADEMIC LIBRARIES

    OpenAIRE

    Sulistiyo Basuki

    2012-01-01

    There are many definitions about digital library, however, this paper used the definition taken from Digital Library Federation which stated that digital library as organizations that provide the resources, including the specialized staff, to select, structure, offer intellectual access to interpret, distribute, preserve the integrity of, and ensure the persistence over time of collections of digital works so that they are readily and economically available for use by defined community or set...

  7. Digital Culture and Digital Library

    Directory of Open Access Journals (Sweden)

    Yalçın Yalçınkaya

    2016-12-01

    Full Text Available In this study; digital culture and digital library which have a vital connection with each other are examined together. The content of the research consists of the interaction of culture, information, digital culture, intellectual technologies, and digital library concepts. The study is an entry work to integrity of digital culture and digital library theories and aims to expand the symmetry. The purpose of the study is to emphasize the relation between the digital culture and digital library theories acting intersection of the subjects that are examined. Also the perspective of the study is based on examining the literature and analytical evaluation in both studies (digital culture and digital library. Within this context, the methodology of the study is essentially descriptive and has an attribute for the transmission and synthesis of distributed findings produced in the field of the research. According to the findings of the study results, digital culture is an inclusive term that describes the effects of intellectual technologies in the field of information and communication. Information becomes energy and the spectrum of the information is expanding in the vertical rise through the digital culture. In this context, the digital library appears as a new living space of a new environment. In essence, the digital library is information-oriented; has intellectual technology support and digital platform; is in a digital format; combines information resources and tools in relationship/communication/cooperation by connectedness, and also it is the dynamic face of the digital culture in time and space independence. Resolved with the study is that the digital libraries are active and effective in the formation of global knowing and/or mass wisdom in the process of digital culture.

  8. Broadband set-top box using MAP-CA processor

    Science.gov (United States)

    Bush, John E.; Lee, Woobin; Basoglu, Chris

    2001-12-01

    Advances in broadband access are expected to exert a profound impact in our everyday life. It will be the key to the digital convergence of communication, computer and consumer equipment. A common thread that facilitates this convergence comprises digital media and Internet. To address this market, Equator Technologies, Inc., is developing the Dolphin broadband set-top box reference platform using its MAP-CA Broadband Signal ProcessorT chip. The Dolphin reference platform is a universal media platform for display and presentation of digital contents on end-user entertainment systems. The objective of the Dolphin reference platform is to provide a complete set-top box system based on the MAP-CA processor. It includes all the necessary hardware and software components for the emerging broadcast and the broadband digital media market based on IP protocols. Such reference design requires a broadband Internet access and high-performance digital signal processing. By using the MAP-CA processor, the Dolphin reference platform is completely programmable, allowing various codecs to be implemented in software, such as MPEG-2, MPEG-4, H.263 and proprietary codecs. The software implementation also enables field upgrades to keep pace with evolving technology and industry demands.

  9. Modeling digital switching circuits with linear algebra

    CERN Document Server

    Thornton, Mitchell A

    2014-01-01

    Modeling Digital Switching Circuits with Linear Algebra describes an approach for modeling digital information and circuitry that is an alternative to Boolean algebra. While the Boolean algebraic model has been wildly successful and is responsible for many advances in modern information technology, the approach described in this book offers new insight and different ways of solving problems. Modeling the bit as a vector instead of a scalar value in the set {0, 1} allows digital circuits to be characterized with transfer functions in the form of a linear transformation matrix. The use of transf

  10. Neutronic control instrumentation of protection systems

    International Nuclear Information System (INIS)

    Furet, J.

    1977-01-01

    The aims of neutronic control instrumentation are briefly recalled and the present status of materials research and development is presented. As for the out-of-pile instrumentation, emphasis is put on the reliability and efficiency of the detectors and the new solutions of electric signal processing. The possible reactivity measurements at rest are examined. As for in-pile instrumentation results relating to mobile detectors of the type of miniaturized fission chambers are presented. The radiation tests on course of development for several years in the working conditions of neutron self-powdered detectors are analyzed so as to show that their use as built-in in-core instrumentation is to be envisaged at short term. Basic options inherent to the 'Nuclear Safety' philosophy that define the protection system are recalled. A definition and a justification of the performance testing of the instrumentation at rest and in-service are then derived. Some new solutions are envisaged for processing the digital data obtained from the various sensors . A quality control of the materials setting conditions (especially electric noise) ensures a high reliability and availability of the materials involved in the neutron control and the protection system in working conditions [fr

  11. Parameters-adjustable front-end controller in digital nuclear measurement system

    International Nuclear Information System (INIS)

    Hao Dejian; Zhang Ruanyu; Yan Yangyang; Wang Peng; Tang Changjian

    2013-01-01

    Background: One digitizer is used to implement a digital nuclear measurement for the acquisition of nuclear information. Purpose: A principle and method of a parameter-adjustable front-end controller is presented for the sake of reducing the quantitative errors while getting the maximum ENOB (effective number of bits) of ADC (analog-to-digital converter) during waveform digitizing, as well as reducing the losing counts. Methods: First of all, the quantitative relationship among the radiation count rate (n), the amplitude of input signal (V in ), the conversion scale of ADC (±V) and the amplification factor (A) was derived. Secondly, the hardware and software of the front-end controller were designed to fulfill matching the output of different detectors, adjusting the amplification linearly through the control of channel switching, and setting of digital potentiometer by CPLD (Complex Programmable Logic Device). Results: (1) Through the measurement of γ-ray of Am-241 under our digital nuclear measurement set-up with CZT detector, it was validated that the amplitude of output signal of detectors of RC feedback type could be amplified linearly with adjustable amplification by the front-end controller. (2) Through the measurement of X-ray spectrum of Fe-5.5 under our digital nuclear measurement set-up with Si-PIN detector, it was validated that the front-end controller was suitable for the switch resetting type detectors, by which high precision measurement under various count rates could be fulfilled. Conclusion: The principle and method of the parameter-adjustable front-end controller presented in this paper is correct and feasible. (authors)

  12. Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    Organizations rely on physical, digital and social mechanisms to protect their IT systems. Of all IT systems, laptops are probably the most troublesome to protect, since they are easy to remove and conceal. When the thief has physical possession of the laptop, it is also difficult to protect the

  13. Digital subtraction angiography system evaluation with phantoms

    International Nuclear Information System (INIS)

    Wenstrup, R.S.; Sweeney, K.P.; Scholz, F.J.

    1985-01-01

    Advances in digital subtraction angiography imaging demonstrate the need for critical evaluation of the performance of digital subtraction equipment. The design of a phantom set for noninvasive assessment of the imaging quality of digital subtraction equipment is described; components include a remotely controlled transport system and individual patterns to evaluate the contrast and detail properties of the image intensifier, low-contrast sensitivity and resolution of the system, geometric distortion of image, linearity, mechanical and electronic stability of equipment, and effects of bone and bowel gas on iodine perception. The performance of an add-on digital radiographic system is presented, along with radiation exposure levels at the image intensifier for a range of radiographic techniques

  14. Prognostic factors in sensory recovery after digital nerve repair.

    Science.gov (United States)

    Bulut, Tuğrul; Akgün, Ulaş; Çıtlak, Atilla; Aslan, Cihan; Şener, Ufuk; Şener, Muhittin

    2016-01-01

    The prognostic factors that affect sensory nerve recovery after digital nerve repair are variable because of nonhomogeneous data, subjective tests, and different assessment/scoring methods. The aim of this study was to evaluate the success of sensory nerve recovery after digital nerve repair and to investigate the prognostic factors in sensorial healing. Ninety-six digital nerve repairs of 63 patients were retrospectively evaluated. All nerves were repaired with end-to-end neurorraphy. The static two-point discrimination (s2PD) and Semmes Weinstein monofilament (SWM) tests were performed to evaluate sensory recovery. The association between prognostic factors such as gender, age, involved digit, time from injury to repair, length of follow-up, smoking, concomitant injuries, type of injury, and sensory recovery results were assessed. The s2PD test demonstrated excellent results in 26 nerves (27%), good results in 61 nerves (64%), and poor results in 9 nerves (9%). The results of the SWM test according to Imai classification showed that 31 nerves (32%) were normal, light touch was diminished in 38 nerves (40%), protective sensation was diminished in 17 nerves (18%), loss of protective sensation occurred in 5 nerves (5%), and 5 nerves (5%) were anesthetic. There was a negative relationship between age, smoking, concomitant injuries, and sensory recovery. Our results demonstrate that concomitant tendon, bone and vascular injuries, older age, and smoking were associated with worse sensory nerve recovery results. However, all digital nerve injuries should be repaired, regardless of these prognostic factors.

  15. Protective Behavior in Games

    NARCIS (Netherlands)

    Fiestras-Janeiro, G.; Borm, P.E.M.; van Megen, F.J.C.

    1996-01-01

    This paper introduces the notion of protective equilibrium in the context of fin ite games in strategic form.It shows that for matrix games the set of protective equilibria equals the set of proper equilibria.Moreover, in the context of bima trix games, the notion of protective behaviour is used as

  16. Privacy in Digital Age: Dead or Alive?! Regarding the New EU Data Protection Regulations

    Directory of Open Access Journals (Sweden)

    Seyed Ebrahim Dorraji

    2015-02-01

    Full Text Available Purpose – To review and critically discuss the current state of privacy in the context of constant technological changes and to emphasize the pace of technological advancements and developments reached over the time when the last EU data protection laws came into effect. These facts inevitably affect the perception of privacy and raise the question of whether privacy is dead or takes the last breath in the digital age? This paper is an attempt to address this question.Design/Methodology/Approach – Based on the comparison and systematic analysis of scientific literature, the authors discuss problematic issues related to privacy and data protection in the technology era – where these issues are too complicated to be clearly regulated by laws and rules since “laws move as a function of years and technology moves as a function of months” (Ron Rivest. Therefore, this analytical approach towards the issue may help to facilitate reaching the best-fit decision in this area.Findings – The authors emphasize the change of perception of privacy, which originated and grew on the idea of “an integral part of our humanity”, the “heart of our liberty” and “the beginning of all freedoms” (Solove, 2008, leading to the recently raised idea that privacy is severely hanging with threat. The authors are of the opinion that legislation and regulation may be one of the best and effective techniques for protecting privacy in the twenty-first century, but it is not currently adequate (Wacks, 2012. One of the solutions lies in technology design.Research limitations/implications – The aspects of privacy and data protection in the European Union have been widely discussed recently because of their broad applicability. Therefore, it is hardly possible to review and cover all the important aspects of the issue. This article focuses on the roles of technology and legislation in securing privacy. The authors examine and provide their own views based on

  17. The myths of the digital native and the multitasker

    NARCIS (Netherlands)

    Kirschner, Paul A.; De Bruyckere, Pedro

    2018-01-01

    Current discussions about educational policy and practice are often embedded in a mind-set that considers students who were born in an age of omnipresent digital media to be fundamentally different from previous generations of students. These students have been labelled digital natives and have

  18. The Challenges of Designing Digital Services for Multiple Mobile Platforms

    DEFF Research Database (Denmark)

    Ghazawneh, Ahmad

    2016-01-01

    on a multiple case study of three mobile application development firms from Sweden, Denmark and Norway, we synthesize the digital service design taxonomy to understand the challenges faced by third-party developers. Our study identifies a set of challenges in four different levels: user level, platform level...... to tap into and join the digital ecosystem. However, while there is an emerging literature on designing digital services, little empirical evidence exists about challenges faced by third-party developers while designing digital services, and in particular for multiple mobile platforms. Drawing......The value of digital services is increasingly recognized by owners of digital platforms. These services have central role in building and sustaining the business of the digital platform. In order to sustain the design of digital services, owners of digital platforms encourage third-party developers...

  19. 77 FR 9187 - Carriage of Digital Television Broadcast Signals: Amendment to the Commission's Rules

    Science.gov (United States)

    2012-02-16

    ... Digital Television Broadcast Signals: Amendment to the Commission's Rules AGENCY: Federal Communications... native format (e.g., .doc, .xml, .ppt, searchable .pdf). Participants in this proceeding should... Commission adopted certain rules to protect consumers as the transition to digital television (DTV...

  20. From Process to Practice: Towards a Practice-Based Model of Digital Innovation

    DEFF Research Database (Denmark)

    Ciriello, Raffaele; Richter, Alexander; Schwabe, Gerhard

    2017-01-01

    companies and an extensive set of empirical data, this paper conceptualizes four interrelated digital innovation practices, namely making sense of an idea, aligning mental models, negotiating solution paths, and crafting an idea. We suggest a practice-based model of digital innovation, specify a set......The ongoing digitalization of many corporate functions, including the innovation process, brings about fundamental changes that urge us to rethink established theories. Facilitating digital innovation requires a deep understanding of the actual practices that are carried out by innovating people...... with the help of artifacts. In this paper, we study the use of artifacts and illustrate their different roles in the underlying innovation practices to provide rich insights into digital innovation from a practice perspective. Grounded in a nearly three year-long, qualitative case study at two Swiss software...

  1. Analog subsystem for the plutonium protection system

    International Nuclear Information System (INIS)

    Arlowe, H.D.

    1978-12-01

    An analog subsystem is described which monitors certain functions in the Plutonium Protection System. Rotary and linear potentiometer output signals are digitized, as are the outputs from thermistors and container ''bulge'' sensors. This work was sponsored by the Department of Energy/Office of Safeguards and Security (DOE/OSS) as part of the overall Sandia Fixed Facility Physical Protection Program

  2. Determination of the protection set-points lines for the Angra-1 reactor core

    International Nuclear Information System (INIS)

    Furieri, E.B.

    1980-03-01

    In this work several thermo-hidraulic calculation were performed to obtain Protection set-points lines for the Angra-1 reactor core in order to compare with the values presented by the vendor in the FSAR. These lines are the locus of points where DNBR min = 1,3 and power = 1,18 x P nominal as a function of ΔT m and T m , the temperature difference and the average coolant temperature between hot and cold legs. A computation scheme was developed using COBRA-IIIF as a subroutine of a new main program and adding new subroutines in order to obtain the desired DNBR. The solution is obtained through a convergentce procedure using parameters estimated in a sensivity study. (author) [pt

  3. Digital implementation of a neural network for imaging

    Science.gov (United States)

    Wood, Richard; McGlashan, Alex; Yatulis, Jay; Mascher, Peter; Bruce, Ian

    2012-10-01

    This paper outlines the design and testing of a digital imaging system that utilizes an artificial neural network with unsupervised and supervised learning to convert streaming input (real time) image space into parameter space. The primary objective of this work is to investigate the effectiveness of using a neural network to significantly reduce the information density of streaming images so that objects can be readily identified by a limited set of primary parameters and act as an enhanced human machine interface (HMI). Many applications are envisioned including use in biomedical imaging, anomaly detection and as an assistive device for the visually impaired. A digital circuit was designed and tested using a Field Programmable Gate Array (FPGA) and an off the shelf digital camera. Our results indicate that the networks can be readily trained when subject to limited sets of objects such as the alphabet. We can also separate limited object sets with rotational and positional invariance. The results also show that limited visual fields form with only local connectivity.

  4. H. Sapiens Digital: From Digital Immigrants and Digital Natives to Digital Wisdom

    Science.gov (United States)

    Prensky, Marc

    2009-01-01

    As we move further into the 21st century, the digital native/digital immigrant paradigm created by Marc Prensky in 2001 is becoming less relevant. In this article, Prensky suggests that we should focus instead on the development of what he calls "digital wisdom." Arguing that digital technology can make us not just smarter but truly wiser, Prensky…

  5. A study on the development of an automatic fault diagnosis system for testing NPP digital electronic circuits

    International Nuclear Information System (INIS)

    Kim, Dae Sik

    1993-02-01

    This paper describes a study on the development of an automatic fault diagnosis system for testing digital electronic circuits of nuclear power plants. Compared with the other conventional fault diagnosis systems, the system described in this paper uses Artificial Intelligence technique of model based reasoning and corroboration, which makes fault diagnosis much more efficient. In order to reduce the testing time, an optimal testing set which means a minimal testing set to determine whether or not the circuit is fault-free and to locate the faulty gate was derived. Compared with the testing using an exhaustive testing set, the testing using the optimal testing set makes fault diagnosis much more fast. Since the system diagnoses the circuit boards bases only on input and output signals, it can be further developed for on-line testing. The system was implemented on a microprocessor and was applied for Universal Circuit board testing of the Solid State protection System in nuclear power plants

  6. NAIP Digital Ortho Photo Image 2010

    Data.gov (United States)

    Kansas Data Access and Support Center — This data set contains imagery from the National Agriculture Imagery Program (NAIP). NAIP acquires digital ortho imagery during the agricultural growing seasons in...

  7. Re-Mixing Multimodal Resources: Multiliteracies and Digital Production in Norwegian Media Education

    Science.gov (United States)

    Erstad, Ola; Gilje, Oystein; de Lange, Thomas

    2007-01-01

    Youngsters are increasingly using digital technologies through participation in informal settings. Schools, however, seem to be struggling with implementing digital technologies into formal school activities. With the impact of digital technologies, media education can be seen as an increasingly important "transactional learning space"…

  8. Method and apparatus for digitally based high speed x-ray spectrometer

    International Nuclear Information System (INIS)

    Warburton, W.K.; Hubbard, B.

    1997-01-01

    A high speed, digitally based, signal processing system which accepts input data from a detector-preamplifier and produces a spectral analysis of the x-rays illuminating the detector. The system achieves high throughputs at low cost by dividing the required digital processing steps between a ''hardwired'' processor implemented in combinatorial digital logic, which detects the presence of the x-ray signals in the digitized data stream and extracts filtered estimates of their amplitudes, and a programmable digital signal processing computer, which refines the filtered amplitude estimates and bins them to produce the desired spectral analysis. One set of algorithms allow this hybrid system to match the resolution of analog systems while operating at much higher data rates. A second set of algorithms implemented in the processor allow the system to be self calibrating as well. The same processor also handles the interface to an external control computer. 19 figs

  9. Digital Collections, Digital Libraries and the Digitization of Cultural Heritage Information.

    Science.gov (United States)

    Lynch, Clifford

    2002-01-01

    Discusses the development of digital collections and digital libraries. Topics include digitization of cultural heritage information; broadband issues; lack of compelling content; training issues; types of materials being digitized; sustainability; digital preservation; infrastructure; digital images; data mining; and future possibilities for…

  10. Digital privacy in Asia: Setting the agenda | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-06-09

    Jun 9, 2016 ... The report, A New Dawn: Privacy in Asia, summarizes the findings of the research. ... among citizens about protecting their personal data and Internet privacy. ... A study on mobile phone use by the poor has resulted in the ...

  11. Introduction of the digitization software GDgraph

    International Nuclear Information System (INIS)

    Chen Guochang; Jin Yongli; Wang Jimin

    2015-01-01

    The evaluators and experimenters always desire to have full and latest experimental data sets. However, the data are often published as figures without any numerical values for some publications or journals. Furthermore, the quality of figures is not always good enough, especially for some figures scanned from the hard copy of old publications. On the other hand, the researchers would like to retrieve the data directly from EXFOR database. Digitization of figures is only one method to obtain the numerical data and correlative uncertainty, when there are only figures available from publications. Therefore we need a digitization tool to fit the requirements from evaluation, measurement and EXFOR compilation in CNDC. Before 2000, there have no common software to digitize experimental and evaluated data. And the quality of digitization results can not fit the requirements of evaluation and measurement using the traditional coordinate paper or rule. The end of twenty century, the PC was developed so quickly that to develop a software for digitization purpose become possible. Since 1997, CNDC devotes to design and develop a software for digitization. Four years later, the first version of digitization software GDGraph was developed using VC++ and released in CNDC. Although, the functions of the 1 st version of GDGraph is fit the basic requirements of digitization only, in which can digitize one group data excluding data error, BMP image format only, and it can not randomly delete digitizing data points. However, it obtains higher quality digitizing results and efficiency than the traditional method

  12. Protective Behavior in Games

    OpenAIRE

    Fiestras-Janeiro, G.; Borm, P.E.M.; van Megen, F.J.C.

    1996-01-01

    This paper introduces the notion of protective equilibrium in the context of fin ite games in strategic form.It shows that for matrix games the set of protective equilibria equals the set of proper equilibria.Moreover, in the context of bima trix games, the notion of protective behaviour is used as a refinement tool.

  13. Selecting suitable enclosures for digitally printed materials

    International Nuclear Information System (INIS)

    Burge, D; Rima, L

    2010-01-01

    It cannot be assumed that storage enclosures considered safe for traditionally printed images and documents are suitable for modern, digitally printed materials. In this project, a large variety of digital print types were tested using a modified version of the ISO 18916 Imaging materials-Processed imaging materials-Photographic activity test for enclosure materials standard to assess the risk to digital prints by paper enclosures known to be inert or reactive with traditional photographic prints. The types of enclosures tested included buffered and non-buffered cotton papers, and groundwood paper. In addition, qualitative filter paper that had been wetted and dried with either an acidic or basic solution was also tested to determine the effects of enclosure pH on digitally printed materials. It was determined that, in general, digital prints tended to be less reactive with various enclosure types than traditional prints. Digital prints were most sensitive to paper that contained groundwood. The enclosure reactivity test results were then integrated with previous published work on the tendencies of various enclosure types to abrade, ferrotype, or block to digital prints in order to create a comprehensive set of recommendations for digital print storage enclosures.

  14. Tomosynthesis and contrast-enhanced digital mammography: recent advances in digital mammography

    International Nuclear Information System (INIS)

    Diekmann, Felix; Bick, Ulrich

    2007-01-01

    Digital mammography is more and more replacing conventional mammography. Initial concerns about an inferior image quality of digital mammography have been largely overcome and recent studies even show digital mammography to be superior in women with dense breasts, while at the same time reducing radiation exposure. Nevertheless, an important limitation of digital mammography remains: namely, the fact that summation may obscure lesions in dense breast tissue. However, digital mammography offers the option of so-called advanced applications, and two of these, contrast-enhanced mammography and tomosynthesis, are promising candidates for improving the detection of breast lesions otherwise obscured by the summation of dense tissue. Two techniques of contrast-enhanced mammography are available: temporal subtraction of images acquired before and after contrast administration and the so-called dual-energy technique, which means that pairs of low/high-energy images acquired after contrast administration are subtracted. Tomosynthesis on the other hand provides three-dimensional information on the breast. The images are acquired with different angulations of the X-ray tube while the object or detector is static. Various reconstruction algorithms can then be applied to the set of typically nine to 28 source images to reconstruct 1-mm slices with a reduced risk of obscuring pathology. Combinations of both advanced applications have only been investigated in individual experimental studies; more advanced software algorithms and CAD systems are still in their infancy and have only undergone preliminary clinical evaluation. (orig.)

  15. Evaluation of fault coverage for digitalized system in nuclear power plants using VHDL

    International Nuclear Information System (INIS)

    Kim, Suk Joon; Lee, Jun Suk; Seong, Poong Hyun

    2003-01-01

    Fault coverage of digital systems is found to be one of the most important factors in the safety analysis of nuclear power plants. Several axiomatic models for the estimation of fault coverage of digital systems have been proposed, but to apply those axiomatic models to real digital systems, parameters that the axiomatic models require should be approximated using analytic methods, empirical methods or expert opinions. In this paper, we apply the fault injection method to VHDL computer simulation model of a real digital system which provides the protection function to nuclear power plants, for the approximation of fault detection coverage of the digital system. As a result, the fault detection coverage of the digital system could be obtained

  16. Digital Social Science Lab

    DEFF Research Database (Denmark)

    Svendsen, Michael; Lauersen, Christian Ulrich

    2015-01-01

    At the Faculty Library of Social Sciences (part of Copenhagen University Library) we are currently working intensely towards the establishment of a Digital Social Science Lab (DSSL). The purpose of the lab is to connect research, education and learning processes with the use of digital tools...... at the Faculty of Social Sciences. DSSL will host and facilitate an 80 m2 large mobile and intelligent study- and learning environment with a focus on academic events, teaching and collaboration. Besides the physical settings DSSL has two primary functions: 1. To implement relevant social scientific software...... and hardware at the disposal for students and staff at The Faculty of Social Sciences along with instruction and teaching in the different types of software, e.g. Stata, Nvivo, Atlas.ti, R Studio, Zotero and GIS-software. 2. To facilitate academic events focusing on use of digital tools and analytic software...

  17. OpenNet Initiative - Asia : Digital Censorship and Surveillance ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Drawing on arguments such as "securing intellectual property rights," "protecting national security," "preserving cultural norms and religious values," or "shielding children from pornography and exploitation," several states and corporations have installed extensive filtering practices to control certain uses of digital media.

  18. PSA based vulnerability and protectability analysis for NPPs

    International Nuclear Information System (INIS)

    Gopika, V.; Sanyasi Rao, V.V.S.; Ghosh, A.K.; Kushwaha, H.S.

    2012-01-01

    Highlights: ► The paper describes the generation of location sets and protection sets. ► Vulnerability and protectability used to rank location sets and protection sets. ► Ranking helps in adequacy of protection measures employed in various locations. ► The procedure for PSA based vital area identification is demonstrated. ► This method has found practical applicability for Indian NPP. -- Abstract: Identification of vital areas in a facility involves assessing the facility and the locations, whose sabotage can result in undesirable (radiological) consequences. Probabilistic Safety Assessment (PSA) technique can find the component failures leading to core damage (a surrogate for radiological consequence) in a systematic manner, which can be extended to identification of vital areas. This paper describes the procedure for the generation of location sets (set of locations whose sabotage can lead to possible core damage) and protection sets (set of locations that must be protected to prevent possible core damage). In addition, measures such as vulnerability and protectability have been introduced, which can be used to rank location sets and protection sets.

  19. Protecting sources: from shield laws to Wikileaks

    Directory of Open Access Journals (Sweden)

    Mélanie Dupéré

    2015-09-01

    Full Text Available This paper focuses on recent developments in the right and ability of journalists to protect their sources’ anonymity in the United Kingdom, particularly in light of the Snowden revelations of June 2013, and the significance of collaboration between the global online media organization Wikileaks and mainstream news organisations. It explores two key difficulties faced by journalists: the notion of a qualified professional privilege and the unknown extent of covert requests by public authorities for disclosure involving communications data and metadata. In doing so, it comments upon the opening filled by Wikileaks, which protects its sources’ anonymity through high data security and encryption. This paper’s findings tend to show that the covert practice of blanket mass digital surveillance of individual communications including journalists’ is undermining source protection and the rise of Wikileaks as an alternative model is challenging the traditional role of journalists as mediators and gatekeepers in the digital era.

  20. IT security standards for the digitalization of the energy transition; IT-Sicherheitsstandards fuer die Digitalisierung der Energiewende

    Energy Technology Data Exchange (ETDEWEB)

    Laupichler, Dennis [Bundesamt fuer Sicherheit in der Informationstechnik, Bonn (Germany). Referat D 11, Cyber-Sicherheit in der Digitalisierung

    2016-12-15

    Intelligent measuring systems are important components in the intelligent net and require security and privacy by design in this critical infrastructure. The smart meter gateway as secure communication platform makes the digital sector coupling possible and becomes the driver for innovations of the digitalization. The protection profiles and the technical rules of the BSI as essential part of the law for the digitalization of the energy transition guarantee a great amount of data protection and data security and provide a unique security standard in the future energy supply system. The data -protection concept of the intelligent measuring system regards a calibration-law conformal data processing and star-shaped data dispatch of the gateway. By this both a traceability and a transparency for the final user is guaranteed and the handling of the data in the sense of the data sovereignty is also technically enforced. For the evidences of compliance of the protection profiles and the technical rules correponding tests in approved test centers with final certification by the BSI are performed. The law for the digitalization of the energy transition makes the first important step to an innovative, digital infrastructure of the intelligent net. By the legal framework additionally a base is created, in order to perform a progressive development of the security targets of the BSI both for intelligent measuring systems as for further important system components of the intelligent energy net via a roadmap for the digitalization. In connection with the technical standards of the BSI the law creates the necessary legal certainty and realizes the aim pursued in the coalition treaty to regulate binding framework conditions for the secure and data-protection conformal application of intelligent measuring systems for diversified application cases in the intelligent net.

  1. Combined optical/digital security devices

    Science.gov (United States)

    Girnyk, Vladimir I.; Tverdokhleb, Igor V.; Ivanovsky, Andrey A.

    2000-04-01

    Modern holographic security devices used as emblems against counterfeiting are being more difficult as they should oppress criminal world. 2D, 3D, 3D rainbow holograms or simple diffraction structures protecting documents can not be acceptable against illegal copying of important documents, banknotes or valuable products. Recent developments in technology of Optical variable devices permit world leaders to create more advanced security elements: Kinegrams, Exelgrams, Pixelgrams, Kineforms. These products are used for protecting the most confidential documents and banknotes, but now even their security level can not be enough and besides their automatic identification is vulnerable to factors of instability. We elaborate new visual security devices based on the usage of expensive and advanced technology of combined optical/digital security devices. The technology unites digital and analogue methods of synthesis and recording of visual security devices. The analogue methods include techniques of optical holography - different combinations of 2D/3D, 3D, 2D/3D + 3D structures. Basing on them the design with elements of 3D graphics including security elements and hidden machine- readable images are implemented. The digital methods provide synthesis of optical variable devices including special security elements, computer generated holograms and Kineforms. Using them we create determined and quasi-random machine-readable images. Recordings are carried out using the combined optical and electronic submicrometer technology elaborated by Optronics, Ltd. The results obtained show effectiveness of the combined technology permitting to increase the security level essentially that should increase tamper and counterfeit resistance during many years.

  2. USDA-FSA-APFO Digital Ortho Mosaic

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — This data set contains imagery from the National Agricultural Imagery Program (NAIP). NAIP acquires digital ortho imagery during the agricultural growing seasons in...

  3. Digital LLRF System for RFQ

    International Nuclear Information System (INIS)

    Agashe, Alok; Motiwala, P.D.; Bharade, S.K.; Mohan, Shyam; Joshi, Gopal; Das, D.

    2015-01-01

    A Low level RF (LLRF) system based on digital techniques has been developed for RFQ of Low Energy High Intensity Proton Accelerator (LEHIPA). The basic LLRF system for RFQ is composed of a Front end analog module housed in a 19 inch bin and a 6U cPCI based Digital board having a high speed and high density FPGA onboard, supporting 32 bit/33MHz PCI ver2.0 protocol and housed in a 19 inch cPCI crate. It also has a cPCI based CPU board with QNX operating system. The cPCI crate is connected to control room via Ethernet. Analog module conditions the input field signals from RF cavity and makes it compatible to digital board. It also amplifies RF Drive signal (Modulator output) from digital board, which goes to high power amplifier. The digital board digitally processes the input RF signals, and generates RF drive signal, which after amplification, used for driving the resonant cavity. The main features of digital board are under-sampling of input RF signals, digital in-phase and quadrature detection, and a proportional- integral (PI) controller algorithm implemented in a FPGA. The LLRF system works in CW as well as in PULSE mode. It also has a DDS implemented in VHDL, used for conditioning and tracking/tuning of the cavity. LLRF system operates under QNX based equipment frontend application and client running from control room. One analog module and one digital board set, supports one resonant cavity. The present paper describes the development of an LLRF system and its results with a test cavity. (author)

  4. Digital stereoscopic imaging

    Science.gov (United States)

    Rao, A. Ravishankar; Jaimes, Alejandro

    1999-05-01

    The convergence of inexpensive digital cameras and cheap hardware for displaying stereoscopic images has created the right conditions for the proliferation of stereoscopic imagin applications. One application, which is of growing importance to museums and cultural institutions, consists of capturing and displaying 3D images of objects at multiple orientations. In this paper, we present our stereoscopic imaging system and methodology for semi-automatically capturing multiple orientation stereo views of objects in a studio setting, and demonstrate the superiority of using a high resolution, high fidelity digital color camera for stereoscopic object photography. We show the superior performance achieved with the IBM TDI-Pro 3000 digital camera developed at IBM Research. We examine various choices related to the camera parameters, image capture geometry, and suggest a range of optimum values that work well in practice. We also examine the effect of scene composition and background selection on the quality of the stereoscopic image display. We will demonstrate our technique with turntable views of objects from the IBM Corporate Archive.

  5. Digital teaching library (DTL) development for radiography education

    International Nuclear Information System (INIS)

    Cosson, Philip; Willis, Neil

    2012-01-01

    Purpose: Having access to a library of radiological images in the university setting is important for teaching and learning in diagnostic radiography. Modern modalities such as PETCT create data volumes rather than single static 2D images. A PACS repository of images alone does not constitute a teaching library without some text based searchable index. A review of several options for acquiring a digital teaching library (DTL) of such indexed DICOM data is presented. Discussion: The data protection principles, current guidance and potential methods for migrating and cleansing large quantities of DICOM data from a clinical PACS prior to transfer to a university setting is discussed. The chosen method is described and the important enabling technology identified. Various methods of index construction are outlined and a method of migrating and cleansing HL7 data from a clinical RIS described. Results: Three terabytes of de-normalised DICOM image files were cleansed of patient, staff and geographic identifiers, within the header tags and pixel data. These files were then migrated to an educational PACS hosted at a university. A searchable index database was created based on 90,200 reports and associated data, and 886,263 DICOM headers to enable meaningful results to be found from the 51,304 unique patient specific cases. Conclusion: A large DTL in the university setting using PACS technology is becoming a valuable resource for teaching, learning and assessment.

  6. How LEGO Built the Foundations and Enterprise Capabilities for Digital Leadership

    DEFF Research Database (Denmark)

    El Sawy, Omar; Henrik, Amsinck; Kræmmergaard, Pernille

    2016-01-01

    We define digital leadership as doing the right things for the strategic success of digitalization for the enterprise and its business ecosystem. Digital leadership means thinking differently about business strategy, business models, the IT function, enterprise platforms, mindsets and skill sets......, and the workplace. Based on the decade-long digitalization journey and experiences of the LEGO Group, this article provides insights on building the foundations for enhancing enterprise capabilities for digital leadership. Leveraging digitalization is one of the LEGO Group’s four strategic priorities...... and is fundamental to it being a world leader in its industry...

  7. Mechanical shape correlation : a novel integrated digital image correlation approach

    NARCIS (Netherlands)

    Kleinendorst, S.M.; Hoefnagels, J.P.M.; Geers, M.G.D.; Lamberti, L.; Lin, M.-T.; Furlong, C.; Sciammarella, C.

    2018-01-01

    Mechanical Shape Correlation (MSC) is a novel integrated digital image correlation technique, used to determine the optimal set of constitutive parameters to describe the experimentally observed mechanical behavior of a test specimen, based on digital images taken during the experiment. In contrast

  8. Digital Humanities and networked digital media

    DEFF Research Database (Denmark)

    Finnemann, Niels Ole

    2014-01-01

    This article discusses digital humanities and the growing diversity of digital media, digital materials and digital methods. The first section describes the humanities computing tradition formed around the interpretation of computation as a rule-based process connected to a concept of digital...... materials centred on the digitisation of non-digital, finite works, corpora and oeuvres. The second section discusses “the big tent” of contemporary digital humanities. It is argued that there can be no unifying interpretation of digital humanities above the level of studying digital materials with the help...... of software-supported methods. This is so, in part, because of the complexity of the world and, in part, because digital media remain open to the projection of new epistemologies onto the functional architecture of these media. The third section discusses the heterogeneous character of digital materials...

  9. Understanding Digital Note-Taking Practice for Visualization.

    Science.gov (United States)

    Willett, Wesley; Goffin, Pascal; Isenberg, Petra

    2015-05-13

    We present results and design implications from a study of digital note-taking practice to examine how visualization can support revisitation, reflection, and collaboration around notes. As digital notebooks become common forms of external memory, keeping track of volumes of content is increasingly difficult. Information visualization tools can help give note-takers an overview of their content and allow them to explore diverse sets of notes, find and organize related content, and compare their notes with their collaborators. To ground the design of such tools, we conducted a detailed mixed-methods study of digital note-taking practice. We identify a variety of different editing, organization, and sharing methods used by digital note-takers, many of which result in notes becoming "lost in the pile''. These findings form the basis for our design considerations that examine how visualization can support the revisitation, organization, and sharing of digital notes.

  10. When Losing Means Winning: The Impact of Conflict in a Digital Game on Young Adults' Intentions to Get Protected from Cancer.

    Science.gov (United States)

    Khalil, Georges E

    2012-08-01

    Despite the improved survival rate for patients with cancer in the United States, there is a need for successful intervention programs that can raise awareness about cancer risks among healthy young adults. This research experimentally examines how conflict in a digital game called "Re-Mission™" (HopeLab, Redwood City, CA) may influence young adults' perception of cancer risk, their motivation to get protected from cancer, and their intention to seek cancer-related information from their doctors. "Re-Mission" is a game in which players control a nanorobot that goes inside patients' virtual bodies to fight cancer cells. Two days after completing a baseline survey, participants (n=48) played "Re-Mission" at either low or high conflict (i.e., low or high level of obstacles and challenges in the game). Then, participants completed a post-experience survey. Participants in the high conflict condition experienced an increase in perceived susceptibility to and severity of cancer. They also increased their intentions to seek information by talking with a physician. Conflict also blocked any decrease in protective motivation. This study suggests that by virtually experiencing the consequences of cancer cell behavior, young adult players of "Re-Mission" increased in perception of cancer risks, protective motivation, and intentions to seek cancer-related information. In practice, health interventions should not only disseminate visual information about cancer, but also give the public the opportunity to virtually experience the consequences of cancer in order to understand the risks and become motivated to get protected. Implications for future research are also discussed.

  11. Finite Word-Length Effects in Digital State-Space Filters

    Directory of Open Access Journals (Sweden)

    B. Psenicka

    1999-12-01

    Full Text Available The state-space description of digital filters involves except the relationship between input and output signals an additional set of state variables. The state-space structures of digital filters have many positive properties compared with direct canonical structures. The main advantage of digital filter structures developed using state-space technique is a smaller sensitivity to quantization effects by fixed-point implementation. In our presentation, the emphasis is on the analysis of coefficient quantization and on existence of zero-input limit cycles in state-space digital filters. The comparison with direct form II structure is presented.

  12. VI Congress of Spanish Radiation Protection Society, Cordoba, 24-27 Set 1996

    International Nuclear Information System (INIS)

    1996-01-01

    This special issue of the journal Radioprotection compiles the sessions of VI Congress of Spanish Radiation Protection Society. The sessions were: 1.- Radiation protection and the environment. 2.- Radiation protection of the workers. 3.- Natural radiation. 4.- Biological effects of the radiations. 5.- Radiation protection of patients. 6.- Dosimetry. 7.- Quality control. 8.- Training on radiation protection. 9.- Legislation. (Author)

  13. ILK recommendation on the avoidance of dependent failures of digital I and C protection systems

    International Nuclear Information System (INIS)

    Anon.

    2003-01-01

    In German nuclear power plants, the instrumentation and control (I and C) technology with the highest importance to safety is essentially hard-wired. In future, digital I and C systems will be put into use as a result of their manifold and sufficiently known advantages. The German Reactor Safety Commission (RSK) has published guidelines on digital safety instrumentation and control in 1996. The ILK welcomes the approach of NPP licensees to digitalize safety I and C functions with graded importance for safety first to gain experience with this new technology. Beyond the requirements laid out by the RSK-guidelines, the ILK recommends the following approach: - Different approaches should be taken in the definition and validation of I and C functions. - The specifications of a safety I and C system should cover all requirements. - If a safety I and C system (cat. 1) is only partly digitalized, then the remaining hardwired part should ideally remain in function. - If this is not the case, then the I and C functions should have functional diversity. - In case the category 1 safety I and C systems are to be entirely digitalized, then the system should be carried out in a functionally diversified way, or equivalent measures should be taken. - Diversified I and C functions should be processed by physically separate equipment. (orig.) [de

  14. Design of the digitizing beam position limit detector

    International Nuclear Information System (INIS)

    Merl, R.

    1998-01-01

    The Digitizing Beam Position Limit Detector (DBPLD) is designed to identify and react to beam missteering conditions in the Advanced Photon Source (APS) storage ring. The high power of the insertion devices requires these missteering conditions to result in a beam abort in less than 2 milliseconds. Commercially available beam position monitors provide a voltage proportional to beam position immediately upstream and downstream of insertion devices. The DBPLD is a custom VME board that digitizes these voltages and interrupts the heartbeat of the APS machine protection system when the beam position exceeds its trip limits

  15. Multi-Agent System Based Special Protection and Emergency Control Scheme against Cascading Events in Power System

    DEFF Research Database (Denmark)

    Liu, Zhou

    relay operations due to low voltage or overload state in the post stage of N-1 (or N-k) contingency. If such state could be sensed and adjusted appropriately before those relay actions, the system stability might be sustained. So it is of great significance to develop a suitable protection scheme...... the proposed protection strategy in this thesis, a real time simulation platform based on Real Time Digital Simulator (RTDS) and LabVIEW is built. In this platform, the cases of cascaded blackouts are simulated on the test system simplified from the East Denmark power system. For the MAS based control system......, the distributed power system agents are set up in RTDS, while the agents in higher level are designed by LabVIEW toolkits. The case studies and simulation results demonstrate the effectiveness of real time application of the proposed MAS based special protection and emergency control scheme against the cascaded...

  16. A Communication-Supported Comprehensive Protection Strategy for Converter-Interfaced Islanded Microgrids

    Directory of Open Access Journals (Sweden)

    Dehua Zheng

    2018-04-01

    Full Text Available The deployment of distributed generators (DGs gives rise to several challenges for a microgrid or conventional distribution feeder, regarding control and protection issues. The major ones are: bi-directional flow of power, changes in fault current magnitude, and continuous changes in operational configuration due to both the plug-and-play of DGs and loads, and the intermittency of the renewable DGs. This issue is exacerbated when the microgrid contains several converter-interfaced DGs and operates in the islanded mode of operation. Hence, conventional protection strategies and relaying techniques will no longer be sufficient to protect islanded microgrids against network faults and disturbance conditions. This paper proposes a fast and reliable communication-supported protection strategy for ensuring the safe operation of converter-interfaced islanded microgrids. The strategy is implementable using commercially accessible microprocessor based digital relays, and is applicable for the protection of low voltage islanded microgrids. It provides backup protection to handle communication failures and malfunctions of protective devices. The paper also presents the detailed structural layout of the digital relay, which executes the proposed protection strategy. A number of improvements are proposed to find an alternative method for conventional overcurrent relays to reliably detect small-magnitude fault currents and high impedance faults, commonly encountered in converter-interfaced islanded microgrids. A simple and economical bus protection method is also proposed. Several simulations are conducted on a comprehensive model of a realistic operational industrial microgrid (Goldwind Smart Microgrid System using PSCAD/EMTDC software environment—for different case studies and fault scenarios—to verify the effectiveness of the present strategy and its digital relay.

  17. Guidelines for reliability analysis of digital systems in PSA context - Phase 2 Status report

    International Nuclear Information System (INIS)

    Authen, S.; Gustafsson, J.; Holmberg, J.-E.

    2012-02-01

    The OECD/NEA CSNI Working Group on Risk Assessment (WGRisk) has set up a task group called DIGREL to develop a taxonomy of failure modes of digital components for the purposes of probabilistic safety assessment (PSA). A parallel Nordic activity carried out a pre-study where a comparison of Nordic experiences and a literature review were performed. The study showed a wide range of approaches and solutions to the challenges given by digital I and C. In 2011, a proposal for the failure modes taxonomy was defined. This is based on a set of requirements agreed on the purpose of the taxonomy. The following levels of details can be distinguished from the hardware point of view: (1) the entire system, (2) a division, (3) processing units (and cabinets), (4) modules, i.e. subcomponents of processing units and (5) generic components, i.e. subcomponents of modules. Module level seems to be the most appropriate from the PSA modelling point of view. The software failure modes taxonomy is still an open issue. An existing simplified PSA model has been complemented with fault tree models for a four-redundant distributed protection system in order to study and demonstrate the effect of design features and modelling approaches. The example shows that even rather simple I and C design leads to rather complex model despite of the fact that many things have been simplified and only a few protection signals are considered. One lesson from the example is that the Alpha factor model should be used to model common cause failures instead of the Beta factor model. Two options were developed to the comparison of different fail-safe principles. The role of detectable and undetectable failure modes with respect to the failed versus spurious actuations can be clearly seen in the results, showing the importance to model these features in PSA. (Author)

  18. Guidelines for reliability analysis of digital systems in PSA context - Phase 2 Status report

    Energy Technology Data Exchange (ETDEWEB)

    Authen, S. (Risk Pilot AB, Stockholm (Sweden)); Gustafsson, J. (Royal Institute of Technology (Sweden)); Holmberg, J.-E. (VTT Technical Research Centre of Finland (Finland))

    2012-02-15

    The OECD/NEA CSNI Working Group on Risk Assessment (WGRisk) has set up a task group called DIGREL to develop a taxonomy of failure modes of digital components for the purposes of probabilistic safety assessment (PSA). A parallel Nordic activity carried out a pre-study where a comparison of Nordic experiences and a literature review were performed. The study showed a wide range of approaches and solutions to the challenges given by digital I and C. In 2011, a proposal for the failure modes taxonomy was defined. This is based on a set of requirements agreed on the purpose of the taxonomy. The following levels of details can be distinguished from the hardware point of view: (1) the entire system, (2) a division, (3) processing units (and cabinets), (4) modules, i.e. subcomponents of processing units and (5) generic components, i.e. subcomponents of modules. Module level seems to be the most appropriate from the PSA modelling point of view. The software failure modes taxonomy is still an open issue. An existing simplified PSA model has been complemented with fault tree models for a four-redundant distributed protection system in order to study and demonstrate the effect of design features and modelling approaches. The example shows that even rather simple I and C design leads to rather complex model despite of the fact that many things have been simplified and only a few protection signals are considered. One lesson from the example is that the Alpha factor model should be used to model common cause failures instead of the Beta factor model. Two options were developed to the comparison of different fail-safe principles. The role of detectable and undetectable failure modes with respect to the failed versus spurious actuations can be clearly seen in the results, showing the importance to model these features in PSA. (Author)

  19. An Economist’s Guide to Digital Music

    OpenAIRE

    Martin Peitz; Patrick Waelbroeck

    2004-01-01

    In this guide, we discuss the impact of digitalization on the music industry. We rely on market and survey data at the international level as well as expert statements from the industry. The guide investigates recent developments in legal and technological protection of digital music and describes new business models as well as consumers' attitude towards music downloads and audio-streaming. We conclude the guide by a discussion of the evolution of the music industry.

  20. Evaluating the benefits of digital pathology implementation: Time savings in laboratory logistics.

    Science.gov (United States)

    Baidoshvili, Alexi; Bucur, Anca; van Leeuwen, Jasper; van der Laak, Jeroen; Kluin, Philip; van Diest, Paul J

    2018-06-20

    The benefits of digital pathology for workflow improvement and thereby cost savings in pathology, at least partly outweighing investment costs, are increasingly recognized. Successful implementations in a variety of scenarios start to demonstrate cost benefits of digital pathology for both research and routine diagnostics, contributing to a sound business case encouraging further adoption. To further support new adopters, there is still a need for detailed assessment of the impact this technology has on the relevant pathology workflows with emphasis on time saving. To assess the impact of digital pathology adoption on logistic laboratory tasks (i.e. not including pathologists' time for diagnosis making) in LabPON, a large regional pathology laboratory in The Netherlands. To quantify the benefits of digitization we analyzed the differences between the traditional analog and new digital workflows, carried out detailed measurements of all relevant steps in key analog and digital processes, and compared time spent. We modeled and assessed the logistic savings in five workflows: (1) Routine diagnosis, (2) Multi-disciplinary meeting, (3) External revision requests, (4) Extra stainings and (5) External consultation. On average over 19 working hours were saved on a typical day by working digitally, with the highest savings in routine diagnosis and multi-disciplinary meeting workflows. By working digitally, a significant amount of time could be saved in a large regional pathology lab with a typical case mix. We also present the data in each workflow per task and concrete logistic steps to allow extrapolation to the context and case mix of other laboratories. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  1. Construct on Digital Rights Management for Historical Newspaper Archives

    Directory of Open Access Journals (Sweden)

    Shien-chiang Yu

    2004-06-01

    Full Text Available Newspaper is one of the most important media as it contains the records that input the cultural data and social events, progress of national and international economical and political developments, the world’s circumstances of the time, so as transmitting information and sharing knowledge of particular regions or around the globe. However, the copyright is limited to cover the transformed entity to digital contents. In order to protect the rights of digitized-contents and restrict the scope of on-line grant of historical newspaper, it is necessary to clarify the concepts and practices. This study reveals the concepts of digital rights management via literature review that will work on both mentioned issues, so as to identify the fair use to assure the profit of digitized archive of historical newspaper. [Article content in Chinese

  2. Similar digit-based working memory in deaf signers and hearing non-signers despite digit span differences

    Directory of Open Access Journals (Sweden)

    Josefine eAndin

    2013-12-01

    Full Text Available Similar working memory (WM for lexical items has been demonstrated for signers and non-signers while short-term memory (STM is regularly poorer in deaf than hearing individuals. In the present study, we investigated digit-based WM and STM in Swedish and British deaf signers and hearing non-signers. To maintain good experimental control we used printed stimuli throughout and held response mode constant across groups. We showed that deaf signers have similar digit-based WM performance, despite shorter digit spans, compared to well-matched hearing non-signers. We found no difference between signers and non-signers on STM span for letters chosen to minimize phonological similarity or in the effects of recall direction. This set of findings indicates that similar WM for signers and non-signers can be generalized from lexical items to digits and suggests that poorer STM in deaf signers compared to hearing non-signers may be due to differences in phonological similarity across the language modalities of sign and speech.

  3. Protecting the Goodies in the Digital Candy Store.

    Science.gov (United States)

    Wasch, Kenneth

    1994-01-01

    Discussion of the protection of intellectual property on the Internet suggests strong regulation of content. Topics addressed include economic losses; access control; encryption; educating the public on copyright law; illegal bulletin board systems; software piracy; copyright infringement; downloading copyrighted material; fair use; and copyright…

  4. Digital publication of EDF's regulatory files

    International Nuclear Information System (INIS)

    Picard, Pauline

    2012-06-01

    The Engineering Centre of Deconstruction and Environment wants to modernize the distribution of its regulatory filings in digital form. This project requires a prior upstream of its implementation to determine the best publishing solution suited to the constraints of diffusion and heritage protection of EDF

  5. Digital atlas of Oklahoma

    Science.gov (United States)

    Rea, A.H.; Becker, C.J.

    1997-01-01

    This compact disc contains 25 digital map data sets covering the State of Oklahoma that may be of interest to the general public, private industry, schools, and government agencies. Fourteen data sets are statewide. These data sets include: administrative boundaries; 104th U.S. Congressional district boundaries; county boundaries; latitudinal lines; longitudinal lines; geographic names; indexes of U.S. Geological Survey 1:100,000, and 1:250,000-scale topographic quadrangles; a shaded-relief image; Oklahoma State House of Representatives district boundaries; Oklahoma State Senate district boundaries; locations of U.S. Geological Survey stream gages; watershed boundaries and hydrologic cataloging unit numbers; and locations of weather stations. Eleven data sets are divided by county and are located in 77 county subdirectories. These data sets include: census block group boundaries with selected demographic data; city and major highways text; geographic names; land surface elevation contours; elevation points; an index of U.S. Geological Survey 1:24,000-scale topographic quadrangles; roads, streets and address ranges; highway text; school district boundaries; streams, river and lakes; and the public land survey system. All data sets are provided in a readily accessible format. Most data sets are provided in Digital Line Graph (DLG) format. The attributes for many of the DLG files are stored in related dBASE(R)-format files and may be joined to the data set polygon attribute or arc attribute tables using dBASE(R)-compatible software. (Any use of trade names in this publication is for descriptive purposes only and does not imply endorsement by the U.S. Government.) Point attribute tables are provided in dBASE(R) format only, and include the X and Y map coordinates of each point. Annotation (text plotted in map coordinates) are provided in AutoCAD Drawing Exchange format (DXF) files. The shaded-relief image is provided in TIFF format. All data sets except the shaded

  6. Idea Hubs as Nexus of Collective Creativity in Digital Innovation

    DEFF Research Database (Denmark)

    Ciriello, Raffaele; Richter, Alexander

    2015-01-01

    Digital innovation radically transforms the nature of corporate innovation practices, implying a growing need for deeper understanding its origins and outcomes. In this paper, we conceptualize the focal points of social networking in digital innovation as idea hubs. We focus our analysis...... on instances of idea hubs in two multinational European software companies, where we conducted a case study over a two-year period, and collected data in form of interviews, digital documents, and participant observations. In doing so, we identify a set of social networking practices in which idea hubs serve...... of digital artifacts individuals can choose from, offline interaction still plays a major role in facilitating digital innovation....

  7. Digital Modeling Phenomenon Of Surface Ground Movement

    OpenAIRE

    Ioan Voina; Maricel Palamariu; Iohan Neuner; Tudor Salagean; Dumitru Onose; Mircea Ortelecan; Anca Maria Moscovici; Mariana Calin

    2016-01-01

    With the development of specialized software applications it was possible to approach and resolve complex problems concerning automating and process optimization for which are being used field data. Computerized representation of the shape and dimensions of the Earth requires a detailed mathematical modeling, known as "digital terrain model". The paper aims to present the digital terrain model of Vulcan mining, Hunedoara County, Romania. Modeling consists of a set of mathematical equations th...

  8. Soldier Flexible Personal Digital Assistant Program

    National Research Council Canada - National Science Library

    Price, Mark; Woytowich, Jason; Carlson, Marc

    2008-01-01

    The main goal of the Soldier Flexible Personal Digital Assistant Program was to develop prototypes of a novel flexible display technology device for demonstration in a laboratory setting and use in Future Force Warrior (FFW) demonstrations...

  9. Towards Rethinking the Digital Divide : Recognizing Shades of Grey in Older Adults’ Digital Inclusion

    NARCIS (Netherlands)

    Lameijer, Charlotte S.; Mueller, Benjamin; Hage, Eveline

    2017-01-01

    The ‘digital divide’ is one of the key concepts related to IT’s role in social inclusion. However, and despite its prominence, the IS literature related to the concept currently provides a rather diverse set of definitions. This results in a fragmented nomological network, which leads to conceptual

  10. Ontology for customer centric digital services and analytics

    Science.gov (United States)

    Keat, Ng Wai; Shahrir, Mohammad Shazri

    2017-11-01

    In computer science research, ontologies are commonly utilised to create a unified abstract across many rich and different fields. In this paper, we apply the concept to the customer centric domain of digital services analytics and present an analytics solution ontology. The essence is based from traditional Entity Relationship Diagram (ERD), which then was abstracted out to cover wider areas on customer centric digital services. The ontology we developed covers both static aspects (customer identifiers) and dynamic aspects (customer's temporal interactions). The structure of the customer scape is modeled with classes that represent different types of customer touch points, ranging from digital and digital-stamps which represent physical analogies. The dynamic aspects of customer centric digital service are modeled with a set of classes, with the importance is represented in different associations involving establishment and termination of the target interaction. The realized ontology can be used in development of frameworks for customer centric applications, and for specification of common data format used by cooperating digital service applications.

  11. Radiation protection program for early detection of breast cancer in a mammography facility

    Science.gov (United States)

    Villagomez Casimiro, Mariana; Ruiz Trejo, Cesar; Espejo Fonseca, Ruby

    2014-11-01

    Mammography is the best tool for early detection of Breast Cancer. In this diagnostic radiology modality it is necessary to establish the criteria to ensure the proper use and operation of the equipment used to obtain mammographic images in order to contribute to the safe use of ionizing radiation. The aim of the work was to implement at FUCAM-AC the radiation protection program which must be established for patients and radiation workers according to Mexican standards [1-4]. To achieve this goal, radiation protection and quality control manuals were elaborated [5]. Furthermore, a quality control program (QCP) in the mammography systems (analog/digital), darkroom included, has been implemented. Daily sensitometry, non-variability of the image quality, visualizing artifacts, revision of the equipment mechanical stability, compression force and analysis of repetition studies are some of the QCP routine tests that must be performed by radiological technicians of this institution as a set of actions to ensure the protection of patients. Image quality and patients dose assessment were performed on 4 analog equipment installed in 2 mobile units. In relation to dose assessment, all equipment passed the acceptance criteria (radiation protection program in this work is applied.

  12. All Digital IQ Servo-System for CERN Linacs

    CERN Document Server

    Rohlev, A; Garoby, R

    2003-01-01

    A new VME based system has been developed and built at CERN for the servo loops regulating the field in the linac accelerating structure. It makes use of high speed digital In-phase/Quadrature (IQ) detection, digital processing, and digital IQ modulation. The digital processing and IQ modulation is done in a single PLD. The system incorporates continually variable set points, iterative learning, feed forward as well as extensive diagnostics and other features well suited for digital implementations. Built on a single VME card, it will be first used in the energy ramping RF chain of the CERN Heavy Ion Linac (linac 3) and later for upgrading the present proton linac (linac 2). This system serves also as a prototype for the future Superconducting Proton Linac (SPL). The design principle and the experimental results are described.

  13. Digital Watermark Tracking using Intelligent Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Nagaraj V. DHARWADKAR

    2010-01-01

    Full Text Available E-commerce has become a huge business and adriving factor in the development of the Internet. Onlineshopping services are well established. Due to the evolution of2G and 3G mobile networks, soon online shopping services arecomplemented by their wireless counterparts. Furthermore, inthe recent years online delivery of digital media, such as MP3audio or video or image is very popular and will become anincreasingly important part of E-commerce. The advantage ofinternet is sharing the valuable digital data which lead to misuseof digital data. To resolve the problem of misuse of digital dataon Internet we need to have strong Digital rights monitoringsystem. Digital Rights Management (DRM is fairly youngdiscipline, while some of its underlying technologies have beenknown from many years. The use of DRM for managing andprotecting intellectual property rights is a comparatively newfield. In this paper we propose a model for online digital imagelibrary copyright protection based on watermark trackingSystem.In our proposed model the tracking of watermarks onremote host nodes is done using active mobile agents. The multiagentsystem architecture is used in watermark tracking whichsupports the coordination of several component tasks acrossdistributed and flexible networks of information sources.Whereas a centralized system is susceptible to system-widefailures and processing bottlenecks, multi-agent systems aremore reliable, especially given the likelihood of individualcomponent failures.

  14. Evaluation of Harmonics Impact on Digital Relays

    Directory of Open Access Journals (Sweden)

    Kinan Wannous

    2018-04-01

    Full Text Available This paper presents the concept of the impact of harmonic distortion on a digital protection relay. The aim is to verify and determine the reasons of a mal-trip or failure to trip the protection relays; the suggested solution of the harmonic distortion is explained by a mathematical model in the Matlab Simulink programming environment. The digital relays have been tested under harmonic distortions in order to verify the function of the relays algorithm under abnormal conditions. The comparison between the protection relay algorithm under abnormal conditions and a mathematical model in the Matlab Simulink programming environment based on injected harmonics of high values is provided. The test is separated into different levels; the first level is based on the harmonic effect of an individual harmonic and mixed harmonics. The test includes the effect of the harmonics in the location of the fault point into distance protection zones. This paper is a new proposal in the signal processing of power quality disturbances using Matlab Simulink and the power quality impact on the measurements of the power system quantities; the test simulates the function of protection in power systems in terms of calculating the current and voltage values of short circuits and their faults. The paper includes several tests: frequency variations and decomposition of voltage waveforms with Fourier transforms (model and commercial relay, the effect of the power factor on the location of fault points, the relation between the tripping time and the total harmonic distortion (THD levels in a commercial relay, and a comparison of the THD capture between the commercial relay and the model.

  15. Parcels and Land Ownership, This data set consists of digital map files containing parcel-level cadastral information obtained from property descriptions. Cadastral features contained in the data set include real property boundary lines, rights-of-way boundaries, property dimensions, Published in Not Provided, 1:2400 (1in=200ft) scale, Racine County Government.

    Data.gov (United States)

    NSGIC Local Govt | GIS Inventory — Parcels and Land Ownership dataset current as of unknown. This data set consists of digital map files containing parcel-level cadastral information obtained from...

  16. Digital signal processor for silicon audio playback devices; Silicon audio saisei kikiyo digital signal processor

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    The digital audio signal processor (DSP) TC9446F series has been developed silicon audio playback devices with a memory medium of, e.g., flash memory, DVD players, and AV devices, e.g., TV sets. It corresponds to AAC (advanced audio coding) (2ch) and MP3 (MPEG1 Layer3), as the audio compressing techniques being used for transmitting music through an internet. It also corresponds to compressed types, e.g., Dolby Digital, DTS (digital theater system) and MPEG2 audio, being adopted for, e.g., DVDs. It can carry a built-in audio signal processing program, e.g., Dolby ProLogic, equalizer, sound field controlling, and 3D sound. TC9446XB has been lined up anew. It adopts an FBGA (fine pitch ball grid array) package for portable audio devices. (translated by NEDO)

  17. Business models for digital repositories

    CERN Document Server

    CERN. Geneva; Bjørnshauge, Lars

    2007-01-01

    Those setting up, or planning to set up, a digital repository may be interested to know more about what has gone before them. What is involved, what is the cost, how many people are needed, how have others made the case to their institution, and how do you get anything into it once it is built? I have recently undertaken a study of European repository business models for the DRIVER project and will present an overview of the findings.

  18. Digital pathology: A systematic evaluation of the patent landscape.

    Science.gov (United States)

    Cucoranu, Ioan C; Parwani, Anil V; Vepa, Suryanarayana; Weinstein, Ronald S; Pantanowitz, Liron

    2014-01-01

    Digital pathology is a relatively new field. Inventors of technology in this field typically file for patents to protect their intellectual property. An understanding of the patent landscape is crucial for companies wishing to secure patent protection and market dominance for their products. To our knowledge, there has been no prior systematic review of patents related to digital pathology. Therefore, the aim of this study was to systematically identify and evaluate United States patents and patent applications related to digital pathology. Issued patents and patent applications related to digital pathology published in the United States Patent and Trademark Office (USPTO) database (www.uspto.gov) (through January 2014) were searched using the Google Patents search engine (Google Inc., Mountain View, California, USA). Keywords and phrases related to digital pathology, whole-slide imaging (WSI), image analysis, and telepathology were used to query the USPTO database. Data were downloaded and analyzed using the Papers application (Mekentosj BV, Aalsmeer, Netherlands). A total of 588 United States patents that pertain to digital pathology were identified. In addition, 228 patent applications were identified, including 155 that were pending, 65 abandoned, and eight rejected. Of the 588 patents granted, 348 (59.18%) were specific to pathology, while 240 (40.82%) included more general patents also usable outside of pathology. There were 70 (21.12%) patents specific to pathology and 57 (23.75%) more general patents that had expired. Over 120 unique entities (individual inventors, academic institutions, and private companies) applied for pathology specific patents. Patents dealt largely with telepathology and image analysis. WSI related patents addressed image acquisition (scanning and focus), quality (z-stacks), management (storage, retrieval, and transmission of WSI files), and viewing (graphical user interface (GUI), workflow, slide navigation and remote control). An

  19. Digital pathology: A systematic evaluation of the patent landscape

    Directory of Open Access Journals (Sweden)

    Ioan C. Cucoranu

    2014-01-01

    Full Text Available Introduction: Digital pathology is a relatively new field. Inventors of technology in this field typically file for patents to protect their intellectual property. An understanding of the patent landscape is crucial for companies wishing to secure patent protection and market dominance for their products. To our knowledge, there has been no prior systematic review of patents related to digital pathology. Therefore, the aim of this study was to systematically identify and evaluate United States patents and patent applications related to digital pathology. Materials and Methods: Issued patents and patent applications related to digital pathology published in the United States Patent and Trademark Office (USPTO database (www.uspto.gov (through January 2014 were searched using the Google Patents search engine (Google Inc., Mountain View, California, USA. Keywords and phrases related to digital pathology, whole-slide imaging (WSI, image analysis, and telepathology were used to query the USPTO database. Data were downloaded and analyzed using the Papers application (Mekentosj BV, Aalsmeer, Netherlands. Results: A total of 588 United States patents that pertain to digital pathology were identified. In addition, 228 patent applications were identified, including 155 that were pending, 65 abandoned, and eight rejected. Of the 588 patents granted, 348 (59.18% were specific to pathology, while 240 (40.82% included more general patents also usable outside of pathology. There were 70 (21.12% patents specific to pathology and 57 (23.75% more general patents that had expired. Over 120 unique entities (individual inventors, academic institutions, and private companies applied for pathology specific patents. Patents dealt largely with telepathology and image analysis. WSI related patents addressed image acquisition (scanning and focus, quality (z-stacks, management (storage, retrieval, and transmission of WSI files, and viewing (graphical user interface (GUI

  20. Selecting a digital camera for telemedicine.

    Science.gov (United States)

    Patricoski, Chris; Ferguson, A Stewart

    2009-06-01

    The digital camera is an essential component of store-and-forward telemedicine (electronic consultation). There are numerous makes and models of digital cameras on the market, and selecting a suitable consumer-grade camera can be complicated. Evaluation of digital cameras includes investigating the features and analyzing image quality. Important features include the camera settings, ease of use, macro capabilities, method of image transfer, and power recharging. Consideration needs to be given to image quality, especially as it relates to color (skin tones) and detail. It is important to know the level of the photographer and the intended application. The goal is to match the characteristics of the camera with the telemedicine program requirements. In the end, selecting a digital camera is a combination of qualitative (subjective) and quantitative (objective) analysis. For the telemedicine program in Alaska in 2008, the camera evaluation and decision process resulted in a specific selection based on the criteria developed for our environment.

  1. Advanced digital technology - improving nuclear power plant performance through maintainability

    International Nuclear Information System (INIS)

    Ford, J.L.; Senechal, R.R.; Altenhein, G.D.; Harvey, R.P.

    1998-01-01

    In today's energy sector there is ever increasing pressure on utilities to operate power plants at high capacity factors. To ensure nuclear power is competitive into the next century, it is imperative that strategic design improvements be made to enhance the performance of nuclear power plants. There are a number of factors that affect a nuclear power plant's performance; lifetime maintenance is one of the major contributors. The maturing of digital technology has afforded ABB the opportunity to make significant design improvements in the area of maintainability. In keeping with ABB's evolutionary advanced nuclear plant design approach, digital technology has systematically been incorporated into the control and protection systems of the most recent Korean nuclear units in operation and under construction. One example of this was the multi-functional design team approach that was utilized for the development of ABB's Digital Plant Protection System (DPPS). The design team consisted of engineers, maintenance technicians, procurement specialists and manufacturing personnel in order to provide a complete perspective on all facets of the design. The governing design goals of increased reliability and safety, simplicity of design, use of off-the-shelf products and reduced need for periodic surveillance testing were met with the selection of proven ABB-Advant Programmable Logic Controllers (PLCs) as the heart of the DPPS. The application of digital PLC technology allows operation for extended periods without requiring routine maintenance or re-calibration. A well documented commercial dedication program approved by the United States Nuclear Regulatory Commission (US NRC) as part of the System 80+ TM Advanced Light Water Reactor Design Certification Program, allowed the use of off-the shelf products in the design of the safety protection system. In addition, a number of mechanical and electrical improvements were made which support maintainability. The result is a DPPS

  2. Preschool Children and iPads: Observations of Social Interactions during Digital Play

    Science.gov (United States)

    Lawrence, Sandra M.

    2018-01-01

    Research Findings: Digital play is now commonplace in many young children's lives, but not in preschool settings. This situation is likely due to the fact that the existent literature seldom highlights what digital play looks like, the various ways it can be situated, and what young children do when they play together with digital devices in the…

  3. Development and application of digital safety system in NPPs

    International Nuclear Information System (INIS)

    Kwon, Keechoon; Kim, Changhwoi; Lee, Dongyoung

    2012-01-01

    This paper describes the development of digital safety system in NPPs based on safety- grade programmable logic controller (PLC) platform and its application to real NPP construction. The digital safety system consists of a reactor protection system and an engineered safety feature-component control system. The safety-grade PLC platform was developed so that it meets the requirements of the regulation. The PLC consists of various modules such as a power module, a processor module, communication modules, digital input/output modules, analog input/output modules, a LOCA bus extension module, and a high-speed pulse counter module. The reactor protection system is designed with a redundant 4-channel architecture, and every channel is implemented with the same architecture. A single channel consists of a redundant bi-stable processor, a redundant coincidence processor, an automatic test and interface processor, and a cabinet operator module. The engineered safety feature-component control system is designed with four redundant divisions, and implemented with the PLC platform. The principal components of an individual division are fault tolerant group controllers, loop controllers, a test and interface processor, a cabinet operator module and a control channel gateway. The topical report is submitted to the regulatory body, and got safety evaluation report from the regulatory body. Also, the developed system is tested in the integrated performance validation facility. It is decided that the digital safety system applied to Shin-Uljin unit 1 and 2 after a topical report approval and validation test. Design changes occur in the digital safety system that is applied to an actual nuclear power plant construction, and the PLC has also been upgraded

  4. Development and application of digital safety system in NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Keechoon; Kim, Changhwoi; Lee, Dongyoung [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2012-03-15

    This paper describes the development of digital safety system in NPPs based on safety- grade programmable logic controller (PLC) platform and its application to real NPP construction. The digital safety system consists of a reactor protection system and an engineered safety feature-component control system. The safety-grade PLC platform was developed so that it meets the requirements of the regulation. The PLC consists of various modules such as a power module, a processor module, communication modules, digital input/output modules, analog input/output modules, a LOCA bus extension module, and a high-speed pulse counter module. The reactor protection system is designed with a redundant 4-channel architecture, and every channel is implemented with the same architecture. A single channel consists of a redundant bi-stable processor, a redundant coincidence processor, an automatic test and interface processor, and a cabinet operator module. The engineered safety feature-component control system is designed with four redundant divisions, and implemented with the PLC platform. The principal components of an individual division are fault tolerant group controllers, loop controllers, a test and interface processor, a cabinet operator module and a control channel gateway. The topical report is submitted to the regulatory body, and got safety evaluation report from the regulatory body. Also, the developed system is tested in the integrated performance validation facility. It is decided that the digital safety system applied to Shin-Uljin unit 1 and 2 after a topical report approval and validation test. Design changes occur in the digital safety system that is applied to an actual nuclear power plant construction, and the PLC has also been upgraded.

  5. Effectiveness of caching in a distributed digital library system

    DEFF Research Database (Denmark)

    Hollmann, J.; Ardø, Anders; Stenstrom, P.

    2007-01-01

    as manifested by gateways that implement the interfaces to the many fulltext archives. A central research question in this approach is: What is the nature of locality in the user access stream to such a digital library? Based on access logs that drive the simulations, it is shown that client-side caching can......Today independent publishers are offering digital libraries with fulltext archives. In an attempt to provide a single user-interface to a large set of archives, the studied Article-Database-Service offers a consolidated interface to a geographically distributed set of archives. While this approach...

  6. Zika Virus: Protecting Pregnant Women and Babies

    Science.gov (United States)

    ... Digital Press Kit Read the MMWR Science Clips Zika Virus Protecting Pregnant Women and Babies Language: English (US) ... Spanish) Recommend on Facebook Tweet Share Compartir Overview Zika virus infection (Zika) during pregnancy can cause damage to ...

  7. Protection set-points lines for the reactor core and considerations about power distribution and peak factors

    International Nuclear Information System (INIS)

    Furieri, E.B.

    1981-01-01

    In order to assure the reactor core integrity during the slow operational transients (power excursion above the nominal value and the high coolant temperature), the formation of a steam film (DNB-Departure from Nucleate Boiling) in the control rods must be avoided. The protection set points lines presents the points where DNBR (relation between critical heat flux-q sub(DNB) and the local heat flux-q' sub(local) is equal to 1.30, corrected by peak factors and uncertainty in function of ΔTr and T sub(R), respectively coolant elevation and medium coolant temperature in reactor pressure vessel. The curve set-points were determined using a new version of COBRA-IIIF (CUPRO) computer code, implemented with new subroutines and linearized convergence scheme. Pratical results for Angra-1 core were obtained and its were compared with the results from the fabricator. (E.G.) [pt

  8. Digital broadcasting

    International Nuclear Information System (INIS)

    Park, Ji Hyeong

    1999-06-01

    This book contains twelve chapters, which deals with digitization of broadcast signal such as digital open, digitization of video signal and sound signal digitization of broadcasting equipment like DTPP and digital VTR, digitization of equipment to transmit such as digital STL, digital FPU and digital SNG, digitization of transmit about digital TV transmit and radio transmit, digital broadcasting system on necessity and advantage, digital broadcasting system abroad and Korea, digital broadcasting of outline, advantage of digital TV, ripple effect of digital broadcasting and consideration of digital broadcasting, ground wave digital broadcasting of DVB-T in Europe DTV in U.S.A and ISDB-T in Japan, HDTV broadcasting, satellite broadcasting, digital TV broadcasting in Korea, digital radio broadcasting and new broadcasting service.

  9. Digital impression-taking: Fundamentals and benefits in orthodontics.

    Science.gov (United States)

    Lecocq, Guillaume

    2016-06-01

    The digital era has burst into our offices in a big way. 3D camera technology has improved, enabling us to record our impressions and the occlusion in a digital format file. This file can then be used to make set-ups and manufacture orthodontic devices. Like any new technology, it needs to be studied and understood in order to grasp it fully and master the information and digital flow which can be generated between one's office and any external party involved in treatment, such as laboratories or other colleagues. Copyright © 2016 CEO. Published by Elsevier Masson SAS. All rights reserved.

  10. An Embedded Based Digital Controller for Thermal Process

    Directory of Open Access Journals (Sweden)

    A. Lakshmi Sangeetha

    2008-01-01

    Full Text Available This paper describes a low cost virtual instrumentation (VI system to monitor and control the electrically heated water bath temperature. The PIC16F877 based digital microcontroller is used as thermostat which controls and monitors the temperature. The digital controller also allows the user to modify the sensor (PT100 calibration data values if necessary. The developed programmable on/off control function provides on-line display of measuring temperature, set point as well as the control function output plots through the parallel port. This bus interaction is realized in Visual Basic/Assembly Language and uses a 16 bit, 10 ms sampling analog-to-digital converter (ADS 7805 for monitoring and controlling the parameters of the temperature local digital controller.

  11. REALIZING LEGAL PROTECTION FOR OUTSOURCING WORKERS THROUGH EMPLOYMENT SETTING SYNCHRONIZATION

    Directory of Open Access Journals (Sweden)

    Khairani

    2015-10-01

    Full Text Available Debating on the outsourcing existence in Law No.13 of 2003 regarding to Labor, is still continuing even though there has been a decision of Indonesia Constitutional Court (MK who stated the rules that the content of Article 65 paragraph (7 and Article 66 paragraph (2 has been outlawed. The problems of this research are: How is the outsourcing concept of regulating in the labor law and the regulation of the labor minister No. 19 of 2012; and What effort to keep the outsourcing arrangement can provide legal protection for workers? This research use juridical normative method. The research finds that some of the concept is in contradiction with the 1945 constitution and another Law which is related to the protection of labor, and even with the other articles that exists in the Labor Law itself so thats the norm contains contradictio adconceptio. Therefore, the system of outsourcing that will be regulated should consider the principles of goof outsourcing governance. They are: legal protection, non-discrimination, worker as the subject not as an object, benefit and welfare, sustainable working relation, and the shifting of protection to the labor.

  12. FPGA-Based Plant Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yoon Hee; Ha, Jae Hong; Kim, Hang Bae [KEPCO E and C, Daejeon (Korea, Republic of)

    2011-08-15

    This paper relates to a plant protection system which detects non-permissible conditions and determines initiation of protective actions for nuclear power plants (NPPs). Conventional plant protection systems were designed based on analog technologies. It is well known that existing protection systems for NPPs contain many components which are becoming obsolete at an increasing rate. Nowadays maintenance and repair for analog-based plant protection systems may be difficult as analog parts become obsolete or difficult to obtain. Accordingly, as an alternative to the analog technology, the digitalisation of the plant protection system was required. Recently digital plant protection systems which include programmable logic controllers (PLCs) and/or computers have been introduced. However PLC or computer-based plant protection systems use an operating system and application software, and so they may result in a common mode failure when a problem occurs in the operating system or application software. Field Programmable Gate Arrays (FPGAs) are highlighted as an alternative to conventional protection or control systems. The paper presents the design of a four-channel plant protection system whose protection functions are implemented in FPGAs without any central processing unit or operating system.

  13. FPGA-Based Plant Protection System

    International Nuclear Information System (INIS)

    Lee, Yoon Hee; Ha, Jae Hong; Kim, Hang Bae

    2011-01-01

    This paper relates to a plant protection system which detects non-permissible conditions and determines initiation of protective actions for nuclear power plants (NPPs). Conventional plant protection systems were designed based on analog technologies. It is well known that existing protection systems for NPPs contain many components which are becoming obsolete at an increasing rate. Nowadays maintenance and repair for analog-based plant protection systems may be difficult as analog parts become obsolete or difficult to obtain. Accordingly, as an alternative to the analog technology, the digitalisation of the plant protection system was required. Recently digital plant protection systems which include programmable logic controllers (PLCs) and/or computers have been introduced. However PLC or computer-based plant protection systems use an operating system and application software, and so they may result in a common mode failure when a problem occurs in the operating system or application software. Field Programmable Gate Arrays (FPGAs) are highlighted as an alternative to conventional protection or control systems. The paper presents the design of a four-channel plant protection system whose protection functions are implemented in FPGAs without any central processing unit or operating system

  14. Reliability analysis of digital safety systems at nuclear power plants

    International Nuclear Information System (INIS)

    Sopira Vladimir; Kovacs, Zoltan

    2015-01-01

    Reliability analysis of digital reactor protection systems built on the basis of TELEPERM XS is described, and experience gained by the Slovak RELKO company during the past 20 years in this domain is highlighted. (orig.)

  15. Boundary crossing and learning identities – digital storytelling in primary schools

    Directory of Open Access Journals (Sweden)

    Anne Mette Bjørgen

    2010-11-01

    Full Text Available This article contributes to academic discussions on how digital storytelling in an educational setting may have potential to build and develop learning identities, agency and digital competences. With a socio-cultural framework on learning and identity as a point of departure, the article sets out to study these issues approached as boundary crossing between the intersecting contexts of leisure time and school. The analysis draws on three examples of digital storytelling among 5th - 7th graders in three Norwegian primary school classes. My findings suggest that digital storytelling might represent a boundary crossing enabling pupils to adopt new roles as producers of creative content, as mentors or guides, to explore new technology and software in a context different from that of outside school and to learn and develop competences related to production processes and multimodal resources. I argue that digital storytelling has a potential to contribute to learning, learning identity and agency, provided it is based on a more fully developed pedagogical strategy of carefully linking school and leisure time.

  16. Era Penyiaran Digital: Pengembangan atau Pemberangusan TV Lokal dan TV Komunitas?

    Directory of Open Access Journals (Sweden)

    Agung Prabowo

    2012-01-01

    Full Text Available Digital TV migration still holds many un-answered questions. Recently, Multiplexing Broadcasting Agencies (LP3M in seven zones have been defined, while 8 other zones are vacant. The winners of Multiplexing Broadcasting Agencies (LP3M are actors who currently control televisions in Indonesia. Investment building that will serve emit multiplexing digital signals is key in digital TV business. All broadcasters have to hire to be broadcast. This has caused problems for local and community TV because they have to rent mux (multiplexing estimated to 40 million per month. Not to mention taht they have to invest equipments for digital-based program. It requires government intervention in term of regulation that protects weak actors from the capital side, such as community TV.

  17. Impact of protection settings of the distributed generation frequency under 1MW in the national electric system

    International Nuclear Information System (INIS)

    Alpizar Chavarria, Oscar

    2013-01-01

    A literature review is conducted to understand the distributed generation, the reason for the introduction into modern power systems and other distributed generation technologies based on renewable energies that have been installed around the country. The frequency protections of distributed generation equipment under 1MW are studied according to international standards like IEEE-1547 and specifications of equipment manufacturers. The influence of the recommended international standards settings are investigated for systems of distributed generation, the performance in frequency that have presented under some frequency perturbation, as well as the influence that can have on the national and regional electrical system, with different amounts of technologies included in the national system. The recommended settings are evaluated through simulations in PSSE program in the context of the behavior of the frequency in the national electric system [es

  18. Performance Analysis of Digital loudspeaker Arrays

    DEFF Research Database (Denmark)

    Pedersen, Bo Rohde; Kontomichos, Fotios; Mourjopoulos, John

    2008-01-01

    An analysis of digital loudspeaker arrays shows that the ways in which bits are mapped to the drivers influence the quality of the audio result. Specifically, a "bit-summed" rather than the traditional "bit-mapped" strategy greatly reduces the number of times drivers make binary transitions per...... period of the input frequency. Detailed simulations compare the results for a 32-loudspeaker array with a similar configuration with analog excitation of the drivers. Ideally, drivers in digital arrays should be very small and span a small area, but that sets limits on the low-frequency response...

  19. CERN-UNESCO School on Digital Libraries

    CERN Multimedia

    2016-01-01

    The CERN-UNESCO School on Digital libraries 2016 was held in Kumasi, Ghana, from 28th November to 2nd December 2016. The school was organized by the United Nations Educational, Scientific and Cultural Organization (UNESCO) and the European Organization for Nuclear Research (CERN) and was hosted by Kwame Nkrumah University of Science and Technology. The purpose of the school was to deepen the participants’ understanding of digital libraries, expose new trends in scientific publishing and emphasize a set of principles related to open access, both for data and publications.

  20. Chinese librarianship in the digital era

    CERN Document Server

    Fang, Conghui

    2013-01-01

    The library in China has been transformed by rapid socioeconomic development, and the proliferation of the Internet. The issues faced by Chinese libraries andlibrarians are those faced by library practitioners more globally, however, China also has its own unique set of issues in the digital era, including developmental imbalance between East and West, urban and rural areas, and availability of skilled practitioners. Chinese Librarianship in the Digital Era is the first book on Chinese libraries responding to these issues, and more.The first part of the book places discussion in historical con

  1. Use of trapezoidal shaping algorithm in the digital multi-channel system

    International Nuclear Information System (INIS)

    Wang Jihong; Wang Lianghou; Fang Zongliang

    2011-01-01

    It discusses one kind of digital filter technology-trapezoidal algorithm based on actual need of studying the digital multi-channel. Firstly, demonstrating the feasibility of the arithmetic with theoretical analysis; secondly, predigesting the process of the arithmetic; thirdly, simulating with MATLAB; lastly, using the arithmetic to measure data. The result of testing indicates trapezoidal shaping algorithm accords with the need of digital multi-channel shaping extraordinary. The best filter can be obtained by means of setting parameter due to superiority of digital multi-channel. (authors)

  2. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  3. Technological measures of protection in the copyright system

    Directory of Open Access Journals (Sweden)

    Radovanović Sanja

    2011-01-01

    Full Text Available Digital exploitation of works often exceed the limit to which the holder can control the exploitation of their intellectual creations, and the protection provided by legal norms are, in the era of a fast exchange of information, may prove to be insufficiently effective. For these reasons, the rights holders are increasingly opting for preventive care through placement of physical obstacles to the exploitation of copyright works, generic called technological protection measures (known as digital right management (DRM. Simultaneously with the development of the application of these measures flows the process of finding ways to circumvent them. Therefore, the effectiveness of technological measures depends on exactly the question of their legal protection, which now exists in most of modern legal systems. However, in the normative solutions there are differences, which reflect the problems in finding adequate forms of protection. They mostly stem from the fact that the sanctioning of circumvention (or preparatory actions of technological measures put into the question the purpose of copyright protection in general. Hence, in this paper we tried to point out the normative solutions accepted in modern legal systems and practical implications of what they have. Conclusion that arises is that the legal shaping of technological measures is not completed and that further technological developments open new dilemmas.

  4. IEC 61850 based refurbishment strategies for protection and automation systems

    Energy Technology Data Exchange (ETDEWEB)

    Tholomier, D. [Areva T and D Automation Canada Inc., Monteal, PQ (Canada); Hossenlopp, L. [Areva T and D Automation Inc., Paris (France); Apostolov, A. [Omicron Electronics, Houston, TX (United States)

    2008-07-01

    Electric utilities are currently facing the challenge of refurbishing aging transmission networks and power system infrastructure at a time of severe economic, environmental and competitive constraints. This paper addressed the issue of an appropriate approach to retrofit the hardware and software of substation secondary systems, and how IEC standards could be used to set up a long term strategy. The first part of the paper considered an asset management strategy for refurbishing substation secondary systems, while the second part of the paper addressed the strategies for refurbishing existing power plants. The final section of the paper analyzed refurbishment strategies designed to protect power distribution systems. The impact of IEC 61850 and how legacy devices can be integrated in substation automation systems were discussed. It was concluded that new SCADA systems are needed to handle new technology. Additional features like remote control, remote settings, remote disturbance records analysis and remote maintenance are also needed to properly operate the power system. The value of preventive maintenance using remote monitoring systems to determine the status of all the digital electronic devices installed in substation was also discussed. IEC 61850 offers several opportunities to improve grid operation and control. It supports interoperability between protective relays and control devices from different manufacturers in the substation, which is required in order to achieve substation level interlocking, protection and control functions and improve the efficiency of microprocessor based relays applications. This technology has now passed the initial stage of implementation and several projects are underway worldwide. 13 figs.

  5. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations.

    Science.gov (United States)

    Nieto, Ana; Rios, Ruben; Lopez, Javier

    2018-02-07

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  6. Watermarking Techniques Using Least Significant Bit Algorithm for Digital Image Security Standard Solution- Based Android

    Directory of Open Access Journals (Sweden)

    Ari Muzakir

    2017-05-01

    Full Text Available Ease of deployment of digital image through the internet has positive and negative sides, especially for owners of the original digital image. The positive side of the ease of rapid deployment is the owner of that image deploys digital image files to various sites in the world address. While the downside is that if there is no copyright that serves as protector of the image it will be very easily recognized ownership by other parties. Watermarking is one solution to protect the copyright and know the results of the digital image. With Digital Image Watermarking, copyright resulting digital image will be protected through the insertion of additional information such as owner information and the authenticity of the digital image. The least significant bit (LSB is one of the algorithm is simple and easy to understand. The results of the simulations carried out using android smartphone shows that the LSB watermarking technique is not able to be seen by naked human eye, meaning there is no significant difference in the image of the original files with images that have been inserted watermarking. The resulting image has dimensions of 640x480 with a bit depth of 32 bits. In addition, to determine the function of the ability of the device (smartphone in processing the image using this application used black box testing. 

  7. Digital control programmer for temperature control

    International Nuclear Information System (INIS)

    Rajore, S.B.; Kumar, S.V.

    1993-01-01

    This report describes a PC based digital control programmer for controlling and programming temperature of a high vacuum resistance heating furnace and the software developed to control power using PID algorithm. It also describes the amplifier specially developed to suit the input requirement of the non-standard W5 thermocouple and the software and hardware protections introduced in the system. (author). 5 refs., 8 figs., 1 appendix

  8. The problem of digital heritage: the case of Costa Rica

    Directory of Open Access Journals (Sweden)

    José Bernal Rivas Fernández

    2012-04-01

    Full Text Available In this article we analyze the problem you are facing the production of documents in digital form, as a result of the latest trends in the e-government that poses new challenges for archives and access to information contained in this type of support. This is a brief review the case of Costa Rica, where there have already been some effects in terms of the protection of digital heritage especially by the impact of information technologies and communication.

  9. Metadata, Cataloging, Digitization and Retrieval--Who's Doing What to Whom: The Colorado Digitization Project Experience.

    Science.gov (United States)

    Bishoff, Liz; Garrison, William A.

    This paper describes the experiences of the Colorado Digitization Project (CDP) related to accessing a diverse set of primary resources held by many different cultural heritage institutions. The CDP is a collaborative initiative involving Colorado's archives, historical societies, libraries, and museums. The CDP's goal is to create a virtual…

  10. Newborn health benefits or financial risk protection? An ethical analysis of a real-life dilemma in a setting without universal health coverage.

    Science.gov (United States)

    Onarheim, Kristine Husøy; Norheim, Ole Frithjof; Miljeteig, Ingrid

    2018-03-30

    High healthcare costs make illness precarious for both patients and their families' economic situation. Despite the recent focus on the interconnection between health and financial risk at the systemic level, the ethical conflict between concerns for potential health benefits and financial risk protection at the household level in a low-income setting is less understood. Using a seven-step ethical analysis, we examine a real-life dilemma faced by families and health workers at the micro level in Ethiopia and analyse the acceptability of limiting treatment for an ill newborn to protect against financial risk. We assess available evidence and ethical issues at stake and discuss the dilemma with respect to three priority setting criteria: health maximisation, priority to the worse-off and financial risk protection. Giving priority to health maximisation and extra priority to the worse-off suggests, in this particular case, that limiting treatment is not acceptable even if the total well-being gain from reduced financial risk is taken into account. Our conclusion depends on the facts of the case and the relative weight assigned to these criteria. However, there are problematic aspects with the premise of this dilemma. The most affected parties-the newborn, family members and health worker-cannot make free choices about whether to limit treatment or not, and we thereby accept deprivations of people's substantive freedoms. In settings where healthcare is financed largely out-of-pocket, families and health workers face tragic trade-offs. As countries move towards universal health coverage, financial risk protection for high-priority services is necessary to promote fairness, improve health and reduce poverty. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  11. Information Storage and Management Storing, Managing, and Protecting Digital Information

    CERN Document Server

    EMC

    2009-01-01

    The spiraling growth of digital information makes the ISM book a "must have" addition to your IT reference library. This exponential growth has driven information management technology to new levels of sophistication and complexity, exposing a skills gap that challenge IT managers and professionals alike. The ISM book, written by storage professionals from EMC Corporation, takes an ' open' approach to teaching information storage and management, focusing on concepts and principles – rather that product specifics – that can be applied in all IT environments. The book enables existing

  12. The mandate and work of ICRP Committee 3 on radiological protection in medicine.

    Science.gov (United States)

    Miller, D L; Martin, C J; Rehani, M M

    2018-01-01

    The mandate of Committee 3 of the International Commission on Radiological Protection (ICRP) is concerned with the protection of persons and unborn children when ionising radiation is used in medical diagnosis, therapy, and biomedical research. Protection in veterinary medicine has been newly added to the mandate. Committee 3 develops recommendations and guidance in these areas. The most recent documents published by ICRP that relate to radiological protection in medicine are 'Radiological protection in cone beam computed tomography' (ICRP Publication 129) and 'Radiological protection in ion beam radiotherapy' (ICRP Publication 127). A report in cooperation with ICRP Committee 2 entitled 'Radiation dose to patients from radiopharmaceuticals: a compendium of current information related to frequently used substances' (ICRP Publication 128) has also been published. 'Diagnostic reference levels in medical imaging' (ICRP Publication 135), published in 2017, provides specific advice on the setting and use of diagnostic reference levels for diagnostic and interventional radiology, digital imaging, computed tomography, nuclear medicine, paediatrics, and multi-modality procedures. 'Occupational radiological protection in interventional procedures' was published in March 2018 as ICRP Publication 139. A document on radiological protection in therapy with radiopharmaceuticals is likely to be published in 2018. Work is in progress on several other topics, including appropriate use of effective dose in collaboration with the other ICRP committees, guidance for occupational radiological protection in brachytherapy, justification in medical imaging, and radiation doses to patients from radiopharmaceuticals (an update to ICRP Publication 128). Committee 3 is also considering the development of guidance on radiological protection in medicine related to individual radiosusceptibility, in collaboration with ICRP Committee 1.

  13. Digital anonymity on the internet : new rules for anonymous electronic transactions? an exploration of the private law implications of digital anonymity

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.; Prins, C.

    2001-01-01

    This article sets out the most important conclusions of the first stage of a study into the dimensions of digital anonymity. It is intended to set out the problem, make people aware of the intricacies of the problem and thus stimulate the debate on useful legal structures for anonymity. The

  14. Concepts of Digital Labour: Schelling's Naturphilosophie

    Directory of Open Access Journals (Sweden)

    Kevin Michael Mitchell

    2014-09-01

    Full Text Available This paper uses F.W.J. Schelling’s Naturphilsophie as a point of departure to theorize the concept of digital labour. Beginning with Marx’s distinction between fulfilling and unfulfilling labour, it is argued that the former is labour that is immanent to, and in line with, the Schellingian notion of Nature as process and ungrounded ground, while the unfulfilling variant externalizes Nature and attempts to use it against itself in the service of capital, and the establishment of what I call a state-of-power. Schelling’s The Ages of the World is re-interpreted by exchanging his version of immaterial spirituality for digital virtuality, and as a result, digital labour is viewed as a consequence of previous forms of world historical developments. While digital virtuality is in fact materialist in terms of both the labour that activates it, and the substrate that sustains it, the materiality of the digital is often overlooked in favour of an anti-materialist stance that works to disconnect the digital labourer from their online activity, and preclude the critical self-awareness necessary for the acknowledgement of their online “playful” activity as work. It ends with an analysis of Mark Zuckerberg’s ideational attempt to “re-wire” the world via Facebook’s digital infrastructure, which begins to set the conditions of possibility for inter-personal interaction, and explores the possibilities for resistance available in Foucault’s notion of the care of the self.

  15. Manufacture of Platform Prototype for Digital Safety System

    International Nuclear Information System (INIS)

    Lee, S. Y.; Kim, J. S.; Kim, J. M.

    2010-01-01

    Unit controller is a basic unit of digital safety system platform prototype. The typical unit controller is comprised of CPB(CPU board), CMB(communication board), AIB(Analog input board), AOB(Analog output board), CIB(contact input board), COB(contact output board), and a subrack. It is developed according to H/W development procedure and S/W development life cycle. A digital safety system(for example, plant protection system) is the assemblies of unit controllers. CPB performs the function of each system. DSP(digital signal processor) is built in CPB. CMB is responsible for communication between unit controllers. NSD(Network Switching Device) exchanges data between the unit controllers. Each unit controller of the platform are connected to NSD through CMB. Reliability analyses on unit controller and NSD are performed. These reliability data are used as input of technical validation

  16. Poor collimation in digital radiology: A growing concern

    African Journals Online (AJOL)

    Arun Kumar Agnihotri

    Recommendations for radiation protection origin from the fact that the x-rays can produce genetic and somatic mutations9, especially in pediatric radiology due to their high radiation sensitivity and susceptibility to radiation-induced cancers such as childhood leukemia5,10. Digital radiography was introduced in the 1980s11 ...

  17. Amendment of the Order of 2 November 1976 setting up an Institute for Protection and Nuclear Safety (29 October 1981)

    International Nuclear Information System (INIS)

    1981-01-01

    The Institute for Protection and Nuclear Safety was set up within the Atomic Energy Commission by an Order of 2 November 1976 now amended by this new Order, which specifies that, in connection with nuclear safety, the Institute provides direct technical support to the Central Service for the Safety of Nuclear Installations. (NEA) [fr

  18. LBA-ECO LC-01 SRTM 90-Meter Digital Elevation Model, Northern Ecuadorian Amazon

    Data.gov (United States)

    National Aeronautics and Space Administration — This data set, LBA-ECO LC-01 SRTM 90-Meter Digital Elevation Model, Northern Ecuadorian Amazon, provides 90-meter resolution Digital Elevation Model data used in the...

  19. Digital technology use in ELT classrooms and self-directed learning

    OpenAIRE

    Nehir Sert; Ebru Boynueğri

    2016-01-01

    The digital era is a new challenge for teachers. While children get acquainted with digital technology before the age of six, teachers, who have encountered the digital world at a later time in their lives, struggle with it. Self-directed learning, which is crucial for lifelong learning, can be enhanced by the use of technology within and beyond classroom settings. The aim of this study was to examine the difference between the perceptions of students in low- and high-income groups about thei...

  20. Digital image correlation based on a fast convolution strategy

    Science.gov (United States)

    Yuan, Yuan; Zhan, Qin; Xiong, Chunyang; Huang, Jianyong

    2017-10-01

    In recent years, the efficiency of digital image correlation (DIC) methods has attracted increasing attention because of its increasing importance for many engineering applications. Based on the classical affine optical flow (AOF) algorithm and the well-established inverse compositional Gauss-Newton algorithm, which is essentially a natural extension of the AOF algorithm under a nonlinear iterative framework, this paper develops a set of fast convolution-based DIC algorithms for high-efficiency subpixel image registration. Using a well-developed fast convolution technique, the set of algorithms establishes a series of global data tables (GDTs) over the digital images, which allows the reduction of the computational complexity of DIC significantly. Using the pre-calculated GDTs, the subpixel registration calculations can be implemented efficiently in a look-up-table fashion. Both numerical simulation and experimental verification indicate that the set of algorithms significantly enhances the computational efficiency of DIC, especially in the case of a dense data sampling for the digital images. Because the GDTs need to be computed only once, the algorithms are also suitable for efficiently coping with image sequences that record the time-varying dynamics of specimen deformations.

  1. Digital signal processing at GEND's data center

    International Nuclear Information System (INIS)

    Jackson, J.E.

    1977-01-01

    The conversion and recording of analog signals in digital form has been an active element in the manufacturing operations of the General Electric Neutron Devices Department (GEND) since 1966. The first computerized data system for these digitized waveforms was implemented at GEND's data center approximately two years later during 1968. The evolution and integration of these two activities at GEND are addressed in this paper. Beginning with the tester--data center interface, emphasis is placed on previous approaches, current capabilities, near-term trends, and future requirements. The digitizing process has developed into a firmly established set of hardware and associated software techniques which has proven itself as an accurate, reliable procedure for capturing waveform characteristics. The most important aspect of this process is the recent trend toward increased sampling rates and a greater number of digitized parameters per operation. The combined effect is a tremendous increase in output data volumes. Since digital signal processing carries the potential for significant contributions to manufacturing quality and reliability, as well as engineering design and development, increased activity in this area appears extremely desirable. 11 figures

  2. Finite test sets development method for test execution of safety critical software

    International Nuclear Information System (INIS)

    El-Bordany Ayman; Yun, Won Young

    2014-01-01

    It reads inputs, computes new states, and updates output for each scan cycle. Korea Nuclear Instrumentation and Control System (KNICS) has recently developed a fully digitalized Reactor Protection System (RPS) based on PLD. As a digital system, this RPS is equipped with a dedicated software. The Reliability of this software is crucial to NPPs safety where its malfunction may cause irreversible consequences and affect the whole system as a Common Cause Failure (CCF). To guarantee the reliability of the whole system, the reliability of this software needs to be quantified. There are three representative methods for software reliability quantification, namely the Verification and Validation (V and V) quality-based method, the Software Reliability Growth Model (SRGM), and the test-based method. An important concept of the guidance is that the test sets represent 'trajectories' (a series of successive values for the input variables of a program that occur during the operation of the software over time) in the space of inputs to the software.. Actually, the inputs to the software depends on the state of plant at that time, and these inputs form a new internal state of the software by changing values of some variables. In other words, internal state of the software at specific timing depends on the history of past inputs. Here the internal state of the software which can be changed by past inputs is named as Context of Software (CoS). In a certain CoS, a software failure occurs when a fault is triggered by some inputs. To cover the failure occurrence mechanism of a software, preceding researches insist that the inputs should be a trajectory form. However, in this approach, there are two critical problems. One is the length of the trajectory input. Input trajectory should long enough to cover failure mechanism, but the enough length is not clear. What is worse, to cover some accident scenario, one set of input should represent dozen hours of successive values

  3. Analysis of Valve Requirements for High-Efficiency Digital Displacement Fluid Power Motors

    DEFF Research Database (Denmark)

    Rømer, Daniel; Johansen, Per; Pedersen, Henrik C.

    2013-01-01

    Digital displacement fluid power motors have been shown to enable high-efficiency operation in a wide operation range, including the part load range where conventional fluid power motors suffers from poor efficiencies. The use of these digital displacement motors set new requirements for the valve...... transition time and flow-pressure coefficient are normalized, leading to a presentation of the general efficiency map of the digital displacement motor. Finally the performance of existing commercial valves with respect to digital motors is commented....

  4. Setting ozone critical levels for protecting horticultural Mediterranean crops: Case study of tomato

    International Nuclear Information System (INIS)

    González-Fernández, I.; Calvo, E.; Gerosa, G.; Bermejo, V.; Marzuoli, R.; Calatayud, V.; Alonso, R.

    2014-01-01

    Seven experiments carried out in Italy and Spain have been used to parameterising a stomatal conductance model and establishing exposure– and dose–response relationships for yield and quality of tomato with the main goal of setting O 3 critical levels (CLe). CLe with confidence intervals, between brackets, were set at an accumulated hourly O 3 exposure over 40 nl l −1 , AOT40 = 8.4 (1.2, 15.6) ppm h and a phytotoxic ozone dose above a threshold of 6 nmol m −2 s −1 , POD6 = 2.7 (0.8, 4.6) mmol m −2 for yield and AOT40 = 18.7 (8.5, 28.8) ppm h and POD6 = 4.1 (2.0, 6.2) mmol m −2 for quality, both indices performing equally well. CLe confidence intervals provide information on the quality of the dataset and should be included in future calculations of O 3 CLe for improving current methodologies. These CLe, derived for sensitive tomato cultivars, should not be applied for quantifying O 3 -induced losses at the risk of making important overestimations of the economical losses associated with O 3 pollution. -- Highlights: • Seven independent experiments from Italy and Spain were analysed. • O 3 critical levels are proposed for the protection of summer horticultural crops. • Exposure- and flux-based O 3 indices performed equally well. • Confidence intervals of the new O 3 critical levels are calculated. • A new method to estimate the degree risk of O 3 damage is proposed. -- Critical levels for tomato yield were set at AOT40 = 8.4 ppm h and POD6 = 2.7 mmol m −2 and confidence intervals should be used for improving O 3 risk assessment

  5. PERSEPSI GURU TENTANG DIGITAL NATIVES, SUMBER BELAJAR DIGITAL DAN MOTIVASI MEMANFAATKAN SUMBER BELAJAR DIGITAL

    Directory of Open Access Journals (Sweden)

    Ferdinandus Bate Dopo

    2016-06-01

    TEACHER’S PERCEPTION OF DIGITAL NATIVES, DIGITAL LEARNING RESOURCES AND MOTIVATION TO UTILIZE DIGITAL LEARNING RESOURCES Abstract This study aims to reveal (1 the influence of teacher's perception of digital natives toward teacher’s motivation to utilize digital learning resources. (2 the influence of teacher's perception of digital learning resources toward teacher’s motivation to utilize digital learning resources and (3 the influence both of teacher's perception of digital natives and digital learning resources toward teacher’s motivation to utilize digital learning resources. This study used the descriptive-correlational quantitative approach. The Population and sample were high school teachers of Regina Pacis Bajawa, SMA Seminari Mataloko and SMA Negeri 1 Golewa. Sampling technique in this research was proportional random sampling. A questionnaire was used to obtain the data. The data were analyzed using the Likert scale. The instrument was developed based on lattice theory of assessment instruments relevant to the study variables. The analysis technique used is a regression followed by statistic technique of t test and F test with the significance level of 0.05. The results are as follows. (1 There is a positive and significant influence of teacher's perception of digital natives toward teacher’s motivation to utilize digital learning resources. (2 There is a positive and significant influence of teacher's perception of digital learning resources and teacher’s motivation to utilize digital learning resources. (3 There is a positive and significant influence both of teacher's perception of digital learning resources and teacher’s motivation to utilize digital learning resources. Keywords: perception, digital natives, digital learning resources, motivation

  6. Digital Storytelling and Employer Branding. An Exploratory Connection

    OpenAIRE

    Camelia CRIȘAN; Dumitru BORȚUN

    2017-01-01

    Our paper aims at explaining what is digital storytelling and its particular methodology, and how its use in the organizational settings could influence the employer branding. For such purpose, the authors have conducted an exploratory research, where a group of participants has been asked to rate their interest in a company, after viewing solely the online commercial communication (website and Facebook account), while another group has viewed two digital stories produced by two employees of ...

  7. Digital pathology for the primary diagnosis of breast histopathological specimens: an innovative validation and concordance study on digital pathology validation and training.

    Science.gov (United States)

    Williams, Bethany Jill; Hanby, Andrew; Millican-Slater, Rebecca; Nijhawan, Anju; Verghese, Eldo; Treanor, Darren

    2018-03-01

    To train and individually validate a group of breast pathologists in specialty-specific digital primary diagnosis by using a novel protocol endorsed by the Royal College of Pathologists' new guideline for digital pathology. The protocol allows early exposure to live digital reporting, in a risk-mitigated environment, and focuses on patient safety and professional development. Three specialty breast pathologists completed training in the use of a digital microscopy system, and were exposed to a training set of 20 challenging cases, designed to help them identify personal digital diagnostic pitfalls. Following this, the three pathologists viewed a total of 694 live, entire breast cases. All primary diagnoses were made on digital slides, with immediate glass slide review and reconciliation before final case sign-out. There was complete clinical concordance between the glass and digital impression of the case in 98.8% of cases. Only 1.2% of cases had a clinically significant difference in diagnosis/prognosis on glass and digital slide reads. All pathologists elected to continue using the digital microscope as the standard for breast histopathology specimens, with deferral to glass for a limited number of clinical/histological scenarios as a safety net. Individual training and validation for digital primary diagnosis allows pathologists to develop competence and confidence in their digital diagnostic skills, and aids safe and responsible transition from the light microscope to the digital microscope. © 2017 John Wiley & Sons Ltd.

  8. Discussion on construction of scientific and technological digital library in nuclear industry

    International Nuclear Information System (INIS)

    Yin Huilan

    2010-01-01

    With the rapid development of digital and network technology, traditional libraries have been unable to meet the needs of the times. Digital libraries will gradually take the place of traditional libraries. Under the circumstances, how will the libraries of the enterprises in nuclear industry face this transformation? This paper gives the brief descriptions and comparative analyses in the four aspects: the definition of the digital library, the meaning of nuclear scientific and technological digital library, the characteristics of the digital library, and major problems in the construction of nuclear scientific and technological digital library that should be solved. Therefore, setting up the digital library is very important. At the same time, it's very necessary and urgent for the libraries of the enterprises in nuclear industry to establish nuclear scientific and technological digital library. (author)

  9. Digital demodulator for wide bandwidth SAR

    DEFF Research Database (Denmark)

    Jørgensen, Jørn Hjelm

    2000-01-01

    A novel approach to the design of efficient digital quadrature demodulators for wide bandwidth SAR systems is described. Efficiency is obtained by setting the intermediate frequency to 1/4 the ADC sampling frequency. One channel is made filter-free by synchronizing the local oscillator...

  10. Multimedia foundations core concepts for digital design

    CERN Document Server

    Costello, Vic; Youngblood, Susan

    2012-01-01

    Understand the core concepts and skills of multimedia production and digital storytelling using text, graphics, photographs, sound, motion, and video. Then, put it all together using the skills that you have developed for effective project planning, collaboration, visual communication, and graphic design. Presented in full color with hundreds of vibrant illustrations, Multimedia Foundations trains you in the principles and skill sets common to all forms of digital media production, enabling you to create successful, engaging content, no matter what tools you are using. Companion website

  11. An Investigation of Digital Payment Platform Designs

    DEFF Research Database (Denmark)

    Kazan, Erol; Damsgaard, Jan

    2014-01-01

    This paper focuses on the triumph march of mobile phones that currently are annexing music players, navigation devices, and cameras as separate physical objects. The next target is set on payment. Through synthesizing available literature, we construct a framework for studying digital payment...... platforms that combines platform, technology and business design aspects. The framework is applied to conduct a comparative case study of digital payment platforms. Four types of market actors are considered: banks, mobile network operators, merchants, and startups, which are incumbents and disrupters....... By hosting third-party services, payment instruments are evolving from single-purpose to multi-functional ones. Our research extends existing payment literature from the MSP perspective to emphasize certain digital payment platform components, which impact strategies and complementary products....

  12. Electronic Health Record Meets Digital Library

    Science.gov (United States)

    Humphreys, Betsy L.

    2000-01-01

    Linking the electronic health record to the digital library is a Web-era reformulation of the long-standing informatics goal of seamless integration of automated clinical data and relevant knowledge-based information to support informed decisions. The spread of the Internet, the development of the World Wide Web, and converging format standards for electronic health data and digital publications make effective linking increasingly feasible. Some existing systems link electronic health data and knowledge-based information in limited settings or limited ways. Yet many challenging informatics research problems remain to be solved before flexible and seamless linking becomes a reality and before systems become capable of delivering the specific piece of information needed at the time and place a decision must be made. Connecting the electronic health record to the digital library also requires positive resolution of important policy issues, including health data privacy, government envouragement of high-speed communications, electronic intellectual property rights, and standards for health data and for digital libraries. Both the research problems and the policy issues should be important priorities for the field of medical informatics. PMID:10984463

  13. Traditional Chinese medicine information digitalization discussion.

    Science.gov (United States)

    Xie, Qi; Cui, Meng; Wu, Zhen-Dou; Zhao, Hong

    2010-11-01

    With the rapid development of information science, the ancient Traditional Chinese Medicine is combining with it rapidly, and forming a new discipline: Traditional Chinese Medicine (TCM) Informatics. TCM information digitalization is the process of digital processing, which uses modern information technology to obtain, process, store, and analyze TCM-related data, information, and knowledge. It gathers research, application development, and service in an integrated whole. This article systematically analyzes the key research issues of TCM informatics (e.g., on data resources, data standard, data system construction). Also, the methodology and technology of TCM information digitalization research are thoroughly discussed. The starting point of the research on traditional Chinese medical information digitalization was in question. The research from the current study research was drawn from collected information that was stored, transferred, and utilized. This process helped to place an emphasis on the topic, as well as extending its research areas. In addition, an innovative TCM information virtual study center was set up to support a great deal of fundamental work.

  14. a Review of Digital Watermarking and Copyright Control Technology for Cultural Relics

    Science.gov (United States)

    Liu, H.; Hou, M.; Hu, Y.

    2018-04-01

    With the rapid growth of the application and sharing of the 3-D model data in the protection of cultural relics, the problem of Shared security and copyright control of the three-dimensional model of cultural relics is becoming increasingly prominent. Followed by a digital watermarking copyright control has become the frontier technology of 3-D model security protection of cultural relics and effective means, related technology research and application in recent years also got further development. 3-D model based on cultural relics digital watermarking and copyright control technology, introduces the research background and demand, its unique characteristics were described, and its development and application of the algorithm are discussed, and the prospects of the future development trend and some problems and the solution.

  15. Implications of the Protection of Personal Information (POPI)

    African Journals Online (AJOL)

    The main purpose of the POPI act is to protect the processing of personal information ... a smartphone, iPad or personal computer), digital storage devices. (iCloud, Dropbox ... (vi) Reasonable security regarding the safeguarding, integrity and.

  16. A risk-based approach to setting priorities in protecting bridges against terrorist attacks.

    Science.gov (United States)

    Leung, Maria; Lambert, James H; Mosenthal, Alexander

    2004-08-01

    This article presents an approach to the problem of terrorism risk assessment and management by adapting the framework of the risk filtering, ranking, and management method. The assessment is conducted at two levels: (1) the system level, and (2) the asset-specific level. The system-level risk assessment attempts to identify and prioritize critical infrastructures from an inventory of system assets. The definition of critical infrastructures offered by Presidential Decision Directive 63 was used to determine the set of attributes to identify critical assets--categorized according to national, regional, and local impact. An example application is demonstrated using information from the Federal Highway Administration National Bridge Inventory for the State of Virginia. Conversely, the asset-specific risk assessment performs an in-depth analysis of the threats and vulnerabilities of a specific critical infrastructure. An illustration is presented to offer some insights in risk scenario identification and prioritization, multiobjective evaluation of management options, and extreme-event analysis for critical infrastructure protection.

  17. Pervasive Technologies and the Paradoxes of Multimodal Digital Communication

    Directory of Open Access Journals (Sweden)

    Sandra Petroni

    2014-12-01

    Full Text Available Contemporary societies are greatly challenged by paradoxes in all facets of life. Digital communication encodes and produces meaning by making use of these contradictory relations. In this contribution, three digital paradoxes will be presented. The first paradox is grounded in the process of remediation in digital settings which mirrors a contradictory double logic. Digital culture, in fact, wants both to multiply its media and to eliminate all traces of mediation. The second antinomy has its origins in the new concept of linguistic entropy: a structured information disorder that is regulated by usability and multimodality. In accordance with the second paradox, the third one stems from further processes that are framing, a multimodal resource, and linking, a hypertextual resource.

  18. 3D Digital Legos for Teaching Security Protocols

    Science.gov (United States)

    Yu, Li; Harrison, L.; Lu, Aidong; Li, Zhiwei; Wang, Weichao

    2011-01-01

    We have designed and developed a 3D digital Lego system as an education tool for teaching security protocols effectively in Information Assurance courses (Lego is a trademark of the LEGO Group. Here, we use it only to represent the pieces of a construction set.). Our approach applies the pedagogical methods learned from toy construction sets by…

  19. Intraoral radiology in general dental practices - a comparison of digital and film-based X-ray systems with regard to radiation protection and dose reduction.

    Science.gov (United States)

    Anissi, H D; Geibel, M A

    2014-08-01

    The purpose of this study was to gain insight into the distribution and application of digital intraoral radiographic techniques within general dental practices and to compare these with film-based systems in terms of patient dose reduction. 1100 questionnaires were handed out to general dental practitioners. Data was analyzed with respect to the type of system by using descriptive statistics and nonparametric tests, i.e. Kruskal-Wallis, Mann-Whitney and chi-square test (SPSS 20). 64% of the questioned dentists still use film-based radiology, 23% utilize storage phosphor plate (SPP) systems and 13% use a charge-coupled device (CCD). A strong correlation between the number of dentists working in a practice and the use of digital dental imaging was observed. Almost 3/4 of the film users work with E- or F-speed film. 45% of them refuse to change to a digital system. The use of lead aprons was popular, while only a minority preferred thyroid shields and rectangular collimators. A fourfold reduction of exposure time from D-speed film to CCD systems was observed. Due to detector size and positioning errors, users of CCD systems take significantly more single-tooth radiographs in total. Considering the number of radiographs per patient, there is only a slight tendency towards more X-rays with CCD systems. Up to image generation, digital systems seem to be as or even more difficult to handle than film-based systems, while their handling was favored after radiographic exposure. Despite a slight increase of radiographs taken with CCD systems, there is a significant dosage reduction. Corresponding to the decrease in exposure time, the patient dose for SPP systems is reduced to one half compared to film. The main issues in CCD technology are positioning errors and the size of the X-ray detectors which are difficult to eliminate. The usage of radiation protection measures still needs to be improved. ► Responsible use of digital intraoral radiology results in a significant

  20. Effect of Different Tube Potential Settings on Caries Detection using PSP Plate and Conventional Film.

    Science.gov (United States)

    De Melo, Daniela Pita; Cruz, Adriana Dibo; Melo, Saulo Leonardo Sousa; De Farias, Julyanna Filgueiras GonçAlves; Haiter-Neto, Francisco; De Almeida, Solange Maria

    2015-04-01

    To compare intraoral Phosphor Stimulable Plate digital system and intraoral film using different tube settings on incipient proximal caries detection. Five blocks, with five teeth each, were radiographically examined using phosphor plates and F-speed films. The images were acquired in 07 different tube potentials from 50-80 kV. The films were digitized. Three oral radiologists scored the images for the presence of caries using a 5-point rating scale. The areas under ROC curve were calculated. The influence of tube kilovoltage was verified by ANOVA and pair wise comparisons performed using Tukey test. Mean ROC curve areas varied from 0.446-0.628 for digital images and 0.494-0.559 for conventional images. The tube setting of 70 kV presented the best result both for digital and conventional images. Considering the image type separately, 70 kV scored highest followed by 75 and 65 kV for digital images (p=0.084). For conventional image modality, even though 70 kV presented the best result, it did not differ significantly from 80 kV, not differing from 60 and 55 kV, which did not differ from 75, 65 and 50 kV (p=0.53). Phosphor plate digital images seem to be more susceptible to tube setting potential variations then digitized film images.

  1. Effect of Different Tube Potential Settings on Caries Detection using PSP Plate and Conventional Film

    Science.gov (United States)

    Cruz, Adriana Dibo; Melo, Saulo Leonardo Sousa; De Farias, Julyanna Filgueiras GonçAlves; Haiter-Neto, Francisco; De Almeida, Solange Maria

    2015-01-01

    Purpose To compare intraoral Phosphor Stimulable Plate digital system and intraoral film using different tube settings on incipient proximal caries detection. Materials and Methods Five blocks, with five teeth each, were radiographically examined using phosphor plates and F-speed films. The images were acquired in 07 different tube potentials from 50-80 kV. The films were digitized. Three oral radiologists scored the images for the presence of caries using a 5-point rating scale. The areas under ROC curve were calculated. The influence of tube kilovoltage was verified by ANOVA and pair wise comparisons performed using Tukey test. Results Mean ROC curve areas varied from 0.446-0.628 for digital images and 0.494–0.559 for conventional images. The tube setting of 70 kV presented the best result both for digital and conventional images. Considering the image type separately, 70 kV scored highest followed by 75 and 65 kV for digital images (p=0.084). For conventional image modality, even though 70 kV presented the best result, it did not differ significantly from 80 kV, not differing from 60 and 55 kV, which did not differ from 75, 65 and 50 kV (p=0.53). Conclusion Phosphor plate digital images seem to be more susceptible to tube setting potential variations then digitized film images. PMID:26023645

  2. Chromatic Dispersion Estimation in Digital Coherent Receivers

    DEFF Research Database (Denmark)

    Soriano, Ruben Andres; Hauske, Fabian N.; Guerrero Gonzalez, Neil

    2011-01-01

    Polarization-diverse coherent demodulation allows to compensate large values of accumulated linear distortion by digital signal processing. In particular, in uncompensated links without optical dispersion compensation, the parameter of the residual chromatic dispersion (CD) is vital to set...

  3. Protection of the Mountain Ridgelines Utilizing GIS

    Science.gov (United States)

    Lee, S.; Lee, M.

    2013-12-01

    Korean peninsula is characterized by numerous hills and mountains. The longest mountain ridgeline starting from Mt. Baekdusan to Mt. Jirisan is called Baekdudaegan which is similar to the continental divide or topographical watershed. In this study, GIS data, such as remotesensing images, national digital map, and watershed map, are used to analyze Korean mountain ridgelines structure and one Baekdudaegan data and nine Ridgelines are extracted. When extracted Baekdudaegan and other Ridgelines are overlaid on geologic maps, granite and gneiss are main components on the mountain ridgelines. The main mountain ridgelines are considered as the spiritual heritage overlapped in the land in Korea. As the environmental state is relatively better than those of other region in Korea, so many mountain ridgelines are legally protected by national legislation. The mountain ridgelines has hierarchical system; Baekdudaegan, Jeongmaek, Gimaek and Jimaek etc. according to their scale and total lengths of ridgelines. As only part of mountain ridgelines are currently protected by law or managed in environmental impact assessment (EIA) procedure, we think that most part of them should be under protection. Considering the environmental state of the ridgelines, we think that some protective measures should be set up nearby 1 km on both sides of them. If there goes a development plan or project near the main mountain ridgelines, topographical change index (TCI) and topographical scale index (TSI) etc. are to be applied in EIA. This study intends: firstly, to analyze the topological characteristics of the Korean mountain ridgelines using GIS, secondly, to analyze the geological characteristics of nearby mountain ridgelines, and lastly, to find a way to utilize the results on EIA.

  4. Three-dimensional displays for natural hazards analysis, using classified Landsat Thematic Mapper digital data and large-scale digital elevation models

    Science.gov (United States)

    Butler, David R.; Walsh, Stephen J.; Brown, Daniel G.

    1991-01-01

    Methods are described for using Landsat Thematic Mapper digital data and digital elevation models for the display of natural hazard sites in a mountainous region of northwestern Montana, USA. Hazard zones can be easily identified on the three-dimensional images. Proximity of facilities such as highways and building locations to hazard sites can also be easily displayed. A temporal sequence of Landsat TM (or similar) satellite data sets could also be used to display landscape changes associated with dynamic natural hazard processes.

  5. Optimum design of seat region in valves suitable for digital displacement machines

    DEFF Research Database (Denmark)

    Roemer, Daniel Beck; Johansen, Per; Pedersen, Henrik C.

    2014-01-01

    Digital displacement fluid power is an upcoming technology setting new standards for the achievable efficiency in variable displacement fluid power pumps and motors. In the present work, an annular seat valve suitable for use in digital displacement units is considered, and the valve geometry...

  6. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Directory of Open Access Journals (Sweden)

    Ana Nieto

    2018-02-01

    Full Text Available IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  7. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Science.gov (United States)

    Lopez, Javier

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases. PMID:29414864

  8. A new approach to pre-processing digital image for wavelet-based watermark

    Science.gov (United States)

    Agreste, Santa; Andaloro, Guido

    2008-11-01

    The growth of the Internet has increased the phenomenon of digital piracy, in multimedia objects, like software, image, video, audio and text. Therefore it is strategic to individualize and to develop methods and numerical algorithms, which are stable and have low computational cost, that will allow us to find a solution to these problems. We describe a digital watermarking algorithm for color image protection and authenticity: robust, not blind, and wavelet-based. The use of Discrete Wavelet Transform is motivated by good time-frequency features and a good match with Human Visual System directives. These two combined elements are important for building an invisible and robust watermark. Moreover our algorithm can work with any image, thanks to the step of pre-processing of the image that includes resize techniques that adapt to the size of the original image for Wavelet transform. The watermark signal is calculated in correlation with the image features and statistic properties. In the detection step we apply a re-synchronization between the original and watermarked image according to the Neyman-Pearson statistic criterion. Experimentation on a large set of different images has been shown to be resistant against geometric, filtering, and StirMark attacks with a low rate of false alarm.

  9. Approach to improve the axial power distribution for the application of a core protection system

    International Nuclear Information System (INIS)

    Koo, Bon Seung; Cho, Jin Young; Song, Jae Seung; Lee, Chung Chan

    2008-01-01

    A Core Protection Calculator System (CPCS) is a digital computer based on a safety system for generating trip signals based on a calculation of the Departure from Nucleate Boiling Ratio (DNBR) and the Local Power Density (LPD) by using several on-line measured system parameters including 3-level ex-core detector signals. A few approaches to improve the axial power distribution for the application of a core protection system were performed. For the Yonggwang unit 3 (cycle 1), axial power distributions were synthesized by applying the cubic spline method and compared with the neutronics code results. Several new cubic spline function sets were generated for the drastically distorted axial shapes for a 3-level ex-core detector system. In addition, synthesized axial shapes with a 5-level ex-core detector signals were compared with the conventional 3-level detector results. It demonstrates that the newly generated function sets appear to be better than that of the conventional CPC from the aspect of an axial power synthesis, particularly for the heavily distorted shapes. Moreover, synthesis of an axial power distribution using 5-level ex-core detector signals appears to be better than that of the 3-level ex-core detector signals. From the above results, improvement of the thermal margin is expected because of an uncertainty decreasing a core protection system. (authors)

  10. EnviroAtlas - Protected Lands for the Conterminous United States

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset shows the percentage of Watershed Boundary Dataset (WBD) 12-digit Hydrologic Unit (HUC) that is included in the USGS National Gap Analysis Program (GAP)...

  11. Why Map Issues? On Controversy Analysis as a Digital Method.

    Science.gov (United States)

    Marres, Noortje

    2015-09-01

    This article takes stock of recent efforts to implement controversy analysis as a digital method in the study of science, technology, and society (STS) and beyond and outlines a distinctive approach to address the problem of digital bias. Digital media technologies exert significant influence on the enactment of controversy in online settings, and this risks undermining the substantive focus of controversy analysis conducted by digital means. To address this problem, I propose a shift in thematic focus from controversy analysis to issue mapping. The article begins by distinguishing between three broad frameworks that currently guide the development of controversy analysis as a digital method, namely, demarcationist, discursive, and empiricist. Each has been adopted in STS, but only the last one offers a digital "move beyond impartiality." I demonstrate this approach by analyzing issues of Internet governance with the aid of the social media platform Twitter.

  12. Digital Natives or Digital Tribes?

    Science.gov (United States)

    Watson, Ian Robert

    2013-01-01

    This research builds upon the discourse surrounding digital natives. A literature review into the digital native phenomena was undertaken and found that researchers are beginning to identify the digital native as not one cohesive group but of individuals influenced by other factors. Primary research by means of questionnaire survey of technologies…

  13. Analysis of redox additive-based overcharge protection for rechargeable lithium batteries

    Science.gov (United States)

    Narayanan, S. R.; Surampudi, S.; Attia, A. I.; Bankston, C. P.

    1991-01-01

    The overcharge condition in secondary lithium batteries employing redox additives for overcharge protection, has been theoretically analyzed in terms of a finite linear diffusion model. The analysis leads to expressions relating the steady-state overcharge current density and cell voltage to the concentration, diffusion coefficient, standard reduction potential of the redox couple, and interelectrode distance. The model permits the estimation of the maximum permissible overcharge rate for any chosen set of system conditions. Digital simulation of the overcharge experiment leads to numerical representation of the potential transients, and estimate of the influence of diffusion coefficient and interelectrode distance on the transient attainment of the steady state during overcharge. The model has been experimentally verified using 1,1-prime-dimethyl ferrocene as a redox additive. The analysis of the experimental results in terms of the theory allows the calculation of the diffusion coefficient and the formal potential of the redox couple. The model and the theoretical results may be exploited in the design and optimization of overcharge protection by the redox additive approach.

  14. A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT

    Directory of Open Access Journals (Sweden)

    Guoyin Zhang

    2017-01-01

    Full Text Available Since its introduction, IoT (Internet of Things has enjoyed vigorous support from governments and research institutions around the world, and remarkable achievements have been obtained. The perception layer of IoT plays an important role as a link between the IoT and the real world; the security has become a bottleneck restricting the further development of IoT. The perception layer is a self-organizing network system consisting of various resource-constrained sensor nodes through wireless communication. Accordingly, the costly encryption mechanism cannot be applied to the perception layer. In this paper, a novel lightweight data integrity protection scheme based on fragile watermark is proposed to solve the contradiction between the security and restricted resource of perception layer. To improve the security, we design a position random watermark (PRW strategy to calculate the embedding position by temporal dynamics of sensing data. The digital watermark is generated by one-way hash function SHA-1 before embedding to the dynamic computed position. In this way, the security vulnerabilities introduced by fixed embedding position can not only be solved effectively, but also achieve zero disturbance to the data. The security analysis and simulation results show that the proposed scheme can effectively ensure the integrity of the data at low cost.

  15. UK Election 2015:Setting the Agenda

    OpenAIRE

    Moore, Martin John Edwards; Ramsay, Gordon Neil

    2015-01-01

    UK election 2015: setting the agenda builds on innovativework by Dr Martin Moore and Dr Gordon Ramsaystarted in January 2015. Using new methods forcollecting and analysing news and social media content,the report provides a fresh perspective on how politicalcommunication is changing in the digital era.

  16. Closing the protection gap: setting health standards for nuclear power workers

    International Nuclear Information System (INIS)

    Kasperson, R.E.; Lundblad, J.

    1982-01-01

    The article discusses the current and proposed standards for protecting workers from ionizing radiation. It reviews the 1981 EPA proposals put forth to this end, identifying the issues at stake and possible alternatives, and considers whether closing the protection gap is feasible and socially desirable - and, if so, how it best should be accomplished

  17. Implementing digital skills training in care homes: a literature review.

    Science.gov (United States)

    Wild, Deidre; Kydd, Angela; Szczepura, Ala

    2016-05-01

    This article is the first of a two-part series that informs and describes digital skills training using a dedicated console computer provided for staff and residents in a care home setting. This was part of a programme of culture change in a large care home with nursing in Glasgow, Scotland. The literature review shows that over the past decade there has been a gradual increase in the use of digital technology by staff and older people in community settings including care homes. Policy from the European Commission presents a persuasive argument for the advancement of technology-enabled care to counter the future impact of an increased number of people of advanced age on finite health and social care resources. The psychosocial and environmental issues that inhibit or enhance the acquisition of digital skills in care homes are considered and include the identification of exemplar schemes and the support involved.

  18. EnviroAtlas - HU12_polygon

    Data.gov (United States)

    U.S. Environmental Protection Agency — This data set is a complete digital hydrologic unit boundary layer to the Subwatershed (12-digit) 6th level for the entire United States. This data set consists of...

  19. Reflexões sobre o patrimônio digital a partir da experiência do projeto Arquigrafia │ Digital heritage: reflections on the Arquigrafia project

    Directory of Open Access Journals (Sweden)

    Artur Simões Rozestraten

    2015-05-01

    ABSTRACT This paper  proposes a critical reflection on documental and technological challenges regarding conservation, digitization, cataloguing and web dissemination of images in the experience of the Arquigrafia multidisciplinary project (www.arquigrafia.org.br. Arquigrafia is a collaborative web image sharing environment open to photographic institutional archives and users' private collections. The need to organize and share this information set, as well as the specificities of descriptive and thematic representation for effective retrieval of this digital heritage are also presented. Besides the issues issues related to the financing of digitization projects of collections and the preservation of documents and digital files, this article discuss the need to establish a public policy that incorporates the latest standards and the most appropriate methodology for the treatment, organization and retrieval information concerning the digital heritage that has been produced by Brazilian public institutions such as university libraries, archives and museums. Keywords: Image; Digital Heritage; Collaborative Environment; Web.

  20. Digital subtraction cerebral angiography by intraarterial injection: comparison with conventional angiography

    International Nuclear Information System (INIS)

    Brant-Zawadzki, M.; Gould, R.; Norman, D.; Newton, T.H.; Lane, B.

    1983-01-01

    For 4 months, a prototype digital subtraction system was used to obtain images of the cerebral vasculature after intraarterial contrast injections. In 12 instances, the intraarterial injections were recorded with both a digital subtraction unit and conventional direct magnification film-screen system. The digital subtraction and conventional film subtraction images were compared and graded for quality and information content by three skilled observers. In addition, quantitative measurements of contrast-detail performance and spatial resolution were obtained on both the digital system and the screen-film imaging chain. In a clinical setting, both the digital subtraction and conventional film-screen systems provided similar quality images and angiographic information. Contrast-detail curves demonstrated that digital subtraction angiography outperformed conventional film technique for low-contrast objects. Digital subtraction angiography also reduced the time required to obtain the angiogram, markedly reduced film cost, and lowered the contrast agent burden