WorldWideScience

Sample records for inadvertent intruder analysis

  1. Inadvertent Intruder Analysis For The Portsmouth On-Site Waste Disposal Facility (OSWDF)

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Frank G. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Phifer, Mark A. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2014-01-22

    The inadvertent intruder analysis considers the radiological impacts to hypothetical persons who are assumed to inadvertently intrude on the Portsmouth OSWDF site after institutional control ceases 100 years after site closure. For the purposes of this analysis, we assume that the waste disposal in the OSWDF occurs at time zero, the site is under institutional control for the next 100 years, and inadvertent intrusion can occur over the following 1,000 year time period. Disposal of low-level radioactive waste in the OSWDF must meet a requirement to assess impacts on such individuals, and demonstrate that the effective dose equivalent to an intruder would not likely exceed 100 mrem per year for scenarios involving continuous exposure (i.e. chronic) or 500 mrem for scenarios involving a single acute exposure. The focus in development of exposure scenarios for inadvertent intruders was on selecting reasonable events that may occur, giving consideration to regional customs and construction practices. An important assumption in all scenarios is that an intruder has no prior knowledge of the existence of a waste disposal facility at the site. Results of the analysis show that a hypothetical inadvertent intruder at the OSWDF who, in the worst case scenario, resides on the site and consumes vegetables from a garden established on the site using contaminated soil (chronic agriculture scenario) would receive a maximum chronic dose of approximately 7.0 mrem/yr during the 1000 year period of assessment. This dose falls well below the DOE chronic dose limit of 100 mrem/yr. Results of the analysis also showed that a hypothetical inadvertent intruder at the OSWDF who, in the worst case scenario, excavates a basement in the soil that reaches the waste (acute basement construction scenario) would receive a maximum acute dose of approximately 0.25 mrem/yr during the 1000 year period of assessment. This dose falls well below the DOE acute dose limit of 500 mrem/yr. Disposal inventory

  2. Inadvertent Intruder Calculatios for F Tank Farm

    Energy Technology Data Exchange (ETDEWEB)

    Koffman, L

    2005-09-12

    Savannah River National Laboratory (SRNL) has been providing radiological performance assessment analysis for Savannah River Site (SRS) solid waste disposal facilities (McDowell-Boyer 2000). The performance assessment considers numerous potential exposure pathways that could occur in the future. One set of exposure scenarios, known as inadvertent intruder analysis, considers the impact on hypothetical individuals who are assumed to inadvertently intrude onto the waste disposal site. An Automated Intruder Analysis application was developed by SRNL (Koffman 2004) that simplifies the inadvertent intruder analysis into a routine, automated calculation. Based on SRNL's experience, personnel from Planning Integration & Technology of Closure Business Unit asked SRNL to assist with inadvertent intruder calculations for F Tank Farm to support the development of the Tank Closure Waste Determination Document. Meetings were held to discuss the scenarios to be calculated and the assumptions to be used in the calculations. As a result of the meetings, SRNL was asked to perform four scenario calculations. Two of the scenarios are the same as those calculated by the Automated Intruder Analysis application and these can be calculated directly by providing appropriate inputs. The other two scenarios involve use of groundwater by the intruder and the Automated Intruder Analysis application was adapted to perform these calculations. The four calculations to be performed are: (1) A post-drilling scenario in which the drilling penetrates a transfer line. (2) A calculation of internal exposure due to drinking water from a well located near a waste tank. (3) A post-drilling calculation in which waste is introduced by irrigation of the garden with water from a well located near a waste tank. (4) A resident scenario where a house is built above transfer lines. Note that calculations 1 and 4 use sources from the waste inventory in the transfer line (given in Table 1) whereas

  3. Potential impact of DOE's performance objective for protection of inadvertent intruders on low-level waste disposals at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1993-01-01

    Performance objectives for disposal of low-level radioactive waste at Department of Energy (DOE) sites include limits on radiation dose to inadvertent intruders. This paper investigates the potential impact of DOE's performance objective for protection of inadvertent intruders on the acceptability of low-level waste disposals at Oak Ridge National Laboratory (ORNL). The analysis is based on waste volumes and radionuclide inventories for recent disposals and estimated doses to an inadvertent intruder for assumed exposure scenarios. The analysis indicates that more than 99% of the total volume of waste in recent disposals meets the performance objective for inadvertent intruders, and the volume of waste found to be unacceptable for disposal is only about 16 m 3 . Therefore, DOE's performance objective for protection of inadvertent intruders probably will not have unreasonably adverse impacts on acceptable waste disposals at ORNL

  4. A proposed alternative approach for protection of inadvertent human intruders from buried Department of Energy low level radioactive wastes

    International Nuclear Information System (INIS)

    Cochran, J.R.

    1995-01-01

    The burial of radioactive wastes creates a legacy. To limit the impact of this legacy on future generations, we establish and comply with performance objectives. This paper reviews performance objectives for the long-term isolation of buried radioactive wastes; identifies regulatorly-defined performance objectives for protecting the inadvertent human intruder (IHI) from buried low-level radioactive waste (LLW); (3) discusses a shortcoming of the current approach; and (4) offers an alternative approach for protecting the IHI. This alternative approach is written specifically for the burial of US Department of Energy (DOE) wastes at the Nevada Test Site (NTS), although the approach might be applied at other DOE burial sites

  5. Intruder Activity Analysis under Unreliable Sensor Networks

    Energy Technology Data Exchange (ETDEWEB)

    Tae-Sic Yoo; Humberto E. Garcia

    2007-09-01

    This paper addresses the problem of counting intruder activities within a monitored domain by a sensor network. The deployed sensors are unreliable. We characterize imperfect sensors with misdetection and false-alarm probabilities. We model intruder activities with Markov Chains. A set of Hidden Markov Models (HMM) models the imperfect sensors and intruder activities to be monitored. A novel sequential change detection/isolation algorithm is developed to detect and isolate a change from an HMM representing no intruder activity to another HMM representing some intruder activities. Procedures for estimating the entry time and the trace of intruder activities are developed. A domain monitoring example is given to illustrate the presented concepts and computational procedures.

  6. [Prewarming according to the AWMF S3 guidelines on preventing inadvertant perioperative hypothermia 2014 : Retrospective analysis of 7786 patients].

    Science.gov (United States)

    Grote, R; Wetz, A J; Bräuer, A; Menzel, M

    2018-01-01

    Inadvertent perioperative hypothermia, which is defined as a core body temperature of less than 36.0 °C, can have serious consequences in surgery patients. These include cardiac complications, increased blood loss, wound infections and postoperative shivering; therefore, the scientific evidence that inadvertent perioperative hypothermia should be avoided is undisputed and several national guidelines have been published summarizing the scientific evidence and recommending specific procedures. The German AWMF guidelines were the first to emphasize the importance of prewarming for surgery patients to avoid inadvertant perioperative hypothermia; however, in contrast to intraoperative warming, prewarming is so far not sufficiently implemented in clinical practice in many hospitals. Furthermore, a recent study has questioned the effectiveness of prewarming. The aim of this retrospective investigation was to evaluate the hypothermia rates that can be achieved when prewarming in the anesthesia induction room is introduced into the clinical practice and performed in addition to intraoperative warming. The ethics committee of the Medical Faculty of the Martin Luther University Halle Wittenberg gave approval for data storage and retrospective data analysis from the anesthesia database. According to the existing local standard operating procedure, prewarming with forced air was performed in addition to intraoperative warming in the anesthesia induction room in 3899 patients receiving general anesthesia with a duration of 30 min or longer from January 2015 to December 2016. The results were compared with a control group of 3887 patients from July 2012 to August 2014 who received intraoperative warming but were not subjected to prewarming. Tracheal intubation was carried out in all patients and temperature measurements after the induction of anesthesia were performed using esophageal, urinary catheter or intra-arterial temperature probes. The mean duration of prewarming

  7. Lazy Mobile Intruders

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis

    2013-01-01

    that by communication, the malicious code can learn new information that it can use in subsequent operations, or that we may have several pieces of malicious code that can exchange information if they “meet”. To formalize both the platform and the malicious code we use the mobile ambient calculus, since it provides......We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching...... a small, abstract formalism that models the essence of mobile code. We provide a decision procedure for security against arbitrary intruder processes when the honest processes can only perform a bounded number of steps and without path constraints in communication. We show that this problem is NP-complete....

  8. Lazy Mobile Intruders

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis

    that by communication, the malicious code can learn new information that it can use in subsequent operations, or that we may have several pieces of malicious code that can exchange information if they \\meet". To formalize both the platform and the malicious code we use the mobile ambient calculus, since it provides......We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching...... a small, abstract formalism that models the essence of mobile code. We provide a decision procedure for security against arbitrary intruder ambients when the honest ambients can only perform a bounded number of steps and without path constraints in communication....

  9. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: the ONSITE/MAXI1 computer program. Supplement No. 1

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.; Neuder, S.M.

    1986-05-01

    The document entitled Intruder Dose Pathway Analysis of the Onsite Disposal of Radioactive Wastes: The ONSITE/MAXI1 Computer Program (1984) summarizes initial efforts to develop human-intrustion scenarios and a modified version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. This document is a supplement to that document and summarizes efforts to further modify and improve the ONSITE/MAXI1 software package. To facilitate cross-referencing, it follows the same format. Notable improvements to the software package include the capability to account for shielding conditions that represent noncompacted trash wastes and the option to indicate alternative land-use condition;s. This supplement contains a description of the implementation of these modifications. In addition, a series of discussions are included in an attempt to increase the user's understanding of the scenarios and dose calculation methods. These discussions respond to frequently asked questions about the mathematical models and use of the software. Computer listings of the ONSITE/MAXI1 computer program are included as Appendices A and B of this document. Appendix C lists external exposure dose-rate factor libraries

  10. Large-scale experiments for the vulnerability analysis of buildings impacted and intruded by fluviatile torrential hazard processes

    Science.gov (United States)

    Sturm, Michael; Gems, Bernhard; Fuchs, Sven; Mazzorana, Bruno; Papathoma-Köhle, Maria; Aufleger, Markus

    2016-04-01

    In European mountain regions, losses due to torrential hazards are still considerable high despite the ongoing debate on an overall increasing or decreasing trend. Recent events in Austria severely revealed that due to technical and economic reasons, an overall protection of settlements in the alpine environment against torrential hazards is not feasible. On the side of the hazard process, events with unpredictable intensities may represent overload scenarios for existent protection structures in the torrent catchments. They bear a particular risk of significant losses in the living space. Although the importance of vulnerability is widely recognised, there is still a research gap concerning its assessment. Currently, potential losses at buildings due to torrential hazards and their comparison with reinstatement costs are determined by the use of empirical functions. Hence, relations of process intensities and the extent of losses, gathered by the analysis of historic hazard events and the information of object-specific restoration values, are used. This approach does not represent a physics-based and integral concept since relevant and often crucial processes, as the intrusion of the fluid-sediment-mixture into elements at risk, are not considered. Based on these findings, our work is targeted at extending these findings and models of present risk research in the context of an integral, more physics-based vulnerability analysis concept. Fluviatile torrential hazard processes and their impacts on the building envelope are experimentally modelled. Material intrusion processes are thereby explicitly considered. Dynamic impacts are gathered quantitatively and spatially distributed by the use of a large set of force transducers. The experimental tests are accomplished with artificial, vertical and skewed plates, including also openings for material intrusion. Further, the impacts on specific buildings within the test site of the work, the fan apex of the Schnannerbach

  11. Incidence of Inadvertent Dural Puncture During CT Fluoroscopy-Guided Interlaminar Epidural Corticosteroid Injections in the Cervical Spine: An Analysis of 974 Cases.

    Science.gov (United States)

    Amrhein, T J; Parivash, S N; Gray, L; Kranz, P G

    2017-09-01

    The objective of this study is to determine the rate of inadvertent dural puncture during CT fluoroscopy-guided cervical interlaminar epidural corticosteroid injection. In addition, in a subanalysis, we aim to assess the rate of inadvertent dural puncture superior to C5-C6 occurring during interlaminar epidural corticosteroid injection using CT fluoroscopy guidance because such injections are not performed using conventional fluoroscopy. Images obtained from consecutive CT fluoroscopy-guided cervical interlaminar epidural corticosteroid injections conducted from November 2009 to November 2015 were reviewed. The following information was recorded: the presence of inadvertent dural puncture, the level of the cervical interlaminar space, approach laterality (left or right), anteroposterior spinal canal diameter, and the presence of a trainee. Two-tailed Fisher exact tests were used for assessment of categoric variables, and t tests were used for continuous variables. A total of 974 cervical interlaminar epidural corticosteroid injections were identified in 728 patients. Inadvertent dural punctures were identified in association with 1.4% (14/974) of these injections; all punctures were recognized during the procedure. Needle placements were performed at every cervical level (C1-C2 through C7-T1). The highest rate of dural puncture (2.8%) occurred at C5-C6. No dural punctures occurred superior to C5-C6 (16.6% of cases). The complication rate was 0.4%. Only greater anteroposterior spinal canal diameter was associated with increased dural puncture rates (p = 0.049). CT fluoroscopy-guided cervical interlaminar epidural corticosteroid injections were performed at all levels throughout the cervical spine. A very low complication rate and a minimal rate of inadvertent dural puncture were noted, similar to previously reported rates for conventional fluoroscopy-guided injections limited to the lower cervical spine only.

  12. [Intruding upper incisors using mini-screw anchorage in patients with gummy smile].

    Science.gov (United States)

    Li, Yun-Yi; Zhou, Yan-Heng; Lin, Jiu-Xiang

    2009-08-01

    To evaluate the effectiveness of mini-screw anchorage on intruding upper incisors in patients with gummy smile. Sixteen female patients (mean age: 23.8 years) were involved in this study. The mini-screws were placed between upper lateral incisors and canines on both sides for intruding upper incisors together with fixed appliance. The cephalometric analysis was carried out. Totally 63 teeth in 16 patients were intruded successfully and the deep overbite was decreased by (2.74 +/- 2.00) mm (P gummy smile by intruding upper incisors with mini-screw implant.

  13. Intruder scenarios for site-specific waste classification

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.

    1988-01-01

    The US Department of Energy (DOE) is currently revising its low-level radioactive waste (LLW) management requirements and guidelines for waste generated at its facilities that support defense missions. Specifically, draft DOE 5820.2A, Chapter 3, describes the purpose, policy, and requirements necessary for the management of defense LLW. The draft DOE policy calls for DOE LLW operations to be managed to protect the health and safety of the public, preserve the environment, and ensure that no remedial action will be necessary after termination of operations. The requirements and guidelines apply to radioactive wastes but are also intended to apply to mixed hazardous and radioactive wastes as defined in draft DOE 5400.5, Hazardous and Radioactive Mixed Waste. The basic approach used by DOE is to establish overall performance objectives in terms of ground-water protection and public radiation dose limits and to require site-specific performance assessments to determine compliance. As a result of these performance assessments, each site shall develop waste acceptance criteria that define the allowable quantities and concentrations of specific radioisotopes. Additional limitations on waste disposal design, waste form, and waste treatment shall also be developed on a site-specific basis. As a key step in the site-specific performance assessments, an evaluation must be conducted of potential radiation doses to intruders who may inadvertently move onto a closed DOE LLW disposal site after loss of institutional controls must be conducted. This paper describes the types of intruder scenarios that should be considered when performing this step of the site-specific performance assessment

  14. Safety analysis of increase in heat removal from reactor coolant system with inadvertent operation of passive residual heat removal at no-load conditions

    Directory of Open Access Journals (Sweden)

    Ge Shao

    2015-06-01

    Full Text Available The advanced passive pressurized water reactor (PWR is being constructed in China and the passive residual heat removal (PRHR system was designed to remove the decay heat. During accident scenarios with increase of heat removal from the primary coolant system, the actuation of the PRHR will enhance the cooldown of the primary coolant system. There is a risk of power excursion during the cooldown of the primary coolant system. Therefore, it is necessary to analyze the thermal hydraulic behavior of the reactor coolant system (RCS at this condition. The advanced passive PWR model, including major components in the RCS, is built by SCDAP/RELAP5 code. The thermal hydraulic behavior of the core is studied for two typical accident sequences with PRHR actuation to investigate the core cooling capability with conservative assumptions, a main steam line break (MSLB event and inadvertent opening of a steam generator (SG safety valve event. The results show that the core is ultimately shut down by the boric acid solution delivered by Core Makeup Tank (CMT injections. The effects of CMT boric acid concentration and the activation delay time on accident consequences are analyzed for MSLB, which shows that there is no consequential damage to the fuel or reactor coolant system in the selected conditions.

  15. Managing Inadvertent Arterial Catheterization During Central Venous Access Procedures

    International Nuclear Information System (INIS)

    Nicholson, Tony; Ettles, Duncan; Robinson, Graham

    2004-01-01

    Purpose: Approximately 200,000 central venous catheterizations are carried out annually in the National Health Service in the United Kingdom. Inadvertent arterial puncture occurs in up to 3.7%. Significant morbidity and death has been reported. We report on our experience in the endovascular treatment of this iatrogenic complication. Methods: Retrospective analysis was carried out of 9 cases referred for endovascular treatment of inadvertent arterial puncture during central venous catheterization over a 5 year period. Results: It was not possible to obtain accurate figures on the numbers of central venous catheterizations carried out during the time period. Five patients were referred with carotid or subclavian pseudoaneurysms and hemothorax following inadvertent arterial catheter insertion and subsequent removal. These patients all underwent percutaneous balloon tamponade and/or stent-graft insertion. More recently 4 patients were referred with the catheter still in situ and were successfully treated with a percutaneous closure device. Conclusion: If inadvertent arterial catheterization during central venous access procedures is recognized and catheters removed, sequelae can be treated percutaneously. However, once the complication is recognized it is better to leave the catheter in situ and seal the artery percutaneously with a closure device

  16. Human intruder dose assessment for deep geological disposal

    International Nuclear Information System (INIS)

    Smith, G. M.; Molinero, J.; Delos, A.; Valls, A.; Conesa, A.; Smith, K.; Hjerpe, T.

    2013-07-01

    For near-surface disposal, approaches to assessment of inadvertent human intrusion have been developed through international cooperation within the IAEA's ISAM programme. Other assessments have considered intrusion into deep geological disposal facilities, but comparable international cooperation to develop an approach for deep disposal has not taken place. Accordingly, the BIOPROTA collaboration project presented here (1) examined the technical aspects of why and how deep geological intrusion might occur; (2) considered how and to what degree radiation exposure would arise to the people involved in such intrusion; (3) identified the processes which constrain the uncertainties; and hence (4) developed and documented an approach for evaluation of human intruder doses which addresses the criteria adopted by the IAEA and takes account of other international guidance and human intrusion assessment experience. Models for radiation exposure of the drilling workers and geologists were developed and described together with compilation of relevant input data, taking into account relevant combinations of drilling technique, geological formation and repository material. Consideration has been given also to others who might be exposed to contaminated material left at the site after drilling work has ceased. The models have been designed to be simple and stylised, in accordance with international recommendations. The set of combinations comprises 58 different scenarios which cover a very wide range of human intrusion possibilities via deep drilling. (orig.)

  17. An intruder model for verifying liveness in security protocols

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi

    2006-01-01

    We present a process algebraic intruder model for verifying a class of liveness properties of security protocols. For this class, the proposed intruder model is proved to be equivalent to a Dolev-Yao intruder that does not delay indefinitely the delivery of messages. In order to prove the

  18. An Intruder Model for Verifying Termination in Security Protocols

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    We formally describe an intruder that is suitable for checking fairness properties of security protocols. The intruder is proved to be equivalent to the Dolev-Yao intruder that respects the resilient communication channels assumption, in the sense that, if a fairness property holds in one of these

  19. Detection of Intelligent Intruders in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yun Wang

    2016-01-01

    Full Text Available Most of the existing research works on the intrusion detection problem in a wireless sensor network (WSN assume linear or random mobility patterns in abstracting intruders’ models in traversing the WSN field. However, in real-life WSN applications, an intruder is usually an intelligent mobile robot with environment learning and detection avoidance capability (i.e., the capability to avoid surrounding sensors. Due to this, the literature results based on the linear or random mobility models may not be applied to the real-life WSN design and deployment for efficient and effective intrusion detection in practice. This motivates us to investigate the impact of intruder’s intelligence on the intrusion detection problem in a WSN for various applications. To be specific, we propose two intrusion algorithms, the pinball and flood-fill algorithms, to mimic the intelligent motion and behaviors of a mobile intruder in detecting and circumventing nearby sensors for detection avoidance while heading for its destination. The two proposed algorithms are integrated into a WSN framework for intrusion detection analysis in various circumstances. Monte Carlo simulations are conducted, and the results indicate that: (1 the performance of a WSN drastically changes as a result of the intruder’s intelligence in avoiding sensor detections and intrusion algorithms; (2 network parameters, including node density, sensing range and communication range, play a crucial part in the effectiveness of the intruder’s intrusion algorithms; and (3 it is imperative to integrate intruder’s intelligence in the WSN research for intruder detection problems under various application circumstances.

  20. Inadvertent P-hacking among trials and systematic reviews of the effect of progestogens in pregnancy? A systematic review and meta-analysis.

    Science.gov (United States)

    Prior, M; Hibberd, R; Asemota, N; Thornton, J G

    2017-06-01

    Progestogens have been evaluated in numerous trials and meta-analyses, many of which concluded they were effective. However, two large trials PROMISE and OPPTIMUM have recently concluded that progesterone was ineffective. This raises the possibility that earlier studies and reviews had been biased by either selective publication or selective choice of outcomes, so called "P-hacking". To compare the findings all progestogen trials and systematic reviews with those of trials with pre-registered primary outcomes which avoided selective outcome reporting. Search of PubMed, the Cochrane Library and trial registries. Registration PROSPERO CRD42016035303. Systematic reviews of randomised trials comparing progestogen with placebo in pregnancy and the individual trials included in those reviews. The subset of trials reporting a pre-registered primary outcome were compared with the totality of trials and reviews. For reviews all outcomes were included. For individual trials all outcomes reported in the systematic reviews were included. For the comparison group we recorded the registered primary outcome from trials that were either registered before they started, or registered during the recruitment phase and also double blind. Nineteen of twenty-nine meta-analyses concluded that progestogens were effective. Twenty-two trials reported their pre-registered primary outcomes. There was no effect of progesterone on primary registered dichotomous outcome RR 1.00 (95% CI 0.94-1.07). Only one of the 22 showed a nominally statistically significant benefit. When evaluated in registered double-blind trials with analysis restricted to predefined primary outcomes, progestational agents in pregnancy are ineffective. Progestogens to prevent pregnancy loss, an example of P-hacking. © 2017 Royal College of Obstetricians and Gynaecologists.

  1. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    Energy Technology Data Exchange (ETDEWEB)

    Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

  2. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Trauth, K.M.; Hora, S.C.; Guzowski, R.V.

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation

  3. Localization Capability of Cooperative Anti-Intruder Radar Systems

    Directory of Open Access Journals (Sweden)

    Mauro Montanari

    2008-06-01

    Full Text Available System aspects of an anti-intruder multistatic radar based on impulse radio ultrawideband (UWB technology are addressed. The investigated system is composed of one transmitting node and at least three receiving nodes, positioned in the surveillance area with the aim of detecting and locating a human intruder (target that moves inside the area. Such systems, referred to also as UWB radar sensor networks, must satisfy severe power constraints worldwide imposed by, for example, the Federal Communications Commission (FCC and by the European Commission (EC power spectral density masks. A single transmitter-receiver pair (bistatic radar is considered at first. Given the available transmitted power and the capability of the receiving node to resolve the UWB pulses in the time domain, the surveillance area regions where the target is detectable, and those where it is not, are obtained. Moreover, the range estimation error for the transmitter-receiver pair is discussed. By employing this analysis, a multistatic system is then considered, composed of one transmitter and three or four cooperating receivers. For this multistatic system, the impact of the nodes location on area coverage, necessary transmitted power and localization uncertainty is studied, assuming a circular surveillance area. It is highlighted how area coverage and transmitted power, on one side, and localization uncertainty, on the other side, require opposite criteria of nodes placement. Consequently, the need for a system compromising between these factors is shown. Finally, a simple and effective criterion for placing the transmitter and the receivers is drawn.

  4. Friction force regimes and the conditions for endless penetration of an intruder into a granular medium.

    Science.gov (United States)

    López-Rodríguez, L A; Pacheco-Vázquez, F

    2017-09-01

    An intruder penetrating into a granular column experiences a depth-dependent friction force F(z). Different regimes of F(z) have been measured depending on the experimental design: a nearly linear dependence for shallow penetrations, total saturation at large depths, and an exponential increase when the intruder approaches the bottom of the granular bed. We report here an experiment that allows us to measure the different regimes in a single run during the quasistatic descent of a sphere in a light granular medium. From the analysis of the resistance in the saturation zone, it was found that F(z) follows a cube-power-law dependence on the intruder diameter and an exponential increase with the packing fraction of the bed. Moreover, we determine the critical mass m_{c} required to observe infinite penetration and its dependence on the above parameters. Finally, we use our results to estimate the final penetration depth reached by intruders of masses mintruder of any density (larger than the density of the granular bed) can sink indefinitely into the granular medium if the bed packing fraction is smaller than a critical value.

  5. Capturing intruders based on Voronoi diagrams assisted by information networks

    Directory of Open Access Journals (Sweden)

    Jonghoek Kim

    2017-01-01

    Full Text Available We consider a scenario of deploying multiple robots to capture all intruders in a cluttered workspace with many obstacles. Here, we say that a robot captures an intruder in the case where the intruder is within the maximum range of a weapon on the robot. All robots use the Voronoi diagram as the topological map of the workspace. Due to obstacles, intruders are confined to move along a passage between obstacles. Suppose the weapons on every robot are powerful enough to cover a passage in the workspace. Then, we can consider a simplified scenario such that robots and intruders are restricted to stay on the Voronoi diagram. We assume that a robot can detect the position of any intruder using the information network. This article presents an intruder capturing strategy that is robust to time delay in data transfer using the network. Our strategy does not require the localization of a node or a robot. Based on this strategy, we provide an upper bound for the minimum number of robots required to capture all intruders on a general graph, which leads to a result of the Voronoi diagram. Lastly, we provide MATLAB (version 7.10.0 R2010a simulations to verify the effectiveness of our capturing strategy.

  6. Intruder Motion in Two-Dimensional Shaken Granular Beds

    International Nuclear Information System (INIS)

    Ma Huan-Ping; Lv Yong-Jun; Zheng Ning; Shi Qing-Fan; Li Liang-Sheng

    2014-01-01

    The dynamical behavior of an intruder immersed in a two-dimensional shaken granular bed is experimentally investigated. With two types of background particles, f−Γ phase diagrams depicting the intruder's motion are measured and compared. It is found that even with the same size and density ratio of the intruder to the background particles, the intruder exhibits a distinct behavior at given vibrational conditions: rising behavior in one granular bed; sinking behavior in another granular bed. We slightly tune the size and density ratio to confirm the reliability of the experimental results. In addition, we examine the influences of interstitial air, convection and the initial position on the intruder's motion, speculating that the opposite motion could be traced to the material properties of the background particles

  7. Automatic implantable cardioverter/defibrillator: inadvertent discharges during permanent pacemaker magnet tests.

    Science.gov (United States)

    Kim, S G; Furman, S; Matos, J A; Waspe, L E; Brodman, R; Fisher, J D

    1987-05-01

    A patient with an automatic implantable cardioverter defibrillator (AICD) received two inadvertent shocks when a magnet was placed over the pacer during a routine permanent pacer check. Analysis of the rhythm strip suggested that both patients' QRS complexes (133 beats/minute) and asynchronous pacer artifacts (70 beats/minute) were counted by the AICD sensing system and exceeded the rate criteria of 153 beats/minute. This resulted in shocks from the AICD during sinus rhythm at 133 beats/minute. To avoid possible inadvertent shocks, an AICD should be deactivated while a magnet is placed over the pacemaker during a permanent pacer check.

  8. On the submerging of a spherical intruder into granular beds

    Directory of Open Access Journals (Sweden)

    Wu Chuan-Yu

    2017-01-01

    Full Text Available Granular materials are complex systems and their mechanical behaviours are determined by the material properties of individual particles, the interaction between particles and the surrounding media, which are still incompletely understood. Using an advanced discrete element method (DEM, we simulate the submerging process of a spherical projectile (an intruder into granular materials of various properties with a zero penetration velocity (i.e. the intruder is touching the top surface of the granular bed and released from stationary and examine its settling behaviour. By systematically changing the density and size of the intruder and the particle density (i.e. the density of the particles in the granular bed, we find that the intruder can sink deep into the granular bed even with a zero penetration velocity. Furthermore, we confirm that under certain conditions the granular bed can behave like a Newtonian liquid and the submerging intruder can reach a constant velocity, i.e. the terminal velocity, identical to the settling of a sphere in a liquid, as observed experimentally. A mathematical model is also developed to predict the maximum penetration depth of the intruder. The model predictions are compared with experimental data reported in the literature,good agreement was obtained, demonstrating the model can accurately predict the submerging behaviour of the intruder in the granular media.

  9. On the submerging of a spherical intruder into granular beds

    Science.gov (United States)

    Wu, Chuan-Yu; Zhang, Ling; Chen, Lan

    2017-06-01

    Granular materials are complex systems and their mechanical behaviours are determined by the material properties of individual particles, the interaction between particles and the surrounding media, which are still incompletely understood. Using an advanced discrete element method (DEM), we simulate the submerging process of a spherical projectile (an intruder) into granular materials of various properties with a zero penetration velocity (i.e. the intruder is touching the top surface of the granular bed and released from stationary) and examine its settling behaviour. By systematically changing the density and size of the intruder and the particle density (i.e. the density of the particles in the granular bed), we find that the intruder can sink deep into the granular bed even with a zero penetration velocity. Furthermore, we confirm that under certain conditions the granular bed can behave like a Newtonian liquid and the submerging intruder can reach a constant velocity, i.e. the terminal velocity, identical to the settling of a sphere in a liquid, as observed experimentally. A mathematical model is also developed to predict the maximum penetration depth of the intruder. The model predictions are compared with experimental data reported in the literature,good agreement was obtained, demonstrating the model can accurately predict the submerging behaviour of the intruder in the granular media.

  10. Inadvertent polychlorinated biphenyls in commercial paint pigments.

    Science.gov (United States)

    Hu, Dingfei; Hornbuckle, Keri C

    2010-04-15

    A polychlorinated biphenyl (PCB) that was not produced as part of the Aroclor mixtures banned in the 1980s was recently reported in air samples collected in Chicago, Philadelphia, the Arctic, and several sites around the Great Lakes. In Chicago, the congener 3,3'-dichlorobiphenyl or PCB11 was found to be the fifth most concentrated congener and ubiquitous throughout the city. The congener exhibited strong seasonal concentration trends that suggest volatilization of this compound from common outdoor surfaces. Due to these findings and also the compound's presence in waters that received waste from paint manufacturing facilities, we hypothesized that PCB11 may be present in current commercial paint. In this study we measured PCBs in paint sold on the current retail market. We tested 33 commercial paint pigments purchased from three local paint stores. The pigment samples were analyzed for all 209 PCB congeners using gas chromatography with tandem mass spectrometry (GC-MS/MS). More than 50 PCB congeners including several dioxin-like PCBs were detected, and the PCB profiles varied due to different types of pigments and different manufacturing processes. PCB congeners were detected in azo and phthalocyanine pigments which are commonly used in paint but also in inks, textiles, paper, cosmetics, leather, plastics, food and other materials. Our findings suggest several possible mechanisms for the inadvertent production of specific PCB congeners during the manufacturing of paint pigments.

  11. Inadvertent Polychlorinated Biphenyls in Commercial Paint Pigments†

    Science.gov (United States)

    2009-01-01

    A polychlorinated biphenyl (PCB) that was not produced as part of the Aroclor mixtures banned in the 1980s was recently reported in air samples collected in Chicago, Philadelphia, the Arctic, and several sites around the Great Lakes. In Chicago, the congener 3,3′-dichlorobiphenyl or PCB11 was found to be the fifth most concentrated congener and ubiquitous throughout the city. The congener exhibited strong seasonal concentration trends that suggest volatilization of this compound from common outdoor surfaces. Due to these findings and also the compound’s presence in waters that received waste from paint manufacturing facilities, we hypothesized that PCB11 may be present in current commercial paint. In this study we measured PCBs in paint sold on the current retail market. We tested 33 commercial paint pigments purchased from three local paint stores. The pigment samples were analyzed for all 209 PCB congeners using gas chromatography with tandem mass spectrometry (GC-MS/MS). More than 50 PCB congeners including several dioxin-like PCBs were detected, and the PCB profiles varied due to different types of pigments and different manufacturing processes. PCB congeners were detected in azo and phthalocyanine pigments which are commonly used in paint but also in inks, textiles, paper, cosmetics, leather, plastics, food and other materials. Our findings suggest several possible mechanisms for the inadvertent production of specific PCB congeners during the manufacturing of paint pigments. PMID:19957996

  12. Description of intruded states in a weak-coupling basis

    International Nuclear Information System (INIS)

    Arenas Peris, G.E.

    1989-01-01

    The systematics of intruder states is described in terms of a particle-hole weak-coupling basis, the first-order correction being then reduced to the monopole component of the interaction. The necessary matrix elements can be obtained from experimental data by using a model-consistent method. Calculations are performed for intruder states in the lead region as well as for the Zr isotopes. The agreement with the experimental data is striking in both cases. (Author) [es

  13. How sand grains stop a high speed intruder

    Science.gov (United States)

    Behringer, Robert

    When a speeding intruder impacts on a granular material, it comes rapidly to rest after penetrating only a modest distance. Empirical dynamical models, dating to the 19th century (if not earlier), describe the drag on the intruder in terms of two types of depth-dependent forces: one a static force, which also includes gravity, and the other a collisional force proportional to the square of the instantaneous speed of the intruder. What processes occur in the material to so quickly decelerate the intruder? We address this question through experiments and simulations (work of Lou Kondic and collaborators). We first probe the granular response using quasi-two-dimensional granular materials consisting of photoelastic discs. When such a particle experiences a force, it appears bright under cross-polarized illumination. High speed video reveals dynamic force transmission into the material along force chains that form in response to the intruder motion. These chains are nearly normal to the intruder surface, implying that collisional rather than frictional forces dominate the momentum transfer from intruder to grains. These observations allow the formation of a collision-based model that correctly captures the collisional drag force for both 2D and 3D intruders of a variety of shapes. This talk will develop a collisional picture of impact, and also explore the change in the system response as the impact speed increases. Experimental collaborators include Abe Clark, Cacey Stevens Bester, and Alec Petersen. This work supported by DTRA, NSF Grant DMR1206351, NASA Grant NNX15AD38G, and the William M. Keck Foundation.

  14. Intruder states at the N=20 shell closure

    International Nuclear Information System (INIS)

    Heyde, K.

    1991-01-01

    It is indicated that mp-mh (multiple) excitations across closed shells can occur at low energy throughout the nuclear mass region. Besides the 4p-4h, 8p-8h configurations, that are deformed, coexisting low-lying excitations are mainly observed for light N=Z nuclei. A new class of 2p-2h intruder O + state is shown to exist in nuclei where a neutron excess is present. In the latter cases, the proton-neutron interaction energy between the excited 2p-2h configuration and the open shell accounts for a very specific mass dependence in the intruder excitation energy. The experimental evidence that corroborates the idea of intruder states will be given. (G.P.) 28 refs.; 13 figs

  15. Side-by-side intruders within a granular flow

    Science.gov (United States)

    Caballero-Robledo, Gabriel; Cuellar-Galan, Eli A.; Clemente-Lopez, Cesar L.; Malaga, Carlos; Mandujano Sanchez, Francisco J.; Acevedo-Escalante, Manuel F.

    Lift and drag forces on side-by-side intruders within a granular flow are studied using experiments, numerical simulations and a hydrodynamic model. Regimes of attractive and repulsive lift forces are found as a function of the separation of the intruders and flow velocity. The origin of such forces is investigated by correlating them to differences in the mean value and fluctuations of flow velocity in the regions around the intruders. Numerically, our three dimensional system is studied through Discrete Element Particle simulations adapted to use a Graphics Processing Unit (GPU). The hydrodynamic model that we apply to describe the system is kinetic theory extended for dense granular flow. This work has been supported by Conacyt, Mexico, under Grant Fronteras de la Ciencia 2015-02-1178.

  16. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  17. [Gummy smile correction by intruding upper incisors with mini-screw implant: an esthetic evaluation by the golden facial mask].

    Science.gov (United States)

    Liu, Da-Wei; Zhou, Yan-Heng; Li, Yun-Yi

    2010-09-01

    to use a golden facial mask to classify the gummy smile and then to evaluate the effectiveness of correction gummy smile by intruding upper incisors and canines with mini-screw implants. sixteen female and 1 male gummy smile patients with an age range of 16 - 40 years, 26.2 years on average, were involved in the study. The mini-screw implants were inserted buccally between upper lateral incisors and canines on both sides for intruding upper incisors together with fixed appliance. The golden facial mask was introduced to analyze the frontal view of smile pre- and post-treatment. gummy smile of all patients involved in the study was reduced by intruding upper incisors and canines, and the average period for intruding about 9.8 months. According to the analysis of the golden facial mask, the reasons of gummy smile in different patients were different before treatment. However, the lips, teeth and gingiva were almost coincident with the golden facial mask after treatment. analyzing the relationship among lip, teeth and gingiva by the golden facial mask, the inprovement of gummy smile by using mini-screw implants to intrude the upper incisors can be evaluated.

  18. The Star Wars Kid and the Bedroom Intruder

    DEFF Research Database (Denmark)

    Christensen, Jørgen Riber

    2011-01-01

    Jørgen Riber Christensen's article Star Wars Kid and the Bedroom Intruder looks at how people may unexpectedly become icons of the Internet, through a transgression of the private sphere. Surveillance and celebrity is revealed to be bound together with a disciplinary effect, at the same time...

  19. Inadvertent transarterial insertion of atrial and ventricular defibrillator leads.

    Science.gov (United States)

    Issa, Ziad F; Rumman, Syeda S; Mullin, James C

    2009-01-01

    Inadvertent placement of pacemaker and implantable cardioverter-defibrillator (ICD) leads in the left ventricle (LV) is a rare but well-recognized complication of device implantation [1]. We report a case of inadvertent transarterial implantation of dual-chamber ICD leads; the ventricular lead positioned in the LV and the atrial lead positioned in the aortic root. The tip of the atrial lead migrated across the aortic wall and captured the epicardial surface of the left atrium. The diagnosis was made 5 years after the implantation procedure with no apparent adverse events directly related to left heart lead placement.

  20. Inadvertent doping through nutritional supplements is a reality | van ...

    African Journals Online (AJOL)

    ... contaminated with banned substances and that inadvertent doping through nutritional supplement use is a reality for athletes. The sporting community should therefore be aware that supplements might contain anabolic androgenic steroids and stimulants that are not declared on the labels. SA Sports Medicine Vol.16(2) ...

  1. Inadvertent doping through nutritional supplements is a reality

    African Journals Online (AJOL)

    Enrique

    ephedrines and caffeine. Conclusion. The results showed that approximately 7% of supplements tested may be mislabelled or contaminat- ed with banned substances and that inadvertent doping through nutritional supplement use is a reality for athletes. The sporting community should therefore be aware that supplements ...

  2. Inadvertent presence of genetically modified elements in maize food ...

    African Journals Online (AJOL)

    Kenya has a biosafety law and has tested genetically modified (GM) maize under confinement and containment, but has neither released nor commercialized any GM crop. This study assessed various maize food products from the Kenyan farms and markets for the inadvertent presence of GMOs. It assessed the possibility ...

  3. Preventing Inadvertent Placement of Foley Catheter into Prostatic ...

    African Journals Online (AJOL)

    Percutaneous suprapubic trocar cystostomy (SPC) is often needed to drain the bladder when urethral catheterization either fails or is not advisable.[1] It is ... vertical or slightly tilting its tip toward umbilicus during foley placement, prevents the inadvertent migration of catheter into prostatic urethra and further complications.

  4. Reorganization of intruder Using Ad-Hoc Network And RFID

    Directory of Open Access Journals (Sweden)

    Vishakha Hagawane

    2014-05-01

    Full Text Available This system is to develop a centralized computer application that needs to identify moving person in a specific area using wireless network. In this paper, we develop a new indoor tracking algorithm using received signal strength. The RFID is able to detect the humans and provide information about the direction of the movement. The gathered information from the node is to be given to the base station for processing. . This application is able to detect and track person, and report direction of the intruder to a central base station. In this system we design nodes through which we are able to track the person. The human intruder is detected using Zigbee.

  5. Sexual aggression by intruders in hooded crow Corvus cornix

    OpenAIRE

    Zduniak, Piotr; Kosicki, Jakub Z.; Yosef, Reuven

    2015-01-01

    The hooded crow Corvus cornix is a west Palaearctic, solitary nesting, monogamous corvid. In the breeding season, populations are characterized by a social organization wherein breeding pairs are territorial and non-breeding individuals, called floaters, live in flocks. During a study of the breeding ecology of the hooded crow, conducted in a protected flooded area, we monitored nests with video cameras. We recorded two separate incidents when intruders attacked a female at the nest. We belie...

  6. Design and Implementation of an Embedded Smart Intruder Surveillance System

    Directory of Open Access Journals (Sweden)

    Sabri Naseer

    2018-01-01

    Full Text Available Remote and scattered valuable and sensitive locations such as labs and offices inside university campus need efficient monitoring and warning system. As well as scattered area and belonging. This research presents a Real-Time intruder Surveillance System based on a single board computer (SBC. Thus the design and development of a cost effective surveillance management system based SBC that can be deployed efficiently in remote and scattered locations such as universities belonging. The fusion of embedded Python codes with SBC that attached to cameras, Long distance sensors, alerting circuitry and wireless module presents a novel integration based effective cost solution and enhances SBC of much flexibility of improvement and development for pervasive remote locations. The system proves the high integrity of smooth working with web application, it’s cost effective and thus can be deployed as many of units to seize and concisely covered remote and scattered area as well as university belonging and departments. The system can be administrated by a remote user sparsely or geographically away from any networked workstation. The proposed solution offers efficient stand alone, flexibility to upgrade and cheap development and installation as well as cost effective ubiquitous surveillance solution. In conclusion, the system acceptable boundaries of successful intruder recognition and warning alert are computed between 1m and 3m distance of intruder from system camera. Recognition rate of 95% and 83% are achieved and the successful warning alert were in the range of 86-97%.

  7. Closure Using a Surgical Closure Device of Inadvertent Subclavian Artery Punctures During Central Venous Catheter Placement

    International Nuclear Information System (INIS)

    Berlet, Matthew H.; Steffen, Diana; Shaughness, George; Hanner, James

    2001-01-01

    Severe complications can and do occur when central venous catheters are inadvertently placed into subclavian arteries. Two cases are discussed that describe how these inadvertent arterial punctures can be closed using the Perclose device (Abbott Laboratories, Redwood City, CA, USA)

  8. Field Measurements of Inadvertent Ingestion Exposure to Metals.

    Science.gov (United States)

    Gorman Ng, Melanie; MacCalman, Laura; Semple, Sean; van Tongeren, Martie

    2017-11-10

    The determinants of inadvertent occupational ingestion exposure are poorly understood, largely due to a lack of available exposure measurement data. In this study, perioral exposure wipes were used as a surrogate for inadvertent ingestion exposure to measure exposure to eight metals (chromium, nickel, aluminium, cobalt, lead, arsenic, manganese, and tin) among 38 workers at 5 work sites in the UK. This work was done alongside a previously reported observational study of hand/object-to-mouth contact frequency. Systematic wipes of the perioral area, and of both hands were taken with proprietary cellulose wipes pre-moistened with deionized water. Measurements were taken at the beginning, middle and end of the shift. Mixed-effect models of exposure measurements were built with area of skin sampled, time during shift, and job group entered as fixed effects and worker identification as a random effect. Linear regression modelling was used to study the effect of hand/object-to-mouth contact frequency on perioral exposure, adjusting for the measured exposure on the hand and observed respirator use. Hand and perioral exposure measurements were correlated with one another (r = 0.79) but mass per unit area exposure was significantly higher on the perioral area than on the hands for seven of the metals (at P exposure, but hand exposure was significantly positively related to perioral exposure and workers who used respirators had significantly higher perioral exposure than those who did not. The results suggest the levels of exposure on the hand and respirator use are important determinants of potential inadvertent ingestion exposure. The results did not demonstrate a relationship between perioral exposure and hand-to-mouth contact frequency. Perioral wipe sampling may be a useful surrogate measure for exposure by the inadvertent ingestion route, but further research is required to confirm the link between perioral levels and actual exposure, measured using biological

  9. Inadvertent epidural injection of drugs for intravenous use. A review.

    Science.gov (United States)

    Beckers, A; Verelst, P; van Zundert, A

    2012-01-01

    The frequency of inadvertent injection of drugs in the epidural space is probably underestimated and underreported, but it can cause serious morbidity and possibly mortality. The aim of this review is to collate reported incidents of this type, to describe the potential mechanisms of occurrence and to identify possible therapeutic solutions. We searched into medical databases and reviewed reference lists of papers retrieved. A list is reported of more than 50 drugs that were inadvertently injected into the epidural space. This list includes drugs which produce no, little or short-lasting neurological deficits, but also includes drugs that may be more etching and can result in temporary or even permanent neurological deficit. Most drugs do not lead to sequelae other than pain during injection or transient neurological complaints. Other drugs may have more deleterious consequences, such as paraplegia. Both the dose of the inadvertent injected drug and the time frame play an important role in the patient's outcome. "Syringe swap", "ampoule error", and epidural/intravenous line confusion due to inaccurate or absent colour coding of epidural catheters were the main sources of error. Preventive strategies, including non Luer-lock epidural injection ports, might increase safety.

  10. Probability of inadvertent operation of electrical components in harsh environments

    International Nuclear Information System (INIS)

    Knoll, A.

    1989-01-01

    Harsh environment, which means humidity and high temperature, may and will affect unsealed electrical components by causing leakage ground currents in ungrounded direct current systems. The concern in a nuclear power plant is that such harsh environment conditions could cause inadvertent operation of normally deenergized components, which may have a safety-related isolation function. Harsh environment is a common cause failure, and one way to approach the problem is to assume that all the unsealed electrical components will simultaneously and inadvertently energize as a result of the environmental common cause failure. This assumption is unrealistically conservative. Test results indicated that insulating resistences of any terminal block in harsh environments have a random distribution in the range of 1 to 270 kΩ, with a mean value ∼59 kΩ. The objective of this paper is to evaluate a realistic conditional failure probability for inadvertent operation of electrical components in harsh environments. This value will be used thereafter in probabilistic safety evaluations of harsh environment events and will replace both the overconservative common cause probability of 1 and the random failure probability used for mild environments

  11. Corticosterone response in a resident-intruder-paradigm depends on social state and coping style in adolescent male Balb-C mice.

    Science.gov (United States)

    Pletzer, Belinda; Klimesch, Wolfgang; Oberascher-Holzinger, Karin; Kerschbaum, Hubert H

    2007-10-01

    Social stressors modulate the hypothalamic-pituitary-adrenal axis in rodents. However, reports on the association between corticosterone level and behavioural responses to the stressor are ambivalent. This may depend on the experimental paradigm, species- and strain-differences, duration of exposure to the stressor, but also on using either the social state (dominant or subordinate) or the coping style (proactive or passive) of an animal to correlate the corticosterone level with. We used male Balb-C mice in a resident-intruder paradigm. Adolescent intruders (aged five to eight weeks) were transferred into the cage of an adult resident (aged about four month) for five minutes. The interactions were video-taped for behavioural analysis. Ten minutes after the encounters, intruders were sacrificed and blood samples were collected. Dominant intruders showed offensive behaviours (attack, chase, tail tracking) and won most of the fights, whereas subordinate intrudes showed mainly submissive behaviours (flight, freezing) and were further classified into active and passive subordinates. Active subordinates displayed significantly more flight-behaviour than passive subordinates. Dominant intruders showed significantly higher post-stress levels of corticosterone than subordinates, which did not differ from control mice, which experienced five minutes of novel-cage exposure. Comparing all three behavioural phenotypes we found the lowest corticosterone levels in active subordinates. Social state significantly affects the HPA-axis response to acute social stressors.

  12. Oblate deformation and intruder configuration in 194,195Bi

    International Nuclear Information System (INIS)

    Mukherjee, G.; Banerjee, K.; Banerjee, S.R.; Basu, S.K.; Bhattacharya, C.; Bhattacharya, S.; Bhattacharya, Srijit; Bhattacharjee, T.; Chanda, S.; Dey, A.; Gupta, D.; Meena, J.K.; Mukhopadhyay, S.; Rana, T.K.; Bhattacharya, Sudeb; Ganguly, S.; Goswami, A.; Kshetri, R.; Pradhan, M.K.; Raut, R.; Dey, G.

    2006-01-01

    The experimental information on 194,195 Bi are very scarce compared to its neighbouring isotopes. Only 6 levels above the ground state band of 195 Bi, based on 9/2, are known with tentative spin parity assignments. Only two low energy gamma rays above the 10 isomeric state are known in 194 Bi. It is interesting not only to extend the presently known bands to higher spins, beyond band crossing but also to search for the intruder quasiparticle configurations to get a clear idea about the structure of these nuclei

  13. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Directory of Open Access Journals (Sweden)

    Ana F. Sequeira

    2015-06-01

    Full Text Available Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.

  14. Intruder states of the odd-mass N = 27 isotones

    International Nuclear Information System (INIS)

    Yokoyama, A.; Horie, H.

    1985-01-01

    Energy levels and electromagnetic properties of the N = 27 and 28 nuclei are studied systematically in terms of the shell model within the f/sub 7/2//sup n/+f/sub 7/2//sup n-1/(p/sub 3/2/ ,p/sub 1/2/,f/sub 5/2/) 1 configurations. The effective interactons are made up of empirical matrix elements and phenomenological potentials superposed with two and three central interactions. Least-squares fitting calculations of selected energy levels are performed to fix some of the matrix elements and the strength parameters of the potentials. It is shown that some states with a collective nature appear in 51 Cr and 53 Fe which are connected to each other by the enhanced E2 transitions, whereas no such states appear in 47 Ca and 49 Ti. The anomalously large B(E2) values observed in the transitions between the intruder states can be reproduced very well. The hindrance of the E2 transitions between the intruder state and the normal f/sub 7/2//sup n/ state is obtained in the present model, being in qualitative agreement with the experiments. Both of the proton-neutron (p-n) interactions (1) among the f/sub 7/2/ nucleons and (2) between the f/sub 7/2/ and the other fp nucleons are very important in order to obtain proper understanding of the nuclei in this mass region

  15. Fingerprint Liveness Detection in the Presence of Capable Intruders.

    Science.gov (United States)

    Sequeira, Ana F; Cardoso, Jaime S

    2015-06-19

    Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.

  16. Determination of inadvertent atrial capture during para-Hisian pacing.

    Science.gov (United States)

    Obeyesekere, Manoj; Leong-Sit, Peter; Skanes, Allan; Krahn, Andrew; Yee, Raymond; Gula, Lorne J; Bennett, Matthew; Klein, George J

    2011-08-01

    Inadvertent capture of the atrium will lead to spurious results during para-Hisian pacing. We sought to establish whether the stimulation-to-atrial electrogram interval at the proximal coronary sinus (stim-PCS) or high right atrium (stim-HRA) could signal inadvertent atrial capture. Para-Hisian pacing with and without intentional atrial capture was performed in 31 patients. Stim-HRA and stim-PCS intervals were measured with atrial capture, His plus para-Hisian ventricular (H+V) capture, and para-Hisian ventricular (V) capture alone. The mean stim-HRA interval was significantly shorter with atrial capture (66 ± 18 ms) than with H+V (121 ± 27 ms, P capture alone (174 ± 38 ms, P capture (51 ± 16 ms) than with H+V (92 ± 22 ms, Pcapture alone (146 ± 33 ms, P capture. A stim-PCS >90 ms (stim-HRA >100 ms) was observed only in the absence of atrial capture. A stim-HRA of capture. Stim-HRA intervals of 75 to 97 ms and stim-PCS intervals of 65 to 88 ms were observed with either atrial, His, or para-Hisian ventricular capture without atrial capture. In this overlap zone, all patients demonstrated a stim-PCS or stim-HRA interval prolongation of at least 20 ms when the catheter was advanced to avoid deliberate atrial pacing. The QRS morphology was of limited value in distinguishing atrial capture due to concurrent ventricular or H+V capture, as observed in 20 of 31 (65%) patients. Stim-PCS and stim-HRA intervals can be used to monitor for inadvertent atrial capture during para-Hisian pacing. A stim-PCS 90 ms (or stim-HRA > 100 ms) were observed only with and without atrial capture, respectively, but there was significant overlap between these values. Deliberate atrial capture and loss of capture reliably identifies atrial capture regardless of intervals.

  17. Inadvertent Screw Stripping During Ankle Fracture Fixation in Elderly Bone

    Science.gov (United States)

    Dinah, A. Feroz; Mears, Simon C.; Knight, Trevor A.; Soin, Sandeep P.; Campbell, John T.; Belkoff, Stephen M.

    2011-01-01

    Poor screw purchase because of osteoporosis presents difficulties in ankle fracture fixation. The aim of our study was to determine if cortical thickness, unicortical versus bicortical purchase, and bone mineral density are predictors of inadvertent screw stripping and overtightening. Ten paired cadaver ankles (average donor age, 81.7 years; range, 50-97 years) were used for the study. Computed tomography scanning with phantoms of known density was used to determine the bone density along the distal fibula. A standard small-fragment, 7-hole, one-third tubular plate was applied to the lateral surface of the fibula, with 3 proximal bicortical cortical screws and 2 distal unicortical cancellous screws. A posterior plate, in which all 5 screws were cortical and achieved bicortical purchase, was subsequently applied to the same bones and positioned so that the screw holes did not overlap. A torque sensor was used to measure the torque of each screw during insertion (Ti) and then stripping (Ts). The effect of bone density, screw location, cortical thickness, and unicortical versus bicortical purchase on Ti and Ts was checked for significance (P screws were inadvertently stripped and 12% were overtightened. Despite 21% of the screws being stripped or being at risk for stripping, we found no significant predictors to warn of impending screw stripping. Additional work is needed to identify clinically useful predictors of screw stripping. PMID:23569675

  18. Vertical slow drag of an intruder in a laterally confined granular medium

    Science.gov (United States)

    Duri, Agnès; Mandato, Sandra; Mabille, Frédéric; Cuq, Bernard; Ruiz, Thierry

    2017-06-01

    The study of force transmission and typologies of motions in a powder bed under low shear solicitation constitutes a challenging issue to achieve a monitoring of most of processes. This work relies on the characterisation of particle mobility in the neighbourhood of a moving intruder in ascendant vertical motion. Vertical force measurements and Particle Image Velocimetry (PIV) technique are used to identify different typologies of particle motions (compaction, loading and rupture of the chain forces, lateral collapsing, avalanches…) of a granular bed ensiled in a semi-confined cell and with a free surface on its top. Force fluctuations during the blade displacement are highlighted and correlated with the dimensionless blade speed but also with the force profile in the static state. The velocity field analysis allows quantifying the shear-banding characteristics corresponding to the blade influence on grain displacements and the impact of the intruder in the motion direction. This signal contains periodical fluctuations which are correlated with the vertical force fluctuations in a specific zone of the granular bed.

  19. Sexual aggression by intruders in hooded crow Corvus cornix.

    Science.gov (United States)

    Zduniak, Piotr; Kosicki, Jakub Z; Yosef, Reuven

    The hooded crow Corvus cornix is a west Palaearctic, solitary nesting, monogamous corvid. In the breeding season, populations are characterized by a social organization wherein breeding pairs are territorial and non-breeding individuals, called floaters, live in flocks. During a study of the breeding ecology of the hooded crow, conducted in a protected flooded area, we monitored nests with video cameras. We recorded two separate incidents when intruders attacked a female at the nest. We believe that she remained in the nest in order to prevent the strangers cannibalizing the nestlings by mantling over the brood. The spatio-temporal occurrence of these attacks suggests that the observed behaviour is intraspecific sexual aggression wherein non-breeding males mounted an immobilized female.

  20. Energy-efficient area coverage for intruder detection in sensor networks

    CERN Document Server

    He, Shibo; Li, Junkun

    2014-01-01

    This Springer Brief presents recent research results on area coverage for intruder detection from an energy-efficient perspective. These results cover a variety of topics, including environmental surveillance and security monitoring. The authors also provide the background and range of applications for area coverage and elaborate on system models such as the formal definition of area coverage and sensing models. Several chapters focus on energy-efficient intruder detection and intruder trapping under the well-known binary sensing model, along with intruder trapping under the probabilistic sens

  1. Inadvertent Central Arterial Catheterization: An Unusual Cause of Ischemic Stroke

    Science.gov (United States)

    Katyal, Nakul; Korzep, Amanda; Newey, Christopher

    2018-01-01

    Central venous catheter (CVC) insertion is extensively utilized in Intensive Care Units for evaluation of hemodynamic status, administration of intravenous drugs, and for providing nutritional support in critically ill patients. Unfortunately, CVC use is associated with complications including lung injury, bleeding, infection, and thrombosis. We present a patient with an acute ischemic stroke from an inadvertently placed CVC into the right common carotid artery. A 57-year-old male presented to our institution for left hemiplegia and seizures 2 days after a CVC was placed. He was found to have a right frontal ischemic stroke on computed tomography (CT). CT angiography noted that the catheter was arterial and had a thrombosis around it. He was started on a low-dose heparin infusion. A combination of cardiothoracic surgery and interventional cardiology was required to safely remove the catheter. Central arterial catheterization is an unusual cause for acute ischemic stroke and presents management challenges. PMID:29456363

  2. 10 CFR 61.42 - Protection of individuals from inadvertent intrusion.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of individuals from inadvertent intrusion. 61.42 Section 61.42 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSING REQUIREMENTS FOR LAND DISPOSAL OF RADIOACTIVE WASTE Performance Objectives § 61.42 Protection of individuals from inadvertent...

  3. Neonicotinoid insecticides can serve as inadvertent insect contraceptives.

    Science.gov (United States)

    Straub, Lars; Villamar-Bouza, Laura; Bruckner, Selina; Chantawannakul, Panuwan; Gauthier, Laurent; Khongphinitbunjong, Kitiphong; Retschnig, Gina; Troxler, Aline; Vidondo, Beatriz; Neumann, Peter; Williams, Geoffrey R

    2016-07-27

    There is clear evidence for sublethal effects of neonicotinoid insecticides on non-target ecosystem service-providing insects. However, their possible impact on male insect reproduction is currently unknown, despite the key role of sex. Here, we show that two neonicotinoids (4.5 ppb thiamethoxam and 1.5 ppb clothianidin) significantly reduce the reproductive capacity of male honeybees (drones), Apis mellifera Drones were obtained from colonies exposed to the neonicotinoid insecticides or controls, and subsequently maintained in laboratory cages until they reached sexual maturity. While no significant effects were observed for male teneral (newly emerged adult) body mass and sperm quantity, the data clearly showed reduced drone lifespan, as well as reduced sperm viability (percentage living versus dead) and living sperm quantity by 39%. Our results demonstrate for the first time that neonicotinoid insecticides can negatively affect male insect reproductive capacity, and provide a possible mechanistic explanation for managed honeybee queen failure and wild insect pollinator decline. The widespread prophylactic use of neonicotinoids may have previously overlooked inadvertent contraceptive effects on non-target insects, thereby limiting conservation efforts. © 2016 The Authors.

  4. Neonicotinoid insecticides can serve as inadvertent insect contraceptives

    Science.gov (United States)

    Villamar-Bouza, Laura; Bruckner, Selina; Chantawannakul, Panuwan; Gauthier, Laurent; Khongphinitbunjong, Kitiphong; Retschnig, Gina; Troxler, Aline; Vidondo, Beatriz; Neumann, Peter; Williams, Geoffrey R.

    2016-01-01

    There is clear evidence for sublethal effects of neonicotinoid insecticides on non-target ecosystem service-providing insects. However, their possible impact on male insect reproduction is currently unknown, despite the key role of sex. Here, we show that two neonicotinoids (4.5 ppb thiamethoxam and 1.5 ppb clothianidin) significantly reduce the reproductive capacity of male honeybees (drones), Apis mellifera. Drones were obtained from colonies exposed to the neonicotinoid insecticides or controls, and subsequently maintained in laboratory cages until they reached sexual maturity. While no significant effects were observed for male teneral (newly emerged adult) body mass and sperm quantity, the data clearly showed reduced drone lifespan, as well as reduced sperm viability (percentage living versus dead) and living sperm quantity by 39%. Our results demonstrate for the first time that neonicotinoid insecticides can negatively affect male insect reproductive capacity, and provide a possible mechanistic explanation for managed honeybee queen failure and wild insect pollinator decline. The widespread prophylactic use of neonicotinoids may have previously overlooked inadvertent contraceptive effects on non-target insects, thereby limiting conservation efforts. PMID:27466446

  5. Inadvertent weather modification urban areas - lessons for global climate change

    International Nuclear Information System (INIS)

    Changnon, S.A.

    1992-01-01

    Large metropolitan areas in North America, home to 65% of the USA's population, have created major changes in their climates over the past 150 years. The rate and amount of the urban climate change approximate those being predicted globally using climate models. Knowledge of urban weather and climate modification holds lessons for the global climate change issue. First, adjustments to urban climate changes can provide guidance for adjusting to global change. A second lesson relates to the difficulty but underscores the necessity of providing scientifically credible proof of change within the noise of natural climatic variability. The evolution of understanding about how urban conditions influence weather reveals several unexpected outcomes, particularly relating to precipitation changes. These suggest that similar future surprises can be expected in a changed global climate, a third lesson. In-depth studies of how urban climate changes affected the hydrologic cycle, the regional economy, and human activities were difficult because of data problems, lack of impact methodology, and necessity for multidisciplinary investigations. Similar impact studies for global climate change will require diverse scientific talents and funding commitments adequate to measure the complexity of impacts and human adjustments. Understanding the processes whereby urban areas and other human activities have altered the atmosphere and changed clouds and precipitation regionally appears highly relevant to the global climate-change issue. Scientific and governmental policy development needs to recognize an old axiom that became evident in the studies of inadvertent urban and regional climate change and their behavioural implications: Think globally but act locally. Global climate change is an international issue, and the atmosphere must be treated globally. But the impacts and the will to act and adjust will occur regionally

  6. Exploring key considerations when determining bona fide inadvertent errors resulting in understatements

    Directory of Open Access Journals (Sweden)

    Chrizanne de Villiers

    2016-03-01

    Full Text Available Chapter 16 of the Tax Administration Act (28 of 2011 (the TA Act deals with understatement penalties. In the event of an ‘understatement’, in terms of Section 222 of the TA Act, a taxpayer must pay an understatement penalty, unless the understatement results from a bona fide inadvertent error. The determining of a bona fide inadvertent error on taxpayers’ returns is a totally new concept in the tax fraternity. It is of utmost importance that this section is applied correctly based on sound evaluation principles and not on professional judgement when determining if the error was indeed the result of a bona fide inadvertent error. This research study focuses on exploring key considerations when determining bona fide inadvertent errors resulting in understatements. The role and importance of tax penalty provisions is explored and the meaning of the different components in the term ‘bona fide inadvertent error’ critically analysed with the purpose to find a possible definition for the term ‘bona fide inadvertent error’. The study also compares the provisions of other tax jurisdictions with regards to errors made resulting in tax understatements in order to find possible guidelines on the application of bona fide inadvertent errors as contained in Section 222 of the TA Act. The findings of the research study revealed that the term ‘bona fide inadvertent error’ contained in Section 222 of the TA Act should be defined urgently and that guidelines must be provided by SARS on the application of the new amendment. SARS should also clarify the application of a bona fide inadvertent error in light of the behaviours contained in Section 223 of the TA Act to avoid any confusion.

  7. Deformed intruders and the onset of deformation at N=20 far from stability

    International Nuclear Information System (INIS)

    Poves, A.; Retamosa, J.

    1991-01-01

    Intruder states, built up of 2p-2h excitations are shown to exhibit rotational features. The combined effects of the reduction of the energy gap between major shells occurring far from stability, and the correlation energy of the valence nucleons, make the intruders dominant in the low energy spectrum of several nuclei. Many experimental puzzles may be solved in this way. (G.P.) 17 refs.; 10 figs

  8. Towards a shell-model description of intruder states and the onset of deformation

    International Nuclear Information System (INIS)

    Heyde, K.; Van Isacker, P.; Casten, R.F.; Wood, J.L.

    1985-01-01

    Basing on the nuclear shell-model and concentrating on the monopole, pairing and quadrupole corrections originating from the nucleon-nucleon force, both the appearance of low-lying 0 + intruder states near major closed shells (Z = 50, 82) and sub-shell regions (Z = 40, 64) can be described. Moreover, a number of new facets related to the study of intruder states are presented. 19 refs., 3 figs

  9. Technology for the detection of airborne intruders approaching the high-security high-value asset

    Science.gov (United States)

    Greneker, Eugene F., III

    1995-05-01

    Security plans to protect high-value assets usually concentrate on stopping potential ground intruders before they reach the asset. Barriers, such as fences, are the first line of defense against the found intruder, providing a delay mechanism. The sight of 10 to 12 foot high fencing topped with razor wire, guard towers, and roving patrols also serves as a psychological deterrent to the potential ground intrusion sensors between an outer and an inner barrier. This visible 'hardness' of a high-value asset makes airborne penetration more attractive, even though the airborne intruder may require training in the use of an aircraft or other airborne conveyance system. Certain airborne intrusion scenarios allow an adversary to penetrate much deeper and faster through delay and defense systems designed to deter the ground intruder. Since an airborne intruder can quickly reach the high-value asset, early detection critical to asset defense. Early detection of the airborne intruder also ensures appropriate use of the deadly force doctrine because the guard force has time to coordinate the response.

  10. Adaptive Neuro-Fuzzy Determination of the Effect of Experimental Parameters on Vehicle Agent Speed Relative to Vehicle Intruder.

    Science.gov (United States)

    Shamshirband, Shahaboddin; Banjanovic-Mehmedovic, Lejla; Bosankic, Ivan; Kasapovic, Suad; Abdul Wahab, Ainuddin Wahid Bin

    2016-01-01

    Intelligent Transportation Systems rely on understanding, predicting and affecting the interactions between vehicles. The goal of this paper is to choose a small subset from the larger set so that the resulting regression model is simple, yet have good predictive ability for Vehicle agent speed relative to Vehicle intruder. The method of ANFIS (adaptive neuro fuzzy inference system) was applied to the data resulting from these measurements. The ANFIS process for variable selection was implemented in order to detect the predominant variables affecting the prediction of agent speed relative to intruder. This process includes several ways to discover a subset of the total set of recorded parameters, showing good predictive capability. The ANFIS network was used to perform a variable search. Then, it was used to determine how 9 parameters (Intruder Front sensors active (boolean), Intruder Rear sensors active (boolean), Agent Front sensors active (boolean), Agent Rear sensors active (boolean), RSSI signal intensity/strength (integer), Elapsed time (in seconds), Distance between Agent and Intruder (m), Angle of Agent relative to Intruder (angle between vehicles °), Altitude difference between Agent and Intruder (m)) influence prediction of agent speed relative to intruder. The results indicated that distance between Vehicle agent and Vehicle intruder (m) and angle of Vehicle agent relative to Vehicle Intruder (angle between vehicles °) is the most influential parameters to Vehicle agent speed relative to Vehicle intruder.

  11. Lift and drag in intruders moving through hydrostatic granular media at high speeds.

    Science.gov (United States)

    Potiguar, Fabricio Q; Ding, Yang

    2013-07-01

    Recently, experiments showed that forces on intruders dragged horizontally through dense, hydrostatic granular packings mainly depend on the local surface orientation and can be seen as the sum of the forces exerted on small surface elements. In order to understand such forces more deeply, we perform a two-dimensional soft-sphere molecular dynamics simulation, on a similar setup, of an intruder dragged through a 50-50 bi-disperse granular packing, with diameters 0.30 and 0.34 cm. We measure, for both circular and half-circle shapes, the forces parallel (drag) and perpendicular (lift) to the drag direction as functions of the drag speed, with V=10.3-309 cm/s, and intruder depths, with D=3.75-37.5 cm. The drag forces on an intruder monotonically increase with V and D, and are larger for the circle. However, the lift force does not depend monotonically on V and D, and this relationship is affected by the shape of the intruder. The vertical force was negative for the half-circle, but for a small range of V and D, we measure positive lift. We find no sign change for the lift on the circle, which is always positive. The explanation for the nonmonotonic dependence is related to the decrease in contacts on the intruder as V increases. This is qualitatively similar to supersonic flow detachment from an obstacle. The detachment picture is supported by simulation measurements of the velocity field around the intruder and force profiles measured on its surface.

  12. Pulling an intruder from a granular material: a novel depinning experiment

    Science.gov (United States)

    Zhang, Yue; Behringer, Robert

    2017-06-01

    Two-dimensional impact experiments by Clark et al. [2] identified the source of inertial drag to be caused by `collisions' with a latent force network, leading to large fluctuations of the force experienced by the impactor. These collisions provided the major drag on an impacting intruder until the intruder was nearly at rest. As a complement, we consider controlled pull-out experiments where a buried intruder is pulled out of a material, starting from rest. This provides a means to better understand the non-inertial part of the drag force, and to explore the mechanisms associated with the force fluctuations. To some extent, the pull out process is a time reversed version of the impact process. In order to visualize this pulling process, we use 2D photoelastic disks from which circular intruders of different radii are pulled out. We present results about the dynamics of the intruder and the structures of the force chains inside the granular system as captured by slow and high speed imaging.

  13. Pulling an intruder from a granular material: a novel depinning experiment

    Directory of Open Access Journals (Sweden)

    Zhang Yue

    2017-01-01

    Full Text Available Two-dimensional impact experiments by Clark et al. [2] identified the source of inertial drag to be caused by ‘collisions’ with a latent force network, leading to large fluctuations of the force experienced by the impactor. These collisions provided the major drag on an impacting intruder until the intruder was nearly at rest. As a complement, we consider controlled pull-out experiments where a buried intruder is pulled out of a material, starting from rest. This provides a means to better understand the non-inertial part of the drag force, and to explore the mechanisms associated with the force fluctuations. To some extent, the pull out process is a time reversed version of the impact process. In order to visualize this pulling process, we use 2D photoelastic disks from which circular intruders of different radii are pulled out. We present results about the dynamics of the intruder and the structures of the force chains inside the granular system as captured by slow and high speed imaging.

  14. Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-10-01

    Full Text Available Given that entropy-based IT technology has been applied in homes, office buildings and elsewhere for IT security systems, diverse kinds of intelligent services are currently provided. In particular, IT security systems have become more robust and varied. However, access control systems still depend on tags held by building entrants. Since tags can be obtained by intruders, an approach to counter the disadvantages of tags is required. For example, it is possible to track the movement of tags in intelligent buildings in order to detect intruders. Therefore, each tag owner can be judged by analyzing the movements of their tags. This paper proposes a security approach based on the received signal strength indicators (RSSIs of beacon-based tags to detect intruders. The normal RSSI patterns of moving entrants are obtained and analyzed. Intruders can be detected when abnormal RSSIs are measured in comparison to normal RSSI patterns. In the experiments, one normal and one abnormal scenario are defined for collecting the RSSIs of a Bluetooth-based beacon in order to validate the proposed method. When the RSSIs of both scenarios are compared to pre-collected RSSIs, the RSSIs of the abnormal scenario are about 61% more different compared to the RSSIs of the normal scenario. Therefore, intruders in buildings can be detected by considering RSSI differences.

  15. Close encounters between star-planet systems and stellar intruders. II. Effect of the mass and impact velocity of the intruder

    International Nuclear Information System (INIS)

    Hills, J.G.; Dissly, R.W.

    1989-01-01

    Results are reported from over 300,000 simulations of encounters between a planet-star binary system and intruders whose masses range from 0.1 to 100 times the mass of the home star of the planet-star system. These calculations were done at a large number of collision velocities and impact parameters. Cross sections for dissociation, for exchange collisions, for changing the orbital energy, and for changing the orbital eccentricity were determined. 16 refs

  16. Does intruder group size and orientation affect flight initiation distance in birds?

    Directory of Open Access Journals (Sweden)

    Geist, C.

    2005-06-01

    Full Text Available Wildlife managers use flight initiation distance (FID, the distance animals flee an approaching predator, to determine set back distances to minimize human impacts on wildlife. FID is typically estimated by a single person; this study examined the effects of intruder number and orientation on FID. Three different group size treatments (solitary person, two people side-by-side, two people one-behind-the-other were applied to Pied Currawongs (Strepera graculina and to Crimson Rosellas (Platycerus elegans. Rosellas flushed at significantly greater distances when approached by two people compared to a single person. This effect was not seen in currawongs. Intruder orientation did not influence the FID of either species. Results suggest that intruder number should be better integrated into estimates of set back distance to manage human visitation around sensitive species.

  17. Intralipid Therapy for Inadvertent Peripheral Nervous System Blockade Resulting from Local Anesthetic Overdose

    Directory of Open Access Journals (Sweden)

    Ihab Kamel

    2015-01-01

    Full Text Available Although local anesthetics have an acceptable safety profile, significant morbidity and mortality have been associated with their use. Inadvertent intravascular injection of local anesthetics and/or the use of excessive doses have been the most frequent causes of local anesthetic systemic toxicity (LAST. Furthermore, excessive doses of local anesthetics injected locally into the tissues may lead to inadvertent peripheral nerve infiltration and blockade. Successful treatment of LAST with intralipid has been reported. We describe a case of local anesthetic overdose that resulted in LAST and in unintentional blockade of peripheral nerves of the lower extremity; both effects completely resolved with administration of intralipid.

  18. Towards a passive acoustic underwater system for protecting harbours against intruders

    NARCIS (Netherlands)

    Fillinger, L.; Theije, P.A.M. de; Zampolli, M.; Sutin, A.; Salloum, H.; Sedunov, N.; Sedunov, A.

    2010-01-01

    The international rules for the protection of harbors against threats and intruders typically apply to threats emanating from the land side. Protection against actions and threats from the water side is much less regulated, apart from some individual cases. Potential threats from the water side may

  19. Processor Instructions Execution Models in Computer Systems Supporting Hardware Virtualization When an Intruder Takes Detection Countermeasures

    OpenAIRE

    A. E. Zhukov; I. Y. Korkin; B. M. Sukhinin

    2012-01-01

    We are discussing processor modes switching schemes and analyzing processor instructions execution in the cases when a hypervisor is present in the computer or not. We determine processor instructions execution latency statistics which are applicable for these hypervisors detection when an intruder is modifying time stamp counter.

  20. APPROACH TO SYNTHESIS OF PASSIVE INFRARED DETECTORS BASED ON QUASI-POINT MODEL OF QUALIFIED INTRUDER

    Directory of Open Access Journals (Sweden)

    I. V. Bilizhenko

    2017-01-01

    Full Text Available Subject of Research. The paper deals with synthesis of passive infra red (PIR detectors with enhanced detection capability of qualified intruder who uses different types of detection countermeasures: the choice of specific movement direction and disguise in infrared band. Methods. We propose an approach based on quasi-point model of qualified intruder. It includes: separation of model priority parameters, formation of partial detection patterns adapted to those parameters and multi channel signal processing. Main Results. Quasi-pointmodel of qualified intruder consisting of different fragments was suggested. Power density difference was used for model parameters estimation. Criteria were formulated for detection pattern parameters choice on the basis of model parameters. Pyroelectric sensor with nine sensitive elements was applied for increasing the signal information content. Multi-channel processing with multiple partial detection patterns was proposed optimized for detection of intruder's specific movement direction. Practical Relevance. Developed functional device diagram can be realized both by hardware and software and is applicable as one of detection channels for dual technology passive infrared and microwave detectors.

  1. INTRUDER STATES IN THE LEAD REGION, STUDIED BY ALPHA-DECAY

    NARCIS (Netherlands)

    WAUTERS, J; DENDOOVEN, P; HUYSE, M; REUSEN, G; VANDUPPEN, P; LIEVENS, P; KIRCHNER, R; KLEPPER, O; ROECKL, E; Neugart, R; Wohr, A

    1993-01-01

    The alpha decay of nuclei around the Z=82 closed proton shell is a powerful tool for the study of shape coexistence and intruder states in the lead region. Systematic measurements of alpha-decay properties of even-even mercury, lead, polonium and radon nuclei have been performed. From the deduced

  2. The resident-intruder paradigm : a standardized test for aggression, violence and social stress

    NARCIS (Netherlands)

    Koolhaas, Jacob; Coppens, Caroline M.; de Boer, Sietse F.; Buwalda, Bauke; Meerlo, Peter; Timmermans, Paul J. A.

    2013-01-01

    This video publication explains in detail the experimental protocol of the resident-intruder paradigm in rats. This test is a standardized method to measure offensive aggression and defensive behavior in a semi natural setting. The most important behavioral elements performed by the resident and the

  3. A study of the management of 55 traumatically intruded permanent incisor teeth in children.

    LENUS (Irish Health Repository)

    Stewart, C

    2009-01-01

    These were to examine the main presenting, treatment and outcome factors for intruded permanent incisors in children, the effect of apical development and degree of intrusion on decisions on repositioning, the effect of apical development status on the maintenance of pulp vitality and the time of pulp extirpation and to compare the decisions made to the advice given in existing clinical guidelines.

  4. Lift on side by side intruders of various geometries within a granular flow

    Directory of Open Access Journals (Sweden)

    Acevedo-Escalante M. F.

    2017-01-01

    Full Text Available Obstacles within fluids have been widely used in engineering and in physics to study hydrodynamic interactions. In granular matter, objects within a granular flow have helped to understand fundamental features of drag and lift forces. In our group, we have studied numerically the flow mediated interaction between two static disks within a vertical granular flow in a two-dimensional container where the flow velocity and the distance between obstacles were varied. Attractive and repulsive forces were found depending on flow velocity and separation between intruders. The simulations evidenced a relationship between the average flow velocity in a specific section ahead of the obstacles and the attractive-repulsive lift. On the other hand, it was showed that the lift force on an object dragged within a granular medium depends on the shape of the intruder. Here we present experimental results of the interaction between two side-by-side intruders of different shapes within a vertical granular flow. We built a quasi-two-dimensional container in which we placed the intruders and using load cells we measured lift and drag forces during the discharge process for different flow velocities.

  5. Endoscopic Removal of an Inadvertently Swallowed Toothbrush in the Emergency Department

    Science.gov (United States)

    Harvey, Martyn; Cave, Grant; Prince, Gaynor

    2012-01-01

    A 16-year-old girl inadvertently swallowed a toothbrush during attempted manual induction of emesis. The 20 cm toothbrush was successfully removed via overtube facilitated endoscopy using a retractable snare while the patient was sedated in the emergency department. PMID:23326718

  6. Endoscopic Removal of an Inadvertently Swallowed Toothbrush in the Emergency Department

    Directory of Open Access Journals (Sweden)

    Martyn Harvey

    2012-01-01

    Full Text Available A 16-year-old girl inadvertently swallowed a toothbrush during attempted manual induction of emesis. The 20 cm toothbrush was successfully removed via overtube facilitated endoscopy using a retractable snare while the patient was sedated in the emergency department.

  7. Attention and Facilitation: Converging Information versus Inadvertent Reading in Stroop Task Performance

    Science.gov (United States)

    Roelofs, Ardi

    2010-01-01

    Disagreement exists about whether color-word Stroop facilitation is caused by converging information (e.g., Cohen et al., 1990; Roelofs, 2003) or inadvertent reading (MacLeod & MacDonald, 2000). Four experiments tested between these hypotheses by examining Stroop effects on response time (RT) both within and between languages. Words cannot be…

  8. Attention and Facilitation: Converging Information Versus Inadvertent Reading in Stroop Task Performance

    NARCIS (Netherlands)

    Roelofs, A.P.A.

    2010-01-01

    Disagreement exists about whether color-word Stroop facilitation is caused by converging information (e.g.. Cohen et al.. 1990: Roelofs, 2003) or inadvertent reading (MacLeod & MacDonald, 2000). Four experiments tested between these hypotheses by examining Stroop effects oil response time (RT) both

  9. Inadvertent yellow fever vaccination of a patient with Crohn's disease treated with infliximab and methotrexate

    DEFF Research Database (Denmark)

    Ekenberg, C.; Friis-Møller, N.; Ulstrup, Thomas

    2016-01-01

    We present a case of a 56-year-old woman with Crohn's disease, treated with methotrexate and infliximab, who inadvertently received yellow fever vaccination (YFV) prior to a journey to Tanzania. She was not previously vaccinated against YF. YFV contains live-attenuated virus, and is contraindicated...

  10. Endoscopic Removal of an Inadvertently Swallowed Toothbrush in the Emergency Department

    OpenAIRE

    Harvey, Martyn; Cave, Grant; Prince, Gaynor

    2012-01-01

    A 16-year-old girl inadvertently swallowed a toothbrush during attempted manual induction of emesis. The 20 cm toothbrush was successfully removed via overtube facilitated endoscopy using a retractable snare while the patient was sedated in the emergency department.

  11. Late-Onset Inadvertent Bleb Formation following Pars Plana M3 Molteno Implant Tube Obstruction

    Directory of Open Access Journals (Sweden)

    Anmar M. Abdul-Rahman

    2017-01-01

    Full Text Available Purpose: To report a case of inadvertent bleb formation presenting 18 months after pars plana M3 Molteno implant tube obstruction in a patient with mixed mechanism glaucoma. Materials and Methods: An 84-year-old Caucasian male with mixed mechanism glaucoma underwent slit-lamp examination, gonioscopy, colour anterior segment photography and anterior segment optical coherence tomography (AS-OCT. Results: An inadvertent bleb developed 18 months after pars plana implant tube re-positioning with a 6/0 Vicryl tie ligature. The bleb was located in the area anterior to the implant plate; it was characterised by a thin, transparent, avascular and multi-cystic wall, with a visible stoma at the posterior edge of the bleb. The bleb was functioning as demonstrated by an intraocular pressure of 6 mm Hg at presentation and a punctate fluorescein uptake pattern of the bleb wall. The bleb over the plate of the Molteno implant was non-functioning, likely secondary to tube obstruction by vitreous in the early postoperative period. AS-OCT showed a tract from the anterior chamber commencing at an entry wound through a corneal tunnel to the posterior stoma at the base of the inadvertent bleb. Conclusions: We hypothesise that the pathophysiologic factors resulting in an inadvertent bleb are a result of a combination of apoptosis, late-onset wound dehiscence and internal gaping of a centrally placed corneal wound. In addition, aqueous hydrodynamic factors may play a role.

  12. Beverage can stay-tabs: still a source for inadvertently ingested foreign bodies in children

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, Lane F. [Cincinnati Children' s Hospital Medical Center, Department of Radiology, MLC 5031, Cincinnati, OH (United States); University of Cincinnati, College of Medicine, Departments of Radiology and Pediatrics, Cincinnati, OH (United States)

    2010-09-15

    In the 1970s in part to avoid inadvertent ingestion, the beverage-can industry changed can construction from pull-tabs to the stay-tabs (remain attached to can after opening) used today. Our purpose is to identify the number of inadvertent ingestions of beverage-can stay-tabs by children recognized at our institution. The medical information system of a children's hospital was searched with key terms to identify cases in which a witnessed or self-reported inadvertent ingestion of a beverage-can stay-tab resulted in a radiograph to rule out presence of a foreign body. Demographics, identification of stay-tab on radiographs, associated abnormalities, and patient management were reviewed. Nineteen cases of stay-tab ingestion were identified over 16 years. Mean age of ingesters was 8.5 years with the majority being teenagers and 15 (79%) >5 years of age. The stay-tab could be seen radiographically only in 4 (21%) cases - all with the stay-tab identified in the stomach. The identification of 19 children who inadvertently ingested beverage-can stay-tabs at a single children's hospital suggests that such ingestions still occur. Radiologists should be aware that stay-tabs are radiographically visible in the minority (21%) of cases. (orig.)

  13. Beverage can stay-tabs: still a source for inadvertently ingested foreign bodies in children

    International Nuclear Information System (INIS)

    Donnelly, Lane F.

    2010-01-01

    In the 1970s in part to avoid inadvertent ingestion, the beverage-can industry changed can construction from pull-tabs to the stay-tabs (remain attached to can after opening) used today. Our purpose is to identify the number of inadvertent ingestions of beverage-can stay-tabs by children recognized at our institution. The medical information system of a children's hospital was searched with key terms to identify cases in which a witnessed or self-reported inadvertent ingestion of a beverage-can stay-tab resulted in a radiograph to rule out presence of a foreign body. Demographics, identification of stay-tab on radiographs, associated abnormalities, and patient management were reviewed. Nineteen cases of stay-tab ingestion were identified over 16 years. Mean age of ingesters was 8.5 years with the majority being teenagers and 15 (79%) >5 years of age. The stay-tab could be seen radiographically only in 4 (21%) cases - all with the stay-tab identified in the stomach. The identification of 19 children who inadvertently ingested beverage-can stay-tabs at a single children's hospital suggests that such ingestions still occur. Radiologists should be aware that stay-tabs are radiographically visible in the minority (21%) of cases. (orig.)

  14. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2002-09-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  15. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-05-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  16. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-12-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  17. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2003-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  18. Intruder Polarization.

    Science.gov (United States)

    1985-12-01

    field coneonenti in the ground-frane in ter-s of j- P... cvcan ’Se ochieved. That result is given in (;.!J-a, b, c) of Ref. !.Tt is re,)eato𔃻 Selo ,: in...steps would leed to tern~s wit’, increasinrjr hipher or ’er veriation with and the ratio 4i). The latter r-tio approaches unity ~ ~ ( a )Ib’)race as

  19. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  20. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2002-09-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  1. Aggression and dominance in cichlids in resident-intruder tests: the role of environmental enrichment

    Directory of Open Access Journals (Sweden)

    Vincent Nijman

    Full Text Available When establishing dominance residents have a greater likelihood to dominate intruders than vice versa, partially because the resident has more to loose that the intruder has to win. This is known as the prior residency effect. In environmentally rich environments this effect should be stronger than in poor environments. Recently Kadry & Barreto (2010, Neotrop Ichthyol 8: 329-332 tested this in the pearl cichlid Geophagus brasiliensis (17 test pairs and reported that environmental enrichment led to a reduction of aggression. We here present data on four other cichlids (332 test pairs showing a stronger prior residency effect in enriched conditions, and, for two species, an increase in aggression. We discuss possible reasons for the differences between studies, focussing on the relationship between aggression and dominance and sample size effects.

  2. A PSDPF interaction to describe the 1 h{omega} intruder states in sd shell nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Bouhelal, M., E-mail: m_bouhelal@yahoo.fr [Laboratoire de Physique Appliquee et Theorique, Universite de Tebessa, Tebessa (Algeria); Haas, F.; Caurier, E.; Nowacki, F. [IPHC, CNRS/IN2P3, Universite de Strasbourg, Strasbourg (France); Bouldjedri, A. [Departement de Physique, Faculte des Sciences, Universite de Batna, Batna (Algeria)

    2011-08-01

    In the level schemes of sd shell nuclei, there is generally at relatively low excitation energies, coexistence of normal 0 h{omega} positive parity states and of intruder 1 h{omega} negative parity states. The aim of the present work is to describe these intruder states in the full p-sd-pf model space with a {sup 4}He core allowing one nucleon jump between the major shells. To construct our PSDPF interaction, we first modified the p-sd and sd-pf cross-monopole terms and then applied a fitting procedure to adjust all PSDPF parameters by comparing an extended set of experimental and calculated excitation energies. Results obtained with the new interaction have been finally compared with experimental data for nuclei throughout the sd shell.

  3. Territoriality evidenced by asymmetric intruder-holder motivation in an amblypygid.

    Science.gov (United States)

    Chapin, Kenneth James; Hill-Lindsay, Sloan

    2016-01-01

    Territoriality has an extensive and thorough history of research, but has been difficult to impossible to test empirically in most species. We offer a method for testing for territoriality by measuring the motivation of territory intruders to win contests in controlled trials. We demonstrated this approach by staging paired trials of the Amblypygi Phrynus longipes (Chelicerata: Arachnida). Amblypygids engaged in agonistic interactions after the opportunity to establish a putative territory on one side of an arena. We found that intruders of putative territories had lower motivation to win contests, thus evidencing territoriality. Physical components of individuals (i.e. energy stores) increased the probability of winning the contest for holders but not intruders, thereby providing insight into the differing decision rules opponents use in territory contests. We discuss why alternative hypotheses, including loser-initiator covariation and home field bourgeois advantage, fail empirical tests. We demonstrated that analyzing animal motivation in territorial contests is tractable even for animals where territories are inconspicuous and cues are outside the normal perceptions of researchers. Copyright © 2015 Elsevier B.V. All rights reserved.

  4. Optical fiber strain sensor for application in intelligent intruder detection systems

    Science.gov (United States)

    Stańczyk, Tomasz; Tenderenda, Tadeusz; Szostkiewicz, Lukasz; Bienkowska, Beata; Kunicki, Daniel; Murawski, Michal; Mergo, Pawel; Nasilowski, Tomasz

    2017-10-01

    Nowadays technology allows to create highly effective Intruder Detection Systems (IDS), that are able to detect the presence of an intruder within a defined area. In such systems the best performance can be achieved by combining different detection techniques in one system. One group of devices that can be applied in an IDS, are devices based on Fiber Optic Sensors (FOS). The FOS benefits from numerous advantages of optical fibers like: small size, light weight or high sensitivity. In this work we present a novel Microstructured Optical Fiber (MOF) characterized by increased strain sensitivity dedicated to distributed acoustic sensing for intelligent intruder detection systems. By designing the MOF with large air holes in close proximity to a fiber core, we increased the effective refractive index sensitivity to longitudinal strain. The presented fiber can be easily integrated in a floor system in order to detect any movement in the investigated area. We believe that sensors, based on the presented MOF, due to its numerous advantages, can find application in intelligent IDS.

  5. Influence of sternal size and inadvertent paramedian sternotomy on stability of the closure site: a clinical and mechanical study.

    Science.gov (United States)

    Zeitani, J; Penta de Peppo, A; Moscarelli, M; Guerrieri Wolf, L; Scafuri, A; Nardi, P; Nanni, F; Di Marzio, E; De Vico, P; Chiariello, L

    2006-07-01

    The influence of sternal size and of inadvertent paramedian sternotomy on stability of the closure site is not well defined. Data on 171 consecutive patients undergoing cardiac surgery through a midline sternotomy were prospectively collected. Intraoperative measurements of sternal dimension included thickness and width at the manubrium, the third and fifth intercostal spaces; paramedian sternotomy was defined as width of one side of the sternum equaling 75% or more of the entire width, at any of the three levels. The chest was closed with simple peristernal steel wires and inspected to detect deep wound infection and/or instability for 3 postoperative months. The sternal factors and several patient/surgery-related factors were included in a multivariate analysis model to identify factors affecting stability. An electromechanical traction test was conducted on 6 rewired sternal models after midline or paramedian sternotomy and separation data were analyzed. Chest instability was detected in 12 (7%) patients and wound infection in 2 (1.2%). Patient weight (P = .03), depressed left ventricular function (P = .04), sternum thickness (indexed to body weight, P = .03), and paramedian sternotomy (P = .0001) were risk factors of postoperative instability; paramedian sternotomy was the only independent predictor (P = .001). The electromechanical test showed more lateral displacement of the two rewired sternal halves after paramedian than midline sternotomy (P = .002); accordingly, load at fracture point was lower after paramedian sternotomy (220 +/- 20 N vs 545 +/- 25 N, P = 0.001). Inadvertent paramedian sternomoty strongly affects postoperative chest wound stability independently from sternal size, requiring prompt reinforcement of chest closure.

  6. Inadvertent Perioperative Hypothermia: A Literature Review of an Old Overlooked Problem

    Directory of Open Access Journals (Sweden)

    Lotfi Fatemi Seyed Naser

    2016-03-01

    Full Text Available Inadvertent perioperative hypothermia is a common anesthesia-related complication in patients undergoing surgery. This could possibly lead to several clinical consequences, which adversely affect the surgery outcome, particularly in high risk patient. The combination of anesthetic drugs and cold operating room environment are among the most common predisposing factors of perioperative hypothermia. The aim of this comprehensive literature review is to describe the importance, monitoring techniques, potential complications, appropriate pharmacologic interventions and modalities to manage perioperative hypothermia.

  7. Anabolic agents: recent strategies for their detection and protection from inadvertent doping.

    Science.gov (United States)

    Geyer, Hans; Schänzer, Wilhelm; Thevis, Mario

    2014-05-01

    According to the World Anti-Doping Agency (WADA) Prohibited List, anabolic agents consist of exogenous anabolic androgenic steroids (AAS), endogenous AAS and other anabolic agents such as clenbuterol and selective androgen receptor modulators (SARMs). Currently employed strategies for their improved detection include the prolongation of the detection windows for exogenous AAS, non-targeted and indirect analytical approaches for the detection of modified steroids (designer steroids), the athlete's biological passport and isotope ratio mass spectrometry for the detection of the misuse of endogenous AAS, as well as preventive doping research for the detection of SARMs. The recent use of these strategies led to 4-80-fold increases of adverse analytical findings for exogenous AAS, to the detection of the misuse of new designer steroids, to adverse analytical findings of different endogenous AAS and to the first adverse analytical findings of SARMs. The strategies of the antidoping research are not only focused on the development of methods to catch the cheating athlete but also to protect the clean athlete from inadvertent doping. Within the past few years several sources of inadvertent doping with anabolic agents have been identified. Among these are nutritional supplements adulterated with AAS, meat products contaminated with clenbuterol, mycotoxin (zearalenone) contamination leading to zeranol findings, and natural products containing endogenous AAS. The protection strategy consists of further investigations in case of reasonable suspicion of inadvertent doping, publication of the results, education of athletes and development of methods to differentiate between intentional and unintentional doping.

  8. Consolidation of a WSN and Minimax method to rapidly neutralise intruders in strategic installations.

    Science.gov (United States)

    Conesa-Muñoz, Jesus; Ribeiro, Angela

    2012-01-01

    Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN). The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders' behaviour is inferred through sequences of sensors' activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final state of the intruders

  9. Inadvertent raising of levels in the FFTF primary sodium pumps. Final unusual occurrence report, HEDL 79-34 (FFTF-58)

    International Nuclear Information System (INIS)

    Kuechle, J.D.

    1981-01-01

    The final unusual occurrence report describes the inadvertent raising of the sodium level in the FFTF primary sodium pumps during system testing. This event is now judged to have caused permanent deformation of the primary pump shaft on loop 1 during a period when pump rotation was stopped and sodium level in the pump tank was inadvertently increased. The shaft was subsequently removed, straightened, and returned to service in the spare FFTF pump

  10. Machine learning approach to detect intruders in database based on hexplet data structure

    Directory of Open Access Journals (Sweden)

    Saad M. Darwish

    2016-09-01

    Full Text Available Most of valuable information resources for any organization are stored in the database; it is a serious subject to protect this information against intruders. However, conventional security mechanisms are not designed to detect anomalous actions of database users. An intrusion detection system (IDS, delivers an extra layer of security that cannot be guaranteed by built-in security tools, is the ideal solution to defend databases from intruders. This paper suggests an anomaly detection approach that summarizes the raw transactional SQL queries into a compact data structure called hexplet, which can model normal database access behavior (abstract the user's profile and recognize impostors specifically tailored for role-based access control (RBAC database system. This hexplet lets us to preserve the correlation among SQL statements in the same transaction by exploiting the information in the transaction-log entry with the aim to improve detection accuracy specially those inside the organization and behave strange behavior. The model utilizes naive Bayes classifier (NBC as the simplest supervised learning technique for creating profiles and evaluating the legitimacy of a transaction. Experimental results show the performance of the proposed model in the term of detection rate.

  11. Inadvertent puncture of the aortic noncoronary cusp during postoperative left atrial tachycardia ablation

    Directory of Open Access Journals (Sweden)

    Dursun Aras, MD

    2015-08-01

    Full Text Available Transseptal catheterization has become part of the interventional electrophysiologist׳s technical armamentarium since the development of left atrial catheter ablation and percutaneous technologies for treating mitral and aortic valve disease. Although frequently performed, the procedure׳s most feared complication is aortic root penetration. Focal atrial tachycardia has been described as the most common late sequela of surgical valve replacements. We present a complicated case involving the inadvertent delivery of an 8 French sheath across the noncoronary cusp during radiofrequency catheter ablation for left atrial tachycardia originating from the mitral annulus in a patient with prior mitral valve replacement.

  12. Treatment Approach to Small Inadvertent Injury of the Crystalline Lens Anterior Capsule During Iridodialysis Repair Surgery

    Directory of Open Access Journals (Sweden)

    Gökçen Gökçe

    2013-01-01

    Full Text Available A 22-year-old man presented to our ophthalmology department with photophobia. On ophthalmic examination, iridodialysis secondary to blunt trauma that occurred 5 years ago was diagnosed. During iridodialysis repair surgery, long curved double-armed needle of 10-0 polypropylene suture (PC-9 inserted into the 19 gauge side port turned down inadvertently by its own weight, resulting in crystalline lens anterior capsule perforation. Postoperative clinical observation revealed no lens opacification affecting visual acuity. This case report showed that lens aspiration surgery should be postponed if the capsule injury is small.(Turk J Ophthalmol 2013; 43: 61-3

  13. A novel adolescent chronic social defeat model: reverse-Resident-Intruder Paradigm (rRIP) in male rats.

    Science.gov (United States)

    Manz, Kevin M; Levine, Wendy A; Seckler, Joshua C; Iskander, Anthony N; Reich, Christian G

    2018-03-01

    Psychosocial stress is linked to the etiology of several neuropsychiatric disorders, including Major Depressive Disorder and Post-Traumatic-Stress-Disorder. Adolescence is a critical neurobehavioral developmental period wherein the maturing nervous system is sensitive to stress-related psychosocial events. The effects of social defeat stress, an animal model of psychosocial stress, on adolescent neurobehavioral phenomena are not well explored. Using the standard Resident-Intruder-Paradigm (RIP), adolescent Long-Evans (LE, residents, n = 100) and Sprague-Dawley (SD, intruders, n = 100) rats interacted for five days to invoke chronic social stress. Tests of depressive behavior (forced-swim-test (FST)), fear conditioning, and long-term synaptic plasticity are affected in various adult rodent chronic stress models, thus we hypothesized that these phenomena would be similarly affected in adolescent rats. Serendipitously, we observed the Intruders became the dominant rats and the Residents were the defeated/submissive rats. This robust and reliable role-reversal resulted in defeated LE-Residents showing a depressive-like state (increased time spent immobile in the FST), enhanced fear conditioning in both hippocampal-dependent and hippocampal-independent fear paradigms and altered hippocampal long-term synaptic plasticity, measured electrophysiologically in vitro in hippocampal slices. Importantly, SD-Intruders, SD and LE controls did not significantly differ from each other in any of these assessments. This reverse-Resident-Intruder-Paradigm (rRIP) represents a novel animal model to study the effects of stress on adolescent neurobehavioral phenomenon.

  14. Analyses of natural resources in 10 CFR Part 60 as related to inadvertent human intrusion

    International Nuclear Information System (INIS)

    Miklas, M.P.; Lefevre, H.E.

    1993-01-01

    The purpose of this paper is to examine the intent of the regulatory language of the portions of 10 CFR Part 60 which deal with considerations of the natural resources of a proposed geologic repository for high-level radioactive wastes as they relate to inadvertent human intrusion. Four Potentially Adverse Conditions (PAC) the requirements of 10 CFR 60.21(c)(13) are shown to be related to natural resources. Groundwater is identified as a natural resource known to be present at Yucca Mountain, Nevada. For economic considerations of natural resources, the open-quotes foreseeable futureclose quotes is thought to be no more than 50 years. Two of the topics addressed by the PACs, subsurface mining and drilling at a proposed repository site, are pre-site-characterization activities which must be evaluated in the context of repository performance criteria set by the US EPA standard, 40 CFR Part 191. An alternative US DOE compliance demonstration to another PAC, 10 CFR 60.122(c)(17), might be to use an open-quotes explorationist perspectiveclose quotes of natural resource assessment. The Commission intends for DOE to evaluate the likelihood and consequence of inadvertent human intrusion into a geologic repository as a result of exploration or exploitation of natural resources within or near a proposed high-level radioactive waste geologic repository

  15. The uptake of radionuclides from inadvertent consumption of soil by grazing animals

    International Nuclear Information System (INIS)

    Green, N.; Dodd, N.J.

    1988-01-01

    Investigations of the transfer to man of artificially-produced radionuclides through food chains have shown that the inadvertent consumption of soil by grazing animals can give variations in estimates of transfer coefficients, especially for radionuclides that are poorly absorbed by plant roots. Even small masses of soil adhering to herbage or directly ingested can make a significant contribution to the intake inventory in terms of activity. Although the activity concentrations of soil-contaminated herbage are elevated, the radionuclides associated with the soil may not necessarily be in a form which is easily absorbed by the animal. Attempts must be made, therefore, to quantify soil intake and the subsequent radionuclide uptake by this mechanism. A field investigation of the uptake of radionuclides by farm animals grazing near the Sellafield nuclear reprocessing plant has been pursued. The aims of the study were to estimate the transfer to muscle and other tissues. This paper describes the methods used to estimate both the soil intake and the consequent availability of radionuclides associated with the soil. The measurements were used to evaluate the contribution to tissue content of inadvertent consumption of soil by cows and sheep. 10 refs.; 2 tabs

  16. Consolidation of a WSN and Minimax Method to Rapidly Neutralise Intruders in Strategic Installations

    Directory of Open Access Journals (Sweden)

    Angela Ribeiro

    2012-03-01

    Full Text Available Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN. The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders’ behaviour is inferred through sequences of sensors’ activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final

  17. Energy of the 2p1h intruder state in $^{34}$Al

    CERN Multimedia

    The second 0$^{+}$ state in $^{34}$Si, of high importance for the understanding of the island of inversion at N=20, has been recently observed through the $\\beta$- decay of a predicted long-lived low-lying isomeric 1$^{+}$ state in $^{34}$Al. We intend to measure the unknown excitation energy of this isomer using the ISOLTRAP Penning-trap mass spectrometer. Since a recent experiment at ISOLDE (IS-530) showed that the full $\\beta$- strength in the decay of $^{34}$Mg goes through this 1$^{+}$ state in $^{34}$Al, we propose to perform a direct mass measurement of the daughter $^{34}$Al ions trapped after the decay of $^{34}$Mg. Mass measurements indicate that the 4$^{−}$ ground state in $^{34}$Al may be an excited state, the ground state being therefore the intruder 1$^{+}$ state. In another run, we propose to perform a remeasurement of the mass of the 4$^{−}$ ground state.

  18. Identification of intruder πi13/2 state in 197Tl

    Directory of Open Access Journals (Sweden)

    Pai H.

    2014-03-01

    Full Text Available The high-spin states in 197Tl were studied by populating them using the 197Au(α, 4n197 Tl reaction at 48 MeV of beam energy. γ−γ coincidence data were taken using a combination of clover, LEPS (low energy photon spectrometer and single crystal HPGe detectors. The polarization and DCO measurements were performed for definite spin and parity assignment of the excited states. The πi13/2 intruder state has been identified for the first time in this nucleus. The total Routhian surface calculations have been performed to study the shape and deformation of 197Tl for different configurations.

  19. Sleep paralysis and "the bedroom intruder": the role of the right superior parietal, phantom pain and body image projection.

    Science.gov (United States)

    Jalal, Baland; Ramachandran, Vilayanur S

    2014-12-01

    Sleep paralysis (SP) is a common condition occurring either at sleep onset or sleep offset. During SP the sleeper experiences gross motor paralysis while the sensory system is clear. Hypnogogic and hypnopompic hallucinations are common during SP and may involve seeing, hearing, and sensing the presence of menacing intruders in one's bedroom. This "intruder" is often perceived as a shadowy humanoid figure. Supernatural accounts of this hallucinated intruder are common across cultures. In this paper, we postulate that a functional disturbance of the right parietal cortex explains the shadowy nocturnal bedroom intruder hallucination during SP. This hallucination may arise due to a disturbance in the multisensory processing of body and self at the temporoparietal junction. We specifically propose that this perceived intruder is the result of a hallucinated projection of the genetically "hard-wired" body image (homunculus), in the right parietal region; namely, the same circuits that dictate aesthetic and sexual preference of body morphology. One way to test this hypothesis would be to study clinical populations who may have genetically acquired "irregularities" in their internal hard-wired body image in the right superior parietal lobule (SPL); for example, individuals with apotemnophilia or anorexia nervosa. If such individuals experience SP (e.g., induced in a sleep lab), and they hallucinate this shadowy figure, one would predict that they would see humanoid shadows and shapes with body irregularities, mirroring their own internal body image morphology. If correct, our hypothesis will offer a neurological explanation for this nocturnal bedroom intruder that has been a source of controversy, and striking and implausible cultural interpretations throughout history. Indeed, if our proposed hypothesis is tested and corroborated, dissemination of such findings would provide great relief to SP experiencers worldwide and could potentially be used in a therapeutic context

  20. Aggression and dominance in cichlids in resident-intruder tests: the role of environmental enrichment

    Directory of Open Access Journals (Sweden)

    Vincent Nijman

    2011-01-01

    Full Text Available When establishing dominance residents have a greater likelihood to dominate intruders than vice versa, partially because the resident has more to loose that the intruder has to win. This is known as the prior residency effect. In environmentally rich environments this effect should be stronger than in poor environments. Recently Kadry & Barreto (2010, Neotrop Ichthyol 8: 329-332 tested this in the pearl cichlid Geophagus brasiliensis (17 test pairs and reported that environmental enrichment led to a reduction of aggression. We here present data on four other cichlids (332 test pairs showing a stronger prior residency effect in enriched conditions, and, for two species, an increase in aggression. We discuss possible reasons for the differences between studies, focussing on the relationship between aggression and dominance and sample size effects.No estabelecimento de dominancia, residentes têm uma maior probabilidade de dominar os intrusos que vice-versa, em parte porque o residente tem mais a perder que o invasor tem a ganhar. Isto é conhecido como o efeito de residência prévia. Em ambientes ecologicamente ricos esse efeito deve ser mais forte do que em ambientes pobres. Recentemente Kadry & Barreto (2010, Neotrop. Ichthyol. 8: 329-332 testaram isso no cará Geophagus brasiliensis (17 pares de teste e relataram que o enriquecimento ambiental levou a uma redução de agressão. Aqui apresentamos dados de quatro outros ciclídeos (332 pares de teste, mostrando um efeito mais forte de residência prévia em condições enriquecidas, e, para duas espécies, o aumento da agressão. Discutimos possíveis razões para as diferenças entre os estudos, concentrando-nos sobre a relação entre agressão e dominação e os efeitos do tamanho da amostra.

  1. Mistaken Identifiers: Gene name errors can be introduced inadvertently when using Excel in bioinformatics

    Science.gov (United States)

    Zeeberg, Barry R; Riss, Joseph; Kane, David W; Bussey, Kimberly J; Uchio, Edward; Linehan, W Marston; Barrett, J Carl; Weinstein, John N

    2004-01-01

    Background When processing microarray data sets, we recently noticed that some gene names were being changed inadvertently to non-gene names. Results A little detective work traced the problem to default date format conversions and floating-point format conversions in the very useful Excel program package. The date conversions affect at least 30 gene names; the floating-point conversions affect at least 2,000 if Riken identifiers are included. These conversions are irreversible; the original gene names cannot be recovered. Conclusions Users of Excel for analyses involving gene names should be aware of this problem, which can cause genes, including medically important ones, to be lost from view and which has contaminated even carefully curated public databases. We provide work-arounds and scripts for circumventing the problem. PMID:15214961

  2. Method and apparatus for preventing inadvertent criticality in a nuclear fueled electric power generating unit

    International Nuclear Information System (INIS)

    Tuley, C.R.; Bauman, D.A.; Neuner, J.A.; Feilchenfeld, M.M.; Greenberg, L.

    1984-01-01

    An inadvertent approach to criticality in a nuclear fueled electric power generating unit is detected and an alarm is generated through on-line monitoring of the neutron flux. The difficulties of accurately measuring the low levels of neutron flux in a subcritical reactor are overcome by the use of a microcomputer which continuously generates average flux count rate signals for incremental time periods from thousands of samples taken during each such period and which serially stores the average flux count rate signals for a preselected time interval. At the end of each incremental time period, the microcomputer compares the latest average flux count rate signal with the oldest, and preferably each of the intervening stored values, and if it exceeds any of them by at least a preselected multiplication factor, an alarm is generated. (author)

  3. Inadvertent 131I therapy for hyperthyroidism in the first trimester of pregnancy

    International Nuclear Information System (INIS)

    Stoffer, S.S.; Hamburger, J.I.

    1976-01-01

    Of 963 physicians surveyed to determine therapeutic attitudes toward, and experience with inadvertent radioiodine therapy for hyperthyroidism during the first trimester of pregnancy, 116 physicians (of 517 responding) reported 237 cases. Therapeutic abortion was advised for 55 patients by 22 physicans. From the 182 remaining pregnancies there were two spontaneous abortions, two stillborn, one neonate with biliary atresia, and one with respiratory distress. This complication rate was not greater than might be expected in a similar number of random pregnancies. On the other hand, six infants were hypothyroid (transient for one) and four of these were mentally deficient. Three mothers of hypothyroid infants had received radioiodine therapy in the second trimester. None of the six mothers of hypothyroid infants had had pregnancy tests prior to radioiodine therapy. Survey responses indicate that routine pregnancy testing prior to radioiodine therapy for patients in the child-bearing age is not yet a standard procedure. It should be

  4. Inadvertent Apical Extrusion of Sodium Hypochlorite with Evaluation by Dental Volumetric Tomography

    Science.gov (United States)

    Başer Can, Elif Delve; Karapınar Kazandağ, Meriç; Kaptan, Rabia Figen

    2015-01-01

    This case report describes the tissue injury caused by inadvertently extruded NaOCl through the apical constriction. A 56-year-old female patient with complaints of pain, swelling, and ecchymosis on the left side of her face was referred to our clinic. The symptoms had emerged following root canal treatment of the maxillary left first premolar, and a soft tissue complication due to apical extrusion of NaOCl was diagnosed. Antibiotics and analgesics were prescribed. DVT images revealed that the buccal root apex had perforated the maxillary bone. The patient was followed up every other day and became asymptomatic on the 10th day. Endodontic therapy was completed with routine procedures. Determining working length precisely and following irrigation protocols meticulously are indispensable to prevent this type of complication. 3D visualization of the affected area may reveal the cause of the incident. PMID:25883812

  5. Inadvertent adverse consequences of clinical and forensic hypnosis: minimizing the risks.

    Science.gov (United States)

    Eimer, Bruce N

    2012-07-01

    Hypnosis is a psychological intervention tool that can make a gamut of psychological, medical, and dental treatments work more rapidly and effectively. It can also be used profitably with some witnesses, victims, and defendants in forensic and investigative contexts as a data gathering tool. As with any other power tool, its use entails some risks. Since risks cannot be totally avoided, this article examines some ways to minimize the risks of inadvertent adverse or negative consequences as a result of the use of the hypnosis tool. Fundamentals of hypnosis risk management are covered as a foundation for beginners and as a review for experienced practitioners. Various straightforward safeguards that should be heeded by all practitioners are discussed.

  6. Intruders: New Neighbors in "Dawn of the Planet of the Apes" and "The Hundred-Foot Journey"

    Science.gov (United States)

    Beck, Bernard

    2015-01-01

    Conflicts over territory are about the power to establish dominant cultures in territories and are often accompanied by cultural claims to legitimacy by each side. The cultural claims, or ideologies, are often expressed in terms of "homeland" dwellers versus "intruders." Two recent movies, "Dawn of the Planet of the…

  7. Territorial responses of male blue tits to simulated dynamic intrusions: effects of song overlap and intruder location

    DEFF Research Database (Denmark)

    Poesel, Angelika; Dabelsteen, Torben

    2005-01-01

    song alternating. A territory owner should therefore perceive an intruder overlapping its songs and staying inside its territory as a greater threat than one alternating and exiting the territory quickly. To test this hypothesis we used playback to interact with territorial male blue tits, Parus...

  8. Stick-slip and force chain evolution in a granular bed in response to a grain intruder.

    Science.gov (United States)

    Tordesillas, Antoinette; Hilton, James E; Tobin, Steven T

    2014-04-01

    The mechanical response of granular beds under applied stresses is often characterized by repeated cycles of stick-slip. Using the discrete element method, we examine stick-slip from a concentrated force loading-imposed by a single grain that is drawn through a densely packed, periodic granular bed via a stiff virtual spring. Force chains continually form and collapse ahead of the intruder grain. A comprehensive characterization of the birth-death evolution of these load-bearing structures, along with their surrounding contact cycles, reveals a well-defined shear zone of around eight particle diameters from the intruder, encapsulating: (i) long force chains that form buttresses with the fixed bottom wall for support, (ii) a region where the collapse of the most stable, persistent three-cycles preferentially occur to the point where they are essentially depleted by the end of the first cycle of stick-slip, and (iii) an inner core where force chain buckling events concentrate. Dilatancy is greatest in this inner core, and in the region next to the free surface. During slip, secondary force chains briefly form behind the intruder: these transient force chains, most of which comprise only 3 particles, form in the direction that is roughly perpendicular to the intruder motion.

  9. Endovascular repair of inadvertent arterial injury induced by central venous catheterization using a vascular closure device: A case report

    Energy Technology Data Exchange (ETDEWEB)

    Kim, So Hee; Jang, Woo Jin; Oh, Ju Heyon; Song, Yun Gyu [Samsung Changwon Hospital, Sungkyunkwan University School of Medicine, Changwon (Korea, Republic of)

    2017-04-15

    Central venous catheterization can cause various complications. Inadvertent subclavian artery catheterization was performed during insertion of a central venous catheter in a 73-year-old man suffering from panperitonitis due to small-bowel perforation. Endovascular treatment was conducted to treat the injured subclavian artery with a FemoSeal vascular closure device.

  10. 46 CFR 308.536 - Declaration where failure to comply with Clause 21 was inadvertent, Form MA-314.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION EMERGENCY OPERATIONS WAR RISK INSURANCE War Risk Cargo Insurance Ii-Open Policy War Risk Cargo... Assured that fails inadvertently to maintain a collateral deposit fund or surety bond in an amount..., which may be obtained from the American War Risk Agency or MARAD. III—Facultative War Risk Cargo...

  11. Management of traumatically intruded permanent maxillary lateral incisor - Case report and review of literature

    Directory of Open Access Journals (Sweden)

    Deepak Sharma

    2016-01-01

    Full Text Available Primary etiologic factors of trauma in the permanent dentition are bicycle accidents, sports accidents, falls, and fights. From the standpoint of therapy, anatomy, and prognosis, five different types of luxation lesions are recognized: Concussion, subluxation, extrusive luxation, lateral luxation, and intrusive luxation. Intrusive luxation is apical displacement of tooth into the alveolar bone. The tooth is driven into the socket, compressing the periodontal ligament, and commonly causes a crushing fracture of the alveolar socket. It is considered one of the most severe luxation injuries to affect permanent teeth. Intrusion injuries are often associated with severe damage to the tooth, periodontium, and pulpal tissue. The rare occurrence of this injury, 0.3–1.9% in the permanent dentition, has resulted in limited studies to support suggested treatment regimens. Clinical treatment for intrusion is especially difficult because of the severe complications accompanying it. These complications include pulp necrosis or obliteration, inflammatory root resorption, ankylosis, replacement root resorption, and loss of marginal bone support. Hence, the aim of presenting this case report of intrusive luxation is to highlight the importance of prompt care and root canal dressing and discuss the several treatments proposed to reposition the intruded teeth.

  12. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    Energy Technology Data Exchange (ETDEWEB)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K., E-mail: prodip.das@ncl.ac.uk [School of Mechanical and Systems Engineering Newcastle University Newcastle upon Tyne, NE1 7RU United Kingdom (United Kingdom)

    2016-07-12

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid’s thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  13. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    Science.gov (United States)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K.

    2016-07-01

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid's thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  14. City Dweller Responses to Multiple Stressors Intruding into Their Homes: Noise, Light, Odour, and Vibration

    Directory of Open Access Journals (Sweden)

    Eja Pedersen

    2015-03-01

    Full Text Available Urban densification increases exposure to noise, light, odour, and vibration in urban dwellings. Exposure from combined environmental stressors intruding into the home could increase the risk of adverse effects on wellbeing, even when the exposure is at a relatively low level. This study assesses the prevalence of annoyance with a combination of potential environmental stressors common in urban areas and the association with wellbeing. A questionnaire was sent by mail to residents in five areas in Halmstad (Sweden with similar socioeconomic and housing characteristics but different exposure (response rate 56%; n = 385. Of the respondents, 50% were annoyed to some degree by at least one of the suggested stressors, most commonly by noise and vibration from local traffic. Structural equation modelling showed that annoyance led to lowered quality of life via the mediating construct residential satisfaction, which in turn was influenced by place attachment and perceived restoration possibilities in the dwelling. Stress had a negative impact on quality of life, but was not directly correlated to annoyance. Stress was however correlated with sensitivity. The findings suggest that dose-response relationships for environmental stressors should be studied in a broader context of environmental and individual factors. Also relatively low levels of exposure should be mitigated, especially if several stressors are present.

  15. Female song rates in response to simulated intruder are positively related to reproductive success.

    Directory of Open Access Journals (Sweden)

    Kristal E Cain

    2015-10-01

    Full Text Available Bird song is well studied in males as a sexually selected behavior. However, although song is also common among females, it is infrequently examined and poorly understood. Research suggests that song is often used as a resource defense behavior and is important in female-female competition for limited resources, e.g. mates and territories. If so, song should be positively related to fitness and related to other resource defense behaviors, but this possibility has rarely been explored. Here we examine fitness estimates in relation to spontaneous song rates and song rates in response to a simulated intruder (playback, in the superb fairy-wren (Malurus cyaneus, a cooperatively breeding songbird. We also determine how song rates relate to other territorial defense behaviors. Song rate in response to playback, but not spontaneous song rate, was positively related to nest success and the number of fledglings produced by successful females. Further, response song rate was also correlated with other territorial defense behaviors (latency to respond and flights. This evidence supports the hypothesis that female song may be used in the context of female-female competition to improve access to limited reproductive resources, and suggests that song may provide direct fitness benefits.

  16. Shape coexistence and shell-model intruder states in the lead region studied by $\\alpha$ -decay

    CERN Multimedia

    2002-01-01

    % IS336 \\\\ \\\\ Low-lying 0$^+$ states in even-even nuclei near closed shells can be a manifestation of the coexistence of different shapes in the same nucleus. Deformed bandstructures built upon these 0$^+$ states, coexisting at low energy with the ground state band, have been observed in several regions of the nuclear chart, including the Z=82 region. Such structures have been found in the neutron-deficient even Pb nuclei and the mixing between intruder and normal states has been studied by the $\\alpha$- decay of $^{194, 196, 198}$Po towards the 0$^+$ excited and ground states in $^{190, 192, 194}$Pb using $\\alpha$-e-t coincidence events. It is expected that shape coexistence will occur in the light Po isotopes as well. Evidence for a deformed band at low excitation energy in $^{196, 198}$Po has been found in in-beam studies and the $\\alpha$-decay of $^{202}$Rn studied at ISOLDE revealed feeding to a 0$^+$~state at 816~keV in $^{198}$Po. \\\\ \\\\It is our intention to investigate the $^{194, 196}$Po nuclei with ...

  17. Simulation of transient inadvertent safety injection system during power operation; Simulacao do transitorio de operacao inadvertida do sistema de injecao de seguranca durante operacao em potencia

    Energy Technology Data Exchange (ETDEWEB)

    Vanni, Enio Antonio [ELETROBRAS Termonuclear S.A. (ELETRONUCLEAR), Rio de Janeiro, RJ (Brazil). E-mail: vanni@eletronuclear.gov.br

    2000-07-01

    The Condition II transient Inadvertent Safety Injection System Operation During Power Operation described on item 15.2.14 of Angra 1 Final Safety Analysis Report (FSAR) has been analyzed. Simulations with RETRAN computer code have been performed to evaluate the consequences to the transient as the Boron Injection Tank (BIT) concentration is reduced from 20000 to 2000 ppm. The first simulation has been carried out for a BIT concentration of 20000 ppm, in order to compare RETRAN results with those presented on FSAR. It has been verified that RETRAN models used and the hypotheses adopted were correct. The second simulation has been performed for a BIT concentration of 2000 ppm. It has been proved that even for this lower concentration level the Departure from Nucleate Boiling ratio (DNBR) limit (1,3) has not been violated. (author)

  18. Passive Barriers to Inadvertent Human Intrusion for Use at the Nevada Test Site

    International Nuclear Information System (INIS)

    NSTec Environmental Management

    2007-01-01

    In July1996, BN transmitted Passive Barriers to Inadvertent Human Intrusion for Use at the Nevada Test Site to the United States Department of Energy, under Contract DE-AC08-91NV10833. The 1996 paper had a limited distribution and was not reviewed for public release. In 2007, National Security Technologies LLC (NSTec) made minor revisions to conform to current editorial standards of the NNSA/NSO and to meet current security requirements for public release. The primary purpose of this study was to identify types of engineered passive barriers that could deter future intrusion into buried low-level radioactive waste, particularly intrusion by drilling water wells. The study considered drilling technology, many natural and man-made materials, and both underground and above-ground barriers. Based on cost and effectiveness, the report recommended underground barriers consisting of a layer of rubble or tires. An aboveground barrier mound might also prove effective, but would cost more, and may become an attractive nuisance (e.g., might, after their purpose has been forgotten, encourage exploration for the sake of satisfying curiosity). Advances in drilling technology could render any engineered barriers ineffective if there is motivation to penetrate the barriers

  19. Inadvertent social information in breeding site selection of natal dispersing birds

    Science.gov (United States)

    Nocera, Joseph J; Forbes, Graham J; Giraldeau, Luc-Alain

    2005-01-01

    Several species use the number of young produced as public information (PI) to assess breeding site quality. PI is inaccessible for synchronously breeding birds because nests are empty by the time the young can collect this information. We investigate if location cues are the next best source of inadvertent social information (ISI) used by young prospectors during breeding site choice. We experimentally deployed ISI as decoys and song playbacks of breeding males in suitable and sub-optimal habitats during pre- and post-breeding periods, and monitored territory establishment during the subsequent breeding season for a social, bobolink (Dolichonyx oryzivorus), and a more solitary species, Nelson's sharp-tailed sparrow (Ammodramus nelsoni). The sparrows did not respond to treatments, but bobolinks responded strongly to post-breeding location cues, irrespective of habitat quality. The following year, 17/20 sub-optimal plots to which bobolink males were recruited were defended for at least two weeks, indicating that song heard the previous year could exert a ‘carry-over attraction’ effect on conspecifics the following year. Sixteen recruited males were natal dispersers, as expected when animals have little opportunity to directly sample their natal habitat quality. We suggest that differences in breeding synchronicity may induce an equivalent clinal distribution of ISI use. PMID:16543178

  20. The role of thromboxane in experimental inadvertent intra-arterial drug injections.

    Science.gov (United States)

    Zachary, L S; Smith, D J; Heggers, J P; Robson, M C; Boertman, J A; Niu, X T; Schileru, R E; Sacks, R J

    1987-03-01

    Inadvertent intra-arterial injection of drugs produces a well-defined clinical syndrome whose pathophysiology remains unclear. This study was designed to determine the role of the inflammatory mediator, thromboxane, in intra-arterial drug injections. The rabbit ear model, as described by Kinmonth and Sheppard, was used. Five of the experimental groups were treated with specific or nonspecific thromboxane blocking agents and two groups served as controls. Immunohistochemical staining of the control ears showed elevated levels of thromboxane within the first 6 hours postinjury. The specific thromboxane blocking agents, methimazole and Aloe vera, showed almost complete blockade of thromboxane production. The percentage of ear survival was significantly greater in the group treated with topical Aloe vera (p less than 0.05) and even greater survival was achieved in the combined Aloe vera/methimazole group (p less than 0.01). On the basis of these results, we have begun treatment of such injuries with specific and nonspecific thromboxane blocking agents.

  1. Causal Analysis of the Inadvertent Contact with an Uncontrolled Electrical Hazardous Energy Source (120 Volts AC)

    Energy Technology Data Exchange (ETDEWEB)

    David E. James; Dennis E. Raunig; Sean S. Cunningham

    2014-10-01

    On September 25, 2013, a Health Physics Technician (HPT) was performing preparations to support a pneumatic transfer from the HFEF Decon Cell to the Room 130 Glovebox in HFEF, per HFEF OI 3165 section 3.5, Field Preparations. This activity involves an HPT setting up and climbing a portable ladder to remove the 14-C meter probe from above ball valve HBV-7. The HPT source checks the meter and probe and then replaces the probe above HBV-7, which is located above Hood ID# 130 HP. At approximately 13:20, while reaching past the HBV-7 valve position indicator switches in an attempt to place the 14-C meter probe in the desired location, the HPT’s left forearm came in contact with one of the three sets of exposed terminals on the valve position indication switches for HBV 7. This resulted in the HPT receiving an electrical shock from a 120 Volt AC source. Upon moving the arm, following the electrical shock, the HPT noticed two exposed electrical connections on a switch. The HPT then notified the HFEF HPT Supervisor, who in turn notified the MFC Radiological Controls Manager and HFEF Operations Manager of the situation. Work was stopped in the area and the hazard was roped off and posted to prevent access to the hazard. The HPT was escorted by the HPT Supervisor to the MFC Dispensary and then preceded to CFA medical for further evaluation. The individual was evaluated and released without any medical restrictions. Causal Factor (Root Cause) A3B3C01/A5B2C08: - Knowledge based error/Attention was given to wrong issues - Written Communication content LTA, Incomplete/situation not covered The Causal Factor (root cause) was attention being given to the wrong issues during the creation, reviews, verifications, and actual performance of HFEF OI-3165, which covers the need to perform the weekly source check and ensure placement of the probe prior to performing a “rabbit” transfer. This resulted in the hazard not being identified and mitigated in the procedure. Work activities with in HFEF-OI-3165 placed the HPT in proximity of an unmitigated hazard directly resulting in this event. Contributing Factor A3B3C04/A4B5C04: - Knowledge Based Error, LTA Review Based on Assumption That Process Will Not Change - Change Management LTA, Risks/consequences associated with change not adequately reviewed/assessed Prior to the pneumatic system being out of service, the probe and meter were not being source checked together. The source check issue was identified and addressed during the period of time when the system was out of service. The corrective actions for this issue resulted in the requirement that a meter and probe be source checked together as it is intended to be used. This changed the activity and required an HPT to weekly, when in use, remove and install the probe from above HBV-7 to meet the requirement of LRD 15001 Part 5 Article 551.5. Risks and consequences associated with this change were not adequately reviewed or assessed. Failure to identify the hazard associated with this change directly contributed to this event.

  2. Anatomy of an intruded coal, I: Effect of contact metamorphism on whole-coal geochemistry, Springfield (No. 5) (Pennsylvanian) coal, Illinois Basin

    Energy Technology Data Exchange (ETDEWEB)

    Rimmer, Susan M. [Department of Geology, Southern Illinois University Carbondale, Carbondale, IL 62901 (United States); Yoksoulian, Lois E. [Department of Earth and Environmental Sciences, University of Kentucky, Lexington, KY 40506 (United States); Hower, James C. [Center for Applied Energy Research, University of Kentucky, 2540 Research Park Drive, Lexington, KY 40511 (United States)

    2009-08-01

    If time and heating rate are important agents in coal maturation, one might expect to see differences in chemical changes in response to maturation depending on the means of increased rank. Using a suite of samples obtained from an intruded Pennsylvanian-age coal in southern Illinois, we present whole-coal chemical data. Comparing these data to extant geochemical data for coals that have undergone normal burial maturation, we evaluated the hypothesis that if coal alteration occurs rapidly (due to intrusion) rather than gradually (burial maturation), then different relationships are seen in chemical composition (proximate and ultimate analyses) and vitrinite reflectance. The Pennsylvanian-age (Asturian [Westphalian D]) Springfield (No. 5) coal is mined at the Big Ridge Mine, near Eldorado, southern Illinois. This high volatile B bituminous coal was intruded by an ultramafic igneous intrusion during the early Permian. Alteration occurs out to {proportional_to} 1.2 x dike thickness and includes an increase in random vitrinite reflectance (R{sub m}) from levels {proportional_to} 0.7% to over 5.3%, loss of liptinites, and formation of devolatilization vacuoles and fine mosaic texture. Decreases in volatile matter (VM) and increases in fixed carbon (FC) appear to be less than would be expected for the level of reflectance seen within the alteration halo. Carbonate minerals have a major influence on proximate analyses but even following the removal of carbonates, the decrease in VM is still less than would be seen in coals of similar vitrinite reflectance that were altered by normal burial maturation. Carbonate mineralization also contributes to variability in ultimate analysis values approaching the intrusion, particularly for %C and %O. After carbonate removal, data for these coals do not appear to follow the normal burial coalification tracks when plotted on a van Krevelen diagram and on a Seyler chart. These differences suggest that a slightly different maturation

  3. Influence of i13/2 proton and j15/2 neutron intruding orbitals on the behaviour of 190 mass region superdeformed nuclei

    International Nuclear Information System (INIS)

    Duprat, J.

    1995-01-01

    This work concerns the study of the nuclear superdeformation phenomenon in the A = 190 mass region. The superdeformed (SD) states in 193 Tl, 194 Tl 195 Tl were produced via heavy-ion induced reactions and studied with the EUROGAM gamma multidetector array. The analysis of high-multiplicity events allowed the study of the magnetic properties of the SD states in these nuclei. For the first time, the g-factor of a proton orbital in a SD nucleus in the A = 190 mass region has been extracted. This measurement indicates that the two known bands in 195 Tl-SD are built on the i 13/2 proton intruder orbital. A new SD band has been found in this isotope: it is the first SD band built on an excited proton state found in the A = 190 region. Finally an interaction between two pairs of bands has been established in 194 Tl; this interaction indicate the crossing of two neutron orbitals above the N = 112 gap. The magnetic properties of the states of the SD bands in 194 Tl reveals that these bands are built on configurations in which the single proton and neutron intrinsic spins are aligned. Comparison between different SD bands in the Thallium isotopes shows the prominent role of the i 13/2 proton and the j 15/2 neutron intruder orbitals in the smooth increase of the dynamical moment of inertia as a function of the rotational frequency. In addition, this work reports on the first observation of a SD rotational band produced in a (HI, αxn) reaction channel. The study of the maximum spin reached by the SD bands indicates both a competition between alpha emission and fission of the compound nucleus, and the limitation due to the fission process in the population of the SD nuclei in the A = 190 region. (author). 120 refs., 112 figs., 22 tabs., 2 ann

  4. Measuring virgin female aggression in the female intruder test (FIT: effects of oxytocin, estrous cycle, and anxiety.

    Directory of Open Access Journals (Sweden)

    Trynke R de Jong

    Full Text Available The costs of violence and aggression in our society have stimulated the scientific search for the predictors and causes of aggression. The majority of studies have focused on males, which are considered to be more aggressive than females in most species. However, rates of offensive behavior in girls and young women are considerable and are currently rising in Western society. The extrapolation of scientific results from males to young, non-maternal females is a priori limited, based on the profound sex differences in brain areas and functioning of neurotransmitters involved in aggression. Therefore, we established a paradigm to assess aggressive behavior in young virgin female rats, i.e. the female intruder test (FIT. We found that approximately 40% of un-manipulated adult (10-11 weeks old female Wistar rats attack an intruder female during the FIT, independent of their estrous phase or that of their intruder. In addition, adolescent (7-8 weeks old female rats selected for high anxiety behavior (HABs displayed significantly more aggression than non-selected (NAB or low-anxiety (LAB rats. Intracerebroventricular infusion of oxytocin (OXT, 0.1 µg/5 µl inhibited aggressive behavior in adult NAB and LAB, but not HAB females. Adolescent NAB rats that had been aggressive towards their intruder showed increased pERK immunoreactivity (IR in the hypothalamic attack area and reduced pERK-IR in OXT neurons in the paraventricular hypothalamic nucleus compared to non-aggressive NAB rats. Taken together, aggressive behavior in young virgin female rats is partly dependent on trait anxiety, and appears to be under considerable OXT control.

  5. Measuring virgin female aggression in the female intruder test (FIT): effects of oxytocin, estrous cycle, and anxiety.

    Science.gov (United States)

    de Jong, Trynke R; Beiderbeck, Daniela I; Neumann, Inga D

    2014-01-01

    The costs of violence and aggression in our society have stimulated the scientific search for the predictors and causes of aggression. The majority of studies have focused on males, which are considered to be more aggressive than females in most species. However, rates of offensive behavior in girls and young women are considerable and are currently rising in Western society. The extrapolation of scientific results from males to young, non-maternal females is a priori limited, based on the profound sex differences in brain areas and functioning of neurotransmitters involved in aggression. Therefore, we established a paradigm to assess aggressive behavior in young virgin female rats, i.e. the female intruder test (FIT). We found that approximately 40% of un-manipulated adult (10-11 weeks old) female Wistar rats attack an intruder female during the FIT, independent of their estrous phase or that of their intruder. In addition, adolescent (7-8 weeks old) female rats selected for high anxiety behavior (HABs) displayed significantly more aggression than non-selected (NAB) or low-anxiety (LAB) rats. Intracerebroventricular infusion of oxytocin (OXT, 0.1 µg/5 µl) inhibited aggressive behavior in adult NAB and LAB, but not HAB females. Adolescent NAB rats that had been aggressive towards their intruder showed increased pERK immunoreactivity (IR) in the hypothalamic attack area and reduced pERK-IR in OXT neurons in the paraventricular hypothalamic nucleus compared to non-aggressive NAB rats. Taken together, aggressive behavior in young virgin female rats is partly dependent on trait anxiety, and appears to be under considerable OXT control.

  6. Long-Term Performance of Transuranic Waste Inadvertently Disposed in a Shallow Land Burial Trench at the Nevada Test Site

    International Nuclear Information System (INIS)

    Shott, Gregory J.; Yucel, Vefa

    2009-01-01

    In 1986, 21 m3 of transuranic (TRU) waste was inadvertently disposed in a shallow land burial trench at the Area 5 Radioactive Waste Management Site on the Nevada Test Site. U.S. Department of Energy (DOE) TRU waste must be disposed in accordance with Title 40, Code of Federal Regulations (CFR), Part 191, Environmental Radiation Protection Standard for Management and Disposal of Spent Nuclear Fuel, High-Level, and Transuranic Radioactive Wastes. The Waste Isolation Pilot Plant is the only facility meeting these requirements. The National Research Council, however, has found that exhumation of buried TRU waste for disposal in a deep geologic repository may not be warranted when the effort, exposures, and expense of retrieval are not commensurate with the risk reduction achieved. The long-term risks of leaving the TRU waste in-place are evaluated in two probabilistic performance assessments. A composite analysis, assessing the dose from all disposed waste and interacting sources of residual contamination, estimates an annual total effective dose equivalent (TEDE) of 0.01 mSv, or 3 percent of the dose constraint. A 40 CFR 191 performance assessment also indicates there is reasonable assurance of meeting all requirements. The 40 CFR 191.15 annual mean TEDE for a member of the public is estimated to reach a maximum of 0.055 mSv at 10,000 years, or approximately 37 percent of the 0.15 mSv individual protection requirement. In both assessments greater than 99 percent of the dose is from co-disposed low-level waste. The simulated probability of the 40 CFR 191.13 cumulative release exceeding 1 and 10 times the release limit is estimated to be 0.0093 and less than 0.0001, respectively. Site characterization data and hydrologic process modeling support a conclusion of no groundwater pathway within 10,000 years. Monte Carlo uncertainty analysis indicates that there is reasonable assurance of meeting all regulatory requirements. Sensitivity analysis indicates that the results

  7. Inadvertent Splenectomy During Resection for Colorectal Cancer Does Not Increase Long-term Mortality in a Propensity Score Model

    DEFF Research Database (Denmark)

    Lolle, Ida; Pommergaard, Hans-Christian; Schefte, David F

    2016-01-01

    BACKGROUND: Previous studies suggest that long-term mortality is increased in patients who undergo splenectomy during surgery for colorectal cancer. The reason for this association remains unclear. OBJECTIVE: The purpose of this study was to investigate the association between inadvertent...... splenectomy attributed to iatrogenic lesion to the spleen during colorectal cancer resections and long-term mortality in a national cohort of unselected patients. DESIGN: This was a retrospective, nationwide cohort study. SETTINGS: Data were collected from the database of the Danish Colorectal Cancer Group...... for patients surviving 30 days after surgery. Secondary outcomes were 30-day mortality and risk factors for inadvertent splenectomy. Multivariable and propensity-score matched Cox regression analyses were used to adjust for potential confounding. RESULTS: In total, 23,727 patients were included, of which 277...

  8. Comparison of resistive heating and forced-air warming to prevent inadvertent perioperative hypothermia.

    Science.gov (United States)

    John, M; Crook, D; Dasari, K; Eljelani, F; El-Haboby, A; Harper, C M

    2016-02-01

    Forced-air warming is a commonly used warming modality, which has been shown to reduce the incidence of inadvertent perioperative hypothermia (heating mattresses offer a potentially cheaper alternative, however, and one of the research recommendations from the National Institute for Health and Care Excellence was to evaluate such devices formally. We conducted a randomized single-blinded study comparing perioperative hypothermia in patients receiving resistive heating or forced-air warming. A total of 160 patients undergoing non-emergency surgery were recruited and randomly allocated to receive either forced-air warming (n=78) or resistive heating (n=82) in the perioperative period. Patient core temperatures were monitored after induction of anaesthesia until the end of surgery and in the recovery room. Our primary outcome measures included the final intraoperative temperature and incidence of hypothermia at the end of surgery. There was a significantly higher rate of hypothermia at the end of surgery in the resistive heating group compared with the forced-air warming group (P=0.017). Final intraoperative temperatures were also significantly lower in the resistive heating group (35.9 compared with 36.1°C, P=0.029). Hypothermia at the end of surgery in both warming groups was common (36% forced air warming, 54% resistive heating). Our results suggest that forced-air warming is more effective than resistive heating in preventing postoperative hypothermia. NCT01056991. © The Author 2016. Published by Oxford University Press on behalf of the British Journal of Anaesthesia. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. The social image of drinking - mass media campaigns may inadvertently increase binge drinking.

    Science.gov (United States)

    Zimmermann, Friederike; Kohlmann, Karoline; Monter, Anne; Ameis, Nina

    2017-10-01

    Mass media campaigns that promote responsible drinking are rarely tested for their usefulness in reducing heavy alcohol consumption. Existing campaigns that appeal to responsible drinking while simultaneously displaying young people in social drinking situations may even have paradoxical effects. To examine such possible effects, we drew on a real-world media campaign, which we systematically modified on the basis of recent prototype research. We pilot tested questionnaires (using n = 41 participants), developed two different sets of posters in the style of an existing campaign (n = 39) and investigated their effectiveness (n = 102). In the main study, young men were randomly assigned to one of three conditions: sociable or unsociable binge drinker prototype condition or a control group. Outcome variables were intention, behavioural willingness, attitude, subjective norm, self-efficacy, prototype evaluation and prototype similarity with respect to binge drinking. Binge drinking as a habit was included to control for the fact that habitual drinking in social situations is hard to overcome and poses a particular challenge to interventions. The manipulation check showed that the experimental variation (sociable vs. unsociable drinker prototype condition) was successful. Results of the main study showed that the sociable drinker prototype condition resulted in a higher willingness and - for those with less of a habit - a higher intention to binge drink the next weekend. The unsociable drinker prototype condition had no effects. The results imply that the social components of mass media campaigns might inadvertently exacerbate binge drinking in young men. We therefore advocate against campaigns including aspects of alcohol consumption that might be positively associated with drinker prototype perception. Finally, we provide suggestions for future research.

  10. Les femmes et le langage selon Charles Bally: "des moments de décevante inadvertance"?

    Directory of Open Access Journals (Sweden)

    Durrer, Sylvie

    2002-01-01

    Full Text Available Les problématiques rassemblées parfois sous la désignation de "Language and Gender" figurent également dans les publications du linguiste suisse Charles Bally. Cet axe de réflexion, qui n’a guère été remarqué dans son œuvre, mérite d’être mis en lumière, non pas pour faire de Bally un féministe avant l’heure, mais simplement, parce qu’il nous semble important de documenter l’histoire d’une problématique en plein essor. Cet article a donc pour objectif de montrer que la question du traitement des femmes et du féminin par la langue française suscite de nombreuses réflexions dès la fin du XIXe. Il s’agira de procéder à une histoire critique d’un épisode de la "linguistique générique", afin de voir si les actuelles thématiques de cette orientation sont abordées, sous quels aspects, dans quels contextes, avec quels résultats, etc. On pourrait alors être surpris-e de découvrir que Charles Bally n’était pas un cas isolé, mais qu’un grand nombre de contemporains (Nyrop, Brunot, Vendryès, Damourette & Pichon, Dauzat, etc., se sont eux aussi interrogés, plus ou moins longuement, sur les rapports entre les femmes, le féminin et le langage. Les réflexions "génériques" de Bally et de ses confrères ne sauraient donc être regardées comme de simples "moments décevante inadvertance".

  11. Inadvertent exaggerated anticoagulation following use of bismuth subsalicylate in an enterally fed patient receiving warfarin therapy.

    Science.gov (United States)

    Bingham, Angela L; Brown, Rex O; Dickerson, Roland N

    2013-12-01

    We report a case of an inadvertent increase in the international normalized ratio (INR) after the addition of bismuth subsalicylate for the treatment of diarrhea in an enterally fed patient receiving warfarin therapy. A 56-year-old Caucasian female presented to the trauma intensive care unit (ICU) with multiple lower extremity fractures. Warfarin was initiated for deep vein thrombosis prophylaxis due to the patient's inability to ambulate. The target INR was 2-3. Continuous intragastric enteral feeding was withheld 1 hour before and 1 hour after intragastric administration of warfarin. Bismuth subsalicylate 30 mL every 4 hours was prescribed for diarrhea. Within 3 days after starting bismuth subsalicylate therapy, the patient's INR increased from 2.56 to 3.54 and minor bleeding was noted from the patient's tracheostomy site. No significant change in warfarin dosage, variability in vitamin K intake, or medications that potentially alter warfarin metabolism were present during the unexpected rise in INR. When the bismuth subsalicylate was discontinued, the patient's INR stabilized into the target range on the same warfarin dose given at the time of the supratherapeutic INR. Salicylate displaces warfarin from plasma protein binding sites and may result in a significant increase in INR secondary to redistribution of warfarin to the free active form. Evaluation of this case report using the Drug Interaction Probability Scale and Naranjo Adverse Drug Reaction Probability Scale yielded scores consistent with a probable adverse drug interaction. Bismuth subsalicylate exaggerates warfarin's anticoagulant response and its concurrent use during warfarin therapy should be avoided.

  12. Inadvertent brachial plexus anesthesia associated with local anesthetic infiltration during internal jugular venous cannulation: a case report.

    Science.gov (United States)

    Karabiyik, L; Tezer, T

    2011-01-01

    In the development of neurological complications due to central venous cannulation, the properties of the anatomical region and the experience of the practitioner are important. In this case report, an inadvertent brachial plexus anesthesia after repeated local anesthetic infiltrations during failed attempts of internal jugular venous cannulation by an inexperienced practitioner in cardiovascular intensive care unit is described. The neurological complications due to central venous cannulation are reviewed in the light of actual literature data.

  13. Design characteristics to reduce inadvertent cross-axis coupling during side stick handling of aircraft pitch and roll axis control

    Science.gov (United States)

    Cote, Marie-Eve

    Integrating a manual flight control inceptor with coupled axes such as the side stick within a flight deck creates challenges for the pilot to input a one-axis command without inadvertently inducing inputs in the opposite axis. The present paper studies three design features of the side stick and armrest setup believed to help reduce inadvertent cross-axis coupling occurrences. Design features address the aimed pilot population anthropometry (1.57m woman to 1.9m male) and their variability in upper segment measurements. Seven pilots of varying anthropometric sizes were asked to perform one-axis manoeuvres in pitch and roll for each setup configuration. To compare the setups both the duration and the definite integral of the unintended cross-axis input were processed and analyzed for each manoeuvre. Findings show that a short armrest reduces the occurrences of cross-axis input for the roll manoeuvre, whereas the side stick skew reduces inadvertent cross-axis coupling for the pitch manoeuvres.

  14. Active body surface warming systems for preventing complications caused by inadvertent perioperative hypothermia in adults.

    Science.gov (United States)

    Madrid, Eva; Urrútia, Gerard; Roqué i Figuls, Marta; Pardo-Hernandez, Hector; Campos, Juan Manuel; Paniagua, Pilar; Maestre, Luz; Alonso-Coello, Pablo

    2016-04-21

    Inadvertent perioperative hypothermia is a phenomenon that can occur as a result of the suppression of the central mechanisms of temperature regulation due to anaesthesia, and of prolonged exposure of large surfaces of skin to cold temperatures in operating rooms. Inadvertent perioperative hypothermia has been associated with clinical complications such as surgical site infection and wound-healing delay, increased bleeding or cardiovascular events. One of the most frequently used techniques to prevent inadvertent perioperative hypothermia is active body surface warming systems (ABSW), which generate heat mechanically (heating of air, water or gels) that is transferred to the patient via skin contact. To assess the effectiveness of pre- or intraoperative active body surface warming systems (ABSW), or both, to prevent perioperative complications from unintended hypothermia during surgery in adults. We searched the Cochrane Central Register of Controlled Trials (CENTRAL; Issue 9, 2015); MEDLINE (PubMed) (1964 to October 2015), EMBASE (Ovid) (1980 to October 2015), and CINAHL (Ovid) (1982 to October 2015). We included randomized controlled trials (RCTs) that compared an ABSW system aimed at maintaining normothermia perioperatively against a control or against any other ABSW system. Eligible studies also had to include relevant clinical outcomes other than measuring temperature alone. Several authors, by pairs, screened references and determined eligibility, extracted data, and assessed risks of bias. We resolved disagreements by discussion and consensus, with the collaboration of a third author. We included 67 trials with 5438 participants that comprised 79 comparisons. Forty-five RCTs compared ABSW versus control, whereas 18 compared two different types of ABSW, and 10 compared two different techniques to administer the same type of ABSW. Forced-air warming (FAW) was by far the most studied intervention.Trials varied widely regarding whether the interventions were

  15. Prevention of and response to inadvertent exposure of embryo/fetus to ionizing radiation, due to medical exposure of the mother. The Greek regulatory authority initiatives.

    Science.gov (United States)

    Economides, Sotirios; Boziari, Argiro; Vogiatzi, Stavroula; Hourdakis, Konstantinos J; Kamenopoulou, Vassiliki; Dimitriou, Panagiotis

    2014-03-01

    Embryo/fetus (E/F) irradiation as a result of medical exposure of the mother should be avoided, unless there are strong clinical indications. Medical practitioners are assigned the primary task and obligation of ensuring overall patient protection and safety in the prescription of and during the delivery of medical exposure. In cases of unintended exposure of embryo/fetus (E/F), the risk analysis and communication is conducted by or under the supervision of medical physicists at local level. National competent authorities can contribute to the prevention, risk analysis and communication of inadvertent E/F exposure to ionizing radiation by recording, analyzing and disseminating the relevant information. Since 2001, Greek Atomic Energy Commission has established a committee with the mandate to provide advice, to keep records, to analyze and disseminate the experience gained in cases of unintended E/F exposure. During the period 2001-2011, the committee was consulted by 269 pregnant women undergone medical exposures. The conclusions from the relevant data analysis, as well as the experience gained are herein presented and discussed. Copyright © 2013 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  16. Warming of intravenous and irrigation fluids for preventing inadvertent perioperative hypothermia.

    Science.gov (United States)

    Campbell, Gillian; Alderson, Phil; Smith, Andrew F; Warttig, Sheryl

    2015-04-13

    Inadvertent perioperative hypothermia (a drop in core temperature to below 36°C) occurs because of interference with normal temperature regulation by anaesthetic drugs, exposure of skin for prolonged periods and receipt of large volumes of intravenous and irrigation fluids. If the temperature of these fluids is below core body temperature, they can cause significant heat loss. Warming intravenous and irrigation fluids to core body temperature or above might prevent some of this heat loss and subsequent hypothermia. To estimate the effectiveness of preoperative or intraoperative warming, or both, of intravenous and irrigation fluids in preventing perioperative hypothermia and its complications during surgery in adults. We searched the Cochrane Central Register of Controlled Trials (CENTRAL) (2014, Issue 2), MEDLINE Ovid SP (1956 to 4 February 2014), EMBASE Ovid SP (1982 to 4 February 2014), the Institute for Scientific Information (ISI) Web of Science (1950 to 4 February 2014), Cumulative Index to Nursing and Allied Health Literature (CINAHL) EBSCOhost (1980 to 4 February 2014) and reference lists of identified articles. We also searched the Current Controlled Trials website and ClinicalTrials.gov. We included randomized controlled trials or quasi-randomized controlled trials comparing fluid warming methods versus standard care or versus other warming methods used to maintain normothermia. Two review authors independently extracted data from eligible trials and settled disputes with a third review author. We contacted study authors to ask for additional details when needed. We collected data on adverse events only if they were reported in the trials. We included in this review 24 studies with a total of 1250 participants. The trials included various numbers and types of participants. Investigators used a range of methods to warm fluids to temperatures between 37°C and 41°C. We found that evidence was of moderate quality because descriptions of trial design were

  17. Indirect usage of miniscrew anchorage to intrude overerupted mandibular incisors in a Class II patient with a deep overbite.

    Science.gov (United States)

    Ishihara, Yoshihito; Kuroda, Shingo; Sugawara, Yasuyo; Balam, Tarek A; Takano-Yamamoto, Teruko; Yamashiro, Takashi

    2013-04-01

    Vertical dentoalveolar discrepancies are a common problem in orthodontic patients but are often difficult to treat with traditional mechanics. This case report illustrates the successful treatment of overerupted mandibular incisors via the indirect use of miniscrew anchorage. A woman (age, 22 years 9 months) had chief complaints of maxillary incisor protrusion and crooked teeth. An excessive curve of Spee caused by elongation of the mandibular incisors was also found. The patient was diagnosed with a severe Class II Division 1 malocclusion and a deep overbite. After extraction of the mandibular first premolars and the subsequent leveling phase, the elongated incisors were intruded with a novel method, which involved the combined use of sectional archwires and miniscrews placed in the premolar areas. After the procedure, the mandibular incisors had been intruded by 6.5 mm with no undesirable side effects. The total active treatment period was 42 months. The resultant occlusion and satisfactory facial profile were maintained after 30 months of retention. Our novel intrusion approach shows potential for correcting a deep overbite. Copyright © 2013 American Association of Orthodontists. Published by Mosby, Inc. All rights reserved.

  18. [Indirect usage of miniscrew anchorage to intrude overerupted mandibular incisors in a Class II patient with a deep overbite].

    Science.gov (United States)

    Ishihara, Yoshihito; Kuroda, Shingo; Sugawara, Yasuyo; Balam, Tarek A; Takano-Yamamoto, Teruko; Yamashiro, Takashi

    2016-06-01

    Vertical dentoalveolar discrepancies are a common problem in orthodontic patients but are often difficult to treat with traditional mechanics. This case report illustrates the successful treatment of overerupted mandibular incisors via the indirect use of miniscrew anchorage. A woman (age, 22 years 9 months) had chief complaints of maxillary incisor protrusion and crooked teeth. An excessive curve of Spee caused by elongation of the mandibular incisors was also found. The patient was diagnosed with a severe Class II Division 1 malocclusion and a deep overbite. After extraction of the mandibular first premolars and the subsequent leveling phase, the elongated incisors were intruded with a novel method, which involved the combined use of sectional archwires and miniscrews placed in the premolar areas. After the procedure, the mandibular incisors had been intruded by 6.5 mm with no undesirable side effects. The total active treatment period was 42 months. The resultant occlusion and satisfactory facial profile were maintained after 30 months of retention. Our novel intrusion approach shows potential for correcting a deep overbite. © EDP Sciences, SFODF, 2016.

  19. Early treatment of anterior open bite: Comparison of the vertical and horizontal morphological changes induced by magnetic bite-blocks and adjusted rapid molar intruders.

    Science.gov (United States)

    Albogha, Mhd Hassan; Takahashi, Ichiro; Sawan, Mhd Naser

    2015-01-01

    This prospective clinical study aims to determine the differences between two treatment modalities for anterior open bite in growing patients. The treatment modalities involved the use of magnetic bite-blocks (MBBs) or rapid molar intruders (RMIs) applied with posterior bite-blocks. Fifteen consecutive patients with a mean age of 11.2 (standard deviation [SD] = 1.6) years and a mean open bite of -3.9 mm were treated with MBBs. Another 15 consecutive patients with a mean age of 10.9 (SD = 1.8) years and a mean open bite of -3.8 mm were treated with RMIs applied on bite-blocks. Cephalometric radiographs were obtained before (T1) and immediately after appliance removal (T2). The treatments lasted four months, during which the appliances were cemented to the teeth. The morphological changes were measured in each group and compared using logistic regression analysis. The MBB group exhibited significantly greater decreases in SNA angle, ANB angle, overjet, and maxillary incisor angle (p open bites and maxillary incisor protrusions.

  20. 2016 Survey of State-Level Health Resources for Men and Boys: Identification of an Inadvertent and Remediable Service and Health Disparity.

    Science.gov (United States)

    Fadich, Ana; Llamas, Ramon P; Giorgianni, Salvatore; Stephenson, Colin; Nwaiwu, Chimezie

    2018-03-01

    This survey evaluated resources available to men and boys at the state level including state public health departments (SPHDs), other state agencies, and governor's offices. Most of the resources and programs are found in the SPHDs and these administer state-initiated and federally funded health programs to provide services and protection to a broad range of populations; however, many men's health advocates believe that SPHDs have failed to create equivalent services for men and boys, inadvertently creating a health disparity. Men's Health Network conducts a survey of state resources, including those found in SPHDs, every 2 years to identify resources available for men and women, determine the extent of any disparity, and establish a relationship with SPHD officials. Data were obtained from all 50 states and Washington, D.C. An analysis of the 2016 survey data indicates that there are few resources allocated and a lack of readily available information on health and preventive care created specifically for men and boys. The data observed that most health information intended for men and boys was scarce among states or oftentimes included on websites that primarily focused on women's health. A potential result of this is a loss of engagement with appropriate health-care providers due to a lack of information. This study continues to validate the disparity between health outcomes for women and men. It continues to highlight the need for better resource allocation, outreach, and health programs specifically tailored to men and boys in order to improve overall community well-being.

  1. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1992-05-01

    This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicitly displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information

  2. A Technique to Salvage Big-Bubble Deep Anterior Lamellar Keratoplasty after Inadvertent Full-Thickness Trephination

    Directory of Open Access Journals (Sweden)

    Siamak Zarei-Ghanavati

    2011-01-01

    Full Text Available Herein we describe a technique for management of large inadvertent full-thickness trephination during deep anterior lamellar keratoplasty using the big-bubble technique without converting to penetrating keratoplasty. First, the anterior chamber is formed with an ophthalmic viscosurgical device (OVD. Then, the full-thickness wound is secured with one X-type 10-0 nylon suture. A 27-gauge needle is attached to a 2 ml air-filled syringe and inserted into the corneal stroma in the meridian opposite to the site of full-thickness trephination. Air is gently injected to produce a limited area of "big-bubble" detaching Descemet′s membrane (DM from the corneal stroma. The "big bubble" is slowly expanded with injection of OVD. Finally, the recipient stroma is removed, the donor lenticule is placed and the DM tear is secured with one full thickness 10-0 nylon suture.

  3. Fully automated radiochemical preparation system for gamma-spectroscopy on fission products and the study of the intruder and vibrational levels in 83Se

    International Nuclear Information System (INIS)

    Lien, O.G. III.

    1983-10-01

    AUTOBATCH was developed to provide a usable source of short-lived neutron-rich nuclides through chemical preparation of the sample from fission products for detailed gamma-ray spectroscopy, which would complement the output of on-line isotope separators. With AUTOBATCH the gamma rays following the β - decay of 83 As were studied to determine the ground state spin and parity of 83 As to be 5/2 - ; the absolute intensity of the β - branch from 83 As to 83 Se/sup m/ to be 0.3%; the absolute intensity of the ground state β - branch from 83 Se/sup m/ to 83 Br to be 39%; the halflife of the 5/2 1 + level to be 3.2 ns; and the structure of 83 Se 49 . Results are used to show that the intruder structure which had been previously observed in the odd mass 49 In isotopes could be observed in the N = 49 isotones. The observed structure is discussed in terms of the unified model calculations of Heyde which has been used to describe the intruder structure in the indium nuclei. The intruder structure is most strongly developed, not at core mid-shell, 89 Zr 49 , but rather at core mid-sub-shell 83 Se. This difference is qualitatively understood to be due to the blocking of collectivity by the Z = 40 subshell closure which prevents the intruder structure from occurring in 87 Sr 49 and 89 Zr 49

  4. Infraclavicular brachial plexus block for the management of inadvertent intraarterial drug administration after arterial insertion of a venous cannula during ultrasound-guided venous cannulation.

    Science.gov (United States)

    Leo, Anne-Marie; Mislovic, Branislav

    2014-09-15

    This case report documents the inadvertent placement of an arterial cannula despite using realtime ultrasound to insert a peripheral venous cannula in a child with difficult venous access. The resultant limb ischemia was treated with an infraclavicular ultrasound-guided brachial plexus block as sympatholytic treatment.

  5. Facing the crowd: intruder pressure, within-group competition, and the resolution of conflicts over group-membership

    Science.gov (United States)

    Port, Markus; Johnstone, Rufus A

    2013-01-01

    Recent theory in social evolution has been mainly concerned with competition and cooperation within social groups of animals and their impact on the stability of those groups. Much less attention has been paid to conflicts arising as a result of solitary floaters (outsiders) attempting to join groups of established residents (insiders). We model such conflicts over group-membership using a demographically explicit approach in which the rates of births and deaths in a population determine the availability of group-vacancies and the number of floaters competing over these vacancies. We find that the outcome of within-group competition, reflected in the partitioning of reproduction among group members, exerts surprisingly little influence on the resolution of insider-outsider conflict. The outcome of such conflict is also largely unaffected by differences in resource holding potential between insiders and outsiders. By contrast, whether or not groups form is mainly determined by demographic factors (variation in vital rates such as fecundity and mortality) and the resulting population dynamics. In particular, at high floater densities territory defense becomes too costly, and groups form because insiders give in to the intruder pressure imposed on them by outsiders. We emphasize the importance of insider-outsider conflicts in social evolution theory and highlight avenues for future research. PMID:23762508

  6. Formation of tectonic peperites from alkaline magmas intruded into wet sediments in the Beiya area, western Yunnan, China

    Science.gov (United States)

    Xu, Xing-Wang; Cai, Xin-Ping; Zhong, Jia-You; Song, Bao-Chang; Peters, Stephen G.

    2007-01-01

    Tertiary (3.78 Ma to 3.65 Ma) biotite-K-feldspar porphyritic bodies intrude Tertiary, poorly consolidated lacustrine sedimentary rocks in the Beiya mineral district in southwestern China. The intrusives are characterized by a microcrystalline and vitreous-cryptocrystalline groundmass, by replacement of some tabular K-feldspar phenocrysts with microcrystalline chlorite and calcite, and by Fe-rich rings surrounding biotite phenocrysts. Peculiar structures, such as contemporary contact faults and slickensides, ductile shear zones and flow folds, foliation and lineations, tension fractures, and banded and boudin peperites, are developed along the contact zones of the intrusives. These features are related to the forceful intrusion of the alkaline magmas into the wet Tertiary sediments. The partially consolidated magmas were deformed and flattened by continued forceful magma intrusion that produced boudinaged and banded peperites. These peperites characterized by containing oriented deformation fabrics are classified as tectonic peperites as a new type of peperite, and formation of these tectonic peperites was related to fracturing of magmas caused by forceful intrusion and shear deformation and to contemporary migration and injection of fluidized sediments along fractures that dismembered the porphyritic magma. Emplacement of the magma into the wet sediments in the Beiya area is interpreted to be related to a large pressure difference rather than to the buoyancy force.

  7. Coupling Effect of Intruding Water and Inherent Gas on Coal Strength Based on the Improved (Mohr-Coulomb Failure Criterion

    Directory of Open Access Journals (Sweden)

    Yiyu Lu

    2016-11-01

    Full Text Available When employing hydraulic processes to increase gas drainage efficiency in underground coal mines, coal seams become a three-phase medium, containing water intruding into the coal pores with the inherent occurrence of gas. This can change the stress state of the coal and cause instability. This work studied the mechanical properties of coal containing water and gas and derived an appropriate failure criterion. Based on mixture theory of unsaturated porous media, the effective stress of coal, considering the interaction of water and gas, was analyzed, and the failure criterion established by combining this with the Mohr–Coulomb criterion. By introducing the stress factor of matrix suction and using fitted curves of experimentally determined matrix suction and moisture content, the relationships between coal strength, gas pressure, and moisture content were determined. To verify the established strength theory, a series of triaxial compression strength tests of coal containing water and gas were carried out on samples taken from the Songzao, Pingdingshan, and Tashan mines in China. The experimental results correlated well with the theoretical predictions. The results showed a linear decrease in the peak strength of coal with increasing gas pressure and an exponential reduction in peak strength with increasing moisture content. The strength theory of coal containing water and gas can become an important part of multiphase medium damage theory.

  8. Inadvertent Splenectomy During Resection for Colorectal Cancer Does Not Increase Long-term Mortality in a Propensity Score Model: A Nationwide Cohort Study.

    Science.gov (United States)

    Lolle, Ida; Pommergaard, Hans-Christian; Schefte, David F; Bulut, Orhan; Krarup, Peter-Martin; Rosenstock, Steffen J

    2016-12-01

    Previous studies suggest that long-term mortality is increased in patients who undergo splenectomy during surgery for colorectal cancer. The reason for this association remains unclear. The purpose of this study was to investigate the association between inadvertent splenectomy attributed to iatrogenic lesion to the spleen during colorectal cancer resections and long-term mortality in a national cohort of unselected patients. This was a retrospective, nationwide cohort study. Data were collected from the database of the Danish Colorectal Cancer Group and merged with data from the National Patient Registry and the National Pathology Databank. Danish patients with colorectal cancer undergoing curatively intended resection between 2001 and 2011 were included in the study. The primary outcome was long-term mortality for patients surviving 30 days after surgery. Secondary outcomes were 30-day mortality and risk factors for inadvertent splenectomy. Multivariable and propensity-score matched Cox regression analyses were used to adjust for potential confounding. In total, 23,727 patients were included, of which 277 (1.2%) underwent inadvertent splenectomy. There was no association between inadvertent splenectomy and long-term mortality (adjusted HR = 1.15 (95% CI, 0.95-1.40); p = 0.16) in the propensity score-matched model, whereas 30-day mortality was significantly increased (adjusted HR = 2.31 (95% CI, 1.71-3.11); p splenectomy was most often seen during left hemicolectomy (left hemicolectomy vs right hemicolectomy: OR = 24.76 (95% CI, 15.30-40.06); p splenectomy during resection for colorectal cancer does not seem to increase long-term mortality. The previously reported reduced overall survival after inadvertent splenectomy may be explained by excess mortality in the immediate postoperative period.

  9. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock -revision 1

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1996-04-01

    Canada has conducted an extensive research program on a concept of safe disposal of nuclear fuel wastes deep In plutonic rock of the Canadian Shield. An essential goal of this program has been to develop and demonstrate a methodology to evaluate the performance of the facility against safety criteria established by Canada's regulatory agency, the Atomic Energy Control Board. These criteria are expressed in terms of risk, where risk is defined as the sum, over all significant scenarios, of the product of the probability of the scenario, the magnitude of the resultant dose, and the probability of a health effect per unit dose. This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicity displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information. (author). 53 refs., 8 tabs., 2 figs

  10. Wellbore enlargement investigation: Potential analogs to the Waste Isolation Pilot Plant during inadvertent intrusion of the repository

    International Nuclear Information System (INIS)

    Boak, D.M.; Dotson, L.; Aguilar, R.

    1997-01-01

    This study involved the evaluation and documentation of cases in which petroleum wellbores were enlarged beyond the nominal hole diameter as a consequence of erosion during exploratory drilling, particularly as a function of gas flow into the wellbore during blowout conditions. A primary objective was to identify analogs to potential wellbore enlargement at the Waste Isolation Pilot Plant (WIPP) during inadvertent human intrusion. Secondary objectives were to identify drilling scenarios associated with enlargement, determine the physical extent of enlargement, and establish the physical properties of the formation in which the enlargement occurred. No analogs of sufficient quality to establish quantitative limits on wellbore enlargement at the WIPP disposal system were identified. However, some information was obtained regarding the frequency of petroleum well blowouts and the likelihood that such blowouts would bridge downhole, self-limiting the surface release of disposal-system material. Further work would be necessary, however, to determine the conditions under which bridging could occur and the extent to which the bridging might be applicable to WIPP. In addition, data on casing sizes of petroleum boreholes in the WIPP vicinity support the use of a 12-1/4 inch borehole size in WIPP performance assessment calculations. Finally, although data are limited, there was no evidence of significant wellbore enlargement in any of three blowouts that occur-red in wellbores in the Delaware Basin (South Culebra Bluff Unit No. 1, Energy Research and Development Administration (ERDA) 6, and WIPP 12)

  11. Evidence utilisation project: Management of inadvertent perioperative hypothermia. The challenges of implementing best practice recommendations in the perioperative environment.

    Science.gov (United States)

    Munday, Judy; Hines, Sonia Jane; Chang, Anne M

    2013-12-01

    The prevention of inadvertent perioperative hypothermia (IPH) remains an important issue in perioperative healthcare. The aims of this project were to: (i) assess current clinical practice in the management of IPH and (ii) promote best practice in the management of IPH in adult operating theatres. This project from August 2010 to March 2012 utilised a system of audit and feedback to implement best practice recommendations. Data were collected via chart audits against criteria developed from best practice recommendations for managing IPH. Evidence-based best practices, such as consistent temperature monitoring and patient warming, were implemented using multifaceted interventions. Perioperative records for 73 patients (baseline) and 72 patients (post-implementation) were audited. Post-implementation audit showed an increase in patients with temperatures >36°C admitted to the post-anaesthetic care unit (PACU) (8%) and discharged from PACU (28%). The percentage of patients receiving preoperative temperature monitoring increased (38%); however, low levels of intraoperative monitoring remained (31% of patients with surgery of 30 min or longer duration). Small increases were found in patient warming of 5% intraoperatively and 8% postoperatively. Preoperative warming was not successfully implemented during this phase of the project. Temperature monitoring, warming and rates of normothermia improved; however, barriers to best practice of IPH management were experienced, which negatively impacted on the project. Further stages of implementation and audit were added to further address IPH management in this department. © 2013 The Authors. International Journal of Evidence-Based Healthcare © 2013 The Joanna Briggs Institute.

  12. Inadvertent chest tube insertion in congenital cystic adenomatoid malformation and congenital lobar emphysema-highlighting an important problem

    International Nuclear Information System (INIS)

    Prabhu, Shailesh M; Choudhury, Subhasis Roy; Solanki, Ravi S; Shetty, Gurucharan S; Agarwala, Surenderkumar

    2013-01-01

    Chest tube insertion in congenital cystic lung lesions is an important problem in children with acute respiratory distress having a cystic lucent lesion on chest radiograph. To evaluate the imaging findings and complications in cases of congenital cystic lung lesions with chest tube insertion and suggest the role of appropriate imaging for management of these patients. Chest radiographs and CT scans of children with congenital cystic lung lesions who had inadvertent chest tube insertion preoperatively were retrospectively reviewed for imaging appearances and complications. Fifteen patients comprising 10 cases of congenital cystic adenomatoid malformation (CCAM) and 5 cases of congenital lobar emphysema (CLE) were included. Majority of the cases were infants. CCAM was misdiagnosed as complicated pneumatocele (n = 5) and pneumothorax (n = 5), while CLE was misdiagnosed as tension pneumothorax (n = 5) on the chest radiograph findings. Final diagnosis was made on CT and operative findings with histopathology. Complications noted were pneumothorax, hydropneumothorax, and infection in cases of CCAM, and change in imaging appearance and pneumothorax in cases of CLE. Chest tube insertion in congenital cystic lesions increases the rate of associated complications. Chest CT has a definite role in early diagnosis and deciding appropriate management in these cases

  13. Inadvertent propagation of factor VII deficiency in a canine mucopolysaccharidosis type I research breeding colony.

    Science.gov (United States)

    Carlstrom, Lucas P; Jens, Jackie K; Dobyns, Marley E; Passage, Merry; Dickson, Patricia I; Ellinwood, N Matthew

    2009-08-01

    Issues of cost and genetics can result in inbreeding of canine genetic disease colonies. Beagles often are used to maintain such colonies, providing stock for outcrosses. Factor VII (FVII) deficiency is a hemostatic disorder found at increased frequency in beagles and has been characterized at the DNA level. Deficiency of FVII presents obstacles in colonies founded with beagles. An initial finding of a FVII-deficient pup from a longstanding colony prompted us to evaluate FVII deficiency fully in this colony. Current and archival records and tissues were used to reconstruct the colony pedigree, assess the contribution from beagles, and test samples to document the source and frequency of the mutant FVII allele. As part of this study we developed a PCR-based diagnostic assay that was simpler than what was previously available. Pedigree analysis revealed a founder effect implicating beagles that led to high frequency (55%) of the mutant allele. In addition, affected animals were identified. The complete picture of the clinical effect within the colony remains unclear, but unusual neonatal presentations, including hemoabdomen, have occurred in pups affected with FVII deficiency. Use of a PCR-based diagnostic assay to screen all potential beagle breeding stock will prevent similar occurrences of FVII deficiency in future canine research colonies.

  14. Aids : A Rampant Intruder

    Directory of Open Access Journals (Sweden)

    Suresh Chandra

    2004-12-01

    Full Text Available The HIV/AIDS epidemic represents the most serious public health problem in India. There is no denial of the enormity of the problem. The prevalence of infection in all parts of the world highlights the spread from urban to rural areas and from high risk to general population. It is esti­mated that as on end of year 2004, 39.4 million people were infected with the virus. Migration of labour, low lit­eracy levels leading to low awareness, gender disparities, prevalence of sexually transmitted diseases and reproduc­tive tract infections are some of the factors attributed to the spread of HIV/AIDS.4.9 million ( 4.3 million - 6.4 million people have aquired HIV infection only in one year of span - 2004. The global AIDS epidemic killed 3.1 million ( 2,8 million- 3.5 million people in the past year.

  15. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: The ONSITE/MAXI1 computer program

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.; Neuder, S.M.

    1987-02-01

    This document summarizes initial efforts to develop human-intrusion scenarios and a modified version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. Supplement 1 of NUREG/CR-3620 (1986) summarized modifications and improvements to the ONSITE/MAXI1 software package. This document summarizes a modified version of the ONSITE/MAXI1 computer program. This modified version of the computer program operates on a personal computer and permits the user to optionally select radiation dose conversion factors published by the International Commission on Radiological Protection (ICRP) in their Publication No. 30 (ICRP 1979-1982) in place of those published by the ICRP in their Publication No. 2 (ICRP 1959) (as implemented in the previous versions of the ONSITE/MAXI1 computer program). The pathway-to-human models used in the computer program have not been changed from those described previously. Computer listings of the ONSITE/MAXI1 computer program and supporting data bases are included in the appendices of this document

  16. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: The ONSITE/MAXI1 computer program

    Energy Technology Data Exchange (ETDEWEB)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.; Neuder, S.M.

    1987-02-01

    This document summarizes initial efforts to develop human-intrusion scenarios and a modified version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. Supplement 1 of NUREG/CR-3620 (1986) summarized modifications and improvements to the ONSITE/MAXI1 software package. This document summarizes a modified version of the ONSITE/MAXI1 computer program. This modified version of the computer program operates on a personal computer and permits the user to optionally select radiation dose conversion factors published by the International Commission on Radiological Protection (ICRP) in their Publication No. 30 (ICRP 1979-1982) in place of those published by the ICRP in their Publication No. 2 (ICRP 1959) (as implemented in the previous versions of the ONSITE/MAXI1 computer program). The pathway-to-human models used in the computer program have not been changed from those described previously. Computer listings of the ONSITE/MAXI1 computer program and supporting data bases are included in the appendices of this document.

  17. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: the ONSITE/MAXI1 computer program

    International Nuclear Information System (INIS)

    Napier, B.A.; Peloquin, R.A.; Kennedy, W.E. Jr.; Neuder, S.M.

    1984-10-01

    Because of uncertainties associated with assessing the potential risks from onsite burials of radioactive waste, the US Nuclear Regulatory Commission (NRC) has amended its regulations to provide greater assurance that buried radioactive material will not present a hazard to public health and safety. The amended regulations now require licensees to apply for approval of proposed procedures for onsite disposal pursuant to 10 CFR 20.302. The NRC technically reviews these requests on a case-by-case basis. These technical reviews require modeling potential pathways to man and projecting radiation dose commitments. This document contains a summary of our efforts to develop human-intrusion scenarios and to modify a version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. The documentation of the ONSITE/MAXI computer program is written for two audiences. The first (Audience A) includes persons concerned with the mathematical models and computer algorithms. The second (Audience B) includes persons concerned with exercising the computer program and scenarios for specific onsite disposal applications. Five sample problems are presented and discussed to assist the user in operating the computer program. Summaries of the input and output for the sample problems are included along with a discussion of the hand calculations performed to verify the correct operation of the computer program. Computer listings of the ONSITE/MAXI1 computer program with an abbreviated data base listing are included as Appendix 1 to this document. Finally, complete listings of the data base with listings of the special codes used to create the data base are included in Appendix 2 as a microfiche attachment to this document

  18. Special Analysis for Disposal of High-Concentration I-129 Waste in the Intermediate-Level Vaults at the E-Area Low-Level Waste Facility

    Energy Technology Data Exchange (ETDEWEB)

    Collard, L.B.

    2003-02-14

    This Special Analysis (SA) addresses disposal of high-concentration I-129 wastes in the Intermediate Level (IL) Vaults at the Savannah River Site E-Area Low-Level Waste Facility. This SA addresses both the existing activated carbon vessels already placed in the IL Vault and any type of future waste that contains a high concentration of I-129. An equation is developed that relates a wasteform's vault inventory limit of I-129 to the wasteform's measured Kd. This SA was prepared to meet the requirements of the U.S. Department of Energy Order 435.1 (DOE 1999a). The order specifies that a performance assessment or SA should provide reasonable assurance that a low-level waste disposal facility will comply with the performance objectives of the Order. In addition to the performance objectives, the Order requires, for purposes of establishing limits on the concentration of radionuclides that may be disposed of near-surface, an assessment of impacts on water resources and on hypothetical persons assumed to inadvertently intrude for a temporary period into the low-level waste disposal facility.

  19. Simultaneous spectroscopy of $\\gamma$- rays and conversion electrons: Systematic study of EO transitions and intruder states in close vicinity of mid-shell point in odd-Au isotopes

    CERN Multimedia

    Venhart, M; Grant, A F; Petrik, K

    This proposal focuses on detailed systematic studies of the $\\beta$ /EC-decays of $^{179,181,183,185}$Hg leading to excited states in the neutron-deficient Au isotopes in the vicinity of the N=104 midshell. $\\gamma$-ray, X-ray and conversion electron de-excitations of odd-A Au isotopes will be studied simultaneously. These studies will address important structural questions such as the excitation energies of coexisting states, properties of multiple intruder states (i.e. intruder particles coupled to intruder cores) and mixing of coexisting structures. The unique combination of Hg beam purity and yields make ISOLDE a unique facility for these experiments.

  20. Can direct immunofluorescence testing still be accurate if performed on biopsy specimens after brief inadvertent immersion in formalin?

    Science.gov (United States)

    Arbesman, Joshua; Grover, Raminder; Helm, Thomas N; Beutner, Ernst H

    2011-07-01

    Direct immunofluorescence is useful in the diagnosis of autoimmune, vesiculobullous, and connective tissue diseases. Michel medium is typically indicated for transport, but clinicians may inadvertently place samples into formalin. We set out to determine the amount of time that specimens can remain in 10% buffered formalin and still retain their diagnostic properties. Biopsy samples were examined from cases with established diagnoses of bullous pemphigoid (n = 12), dermatitis herpetiformis (n = 6), and pemphigus vulgaris (n = 6) and exposed to formalin for time points ranging from 2 minutes to 4 hours. We found that immunoreactants were detectable in the majority of samples when subjected to 2 minutes of formalin exposure. Dermatitis herpetiformis and pemphigoid samples retained immunogenicity for 10 minutes, whereas pemphigus showed reduced immunogenicity for all samples studied. A nonimmunologic nuclear fluorochroming pattern was noted in some of the specimens after formalin immersion. Sample size, only examining 3 disease processes, and samples already having been in Michel medium were the major limitations in the study. In direct immunofluorescence studies, formalin exposure to biopsy specimens causes two types of artifactual changes: (1) the shortest exposure (2 minutes) causes complete loss of diagnostic markers of pemphigus; and (2) prolonged exposure changes tissue to a form that allows fluorescein-labeled antibodies to give fluorochroming reactions of nuclei (which can be mistaken for in vivo antinuclear antibody reactions of lupus erythematosus). After time intervals of 10 minutes to 2 hours, direct immunofluorescence studies of proven cases of bullous pemphigoid and dermatitis herpetiformis retained variable levels of specific reactivity. Copyright © 2010 American Academy of Dermatology, Inc. Published by Mosby, Inc. All rights reserved.

  1. Characterization of LP-MOCVD grown (Al, Ga)As/GaAs heterostructures by photoluminescence - Single heterojunction and inadvertent quantum wells

    Science.gov (United States)

    Zemon, S.; Norris, P.; Lee, J.; Lambert, G.; Black, J.

    1984-12-01

    Photoluminescence (PL) was used to detect rapid alloy compositional fluctuations which were found in (Al, Ga)As/GaAs heterostructures grown by low-pressure metal-organic chemical vapor deposition (LP-MOCVD). PL data are employed to estimate the thickness and aluminum composition of the resulting inadvertent quantum well. A way to eliminate these artifacts was found. Using the improved growth procedures, modulation-doped heterostructures showing two-dimensional electron-gas behavior were then achieved.

  2. A common-sense probabilistic approach to assessing inadvertent human intrusion into low-level radioactive waste at the Nevada Test Site

    International Nuclear Information System (INIS)

    Black, P.; Hooten, M.; Black, K.; Moore, B.; Rawlinson, S.; Barker, L.

    1997-01-01

    Each site disposing of low-level radioactive waste is required to prepare and maintain a site-specific performance assessment (1) to determine potential risks posed by waste management systems to the public, and the environment, and (2) to compare these risks to established performance objectives. The DOE Nevada Operations Office, Waste Management Program recently completed a one-year study of site-specific scenarios for inadvertent human intrusion by drilling into buried low-level radioactive waste sites, as part of ongoing performance assessment studies. Intrusion scenarios focus on possible penetration of buried waste through drilling for sources of groundwater. The probability of drilling penetration into waste was judged to be driven primarily by two settlement scenarios: (1) scattered individual homesteaders, and (2) a community scenario consisting of a cluster of settlers that share drilling and distribution systems for groundwater. Management control factors include institutional control, site knowledge, placards and markers, surface barriers, and subsurface barriers. The Subject Matter Experts concluded that institutional control and site knowledge may be important factors for the first few centuries, but are not significant over the evaluation period of 10,000 years. Surface barriers can be designed that would deter the siting of a drill rig over the waste site to an effectiveness of 95%. Subsurface barriers and placards and markers will not as effectively prevent inadvertent human intrusion. Homestead and community scenarios were considered by the panel to render a site-specific probability of around 10% for inadvertent human intrusion. If management controls are designed and implemented effectively, then the probability of inadvertent human intrusion can be reduced to less than 1%

  3. Adherence to a Gluten-Free Diet in Mexican Subjects with Gluten-Related Disorders: A High Prevalence of Inadvertent Gluten Intake.

    Science.gov (United States)

    Ramírez-Cervantes, Karen Lizzette; Romero-López, Angélica Viridiana; Núñez-Álvarez, Carlos Alberto; Uscanga-Domínguez, Luis F

    2016-01-01

    The rate of compliance with a gluten-free diet in patients with gluten-related disorders is unknown in most Latin American countries. To study the adherence to a gluten-free diet of Mexican individuals with celiac disease and nonceliac gluten sensitivity at the time of their first medical and nutritional consultation at a tertiary referral center. A cross-sectional study was performed. A specific questionnaire was used to gather information on demographics, clinical condition, and self-reported adherence to a gluten-free diet, and to determine strict compliance and intentional or inadvertent gluten consumption. All questionnaires were applied by a nutritionist with expertise in gluten-related disorders. Fifty-six patients with celiac disease and 24 with non-celiac gluten sensitivity were included. Overall, 46 (57.5%) subjects perceived themselves as strictly adherent; however, inadvertent gluten intake was frequent in both celiac disease and non-celiac gluten sensitivity patients (39.2 vs. 33.3%; p = 0.2). Intentional consumption was more prevalent in subjects with celiac disease (48.8 vs. 29.1%; p = 0.048) and individuals with non-celiac gluten sensitivity showed better adherence (37.5 vs. 12.5%; p = 0.035). The importance of a gluten-free diet is underestimated by Mexican patients with celiac disease. The role of a team with expertise in gluten-related disorders is essential to identify inadvertent gluten intake.

  4. Further evidence for the role of nitric oxide in maternal aggression: effects of L-NAME on maternal aggression towards female intruders in Wistar rats.

    Science.gov (United States)

    Ankarali, S; Ankarali, H C; Marangoz, C

    2009-01-01

    It has been shown that nitric oxide (NO) increases aggression in male mice, whereas it decreases aggression in lactating female mice and prairie voles. It is also known that aggression can be exhibited at different levels in rodent species, strain or subtypes. The aims of this study were to investigate the proportion of aggressiveness in Wistar rats, the effect of intraperitoneally administered nonspecific nitric oxide synthase (NOS) inhibitor L-NAME (NG-nitro L-arginine methyl ester) on maternal aggression towards female intruders, and whether these effects are due to NO production or not. Rats were given saline intraperitoneally on the postpartum Day 2 and aggression levels were recorded. The same rats were given 60 mg/kg L-NAME or D-NAME (NG-nitro D-arginine methyl ester) on the postpartum Day 3 and their effects on aggression levels were compared to saline. While L-NAME administration did not cause any differences in the total number of aggressive behavior, aggression duration and aggression intensity, it reduced the proportion of animals showing aggressive behavior. In addition, the latency of the first aggression was significantly increased by L-NAME. In the D-NAME group, however, no significant change was found. Our results have shown that L-NAME reduces maternal aggression towards female intruders in Wistar rats through inhibition of NO production. These results suggest that the role of NO in offensive and defensive maternal aggression shares neural mechanisms.

  5. Special Analysis: 2004 General Revision of Slit and Engineered Trench Limits

    Energy Technology Data Exchange (ETDEWEB)

    COLLARD, LEONARDB.

    2004-06-14

    This Special Analysis revises the Slit Trench and Engineered Trench inventory limits. Changes have been made in the methods of analyses and in the implementation of those methods. General changes applicable to multiple pathways/scenarios are discussed in this section, while changes specific to individual pathways/scenarios are discussed in their applicable sections. This report provides limits for each nuclide for each pathway/scenario in a single table to help implement the approach introduced in the ''timed sum-of-fractions'' report. The pathways/scenarios include the following: (1) Groundwater; (2) Inadvertent Intruder; (3) Air; (4) Radon. In the timed sum-of-fractions report, the time intervals were selected to be 0-100 years, 100-1000 years, and 1000-10,000 years. The time intervals for this report were refined to 0-12 years, 12-100 years, and 100-1000 years to account for the separation of the tritium groundwater peak from those of other radionuclides. This report includes nuclides not previously included in the process analysis. Some of these nuclides are included because they have been disposed in Slit or Engineered Trenches and the latest screening analysis indicates that they survived the screening process. Other nuclides are only included because they survived the screening process and they have been disposed in other disposal units. Inventory limits for Slit Trenches and Engineered Trenches were recalculated while imposing a multitude of changes. The most important changes both tended to increase limits, such as changing the time of compliance from 10,000 years to 1000 years and tended to decrease limits, such as modifying the aquifer source node selection. The net effect for the groundwater pathway reduced some limits for nuclides that dominate the sum-of-fractions.

  6. Pregnancy outcome after 1st-trimester inadvertent exposure to barium sulphate as a contrast media for upper gastrointestinal tract radiography.

    Science.gov (United States)

    Han, B H; Lee, K S; Han, J Y; Choi, J S; Ahn, H K; Ryu, H M; Yang, J H; Han, H W; Nava-Ocampo, A A

    2011-10-01

    Despite barium being used as a contrast media for decades, the specific assessment of its safety in pregnant women is scarce. We are reporting the favourable pregnancy outcome in women who were inadvertently exposed to barium swallow and associated ionising radiation, early in pregnancy. A control group of age- and gravidity-matched unexposed pregnant women was also included. There were 32 live-born babies in the exposed group and 94 in the control group. Women had undergone diagnostic upper gastrointestinal tract (UGT) fluoroscopic examination at 3.3 ± 1.5 weeks' gestation. Estimated maternal radiation dose secondary to barium swallow varied widely, the maximum dose was estimated to be 2.45 mSv. Similar pregnancy outcomes were observed between the groups. The number of babies born with major malformations was not significantly different (p = 1.0) between cases and controls: one (3.1%) vs three (3.2%), respectively. In conclusion, our small prospective cohort study of women suggests no association between inadvertent exposure to ionising radiation and barium sulphate during fluoroscopic barium swallow and adverse fetal outcomes.

  7. Stepping in Place While Voluntarily Turning Around Produces a Long-Lasting Posteffect Consisting in Inadvertent Turning While Stepping Eyes Closed

    Directory of Open Access Journals (Sweden)

    Stefania Sozzi

    2016-01-01

    Full Text Available Training subjects to step in place on a rotating platform while maintaining a fixed body orientation in space produces a posteffect consisting in inadvertent turning around while stepping in place eyes closed (podokinetic after-rotation, PKAR. We tested the hypothesis that voluntary turning around while stepping in place also produces a posteffect similar to PKAR. Sixteen subjects performed 12 min of voluntary turning while stepping around their vertical axis eyes closed and 12 min of stepping in place eyes open on the center of a platform rotating at 60°/s (pretests. Then, subjects continued stepping in place eyes closed for at least 10 min (posteffect. We recorded the positions of markers fixed to head, shoulder, and feet. The posteffect of voluntary turning shared all features of PKAR. Time decay of angular velocity, stepping cadence, head acceleration, and ratio of angular velocity after to angular velocity before were similar between both protocols. Both postrotations took place inadvertently. The posteffects are possibly dependent on the repeated voluntary contraction of leg and foot intrarotating pelvic muscles that rotate the trunk over the stance foot, a synergy common to both protocols. We propose that stepping in place and voluntary turning can be a scheme ancillary to the rotating platform for training body segment coordination in patients with impairment of turning synergies of various origin.

  8. Negative-parity intruder states of the neutron-rich N=20, Z=14-16 isotones: a 1{Dirac_h}{omega} shell model description

    Energy Technology Data Exchange (ETDEWEB)

    Bouhelal, M. [Universite de Strasbourg, IPHC, CNRS/IN2P3, Strasbourg (France); Universite de Batna, Departement de Physique, Faculte des Sciences, Batna (Algeria); Haas, F.; Caurier, E.; Nowacki, F. [Universite de Strasbourg, IPHC, CNRS/IN2P3, Strasbourg (France); Bouldjedri, A. [Universite de Batna, Departement de Physique, Faculte des Sciences, Batna (Algeria)

    2009-12-15

    In order to get a consistent shell model description of the negative-parity states throughout the sd shell a new interaction (PSDPFB) has been developed. It was derived in the full p-sd-pf model space and is built on existing interactions for the major shells with adjustments of the cross-shell monopoles. The calculated energy spectra for these 1{Dirac_h}{omega} intruder states are compared to experiment for the N=20 neutron-rich isotones {sup 34}Si, {sup 35}P and {sup 36}S. A systematics for the multiplet configuration {nu}(d{sub 3/2}{sup -1}f{sub 7/2}{sup 1}) in even-even isotones from {sup 34}Si to {sup 40}Ca is also presented. (orig.)

  9. Study for on-line system to identify inadvertent control rod drops in PWR reactors using ex-core detector and thermocouple measures

    Energy Technology Data Exchange (ETDEWEB)

    Souza, Thiago J.; Medeiros, Jose A.C.C.; Goncalves, Alessandro C., E-mail: tsouza@nuclear.ufrj.br, E-mail: canedo@lmp.ufrj.br, E-mail: alessandro@nuclear.ufrj.br [Coordenacao dos Programas de Pos-Graduacao em Engenharia (COPPE/UFRJ), Rio de Janeiro, RJ (Brazil). Programa de Engenharia Nuclear

    2015-07-01

    Accidental control rod drops event in PWR reactors leads to an unsafe operating condition. It is important to quickly identify the rod to minimize undesirable effects in such a scenario. In this event, there is a distortion in the power distribution and temperature in the reactor core. The goal of this study is to develop an on-line model to identify the inadvertent control rod dropped in PWR reactor. The proposed model is based on physical correlations and pattern recognition of ex-core detector responses and thermocouples measures. The results of the study demonstrated the feasibility of an on-line system, contributing to safer operation conditions and preventing undesirable effects, as its shutdown. (author)

  10. The use of protective barriers to deter inadvertent human intrusion into a mined geologic facility for the disposal of radioactive waste: A review of previous investigations and potential concepts

    International Nuclear Information System (INIS)

    Tolan, T.L.

    1993-06-01

    Sandia National Laboratories is evaluating the feasibility of developing protective barrier system for the Waste Isolation Pilot Plant (WIPP) to thwart inadvertent human intrusion into this radioactive-waste disposal system for a period of 9,900 years after assumed loss of active institutional controls. The protective barrier system would be part of a series of enduring passive institutional controls whose long-term function will be to reduce the likelihood of inadvertent human activities (e.g., exploratory drilling for resources) that could disrupt the WIPP disposal system

  11. The use of protective barriers to deter inadvertent human intrusion into a mined geologic facility for the disposal of radioactive waste: A review of previous investigations and potential concepts

    Energy Technology Data Exchange (ETDEWEB)

    Tolan, T.L. [Tolan, Beeson and Associates, Kennewick, WA (United States)

    1993-06-01

    Sandia National Laboratories is evaluating the feasibility of developing protective barrier system for the Waste Isolation Pilot Plant (WIPP) to thwart inadvertent human intrusion into this radioactive-waste disposal system for a period of 9,900 years after assumed loss of active institutional controls. The protective barrier system would be part of a series of enduring passive institutional controls whose long-term function will be to reduce the likelihood of inadvertent human activities (e.g., exploratory drilling for resources) that could disrupt the WIPP disposal system.

  12. Studying the effects of Bite plane application in intruding and extruding the teeth in patients with deep bite

    Directory of Open Access Journals (Sweden)

    M. Shirazi

    1987-08-01

    Full Text Available Deep bite is a major clinical problem manifested as higher than normal overbite in anterior region of the jaws. Various studies were conducted to identify the effects of using bite plan and its results. 14 subjects with deep bite were selected out of 400 students of a school who had not proximal caries and had not lost any permanent teeth with healthy periodontal condition. 8 patients were considered as case group and the 6 other as the control group. In case group, a simple labial arc with acrylic palate that caused a gap in occlusion was placed. 2 lateral radiographs were obtained both pre and post 14 months treatment period. After cephalometric analysis, due to bite plane application significant intrusion in mandibular  incisors were observed as well as elongation in both maxillary and mandibular molars.

  13. Properties of low-lying intruder states in $^{34}$Al and $^{34}$Si sequentially populated in $\\beta$-decay of $^{34}$Mg

    CERN Multimedia

    A low-lying long-lived (26±1 ms) isomer in $^{34}$Al has been observed recently and assigned as 1$^{+}$ state of intruder character. It was populated in $^{36}$S fragmentation and feeds, in $\\beta$-decay, the 0$_{2}^{+}$ state in $^{34}$Si whose excitation energy and lifetime were determined in an electron-positron pairs spectroscopy experiment. In the present experiment we intend to measure for the first time the $\\gamma$-rays following the $\\beta$-decay of $^{34}$Mg. Despite the interest for $^{34}$Mg, the up-right corner of the “N$\\thicksim$20 island of inversion”, the only information on its $\\beta$-decay is the lifetime of 20±10 ms, determined from $\\beta$-neutron coincidences. As a result of the proposed experiment, we expect to place the first transitions in the level scheme of $^{34}$Al and to strongly populate the newly observed isomer, measuring its excitation energy, if the branching ratio to 4$^{−}$ ground state is significant. Theoretical estimations for the $\\beta$-decay of the new isome...

  14. Posterior reversible encephalopathy syndrome following an inadvertent dural puncture during an emergency laparotomy for ischemic colitis – a case report

    Directory of Open Access Journals (Sweden)

    Shah R

    2014-01-01

    Full Text Available Reena Shah, Agnieszka Kubisz-Pudelko, Jeremy Reid Yeovil District Hospital, Yeovil, UK Abstract: Posterior reversible encephalopathy syndrome (PRES is a clinico-neuroradiological syndrome characterized by various symptoms of neurological disease. It has commonly been reported in association with acute hypertension, pre-eclampsia, eclampsia, sepsis, and exposure to immunosuppressants. Here, we report on a normotensive woman who developed a severe frontal headache, visual disturbances, and hypertension 3 days after undergoing an emergency laparotomy for ischemic colitis during which she suffered an inadvertent dural puncture. Neuro-imaging revealed features consistent with PRES. The patient went on to make a good recovery, being discharged 21 days postoperatively, with only minor visual disturbances and memory problems. This case highlights the importance of awareness of PRES to all specialties. On reviewing the literature, we feel that PRES may be a potential differential diagnosis to post-procedural neurological symptoms in those patients undergoing routine procedures such as spinal anesthetics or lumbar punctures. Keywords: PRES, neurological disease, lumbar puncture, spinal anesthetic

  15. Prolonged mydriasis after inadvertent topical administration of the calcium channel antagonist amlodipine: implications for glaucoma drug development.

    Science.gov (United States)

    Roos, Jonathan C P; Haridas, Anjana S

    2015-03-01

    Calcium channel inhibitors are being investigated as potential therapeutic adjuncts to reduce painful ciliary muscle spasm and control intraocular pressure in glaucoma. Relatively little is known about the effect of topical administration of calcium channel blockers in humans. (1) To describe prolonged fixed pupil dilation resulting from exposure to topical amlodipine (2) to review the evidence that links calcium channel blockers with mydriasis and (3) to discuss the implications for glaucoma pharmacotherapy. Single interventional case report, literature review (including human and animal studies) and analysis of reported adverse drug reactions (ADRs) records in the USA and UK. A 35-year-old female doctor presented to eye casualty with blurred vision and bilateral, fixed, dilated pupils. A history of exposure to liquid amlodipine while preparing a paediatric chemotherapy regimen for a neuroblastoma patient was elicited. The patient was reassured and observed. Pupil function returned to normal within 48 h. A multi-national review of adverse drug reactions reports was conducted, as well as an extensive literature search for case reports and experimental studies. To the authors' knowledge this is the first report of amlodipine causing mydriasis and we discuss the potential molecular mechanism. This case is the first to suggest that calcium channel blockers can cause prolonged mydriasis. These agents have been investigated as potential adjuncts in glaucoma therapy. As accidental topical exposure to amlodipine can cause prolonged pupil dilation, it could precipitate angle closure in predisposed patients.

  16. Has Therapy Intruded into Education?

    Science.gov (United States)

    Mintz, Avi

    2009-01-01

    For over fifty years, scholars have argued that a therapeutic ethos has begun to change how people think about themselves and others. There is also a growing concern that the therapeutic ethos has influenced educational theory and practice, perhaps to their detriment. This review article discusses three books, "The Dangerous Rise of Therapeutic…

  17. Side effects and quality of life after inadvertent radiation overdosage in brachytherapy of head-and-neck cancer

    International Nuclear Information System (INIS)

    Evensen, Jan F.; Bjordal, Kristin; Knutsen, Bjoern H.; Olsen, Dag R.; Stoere, Geir; Tausjoe, Johan E.

    2002-01-01

    Purpose: By comparing our old (DP5, in use from 1978 to 1994) and new (Plato, Nucletron) dose planning system, we found that the old system underestimated doses by 20-25%. To study the possible consequences for the patients treated between 1978 and 1994, all who were still alive were invited to undergo an examination with respect to side effects and quality of life (QOL). Methods and Materials: The degree of overdosage was calculated by comparing the isodose distribution generated on the two dose planning systems. Eighty-four patients were then invited to undergo an examination with respect to side effects and QOL. The side effects were scored according to the LENT SOMA system and QOL according to European Organization for Research and Treatment of Cancer (EORTC) Quality of Life Questionnaire-Core 30 (QLQ-C30), and EORTC Quality of Life Questionnaire-Head and Neck 35 (QLQ-H and N35). Results: The mean overdosage of brachytherapy was 19.3%. No association was found between overdosage and side effects or QOL. For implants in the lateral border of the tongue, we found a statistically significant correlation between osteoradionecrosis and the following parameters: linear activity, total activity, dose rate, and extrapolated response dose. By multivariate analysis, only total implanted activity and the use of lead protection during brachytherapy were found to be of prognostic significance with respect to development of osteoradionecrosis. Conclusion: The incidence of side effects after brachytherapy at the Norwegian Radium Hospital seems to have been somewhat higher in the period under investigation than at other institutions. There may be several explanations, including the use of external beam radiotherapy before brachytherapy and departure from the Paris system among others. However, the side effects were not associated with the overdosage that was the basis for the study. As opposed to the general consensus of opinion, long-term QOL was found to be worse after

  18. Particle-hole intruder levels in {sup 67}Cu, collectivity, monopole shifts, and the hockey-stick behaviour of l - 1/2 5/2{sup -} levels in neutron-rich odd-mass Cu nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Walters, W B; Chiara, C J, E-mail: wwalters@umd.edu [University of Maryland, College Park, MD 20742 (United States)

    2011-01-01

    A new sequence of gamma rays with energies of 572, 499, 585, and 674 keV has been identified in {sup 67}Cu populating the 7/2{sup -} level at 2362 keV. Owing to the strong population of the 2362-keV level via an l = 3 proton pickup reaction, that level is assigned to be an f{sub 7/2}{sup -1} 2-particle-1-hole 'intruder' proton configuration, and the new levels are found to form a sequence consistent with intruder sequences in the adjacent odd-mass Cu isotopes and in the odd-mass Sb isotopes. The changing position of the intruder sequence in the odd-mass Cu isotopes is discussed and related to the onset of collectivity associated with the presence of g{sub 9/2} neutrons beyond N = 40. The increase in collectivity is also discussed for a number of isotonic and isotopic chains as more protons or neutrons, respectively, are added beyond an oscillator shell boundary. For most of these systems, the l -1/2 levels show a systematic 'hockey-stick-like' behaviour with a sharp decrease in energy with the addition of the first protons or neutrons, owing to both the added collectivity and the tensor interaction, and then a lower slope when collectivity changes are diminished and only the tensor interaction is influencing the changes in level positions.

  19. Particle-hole intruder levels in 67Cu, collectivity, monopole shifts, and the hockey-stick behaviour of ell - 1/2 5/2- levels in neutron-rich odd-mass Cu nuclei

    Science.gov (United States)

    Walters, W. B.; Chiara, C. J.

    2011-01-01

    A new sequence of gamma rays with energies of 572, 499, 585, and 674 keV has been identified in 67Cu populating the 7/2- level at 2362 keV. Owing to the strong population of the 2362-keV level via an ell = 3 proton pickup reaction, that level is assigned to be an f7/2-1 2-particle-1-hole "intruder" proton configuration, and the new levels are found to form a sequence consistent with intruder sequences in the adjacent odd-mass Cu isotopes and in the odd-mass Sb isotopes. The changing position of the intruder sequence in the odd-mass Cu isotopes is discussed and related to the onset of collectivity associated with the presence of g9/2 neutrons beyond N = 40. The increase in collectivity is also discussed for a number of isotonic and isotopic chains as more protons or neutrons, respectively, are added beyond an oscillator shell boundary. For most of these systems, the ell -1/2 levels show a systematic "hockey-stick-like" behaviour with a sharp decrease in energy with the addition of the first protons or neutrons, owing to both the added collectivity and the tensor interaction, and then a lower slope when collectivity changes are diminished and only the tensor interaction is influencing the changes in level positions.

  20. Assessment of the long-term risks of inadvertent human intrusion into a disposal vault in deep plutonic rock: reassessment using ICRP recommendations

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1996-06-01

    Canada has conducted an extensive research program on the safe disposal of nuclear fuel waste. The program has focussed on the concept of disposal in durable containers in an engineered facility or 'vault' located 500 to 1000 m deep in plutonic rock on the Canadian Shield. As part of this task, a methodology was developed to assess the long-term risk from inadvertent intrusion scenarios, and applied to a reference conceptual design of a facility for disposal of used fuel. The AECB has specified that 'the predicted radiological risk to individuals from a waste disposal facility shall not exceed 10 -6 fatal cancers and serious genetic effects in a year.' Risk is defined as the sum, of the product of the probability of the scenario, the magnitude of the resultant radiation dose, and the probability of a health effect per unit dose. The AECB also specifies that 'calculations of individual risk should be made by using the risk conversion factor of 2 x 10 -2 per sievert.' Our earlier assessment of four human intrusion scenarios showed that the estimated risk using the risk conversion factor recommended by the AECB was at least 3 orders of magnitude below the AECB risk criterion, at all times up to 10 000 a, for each of the four scenarios analysed. The AECB risk criterion and risk conversion factor are based on the recommendations of the Intemafional Commission on Radiological Protection (ICRP) in their Publication ICRP 26. More recently, in its Publication ICRP 60, the ICRP has recommended dose factors for fatal cancers that are larger than those in ICRP 26 and an increase in the risk factor for serious hereditary effects in all future generations. Another ICRP Publication, ICRP 64, states that 'For potential exposure situations, the consideration of the basic dose response used for stochastic effects must be extended into the range of high doses where deterministic effects also occur.' For the new assessments of risk we use the estimated doses and probabilities of

  1. Special Analysis: Revision of Saltstone Vault 4 Disposal Limits (U)

    Energy Technology Data Exchange (ETDEWEB)

    Cook, J

    2005-05-26

    New disposal limits have been computed for Vault 4 of the Saltstone Disposal Facility based on several revisions to the models in the existing Performance Assessment and the Special Analysis issued in 2002. The most important changes are the use of a more rigorous groundwater flow and transport model, and consideration of radon emanation. Other revisions include refinement of the aquifer mesh to more accurately model the footprint of the vault, a new plutonium chemistry model accounting for the different transport properties of oxidation states III/IV and V/VI, use of variable infiltration rates to simulate degradation of the closure system, explicit calculation of gaseous releases and consideration of the effects of settlement and seismic activity on the vault structure. The disposal limits have been compared with the projected total inventory expected to be disposed in Vault 4. The resulting sum-of-fractions of the 1000-year disposal limits is 0.2, which indicates that the performance objectives and requirements of DOE 435.1 will not be exceeded. This SA has not altered the conceptual model (i.e., migration of radionuclides from the Saltstone waste form and Vault 4 to the environment via the processes of diffusion and advection) of the Saltstone PA (MMES 1992) nor has it altered the conclusions of the PA (i.e., disposal of the proposed waste in the SDF will meet DOE performance measures). Thus a PA revision is not required and this SA serves to update the disposal limits for Vault 4. In addition, projected doses have been calculated for comparison with the performance objectives laid out in 10 CFR 61. These doses are 0.05 mrem/year to a member of the public and 21.5 mrem/year to an inadvertent intruder in the resident scenario over a 10,000-year time-frame, which demonstrates that the 10 CFR 61 performance objectives will not be exceeded. This SA supplements the Saltstone PA and supersedes the two previous SAs (Cook et al. 2002; Cook and Kaplan 2003).

  2. Control of Transboundary Movement of Radioactive Material Inadvertently Incorporated into Scrap Metal and Semi-finished Products of the Metal Recycling Industries. Results of the Meetings Conducted to Develop a Draft Code of Conduct

    International Nuclear Information System (INIS)

    2014-02-01

    In 2010, the IAEA initiated the development of a code of conduct on the transboundary movement of radioactive material inadvertently incorporated into scrap metal and semi- finished products of the metal recycling industries (Metal Recycling Code of Conduct). The Metal Recycling Code of Conduct was intended to harmonize the approaches of Member States in relation to the discovery of radioactive material that may inadvertently be present in scrap metals and semi-finished products subject to transboundary movement, and their safe handling and management to facilitate regulatory control. The Metal Recycling Code of Conduct was envisaged as being complementary to the Safety Guide on Control of Orphan Sources and Other Radioactive Material in the Metal Recycling and Production Industries (IAEA Safety Standards Series No. SSG-17), which provides recommendations, principally within a national context, on the protection of workers, members of the public and the environment in relation to the control of radioactive material inadvertently incorporated in scrap metal. In February 2013, the third open-ended meeting of technical and legal experts to develop the Metal Recycling Code of Conduct was organized. The objective of this meeting was to address the comments received from Member States and to finalize the text of the draft Metal Recycling Code of Conduct. Representatives from 55 Member States, one non-Member State and the EU, together with seven observers from the metal recycling industry, reviewed the comments and revised the draft accordingly. In September 2013, in Resolution GC(57)/RES/9, the IAEA General Conference recorded that it 'Appreciates the intensive efforts undertaken by the Secretariat to develop a code of conduct on the transboundary movement of scrap metal, or materials produced from scrap metal, that may inadvertently contain radioactive material, and encourages the Secretariat to make the results of the discussion conducted on this issue available to

  3. Petrological and geochemical constraints on the origin of mafic dykes intruding the composite Kaçkar Pluton from the eastern Blacksea magmatic arc, NE Turkey

    Science.gov (United States)

    Aydin, Faruk; Oguz, Simge; Baser, Rasim; Uysal, Ibrahim; Sen, Cüneyt; Karsli, Orhan; Kandemir, Raif

    2015-04-01

    Geological, petrographical and geochemical data of mafic dykes intruding the composite Kaçkar Pluton from the eastern Blacksea magmatic arc (EBMA), NE Turkey, provide new insights into the nature of the metasomatizing agents in subcontinental lithospheric mantle beneath the region during the late Mesozoic-early Tertiary. Mafic dykes from the Çaykara and Hayrat (Trabzon), and also Ikizdere (Rize) areas from the northern margin of the EBMA consist of basalts, dolerites, lamprophyres (basic member) and lesser basaltic andesites and trachyandesites (evolved member). All dykes have no deformation and metamorphism. The outcrops of these dykes vary, with thickness from 0.2 to 10 m. and visible length from 3 to 20 m. In general, the mafic dykes dip steeply and cut directly across the Kaçkar Pluton, and show NW- and NE-trending, roughly parallel to the orientations of the EBMA main faults. Most of the dyke samples display subaphyric to porphyritic texture with phenocrysts of plagioclase (up to 10%), clinopyroxene (5-20%), amphibole (5-15%), and some contain variable amount of biotite (5-20%), lesser quartz (1-2%), and minor euhedral zircon, apatite and Fe-Ti oxides. The basic members of the mafic dykes have SiO2 of 44.1-51.9%, MgO of 4.5-12.1%, and TiO2 >mostly 0.8% (up to 2.3%) with K2O+Na2O of 1.3-6.6% with mostly subalkaline character. They are relatively high in mg-number (0.45-0.73) and transition metals (V=171-376 ppm, Co=22-45 ppm, Ni=3-148 ppm, and Sc=21-49 ppm). The evolved members of the dykes exhibit relatively higher SiO2 (57.1-60.2%) and K2O+Na2O (5.6-9.0%), and lower MgO (2.2-5.9%) and TiO2 (0.5-0.8%) contents than those from the basic dykes. Also, these samples have slightly low mg-number (0.41-0.65) and transition metals (V=99-172 ppm, Co=9-22 ppm, Ni=1-43 ppm, and Sc=9-20 ppm). In the Harker diagrams, all samples of the mafic dykes form a continuous array, and exhibit similar geochemical characteristics. In general, SiO2 inversely correlates with MgO, Fe

  4. 'Agony aunt, hostage, intruder or friend?'. The multiple personas of the interviewer during fieldwork 'Agony aunt, hostage, intruder or friend?'. The multiple personas of the interviewer during fieldwork ¿Consultor sentimental, intruso, rehén o amigo? Los múltiples papeles del entrevistador durante el trabajo de campo

    Directory of Open Access Journals (Sweden)

    Valerie Caven

    2012-12-01

    Full Text Available Purpose: This paper examines how the role of the intervieweris manipulated by the interviewees in return for them offering their experiences, opinions and information during qualitative research interviews.Design/methodology: Semi-structured interviews in the qualitative paradigm were carried out with 55 architects from the East Midlands region of the UK. The interview data is supported by research diary evidence.Findings: A typology of four interviewer personas is presented: as ‘agony aunt, hostage, intruder or friend’.Research limitations/implications: The four personas were generated by the interviewees’ responses to one researcher which is a limitation. However, the study could be replicated with other researchers/interviewers in different interview situations.Practical implications: The research has practical value in highlighting the multiple facets of the relationship between interviewer and interviewee in qualitative research. It will be of value to both experienced and new researchers.Originality/value: The development of the typology represents the originality and value of the research. Previous research has focused more on telling the stories rather than the development of new theory relating to interviewing.Purpose: This paper examines how the role of the interviewer is manipulated by the interviewees in return for them offering their experiences, opinions and information during qualitative research interviews. Design/methodology: Semi-structured interviews in the qualitative paradigm were carried out with 55 architects from the East Midlands region of the UK. The interview data is supported by research diary evidence. Findings: A typology of four interviewer personas is presented: as ‘agony aunt, hostage, intruder or friend’. Research limitations/implications: The four personas were generated by the interviewees’ responses to one researcher which is a limitation. However, the study could be replicated with other

  5. Identification of deformed intruder states in semi-magic Ni70

    Energy Technology Data Exchange (ETDEWEB)

    Chiara, C. J.; Weisshaar, D.; Janssens, R. V. F.; Tsunoda, Y.; Otsuka, T.; Harker, J. L.; Walters, W. B.; Recchia, F.; Albers, M.; Alcorta, M.; Bader, V. M.; Baugher, T.; Bazin, D.; Berryman, J. S.; Bertone, P. F.; Campbell, C. M.; Carpenter, M. P.; Chen, J.; Crawford, H. L.; David, H. M.; Doherty, D. T.; Gade, A.; Hoffman, C. R.; Honma, M.; Kondev, F. G.; Korichi, A.; Langer, C.; Larson, N.; Lauritsen, T.; Liddick, S. N.; Lunderberg, E.; Macchiavelli, A. O.; Noji, S.; Prokop, C.; Rogers, A. M.; Seweryniak, D.; Shimizu, N.; Stroberg, S. R.; Suchyta, S.; Utsuno, Y.; Williams, S. J.; Wimmer, K.; Zhu, S.

    2015-04-01

    The structure of semi-magic Ni-70(28)42 was investigated following complementary multinucleon-transfer and secondary fragmentation reactions. Changes to the higher-spin, presumed negative-parity states based on observed gamma-ray coincidence relationships result in better agreement with shell-model calculations using effective interactions in the neutron f(5/2)pg(9/2) model space. The second 2(+) and (4(+)) states, however, can only be successfully described when proton excitations across the Z = 28 shell gap are included. Monte Carlo shell-model calculations suggest that the latter two states are part of a prolate-deformed intruder sequence, establishing an instance of shape coexistence at low excitation energies similar to that observed recently in neighboring Ni-68.

  6. Safety analysis for complex systems

    Science.gov (United States)

    Onesty, J. P.; Peercy, R. L., Jr.

    1981-01-01

    Operational risk assessment considers hardware, environment, and human factors. Technique starts with division of postulated mission into segments which are further subdivided into separate operational steps. Consequences of steps, nonoccurrence, premature operation, out-of-sequence operation, and inadvertent execution are examined at subevent, event, and phase levels. Hazards are identified and treated individually. Analysis is well suited to application in energy and transportation fields.

  7. Evaluation of stress patterns on maxillary posterior segment when intruded with mini implant anchorage: A three-dimensional finite element study

    Directory of Open Access Journals (Sweden)

    Nikhita Pekhale

    2016-01-01

    Full Text Available Introduction: The aim of this study is to evaluate stress and displacement effects of maxillary posterior intrusion mechanics with mini-implant anchorage by using finite element method. Materials and Methods: A computer stimulation of three-dimensional model maxilla with all teeth, PDL, bone, mini-implants, brackets, arch wire, force element, and transpalatal arch was constructed on the basis of average anatomic morphology. Finite element analysis was done to evaluate the amount of stress and its distribution during orthodontic intrusive force. Results: Increased Von Mises stress values were observed in mesio-cervical region of first molar. The middle third of second premolar and second molar and regions adjacent to force application sites also showed relatively high stress values. Minimum stress values were observed in apical region of first premolar as it is away from force application. Conclusion: Using three mini-implant and transpalatal arches, this study demonstrates that significant amount of true intrusion of maxillary molars could be obtained with lesser concentration of stresses in the apical area recorded.

  8. Detection of inadvertent catheter movement into the coronary sinus ostium or middle cardiac vein by real-time impedance monitoring prior to radiofrequency ablation in the right atrial posteroseptal region.

    Science.gov (United States)

    Pollak, Scott J; Seckel, Heather; Monir, Joseph; Ebra, George; Monir, George

    2012-09-01

    The objective of this study was to evaluate the use of continuous catheter impedance monitoring prior to ablation to facilitate differentiation of the coronary sinus ostium (CSO) and the middle cardiac vein (MCV) from the right atrial posteroseptal region (RPS). Empiric observations have suggested that continuous catheter impedance monitoring could differentiate the CSO and MCV from the RPS region. Radiofrequency ablation in the MCV or coronary sinus has been associated with coronary artery injury. Differentiation of these areas may be difficult with either fluoroscopy or electrogram characteristics. Continuous impedance measurements using a 4-mm Navistar (Biosense Webster) ablation catheter were conducted in 17 consecutive patients undergoing ablation for supraventricular tachycardia. The average impedance value was recorded at the right atrial septum (RS) posterior to the bundle of His, the RPS region, within 1 cm inside the CSO and in the MCV. These areas were confirmed and demarcated with 3-D mapping and biplane fluoroscopy. A significant increase in impedance was observed between the CSO (X = 146.6 ± 24.8) and RPS [Formula: see text] regions (p regions. Continuous impedance measurements during mapping can facilitate differentiation of catheter locations inside the CSO and MCV from extracoronary sinus regions. This may reduce the risk of inadvertent coronary artery damage during the ablation procedure.

  9. Commonwealth Edison captures intruders on screen

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Commonwealth Edison has developed three software programs, with the supporting hardware, that significantly upgrade security monitoring capabilities at nuclear power stations. These are Video Capture, the Alternate Perimeter Alarm Reporting System, and the Redundant Access Control System. Conventional video systems only display what is happening at the moment and rewinding a VCR to discover what occurred earlier takes time. With Video Capture the images can be instantly restored to the monitor screen and printed out. When one of the security devices used to monitor the perimeter of a Commonwealth Edison nuclear power station is tripped, the Video Capture program stores the visual image digitally. This is done using similar technology to the employed in fax machines. The security staff are thus able to distinguish immediately between disturbances taking place simultaneously at different security zones. They can magnify and compare the stored images and print them out. The Alternate Perimeter Alarm Reporting System was developed to speed the transmission of alarm signals from the security sensors to the security computer. The Redundant Access Control System (RACS) was originally developed to meet the requirement of the Nuclear Regulatory Commission (NRC) for a secondary computer-operated security measure to monitor employee access to a nuclear power station. When employee drug testing became an additional NRC requirement, the Nuclear Division of Commonwealth Edison asked their programmers to modify RACS to generate a random list of personnel to be tested for substance abuse. RACS was then further modified to produce numerous station operating reports that had been previously compiled manually. (author)

  10. Report on the training for an intruder

    International Nuclear Information System (INIS)

    Aoki, Yoshikazu; Fukumoto, Masahiro; Saito, Toru; Tsujinaka, Hideyuki

    2002-12-01

    Crisis management section members of Japan Nuclear Cycle Development Institute (JNC) Tokai Works had implemented two types of trainings against terrorism in last Japanese fiscal year and improved the countermeasure against the terrorism. In this fiscal year we trained against the new type of terrorism in the period of about 1 year later of a series of attacks on America by terrorism. As a result of the training some points which need further improvements and new weak points have been availed as follows. (1) Enlightenment of workers' senses against terrorism. Few members of the Emergency Control Center, workers and guards looked tensionless in the training. The sense against terrorism needs to be enlightened. (2) Speediness of initial response. In this training the events using a car went on more rapidly than expected. The rapid response to counter terrorism needs to be examined. (3) Improvement of fundamental countermeasures. The fundamental response of the workers to the terrorism under limited condition before the guard authorities' arrival has been improved further more through the education and trainings. (4) Completeness of the prevention of terrorism. After terrorism occurs, Tokai Works is helpless until the guard authorities arrive. First of all the measure to avoid terrorism occurrence is important. (5) Strengthen the cooperation with the guard authorities. Besides completeness of the prevention of terrorism it is necessary to cope with the guard authorities at ordinary times against an emergency. (author)

  11. Anomalous intruder response in diverse granular systems

    NARCIS (Netherlands)

    Oyarte Galvez, Loreto Alejandra

    2017-01-01

    The definition of granular matter is extremely broad; any collection of conglomeration of particles larger than 100 micrometers can be considered as part of this group, and virtually the entire universe is composed of them. Examples are found in many fields, e.g. in nature (dunes, avalanches,

  12. The adverse effects of inadvertent intraoperative intravenous ...

    African Journals Online (AJOL)

    This medical error was investigated using the criticalincident technique that is available in our department. This case report highlights the cardiovascular sequelae of phenylephrine overdose and the human factor that is associated with a medication error. We discuss these two factors, as well as the organisational factors ...

  13. Inadvertent intrathecal use of ionic contrast agent

    Energy Technology Data Exchange (ETDEWEB)

    Leede, H. van der; Jorens, P.G. [Department of Intensive Care Medicine, University Hospital of Antwerp, Wilrijkstraat 10, 2650 Edegem (Belgium); Parizel, P. [Department of Radiology, University Hospital of Antwerp, Wilrijkstraat 10, 2650 Edegem (Belgium); Cras, P. [Department of Neurology, University Hospital of Antwerp, Wilrijkstraat 10, 2650 Edegem (Belgium)

    2002-07-01

    Intrathecal administration of ionic contrast media may cause severe and fatal neurotoxic reactions due to their hyperosmolarity and ionic nature. They are therefore strictly contraindicated for all radiologic applications involving the central nervous system (e.g., myelography). We present a case in which ioxitalamate was accidentally injected intrathecally. The patient recovered completely due to a combination of the different therapeutic options reported in the literature, including early mechanical ventilation and neuromuscular paralysis, aggressive control of seizures, elevation of head and trunk to prevent cephalad migration of contrast, steroids, cerebrospinal fluid drainage and lavage and prophylactic antibiotics. (orig.)

  14. The adverse effects of inadvertent intraoperative intravenous ...

    African Journals Online (AJOL)

    2012-03-03

    Mar 3, 2012 ... healthy female patient undergoing elective gynaecological surgery. This medical error was investigated using the critical- incident technique that is available in our department. This case report highlights the cardiovascular sequelae of phenylephrine overdose and the human factor that is associated with a ...

  15. Inadvertent intrathecal use of ionic contrast agent

    International Nuclear Information System (INIS)

    Leede, H. van der; Jorens, P.G.; Parizel, P.; Cras, P.

    2002-01-01

    Intrathecal administration of ionic contrast media may cause severe and fatal neurotoxic reactions due to their hyperosmolarity and ionic nature. They are therefore strictly contraindicated for all radiologic applications involving the central nervous system (e.g., myelography). We present a case in which ioxitalamate was accidentally injected intrathecally. The patient recovered completely due to a combination of the different therapeutic options reported in the literature, including early mechanical ventilation and neuromuscular paralysis, aggressive control of seizures, elevation of head and trunk to prevent cephalad migration of contrast, steroids, cerebrospinal fluid drainage and lavage and prophylactic antibiotics. (orig.)

  16. Reproductive, productivity, and mortality outcomes in late-gestation gilts and their litters following simulation of inadvertent exposure to a modified-live vaccine strain of porcine reproductive and respiratory syndrome (PRRS) virus.

    Science.gov (United States)

    Schelkopf, Adam; Nerem, Joel; Cowles, Bobby; Amodie, Deb; Swalla, Richard; Dee, Scott

    2014-08-06

    The study evaluated the safety of a modified live-virus (MLV) porcine reproductive and respiratory syndrome (PRRS) vaccine in susceptible, pregnant gilts. To simulate inadvertent exposure secondary to postvaccination shedding of PRRS-MLV, seronegative gilts (n=51) were exposed by IM vaccination at 90 days of gestation. Vaccinated and nonvaccinated, seronegative control gilts (n=25) were maintained in separate facilities. The PRRS-MLV vaccine was given in a 2mL dose on day 0. On day 7 all vaccinated gilts were PRRSV-PCR-positive for PRRSV and had responded serologically as determined by an ELISA. All control gilts remained PRRSV-PCR- and ELISA-negative throughout the study. Abortions did not occur in gilts from either group. The difference between vaccinated and control gilts in average number of piglets per litter (12.43 and 12.16, respectively), number of live births per litter (11.21 and 11.54), and mean piglet birth weight (3.22 and 3.26 lbs) were not significantly different. Piglets in the control group had significantly greater average daily gain versus piglets from vaccinated gilts (0.52 vs. 0.46 lbs, PPRRS-MLV agent did not significantly affect reproductive outcomes. Lower ADG in piglets from vaccinated gilts may be due to PRRS-MLV viremia following transplacental or post-farrowing exposure. Air sampling results indicated that environmental contamination with PRRS-MLV shed from vaccinated gilts was minimal. Copyright © 2014 Elsevier Ltd. All rights reserved.

  17. The analyst's hatred of analysis.

    Science.gov (United States)

    Kravis, Nathan

    2013-01-01

    Analytic work is loved and hated. Both attitudes deserve scrutiny, but the analyst's hatred of analysis, which transcends countertransference responses to individual patients, represents an impediment to gratifying analytic work whose recognition and conceptualization has been resisted. The author suggests that antipathy among analysts toward analysis and the analytic situation is normative and expectable, yet commonly experienced as shameful. He speculates that it is sometimes disavowed and projected. Training institutes might inadvertently foster this sense of shame rather than promote its working through. The recognition that analytic identity functions as both a loving and a persecutory internal object has implications for psychoanalytic education and practice. © 2013 The Psychoanalytic Quarterly, Inc.

  18. Radiological pathways analysis for spent solvents from the boiler chemical cleaning at the Pickering Nuclear Site

    International Nuclear Information System (INIS)

    Garisto, N.C.; Eslami, Z.; Hodgins, S.; Beaman, T.; Von Svoboda, S.; Marczak, J.

    2006-01-01

    Spent solvents are generated as a result of Boiler Chemical Cleanings (BCC) at CANDU reactor sites. These solutions contain small amount of radioactivity from a number of different sources including: Cut tubes - short sections of boiler tubes are infrequently removed from the boilers for a detailed characterization. These tubes are typically only plugged at the tubesheet allowing the primary side deposits to be exposed to BCC solvents. Tube leaks - primary to secondary side leaks also occur infrequently as a result of tube degradation. Radioactivity from the leaking fluid can consequently be deposited in the sludge on the secondary side of the tubes. Diffusion of tritium - during normal operation of the reactor units, tritium slowly diffuses from the heavy water in the primary heat-transfer system to the light-water coolant on the secondary side. Some of this tritium is retained in the secondary side deposits. The Pickering Nuclear Generating Station (PNGS) would like the flexibility to have several options for handling the spent solvent waste and associated rinse water from BCC. To this end, a radiological pathways analysis was undertaken to determine dose consequences associated with each option. Sample results from this study are included in this paper. The pathways analysis is used in this study to calculate dose to hypothetical receptors including individuals such as truck drivers, incinerator workers, residue (ash) handlers, residents who live near the landfill, inadvertent intruders into the landfill after closure and residents who live near the outfall. This dose is compared to a de minimis dose. A de minimis dose or dose rate represents a level of risk, which is generally accepted as being of no significance. Shipments of spent solvents and rinse water with corresponding doses below de minimis can be sent to conventional (i.e., non-radioactive) landfills for incineration and disposal as the radioactive dose associated with them is much less than natural

  19. Organizational Discourse Analysis - Well Done or too Rare?

    DEFF Research Database (Denmark)

    Alvesson, Mats; Kärreman, Dan

    2011-01-01

    In this article we respond to Bargiela-Chiappini, Iedema and Mumby.We notice that there is considerable agreement concerning the state of the art of organizational discourse analysis, while also discussing the disagreements. We expand on some of the ontological issues inherent in our argument......, further discuss the character of reductionism in organizational discourse analysis, the trappings of a priori assumptions, and, finally, argue that our critics themselves, perhaps inadvertently, tend to repeat the problematic moves we identified in our original article....

  20. Combining the Sterile Insect Technique with Wolbachia-Based Approaches: II--A Safer Approach to Aedes albopictus Population Suppression Programmes, Designed to Minimize the Consequences of Inadvertent Female Release.

    Directory of Open Access Journals (Sweden)

    Dongjing Zhang

    Full Text Available Due to the absence of a perfect method for mosquito sex separation, the combination of the sterile insect technique and the incompatible insect technique is now being considered as a potentially effective method to control Aedes albopictus. In this present study first we examine the minimum pupal irradiation dose required to induce complete sterility in Wolbachia triple-infected (HC, double-infected (GUA and uninfected (GT female Ae. albopictus. The HC line is a candidate for Ae. albopictus population suppression programmes, but due to the risk of population replacement which characterizes this triple infected line, the individuals to be released need to be additionally irradiated. After determining the minimum irradiation dose required for complete female sterility, we test whether sterilization is sufficient to prevent invasion of the triple infection from the HC females into double-infected (GUA populations. Our results indicate that irradiated Ae. albopictus HC, GUA and GT strain females have decreased fecundity and egg hatch rate when irradiated, inversely proportional to the dose, and the complete sterilization of females can be acquired by pupal irradiation with doses above 28 Gy. PCR-based analysis of F1 and F2 progeny indicate that the irradiated HC females, cannot spread the new Wolbachia wPip strain into a small cage GUA population, released at a 1:5 ratio. Considering the above results, we conclude that irradiation can be used to reduce the risk of population replacement caused by an unintentional release of Wolbachia triple-infected Ae. albopictus HC strain females during male release for population suppression.

  1. Design analysis report: high-integrity container for disposal of EPICOR-II prefilter liners

    International Nuclear Information System (INIS)

    Chapman, R.L.; Reno, H.W.

    1983-06-01

    A high-integrity container has been developed to (a) immobilize the EPIROC-II prefilter liners from Unit-2 of the Three Mile Island (TMI) Nuclear Power Station, and (b) protect possible future, inadvertent intruders from damaging radiation. The container is designed for disposal depths to 90 feet in either wet or dry subsurface conditions. A built-in vent system for each container will permit the release of gas and function as a water barrier at pressures reaching 45 psig. The container has outside dimensions of 62.5 inches diameter by 84 inches high, and is designed to ensure a 300-year functional life. Its design features multiple barriers that prevent corrosives from penetrating container walls. The multiple-barrier approach provides a 1204-year mean time to total failure, based on an assumed single-event-failure probability of 20%. The multiple-corrosion-barrier concept is supplemented by aluminum hydroxide, which reduces the chemical activity of corrosives potentially arising from chemical decomposition of organic resins in the EPICOR-II prefilter liner. Aluminum hydroxide, an effective amphoteric material, tends to neutralize both acids and bases. An epoxy seal between the lid and container body functions as a barrier against any loss of container contents. Two separate epoxy materials fill the space between the lid and container body; they form a seal, mechanically bonding the lid in place. After curing, this epoxy material has a greater strength than the concrete; thus, the concrete has to fail in order for the lid to loosen

  2. Apoplastic interactions between plants and plant root intruders

    Directory of Open Access Journals (Sweden)

    Kanako eMitsumasu

    2015-08-01

    Full Text Available Numerous pathogenic or parasitic organisms attack plant roots to obtain nutrients, and the apoplast including the plant cell wall is where the plant cell meets such organisms. Root-parasitic angiosperms and nematodes are two distinct types of plant root parasites but share some common features in their strategies for breaking into plant roots. Striga and Orobanche are obligate root parasitic angiosperms that cause devastating agricultural problems worldwide. Parasitic plants form an invasion organ called a haustorium, where plant cell wall degrading enzymes (PCWDEs are highly expressed. Plant-parasitic nematodes are another type of agriculturally important plant root parasite. These nematodes breach the plant cell walls by protruding a sclerotized stylet from which PCWDEs are secreted. Responding to such parasitic invasion, host plants activate their own defense responses against parasites. Endoparasitic nematodes secrete apoplastic effectors to modulate host immune responses and to facilitate the formation of a feeding site. Apoplastic communication between hosts and parasitic plants also contributes to their interaction. Parasitic plant germination stimulants, strigolactones (SLs, are recently identified apoplastic signals that are transmitted over long distances from biosynthetic sites to functioning sites. Here, we discuss recent advances in understanding the importance of apoplastic signals and cell walls for plant-parasite interactions.

  3. Probing intruder configurations in $^{186, 188}$Pb using Coulomb excitation

    CERN Multimedia

    Columb excitation measurements to study the shape coexistence, mixing and quadrupole collectivity of the low-lying levels in neutron-deficient $^{188}$Pb nuclei are proposed with a view to extending similar studies to the $^{186}$Pb midshell nucleus. The HIE-ISOLDE beam of $^{186,188}$Pb nuclei will be delivered to MINIBALL+SPEDE set-up for simultaneous in-beam $\\gamma$-ray and conversion electron spectroscopy. The proposed experiment will allow the sign of the quadrupole deformation parameter to be extracted for the two lowest 2$^{+}$ states in $^{188}$Pb. Moreover, the advent of SPEDE will allow probing of the bandhead 0$^{+}$ states via direct measurements of E0 transitions. Beam development is requested to provide pure and instense $^{186}$Pb beam.

  4. Planning for a Violent Intruder Event: The School Nurse's Role.

    Science.gov (United States)

    Selekman, Janice; Melvin, Joseph

    2017-05-01

    School shootings occur too frequently and often with devastating results. The key to prevention and mitigation of these events is to have a plan that is simple, up-to-date, disseminated, and practiced. This article discusses the steps that school nurses can take to work with school administration to prepare themselves, their staff, and their students.

  5. Detection of the under-soil intruder activity

    Science.gov (United States)

    Cechak, Jaroslav

    2007-04-01

    The presented paper focuses on the possibilities of technical methods designed to detect a trespasser under the ground, and in general on the possibilities of detection a trespasser behind an obstruction. The paper analyses method of detection of a trespasser that were practically verified by the author of the paper. The first part of the paper discusses the characteristics and use of piezoelectric films that could be used as a replacement for the traditional geophone for detection of underground mining operation. It also provides a block connection diagram of the measuring chain and photos of the practical implementation of the sensor. The consequent part of the paper then discusses the possibilities of detecting a trespasser based on electromagnetic waves emission by humans in the ELF - Extremely Low Frequency band. The paper is supplemented with illustrative photos and results of numeric processing of signals in the form of graphs and courses. The history of excavating and using tunnels spans long into the past. Tunnels were used not only as storage for food and war material but mainly as effective means of protection against attackers. A significant motivating factor for constructing tunnels lies in the hidden possibility of movement of people and transfer of material under the ground of a protected perimeter. At present some tunnels are used as roads for smuggling drugs, weapons, ammunition or illegal passages of people. There are even cases, not exceptional, when tunnels were excavated with the aim to rob a bank safe etc. The fact that construction of tunnels, often quite primitive ones, is not sporadic, can be continually documented not only by historical sources but often also by the daily news summary. The concurrent lack of proper technological means results in the renaissance of using tunnels for illegal purposes even at present. The presented paper focuses on the above mentioned area and points to little used physical principles of detection underground activities of trespassers.

  6. Temperature profile around a basaltic sill intruded into wet sediments

    Science.gov (United States)

    Baker, Leslie; Bernard, Andrew; Rember, William C.; Milazzo, Moses; Dundas, Colin M.; Abramov, Oleg; Kestay, Laszlo P.

    2015-01-01

    The transfer of heat into wet sediments from magmatic intrusions or lava flows is not well constrained from field data. Such field constraints on numerical models of heat transfer could significantly improve our understanding of water–lava interactions. We use experimentally calibrated pollen darkening to measure the temperature profile around a basaltic sill emplaced into wet lakebed sediments. It is well known that, upon heating, initially transparent palynomorphs darken progressively through golden, brown, and black shades before being destroyed; however, this approach to measuring temperature has not been applied to volcanological questions. We collected sediment samples from established Miocene fossil localities at Clarkia, Idaho. Fossils in the sediments include pollen from numerous tree and shrub species. We experimentally calibrated changes in the color of Clarkia sediment pollen and used this calibration to determine sediment temperatures around a Miocene basaltic sill emplaced in the sediments. Results indicated a flat temperature profile above and below the sill, with T > 325 °C within 1 cm of the basalt-sediment contact, near 300 °C at 1–2 cm from the contact, and ~ 250 °C at 1 m from the sill contact. This profile suggests that heat transport in the sediments was hydrothermally rather than conductively controlled. This information will be used to test numerical models of heat transfer in wet sediments on Earth and Mars.

  7. Mineral Trioxide Aggregate for Intruded Teeth with Incomplete Apex Formation.

    Science.gov (United States)

    T S Oliveira, Caroline; M A de Carvalho, Fredson; C O Gonçalves, Leonardo; M N de Souza, Jessyca; F R Garcia, Lucas; A F Marques, André; N de Souza, Samir

    2018-01-01

    The axial displacement of a tooth within the alveolar bone is called traumatic intrusive luxation. The treatment of immature permanent teeth with incomplete root formation is a challenging procedure, as the prognosis is uncertain. The objective of the present article is to report the successful treatment of traumatic intrusive luxation in teeth with incomplete root formation, where mineral trioxide aggregate (MTA) was used as an apical plug to induce apexification. A 10-year-old boy was referred to our department for emergency treatment of dentoalveolar trauma to the maxillary central incisors. After clinical and radiographic examination, the teeth were surgically repositioned and rigidly fixed. Three months later, a pulp vitality test of both teeth elicited a negative response. Endodontic therapy with an MTA plug was used to induce apexification as root formation was incomplete. The root canals were then filled. Clinical and radiographic examination was then performed again at 2 and 4 months later. The MTA apical plug was effective in inducing apexification and maintaining both teeth.

  8. Apoplastic interactions between plants and plant root intruders.

    Science.gov (United States)

    Mitsumasu, Kanako; Seto, Yoshiya; Yoshida, Satoko

    2015-01-01

    Numerous pathogenic or parasitic organisms attack plant roots to obtain nutrients, and the apoplast including the plant cell wall is where the plant cell meets such organisms. Root parasitic angiosperms and nematodes are two distinct types of plant root parasites but share some common features in their strategies for breaking into plant roots. Striga and Orobanche are obligate root parasitic angiosperms that cause devastating agricultural problems worldwide. Parasitic plants form an invasion organ called a haustorium, where plant cell wall degrading enzymes (PCWDEs) are highly expressed. Plant-parasitic nematodes are another type of agriculturally important plant root parasite. These nematodes breach the plant cell walls by protruding a sclerotized stylet from which PCWDEs are secreted. Responding to such parasitic invasion, host plants activate their own defense responses against parasites. Endoparasitic nematodes secrete apoplastic effectors to modulate host immune responses and to facilitate the formation of a feeding site. Apoplastic communication between hosts and parasitic plants also contributes to their interaction. Parasitic plant germination stimulants, strigolactones, are recently identified apoplastic signals that are transmitted over long distances from biosynthetic sites to functioning sites. Here, we discuss recent advances in understanding the importance of apoplastic signals and cell walls for plant-parasite interactions.

  9. Radar-Based Intruder Detection for a Robotic Security System

    National Research Council Canada - National Science Library

    Cory, Phil

    1998-01-01

    .... The system includes multiple supervised-autonomous platforms equipped with intrusion detection, barrier assessment, and inventory assessment subsystems commanded from an integrated control station...

  10. Inadvertent presence of genetically modified elements in maize food ...

    African Journals Online (AJOL)

    owner

    2013-07-31

    Jul 31, 2013 ... assess the maize food products in the Kenyan market for the presence of genetic elements from GMOs. This was done by testing various maize food products, including grains from open air markets, relief food, maize seeds from seed companies and processed food sampled from various supermarkets in ...

  11. Inadvertent presence of genetically modified elements in maize food ...

    African Journals Online (AJOL)

    owner

    2013-07-31

    Jul 31, 2013 ... such as corn flakes, corn puffs and corn syrup. These results suggest that high temperatures or other factors involved in the processing of the cornflakes degraded the. cry1Ab DNA. PCR is very efficient in detecting genetically modified genes in Bt maize seed and grains because it was able to amplify the ...

  12. Fisheries bycatch as an inadvertent human-induced evolutionary mechanism.

    Directory of Open Access Journals (Sweden)

    Christophe Barbraud

    Full Text Available Selective harvesting of animals by humans can affect the sustainability and genetics of their wild populations. Bycatch - the accidental catch of non-target species - spans the spectrum of marine fauna and constitutes a harvesting pressure. Individual differences in attraction to fishing vessels and consequent susceptibility to bycatch exist, but few studies integrate this individual heterogeneity with demography. Here, we tested for the evidence and consequences of individual heterogeneity on the demography of the wandering albatross, a seabird heavily affected by fisheries bycatch. We found strong evidence for heterogeneity in survival with one group of individuals having a 5.2% lower annual survival probability than another group, and a decrease in the proportion of those individuals with the lowest survival in the population coinciding with a 7.5 fold increase in fishing effort in the foraging areas. Potential causes for the heterogeneity in survival are discussed and we suggest that bycatch removed a large proportion of individuals attracted by fishing vessels and had significant phenotypic and population consequences.

  13. The Inadvertent Effect of Assurance on Nuclear Proliferation

    Science.gov (United States)

    2013-02-14

    despite steady Gross Domestic Product ( GDP ) growth.13 Moreover, China’s space intercept of a defunct weather satellite, fielding of advanced BMD...ponder why the U.S. would want to swap Los Angeles for Taipei . In an uncertain and multi-polar world containing proliferating nuclear weapon states, the...RL33436 (Washington, DC: Congressional Research Service, 04 May 2012), 7. 13 China’s GDP and military budget over the decade between 1996 and 2006

  14. Inadvertent Exemplars: Life History Portraits of Two Socially Just Principals

    Science.gov (United States)

    Scanlan, Martin

    2012-01-01

    This study creates life history portraits of two White middle-class native-English-speaking principals demonstrating commitments to social justice in their work in public elementary schools serving disproportionately high populations of students who are marginalized by poverty, race, and linguistic heritage. Through self-reported life histories of…

  15. Special Analysis: Radionuclides Screening Analysis for E Area

    Energy Technology Data Exchange (ETDEWEB)

    COOK, JAMES

    2004-07-22

    It was recently discovered that waste being disposed of onsite contained radionuclides that had not been analyzed by the Performance Assessment (PA). These radionuclides had been eliminated from the PA in an earlier screening evaluation because they were not expected to be contained in SRS-generated waste or that received from offsite generators. This Special Analysis (SA) is being prepared to establish the screening criteria and level of evaluation for all radionuclides potentially significant to a Low Level Waste PA or Composite Analysis (CA). The screening methodology recommended by the National Council on Radiological Protection and Measurements (NCRP) has been used to identify those radionuclides that require detailed analysis to derive disposal limits. Of the approximately 2800 radionuclides, a total of 826 were considered by the NCRP to be potentially significant. Approximately 686 radionuclides were eliminated from this analysis due to their short half-life or other properties. Approximately 40 of the 140 remaining radionuclides have been analyzed in the existing PA and waste acceptance criteria established. This SA develops the screening criteria and establishes trigger values to be used to determine the level of analysis required for those radionuclides not analyzed in PA. The results of the SA identified 20 radionuclides that will require more detailed groundwater and intruder analysis. This analysis will be documented in a SA for trench disposal.

  16. Analysis

    DEFF Research Database (Denmark)

    Mathiesen, Brian Vad; Liu, Wen; Zhang, Xiliang

    2014-01-01

    three major technological changes: energy savings on the demand side, efficiency improvements in energy production, and the replacement of fossil fuels by various sources of renewable energy. Consequently, the analysis of these systems must include strategies for integrating renewable sources...

  17. Analysis

    CERN Document Server

    Maurin, Krzysztof

    1980-01-01

    The extraordinarily rapid advances made in mathematics since World War II have resulted in analysis becoming an enormous organism spread­ ing in all directions. Gone for good surely are the days of the great French "courses of analysis" which embodied the whole of the "ana­ lytical" knowledge of the times in three volumes-as the classical work of Camille Jordan. Perhaps that is why present-day textbooks of anal­ ysis are disproportionately modest relative to the present state of the art. More: they have "retreated" to the state before Jordan and Goursat. In recent years the scene has been changing rapidly: Jean Dieudon­ ne is offering us his monumentel Elements d'Analyse (10 volumes) written in the spirit of the great French Course d'Analyse. To the best of my knowledge, the present book is the only one of its size: starting from scratch-from rational numbers, to be precise-it goes on to the theory of distributions, direct integrals, analysis on com­ plex manifolds, Kahler manifolds, the theory of sheave...

  18. Estimation of contaminant transport in groundwater beneath radioactive waste disposal facilities

    International Nuclear Information System (INIS)

    Wang, J.C.; Tauxe, J.D.; Lee, D.W.

    1995-01-01

    Performance assessments are required for low-level radioactive waste disposal facilities to demonstrate compliance with the performance objectives, consider human exposures from water, air, and inadvertent intruder pathways. Among these, the groundwater pathway analysis usually involves complex numerical simulations with results which are often difficult to verify and interpret. This paper presents a technique to identify and simplify the essential parts of the groundwater analysis. The transport process of radionuclides including infiltration of precipitation, leachate generation, and advection and dispersion in the groundwater is divided into several steps. For each step, a simple analytical model is constructed and refined to capture the dominant phenomena represented in the complex analysis included in a site-specific performance assessment. This step-wise approach provides a means for gaining insights into the transport process and obtaining reasonable estimates of relevant quantities for facility design and site evaluation

  19. Review of the treat upgrade reactor scram system reliability analysis

    International Nuclear Information System (INIS)

    Montague, D.F.; Fussell, J.B.; Krois, P.A.; Morelock, T.C.; Knee, H.E.; Manning, J.J.; Haas, P.M.; West, K.W.

    1984-10-01

    In order to resolve some key LMFBR safety issues, ANL personnel are modifying the TREAT reactor to handle much larger experiments. As a result of these modifications, the upgraded Treat reactor will not always operate in a self-limited mode. During certain experiments in the upgraded TREAT reactor, it is possible that the fuel could be damaged by overheating if, once the computer systems fail, the reactor scram system (RSS) fails on demand. To help ensure that the upgraded TREAT reactor is shut down when required, ANL personnel have designed a triply redundant RSS for the facility. The RSS is designed to meet three reliability goals: (1) a loss of capability failure probability of 10 -9 /demand (independent failures only); (2) an inadvertent shutdown probability of 10 -3 /experiment; and (3) protection agaist any known potential common cause failures. According to ANL's reliability analysis of the RSS, this system substantially meets these goals

  20. Seroepidemiological profile of pregnant women after inadvertent rubella vaccination in the state of Rio de Janeiro, Brazil, 2001-2002 Perfil seroepidemiológico de embarazadas después de recibir inadvertidamente la vacuna antirrubeólica, estado de Rio de Janeiro, Brasil, 2001-2002

    Directory of Open Access Journals (Sweden)

    Gloria Regina da Silva e Sá

    2006-06-01

    Full Text Available OBJECTIVES: To analyze postvaccination serological status in pregnant women inadvertently vaccinated against rubella in the state of Rio de Janeiro, Brazil. METHODS: This was a cross-sectional study of pregnant women 15 to 29 years old, vaccinated against rubella and measles from November 2001 to March 2002, who were unaware of their pregnancy at the time of vaccination or who became pregnant within 30 days thereafter. They were tested for rubella-specific immunoglobulin M (IgM and G (IgG and classified as immune (IgM-negative, IgG-positive, tested within 30 days after vaccination, susceptible (IgM-positive after vaccination or indeterminate (IgM-negative, IgG-positive, vaccination- serological testing interval greater than 30 days. RESULTS: Of 2 292 women, 288 (12.6% were susceptible, 316 (13.8% immune, 1 576 (68.8% indeterminate, 8 (0.3% ineligible, and 104 (4.5% lost to follow-up. IgM seropositivity by vaccination-serological testing interval was 16.1% (d" 30 days, 15.4% (30-60 days, and 14.2% (61-90 days. Considering the campaign's target age, the 20-to-24-year age group had the largest proportion of individuals susceptible to rubella (14.8% and represented 42.4% (122/288 of all susceptible women. In 75% of susceptible pregnant women, gestational age was 5 weeks or less at the time of vaccination. CONCLUSIONS: Mass immunization of childbearing-age women was justified on the basis of epidemiological and serological data. Follow-up of vaccinated pregnant women revealed no cases of congenital rubella syndrome due to rubella vaccination. However, the observed rate of congenital infection supports the recommendation to avoid vaccinating pregnant women, and to avoid conception for up to 1 month following rubella vaccination.OBJETIVOS: Analizar el estado serológico de mujeres embarazadas tras haber recibido inadvertidamente la vacuna antirrubeólica, en el estado de Rio de Janeiro, Brasil. MÉTODOS: Se realizó un estudio transversal de mujeres

  1. Environmental Impact Analysis Process Chemical Release Experiment

    National Research Council Canada - National Science Library

    1999-01-01

    The U.S. Air Force proposes to conduct an experiment to identify the potential environmental consequences of an inadvertent release of hydrazine rocket propellant in space, during orbital or suborbital operations...

  2. Extractive waste management: A risk analysis approach.

    Science.gov (United States)

    Mehta, Neha; Dino, Giovanna Antonella; Ajmone-Marsan, Franco; Lasagna, Manuela; Romè, Chiara; De Luca, Domenico Antonio

    2018-05-01

    Abandoned mine sites continue to present serious environmental hazards because the heavy metals associated with extractive waste are continuously released into the environment, where they threaten human life and the environment. Remediating and securing extractive waste are complex, lengthy and costly processes. Thus, in most European countries, a site is considered for intervention when it poses a risk to human health and the surrounding environment. As a consequence, risk analysis presents a viable decisional approach towards the management of extractive waste. To evaluate the effects posed by extractive waste to human health and groundwater, a risk analysis approach was used for an abandoned nickel extraction site in Campello Monti in North Italy. This site is located in the Southern Italian Alps. The area consists of large and voluminous mafic rocks intruded by mantle peridotite. The mining activities in this area have generated extractive waste. A risk analysis of the site was performed using Risk Based Corrective Action (RBCA) guidelines, considering the properties of extractive waste and water for the properties of environmental matrices. The results showed the presence of carcinogenic risk due to arsenic and risks to groundwater due to nickel. The results of the risk analysis form a basic understanding of the current situation at the site, which is affected by extractive waste. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Elemental and Microscopic Analysis of Naturally Occurring C-O-Si Hetero-Fullerene-Like Structures.

    Science.gov (United States)

    Hullavarad, Nilima V; Hullavarad, Shiva S; Fochesatto, Javier

    2015-03-01

    Carbon exhibits an ability to form a wide range of structures in nature. Under favorable conditions, carbon condenses to form hollow, spheroid fullerenes in an inert atmosphere. Using high resolution FESEM, we have concealed the existence of giant hetero-fullerene like structures in the natural form. Clear, distinct features of connected hexagons and pentagons were observed. Energy dispersive X-ray analysis depth-profile of natural fullerene structures indicates that Russian-doll-like configurations composed of C, 0, and Si rings exist in nature. The analysis is based on an outstanding molecular feature found in the size fraction of aerosols having diameters 150 nm to 1.0 µm. The fullerene like structures, which are ~ 150 nm in diameter, are observed in large numbers. To the best of our knowledge, this is the first direct detailed observation of natural fullerene-like structures. This article reports inadvertent observation of naturally occurring hetero-fullerene-like structures in the Arctic.

  4. The Use Of Computational Human Performance Modeling As Task Analysis Tool

    Energy Technology Data Exchange (ETDEWEB)

    Jacuqes Hugo; David Gertman

    2012-07-01

    During a review of the Advanced Test Reactor safety basis at the Idaho National Laboratory, human factors engineers identified ergonomic and human reliability risks involving the inadvertent exposure of a fuel element to the air during manual fuel movement and inspection in the canal. There were clear indications that these risks increased the probability of human error and possible severe physical outcomes to the operator. In response to this concern, a detailed study was conducted to determine the probability of the inadvertent exposure of a fuel element. Due to practical and safety constraints, the task network analysis technique was employed to study the work procedures at the canal. Discrete-event simulation software was used to model the entire procedure as well as the salient physical attributes of the task environment, such as distances walked, the effect of dropped tools, the effect of hazardous body postures, and physical exertion due to strenuous tool handling. The model also allowed analysis of the effect of cognitive processes such as visual perception demands, auditory information and verbal communication. The model made it possible to obtain reliable predictions of operator performance and workload estimates. It was also found that operator workload as well as the probability of human error in the fuel inspection and transfer task were influenced by the concurrent nature of certain phases of the task and the associated demand on cognitive and physical resources. More importantly, it was possible to determine with reasonable accuracy the stages as well as physical locations in the fuel handling task where operators would be most at risk of losing their balance and falling into the canal. The model also provided sufficient information for a human reliability analysis that indicated that the postulated fuel exposure accident was less than credible.

  5. Social instigation and repeated aggressive confrontations in male Swiss mice: analysis of plasma corticosterone, CRF and BDNF levels in limbic brain areas

    Directory of Open Access Journals (Sweden)

    Paula Madeira Fortes

    2017-06-01

    Full Text Available Abstract Introduction: Agonistic behaviors help to ensure survival, provide advantage in competition, and communicate social status. The resident-intruder paradigm, an animal model based on male intraspecific confrontations, can be an ethologically relevant tool to investigate the neurobiology of aggressive behavior. Objectives: To examine behavioral and neurobiological mechanisms of aggressive behavior in male Swiss mice exposed to repeated confrontations in the resident intruder paradigm. Methods: Behavioral analysis was performed in association with measurements of plasma corticosterone of mice repeatedly exposed to a potential rival nearby, but inaccessible (social instigation, or to 10 sessions of social instigation followed by direct aggressive encounters. Moreover, corticotropin-releasing factor (CRF and brain-derived neurotrophic factor (BNDF were measured in the brain of these animals. Control mice were exposed to neither social instigation nor aggressive confrontations. Results: Mice exposed to aggressive confrontations exhibited a similar pattern of species-typical aggressive and non-aggressive behaviors on the first and the last session. Moreover, in contrast to social instigation only, repeated aggressive confrontations promoted an increase in plasma corticosterone. After 10 aggressive confrontation sessions, mice presented a non-significant trend toward reducing hippocampal levels of CRF, which inversely correlated with plasma corticosterone levels. Conversely, repeated sessions of social instigation or aggressive confrontation did not alter BDNF concentrations at the prefrontal cortex and hippocampus. Conclusion: Exposure to repeated episodes of aggressive encounters did not promote habituation over time. Additionally, CRF seems to be involved in physiological responses to social stressors.

  6. PWR core safety analysis with 3-dimensional methods

    International Nuclear Information System (INIS)

    Gensler, A.; Kühnel, K.; Kuch, S.

    2015-01-01

    Highlights: • An overview of AREVA’s safety analysis codes their coupling is provided. • The validation base and licensing applications of these codes are summarized. • Coupled codes and methods provide improved margins and non-conservative results. • Examples for REA and inadvertent opening of the pressurizer safety valve are given. - Abstract: The main focus of safety analysis is to demonstrate the required safety level of the reactor core. Because of the demanding requirements, the quality of the safety analysis strongly affects the confidence in the operational safety of a reactor. To ensure the highest quality, it is essential that the methodology consists of appropriate analysis tools, an extensive validation base, and last but not least highly educated engineers applying the methodology. The sophisticated 3-dimensional core models applied by AREVA ensure that all physical effects relevant for safety are treated and the results are reliable and conservative. Presently AREVA employs SCIENCE, CASMO/NEMO and CASCADE-3D for pressurized water reactors. These codes are currently being consolidated into the next generation 3D code system ARCADIA®. AREVA continuously extends the validation base, including measurement campaigns in test facilities and comparisons of the predictions of steady state and transient measured data gathered from plants during many years of operation. Thus, the core models provide reliable and comprehensive results for a wide range of applications. For the application of these powerful tools, AREVA is taking benefit of its interdisciplinary know-how and international teamwork. Experienced engineers of different technical backgrounds are working together to ensure an appropriate interpretation of the calculation results, uncertainty analysis, along with continuously maintaining and enhancing the quality of the analysis methodologies. In this paper, an overview of AREVA’s broad application experience as well as the broad validation

  7. Benchmark analysis of three main circulation pump sequential trip event at Ignalina NPP

    International Nuclear Information System (INIS)

    Uspuras, E.; Kaliatka, A.; Urbonas, R.

    2001-01-01

    The Ignalina Nuclear Power Plant is a twin-unit with two RBMK-1500 reactors. The primary circuit consists of two symmetrical loops. Eight Main Circulation Pumps (MCPs) at the Ignalina NPP are employed for the coolant water forced circulation through the reactor core. The MCPs are joined in groups of four pumps for each loop (three for normal operation and one on standby). This paper presents the benchmark analysis of three main circulation pump sequential trip event at RBMK-1500 using RELAP5 code. During this event all three MCPs in one circulation loop at Unit 2 Ignalina NPP were tripped one after another, because of inadvertent activation of the fire protection system. The comparison of calculated and measured parameters led us to establish realistic thermal hydraulic characteristics of different main circulation circuit components and to verify the model of drum separators pressure and water level controllers.(author)

  8. Can Anyone Hear Me? Does Anyone See Me? A Qualitative Meta-Analysis of Women's Experiences of Heart Disease.

    Science.gov (United States)

    Galick, Aimee; D'Arrigo-Patrick, Elizabeth; Knudson-Martin, Carmen

    2015-08-01

    Female heart patients are underdiagnosed and undertreated. The purpose of this qualitative meta-data-analysis was to explain how societal expectations related to gender and the treatment environment influence women's experiences and can inform optimal care. The authors used grounded theory methodology and a social constructionist gender lens to analyze 43 studies (1993-2012) of women's experiences of heart disease. The analysis illustrates how social expectations within both medical and relational contexts led to women experiencing barriers to diagnosis and treatment and inadvertent minimization of their experience and knowledge. Women's descriptions of their experiences suggest three kinds of health care strategies that have the potential to increase women's engagement with heart disease treatment and rehabilitation: (a) support give and take in relational connections, (b) identify and acknowledge unique health-promoting behavior, and (c) focus on empowerment. These findings have interdisciplinary implications for practice with women with heart disease. © The Author(s) 2015.

  9. Swimming behavior of zebrafish is accurately classified by direct modeling and behavioral space analysis

    Science.gov (United States)

    Feng, Ruopei; Chemla, Yann; Gruebele, Martin

    Larval zebrafish is a popular organism in the search for the correlation between locomotion behavior and neural pathways because of their highly stereotyped and temporally episodic swimming motion. This correlation is usually investigated using electrophysiological recordings of neural activities in partially immobilized fish. Seeking for a way to study animal behavior without constraints or intruding electrodes, which can in turn modify their behavior, our lab has introduced a parameter-free approach which allows automated classification of the locomotion behaviors of freely swimming fish. We looked into several types of swimming bouts including free swimming and two modes of escape responses and established a new classification of these behaviors. Combined with a neurokinematic model, our analysis showed the capability to probe intrinsic properties of the underlying neural pathways of freely swimming larval zebrafish by inspecting swimming movies only.

  10. Analysis of Swine Leukocyte Antigen Peptide Binding Profiles and the Identification of T cell Epitopes by Tetramer Staining

    DEFF Research Database (Denmark)

    Pedersen, Lasse Eggers

    ) class I molecules, which are highly polymorphic peptide receptors which select and present endogenously derived peptides to circulating CTLs. Peptides that are recognized by CTLs in the context of MHC are epitopes, and represent a small sample of the pathogen proteome, making it possible for the immune...... fingerprint” of an individual can be identified by defining MHC alleles. This is classically called “tissue typing” and is done by analyzing the reactivity of peripheral blood cells with sera unique to MHC alleles. Such knowledge is paramount to analysis of the immune response regarding MHC restriction...... within a species makes immune escape almost impossible for any intruding pathogen. Characterization of the SLA class I and class II gene products and their peptide binding capacity defines the T cell epitopes of any given pathogen proteome. To date the analysis of MHC peptide interactions, strength...

  11. 14 CFR 417.309 - Flight safety system analysis.

    Science.gov (United States)

    2010-01-01

    ... the lowest output power provided by the transmitter system; (iii) Worst-case power loss due to antenna... automatic or inadvertent destruct system; (2) An engine hard-over nozzle induced tumble during each phase of...

  12. Discrimination of source reactor type by multivariate statistical analysis of uranium and plutonium isotopic concentrations in unknown irradiated nuclear fuel material

    Energy Technology Data Exchange (ETDEWEB)

    Robel, Martin [Chemical Sciences Division, Lawrence Livermore National Laboratory, 7000 East Avenue, Livermore, CA 9455 (United States)], E-mail: robel1@llnl.gov; Kristo, Michael J. [Chemical Sciences Division, Lawrence Livermore National Laboratory, 7000 East Avenue, Livermore, CA 9455 (United States)

    2008-11-15

    The problem of identifying the provenance of unknown nuclear material in the environment by multivariate statistical analysis of its uranium and/or plutonium isotopic composition is considered. Such material can be introduced into the environment as a result of nuclear accidents, inadvertent processing losses, illegal dumping of waste, or deliberate trafficking in nuclear materials. Various combinations of reactor type and fuel composition were analyzed using Principal Components Analysis (PCA) and Partial Least Squares Discriminant Analysis (PLSDA) of the concentrations of nine U and Pu isotopes in fuel as a function of burnup. Real-world variation in the concentrations of {sup 234}U and {sup 236}U in the fresh (unirradiated) fuel was incorporated. The U and Pu were also analyzed separately, with results that suggest that, even after reprocessing or environmental fractionation, Pu isotopes can be used to determine both the source reactor type and the initial fuel composition with good discrimination.

  13. Discrimination of source reactor type by multivariate statistical analysis of uranium and plutonium isotopic concentrations in unknown irradiated nuclear fuel material.

    Science.gov (United States)

    Robel, Martin; Kristo, Michael J

    2008-11-01

    The problem of identifying the provenance of unknown nuclear material in the environment by multivariate statistical analysis of its uranium and/or plutonium isotopic composition is considered. Such material can be introduced into the environment as a result of nuclear accidents, inadvertent processing losses, illegal dumping of waste, or deliberate trafficking in nuclear materials. Various combinations of reactor type and fuel composition were analyzed using Principal Components Analysis (PCA) and Partial Least Squares Discriminant Analysis (PLSDA) of the concentrations of nine U and Pu isotopes in fuel as a function of burnup. Real-world variation in the concentrations of (234)U and (236)U in the fresh (unirradiated) fuel was incorporated. The U and Pu were also analyzed separately, with results that suggest that, even after reprocessing or environmental fractionation, Pu isotopes can be used to determine both the source reactor type and the initial fuel composition with good discrimination.

  14. A Policy Analysis and Quantitative Assessment of Key Issues Arising from Climate Change Negotiations Following COP 7

    International Nuclear Information System (INIS)

    Sager, J. M.

    2003-04-01

    This paper aims to assess the consequences of the amendments made to the Kyoto Protocol during COP 7 in Marrakech. Following a comprehensive policy analysis, the major issue of 'hot air' and CDM transaction costs is examined using the CERT model. This was done to show that primary supply regions, typically those with 'hot air' availability, might control the emissions reduction permit supply market and maximise net export revenues of permit supply by withholding 40 to 60% of available 'hot air' credits. The assumption that primary permit suppliers control permit price via a restriction of 'hot air' supply to the market will inadvertently leave a portion of the market share open to Non-Annex B CDM supply, despite potentially extreme variance in CDM transaction costs. A summary table of policy implications on the emissions reduction permit market is also included in the Appendix. (author)

  15. A Policy Analysis and Quantitative Assessment of Key Issues Arising from Climate Change Negotiations Following COP 7

    Energy Technology Data Exchange (ETDEWEB)

    Sager, J. M

    2003-04-01

    This paper aims to assess the consequences of the amendments made to the Kyoto Protocol during COP 7 in Marrakech. Following a comprehensive policy analysis, the major issue of 'hot air' and CDM transaction costs is examined using the CERT model. This was done to show that primary supply regions, typically those with 'hot air' availability, might control the emissions reduction permit supply market and maximise net export revenues of permit supply by withholding 40 to 60% of available 'hot air' credits. The assumption that primary permit suppliers control permit price via a restriction of 'hot air' supply to the market will inadvertently leave a portion of the market share open to Non-Annex B CDM supply, despite potentially extreme variance in CDM transaction costs. A summary table of policy implications on the emissions reduction permit market is also included in the Appendix. (author)

  16. Perimeter Security and Intruder Detection Using Gravity Gradiometry: A Feasibility Study

    Science.gov (United States)

    2011-03-24

    Poisson’s Equation for Gravitational Gradiometry in Free Space [20] Mickus and Hinojosa [23] note the gravitational gradient tensor forms a...L., and Hinojosa , J.H., "The complete gravity gradient tensor derived from the vertical component of gravity: a Fourier transform technique," Journal

  17. Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT)

    Science.gov (United States)

    2016-07-27

    Airman Systems Directorate Warfighter Interface Division Applied Neuroscience Branch Wright-Patterson Air Force Base, OH 45433 AGENCY...Typically, an automated , algorithmic computer program known as an Intrusion Detection System (IDS) is responsible for the initial inspection of network data...rates were varied from 1 to 10 alerts per minute. A SME-provided severity distribution was explored, within which 25 % of alerts were classified as

  18. Similarities between the target and the intruder in naturally-occurring repeated person naming errors

    Directory of Open Access Journals (Sweden)

    Serge eBredart

    2015-09-01

    Full Text Available The present study investigated an intriguing phenomenon that did not receive much attention so far: repeatedly calling a familiar person with someone else’s name. From participants’ responses to a questionnaire, these repeated naming errors were characterized with respect to a number of properties (e.g., type of names being substituted, error frequency, error longevity and different features of similarity (e.g., age, gender, type of relationship with the participant, face resemblance and similarity of the contexts of encounter between the bearer of the target name and the bearer of the wrong name. Moreover, it was evaluated whether the phonological similarity between names, the participants’ age, the difference of age between the two persons whose names were substituted, and face resemblance between the two persons predicted the frequency of error. Regression analyses indicated that phonological similarity between the target name and the wrong name predicted the frequency of repeated person naming errors. The age of the participant was also a significant predictor of error frequency: the older the participant the higher the frequency of errors. Consistent with previous research stressing the importance of the age of acquisition of words on lexical access in speech production, results indicated that bearer of the wrong name was on average known for longer than the bearer of the target name.

  19. The use of isotope techniques to investigate saltwater intruded aquifers in the Philippines

    International Nuclear Information System (INIS)

    Peralta, G.L.

    1988-01-01

    Studies in Metro Manila area have identified inland bodies of saline water which have been called ''connate water''. It has been refered to in literature as saline water occurring inland at a range of depths, in close association with freshwater. The relationships between these various bodies of saline water are not clear and for groundwater development planning it would be useful to determine whether the inland cases are a series of small isolated residual bodies from the last marine transgression or parts of a large continuous saline body. Furthermore the origin and mechanism of natural groundwater recharges are often not clear from the chemical and hydrogeological data as in the island of Cebu. In these circumstances it was recommended that useful planning data be obtained from a study of the concentrations of natural isotopes in the groundwater, particularly in the areas of Manila, Cebu and Bulacan-Pampanga. (author)

  20. Origin of a rhyolite that intruded a geothermal well while drilling at the Krafla volcano, Iceland

    Science.gov (United States)

    Elders, W.A.; Fridleifsson, G.O.; Zierenberg, R.A.; Pope, E.C.; Mortensen, A.K.; Gudmundsson, A.; Lowenstern, J. B.; Marks, N.E.; Owens, L.; Bird, D.K.; Reed, M.; Olsen, N.J.; Schiffman, P.

    2011-01-01

    Magma flowed into an exploratory geothermal well at 2.1 km depth being drilled in the Krafla central volcano in Iceland, creating a unique opportunity to study rhyolite magma in situ in a basaltic environment. The quenched magma is a partly vesicular, sparsely phyric, glass containing ~1.8% of dissolved volatiles. Based on calculated H2O-CO2 saturation pressures, it degassed at a pressure intermediate between hydrostatic and lithostatic, and geothermometry indicates that the crystals in the melt formed at ~900 ??C. The glass shows no signs of hydrothermal alteration, but its hydrogen and oxygen isotopic ratios are much lower than those of typical mantle-derived magmas, indicating that this rhyolite originated by anhydrous mantle-derived magma assimilating partially melted hydrothermally altered basalts. ?? 2011 Geological Society of America.

  1. Strength of Occipital Hair as an Explanation for Pilonidal Sinus Disease Caused by Intruding Hair.

    Science.gov (United States)

    Doll, Dietrich; Bosche, Friederike D; Stauffer, Verena K; Sinicina, Inga; Hoffmann, Sebastian; van der Zypen, Dominic; Luedi, Markus M

    2017-09-01

    Pilonidal sinus disease is thought to be caused by intrusion of hair into healthy skin; loose hair in the intergluteal fold is thought to promote disease. However, compelling evidence to support these postulates is lacking; the cause of pilonidal sinus disease remains uncertain. To determine whether particular properties of hair are associated with susceptibility to pilonidal sinus disease, we compared physical properties of hairs of patients with pilonidal sinus disease with hairs from control subjects who were matched for sex, BMI, and age. This was an experimental study with establishment of a mechanical strength test for single hairs to quantify the maximum vertical force that a hair could exert, following tests of strength of occipital, lumbar, and intergluteal hair. Hair from patients with pilonidal sinus disease and matched control subjects were harvested from patients of the St. Marienhospital Vechta Department of Procto-Surgery. A total of 17 adult patients with pilonidal sinus disease and 217 control subjects were included. ANOVA and intraclass and interclass variations of data gained from mechanical strength tests of occipital, lumbar, and intergluteal hair were included. Vertical hair strength was significantly greater in patients with pilonidal sinus disease. Occipital hair exhibited 20% greater, glabella sacralis 1.1 times greater, and intergluteal hair 2 times greater strength in patients with pilonidal sinus disease than in matched control subjects (all p = 0.0001). In addition, patients with pilonidal sinus disease presented with significantly more hair at the glabella sacralis and in the intergluteal fold. The study was limited by its relatively small number of patients from a specific cohort of European patients. Occipital hair exhibited considerable vertical strength. Because occipital hair exerted the greatest force and cut hair fragments were found in the pilonidal nest in large quantities, these data suggest that pilonidal sinus disease is promoted by occipital hair. See Video Abstract at http://links.lww.com/DCR/A435.

  2. Where is the Frame? : Victims and Intruders in the Belgian Press Coverage of the Asylum Issue

    NARCIS (Netherlands)

    Gorp, B. van

    2005-01-01

    In this article an empirically oriented conceptualization of frames is developed, using the issue of asylum and illegal immigration in the Belgian press as a test case. The methodological focus of this study is on the question of how these frames can be detected in the coverage. How can they be

  3. Playback responses of socially monogamous black-fronted titi monkeys to simulated solitary and paired intruders.

    Science.gov (United States)

    Caselli, Christini B; Mennill, Daniel J; Gestich, Carla C; Setz, Eleonore Z F; Bicca-Marques, Júlio César

    2015-11-01

    Many birds and primates use loud vocalizations to mediate agonistic interactions with conspecifics, either as solos by males or females, or as coordinated duets. The extensive variation in duet complexity, the contribution of each sex, and the context in which duets are produced suggest that duets may serve several functions, including territory and mate defense. Titi monkeys (Callicebus spp.) are believed to defend their home range via solo loud calls or coordinated duets. Yet there are remarkably few experimental studies assessing the function of these calls. Observations of interactions between wild established groups and solitary individuals are rare and, therefore, controlled experiments are required to simulate such situations and evaluate the mate and joint territorial defense hypotheses. We conducted playback experiments with three free-ranging groups of habituated black-fronted titi monkeys (Callicebus nigrifrons) to test these hypotheses. We found that titi monkeys responded to the three conspecific playback treatments (duets, female solos, and male solos) and did not respond to the heterospecific control treatment. The monkeys did not show sex-specific responses to solos (N = 12 trials). Partners started to duet together in 79% of their responses to playback-simulated rivals (N = 14 calls in response to playback). Males started to approach the loudspeaker before females regardless of the type of stimulus. The strength of the response of mated pairs to all three conspecific treatments was similar. Overall, our results are consistent with the idea that black-fronted titi monkeys use their loud calls in intergroup communication as a mechanism of joint territorial defense. © 2015 Wiley Periodicals, Inc.

  4. Hydrogeochemical characterization and groundwater quality assessment in intruded coastal brine aquifers (Laizhou Bay, China).

    Science.gov (United States)

    Zhang, Xiaoying; Miao, Jinjie; Hu, Bill X; Liu, Hongwei; Zhang, Hanxiong; Ma, Zhen

    2017-09-01

    The aquifer in the coastal area of the Laizhou Bay is affected by salinization processes related to intense groundwater exploitation for brine resource and for agriculture irrigation during the last three decades. As a result, the dynamic balances among freshwater, brine, and seawater have been disturbed and the quality of groundwater has deteriorated. To fully understand the groundwater chemical distribution and evolution in the regional aquifers, hydrogeochemical and isotopic studies have been conducted based on the water samples from 102 observation wells. Groundwater levels and salinities in four monitoring wells are as well measured to inspect the general groundwater flow and chemical patterns and seasonal variations. Chemical components such as Na + , K + , Ca 2+ , Mg 2+ , Sr 2+ , Cl - , SO 4 2- , HCO 3 - , NO 3 - , F - , and TDS during the same period are analyzed to explore geochemical evolution, water-rock interactions, sources of salt, nitrate, and fluoride pollution in fresh, brackish, saline, and brine waters. The decreased water levels without typical seasonal variation in the southeast of the study area confirm an over-exploitation of groundwater. The hydrogeochemical characteristics indicate fresh-saline-brine-saline transition pattern from inland to coast where evaporation is a vital factor to control the chemical evolution. The cation exchange processes are occurred at fresh-saline interfaces of mixtures along the hydraulic gradient. Meanwhile, isotopic data indicate that the brine in aquifers was either originated from older meteoric water with mineral dissolution and evaporation or repeatedly evaporation of retained seawater with fresher water recharge and mixing in geological time. Groundwater suitability for drinking is further evaluated according to water quality standard of China. Results reveal high risks of nitrate and fluoride contamination. The elevated nitrate concentration of 560 mg/L, which as high as 28 times of the standard content in drinking water is identified in the south region. In addition, the nitrate and ammonia data of the Wei River suggests decreasing nitrification rate in the study area from inland to estuary. High fluoride concentration, larger than 1 mg/L, is also detected in an area of about 50% of the study region. The saltwater intrusion is analyzed to be responsible for part of dissolution of minerals containing fluoride. Therefore, water treatment before drinking is needed in urgent to reduce the health expose risk.

  5. 'No entry', an invitation to intrude, or both? Reflections on a group of anorexic patients.

    Science.gov (United States)

    Stern, Julian M

    2013-08-01

    This paper describes the twice-weekly psychoanalytic psychotherapy of a young woman who had undergone major bowel surgery in her early 20s, with no clear medical indication for the surgery. Whilst the concept of 'No Entry' described by Williams (, b) aptly describes many features of more 'typical' anorexic patients, this paper describes a particular group of anorexic patients, referred by their physicians for multiple medical procedures; and proposes there is a group of anorexic patients, repeatedly referred for medical investigations, into whom particular types of entries occur. These are entries into the body 'legitimized' as medical, with a trajectory towards multiple procedures, examinations and surgical operations. Other entries (outside the medical setting) may occur in a state of altered consciousness, under the influence of alcohol or drugs, such that any wish for intrusion is disowned and denied. In both sets of events, intrusion is both invited, and consciously denied. The case example illuminates some of these features, and aspects of the countertransference are also described. Attention is drawn to relevant research focusing on surgical intrusion. Finally, there is an exploration as to how such patients may invite intrusions into the body through surgery and medical procedures. Copyright © 2013 Institute of Psychoanalysis.

  6. Post mitigation impact risk analysis for asteroid deflection demonstration missions

    Science.gov (United States)

    Eggl, Siegfried; Hestroffer, Daniel; Thuillot, William; Bancelin, David; Cano, Juan L.; Cichocki, Filippo

    2015-08-01

    Even though mankind believes to have the capabilities to avert potentially disastrous asteroid impacts, only the realization of mitigation demonstration missions can validate this claim. Such a deflection demonstration attempt has to be cost effective, easy to validate, and safe in the sense that harmless asteroids must not be turned into potentially hazardous objects. Uncertainties in an asteroid's orbital and physical parameters as well as those additionally introduced during a mitigation attempt necessitate an in depth analysis of deflection mission designs in order to dispel planetary safety concerns. We present a post mitigation impact risk analysis of a list of potential kinetic impactor based deflection demonstration missions proposed in the framework of the NEOShield project. Our results confirm that mitigation induced uncertainties have a significant influence on the deflection outcome. Those cannot be neglected in post deflection impact risk studies. We show, furthermore, that deflection missions have to be assessed on an individual basis in order to ensure that asteroids are not inadvertently transported closer to the Earth at a later date. Finally, we present viable targets and mission designs for a kinetic impactor test to be launched between the years 2025 and 2032.

  7. E AREA LOW LEVEL WASTE FACILITY DOE 435.1 PERFORMANCE ASSESSMENT

    Energy Technology Data Exchange (ETDEWEB)

    Wilhite, E

    2008-03-31

    , situated immediately north of the Mixed Waste Management Facility. The E-Area Low-Level Waste Facility is comprised of 200 acres for waste disposal and a surrounding buffer zone that extends out to the 100-m point of compliance. Disposal units within the footprint of the low-level waste facilities include the Slit Trenches, Engineered Trenches, Component-in-Grout Trenches, the Low-Activity Waste Vault, the Intermediate-Level Vault, and the Naval Reactor Component Disposal Area. Radiological waste disposal operations at the E-Area Low-Level Waste Facility began in 1994. E-Area Low-Level Waste Facility closure will be conducted in three phases: operational closure, interim closure, and final closure. Operational closure will be conducted during the 25-year operation period (30-year period for Slit and Engineered Trenches) as disposal units are filled; interim closure measures will be taken for some units. Interim closure will take place following the end of operations and will consist of an area-wide runoff cover along with additional grading over the trench units. Final closure of all disposal units in the E-Area Low-Level Waste Facility will take place at the end of the 100-year institutional control period and will consist of the installation of an integrated closure system designed to minimize moisture contact with the waste and to serve as a deterrent to intruders. Radiological dose to human receptors is analyzed in this PA in the all-pathways analysis, the inadvertent intruder analysis and the air pathway analysis, and the results are compared to the relevant performance measures. For the all-pathways analysis, the performance measure of relevance is a 25-mrem/yr EDE to representative members of the public, excluding dose from radon and its progeny in air. For the inadvertent intruder, the applicable performance measures are 100-mrem/yr EDE and 500 mrem/yr EDE for chronic and exposure scenarios, respectively. The relevant performance measure for the air pathway is 10

  8. The greenhouse theory of climate change - A test by an inadvertent global experiment

    Science.gov (United States)

    Ramanathan, V.

    1988-01-01

    The greenhouse theory of climate change has reached the crucial stage of verification. Surface warming as large as that predicted by models would be unprecedented during an interglacial period such as the present. The theory, its scope for verification, and the emerging complexities of the climate feedback mechanisms are discussed in this paper. The evidence for change is described and competing nonclimatic forcings are discussed.

  9. Vessel biofouling as an inadvertent vector of benthic invertebrates occurring in Brazil.

    Science.gov (United States)

    Farrapeira, Cristiane Maria Rocha; Tenório, Deusinete de Oliveira; Amaral, Fernanda Duarte do

    2011-04-01

    This article reviews the literature involving benthic invertebrates that are cited in association with hull fouling, reporting the species that occur on the Brazilian coast and evaluating the importance of this vector for the introduction of nonindigenous and cryptogenic invertebrates in Brazil. It discusses some of the strategies that were used by the species that allowed for their overseas transport and made it easier to cross natural barriers that otherwise would have been obstacles to their dispersion. The compiled data list 343 species (65% nonindigenous and 35% cryptogenic), mainly from the northwestern Atlantic Ocean. The traveling fauna, composed mostly of cosmopolitan species (70.3%), is primarily euryhaline and marine stenohaline, with sessile and sedentary habits. After delineating the shipborne species' ecological profiles and traveling strategies and evaluating their overlapping vectors, we concluded that hull vessels were the main vector of introduction to the Brazilian coast for 89.8% of the compiled species. Copyright © 2010 Elsevier Ltd. All rights reserved.

  10. MRI findings in 6 cases of children by inadvertent ingestion of diphenoxylate-atropine

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Lianxiang [Shandong University School of Medicine, Shandong Medical Imaging Research Institute , No. 44 West Wenhua Road, Jinan 250012 (China); Lin Xiangtao, E-mail: yishui1982@126.com [Shandong University School of Medicine, Shandong Medical Imaging Research Institute, No. 44 West Wenhua Road, Jinan 250012 (China); Cao Jinfeng [Shandong University School of Medicine, Shandong Medical Imaging Research Institute , No. 44 West Wenhua Road, Jinan 250012 (China); Wang Xueyu [Division of Pediatrics, Shandong Provincial Hospital, Shandong University, No. 324 Jingwu Road, Jinan 250021 (China); Wu Lebin [Shandong Medical Imaging Research Institute, No. 324 Jingwu Road, Jinan 250021 (China)

    2011-09-15

    Purpose: Compound diphenoxylate (diphenoxylate-atropine) poisoning can cause toxic encephalopathy in children, and magnetic resonance imaging (MRI) of the brain in this condition has not been reported. This study is to analyze brain MRI findings and to investigate the relations between MRI features and possible pathophysiological changes in children. Methods: Six children accidentally swallowed compound diphenoxylate, 4 males, 2 females, aged 20-46 months, average 33 months. Quantity of ingested diphenoxylate-atropine was from 6 to 30 tablets, each tablet contains diphenoxylate 2.5 mg and atropine 0.025 mg. These patients were referred to our hospital within 24 h after diphenoxylate-atropine ingestion, and underwent brain MRI scan within 24-72 h after emergency treatment. The characteristics of conventional MRI were analyzed. Results: These pediatric patients had various symptoms of opioid intoxication and atropine toxicity. Brain MRI showed abnormal low signal intensity on T1-weighted images (T1WI) and abnormal high signal intensity on T2-weighted images (T2WI) and fluid-attenuated inversion recovery (FLAIR) imaging in bilateral in all cases; abnormal high signal intensity on T1WI, T2WI and FLAIR in 4 cases. Encephalomalacia was observed in 3 cases during follow-up. Conclusion: In the early stage of compound diphenoxylate poisoning in children, multiple extensive edema-necrosis and hemorrhagic-necrosis focus were observed in basic nucleus, pallium and cerebellum, these resulted in the corresponding brain dysfunction with encephalomalacia. MRI scan in the early stage in this condition may provide evidences of brain impairment, and is beneficial for the early diagnosis, treatment and prognosis assessment.

  11. Lethal Consequences in an Infant with Myelomeningocele Following an Inadvertent Treatment

    Directory of Open Access Journals (Sweden)

    Xuemei Wu

    2016-01-01

    Full Text Available Myelomeningocele (MMC is a protrusion of spinal cord contents and meninges through a vertebral defect. Iatrogenic deaths of patients with MMC are rarely encountered in forensic practice. In our case, a 3-month-old female was born with a lumbosacral cyst, the size of which had been increasing gradually over age. There was no neurological, orthopedic, or urologic dysfunction. On the day of her death, she received a repetitive and rapid lumbosacral cyst puncture drainage procedure, performed by an illegal medical practitioner. Postmortem autopsy findings confirmed a diagnosis of MMC and the cause of death to be cerebellar tonsillar herniation. This is a pathetic case of preventable infant death. This report suggests that the possibility of MMC should be considered in infants born with a lumbosacral cyst, and aspiration is inadvisable. Besides, forensic autopsy has a valuable role in determining the exact cause of death, identifying, or excluding iatrogenic factors that may be relevant to death following a medical procedure. A final point is that prevention programs should be developed, especially by the health care sectors to reduce such tragedy.

  12. Inadvertently programmed bits in Samsung 128 Mbit flash devices: a flaky investigation

    Science.gov (United States)

    Swift, G.

    2002-01-01

    JPL's X2000 avionics design pioneers new territory by specifying a non-volatile memory (NVM) board based on flash memories. The Samsung 128Mb device chosen was found to demonstrate bit errors (mostly program disturbs) and block-erase failures that increase with cycling. Low temperature, certain pseudo- random patterns, and, probably, higher bias increase the observable bit errors. An experiment was conducted to determine the wearout dependence of the bit errors to 100k cycles at cold temperature using flight-lot devices (some pre-irradiated). The results show an exponential growth rate, a wide part-to-part variation, and some annealing behavior.

  13. Aligned Incentives: Could the Army’s Award System Inadvertently be Hindering Counterinsurgency Operations

    Science.gov (United States)

    2009-06-01

    OIF) 5 0 1 1 1 7 Perkins, David G. - (OIF) 6 0 1 3 Peters, Steven - (OIF) 5 0 1 7 Petithory, Daniel Henry - (OEF...Shanaberger, Wentz Jerome Henry , III - (OIF) 7 0 1 1 1 4 Sheetz, Brian M. - (OIF) 4 0 1 1 6 Sims, Sean P. - (OIF) 3 0 1 1...0 Dec-07 0 0 0 Coffman James 1 6 0 1 DSC 1 1 Nov-04 0 1 0 Copeland Willie 1 5 0 1 NC 1 0 Apr-04 0 0 0 Corbin Todd 1

  14. Inadvertent BSA-induced elution of IgE in the BSA-RAST

    NARCIS (Netherlands)

    Kleine Budde, I.; de Heer, P. G.; Stapel, S. O.; van der Zee, J. S.; Aalberse, R. C.

    2001-01-01

    Bovine serum albumin (BSA) is widely used to block nonspecific binding in immunochemical assays. Whereas a previous study had indicated that soluble allergen present during the incubation with anti-IgE in the RAST did not affect bound IgE, we reinvestigated this in the current study, using IgE

  15. Amodiaquine-associated adverse effects after inadvertent overdose and after a standard therapeutic dose

    DEFF Research Database (Denmark)

    Adjei, G O; Goka, B Q; Rodrigues, O P

    2009-01-01

    A case of an acute dystonic reaction in a child presumptively treated for malaria with amodiaquine, and a case of persistent asymptomatic bradycardia in another child with mild pulmonary stenosis treated with a standard dose of amodiaquine for parasitologically confirmed uncomplicated malaria, is...

  16. Inadvertent exposure to organochlorine pesticides DDT and derivatives in people from the Canary Islands (Spain)

    International Nuclear Information System (INIS)

    Zumbado, Manuel; Goethals, Muriel; Alvarez-Leon, Eva E.; Luzardo, Octavio P.; Cabrera, Felix; Serra-Majem, Lluis; Dominguez-Boada, Luis

    2005-01-01

    In 1998, one of the largest determinations of organochlorine pesticides in a representative sample of a Spanish population (682 serum samples from the Canary Islands) was made in the context of the 'Canary Islands Nutrition Survey' (ENCA). In the Canary Islands, extensive farming areas have been developed in these last decades, with greenhouses dedicated to intensive cultivation using DDT in huge amounts. In Spain, similarly to other European countries, DDT was banned in the late 1970s. The pesticide residues in human serum are indicative of past and present exposure to them. Our objective is to point out the differences of pesticide contamination between islands; and together with this, if a connection could be established with gender, age, or habitat of subjects. Concentration of selected persistent organochlorine pollutants (p,p'-DDT, o,p'-DDT, p,p'-DDE, o,p'-DDE, p,p'-DDD, and o,p'-DDD) was measured with gas chromatography-electron capture detector. Almost all of the samples (99.3%) presented detectable levels of some DDT-derivatives, being p,p'-DDE the most frequently detected organochlorine. The median concentration of total DDT body burden, expressed in ng/g fat, present in the Canary Islands (370 ng/g fat) was similar to that found in other European countries, although it was noteworthy that a fourth of the population showed a total DDT body burden higher than 715 ng/g. Interestingly, statistical significant differences were found in serum levels of organochlorine pesticides between islands, being these levels higher in people from Tenerife and Gran Canaria (415 and 612 ng/g fat, respectively), the islands that present both highest population and highest surface devoted to intensive agriculture. As expected, serum levels of both total DDT body burden and p,p'-DDE increased with age. Statistically significant differences were also found in relation to gender, women showing higher levels of these organochlorine pesticides than men. One of the most relevant findings of this work is the presence of a very high DDT/DDE ratio in people from the Canary Islands, thus indicating a chronic exposure to DDT that persists nowadays. DDT and its derivatives are considered as xenoestrogens, and they have been linked to breast cancer. Having into account that the Canary Islands present high incidence and mortality for breast cancer, our results point to the possibility that these environmental contaminants may be playing a determining role that must be investigated in detail. The high levels of DDT and its derivatives in serum from people living in this Archipelago should be considered a matter of public health concern

  17. Inadvertent shipment of a radiographic source from Korea to Amersham Corporation, Burlington, Massachusetts

    International Nuclear Information System (INIS)

    1990-05-01

    Amersham Corporation, Burlington, Massachusetts, a licensee of the US Nuclear Regulatory Commission (NRC), authorized to manufacture and distribute iridium-192 and cobalt-60 source assemblies for use in radiography equipment, received a shipment of 14 source changer son March 8, 1990, that were being returned from their product distributor, NDI Corporation in Seoul, Korea. One source changer contained a small sealed source in an unshielded location. Amersham employees retrieved the source, secured it in a hot cell, and notified NRC's Region I. Subsequently, NRC dispatched an Incident Investigation Team to perform a comprehensive review of this incident and determine the potential for exposure to those who handled the source changer and to members of the general public. This report describes the incident and the methodology used in the investigation and presents the Team's findings and conclusions

  18. Clenbuterol - regional food contamination a possible source for inadvertent doping in sports.

    Science.gov (United States)

    Guddat, S; Fußhöller, G; Geyer, H; Thomas, A; Braun, H; Haenelt, N; Schwenke, A; Klose, C; Thevis, M; Schänzer, W

    2012-06-01

    The misuse of the sympathomimetic and anabolic agent clenbuterol has been frequently reported in professional sport and in the livestock industry. In 2010, a team of athletes returned from competition in China and regular doping control samples were taken within the next two days. All urine samples contained low amounts (pg/ml) of clenbuterol, drawing the attention to a well-known problem: the possibility of an unintended clenbuterol intake with food. A warning that Chinese meat is possibly contaminated with prohibited substances according to international anti-doping regulations was also given by Chinese officials just before the Bejing Olympic Games in 2008. To investigate if clenbuterol can be found in human urine, a study was initiated comprising 28 volunteers collecting urine samples after their return from China. For the quantification of clenbuterol at a low pg/ml level, a very sensitive and specific isotope dilution liquid chromatography-tandem mass spectrometry (LC-MS/MS) assay was developed using liquid/liquid re-extraction for clean-up with a limit of detection and quantification of 1 and 3 pg/ml, respectively. The method was validated demonstrating good precision (intra-day: 2.9-5.5 %; inter-day: 5.1-8.8%), accuracy (89.5-102.5%) and mean recovery (81.4%). Clenbuterol was detectable in 22 (79%) of the analyzed samples, indicating a general food contamination problem despite an official clenbuterol prohibition in China for livestock. Copyright © 2012 John Wiley & Sons, Ltd.

  19. Globalisation, Mergers and "Inadvertent Multi-Campus Universities": Reflections from Wales

    Science.gov (United States)

    Zeeman, Nadine; Benneworth, Paul

    2017-01-01

    Multi-site universities face the challenge of integrating campuses that may have different profiles and orientations arising from place-specific attachments. Multi-campus universities created via mergers seeking to ensure long-term financial sustainability, and increasing their attractiveness to students, create a tension in campuses' purposes. We…

  20. Skills Training to Avoid Inadvertent Plagiarism: Results from a Randomised Control Study

    Science.gov (United States)

    Newton, Fiona J.; Wright, Jill D.; Newton, Joshua D.

    2014-01-01

    Plagiarism continues to be a concern within academic institutions. The current study utilised a randomised control trial of 137 new entry tertiary students to assess the efficacy of a scalable short training session on paraphrasing, patch writing and plagiarism. The results indicate that the training significantly enhanced students' overall…

  1. Ecological Automation Design, Extending Work Domain Analysis

    NARCIS (Netherlands)

    Amelink, M.H.J.

    2010-01-01

    In high–risk domains like aviation, medicine and nuclear power plant control, automation has enabled new capabilities, increased the economy of operation and has greatly contributed to safety. However, automation increases the number of couplings in a system, which can inadvertently lead to more

  2. Rotating machinery vibration: from analysis to troubleshooting

    National Research Council Canada - National Science Library

    Adams, Maurice L

    2001-01-01

    .... Elemer Makay shortly after his arrival at the Franklin Institute Research Laboratories (FIRL) in 1969, at which time he was starting a new section called Rotating Machinery. I had been at FIRL (Philadelphia) for only two years, so we both had at least one thing in common- we were both recent "intruders" into this high-pressure dog-eat-dog organiza...

  3. A meta-analysis of executive components of working memory.

    Science.gov (United States)

    Nee, Derek Evan; Brown, Joshua W; Askren, Mary K; Berman, Marc G; Demiralp, Emre; Krawitz, Adam; Jonides, John

    2013-02-01

    Working memory (WM) enables the online maintenance and manipulation of information and is central to intelligent cognitive functioning. Much research has investigated executive processes of WM in order to understand the operations that make WM "work." However, there is yet little consensus regarding how executive processes of WM are organized. Here, we used quantitative meta-analysis to summarize data from 36 experiments that examined executive processes of WM. Experiments were categorized into 4 component functions central to WM: protecting WM from external distraction (distractor resistance), preventing irrelevant memories from intruding into WM (intrusion resistance), shifting attention within WM (shifting), and updating the contents of WM (updating). Data were also sorted by content (verbal, spatial, object). Meta-analytic results suggested that rather than dissociating into distinct functions, 2 separate frontal regions were recruited across diverse executive demands. One region was located dorsally in the caudal superior frontal sulcus and was especially sensitive to spatial content. The other was located laterally in the midlateral prefrontal cortex and showed sensitivity to nonspatial content. We propose that dorsal-"where"/ventral-"what" frameworks that have been applied to WM maintenance also apply to executive processes of WM. Hence, WM can largely be simplified to a dual selection model.

  4. Reflections on the glass ceiling: women in the experimental analysis of behavior.

    Science.gov (United States)

    Odum, A L

    2000-01-01

    McSweeney and Swindell (1998) sought to determine whether men and women are treated equitably in the experimental analysis of behavior. They purported to show that women participate less in the Journal of the Experimental Analysis of Behavior than in similar journals and that the participation of women decreases with increases in selectivity. Their data were difficult to interpret, however, because they did not present the variability in the mean data drawn from different individuals over time. My analyses were not in accord with their conclusions. When the percentage of associate editors who are women was considered along with the mean percentages McSweeney and Swindell reported for other measures, participation did not systematically decrease with increases in selectivity in recent years. As quantified in terms of their number of publications in the Journal of the Experimental Analysis of Behavior, women who were editorial board members and associate editors were not more highly selected than their male counterparts. Finally, in the recent period from 1996 to 1998, although women submitted fewer manuscripts to the journal, rejection ratios did not differ for men and women. Efforts to increase the participation of women in the experimental analysis of behavior may best be directed toward recruitment and retention rather than some of the suggestions proposed by McSweeney and Swindell (1998), which could inadvertently create different standards for women's work.

  5. LCA data quality: sensitivity and uncertainty analysis.

    Science.gov (United States)

    Guo, M; Murphy, R J

    2012-10-01

    Life cycle assessment (LCA) data quality issues were investigated by using case studies on products from starch-polyvinyl alcohol based biopolymers and petrochemical alternatives. The time horizon chosen for the characterization models was shown to be an important sensitive parameter for the environmental profiles of all the polymers. In the global warming potential and the toxicity potential categories the comparison between biopolymers and petrochemical counterparts altered as the time horizon extended from 20 years to infinite time. These case studies demonstrated that the use of a single time horizon provide only one perspective on the LCA outcomes which could introduce an inadvertent bias into LCA outcomes especially in toxicity impact categories and thus dynamic LCA characterization models with varying time horizons are recommended as a measure of the robustness for LCAs especially comparative assessments. This study also presents an approach to integrate statistical methods into LCA models for analyzing uncertainty in industrial and computer-simulated datasets. We calibrated probabilities for the LCA outcomes for biopolymer products arising from uncertainty in the inventory and from data variation characteristics this has enabled assigning confidence to the LCIA outcomes in specific impact categories for the biopolymer vs. petrochemical polymer comparisons undertaken. Uncertainty combined with the sensitivity analysis carried out in this study has led to a transparent increase in confidence in the LCA findings. We conclude that LCAs lacking explicit interpretation of the degree of uncertainty and sensitivities are of limited value as robust evidence for decision making or comparative assertions. Copyright © 2012 Elsevier B.V. All rights reserved.

  6. Special Analysis of Transuranic Waste in Trench T04C at the Area 5 Radioactive Waste Management Site, Nevada Test Site, Nye County, Nevada, Revision 1

    International Nuclear Information System (INIS)

    Greg Shott; Vefa Yucel; Lloyd Desotell

    2008-01-01

    This Special Analysis (SA) was prepared to assess the potential impact of inadvertent disposal of a limited quantity of transuranic (TRU) waste in classified Trench 4 (T04C) within the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada Test Site (NTS). The Area 5 RWMS is a low-level radioactive waste disposal site in northern Frenchman Flat on the Nevada Test Site (NTS). The Area 5 RWMS is regulated by the U.S. Department of Energy (DOE) under DOE Order 435.1 and DOE Manual (DOE M) 435.1-1. The primary objective of the SA is to evaluate if inadvertent disposal of limited quantities of TRU waste in a shallow land burial trench at the Area 5 RWMS is in compliance with the existing, approved Disposal Authorization Statement (DAS) issued under DOE M 435.1-1. In addition, supplemental analyses are performed to determine if there is reasonable assurance that the requirements of Title 40, Code of Federal Regulations (CFR), Part 191, Environmental Radiation Protection Standards for Management and Disposal of Spent Nuclear Fuel, High-Level, and Transuranic Radioactive Wastes, can be met. The 40 CFR 191 analyses provide supplemental information regarding the risk to human health and the environment of leaving the TRU waste in T04C. In 1989, waste management personnel reviewing classified materials records discovered that classified materials buried in trench T04C at the Area 5 RWMS contained TRU waste. Subsequent investigations determined that a total of 102 55-gallon drums of TRU waste from Rocky Flats were buried in trench T04C in 1986. The disposal was inadvertent because unclassified records accompanying the shipment indicated that the waste was low-level. The exact location of the TRU waste in T04C was not recorded and is currently unknown. Under DOE M 435.1-1, Chapter IV, Section P.5, low-level waste disposal facilities must obtain a DAS. The DAS specifies conditions that must be met to operate within the radioactive waste management basis, consisting of a

  7. Special Analysis of Transuranic Waste in Trench T04C at the Area 5 Radioactive Waste Management Site, Nevada Test Site, Nye County, Nevada, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Greg Shott, Vefa Yucel, Lloyd Desotell

    2008-05-01

    This Special Analysis (SA) was prepared to assess the potential impact of inadvertent disposal of a limited quantity of transuranic (TRU) waste in classified Trench 4 (T04C) within the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada Test Site (NTS). The Area 5 RWMS is a low-level radioactive waste disposal site in northern Frenchman Flat on the Nevada Test Site (NTS). The Area 5 RWMS is regulated by the U.S. Department of Energy (DOE) under DOE Order 435.1 and DOE Manual (DOE M) 435.1-1. The primary objective of the SA is to evaluate if inadvertent disposal of limited quantities of TRU waste in a shallow land burial trench at the Area 5 RWMS is in compliance with the existing, approved Disposal Authorization Statement (DAS) issued under DOE M 435.1-1. In addition, supplemental analyses are performed to determine if there is reasonable assurance that the requirements of Title 40, Code of Federal Regulations (CFR), Part 191, Environmental Radiation Protection Standards for Management and Disposal of Spent Nuclear Fuel, High-Level, and Transuranic Radioactive Wastes, can be met. The 40 CFR 191 analyses provide supplemental information regarding the risk to human health and the environment of leaving the TRU waste in T04C. In 1989, waste management personnel reviewing classified materials records discovered that classified materials buried in trench T04C at the Area 5 RWMS contained TRU waste. Subsequent investigations determined that a total of 102 55-gallon drums of TRU waste from Rocky Flats were buried in trench T04C in 1986. The disposal was inadvertent because unclassified records accompanying the shipment indicated that the waste was low-level. The exact location of the TRU waste in T04C was not recorded and is currently unknown. Under DOE M 435.1-1, Chapter IV, Section P.5, low-level waste disposal facilities must obtain a DAS. The DAS specifies conditions that must be met to operate within the radioactive waste management basis, consisting of a

  8. Pertinent anatomy and analysis for midface volumizing procedures.

    Science.gov (United States)

    Surek, Christopher C; Beut, Javier; Stephens, Robert; Jelks, Glenn; Lamb, Jerome

    2015-05-01

    The study was conducted to construct an anatomically inspired midfacial analysis facilitating safe, accurate, and dynamic nonsurgical rejuvenation. Emphasis is placed on determining injection target areas and adverse event zones. Twelve hemifacial fresh cadavers were dissected in a layered fashion. Dimensional measurements between the midfacial fat compartments, prezygomatic space, mimetic muscles, and neurovascular bundles were used to develop a topographic analysis for clinical injections. A longitudinal line from the base of the alar crease to the medial edge of the levator anguli oris muscle (1.9 cm), lateral edge of the levator anguli oris muscle (2.6 cm), and zygomaticus major muscle (4.6 cm) partitions the cheek into two aesthetic regions. A six-step facial analysis outlines three target zones and two adverse event zones and triangulates the point of maximum cheek projection. The lower adverse event zone yields an anatomical explanation to inadvertent jowling during anterior cheek injection. The upper adverse event zone localizes the palpebral branch of the infraorbital artery. The medial malar target area isolates quadrants for anterior cheek projection and tear trough effacement. The middle malar target area addresses lid-cheek blending and superficial compartment turgor. The lateral malar target area highlights lateral cheek projection and locates the prezygomatic space. This stepwise analysis illustrates target areas and adverse event zones to achieve midfacial support, contour, and profile in the repose position and simultaneous molding of a natural shape during animation. This reproducible method can be used both procedurally and in record-keeping for midface volumizing procedures.

  9. PHYSICS AND SAFETY ANALYSIS FOR THE NIST RESEARCH REACTOR

    International Nuclear Information System (INIS)

    CHENG, L.; HANSON, A.; DIAMOND, D.; XU, J.; CAREW, J.; RORER, D.

    2004-01-01

    Detailed reactor physics and safety analyses have been performed for the 20 MW D 2 O moderated research reactor (NBSR) at the National Institute of Standards and Technology (NIST). The analyses provide an update to the Final Safety Analysis Report (FSAR) and employ state-of-the-art calculational methods. Three-dimensional Monte Carlo neutron and photon transport calculations were performed with the MCNP code to determine the safety parameters for the NBSR. The core depletion and determination of the fuel compositions were performed with MONTEBURNS. MCNP calculations were performed to determine the beginning, middle, and end-of-cycle power distributions, moderator temperature coefficient, and shim safety arm, beam tube and void reactivity worths. The calculational model included a plate-by-plate description of each fuel assembly, axial mid-plane water gap, beam tubes and the tubular geometry of the shim safety arms. The time-dependent analysis of the primary loop was determined with a RELAP5 transient analysis model that includes the pump, heat exchanger, fuel element geometry, and flow channels for both the six inner and twenty-four outer fuel elements. The statistical analysis used to assure protection from critical heat flux (CHF) was performed using a Monte Carlo simulation of the uncertainties contributing to the CHF calculation. The power distributions used to determine the local fuel conditions and margin to CHF were determined with MCNP. Evaluations were performed for the following accidents: (1) the control rod withdrawal startup accident, (2) the maximum reactivity insertion accident, (3) loss-of-flow resulting from loss of electrical power, (4) loss-of-flow resulting from a primary pump seizure, (5) loss-of-flow resulting from inadvertent throttling of a flow control valve, (6) loss-of-flow resulting from failure of both shutdown cooling pumps and (7) misloading of a fuel element. In both the startup and maximum reactivity insertion accidents, the core

  10. FT4 Data Analysis Summary (SSI-ARC)

    Science.gov (United States)

    Isaacson, Douglas R.; Gong, Chester; Reardon, Scott Edward; Santiago, Confesor

    2016-01-01

    Standards for Unmanned Aircraft System (UAS) Detect-and-Avoid (DAA) systems are currently being developed under the auspices of the RTCA Special Committee 228 (SC-228). To support the development of these standards, a series of flight tests has been conducted at NASAs Armstrong Flight Research Center (NASA-AFRC). The fourth in this series of flight test activities (Flight Test 4, or simply FT4) was conducted during the Spring and Summer of 2016. FT4 supported the objectives of numerous organizations working toward UAS DAA Minimum Operational Performance Standards (MOPS) and UAS DAA Radar MOPS. The summary provided herein is limited to the objectives, analysis and conclusions of the NASA Ames Research Center (NASA-ARC) SSI team toward the refinement of UAS DAA MOPS. This document provides a high-level overview of FT4 and the SSI-ARC objectives, a summary of the data analysis methodology and recommendations for UAS DAA MOPS refinements based on the data analysis results. A total of 72 encounters were flown to support SSI-ARC objectives. Test results were generally consistent with acceptable UAS DAA system performance and will be considered in broader SC-228 requirements validation efforts. Observed alert lead times indicated acceptable UAS DAA alerting performance. Effective interoperability between the UAS DAA system and the Traffic Alert and Collision Avoidance System (TCAS) was observed with one notable exception: TCAS Resolutions Advisories (RA) were observed in the absence of any DAA alert on two occasions, indicating the need for alert parameter refinement. Findings further indicated the need for continued work in the areas of DAA Well Clear Recovery logic and alert stability for Mode-C-only intruders. Finally, results demonstrated a high level of compliance with a set of evaluation criteria designed to provide anecdotal evidence of acceptable UAS DAA system performance.

  11. A critical analysis of Child and Adolescent Mental Health Services policy in England.

    Science.gov (United States)

    Callaghan, Jane Em; Fellin, Lisa Chiara; Warner-Gale, Fiona

    2017-01-01

    Policy on Child and Adolescent Mental Health Services (CAMHS) in England has undergone radical changes in the last 15 years, with far reaching implications for funding models, access to services and service delivery. Using corpus analysis and critical discourse analysis, we explore how childhood, mental health and CAMHS are constituted in 15 policy documents, 9 pre-2010 and 6 post-2010. We trace how these constructions have changed over time and consider the practice implications of these changes. We identify how children's distress is individualised, through medicalising discourses and shifting understandings of the relationship between socio-economic context and mental health. This is evidenced in a shift from seeing children's mental health challenges as produced by social and economic inequities to a view that children's mental health must be addressed early to prevent future socio-economic burden. We consider the implications of CAMHS policies for the relationship between children, families, mental health services and the state. The article concludes by exploring how concepts of 'parity of esteem' and 'stigma reduction' may inadvertently exacerbate the individualisation of children's mental health.

  12. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  13. DOE's performance evaluation project for mixed low-level waste disposal

    International Nuclear Information System (INIS)

    Waters, R.D.; Chu, M.S.Y.; Gruebel, M.M.; Lee, D.W.

    1995-01-01

    A performance evaluation (PE) is an analysis that estimates radionuclide concentration limits for 16 potential Department of Energy (DOE) mixed low-level waste (ULLW) disposal sites based on the analysis of two environmental exposure pathways (air and water) to an off-site individual and an inadvertent-intruder exposure pathway. Sites are analyzed for their ability to attenuate concentrations of specific radionuclides that could be released from wastes in a hypothetical ULLW disposal facility. Site-specific data and knowledge are used within a generic framework that is consistent across all sites being evaluated. After estimates of waste concentrations for the three pathways are calculated, the minimum of the waste concentration values is selected as the permissible waste concentration for each radionuclide. The PE results will be used as input to the process for DOE's ULLW disposal configuration. Preliminary comparisons of results from the PE and site-specific performance assessments indicate that the simple PE results generally agree with results of the performance assessments, even when site conditions are complex. This agreement with performance-assessment results increases confidence that similar results can be obtained at other sites that have good characterization data. In addition, the simple analyses contained in the PE illustrate a potential method to satisfy the needs of many regulators and the general public for a simple, conservative, defensible, and easily understandable analysis that provides results similar to those of more complex analyses

  14. X-ray Tomographic Analysis of Porosity Distributions in Gas Diffusion Layers of Proton Exchange Membrane Fuel Cells

    International Nuclear Information System (INIS)

    Odaya, S.; Phillips, R.K.; Sharma, Y.; Bellerive, J.; Phillion, A.B.; Hoorfar, M.

    2015-01-01

    This paper describes a method to characterize the structure of polytetrafluoroethylene (PTFE) treated gas diffusion layers (GDLs) with and without microporous layers (MPLs) using 3D X-ray micro computed tomographic (μCT) microscopy. In this work, the structure of single and dual layer GDLs is evaluated via μCT for various GDL samples (such as Toray TGP-H-060 and AvCarb EP40) loaded with different MPLs. A new method is presented for separating, or segmenting, the various phases of the GDL, i.e., void space, carbon fiber (including binder and PTFE), and MPL. Through analysis, it was found that the variation in bulk porosity and the average pore diameter of the GDLs depends highly on the GDL series manufacturing and treatment processes. Using advanced image analysis techniques, routines were developed to accurately segment the GDL fibers (including binder/PTFE) and the MPL. The percentage of the intruding MPL material into the carbon fiber paper as a function of the GDL thickness was successfully found for dual layer GDLs, with varying PTFE content and areal weight loading in the MPL. This analysis provides invaluable insight into the physical microstructure of paper-based GDLs, emphasizing the heterogeneous porosity distribution of single layer GDLs and the interaction of the MPL with the carbon fiber paper of dual layer GDLs

  15. International clinical volunteering in Tanzania: A postcolonial analysis of a Global Health business.

    Science.gov (United States)

    Sullivan, Noelle

    2018-03-01

    This article traces how scarcities characteristic of health systems in low-income countries (LICs), and increasing popular interest in Global Health, have inadvertently contributed to the popularisation of a specific Global Health business: international clinical volunteering through private volunteer placement organisations (VPOs). VPOs market neglected health facilities as sites where foreigners can 'make a difference', regardless of their skill set. Drawing on online investigation and ethnographic research in Tanzania over four field seasons from 2011 to 2015, including qualitative interviews with 41 foreign volunteers and 90 Tanzanian health workers, this article offers a postcolonial analysis of VPO marketing and volunteer action in health facilities of LICs. Two prevalent postcolonial racialised tropes inform both VPO marketing and foreign volunteers' discourses and practices in Tanzania. The first trope discounts Tanzanian expertise in order to envision volunteers in expert roles despite lacking training, expertise, or contextual knowledge. The second trope envisions Tanzanian patients as so impoverished that insufficiently trained volunteer help is 'better than nothing at all'. These two postcolonial racialised tropes inform the conceptual work undertaken by VPO marketing schemes and foreign volunteers in order to remake Tanzanian health professionals and patients into appropriate and justifiable sites for foreign volunteer intervention.

  16. A Mapping from the Human Factors Analysis and Classification System (DOD-HFACS) to the Domains of Human Systems Integration (HSI)

    Science.gov (United States)

    2009-11-01

    Deficiency x PC405 Technical/Procedural Knowledge x PC501 Illusion – Kinesthetic x PC502 Illusion – Vestibular x...training or proficiency and result in an unsafe a situation. AE101 Inadvertent Operation Inadvertent Operation is a factor when individual’s movements ...night work or rapid movement (such as one time zone per hour) across several time zones. Referred to as “shift lag” and “jet lag.” (Time in the new time

  17. Stress analysis of MFTF-B getter system bellows. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Tokarz, F.J.; Johnson, J.J.; Mukherjee, A.N.; Dalder, E.N.

    1982-04-01

    The MFTF-B design includes a retractable getter system. Eight getter assemblies are planned (4 in each end plug). Electrically heated Ti wires are mounted on a telescoping insertion mechanism and, between machine shots (pulses), are extended into the chamber in the vicinity of inward-facing water-cooled magnet liners. During the shots, the sublimators must be withdrawn because they will intrude into plasma and diagnostic space. Each of the getter assemblies will be mounted on the exterior of the vacuum vessel. Bellows are used to keep essentially all of the mechanism isolated from the vessel vacuum. The bellows come in two sizes (8.25'' O.D. and 14'' O.D.). The smaller of the two bellows has been qualified by testing up to 94,000 cycles by empirically adjusting details of the bellow design (geometry and thickness). The process required 12 different test samples and took over a one-year period to accomplish. The bellows consistently failed in the inside diameter weld heat-affected zone. Results from stress analysis studies are presented.

  18. Analysis to determine the maximum dimensions of flexible apertures in sensored security netting products.

    Energy Technology Data Exchange (ETDEWEB)

    Murton, Mark; Bouchier, Francis A.; vanDongen, Dale T.; Mack, Thomas Kimball; Cutler, Robert P; Ross, Michael P.

    2013-08-01

    Although technological advances provide new capabilities to increase the robustness of security systems, they also potentially introduce new vulnerabilities. New capability sometimes requires new performance requirements. This paper outlines an approach to establishing a key performance requirement for an emerging intrusion detection sensor: the sensored net. Throughout the security industry, the commonly adopted standard for maximum opening size through barriers is a requirement based on square inchestypically 96 square inches. Unlike standard rigid opening, the dimensions of a flexible aperture are not fixed, but variable and conformable. It is demonstrably simple for a human intruder to move through a 96-square-inch opening that is conformable to the human body. The longstanding 96-square-inch requirement itself, though firmly embedded in policy and best practice, lacks a documented empirical basis. This analysis concluded that the traditional 96-square-inch standard for openings is insufficient for flexible openings that are conformable to the human body. Instead, a circumference standard is recommended for these newer types of sensored barriers. The recommended maximum circumference for a flexible opening should be no more than 26 inches, as measured on the inside of the netting material.

  19. The NRC/SNL [Nuclear Regulatory Commission]/[Sandia National Laboratory] performance assessment methodology for low-level radioactive waste facilities

    International Nuclear Information System (INIS)

    Kozak, M.W.

    1991-01-01

    A performance assessment methodology has been developed for use by the US Nuclear Regulatory Commission (NRC) in evaluating license applications for low-level waste disposal facilities. This paper provides a summary of the modeling approaches selected for the methodology, and includes discussions of the philosophy and structure of the methodology. The performance assessment methodology is designed to provide the NRC with a tool for performing confirmatory analyses in support of license reviews related to postclosure performance. The methodology allows analyses of dose to individuals from off-site releases under normal conditions as well as on-site doses to inadvertent intruders. Computer codes have been chosen for source-term analysis, for vadose-zone flow and transport, for saturated-zone flow and transport, for surface-water transport, for transport via the air pathway, and for food chain and dosimetry analyses. More than one computer code is recommended for each module in the methodology, which increases its flexibility, but also increases the amount of user effort required to provide interfaces between the modules. 25 refs., 2 figs

  20. Performance Assessment for the Idaho National Laboratory Remote-Handled Low-Level Waste Disposal Facility

    Energy Technology Data Exchange (ETDEWEB)

    Annette L. Schafer; A. Jeffrey Sondrup; Arthur S. Rood

    2012-05-01

    This performance assessment for the Remote-Handled Low-Level Radioactive Waste Disposal Facility at the Idaho National Laboratory documents the projected radiological dose impacts associated with the disposal of low-level radioactive waste at the facility. This assessment evaluates compliance with the applicable radiological criteria of the U.S. Department of Energy and the U.S. Environmental Protection Agency for protection of the public and the environment. The calculations involve modeling transport of radionuclides from buried waste to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses are calculated for both offsite receptors and individuals who inadvertently intrude into the waste after site closure. The results of the calculations are used to evaluate the future performance of the low-level radioactive waste disposal facility and to provide input for establishment of waste acceptance criteria. In addition, one-factor-at-a-time, Monte Carlo, and rank correlation analyses are included for sensitivity and uncertainty analysis. The comparison of the performance assessment results to the applicable performance objectives provides reasonable expectation that the performance objectives will be met

  1. Operating limit study for the proposed solid waste landfill at Paducah Gaseous Diffusion Plant

    International Nuclear Information System (INIS)

    Lee, D.W.; Wang, J.C.; Kocher, D.C.

    1995-06-01

    A proposed solid waste landfill at Paducah Gaseous Diffusion Plant (PGDP) would accept wastes generated during normal operations that are identified as non-radioactive. These wastes may include small amounts of radioactive material from incidental contamination during plant operations. A site-specific analysis of the new solid waste landfill is presented to determine a proposed operating limit that will allow for waste disposal operations to occur such that protection of public health and the environment from the presence of incidentally contaminated waste materials can be assured. Performance objectives for disposal were defined from existing regulatory guidance to establish reasonable dose limits for protection of public health and the environment. Waste concentration limits were determined consistent with these performance objectives for the protection of off-site individuals and inadvertent intruders who might be directly exposed to disposed wastes. Exposures of off-site individuals were estimated using a conservative, site-specific model of the groundwater transport of contamination from the wastes. Direct intrusion was analyzed using an agricultural homesteader scenario. The most limiting concentrations from direct intrusion or groundwater transport were used to establish the concentration limits for radionuclides likely to be present in PGDP wastes

  2. A new analysis of Mars "Special Regions": findings of the second MEPAG Special Regions Science Analysis Group (SR-SAG2).

    Science.gov (United States)

    Rummel, John D; Beaty, David W; Jones, Melissa A; Bakermans, Corien; Barlow, Nadine G; Boston, Penelope J; Chevrier, Vincent F; Clark, Benton C; de Vera, Jean-Pierre P; Gough, Raina V; Hallsworth, John E; Head, James W; Hipkin, Victoria J; Kieft, Thomas L; McEwen, Alfred S; Mellon, Michael T; Mikucki, Jill A; Nicholson, Wayne L; Omelon, Christopher R; Peterson, Ronald; Roden, Eric E; Sherwood Lollar, Barbara; Tanaka, Kenneth L; Viola, Donna; Wray, James J

    2014-11-01

    A committee of the Mars Exploration Program Analysis Group (MEPAG) has reviewed and updated the description of Special Regions on Mars as places where terrestrial organisms might replicate (per the COSPAR Planetary Protection Policy). This review and update was conducted by an international team (SR-SAG2) drawn from both the biological science and Mars exploration communities, focused on understanding when and where Special Regions could occur. The study applied recently available data about martian environments and about terrestrial organisms, building on a previous analysis of Mars Special Regions (2006) undertaken by a similar team. Since then, a new body of highly relevant information has been generated from the Mars Reconnaissance Orbiter (launched in 2005) and Phoenix (2007) and data from Mars Express and the twin Mars Exploration Rovers (all 2003). Results have also been gleaned from the Mars Science Laboratory (launched in 2011). In addition to Mars data, there is a considerable body of new data regarding the known environmental limits to life on Earth-including the potential for terrestrial microbial life to survive and replicate under martian environmental conditions. The SR-SAG2 analysis has included an examination of new Mars models relevant to natural environmental variation in water activity and temperature; a review and reconsideration of the current parameters used to define Special Regions; and updated maps and descriptions of the martian environments recommended for treatment as "Uncertain" or "Special" as natural features or those potentially formed by the influence of future landed spacecraft. Significant changes in our knowledge of the capabilities of terrestrial organisms and the existence of possibly habitable martian environments have led to a new appreciation of where Mars Special Regions may be identified and protected. The SR-SAG also considered the impact of Special Regions on potential future human missions to Mars, both as locations of

  3. Nest defence against conspecific intruders in the common pochard Aythya ferina: natural observations and an experimental test

    Czech Academy of Sciences Publication Activity Database

    Honza, Marcel; Piálková, Radka; Albrecht, Tomáš; Neužilová, Š.

    2009-01-01

    Roč. 44, č. 2 (2009), s. 151-158 ISSN 0001-6454 R&D Projects: GA AV ČR IAA6093403; GA AV ČR KJB600930611 Institutional research plan: CEZ:AV0Z60930519 Keywords : waterfowl * brood parasitism * intraspecific parasitism * breeding strategy * egg rejection Subject RIV: EG - Zoology Impact factor: 1.018, year: 2009 http://www.bioone.org/doi/pdf/10.3161/000164509X482713

  4. A brief review of intruder rotational bands and magnetic rotation in the A = 110 mass region

    Science.gov (United States)

    Banerjee, P.

    2018-05-01

    Nuclei in the A ∼ 110 mass region exhibit interesting structural features. One of these relates to the process by which specific configurations, built on the excitation of one or more protons across the Z = 50 shell-gap, manifest as collective rotational bands at intermediate spins and gradually lose their collectivity with increase in spin and terminate in a non-collective state at the maximum spin which the configuration can support. These bands are called terminating bands that co-exist with spherical states. Some of these bands are said to terminate smoothly underlining the continuous character of the process by which the band evolves from significant collectivity at low spin to a pure particle-hole non-collective state at the highest spin. The neutron-deficient A ∼ 110 mass region provides the best examples of smoothly terminating bands. The present experimental and theoretical status of such bands in several nuclei with 48 ≤ Z ≤ 52 spanning the 106 ≤ A ≤ 119 mass region have been reviewed in this article. The other noteworthy feature of nuclei in the A ∼ 110 mass region is the observation of regular rotation-like sequences of strongly enhanced magnetic dipole transitions in near-spherical nuclei. These bands, unlike the well-studied rotational sequences in deformed nuclei, arise from a spontaneous symmetry breaking by the anisotropic currents of a few high-j excited particles and holes. This mode of excitation is called magnetic rotation and was first reported in the Pb region. Evidence in favor of the existence of such structures, also called shears bands, are reported in the literature for a large number of Cd, In, Sn and Sb isotope with A ∼ 110. The present article provides a general overview of these reported structures across this mass region. The review also discusses antimagnetic rotation bands and a few cases of octupole correlations in the A = 110 mass region.

  5. Testing the adjustable threshold model for intruder recognition on Myrmica ants in the context of a social parasite.

    Science.gov (United States)

    Fürst, Matthias A; Durey, Maëlle; Nash, David R

    2012-02-07

    Social insect colonies are like fortresses, well protected and rich in shared stored resources. This makes them ideal targets for exploitation by predators, parasites and competitors. Colonies of Myrmica rubra ants are sometimes exploited by the parasitic butterfly Maculinea alcon. Maculinea alcon gains access to the ants' nests by mimicking their cuticular hydrocarbon recognition cues, which allows the parasites to blend in with their host ants. Myrmica rubra may be particularly susceptible to exploitation in this fashion as it has large, polydomous colonies with many queens and a very viscous population structure. We studied the mutual aggressive behaviour of My. rubra colonies based on predictions for recognition effectiveness. Three hypotheses were tested: first, that aggression increases with distance (geographical, genetic and chemical); second, that the more queens present in a colony and therefore the less-related workers within a colony, the less aggressively they will behave; and that colonies facing parasitism will be more aggressive than colonies experiencing less parasite pressure. Our results confirm all these predictions, supporting flexible aggression behaviour in Myrmica ants depending on context.

  6. Seal dynamics on the Swedish west coast: Scenarios of competition as Baltic grey seal intrude on harbour seal territory

    Science.gov (United States)

    Svensson, Carl Johan

    2012-07-01

    The Kattegat-Skagerrak region on the Swedish west coast is home to an abundant harbour seal population (Phoca vitulina) and a small scattered grey seal population (Halichoerus grypus). In addition, grey seal from the growing population in the Baltic Sea frequently migrate into the Kattegat-Skagerrak. Harbour seals on the west coast of Sweden show relatively high population growth (approximately 9%) compared to the Baltic grey seal in ice-free habitats (approximately 6%), which, in theory, makes harbour seal the stronger competitor of the two in this region. However, incidents of disease in harbour seals that lower population growth are becoming more frequent. These epidemics are primarily caused by the Phocine Distemper Virus (PDV), and may reduce population size with up to 70%. This study models the average development under potential scenarios of competing harbour- and Baltic grey seal populations using Leslie matrices and the Lotka-Volterra model of inter-specific competition. The model is parameterised with previously published data, and resource overlap is incorporated through density dependent pup survival. Using numerical methods short- and long-term abundances are simulated under weak, moderate and strong competition and for different frequencies of PDV epidemics. Results show that the harbour seals are resilient to competition while exerting a negative effect on grey seal abundance under moderate to strong competition. Hence Baltic grey seal benefit from weaker levels of competition. Under moderate and strong competition grey seal abundance is a direct function of the PDV frequency as this reduces the competitive strength of harbour seals. Theoretically this means that higher frequencies of PDV or other pathogens epidemics could facilitate an expansion of Baltic grey seal into Kattegat-Skagerrak. Independent of interaction strength and frequency of epidemics the projected changes to abundances are slow (50-100 years), and even in exceedingly stable populations very long time-series of population size estimates are necessary to determine interaction strength. From a management perspective, a more permanent grey seal population in Kattegat-Skagerrak is likely to increase the predation pressure on overfished regional cod populations, and also lead to higher prevalence of the cod parasite Pseudoterranova decipiens, which uses grey seal as end host. From a population ecology perspective, abundant Baltic grey seal in this region would facilitate the mixing of grey seals from the North Atlantic and the Baltic Sea, with unknown implications for the genetically divergent Baltic population.

  7. Trapping the intruder - immune receptor domain fusions provide new molecular leads for improving disease resistance in plants.

    Science.gov (United States)

    Krattinger, Simon G; Keller, Beat

    2016-02-19

    A new study uses genomics to show that fusions of plant immune receptors and other protein domains occur in significant numbers. This finding will generate many new research hypotheses and provide new opportunities for breeding resistant plant varieties.

  8. Differentiation of pre-existing trapped methane from thermogenic methane in an igneous-intruded coal by hydrous pyrolysis

    Science.gov (United States)

    Dias, Robert F.; Lewan, Michael D.; Birdwell, Justin E.; Kotarba, Maciej J.

    2014-01-01

    So as to better understand how the gas generation potential of coal changes with increasing rank, same-seam samples of bituminous coal from the Illinois Basin that were naturally matured to varying degrees by the intrusion of an igneous dike were subjected to hydrous pyrolysis (HP) conditions of 360 °C for 72 h. The accumulated methane in the reactor headspace was analyzed for δ13C and δ2H, and mol percent composition. Maximum methane production (9.7 mg/g TOC) occurred in the most immature samples (0.5 %Ro), waning to minimal methane values at 2.44 %Ro (0.67 mg/g TOC), and rebounding to 3.6 mg/g TOC methane in the most mature sample (6.76 %Ro). Methane from coal with the highest initial thermal maturity (6.76 %Ro) shows no isotopic dependence on the reactor water and has a microbial δ13C value of −61‰. However, methane from coal of minimal initial thermal maturity (0.5 %Ro) shows hydrogen isotopic dependence on the reaction water and has a δ13C value of −37‰. The gas released from coals under hydrous pyrolysis conditions represents a quantifiable mixture of ancient (270 Ma) methane (likely microbial) that was generated in situ and trapped within the rock during the rapid heating by the dike, and modern (laboratory) thermogenic methane that was generated from the indigenous organic matter due to thermal maturation induced by hydrous pyrolysis conditions. These findings provide an analytical framework for better assessment of natural gas sources and for differentiating generated gas from pre-existing trapped gas in coals of various ranks.

  9. Intruder states in sd-shell nuclei: from 1p-1t to np-nt in Si isotopes

    International Nuclear Information System (INIS)

    Goasduff, A.

    2012-01-01

    New large-scale shell-model calculations with full 1ℎω valence space for the sd-nuclei has been used for the first time to predict lifetimes of positive and negative parity states in neutron rich Si isotopes. The predicted lifetimes (1 - 100 ps) fall in the range of the differential Doppler shift method. Using the demonstrator of the European next generation γ-ray array, AGATA, in coincidence with the large acceptance PRISMA magnetic spectrometer from LNL (Legnaro) and the differential plunger of the University of Cologne, lifetimes of excited states in 32;33 Si and 35;36 S nuclei were measured. In a second step, the nℎω structure in the stable 28 Si nucleus was also studied. 28 Si is an important nucleus in order to understand the competition between mean-field and cluster structures. It displays a wealth of structures in terms of deformation and clustering. Light heavy-ion resonant radiative capture 12 C+ 16 O has been performed at energies below the Coulomb barrier. The measure γ-spectra indicate for the first time at these energies that the strongest part of the resonance decay proceeds though intermediate states around 10 MeV. Comparisons with previous radiative capture studies above the Coulomb barrier have been performed and the results have been interpreted in terms of a favoured feeding of T=1 states in the 28 Si self-conjugate nucleus. (author)

  10. Bending transition in the penetration of a flexible intruder in a two-dimensional dense granular medium

    Science.gov (United States)

    Algarra, Nicolas; Karagiannopoulos, Panagiotis G.; Lazarus, Arnaud; Vandembroucq, Damien; Kolb, Evelyne

    2018-02-01

    We study the quasistatic penetration of a flexible beam into a two-dimensional dense granular medium lying on a horizontal plate. Rather than a buckling-like behavior we observe a transition between a regime of crack-like penetration in which the fiber only shows small fluctuations around a stable straight geometry and a bending regime in which the fiber fully bends and advances through series of loading and unloading steps. We show that the shape reconfiguration of the fiber is controlled by a single nondimensional parameter L /Lc , which is the ratio of the length of the flexible beam L to Lc, a bending elastogranular length scale that depends on the rigidity of the fiber and on the departure from the jamming packing fraction of the granular medium. We show, moreover, that the dynamics of the bending transition in the course of the penetration experiment is gradual and is accompanied by a symmetry breaking of the granular packing fraction in the vicinity of the fiber. Together with the progressive bending of the fiber, a cavity grows downstream of the fiber and the accumulation of grains upstream of the fiber leads to the development of a jammed cluster of grains. We discuss our experimental results in the framework of a simple model of bending-induced compaction and we show that the rate of the bending transition only depends on the control parameter L /Lc .

  11. Testing the adjustable threshold model for intruder recognition on Myrmica ants in the context of a social parasite

    DEFF Research Database (Denmark)

    Fürst, Matthias Alois; Durey, Maëlle; Nash, David Richard

    2012-01-01

    gains access to the ants' nests by mimicking their cuticular hydrocarbon recognition cues, which allows the parasites to blend in with their host ants. Myrmica rubra may be particularly susceptible to exploitation in this fashion as it has large, polydomous colonies with many queens and a very viscous...... population structure. We studied the mutual aggressive behaviour of My. rubra colonies based on predictions for recognition effectiveness. Three hypotheses were tested: first, that aggression increases with distance (geographical, genetic and chemical); second, that the more queens present in a colony...... and therefore the less-related workers within a colony, the less aggressively they will behave; and that colonies facing parasitism will be more aggressive than colonies experiencing less parasite pressure. Our results confirm all these predictions, supporting flexible aggression behaviour in Myrmica ants...

  12. Bending transition in the penetration of a flexible intruder in a two-dimensional dense granular medium.

    Science.gov (United States)

    Algarra, Nicolas; Karagiannopoulos, Panagiotis G; Lazarus, Arnaud; Vandembroucq, Damien; Kolb, Evelyne

    2018-02-01

    We study the quasistatic penetration of a flexible beam into a two-dimensional dense granular medium lying on a horizontal plate. Rather than a buckling-like behavior we observe a transition between a regime of crack-like penetration in which the fiber only shows small fluctuations around a stable straight geometry and a bending regime in which the fiber fully bends and advances through series of loading and unloading steps. We show that the shape reconfiguration of the fiber is controlled by a single nondimensional parameter L/L_{c}, which is the ratio of the length of the flexible beam L to L_{c}, a bending elastogranular length scale that depends on the rigidity of the fiber and on the departure from the jamming packing fraction of the granular medium. We show, moreover, that the dynamics of the bending transition in the course of the penetration experiment is gradual and is accompanied by a symmetry breaking of the granular packing fraction in the vicinity of the fiber. Together with the progressive bending of the fiber, a cavity grows downstream of the fiber and the accumulation of grains upstream of the fiber leads to the development of a jammed cluster of grains. We discuss our experimental results in the framework of a simple model of bending-induced compaction and we show that the rate of the bending transition only depends on the control parameter L/L_{c}.

  13. Bird Killer, Industrial Intruder or Clean Energy? Perceiving Risks to Ecosystem Services Due to an Offshore Wind Farm

    KAUST Repository

    Klain, Sarah C.

    2017-07-19

    Proposals to develop renewable energy technologies may threaten local values, which can generate opposition. Efforts to explain this opposition have focused on perceived negative aesthetic and environmental impact. Less attention has been paid to a fuller suite of the perceived risks and benefits associated with new energy technologies. This paper thus investigates impacts of an offshore wind farm pertaining to individual perceptions and judgments, and why risks to some ecosystem services might be cause for greater public concern than others. We find that this difference can be attributed to the affective and intuitive ways in which people perceive risk. Our mixed-methods design used interviews (n=27) that involved risk-benefit weighting tasks and an animated visualization to help people imagine an offshore wind farm in a familiar place. We found that affectively-loaded impacts (harm to charismatic wildlife and visual intrusion) were assigned greater weight than more easily quantifiable impacts (displacement of fishing, impact to tourism, cost of compliance with regulations). Interviewees identified increased regional energy self-sufficiency as the most valued potential benefit of an offshore wind farm. These results have implications for ecosystem service assessments generally and, more specifically, for our understanding of ‘affective’ dimensions of development proposals.

  14. Compendium of ECCS [Emergency Core Cooling Systems] research for realistic LOCA [loss-of-coolant accidents] analysis: Final report

    International Nuclear Information System (INIS)

    1988-12-01

    In the United States, Emergency Core Cooling Systems (ECCS) are required for light water reactors (LWRs) to provide cooling of the reactor core in the event of a break or leak in the reactor piping or an inadvertent opening of a valve. These accidents are called loss-of-coolant accidents (LOCA), and they range from small leaks up to a postulated full break of the largest pipe in the reactor cooling system. Federal government regulations provide that LOCA analysis be performed to show that the ECCS will maintain fuel rod cladding temperatures, cladding oxidation, and hydrogen production within certain limits. The NRC and others have completed a large body of research which investigated fuel rod behavior and LOCA/ECCS performance. It is now possible to make a realistic estimate of the ECCS performance during a LOCA and to quantify the uncertainty of this calculation. The purpose of this report is to summarize this research and to serve as a general reference for the extensive research effort that has been performed. The report: (1) summarizes the understanding of LOCA phenomena in 1974; (2) reviews experimental and analytical programs developed to address the phenomena; (3) describes the best-estimate computer codes developed by the NRC; (4) discusses the salient technical aspects of the physical phenomena and our current understanding of them; (5) discusses probabilistic risk assessment results and perspectives, and (6) evaluates the impact of research results on the ECCS regulations. 736 refs., 412 figs., 66 tabs

  15. Inadvertent insertion of a nasogastric tube into both main bronchi of an awake patient: a case report

    Science.gov (United States)

    2009-01-01

    The use of nasogastric tube is desirable for the short-term administration of calories when oral feeding is not possible. Although the insertion of nasogastric tubes has been described as being easy this is not without risks. An unusual case of malpositioning of a fine bore nasogastric tube into both main bronchi in a patient that was awake is reported. Respiratory complications of misplaced nasogastric tubes and the importance of a check chest x-ray following tube placement are discussed. PMID:19829883

  16. Inadvertent venous air embolism during cesarean section: Collapsible intravenous fluid bags without self-sealing outlet have risks. Case report.

    Science.gov (United States)

    Bakan, Mefkur; Topuz, Ufuk; Esen, Asim; Basaranoglu, Gokcen; Ozturk, Erdogan

    2013-01-01

    The anesthesiologist must be aware of the causes, diagnosis and treatment of venous air embolism and adopt the practice patterns to prevent its occurrence. Although venous air embolism is a known complication of cesarean section, we describe an unusual inattention that causes iatrogenic near fatal venous air embolism during a cesarean section under spinal anesthesia. One of the reasons for using self-collapsible intravenous (IV) infusion bags instead of conventional glass or plastic bottles is to take precaution against air embolism. We also demonstrated the risk of air embolism for two kinds of plastic collapsible intravenous fluid bags: polyvinyl chloride (PVC) and polypropylene-based. Fluid bags without self-sealing outlets pose a risk for air embolism if the closed system is broken down, while the flexibility of the bag limits the amount of air entry. PVC-based bags, which have more flexibility, have significantly less risk of air entry when IV administration set is disconnected from the outlet. Using a pressure bag for rapid infusion can be dangerous without checking and emptying all air from the IV bag. Copyright © 2013 Sociedade Brasileira de Anestesiologia. Published by Elsevier Editora Ltda. All rights reserved.

  17. Fear and overprotection in Australian residential aged-care facilities: The inadvertent impact of regulation on quality continence care.

    Science.gov (United States)

    Ostaszkiewicz, Joan; O'Connell, Beverly; Dunning, Trisha

    2016-06-01

    Most residents in residential aged-care facilities are incontinent. This study explored how continence care was provided in residential aged-care facilities, and describes a subset of data about staffs' beliefs and experiences of the quality framework and the funding model on residents' continence care. Using grounded theory methodology, 18 residential aged-care staff members were interviewed and 88 hours of field observations conducted in two facilities. Data were analysed using a combination of inductive and deductive analytic procedures. Staffs' beliefs and experiences about the requirements of the quality framework and the funding model fostered a climate of fear and risk adversity that had multiple unintended effects on residents' continence care, incentivising dependence on continence management, and equating effective continence care with effective pad use. There is a need to rethink the quality of continence care and its measurement in Australian residential aged-care facilities. © 2015 AJA Inc.

  18. Probabilistic consequence study of residual radiological effects from a hypothetical ten-ton inadvertent nuclear yield. Weapons Safety Program

    International Nuclear Information System (INIS)

    Harvey, T.; Peters, L.; Serduke, F.; Edwards, L.

    1994-01-01

    In this paper we study the potential radiological consequences of a strategic bomber accident, in which one of the assumed on-board nuclear weapons explodes with an arbitrarily chosen 10-ton nuclear yield. The frequency of such an occurrence is infinitesimal. The safety design features in today s nuclear weapons' systems essentially forbid its occurrence. We have a chosen a military base which has the feature of being a representative combination of urban and rural populations. The assumed ''crash site'' is near the northwest comer of the military base, close to civilian housing located just across the street from the base. A worst case wind would be from the ESE (east south east). This would cause fission debris to be dispersed toward the largest population centers and, thus, would lead to the largest Pu ''collective'' doses (i.e., a dose integrated over time and summed over individuals). Also, if an ESE wind were blowing at accident time, some people in nearby housing could receive lethal gamma-ray doses from fallout before evacuation could occur. It is assumed only one weapon undergoes nuclear yield; the other on-board weapons would HE detonate and the Pu would be aerosolized and lofted. We assume an activity-size distribution and lofting similar to those used to predict fallout measured at NTS. The main thrust of our study is to provide estimates of probabilistic radiological risks to the population local to a strategic bomber crash site. The studied radiological consequences are: cloud-passage doses from Pu inhalation; doses from groundshine due to gamma-producing radionuclides; and areal contamination from Pu and the long-lived fission products Cs-137 and Sr-90

  19. Inadvertent gene silencing of argininosuccinate synthase (bcass1) in Botrytis cinerea by the pLOB1 vector system

    NARCIS (Netherlands)

    Patel, R.M.; Kan, van J.A.L.; Bailey, A.M.; Foster, G.D.

    2010-01-01

    For several years, researchers working on the plant pathogen Botrytis cinerea and a number of other related fungi have routinely used the pLOB1 vector system, based on hygromycin resistance, under the control of the Aspergillus nidulans oliC promoter and what was reported to be the ß-tubulin (tubA)

  20. (Inadvertently) Instructing Missionaries in (Public University) World Religions Courses: Examining a Pedagogical Dilemma, Its Dimensions, and a Course Section Solution

    Science.gov (United States)

    Karapanagiotis, Nicole

    2017-01-01

    In this article, I explore an ethical and pedagogical dilemma that I encounter each semester in my world religions courses: namely, that a great number of students enroll in the courses as part of their missionary training programs, and come to class understanding successful learning to mean gathering enough information about the world's religious…

  1. Decision analysis multicriteria analysis

    International Nuclear Information System (INIS)

    Lombard, J.

    1986-09-01

    The ALARA procedure covers a wide range of decisions from the simplest to the most complex one. For the simplest one the engineering judgement is generally enough and the use of a decision aiding technique is therefore not necessary. For some decisions the comparison of the available protection option may be performed from two or a few criteria (or attributes) (protection cost, collective dose,...) and the use of rather simple decision aiding techniques, like the Cost Effectiveness Analysis or the Cost Benefit Analysis, is quite enough. For the more complex decisions, involving numerous criteria or for decisions involving large uncertainties or qualitative judgement the use of these techniques, even the extended cost benefit analysis, is not recommended and appropriate techniques like multi-attribute decision aiding techniques are more relevant. There is a lot of such particular techniques and it is not possible to present all of them. Therefore only two broad categories of multi-attribute decision aiding techniques will be presented here: decision analysis and the outranking analysis

  2. Geology of the Riacho do Pontal iron oxide copper-gold (IOCG prospect, Bahia, Brazil: hydrothermal alteration approached via hierarchical cluster analysis

    Directory of Open Access Journals (Sweden)

    Sérgio Roberto Bacelar Huhn

    Full Text Available The Riacho do Pontal prospect is situated on the border between the Borborema Province and the São Francisco Craton, in Bahia state. It comprises rocks polydeformed during the Neoproterozoic. The prospect area includes migmatites and gneissic rocks intruded by several sin- to post-tectonic granites. Structural analysis indicates a strong relationship between the development of ductile to brittle-ductile shear zones and associated hydrothermalism. The main tracts of high-strain rate are represented by the Riacho do Pontal (north and Macururé (south shear zones. Several copper occurrences have been mapped within the Riacho do Pontal prospect along secondary shear zones. In these areas, the gneissic rocks were affected by intense hydrothermal alteration. Hierarchical cluster analysis permitted the identification of the main hydrothermal mineral associations present in these rocks, which resulted from potassic (biotite and sodic-calcic (amphibole-albite alteration, in addition to silicification and iron alteration (hematite. These hydrothermal alteration types are similar to those typically found in iron oxide copper-gold deposits developed at intermediate crustal levels. Hematite-quartz-albite-chalcopyrite-pyrite hydrothermal breccias host the highest-grade copper ore (chalcopyrite-pyrite-chalcocite zones. The spatial relationship between copper deposits and shear zones improves the metallogenic potential for copper of the Borborema Province and has important implications for mineral exploration in the region.

  3. Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Delzanno, Giorgio; Esparza, Javier; Srba, Jiri

    2006-01-01

    Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Turing powerful model. We show that under the environment sensitive semantics (i.e. by adding an active intruder capable of storing all exchanged messages including full analysis and synthesis...

  4. Background information for the development of a low-level waste performance assessment methodology

    International Nuclear Information System (INIS)

    Shipers, L.R.

    1989-12-01

    This document identifies and describes the potential postclosure pathways of radionuclide release, migration, and exposure from low-level radioactive waste disposal facilities. Each pathway identified is composed of a combination of migration pathways (air, surface water, ground water, food chain) and exposure pathways (direct gamma, inhalation, ingestion, surface contact). The pathway identification is based on a review and evaluation of existing information, and not all pathways presented in the document would necessarily be of importance at a given low-level waste disposal site. This document presents pathways associated with undisturbed (ground water, gas generation), naturally disturbed (erosion, bathtubbing, earth creep, frost heave, plant and animal intruder), and inadvertent intruder (construction, agriculture) scenarios of a low-level waste disposal facility. 20 refs., 1 fig

  5. Overview of a performance assessment methodology for low-level radioactive waste disposal facilities

    International Nuclear Information System (INIS)

    Kozak, M.W.; Chu, M.S.Y.

    1991-01-01

    A performance assessment methodology has been developed for use by the US Nuclear Regulatory Commission in evaluating license applications for low-level waste disposal facilities. This paper provides a summary and an overview of the modeling approaches selected for the methodology. The overview includes discussions of the philosophy and structure of the methodology. This performance assessment methodology is designed to provide the NRC with a tool for performing confirmatory analyses in support of license reviews related to postclosure performance. The methodology allows analyses of dose to individuals from off-site releases under normal conditions as well as on-site doses to inadvertent intruders. 24 refs., 1 tab

  6. Development of polymer concrete radioactive waste management containers

    Energy Technology Data Exchange (ETDEWEB)

    Chung, H.; Lee, M. S.; Ahn, D. H.; Won, H. J.; Kang, H. S.; Lee, H. S.; Lim, S.P.; Kim, Y. E.; Lee, B. O.; Lee, K. P.; Min, B. Y.; Lee, J.K.; Jang, W. S.; Sim, W. B.; Lee, J. C.; Park, M. J.; Choi, Y. J.; Shin, H. E.; Park, H. Y.; Kim, C. Y

    1999-11-01

    A high-integrity radioactive waste container has been developed to immobilize the spent resin wastes from nuclear power plants, protect possible future, inadvertent intruders from damaging radiation. The polymer concrete container is designed to ensure safe and reliable disposal of the radioactive waste for a minimum period of 300 years. A built-in vent system for each container will permit the release of gas. An experimental evaluation of the mechanical, chemical, and biological tests of the container was carried out. The tests showed that the polymer concrete container is adequate for safe disposal of the radioactive wastes. (author)

  7. Performance analysis

    International Nuclear Information System (INIS)

    2008-05-01

    This book introduces energy and resource technology development business with performance analysis, which has business division and definition, analysis of current situation of support, substance of basic plan of national energy, resource technique development, selection of analysis index, result of performance analysis by index, performance result of investigation, analysis and appraisal of energy and resource technology development business in 2007.

  8. Autoclave nuclear criticality safety analysis

    Energy Technology Data Exchange (ETDEWEB)

    D`Aquila, D.M. [Martin Marietta Energy Systems, Inc., Piketon, OH (United States); Tayloe, R.W. Jr. [Battelle, Columbus, OH (United States)

    1991-12-31

    Steam-heated autoclaves are used in gaseous diffusion uranium enrichment plants to heat large cylinders of UF{sub 6}. Nuclear criticality safety for these autoclaves is evaluated. To enhance criticality safety, systems are incorporated into the design of autoclaves to limit the amount of water present. These safety systems also increase the likelihood that any UF{sub 6} inadvertently released from a cylinder into an autoclave is not released to the environment. Up to 140 pounds of water can be held up in large autoclaves. This mass of water is sufficient to support a nuclear criticality when optimally combined with 125 pounds of UF{sub 6} enriched to 5 percent U{sup 235}. However, water in autoclaves is widely dispersed as condensed droplets and vapor, and is extremely unlikely to form a critical configuration with released UF{sub 6}.

  9. The Role of Tourism and Recreation in the Spread of Non-Native Species: A Systematic Review and Meta-Analysis.

    Science.gov (United States)

    Anderson, Lucy G; Rocliffe, Steve; Haddaway, Neal R; Dunn, Alison M

    2015-01-01

    Managing the pathways by which non-native species are introduced and spread is considered the most effective way of preventing species invasions. Tourism and outdoor recreation involve the frequent congregation of people, vehicles and vessels from geographically diverse areas. They are therefore perceived to be major pathways for the movement of non-native species, and ones that will become increasingly important with the continued growth of these sectors. However, a global assessment of the relationship between tourism activities and the introduction of non-native species-particularly in freshwater and marine environments-is lacking. We conducted a systematic review and meta-analysis to determine the impact of tourism and outdoor recreation on non-native species in terrestrial, marine and freshwater environments. Our results provide quantitative evidence that the abundance and richness of non-native species are significantly higher in sites where tourist activities take place than in control sites. The pattern was consistent across terrestrial, freshwater and marine environments; across a variety of vectors (e.g. horses, hikers, yachts); and across a range of taxonomic groups. These results highlight the need for widespread biosecurity interventions to prevent the inadvertent introduction of invasive non-native species (INNS) as the tourism and outdoor recreation sectors grow.

  10. An analysis of critical incidents relevant to pediatric anesthesia reported to the UK National Reporting and Learning System, 2006-2008.

    Science.gov (United States)

    MacLennan, Andrew I; Smith, Andrew F

    2011-08-01

    We aimed to identify and analyze critical incidents relating to pediatric anesthesia from the National Reporting and Learning System (NRLS) in England and Wales. Critical incident reporting plays a key role in learning from problems and so enhancing patient safety. There has been no previous analysis of pediatric anesthetic incidents in the NRLS. We obtained potentially relevant records from the UK National Patient Safety Agency. Eligible incidents were classified according to patient age, degree of harm sustained, and clinical category. A total of 606 incidents met the inclusion criteria. Six deaths were reported and 48 incidents resulted in severe harm. In many reports, sufficient detail was lacking for a full understanding of what had happened. However, the broad focus of the NRLS revealed a wide spectrum of clinical and organizational incidents relating to pediatric anesthesia. Medication issues predominated (35.6%), notably inadvertent duplication of dosing in operating theater and ward. Airway/ventilation incidents formed 18.8% of the total, cardiovascular incidents 5.9%, and equipment-related incidents (failure or unavailability) 15.7%. Communication and organizational problems made up 8.6% of reports. We make a number of recommendations for practice. In addition, anesthetists should be encouraged to take ownership and contribute high-quality descriptions of incidents to national systems. © 2010 Blackwell Publishing Ltd.

  11. A three-dimensional finite element analysis of molar distalization with a palatal plate, pendulum, and headgear according to molar eruption stage

    Science.gov (United States)

    Kang, Ju-Man; Park, Jae Hyun; Bayome, Mohamed; Oh, Moonbee; Park, Chong Ook; Mo, Sung-Seo

    2016-01-01

    Objective This study aimed to (1) evaluate the effects of maxillary second and third molar eruption status on the distalization of first molars with a modified palatal anchorage plate (MPAP), and (2) compare the results to the outcomes of the use of a pendulum and that of a headgear using three-dimensional finite element analysis. Methods Three eruption stages were established: an erupting second molar at the cervical one-third of the first molar root (Stage 1), a fully erupted second molar (Stage 2), and an erupting third molar at the cervical one-third of the second molar root (Stage 3). Retraction forces were applied via three anchorage appliance models: an MPAP with bracket and archwire, a bone-anchored pendulum appliance, and cervical-pull headgear. Results An MPAP showed greater root movement of the first molar than crown movement, and this was more noticeable in Stages 2 and 3. With the other devices, the first molar showed distal tipping. Transversely, the first molar had mesial-out rotation with headgear and mesial-in rotation with the other devices. Vertically, the first molar was intruded with an MPAP, and extruded with the other appliances. Conclusions The second molar eruption stage had an effect on molar distalization, but the third molar follicle had no effect. The application of an MPAP may be an effective treatment option for maxillary molar distalization. PMID:27668192

  12. The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market

    Directory of Open Access Journals (Sweden)

    Andy Jones

    2006-09-01

    Full Text Available All organisations, whether in the public or private sector, use computers for the storage and processing of information relating to their business or services, their employees and their customers. A large proportion of families and individuals in their homes now also use personal computers and, both intentionally and inadvertently, often store on those computers personal information. It is clear that most organisations and individuals continue to be unaware of the information that may be stored on the hard disks that the computers contain, and have not considered what may happen to the information after the disposal of the equipment.In 2005, joint research was carried out by the University of Glamorgan in Wales and Edith Cowan University in Australia to determine whether second hand computer disks that were purchased from a number of sources still contained any information or whether the information had been effectively erased. The research revealed that, for the majority of the disks that were examined, the information had not been effectively removed and as a result, both organisations and individuals were potentially exposed to a range of potential crimes.  It is worthy of note that in the disposal of this equipment, the organisations involved had failed to meet their statutory, regulatory and legal obligations.This paper describes a second research project that was carried out in 2006 which repeated the research carried out the previous year and also extended the scope of the research to include additional countries.  The methodology used was the same as that in the previous year and the disks that were used for the research were again supplied blind by a third party. The research involved the forensic imaging of the disks which was followed by an analysis of the disks to determine what information remained and whether it could be easily recovered using publicly available tools and techniques.

  13. Rapid depressurization event analysis in BWR/6 using RELAP5 and contain

    Energy Technology Data Exchange (ETDEWEB)

    Mueftueoglu, A.K.; Feltus, M.A. [Pennsylvania State Univ., University Park, PA (United States)

    1995-09-01

    Noncondensable gases may become dissolved in Boiling Water Reactor (BWR) water level instrumentation during normal operations. Any dissolved noncondensable gases inside these water columns may come out of solution during rapid depressurization events, and displace water from the reference leg piping resulting in a false high level. These water level errors may cause a delay or failure in actuation, or premature shutdown of the Emergency Core Cooling System. (ECCS). If a rapid depressurization causes an erroneously high water level, preventing automatic ECCS actuation, it becomes important to determine if there would be other adequate indications for operator response and other signals for automatic actuation such as high drywell pressure. It is also important to determine the effect of the level signal on ECCS operation after it is being actuated. The objective of this study is to determine the detailed coupled containment/NSSS response during this rapid depressurization events in BWR/6. The selected scenarios involve: (a) inadvertent opening of all ADS valves, (b) design basis (DB) large break loss of coolant accident (LOCA), and (c) main steam line break (MSLB). The transient behaviors are evaluated in terms of: (a) vessel pressure and collapsed water level response, (b) specific transient boundary conditions, (e.g., scram, MSIV closure timing, feedwater flow, and break blowdown rates), (c) ECCS initiation timing, (d) impact of operator actions, (e) whether indications besides low-low water level were available. The results of the analysis had shown that there would be signals to actuate ECCS other than low reactor level, such as high drywell pressure, low vessel pressure, high suppression pool temperature, and that the plant operators would have significant indications to actuate ECCS.

  14. A Meta-analysis of the Rates of Listeria monocytogenes and Enterococcus in Febrile Infants.

    Science.gov (United States)

    Leazer, Rianna; Perkins, Amy M; Shomaker, Kyrie; Fine, Bryan

    2016-04-01

    A change in the epidemiology of pathogens causing serious bacterial infection (SBI) has been noted since original recommendations were made for the empirical antibiotic choices for young infants with fever. To assess the prevalence of SBI caused by Listeria monocytogenes and Enterococcus species. A literature search was conducted on keywords related to SBI, L. monocytogenes, and Enterococcus spp. infections. Eligible studies were those conducted in the United States and published between January 1998 and June 2014 focusing on SBI in infants≤90 days of age. The rates of urinary tract infection, bacteremia, and meningitis for each pathogen were recorded for each study. Meta-analysis was performed to calculate the prevalence for each pathogen in a random effects model with 0.5 continuity correction added to studies with zero events. Sixteen studies were included. A total of 20,703 blood cultures were included, with weighted prevalences for L. monocytogenes and Enterococcus spp. bacteremia of 0.03% and 0.09%, respectively. A total of 13,775 cerebrospinal fluid cultures were included with event rates (unweighted prevalences) for L. monocytogenes and Enterococcus spp. meningitis of 0.02% and 0.03%, respectively. A total of 18,283 urine cultures were included, with no cases of L. monocytogenes and a weighted prevalence for Enterococcus spp. urinary tract infection of 0.28%. There may have been reporting bias or incomplete retrieval or inadvertent exclusion of relevant studies. SBI caused by L. monocytogenes and Enterococcus spp. in febrile infants is rare, and therefore clinicians may consider a change in empirical antibiotic choices. Copyright © 2016 by the American Academy of Pediatrics.

  15. Safety analysis of a high temperature supercritical pressure light water cooled and moderated reactor

    International Nuclear Information System (INIS)

    Ishiwatari, Y.; Oka, Y.; Koshizuka, S.

    2002-01-01

    A safety analysis code for a high temperature supercritical pressure light water cooled reactor (SCLWR-H) with water rods cooled by descending flow, SPRAT-DOWN, is developed. The hottest channel, a water rod, down comer, upper and lower plenums, feed pumps, etc. are modeled as junction of nodes. Partial of the feed water flows downward from the upper dome of the reactor pressure vessel to the water rods. The accidents analyzed here are total loss of feed water flow, feed water pump seizure, and control rods ejection. All the accidents satisfy the criteria. The accident event at which the maximum cladding temperature is the highest is total loss of feedwater flow. The transients analyzed here are loss of feed water heating, inadvertent start-up of an auxiliary water supply system, partial loss of feed water flow, loss of offsite power, loss of load, and abnormal withdrawal of control rods. All the transients satisfied the criteria. The transient event for which the maximum cladding temperature is the highest is control rod withdrawal at normal operation. The behavior of loss of load transient is different from that of BWR. The power does not increase because loss of flow occurs and the density change is small. The sensitivities of the system behavior to various parameters during transients and accidents are analyzed. The parameters having strong influence are the capacity of the auxiliary water supply system, the coast down time of the main feed water pumps, and the time delay of the main feed water pumps trip. The control rod reactivity also has strong influence. (authors)

  16. Instrumental analysis

    International Nuclear Information System (INIS)

    Kim, Seung Jae; Seo, Seong Gyu

    1995-03-01

    This textbook deals with instrumental analysis, which consists of nine chapters. It has Introduction of analysis chemistry, the process of analysis and types and form of the analysis, Electrochemistry on basic theory, potentiometry and conductometry, electromagnetic radiant rays and optical components on introduction and application, Ultraviolet rays and Visible spectrophotometry, Atomic absorption spectrophotometry on introduction, flame emission spectrometry and plasma emission spectrometry. The others like infrared spectrophotometry, X-rays spectrophotometry and mass spectrometry, chromatography and the other instrumental analysis like radiochemistry.

  17. Does gender matter? An analysis of men's and women's accounts of responding to symptoms of lung cancer.

    Science.gov (United States)

    MacLean, Alice; Hunt, Kate; Smith, Sarah; Wyke, Sally

    2017-10-01

    Men are often portrayed - in research studies, 'common-sense' accounts and popular media - as reluctant users of health services. They are said to avoid going to the GP whenever possible, while women are portrayed, in presumed opposition, as consulting more readily, more frequently and with less serious complaints. Such stereotypes may inadvertently encourage doctors to pay greater heed to men's symptoms in 'routine' consultations. Although previous research has challenged this view with evidence, and suggested that links between gender identities and help-seeking are complex and fluid, gender comparative studies remain uncommon, and particularly few studies (either qualitative or quantitative) compare men and women with similar morbidity. We contribute here to gender comparative research on help-seeking by investigating men's and women's accounts of responding to symptoms later diagnosed as lung cancer. A secondary analysis of qualitative interviews with 27 men and 18 women attending Scottish cancer centres revealed striking similarities between men's and women's accounts. Participants were seen as negotiating a complex and delicate balance in constructing their moral integrity as, on the one hand, responsible service users who were conscious of the demands on health care professionals' time, and as patients who did not take undue risks with their health, in the context of an illness for which people are often held culpable, on the other. In accounting for their responses to symptoms, men and women drew equally on culturally-embedded moral frameworks of stoicism and responsible service use. Regardless of gender, the accounts portrayed participants as stoic in response to illness and responsible service users; and as people seeking explanations for bodily changes and taking appropriate and timely action. Our analysis challenges simplistic, 'common-sense' views of gendered help-seeking and highlights that both men and women need support to consult their doctor for

  18. Seeking missing pieces in science concept assessments: Reevaluating the Brief Electricity and Magnetism Assessment through Rasch analysis

    Science.gov (United States)

    Ding, Lin

    2014-02-01

    Discipline-based science concept assessments are powerful tools to measure learners' disciplinary core ideas. Among many such assessments, the Brief Electricity and Magnetism Assessment (BEMA) has been broadly used to gauge student conceptions of key electricity and magnetism (E&M) topics in college-level introductory physics courses. Differing from typical concept inventories that focus only on one topic of a subject area, BEMA covers a broad range of topics in the electromagnetism domain. In spite of this fact, prior studies exclusively used a single aggregate score to represent individual students' overall understanding of E&M without explicating the construct of this assessment. Additionally, BEMA has been used to compare traditional physics courses with a reformed course entitled Matter and Interactions (M&I). While prior findings were in favor of M&I, no empirical evidence was sought to rule out possible differential functioning of BEMA that may have inadvertently advantaged M&I students. In this study, we used Rasch analysis to seek two missing pieces regarding the construct and differential functioning of BEMA. Results suggest that although BEMA items generally can function together to measure the same construct of application and analysis of E&M concepts, several items may need further revision. Additionally, items that demonstrate differential functioning for the two courses are detected. Issues such as item contextual features and student familiarity with question settings may underlie these findings. This study highlights often overlooked threats in science concept assessments and provides an exemplar for using evidence-based reasoning to make valid inferences and arguments.

  19. Comprehensive Analysis of Adverse Events Associated With Per Oral Endoscopic Myotomy in 1826 Patients: An International Multicenter Study.

    Science.gov (United States)

    Haito-Chavez, Yamile; Inoue, Haruhiro; Beard, Kristin W; Draganov, Peter V; Ujiki, Michael; Rahden, Burkhard H A; Desai, Pankaj N; Pioche, Mathieu; Hayee, Bu; Haji, Amyn; Saxena, Payal; Reavis, Kevin; Onimaru, Manabu; Balassone, Valerio; Nakamura, Jun; Hata, Yoshitaka; Yang, Dennis; Pannu, Davinderbir; Abbas, Ali; Perbtani, Yaseen B; Patel, Lava Y; Filser, Jorg; Roman, Sabine; Rivory, Jerome; Mion, Francois; Ponchon, Thierry; Perretta, Silvana; Wong, Vivien; Maselli, Roberta; Ngamruengphong, Saowanee; Chen, Yen-I; Bukhari, Majidah; Hajiyeva, Gulara; Ismail, Amr; Pieratti, Renata; Kumbhari, Vivek; Galdos-Cardenas, Gerson; Repici, Alessandro; Khashab, Mouen A

    2017-08-01

    The safety of peroral endoscopic myotomy (POEM) is still debated since comprehensive analysis of adverse events (AEs) associated with the procedure in large multicenter cohort studies has not been performed. To study (1) the prevalence of AEs and (2) factors associated with occurrence of AEs in patients undergoing POEM. Patients who underwent POEM at 12 tertiary-care centers between 2009 and 2015 were included in this case-control study. Cases were defined by the occurrence of any AE related to the POEM procedure. Control patients were selected for each AE case by matching for age, gender, and disease classification (achalasia type I and II vs. type III/spastic esophageal disorders). A total of 1,826 patients underwent POEM. Overall, 156 AEs occurred in 137 patients (7.5%). A total of 51 (2.8%) inadvertent mucosotomies occurred. Mild, moderate, and severe AEs had a frequency of 116 (6.4%), 31 (1.7%), and 9 (0.5%), respectively. Multivariate analysis demonstrated that sigmoid-type esophagus (odds ratio (OR) 2.28, P=0.05), endoscopist experience <20 cases (OR 1.98, P=0.04), use of a triangular tip knife (OR 3.22, P=0.05), and use of an electrosurgical current different than spray coagulation (OR 3.09, P=0.02) were significantly associated with the occurrence of AEs. This large study comprehensively assessed the safety of POEM and highly suggests POEM as a relatively safe procedure when performed by experts at tertiary centers with an overall 7.5% prevalence of AEs. Severe AEs are rare. Sigmoid-type esophagus, endoscopist experience, type of knife, and current used can be considered as predictive factors of AE occurrence.

  20. Seeking missing pieces in science concept assessments: Reevaluating the Brief Electricity and Magnetism Assessment through Rasch analysis

    Directory of Open Access Journals (Sweden)

    Lin Ding

    2014-02-01

    Full Text Available Discipline-based science concept assessments are powerful tools to measure learners’ disciplinary core ideas. Among many such assessments, the Brief Electricity and Magnetism Assessment (BEMA has been broadly used to gauge student conceptions of key electricity and magnetism (E&M topics in college-level introductory physics courses. Differing from typical concept inventories that focus only on one topic of a subject area, BEMA covers a broad range of topics in the electromagnetism domain. In spite of this fact, prior studies exclusively used a single aggregate score to represent individual students’ overall understanding of E&M without explicating the construct of this assessment. Additionally, BEMA has been used to compare traditional physics courses with a reformed course entitled Matter and Interactions (M&I. While prior findings were in favor of M&I, no empirical evidence was sought to rule out possible differential functioning of BEMA that may have inadvertently advantaged M&I students. In this study, we used Rasch analysis to seek two missing pieces regarding the construct and differential functioning of BEMA. Results suggest that although BEMA items generally can function together to measure the same construct of application and analysis of E&M concepts, several items may need further revision. Additionally, items that demonstrate differential functioning for the two courses are detected. Issues such as item contextual features and student familiarity with question settings may underlie these findings. This study highlights often overlooked threats in science concept assessments and provides an exemplar for using evidence-based reasoning to make valid inferences and arguments.

  1. Content Analysis

    Directory of Open Access Journals (Sweden)

    George Bedinelli Rossi

    2014-09-01

    Full Text Available This study introduces the various definitions and types of content analysis. This type of analysis historically presents itself as a quantitative approach to data analysis and currently shows up as a qualitative approach. The most common types are the conceptual and relational analysis. The latter receives influences of linguistic, cognitive and mental models and it is subdivided in affective extraction, analysis of proximity and cognitive mapping. Regarding the importance of this type of analysis, we have quantitative and qualitative character and the latter approach can be used to identify hypotheses, theoretical constructs or even models that can be tested by multivariate statistical techniques or even by experiments. 

  2. Sensitivity analysis

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/003741.htm Sensitivity analysis To use the sharing features on this page, please enable JavaScript. Sensitivity analysis determines the effectiveness of antibiotics against microorganisms (germs) ...

  3. Real analysis

    CERN Document Server

    McShane, Edward James

    2013-01-01

    This text surveys practical elements of real function theory, general topology, and functional analysis. Discusses the maximality principle, the notion of convergence, the Lebesgue-Stieltjes integral, function spaces and harmonic analysis. Includes exercises. 1959 edition.

  4. Strategic analysis

    OpenAIRE

    Bartuňková, Alena

    2011-01-01

    The goal of the master thesis is to conduct a strategic analysis of the Czech Export Bank. The work is divided in two parts, a theoretically methodological and practical part. Within theoretical part there is identified strategy by different approaches and there are described the procedures for strategic analysis. Findings from the theoretically methodological part are applied in the practical part and subsequently are used in the strategic analysis. The external analysis is characterized by ...

  5. Fourier analysis

    CERN Document Server

    Stade, Eric

    2005-01-01

    A reader-friendly, systematic introduction to Fourier analysis Rich in both theory and application, Fourier Analysis presents a unique and thorough approach to a key topic in advanced calculus. This pioneering resource tells the full story of Fourier analysis, including its history and its impact on the development of modern mathematical analysis, and also discusses essential concepts and today's applications. Written at a rigorous level, yet in an engaging style that does not dilute the material, Fourier Analysis brings two profound aspects of the discipline to the forefront: the wealth of ap

  6. Functional analysis

    CERN Document Server

    Kantorovich, L V

    1982-01-01

    Functional Analysis examines trends in functional analysis as a mathematical discipline and the ever-increasing role played by its techniques in applications. The theory of topological vector spaces is emphasized, along with the applications of functional analysis to applied analysis. Some topics of functional analysis connected with applications to mathematical economics and control theory are also discussed. Comprised of 18 chapters, this book begins with an introduction to the elements of the theory of topological spaces, the theory of metric spaces, and the theory of abstract measure space

  7. An analysis of policies for cotrimoxazole, amoxicillin and azithromycin use in Namibia's public sector: Findings and therapeutic implications.

    Science.gov (United States)

    Kibuule, Dan; Mubita, Mwangana; Naikaku, Ester; Kalemeera, Francis; Godman, Brian B; Sagwa, Evans

    2017-02-01

    Despite Namibia's robust medicine use systems and policies, antibiotic use indicators remain suboptimal. Recent medicine use surveys rank cotrimoxazole, amoxicillin and azithromycin (CAA) among the most used medicines. However, there is rising resistance to CAA (55.9%-96.7%). Unfortunately, to date, there have been limited studies evaluating policies to improve antibiotic use in Namibia. To evaluate public sector pharmaceutical policies and guidelines influencing the therapeutic use of CAA antibiotics in Namibia. Evaluate Namibia's pharmaceutical policies and guidelines for CAA use through quantitative text analysis. The main outcome variables were the existence of antibiotic policies, therapeutic indications per antibiotic and the type/level of healthcare facility allowed to use the antibiotic. Policies for antibiotic use were limited, with only the draft Namibia Medicines Policy having a statement on antibiotic use. Several essential antibiotics had no therapeutic indications mentioned in the guidelines. Twenty-nine antibiotics were listed for 69 therapeutic indications; CAA (49.3%) antibiotics and ATC J01C/J01D (48%) having the highest indications per antibiotic. For CAA antibiotics, this suggested use was mainly for acute respiratory infections (n=22, 37.2%). Published policies (58.6%-17/29) recommended antibiotics for use at the primary healthcare (PHC) level, with CAA antibiotics recommended mostly for respiratory tract infections and genitourinary infections. Policy and guidelines for antibiotic use in Namibia are not comprehensive and are skewed towards PHCs. Existing policies promote the wide use of CAA antibiotics, which may inadvertently result in their inappropriate use enhancing resistance rates. This calls for the development of more comprehensive antibiotic guidelines and essential medicine lists in tandem with local antimicrobial resistance patterns. In addition, educational initiatives among all key stakeholder groups. © 2017 John Wiley & Sons Ltd.

  8. Dimensional Analysis

    Indian Academy of Sciences (India)

    Dimensional analysis is a useful tool which finds important applications in physics and engineering. It is most effective when there exist a maximal number of dimensionless quantities constructed out of the relevant physical variables. Though a complete theory of dimen- sional analysis was developed way back in 1914 in a.

  9. Applied analysis

    CERN Document Server

    Lanczos, Cornelius

    1956-01-01

    Basic text for graduate and advanced undergraduate deals with search for roots of algebraic equations encountered in vibration and flutter problems and in those of static and dynamic stability. Other topics devoted to matrices and eigenvalue problems, large-scale linear systems, harmonic analysis and data analysis, more.

  10. Incidents analysis

    International Nuclear Information System (INIS)

    Francois, P.

    1996-01-01

    We undertook a study programme at the end of 1991. To start with, we performed some exploratory studies aimed at learning some preliminary lessons on this type of analysis: Assessment of the interest of probabilistic incident analysis; possibility of using PSA scenarios; skills and resources required. At the same time, EPN created a working group whose assignment was to define a new approach for analysis of incidents on NPPs. This working group gave thought to both aspects of Operating Feedback that EPN wished to improve: Analysis of significant incidents; analysis of potential consequences. We took part in the work of this group, and for the second aspects, we proposed a method based on an adaptation of the event-tree method in order to establish a link between existing PSA models and actual incidents. Since PSA provides an exhaustive database of accident scenarios applicable to the two most common types of units in France, they are obviously of interest for this sort of analysis. With this method we performed some incident analyses, and at the same time explores some methods employed abroad, particularly ASP (Accident Sequence Precursor, a method used by the NRC). Early in 1994 EDF began a systematic analysis programme. The first, transient phase will set up methods and an organizational structure. 7 figs

  11. Factor Analysis via Components Analysis

    Science.gov (United States)

    Bentler, Peter M.; de Leeuw, Jan

    2011-01-01

    When the factor analysis model holds, component loadings are linear combinations of factor loadings, and vice versa. This interrelation permits us to define new optimization criteria and estimation methods for exploratory factor analysis. Although this article is primarily conceptual in nature, an illustrative example and a small simulation show…

  12. Dimensional Analysis

    CERN Document Server

    Tan, Qingming

    2011-01-01

    Dimensional analysis is an essential scientific method and a powerful tool for solving problems in physics and engineering. This book starts by introducing the Pi Theorem, which is the theoretical foundation of dimensional analysis. It also provides ample and detailed examples of how dimensional analysis is applied to solving problems in various branches of mechanics. The book covers the extensive findings on explosion mechanics and impact dynamics contributed by the author's research group over the past forty years at the Chinese Academy of Sciences. The book is intended for advanced undergra

  13. Recursive analysis

    CERN Document Server

    Goodstein, R L

    2010-01-01

    Recursive analysis develops natural number computations into a framework appropriate for real numbers. This text is based upon primary recursive arithmetic and presents a unique combination of classical analysis and intuitional analysis. Written by a master in the field, it is suitable for graduate students of mathematics and computer science and can be read without a detailed knowledge of recursive arithmetic.Introductory chapters on recursive convergence and recursive and relative continuity are succeeded by explorations of recursive and relative differentiability, the relative integral, and

  14. Special Analysis: Update of Disposal of Cement-Stabilized Encapsulated Waste at the E-Area Low-Level Waste Facility

    Energy Technology Data Exchange (ETDEWEB)

    Collard, L.B.

    2003-10-15

    This Special Analysis for Components-in-Grout (CIG) expands the list of isotopes to the full suite of normal isotopes. This revision also addresses selected isotopes in special waste forms from the K and L basin resin that have waste-specific Kds and high-concentration I-129 wastes with waste-specific Kds, including Effluent Treatment Facility (ETF) activated carbon vessels. The full suite of normal isotopes was first screened using the Slit Trench screening results as a conservative approach. The isotopes that survived the screening were analyzed to determine the appropriate CIG inventory limits. The groundwater modeling was revised to incorporate improvements and changes in other recent Special Analyses and Unreviewed Disposal Question (UDQ) evaluations. The air pathway analysis was modified to consider a distributed source rather than a point source. These changes are discussed below in intruder and groundwater sections. Tables and figures are provided in appendices that are directly related to the most recent analyses. Changes to inventory limits are shown in Table 7. Inventory limits for solubility- limited radionuclides require special treatment as discussed in Section 3.1.1.3. U-238 and Pu-239 were analyzed as being solubility-limited, because otherwise they would consume excessive amounts of their inventory limits. Other U and Pu isotopes were not analyzed as being solubility- limited because they would not consume excessive amounts of inventory limits. Current and projected inventories for the K and L basin resins are compared against inventory limits for a single set of 5 CIG trenches. Projections for the K and L basin waste are through 2035, thus actual inventory consumption is dependent on the total number of CIG trenches excavated and filled through 2035. Current inventory for three ETF activated carbon vessels awaiting disposal are compared against inventory limits for a single set of 5 CIG trenches.

  15. Hydroeconomic analysis

    DEFF Research Database (Denmark)

    Bauer-Gottwein, Peter; Riegels, Niels; Pulido-Velazquez, Manuel

    2017-01-01

    Hydroeconomic analysis and modeling provides a consistent and quantitative framework to assess the links between water resources systems and economic activities related to water use, simultaneously modeling water supply and water demand. It supports water managers and decision makers in assessing...... trade-offs between different water uses, different geographic regions, and various economic sectors and between the present and the future. Hydroeconomic analysis provides consistent economic performance criteria for infrastructure development and institutional reform in water policies and management...... organizations. This chapter presents an introduction to hydroeconomic analysis and modeling, and reviews the state of the art in the field. We review available economic water-valuation techniques and summarize the main types of decision problems encountered in hydroeconomic analysis. Popular solution strategies...

  16. Biorefinery Analysis

    Energy Technology Data Exchange (ETDEWEB)

    2016-06-01

    Fact sheet summarizing NREL's techno-economic analysis and life-cycle assessment capabilities to connect research with future commercial process integration, a critical step in the scale-up of biomass conversion technologies.

  17. Nonlinear analysis

    CERN Document Server

    Gasinski, Leszek

    2005-01-01

    Hausdorff Measures and Capacity. Lebesgue-Bochner and Sobolev Spaces. Nonlinear Operators and Young Measures. Smooth and Nonsmooth Analysis and Variational Principles. Critical Point Theory. Eigenvalue Problems and Maximum Principles. Fixed Point Theory.

  18. Analysis II

    CERN Document Server

    Tao, Terence

    2016-01-01

    This is part two of a two-volume book on real analysis and is intended for senior undergraduate students of mathematics who have already been exposed to calculus. The emphasis is on rigour and foundations of analysis. Beginning with the construction of the number systems and set theory, the book discusses the basics of analysis (limits, series, continuity, differentiation, Riemann integration), through to power series, several variable calculus and Fourier analysis, and then finally the Lebesgue integral. These are almost entirely set in the concrete setting of the real line and Euclidean spaces, although there is some material on abstract metric and topological spaces. The book also has appendices on mathematical logic and the decimal system. The entire text (omitting some less central topics) can be taught in two quarters of 25–30 lectures each. The course material is deeply intertwined with the exercises, as it is intended that the student actively learn the material (and practice thinking and writing ri...

  19. Analysis I

    CERN Document Server

    Tao, Terence

    2016-01-01

    This is part one of a two-volume book on real analysis and is intended for senior undergraduate students of mathematics who have already been exposed to calculus. The emphasis is on rigour and foundations of analysis. Beginning with the construction of the number systems and set theory, the book discusses the basics of analysis (limits, series, continuity, differentiation, Riemann integration), through to power series, several variable calculus and Fourier analysis, and then finally the Lebesgue integral. These are almost entirely set in the concrete setting of the real line and Euclidean spaces, although there is some material on abstract metric and topological spaces. The book also has appendices on mathematical logic and the decimal system. The entire text (omitting some less central topics) can be taught in two quarters of 25–30 lectures each. The course material is deeply intertwined with the exercises, as it is intended that the student actively learn the material (and practice thinking and writing ri...

  20. Water analysis

    International Nuclear Information System (INIS)

    Fishman, M.J.; Erdmann, D.E.

    1975-01-01

    The literature of analytical chemistry applied to water analysis is reviewed for the period Oct. 1972, through Sept. 1974. The material used in preparing the review comes mainly from major analytical journals and Chemical Abstracts. Many methods, including activation and radiometric, are discussed for the analyses of various elements, including Mo, U, Th, rare earths, and halides. Radioactivity and isotope analysis are also discussed. (663 references.) (U.S.)

  1. Link Analysis

    Science.gov (United States)

    Donoho, Steve

    Link analysis is a collection of techniques that operate on data that can be represented as nodes and links. This chapter surveys a variety of techniques including subgraph matching, finding cliques and K-plexes, maximizing spread of influence, visualization, finding hubs and authorities, and combining with traditional techniques (classification, clustering, etc). It also surveys applications including social network analysis, viral marketing, Internet search, fraud detection, and crime prevention.

  2. Radioactivation analysis

    International Nuclear Information System (INIS)

    1959-01-01

    Radioactivation analysis is the technique of radioactivation analysis of the constituents of a very small sample of matter by making the sample artificially radioactive. The first stage is to make the sample radioactive by artificial means, e.g. subject it to neutron bombardment. Once the sample has been activated, or made radioactive, the next task is to analyze the radiations given off by the sample. This analysis would indicate the nature and quantities of the various elements present in the sample. The reason is that the radiation from a particular radioisotope. In 1959 a symposium on 'Radioactivation Analysis' was organized in Vienna by the IAEA and the Joint Commission on Applied Radioactivity (ICSU). It was pointed out that there are certain factors creating uncertainties and elaborated how to overcome them. Attention was drawn to the fact that radioactivation analysis had proven a powerful tool tackling fundamental problems in geo- and cosmochemistry, and a review was given of the recent work in this field. Because of its extreme sensitivity radioactivation analysis had been principally employed for trace detection and its most extensive use has been in control of semiconductors and very pure metals. An account of the experience gained in the USA was given, where radioactivation analysis was being used by many investigators in various scientific fields as a practical and useful tool for elemental analyses. Much of this work had been concerned with determining sub microgramme and microgramme concentration of many different elements in samples of biological materials, drugs, fertilizers, fine chemicals, foods, fuels, glass, ceramic materials, metals, minerals, paints, petroleum products, resinous materials, soils, toxicants, water and other materials. In addition to these studies, radioactivation analysis had been used by other investigators to determine isotopic ratios of the stable isotopes of some of the elements. Another paper dealt with radioactivation

  3. The PGRIS and parathyroid splinting concepts for the analysis and prognosis of protracted hypoparathyroidism

    OpenAIRE

    Sitges-Serra, Antonio

    2017-01-01

    Most patients with hypocalcemia after total thyroidectomy will recover the parathyroid function in a few weeks, but some 20–30% of them will still be in the need for replacement therapy one month after surgery and about 5–10% of those will develop permanent hypoparathyroidism. Although postoperative hypocalcemia has been related to several demographic and metabolic causes, parathyroid hormone (PTH) decline, resulting from autotransplantation, inadvertent excision or devascularization of the p...

  4. Gastric polyps: a retrospective analysis of 26,000 digestive endoscopies

    OpenAIRE

    Morais, Drausio Jefferson; Yamanaka, Ademar; Zeitune, José Murilo Robilotta; Andreollo, Nelson Adami

    2007-01-01

    BACKGROUND: Gastric polyps are small gastric lesions, asymptomatic in most cases and are generally discovered inadvertently during upper digestive endoscopy. AIM: To retrospectively review the characteristics and frequency of gastric polyps, derived from the gastric mucosal epithelium in a large series of endoscopies. METHODS: One hundred and fifty three patients in a series of 26,000 consecutive upper digestive endoscopies done over a 5-year period, being that each patient had only one exami...

  5. Seismic Analysis Code (SAC): Development, porting, and maintenance within a legacy code base

    Science.gov (United States)

    Savage, B.; Snoke, J. A.

    2017-12-01

    The Seismic Analysis Code (SAC) is the result of toil of many developers over almost a 40-year history. Initially a Fortran-based code, it has undergone major transitions in underlying bit size from 16 to 32, in the 1980s, and 32 to 64 in 2009; as well as a change in language from Fortran to C in the late 1990s. Maintenance of SAC, the program and its associated libraries, have tracked changes in hardware and operating systems including the advent of Linux in the early 1990, the emergence and demise of Sun/Solaris, variants of OSX processors (PowerPC and x86), and Windows (Cygwin). Traces of these systems are still visible in source code and associated comments. A major concern while improving and maintaining a routinely used, legacy code is a fear of introducing bugs or inadvertently removing favorite features of long-time users. Prior to 2004, SAC was maintained and distributed by LLNL (Lawrence Livermore National Lab). In that year, the license was transferred from LLNL to IRIS (Incorporated Research Institutions for Seismology), but the license is not open source. However, there have been thousands of downloads a year of the package, either source code or binaries for specific system. Starting in 2004, the co-authors have maintained the SAC package for IRIS. In our updates, we fixed bugs, incorporated newly introduced seismic analysis procedures (such as EVALRESP), added new, accessible features (plotting and parsing), and improved the documentation (now in HTML and PDF formats). Moreover, we have added modern software engineering practices to the development of SAC including use of recent source control systems, high-level tests, and scripted, virtualized environments for rapid testing and building. Finally, a "sac-help" listserv (administered by IRIS) was setup for SAC-related issues and is the primary avenue for users seeking advice and reporting bugs. Attempts are always made to respond to issues and bugs in a timely fashion. For the past thirty-plus years

  6. Performance analysis of DoS LAND attack detection

    Directory of Open Access Journals (Sweden)

    Deepak Kshirsagar

    2016-09-01

    This paper proposes the intrusion detection mechanism for DoS detection such as Local Area Network Denial (LAND, which classified into the Network Traffic Analyzer, Traffic Features Identification and Extraction, IP spoofing based attack detection and Intruder Information. This system efficiently detects DoS LAND based on IP spoofing. This system analyzes the network resources consumed by an attacker. The system is implemented and tested using open source tools. The experimental result shows that, the proposed system produces better performance in comparison with state-of-art existing system and result into a low level of memory and CPU usage.

  7. Real analysis

    CERN Document Server

    Loeb, Peter A

    2016-01-01

    This textbook is designed for a year-long course in real analysis taken by beginning graduate and advanced undergraduate students in mathematics and other areas such as statistics, engineering, and economics. Written by one of the leading scholars in the field, it elegantly explores the core concepts in real analysis and introduces new, accessible methods for both students and instructors. The first half of the book develops both Lebesgue measure and, with essentially no additional work for the student, general Borel measures for the real line. Notation indicates when a result holds only for Lebesgue measure. Differentiation and absolute continuity are presented using a local maximal function, resulting in an exposition that is both simpler and more general than the traditional approach. The second half deals with general measures and functional analysis, including Hilbert spaces, Fourier series, and the Riesz representation theorem for positive linear functionals on continuous functions with compact support....

  8. Numerical analysis

    CERN Document Server

    Rao, G Shanker

    2006-01-01

    About the Book: This book provides an introduction to Numerical Analysis for the students of Mathematics and Engineering. The book is designed in accordance with the common core syllabus of Numerical Analysis of Universities of Andhra Pradesh and also the syllabus prescribed in most of the Indian Universities. Salient features: Approximate and Numerical Solutions of Algebraic and Transcendental Equation Interpolation of Functions Numerical Differentiation and Integration and Numerical Solution of Ordinary Differential Equations The last three chapters deal with Curve Fitting, Eigen Values and Eigen Vectors of a Matrix and Regression Analysis. Each chapter is supplemented with a number of worked-out examples as well as number of problems to be solved by the students. This would help in the better understanding of the subject. Contents: Errors Solution of Algebraic and Transcendental Equations Finite Differences Interpolation with Equal Intervals Interpolation with Unequal Int...

  9. Real analysis

    CERN Document Server

    DiBenedetto, Emmanuele

    2016-01-01

    The second edition of this classic textbook presents a rigorous and self-contained introduction to real analysis with the goal of providing a solid foundation for future coursework and research in applied mathematics. Written in a clear and concise style, it covers all of the necessary subjects as well as those often absent from standard introductory texts. Each chapter features a “Problems and Complements” section that includes additional material that briefly expands on certain topics within the chapter and numerous exercises for practicing the key concepts. The first eight chapters explore all of the basic topics for training in real analysis, beginning with a review of countable sets before moving on to detailed discussions of measure theory, Lebesgue integration, Banach spaces, functional analysis, and weakly differentiable functions. More topical applications are discussed in the remaining chapters, such as maximal functions, functions of bounded mean oscillation, rearrangements, potential theory, a...

  10. Numerical analysis

    CERN Document Server

    Jacques, Ian

    1987-01-01

    This book is primarily intended for undergraduates in mathematics, the physical sciences and engineering. It introduces students to most of the techniques forming the core component of courses in numerical analysis. The text is divided into eight chapters which are largely self-contained. However, with a subject as intricately woven as mathematics, there is inevitably some interdependence between them. The level of difficulty varies and, although emphasis is firmly placed on the methods themselves rather than their analysis, we have not hesitated to include theoretical material when we consider it to be sufficiently interesting. However, it should be possible to omit those parts that do seem daunting while still being able to follow the worked examples and to tackle the exercises accompanying each section. Familiarity with the basic results of analysis and linear algebra is assumed since these are normally taught in first courses on mathematical methods. For reference purposes a list of theorems used in the t...

  11. Numerical analysis

    CERN Document Server

    Scott, L Ridgway

    2011-01-01

    Computational science is fundamentally changing how technological questions are addressed. The design of aircraft, automobiles, and even racing sailboats is now done by computational simulation. The mathematical foundation of this new approach is numerical analysis, which studies algorithms for computing expressions defined with real numbers. Emphasizing the theory behind the computation, this book provides a rigorous and self-contained introduction to numerical analysis and presents the advanced mathematics that underpin industrial software, including complete details that are missing from most textbooks. Using an inquiry-based learning approach, Numerical Analysis is written in a narrative style, provides historical background, and includes many of the proofs and technical details in exercises. Students will be able to go beyond an elementary understanding of numerical simulation and develop deep insights into the foundations of the subject. They will no longer have to accept the mathematical gaps that ex...

  12. META - ANALYSIS

    Directory of Open Access Journals (Sweden)

    Ivana Ilić

    2009-04-01

    Full Text Available Meta-analysis is a statistical and analytical method which combines and synthesizes different independent studies and integrates their results into a common result. In the past few years, there has been an increasing interest in meta-analysis from both medical researches and statisticians. One of the main targets of clinical research is to obtain reliable results, although clinical trials with the same topic often give contrasting results. Medical practice is strongly influenced by the results of clinical studies if they are brought to light through important scientific journals. This large amount of information often contains scattered data, and discordant conclusions, and sometimes it is very hard to define the quality and validity of each study. Today, a large number of biomedical journals give importance to articles using meta-analysis in their researches. By using meta-analysis as a method of summarizing, integrating and analyzing a large number of independent studies on the same topic and finally pooling their results into a common result, a researcher can achieve relevant, objective and unbiased conclusions, if the procedure is well-conducted and controlled by the experts. The aim of this paper is to provide the clinical researcher with the basic principles of meta-analysis and its concepts in order to perform a valid clinical study and to report results in the correct way. In today’s evidence-based medical practice, it is crucial for anyone who wants to deal seriously with the scientific work in the biomedical field to learn mathematical and statistical principles that build meta-analysis. In that way, this statistical method could be of great importance to the researcher who wants to respond to new demands of modern medical science.

  13. Outlier analysis

    CERN Document Server

    Aggarwal, Charu C

    2013-01-01

    With the increasing advances in hardware technology for data collection, and advances in software technology (databases) for data organization, computer scientists have increasingly participated in the latest advancements of the outlier analysis field. Computer scientists, specifically, approach this field based on their practical experiences in managing large amounts of data, and with far fewer assumptions- the data can be of any type, structured or unstructured, and may be extremely large.Outlier Analysis is a comprehensive exposition, as understood by data mining experts, statisticians and

  14. Field analysis

    Directory of Open Access Journals (Sweden)

    Waindok Andrzej

    2017-12-01

    Full Text Available Field analysis including eddy currents in the magnetic core of five-phase permanent magnet tubular linear actuator (TLA has been carried out. The eddy currents induced in the magnetic core cause the losses which have been calculated. The results from 2D finite element (FE analysis have been compared with those from 3D calculations. The losses in the mover of the five-phase actuator are much lower than the losses in its stator. That is why the former ones can be neglected in the computer aided designing. The calculation results have been verified experimentally

  15. Numerical analysis

    CERN Document Server

    Brezinski, C

    2012-01-01

    Numerical analysis has witnessed many significant developments in the 20th century. This book brings together 16 papers dealing with historical developments, survey papers and papers on recent trends in selected areas of numerical analysis, such as: approximation and interpolation, solution of linear systems and eigenvalue problems, iterative methods, quadrature rules, solution of ordinary-, partial- and integral equations. The papers are reprinted from the 7-volume project of the Journal of Computational and Applied Mathematics on '/homepage/sac/cam/na2000/index.html<

  16. Clustering analysis

    International Nuclear Information System (INIS)

    Romli

    1997-01-01

    Cluster analysis is the name of group of multivariate techniques whose principal purpose is to distinguish similar entities from the characteristics they process.To study this analysis, there are several algorithms that can be used. Therefore, this topic focuses to discuss the algorithms, such as, similarity measures, and hierarchical clustering which includes single linkage, complete linkage and average linkage method. also, non-hierarchical clustering method, which is popular name K -mean method ' will be discussed. Finally, this paper will be described the advantages and disadvantages of every methods

  17. Image Analysis

    DEFF Research Database (Denmark)

    . The topics of the accepted papers range from novel applications of vision systems, pattern recognition, machine learning, feature extraction, segmentation, 3D vision, to medical and biomedical image analysis. The papers originate from all the Scandinavian countries and several other European countries......The 19th Scandinavian Conference on Image Analysis was held at the IT University of Copenhagen in Denmark during June 15-17, 2015. The SCIA conference series has been an ongoing biannual event for more than 30 years and over the years it has nurtured a world-class regional research and development...

  18. Risk analysis

    International Nuclear Information System (INIS)

    Baron, J.H.; Nunez McLeod, J.; Rivera, S.S.

    1997-01-01

    This book contains a selection of research works performed in the CEDIAC Institute (Cuyo National University) in the area of Risk Analysis, with specific orientations to the subjects of uncertainty and sensitivity studies, software reliability, severe accident modeling, etc. This volume presents important material for all those researches who want to have an insight in the risk analysis field, as a tool to solution several problems frequently found in the engineering and applied sciences field, as well as for the academic teachers who want to keep up to date, including the new developments and improvements continuously arising in this field [es

  19. Convex analysis

    CERN Document Server

    Rockafellar, Ralph Tyrell

    2015-01-01

    Available for the first time in paperback, R. Tyrrell Rockafellar's classic study presents readers with a coherent branch of nonlinear mathematical analysis that is especially suited to the study of optimization problems. Rockafellar's theory differs from classical analysis in that differentiability assumptions are replaced by convexity assumptions. The topics treated in this volume include: systems of inequalities, the minimum or maximum of a convex function over a convex set, Lagrange multipliers, minimax theorems and duality, as well as basic results about the structure of convex sets and

  20. Elementary analysis

    CERN Document Server

    Snell, K S; Langford, W J; Maxwell, E A

    1966-01-01

    Elementary Analysis, Volume 2 introduces several of the ideas of modern mathematics in a casual manner and provides the practical experience in algebraic and analytic operations that lays a sound foundation of basic skills. This book focuses on the nature of number, algebraic and logical structure, groups, rings, fields, vector spaces, matrices, sequences, limits, functions and inverse functions, complex numbers, and probability. The logical structure of analysis given through the treatment of differentiation and integration, with applications to the trigonometric and logarithmic functions, is

  1. Cluster analysis

    CERN Document Server

    Everitt, Brian S; Leese, Morven; Stahl, Daniel

    2011-01-01

    Cluster analysis comprises a range of methods for classifying multivariate data into subgroups. By organizing multivariate data into such subgroups, clustering can help reveal the characteristics of any structure or patterns present. These techniques have proven useful in a wide range of areas such as medicine, psychology, market research and bioinformatics.This fifth edition of the highly successful Cluster Analysis includes coverage of the latest developments in the field and a new chapter dealing with finite mixture models for structured data.Real life examples are used throughout to demons

  2. Relativistic analysis

    International Nuclear Information System (INIS)

    Unterberger, A.

    1987-01-01

    We study the Klein-Gordon symbolic calculus of operators acting on solutions of the free Klein-Gordon equation. It contracts to the Weyl calculus as c→∞. Mathematically, it may also be considered as a pseudodifferential analysis on the unit ball of R n [fr

  3. Analysis paralysis

    Science.gov (United States)

    Bill Block

    2012-01-01

    I have been Editor-in-Chief for about 10 months now. Over that period of time, I have processed hundreds of manuscripts and considered hundreds of reviews. In doing so, I have noticed an emphasis on analysis at the expense of a better understanding of the ecological system under study. I mention this not to belittle statistical advances made within various disciplines...

  4. IWS analysis

    International Nuclear Information System (INIS)

    Rhoades, W.A.; Dray, B.J.

    1970-01-01

    The effect of Gadolinium-155 on the prompt kinetic behavior of a zirconium hydride reactor has been deduced, using experimental data from the SNAPTRAN machine. The poison material makes the temperature coefficient more positive, and the Type IV sleeves were deduced to give a positive coefficient above 1100 0 F. A thorough discussion of the data and analysis is included. (U.S.)

  5. Analysis report

    International Nuclear Information System (INIS)

    Saadi, Radouan; Marah, Hamid

    2014-01-01

    This report presents results related to Tritium analysis carried out at the CNESTEN DASTE in Rabat (Morocco), on behalf of Senegal, within the framework of the RAF7011 project. It describes analytical method and instrumentation including general uncertainty estimation: Electrolytic enrichment and liquid scintillation counting; The results are expressed in Tritium Unit (TU); Low Limit Detection: 0.02 TU

  6. Dimensional Analysis

    Indian Academy of Sciences (India)

    to understand and quite straightforward to use. Dimensional analysis is a topic which every student of 'science encounters in elementary physics courses. The basics of this topic are taught and learnt quite hurriedly (and forgotten fairly quickly thereafter!) It does not generally receive the attention and the respect it deserves ...

  7. Survival Analysis

    CERN Document Server

    Miller, Rupert G

    2011-01-01

    A concise summary of the statistical methods used in the analysis of survival data with censoring. Emphasizes recently developed nonparametric techniques. Outlines methods in detail and illustrates them with actual data. Discusses the theory behind each method. Includes numerous worked problems and numerical exercises.

  8. Poetic Analysis

    DEFF Research Database (Denmark)

    Nielsen, Kirsten

    2010-01-01

    The first part of this article presents the characteristics of Hebrew poetry: features associated with rhythm and phonology, grammatical features, structural elements like parallelism, and imagery and intertextuality. The second part consists of an analysis of Psalm 121. It is argued that assonance...

  9. Architecture Analysis

    NARCIS (Netherlands)

    Iacob, Maria-Eugenia; Jonkers, Henk; van der Torre, Leon; de Boer, Frank S.; Bonsangue, Marcello; Stam, Andries W.; Lankhorst, Marc M.; Quartel, Dick A.C.; Aldea, Adina; Lankhorst, Marc

    2017-01-01

    This chapter also explains what the added value of enterprise architecture analysis techniques is in addition to existing, more detailed, and domain-specific ones for business processes or software, for example. Analogous to the idea of using the ArchiMate enterprise modelling language to integrate

  10. Trend analysis

    International Nuclear Information System (INIS)

    Smith, M.; Jones, D.R.

    1991-01-01

    The goal of exploration is to find reserves that will earn an adequate rate of return on the capital invested. Neither exploration nor economics is an exact science. The authors must therefore explore in those trends (plays) that have the highest probability of achieving this goal. Trend analysis is a technique for organizing the available data to make these strategic exploration decisions objectively and is in conformance with their goals and risk attitudes. Trend analysis differs from resource estimation in its purpose. It seeks to determine the probability of economic success for an exploration program, not the ultimate results of the total industry effort. Thus the recent past is assumed to be the best estimate of the exploration probabilities for the near future. This information is combined with economic forecasts. The computer software tools necessary for trend analysis are (1) Information data base - requirements and sources. (2) Data conditioning program - assignment to trends, correction of errors, and conversion into usable form. (3) Statistical processing program - calculation of probability of success and discovery size probability distribution. (4) Analytical processing - Monte Carlo simulation to develop the probability distribution of the economic return/investment ratio for a trend. Limited capital (short-run) effects are analyzed using the Gambler's Ruin concept in the Monte Carlo simulation and by a short-cut method. Multiple trend analysis is concerned with comparing and ranking trends, allocating funds among acceptable trends, and characterizing program risk by using risk profiles. In summary, trend analysis is a reality check for long-range exploration planning

  11. The effect of rigid and non-rigid connections between implants and teeth on biological and technical complications: a systematic review and a meta-analysis.

    Science.gov (United States)

    Tsaousoglou, Phoebus; Michalakis, Konstantinos; Kang, Kiho; Weber, Hans-Peter; Sculean, Anton

    2017-07-01

    To assess survival, as well as technical and biological complication rates of partial fixed dental prostheses (FDPs) supported by implants and teeth. An electronic Medline search was conducted to identify articles, published in dental journals from January 1980 to August 2015, reporting on partial FDPs supported by implants and teeth. The search terms were categorized into four groups comprising the PICO question. Manual searches of published full-text articles and related reviews were also performed. The initial database search produced 3587 relevant titles. Three hundred and eighty-six articles were retrieved for abstract review, while 39 articles were selected for full-text review. A total of 10 studies were selected for inclusion. Overall survival rate for implants ranged between 90% and 100%, after follow-up periods with a mean range of 18-120 months. The survival of the abutment teeth was 94.1-100%, while the prostheses survival was 85-100% for the same time period. The most frequent complications were "periapical lesions" (11.53%). The most frequent technical complication was "porcelain occlusal fracture" (16.6%), followed by "screw loosening" (15%). According to the meta-analysis, no intrusion was noted on the rigid connection group, while five teeth (8.19%) were intruded in the non-rigid connection group [95% CI (0.013-0.151)]. The tooth-implant FDP seems to be a possible alternative to an implant-supported FDP. There is limited evidence that rigid connection between teeth and implants presents better results when compared with the non-rigid one. The major drawback of non-rigidly connected FDPs is tooth intrusion. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  12. Complex analysis

    CERN Document Server

    Freitag, Eberhard

    2005-01-01

    The guiding principle of this presentation of ``Classical Complex Analysis'' is to proceed as quickly as possible to the central results while using a small number of notions and concepts from other fields. Thus the prerequisites for understanding this book are minimal; only elementary facts of calculus and algebra are required. The first four chapters cover the essential core of complex analysis: - differentiation in C (including elementary facts about conformal mappings) - integration in C (including complex line integrals, Cauchy's Integral Theorem, and the Integral Formulas) - sequences and series of analytic functions, (isolated) singularities, Laurent series, calculus of residues - construction of analytic functions: the gamma function, Weierstrass' Factorization Theorem, Mittag-Leffler Partial Fraction Decomposition, and -as a particular highlight- the Riemann Mapping Theorem, which characterizes the simply connected domains in C. Further topics included are: - the theory of elliptic functions based on...

  13. Wavelet analysis

    CERN Document Server

    Cheng, Lizhi; Luo, Yong; Chen, Bo

    2014-01-01

    This book could be divided into two parts i.e. fundamental wavelet transform theory and method and some important applications of wavelet transform. In the first part, as preliminary knowledge, the Fourier analysis, inner product space, the characteristics of Haar functions, and concepts of multi-resolution analysis, are introduced followed by a description on how to construct wavelet functions both multi-band and multi wavelets, and finally introduces the design of integer wavelets via lifting schemes and its application to integer transform algorithm. In the second part, many applications are discussed in the field of image and signal processing by introducing other wavelet variants such as complex wavelets, ridgelets, and curvelets. Important application examples include image compression, image denoising/restoration, image enhancement, digital watermarking, numerical solution of partial differential equations, and solving ill-conditioned Toeplitz system. The book is intended for senior undergraduate stude...

  14. Harmonic analysis

    CERN Document Server

    Helson, Henry

    2010-01-01

    This second edition has been enlarged and considerably rewritten. Among the new topics are infinite product spaces with applications to probability, disintegration of measures on product spaces, positive definite functions on the line, and additional information about Weyl's theorems on equidistribution. Topics that have continued from the first edition include Minkowski's theorem, measures with bounded powers, idempotent measures, spectral sets of bounded functions and a theorem of Szego, and the Wiener Tauberian theorem. Readers of the book should have studied the Lebesgue integral, the elementary theory of analytic and harmonic functions, and the basic theory of Banach spaces. The treatment is classical and as simple as possible. This is an instructional book, not a treatise. Mathematics students interested in analysis will find here what they need to know about Fourier analysis. Physicists and others can use the book as a reference for more advanced topics.

  15. Geometric analysis

    CERN Document Server

    Bray, Hubert L; Mazzeo, Rafe; Sesum, Natasa

    2015-01-01

    This volume includes expanded versions of the lectures delivered in the Graduate Minicourse portion of the 2013 Park City Mathematics Institute session on Geometric Analysis. The papers give excellent high-level introductions, suitable for graduate students wishing to enter the field and experienced researchers alike, to a range of the most important areas of geometric analysis. These include: the general issue of geometric evolution, with more detailed lectures on Ricci flow and Kähler-Ricci flow, new progress on the analytic aspects of the Willmore equation as well as an introduction to the recent proof of the Willmore conjecture and new directions in min-max theory for geometric variational problems, the current state of the art regarding minimal surfaces in R^3, the role of critical metrics in Riemannian geometry, and the modern perspective on the study of eigenfunctions and eigenvalues for Laplace-Beltrami operators.

  16. [OSTEOMETRIC ANALYSIS].

    Science.gov (United States)

    Tartaglia, Gianna; Nava, Alessia

    2015-01-01

    In the paleobiological studies, the osteometry is a method for gaining insight into human populations of the past. The analysis of the data obtained from measurements of the skeleton can be applied in the determination of sex and degree of sexual dimorphism intra and interpopulation. The results obtained from osteometrical data of postcranial allow us to formulate hypotheses on certain aspects related to the living conditions of the people who lived in the urban and suburban area of ancient Rome.

  17. Survival analysis

    International Nuclear Information System (INIS)

    Badwe, R.A.

    1999-01-01

    The primary endpoint in the majority of the studies has been either disease recurrence or death. This kind of analysis requires a special method since all patients in the study experience the endpoint. The standard method for estimating such survival distribution is Kaplan Meier method. The survival function is defined as the proportion of individuals who survive beyond certain time. Multi-variate comparison for survival has been carried out with Cox's proportional hazard model

  18. Meaning of 9/11 for two Pakistani communities: from external intruders to the internalisation of a negative self-image.

    Science.gov (United States)

    Rousseau, Cécile; Jamil, Uzma

    2008-12-01

    Since September 11, the increase in international tensions and the subsequent wars in Afghanistan and Iraq have created turmoil and fears in immigrant communities, fanned by the media in the context of the war against terrorism. This paper aims to compare the meaning systems evoked around 9/11 within two Pakistani groups-an immigrant community in Montreal and a group in Karachi. It also intends to examine the representation of themselves and of the 'Other' within these two groups. Results suggest that both Karachi and Montreal Pakistani respondents favour a conspiracy scenario which protects the Muslim community from the responsibility of 9/11 events. They refer to an argumentation process based on 'proofs', thus mirroring the political rhetoric used by the US government and its allies to justify the military intervention in Iraq. In the Montreal group, the pervasive feeling of fear and the bleak image that the community has of itself support the hypothesis of an immigrant internalisation of the negative representations of Muslim and South Asian identities in the North American context. The negative self-image observed in these minority groups indicates that more effort than ever should be dedicated to understanding the impact of the present international context on minority-majority relations in multi-ethnic societies. It is as if America is sitting right here in the living room with us … We have to ask them permission to breathe. (Parveen, Karachi).

  19. Water analysis

    International Nuclear Information System (INIS)

    Garbarino, J.R.; Steinheimer, T.R.; Taylor, H.E.

    1985-01-01

    This is the twenty-first biennial review of the inorganic and organic analytical chemistry of water. The format of this review differs somewhat from previous reviews in this series - the most recent of which appeared in Analytical Chemistry in April 1983. Changes in format have occurred in the presentation of material concerning review articles and the inorganic analysis of water sections. Organic analysis of water sections are organized as in previous reviews. Review articles have been compiled and tabulated in an Appendix with respect to subject, title, author(s), citation, and number of references cited. The inorganic water analysis sections are now grouped by constituent using the periodic chart; for example, alkali, alkaline earth, 1st series transition metals, etc. Within these groupings the references are roughly grouped by instrumental technique; for example, spectrophotometry, atomic absorption spectrometry, etc. Multiconstituent methods for determining analytes that cannot be grouped in this manner are compiled into a separate section sorted by instrumental technique. References used in preparing this review were compiled from nearly 60 major journals published during the period from October 1982 through September 1984. Conference proceedings, most foreign journals, most trade journals, and most government publications are excluded. References cited were obtained using the American Chemical Society's Chemical Abstracts for sections on inorganic analytical chemistry, organic analytical chemistry, water, and sewage waste. Cross-references of these sections were also included. 860 references

  20. Economic analysis

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-06-01

    The Energy Policy and Conservation Act (EPCA) mandated that minimum energy efficiency standards be established for classes of refrigerators and refrigerator-freezers, freezers, clothes dryers, water heaters, room air conditioners, home heating equipment, kitchen ranges and ovens, central air conditioners, and furnaces. EPCA requires that standards be designed to achieve the maximum improvement in energy efficiency that is technologically feasible and economically justified. Following the introductory chapter, Chapter Two describes the methodology used in the economic analysis and its relationship to legislative criteria for consumer product efficiency assessment; details how the CPES Value Model systematically compared and evaluated the economic impacts of regulation on the consumer, manufacturer and Nation. Chapter Three briefly displays the results of the analysis and lists the proposed performance standards by product class. Chapter Four describes the reasons for developing a baseline forecast, characterizes the baseline scenario from which regulatory impacts were calculated and summarizes the primary models, data sources and assumptions used in the baseline formulations. Chapter Five summarizes the methodology used to calculate regulatory impacts; describes the impacts of energy performance standards relative to the baseline discussed in Chapter Four. Also discussed are regional standards and other program alternatives to performance standards. Chapter Six describes the procedure for balancing consumer, manufacturer, and national impacts to select standard levels. Details of models and data bases used in the analysis are included in Appendices A through K.

  1. Activation analysis

    International Nuclear Information System (INIS)

    Beeck, J. OP de

    1977-01-01

    It is shown that activation analysis is especially suited to serve as a basis for determining the chemical similarity between samples defined by their trace-element concentration patterns. The general problem of classification and identification is discussed. The nature of possible classification structures and their appropriate clustering strategies is considered. A practical computer method is suggested and its application as well as the graphical representation of classification results are given. The possibility for classification using information theory is mentioned. Classification of chemical elements is discussed and practically realized after Hadamard transformation of the concentration variation patterns in a series of samples. (Sz.N.Z.)

  2. Exergy analysis

    DEFF Research Database (Denmark)

    Dovjak, M.; Simone, Angela; Kolarik, Jakub

    2011-01-01

    Exergy analysis enables us to make connections among processes inside the human body and processes in a building. So far, only the effect of different combinations of air temperatures and mean radiant temperatures have been studied, with constant relative humidity in experimental conditions...... al. (1998). The effect of different levels of RH, Ta and effective clothing insulation on human body exergy balance chain, changes in human body exergy consumption rate (hbExCr) and predicted mean vote (PMV) index were analyzed. The results show that thermal comfort conditions do not always results...

  3. Complex Analysis

    CERN Document Server

    Stein, Elias M

    2009-01-01

    With this second volume, we enter the intriguing world of complex analysis. From the first theorems on, the elegance and sweep of the results is evident. The starting point is the simple idea of extending a function initially given for real values of the argument to one that is defined when the argument is complex. From there, one proceeds to the main properties of holomorphic functions, whose proofs are generally short and quite illuminating: the Cauchy theorems, residues, analytic continuation, the argument principle.With this background, the reader is ready to learn a wealth of additional m

  4. Vector analysis

    CERN Document Server

    Newell, Homer E

    2006-01-01

    When employed with skill and understanding, vector analysis can be a practical and powerful tool. This text develops the algebra and calculus of vectors in a manner useful to physicists and engineers. Numerous exercises (with answers) not only provide practice in manipulation but also help establish students' physical and geometric intuition in regard to vectors and vector concepts.Part I, the basic portion of the text, consists of a thorough treatment of vector algebra and the vector calculus. Part II presents the illustrative matter, demonstrating applications to kinematics, mechanics, and e

  5. Sequential analysis

    CERN Document Server

    Wald, Abraham

    2013-01-01

    In 1943, while in charge of Columbia University's Statistical Research Group, Abraham Wald devised Sequential Design, an innovative statistical inference system. Because the decision to terminate an experiment is not predetermined, sequential analysis can arrive at a decision much sooner and with substantially fewer observations than equally reliable test procedures based on a predetermined number of observations. The system's immense value was immediately recognized, and its use was restricted to wartime research and procedures. In 1945, it was released to the public and has since revolutio

  6. Vector analysis

    CERN Document Server

    Brand, Louis

    2006-01-01

    The use of vectors not only simplifies treatments of differential geometry, mechanics, hydrodynamics, and electrodynamics, but also makes mathematical and physical concepts more tangible and easy to grasp. This text for undergraduates was designed as a short introductory course to give students the tools of vector algebra and calculus, as well as a brief glimpse into these subjects' manifold applications. The applications are developed to the extent that the uses of the potential function, both scalar and vector, are fully illustrated. Moreover, the basic postulates of vector analysis are brou

  7. In situ major and trace element analysis of amphiboles in quartz monzodiorite porphyry from the Tonglvshan Cu-Fe (Au) deposit, Hubei Province, China: insights into magma evolution and related mineralization

    Science.gov (United States)

    Duan, Deng-Fei; Jiang, Shao-Yong

    2017-05-01

    The Tonglvshan deposit is the largest Cu-Fe (Au) skarn deposit in the Edong district, which is located in the westernmost part of the Middle and Lower Yangtze River metallogenic belt, China. In this study, we performed a detailed in situ analysis of major and trace elements in amphiboles from the ore-related Tonglvshan quartz monzodiorite porphyry using electron microprobe (EMPA) analysis and laser ablation inductively coupled plasma mass spectrometry (LA-ICP-MS). Two distinct populations of amphiboles, which can be distinguished by their aluminum content, are found in the quartz monzodiorite porphyry. The low-aluminum (Low-Al) amphiboles are subhedral or anhedral and formed at 46.3-73.5 MPa and 713-763 °C. In contrast, the high-aluminum (High-Al) amphiboles are euhedral and formed at 88-165 MPa and 778-854 °C. Some euhedral amphiboles are partially or completely replaced by Low-Al amphibole. The compositions of parental melts in equilibrium with the High-Al amphibole ( Melt 1) and Low-Al amphibole ( Melt 2) were computed by applying solid/liquid partition coefficients. This modeling shows that magma in equilibrium with High-Al amphibole ( Melt 1) underwent 40% fractional crystallization of amphibole, plagioclase and apatite at a depth of 5 km to evolve to magma in equilibrium with Low-Al amphibole ( Melt 2). Copper enrichment occurred in the magma after undergoing fractional crystallization. The magma had a high oxygen fugacity, increasing from NNO + 1 ( Melt 1) through NNO + 2 to HM ( Melt 2), which could have prevented the loss of Cu (and possibly Au) to sulfide minerals during crystallization. Finally, the evolved magma intruded to shallower depths, where it presumably exsolved aqueous ore-forming fluids. Therefore, the large Cu-Fe-Au reserves of the Tonglvshan deposit can likely be attributed to a combination of controlling factors, including high oxygen fugacity, fractional crystallization, fluid exsolution, and a shallow emplacement depth.

  8. Understanding analysis

    CERN Document Server

    Abbott, Stephen

    2015-01-01

    This lively introductory text exposes the student to the rewards of a rigorous study of functions of a real variable. In each chapter, informal discussions of questions that give analysis its inherent fascination are followed by precise, but not overly formal, developments of the techniques needed to make sense of them. By focusing on the unifying themes of approximation and the resolution of paradoxes that arise in the transition from the finite to the infinite, the text turns what could be a daunting cascade of definitions and theorems into a coherent and engaging progression of ideas. Acutely aware of the need for rigor, the student is much better prepared to understand what constitutes a proper mathematical proof and how to write one. Fifteen years of classroom experience with the first edition of Understanding Analysis have solidified and refined the central narrative of the second edition. Roughly 150 new exercises join a selection of the best exercises from the first edition, and three more project-sty...

  9. Down the wrong road - a case report of inadvertent nasogastric tube insertion leading to lung laceration and important pearls to avoid complications.

    Science.gov (United States)

    Mohiuddin, Syed Adnan; Al Kaabi, Saad; Butt, Tarik; Yakoob, Rafie; Khanna, Maneesh

    2016-01-01

    Nasogastric tube (NGT) insertion is a common procedure performed by residents and nursing staff to access the stomach. Although an apparently simple procedure, it is associated with technical difficulties and complications if proper care is not taken during insertion. We present a case of a 79-year-old female with multiple comorbidities who had a percutaneous enteral gastrostomy tube removed due to infection of an insertion site wound and a NGT was inserted for feeding. A few minutes post-insertion the patient developed shortness of breath and a drop in oxygen saturation. An immediate chest X-ray showed the NG tube traversing along the course of the trachea and the right main bronchus into the right upper abdomen with right-sided pneumothorax. The NG tube was immediately removed and a right chest drain inserted. Subsequent imaging showed right-sided pneumothorax with evidence of lung laceration and underlying lung collapse and diaphragmatic injury. The patient underwent a prolonged course of hospitalisation due to hospital-acquired pneumonia before being discharged upon clinical improvement. We highlight the fact that a simple and routine procedure such as NGT insertion can have devastating complications if due care is not taken. Along with a literature review, we provide and compare different methods to confirm correct placement of a NGT. The article also discusses important pearls for practising physicians and nursing staff to avoid such complications. Owing to the frequency of the procedure in hospitals and long-term care units, appropriate awareness among medical staff is necessary.

  10. Down the wrong road – a case report of inadvertent nasogastric tube insertion leading to lung laceration and important pearls to avoid complications

    Science.gov (United States)

    Mohiuddin, Syed Adnan; Al Kaabi, Saad; Butt, Tarik; Yakoob, Rafie; Khanna, Maneesh

    2016-01-01

    Nasogastric tube (NGT) insertion is a common procedure performed by residents and nursing staff to access the stomach. Although an apparently simple procedure, it is associated with technical difficulties and complications if proper care is not taken during insertion. We present a case of a 79-year-old female with multiple comorbidities who had a percutaneous enteral gastrostomy tube removed due to infection of an insertion site wound and a NGT was inserted for feeding. A few minutes post-insertion the patient developed shortness of breath and a drop in oxygen saturation. An immediate chest X-ray showed the NG tube traversing along the course of the trachea and the right main bronchus into the right upper abdomen with right-sided pneumothorax. The NG tube was immediately removed and a right chest drain inserted. Subsequent imaging showed right-sided pneumothorax with evidence of lung laceration and underlying lung collapse and diaphragmatic injury. The patient underwent a prolonged course of hospitalisation due to hospital-acquired pneumonia before being discharged upon clinical improvement. We highlight the fact that a simple and routine procedure such as NGT insertion can have devastating complications if due care is not taken. Along with a literature review, we provide and compare different methods to confirm correct placement of a NGT. The article also discusses important pearls for practising physicians and nursing staff to avoid such complications. Owing to the frequency of the procedure in hospitals and long-term care units, appropriate awareness among medical staff is necessary. PMID:28534005

  11. Expansion of Non-Native Brown Trout in South Europe May Be Inadvertently Driven by Stocking: Molecular and Social Survey in the North Iberian Narcea River

    Directory of Open Access Journals (Sweden)

    Jose L. Horreo

    2015-07-01

    Full Text Available The biological and anthropogenic (management factors that may contribute to the expansion of non-native lineages in managed fish have been studied in this work taking brown trout (Salmo trutta as a model species. The changes of users’ opinion about stocking was studied employing social science methodology (surveys. The evolution of hatchery stocks together with the outcome of stocking were analysed with two genetic tools: the LDH-C1* locus (marker of non-native stocks and six microsatellite loci (for assignment of wild trout to the natural population or putative hatchery stocks. Consulted stakeholders were convinced of the correctness of releasing only native stocks, although in practice the hatcheries managed by them contained important proportions of non-native gene carriers. Our results suggest that allochthonous individuals perform better and grow faster in hatchery conditions than the native ones. We also find a dilution of the impact of this kind of suplementation in wild conditions. The use of only native individuals as hatchery breeders tested for the presence of non-native alleles previously to the artificial crosses must be a priority. Surveys can help steer policy making toward decisions that will be followed by the public, but they should not be used to justify science.

  12. Inadvertent injection of potassium chloride instead of sodium chloride during treatment of chronic low back ache with epidural injection leading to paraplegia

    Directory of Open Access Journals (Sweden)

    Rahul Ranjan

    2016-01-01

    Full Text Available Epidural injection of steroid is given for back pain resistant to other conservative management. Normal saline (NS is used as diluent in 80 mg methylprednisolone and a local anesthetic. Due to a similar looking ampoule of NS and potassium chloride (KCl, there is a probability of accidental use of KCl instead of NS. We present a case of a 50 year old male patient having low back ache refractory to other conservative treatments. Epidural injection of steroid was given, but accidently KCl was mixed with methylprednisolone instead of NS. He developed severe cramps in the lower limbs, pruritus, and sweating, and finally paraplegia. Electrocardiography and blood showed features suggestive of hyperkalemia. He was given calcium gluconate and potassium chelating agent along with supportive measures. The patient recovered within 8 h. It is concluded that calcium gluconate and potassium chelating agent can be used if accidentally KCl is injected in epidural space.

  13. Inadvertent Evangalisms (Or Not): Teachers' Views on Religion, Religious Beliefs, Positionality and Presence and Their Influence on Their Curricular Choices in the Classroom

    Science.gov (United States)

    Lipmen, Sara-Jean

    2017-01-01

    There has been very limited research on the possible role religion has in its influence on teacher choices, especially within a Social Science classroom. The purpose of this study was to examine how secondary Social Studies teachers explicitly and implicitly treat religion as a factor in the teaching of history and how their own affinity with/to a…

  14. Violent explosion after inadvertent mixing of nitric acid and isopropanol – Review 15 years later finds basic accident data corrupted, no evidence of broad learning

    DEFF Research Database (Denmark)

    Hedlund, Frank Huess; Folmer Nielsen, Merete; Hagen Mikkelsen, Sonja

    2014-01-01

    to produce isopropyl nitrate (nitric acid 1-methylethyl ester, CAS 1712-64-7), a rocket propellant. It is argued that the accident has broad learning potential because of the widespread usage of the two chemicals across industries, the innocent nature of the human error and the severity of the consequence....... A review 15 years later of lessons learned finds that information dissemination has followed a tradition of informal meetings in small industry sector associations but impact is unclear. There is no useful mention of the accident in open sources. Although the Danish Working Environment Authority took...... the brewery to court for negligence, they did not report or investigate the accident, or attempt to disseminate information available to them. Today, the general literature is silent on the explosion hazards of mixing the two chemicals. The paper argues that without institutional support, learning...

  15. Inadvertent Exposure to Pornography on the Internet: Implications of Peer-to-Peer File-Sharing Networks for Child Development and Families

    Science.gov (United States)

    Greenfield, P.M.

    2004-01-01

    This essay comprises testimony to the Congressional Committee on Government Reform. The Committee's concern was the possibility of exposure to pornography when children and teens participate in peer-to-peer file-sharing networks, which are extremely popular in these age groups. A review of the relevant literature led to three major conclusions:…

  16. Failure Analysis

    International Nuclear Information System (INIS)

    Iorio, A.F.; Crespi, J.C.

    1987-01-01

    After ten years of operation at the Atucha I Nuclear Power Station a gear belonging to a pressurized heavy water reactor refuelling machine, failed. The gear box was used to operate the inlet-outlet heavy-water valve of the machine. Visual examination of the gear device showed an absence of lubricant and that several gear teeth were broken at the root. Motion was transmitted with a speed-reducing device with controlled adjustable times in order to produce a proper fitness of the valve closure. The aim of this paper is to discuss the results of the gear failure analysis in order to recommend the proper solution to prevent further failures. (Author)

  17. Erratum to: A Rapid and Reliable Method for Total Protein Extraction from Succulent Plants for Proteomic Analysis.

    Science.gov (United States)

    Lledías, Fernando; Hernández, Felipe; Rivas, Viridiana; García-Mendoza, Abisaí; Cassab, Gladys I; Nieto-Sotelo, Jorge

    2017-12-01

    The original version of this article unfortunately contains a mistake. The authors have inadvertently incorrectly listed the concentration of TCA in the acetone/TCA/β-ME solution in the materials and methods section of this paper. The TCA concentration in Sects. 2.3.2 and 2.3.5 should be 10% TCA, making the solution acetone/10% TCA/0.07% β-ME. It is now corrected with this erratum.

  18. Matrix analysis

    CERN Document Server

    Bhatia, Rajendra

    1997-01-01

    A good part of matrix theory is functional analytic in spirit. This statement can be turned around. There are many problems in operator theory, where most of the complexities and subtleties are present in the finite-dimensional case. My purpose in writing this book is to present a systematic treatment of methods that are useful in the study of such problems. This book is intended for use as a text for upper division and gradu­ ate courses. Courses based on parts of the material have been given by me at the Indian Statistical Institute and at the University of Toronto (in collaboration with Chandler Davis). The book should also be useful as a reference for research workers in linear algebra, operator theory, mathe­ matical physics and numerical analysis. A possible subtitle of this book could be Matrix Inequalities. A reader who works through the book should expect to become proficient in the art of deriving such inequalities. Other authors have compared this art to that of cutting diamonds. One first has to...

  19. Functional analysis

    CERN Document Server

    Kesavan, S

    2009-01-01

    The material presented in this book is suited for a first course in Functional Analysis which can be followed by Masters students. While covering all the standard material expected of such a course, efforts have been made to illustrate the use of various theorems via examples taken from differential equations and the calculus of variations, either through brief sections or through exercises. In fact, this book will be particularly useful for students who would like to pursue a research career in the applications of mathematics. The book includes a chapter on weak and weak topologies and their applications to the notions of reflexivity, separability and uniform convexity. The chapter on the Lebesgue spaces also presents the theory of one of the simplest classes of Sobolev spaces. The book includes a chapter on compact operators and the spectral theory for compact self-adjoint operators on a Hilbert space. Each chapter has large collection of exercises at the end. These illustrate the results of the text, show ...

  20. Uncertainty analysis

    International Nuclear Information System (INIS)

    Thomas, R.E.

    1982-03-01

    An evaluation is made of the suitability of analytical and statistical sampling methods for making uncertainty analyses. The adjoint method is found to be well-suited for obtaining sensitivity coefficients for computer programs involving large numbers of equations and input parameters. For this purpose the Latin Hypercube Sampling method is found to be inferior to conventional experimental designs. The Latin hypercube method can be used to estimate output probability density functions, but requires supplementary rank transformations followed by stepwise regression to obtain uncertainty information on individual input parameters. A simple Cork and Bottle problem is used to illustrate the efficiency of the adjoint method relative to certain statistical sampling methods. For linear models of the form Ax=b it is shown that a complete adjoint sensitivity analysis can be made without formulating and solving the adjoint problem. This can be done either by using a special type of statistical sampling or by reformulating the primal problem and using suitable linear programming software

  1. Uncertainty analysis

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, R.E.

    1982-03-01

    An evaluation is made of the suitability of analytical and statistical sampling methods for making uncertainty analyses. The adjoint method is found to be well-suited for obtaining sensitivity coefficients for computer programs involving large numbers of equations and input parameters. For this purpose the Latin Hypercube Sampling method is found to be inferior to conventional experimental designs. The Latin hypercube method can be used to estimate output probability density functions, but requires supplementary rank transformations followed by stepwise regression to obtain uncertainty information on individual input parameters. A simple Cork and Bottle problem is used to illustrate the efficiency of the adjoint method relative to certain statistical sampling methods. For linear models of the form Ax=b it is shown that a complete adjoint sensitivity analysis can be made without formulating and solving the adjoint problem. This can be done either by using a special type of statistical sampling or by reformulating the primal problem and using suitable linear programming software.

  2. Information security risk analysis

    CERN Document Server

    Peltier, Thomas R

    2001-01-01

    Effective Risk AnalysisQualitative Risk AnalysisValue AnalysisOther Qualitative MethodsFacilitated Risk Analysis Process (FRAP)Other Uses of Qualitative Risk AnalysisCase StudyAppendix A: QuestionnaireAppendix B: Facilitated Risk Analysis Process FormsAppendix C: Business Impact Analysis FormsAppendix D: Sample of ReportAppendix E: Threat DefinitionsAppendix F: Other Risk Analysis OpinionsIndex

  3. A Lipskian analysis of child protection failures from Victoria Climbié to "Baby P": a street-level re-evaluation of joined-up governance.

    Science.gov (United States)

    Marinetto, Michael

    2011-01-01

    This paper explores the issue of joined-up governance by considering child protection failures, firstly, the case of Victoria Climbié who was killed by her guardians despite being known as an at risk child by various public agencies. The seeming inability of the child protection system to prevent Victoria Climbié's death resulted in a public inquiry under the chairmanship of Lord Laming. The Laming report of 2003 looked, in part, to the lack of joined-up working between agencies to explain this failure to intervene and made a number of recommendations to improve joined-up governance. Using evidence from detailed testimonies given by key personnel during the Laming Inquiry, the argument of this paper is that we cannot focus exclusively on formal structures or decision-making processes but must also consider the normal, daily and informal routines of professional workers. These very same routines may inadvertently culminate in the sort of systemic failures that lead to child protection tragedies. Analysis of the micro-world inhabited by professional workers would benefit most, it is argued here, from the policy-based concept of street-level bureaucracy developed by Michael Lipsky some 30 years ago. The latter half of the paper considers child protection failures that emerged after the Laming-inspired reforms. In particular, the case of ‘Baby P’ highlights, once again, how the working practices of street-level professionals, rather than a lack of joined-up systems, may possibly complement an analysis of, and help us to explain, failures in the child protection system. A Lipskian analysis generally offers, although there are some caveats, only pessimistic conclusions about the prospects of governing authorities being able to avoid future child protection disasters. These conclusions are not wholeheartedly accepted. There exists a glimmer of optimism because street-level bureaucrats still remain accountable, but not necessarily in terms of top-down relations of

  4. Pitfalls of improperly procured adjacent non-neoplastic tissue for somatic mutation analysis using next-generation sequencing

    Directory of Open Access Journals (Sweden)

    Lei Wei

    2016-10-01

    Full Text Available Abstract Background The rapid adoption of next-generation sequencing provides an efficient system for detecting somatic alterations in neoplasms. The detection of such alterations requires a matched non-neoplastic sample for adequate filtering of non-somatic events such as germline polymorphisms. Non-neoplastic tissue adjacent to the excised neoplasm is often used for this purpose as it is simultaneously collected and generally contains the same tissue type as the neoplasm. Following NGS analysis, we and others have frequently observed low-level somatic mutations in these non-neoplastic tissues, which may impose additional challenges to somatic mutation detection as it complicates germline variant filtering. Methods We hypothesized that the low-level somatic mutation observed in non-neoplastic tissues may be entirely or partially caused by inadvertent contamination by neoplastic cells during the surgical pathology gross assessment or tissue procurement process. To test this hypothesis, we applied a systematic protocol designed to collect multiple grossly non-neoplastic tissues using different methods surrounding each single neoplasm. The procedure was applied in two breast cancer lumpectomy specimens. In each case, all samples were first sequenced by whole-exome sequencing to identify somatic mutations in the neoplasm and determine their presence in the adjacent non-neoplastic tissues. We then generated ultra-deep coverage using targeted sequencing to assess the levels of contamination in non-neoplastic tissue samples collected under different conditions. Results Contamination levels in non-neoplastic tissues ranged up to 3.5 and 20.9 % respectively in the two cases tested, with consistent pattern correlated with the manner of grossing and procurement. By carefully controlling the conditions of various steps during this process, we were able to eliminate any detectable contamination in both patients. Conclusion The results demonstrated that the

  5. Special Analysis: Atmospheric Dose Resulting from the Release of C14 from Reactor Moderator Deionizers in a Disposal Environment

    Energy Technology Data Exchange (ETDEWEB)

    Hiergesell, Robert A.; Swingle, Robert F.

    2005-08-18

    The proposed action of disposing of 52 moderator deionizer vessels within the ILV was evaluated in this SA. In particular, a detailed analysis of the release of {sup 14}C via the atmospheric pathway was conducted for these vessels since the major concern has been the nearly 20 Ci of {sup 14}C that is associated with each vessel. The more rigorous evaluation of the atmospheric pathway for {sup 14}C included incorporation of new information about the chemical availability of {sup 14}C when disposed in a grout/cement encapsulation environment, as will be the case in the ILV. This information was utilized to establish the source term for a 1-D numerical model to simulate the diffusion of {sup 14}CO{sub 2} from the ILV Waste Zone to the land surface. The results indicate a peak surface emanation rate from the entire ILV of 1.42E-08 Ci/yr with an associated dose of only 3.83E-05 mrem/yr to the Maximally Exposed Individual (MEI) at 100m. The fact that the atmospheric pathway exposure for {sup 14}C is controlled by chemical solubility limits for {sup 14}C between the solid waste, pore water and pore vapor within the disposal environment rather than the absolute inventory suggests that the establishment of specific facility limits is inappropriate. With the relaxation of the atmospheric pathway restriction, the groundwater pathway becomes the more restrictive in terms of disposing {sup 14}C or {sup 14}C{sub KB} within the ILV. Since the resin-based {sup 14}C of the 52 moderator deionizer vessels is highly similar to the {sup 14}C{sub KB} waste form, the inventory from the 52 deionizer vessels is compared against the groundwater limits for that waste form. The small groundwater pathway fraction (1.14E-05) calculated for the proposed inventory of the 52 moderator deionizer vessels indicates that the proposed action will have an insignificant impact with respect to possible exposures via the groundwater pathway. This investigation recommends that there be no ILV Atmospheric

  6. Special Analysis: Atmospheric Dose Resulting from the Release of C14 from Reactor Moderator Deionizers in a Disposal Environment

    International Nuclear Information System (INIS)

    Hiergesell, Robert A.; Swingle, Robert F.

    2005-01-01

    The proposed action of disposing of 52 moderator deionizer vessels within the ILV was evaluated in this SA. In particular, a detailed analysis of the release of 14 C via the atmospheric pathway was conducted for these vessels since the major concern has been the nearly 20 Ci of 14 C that is associated with each vessel. The more rigorous evaluation of the atmospheric pathway for 14 C included incorporation of new information about the chemical availability of 14 C when disposed in a grout/cement encapsulation environment, as will be the case in the ILV. This information was utilized to establish the source term for a 1-D numerical model to simulate the diffusion of 14 CO 2 from the ILV Waste Zone to the land surface. The results indicate a peak surface emanation rate from the entire ILV of 1.42E-08 Ci/yr with an associated dose of only 3.83E-05 mrem/yr to the Maximally Exposed Individual (MEI) at 100m. The fact that the atmospheric pathway exposure for 14 C is controlled by chemical solubility limits for 14 C between the solid waste, pore water and pore vapor within the disposal environment rather than the absolute inventory suggests that the establishment of specific facility limits is inappropriate. With the relaxation of the atmospheric pathway restriction, the groundwater pathway becomes the more restrictive in terms of disposing 14 C or 14 C KB within the ILV. Since the resin-based 14 C of the 52 moderator deionizer vessels is highly similar to the 14 C KB waste form, the inventory from the 52 deionizer vessels is compared against the groundwater limits for that waste form. The small groundwater pathway fraction (1.14E-05) calculated for the proposed inventory of the 52 moderator deionizer vessels indicates that the proposed action will have an insignificant impact with respect to possible exposures via the groundwater pathway. This investigation recommends that there be no ILV Atmospheric pathway limit for 14 C and 14 C KB . Further, in the absence of an

  7. Pyrotechnic Shock Analysis Using Statistical Energy Analysis

    Science.gov (United States)

    2015-10-23

    2013. 3. Lyon, Richard H., and DeJong, Richard G., “ Theory and Application of Statistical Energy Analysis, 2nd Edition,” Butterworth-Heinemann, 1995... Dalton , Eric C., “Ballistic Shock Response Prediction through the Synergistic Use of Statistical Energy Analysis, Finite Element Analysis, and

  8. Safety analysis fundamentals

    International Nuclear Information System (INIS)

    Wright, A.C.D.

    2002-01-01

    This paper discusses the safety analysis fundamentals in reactor design. This study includes safety analysis done to show consequences of postulated accidents are acceptable. Safety analysis is also used to set design of special safety systems and includes design assist analysis to support conceptual design. safety analysis is necessary for licensing a reactor, to maintain an operating license, support changes in plant operations

  9. Environmental Impact Analysis Process. Environmental Review Starlab Site On Antigua; Phase II Archeological Surveys of Proposed Ground Calibration Sites on Antigua, West Indies

    Science.gov (United States)

    1990-09-07

    mongoose. In 1964, the large edible lizard ( Iguana delicatissima) was present on Antigua (Ethridge 1964), but sightings in recent years have been...wander off the target or be misdirected to areas inhabited by terrestrial or marine wildlife (e.g., nesting areas). In the most serious case that...muddy substrate that is exposed at low tide. Any threatened or endangered turtles or marine mammals that might be inadvertently exposed to a

  10. Gastric polyps: a retrospective analysis of 26,000 digestive endoscopies Pólipos gástricos: análise retrospectiva de 26 000 endoscopias digestivas

    OpenAIRE

    Drausio Jefferson Morais; Ademar Yamanaka; José Murilo Robilotta Zeitune; Nelson Adami Andreollo

    2007-01-01

    BACKGROUND: Gastric polyps are small gastric lesions, asymptomatic in most cases and are generally discovered inadvertently during upper digestive endoscopy. AIM: To retrospectively review the characteristics and frequency of gastric polyps, derived from the gastric mucosal epithelium in a large series of endoscopies. METHODS: One hundred and fifty three patients in a series of 26,000 consecutive upper digestive endoscopies done over a 5-year period, being that each patient had only one exami...

  11. Radioactive Waste Management Complex low-level waste radiological performance assessment

    Energy Technology Data Exchange (ETDEWEB)

    Maheras, S.J.; Rood, A.S.; Magnuson, S.O.; Sussman, M.E.; Bhatt, R.N.

    1994-04-01

    This report documents the projected radiological dose impacts associated with the disposal of radioactive low-level waste at the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory. This radiological performance assessment was conducted to evaluate compliance with applicable radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the public and the environment. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses were made for both offsite receptors and individuals inadvertently intruding onto the site after closure. In addition, uncertainty and sensitivity analyses were performed. The results of the analyses indicate compliance with established radiological criteria and provide reasonable assurance that public health and safety will be protected.

  12. Mixed low-level waste form evaluation

    International Nuclear Information System (INIS)

    Pohl, P.I.; Cheng, Wu-Ching; Wheeler, T.; Waters, R.D.

    1997-01-01

    A scoping level evaluation of polyethylene encapsulation and vitreous waste forms for safe storage of mixed low-level waste was performed. Maximum permissible radionuclide concentrations were estimated for 15 indicator radionuclides disposed of at the Hanford and Savannah River sites with respect to protection of the groundwater and inadvertent intruder pathways. Nominal performance improvements of polyethylene and glass waste forms relative to grout are reported. These improvements in maximum permissible radionuclide concentrations depend strongly on the radionuclide of concern and pathway. Recommendations for future research include improving the current understanding of the performance of polymer waste forms, particularly macroencapsulation. To provide context to these estimates, the concentrations of radionuclides in treated DOE waste should be compared with the results of this study to determine required performance

  13. Long-term climate change assessment study plan for the Hanford Site Permanent Isolation Barrier Development Program

    International Nuclear Information System (INIS)

    The Hanford Site Permanent Isolation Barrier Development Program (Barrier Development Program) was organized to develop the technology needed to provide an in-place disposal capability for low-level nuclear waste for the US Department of Energy at the Hanford Site in south-central Washington. The goal of the Barrier Development Program is to provide defensible evidence that final barrier design(s) will adequately control water infiltration, plant and animal intrusion, and wind and water erosion for a minimum of 1,000 yr; to isolate wastes from the accessible environment; and to use markers to warn inadvertent human intruders. Evidence for barrier performance will be obtained by conducting laboratory experiments, field tests, computer modeling, and other studies that establish confidence in the barrier's ability to meet its 1,000-yr design life

  14. Radiological performance assessment for the Z-Area Saltstone Disposal Facility

    Energy Technology Data Exchange (ETDEWEB)

    Cook, J.R.; Fowler, J.R. [Westinghouse Savannah River Co., Aiken, SC (United States)

    1992-12-18

    This radiological performance assessment (RPA) for the Savannah River Site (SRS) Saltstone Disposal Facility (SDF) was prepared in accordance with the requirements of Chapter III of the US Department of Energy Order 5820.2A. The Order specifies that an RPA should provide reasonable assurance that a low-level waste (LLW) disposal facility will comply with the performance objectives of the Order. The performance objectives require that: (1) exposures of the general public to radioactivity in the waste or released from the waste will not result in an effective dose equivalent of 25 mrem per year; (2) releases to the atmosphere will meet the requirements of 40 CFR 61; (3) inadvertent intruders will not be committed to an excess of an effective dose equivalent of 100 mrem per year from chronic exposure, or 500 mrem from a single acute exposure; and (4) groundwater resources will be protected in accordance with Federal, State and local requirements.

  15. Radiological performance assessment for the Z-Area Saltstone Disposal Facility

    International Nuclear Information System (INIS)

    Cook, J.R.; Fowler, J.R.

    1992-01-01

    This radiological performance assessment (RPA) for the Savannah River Site (SRS) Saltstone Disposal Facility (SDF) was prepared in accordance with the requirements of Chapter III of the US Department of Energy Order 5820.2A. The Order specifies that an RPA should provide reasonable assurance that a low-level waste (LLW) disposal facility will comply with the performance objectives of the Order. The performance objectives require that: (1) exposures of the general public to radioactivity in the waste or released from the waste will not result in an effective dose equivalent of 25 mrem per year; (2) releases to the atmosphere will meet the requirements of 40 CFR 61; (3) inadvertent intruders will not be committed to an excess of an effective dose equivalent of 100 mrem per year from chronic exposure, or 500 mrem from a single acute exposure; and (4) groundwater resources will be protected in accordance with Federal, State and local requirements

  16. An Analysis of Security System for Intrusion in Smartphone Environment

    Directory of Open Access Journals (Sweden)

    Maya Louk

    2014-01-01

    Full Text Available There are many malware applications in Smartphone. Smartphone’s users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a MDTN process is possible and will be enabled for Smartphone environment. (b The methods are shown to be an advanced security for private sensitive data of the Smartphone user.

  17. Shape analysis in medical image analysis

    CERN Document Server

    Tavares, João

    2014-01-01

    This book contains thirteen contributions from invited experts of international recognition addressing important issues in shape analysis in medical image analysis, including techniques for image segmentation, registration, modelling and classification, and applications in biology, as well as in cardiac, brain, spine, chest, lung and clinical practice. This volume treats topics such as, anatomic and functional shape representation and matching; shape-based medical image segmentation; shape registration; statistical shape analysis; shape deformation; shape-based abnormity detection; shape tracking and longitudinal shape analysis; machine learning for shape modeling and analysis; shape-based computer-aided-diagnosis; shape-based medical navigation; benchmark and validation of shape representation, analysis and modeling algorithms. This work will be of interest to researchers, students, and manufacturers in the fields of artificial intelligence, bioengineering, biomechanics, computational mechanics, computationa...

  18. Thermal Performance Analysis For Small Ion-Exchange Cesium Removal Process

    International Nuclear Information System (INIS)

    Lee, S.; King, W.

    2009-01-01

    The In-Riser Ion Exchange program focuses on the development of in-tank systems to decontaminate high level waste (HLW) salt solutions at the Savannah River Site (SRS) and the Hanford Site. Small Column Ion Exchange (SCIX) treatment for cesium removal is a primary in-riser technology for decontamination prior to final waste immobilization in Saltstone. Through this process, radioactive cesium from the salt solution is adsorbed onto the ion exchange media which is packed within a flow-through column. Spherical Resorcinol-Formaldehyde (RF) is being considered as the ion exchange media for the application of this technology at both sites. A packed column loaded with media containing radioactive cesium generates significant heat from radiolytic decay. Under normal operating conditions, process fluid flow through the column can provide adequate heat removal from the columns. However, in the unexpected event of loss of fluid flow or fluid drainage from the column, the design must be adequate to handle the thermal load to avoid unacceptable temperature excursions. Otherwise, hot spots may develop locally which could degrade the performance of the ion-exchange media or the temperature could rise above column safety limits. Data exists which indicates that performance degradation with regard to cesium removal occurs with RF at 65C. In addition, the waste supernate solution will boil around 130C. As a result, two temperature limits have been assumed for this analysis. An additional upset scenario was considered involving the loss of the supernate solution due to inadvertent fluid drainage through the column boundary. In this case, the column containing the loaded media could be completely dry. This event is expected to result in high temperatures that could damage the column or cause the RF sorbent material to undergo undesired physical changes. One objective of these calculations is to determine the range of temperatures that should be evaluated during testing with the RF

  19. Special Analysis of the Area 3 Radioactive Waste Management Site at the Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    National Security Technologies, LLC, Environmental Management

    2012-09-30

    This report describes the methods and results of a special analysis (SA) of the Area 3 Radioactive Waste Management Site (RWMS) on the Nevada National Security Site (NNSS). The purpose of the SA is to determine if the approved performance assessment (PA) and composite analysis (CA) (Shott et al., 2001) remain valid. The Area 3 RWMS PA and CA were prepared as a single document and received conditional approval on October 6, 1999. A conditional Disposal Authorization Statement (DAS) for the Area 3 RWMS was issued on October 20, 1999. Since preparation of the approved PA and CA, new information and additional environmental monitoring data have been used to update the PA and CA. At the same time, continual advancements in computer processors and software have allowed improvement to the PA and CA models. Annual reviews of the PA and CA required by U.S. Department of Energy (DOE) Order DOE O 435.1 have documented multiple changes occurring since preparation of the PA and CA. Potentially important changes include: Development of a new and improved baseline PA and CA model implemented in the probabilistic GoldSim simulation platform. A significant increase in the waste inventory disposed at the site. Revision and updating of model parameters based on additional years of site monitoring data and new research and development results. Although changes have occurred, many important PA/CA issues remain unchanged, including the site conceptual model, important features, events, and processes, and the points of compliance. The SA is performed to document the current status of the PA/CA model and to quantitatively assess the impact of cumulative changes on the PA and CA results. The results of the SA are used to assess the validity of the approved PA/CA and make a determination if revision of the PA or CA is necessary. The SA was performed using the Area 3 RWMS, version 2.102, GoldSim model, the current baseline PA/CA model. Comparison of the maximum SA results with the PA

  20. Integrated Sensitivity Analysis Workflow

    Energy Technology Data Exchange (ETDEWEB)

    Friedman-Hill, Ernest J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hoffman, Edward L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gibson, Marcus J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Clay, Robert L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-08-01

    Sensitivity analysis is a crucial element of rigorous engineering analysis, but performing such an analysis on a complex model is difficult and time consuming. The mission of the DART Workbench team at Sandia National Laboratories is to lower the barriers to adoption of advanced analysis tools through software integration. The integrated environment guides the engineer in the use of these integrated tools and greatly reduces the cycle time for engineering analysis.

  1. K Basin Hazard Analysis

    International Nuclear Information System (INIS)

    PECH, S.H.

    2000-01-01

    This report describes the methodology used in conducting the K Basins Hazard Analysis, which provides the foundation for the K Basins Final Safety Analysis Report. This hazard analysis was performed in accordance with guidance provided by DOE-STD-3009-94, Preparation Guide for U. S. Department of Energy Nonreactor Nuclear Facility Safety Analysis Reports and implements the requirements of DOE Order 5480.23, Nuclear Safety Analysis Report

  2. K Basin Hazard Analysis

    Energy Technology Data Exchange (ETDEWEB)

    PECH, S.H.

    2000-08-23

    This report describes the methodology used in conducting the K Basins Hazard Analysis, which provides the foundation for the K Basins Final Safety Analysis Report. This hazard analysis was performed in accordance with guidance provided by DOE-STD-3009-94, Preparation Guide for U. S. Department of Energy Nonreactor Nuclear Facility Safety Analysis Reports and implements the requirements of DOE Order 5480.23, Nuclear Safety Analysis Report.

  3. K Basins Hazard Analysis

    International Nuclear Information System (INIS)

    WEBB, R.H.

    1999-01-01

    This report describes the methodology used in conducting the K Basins Hazard Analysis, which provides the foundation for the K Basins Safety Analysis Report (HNF-SD-WM-SAR-062/Rev.4). This hazard analysis was performed in accordance with guidance provided by DOE-STD-3009-94, Preparation Guide for U. S. Department of Energy Nonreactor Nuclear Facility Safety Analysis Reports and implements the requirements of DOE Order 5480.23, Nuclear Safety Analysis Report

  4. Qualitative Content Analysis

    OpenAIRE

    Philipp Mayring

    2000-01-01

    The article describes an approach of systematic, rule guided qualitative text analysis, which tries to preserve some methodological strengths of quantitative content analysis and widen them to a concept of qualitative procedure. First the development of content analysis is delineated and the basic principles are explained (units of analysis, step models, working with categories, validity and reliability). Then the central procedures of qualitative content analysis, inductive development of ca...

  5. Quantitative analysis chemistry

    International Nuclear Information System (INIS)

    Ko, Wansuk; Lee, Choongyoung; Jun, Kwangsik; Hwang, Taeksung

    1995-02-01

    This book is about quantitative analysis chemistry. It is divided into ten chapters, which deal with the basic conception of material with the meaning of analysis chemistry and SI units, chemical equilibrium, basic preparation for quantitative analysis, introduction of volumetric analysis, acid-base titration of outline and experiment examples, chelate titration, oxidation-reduction titration with introduction, titration curve, and diazotization titration, precipitation titration, electrometric titration and quantitative analysis.

  6. Analysis of Precision of Activation Analysis Method

    DEFF Research Database (Denmark)

    Heydorn, Kaj; Nørgaard, K.

    1973-01-01

    The precision of an activation-analysis method prescribes the estimation of the precision of a single analytical result. The adequacy of these estimates to account for the observed variation between duplicate results from the analysis of different samples and materials, is tested by the statistic T...

  7. Sentiment Analysis for Exploratory Data Analysis

    Directory of Open Access Journals (Sweden)

    Zoë Wilkinson Saldaña

    2018-01-01

    Full Text Available In this lesson you will learn to conduct 'sentiment analysis' on texts and to interpret the results. This is a form of exploratory data analysis based on natural language processing. You will learn to install all appropriate software and to build a reusable program that can be applied to your own texts.

  8. Development of Risk Insights for Regulatory Review of a Near-Surface Disposal Facility for Radioactive Waste

    International Nuclear Information System (INIS)

    Esh, D.W.; Ridge, A.C.; Thaggard, M.

    2006-01-01

    Section 3116 of the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 (NDAA) requires the Department of Energy (DOE) to consult with the Nuclear Regulatory Commission (NRC) about non-High Level Waste (HLW) determinations. In its consultative role, NRC performs technical reviews of DOE's waste determinations but does not have regulatory authority over DOE's waste disposal activities. The safety of disposal is evaluated by comparing predicted disposal facility performance to the performance objectives specified in NRC regulations for the disposal of low-level waste (10 CFR Part 61 Subpart C). The performance objectives contain criteria for protection of the public, protection of inadvertent intruders, protection of workers, and stability of the disposal site after closure. The potential radiological dose to receptors typically is evaluated with a performance assessment (PA) model that simulates the release of radionuclides from the disposal site, transport of radionuclides through the environment, and exposure of potential receptors to residual contamination for thousands of years. This paper describes NRC's development and use of independent performance assessment modeling to facilitate review of DOE's non-HLW determination for the Saltstone Disposal Facility (SDF) at the Savannah River Site. NRC's review of the safety of near-surface disposal of radioactive waste at the SDF was facilitated and focused by risk insights developed with an independent PA model. The main components of NRC's performance assessment model are presented. The development of risk insights that allow the staff to focus review efforts on those areas that are most important to satisfying the performance objectives is discussed. Uncertainty analysis was performed of the full stochastic model using genetic variable selection algorithms. The results of the uncertainty analysis were then used to guide the development of simulations of other scenarios to understand the key risk

  9. Performance assessment review for DOE LLW disposal facilities

    International Nuclear Information System (INIS)

    Wilhite, Elmer L.

    1992-01-01

    The United States Department of Energy (US DOE) disposes of low-level radioactive waste in near-surface disposal facilities. Safety of the disposal operations is evaluated for operational safety as well as long-term safety. Operational safety is evaluated based on the perceived level of hazard of the operation and may vary from a simple safety assessment to a safety analysis report. Long-term safety of all low-level waste disposal systems is evaluated through the conduct of a radiological performance assessment. The US DOE has established radiological performance objectives for disposal of low-level waste. They are to protect a member of the general public from receiving over 25 mrem/y, and an inadvertent intruder into the waste from receiving over 100 mrem/y continuous exposure or 500 mrem from a single exposure. For a disposal system to be acceptable, a performance assessment must be prepared which must be technically accurate and provide reasonable assurance that these performance objectives are met. Technical quality of the performance assessments is reviewed by a panel of experts. The panel of experts is used in two ways to assure the technical quality of performance assessment. A preliminary (generally 2 day) review by the panel is employed in the late stages of development to provide guidance on finalizing the performance assessment. The comments from this review are communicated to the personnel responsible for the performance assessment for consideration and incorporation. After finalizing the performance assessment, it is submitted for a formal review. The formal review is accomplished by a much more thorough analysis of the performance assessment over a multi-week time period. The panel then formally reports their recommendations to the US DOE waste management senior staff who make the final determination on acceptability of the performance assessment. A number of lessons have been learned from conducting several preliminary reviews of performance

  10. Hazard Analysis Database Report

    CERN Document Server

    Grams, W H

    2000-01-01

    The Hazard Analysis Database was developed in conjunction with the hazard analysis activities conducted in accordance with DOE-STD-3009-94, Preparation Guide for U S . Department of Energy Nonreactor Nuclear Facility Safety Analysis Reports, for HNF-SD-WM-SAR-067, Tank Farms Final Safety Analysis Report (FSAR). The FSAR is part of the approved Authorization Basis (AB) for the River Protection Project (RPP). This document describes, identifies, and defines the contents and structure of the Tank Farms FSAR Hazard Analysis Database and documents the configuration control changes made to the database. The Hazard Analysis Database contains the collection of information generated during the initial hazard evaluations and the subsequent hazard and accident analysis activities. The Hazard Analysis Database supports the preparation of Chapters 3 ,4 , and 5 of the Tank Farms FSAR and the Unreviewed Safety Question (USQ) process and consists of two major, interrelated data sets: (1) Hazard Analysis Database: Data from t...

  11. Multiple-pressure-source model for ground inflation during the period of high explosivity at Sakurajima volcano, Japan - Combination analysis of continuous GNSS, tilt and strain data -

    Science.gov (United States)

    Hotta, Kohei; Iguchi, Masato; Ohkura, Takahiro; Yamamoto, Keigo

    2016-01-01

    We herein propose a three-pressure-source model for ground inflation with highly eruptive activity at the Showa crater of Sakurajima volcano, Japan. We applied a model of stacked spherical sources to continuous combined geodetic data from a global navigation satellite system, tilt and strainmeters. The data were recorded during ground inflation throughout an eruptive episode that began in October 2011 and ended in March 2012. Using a genetic algorithm, we obtained the locations and volumes of three sources. A pressure source analysis of ground inflation during the period from October 2011 to March 2012 revealed inflation sources to be located at a depth of 9.6 km beneath Aira caldera (A-source) and 3.3 km beneath Kita-dake (K-source), and a shallow deflation source is located at a depth of 0.7 km beneath Minami-dake (M-source). The A-source corresponds to the main magma reservoir at a depth of 10 km beneath the Aira caldera inferred by previous geophysical studies. The K-source is a-reservoir of Sakurajima volcano, where magma intrudes from the main magma reservoir beneath the Aira caldera during the first stage of eruptive activity. The M-source is the uppermost part of a conduit from the K-source to the summit and the Showa crater. Magma injection into the A-source started in mid-November 2011, instantly triggering the migration of increased volumes of magma from the A-source to the K-source. Approximately one month later, in mid-December 2011, an increased volume of magma started migrating from the K-source to the M-source and finally erupted at the surface. The accumulation rate for the A-source is comparable to the magma supply rate for the past 100 years (0.8 to 1.6 × 107 m3). The three-pressure-source model was applied to inflation events before the 2011 event in order to reconstruct the magma migration process. Applying our source model to earlier activity phases, we found that injected magma from the A-source remained at the K-source and a small amount of

  12. A Study on Establishment of Buffer Zone of Radioactive Waste Repository

    International Nuclear Information System (INIS)

    Yoon, Jeong Hyoun; Park, Joo Wan; Ju, Min Su; Kim, Chang Lak; Park, Jin Baek

    2008-01-01

    A new proposed repository has a final capacity of 800,000 drums radioactive waste. Most of foreign repositories have a general practice of segregating control zones which mainly contributes to classification of degree of control, whether it is called buffer zone or not. Domestic regulatory requirements of establishment of buffer zone in a repository are not much different from those of nuclear power plants for operation period, in which satisfactory design objective or performance objective is the most important factor in determination of the buffer zone. The meaning of buffer zone after closure is a minimum requested area which can prevent inadvertent intruders from leading to non-allowable exposure during institutional control period. Safety assessment with drinking well scenario giving rise to the highest probability of exposure among the intruder's actions can verify fulfillment of the buffer zone which is determined by operational safety of the repository. At present. for the repository to be constructed in a few years, the same procedure and concept as described in this paper are applied that can satisfy regulatory requirements and radiological safety as well. However, the capacity of the repository will be stepwise extended upto 800,000 drums, consequently its layout will be varied too. Timely considerations will be necessary for current boundary of the buffer zone which has been established on the basis of 100,000 drums disposal.

  13. Cluster analysis for applications

    CERN Document Server

    Anderberg, Michael R

    1973-01-01

    Cluster Analysis for Applications deals with methods and various applications of cluster analysis. Topics covered range from variables and scales to measures of association among variables and among data units. Conceptual problems in cluster analysis are discussed, along with hierarchical and non-hierarchical clustering methods. The necessary elements of data analysis, statistics, cluster analysis, and computer implementation are integrated vertically to cover the complete path from raw data to a finished analysis.Comprised of 10 chapters, this book begins with an introduction to the subject o

  14. Circuit analysis for dummies

    CERN Document Server

    Santiago, John

    2013-01-01

    Circuits overloaded from electric circuit analysis? Many universities require that students pursuing a degree in electrical or computer engineering take an Electric Circuit Analysis course to determine who will ""make the cut"" and continue in the degree program. Circuit Analysis For Dummies will help these students to better understand electric circuit analysis by presenting the information in an effective and straightforward manner. Circuit Analysis For Dummies gives you clear-cut information about the topics covered in an electric circuit analysis courses to help

  15. Analysis Of Using Firewall And Single Honeypot In Training Attack On Wireless Network

    Science.gov (United States)

    Mohd. Diansyah, Tengku.; Faisal, Ilham; Perdana, Adidtya; Octaviani Sembiring, Boni; Hidayati Sinaga, Tantri

    2017-12-01

    Security issues become one of the important aspects of a network, especially a network security on the server. These problems underlie the need to build a system that can detect threats from parties who do not have access rights (hackers) that are by building a security system honeypot. A Honeypot is a diversion of intruders' attention, in order for intruders to think that it has managed to break down and retrieve data from a network, when in fact the data is not important and the location is isolated. A way to trap or deny unauthorized use of effort in an information system. One type of honeypot is honeyd. Honeyd is a low interaction honeypot that has a smaller risk compared to high interaction types because the interaction with the honeypot does not directly involve the real system. The purpose of the implementation of honeypot and firewall, firewall is used on Mikrotik. Can be used as an administrative tool to view reports of Honeyd generated activity and administrators can also view reports that are stored in the logs in order to assist in determining network security policies.

  16. Canonical Information Analysis

    DEFF Research Database (Denmark)

    Vestergaard, Jacob Schack; Nielsen, Allan Aasbjerg

    2015-01-01

    Canonical correlation analysis is an established multivariate statistical method in which correlation between linear combinations of multivariate sets of variables is maximized. In canonical information analysis introduced here, linear correlation as a measure of association between variables is ...

  17. Introductory numerical analysis

    CERN Document Server

    Pettofrezzo, Anthony J

    2006-01-01

    Written for undergraduates who require a familiarity with the principles behind numerical analysis, this classical treatment encompasses finite differences, least squares theory, and harmonic analysis. Over 70 examples and 280 exercises. 1967 edition.

  18. Ecosystem Analysis Program

    International Nuclear Information System (INIS)

    Burgess, R.L.

    1978-01-01

    Progress is reported on the following research programs: analysis and modeling of ecosystems; EDFB/IBP data center; biome analysis studies; land/water interaction studies; and computer programs for development of models

  19. Importance-performance analysis based SWOT analysis

    OpenAIRE

    Phadermrod, Boonyarat; Crowder, Richard M.; Wills, Gary B.

    2016-01-01

    SWOT analysis, a commonly used tool for strategic planning, is traditionally a form of brainstorming. Hence, it has been criticised that it is likely to hold subjective views of the individuals who participate in a brainstorming session and that SWOT factors are not prioritized by their significance thus it may result in an improper strategic action. While most studies of SWOT analysis have only focused on solving these shortcomings separately, this study offers an approach to diminish both s...

  20. Computational movement analysis

    CERN Document Server

    Laube, Patrick

    2014-01-01

    This SpringerBrief discusses the characteristics of spatiotemporal movement data, including uncertainty and scale. It investigates three core aspects of Computational Movement Analysis: Conceptual modeling of movement and movement spaces, spatiotemporal analysis methods aiming at a better understanding of movement processes (with a focus on data mining for movement patterns), and using decentralized spatial computing methods in movement analysis. The author presents Computational Movement Analysis as an interdisciplinary umbrella for analyzing movement processes with methods from a range of fi

  1. Regression analysis by example

    CERN Document Server

    Chatterjee, Samprit

    2012-01-01

    Praise for the Fourth Edition: ""This book is . . . an excellent source of examples for regression analysis. It has been and still is readily readable and understandable."" -Journal of the American Statistical Association Regression analysis is a conceptually simple method for investigating relationships among variables. Carrying out a successful application of regression analysis, however, requires a balance of theoretical results, empirical rules, and subjective judgment. Regression Analysis by Example, Fifth Edition has been expanded

  2. Applied longitudinal analysis

    CERN Document Server

    Fitzmaurice, Garrett M; Ware, James H

    2012-01-01

    Praise for the First Edition "". . . [this book] should be on the shelf of everyone interested in . . . longitudinal data analysis.""-Journal of the American Statistical Association   Features newly developed topics and applications of the analysis of longitudinal data Applied Longitudinal Analysis, Second Edition presents modern methods for analyzing data from longitudinal studies and now features the latest state-of-the-art techniques. The book emphasizes practical, rather than theoretical, aspects of methods for the analysis of diverse types of lo

  3. Discourse analysis and Foucault's

    Directory of Open Access Journals (Sweden)

    Jansen I.

    2008-01-01

    Full Text Available Discourse analysis is a method with up to now was less recognized in nursing science, althoughmore recently nursing scientists are discovering it for their purposes. However, several authors have criticized thatdiscourse analysis is often misinterpreted because of a lack of understanding of its theoretical backgrounds. In thisarticle, I reconstruct Foucault’s writings in his “Archaeology of Knowledge” to provide a theoretical base for futurearchaeological discourse analysis, which can be categorized as a socio-linguistic discourse analysis.

  4. Nonstandard Analysis and Constructivism!

    OpenAIRE

    Sanders, Sam

    2017-01-01

    Almost two decades ago, Wattenberg published a paper with the title 'Nonstandard Analysis and Constructivism?' in which he speculates on a possible connection between Nonstandard Analysis and constructive mathematics. We study Wattenberg's work in light of recent research on the aforementioned connection. On one hand, with only slight modification, some of Wattenberg's theorems in Nonstandard Analysis are seen to yield effective and constructive theorems (not involving Nonstandard Analysis). ...

  5. Analysis of extreme events

    CSIR Research Space (South Africa)

    Khuluse, S

    2009-04-01

    Full Text Available the stability of the parameter estimates. 9 / 27 Background Overview of the Theory of Extremes Case Studies Concluding Remarks Analysis of Extreme Rainfall Events Analysis of Extreme Wave Heights Figure: Map of South Africa with the study areas... highlighted 10 / 27 Background Overview of the Theory of Extremes Case Studies Concluding Remarks Analysis of Extreme Rainfall Events Analysis of Extreme Wave Heights Western Cape Climatologically diverse: Influence of the varied topography and it’s...

  6. Biological sequence analysis

    DEFF Research Database (Denmark)

    Durbin, Richard; Eddy, Sean; Krogh, Anders Stærmose

    This book provides an up-to-date and tutorial-level overview of sequence analysis methods, with particular emphasis on probabilistic modelling. Discussed methods include pairwise alignment, hidden Markov models, multiple alignment, profile searches, RNA secondary structure analysis, and phylogene......This book provides an up-to-date and tutorial-level overview of sequence analysis methods, with particular emphasis on probabilistic modelling. Discussed methods include pairwise alignment, hidden Markov models, multiple alignment, profile searches, RNA secondary structure analysis...

  7. Principal component analysis

    NARCIS (Netherlands)

    Bro, R.; Smilde, A.K.

    2014-01-01

    Principal component analysis is one of the most important and powerful methods in chemometrics as well as in a wealth of other areas. This paper provides a description of how to understand, use, and interpret principal component analysis. The paper focuses on the use of principal component analysis

  8. Charged particle activation analysis

    International Nuclear Information System (INIS)

    Peisach, M.

    1977-01-01

    The techniques of prompt and delayed activation analysis are outlined. Methods using cyclotron beams are suitable for delayed A.A., but prompt methods with relatively low energy beams serve a useful purpose for analysis of thin layers and surfaces. Multi-element analyses with prompt X-rays, generally applicable analysis by backscattering and specific analyses by nuclaer reactions are described [af

  9. Critical Classroom Discourse Analysis.

    Science.gov (United States)

    Kumaravadivelu, B.

    1999-01-01

    Conceptualizes a framework for conducting critical classroom-discourse analysis. Critiques the scope and method of current models of classroom-interaction analysis and classroom-discourse analysis and advocates using poststructuralist and postcolonialist understandings of discourse to develop a critical framework for understanding what actually…

  10. Practical data analysis

    CERN Document Server

    Cuesta, Hector

    2013-01-01

    Each chapter of the book quickly introduces a key 'theme' of Data Analysis, before immersing you in the practical aspects of each theme. You'll learn quickly how to perform all aspects of Data Analysis.Practical Data Analysis is a book ideal for home and small business users who want to slice & dice the data they have on hand with minimum hassle.

  11. Data analysis for chemistry

    CERN Document Server

    Hibbert, DBrynn

    2005-01-01

    Based on D Brynn Hibbert''s lectures on data analysis to undergraduates and graduate students, this book covers topics including measurements, means and confidence intervals, hypothesis testing, analysis of variance, and calibration models. It is meant as an entry level book targeted at learning and teaching undergraduate data analysis.

  12. Bayesian Mediation Analysis

    Science.gov (United States)

    Yuan, Ying; MacKinnon, David P.

    2009-01-01

    In this article, we propose Bayesian analysis of mediation effects. Compared with conventional frequentist mediation analysis, the Bayesian approach has several advantages. First, it allows researchers to incorporate prior information into the mediation analysis, thus potentially improving the efficiency of estimates. Second, under the Bayesian…

  13. Remote sensing analysis for fault-zones detection in the Central Andean Plateau (Catamarca, Argentina)

    Science.gov (United States)

    Traforti, Anna; Massironi, Matteo; Zampieri, Dario; Carli, Cristian

    2015-04-01

    Remote sensing techniques have been extensively used to detect the structural framework of investigated areas, which includes lineaments, fault zones and fracture patterns. The identification of these features is fundamental in exploration geology, as it allows the definition of suitable sites for the exploitation of different resources (e.g. ore mineral, hydrocarbon, geothermal energy and groundwater). Remote sensing techniques, typically adopted in fault identification, have been applied to assess the geological and structural framework of the Laguna Blanca area (26°35'S-66°49'W). This area represents a sector of the south-central Andes localized in the Argentina region of Catamarca, along the south-eastern margin of the Puna plateau. The study area is characterized by a Precambrian low-grade metamorphic basement intruded by Ordovician granitoids. These rocks are unconformably covered by a volcano-sedimentary sequence of Miocene age, followed by volcanic and volcaniclastic rocks of Upper Miocene to Plio-Pleistocene age. All these units are cut by two systems of major faults, locally characterized by 15-20 m wide damage zones. The detection of main tectonic lineaments in the study area was firstly carried out by classical procedures: image sharpening of Landsat 7 ETM+ images, directional filters applied to ASTER images, medium resolution Digital Elevation Models analysis (SRTM and ASTER GDEM) and hill shades interpretation. In addition, a new approach in fault zone identification, based on multispectral satellite images classification, has been tested in the Laguna Blanca area and in other sectors of south-central Andes. In this perspective, several prominent fault zones affecting basement and granitoid rocks have been sampled. The collected fault gouge samples have been analyzed with a Field-Pro spectrophotometer mounted on a goniometer. We acquired bidirectional reflectance spectra, from 0.35μm to 2.5μm with 1nm spectral sampling, of the sampled fault rocks

  14. Recharge Data Package for the Immobilized Low-Activity Waste 2001 Performance Assessment

    International Nuclear Information System (INIS)

    MJ Fayer; EM Murphy; JL Downs; FO Khan; CW Lindenmeier; BN Bjornstad

    2000-01-01

    Lockheed Martin Hanford Company (LMHC) is designing and assessing the performance of disposal facilities to receive radioactive wastes that are currently stored in single- and double-shell tanks at the Hanford Site. The preferred method of disposing of the portion that is classified as immobilized low-activity waste (ILAW) is to vitrify the waste and place the product in near-surface, shallow-land burial facilities. The LMHC project to assess the performance of these disposal facilities is known as the Hanford ILAW Performance Assessment (PA) Activity, hereafter called the ILAW PA project. The goal of this project is to provide a reasonable expectation that the disposal of the waste is protective of the general public, groundwater resources, air resources, surface-water resources, and inadvertent intruders. Achieving this goal will require predictions of contaminant migration from the facility. To make such predictions will require estimates of the fluxes of water moving through the sediments within the vadose zone around and beneath the disposal facility. These fluxes, loosely called recharge rates, are the primary mechanism for transporting contaminants to the groundwater. Pacific Northwest National Laboratory (PNNL) assists LMHC in their performance assessment activities. One of the PNNL tasks is to provide estimates of recharge rates for current conditions and long-term scenarios involving the shallow-land disposal of ILAW. Specifically, recharge estimates are needed for a filly functional surface cover; the cover sideslope, and the immediately surrounding terrain. In addition, recharge estimates are needed for degraded cover conditions. The temporal scope of the analysis is 10,000 years, but could be longer if some contaminant peaks occur after 10,000 years. The elements of this report compose the Recharge Data Package, which provides estimates of recharge rates for the scenarios being considered in the 2001 PA. Table S.1 identifies the surface features and

  15. Recharge Data Package for the Immobilized Low-Activity Waste 2001 Performance Assessment

    Energy Technology Data Exchange (ETDEWEB)

    MJ Fayer; EM Murphy; JL Downs; FO Khan; CW Lindenmeier; BN Bjornstad

    2000-01-18

    Lockheed Martin Hanford Company (LMHC) is designing and assessing the performance of disposal facilities to receive radioactive wastes that are currently stored in single- and double-shell tanks at the Hanford Site. The preferred method of disposing of the portion that is classified as immobilized low-activity waste (ILAW) is to vitrify the waste and place the product in near-surface, shallow-land burial facilities. The LMHC project to assess the performance of these disposal facilities is known as the Hanford ILAW Performance Assessment (PA) Activity, hereafter called the ILAW PA project. The goal of this project is to provide a reasonable expectation that the disposal of the waste is protective of the general public, groundwater resources, air resources, surface-water resources, and inadvertent intruders. Achieving this goal will require predictions of contaminant migration from the facility. To make such predictions will require estimates of the fluxes of water moving through the sediments within the vadose zone around and beneath the disposal facility. These fluxes, loosely called recharge rates, are the primary mechanism for transporting contaminants to the groundwater. Pacific Northwest National Laboratory (PNNL) assists LMHC in their performance assessment activities. One of the PNNL tasks is to provide estimates of recharge rates for current conditions and long-term scenarios involving the shallow-land disposal of ILAW. Specifically, recharge estimates are needed for a filly functional surface cover; the cover sideslope, and the immediately surrounding terrain. In addition, recharge estimates are needed for degraded cover conditions. The temporal scope of the analysis is 10,000 years, but could be longer if some contaminant peaks occur after 10,000 years. The elements of this report compose the Recharge Data Package, which provides estimates of recharge rates for the scenarios being considered in the 2001 PA. Table S.1 identifies the surface features and

  16. Strategic Analysis Overview

    Science.gov (United States)

    Cirillo, William M.; Earle, Kevin D.; Goodliff, Kandyce E.; Reeves, J. D.; Stromgren, Chel; Andraschko, Mark R.; Merrill, R. Gabe

    2008-01-01

    NASA s Constellation Program employs a strategic analysis methodology in providing an integrated analysis capability of Lunar exploration scenarios and to support strategic decision-making regarding those scenarios. The strategic analysis methodology integrates the assessment of the major contributors to strategic objective satisfaction performance, affordability, and risk and captures the linkages and feedbacks between all three components. Strategic analysis supports strategic decision making by senior management through comparable analysis of alternative strategies, provision of a consistent set of high level value metrics, and the enabling of cost-benefit analysis. The tools developed to implement the strategic analysis methodology are not element design and sizing tools. Rather, these models evaluate strategic performance using predefined elements, imported into a library from expert-driven design/sizing tools or expert analysis. Specific components of the strategic analysis tool set include scenario definition, requirements generation, mission manifesting, scenario lifecycle costing, crew time analysis, objective satisfaction benefit, risk analysis, and probabilistic evaluation. Results from all components of strategic analysis are evaluated a set of pre-defined figures of merit (FOMs). These FOMs capture the high-level strategic characteristics of all scenarios and facilitate direct comparison of options. The strategic analysis methodology that is described in this paper has previously been applied to the Space Shuttle and International Space Station Programs and is now being used to support the development of the baseline Constellation Program lunar architecture. This paper will present an overview of the strategic analysis methodology and will present sample results from the application of the strategic analysis methodology to the Constellation Program lunar architecture.

  17. Foundations of mathematical analysis

    CERN Document Server

    Johnsonbaugh, Richard

    2010-01-01

    This classroom-tested volume offers a definitive look at modern analysis, with views of applications to statistics, numerical analysis, Fourier series, differential equations, mathematical analysis, and functional analysis. Upper-level undergraduate students with a background in calculus will benefit from its teachings, along with beginning graduate students seeking a firm grounding in modern analysis. A self-contained text, it presents the necessary background on the limit concept, and the first seven chapters could constitute a one-semester introduction to limits. Subsequent chapters discuss

  18. Multivariate analysis with LISREL

    CERN Document Server

    Jöreskog, Karl G; Y Wallentin, Fan

    2016-01-01

    This book traces the theory and methodology of multivariate statistical analysis and shows how it can be conducted in practice using the LISREL computer program. It presents not only the typical uses of LISREL, such as confirmatory factor analysis and structural equation models, but also several other multivariate analysis topics, including regression (univariate, multivariate, censored, logistic, and probit), generalized linear models, multilevel analysis, and principal component analysis. It provides numerous examples from several disciplines and discusses and interprets the results, illustrated with sections of output from the LISREL program, in the context of the example. The book is intended for masters and PhD students and researchers in the social, behavioral, economic and many other sciences who require a basic understanding of multivariate statistical theory and methods for their analysis of multivariate data. It can also be used as a textbook on various topics of multivariate statistical analysis.

  19. http Log Analysis

    DEFF Research Database (Denmark)

    Bøving, Kristian Billeskov; Simonsen, Jesper

    2004-01-01

    This article documents how log analysis can inform qualitative studies concerning the usage of web-based information systems (WIS). No prior research has used http log files as data to study collaboration between multiple users in organisational settings. We investigate how to perform http log...... analysis; what http log analysis says about the nature of collaborative WIS use; and how results from http log analysis may support other data collection methods such as surveys, interviews, and observation. The analysis of log files initially lends itself to research designs, which serve to test...... hypotheses using a quantitative methodology. We show that http log analysis can also be valuable in qualitative research such as case studies. The results from http log analysis can be triangulated with other data sources and for example serve as a means of supporting the interpretation of interview data...

  20. The ATLAS Analysis Model

    CERN Multimedia

    Amir Farbin

    The ATLAS Analysis Model is a continually developing vision of how to reconcile physics analysis requirements with the ATLAS offline software and computing model constraints. In the past year this vision has influenced the evolution of the ATLAS Event Data Model, the Athena software framework, and physics analysis tools. These developments, along with the October Analysis Model Workshop and the planning for CSC analyses have led to a rapid refinement of the ATLAS Analysis Model in the past few months. This article introduces some of the relevant issues and presents the current vision of the future ATLAS Analysis Model. Event Data Model The ATLAS Event Data Model (EDM) consists of several levels of details, each targeted for a specific set of tasks. For example the Event Summary Data (ESD) stores calorimeter cells and tracking system hits thereby permitting many calibration and alignment tasks, but will be only accessible at particular computing sites with potentially large latency. In contrast, the Analysis...

  1. Social Set Analysis

    DEFF Research Database (Denmark)

    Vatrapu, Ravi; Mukkamala, Raghava Rao; Hussain, Abid

    2016-01-01

    Current analytical approaches in computational social science can be characterized by four dominant paradigms: text analysis (information extraction and classification), social network analysis (graph theory), social complexity analysis (complex systems science), and social simulations (cellular...... this limitation, based on the sociology of associations and the mathematics of set theory, this paper presents a new approach to big data analytics called social set analysis. Social set analysis consists of a generative framework for the philosophies of computational social science, theory of social data...... analysis, crisp set-theoretical interaction analysis, and event-studies-oriented set-theoretical visualizations. Implications for big data analytics, current limitations of the set-theoretical approach, and future directions are outlined....

  2. Cost benefit analysis cost effectiveness analysis

    International Nuclear Information System (INIS)

    Lombard, J.

    1986-09-01

    The comparison of various protection options in order to determine which is the best compromise between cost of protection and residual risk is the purpose of the ALARA procedure. The use of decision-aiding techniques is valuable as an aid to selection procedures. The purpose of this study is to introduce two rather simple and well known decision aiding techniques: the cost-effectiveness analysis and the cost-benefit analysis. These two techniques are relevant for the great part of ALARA decisions which need the use of a quantitative technique. The study is based on an hypothetical case of 10 protection options. Four methods are applied to the data

  3. NASA trend analysis procedures

    Science.gov (United States)

    1993-01-01

    This publication is primarily intended for use by NASA personnel engaged in managing or implementing trend analysis programs. 'Trend analysis' refers to the observation of current activity in the context of the past in order to infer the expected level of future activity. NASA trend analysis was divided into 5 categories: problem, performance, supportability, programmatic, and reliability. Problem trend analysis uncovers multiple occurrences of historical hardware or software problems or failures in order to focus future corrective action. Performance trend analysis observes changing levels of real-time or historical flight vehicle performance parameters such as temperatures, pressures, and flow rates as compared to specification or 'safe' limits. Supportability trend analysis assesses the adequacy of the spaceflight logistics system; example indicators are repair-turn-around time and parts stockage levels. Programmatic trend analysis uses quantitative indicators to evaluate the 'health' of NASA programs of all types. Finally, reliability trend analysis attempts to evaluate the growth of system reliability based on a decreasing rate of occurrence of hardware problems over time. Procedures for conducting all five types of trend analysis are provided in this publication, prepared through the joint efforts of the NASA Trend Analysis Working Group.

  4. Fundamentals of functional analysis

    CERN Document Server

    Farenick, Douglas

    2016-01-01

    This book provides a unique path for graduate or advanced undergraduate students to begin studying the rich subject of functional analysis with fewer prerequisites than is normally required. The text begins with a self-contained and highly efficient introduction to topology and measure theory, which focuses on the essential notions required for the study of functional analysis, and which are often buried within full-length overviews of the subjects. This is particularly useful for those in applied mathematics, engineering, or physics who need to have a firm grasp of functional analysis, but not necessarily some of the more abstruse aspects of topology and measure theory normally encountered. The reader is assumed to only have knowledge of basic real analysis, complex analysis, and algebra. The latter part of the text provides an outstanding treatment of Banach space theory and operator theory, covering topics not usually found together in other books on functional analysis. Written in a clear, concise manner,...

  5. Data analysis in astronomy

    International Nuclear Information System (INIS)

    Di Gesu, V.; Crane, P.; Friedman, J.H.; Levialdi, S.; Scarsi, L.

    1985-01-01

    This book presents information on the following topics: the data analysis facilities that astronomers want; time analysis in astronomy; tools for periodicity searches; graphical methods of exploratory data analysis; multivariate statistics to analyze extraterrestrial particles from the ocean floor; application of bootstrap sampling in gamma-ray astronomy; an automated method for velocity field analysis; panel discussion on data analysis trends in x-ray and gamma-ray astronomy; the Groningen image processing system; astronomical input to image processing - astronomical output from image processing; 2-D photometry; spectrometry; time dependent analysis; solar image processing with the Clark Lake Radioheliograph; steps toward parallel processing; new architectures for image processing; data structures and languages in support of parallel image processing for astronomy; and morphology and probability in image processing

  6. Computational Music Analysis

    DEFF Research Database (Denmark)

    This book provides an in-depth introduction and overview of current research in computational music analysis. Its seventeen chapters, written by leading researchers, collectively represent the diversity as well as the technical and philosophical sophistication of the work being done today...... on well-established theories in music theory and analysis, such as Forte's pitch-class set theory, Schenkerian analysis, the methods of semiotic analysis developed by Ruwet and Nattiez, and Lerdahl and Jackendoff's Generative Theory of Tonal Music. The book is divided into six parts, covering...... music analysis, the book provides an invaluable resource for researchers, teachers and students in music theory and analysis, computer science, music information retrieval and related disciplines. It also provides a state-of-the-art reference for practitioners in the music technology industry....

  7. Sparse Exploratory Factor Analysis.

    Science.gov (United States)

    Trendafilov, Nickolay T; Fontanella, Sara; Adachi, Kohei

    2017-07-13

    Sparse principal component analysis is a very active research area in the last decade. It produces component loadings with many zero entries which facilitates their interpretation and helps avoid redundant variables. The classic factor analysis is another popular dimension reduction technique which shares similar interpretation problems and could greatly benefit from sparse solutions. Unfortunately, there are very few works considering sparse versions of the classic factor analysis. Our goal is to contribute further in this direction. We revisit the most popular procedures for exploratory factor analysis, maximum likelihood and least squares. Sparse factor loadings are obtained for them by, first, adopting a special reparameterization and, second, by introducing additional [Formula: see text]-norm penalties into the standard factor analysis problems. As a result, we propose sparse versions of the major factor analysis procedures. We illustrate the developed algorithms on well-known psychometric problems. Our sparse solutions are critically compared to ones obtained by other existing methods.

  8. Analysis apparatus and method of analysis

    International Nuclear Information System (INIS)

    1976-01-01

    A continuous streaming method developed for the excution of immunoassays is described in this patent. In addition, a suitable apparatus for the method was developed whereby magnetic particles are automatically employed for the consecutive analysis of a series of liquid samples via the RIA technique

  9. Static Analysis Numerical Algorithms

    Science.gov (United States)

    2016-04-01

    STATIC ANALYSIS OF NUMERICAL ALGORITHMS KESTREL TECHNOLOGY, LLC APRIL 2016 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION...3. DATES COVERED (From - To) NOV 2013 – NOV 2015 4. TITLE AND SUBTITLE STATIC ANALYSIS OF NUMERICAL ALGORITHMS 5a. CONTRACT NUMBER FA8750-14-C...and Honeywell Aerospace Advanced Technology to combine model-based development of complex avionics control software with static analysis of the

  10. Emission spectrochemical analysis

    International Nuclear Information System (INIS)

    Rives, R.D.; Bruks, R.R.

    1983-01-01

    The emission spectrochemical method of analysis based on the fact that atoms of elements can be excited in the electric arc or in the laser beam and will emit radiation with characteristic wave lengths is considered. The review contains the data on spectrochemical analysis, of liquids geological materials, scheme of laser microprobe. The main characteristics of emission spectroscopy, atomic absorption spectroscopy and X-ray fluorescent analysis, are aeneralized

  11. Mastering Clojure data analysis

    CERN Document Server

    Rochester, Eric

    2014-01-01

    This book consists of a practical, example-oriented approach that aims to help you learn how to use Clojure for data analysis quickly and efficiently.This book is great for those who have experience with Clojure and who need to use it to perform data analysis. This book will also be hugely beneficial for readers with basic experience in data analysis and statistics.

  12. The ATLAS Analysis Architecture

    International Nuclear Information System (INIS)

    Cranmer, K.S.

    2008-01-01

    We present an overview of the ATLAS analysis architecture including the relevant aspects of the computing model and the major architectural aspects of the Athena framework. Emphasis will be given to the interplay between the analysis use cases and the technical aspects of the architecture including the design of the event data model, transient-persistent separation, data reduction strategies, analysis tools, and ROOT interoperability

  13. Stochastic Analysis 2010

    CERN Document Server

    Crisan, Dan

    2011-01-01

    "Stochastic Analysis" aims to provide mathematical tools to describe and model high dimensional random systems. Such tools arise in the study of Stochastic Differential Equations and Stochastic Partial Differential Equations, Infinite Dimensional Stochastic Geometry, Random Media and Interacting Particle Systems, Super-processes, Stochastic Filtering, Mathematical Finance, etc. Stochastic Analysis has emerged as a core area of late 20th century Mathematics and is currently undergoing a rapid scientific development. The special volume "Stochastic Analysis 2010" provides a sa

  14. Introduction to analysis

    CERN Document Server

    Gaughan, Edward D

    2009-01-01

    Introduction to Analysis is designed to bridge the gap between the intuitive calculus usually offered at the undergraduate level and the sophisticated analysis courses the student encounters at the graduate level. In this book the student is given the vocabulary and facts necessary for further study in analysis. The course for which it is designed is usually offered at the junior level, and it is assumed that the student has little or no previous experience with proofs in analysis. A considerable amount of time is spent motivating the theorems and proofs and developing the reader's intuition.

  15. Space Weather Analysis

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Space Weather Analysis archives are model output of ionospheric, thermospheric and magnetospheric particle populations, energies and electrodynamics

  16. Textile Technology Analysis Lab

    Data.gov (United States)

    Federal Laboratory Consortium — The Textile Analysis Labis built for evaluating and characterizing the physical properties of an array of textile materials, but specifically those used in aircrew...

  17. Risk analysis methodology survey

    Science.gov (United States)

    Batson, Robert G.

    1987-01-01

    NASA regulations require that formal risk analysis be performed on a program at each of several milestones as it moves toward full-scale development. Program risk analysis is discussed as a systems analysis approach, an iterative process (identification, assessment, management), and a collection of techniques. These techniques, which range from simple to complex network-based simulation were surveyed. A Program Risk Analysis Handbook was prepared in order to provide both analyst and manager with a guide for selection of the most appropriate technique.

  18. Thermogravimetric Analysis Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — At NETL’s Thermogravimetric Analysis Laboratory in Morgantown, WV, researchers study how chemical looping combustion (CLC) can be applied to fossil energy systems....

  19. Sensitivity and uncertainty analysis

    CERN Document Server

    Cacuci, Dan G; Navon, Ionel Michael

    2005-01-01

    As computer-assisted modeling and analysis of physical processes have continued to grow and diversify, sensitivity and uncertainty analyses have become indispensable scientific tools. Sensitivity and Uncertainty Analysis. Volume I: Theory focused on the mathematical underpinnings of two important methods for such analyses: the Adjoint Sensitivity Analysis Procedure and the Global Adjoint Sensitivity Analysis Procedure. This volume concentrates on the practical aspects of performing these analyses for large-scale systems. The applications addressed include two-phase flow problems, a radiative c

  20. International Market Analysis

    DEFF Research Database (Denmark)

    Sørensen, Olav Jull

    2009-01-01

    The review presents the book International Market Analysis: Theories and Methods, written by John Kuiada, professor at Centre of International Business, Department of Business Studies, Aalborg University. The book is refreshingly new in its way of looking at a classical problem. It looks at market...... analysis from the point of vie of ways of thinking about markets. Furthermore, the book includes the concept of learning in the analysis of markets og how the way we understand business reality influneces our choice of methodology for market analysis....