WorldWideScience

Sample records for inadvertent intruder analysis

  1. Automated Inadvertent Intruder Application

    International Nuclear Information System (INIS)

    Koffman, Larry D.; Lee, Patricia L.; Cook, James R.; Wilhite, Elmer L.

    2008-01-01

    The Environmental Analysis and Performance Modeling group of Savannah River National Laboratory (SRNL) conducts performance assessments of the Savannah River Site (SRS) low-level waste facilities to meet the requirements of DOE Order 435.1. These performance assessments, which result in limits on the amounts of radiological substances that can be placed in the waste disposal facilities, consider numerous potential exposure pathways that could occur in the future. One set of exposure scenarios, known as inadvertent intruder analysis, considers the impact on hypothetical individuals who are assumed to inadvertently intrude onto the waste disposal site. Inadvertent intruder analysis considers three distinct scenarios for exposure referred to as the agriculture scenario, the resident scenario, and the post-drilling scenario. Each of these scenarios has specific exposure pathways that contribute to the overall dose for the scenario. For the inadvertent intruder analysis, the calculation of dose for the exposure pathways is a relatively straightforward algebraic calculation that utilizes dose conversion factors. Prior to 2004, these calculations were performed using an Excel spreadsheet. However, design checks of the spreadsheet calculations revealed that errors could be introduced inadvertently when copying spreadsheet formulas cell by cell and finding these errors was tedious and time consuming. This weakness led to the specification of functional requirements to create a software application that would automate the calculations for inadvertent intruder analysis using a controlled source of input parameters. This software application, named the Automated Inadvertent Intruder Application, has undergone rigorous testing of the internal calculations and meets software QA requirements. The Automated Inadvertent Intruder Application was intended to replace the previous spreadsheet analyses with an automated application that was verified to produce the same calculations and

  2. AUTOMATED INADVERTENT INTRUDER APPLICATION

    International Nuclear Information System (INIS)

    Koffman, L; Patricia Lee, P; Jim Cook, J; Elmer Wilhite, E

    2007-01-01

    The Environmental Analysis and Performance Modeling group of Savannah River National Laboratory (SRNL) conducts performance assessments of the Savannah River Site (SRS) low-level waste facilities to meet the requirements of DOE Order 435.1. These performance assessments, which result in limits on the amounts of radiological substances that can be placed in the waste disposal facilities, consider numerous potential exposure pathways that could occur in the future. One set of exposure scenarios, known as inadvertent intruder analysis, considers the impact on hypothetical individuals who are assumed to inadvertently intrude onto the waste disposal site. Inadvertent intruder analysis considers three distinct scenarios for exposure referred to as the agriculture scenario, the resident scenario, and the post-drilling scenario. Each of these scenarios has specific exposure pathways that contribute to the overall dose for the scenario. For the inadvertent intruder analysis, the calculation of dose for the exposure pathways is a relatively straightforward algebraic calculation that utilizes dose conversion factors. Prior to 2004, these calculations were performed using an Excel spreadsheet. However, design checks of the spreadsheet calculations revealed that errors could be introduced inadvertently when copying spreadsheet formulas cell by cell and finding these errors was tedious and time consuming. This weakness led to the specification of functional requirements to create a software application that would automate the calculations for inadvertent intruder analysis using a controlled source of input parameters. This software application, named the Automated Inadvertent Intruder Application, has undergone rigorous testing of the internal calculations and meets software QA requirements. The Automated Inadvertent Intruder Application was intended to replace the previous spreadsheet analyses with an automated application that was verified to produce the same calculations and

  3. Inadvertent Intruder Analysis For The Portsmouth On-Site Waste Disposal Facility (OSWDF)

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Frank G. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Phifer, Mark A. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2014-01-22

    The inadvertent intruder analysis considers the radiological impacts to hypothetical persons who are assumed to inadvertently intrude on the Portsmouth OSWDF site after institutional control ceases 100 years after site closure. For the purposes of this analysis, we assume that the waste disposal in the OSWDF occurs at time zero, the site is under institutional control for the next 100 years, and inadvertent intrusion can occur over the following 1,000 year time period. Disposal of low-level radioactive waste in the OSWDF must meet a requirement to assess impacts on such individuals, and demonstrate that the effective dose equivalent to an intruder would not likely exceed 100 mrem per year for scenarios involving continuous exposure (i.e. chronic) or 500 mrem for scenarios involving a single acute exposure. The focus in development of exposure scenarios for inadvertent intruders was on selecting reasonable events that may occur, giving consideration to regional customs and construction practices. An important assumption in all scenarios is that an intruder has no prior knowledge of the existence of a waste disposal facility at the site. Results of the analysis show that a hypothetical inadvertent intruder at the OSWDF who, in the worst case scenario, resides on the site and consumes vegetables from a garden established on the site using contaminated soil (chronic agriculture scenario) would receive a maximum chronic dose of approximately 7.0 mrem/yr during the 1000 year period of assessment. This dose falls well below the DOE chronic dose limit of 100 mrem/yr. Results of the analysis also showed that a hypothetical inadvertent intruder at the OSWDF who, in the worst case scenario, excavates a basement in the soil that reaches the waste (acute basement construction scenario) would receive a maximum acute dose of approximately 0.25 mrem/yr during the 1000 year period of assessment. This dose falls well below the DOE acute dose limit of 500 mrem/yr. Disposal inventory

  4. Potential impact of DOE's performance objective for protection of inadvertent intruders on low-level waste disposals at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1993-01-01

    Performance objectives for disposal of low-level radioactive waste at Department of Energy (DOE) sites include limits on radiation dose to inadvertent intruders. This paper investigates the potential impact of DOE's performance objective for protection of inadvertent intruders on the acceptability of low-level waste disposals at Oak Ridge National Laboratory (ORNL). The analysis is based on waste volumes and radionuclide inventories for recent disposals and estimated doses to an inadvertent intruder for assumed exposure scenarios. The analysis indicates that more than 99% of the total volume of waste in recent disposals meets the performance objective for inadvertent intruders, and the volume of waste found to be unacceptable for disposal is only about 16 m 3 . Therefore, DOE's performance objective for protection of inadvertent intruders probably will not have unreasonably adverse impacts on acceptable waste disposals at ORNL

  5. Potential impact of DOE's performance objective for protection of inadvertent intruders on low-level waste disposals at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1992-01-01

    The Department of Energy's Order 5820.2A, Chapter III, specifies performance objectives for disposal of low-level radioactive waste which include limits on effective dose equivalent for inadvertent intruders. This paper investigates the potential impact of the performance objective for protection of inadvertent intruders on the acceptability of waste disposals in Solid Waste Storage Area (SWSA) 6 at Oak Ridge National Laboratory (ORNL). The analysis is based on radionuclide inventories and waste volumes for recent disposals in SWSA 6 and calculated doses to an inadvertent intruder per unit concentration of radionuclides in disposed waste for assumed exposure scenarios

  6. A proposed alternative approach for protection of inadvertent human intruders from buried Department of Energy low level radioactive wastes

    International Nuclear Information System (INIS)

    Cochran, J.R.

    1995-01-01

    The burial of radioactive wastes creates a legacy. To limit the impact of this legacy on future generations, we establish and comply with performance objectives. This paper reviews performance objectives for the long-term isolation of buried radioactive wastes; identifies regulatorly-defined performance objectives for protecting the inadvertent human intruder (IHI) from buried low-level radioactive waste (LLW); (3) discusses a shortcoming of the current approach; and (4) offers an alternative approach for protecting the IHI. This alternative approach is written specifically for the burial of US Department of Energy (DOE) wastes at the Nevada Test Site (NTS), although the approach might be applied at other DOE burial sites

  7. Tracking intruder states

    Energy Technology Data Exchange (ETDEWEB)

    Riedinger, L L; Mueller, W F; Yu, C H [Tennessee Univ., Knoxville, TN (United States). Dept. of Physics

    1992-08-01

    The deformation-driving effects of intruder states are studied by analysis of various types of data on rotational bands in rare-earth deformed nuclei. The sensitivity of four measurables (bandhead energy, B(E2) value, neutron i{sub 13/2} crossing frequency, and signature splitting) to increased deformation in an intruder band is shown. The analysis of signature splitting systematics is extended to known superdeformed bands. (author). 22 refs., 5 figs.

  8. Analysis of inadvertent containment spray actuation for NPP Krsko

    International Nuclear Information System (INIS)

    Grgic, D.; Spalj, S.; Fancev, T.

    2000-01-01

    Refueling Water Storage Tank (RWST) supplies borated water to the Chemical and Volume Control System, Emergency Core Cooling System and Containment Spray System. In the analyses of the containment external pressure the spray temperature is assumed to be equal to the RWST lower temperature limit. This value ensures that the design negative containment pressure will not be exceeded in the event of inadvertent actuation of the Containment Spray. For NPP Kriko the negative containment pressure has to be kept below 0.1 kp/cm2 to avoid the loss of containment integrity. This paper pursuents the analysis of Inadvertent Containment Spray Actuation in order to check the influence of change in RWST water temperature on containment negative pressure. GOTHIC computer code was used for calculation of containment thermal hydraulic behavior during this accident. (author)

  9. Intruder scenarios for site-specific waste classification

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.

    1988-01-01

    The US Department of Energy (DOE) is currently revising its low-level radioactive waste (LLW) management requirements and guidelines for waste generated at its facilities that support defense missions. Specifically, draft DOE 5820.2A, Chapter 3, describes the purpose, policy, and requirements necessary for the management of defense LLW. The draft DOE policy calls for DOE LLW operations to be managed to protect the health and safety of the public, preserve the environment, and ensure that no remedial action will be necessary after termination of operations. The requirements and guidelines apply to radioactive wastes but are also intended to apply to mixed hazardous and radioactive wastes as defined in draft DOE 5400.5, Hazardous and Radioactive Mixed Waste. The basic approach used by DOE is to establish overall performance objectives in terms of ground-water protection and public radiation dose limits and to require site-specific performance assessments to determine compliance. As a result of these performance assessments, each site shall develop waste acceptance criteria that define the allowable quantities and concentrations of specific radioisotopes. Additional limitations on waste disposal design, waste form, and waste treatment shall also be developed on a site-specific basis. As a key step in the site-specific performance assessments, an evaluation must be conducted of potential radiation doses to intruders who may inadvertently move onto a closed DOE LLW disposal site after loss of institutional controls must be conducted. This paper describes the types of intruder scenarios that should be considered when performing this step of the site-specific performance assessment

  10. Intruder states and low energy nuclear spectroscopy

    International Nuclear Information System (INIS)

    Bengtsson, R.

    1991-01-01

    The crucial role intruder orbitals play is not limited to low spin and small deformations. In fact much of the physics at superdeformed shapes and at very high spin is a direct result of the presence of high-j intruder orbitals in the vicinity of the Fermi surface, including the introduction of intruder orbitals from still higher shells at extreme deformations. Since the intruder subshell has a larger angular momentum (j) than any other subshell close to the Fermi surface it plays an essential role for building up angular momentum in the nucleus, and the alignment of intruder shell (quasi) particles is responsible for a large variety of bandcrossings observed in discrete spectroscopy along or near the yrast line. Intruder shell orbitals are also associated with large quadrupole moments and the occupation of these orbitals may lead to significant changes of the deformation of the nucleus. Under favorable circumstances a nucleus may have totally different shapes depending on the occupation of the intruder orbitals, giving rise to a phenomenon which is usually referred to as shape coexistence. In this paper, shape coexistence in several mass regions will be discussed with specific attention focused on the relation between shape coexistence and the occupation of intruder shell levels. Shape effects associated both with spin aligned and non-aligned intruder orbitals will be investigated

  11. The behaviour of free-flowing granular intruders

    Directory of Open Access Journals (Sweden)

    Wyburn Edward

    2017-01-01

    Full Text Available Particle shape affects both the quasi-static and dynamic behaviour of granular media. There has been significant research devoted to the flowability of systems of irregularly shaped particles, as well as the flow of grains around fixed intruders, however the behaviour of free flowing intruders within granular flows remains comparatively unexplored. Here, the effect of the shape of these intruder particles is studied, looking at the kinematic behaviour of the intruders and in particular their tendency of orientation. Experiments are carried out within the Stadium Shear Device, which is a novel apparatus able to continuously apply simple shear conditions to two-dimensional grain analogues. It is found that the intruder shows different behaviour to that of the bulk flow, and that this behaviour is strongly shape dependent. These insights could lead to the development of admixtures that alter the flowability of granular materials.

  12. Managing Inadvertent Arterial Catheterization During Central Venous Access Procedures

    International Nuclear Information System (INIS)

    Nicholson, Tony; Ettles, Duncan; Robinson, Graham

    2004-01-01

    Purpose: Approximately 200,000 central venous catheterizations are carried out annually in the National Health Service in the United Kingdom. Inadvertent arterial puncture occurs in up to 3.7%. Significant morbidity and death has been reported. We report on our experience in the endovascular treatment of this iatrogenic complication. Methods: Retrospective analysis was carried out of 9 cases referred for endovascular treatment of inadvertent arterial puncture during central venous catheterization over a 5 year period. Results: It was not possible to obtain accurate figures on the numbers of central venous catheterizations carried out during the time period. Five patients were referred with carotid or subclavian pseudoaneurysms and hemothorax following inadvertent arterial catheter insertion and subsequent removal. These patients all underwent percutaneous balloon tamponade and/or stent-graft insertion. More recently 4 patients were referred with the catheter still in situ and were successfully treated with a percutaneous closure device. Conclusion: If inadvertent arterial catheterization during central venous access procedures is recognized and catheters removed, sequelae can be treated percutaneously. However, once the complication is recognized it is better to leave the catheter in situ and seal the artery percutaneously with a closure device

  13. Human intruder dose assessment for deep geological disposal

    International Nuclear Information System (INIS)

    Smith, G. M.; Molinero, J.; Delos, A.; Valls, A.; Conesa, A.; Smith, K.; Hjerpe, T.

    2013-07-01

    For near-surface disposal, approaches to assessment of inadvertent human intrusion have been developed through international cooperation within the IAEA's ISAM programme. Other assessments have considered intrusion into deep geological disposal facilities, but comparable international cooperation to develop an approach for deep disposal has not taken place. Accordingly, the BIOPROTA collaboration project presented here (1) examined the technical aspects of why and how deep geological intrusion might occur; (2) considered how and to what degree radiation exposure would arise to the people involved in such intrusion; (3) identified the processes which constrain the uncertainties; and hence (4) developed and documented an approach for evaluation of human intruder doses which addresses the criteria adopted by the IAEA and takes account of other international guidance and human intrusion assessment experience. Models for radiation exposure of the drilling workers and geologists were developed and described together with compilation of relevant input data, taking into account relevant combinations of drilling technique, geological formation and repository material. Consideration has been given also to others who might be exposed to contaminated material left at the site after drilling work has ceased. The models have been designed to be simple and stylised, in accordance with international recommendations. The set of combinations comprises 58 different scenarios which cover a very wide range of human intrusion possibilities via deep drilling. (orig.)

  14. Lazy Mobile Intruders

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis

    We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching...... that by communication, the malicious code can learn new information that it can use in subsequent operations, or that we may have several pieces of malicious code that can exchange information if they \\meet". To formalize both the platform and the malicious code we use the mobile ambient calculus, since it provides...... a small, abstract formalism that models the essence of mobile code. We provide a decision procedure for security against arbitrary intruder ambients when the honest ambients can only perform a bounded number of steps and without path constraints in communication....

  15. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    Energy Technology Data Exchange (ETDEWEB)

    Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

  16. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Trauth, K.M.; Hora, S.C.; Guzowski, R.V.

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation

  17. Lazy Mobile Intruders

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis

    2013-01-01

    We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching...... that by communication, the malicious code can learn new information that it can use in subsequent operations, or that we may have several pieces of malicious code that can exchange information if they “meet”. To formalize both the platform and the malicious code we use the mobile ambient calculus, since it provides...... a small, abstract formalism that models the essence of mobile code. We provide a decision procedure for security against arbitrary intruder processes when the honest processes can only perform a bounded number of steps and without path constraints in communication. We show that this problem is NP-complete....

  18. Long-term captures of low-mass intruders by binary stars

    International Nuclear Information System (INIS)

    Hills, J.G.

    1983-01-01

    Intensive computer simulations were made of three families of encounters between a binary star and a low-mass intruder which previous work indicated have a high probability of producing long-lived triple-star systems. For comparison, a fourth family which produces few long-lived trinaries was also studied. In the first two families, the binary components are equally massive and the closest approach of the intruder to the center of mass of the binary is about two times its semimajor axis, a 0 . In Family 1, the orbit of the original binary is circular, e = 0, while in Family 2, e 0 = 0.95. In Family 3 one binary component is 100 times as massive as the other, the orbit is circular, and the low-mass intruder enters the binary at nearly zero impact parameter. The probability that the intruder is trapped for at least one revolution around the binary is 0.24, 0.46, and 0.51, respectively, for these three families of encounters. The fraction of the intruders surviving successive revolutions drops rapidly. However, one encounter in Family 1 and two in Family 3 resulted in the intruder making more than 300 revolutions around the inner binary before escaping. Some intruders remained bound for more than 20 000 revolutions of the inner binary. The longest duration captures occur when the intruder is thrown into an orbit with a very large semimajor axis. About 20% of the encounters in the three families result in the intruder being thrown into an orbit with a semimajor axis a>100 a 0 , while about 2% result in the intruder going into an orbit with a>1000 a 0 . Intruders thrown into these large semimajor axis orbits have the best chance of having their orbits stabilized by passing stars

  19. Energy-efficient area coverage for intruder detection in sensor networks

    CERN Document Server

    He, Shibo; Li, Junkun

    2014-01-01

    This Springer Brief presents recent research results on area coverage for intruder detection from an energy-efficient perspective. These results cover a variety of topics, including environmental surveillance and security monitoring. The authors also provide the background and range of applications for area coverage and elaborate on system models such as the formal definition of area coverage and sensing models. Several chapters focus on energy-efficient intruder detection and intruder trapping under the well-known binary sensing model, along with intruder trapping under the probabilistic sens

  20. Intelligent Machine Vision for Automated Fence Intruder Detection Using Self-organizing Map

    Directory of Open Access Journals (Sweden)

    Veldin A. Talorete Jr.

    2017-03-01

    Full Text Available This paper presents an intelligent machine vision for automated fence intruder detection. A series of still captured images that contain fence events using Internet Protocol cameras was used as input data to the system. Two classifiers were used; the first is to classify human posture and the second one will classify intruder location. The system classifiers were implemented using Self-Organizing Map after the implementation of several image segmentation processes. The human posture classifier is in charge of classifying the detected subject’s posture patterns from subject’s silhouette. Moreover, the Intruder Localization Classifier is in charge of classifying the detected pattern’s location classifier will estimate the location of the intruder with respect to the fence using geometric feature from images as inputs. The system is capable of activating the alarm, display the actual image and depict the location of the intruder when an intruder is detected. In detecting intruder posture, the system’s success rate of 88%. Overall system accuracy for day-time intruder localization is 83% and an accuracy of 88% for night-time intruder localization

  1. On the submerging of a spherical intruder into granular beds

    Directory of Open Access Journals (Sweden)

    Wu Chuan-Yu

    2017-01-01

    Full Text Available Granular materials are complex systems and their mechanical behaviours are determined by the material properties of individual particles, the interaction between particles and the surrounding media, which are still incompletely understood. Using an advanced discrete element method (DEM, we simulate the submerging process of a spherical projectile (an intruder into granular materials of various properties with a zero penetration velocity (i.e. the intruder is touching the top surface of the granular bed and released from stationary and examine its settling behaviour. By systematically changing the density and size of the intruder and the particle density (i.e. the density of the particles in the granular bed, we find that the intruder can sink deep into the granular bed even with a zero penetration velocity. Furthermore, we confirm that under certain conditions the granular bed can behave like a Newtonian liquid and the submerging intruder can reach a constant velocity, i.e. the terminal velocity, identical to the settling of a sphere in a liquid, as observed experimentally. A mathematical model is also developed to predict the maximum penetration depth of the intruder. The model predictions are compared with experimental data reported in the literature,good agreement was obtained, demonstrating the model can accurately predict the submerging behaviour of the intruder in the granular media.

  2. Intruder states at the N=20 shell closure

    International Nuclear Information System (INIS)

    Heyde, K.

    1991-01-01

    It is indicated that mp-mh (multiple) excitations across closed shells can occur at low energy throughout the nuclear mass region. Besides the 4p-4h, 8p-8h configurations, that are deformed, coexisting low-lying excitations are mainly observed for light N=Z nuclei. A new class of 2p-2h intruder O + state is shown to exist in nuclei where a neutron excess is present. In the latter cases, the proton-neutron interaction energy between the excited 2p-2h configuration and the open shell accounts for a very specific mass dependence in the intruder excitation energy. The experimental evidence that corroborates the idea of intruder states will be given. (G.P.) 28 refs.; 13 figs

  3. Firewater system inadvertent actuation frequencies

    International Nuclear Information System (INIS)

    Schroeder, J.A.; Eide, S.A.

    1993-01-01

    This paper presents some recommended generic values for fire protection system inadvertent actuation frequencies. The frequencies are based on actual data from Department of Energy and commercial reactor plant facilities

  4. Detection of Intelligent Intruders in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yun Wang

    2016-01-01

    Full Text Available Most of the existing research works on the intrusion detection problem in a wireless sensor network (WSN assume linear or random mobility patterns in abstracting intruders’ models in traversing the WSN field. However, in real-life WSN applications, an intruder is usually an intelligent mobile robot with environment learning and detection avoidance capability (i.e., the capability to avoid surrounding sensors. Due to this, the literature results based on the linear or random mobility models may not be applied to the real-life WSN design and deployment for efficient and effective intrusion detection in practice. This motivates us to investigate the impact of intruder’s intelligence on the intrusion detection problem in a WSN for various applications. To be specific, we propose two intrusion algorithms, the pinball and flood-fill algorithms, to mimic the intelligent motion and behaviors of a mobile intruder in detecting and circumventing nearby sensors for detection avoidance while heading for its destination. The two proposed algorithms are integrated into a WSN framework for intrusion detection analysis in various circumstances. Monte Carlo simulations are conducted, and the results indicate that: (1 the performance of a WSN drastically changes as a result of the intruder’s intelligence in avoiding sensor detections and intrusion algorithms; (2 network parameters, including node density, sensing range and communication range, play a crucial part in the effectiveness of the intruder’s intrusion algorithms; and (3 it is imperative to integrate intruder’s intelligence in the WSN research for intruder detection problems under various application circumstances.

  5. Intruder level and deformation in SD-pair shell model

    International Nuclear Information System (INIS)

    Luo Yan'an; Ning Pingzhi; Pan Feng

    2004-01-01

    The influence of intruder level on nuclear deformation is studied within the framework of the nucleon-pair shell model truncated to an SD-pair subspace. The results suggest that the intruder level has a tendency to reduce the deformation and plays an important role in determining the onset of rotational behavior. (authors)

  6. LWRA analysis of inadvertent closing of the main steam isolation valve in NPP Krsko

    International Nuclear Information System (INIS)

    Feretic, D.; Cavlina, N.; Grgic, D.; Spalj, S.

    1996-01-01

    The paper describes the use of system code RELAP5/mod2 and analyzer code LWRA in analysis of inadvertent closing of the main steam isolation valve that happened in NPP Krsko on September, 25 1995. Three cases were calculated in order to address different aspects of the modelled transient. This preliminary calculation showed that, even though the real plant behaviour was not completely reproduced, such kind of analysis can help to better understand plant behaviour and to identify important phenomena in the plant during transient. The results calculated by RELAP5 and LWRA were similar and both codes indicated lack of better understanding of the plant systems status. The LWRA was more than 5 times faster than real time. (author)

  7. Friction force regimes and the conditions for endless penetration of an intruder into a granular medium.

    Science.gov (United States)

    López-Rodríguez, L A; Pacheco-Vázquez, F

    2017-09-01

    An intruder penetrating into a granular column experiences a depth-dependent friction force F(z). Different regimes of F(z) have been measured depending on the experimental design: a nearly linear dependence for shallow penetrations, total saturation at large depths, and an exponential increase when the intruder approaches the bottom of the granular bed. We report here an experiment that allows us to measure the different regimes in a single run during the quasistatic descent of a sphere in a light granular medium. From the analysis of the resistance in the saturation zone, it was found that F(z) follows a cube-power-law dependence on the intruder diameter and an exponential increase with the packing fraction of the bed. Moreover, we determine the critical mass m_{c} required to observe infinite penetration and its dependence on the above parameters. Finally, we use our results to estimate the final penetration depth reached by intruders of masses mintruder of any density (larger than the density of the granular bed) can sink indefinitely into the granular medium if the bed packing fraction is smaller than a critical value.

  8. Compensated intruder-detection systems

    Science.gov (United States)

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  9. Pulling an intruder from a granular material: a novel depinning experiment

    Directory of Open Access Journals (Sweden)

    Zhang Yue

    2017-01-01

    Full Text Available Two-dimensional impact experiments by Clark et al. [2] identified the source of inertial drag to be caused by ‘collisions’ with a latent force network, leading to large fluctuations of the force experienced by the impactor. These collisions provided the major drag on an impacting intruder until the intruder was nearly at rest. As a complement, we consider controlled pull-out experiments where a buried intruder is pulled out of a material, starting from rest. This provides a means to better understand the non-inertial part of the drag force, and to explore the mechanisms associated with the force fluctuations. To some extent, the pull out process is a time reversed version of the impact process. In order to visualize this pulling process, we use 2D photoelastic disks from which circular intruders of different radii are pulled out. We present results about the dynamics of the intruder and the structures of the force chains inside the granular system as captured by slow and high speed imaging.

  10. Exploring key considerations when determining bona fide inadvertent errors resulting in understatements

    Directory of Open Access Journals (Sweden)

    Chrizanne de Villiers

    2016-03-01

    Full Text Available Chapter 16 of the Tax Administration Act (28 of 2011 (the TA Act deals with understatement penalties. In the event of an ‘understatement’, in terms of Section 222 of the TA Act, a taxpayer must pay an understatement penalty, unless the understatement results from a bona fide inadvertent error. The determining of a bona fide inadvertent error on taxpayers’ returns is a totally new concept in the tax fraternity. It is of utmost importance that this section is applied correctly based on sound evaluation principles and not on professional judgement when determining if the error was indeed the result of a bona fide inadvertent error. This research study focuses on exploring key considerations when determining bona fide inadvertent errors resulting in understatements. The role and importance of tax penalty provisions is explored and the meaning of the different components in the term ‘bona fide inadvertent error’ critically analysed with the purpose to find a possible definition for the term ‘bona fide inadvertent error’. The study also compares the provisions of other tax jurisdictions with regards to errors made resulting in tax understatements in order to find possible guidelines on the application of bona fide inadvertent errors as contained in Section 222 of the TA Act. The findings of the research study revealed that the term ‘bona fide inadvertent error’ contained in Section 222 of the TA Act should be defined urgently and that guidelines must be provided by SARS on the application of the new amendment. SARS should also clarify the application of a bona fide inadvertent error in light of the behaviours contained in Section 223 of the TA Act to avoid any confusion.

  11. Optimizing the Configuration of Sensor Networks to Detect Intruders.

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Nathanael J. K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nozick, Linda Karen [Cornell Univ., Ithaca, NY (United States); Xu, Ningxiong [Cornell Univ., Ithaca, NY (United States)

    2015-03-01

    This paper focuses on optimizing the selection and configuration of detection technologies to protect a target of interest. The ability of an intruder to simply reach the target is assumed to be sufficient to consider the security system a failure. To address this problem, we develop a game theoretic model of the strategic interactions between the system owner and a knowledgeable intruder. A decomposition-based exact method is used to solve the resultant model.

  12. Mitigating Inadvertent Insider Threats with Incentives

    Science.gov (United States)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  13. Description of intruded states in a weak-coupling basis

    International Nuclear Information System (INIS)

    Arenas Peris, G.E.

    1989-01-01

    The systematics of intruder states is described in terms of a particle-hole weak-coupling basis, the first-order correction being then reduced to the monopole component of the interaction. The necessary matrix elements can be obtained from experimental data by using a model-consistent method. Calculations are performed for intruder states in the lead region as well as for the Zr isotopes. The agreement with the experimental data is striking in both cases. (Author) [es

  14. Evaluation of SPACE code for simulation of inadvertent opening of spray valve in Shin Kori unit 1

    International Nuclear Information System (INIS)

    Kim, Seyun; Youn, Bumsoo

    2013-01-01

    SPACE code is expected to be applied to the safety analysis for LOCA (Loss of Coolant Accident) and Non-LOCA scenarios. SPACE code solves two-fluid, three-field governing equations and programmed with C++ computer language using object-oriented concepts. To evaluate the analysis capability for the transient phenomena in the actual nuclear power plant, an inadvertent opening of spray valve in startup test phase of Shin Kori unit 1 was simulated with SPACE code. To evaluate the analysis capability for the transient phenomena in the actual nuclear power plant, an inadvertent opening of spray valve in startup test phase of Shin Kori unit 1 was simulated with SPACE code

  15. Low Cost Night Vision System for Intruder Detection

    Science.gov (United States)

    Ng, Liang S.; Yusoff, Wan Azhar Wan; R, Dhinesh; Sak, J. S.

    2016-02-01

    The growth in production of Android devices has resulted in greater functionalities as well as lower costs. This has made previously more expensive systems such as night vision affordable for more businesses and end users. We designed and implemented robust and low cost night vision systems based on red-green-blue (RGB) colour histogram for a static camera as well as a camera on an unmanned aerial vehicle (UAV), using OpenCV library on Intel compatible notebook computers, running Ubuntu Linux operating system, with less than 8GB of RAM. They were tested against human intruders under low light conditions (indoor, outdoor, night time) and were shown to have successfully detected the intruders.

  16. Adaptive Neuro-Fuzzy Determination of the Effect of Experimental Parameters on Vehicle Agent Speed Relative to Vehicle Intruder.

    Directory of Open Access Journals (Sweden)

    Shahaboddin Shamshirband

    Full Text Available Intelligent Transportation Systems rely on understanding, predicting and affecting the interactions between vehicles. The goal of this paper is to choose a small subset from the larger set so that the resulting regression model is simple, yet have good predictive ability for Vehicle agent speed relative to Vehicle intruder. The method of ANFIS (adaptive neuro fuzzy inference system was applied to the data resulting from these measurements. The ANFIS process for variable selection was implemented in order to detect the predominant variables affecting the prediction of agent speed relative to intruder. This process includes several ways to discover a subset of the total set of recorded parameters, showing good predictive capability. The ANFIS network was used to perform a variable search. Then, it was used to determine how 9 parameters (Intruder Front sensors active (boolean, Intruder Rear sensors active (boolean, Agent Front sensors active (boolean, Agent Rear sensors active (boolean, RSSI signal intensity/strength (integer, Elapsed time (in seconds, Distance between Agent and Intruder (m, Angle of Agent relative to Intruder (angle between vehicles °, Altitude difference between Agent and Intruder (m influence prediction of agent speed relative to intruder. The results indicated that distance between Vehicle agent and Vehicle intruder (m and angle of Vehicle agent relative to Vehicle Intruder (angle between vehicles ° is the most influential parameters to Vehicle agent speed relative to Vehicle intruder.

  17. Adaptive Neuro-Fuzzy Determination of the Effect of Experimental Parameters on Vehicle Agent Speed Relative to Vehicle Intruder.

    Science.gov (United States)

    Shamshirband, Shahaboddin; Banjanovic-Mehmedovic, Lejla; Bosankic, Ivan; Kasapovic, Suad; Abdul Wahab, Ainuddin Wahid Bin

    2016-01-01

    Intelligent Transportation Systems rely on understanding, predicting and affecting the interactions between vehicles. The goal of this paper is to choose a small subset from the larger set so that the resulting regression model is simple, yet have good predictive ability for Vehicle agent speed relative to Vehicle intruder. The method of ANFIS (adaptive neuro fuzzy inference system) was applied to the data resulting from these measurements. The ANFIS process for variable selection was implemented in order to detect the predominant variables affecting the prediction of agent speed relative to intruder. This process includes several ways to discover a subset of the total set of recorded parameters, showing good predictive capability. The ANFIS network was used to perform a variable search. Then, it was used to determine how 9 parameters (Intruder Front sensors active (boolean), Intruder Rear sensors active (boolean), Agent Front sensors active (boolean), Agent Rear sensors active (boolean), RSSI signal intensity/strength (integer), Elapsed time (in seconds), Distance between Agent and Intruder (m), Angle of Agent relative to Intruder (angle between vehicles °), Altitude difference between Agent and Intruder (m)) influence prediction of agent speed relative to intruder. The results indicated that distance between Vehicle agent and Vehicle intruder (m) and angle of Vehicle agent relative to Vehicle Intruder (angle between vehicles °) is the most influential parameters to Vehicle agent speed relative to Vehicle intruder.

  18. Intruder bands in Z = 51 nuclei

    International Nuclear Information System (INIS)

    LaFosse, D.R.

    1993-01-01

    Recent investigations of h 11/2 proton intruder bands in odd 51 Sb nuclei are reported. In addition to experiments performed at SUNY Stony Brook and Chalk River, data from Early Implementation of GAMMASPHERE (analysis in progress) are presented. In particular, the nuclei 109 Sb and 111 Sb are discussed. Rotational bands based on the πh 11/2 orbital coupled to a 2p2h deformed state of the 50 Sn core have been observed. These bands have been observed to high spin, and in the case of 109 Sb to a rotational frequency of 1.4 MeV, the highest frequency observed in a heavy nucleus. The dynamic moments of inertia in these bands decrease slowly with frequency, suggesting a gradual band termination. The systematics of such bands in 109-119 Sb will be discussed

  19. Intentional and inadvertent non-adherence in adult coeliac disease. A cross-sectional survey.

    Science.gov (United States)

    Hall, Nicola J; Rubin, Gregory P; Charnock, Anne

    2013-09-01

    Adherence to a gluten-free diet is the mainstay of treatment for coeliac disease. Non-adherence is common as the diet is restrictive and can be difficult to follow. This study aimed to determine the rates of intentional and inadvertent non-adherence in adult coeliac disease and to examine the factors associated with both. A self-completion questionnaire was mailed to adult coeliac patients identified from the computer records of 31 family practices within the North East of England. We received 287 responses after one reminder. Intentional gluten consumption was reported by 115 (40%) of respondents. 155 (54%) had made at least one known mistaken lapse over the same period and 82 (29%) reported neither intentional nor mistaken gluten consumption. Using logistic regression analysis, low self-efficacy, perceptions of tolerance to gluten and intention were found to be independently predictive of intentional gluten consumption. A statistical model predicted 71.8% of cases reporting intentional lapses. Intentional non-adherence to the GFD was found to be common but not as frequent as inadvertent lapses. Distinguishing the factors influencing both intentional and inadvertent non-adherence is useful in understanding dietary self-management in coeliac disease. Copyright © 2013 Elsevier Ltd. All rights reserved.

  20. The adverse effects of inadvertent intraoperative intravenous ...

    African Journals Online (AJOL)

    Inadvertent intravenous injection of 1% phenylephrine (10 mg) induced severe hypertension and tachycardia in a previously healthy female patient undergoing elective gynaecological surgery. This medical error was investigated using the criticalincident technique that is available in our department. This case report ...

  1. Ureteroscopic holmium laser cutting for inadvertently sutured drainage tube (report of five cases).

    Science.gov (United States)

    Gao, Xu; Lu, Xin; Ren, Shancheng; Xu, Chuanliang; Sun, Yinghao

    2008-07-01

    The aim of this paper is to report a simple solution for inadvertently sutured drainage tube after urological surgery and discuss the different managements according to different types of this embarrassing complication. From September 2001 to January 2007, five inadvertently sutured drainage tubes were treated with ureteroscopic holmium laser cutting for the suture. All drainage tubes were removed after the operation without other complications. Holmium laser cutting via ureteroscope is a simple solution for the embarrassing problem of inadvertently sutured drainage tube. It can save the patient from undergoing another open surgery.

  2. Unexpected alignment patterns in high-j intruder bands evidence for a strong residual neutron proton interaction?

    International Nuclear Information System (INIS)

    Wyss, R.; Johnson, A.; Royal Inst. of Tech., Stockholm

    1990-01-01

    The alignment of h 11/12 protons in νi 13/2 intruder bands in mass A = 130 region is investigated. The lack of a clear h 11/12 band crossing is compared with the alignment pattern of i 13/2 neutrons in πi 13/2 intruder bands in mass A = 180 region. The very smooth rise in angular momentum in the intruder bands is related to a possible neutron proton interaction between the single intruder orbital and the aligned two-quasiparticle configuration. 36 refs., 3 figs

  3. Reorganization of intruder Using Ad-Hoc Network And RFID

    Directory of Open Access Journals (Sweden)

    Vishakha Hagawane

    2014-05-01

    Full Text Available This system is to develop a centralized computer application that needs to identify moving person in a specific area using wireless network. In this paper, we develop a new indoor tracking algorithm using received signal strength. The RFID is able to detect the humans and provide information about the direction of the movement. The gathered information from the node is to be given to the base station for processing. . This application is able to detect and track person, and report direction of the intruder to a central base station. In this system we design nodes through which we are able to track the person. The human intruder is detected using Zigbee.

  4. Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-10-01

    Full Text Available Given that entropy-based IT technology has been applied in homes, office buildings and elsewhere for IT security systems, diverse kinds of intelligent services are currently provided. In particular, IT security systems have become more robust and varied. However, access control systems still depend on tags held by building entrants. Since tags can be obtained by intruders, an approach to counter the disadvantages of tags is required. For example, it is possible to track the movement of tags in intelligent buildings in order to detect intruders. Therefore, each tag owner can be judged by analyzing the movements of their tags. This paper proposes a security approach based on the received signal strength indicators (RSSIs of beacon-based tags to detect intruders. The normal RSSI patterns of moving entrants are obtained and analyzed. Intruders can be detected when abnormal RSSIs are measured in comparison to normal RSSI patterns. In the experiments, one normal and one abnormal scenario are defined for collecting the RSSIs of a Bluetooth-based beacon in order to validate the proposed method. When the RSSIs of both scenarios are compared to pre-collected RSSIs, the RSSIs of the abnormal scenario are about 61% more different compared to the RSSIs of the normal scenario. Therefore, intruders in buildings can be detected by considering RSSI differences.

  5. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-05-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  6. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-12-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  7. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2003-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  8. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2003-05-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  9. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2002-09-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  10. Motion patterns and phase-transition of a defender-intruder problem and optimal interception strategy of the defender

    Science.gov (United States)

    Wang, Jiangliu; Li, Wei

    2015-10-01

    In this paper, we consider a defense-intrusion interaction, in which an intruder is attracted by a protected stationary target but repulsed by a defender; while the defender tries to move towards an appropriate interception position (IP) between the intruder and the target in order to intercept the intruder and expel the intruder away from the target as maximum as possible. Intuitionally, to keep the intruder further away, one may wonder that: is it a better strategy for the defender trying to approach the intruder as near as possible? Unexpectedly and interestingly enough, this is not always the case. We first introduce the flexibility for IP selection, then investigate the system dynamics and the stable motion patterns, and characterize the phase-transition surface for the motion patterns. We show that, the phase-transition surface just defines the optimal interception strategy of the defender for IP selection; and from the perspective of mobility of agents, the optimal strategy just depends on relative mobility of the two agents.

  11. Localization Capability of Cooperative Anti-Intruder Radar Systems

    Directory of Open Access Journals (Sweden)

    Mauro Montanari

    2008-06-01

    Full Text Available System aspects of an anti-intruder multistatic radar based on impulse radio ultrawideband (UWB technology are addressed. The investigated system is composed of one transmitting node and at least three receiving nodes, positioned in the surveillance area with the aim of detecting and locating a human intruder (target that moves inside the area. Such systems, referred to also as UWB radar sensor networks, must satisfy severe power constraints worldwide imposed by, for example, the Federal Communications Commission (FCC and by the European Commission (EC power spectral density masks. A single transmitter-receiver pair (bistatic radar is considered at first. Given the available transmitted power and the capability of the receiving node to resolve the UWB pulses in the time domain, the surveillance area regions where the target is detectable, and those where it is not, are obtained. Moreover, the range estimation error for the transmitter-receiver pair is discussed. By employing this analysis, a multistatic system is then considered, composed of one transmitter and three or four cooperating receivers. For this multistatic system, the impact of the nodes location on area coverage, necessary transmitted power and localization uncertainty is studied, assuming a circular surveillance area. It is highlighted how area coverage and transmitted power, on one side, and localization uncertainty, on the other side, require opposite criteria of nodes placement. Consequently, the need for a system compromising between these factors is shown. Finally, a simple and effective criterion for placing the transmitter and the receivers is drawn.

  12. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  13. Intelligent Machine Vision for Automated Fence Intruder Detection Using Self-organizing Map

    OpenAIRE

    Veldin A. Talorete Jr.; Sherwin A Guirnaldo

    2017-01-01

    This paper presents an intelligent machine vision for automated fence intruder detection. A series of still captured images that contain fence events using Internet Protocol cameras was used as input data to the system. Two classifiers were used; the first is to classify human posture and the second one will classify intruder location. The system classifiers were implemented using Self-Organizing Map after the implementation of several image segmentation processes. The human posture classifie...

  14. The Star Wars Kid and the Bedroom Intruder

    DEFF Research Database (Denmark)

    Christensen, Jørgen Riber

    2011-01-01

    Jørgen Riber Christensen's article Star Wars Kid and the Bedroom Intruder looks at how people may unexpectedly become icons of the Internet, through a transgression of the private sphere. Surveillance and celebrity is revealed to be bound together with a disciplinary effect, at the same time...

  15. Human intrusion into geologic repositories for high-level radioactive waste: potential and prevention

    Energy Technology Data Exchange (ETDEWEB)

    Cameron, F X [Nuclear Regulatory Commission, Washington, DC (USA). Office of Nuclear Regulatory Research

    1981-12-01

    Isolation of high-level radioactive waste over long periods of time requires protection not only from natural events and processes, but also from the deliberate or inadvertent activities of future societies. This paper evaluates the likelihood of inadvertent human intrusion due to the loss of societal memory of the repository site. In addition measures to prevent inadvertent intrusion, and to guide future societies in any decision to deliberately intrude into the repository are suggested.

  16. Lift on side by side intruders of various geometries within a granular flow

    Science.gov (United States)

    Acevedo-Escalante, M. F.; Caballero-Robledo, G. A.

    2017-06-01

    Obstacles within fluids have been widely used in engineering and in physics to study hydrodynamic interactions. In granular matter, objects within a granular flow have helped to understand fundamental features of drag and lift forces. In our group, we have studied numerically the flow mediated interaction between two static disks within a vertical granular flow in a two-dimensional container where the flow velocity and the distance between obstacles were varied. Attractive and repulsive forces were found depending on flow velocity and separation between intruders. The simulations evidenced a relationship between the average flow velocity in a specific section ahead of the obstacles and the attractive-repulsive lift. On the other hand, it was showed that the lift force on an object dragged within a granular medium depends on the shape of the intruder. Here we present experimental results of the interaction between two side-by-side intruders of different shapes within a vertical granular flow. We built a quasi-two-dimensional container in which we placed the intruders and using load cells we measured lift and drag forces during the discharge process for different flow velocities.

  17. Towards a shell-model description of intruder states and the onset of deformation

    International Nuclear Information System (INIS)

    Heyde, K.; Van Isacker, P.; Casten, R.F.; Wood, J.L.

    1985-01-01

    Basing on the nuclear shell-model and concentrating on the monopole, pairing and quadrupole corrections originating from the nucleon-nucleon force, both the appearance of low-lying 0 + intruder states near major closed shells (Z = 50, 82) and sub-shell regions (Z = 40, 64) can be described. Moreover, a number of new facets related to the study of intruder states are presented. 19 refs., 3 figs

  18. Probability of inadvertent operation of electrical components in harsh environments

    International Nuclear Information System (INIS)

    Knoll, A.

    1989-01-01

    Harsh environment, which means humidity and high temperature, may and will affect unsealed electrical components by causing leakage ground currents in ungrounded direct current systems. The concern in a nuclear power plant is that such harsh environment conditions could cause inadvertent operation of normally deenergized components, which may have a safety-related isolation function. Harsh environment is a common cause failure, and one way to approach the problem is to assume that all the unsealed electrical components will simultaneously and inadvertently energize as a result of the environmental common cause failure. This assumption is unrealistically conservative. Test results indicated that insulating resistences of any terminal block in harsh environments have a random distribution in the range of 1 to 270 kΩ, with a mean value ∼59 kΩ. The objective of this paper is to evaluate a realistic conditional failure probability for inadvertent operation of electrical components in harsh environments. This value will be used thereafter in probabilistic safety evaluations of harsh environment events and will replace both the overconservative common cause probability of 1 and the random failure probability used for mild environments

  19. Deformed intruders and the onset of deformation at N=20 far from stability

    International Nuclear Information System (INIS)

    Poves, A.; Retamosa, J.

    1991-01-01

    Intruder states, built up of 2p-2h excitations are shown to exhibit rotational features. The combined effects of the reduction of the energy gap between major shells occurring far from stability, and the correlation energy of the valence nucleons, make the intruders dominant in the low energy spectrum of several nuclei. Many experimental puzzles may be solved in this way. (G.P.) 17 refs.; 10 figs

  20. Preventing Inadvertent Placement of Foley Catheter into Prostatic ...

    African Journals Online (AJOL)

    Percutaneous suprapubic trocar cystostomy (SPC) is often needed to drain the bladder when urethral catheterization either fails or is not advisable.[1] It is ... vertical or slightly tilting its tip toward umbilicus during foley placement, prevents the inadvertent migration of catheter into prostatic urethra and further complications.

  1. Implementation of coordinated global serotype 2 oral poliovirus vaccine cessation: risks of inadvertent trivalent oral poliovirus vaccine use.

    Science.gov (United States)

    Duintjer Tebbens, Radboud J; Hampton, Lee M; Thompson, Kimberly M

    2016-06-01

    The endgame for polio eradication includes coordinated global cessation of oral poliovirus vaccine (OPV), starting with the cessation of vaccine containing OPV serotype 2 (OPV2) by switching all trivalent OPV (tOPV) to bivalent OPV (bOPV). The logistics associated with this global switch represent a significant undertaking, with some possibility of inadvertent tOPV use after the switch. We used a previously developed poliovirus transmission and OPV evolution model to explore the relationships between the extent of inadvertent tOPV use, the time after the switch of the inadvertent tOPV use and corresponding population immunity to serotype 2 poliovirus transmission, and the ability of the inadvertently introduced viruses to cause a serotype 2 circulating vaccine-derived poliovirus (cVDPV2) outbreak in a hypothetical population. We then estimated the minimum time until inadvertent tOPV use in a supplemental immunization activity (SIA) or in routine immunization (RI) can lead to a cVDPV2 outbreak in realistic populations with properties like those of northern India, northern Pakistan and Afghanistan, northern Nigeria, and Ukraine. At low levels of inadvertent tOPV use, the minimum time after the switch for the inadvertent use to cause a cVDPV2 outbreak decreases sharply with increasing proportions of children inadvertently receiving tOPV. The minimum times until inadvertent tOPV use in an SIA or in RI can lead to a cVDPV2 outbreak varies widely among populations, with higher basic reproduction numbers, lower tOPV-induced population immunity to serotype 2 poliovirus transmission prior to the switch, and a lower proportion of transmission occurring via the oropharyngeal route all resulting in shorter times. In populations with the lowest expected immunity to serotype 2 poliovirus transmission after the switch, inadvertent tOPV use in an SIA leads to a cVDPV2 outbreak if it occurs as soon as 9 months after the switch with 0.5 % of children aged 0-4 years inadvertently

  2. Equivalence of the spherical and deformed shell-model approach to intruder states

    International Nuclear Information System (INIS)

    Heyde, K.; Coster, C. de; Ryckebusch, J.; Waroquier, M.

    1989-01-01

    We point out that the description of intruder states, incorporating particle-hole (p-h) excitation across a closed shell in the spherical shell model or a description starting from the Nilsson model are equivalent. We furthermore indicate that the major part of the nucleon-nucleon interaction, responsible for the low excitation energy of intruder states comes as a two-body proton-neutron quadrupole interaction in the spherical shell model. In the deformed shell model, quadrupole binding energy is gained mainly through the one-body part of the potential. (orig.)

  3. Cyclodialysis cleft with late hypotony maculopathy after inadvertent cannula detachment during cataract surgery.

    Science.gov (United States)

    Kahawita, Shyalle; Cugati, Sudha; Casson, Robert

    2015-05-01

    We present the case of a 69-year-old woman who presented with hypotony several years after an inadvertent cannula detachment presumably formed a cyclodialysis cleft during phacoemulsification cataract extraction and posterior chamber intraocular lens implantation in her right eye. To our knowledge, this is the first report of late hypotony maculopathy as a result of inadvertent cannula release. Crown Copyright © 2015. Published by Elsevier Inc. All rights reserved.

  4. APPROACH TO SYNTHESIS OF PASSIVE INFRARED DETECTORS BASED ON QUASI-POINT MODEL OF QUALIFIED INTRUDER

    Directory of Open Access Journals (Sweden)

    I. V. Bilizhenko

    2017-01-01

    Full Text Available Subject of Research. The paper deals with synthesis of passive infra red (PIR detectors with enhanced detection capability of qualified intruder who uses different types of detection countermeasures: the choice of specific movement direction and disguise in infrared band. Methods. We propose an approach based on quasi-point model of qualified intruder. It includes: separation of model priority parameters, formation of partial detection patterns adapted to those parameters and multi channel signal processing. Main Results. Quasi-pointmodel of qualified intruder consisting of different fragments was suggested. Power density difference was used for model parameters estimation. Criteria were formulated for detection pattern parameters choice on the basis of model parameters. Pyroelectric sensor with nine sensitive elements was applied for increasing the signal information content. Multi-channel processing with multiple partial detection patterns was proposed optimized for detection of intruder's specific movement direction. Practical Relevance. Developed functional device diagram can be realized both by hardware and software and is applicable as one of detection channels for dual technology passive infrared and microwave detectors.

  5. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  6. Closure Using a Surgical Closure Device of Inadvertent Subclavian Artery Punctures During Central Venous Catheter Placement

    International Nuclear Information System (INIS)

    Berlet, Matthew H.; Steffen, Diana; Shaughness, George; Hanner, James

    2001-01-01

    Severe complications can and do occur when central venous catheters are inadvertently placed into subclavian arteries. Two cases are discussed that describe how these inadvertent arterial punctures can be closed using the Perclose device (Abbott Laboratories, Redwood City, CA, USA)

  7. Design and Implementation of an Embedded Smart Intruder Surveillance System

    Directory of Open Access Journals (Sweden)

    Sabri Naseer

    2018-01-01

    Full Text Available Remote and scattered valuable and sensitive locations such as labs and offices inside university campus need efficient monitoring and warning system. As well as scattered area and belonging. This research presents a Real-Time intruder Surveillance System based on a single board computer (SBC. Thus the design and development of a cost effective surveillance management system based SBC that can be deployed efficiently in remote and scattered locations such as universities belonging. The fusion of embedded Python codes with SBC that attached to cameras, Long distance sensors, alerting circuitry and wireless module presents a novel integration based effective cost solution and enhances SBC of much flexibility of improvement and development for pervasive remote locations. The system proves the high integrity of smooth working with web application, it’s cost effective and thus can be deployed as many of units to seize and concisely covered remote and scattered area as well as university belonging and departments. The system can be administrated by a remote user sparsely or geographically away from any networked workstation. The proposed solution offers efficient stand alone, flexibility to upgrade and cheap development and installation as well as cost effective ubiquitous surveillance solution. In conclusion, the system acceptable boundaries of successful intruder recognition and warning alert are computed between 1m and 3m distance of intruder from system camera. Recognition rate of 95% and 83% are achieved and the successful warning alert were in the range of 86-97%.

  8. Inadvertent presence of genetically modified elements in maize food ...

    African Journals Online (AJOL)

    Kenya has a biosafety law and has tested genetically modified (GM) maize under confinement and containment, but has neither released nor commercialized any GM crop. This study assessed various maize food products from the Kenyan farms and markets for the inadvertent presence of GMOs. It assessed the possibility ...

  9. Beverage can stay-tabs: still a source for inadvertently ingested foreign bodies in children

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, Lane F. [Cincinnati Children' s Hospital Medical Center, Department of Radiology, MLC 5031, Cincinnati, OH (United States); University of Cincinnati, College of Medicine, Departments of Radiology and Pediatrics, Cincinnati, OH (United States)

    2010-09-15

    In the 1970s in part to avoid inadvertent ingestion, the beverage-can industry changed can construction from pull-tabs to the stay-tabs (remain attached to can after opening) used today. Our purpose is to identify the number of inadvertent ingestions of beverage-can stay-tabs by children recognized at our institution. The medical information system of a children's hospital was searched with key terms to identify cases in which a witnessed or self-reported inadvertent ingestion of a beverage-can stay-tab resulted in a radiograph to rule out presence of a foreign body. Demographics, identification of stay-tab on radiographs, associated abnormalities, and patient management were reviewed. Nineteen cases of stay-tab ingestion were identified over 16 years. Mean age of ingesters was 8.5 years with the majority being teenagers and 15 (79%) >5 years of age. The stay-tab could be seen radiographically only in 4 (21%) cases - all with the stay-tab identified in the stomach. The identification of 19 children who inadvertently ingested beverage-can stay-tabs at a single children's hospital suggests that such ingestions still occur. Radiologists should be aware that stay-tabs are radiographically visible in the minority (21%) of cases. (orig.)

  10. Beverage can stay-tabs: still a source for inadvertently ingested foreign bodies in children

    International Nuclear Information System (INIS)

    Donnelly, Lane F.

    2010-01-01

    In the 1970s in part to avoid inadvertent ingestion, the beverage-can industry changed can construction from pull-tabs to the stay-tabs (remain attached to can after opening) used today. Our purpose is to identify the number of inadvertent ingestions of beverage-can stay-tabs by children recognized at our institution. The medical information system of a children's hospital was searched with key terms to identify cases in which a witnessed or self-reported inadvertent ingestion of a beverage-can stay-tab resulted in a radiograph to rule out presence of a foreign body. Demographics, identification of stay-tab on radiographs, associated abnormalities, and patient management were reviewed. Nineteen cases of stay-tab ingestion were identified over 16 years. Mean age of ingesters was 8.5 years with the majority being teenagers and 15 (79%) >5 years of age. The stay-tab could be seen radiographically only in 4 (21%) cases - all with the stay-tab identified in the stomach. The identification of 19 children who inadvertently ingested beverage-can stay-tabs at a single children's hospital suggests that such ingestions still occur. Radiologists should be aware that stay-tabs are radiographically visible in the minority (21%) of cases. (orig.)

  11. Intruder states, coexistence, and approaches to deformation: The study of 120Xe and the N = 66 isotones

    International Nuclear Information System (INIS)

    Mantica, P.F. Jr.; Zimmerman, B.E.; Ford, C.E.; Walters, W.B.; Rikovska, J.; Stone, N.J.

    1989-01-01

    In this chapter, new results of γ-ray and conversion-electron spectroscopic studies of the structure of 119,121 Te and 126,127 Xe will be reported. These results will be described along with the results of previous studies of intruder structures in the Te and Xe mass region. The observed structures will be contrasted with other intruder structure identified in the Sn, Cd, and Pd isotopes. Results of IBM mixing calculations will be shown for the even-even Te nuclides. The role of intruder structures in the development of nuclear deformation will be discussed. 52 refs., 8 figs., 1 tab

  12. Intruder bands in odd-A {sup 109-115}Sb

    Energy Technology Data Exchange (ETDEWEB)

    Janzen, V P [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; [McMaster Univ., Hamilton, ON (Canada). Dept. of Physics; Andrews, H R; Galindo-Uribarri, A; Radford, D C; Ward, D [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; Omar, A; Mullins, S; Persson, L; Prevost, D; Rodriguez, J; Sawicki, M; Unrau, P; Waddington, J C [McMaster Univ., Hamilton, ON (Canada). Dept. of Physics; Drake, T E; Zwartz, G [Toronto Univ., ON (Canada). Dept. of Physics; Fossan, D B; Lafosse, D R; Hughes, J R; Schnare, H; Timmers, H; Vaska, P [State Univ. of New York, Stony Brook, NY (United States). Dept. of Physics; Haas, B [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; [Strasbourg-1 Univ., 67 (France). Centre de Recherches Nucleaires; Paul, E S; Wilson, J [Liverpool Univ. (United Kingdom). Oliver Lodge Lab.; Pilotte, S [Ottawa Univ., ON (Canada). Dept. of Physics; Wadsworth, R [York Univ. (United Kingdom). Dept. of Physics; Wyss, R [Joint Inst. for Heavy Ion Research, Oak Ridge, TN (United States)

    1992-08-01

    The existence of rotational structures in nuclei bordering on the spherical Z= 50 closed shell has been known for some time. Nevertheless, our understanding of collective effects in this region is remarkably incomplete; for example, before this work little high-spin data existed and there were no lifetime measurements to confirm the collectivity associated with the rotational bands observed in Sb (Z = 51) and Sn (Z = 50) nuclei. Furthermore, the role of the h{sub 11/2} orbital was virtually unknown, although it has the highest angular momentum of the orbitals in this mass region and therefore is expected to have the most influence on the properties of high-spin states. In the A {approx} 130 and A {approx} 180 mass regions, where highly deformed intruder bands have been observed, it is the neutron i{sub 13/2} orbitals, respectively, which are preferentially lowered in energy by a combination of large deformation and fast rotation In lighter nuclei the h{sub 11/2} orbital is expected to appear as an intruder configuration. (author). 11 refs., 1 tab., 4 figs.

  13. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2002-09-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  14. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  15. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2002-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  16. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2003-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  17. Optimal Randomized Surveillance Patterns to Detect Intruders Approaching a Military Installation

    National Research Council Canada - National Science Library

    McLemore, Trevor D

    2007-01-01

    .... The intruder attempts to penetrate the military installation by choosing one of its many entry points, each of which is monitored by a surveillance camera and may require a different amount of time to transit...

  18. Inadvertent intrathecal injection of labetalol in a patient undergoing post-partum tubal ligation.

    Science.gov (United States)

    Balestrieri, P J; Hamza, M S; Ting, P H; Blank, R S; Grubb, C T

    2005-10-01

    After receiving a continuous spinal anesthetic for labor following an inadvertent dural puncture with a 17-gauge epidural needle, a morbidly obese parturient underwent post-partum tubal ligation 12 h after vaginal delivery. The patient received a total of 2 mL of 0.75% hyperbaric bupivacaine for the surgery. In response to moderate hypertension the patient received intravenous labetalol hydrochloride 20 mg. She subsequently was inadvertently administered approximately 15 mg of labetalol through the spinal catheter. The spinal catheter was removed immediately after the procedure. She suffered no apparent adverse neurologic effects.

  19. An i{sub 13/2} neutron intruder band in {sup 141}Gd

    Energy Technology Data Exchange (ETDEWEB)

    Mullins, S M; Omar, A; Persson, L; Prevost, D; Waddington, J C [McMaster Univ., Hamilton, ON (Canada); Andrews, H R; Ball, G C; Galindo-Uribarri, A; Janzen, V P; Radford, D C; Ward, D [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; Drake, T E [Toronto Univ., ON (Canada). Dept. of Physics; Fossan, D B; Lafosse, D; Vaska, P; Waring, M [State Univ. of New York, Stony Brook, NY (United States). Dept. of Physics; Wadsworth, R [York Univ. (United Kingdom). Dept. of Physics

    1992-08-01

    The nucleus {sup 141}Gd has been investigated at high spins for the first time following the reactions {sup 112}Sn({sup 32}S,2pn){sup 141}Gd at 155 MeV and {sup 112}Sn({sup 33}S,2p2n){sup 141}Gd at 170 MeV. The methods of in-beam {gamma}-ray spectroscopy were used to establish a number of different structures, including a band which has been assigned as being based on the {nu}i{sub 13/2}[660]1/2{sup +} Nilsson intruder orbital. This is the heaviest nucleus thus far in which this type of intruder band has been identified. (author). 11 refs., 3 figs.

  20. Late-Onset Inadvertent Bleb Formation following Pars Plana M3 Molteno Implant Tube Obstruction

    Directory of Open Access Journals (Sweden)

    Anmar M. Abdul-Rahman

    2017-01-01

    Full Text Available Purpose: To report a case of inadvertent bleb formation presenting 18 months after pars plana M3 Molteno implant tube obstruction in a patient with mixed mechanism glaucoma. Materials and Methods: An 84-year-old Caucasian male with mixed mechanism glaucoma underwent slit-lamp examination, gonioscopy, colour anterior segment photography and anterior segment optical coherence tomography (AS-OCT. Results: An inadvertent bleb developed 18 months after pars plana implant tube re-positioning with a 6/0 Vicryl tie ligature. The bleb was located in the area anterior to the implant plate; it was characterised by a thin, transparent, avascular and multi-cystic wall, with a visible stoma at the posterior edge of the bleb. The bleb was functioning as demonstrated by an intraocular pressure of 6 mm Hg at presentation and a punctate fluorescein uptake pattern of the bleb wall. The bleb over the plate of the Molteno implant was non-functioning, likely secondary to tube obstruction by vitreous in the early postoperative period. AS-OCT showed a tract from the anterior chamber commencing at an entry wound through a corneal tunnel to the posterior stoma at the base of the inadvertent bleb. Conclusions: We hypothesise that the pathophysiologic factors resulting in an inadvertent bleb are a result of a combination of apoptosis, late-onset wound dehiscence and internal gaping of a centrally placed corneal wound. In addition, aqueous hydrodynamic factors may play a role.

  1. Restoration of an intruded maxillary central incisor with a uniquely designed dowel and core restoration: a case report.

    Science.gov (United States)

    Polat, Zelal Seyfioğlu; Tacir, Ibrahim Halil

    2007-01-01

    This article describes the restoration of an intruded root using a custom-made metal dowel and metal-ceramic veneer core restoration. The treatment plan for this patient consisted of restoring the missing esthetics and eliminating psychological trauma by utilizing the root of the intruded maxillary left central incisor to replace both missing central incisor crowns. This treatment will preserve space and bone until the patient is old enough for another prosthodontic restoration to be considered. As the lost fragments were not recovered, we considered this restoration of the intruded root to be the best therapeutic option, considering the effect on the patient's psyche. The patient was satisfied with the final result.

  2. Automated electronic intruder simulator for evaluation of odd frequency microwave detectors

    International Nuclear Information System (INIS)

    1979-01-01

    A microwave intruder simulator for testing motion detection sensors is described. This simulator can be used to evaluate a variety of microwave sensors regardless of the value of the center frequency of the signal utilized. Representative curves from the evaluation of one microwave sensor are also presented

  3. Expert judgement on inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Hora, S.C.; von Winterfeldt, D.; Trauth, K.M.

    1991-12-01

    Four expert-judgment teams have developed analyses delineating possible future societies in the next 10,000 years in the vicinity of the Waste Isolation Pilot Plant (WIPP). Expert-judgment analysis was used to address the question of future societies because neither experimentation, observation, nor modeling can resolve such uncertainties. Each of the four, four-member teams, comprised of individuals with expertise in the physical, social, or political sciences, developed detailed qualitative assessments of possible future societies. These assessments include detailed discussions of the underlying physical and societal factors that would influence society and the likely modes of human-intrusion at the WIPP, as well as the probabilities of intrusion. Technological development, population growth, economic development, conservation of information, persistence of government control, and mitigation of danger from nuclear waste were the factors the teams believed to be most important. Likely modes of human-intrusion were categorized as excavation, disposal/storage, tunneling, drilling, and offsite activities. Each team also developed quantitative assessments by providing probabilities of various alternative futures, of inadvertent human intrusion, and in some cases, of particular modes of intrusion. The information created throughout this study will be used in conjunction with other types of information, including experimental data, calculations from physical principles and computer models, and perhaps other judgments, as input to ''performance assessment.'' The more qualitative results of this study will be used as input to another expert panel considering markers to deter inadvertent human intrusion at the WIPP

  4. Sexual aggression by intruders in hooded crow Corvus cornix

    OpenAIRE

    Zduniak, Piotr; Kosicki, Jakub Z.; Yosef, Reuven

    2015-01-01

    The hooded crow Corvus cornix is a west Palaearctic, solitary nesting, monogamous corvid. In the breeding season, populations are characterized by a social organization wherein breeding pairs are territorial and non-breeding individuals, called floaters, live in flocks. During a study of the breeding ecology of the hooded crow, conducted in a protected flooded area, we monitored nests with video cameras. We recorded two separate incidents when intruders attacked a female at the nest. We belie...

  5. Analysis of inadvertent safety injection incident at Kori unit 3 on september 6, 1990

    International Nuclear Information System (INIS)

    Kim, Kyun Tae; Chung, Bub Dong; Kim, In Goo; Kim, Hho Jung

    1992-01-01

    The inadvertent safety injection incident occurred at Kori Unit 3 on September 6, 1990 is analyzed using RELAP5/MOD3 code. The event was initiated by a failure of main feedwater control valve in one of three steam generators. The actual sequence of plant transient with the proper estimations of the operator actions is investigated in the present calculation. The calculational results are compared with the plant transient data. It is shown that the results of the plant behaviors are in good agreement with the plant data. The emergency response guidelines is assessed for the time of the SI termination and the establishment of natural circulation. The changes in the time of the SI termination do not significantly affect the overall plant behaviors, and the natural circulation is established

  6. Identification of low-lying proton-based intruder states in 189-193Pb

    International Nuclear Information System (INIS)

    Vel, K. van de; Andreyev, A.N.; Huyse, M.; Duppen, P. van; Cocks, J.F.C.; Dorvaux, O.; Greenlees, P.T.; Helariutta, K.; Jones, P.; Julin, R.; Juutinen, S.; Kettunen, H.; Kuusiniemi, P.; Leino, M.; Muikku, M.; Nieminen, P.; Eskola, K.; Wyss, R.

    2002-01-01

    Low-lying proton-based intruder states have been observed in the odd-mass isotopes 189,191,193 Pb in experiments at the RITU gas-filled recoil separator. The identification has been performed by observing the fine structure in the α decay of the parent 193,195,197 Po nuclei in prompt coincidence with conversion electrons and γ rays in the daughter lead isotopes. Along with the literature data these results establish a systematics of intruder states in the odd-mass lead isotopes from 197 Pb down to 185 Pb. Interpretation of these states involves the coupling of the 1i 13/2 or 3p 3/2 odd neutron to the 0 + state in the oblate minimum in the even-mass lead core. Conversion coefficients have been determined for some of the transitions, revealing mixing between the coexisting states. The experimental results are compared to potential energy surface calculations

  7. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Science.gov (United States)

    Sequeira, Ana F.; Cardoso, Jaime S.

    2015-01-01

    Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system. PMID:26102491

  8. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Directory of Open Access Journals (Sweden)

    Ana F. Sequeira

    2015-06-01

    Full Text Available Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.

  9. Intruder states in the cadmium isotopes and a simple schematic calculation

    International Nuclear Information System (INIS)

    Aprahamian, A.; Brenner, D.S.; Casten, R.F.; Heyde, K.

    1984-01-01

    Angular correlation studies of 118 120 Cd at TRISTAN have allowed the discovery and identification in each nucleus of two new 0 + states and their respective E2 decay properties. The results have been interpreted in terms of a simple schematic model based on the mixing of normal vibration-like and intruder rotation-like 2p-4h configurations

  10. Anabolic agents: recent strategies for their detection and protection from inadvertent doping

    Science.gov (United States)

    Geyer, Hans; Schänzer, Wilhelm; Thevis, Mario

    2014-01-01

    According to the World Anti-Doping Agency (WADA) Prohibited List, anabolic agents consist of exogenous anabolic androgenic steroids (AAS), endogenous AAS and other anabolic agents such as clenbuterol and selective androgen receptor modulators (SARMs). Currently employed strategies for their improved detection include the prolongation of the detection windows for exogenous AAS, non-targeted and indirect analytical approaches for the detection of modified steroids (designer steroids), the athlete’s biological passport and isotope ratio mass spectrometry for the detection of the misuse of endogenous AAS, as well as preventive doping research for the detection of SARMs. The recent use of these strategies led to 4–80-fold increases of adverse analytical findings for exogenous AAS, to the detection of the misuse of new designer steroids, to adverse analytical findings of different endogenous AAS and to the first adverse analytical findings of SARMs. The strategies of the antidoping research are not only focused on the development of methods to catch the cheating athlete but also to protect the clean athlete from inadvertent doping. Within the past few years several sources of inadvertent doping with anabolic agents have been identified. Among these are nutritional supplements adulterated with AAS, meat products contaminated with clenbuterol, mycotoxin (zearalenone) contamination leading to zeranol findings, and natural products containing endogenous AAS. The protection strategy consists of further investigations in case of reasonable suspicion of inadvertent doping, publication of the results, education of athletes and development of methods to differentiate between intentional and unintentional doping. PMID:24632537

  11. Attention and Facilitation: Converging Information Versus Inadvertent Reading in Stroop Task Performance

    NARCIS (Netherlands)

    Roelofs, A.P.A.

    2010-01-01

    Disagreement exists about whether color-word Stroop facilitation is caused by converging information (e.g.. Cohen et al.. 1990: Roelofs, 2003) or inadvertent reading (MacLeod & MacDonald, 2000). Four experiments tested between these hypotheses by examining Stroop effects oil response time (RT) both

  12. Effect of intruder mass on collisions with hard binaries. II - Dependence on impact parameter and computations of the interaction cross sections

    Science.gov (United States)

    Hills, J. G.

    1992-06-01

    Over 125,000 encounters between a hard binary with equal mass, components and orbital eccentricity of 0, and intruders with solar masses ranging from 0.01 to 10,000 are simulated. Each encounter was followed up to a maximum of 5 x 10 exp 6 integration steps to allow long-term 'resonances', temporary trinary systems, to break into a binary and a single star. These simulations were done over a range of impact parameters to find the cross sections for various processes occurring in these encounters. A critical impact parameter found in these simulations is the one beyond which no exchange collisions can occur. The energy exchange between the binary and a massive intruder decreases greatly in collisions with Rmin of not less than Rc. The semimajor axes and orbital eccentricity of the surviving binary also drops rapidly at Rc in encounters with massive intruders. The formation of temporary trinary systems is important for all intruder masses.

  13. Consolidation of a WSN and Minimax method to rapidly neutralise intruders in strategic installations.

    Science.gov (United States)

    Conesa-Muñoz, Jesus; Ribeiro, Angela

    2012-01-01

    Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN). The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders' behaviour is inferred through sequences of sensors' activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final state of the intruders

  14. Resident intruder paradigm-induced aggression relieves depressive-like behaviors in male rats subjected to chronic mild stress

    Science.gov (United States)

    Wei, Sheng; Ji, Xiao-wei; Wu, Chun-ling; Li, Zi-fa; Sun, Peng; Wang, Jie-qiong; Zhao, Qi-tao; Gao, Jie; Guo, Ying-hui; Sun, Shi-guang; Qiao, Ming-qi

    2014-01-01

    Background Accumulating epidemiological evidence shows that life event stressors are major vulnerability factors for psychiatric diseases such as major depression. It is also well known that the resident intruder paradigm (RIP) results in aggressive behavior in male rats. However, it is not known how resident intruder paradigm-induced aggression affects depressive-like behavior in isolated male rats subjected to chronic mild stress (CMS), which is an animal model of depression. Material/Methods Male Wistar rats were divided into 3 groups: non-stressed controls, isolated rats subjected to the CMS protocol, and resident intruder paradigm-exposed rats subjected to the CMS protocol. Results In the sucrose intake test, ingestion of a 1% sucrose solution by rats in the CMS group was significantly lower than in control and CMS+RIP rats after 3 weeks of stress. In the open-field test, CMS rats had significantly lower open-field scores compared to control rats. Furthermore, the total scores given the CMS group were significantly lower than in the CMS+RIP rats. In the forced swimming test (FST), the immobility times of CMS rats were significantly longer than those of the control or CMS+RIP rats. However, no differences were observed between controls and CMS+RIP rats. Conclusions Our data show that aggressive behavior evoked by the resident intruder paradigm could relieve broad-spectrum depressive-like behaviors in isolated adult male rats subjected to CMS. PMID:24911067

  15. Oblate deformation and intruder configuration in 194,195Bi

    International Nuclear Information System (INIS)

    Mukherjee, G.; Banerjee, K.; Banerjee, S.R.; Basu, S.K.; Bhattacharya, C.; Bhattacharya, S.; Bhattacharya, Srijit; Bhattacharjee, T.; Chanda, S.; Dey, A.; Gupta, D.; Meena, J.K.; Mukhopadhyay, S.; Rana, T.K.; Bhattacharya, Sudeb; Ganguly, S.; Goswami, A.; Kshetri, R.; Pradhan, M.K.; Raut, R.; Dey, G.

    2006-01-01

    The experimental information on 194,195 Bi are very scarce compared to its neighbouring isotopes. Only 6 levels above the ground state band of 195 Bi, based on 9/2, are known with tentative spin parity assignments. Only two low energy gamma rays above the 10 isomeric state are known in 194 Bi. It is interesting not only to extend the presently known bands to higher spins, beyond band crossing but also to search for the intruder quasiparticle configurations to get a clear idea about the structure of these nuclei

  16. The resident-intruder paradigm : a standardized test for aggression, violence and social stress

    NARCIS (Netherlands)

    Koolhaas, Jacob; Coppens, Caroline M.; de Boer, Sietse F.; Buwalda, Bauke; Meerlo, Peter; Timmermans, Paul J. A.

    2013-01-01

    This video publication explains in detail the experimental protocol of the resident-intruder paradigm in rats. This test is a standardized method to measure offensive aggression and defensive behavior in a semi natural setting. The most important behavioral elements performed by the resident and the

  17. Attention and Facilitation: Converging Information versus Inadvertent Reading in Stroop Task Performance

    Science.gov (United States)

    Roelofs, Ardi

    2010-01-01

    Disagreement exists about whether color-word Stroop facilitation is caused by converging information (e.g., Cohen et al., 1990; Roelofs, 2003) or inadvertent reading (MacLeod & MacDonald, 2000). Four experiments tested between these hypotheses by examining Stroop effects on response time (RT) both within and between languages. Words cannot be…

  18. Measuring virgin female aggression in the female intruder test (FIT): effects of oxytocin, estrous cycle, and anxiety.

    Science.gov (United States)

    de Jong, Trynke R; Beiderbeck, Daniela I; Neumann, Inga D

    2014-01-01

    The costs of violence and aggression in our society have stimulated the scientific search for the predictors and causes of aggression. The majority of studies have focused on males, which are considered to be more aggressive than females in most species. However, rates of offensive behavior in girls and young women are considerable and are currently rising in Western society. The extrapolation of scientific results from males to young, non-maternal females is a priori limited, based on the profound sex differences in brain areas and functioning of neurotransmitters involved in aggression. Therefore, we established a paradigm to assess aggressive behavior in young virgin female rats, i.e. the female intruder test (FIT). We found that approximately 40% of un-manipulated adult (10-11 weeks old) female Wistar rats attack an intruder female during the FIT, independent of their estrous phase or that of their intruder. In addition, adolescent (7-8 weeks old) female rats selected for high anxiety behavior (HABs) displayed significantly more aggression than non-selected (NAB) or low-anxiety (LAB) rats. Intracerebroventricular infusion of oxytocin (OXT, 0.1 µg/5 µl) inhibited aggressive behavior in adult NAB and LAB, but not HAB females. Adolescent NAB rats that had been aggressive towards their intruder showed increased pERK immunoreactivity (IR) in the hypothalamic attack area and reduced pERK-IR in OXT neurons in the paraventricular hypothalamic nucleus compared to non-aggressive NAB rats. Taken together, aggressive behavior in young virgin female rats is partly dependent on trait anxiety, and appears to be under considerable OXT control.

  19. Measuring virgin female aggression in the female intruder test (FIT: effects of oxytocin, estrous cycle, and anxiety.

    Directory of Open Access Journals (Sweden)

    Trynke R de Jong

    Full Text Available The costs of violence and aggression in our society have stimulated the scientific search for the predictors and causes of aggression. The majority of studies have focused on males, which are considered to be more aggressive than females in most species. However, rates of offensive behavior in girls and young women are considerable and are currently rising in Western society. The extrapolation of scientific results from males to young, non-maternal females is a priori limited, based on the profound sex differences in brain areas and functioning of neurotransmitters involved in aggression. Therefore, we established a paradigm to assess aggressive behavior in young virgin female rats, i.e. the female intruder test (FIT. We found that approximately 40% of un-manipulated adult (10-11 weeks old female Wistar rats attack an intruder female during the FIT, independent of their estrous phase or that of their intruder. In addition, adolescent (7-8 weeks old female rats selected for high anxiety behavior (HABs displayed significantly more aggression than non-selected (NAB or low-anxiety (LAB rats. Intracerebroventricular infusion of oxytocin (OXT, 0.1 µg/5 µl inhibited aggressive behavior in adult NAB and LAB, but not HAB females. Adolescent NAB rats that had been aggressive towards their intruder showed increased pERK immunoreactivity (IR in the hypothalamic attack area and reduced pERK-IR in OXT neurons in the paraventricular hypothalamic nucleus compared to non-aggressive NAB rats. Taken together, aggressive behavior in young virgin female rats is partly dependent on trait anxiety, and appears to be under considerable OXT control.

  20. Inadvertent raising of levels in the FFTF primary sodium pumps. Final unusual occurrence report, HEDL 79-34 (FFTF-58)

    International Nuclear Information System (INIS)

    Kuechle, J.D.

    1981-01-01

    The final unusual occurrence report describes the inadvertent raising of the sodium level in the FFTF primary sodium pumps during system testing. This event is now judged to have caused permanent deformation of the primary pump shaft on loop 1 during a period when pump rotation was stopped and sodium level in the pump tank was inadvertently increased. The shaft was subsequently removed, straightened, and returned to service in the spare FFTF pump

  1. The uptake of radionuclides from inadvertent consumption of soil by grazing animals

    International Nuclear Information System (INIS)

    Green, N.; Dodd, N.J.

    1988-01-01

    Investigations of the transfer to man of artificially-produced radionuclides through food chains have shown that the inadvertent consumption of soil by grazing animals can give variations in estimates of transfer coefficients, especially for radionuclides that are poorly absorbed by plant roots. Even small masses of soil adhering to herbage or directly ingested can make a significant contribution to the intake inventory in terms of activity. Although the activity concentrations of soil-contaminated herbage are elevated, the radionuclides associated with the soil may not necessarily be in a form which is easily absorbed by the animal. Attempts must be made, therefore, to quantify soil intake and the subsequent radionuclide uptake by this mechanism. A field investigation of the uptake of radionuclides by farm animals grazing near the Sellafield nuclear reprocessing plant has been pursued. The aims of the study were to estimate the transfer to muscle and other tissues. This paper describes the methods used to estimate both the soil intake and the consequent availability of radionuclides associated with the soil. The measurements were used to evaluate the contribution to tissue content of inadvertent consumption of soil by cows and sheep. 10 refs.; 2 tabs

  2. Study of intruder band in 112Sn

    International Nuclear Information System (INIS)

    Ganguly, S.; Banerjee, P.; Ray, I.; Kshetri, R.; Raut, R.; Bhattacharya, S.; Saha-Sarkar, M.; Goswami, A.; Mukhopadhyay, S.; Mukherjee, A.; Mukherjee, G.; Basu, S.K.

    2007-01-01

    Excited states of the positive-parity intruder band in 112 Sn, populated in the 100 Mo( 20 Ne,α4n) reaction at a beam energy of 136 MeV, have been studied. The band has been observed up to 11570.0 keV with spin (24 + ). Mean lifetimes have been measured for six states up to the 22 + , 10335.1 keV level and an upper limit of the lifetime has been estimated for the 11570.0 keV (24 + ) state. The B(E2) values, derived from the present lifetime results, correspond to a moderate quadrupole deformation of β 2 ∼0.18 for states with spin J π >=12 + , and the decrease in B(E2) for the 14 + ->12 + transition is consistent with a ν(h 11/2 ) 2 alignment at ω∼0.35 MeV, predicted by a cranked shell-model calculation. Total Routhian surface calculations predict a triaxial shape following the alignment

  3. Machine learning approach to detect intruders in database based on hexplet data structure

    Directory of Open Access Journals (Sweden)

    Saad M. Darwish

    2016-09-01

    Full Text Available Most of valuable information resources for any organization are stored in the database; it is a serious subject to protect this information against intruders. However, conventional security mechanisms are not designed to detect anomalous actions of database users. An intrusion detection system (IDS, delivers an extra layer of security that cannot be guaranteed by built-in security tools, is the ideal solution to defend databases from intruders. This paper suggests an anomaly detection approach that summarizes the raw transactional SQL queries into a compact data structure called hexplet, which can model normal database access behavior (abstract the user's profile and recognize impostors specifically tailored for role-based access control (RBAC database system. This hexplet lets us to preserve the correlation among SQL statements in the same transaction by exploiting the information in the transaction-log entry with the aim to improve detection accuracy specially those inside the organization and behave strange behavior. The model utilizes naive Bayes classifier (NBC as the simplest supervised learning technique for creating profiles and evaluating the legitimacy of a transaction. Experimental results show the performance of the proposed model in the term of detection rate.

  4. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: the ONSITE/MAXI1 computer program. Supplement No. 1

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.; Neuder, S.M.

    1986-05-01

    The document entitled Intruder Dose Pathway Analysis of the Onsite Disposal of Radioactive Wastes: The ONSITE/MAXI1 Computer Program (1984) summarizes initial efforts to develop human-intrustion scenarios and a modified version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. This document is a supplement to that document and summarizes efforts to further modify and improve the ONSITE/MAXI1 software package. To facilitate cross-referencing, it follows the same format. Notable improvements to the software package include the capability to account for shielding conditions that represent noncompacted trash wastes and the option to indicate alternative land-use condition;s. This supplement contains a description of the implementation of these modifications. In addition, a series of discussions are included in an attempt to increase the user's understanding of the scenarios and dose calculation methods. These discussions respond to frequently asked questions about the mathematical models and use of the software. Computer listings of the ONSITE/MAXI1 computer program are included as Appendices A and B of this document. Appendix C lists external exposure dose-rate factor libraries

  5. Sexual aggression by intruders in hooded crow Corvus cornix.

    Science.gov (United States)

    Zduniak, Piotr; Kosicki, Jakub Z; Yosef, Reuven

    The hooded crow Corvus cornix is a west Palaearctic, solitary nesting, monogamous corvid. In the breeding season, populations are characterized by a social organization wherein breeding pairs are territorial and non-breeding individuals, called floaters, live in flocks. During a study of the breeding ecology of the hooded crow, conducted in a protected flooded area, we monitored nests with video cameras. We recorded two separate incidents when intruders attacked a female at the nest. We believe that she remained in the nest in order to prevent the strangers cannibalizing the nestlings by mantling over the brood. The spatio-temporal occurrence of these attacks suggests that the observed behaviour is intraspecific sexual aggression wherein non-breeding males mounted an immobilized female.

  6. Inadvertent Splenectomy During Resection for Colorectal Cancer Does Not Increase Long-term Mortality in a Propensity Score Model: A Nationwide Cohort Study.

    Science.gov (United States)

    Lolle, Ida; Pommergaard, Hans-Christian; Schefte, David F; Bulut, Orhan; Krarup, Peter-Martin; Rosenstock, Steffen J

    2016-12-01

    Previous studies suggest that long-term mortality is increased in patients who undergo splenectomy during surgery for colorectal cancer. The reason for this association remains unclear. The purpose of this study was to investigate the association between inadvertent splenectomy attributed to iatrogenic lesion to the spleen during colorectal cancer resections and long-term mortality in a national cohort of unselected patients. This was a retrospective, nationwide cohort study. Data were collected from the database of the Danish Colorectal Cancer Group and merged with data from the National Patient Registry and the National Pathology Databank. Danish patients with colorectal cancer undergoing curatively intended resection between 2001 and 2011 were included in the study. The primary outcome was long-term mortality for patients surviving 30 days after surgery. Secondary outcomes were 30-day mortality and risk factors for inadvertent splenectomy. Multivariable and propensity-score matched Cox regression analyses were used to adjust for potential confounding. In total, 23,727 patients were included, of which 277 (1.2%) underwent inadvertent splenectomy. There was no association between inadvertent splenectomy and long-term mortality (adjusted HR = 1.15 (95% CI, 0.95-1.40); p = 0.16) in the propensity score-matched model, whereas 30-day mortality was significantly increased (adjusted HR = 2.31 (95% CI, 1.71-3.11); p splenectomy was most often seen during left hemicolectomy (left hemicolectomy vs right hemicolectomy: OR = 24.76 (95% CI, 15.30-40.06); p splenectomy during resection for colorectal cancer does not seem to increase long-term mortality. The previously reported reduced overall survival after inadvertent splenectomy may be explained by excess mortality in the immediate postoperative period.

  7. A study of the management of 55 traumatically intruded permanent incisor teeth in children.

    LENUS (Irish Health Repository)

    Stewart, C

    2009-01-01

    These were to examine the main presenting, treatment and outcome factors for intruded permanent incisors in children, the effect of apical development and degree of intrusion on decisions on repositioning, the effect of apical development status on the maintenance of pulp vitality and the time of pulp extirpation and to compare the decisions made to the advice given in existing clinical guidelines.

  8. Interventions for treating inadvertent postoperative hypothermia.

    Science.gov (United States)

    Warttig, Sheryl; Alderson, Phil; Campbell, Gillian; Smith, Andrew F

    2014-11-20

    Inadvertent postoperative hypothermia (a drop in core body temperature to below 36°C) occurs as an effect of surgery when anaesthetic drugs and exposure of the skin for long periods of time during surgery result in interference with normal temperature regulation. Once hypothermia has occurred, it is important that patients are rewarmed promptly to minimise potential complications. Several different interventions are available for rewarming patients. To estimate the effectiveness of treating inadvertent perioperative hypothermia through postoperative interventions to decrease heat loss and apply passive and active warming systems in adult patients who have undergone surgery. We searched the Cochrane Central Register of Controlled Trials (CENTRAL) (2014, Issue 2), MEDLINE (Ovid SP) (1956 to 21 February 2014), EMBASE (Ovid SP) (1982 to 21 February 2014), the Institute for Scientific Information (ISI) Web of Science (1950 to 21 February 2014) and the Cumulative Index to Nursing and Allied Health Literature (CINAHL), EBSCO host (1980 to 21 February 2014), as well as reference lists of articles. We also searched www.controlled-trials.com and www.clincialtrials.gov. Randomized controlled trials of postoperative warming interventions aiming to reverse hypothermia compared with control or with each other. Three review authors identified studies for inclusion in this review. One review author extracted data and completed risk of bias assessments; two review authors checked the details. Meta-analysis was conducted when appropriate by using standard methodological procedures as expected by The Cochrane Collaboration. We included 11 trials with 699 participants. Ten trials provided data for analysis. Trials varied in the numbers and types of participants included and in the types of surgery performed. Most trials were at high or unclear risk of bias because of inappropriate or unclear randomization procedures, and because blinding of assessors and participants generally was

  9. Consolidation of a WSN and Minimax Method to Rapidly Neutralise Intruders in Strategic Installations

    Directory of Open Access Journals (Sweden)

    Angela Ribeiro

    2012-03-01

    Full Text Available Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN. The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders’ behaviour is inferred through sequences of sensors’ activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final

  10. Intruders: New Neighbors in "Dawn of the Planet of the Apes" and "The Hundred-Foot Journey"

    Science.gov (United States)

    Beck, Bernard

    2015-01-01

    Conflicts over territory are about the power to establish dominant cultures in territories and are often accompanied by cultural claims to legitimacy by each side. The cultural claims, or ideologies, are often expressed in terms of "homeland" dwellers versus "intruders." Two recent movies, "Dawn of the Planet of the…

  11. Simultaneous spectroscopy of $\\gamma$- rays and conversion electrons: Systematic study of EO transitions and intruder states in close vicinity of mid-shell point in odd-Au isotopes

    CERN Multimedia

    Venhart, M; Grant, A F; Petrik, K

    This proposal focuses on detailed systematic studies of the $\\beta$ /EC-decays of $^{179,181,183,185}$Hg leading to excited states in the neutron-deficient Au isotopes in the vicinity of the N=104 midshell. $\\gamma$-ray, X-ray and conversion electron de-excitations of odd-A Au isotopes will be studied simultaneously. These studies will address important structural questions such as the excitation energies of coexisting states, properties of multiple intruder states (i.e. intruder particles coupled to intruder cores) and mixing of coexisting structures. The unique combination of Hg beam purity and yields make ISOLDE a unique facility for these experiments.

  12. Radionuclide migration pathways analysis for the Oak Ridge Central Waste Disposal Facility on the West Chestnut Ridge site

    International Nuclear Information System (INIS)

    Pin, F.G.; Witherspoon, J.P.; Lee, D.W.; Cannon, J.B.; Ketelle, R.H.

    1984-10-01

    A dose-to-man pathways analysis is performed for disposal of low-level radioactive waste at the Central Waste Disposal Facility on the West Chestnut Ridge Site. Both shallow land burial (trench) and aboveground (tumulus) disposal methods are considered. The waste volumes, characteristics, and radionuclide concentrations are those of waste streams anticipated from the Oak Ridge National Laboratory, the Y-12 Plant, and the Oak Ridge Gaseous Diffusion Plant. The site capacity for the waste streams is determined on the basis of the pathways analysis. The exposure pathways examined include (1) migration and transport of leachate from the waste disposal units to the Clinch River (via the groundwater medium for trench disposal and Ish Creek for tumulus disposal) and (2) those potentially associated with inadvertent intrusion following a 100-year period of institutional control: an individual resides on the site, inhales suspended particles of contaminated dust, ingests vegetables grown on the plot, consumes contaminated water from either an on-site well or from a nearby surface stream, and receives direct exposure from the contaminated soil. It is found that either disposal method would provide effective containment and isolation for the anticipated waste inventory. However, the proposed trench disposal method would provide more effective containment than tumuli because of sorption of some radionuclides in the soil. Persons outside the site boundary would receive radiation doses well below regulatory limits if they were to ingest water from the Clinch River. An inadvertent intruder could receive doses that approach regulatory limits; however, the likelihood of such intrusions and subsequent exposures is remote. 33 references, 31 figures, 28 tables

  13. A common-sense probabilistic approach to assessing inadvertent human intrusion into low-level radioactive waste at the Nevada Test Site

    International Nuclear Information System (INIS)

    Black, P.; Hooten, M.; Black, K.; Moore, B.; Rawlinson, S.; Barker, L.

    1997-01-01

    Each site disposing of low-level radioactive waste is required to prepare and maintain a site-specific performance assessment (1) to determine potential risks posed by waste management systems to the public, and the environment, and (2) to compare these risks to established performance objectives. The DOE Nevada Operations Office, Waste Management Program recently completed a one-year study of site-specific scenarios for inadvertent human intrusion by drilling into buried low-level radioactive waste sites, as part of ongoing performance assessment studies. Intrusion scenarios focus on possible penetration of buried waste through drilling for sources of groundwater. The probability of drilling penetration into waste was judged to be driven primarily by two settlement scenarios: (1) scattered individual homesteaders, and (2) a community scenario consisting of a cluster of settlers that share drilling and distribution systems for groundwater. Management control factors include institutional control, site knowledge, placards and markers, surface barriers, and subsurface barriers. The Subject Matter Experts concluded that institutional control and site knowledge may be important factors for the first few centuries, but are not significant over the evaluation period of 10,000 years. Surface barriers can be designed that would deter the siting of a drill rig over the waste site to an effectiveness of 95%. Subsurface barriers and placards and markers will not as effectively prevent inadvertent human intrusion. Homestead and community scenarios were considered by the panel to render a site-specific probability of around 10% for inadvertent human intrusion. If management controls are designed and implemented effectively, then the probability of inadvertent human intrusion can be reduced to less than 1%

  14. E AREA LOW LEVEL WASTE FACILITY DOE 435.1 PERFORMANCE ASSESSMENT

    Energy Technology Data Exchange (ETDEWEB)

    Wilhite, E

    2008-03-31

    , situated immediately north of the Mixed Waste Management Facility. The E-Area Low-Level Waste Facility is comprised of 200 acres for waste disposal and a surrounding buffer zone that extends out to the 100-m point of compliance. Disposal units within the footprint of the low-level waste facilities include the Slit Trenches, Engineered Trenches, Component-in-Grout Trenches, the Low-Activity Waste Vault, the Intermediate-Level Vault, and the Naval Reactor Component Disposal Area. Radiological waste disposal operations at the E-Area Low-Level Waste Facility began in 1994. E-Area Low-Level Waste Facility closure will be conducted in three phases: operational closure, interim closure, and final closure. Operational closure will be conducted during the 25-year operation period (30-year period for Slit and Engineered Trenches) as disposal units are filled; interim closure measures will be taken for some units. Interim closure will take place following the end of operations and will consist of an area-wide runoff cover along with additional grading over the trench units. Final closure of all disposal units in the E-Area Low-Level Waste Facility will take place at the end of the 100-year institutional control period and will consist of the installation of an integrated closure system designed to minimize moisture contact with the waste and to serve as a deterrent to intruders. Radiological dose to human receptors is analyzed in this PA in the all-pathways analysis, the inadvertent intruder analysis and the air pathway analysis, and the results are compared to the relevant performance measures. For the all-pathways analysis, the performance measure of relevance is a 25-mrem/yr EDE to representative members of the public, excluding dose from radon and its progeny in air. For the inadvertent intruder, the applicable performance measures are 100-mrem/yr EDE and 500 mrem/yr EDE for chronic and exposure scenarios, respectively. The relevant performance measure for the air pathway is 10

  15. Inadvertent Splenectomy During Resection for Colorectal Cancer Does Not Increase Long-term Mortality in a Propensity Score Model

    DEFF Research Database (Denmark)

    Lolle, Ida; Pommergaard, Hans-Christian; Schefte, David F

    2016-01-01

    BACKGROUND: Previous studies suggest that long-term mortality is increased in patients who undergo splenectomy during surgery for colorectal cancer. The reason for this association remains unclear. OBJECTIVE: The purpose of this study was to investigate the association between inadvertent...... splenectomy attributed to iatrogenic lesion to the spleen during colorectal cancer resections and long-term mortality in a national cohort of unselected patients. DESIGN: This was a retrospective, nationwide cohort study. SETTINGS: Data were collected from the database of the Danish Colorectal Cancer Group...... for patients surviving 30 days after surgery. Secondary outcomes were 30-day mortality and risk factors for inadvertent splenectomy. Multivariable and propensity-score matched Cox regression analyses were used to adjust for potential confounding. RESULTS: In total, 23,727 patients were included, of which 277...

  16. Fully automated radiochemical preparation system for gamma-spectroscopy on fission products and the study of the intruder and vibrational levels in 83Se

    International Nuclear Information System (INIS)

    Lien, O.G. III.

    1983-10-01

    AUTOBATCH was developed to provide a usable source of short-lived neutron-rich nuclides through chemical preparation of the sample from fission products for detailed gamma-ray spectroscopy, which would complement the output of on-line isotope separators. With AUTOBATCH the gamma rays following the β - decay of 83 As were studied to determine the ground state spin and parity of 83 As to be 5/2 - ; the absolute intensity of the β - branch from 83 As to 83 Se/sup m/ to be 0.3%; the absolute intensity of the ground state β - branch from 83 Se/sup m/ to 83 Br to be 39%; the halflife of the 5/2 1 + level to be 3.2 ns; and the structure of 83 Se 49 . Results are used to show that the intruder structure which had been previously observed in the odd mass 49 In isotopes could be observed in the N = 49 isotones. The observed structure is discussed in terms of the unified model calculations of Heyde which has been used to describe the intruder structure in the indium nuclei. The intruder structure is most strongly developed, not at core mid-shell, 89 Zr 49 , but rather at core mid-sub-shell 83 Se. This difference is qualitatively understood to be due to the blocking of collectivity by the Z = 40 subshell closure which prevents the intruder structure from occurring in 87 Sr 49 and 89 Zr 49

  17. Study of intruder band in {sup 112}Sn

    Energy Technology Data Exchange (ETDEWEB)

    Ganguly, S. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Banerjee, P. [Saha Institute of Nuclear Physics, Kolkata 700064 (India)]. E-mail: polash.banerjee@saha.ac.in; Ray, I. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Kshetri, R. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Raut, R. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Bhattacharya, S. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Saha-Sarkar, M. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Goswami, A. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Mukhopadhyay, S. [UGC-DAE-CSR, Kolkata 700098 (India); Mukherjee, A. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Mukherjee, G. [Variable Energy Cyclotron Centre, Kolkata 700064 (India); Basu, S.K. [Variable Energy Cyclotron Centre, Kolkata 700064 (India)

    2007-06-01

    Excited states of the positive-parity intruder band in {sup 112}Sn, populated in the {sup 100}Mo({sup 20}Ne,{alpha}4n) reaction at a beam energy of 136 MeV, have been studied. The band has been observed up to 11570.0 keV with spin (24{sup +}). Mean lifetimes have been measured for six states up to the 22{sup +}, 10335.1 keV level and an upper limit of the lifetime has been estimated for the 11570.0 keV (24{sup +}) state. The B(E2) values, derived from the present lifetime results, correspond to a moderate quadrupole deformation of {beta}{sub 2}{approx}0.18 for states with spin J{sup {pi}}>=12{sup +}, and the decrease in B(E2) for the 14{sup +}->12{sup +} transition is consistent with a {nu}(h{sub 11/2}){sup 2} alignment at {omega}{approx}0.35 MeV, predicted by a cranked shell-model calculation. Total Routhian surface calculations predict a triaxial shape following the alignment.

  18. Inadvertent pump start with gas expansion modules

    International Nuclear Information System (INIS)

    Campbell, L.R.; Harris, R.A.; Heard, F.J.; Dautel, W.A.

    1992-01-01

    Previous testing demonstrated the effectiveness of gas expansion modules (GEMs) in mitigating the consequences of a loss-of-flow-without-scram transient in Fast Flux Test Facility (FFTF)-sized sodium cooled cores. As a result, GEMs have been included in the advance liquid-metal reactor (PRISM) design project sponsored by the US Department of Energy. The PRISM design is under review at the US Nuclear Regulatory Commission for licensability. In the unlikely event that the reactor does not scram during a loss of low, the GEMs quickly insert sufficient negative reactivity to limit fuel and cladding temperatures to acceptable values. This is the positive benefit of the GEMs; however, the reverse situation must be considered. A primary pump could be inadvertently started from near-critical conditions resulting in a positive reactivity insertion and a power transient. One mitigating aspect of this event is that as the reactivity associated with the GEMs is inserted, the increasing flow increases core cooling. A test was conducted in the FFTF to demonstrate that the GEM and feedback reactivity are well predicted following pump start, and the reactivity transient is benign

  19. Underwater Intruder Detection Sonar for Harbour Protection: State of the Art Review and Implications

    Science.gov (United States)

    2006-10-01

    intruder would appear as a small moving “ blob ” of energetic echo in the echograph, and the operator could judge whether the contact is a threat that calls...visually then as a small fluctuating “ blob ” against a fluctuating background of sound clutter and reverberation, making it difficult to visually...4. Non-random false alarms caused by genuine underwater contacts that happened not to be intruders—by large fish , or schools of fish , or marine

  20. 46 CFR 308.536 - Declaration where failure to comply with Clause 21 was inadvertent, Form MA-314.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION EMERGENCY OPERATIONS WAR RISK INSURANCE War Risk Cargo Insurance Ii-Open Policy War Risk Cargo... Assured that fails inadvertently to maintain a collateral deposit fund or surety bond in an amount..., which may be obtained from the American War Risk Agency or MARAD. III—Facultative War Risk Cargo...

  1. Neonicotinoid insecticides can serve as inadvertent insect contraceptives

    Science.gov (United States)

    Villamar-Bouza, Laura; Bruckner, Selina; Chantawannakul, Panuwan; Gauthier, Laurent; Khongphinitbunjong, Kitiphong; Retschnig, Gina; Troxler, Aline; Vidondo, Beatriz; Neumann, Peter; Williams, Geoffrey R.

    2016-01-01

    There is clear evidence for sublethal effects of neonicotinoid insecticides on non-target ecosystem service-providing insects. However, their possible impact on male insect reproduction is currently unknown, despite the key role of sex. Here, we show that two neonicotinoids (4.5 ppb thiamethoxam and 1.5 ppb clothianidin) significantly reduce the reproductive capacity of male honeybees (drones), Apis mellifera. Drones were obtained from colonies exposed to the neonicotinoid insecticides or controls, and subsequently maintained in laboratory cages until they reached sexual maturity. While no significant effects were observed for male teneral (newly emerged adult) body mass and sperm quantity, the data clearly showed reduced drone lifespan, as well as reduced sperm viability (percentage living versus dead) and living sperm quantity by 39%. Our results demonstrate for the first time that neonicotinoid insecticides can negatively affect male insect reproductive capacity, and provide a possible mechanistic explanation for managed honeybee queen failure and wild insect pollinator decline. The widespread prophylactic use of neonicotinoids may have previously overlooked inadvertent contraceptive effects on non-target insects, thereby limiting conservation efforts. PMID:27466446

  2. Inadvertent injection of formalin mistaken for local anesthetic agent: report of a case.

    Science.gov (United States)

    Arakeri, Gururaj; Brennan, Peter A

    2012-05-01

    Chemical facial cellulitis, while commonly seen in domestic accidents or attempted suicide, is uncommon in the dental office and hence rarely addressed in the dental literature. We present an unusual case of chemical facial cellulitis caused by inadvertent injection of formalin into the soft tissues of the oral cavity, which was mistaken for local anesthesia solution. This report comprises the immediate symptoms, possible root cause, and management of the difficult situation. We also provide some guidelines to avoid such unfortunate events. Copyright © 2012 Elsevier Inc. All rights reserved.

  3. Adherence to a Gluten-Free Diet in Mexican Subjects with Gluten-Related Disorders: A High Prevalence of Inadvertent Gluten Intake.

    Science.gov (United States)

    Ramírez-Cervantes, Karen Lizzette; Romero-López, Angélica Viridiana; Núñez-Álvarez, Carlos Alberto; Uscanga-Domínguez, Luis F

    2016-01-01

    The rate of compliance with a gluten-free diet in patients with gluten-related disorders is unknown in most Latin American countries. To study the adherence to a gluten-free diet of Mexican individuals with celiac disease and nonceliac gluten sensitivity at the time of their first medical and nutritional consultation at a tertiary referral center. A cross-sectional study was performed. A specific questionnaire was used to gather information on demographics, clinical condition, and self-reported adherence to a gluten-free diet, and to determine strict compliance and intentional or inadvertent gluten consumption. All questionnaires were applied by a nutritionist with expertise in gluten-related disorders. Fifty-six patients with celiac disease and 24 with non-celiac gluten sensitivity were included. Overall, 46 (57.5%) subjects perceived themselves as strictly adherent; however, inadvertent gluten intake was frequent in both celiac disease and non-celiac gluten sensitivity patients (39.2 vs. 33.3%; p = 0.2). Intentional consumption was more prevalent in subjects with celiac disease (48.8 vs. 29.1%; p = 0.048) and individuals with non-celiac gluten sensitivity showed better adherence (37.5 vs. 12.5%; p = 0.035). The importance of a gluten-free diet is underestimated by Mexican patients with celiac disease. The role of a team with expertise in gluten-related disorders is essential to identify inadvertent gluten intake.

  4. 13 CFR 126.308 - What happens if SBA inadvertently omits a qualified HUBZone SBC from the List?

    Science.gov (United States)

    2010-01-01

    ... writing at U.S. Small Business Administration, 409 Third Street, SW., Washington, DC 20416 or via e-mail... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What happens if SBA inadvertently omits a qualified HUBZone SBC from the List? 126.308 Section 126.308 Business Credit and Assistance...

  5. Background information for the development of a low-level waste performance assessment methodology

    International Nuclear Information System (INIS)

    Shipers, L.R.

    1989-12-01

    This document identifies and describes the potential postclosure pathways of radionuclide release, migration, and exposure from low-level radioactive waste disposal facilities. Each pathway identified is composed of a combination of migration pathways (air, surface water, ground water, food chain) and exposure pathways (direct gamma, inhalation, ingestion, surface contact). The pathway identification is based on a review and evaluation of existing information, and not all pathways presented in the document would necessarily be of importance at a given low-level waste disposal site. This document presents pathways associated with undisturbed (ground water, gas generation), naturally disturbed (erosion, bathtubbing, earth creep, frost heave, plant and animal intruder), and inadvertent intruder (construction, agriculture) scenarios of a low-level waste disposal facility. 20 refs., 1 fig

  6. Prevention of the inadvertent movement and illicit trafficking of radioactive and nuclear materials in Argentine border

    International Nuclear Information System (INIS)

    Bonet Duran, Stella M.; Canibano, Javier A.; Menossi, Sergio A.; Rodriguez, Carlos E.

    2004-01-01

    The inadvertent and illegal movements of radioactive and nuclear materials are issues of increased national and international awareness. States are progressively becoming more conscious of the need to adequately respond to these events. As regards the States' regulatory infrastructure, the design and enforcement of control and verification measures to maintain the continuity of knowledge about possession, use and movements of radioactive and nuclear materials is of critical importance. The existence of an appropriate legislative framework and a regulatory authority empowered to establish effective safety and security measures are essential to prevent inadvertent and illegal movements of nuclear materials and other radioactive materials. The events of Sep. 11, 2001 in the US have increased the States' awareness on the need to review their national infrastructure to identify additional measures against inadvertent and illegal movements of radioactive and nuclear materials as well as against sabotage of nuclear facilities. Argentina has more than a half- century- old tradition regarding the control and supervision of all activities involving the use of nuclear and radioactive materials. The Nuclear Regulatory Authority (ARN) of Argentina is the organization with federal competence in radiation protection, nuclear safety, safeguards and physical protection. It is responsible for issuing licenses and permits to any activity involving radioactive materials and for controlling and verifying that these activities are performed in full compliance with ARN standards and requirements. In the region, Argentina has been playing an important role in the prevention of illicit traffic of nuclear and radioactive materials for the last years within the framework of Security Commission of MERCOSUR. The last goals of this initiative are to define and coordinate actions and to establish a set of common operational procedures in the countries participating in the mentioned multilateral

  7. Inadvertent puncture of the aortic noncoronary cusp during postoperative left atrial tachycardia ablation

    Directory of Open Access Journals (Sweden)

    Dursun Aras, MD

    2015-08-01

    Full Text Available Transseptal catheterization has become part of the interventional electrophysiologist׳s technical armamentarium since the development of left atrial catheter ablation and percutaneous technologies for treating mitral and aortic valve disease. Although frequently performed, the procedure׳s most feared complication is aortic root penetration. Focal atrial tachycardia has been described as the most common late sequela of surgical valve replacements. We present a complicated case involving the inadvertent delivery of an 8 French sheath across the noncoronary cusp during radiofrequency catheter ablation for left atrial tachycardia originating from the mitral annulus in a patient with prior mitral valve replacement.

  8. Genotypic differences in intruder-evoked immediate early gene activation in male, but not female, vasopressin 1b receptor knockout mice.

    Science.gov (United States)

    Witchey, Shannah K; Stevenson, Erica L; Caldwell, Heather K

    2016-11-24

    The neuropeptide arginine vasopressin (Avp) modulates social behaviors via its two centrally expressed receptors, the Avp 1a receptor and the Avp 1b receptor (Avpr1b). Recent work suggests that, at least in mice, Avp signaling through Avpr1b within the CA2 region of the hippocampus is critical for normal aggressive behaviors and social recognition memory. However, this brain area is just one part of a larger neural circuit that is likely to be impacted in Avpr1b knockout (-/-) mice. To identify other brain areas that are affected by altered Avpr1b signaling, genotypic differences in immediate early gene activation, i.e. c-FOS and early growth response factor 1 (EGR-1), were quantified using immunocytochemistry following a single exposure to an intruder. In females, no genotypic differences in intruder-evoked c-FOS or EGR-1 immunoreactivity were observed in any of the brain areas measured. In males, while there were no intruder-evoked genotypic differences in c-FOS immunoreactivity, genotypic differences were observed in EGR-1 immunoreactivity within the ventral bed nucleus of the stria terminalis and the anterior hypothalamus; with Avpr1b -/- males having less EGR-1 immunoreactivity in these regions than controls. These data are the first to identify specific brain areas that may be a part of a neural circuit that includes Avpr1b-expressing cells in the CA2 region of the hippocampus. It is thought that this circuit, when working properly, plays a role in how an animal evaluates its social context.

  9. Sensing the intruder: a quantitative threshold for recognition cues perception in honeybees

    Science.gov (United States)

    Cappa, Federico; Bruschini, Claudia; Cipollini, Maria; Pieraccini, Giuseppe; Cervo, Rita

    2014-02-01

    The ability to discriminate among nestmates and non-nestmate is essential to defend social insect colonies from intruders. Over the years, nestmate recognition has been extensively studied in the honeybee Apis mellifera; nevertheless, the quantitative perceptual aspects at the basis of the recognition system represent an unexplored subject in this species. To test the existence of a cuticular hydrocarbons' quantitative perception threshold for nestmate recognition cues, we conducted behavioural assays by presenting different amounts of a foreign forager's chemical profile to honeybees at the entrance of their colonies. We found an increase in the explorative and aggressive responses as the amount of cues increased based on a threshold mechanism, highlighting the importance of the quantitative perceptual features for the recognition processes in A. mellifera.

  10. High spin spectroscopy of near spherical nuclei: Role of intruder orbitals

    Energy Technology Data Exchange (ETDEWEB)

    Bhattacharyya, S.; Bhattacharjee, T.; Mukherjee, G. [Variable Energy Cyclotron Centre, 1/AF Bidhan Nagar, Kolkata - 700064 (India); Chanda, S. [Fakir Chand College, Diamond Herbour, West Bengal (India); Banerjee, D.; Das, S. K.; Guin, R. [Radiochemistry Division, Variable Energy Cyclotron Centre, BARC, Kolkata - 700064 (India); Gupta, S. Das [Variable Energy Cyclotron Centre, 1/AF Bidhan Nagar, Kolkata - 700064, India and Saha Institute of Nuclear Physics, Kolkata-700064 (India); Pai, H. [Variable Energy Cyclotron Centre, 1/AF Bidhan Nagar, Kolkata - 700064, India and Institut für Kernphysik, Technische Universität Darmstadt, Schlossgartenstrasse 9, 64289 Darmstadt (Germany)

    2014-08-14

    High spin states of nuclei in the vicinity of neutron shell closure N = 82 and proton shell closure Z = 82 have been studied using the Clovere Ge detectors of Indian National Gamma Array. The shape driving effects of proton and neutron unique parity intruder orbitals for the structure of nuclei around the above shell closures have been investigated using light and heavy ion beams. Lifetime measurements of excited states in {sup 139}Pr have been done using pulsed-beam-γ coincidence technique. The prompt spectroscopy of {sup 207}Rn has been extended beyond the 181μs 13/2{sup +} isomer. Neutron-rich nuclei around {sup 132}Sn have been produced from proton induced fission of {sup 235}U and lifetime measurement of low-lying states of odd-odd {sup 132}I have been performed from offline decay.

  11. Analyses of natural resources in 10 CFR Part 60 as related to inadvertent human intrusion

    International Nuclear Information System (INIS)

    Miklas, M.P.; Lefevre, H.E.

    1993-01-01

    The purpose of this paper is to examine the intent of the regulatory language of the portions of 10 CFR Part 60 which deal with considerations of the natural resources of a proposed geologic repository for high-level radioactive wastes as they relate to inadvertent human intrusion. Four Potentially Adverse Conditions (PAC) the requirements of 10 CFR 60.21(c)(13) are shown to be related to natural resources. Groundwater is identified as a natural resource known to be present at Yucca Mountain, Nevada. For economic considerations of natural resources, the open-quotes foreseeable futureclose quotes is thought to be no more than 50 years. Two of the topics addressed by the PACs, subsurface mining and drilling at a proposed repository site, are pre-site-characterization activities which must be evaluated in the context of repository performance criteria set by the US EPA standard, 40 CFR Part 191. An alternative US DOE compliance demonstration to another PAC, 10 CFR 60.122(c)(17), might be to use an open-quotes explorationist perspectiveclose quotes of natural resource assessment. The Commission intends for DOE to evaluate the likelihood and consequence of inadvertent human intrusion into a geologic repository as a result of exploration or exploitation of natural resources within or near a proposed high-level radioactive waste geologic repository

  12. Study of 'inadvertent human intrusion or rare natural event scenarios' for sub-surface disposal of radioactive waste

    International Nuclear Information System (INIS)

    Nakatani, Takayoshi; Ishitoya, Kimihide; Funabashi, Hideyuki; Sugaya, Toshikatsu; Sone, Tomoyuki; Shimada, Hidemitsu; Nakai, Kunihiro

    2010-03-01

    Japan Atomic Energy Agency (JAEA) is making preparations for the sub-surface disposal of radioactive wastes, in an integrated fashion according to the properties of the waste material regardless of the generators or waste sources. In this study, 'Inadvertent Human Intrusion or Rare Natural Event Scenarios' of 'Three Types scenarios' was considered according to the standard of the Atomic Energy Society of Japan (AESJ) on the sub-surface disposal system that was based on 'Basic Policy for Safety Regulation Concerning Land Disposal of Low-Level Radioactive Waste (Interim Report)' by Nuclear Safety Commission of Japan (NSC). Selection of the assessed scenarios, development of the assessment tool and preliminary exposure dose assessment for general public were conducted. Among the assessed scenarios, the exposure dose of 'well water drinking scenario' was the highest under the very conservative assessment condition. This scenario assumed that the groundwater in Excavation Disturbed Zone (EDZ) was directly used as drinking water without any dilution. Although this was very conservative condition and the result exceeded 10 mSv/y, it stayed under the upper limit of standard dose value for 'Inadvertent Human Intrusion or Rare Natural Event Scenarios' (10 - 100 mSv/y). (author)

  13. Endovascular repair of inadvertent arterial injury induced by central venous catheterization using a vascular closure device: A case report

    Energy Technology Data Exchange (ETDEWEB)

    Kim, So Hee; Jang, Woo Jin; Oh, Ju Heyon; Song, Yun Gyu [Samsung Changwon Hospital, Sungkyunkwan University School of Medicine, Changwon (Korea, Republic of)

    2017-04-15

    Central venous catheterization can cause various complications. Inadvertent subclavian artery catheterization was performed during insertion of a central venous catheter in a 73-year-old man suffering from panperitonitis due to small-bowel perforation. Endovascular treatment was conducted to treat the injured subclavian artery with a FemoSeal vascular closure device.

  14. Performance Assessment Position Paper: Time for Compliance

    International Nuclear Information System (INIS)

    Wilhite, E.L.

    2003-01-01

    This study lays out the historical development of the time frame for a low-level waste disposal facility to demonstrate compliance with the DOE performance objectives and requirements. The study recommends that 1,000 years should be used as the time for compliance for all of the performance objectives and requirements (i.e., for the all-pathways, air pathway, radon emanation, water resource protection and inadvertent intruder analyses) for all low-level waste disposal facility performance assessments at the Savannah River Site

  15. Central vasopressin V1a receptors modulate neural processing in mothers facing intruder threat to pups

    OpenAIRE

    Caffrey, Martha K.; Nephew, Benjamin C.; Febo, Marcelo

    2009-01-01

    Vasopressin V1a receptors in the rat brain have been studied for their role in modulating aggression and anxiety. In the current study blood-oxygen-level-dependent (BOLD) functional MRI was used to test whether V1a receptors modulate neural processing in the maternal brain when dams are exposed to a male intruder. Primiparous females were given an intracerebroventricular (ICV) injection of vehicle or V1a receptor antagonist ([deamino-Pen1, O-Me-Try, Arg8]-Vasopressin, 125 ng/10 μL) 90-120 min...

  16. The use of protective barriers to deter inadvertent human intrusion into a mined geologic facility for the disposal of radioactive waste: A review of previous investigations and potential concepts

    International Nuclear Information System (INIS)

    Tolan, T.L.

    1993-06-01

    Sandia National Laboratories is evaluating the feasibility of developing protective barrier system for the Waste Isolation Pilot Plant (WIPP) to thwart inadvertent human intrusion into this radioactive-waste disposal system for a period of 9,900 years after assumed loss of active institutional controls. The protective barrier system would be part of a series of enduring passive institutional controls whose long-term function will be to reduce the likelihood of inadvertent human activities (e.g., exploratory drilling for resources) that could disrupt the WIPP disposal system

  17. Pregnancy outcome after 1st-trimester inadvertent exposure to barium sulphate as a contrast media for upper gastrointestinal tract radiography.

    Science.gov (United States)

    Han, B H; Lee, K S; Han, J Y; Choi, J S; Ahn, H K; Ryu, H M; Yang, J H; Han, H W; Nava-Ocampo, A A

    2011-10-01

    Despite barium being used as a contrast media for decades, the specific assessment of its safety in pregnant women is scarce. We are reporting the favourable pregnancy outcome in women who were inadvertently exposed to barium swallow and associated ionising radiation, early in pregnancy. A control group of age- and gravidity-matched unexposed pregnant women was also included. There were 32 live-born babies in the exposed group and 94 in the control group. Women had undergone diagnostic upper gastrointestinal tract (UGT) fluoroscopic examination at 3.3 ± 1.5 weeks' gestation. Estimated maternal radiation dose secondary to barium swallow varied widely, the maximum dose was estimated to be 2.45 mSv. Similar pregnancy outcomes were observed between the groups. The number of babies born with major malformations was not significantly different (p = 1.0) between cases and controls: one (3.1%) vs three (3.2%), respectively. In conclusion, our small prospective cohort study of women suggests no association between inadvertent exposure to ionising radiation and barium sulphate during fluoroscopic barium swallow and adverse fetal outcomes.

  18. Pulse-train control of branching processes: Elimination of background and intruder state population

    International Nuclear Information System (INIS)

    Seidl, Markus; Uiberacker, Christoph; Jakubetz, Werner; Etinski, Mihajlo

    2008-01-01

    The authors introduce and describe pulse train control (PTC) of population branching in strongly coupled processes as a novel control tool for the separation of competing multiphoton processes. Control strategies are presented based on the different responses of processes with different photonicities and/or different frequency detunings to the pulse-to-pulse time delay and the pulse-to-pulse phase shift in pulse trains. The control efficiency is further enhanced by the property of pulse trains that complete population transfer can be obtained over an extended frequency range that replaces the resonance frequency of simple pulses. The possibility to freely tune the frequency assists the separation of the competing processes and reduces the number of subpulses required for full control. As a sample application, PTC of leaking multiphoton resonances is demonstrated by numerical simulations. In model systems exhibiting sizable background (intruder) state population if excited with single pulses, PTC leading to complete accumulation of population in the target state and elimination of background population is readily achieved. The analysis of the results reveals different mechanisms of control and provides clues on the mechanisms of the leaking process itself. In an alternative setup, pulse trains can be used as a phase-sensitive tool for level switching. By changing only the pulse-to-pulse phase shift of a train with otherwise unchanged parameters, population can be transferred to any of two different target states in a near-quantitative manner.

  19. Energy of the 2p1h intruder state in $^{34}$Al

    CERN Multimedia

    The second 0$^{+}$ state in $^{34}$Si, of high importance for the understanding of the island of inversion at N=20, has been recently observed through the $\\beta$- decay of a predicted long-lived low-lying isomeric 1$^{+}$ state in $^{34}$Al. We intend to measure the unknown excitation energy of this isomer using the ISOLTRAP Penning-trap mass spectrometer. Since a recent experiment at ISOLDE (IS-530) showed that the full $\\beta$- strength in the decay of $^{34}$Mg goes through this 1$^{+}$ state in $^{34}$Al, we propose to perform a direct mass measurement of the daughter $^{34}$Al ions trapped after the decay of $^{34}$Mg. Mass measurements indicate that the 4$^{−}$ ground state in $^{34}$Al may be an excited state, the ground state being therefore the intruder 1$^{+}$ state. In another run, we propose to perform a remeasurement of the mass of the 4$^{−}$ ground state.

  20. Inadvertent Apical Extrusion of Sodium Hypochlorite with Evaluation by Dental Volumetric Tomography

    Directory of Open Access Journals (Sweden)

    Elif Delve Başer Can

    2015-01-01

    Full Text Available This case report describes the tissue injury caused by inadvertently extruded NaOCl through the apical constriction. A 56-year-old female patient with complaints of pain, swelling, and ecchymosis on the left side of her face was referred to our clinic. The symptoms had emerged following root canal treatment of the maxillary left first premolar, and a soft tissue complication due to apical extrusion of NaOCl was diagnosed. Antibiotics and analgesics were prescribed. DVT images revealed that the buccal root apex had perforated the maxillary bone. The patient was followed up every other day and became asymptomatic on the 10th day. Endodontic therapy was completed with routine procedures. Determining working length precisely and following irrigation protocols meticulously are indispensable to prevent this type of complication. 3D visualization of the affected area may reveal the cause of the incident.

  1. Treatment Approach to Small Inadvertent Injury of the Crystalline Lens Anterior Capsule During Iridodialysis Repair Surgery

    Directory of Open Access Journals (Sweden)

    Gökçen Gökçe

    2013-01-01

    Full Text Available A 22-year-old man presented to our ophthalmology department with photophobia. On ophthalmic examination, iridodialysis secondary to blunt trauma that occurred 5 years ago was diagnosed. During iridodialysis repair surgery, long curved double-armed needle of 10-0 polypropylene suture (PC-9 inserted into the 19 gauge side port turned down inadvertently by its own weight, resulting in crystalline lens anterior capsule perforation. Postoperative clinical observation revealed no lens opacification affecting visual acuity. This case report showed that lens aspiration surgery should be postponed if the capsule injury is small.(Turk J Ophthalmol 2013; 43: 61-3

  2. Investigations on the inadvertent power increase in a PHWR as ASSET experience

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, S H [Operating Plants Safety Div., Atomic Energy Regulatory Board, Mumbai (India)

    1997-12-31

    Investigations were carried out using the ASSET methodology to find out the root cause of an incident involving inadvertent increase in reactor power in the Unit 1 of Narora Atomic Power Station (NAPS) in India. NAPS is a twin Unit, 220 MWe PHWR based power station. On December 4, 1992, when NPAS Unit 1 was operating at 130 MWe, the reactor power increased steadily on its own and touched 147 MWe, over a period of 14 minutes. The set (demand) power of the triplicated reactor regulating system had increased on its own and in turn has made the reactor to operated at higher power. The power was brought down to 120 MWe by manual intervention. Since adequate system related data during the incident was not available, laboratory studies were carried out using computer simulations for the various process disturbances which could affect the reactor regulating system, for establishing the causes of the event. 4 figs.

  3. Investigations on the inadvertent power increase in a PHWR as ASSET experience

    International Nuclear Information System (INIS)

    Kumar, S.H.

    1996-01-01

    Investigations were carried out using the ASSET methodology to find out the root cause of an incident involving inadvertent increase in reactor power in the Unit 1 of Narora Atomic Power Station (NAPS) in India. NAPS is a twin Unit, 220 MWe PHWR based power station. On December 4, 1992, when NPAS Unit 1 was operating at 130 MWe, the reactor power increased steadily on its own and touched 147 MWe, over a period of 14 minutes. The set (demand) power of the triplicated reactor regulating system had increased on its own and in turn has made the reactor to operated at higher power. The power was brought down to 120 MWe by manual intervention. Since adequate system related data during the incident was not available, laboratory studies were carried out using computer simulations for the various process disturbances which could affect the reactor regulating system, for establishing the causes of the event. 4 figs

  4. Evaluation of periodontal condition in intruded molars using miniscrews

    Directory of Open Access Journals (Sweden)

    Habib Ollah Ghanbari

    2015-12-01

    Full Text Available Introduction: The purpose of this preliminary study was to evaluate the periodontal condition of intruded molars in various phases of treatments. Methods: 30 patients with at least one overerupted upper first molar were selected. Upper molar bands with brackets were cemented. Two miniscrews were placed in the mesiopalatal and mesiobuccal aspect of the aforementioned teeth. A titanium molybdenum alloy (TMA spring was attached to the head of miniscrew in one end and ligated to the bracket in the other end to reach the predetermined force. Plaque index (PI, probing pocket depth (PPD, keratinized gingiva (KG, The distance between miniscrew (M.S and gingival level (GL, and bleeding on probing (BOP were recorded before loading and 1, 2, 3, 4 and 5 months post-loading .Results:  All patients completed the study and no complications were reported. Statistically significant intrusion (2.1 ± 0.9 mm was obtained during active treatment. Inserting miniscrews generally was presented with greater sulcus bleeding, plaque accumulation and plaque formation at follow-up visits. There was a statistically significant increase in PI, PPD and BOP indices. Furthermore, the results showed decrease in KG level and M.S to GL level. Conclusion: Miniscrews can provide a clinical benefit as an absolute anchorage device. However, keeping a good oral hygiene is essential to achieve ideal results, because the presence of miniscrews, as a foreign object in mouth, and intrusion force might be harmful for periodontal tissues

  5. The availability of soil-associated radionuclides for uptake after inadvertent ingestion by humans

    International Nuclear Information System (INIS)

    Shaw, S.; Green, N.

    2002-01-01

    Assessments of the radiological impact of radionuclides released into the environment generally take into account the inadvertent ingestion of radionuclides associated with soil or sediment. Such assessments often assume that gut uptake factors for radionuclides that are biologically incorporated in food are also applicable when the ingested activity is associated with soil. Studies of the availability of soil-associated radionuclides after ingestion have been mainly conducted on ruminant animals and few data exist for humans. The digestive tract of ruminants is totally different from that of a mono-gastric animal and so the availability estimated from the animal studies may not be valid in the case of man. A simple in-vitro enzymolysis procedure was therefore developed to simulate human digestion closely. The measured availability of 137 Cs, 241 Am, 239 PU and 90 Sr associated with loam, sand and peat soils was about 3%, 3%, 10% and 50% respectively. (author)

  6. Anatomy of an intruded coal, I: Effect of contact metamorphism on whole-coal geochemistry, Springfield (No. 5) (Pennsylvanian) coal, Illinois Basin

    Energy Technology Data Exchange (ETDEWEB)

    Rimmer, Susan M. [Department of Geology, Southern Illinois University Carbondale, Carbondale, IL 62901 (United States); Yoksoulian, Lois E. [Department of Earth and Environmental Sciences, University of Kentucky, Lexington, KY 40506 (United States); Hower, James C. [Center for Applied Energy Research, University of Kentucky, 2540 Research Park Drive, Lexington, KY 40511 (United States)

    2009-08-01

    If time and heating rate are important agents in coal maturation, one might expect to see differences in chemical changes in response to maturation depending on the means of increased rank. Using a suite of samples obtained from an intruded Pennsylvanian-age coal in southern Illinois, we present whole-coal chemical data. Comparing these data to extant geochemical data for coals that have undergone normal burial maturation, we evaluated the hypothesis that if coal alteration occurs rapidly (due to intrusion) rather than gradually (burial maturation), then different relationships are seen in chemical composition (proximate and ultimate analyses) and vitrinite reflectance. The Pennsylvanian-age (Asturian [Westphalian D]) Springfield (No. 5) coal is mined at the Big Ridge Mine, near Eldorado, southern Illinois. This high volatile B bituminous coal was intruded by an ultramafic igneous intrusion during the early Permian. Alteration occurs out to {proportional_to} 1.2 x dike thickness and includes an increase in random vitrinite reflectance (R{sub m}) from levels {proportional_to} 0.7% to over 5.3%, loss of liptinites, and formation of devolatilization vacuoles and fine mosaic texture. Decreases in volatile matter (VM) and increases in fixed carbon (FC) appear to be less than would be expected for the level of reflectance seen within the alteration halo. Carbonate minerals have a major influence on proximate analyses but even following the removal of carbonates, the decrease in VM is still less than would be seen in coals of similar vitrinite reflectance that were altered by normal burial maturation. Carbonate mineralization also contributes to variability in ultimate analysis values approaching the intrusion, particularly for %C and %O. After carbonate removal, data for these coals do not appear to follow the normal burial coalification tracks when plotted on a van Krevelen diagram and on a Seyler chart. These differences suggest that a slightly different maturation

  7. Flight Test Evaluation of AVOID I (Avionic Observation of Intruder Danger) Collision Avoidance System

    Science.gov (United States)

    1975-05-01

    memory registers A through G ( 2048 bit shift registers) for each of the basic altitude bands (1+26, 113 1+6) to store intruder responses. Since the 1...af EV 11z iIIV~ ~l~~ NADlC-75056-60_ _ _- 2 w< -I- LI- ~jw 0IU oo2 W I aJ W %L6fI9~~AVdI tVOV~ aN9Ao ccH % VdI I11813iA-di V GN Ed a3IV0 %AIII1IilV11W...tei mix ;;; c le z - Is’ %~~~~~~~~~~;s AJIiV1 VdI ~ %AIIV~ v~iO VIR 1ý 123 Lz NADC-7056-6 w, M w o ~2IV ONY Ed CIRNIGVNOO at p 00 CLt % 118I3iAVldSIC3

  8. Stepping in Place While Voluntarily Turning Around Produces a Long-Lasting Posteffect Consisting in Inadvertent Turning While Stepping Eyes Closed

    Directory of Open Access Journals (Sweden)

    Stefania Sozzi

    2016-01-01

    Full Text Available Training subjects to step in place on a rotating platform while maintaining a fixed body orientation in space produces a posteffect consisting in inadvertent turning around while stepping in place eyes closed (podokinetic after-rotation, PKAR. We tested the hypothesis that voluntary turning around while stepping in place also produces a posteffect similar to PKAR. Sixteen subjects performed 12 min of voluntary turning while stepping around their vertical axis eyes closed and 12 min of stepping in place eyes open on the center of a platform rotating at 60°/s (pretests. Then, subjects continued stepping in place eyes closed for at least 10 min (posteffect. We recorded the positions of markers fixed to head, shoulder, and feet. The posteffect of voluntary turning shared all features of PKAR. Time decay of angular velocity, stepping cadence, head acceleration, and ratio of angular velocity after to angular velocity before were similar between both protocols. Both postrotations took place inadvertently. The posteffects are possibly dependent on the repeated voluntary contraction of leg and foot intrarotating pelvic muscles that rotate the trunk over the stance foot, a synergy common to both protocols. We propose that stepping in place and voluntary turning can be a scheme ancillary to the rotating platform for training body segment coordination in patients with impairment of turning synergies of various origin.

  9. Method and apparatus for preventing inadvertent criticality in a nuclear fueled electric power generating unit

    International Nuclear Information System (INIS)

    Tuley, C.R.; Bauman, D.A.; Neuner, J.A.; Feilchenfeld, M.M.; Greenberg, L.

    1984-01-01

    An inadvertent approach to criticality in a nuclear fueled electric power generating unit is detected and an alarm is generated through on-line monitoring of the neutron flux. The difficulties of accurately measuring the low levels of neutron flux in a subcritical reactor are overcome by the use of a microcomputer which continuously generates average flux count rate signals for incremental time periods from thousands of samples taken during each such period and which serially stores the average flux count rate signals for a preselected time interval. At the end of each incremental time period, the microcomputer compares the latest average flux count rate signal with the oldest, and preferably each of the intervening stored values, and if it exceeds any of them by at least a preselected multiplication factor, an alarm is generated. (author)

  10. Inadvertent yellow fever vaccination of a patient with Crohn's disease treated with infliximab and methotrexate

    DEFF Research Database (Denmark)

    Ekenberg, C.; Friis-Møller, N.; Ulstrup, Thomas

    2016-01-01

    We present a case of a 56-year-old woman with Crohn's disease, treated with methotrexate and infliximab, who inadvertently received yellow fever vaccination (YFV) prior to a journey to Tanzania. She was not previously vaccinated against YF. YFV contains live-attenuated virus, and is contraindicated...... in patients treated with immunosuppressive drugs. Following vaccination, the patient fell ill with influenza-like illness. Elevated transaminase levels and YF viremia were detected. Despite being immunocompromised, the patient did not develop more severe adverse effects. Neutralising antibodies to YF virus...... were detected on day 14 following vaccination and remained protective at least 10 months after vaccination. Limited data is available on outcomes of YFV in patients receiving immunosuppressive therapy, including biologics, and we report this case as a reminder of vigilance of vaccine recommendations...

  11. Development of polymer concrete radioactive waste management containers

    Energy Technology Data Exchange (ETDEWEB)

    Chung, H.; Lee, M. S.; Ahn, D. H.; Won, H. J.; Kang, H. S.; Lee, H. S.; Lim, S.P.; Kim, Y. E.; Lee, B. O.; Lee, K. P.; Min, B. Y.; Lee, J.K.; Jang, W. S.; Sim, W. B.; Lee, J. C.; Park, M. J.; Choi, Y. J.; Shin, H. E.; Park, H. Y.; Kim, C. Y

    1999-11-01

    A high-integrity radioactive waste container has been developed to immobilize the spent resin wastes from nuclear power plants, protect possible future, inadvertent intruders from damaging radiation. The polymer concrete container is designed to ensure safe and reliable disposal of the radioactive waste for a minimum period of 300 years. A built-in vent system for each container will permit the release of gas. An experimental evaluation of the mechanical, chemical, and biological tests of the container was carried out. The tests showed that the polymer concrete container is adequate for safe disposal of the radioactive wastes. (author)

  12. Influence of i13/2 proton and j15/2 neutron intruding orbitals on the behaviour of 190 mass region superdeformed nuclei

    International Nuclear Information System (INIS)

    Duprat, J.

    1995-01-01

    This work concerns the study of the nuclear superdeformation phenomenon in the A = 190 mass region. The superdeformed (SD) states in 193 Tl, 194 Tl 195 Tl were produced via heavy-ion induced reactions and studied with the EUROGAM gamma multidetector array. The analysis of high-multiplicity events allowed the study of the magnetic properties of the SD states in these nuclei. For the first time, the g-factor of a proton orbital in a SD nucleus in the A = 190 mass region has been extracted. This measurement indicates that the two known bands in 195 Tl-SD are built on the i 13/2 proton intruder orbital. A new SD band has been found in this isotope: it is the first SD band built on an excited proton state found in the A = 190 region. Finally an interaction between two pairs of bands has been established in 194 Tl; this interaction indicate the crossing of two neutron orbitals above the N = 112 gap. The magnetic properties of the states of the SD bands in 194 Tl reveals that these bands are built on configurations in which the single proton and neutron intrinsic spins are aligned. Comparison between different SD bands in the Thallium isotopes shows the prominent role of the i 13/2 proton and the j 15/2 neutron intruder orbitals in the smooth increase of the dynamical moment of inertia as a function of the rotational frequency. In addition, this work reports on the first observation of a SD rotational band produced in a (HI, αxn) reaction channel. The study of the maximum spin reached by the SD bands indicates both a competition between alpha emission and fission of the compound nucleus, and the limitation due to the fission process in the population of the SD nuclei in the A = 190 region. (author). 120 refs., 112 figs., 22 tabs., 2 ann

  13. Sinus anatomy associated with inadvertent cerebrospinal fluid leak during functional endoscopic sinus surgery.

    Science.gov (United States)

    Heaton, Chase M; Goldberg, Andrew N; Pletcher, Steven D; Glastonbury, Christine M

    2012-07-01

    Anatomic variations in skull base anatomy may predispose the surgeon to inadvertent skull base injury with resultant cerebrospinal fluid (CSF) leak during functional endoscopic sinus surgery (ESS). Our objective was to compare preoperative sinus imaging of patients who underwent FESS with and without CSF leak to elucidate these variations. In this retrospective case-control study, 18 patients with CSF leak following FESS for chronic rhinosinusitis (CRS) from 2000 to 2011 were compared to 18 randomly selected patients who underwent preoperative imaging for FESS for CRS. Measurements were obtained from preoperative computed tomography images with specific attention to anatomic differences in cribriform plate and ethmoid roof heights in the coronal plane, and the skull base angle in the sagittal plane. Mean values of measured variables were compared using a nonparametric Mann-Whitney test. When compared to controls, patients with CSF leak demonstrated a greater angle of the skull base in the sagittal plane (P variations may help to prevent iatrogenic CSF leak. Copyright © 2012 The American Laryngological, Rhinological, and Otological Society, Inc.

  14. Safety assessment on the human intrusion scenarios of near surface disposal facility for low and very low level radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Hong, Sung Wook; Park, Jin Baek [Korea Radioactive Waste Agency, Daejeon (Korea, Republic of); Park, Sang Ho [Chungnam National University, Daejeon (Korea, Republic of)

    2016-03-15

    The second-stage near surface disposal facility for low and very low level radioactive waste's permanent disposal is to be built. During the institutional control period, the inadvertent intrusion of the general public is limited. But after the institutional control period, the access to the general public is not restricted. Therefore human who has purpose of residence and resource exploration can intrude the disposal facility. In this case, radioactive effects to the intruder should be limited within regulatory dose limits. This study conducted the safety assessment of human intrusion on the second-stage surface disposal facility through drilling and post drilling scenario. Results of drilling and post drilling scenario were satisfied with regulatory dose limits. The result showed that post-drilling scenario was more significant than drilling scenario. According to the human intrusion time and behavior after the closure of the facility, dominant radionuclide contributing to the intruder was different. Sensitivity analyses on the parameters about the human behavior were also satisfied with regulatory dose limits. Especially, manual redistribution factor was the most sensitive parameter on exposure dose. A loading plan of spent filter waste and dry active waste was more effective than a loading plan of spent filter waste and other wastes for the radiological point of view. These results can be expected to provide both robustness and defense in depth for the development of safety case further.

  15. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1992-05-01

    This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicitly displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information

  16. Prevention of and response to inadvertent exposure of embryo/fetus to ionizing radiation, due to medical exposure of the mother. The Greek regulatory authority initiatives.

    Science.gov (United States)

    Economides, Sotirios; Boziari, Argiro; Vogiatzi, Stavroula; Hourdakis, Konstantinos J; Kamenopoulou, Vassiliki; Dimitriou, Panagiotis

    2014-03-01

    Embryo/fetus (E/F) irradiation as a result of medical exposure of the mother should be avoided, unless there are strong clinical indications. Medical practitioners are assigned the primary task and obligation of ensuring overall patient protection and safety in the prescription of and during the delivery of medical exposure. In cases of unintended exposure of embryo/fetus (E/F), the risk analysis and communication is conducted by or under the supervision of medical physicists at local level. National competent authorities can contribute to the prevention, risk analysis and communication of inadvertent E/F exposure to ionizing radiation by recording, analyzing and disseminating the relevant information. Since 2001, Greek Atomic Energy Commission has established a committee with the mandate to provide advice, to keep records, to analyze and disseminate the experience gained in cases of unintended E/F exposure. During the period 2001-2011, the committee was consulted by 269 pregnant women undergone medical exposures. The conclusions from the relevant data analysis, as well as the experience gained are herein presented and discussed. Copyright © 2013 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  17. Overview of a performance assessment methodology for low-level radioactive waste disposal facilities

    International Nuclear Information System (INIS)

    Kozak, M.W.; Chu, M.S.Y.

    1991-01-01

    A performance assessment methodology has been developed for use by the US Nuclear Regulatory Commission in evaluating license applications for low-level waste disposal facilities. This paper provides a summary and an overview of the modeling approaches selected for the methodology. The overview includes discussions of the philosophy and structure of the methodology. This performance assessment methodology is designed to provide the NRC with a tool for performing confirmatory analyses in support of license reviews related to postclosure performance. The methodology allows analyses of dose to individuals from off-site releases under normal conditions as well as on-site doses to inadvertent intruders. 24 refs., 1 tab

  18. Passive Barriers to Inadvertent Human Intrusion for Use at the Nevada Test Site

    International Nuclear Information System (INIS)

    NSTec Environmental Management

    2007-01-01

    In July1996, BN transmitted Passive Barriers to Inadvertent Human Intrusion for Use at the Nevada Test Site to the United States Department of Energy, under Contract DE-AC08-91NV10833. The 1996 paper had a limited distribution and was not reviewed for public release. In 2007, National Security Technologies LLC (NSTec) made minor revisions to conform to current editorial standards of the NNSA/NSO and to meet current security requirements for public release. The primary purpose of this study was to identify types of engineered passive barriers that could deter future intrusion into buried low-level radioactive waste, particularly intrusion by drilling water wells. The study considered drilling technology, many natural and man-made materials, and both underground and above-ground barriers. Based on cost and effectiveness, the report recommended underground barriers consisting of a layer of rubble or tires. An aboveground barrier mound might also prove effective, but would cost more, and may become an attractive nuisance (e.g., might, after their purpose has been forgotten, encourage exploration for the sake of satisfying curiosity). Advances in drilling technology could render any engineered barriers ineffective if there is motivation to penetrate the barriers

  19. Dose and risk assessment for intrusion into mixed waste disposal sites

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Aaberg, R.L.

    1991-10-01

    Sites previously used for disposal of radioactive and hazardous chemical materials have resulted in situations that pose a potential threat to humans from inadvertent intrusion. An example generic scenario analysis was developed to demonstrate the evaluation of potential exposure to either cleanup workers or members of the public who intrude into buried waste containing both radioactive and hazardous chemical contaminants. The example scenarios consist of a collection of exposure routes (or pathways) with specific modeling assumptions for well-drilling and for excavation to construct buildings. These scenarios are used to describe conceptually some potential patterns of activity by non-protected human beings during intrusion into mixed-waste disposal sites. The dose from exposure to radioactive materials is calculated using the GENII software system and converted to risk by using factors from ICRP Publication 60. The hazard assessment for nonradioactive materials is performed using recent guidelines from the US Environmental Protection Agency (EPA). The example results are in the form of cancer risk for carcinogens and radiation exposure

  20. Inadvertent weather modification urban areas - lessons for global climate change

    Energy Technology Data Exchange (ETDEWEB)

    Changnon, S A [Illinois State Water Survey, Champaign, IL (USA)

    1992-05-01

    Large metropolitan areas in North America, home to 65% of the USA's population, have created major changes in their climates over the past 150 years. The rate and amount of the urban climate change approximate those being predicted globally using climate models. Knowledge of urban weather and climate modification holds lessons for the global climate change issue. First, adjustments to urban climate changes can provide guidance for adjusting to global change. A second lesson relates to the difficulty but underscores the necessity of providing scientifically credible proof of change within the noise of natural climatic variability. The evolution of understanding about how urban conditions influence weather reveals several unexpected outcomes, particularly relating to precipitation changes. These suggest that similar future surprises can be expected in a changed global climate, a third lesson. In-depth studies of how urban climate changes affected the hydrologic cycle, the regional economy, and human activities were difficult because of data problems, lack of impact methodology, and necessity for multidisciplinary investigations. Similar impact studies for global climate change will require diverse scientific talents and funding commitments adequate to measure the complexity of impacts and human adjustments. Understanding the processes whereby urban areas and other human activities have altered the atmosphere and changed clouds and precipitation regionally appears highly relevant to the global climate-change issue. Scientific and governmental policy development needs to recognize an old axiom that became evident in the studies of inadvertent urban and regional climate change and their behavioural implications: Think globally but act locally. Global climate change is an international issue, and the atmosphere must be treated globally. But the impacts and the will to act and adjust will occur regionally.

  1. Inadvertent weather modification urban areas - lessons for global climate change

    International Nuclear Information System (INIS)

    Changnon, S.A.

    1992-01-01

    Large metropolitan areas in North America, home to 65% of the USA's population, have created major changes in their climates over the past 150 years. The rate and amount of the urban climate change approximate those being predicted globally using climate models. Knowledge of urban weather and climate modification holds lessons for the global climate change issue. First, adjustments to urban climate changes can provide guidance for adjusting to global change. A second lesson relates to the difficulty but underscores the necessity of providing scientifically credible proof of change within the noise of natural climatic variability. The evolution of understanding about how urban conditions influence weather reveals several unexpected outcomes, particularly relating to precipitation changes. These suggest that similar future surprises can be expected in a changed global climate, a third lesson. In-depth studies of how urban climate changes affected the hydrologic cycle, the regional economy, and human activities were difficult because of data problems, lack of impact methodology, and necessity for multidisciplinary investigations. Similar impact studies for global climate change will require diverse scientific talents and funding commitments adequate to measure the complexity of impacts and human adjustments. Understanding the processes whereby urban areas and other human activities have altered the atmosphere and changed clouds and precipitation regionally appears highly relevant to the global climate-change issue. Scientific and governmental policy development needs to recognize an old axiom that became evident in the studies of inadvertent urban and regional climate change and their behavioural implications: Think globally but act locally. Global climate change is an international issue, and the atmosphere must be treated globally. But the impacts and the will to act and adjust will occur regionally

  2. Safety analysis of increase in heat removal from reactor coolant system with inadvertent operation of passive residual heat removal at no load conditions

    Energy Technology Data Exchange (ETDEWEB)

    Shao, Ge; Cao, Xuewu [School of Mechanical and Engineering, Shanghai Jiao Tong University, Shanghai (China)

    2015-06-15

    The advanced passive pressurized water reactor (PWR) is being constructed in China and the passive residual heat removal (PRHR) system was designed to remove the decay heat. During accident scenarios with increase of heat removal from the primary coolant system, the actuation of the PRHR will enhance the cooldown of the primary coolant system. There is a risk of power excursion during the cooldown of the primary coolant system. Therefore, it is necessary to analyze the thermal hydraulic behavior of the reactor coolant system (RCS) at this condition. The advanced passive PWR model, including major components in the RCS, is built by SCDAP/RELAP5 code. The thermal hydraulic behavior of the core is studied for two typical accident sequences with PRHR actuation to investigate the core cooling capability with conservative assumptions, a main steam line break (MSLB) event and inadvertent opening of a steam generator (SG) safety valve event. The results show that the core is ultimately shut down by the boric acid solution delivered by Core Makeup Tank (CMT) injections. The effects of CMT boric acid concentration and the activation delay time on accident consequences are analyzed for MSLB, which shows that there is no consequential damage to the fuel or reactor coolant system in the selected conditions.

  3. Control of Transboundary Movement of Radioactive Material Inadvertently Incorporated into Scrap Metal and Semi-finished Products of the Metal Recycling Industries. Results of the Meetings Conducted to Develop a Draft Code of Conduct

    International Nuclear Information System (INIS)

    2014-02-01

    In 2010, the IAEA initiated the development of a code of conduct on the transboundary movement of radioactive material inadvertently incorporated into scrap metal and semi- finished products of the metal recycling industries (Metal Recycling Code of Conduct). The Metal Recycling Code of Conduct was intended to harmonize the approaches of Member States in relation to the discovery of radioactive material that may inadvertently be present in scrap metals and semi-finished products subject to transboundary movement, and their safe handling and management to facilitate regulatory control. The Metal Recycling Code of Conduct was envisaged as being complementary to the Safety Guide on Control of Orphan Sources and Other Radioactive Material in the Metal Recycling and Production Industries (IAEA Safety Standards Series No. SSG-17), which provides recommendations, principally within a national context, on the protection of workers, members of the public and the environment in relation to the control of radioactive material inadvertently incorporated in scrap metal. In February 2013, the third open-ended meeting of technical and legal experts to develop the Metal Recycling Code of Conduct was organized. The objective of this meeting was to address the comments received from Member States and to finalize the text of the draft Metal Recycling Code of Conduct. Representatives from 55 Member States, one non-Member State and the EU, together with seven observers from the metal recycling industry, reviewed the comments and revised the draft accordingly. In September 2013, in Resolution GC(57)/RES/9, the IAEA General Conference recorded that it 'Appreciates the intensive efforts undertaken by the Secretariat to develop a code of conduct on the transboundary movement of scrap metal, or materials produced from scrap metal, that may inadvertently contain radioactive material, and encourages the Secretariat to make the results of the discussion conducted on this issue available to

  4. Management of traumatically intruded permanent maxillary lateral incisor - Case report and review of literature

    Directory of Open Access Journals (Sweden)

    Deepak Sharma

    2016-01-01

    Full Text Available Primary etiologic factors of trauma in the permanent dentition are bicycle accidents, sports accidents, falls, and fights. From the standpoint of therapy, anatomy, and prognosis, five different types of luxation lesions are recognized: Concussion, subluxation, extrusive luxation, lateral luxation, and intrusive luxation. Intrusive luxation is apical displacement of tooth into the alveolar bone. The tooth is driven into the socket, compressing the periodontal ligament, and commonly causes a crushing fracture of the alveolar socket. It is considered one of the most severe luxation injuries to affect permanent teeth. Intrusion injuries are often associated with severe damage to the tooth, periodontium, and pulpal tissue. The rare occurrence of this injury, 0.3–1.9% in the permanent dentition, has resulted in limited studies to support suggested treatment regimens. Clinical treatment for intrusion is especially difficult because of the severe complications accompanying it. These complications include pulp necrosis or obliteration, inflammatory root resorption, ankylosis, replacement root resorption, and loss of marginal bone support. Hence, the aim of presenting this case report of intrusive luxation is to highlight the importance of prompt care and root canal dressing and discuss the several treatments proposed to reposition the intruded teeth.

  5. U-Pb SHRIMP data and geochemical characterization of granitoids intruded along the Coxixola shear zone, Provincia Borborema, NE Brazil

    Energy Technology Data Exchange (ETDEWEB)

    Guimaraes, Ignez de Pinho; Silva Filho, Adejardo Francisco da; Silva, Francis M.J.V. da, E-mail: ignez@ufpe.br [Universidade Federal de Pernanmbuco (UFPE), Recife, PE (Brazil). Dept. de Geologia; Armstrong, Richard [Australian National University (Australia)

    2011-07-01

    A large volume of granitic magmatism associated with large scale shear zone and metamorphism under high-T amphibolite facies conditions characterize the Brasiliano Orogeny in the Borborema Province, NE Brazil. Granitoids from two plutons and later dykes intruded along the Coxixola shear zone show distinct crystallization ages and geochemical signature. The oldest granitoids (618 ± 5 Ma), Serra de Inacio Pereira Pluton are coeval with the peak of regional metamorphism and they were probably originated by melting of a paleoproterozoic source. The granitoids from the Serra do Marinho Pluton show crystallization age of 563 ± 4 Ma and geochemical signature of post-collisional A-type granites. The later dykes have crystallization age of 526 ± 7 Ma, geochemical signature of A-type granitoids. (author)

  6. DIRECT USAGE OF MINISCREW ANCHORAGE TO INTRUDE OVERERUPTED MAXILLARY POSTERIOR TEETH BEFORE PROSTHODONTIC PREPARATION:A CASE REPORT

    Directory of Open Access Journals (Sweden)

    Yasemin Bahar Acar

    2016-01-01

    Full Text Available Overeruption of maxillary molars due loss of opposing teeth creates occlusal and functional interferences. Before reconstruction can be initiated, intrusion of overerupted molars becomes essential. This report illustrates treatment of overerupted maxillary premolar and molar via direct use of miniscrew anchorage. A 24-year old female had lost first and second left mandibular molars due to pulpal necrotizing agents, resulting with a large alveolar bone defect and overerupted maxillary premolar and molar. She had a history of unsuccessful alveolar distraction of mandibular left premolars to increase the alveolar bone height prior to implant placement. Patient was satisfied with her smile and refused comprehensive orthodontic treatment. Maxillary premolar and molar were intruded segmentally for 4mm in 8 months, using a combination of a mini-implant and partialfixed edgewise appliances. Biological responses of teeth and surrounding bony structures to intrusion appeared normal and acceptable in radiographic and clinical examination.

  7. Evolution of the Collectivity around 68Ni: role of intruder states

    International Nuclear Information System (INIS)

    Dijon, A.

    2012-01-01

    The evolution of magic numbers as a function of the neutron number for a given chain of isotopes is one of the major goals of nuclear physics today. Changing magic numbers may lead to profound modifications in the structure of exotic nuclei and manifest themselves experimentally in rapid changes of collectivity and shapes. In this thesis we have studied nuclei around 68 Ni produced in deep inelastic collisions at GANIL. The nuclei of interest were selected and identified by the large acceptance VAMOS recoil spectrometer. Their structure was studied via the detection of the gamma rays emitted at the target point by the EXOGAM array. In one of the two experiments we also installed a specific setup dedicated to the measurements of the delayed gamma rays emitted by the nuclei after their implantation at the focal plane of VAMOS. In the first experiment we have observed a new isomeric state in 68 Ni with a proton intruder configuration at an excitation energy which sensitively depends on the Z=28 and N=40 shell gaps. New transitions were also identified in odd-mass isotopes of Co, Fe and Mn. In the second experiment we have measured the lifetimes of the first-excited states in 63,65 Co using the recoil distance Doppler shift method. From these lifetimes electromagnetic transition probabilities could be deduced, which in turn shed light on the collectivity of the studied isotopes. Comparisons with the shell model and with mean field calculations were carried and provided additional information on the proton-neutron interaction as well as on the evolution of the collectivity in this mass region. (author) [fr

  8. Female song rates in response to simulated intruder are positively related to reproductive success.

    Directory of Open Access Journals (Sweden)

    Kristal E Cain

    2015-10-01

    Full Text Available Bird song is well studied in males as a sexually selected behavior. However, although song is also common among females, it is infrequently examined and poorly understood. Research suggests that song is often used as a resource defense behavior and is important in female-female competition for limited resources, e.g. mates and territories. If so, song should be positively related to fitness and related to other resource defense behaviors, but this possibility has rarely been explored. Here we examine fitness estimates in relation to spontaneous song rates and song rates in response to a simulated intruder (playback, in the superb fairy-wren (Malurus cyaneus, a cooperatively breeding songbird. We also determine how song rates relate to other territorial defense behaviors. Song rate in response to playback, but not spontaneous song rate, was positively related to nest success and the number of fledglings produced by successful females. Further, response song rate was also correlated with other territorial defense behaviors (latency to respond and flights. This evidence supports the hypothesis that female song may be used in the context of female-female competition to improve access to limited reproductive resources, and suggests that song may provide direct fitness benefits.

  9. Inadvertent recovery in communication deficits following the upper limb mirror therapy in stroke: A case report.

    Science.gov (United States)

    Arya, Kamal Narayan; Pandian, Shanta

    2014-10-01

    Broca's aphasia is the most challenging communication deficit in stroke. Left inferior frontal gyrus (IFG), a key region of the mirror-neuron system, gets lesioned in Broca's aphasia. Mirror therapy (MT), a form of action-observation, may trigger the mirror neurons. The aim of this study was to report a case of poststroke subject with Broca's aphasia, who exhibited an inadvertent and significant improvement in speech after MT for the paretic upper limb. The 20-month old stroke patient underwent MT through goal-directed tasks. He received a total absence of spontaneous speech, writing, and naming. After 45 sessions of task-based MT for the upper limb, he showed tremendous recovery in expressive communication. He had fluent and comprehensive communication; however, with a low pitch and minor pronunciation errors. He showed a substantial change (from 18/100 to 79/100) on the Communicative Effective Index, particularly, on items such as expressing emotions, one-to-one conversation, naming, and spontaneous conversation. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. Site-Specific Analyses for Demonstrating Compliance with 10 CFR 61 Performance Objectives - 12179

    Energy Technology Data Exchange (ETDEWEB)

    Grossman, C.J.; Esh, D.W.; Yadav, P.; Carrera, A.G. [U.S. Nuclear Regulatory Commission, 11545 Rockville Pike, Rockville, MD 20852 (United States)

    2012-07-01

    performance assessment to demonstrate protection of the general population from releases of radioactivity, an assessment to demonstrate protection of a potential inadvertent intruder, and a long-term analysis to assess how the design of the facility considers the potential radiological impacts associated with disposal of long-lived waste streams. Concurrently, the NRC staff intends to propose associated guidance to facilitate the implementation of the requirements to conduct site-specific analyses. In proposing these amendments to the regulation and associated guidance, the NRC staff has conducted extensive public outreach since 2009 including three public meetings and four briefings of the NRC's Advisory Committee on Reactor Safeguards. The NRC staff plans to submit the proposed amendments to the regulations to the Commission in early 2012. Subsequently, the proposed amendments and associated guidance would be published in the Federal Register for public comment pending approval of the proposed amendments to the regulations by the Commission. Following the public comment period, NRC staff plans to address public comments and revise, as necessary, the regulations and associated guidance before publishing a final rule, which is anticipated in 2013. (authors)

  11. Study for on-line system to identify inadvertent control rod drops in PWR reactors using ex-core detector and thermocouple measures

    International Nuclear Information System (INIS)

    Souza, Thiago J.; Medeiros, Jose A.C.C.; Goncalves, Alessandro C.

    2015-01-01

    Accidental control rod drops event in PWR reactors leads to an unsafe operating condition. It is important to quickly identify the rod to minimize undesirable effects in such a scenario. In this event, there is a distortion in the power distribution and temperature in the reactor core. The goal of this study is to develop an on-line model to identify the inadvertent control rod dropped in PWR reactor. The proposed model is based on physical correlations and pattern recognition of ex-core detector responses and thermocouples measures. The results of the study demonstrated the feasibility of an on-line system, contributing to safer operation conditions and preventing undesirable effects, as its shutdown. (author)

  12. Study for on-line system to identify inadvertent control rod drops in PWR reactors using ex-core detector and thermocouple measures

    Energy Technology Data Exchange (ETDEWEB)

    Souza, Thiago J.; Medeiros, Jose A.C.C.; Goncalves, Alessandro C., E-mail: tsouza@nuclear.ufrj.br, E-mail: canedo@lmp.ufrj.br, E-mail: alessandro@nuclear.ufrj.br [Coordenacao dos Programas de Pos-Graduacao em Engenharia (COPPE/UFRJ), Rio de Janeiro, RJ (Brazil). Programa de Engenharia Nuclear

    2015-07-01

    Accidental control rod drops event in PWR reactors leads to an unsafe operating condition. It is important to quickly identify the rod to minimize undesirable effects in such a scenario. In this event, there is a distortion in the power distribution and temperature in the reactor core. The goal of this study is to develop an on-line model to identify the inadvertent control rod dropped in PWR reactor. The proposed model is based on physical correlations and pattern recognition of ex-core detector responses and thermocouples measures. The results of the study demonstrated the feasibility of an on-line system, contributing to safer operation conditions and preventing undesirable effects, as its shutdown. (author)

  13. Mixed low-level waste form evaluation

    International Nuclear Information System (INIS)

    Pohl, P.I.; Cheng, Wu-Ching; Wheeler, T.; Waters, R.D.

    1997-01-01

    A scoping level evaluation of polyethylene encapsulation and vitreous waste forms for safe storage of mixed low-level waste was performed. Maximum permissible radionuclide concentrations were estimated for 15 indicator radionuclides disposed of at the Hanford and Savannah River sites with respect to protection of the groundwater and inadvertent intruder pathways. Nominal performance improvements of polyethylene and glass waste forms relative to grout are reported. These improvements in maximum permissible radionuclide concentrations depend strongly on the radionuclide of concern and pathway. Recommendations for future research include improving the current understanding of the performance of polymer waste forms, particularly macroencapsulation. To provide context to these estimates, the concentrations of radionuclides in treated DOE waste should be compared with the results of this study to determine required performance

  14. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    International Nuclear Information System (INIS)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K.

    2016-01-01

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid’s thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  15. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    Energy Technology Data Exchange (ETDEWEB)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K., E-mail: prodip.das@ncl.ac.uk [School of Mechanical and Systems Engineering Newcastle University Newcastle upon Tyne, NE1 7RU United Kingdom (United Kingdom)

    2016-07-12

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid’s thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  16. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    Science.gov (United States)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K.

    2016-07-01

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid's thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  17. Comparison of resistive heating and forced-air warming to prevent inadvertent perioperative hypothermia.

    Science.gov (United States)

    John, M; Crook, D; Dasari, K; Eljelani, F; El-Haboby, A; Harper, C M

    2016-02-01

    Forced-air warming is a commonly used warming modality, which has been shown to reduce the incidence of inadvertent perioperative hypothermia (heating mattresses offer a potentially cheaper alternative, however, and one of the research recommendations from the National Institute for Health and Care Excellence was to evaluate such devices formally. We conducted a randomized single-blinded study comparing perioperative hypothermia in patients receiving resistive heating or forced-air warming. A total of 160 patients undergoing non-emergency surgery were recruited and randomly allocated to receive either forced-air warming (n=78) or resistive heating (n=82) in the perioperative period. Patient core temperatures were monitored after induction of anaesthesia until the end of surgery and in the recovery room. Our primary outcome measures included the final intraoperative temperature and incidence of hypothermia at the end of surgery. There was a significantly higher rate of hypothermia at the end of surgery in the resistive heating group compared with the forced-air warming group (P=0.017). Final intraoperative temperatures were also significantly lower in the resistive heating group (35.9 compared with 36.1°C, P=0.029). Hypothermia at the end of surgery in both warming groups was common (36% forced air warming, 54% resistive heating). Our results suggest that forced-air warming is more effective than resistive heating in preventing postoperative hypothermia. NCT01056991. © The Author 2016. Published by Oxford University Press on behalf of the British Journal of Anaesthesia. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  18. Long-term climate change assessment study plan for the Hanford Site Permanent Isolation Barrier Development Program

    International Nuclear Information System (INIS)

    Petersen, K.L.; Chatters, J.C.; Waugh, W.J.

    1993-05-01

    The Hanford Site Permanent Isolation Barrier Development Program (Barrier Development Program) was organized to develop the technology needed to provide an in-place disposal capability for low-level nuclear waste for the US Department of Energy at the Hanford Site in south-central Washington. The goal of the Barrier Development Program is to provide defensible evidence that final barrier design(s) will adequately control water infiltration, plant and animal intrusion, and wind and water erosion for a minimum of 1,000 yr; to isolate wastes from the accessible environment; and to use markers to warn inadvertent human intruders. Evidence for barrier performance will be obtained by conducting laboratory experiments, field tests, computer modeling, and other studies that establish confidence in the barrier's ability to meet its 1,000-yr design life

  19. Inadvertent chest tube insertion in congenital cystic adenomatoid malformation and congenital lobar emphysema-highlighting an important problem

    International Nuclear Information System (INIS)

    Prabhu, Shailesh M; Choudhury, Subhasis Roy; Solanki, Ravi S; Shetty, Gurucharan S; Agarwala, Surenderkumar

    2013-01-01

    Chest tube insertion in congenital cystic lung lesions is an important problem in children with acute respiratory distress having a cystic lucent lesion on chest radiograph. To evaluate the imaging findings and complications in cases of congenital cystic lung lesions with chest tube insertion and suggest the role of appropriate imaging for management of these patients. Chest radiographs and CT scans of children with congenital cystic lung lesions who had inadvertent chest tube insertion preoperatively were retrospectively reviewed for imaging appearances and complications. Fifteen patients comprising 10 cases of congenital cystic adenomatoid malformation (CCAM) and 5 cases of congenital lobar emphysema (CLE) were included. Majority of the cases were infants. CCAM was misdiagnosed as complicated pneumatocele (n = 5) and pneumothorax (n = 5), while CLE was misdiagnosed as tension pneumothorax (n = 5) on the chest radiograph findings. Final diagnosis was made on CT and operative findings with histopathology. Complications noted were pneumothorax, hydropneumothorax, and infection in cases of CCAM, and change in imaging appearance and pneumothorax in cases of CLE. Chest tube insertion in congenital cystic lesions increases the rate of associated complications. Chest CT has a definite role in early diagnosis and deciding appropriate management in these cases

  20. The social image of drinking - mass media campaigns may inadvertently increase binge drinking.

    Science.gov (United States)

    Zimmermann, Friederike; Kohlmann, Karoline; Monter, Anne; Ameis, Nina

    2017-10-01

    Mass media campaigns that promote responsible drinking are rarely tested for their usefulness in reducing heavy alcohol consumption. Existing campaigns that appeal to responsible drinking while simultaneously displaying young people in social drinking situations may even have paradoxical effects. To examine such possible effects, we drew on a real-world media campaign, which we systematically modified on the basis of recent prototype research. We pilot tested questionnaires (using n = 41 participants), developed two different sets of posters in the style of an existing campaign (n = 39) and investigated their effectiveness (n = 102). In the main study, young men were randomly assigned to one of three conditions: sociable or unsociable binge drinker prototype condition or a control group. Outcome variables were intention, behavioural willingness, attitude, subjective norm, self-efficacy, prototype evaluation and prototype similarity with respect to binge drinking. Binge drinking as a habit was included to control for the fact that habitual drinking in social situations is hard to overcome and poses a particular challenge to interventions. The manipulation check showed that the experimental variation (sociable vs. unsociable drinker prototype condition) was successful. Results of the main study showed that the sociable drinker prototype condition resulted in a higher willingness and - for those with less of a habit - a higher intention to binge drink the next weekend. The unsociable drinker prototype condition had no effects. The results imply that the social components of mass media campaigns might inadvertently exacerbate binge drinking in young men. We therefore advocate against campaigns including aspects of alcohol consumption that might be positively associated with drinker prototype perception. Finally, we provide suggestions for future research.

  1. Safety significance of inadvertent operation of motor-operated valves in nuclear power plants

    International Nuclear Information System (INIS)

    Ruger, C.J.; Higgins, J.C.; Carbonaro, J.F.; Hall, R.E.

    1994-01-01

    Concerns about the consequences of valve mispositioning were brought to the forefront following an event at Davis Besse in 1985. The concern related to the ability to reposition open-quotes position-changeableclose quotes motor-operated valves (MOVs) from the control room in the event of their inadvertent operation and was documented in U.S. Nuclear Regulatory Commission (USNRC) Bulletin 85-03 and Generic Letter (GL) 89-10. The mispositioned MOVs may not be able to be returned to their required position due to high differential pressure or high flow conditions across the valves. The inability to reposition such valves may have significantly safety consequences, as in the Davis Besse event. However, full consideration of such mispositioning in safety analyses and in MOV test programs can be labor intensive and expensive. Industry raised concerns that consideration of position-changeable valves under GL 89-10 would not decrease the probability of core damage to an extent that would justify licensee costs. As a response, Brookhaven National Laboratory has conducted separate scoping studies for both boiling water reactors (BWRs) and pressurized water reactors (PWRs) using probabilistic risk assessment (PRA) techniques to determine if such valve mispositioning by itself is significant to safety. The approach used internal events PRA models to survey the order of magnitude of the risk-significance of valve mispositioning by considering the failure of selected position-changeable MOVs. The change in core damage frequency was determined for each valve considered, and the results were presented as a risk increase ratio for each of four assumed MOV failure rates. The risk increase ratios resulting from this failure rate sensitivity study can be used as a basis for a determination of the risk-significance of the MOV mispositioning issues for BWRs and PWRs

  2. 2016 Survey of State-Level Health Resources for Men and Boys: Identification of an Inadvertent and Remediable Service and Health Disparity.

    Science.gov (United States)

    Fadich, Ana; Llamas, Ramon P; Giorgianni, Salvatore; Stephenson, Colin; Nwaiwu, Chimezie

    2018-03-01

    This survey evaluated resources available to men and boys at the state level including state public health departments (SPHDs), other state agencies, and governor's offices. Most of the resources and programs are found in the SPHDs and these administer state-initiated and federally funded health programs to provide services and protection to a broad range of populations; however, many men's health advocates believe that SPHDs have failed to create equivalent services for men and boys, inadvertently creating a health disparity. Men's Health Network conducts a survey of state resources, including those found in SPHDs, every 2 years to identify resources available for men and women, determine the extent of any disparity, and establish a relationship with SPHD officials. Data were obtained from all 50 states and Washington, D.C. An analysis of the 2016 survey data indicates that there are few resources allocated and a lack of readily available information on health and preventive care created specifically for men and boys. The data observed that most health information intended for men and boys was scarce among states or oftentimes included on websites that primarily focused on women's health. A potential result of this is a loss of engagement with appropriate health-care providers due to a lack of information. This study continues to validate the disparity between health outcomes for women and men. It continues to highlight the need for better resource allocation, outreach, and health programs specifically tailored to men and boys in order to improve overall community well-being.

  3. Operating limit study for the proposed solid waste landfill at Paducah Gaseous Diffusion Plant

    Energy Technology Data Exchange (ETDEWEB)

    Lee, D.W.; Wang, J.C.; Kocher, D.C.

    1995-06-01

    A proposed solid waste landfill at Paducah Gaseous Diffusion Plant (PGDP) would accept wastes generated during normal operations that are identified as non-radioactive. These wastes may include small amounts of radioactive material from incidental contamination during plant operations. A site-specific analysis of the new solid waste landfill is presented to determine a proposed operating limit that will allow for waste disposal operations to occur such that protection of public health and the environment from the presence of incidentally contaminated waste materials can be assured. Performance objectives for disposal were defined from existing regulatory guidance to establish reasonable dose limits for protection of public health and the environment. Waste concentration limits were determined consistent with these performance objectives for the protection of off-site individuals and inadvertent intruders who might be directly exposed to disposed wastes. Exposures of off-site individuals were estimated using a conservative, site-specific model of the groundwater transport of contamination from the wastes. Direct intrusion was analyzed using an agricultural homesteader scenario. The most limiting concentrations from direct intrusion or groundwater transport were used to establish the concentration limits for radionuclides likely to be present in PGDP wastes.

  4. Operating limit study for the proposed solid waste landfill at Paducah Gaseous Diffusion Plant

    International Nuclear Information System (INIS)

    Lee, D.W.; Wang, J.C.; Kocher, D.C.

    1995-06-01

    A proposed solid waste landfill at Paducah Gaseous Diffusion Plant (PGDP) would accept wastes generated during normal operations that are identified as non-radioactive. These wastes may include small amounts of radioactive material from incidental contamination during plant operations. A site-specific analysis of the new solid waste landfill is presented to determine a proposed operating limit that will allow for waste disposal operations to occur such that protection of public health and the environment from the presence of incidentally contaminated waste materials can be assured. Performance objectives for disposal were defined from existing regulatory guidance to establish reasonable dose limits for protection of public health and the environment. Waste concentration limits were determined consistent with these performance objectives for the protection of off-site individuals and inadvertent intruders who might be directly exposed to disposed wastes. Exposures of off-site individuals were estimated using a conservative, site-specific model of the groundwater transport of contamination from the wastes. Direct intrusion was analyzed using an agricultural homesteader scenario. The most limiting concentrations from direct intrusion or groundwater transport were used to establish the concentration limits for radionuclides likely to be present in PGDP wastes

  5. Performance Assessment for the Idaho National Laboratory Remote-Handled Low-Level Waste Disposal Facility

    Energy Technology Data Exchange (ETDEWEB)

    Annette L. Schafer; A. Jeffrey Sondrup; Arthur S. Rood

    2012-05-01

    This performance assessment for the Remote-Handled Low-Level Radioactive Waste Disposal Facility at the Idaho National Laboratory documents the projected radiological dose impacts associated with the disposal of low-level radioactive waste at the facility. This assessment evaluates compliance with the applicable radiological criteria of the U.S. Department of Energy and the U.S. Environmental Protection Agency for protection of the public and the environment. The calculations involve modeling transport of radionuclides from buried waste to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses are calculated for both offsite receptors and individuals who inadvertently intrude into the waste after site closure. The results of the calculations are used to evaluate the future performance of the low-level radioactive waste disposal facility and to provide input for establishment of waste acceptance criteria. In addition, one-factor-at-a-time, Monte Carlo, and rank correlation analyses are included for sensitivity and uncertainty analysis. The comparison of the performance assessment results to the applicable performance objectives provides reasonable expectation that the performance objectives will be met

  6. A Study on Establishment of Buffer Zone of Radioactive Waste Repository

    International Nuclear Information System (INIS)

    Yoon, Jeong Hyoun; Park, Joo Wan; Ju, Min Su; Kim, Chang Lak; Park, Jin Baek

    2008-01-01

    A new proposed repository has a final capacity of 800,000 drums radioactive waste. Most of foreign repositories have a general practice of segregating control zones which mainly contributes to classification of degree of control, whether it is called buffer zone or not. Domestic regulatory requirements of establishment of buffer zone in a repository are not much different from those of nuclear power plants for operation period, in which satisfactory design objective or performance objective is the most important factor in determination of the buffer zone. The meaning of buffer zone after closure is a minimum requested area which can prevent inadvertent intruders from leading to non-allowable exposure during institutional control period. Safety assessment with drinking well scenario giving rise to the highest probability of exposure among the intruder's actions can verify fulfillment of the buffer zone which is determined by operational safety of the repository. At present. for the repository to be constructed in a few years, the same procedure and concept as described in this paper are applied that can satisfy regulatory requirements and radiological safety as well. However, the capacity of the repository will be stepwise extended upto 800,000 drums, consequently its layout will be varied too. Timely considerations will be necessary for current boundary of the buffer zone which has been established on the basis of 100,000 drums disposal.

  7. Identification of deformed intruder states in semi-magic Ni70

    Energy Technology Data Exchange (ETDEWEB)

    Chiara, C. J.; Weisshaar, D.; Janssens, R. V. F.; Tsunoda, Y.; Otsuka, T.; Harker, J. L.; Walters, W. B.; Recchia, F.; Albers, M.; Alcorta, M.; Bader, V. M.; Baugher, T.; Bazin, D.; Berryman, J. S.; Bertone, P. F.; Campbell, C. M.; Carpenter, M. P.; Chen, J.; Crawford, H. L.; David, H. M.; Doherty, D. T.; Gade, A.; Hoffman, C. R.; Honma, M.; Kondev, F. G.; Korichi, A.; Langer, C.; Larson, N.; Lauritsen, T.; Liddick, S. N.; Lunderberg, E.; Macchiavelli, A. O.; Noji, S.; Prokop, C.; Rogers, A. M.; Seweryniak, D.; Shimizu, N.; Stroberg, S. R.; Suchyta, S.; Utsuno, Y.; Williams, S. J.; Wimmer, K.; Zhu, S.

    2015-04-01

    The structure of semi-magic Ni-70(28)42 was investigated following complementary multinucleon-transfer and secondary fragmentation reactions. Changes to the higher-spin, presumed negative-parity states based on observed gamma-ray coincidence relationships result in better agreement with shell-model calculations using effective interactions in the neutron f(5/2)pg(9/2) model space. The second 2(+) and (4(+)) states, however, can only be successfully described when proton excitations across the Z = 28 shell gap are included. Monte Carlo shell-model calculations suggest that the latter two states are part of a prolate-deformed intruder sequence, establishing an instance of shape coexistence at low excitation energies similar to that observed recently in neighboring Ni-68.

  8. Properties of low-lying intruder states in $^{34}$Al and $^{34}$Si sequentially populated in $\\beta$-decay of $^{34}$Mg

    CERN Multimedia

    A low-lying long-lived (26±1 ms) isomer in $^{34}$Al has been observed recently and assigned as 1$^{+}$ state of intruder character. It was populated in $^{36}$S fragmentation and feeds, in $\\beta$-decay, the 0$_{2}^{+}$ state in $^{34}$Si whose excitation energy and lifetime were determined in an electron-positron pairs spectroscopy experiment. In the present experiment we intend to measure for the first time the $\\gamma$-rays following the $\\beta$-decay of $^{34}$Mg. Despite the interest for $^{34}$Mg, the up-right corner of the “N$\\thicksim$20 island of inversion”, the only information on its $\\beta$-decay is the lifetime of 20±10 ms, determined from $\\beta$-neutron coincidences. As a result of the proposed experiment, we expect to place the first transitions in the level scheme of $^{34}$Al and to strongly populate the newly observed isomer, measuring its excitation energy, if the branching ratio to 4$^{−}$ ground state is significant. Theoretical estimations for the $\\beta$-decay of the new isome...

  9. Radioactive Waste Management Complex low-level waste radiological performance assessment

    Energy Technology Data Exchange (ETDEWEB)

    Maheras, S.J.; Rood, A.S.; Magnuson, S.O.; Sussman, M.E.; Bhatt, R.N.

    1994-04-01

    This report documents the projected radiological dose impacts associated with the disposal of radioactive low-level waste at the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory. This radiological performance assessment was conducted to evaluate compliance with applicable radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the public and the environment. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses were made for both offsite receptors and individuals inadvertently intruding onto the site after closure. In addition, uncertainty and sensitivity analyses were performed. The results of the analyses indicate compliance with established radiological criteria and provide reasonable assurance that public health and safety will be protected.

  10. Radioactive Waste Management Complex low-level waste radiological performance assessment

    International Nuclear Information System (INIS)

    Maheras, S.J.; Rood, A.S.; Magnuson, S.O.; Sussman, M.E.; Bhatt, R.N.

    1994-04-01

    This report documents the projected radiological dose impacts associated with the disposal of radioactive low-level waste at the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory. This radiological performance assessment was conducted to evaluate compliance with applicable radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the public and the environment. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses were made for both offsite receptors and individuals inadvertently intruding onto the site after closure. In addition, uncertainty and sensitivity analyses were performed. The results of the analyses indicate compliance with established radiological criteria and provide reasonable assurance that public health and safety will be protected

  11. Special Analysis: Revision of Saltstone Vault 4 Disposal Limits (U)

    Energy Technology Data Exchange (ETDEWEB)

    Cook, J

    2005-05-26

    New disposal limits have been computed for Vault 4 of the Saltstone Disposal Facility based on several revisions to the models in the existing Performance Assessment and the Special Analysis issued in 2002. The most important changes are the use of a more rigorous groundwater flow and transport model, and consideration of radon emanation. Other revisions include refinement of the aquifer mesh to more accurately model the footprint of the vault, a new plutonium chemistry model accounting for the different transport properties of oxidation states III/IV and V/VI, use of variable infiltration rates to simulate degradation of the closure system, explicit calculation of gaseous releases and consideration of the effects of settlement and seismic activity on the vault structure. The disposal limits have been compared with the projected total inventory expected to be disposed in Vault 4. The resulting sum-of-fractions of the 1000-year disposal limits is 0.2, which indicates that the performance objectives and requirements of DOE 435.1 will not be exceeded. This SA has not altered the conceptual model (i.e., migration of radionuclides from the Saltstone waste form and Vault 4 to the environment via the processes of diffusion and advection) of the Saltstone PA (MMES 1992) nor has it altered the conclusions of the PA (i.e., disposal of the proposed waste in the SDF will meet DOE performance measures). Thus a PA revision is not required and this SA serves to update the disposal limits for Vault 4. In addition, projected doses have been calculated for comparison with the performance objectives laid out in 10 CFR 61. These doses are 0.05 mrem/year to a member of the public and 21.5 mrem/year to an inadvertent intruder in the resident scenario over a 10,000-year time-frame, which demonstrates that the 10 CFR 61 performance objectives will not be exceeded. This SA supplements the Saltstone PA and supersedes the two previous SAs (Cook et al. 2002; Cook and Kaplan 2003).

  12. Long-Term Performance of Transuranic Waste Inadvertently Disposed in a Shallow Land Burial Trench at the Nevada Test Site

    International Nuclear Information System (INIS)

    Shott, Gregory J.; Yucel, Vefa

    2009-01-01

    In 1986, 21 m3 of transuranic (TRU) waste was inadvertently disposed in a shallow land burial trench at the Area 5 Radioactive Waste Management Site on the Nevada Test Site. U.S. Department of Energy (DOE) TRU waste must be disposed in accordance with Title 40, Code of Federal Regulations (CFR), Part 191, Environmental Radiation Protection Standard for Management and Disposal of Spent Nuclear Fuel, High-Level, and Transuranic Radioactive Wastes. The Waste Isolation Pilot Plant is the only facility meeting these requirements. The National Research Council, however, has found that exhumation of buried TRU waste for disposal in a deep geologic repository may not be warranted when the effort, exposures, and expense of retrieval are not commensurate with the risk reduction achieved. The long-term risks of leaving the TRU waste in-place are evaluated in two probabilistic performance assessments. A composite analysis, assessing the dose from all disposed waste and interacting sources of residual contamination, estimates an annual total effective dose equivalent (TEDE) of 0.01 mSv, or 3 percent of the dose constraint. A 40 CFR 191 performance assessment also indicates there is reasonable assurance of meeting all requirements. The 40 CFR 191.15 annual mean TEDE for a member of the public is estimated to reach a maximum of 0.055 mSv at 10,000 years, or approximately 37 percent of the 0.15 mSv individual protection requirement. In both assessments greater than 99 percent of the dose is from co-disposed low-level waste. The simulated probability of the 40 CFR 191.13 cumulative release exceeding 1 and 10 times the release limit is estimated to be 0.0093 and less than 0.0001, respectively. Site characterization data and hydrologic process modeling support a conclusion of no groundwater pathway within 10,000 years. Monte Carlo uncertainty analysis indicates that there is reasonable assurance of meeting all regulatory requirements. Sensitivity analysis indicates that the results

  13. Posterior reversible encephalopathy syndrome following an inadvertent dural puncture during an emergency laparotomy for ischemic colitis – a case report

    Directory of Open Access Journals (Sweden)

    Shah R

    2014-01-01

    Full Text Available Reena Shah, Agnieszka Kubisz-Pudelko, Jeremy Reid Yeovil District Hospital, Yeovil, UK Abstract: Posterior reversible encephalopathy syndrome (PRES is a clinico-neuroradiological syndrome characterized by various symptoms of neurological disease. It has commonly been reported in association with acute hypertension, pre-eclampsia, eclampsia, sepsis, and exposure to immunosuppressants. Here, we report on a normotensive woman who developed a severe frontal headache, visual disturbances, and hypertension 3 days after undergoing an emergency laparotomy for ischemic colitis during which she suffered an inadvertent dural puncture. Neuro-imaging revealed features consistent with PRES. The patient went on to make a good recovery, being discharged 21 days postoperatively, with only minor visual disturbances and memory problems. This case highlights the importance of awareness of PRES to all specialties. On reviewing the literature, we feel that PRES may be a potential differential diagnosis to post-procedural neurological symptoms in those patients undergoing routine procedures such as spinal anesthetics or lumbar punctures. Keywords: PRES, neurological disease, lumbar puncture, spinal anesthetic

  14. Calculations for BDAS Setpoint with Non-conservative Boron Dilution Analysis

    International Nuclear Information System (INIS)

    Lee, Hwan Soo; Shin, Ho Cheol; Kim, Yong Bae

    2014-01-01

    BDAS (Boron Dilution Alarm System) utilizes the ex-core detector instrumentation signals to detect a possible inadvertent boron dilution event during operation mode 3, 4, 5, 6. For boron dilution analysis, discrepancies in the active coolant volume and the assumed linearity of the ex-core instrumentation response were identified for CE type PWR and they were reported by NASL-04-02 These discrepancies have potential to impact to determine BDAS setpoint in a non-conservative manner Therefore, in this study, the calculation of BDAS setpoint with those discrepancies condition about OPR1000 was performed and analyzed for checking the safety of BDAS. The new BDAS setpoint is calculated with conservative condition which recommended from Westinghouse Electric Company. The setpoint of BDAS using non-linear ICRR curve decrease to about 5% compared to the setpoint of that using linear ICRR curve. And this effect of the non-linearity is to slightly delay the boron dilution alarm during the inadvertence boron dilution at mode 3, 4, and 5

  15. Design analysis report: high-integrity container for disposal of EPICOR-II prefilter liners

    International Nuclear Information System (INIS)

    Chapman, R.L.; Reno, H.W.

    1983-06-01

    A high-integrity container has been developed to (a) immobilize the EPIROC-II prefilter liners from Unit-2 of the Three Mile Island (TMI) Nuclear Power Station, and (b) protect possible future, inadvertent intruders from damaging radiation. The container is designed for disposal depths to 90 feet in either wet or dry subsurface conditions. A built-in vent system for each container will permit the release of gas and function as a water barrier at pressures reaching 45 psig. The container has outside dimensions of 62.5 inches diameter by 84 inches high, and is designed to ensure a 300-year functional life. Its design features multiple barriers that prevent corrosives from penetrating container walls. The multiple-barrier approach provides a 1204-year mean time to total failure, based on an assumed single-event-failure probability of 20%. The multiple-corrosion-barrier concept is supplemented by aluminum hydroxide, which reduces the chemical activity of corrosives potentially arising from chemical decomposition of organic resins in the EPICOR-II prefilter liner. Aluminum hydroxide, an effective amphoteric material, tends to neutralize both acids and bases. An epoxy seal between the lid and container body functions as a barrier against any loss of container contents. Two separate epoxy materials fill the space between the lid and container body; they form a seal, mechanically bonding the lid in place. After curing, this epoxy material has a greater strength than the concrete; thus, the concrete has to fail in order for the lid to loosen

  16. Wellbore enlargement investigation: Potential analogs to the Waste Isolation Pilot Plant during inadvertent intrusion of the repository

    International Nuclear Information System (INIS)

    Boak, D.M.; Dotson, L.; Aguilar, R.

    1997-01-01

    This study involved the evaluation and documentation of cases in which petroleum wellbores were enlarged beyond the nominal hole diameter as a consequence of erosion during exploratory drilling, particularly as a function of gas flow into the wellbore during blowout conditions. A primary objective was to identify analogs to potential wellbore enlargement at the Waste Isolation Pilot Plant (WIPP) during inadvertent human intrusion. Secondary objectives were to identify drilling scenarios associated with enlargement, determine the physical extent of enlargement, and establish the physical properties of the formation in which the enlargement occurred. No analogs of sufficient quality to establish quantitative limits on wellbore enlargement at the WIPP disposal system were identified. However, some information was obtained regarding the frequency of petroleum well blowouts and the likelihood that such blowouts would bridge downhole, self-limiting the surface release of disposal-system material. Further work would be necessary, however, to determine the conditions under which bridging could occur and the extent to which the bridging might be applicable to WIPP. In addition, data on casing sizes of petroleum boreholes in the WIPP vicinity support the use of a 12-1/4 inch borehole size in WIPP performance assessment calculations. Finally, although data are limited, there was no evidence of significant wellbore enlargement in any of three blowouts that occur-red in wellbores in the Delaware Basin (South Culebra Bluff Unit No. 1, Energy Research and Development Administration (ERDA) 6, and WIPP 12)

  17. DOE's performance evaluation project for mixed low-level waste disposal

    International Nuclear Information System (INIS)

    Waters, R.D.; Chu, M.S.Y.; Gruebel, M.M.; Lee, D.W.

    1995-01-01

    A performance evaluation (PE) is an analysis that estimates radionuclide concentration limits for 16 potential Department of Energy (DOE) mixed low-level waste (ULLW) disposal sites based on the analysis of two environmental exposure pathways (air and water) to an off-site individual and an inadvertent-intruder exposure pathway. Sites are analyzed for their ability to attenuate concentrations of specific radionuclides that could be released from wastes in a hypothetical ULLW disposal facility. Site-specific data and knowledge are used within a generic framework that is consistent across all sites being evaluated. After estimates of waste concentrations for the three pathways are calculated, the minimum of the waste concentration values is selected as the permissible waste concentration for each radionuclide. The PE results will be used as input to the process for DOE's ULLW disposal configuration. Preliminary comparisons of results from the PE and site-specific performance assessments indicate that the simple PE results generally agree with results of the performance assessments, even when site conditions are complex. This agreement with performance-assessment results increases confidence that similar results can be obtained at other sites that have good characterization data. In addition, the simple analyses contained in the PE illustrate a potential method to satisfy the needs of many regulators and the general public for a simple, conservative, defensible, and easily understandable analysis that provides results similar to those of more complex analyses

  18. Les femmes et le langage selon Charles Bally: "des moments de décevante inadvertance"?

    Directory of Open Access Journals (Sweden)

    Durrer, Sylvie

    2002-01-01

    Full Text Available Les problématiques rassemblées parfois sous la désignation de "Language and Gender" figurent également dans les publications du linguiste suisse Charles Bally. Cet axe de réflexion, qui n’a guère été remarqué dans son œuvre, mérite d’être mis en lumière, non pas pour faire de Bally un féministe avant l’heure, mais simplement, parce qu’il nous semble important de documenter l’histoire d’une problématique en plein essor. Cet article a donc pour objectif de montrer que la question du traitement des femmes et du féminin par la langue française suscite de nombreuses réflexions dès la fin du XIXe. Il s’agira de procéder à une histoire critique d’un épisode de la "linguistique générique", afin de voir si les actuelles thématiques de cette orientation sont abordées, sous quels aspects, dans quels contextes, avec quels résultats, etc. On pourrait alors être surpris-e de découvrir que Charles Bally n’était pas un cas isolé, mais qu’un grand nombre de contemporains (Nyrop, Brunot, Vendryès, Damourette & Pichon, Dauzat, etc., se sont eux aussi interrogés, plus ou moins longuement, sur les rapports entre les femmes, le féminin et le langage. Les réflexions "génériques" de Bally et de ses confrères ne sauraient donc être regardées comme de simples "moments décevante inadvertance".

  19. Experience during the monitoring of inactive scrap for the detection of inadvertent presence of radioactivity

    International Nuclear Information System (INIS)

    Sharma, Ranjit; Kumar, Anoj; Vikas; Patra, R.P.; Kumar, Vikas; Singh, Rajvir; Pradeepkumar, K.S.

    2012-01-01

    The inspection and certification of scrap material from nuclear facilities is a regulatory requirement to ensure that radioactive material will not reach public domain. Around the world, cases involving radioactive contamination of metallic components have occurred due to radioactive sources/contaminated metal scrap reaching the public domain. Radiological monitoring of inactive scrap material is essential as it may get into various usages in public domain where controls cannot be implemented. The method of detection is measurement of gamma dose rates due to any loose/fixed radioactive contamination in the scrap or presence of any radioactive material/source. In addition prevention of any inadvertent/malicious act leading to radioactive material reaching the public domain through scrap being essential, this monitoring gains further importance. This paper describes the methodology and experience in detection of presence of radioactivity at inactive Scrap monitoring facility. Even though radioactive sources of high strength with potential for serious environmental hazard have not been detected, few cases of contaminated material (MS plate/equipments etc with extremely low level of 137 Cs and Uranium contamination) have been detected and identified using portable gamma spectrometer. If proper monitoring is not carried out the dispersal of radioactivity to the environment can be a matter of concern due to metal scrap reaching recycling industry resulting in huge cost of decontamination and waste disposal. These events may also have negative impact on the export from the country resulting in economic losses. The impact of such events can be ruled out by effective scrap monitoring techniques which ensure that even small quantity of radioactivity escaping into public domain can be prevented. The methodology followed for monitoring of inactive scrap is found to be effective even for detection of presence of very low level of radioactivity

  20. Coupling Effect of Intruding Water and Inherent Gas on Coal Strength Based on the Improved (Mohr-Coulomb Failure Criterion

    Directory of Open Access Journals (Sweden)

    Yiyu Lu

    2016-11-01

    Full Text Available When employing hydraulic processes to increase gas drainage efficiency in underground coal mines, coal seams become a three-phase medium, containing water intruding into the coal pores with the inherent occurrence of gas. This can change the stress state of the coal and cause instability. This work studied the mechanical properties of coal containing water and gas and derived an appropriate failure criterion. Based on mixture theory of unsaturated porous media, the effective stress of coal, considering the interaction of water and gas, was analyzed, and the failure criterion established by combining this with the Mohr–Coulomb criterion. By introducing the stress factor of matrix suction and using fitted curves of experimentally determined matrix suction and moisture content, the relationships between coal strength, gas pressure, and moisture content were determined. To verify the established strength theory, a series of triaxial compression strength tests of coal containing water and gas were carried out on samples taken from the Songzao, Pingdingshan, and Tashan mines in China. The experimental results correlated well with the theoretical predictions. The results showed a linear decrease in the peak strength of coal with increasing gas pressure and an exponential reduction in peak strength with increasing moisture content. The strength theory of coal containing water and gas can become an important part of multiphase medium damage theory.

  1. Active body surface warming systems for preventing complications caused by inadvertent perioperative hypothermia in adults.

    Science.gov (United States)

    Madrid, Eva; Urrútia, Gerard; Roqué i Figuls, Marta; Pardo-Hernandez, Hector; Campos, Juan Manuel; Paniagua, Pilar; Maestre, Luz; Alonso-Coello, Pablo

    2016-04-21

    Inadvertent perioperative hypothermia is a phenomenon that can occur as a result of the suppression of the central mechanisms of temperature regulation due to anaesthesia, and of prolonged exposure of large surfaces of skin to cold temperatures in operating rooms. Inadvertent perioperative hypothermia has been associated with clinical complications such as surgical site infection and wound-healing delay, increased bleeding or cardiovascular events. One of the most frequently used techniques to prevent inadvertent perioperative hypothermia is active body surface warming systems (ABSW), which generate heat mechanically (heating of air, water or gels) that is transferred to the patient via skin contact. To assess the effectiveness of pre- or intraoperative active body surface warming systems (ABSW), or both, to prevent perioperative complications from unintended hypothermia during surgery in adults. We searched the Cochrane Central Register of Controlled Trials (CENTRAL; Issue 9, 2015); MEDLINE (PubMed) (1964 to October 2015), EMBASE (Ovid) (1980 to October 2015), and CINAHL (Ovid) (1982 to October 2015). We included randomized controlled trials (RCTs) that compared an ABSW system aimed at maintaining normothermia perioperatively against a control or against any other ABSW system. Eligible studies also had to include relevant clinical outcomes other than measuring temperature alone. Several authors, by pairs, screened references and determined eligibility, extracted data, and assessed risks of bias. We resolved disagreements by discussion and consensus, with the collaboration of a third author. We included 67 trials with 5438 participants that comprised 79 comparisons. Forty-five RCTs compared ABSW versus control, whereas 18 compared two different types of ABSW, and 10 compared two different techniques to administer the same type of ABSW. Forced-air warming (FAW) was by far the most studied intervention.Trials varied widely regarding whether the interventions were

  2. Radiological performance assessment for the Z-Area Saltstone Disposal Facility

    Energy Technology Data Exchange (ETDEWEB)

    Cook, J.R.; Fowler, J.R. [Westinghouse Savannah River Co., Aiken, SC (United States)

    1992-12-18

    This radiological performance assessment (RPA) for the Savannah River Site (SRS) Saltstone Disposal Facility (SDF) was prepared in accordance with the requirements of Chapter III of the US Department of Energy Order 5820.2A. The Order specifies that an RPA should provide reasonable assurance that a low-level waste (LLW) disposal facility will comply with the performance objectives of the Order. The performance objectives require that: (1) exposures of the general public to radioactivity in the waste or released from the waste will not result in an effective dose equivalent of 25 mrem per year; (2) releases to the atmosphere will meet the requirements of 40 CFR 61; (3) inadvertent intruders will not be committed to an excess of an effective dose equivalent of 100 mrem per year from chronic exposure, or 500 mrem from a single acute exposure; and (4) groundwater resources will be protected in accordance with Federal, State and local requirements.

  3. Radiological performance assessment for the Z-Area Saltstone Disposal Facility

    International Nuclear Information System (INIS)

    Cook, J.R.; Fowler, J.R.

    1992-01-01

    This radiological performance assessment (RPA) for the Savannah River Site (SRS) Saltstone Disposal Facility (SDF) was prepared in accordance with the requirements of Chapter III of the US Department of Energy Order 5820.2A. The Order specifies that an RPA should provide reasonable assurance that a low-level waste (LLW) disposal facility will comply with the performance objectives of the Order. The performance objectives require that: (1) exposures of the general public to radioactivity in the waste or released from the waste will not result in an effective dose equivalent of 25 mrem per year; (2) releases to the atmosphere will meet the requirements of 40 CFR 61; (3) inadvertent intruders will not be committed to an excess of an effective dose equivalent of 100 mrem per year from chronic exposure, or 500 mrem from a single acute exposure; and (4) groundwater resources will be protected in accordance with Federal, State and local requirements

  4. Evidence utilisation project: Management of inadvertent perioperative hypothermia. The challenges of implementing best practice recommendations in the perioperative environment.

    Science.gov (United States)

    Munday, Judy; Hines, Sonia Jane; Chang, Anne M

    2013-12-01

    The prevention of inadvertent perioperative hypothermia (IPH) remains an important issue in perioperative healthcare. The aims of this project were to: (i) assess current clinical practice in the management of IPH and (ii) promote best practice in the management of IPH in adult operating theatres. This project from August 2010 to March 2012 utilised a system of audit and feedback to implement best practice recommendations. Data were collected via chart audits against criteria developed from best practice recommendations for managing IPH. Evidence-based best practices, such as consistent temperature monitoring and patient warming, were implemented using multifaceted interventions. Perioperative records for 73 patients (baseline) and 72 patients (post-implementation) were audited. Post-implementation audit showed an increase in patients with temperatures >36°C admitted to the post-anaesthetic care unit (PACU) (8%) and discharged from PACU (28%). The percentage of patients receiving preoperative temperature monitoring increased (38%); however, low levels of intraoperative monitoring remained (31% of patients with surgery of 30 min or longer duration). Small increases were found in patient warming of 5% intraoperatively and 8% postoperatively. Preoperative warming was not successfully implemented during this phase of the project. Temperature monitoring, warming and rates of normothermia improved; however, barriers to best practice of IPH management were experienced, which negatively impacted on the project. Further stages of implementation and audit were added to further address IPH management in this department. © 2013 The Authors. International Journal of Evidence-Based Healthcare © 2013 The Joanna Briggs Institute.

  5. Analysis of operating experience data in nuclear power plants

    International Nuclear Information System (INIS)

    Watanabe, Norio; Hirano, Masashi; Oikawa, Tetsukuni

    1991-09-01

    This report analyzes pressurized water reactor (PWR) and boiling water reactor (BWR) experience involving loss of decay heat removal (DHR) during reactor shutdown. Referring to USNRC's Licensee Event Reports (LERs), OECD/NEA-IRS reports, etc., we selected 206 loss of DHR events which have occurred in PWRs between 1976 and 1990 and 48 events in BWRs between 1985 and 1990. Analysis of 197 events which have occurred in U.S. PWRs indicates that the following direct causes are major contributions resulting in loss of DHR during reactor shutdown: 1) Inadvertent automatic closure of the suction/isolation valves in residual heat removal (RHR) system, 2) RHR pump cavitation due to air entrainment in reduced coolant inventory condition, and 3) Loss of power to RHR pumps. Human factors deficiencies involving procedural inadequacies and personnel errors were identified as the most significant underlying or root causes of the loss of DHR events. Most of the errors were committed during maintenance, testing and repair works. As for 48 events in U.S. BWRs, the leading category of loss DHR events was the inadvertent automatic closure of the suction/isolation valves in RHR system, most of which were caused by human errors. This report describes the above analysis results and presents the events description for the selected significant events. As well, the brief descriptions of the 206 events in PWRs and 48 events in BWRs are provided in Appendix. (author)

  6. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock -revision 1

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1996-04-01

    Canada has conducted an extensive research program on a concept of safe disposal of nuclear fuel wastes deep In plutonic rock of the Canadian Shield. An essential goal of this program has been to develop and demonstrate a methodology to evaluate the performance of the facility against safety criteria established by Canada's regulatory agency, the Atomic Energy Control Board. These criteria are expressed in terms of risk, where risk is defined as the sum, over all significant scenarios, of the product of the probability of the scenario, the magnitude of the resultant dose, and the probability of a health effect per unit dose. This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicity displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information. (author). 53 refs., 8 tabs., 2 figs

  7. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock -revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Wuschke, D M

    1996-04-01

    Canada has conducted an extensive research program on a concept of safe disposal of nuclear fuel wastes deep In plutonic rock of the Canadian Shield. An essential goal of this program has been to develop and demonstrate a methodology to evaluate the performance of the facility against safety criteria established by Canada`s regulatory agency, the Atomic Energy Control Board. These criteria are expressed in terms of risk, where risk is defined as the sum, over all significant scenarios, of the product of the probability of the scenario, the magnitude of the resultant dose, and the probability of a health effect per unit dose. This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicity displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information. (author). 53 refs., 8 tabs., 2 figs.

  8. Warming of intravenous and irrigation fluids for preventing inadvertent perioperative hypothermia.

    Science.gov (United States)

    Campbell, Gillian; Alderson, Phil; Smith, Andrew F; Warttig, Sheryl

    2015-04-13

    Inadvertent perioperative hypothermia (a drop in core temperature to below 36°C) occurs because of interference with normal temperature regulation by anaesthetic drugs, exposure of skin for prolonged periods and receipt of large volumes of intravenous and irrigation fluids. If the temperature of these fluids is below core body temperature, they can cause significant heat loss. Warming intravenous and irrigation fluids to core body temperature or above might prevent some of this heat loss and subsequent hypothermia. To estimate the effectiveness of preoperative or intraoperative warming, or both, of intravenous and irrigation fluids in preventing perioperative hypothermia and its complications during surgery in adults. We searched the Cochrane Central Register of Controlled Trials (CENTRAL) (2014, Issue 2), MEDLINE Ovid SP (1956 to 4 February 2014), EMBASE Ovid SP (1982 to 4 February 2014), the Institute for Scientific Information (ISI) Web of Science (1950 to 4 February 2014), Cumulative Index to Nursing and Allied Health Literature (CINAHL) EBSCOhost (1980 to 4 February 2014) and reference lists of identified articles. We also searched the Current Controlled Trials website and ClinicalTrials.gov. We included randomized controlled trials or quasi-randomized controlled trials comparing fluid warming methods versus standard care or versus other warming methods used to maintain normothermia. Two review authors independently extracted data from eligible trials and settled disputes with a third review author. We contacted study authors to ask for additional details when needed. We collected data on adverse events only if they were reported in the trials. We included in this review 24 studies with a total of 1250 participants. The trials included various numbers and types of participants. Investigators used a range of methods to warm fluids to temperatures between 37°C and 41°C. We found that evidence was of moderate quality because descriptions of trial design were

  9. Performance objectives for disposal of low-level radioactive wastes on the Oak Ridge Reservation

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1986-01-01

    This paper presents a set of performance objectives for disposal of low-level radioactive wastes in a new facility on the Oak Ridge Reservation. The principal performance objectives include (1) a limit on annual committed effective dose equivalent averaged over a lifetime of 0.25 mSv (25 mrem) for any member of the general public beyond the boundary of the disposal facility, and (2) a limit on annual committed effective dose equivalent averaged over a lifetime of 1 mSv (100 mrem) and a limit on committed effective dose equivalent in any year of 5 mSv (500 mrem) for any individual who inadvertently intrudes onto the disposal site after loss of active institutional controls. The use of annual committed effective dose equivalents averaged over a lifetime departs from customary practice in environmental radiation standards in the U.S. of specifying limits on actual dose received in any year to whole body or the critical organ, but provides a set of performance objectives that are more closely related to the fundamental goal of limiting risk from chronic lifetime exposures. (Auth.)

  10. Development of closure criteria for inactive radioactive waste disposal sites at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1989-01-01

    The Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA), as amended, specifies that cleanup of inactive waste disposal sites at Department of Energy (DOE) facilities shall at least attain legally applicable or relevant and appropriate requirements (ARARs) for cleanup or control of environmental contamination. This paper discusses potential ARARs for cleanup of inactive radioactive waste disposal sites and proposes a set of closure criteria for such sites at Oak Ridge National Laboratory (ORNL). The most important potential ARARs include Federal standards for radiation protection of the public, radioactivity in drinking water, and near-surface land disposal of radioactive wastes. On the basis of these standards, we propose that cleanup and closure of inactive radioactive waste disposal sites at ORNL shall achieve (1) limits on annual effective dose equivalent for off-site individuals and inadvertent intruders that conform to the DOE's performance objectives for new low-level waste disposal facilities and (2) to the extent reasonably achievable, limits on radionuclide concentrations in ground water and surface waters in accordance with Federal drinking water standards and ground-water protection requirements

  11. Selection of Computer Codes for Shallow Land Waste Disposal in PPTA Serpong

    International Nuclear Information System (INIS)

    Syahrir

    1996-01-01

    Selection of Computer Codes for Shallow Land Waste Disposal in PPTA Serpong. Models and computer codes have been selected for safety assessment of near surface waste disposal facility. This paper provides a summary and overview of the methodology and codes selected. The methodology allows analyses of dose to individuals from offsite releases under normal conditions as well as on-site doses to inadvertent intruders. A demonstration in the case of shallow land waste disposal in Nuclear Research Establishment are in Serpong has been given for normal release scenario. The assessment includes infiltration of rainfall, source-term, ground water (well) and surface water transport, food-chain and dosimetry. The results show dose history of maximally exposed individuals. The codes used are VS2DT, PAGAN and GENII. The application of 1 m silt loam as a moisture barrier cover decreases flow in the disposal unit by a factor of 27. The selected radionuclides show variety of dose histories according to their chemical and physical characteristics and behavior in the environment

  12. TRACE and TRAC-BF1 benchmark against Leibstadt plant data during the event inadvertent opening of relief valves

    Energy Technology Data Exchange (ETDEWEB)

    Sekhri, A.; Baumann, P. [KernkraftwerkLeibstadt AG, 5325 Leibstadt (Switzerland); Wicaksono, D. [Swiss Federal Inst. of Technology Zurich ETH, 8092 Zurich (Switzerland); Miro, R.; Barrachina, T.; Verdu, G. [Inst. for Industrial, Radiophysical and Environmental Safety ISIRYM, Universitat Politecnica de Valencia UPV, Cami de Vera s/n, 46021 Valencia (Spain)

    2012-07-01

    In framework of introducing TRACE code to transient analyses system codes for Leibstadt Power Plant (KKL), a conversion process of existing TRAC-BF1 model to TRACE has been started within KKL. In the first step, TRACE thermal-hydraulic model for KKL has been developed based on existing TRAC-BF1 model. In order to assess the code models a simulation of plant transient event is required. In this matter simulations of inadvertent opening of 8 relief valves event have been performed. The event occurs at KKL during normal operation, and it started when 8 relief valves open resulting in depressurization of the Reactor Pressure Vessel (RPV). The reactor was shutdown safely by SCRAM at low level. The high pressure core spray (HPCS) and the reactor core isolation cooling (RCIC) have been started manually in order to compensate the level drop. The remaining water in the feedwater (FW) lines flashes due to saturation conditions originated from RPV depressurization and refills the reactor downcomer. The plant boundary conditions have been used in the simulations and the FW flow rate has been adjusted for better prediction. The simulations reproduce the plant data with good agreement. It can be concluded that the TRAC-BF1 existing model has been used successfully to develop the TRACE model and the results of the calculations have shown good agreement with plant recorded data. Beside the modeling assessment, the TRACE and TRAC-BF1 capabilities to reproduce plant physical behavior during the transient have shown satisfactory results. The first step of developing KKL model for TRACE has been successfully achieved and this model is further developed in order to simulate more complex plant behavior such as Turbine Trip. (authors)

  13. TRACE and TRAC-BF1 benchmark against Leibstadt plant data during the event inadvertent opening of relief valves

    International Nuclear Information System (INIS)

    Sekhri, A.; Baumann, P.; Wicaksono, D.; Miro, R.; Barrachina, T.; Verdu, G.

    2012-01-01

    In framework of introducing TRACE code to transient analyses system codes for Leibstadt Power Plant (KKL), a conversion process of existing TRAC-BF1 model to TRACE has been started within KKL. In the first step, TRACE thermal-hydraulic model for KKL has been developed based on existing TRAC-BF1 model. In order to assess the code models a simulation of plant transient event is required. In this matter simulations of inadvertent opening of 8 relief valves event have been performed. The event occurs at KKL during normal operation, and it started when 8 relief valves open resulting in depressurization of the Reactor Pressure Vessel (RPV). The reactor was shutdown safely by SCRAM at low level. The high pressure core spray (HPCS) and the reactor core isolation cooling (RCIC) have been started manually in order to compensate the level drop. The remaining water in the feedwater (FW) lines flashes due to saturation conditions originated from RPV depressurization and refills the reactor downcomer. The plant boundary conditions have been used in the simulations and the FW flow rate has been adjusted for better prediction. The simulations reproduce the plant data with good agreement. It can be concluded that the TRAC-BF1 existing model has been used successfully to develop the TRACE model and the results of the calculations have shown good agreement with plant recorded data. Beside the modeling assessment, the TRACE and TRAC-BF1 capabilities to reproduce plant physical behavior during the transient have shown satisfactory results. The first step of developing KKL model for TRACE has been successfully achieved and this model is further developed in order to simulate more complex plant behavior such as Turbine Trip. (authors)

  14. Large-scale experiments for the vulnerability analysis of buildings impacted and intruded by fluviatile torrential hazard processes

    Science.gov (United States)

    Sturm, Michael; Gems, Bernhard; Fuchs, Sven; Mazzorana, Bruno; Papathoma-Köhle, Maria; Aufleger, Markus

    2016-04-01

    In European mountain regions, losses due to torrential hazards are still considerable high despite the ongoing debate on an overall increasing or decreasing trend. Recent events in Austria severely revealed that due to technical and economic reasons, an overall protection of settlements in the alpine environment against torrential hazards is not feasible. On the side of the hazard process, events with unpredictable intensities may represent overload scenarios for existent protection structures in the torrent catchments. They bear a particular risk of significant losses in the living space. Although the importance of vulnerability is widely recognised, there is still a research gap concerning its assessment. Currently, potential losses at buildings due to torrential hazards and their comparison with reinstatement costs are determined by the use of empirical functions. Hence, relations of process intensities and the extent of losses, gathered by the analysis of historic hazard events and the information of object-specific restoration values, are used. This approach does not represent a physics-based and integral concept since relevant and often crucial processes, as the intrusion of the fluid-sediment-mixture into elements at risk, are not considered. Based on these findings, our work is targeted at extending these findings and models of present risk research in the context of an integral, more physics-based vulnerability analysis concept. Fluviatile torrential hazard processes and their impacts on the building envelope are experimentally modelled. Material intrusion processes are thereby explicitly considered. Dynamic impacts are gathered quantitatively and spatially distributed by the use of a large set of force transducers. The experimental tests are accomplished with artificial, vertical and skewed plates, including also openings for material intrusion. Further, the impacts on specific buildings within the test site of the work, the fan apex of the Schnannerbach

  15. PWR core safety analysis with 3-dimensional methods

    International Nuclear Information System (INIS)

    Gensler, A.; Kühnel, K.; Kuch, S.

    2015-01-01

    Highlights: • An overview of AREVA’s safety analysis codes their coupling is provided. • The validation base and licensing applications of these codes are summarized. • Coupled codes and methods provide improved margins and non-conservative results. • Examples for REA and inadvertent opening of the pressurizer safety valve are given. - Abstract: The main focus of safety analysis is to demonstrate the required safety level of the reactor core. Because of the demanding requirements, the quality of the safety analysis strongly affects the confidence in the operational safety of a reactor. To ensure the highest quality, it is essential that the methodology consists of appropriate analysis tools, an extensive validation base, and last but not least highly educated engineers applying the methodology. The sophisticated 3-dimensional core models applied by AREVA ensure that all physical effects relevant for safety are treated and the results are reliable and conservative. Presently AREVA employs SCIENCE, CASMO/NEMO and CASCADE-3D for pressurized water reactors. These codes are currently being consolidated into the next generation 3D code system ARCADIA®. AREVA continuously extends the validation base, including measurement campaigns in test facilities and comparisons of the predictions of steady state and transient measured data gathered from plants during many years of operation. Thus, the core models provide reliable and comprehensive results for a wide range of applications. For the application of these powerful tools, AREVA is taking benefit of its interdisciplinary know-how and international teamwork. Experienced engineers of different technical backgrounds are working together to ensure an appropriate interpretation of the calculation results, uncertainty analysis, along with continuously maintaining and enhancing the quality of the analysis methodologies. In this paper, an overview of AREVA’s broad application experience as well as the broad validation

  16. Influence of i{sub 13/2} proton and j{sub 15/2} neutron intruding orbitals on the behaviour of 190 mass region superdeformed nuclei; Influence des orbitales intruses proton i{sub 13/2} et neutron j{sub 15/2} sur le comportement des noyaux superdeformes de la region de masse 190

    Energy Technology Data Exchange (ETDEWEB)

    Duprat, J

    1995-01-01

    This work concerns the study of the nuclear superdeformation phenomenon in the A = 190 mass region. The superdeformed (SD) states in {sup 193}Tl, {sup 194}Tl {sup 195}Tl were produced via heavy-ion induced reactions and studied with the EUROGAM gamma multidetector array. The analysis of high-multiplicity events allowed the study of the magnetic properties of the SD states in these nuclei. For the first time, the g-factor of a proton orbital in a SD nucleus in the A = 190 mass region has been extracted. This measurement indicates that the two known bands in {sup 195}Tl-SD are built on the i{sub 13/2} proton intruder orbital. A new SD band has been found in this isotope: it is the first SD band built on an excited proton state found in the A = 190 region. Finally an interaction between two pairs of bands has been established in {sup 194}Tl; this interaction indicate the crossing of two neutron orbitals above the N = 112 gap. The magnetic properties of the states of the SD bands in {sup 194}Tl reveals that these bands are built on configurations in which the single proton and neutron intrinsic spins are aligned. Comparison between different SD bands in the Thallium isotopes shows the prominent role of the i{sub 13/2} proton and the j{sub 15/2} neutron intruder orbitals in the smooth increase of the dynamical moment of inertia as a function of the rotational frequency. In addition, this work reports on the first observation of a SD rotational band produced in a (HI, {alpha}xn) reaction channel. The study of the maximum spin reached by the SD bands indicates both a competition between alpha emission and fission of the compound nucleus, and the limitation due to the fission process in the population of the SD nuclei in the A = 190 region. (author). 120 refs., 112 figs., 22 tabs., 2 ann.

  17. Identification of risk factors for post-endoscopic retrograde cholangiopancreatography pancreatitis in a high volume center.

    Science.gov (United States)

    Phillip, Veit; Schwab, Miriam; Haf, David; Algül, Hana

    2017-01-01

    Pancreatitis is the most common complication of endoscopic retrograde cholangiopancreatography (ERCP). Several patients´ or procedure related risk factors for post-ERCP pancreatitis (PEP) have been suggested. The aim of this study was to validate the risk factors for PEP in a high-volume center. All patients undergoing first time ERCP at a tertiary referral center between December 2010 and October 2013 were retrospectively included. PEP was defined according to the Atlanta Classification. 344 patients were included in the final analysis. The risk to develop PEP was increased in patients with chronic pancreatitis (odds ratio 3.7) and after inadvertent cannulation of the pancreatic duct (odds ratio 2.2), which occurred in 26.5% of the patients. Inadvertent cannulation occurred significantly more frequently in patients with difficult cannulation of the papilla duodeni major (odds ratio 12.7; passociated with an increased risk for difficult cannulation (odds ratio 3.0). Inadvertent cannulation of the pancreatic duct is a procedure related risk factor for PEP. Measurements on preventing inadvertent cannulation of the pancreatic duct should be established and studies on prophylactic measurements should focus particularly on patients with inadvertent cannulation of the pancreatic duct.

  18. The Use Of Computational Human Performance Modeling As Task Analysis Tool

    Energy Technology Data Exchange (ETDEWEB)

    Jacuqes Hugo; David Gertman

    2012-07-01

    During a review of the Advanced Test Reactor safety basis at the Idaho National Laboratory, human factors engineers identified ergonomic and human reliability risks involving the inadvertent exposure of a fuel element to the air during manual fuel movement and inspection in the canal. There were clear indications that these risks increased the probability of human error and possible severe physical outcomes to the operator. In response to this concern, a detailed study was conducted to determine the probability of the inadvertent exposure of a fuel element. Due to practical and safety constraints, the task network analysis technique was employed to study the work procedures at the canal. Discrete-event simulation software was used to model the entire procedure as well as the salient physical attributes of the task environment, such as distances walked, the effect of dropped tools, the effect of hazardous body postures, and physical exertion due to strenuous tool handling. The model also allowed analysis of the effect of cognitive processes such as visual perception demands, auditory information and verbal communication. The model made it possible to obtain reliable predictions of operator performance and workload estimates. It was also found that operator workload as well as the probability of human error in the fuel inspection and transfer task were influenced by the concurrent nature of certain phases of the task and the associated demand on cognitive and physical resources. More importantly, it was possible to determine with reasonable accuracy the stages as well as physical locations in the fuel handling task where operators would be most at risk of losing their balance and falling into the canal. The model also provided sufficient information for a human reliability analysis that indicated that the postulated fuel exposure accident was less than credible.

  19. Equine ulnar fracture repair with locking compression plates can be associated with inadvertent penetration of the lateral cortex of the radius.

    Science.gov (United States)

    Kuemmerle, Jan M; Kühn, Karolin; Bryner, Marco; Fürst, Anton E

    2013-10-01

    To evaluate if the use of locking head screws (LHS) in the distal holes of a locking compression plate (LCP) applied to the caudal aspect of the ulna to treat equine ulnar fractures is associated with a risk of injury to the lateral cortex of the radius. Controlled laboratory study. Cadaveric equine forelimbs (n = 8 pair). After transverse ulnar osteotomy, osteosynthesis was performed with a narrow 10-13 hole 4.5/5.0 LCP applied to the caudal aspect of each ulna. The distal 3 holes were filled with 4.5 mm cortex screws (CS) in 1 limb (group 1) and with 5.0 mm LHS contralaterally (group 2). CS were inserted in an angle deemed appropriate by the surgeon and LHS were inserted perpendicular to the plate. Implant position and injury to the lateral cortex of the radius were assessed by radiography, CT, and limb dissection. In group 1, injury of the lateral radius cortex did not occur. In group 2, 4 limbs and 6/24 LHS were associated with injury of the lateral radius cortex by penetration of a LHS. This difference was statistically significant. CS were inserted with a mean angle of 17.6° from the sagittal plane in a caudolateral-craniomedial direction. Use of LHS in the distal part of a LCP applied to the caudal aspect of the ulna is associated with a risk of inadvertent injury to the lateral cortex of the radius. © Copyright 2013 by The American College of Veterinary Surgeons.

  20. Ecological Automation Design, Extending Work Domain Analysis

    NARCIS (Netherlands)

    Amelink, M.H.J.

    2010-01-01

    In high–risk domains like aviation, medicine and nuclear power plant control, automation has enabled new capabilities, increased the economy of operation and has greatly contributed to safety. However, automation increases the number of couplings in a system, which can inadvertently lead to more

  1. Are Brazil nuts attractive?

    Science.gov (United States)

    Sanders, Duncan A; Swift, Michael R; Bowley, R M; King, P J

    2004-11-12

    We present event-driven simulation results for single and multiple intruders in a vertically vibrated granular bed. Under our vibratory conditions, the mean vertical position of a single intruder is governed primarily by a buoyancylike effect. Multiple intruders also exhibit buoyancy governed behavior; however, multiple neutrally buoyant intruders cluster spontaneously and undergo horizontal segregation. These effects can be understood by considering the dynamics of two neutrally buoyant intruders. We have measured an attractive force between such intruders which has a range of five intruder diameters, and we provide a mechanistic explanation for the origins of this force.

  2. Identification of risk factors for post-endoscopic retrograde cholangiopancreatography pancreatitis in a high volume center.

    Directory of Open Access Journals (Sweden)

    Veit Phillip

    Full Text Available Pancreatitis is the most common complication of endoscopic retrograde cholangiopancreatography (ERCP. Several patients´ or procedure related risk factors for post-ERCP pancreatitis (PEP have been suggested. The aim of this study was to validate the risk factors for PEP in a high-volume center.All patients undergoing first time ERCP at a tertiary referral center between December 2010 and October 2013 were retrospectively included. PEP was defined according to the Atlanta Classification.344 patients were included in the final analysis. The risk to develop PEP was increased in patients with chronic pancreatitis (odds ratio 3.7 and after inadvertent cannulation of the pancreatic duct (odds ratio 2.2, which occurred in 26.5% of the patients. Inadvertent cannulation occurred significantly more frequently in patients with difficult cannulation of the papilla duodeni major (odds ratio 12.7; p<0.001. ERCP on call was associated with an increased risk for difficult cannulation (odds ratio 3.0.Inadvertent cannulation of the pancreatic duct is a procedure related risk factor for PEP. Measurements on preventing inadvertent cannulation of the pancreatic duct should be established and studies on prophylactic measurements should focus particularly on patients with inadvertent cannulation of the pancreatic duct.

  3. Analysis of Two Electrocution Accidents in Greece that Occurred due to Unexpected Re-energization of Power Lines

    Directory of Open Access Journals (Sweden)

    Aikaterini D. Baka

    2014-09-01

    Full Text Available Investigation and analysis of accidents are critical elements of safety management. The over-riding purpose of an organization in carrying out an accident investigation is to prevent similar accidents, as well as seek a general improvement in the management of health and safety. Hundreds of workers have suffered injuries while installing, maintaining, or servicing machinery and equipment due to sudden re-energization of power lines. This study presents and analyzes two electrical accidents (1 fatal injury and 1 serious injury that occurred because the power supply was reconnected inadvertently or by mistake.

  4. Analysis of Two Electrocution Accidents in Greece that Occurred due to Unexpected Re-energization of Power Lines.

    Science.gov (United States)

    Baka, Aikaterini D; Uzunoglu, Nikolaos K

    2014-09-01

    Investigation and analysis of accidents are critical elements of safety management. The over-riding purpose of an organization in carrying out an accident investigation is to prevent similar accidents, as well as seek a general improvement in the management of health and safety. Hundreds of workers have suffered injuries while installing, maintaining, or servicing machinery and equipment due to sudden re-energization of power lines. This study presents and analyzes two electrical accidents (1 fatal injury and 1 serious injury) that occurred because the power supply was reconnected inadvertently or by mistake.

  5. The development of surface barriers at the Hanford Site

    International Nuclear Information System (INIS)

    Wing, N.R.; Gee, G.W.

    1994-03-01

    Engineered barriers are being developed to isolate wastes disposed of near the earth's surface at the US Department of Energy's (DOE) Hanford Site near Richland, Washington. Much of the waste that would be disposed of by in-place stabilization currently is located in relatively shallow subsurface structures such as solid waste burial grounds, tanks, vaults, and cribs. Unless protected in some way, the wastes could be transported to the accessible environment via the following pathways: plant, animal, and human intrusion; water infiltration; erosion; and the exhalation of noxious gases. Permanent isolation surface barriers have been proposed to protect wastes disposed of ''in place'' from the transport pathways identified previously (Figure 1). The protective barrier consists of a variety of different materials (e.g., fine soil, sand, gravel, riprap, asphalt, etc.) placed in layers to form an above-grade mound directly over the waste zone. Surface markers are being considered for placement around the periphery of the waste sites to inform future generations of the nature and hazards of the buried wastes. In addition, throughout the protective barrier, subsurface markers could be placed to warn any inadvertent human intruders of the dangers of the buried wastes (Figure 2)

  6. U.S. Nuclear Regulatory Commission Role and Activities Related to U.S. Department of Energy Incidental Waste Determinations

    International Nuclear Information System (INIS)

    Bradford, A.H.; Esh, D.W.; Ridge, A.C.

    2006-01-01

    Section 3116 of the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 (NDAA) requires the U.S. Department of Energy (DOE) to consult with the U.S. Nuclear Regulatory Commission (NRC) for certain non-high level waste (HLW) determinations. Under the NDAA, NRC performs consultative technical reviews of DOE's waste determinations and monitors DOE's disposal actions for such waste, but the NRC does not have regulatory authority over DOE's waste disposal activities. The NDAA provides the criteria that must be met to determine that waste is not HLW. The criteria require that the waste does not need to be disposed of in a geologic repository, that highly radioactive radionuclides be removed to the maximum extent practical, and that the performance objectives of 10 CFR 61, Subpart C, be met. The performance objectives contain criteria for protection of the public, protection of inadvertent intruders, protection of workers, and stability of the disposal site after closure. This paper describes NRC's approach to implementing its responsibilities under the NDAA, as well as similar activities being performed for sites not covered by the NDAA. (authors)

  7. Definition of intrusion scenarios and example concentration ranges for the disposal of near-surface waste at the Hanford Site

    International Nuclear Information System (INIS)

    Aaberg, R.L.; Kennedy, W.E. Jr.

    1990-10-01

    The US Department of Energy (DOE) is in the process of conducting performance assessments of its radioactive waste sites and disposal systems to ensure that public health and safety are protected, the environment is preserved, and that no remedial actions after disposal are required. Hanford Site low-level waste performance assessments are technical evaluations of waste sites or disposal systems that provide a basis for making decisions using established criteria. The purpose of this document is to provide a family of scenarios to be considered when calculating radionuclide exposure to individuals who may inadvertently intrude into near-surface waste disposal sites. Specific performance assessments will use modifications of the general scenarios described here to include additional site/system details concerning the engineering design, waste form, inventory, and environmental setting. This document also describes and example application of the Hanford-specific scenarios in the development of example concentration ranges for the disposal of near-surface wastes. The overall goal of the example calculations is to illustrate the application of the scenarios in a performance assessment to assure that people in the future cannot receive a dose greater than an established limit. 24 refs., 2 figs., 5 tabs

  8. Grout treatment facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1988-01-01

    The long-term performance of the grout disposal system for Phosphate/Sulfate Waste (PSW) was analyzed. PSW is a low-level liquid generated by activities associated with N Reactor operations. The waste will be mixed with dry solids and permanently disposed of as a cementitious grout in sub-surface concrete vaults at Hanford's 200-East Area. Two categories of scenarios were analyzed that could cause humans to be exposed to radionuclides and chemicals from the grouted waste: contaminated groundwater and direct intrusion. In the groundwater scenario, contaminants are released from the buried grout monoliths, then eventually transported via the groundwater to the Columbia River. As modeled, the contaminants are assumed to leach out of the monoliths at a constant rate over a 10,000-year period. The other category of exposure involves intruders who inadvertently contact the waste directly, either by drilling, excavating, or gardening. Long-term impacts that could result from disposal of PSW grout were expressed in terms of incremental increases of (1) chemical concentrations in the groundwater and surface waters, and (2) radiation doses. None of the calculated impacts exceeded the corresponding regulatory limits set by Washington State, Department of Energy, or the Nuclear Regulatory Commission

  9. Long-term climate change assessment study plan for the Hanford Site permanent isolation Barrier Development Program

    International Nuclear Information System (INIS)

    Petersen, K.L.; Chatters, J.C.; Waugh, W.J.

    1992-07-01

    The Hanford Site Permanent Isolation Barrier Development Program (Barrier Development Program) was organized to develop the technology needed to provide an in-place disposal capability for the Hanford Site (Adams and Wing 1986; Wig and Gee 1990). The goal of the Barrier Development Program is to provide defensible evidence that final barrier design(s) will adequately control water infiltration; plant and animal intrusion; and wind and water erosion for a minimum of 1,000 yr and isolate wastes from the accessible environment and warm inadvertent human intruders using markers. This document describes the long-term climate change studies planned to support the Barrier Development Program. The plan outlines a multi-year and multi-discipline approach to assess long-term climate change issues and to help optimize the design of the permanent isolation barriers. A multi-disciplinary approach to climatic data acquisition will be responsible for obtaining needed information for concurrent barrier tasks and for developing a local climate forecast model. This model will couple past climate patterns with models of regional and global climate drivers to provide bounding conditions for barrier performance assessment analyses

  10. Distributed Tracing of Intruders

    National Research Council Canada - National Science Library

    Staniford-Chen, Stuart G

    1995-01-01

    .... One of the things that facilitates this malfeasance is that computer networks provide the ability for a user to log into multiple computer systems in sequence, changing identity with each step...

  11. Anticipated transient without scram analysis of the simplified boiling water reactor following main steam isolation valve closure with boron injection

    International Nuclear Information System (INIS)

    Khan, H.J.; Cheng, H.S.; Rohatgi, U.S.

    1996-01-01

    The simplified boiling water reactor (SBWR) operating in natural circulation is designed with many passive safety features. An anticipated transient without scram (ATWS) initiated by inadvertent closure of the main steam isolation valve (MSIV) in an SBWR has been analyzed using the RAMONA-4B code of Brookhaven National Laboratory. This analysis demonstrates the predicted performance of the SBWR during an MSIV closure ATWS, followed by shutdown of the reactor through injection of boron into the reactor core from the standby liquid control system

  12. An overlooked environmental issue? A review of the inadvertent formation of PCB-11 and other PCB congeners and their occurrence in consumer products and in the environment.

    Science.gov (United States)

    Vorkamp, Katrin

    2016-01-15

    Polychlorinated biphenyls (PCBs) are banned from production and use in most countries as they are persistent organic pollutants (POPs) of concern for environment and health. Recent research has pointed at a new environment issue resulting from the inadvertent formation of PCBs in certain processes, in particular the pigment production. PCB-11 is a major by-product in these processes, but PCB-28, PCB-52, PCB-77 as well as the nonachlorinated PCBs and PCB-209 have been found in pigments and consumer products as well. In addition to environmental emissions via point sources, in particular related to industrial and municipal wastewater, atmospheric transport seems to be important for the global distribution of PCB-11. Thus, PCB-11 has also been detected in the polar regions. Worldwide air concentrations appear relatively uniform, but maxima have been found in urban and industrialised areas. Data on the uptake and accumulation of PCB-11 in the food chain are still inconclusive: Although food web studies do not show biomagnification, PCB-11 has been detected in humans. The human exposure might originate from the direct contact to consumer products as well as from the omnipresence of PCB-11 in the environment. Copyright © 2015 Elsevier B.V. All rights reserved.

  13. Intruder dose pathway analysis for the onsite disposal of commercial radioactive waste

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.

    1984-10-01

    Because of uncertainties associated with assessing the potential risks from onsite burials of commercial radioactive waste, the US Nuclear Regulatory Commission (NRC) has amended its regulations to provide greater assurance that buried radioactive material will not present a hazard to public health and safety. The amended regulations now require licensees to apply for approval of proposed procedures for onsite disposal pursuant to 10 CFR 20.302. The NRC technically reviews these requests on a case-by-case basis. These technical reviews require modeling potential pathways to man and projecting radiation dose commitments. This paper contains a summary of our efforts to develop human-intrusion scenarios and to modify a version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. The ONSITE/MAXI1 computer software package contains four computer codes. ONSITE is the interactive user interface that allows the end-user to simply and efficiently create and use the radiation-exposure scenarios. MAXI1 is then used with the scenario information to calculate the maximum annual dose to the exposed individual from selected pathways. 1 figure

  14. A Case of Transfusion Error in a Trauma Patient With Subsequent Root Cause Analysis Leading to Institutional Change.

    Science.gov (United States)

    Clifford, Sean Patrick; Mick, Paul Brian; Derhake, Brian Matthew

    2016-01-01

    A 28-year-old man presented emergently to the operating room following a gun-shot injury to his right groin. Our hospital's Massive Transfusion Protocol was initiated as the patient entered the operating room actively hemorrhaging and severely hypotensive. During the aggressive resuscitation efforts, the patient was inadvertently transfused 2 units of packed red blood cells intended for another patient due to a series of errors. Fortunately, the incorrect product was compatible, and the patient recovered from his near-fatal injuries. Root cause analysis was used to review the transfusion error and develop an action plan to help prevent future occurrences.

  15. Evaluation of costs accrued through inadvertent continuation of hospital-initiated proton pump inhibitor therapy for stress ulcer prophylaxis beyond hospital discharge: a retrospective chart review

    Directory of Open Access Journals (Sweden)

    Shin S

    2015-04-01

    Full Text Available Sooyoung Shin Ajou University College of Pharmacy, Yeongtong-gu, Suwon-si, Gyeonggi-do, South Korea Background: Stress ulcers and related upper gastrointestinal bleeding are well-known complications in intensive care unit (ICU patients. Proton pump inhibitor (PPI-based stress ulcer prophylaxis (SUP has been widely prescribed in noncritically ill patients who are at low risk for clinically significant bleeding, which is then injudiciously continued after hospital discharge. This study aimed to evaluate the incidence of inappropriate prescribing of PPI-based preventative therapy in ICU versus non-ICU patients that subsequently continued postdischarge, and to estimate the costs incurred by the unwarranted outpatient continuation of PPI therapy.Methods: A retrospective review of patient data at a major teaching hospital in Korea was performed. During the 4-year study period, adult patients who were newly initiated on PPI-based SUP during hospital admission and subsequently discharged on a PPI without a medical indication for such therapy were captured for data analysis. The incidence rates of inappropriate prescribing of PPIs were compared between ICU and non-ICU patients, and the costs associated with such therapy were also examined.Results: A total of 4,410 patients, more than half of the inpatient-initiated PPI users, were deemed to have been inadvertently prescribed a PPI at discharge in the absence of a medical need for acid suppression. The incidence of inappropriate outpatient continuation of the prophylaxis was higher among ICU patients compared with non-ICU patients (57.7% versus 52.2%, respectively; P=0.001. The total expenditure accrued through the continuation of nonindicated PPI therapy was approximately US$40,175.Conclusion: This study confirmed that excess usage of PPIs for SUP has spread to low-risk, non-ICU patients. The overuse of unwarranted PPI therapy can incur large health care expenditure, as well as clinical complications

  16. Derivation of upper bound concentration of LLW for land disposal in Taiwan

    International Nuclear Information System (INIS)

    Chang, F.D.; Liou, C.T.; Su, M.F.; Tsai, S.C.

    1989-01-01

    The upper bound concentrations of radionuclides in the low level waste to be disposed in Taiwan are investigated based on a proposed reference site with all of the scenarios and exposure pathways reflecting the local conditions and environmental characteristics. The analysis reveals that most of the upper bound concentrations are determined from the scenario of intruder-agriculture. It can also be found that the Transuranic radionuclides and those with long half-lives are the dominant radionuclides which result in major radiological impact to the environment in this intruder-agriculture scenario

  17. Special Analysis of Transuranic Waste in Trench T04C at the Area 5 Radioactive Waste Management Site, Nevada Test Site, Nye County, Nevada, Revision 1

    International Nuclear Information System (INIS)

    Greg Shott; Vefa Yucel; Lloyd Desotell

    2008-01-01

    This Special Analysis (SA) was prepared to assess the potential impact of inadvertent disposal of a limited quantity of transuranic (TRU) waste in classified Trench 4 (T04C) within the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada Test Site (NTS). The Area 5 RWMS is a low-level radioactive waste disposal site in northern Frenchman Flat on the Nevada Test Site (NTS). The Area 5 RWMS is regulated by the U.S. Department of Energy (DOE) under DOE Order 435.1 and DOE Manual (DOE M) 435.1-1. The primary objective of the SA is to evaluate if inadvertent disposal of limited quantities of TRU waste in a shallow land burial trench at the Area 5 RWMS is in compliance with the existing, approved Disposal Authorization Statement (DAS) issued under DOE M 435.1-1. In addition, supplemental analyses are performed to determine if there is reasonable assurance that the requirements of Title 40, Code of Federal Regulations (CFR), Part 191, Environmental Radiation Protection Standards for Management and Disposal of Spent Nuclear Fuel, High-Level, and Transuranic Radioactive Wastes, can be met. The 40 CFR 191 analyses provide supplemental information regarding the risk to human health and the environment of leaving the TRU waste in T04C. In 1989, waste management personnel reviewing classified materials records discovered that classified materials buried in trench T04C at the Area 5 RWMS contained TRU waste. Subsequent investigations determined that a total of 102 55-gallon drums of TRU waste from Rocky Flats were buried in trench T04C in 1986. The disposal was inadvertent because unclassified records accompanying the shipment indicated that the waste was low-level. The exact location of the TRU waste in T04C was not recorded and is currently unknown. Under DOE M 435.1-1, Chapter IV, Section P.5, low-level waste disposal facilities must obtain a DAS. The DAS specifies conditions that must be met to operate within the radioactive waste management basis, consisting of a

  18. Special Analysis of Transuranic Waste in Trench T04C at the Area 5 Radioactive Waste Management Site, Nevada Test Site, Nye County, Nevada, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Greg Shott, Vefa Yucel, Lloyd Desotell

    2008-05-01

    This Special Analysis (SA) was prepared to assess the potential impact of inadvertent disposal of a limited quantity of transuranic (TRU) waste in classified Trench 4 (T04C) within the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada Test Site (NTS). The Area 5 RWMS is a low-level radioactive waste disposal site in northern Frenchman Flat on the Nevada Test Site (NTS). The Area 5 RWMS is regulated by the U.S. Department of Energy (DOE) under DOE Order 435.1 and DOE Manual (DOE M) 435.1-1. The primary objective of the SA is to evaluate if inadvertent disposal of limited quantities of TRU waste in a shallow land burial trench at the Area 5 RWMS is in compliance with the existing, approved Disposal Authorization Statement (DAS) issued under DOE M 435.1-1. In addition, supplemental analyses are performed to determine if there is reasonable assurance that the requirements of Title 40, Code of Federal Regulations (CFR), Part 191, Environmental Radiation Protection Standards for Management and Disposal of Spent Nuclear Fuel, High-Level, and Transuranic Radioactive Wastes, can be met. The 40 CFR 191 analyses provide supplemental information regarding the risk to human health and the environment of leaving the TRU waste in T04C. In 1989, waste management personnel reviewing classified materials records discovered that classified materials buried in trench T04C at the Area 5 RWMS contained TRU waste. Subsequent investigations determined that a total of 102 55-gallon drums of TRU waste from Rocky Flats were buried in trench T04C in 1986. The disposal was inadvertent because unclassified records accompanying the shipment indicated that the waste was low-level. The exact location of the TRU waste in T04C was not recorded and is currently unknown. Under DOE M 435.1-1, Chapter IV, Section P.5, low-level waste disposal facilities must obtain a DAS. The DAS specifies conditions that must be met to operate within the radioactive waste management basis, consisting of a

  19. Performance analysis for disposal of mixed low-level waste. 1: Methodology

    International Nuclear Information System (INIS)

    Waters, R.D.; Gruebel, M.M.

    1999-01-01

    A simple methodology has been developed for evaluating the technical capabilities of potential sites for disposal of mixed low-level radioactive waste. The results of the evaluation are expressed as permissible radionuclide concentrations in disposed waste. The methodology includes an analysis of three separate pathways: (1) releases of radionuclides to groundwater; (2) releases of potentially volatile radionuclides to the atmosphere; and (3) the consequences of inadvertent intrusion into a disposal facility. For each radionuclide, its limiting permissible concentration in disposed waste is the lowest of the permissible concentrations determined from each of the three pathways. These permissible concentrations in waste at an evaluated site can be used to assess the capability of the site to dispose of waste streams containing multiple radionuclides

  20. Optimal Stabilization of Social Welfare under Small Variation of Operating Condition with Bifurcation Analysis

    Science.gov (United States)

    Chanda, Sandip; De, Abhinandan

    2016-12-01

    A social welfare optimization technique has been proposed in this paper with a developed state space based model and bifurcation analysis to offer substantial stability margin even in most inadvertent states of power system networks. The restoration of the power market dynamic price equilibrium has been negotiated in this paper, by forming Jacobian of the sensitivity matrix to regulate the state variables for the standardization of the quality of solution in worst possible contingencies of the network and even with co-option of intermittent renewable energy sources. The model has been tested in IEEE 30 bus system and illustrious particle swarm optimization has assisted the fusion of the proposed model and methodology.

  1. Context for performance assessment

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1997-01-01

    In developing its recommendations on performance assessment for disposal of low-level radioactive waste, Scientific committee 87-3 of the National Council on Radiation Protection and Measurements (NCRP) has considered a number of topics that provide a context for the development of suitable approaches to performance assessment. This paper summarizes the Committee' discussions on these topics, including (1) the definition of low-level waste and its sources and properties, as they affect the variety of wastes that must be considered, (2) fundamental objectives and principles of radioactive waste disposal and their application to low-level waste, (3) current performance objectives for low-level waste disposal in the US, with particular emphasis on such unresolved issues of importance to performance assessment as the time frame for compliance, requirements for protection of groundwater and surface water, inclusion of doses from radon, demonstrating compliance with fixed performance objectives using highly uncertain model projections, and application of the principle that releases to the environment should be maintained as low as reasonably achievable (ALARA), (4) the role of active and passive institutional controls over disposal sites, (5) the role of the inadvertent human intruder in low-level waste disposal, (6) model validation and confidence in model outcomes, and (7) the concept of reasonable assurance of compliance

  2. Radiological pathways analysis for spent solvents from the boiler chemical cleaning at the Pickering Nuclear Site

    International Nuclear Information System (INIS)

    Garisto, N.C.; Eslami, Z.; Hodgins, S.; Beaman, T.; Von Svoboda, S.; Marczak, J.

    2006-01-01

    Spent solvents are generated as a result of Boiler Chemical Cleanings (BCC) at CANDU reactor sites. These solutions contain small amount of radioactivity from a number of different sources including: Cut tubes - short sections of boiler tubes are infrequently removed from the boilers for a detailed characterization. These tubes are typically only plugged at the tubesheet allowing the primary side deposits to be exposed to BCC solvents. Tube leaks - primary to secondary side leaks also occur infrequently as a result of tube degradation. Radioactivity from the leaking fluid can consequently be deposited in the sludge on the secondary side of the tubes. Diffusion of tritium - during normal operation of the reactor units, tritium slowly diffuses from the heavy water in the primary heat-transfer system to the light-water coolant on the secondary side. Some of this tritium is retained in the secondary side deposits. The Pickering Nuclear Generating Station (PNGS) would like the flexibility to have several options for handling the spent solvent waste and associated rinse water from BCC. To this end, a radiological pathways analysis was undertaken to determine dose consequences associated with each option. Sample results from this study are included in this paper. The pathways analysis is used in this study to calculate dose to hypothetical receptors including individuals such as truck drivers, incinerator workers, residue (ash) handlers, residents who live near the landfill, inadvertent intruders into the landfill after closure and residents who live near the outfall. This dose is compared to a de minimis dose. A de minimis dose or dose rate represents a level of risk, which is generally accepted as being of no significance. Shipments of spent solvents and rinse water with corresponding doses below de minimis can be sent to conventional (i.e., non-radioactive) landfills for incineration and disposal as the radioactive dose associated with them is much less than natural

  3. Uncertainty analysis of one Main Circulation Pump trip event at the Ignalina NPP

    International Nuclear Information System (INIS)

    Vileiniskis, V.; Kaliatka, A.; Uspuras, E.

    2004-01-01

    One Main Circulation Pump (MCP) trip event is an anticipated transient with expected frequency of approximately one event per year. There were a few events when one MCP was inadvertently tripped. The throughput of the rest running pumps in the affected Main Circulation Circuit loop increased, however, the total coolant flow through the affected loop decreased. The main question arises whether this coolant flow rate is sufficient for adequate core cooling. This paper presents an investigation of one MCP trip event at the Ignalina NPP. According to international practice, the transient analysis should consist of deterministic analysis by employing best-estimate codes and uncertainty analysis. For that purpose, the plant's RELAP5 model and the GRS (Germany) System for Uncertainty and Sensitivity Analysis package (SUSA) were employed. Uncertainty analysis of flow energy loss in different parts of the Main Circulation Circuit, initial conditions and code-selected models was performed. Such analysis allows to estimate the influence of separate parameters on calculation results and to find the modelling parameters that have the largest impact on the event studied. On the basis of this analysis, recommendations for the further improvement of the model have been developed. (author)

  4. Control and Management of Radioactive Material Inadvertently Incorporated into Scrap Metal. Proceedings of an International Conference

    International Nuclear Information System (INIS)

    2011-01-01

    Radioactive substances can become associated with scrap metal in various ways and if not discovered they can be incorporated into steel and non-ferrous metals through the melting process. This can cause health hazards as well as environmental concerns and there can be serious commercial implications. Numerous incidents have occurred in recent years involving the discovery of radioactive substances in scrap metal and, in some cases, in metal from the melting process. These incidents have proved to be very costly in relation to the recovery and cleanup operations required but also in terms of the potential loss of confidence of the industry in scrap metal as a resource. This has led the scrap metal industry to seek ways of managing the problem. In most countries, shipments of scrap metal are monitored but at different points in the distribution chain and to different extents and efficiencies. As yet, only limited efforts towards unifying and harmonizing monitoring strategies and methods in the context of scrap metal have been made at the international level. The Conference was organized into five sessions: the global perspective, national policies and strategies, compliance with radiological criteria, management of incidents with contaminated scrap metal, and improving confidence and protecting the interests of stakeholders. The aim of the first session was to present the views and perspectives of the different organizations concerned with radioactive material in scrap metal, scrap metal recycling, steel making, radiation source security and safety and international trade and economics. The second session covered some of the national policies and strategies being used to address the control of radioactive material that has been inadvertently incorporated into scrap metal were presented. In addition to the oral presentations, contributions describing the situation in many countries of the world in the form of posters were displayed. The many posters reporting national

  5. Control and Management of Radioactive Material Inadvertently Incorporated into Scrap Metal. Proceedings of an International Conference

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-15

    Radioactive substances can become associated with scrap metal in various ways and if not discovered they can be incorporated into steel and non-ferrous metals through the melting process. This can cause health hazards as well as environmental concerns and there can be serious commercial implications. Numerous incidents have occurred in recent years involving the discovery of radioactive substances in scrap metal and, in some cases, in metal from the melting process. These incidents have proved to be very costly in relation to the recovery and cleanup operations required but also in terms of the potential loss of confidence of the industry in scrap metal as a resource. This has led the scrap metal industry to seek ways of managing the problem. In most countries, shipments of scrap metal are monitored but at different points in the distribution chain and to different extents and efficiencies. As yet, only limited efforts towards unifying and harmonizing monitoring strategies and methods in the context of scrap metal have been made at the international level. The Conference was organized into five sessions: the global perspective, national policies and strategies, compliance with radiological criteria, management of incidents with contaminated scrap metal, and improving confidence and protecting the interests of stakeholders. The aim of the first session was to present the views and perspectives of the different organizations concerned with radioactive material in scrap metal, scrap metal recycling, steel making, radiation source security and safety and international trade and economics. The second session covered some of the national policies and strategies being used to address the control of radioactive material that has been inadvertently incorporated into scrap metal were presented. In addition to the oral presentations, contributions describing the situation in many countries of the world in the form of posters were displayed. The many posters reporting national

  6. Collisional model for granular impact dynamics.

    Science.gov (United States)

    Clark, Abram H; Petersen, Alec J; Behringer, Robert P

    2014-01-01

    When an intruder strikes a granular material from above, the grains exert a stopping force which decelerates and stops the intruder. Many previous studies have used a macroscopic force law, including a drag force which is quadratic in velocity, to characterize the decelerating force on the intruder. However, the microscopic origins of the force-law terms are still a subject of debate. Here, drawing from previous experiments with photoelastic particles, we present a model which describes the velocity-squared force in terms of repeated collisions with clusters of grains. From our high speed photoelastic data, we infer that "clusters" correspond to segments of the strong force network that are excited by the advancing intruder. The model predicts a scaling relation for the velocity-squared drag force that accounts for the intruder shape. Additionally, we show that the collisional model predicts an instability to rotations, which depends on the intruder shape. To test this model, we perform a comprehensive experimental study of the dynamics of two-dimensional granular impacts on beds of photoelastic disks, with different profiles for the leading edge of the intruder. We particularly focus on a simple and useful case for testing shape effects by using triangular-nosed intruders. We show that the collisional model effectively captures the dynamics of intruder deceleration and rotation; i.e., these two dynamical effects can be described as two different manifestations of the same grain-scale physical processes.

  7. A Case of Transfusion Error in a Trauma Patient With Subsequent Root Cause Analysis Leading to Institutional Change

    Directory of Open Access Journals (Sweden)

    Sean Patrick Clifford MD

    2016-05-01

    Full Text Available A 28-year-old man presented emergently to the operating room following a gun-shot injury to his right groin. Our hospital’s Massive Transfusion Protocol was initiated as the patient entered the operating room actively hemorrhaging and severely hypotensive. During the aggressive resuscitation efforts, the patient was inadvertently transfused 2 units of packed red blood cells intended for another patient due to a series of errors. Fortunately, the incorrect product was compatible, and the patient recovered from his near-fatal injuries. Root cause analysis was used to review the transfusion error and develop an action plan to help prevent future occurrences.

  8. Has Therapy Intruded into Education?

    Science.gov (United States)

    Mintz, Avi

    2009-01-01

    For over fifty years, scholars have argued that a therapeutic ethos has begun to change how people think about themselves and others. There is also a growing concern that the therapeutic ethos has influenced educational theory and practice, perhaps to their detriment. This review article discusses three books, "The Dangerous Rise of Therapeutic…

  9. Siting of a low-level radioactive waste disposal facility

    International Nuclear Information System (INIS)

    Alvarado, R.A.

    1983-01-01

    The Texas Low-Level Radioactive Waste Disposal Authority was established by the 67th Legislature to assure safe and effective disposal of the state's low-level radioactive waste. The Authority operates under provisions of the Texas Low-Level Radioactive Waste Disposal Authority Act, VACS 4590f-1. In Texas, low-level radioactive waste is defined as any radioactive material that has a half-life of 35 years or less or that has less than 10 nanocuries per gram of transuranics, and may include radioactive material not excluded by this definition with a half-life or more than 35 years if special disposal criteria are established. Prior to beginning the siting study, the Authority developed both exclusionary and inclusionary criteria. Major requirements of the siting guidelines are that the site shall be located such that it will not interfere with: (1) existing or near-future industrial use, (2) sensitive environmental and ecological areas, and (3) existing and projected population growth. Therefore, the site should be located away from currently known recoverable mineral, energy and water resources, population centers, and areas of projected growth. This would reduce the potential for inadvertent intruders, increasing the likelihood for stability of the disposal site after closure. The identification of potential sites for disposal of low-level radioactive waste involves a phased progression from statewide screening to site-specific exploration, using a set of exclusionary and preferential criteria to guide the process. This methodology applied the criteria in a sequential manner to focus the analysis on progressively smaller and more favorable areas. The study was divided into three phases: (1) statewide screening; (2) site identification; and (3) preliminary site characterization

  10. Inadvertent intrathecal injection of atracurium.

    Science.gov (United States)

    Zirak, Nahid; Soltani, Ghasem; Ghomian, Naiere; Hasanpour, Mohamad Reza; Mashayekhi, Zahra

    2011-04-01

    This report relates how tracurium was given by mistake, intrathecally, during spinal anesthesia, to a 38-year-old woman, who was a candidate for abdominal hysterectomy. When no analgesia was observed, the mistake in giving the injection was understood. She was evaluated postoperatively by train of four ratio, measuring her breathing rate, eye opening, and protruding of tongue at one, two, twenty-four, and forty-eight hours, and then at one and two weeks, with the final evaluation the following month. The patient had normal timings during the operation and postoperation periods, and no abnormal findings were observed through the first month. This finding was contrary to several studies, which described adverse reactions due to accidental intrathecal injection of neuromuscular blocking drugs.

  11. Inadvertent intrathecal injection of atracurium

    Directory of Open Access Journals (Sweden)

    Nahid Zirak

    2011-01-01

    Full Text Available This report relates how tracurium was given by mistake, intrathecally, during spinal anesthesia, to a 38-year-old woman, who was a candidate for abdominal hysterectomy. When no analgesia was observed, the mistake in giving the injection was understood. She was evaluated postoperatively by train of four ratio, measuring her breathing rate, eye opening, and protruding of tongue at one, two, twenty-four, and forty-eight hours, and then at one and two weeks, with the final evaluation the following month. The patient had normal timings during the operation and postoperation periods, and no abnormal findings were observed through the first month. This finding was contrary to several studies, which described adverse reactions due to accidental intrathecal injection of neuromuscular blocking drugs.

  12. The Tile-map Based Vulnerability Assessment Code of a Physical Protection System: SAPE (Systematic Analysis of Protection Effectiveness)

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Kwak, Sung Woo; Yoo, Ho Sik; Kim, Jung Soo; Yoon, Wan Ki

    2008-01-01

    Increasing threats on nuclear facilities demands stronger physical protection system (PPS) within the limited budget. For this reason we need an efficient physical protection system and before making an efficient PPS we need to evaluate it. This evaluation process should faithfully reflect real situation, reveal weak points and unnecessary protection elements, and give comparable quantitative values. Performance based analysis helps to build an efficient physical protection system. Instead of regulating the number of sensors and barriers, the performance based analysis evaluates a PPS fit to the situation of a facility. The analysis assesses delay (sensors) and detection (barriers) of a PPS against an intrusion, and judges whether a response force arrives before intruders complete their job. Performance based analysis needs complicated calculation and, hence, several assessment codes have been developed. A code called the estimation of adversary sequence interruption (EASI) was developed to analyze vulnerability along a single intrusion path. The systematic analysis of vulnerability to intrusion (SAVI) code investigates multi-paths to a valuable asset in an actual facility. SAVI uses adversary sequence diagram to describe multi-paths

  13. Data Hemorrhages in the Health-Care Sector

    Science.gov (United States)

    Johnson, M. Eric

    Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including privacy violations, medical fraud, financial identity theft, and medical identity theft. We also examine the types and sources of data hemorrhages, focusing on inadvertent disclosures. Through an analysis of leaked files, we examine data hemorrhages stemming from inadvertent disclosures on internet-based file sharing networks. We characterize the security risk for a group of health-care organizations using a direct analysis of leaked files. These files contained highly sensitive medical and personal information that could be maliciously exploited by criminals seeking to commit medical and financial identity theft. We also present evidence of the threat by examining user-issued searches. Our analysis demonstrates both the substantial threat and vulnerability for the health-care sector and the unique complexity exhibited by the US health-care system.

  14. Elemental and Microscopic Analysis of Naturally Occurring C-O-Si Hetero-Fullerene-Like Structures.

    Science.gov (United States)

    Hullavarad, Nilima V; Hullavarad, Shiva S; Fochesatto, Javier

    2015-03-01

    Carbon exhibits an ability to form a wide range of structures in nature. Under favorable conditions, carbon condenses to form hollow, spheroid fullerenes in an inert atmosphere. Using high resolution FESEM, we have concealed the existence of giant hetero-fullerene like structures in the natural form. Clear, distinct features of connected hexagons and pentagons were observed. Energy dispersive X-ray analysis depth-profile of natural fullerene structures indicates that Russian-doll-like configurations composed of C, 0, and Si rings exist in nature. The analysis is based on an outstanding molecular feature found in the size fraction of aerosols having diameters 150 nm to 1.0 µm. The fullerene like structures, which are ~ 150 nm in diameter, are observed in large numbers. To the best of our knowledge, this is the first direct detailed observation of natural fullerene-like structures. This article reports inadvertent observation of naturally occurring hetero-fullerene-like structures in the Arctic.

  15. Discrimination of source reactor type by multivariate statistical analysis of uranium and plutonium isotopic concentrations in unknown irradiated nuclear fuel material.

    Science.gov (United States)

    Robel, Martin; Kristo, Michael J

    2008-11-01

    The problem of identifying the provenance of unknown nuclear material in the environment by multivariate statistical analysis of its uranium and/or plutonium isotopic composition is considered. Such material can be introduced into the environment as a result of nuclear accidents, inadvertent processing losses, illegal dumping of waste, or deliberate trafficking in nuclear materials. Various combinations of reactor type and fuel composition were analyzed using Principal Components Analysis (PCA) and Partial Least Squares Discriminant Analysis (PLSDA) of the concentrations of nine U and Pu isotopes in fuel as a function of burnup. Real-world variation in the concentrations of (234)U and (236)U in the fresh (unirradiated) fuel was incorporated. The U and Pu were also analyzed separately, with results that suggest that, even after reprocessing or environmental fractionation, Pu isotopes can be used to determine both the source reactor type and the initial fuel composition with good discrimination.

  16. Residency in white-eared hummingbirds (Hylocharis leucotis and its effect in territorial contest resolution

    Directory of Open Access Journals (Sweden)

    Verónica Mendiola-Islas

    2016-10-01

    Full Text Available Background Territory owners usually defeat intruders. One explanation for this observation is the uncorrelated asymmetry hypothesis which argues that contests might be settled by an arbitrary convention such as “owners win.” We studied the effect of territorial residency on contest asymmetries in the white-eared hummingbird (Hylocharis leucotis in a fir forest from central Mexico. Methods Twenty white-eared male adult hummingbird territories were monitored during a winter season, recording the territorial behavior of the resident against intruding hummingbirds. The size and quality of the territory were related to the probability that the resident would allow the use of flowers by the intruder. Various generalized models (logistical models were generated to describe the probabilities of victory for each individual resident depending on the different combinations of three predictor variables (territory size, territory quality, and intruder identity. Results In general, small and low quality territory owners tend to prevent conspecific intruders from foraging at a higher rate, while they frequently fail to exclude heterospecific intruders such as the magnificent hummingbird (Eugenes fulgens or the green violetear hummingbird (Colibri thalassinus on any territory size. Our results showed that the identity of the intruder and the size and quality of the territory determined the result of the contests, but not the intensity of defense. Discussion Initially, the rule that “the resident always wins” was supported, since no resident was expelled from its territory during the study. Nevertheless, the resident-intruder asymmetries during the course of a day depended on different factors, such as the size and quality of the territory and, mainly, the identity of the intruders. Our results showed that flexibility observed in contest tactics suggests that these tactics are not fixed but are socially plastic instead and they can be adjusted to

  17. Residency in white-eared hummingbirds (Hylocharis leucotis) and its effect in territorial contest resolution.

    Science.gov (United States)

    Mendiola-Islas, Verónica; Lara, Carlos; Corcuera, Pablo; Valverde, Pedro Luis

    2016-01-01

    Territory owners usually defeat intruders. One explanation for this observation is the uncorrelated asymmetry hypothesis which argues that contests might be settled by an arbitrary convention such as "owners win." We studied the effect of territorial residency on contest asymmetries in the white-eared hummingbird ( Hylocharis leucotis ) in a fir forest from central Mexico. Twenty white-eared male adult hummingbird territories were monitored during a winter season, recording the territorial behavior of the resident against intruding hummingbirds. The size and quality of the territory were related to the probability that the resident would allow the use of flowers by the intruder. Various generalized models (logistical models) were generated to describe the probabilities of victory for each individual resident depending on the different combinations of three predictor variables (territory size, territory quality, and intruder identity). In general, small and low quality territory owners tend to prevent conspecific intruders from foraging at a higher rate, while they frequently fail to exclude heterospecific intruders such as the magnificent hummingbird ( Eugenes fulgens ) or the green violetear hummingbird ( Colibri thalassinus ) on any territory size. Our results showed that the identity of the intruder and the size and quality of the territory determined the result of the contests, but not the intensity of defense. Initially, the rule that "the resident always wins" was supported, since no resident was expelled from its territory during the study. Nevertheless, the resident-intruder asymmetries during the course of a day depended on different factors, such as the size and quality of the territory and, mainly, the identity of the intruders. Our results showed that flexibility observed in contest tactics suggests that these tactics are not fixed but are socially plastic instead and they can be adjusted to specific circumstances.

  18. Social instigation and repeated aggressive confrontations in male Swiss mice: analysis of plasma corticosterone, CRF and BDNF levels in limbic brain areas

    Directory of Open Access Journals (Sweden)

    Paula Madeira Fortes

    2017-06-01

    Full Text Available Abstract Introduction: Agonistic behaviors help to ensure survival, provide advantage in competition, and communicate social status. The resident-intruder paradigm, an animal model based on male intraspecific confrontations, can be an ethologically relevant tool to investigate the neurobiology of aggressive behavior. Objectives: To examine behavioral and neurobiological mechanisms of aggressive behavior in male Swiss mice exposed to repeated confrontations in the resident intruder paradigm. Methods: Behavioral analysis was performed in association with measurements of plasma corticosterone of mice repeatedly exposed to a potential rival nearby, but inaccessible (social instigation, or to 10 sessions of social instigation followed by direct aggressive encounters. Moreover, corticotropin-releasing factor (CRF and brain-derived neurotrophic factor (BNDF were measured in the brain of these animals. Control mice were exposed to neither social instigation nor aggressive confrontations. Results: Mice exposed to aggressive confrontations exhibited a similar pattern of species-typical aggressive and non-aggressive behaviors on the first and the last session. Moreover, in contrast to social instigation only, repeated aggressive confrontations promoted an increase in plasma corticosterone. After 10 aggressive confrontation sessions, mice presented a non-significant trend toward reducing hippocampal levels of CRF, which inversely correlated with plasma corticosterone levels. Conversely, repeated sessions of social instigation or aggressive confrontation did not alter BDNF concentrations at the prefrontal cortex and hippocampus. Conclusion: Exposure to repeated episodes of aggressive encounters did not promote habituation over time. Additionally, CRF seems to be involved in physiological responses to social stressors.

  19. Automated Groundwater Screening

    International Nuclear Information System (INIS)

    Taylor, Glenn A.; Collard, Leonard B.

    2005-01-01

    The Automated Intruder Analysis has been extended to include an Automated Ground Water Screening option. This option screens 825 radionuclides while rigorously applying the National Council on Radiation Protection (NCRP) methodology. An extension to that methodology is presented to give a more realistic screening factor for those radionuclides which have significant daughters. The extension has the promise of reducing the number of radionuclides which must be tracked by the customer. By combining the Automated Intruder Analysis with the Automated Groundwater Screening a consistent set of assumptions and databases is used. A method is proposed to eliminate trigger values by performing rigorous calculation of the screening factor thereby reducing the number of radionuclides sent to further analysis. Using the same problem definitions as in previous groundwater screenings, the automated groundwater screening found one additional nuclide, Ge-68, which failed the screening. It also found that 18 of the 57 radionuclides contained in NCRP Table 3.1 failed the screening. This report describes the automated groundwater screening computer application

  20. Assessment of the long-term risks of inadvertent human intrusion into a disposal vault in deep plutonic rock: reassessment using ICRP recommendations

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1996-06-01

    Canada has conducted an extensive research program on the safe disposal of nuclear fuel waste. The program has focussed on the concept of disposal in durable containers in an engineered facility or 'vault' located 500 to 1000 m deep in plutonic rock on the Canadian Shield. As part of this task, a methodology was developed to assess the long-term risk from inadvertent intrusion scenarios, and applied to a reference conceptual design of a facility for disposal of used fuel. The AECB has specified that 'the predicted radiological risk to individuals from a waste disposal facility shall not exceed 10 -6 fatal cancers and serious genetic effects in a year.' Risk is defined as the sum, of the product of the probability of the scenario, the magnitude of the resultant radiation dose, and the probability of a health effect per unit dose. The AECB also specifies that 'calculations of individual risk should be made by using the risk conversion factor of 2 x 10 -2 per sievert.' Our earlier assessment of four human intrusion scenarios showed that the estimated risk using the risk conversion factor recommended by the AECB was at least 3 orders of magnitude below the AECB risk criterion, at all times up to 10 000 a, for each of the four scenarios analysed. The AECB risk criterion and risk conversion factor are based on the recommendations of the Intemafional Commission on Radiological Protection (ICRP) in their Publication ICRP 26. More recently, in its Publication ICRP 60, the ICRP has recommended dose factors for fatal cancers that are larger than those in ICRP 26 and an increase in the risk factor for serious hereditary effects in all future generations. Another ICRP Publication, ICRP 64, states that 'For potential exposure situations, the consideration of the basic dose response used for stochastic effects must be extended into the range of high doses where deterministic effects also occur.' For the new assessments of risk we use the estimated doses and probabilities of

  1. Home range defense in the red fox, Vulpes vulpes L

    Science.gov (United States)

    Preston, E.M.

    1975-01-01

    This paper describes the home range defense behavior observed when nonresident male red foxes were introduced into established home ranges of resident male-female pairs. In 12 observation periods, four intruders were introduced to each of three mated pairs which had been given three weeks to acclimate to a 4.05-hectare, fenced enclosure. The residents centered their activities around a natural den and the frequency of intruder-resident encounters decreased rapidly with increasing distance from the den. The primary home range defense was continual harassment of the intruders by the resident males through agonistic displays and chases. Physical contact was rare. Even though the resident males were dominant in less than a majority of the interactions observed, they were usually successful in displacing the intruders within a few hours. The resident females seldom interacted with the intruders.

  2. Performance objectives for disposal of low-level radioactive wastes on the Oak Ridge Reservation

    Energy Technology Data Exchange (ETDEWEB)

    Kocher, D.C.

    1987-07-01

    This report presents a set of performance objectives for disposal of low-level radioactive wastes in a new facility on the Oak Ridge Reservation. The principal performance objectives include a limit on annual committed effective dose equivalent averaged over a lifetime of 0.25 mSv (25 mrem) for any member of the public beyond the boundary of the disposal facility, and a limit on annual committed effective dose equivalent averaged over a lifetime of 1 mSv (0.1 rem) and a limit on committed effective dose equivalent in any year of 5 mSv (0.5 rem) for any individual who inadvertently intrudes onto the disposal site after loss of active institutional controls. In addition, releases of radioactivity beyond the site boundary shall not result in annual dose equivalents to any number of the public from all sources of exposure that exceed limits established by Federal regulatory authorities and shall be kept as low as reasonably achievable. This report reviews generally applicable radiation protection standards for the public and environmental radiation standards for specific practices that have been developed by national and international authorities and discusses the use of limits on risk rather than dose as performance objectives and consideration of chemical toxicity rather than radiation dose in establishing limits on intakes of uranium. 63 refs., 7 figs., 2 tabs.

  3. Performance objectives for disposal of low-level radioactive wastes on the Oak Ridge Reservation

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1987-07-01

    This report presents a set of performance objectives for disposal of low-level radioactive wastes in a new facility on the Oak Ridge Reservation. The principal performance objectives include a limit on annual committed effective dose equivalent averaged over a lifetime of 0.25 mSv (25 mrem) for any member of the public beyond the boundary of the disposal facility, and a limit on annual committed effective dose equivalent averaged over a lifetime of 1 mSv (0.1 rem) and a limit on committed effective dose equivalent in any year of 5 mSv (0.5 rem) for any individual who inadvertently intrudes onto the disposal site after loss of active institutional controls. In addition, releases of radioactivity beyond the site boundary shall not result in annual dose equivalents to any number of the public from all sources of exposure that exceed limits established by Federal regulatory authorities and shall be kept as low as reasonably achievable. This report reviews generally applicable radiation protection standards for the public and environmental radiation standards for specific practices that have been developed by national and international authorities and discusses the use of limits on risk rather than dose as performance objectives and consideration of chemical toxicity rather than radiation dose in establishing limits on intakes of uranium. 63 refs., 7 figs., 2 tabs

  4. Development of closure criteria for inactive radioactive waste-disposal sites at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1990-01-01

    The Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) specifies that the U.S. Department of Energy shall comply with the procedural and substantive requirements of CERCLA regarding cleanup of inactive waste-disposal sites. Remedial actions require a level of control for hazardous substances that at least attains legally applicable or relevant and appropriate requirements (ARAR). This requirement may be waived if compliance with ARAR results in greater risk to human health and the environment than alternatives or is technically impractical. It will review potential ARAR for cleanup of inactive radioactive waste-disposal sites and propose a set of closure criteria for such sites at Oak Ridge National Laboratory. Important potential ARAR include federal standards for radiation protection of the public, radioactivity in drinking water, and near-surface land disposal of radioactive wastes. Proposed criteria for cleanup of inactive radioactive waste-disposal sites are: (1) a limit of 0.25 mSv on annual effective dose equivalent for offsite individuals; (2) limits of 1 mSv for continuous exposures and 5 mSv for occasional exposures on annual effective dose equivalent for inadvertent intruders, following loss of institutional controls over disposal sites; and (3) limits on concentrations of radionuclides in potable ground and surface waters in accordance with federal drinking-water standards, to the extent reasonably achievable

  5. A numerical study of variable density flow and mixing in porous media

    Science.gov (United States)

    Fan, Yin; Kahawita, René

    1994-10-01

    A numerical study of a negatively buoyant plume intruding into a neutrally stratified porous medium has been undertaken using finite different methods. Of particular interest has been to ascertain whether the experimentally observed gravitational instabilities that form along the lower edge of the plume are reproduced in the numerical model. The model has been found to faithfully reproduce the mean flow as well as the gravitational instabilities in the intruding plume. A linear stability analysis has confirmed the fact that the negatively buoyant plume is in fact gravitationally unstable and that the stability depends on two parameters: a concentration Rayleigh number and a characteristic length scale which is dependent on the transverse dispersivity.

  6. Relationships between hormones and aggressive behavior in green anole lizards: an analysis using structural equation modeling.

    Science.gov (United States)

    Yang, Eun-Jin; Wilczynski, Walter

    2002-09-01

    We investigated the relationship between aggressive behavior and circulating androgens in the context of agonistic social interaction and examined the effect of this interaction on the androgen-aggression relationship in response to a subsequent social challenge in male Anolis carolinensis lizards. Individuals comprising an aggressive encounter group were exposed to an aggressive conspecific male for 10 min per day during a 5-day encounter period, while controls were exposed to a neutral stimulus for the same period. On the sixth day, their responses to an intruder test were observed. At intervals, individuals were sacrificed to monitor plasma androgen levels. Structural equation modeling (SEM) was used to test three a priori interaction models of the relationship between social stimulus, aggressive behavior, and androgen. Model 1 posits that exposure to a social stimulus influences androgen and aggressive behavior independently. In Model 2, a social stimulus triggers aggressive behavior, which in turn increases circulating levels of androgen. In Model 3, exposure to a social stimulus influences circulating androgen levels, which in turn triggers aggressive behavior. During the 5 days of the encounter period, circulating testosterone (T) levels of the aggressive encounter group followed the same pattern as their aggressive behavioral responses, while the control group did not show significant changes in their aggressive behavior or T level. Our SEM results supported Model 2. A means analysis showed that during the intruder test, animals with 5 days of aggressive encounters showed more aggressive responses than did control animals, while their circulating androgen levels did not differ. This further supports Model 2, suggesting that an animal's own aggressive behavior may trigger increases in levels of plasma androgen. Copyright 2002 Elsevier Science (USA)

  7. Characteristics of Pseudoaneurysms in Northern India; Risk Analysis, Clinical Profile, Surgical Management and Outcome.

    Science.gov (United States)

    Lone, Hafeezulla; Ganaie, Farooq Ahmad; Lone, Ghulam Nabi; Dar, Abdul Majeed; Bhat, Mohammad Akbar; Singh, Shyam; Parra, Khursheed Ahmad

    2015-04-01

    To determine the risk factors, clinical characteristics, surgical management and outcome of pseudoaneurysm secondary to iatrogenic or traumatic vascular injury. This was a cross-sectional study being performed in department of cardiovascular and thoracic surgery skims soura during a 4-year period. We included all the patients referring to our center with primary diagnosis of pseudoaneurysm. The pseudoaneurysm was diagnosed with angiography and color Doppler sonography. The clinical and demographic characteristics were recorded and the risk factors were identified accordingly. Patients with small swelling (less than 5-cm) and without any complication were managed conservatively. They were followed for progression and development of complications in relation to swelling. Others underwent surgical repair and excision. The outcome of the patients was also recorded. Overall we included 20 patients with pseudoaneurysm. The mean age of the patients was 42.1±0.6 years. Among them there were 11 (55%) men and 9 (45%) women. Nine (45%) patients with end stage renal disease developed pseudoaneurysm after inadvertent femoral artery puncture for hemodialysis; two patients after interventional cardiology procedure; one after femoral embolectomy; one developed after fire arm splinter injury and one formed femoral artery related pseudoaneurysm after drainage of right inguinal abscess. The most common site of pseudoaneurysm was femoral artery followed by brachial artery. Overall surgical intervention was performed in 17 (85%) patients and 3 (15%) were managed conservatively. End stage renal disease is a major risk factor for pseudoaneurysm formation. Coagulopathy, either therapeutic or pathological is also an important risk factor. Patients with these risk factors need cannulation of venous structures for hemodialysis under ultrasound guide to prevent inadvertent arterial injury. Patients with end stage renal disease who sustain inadvertent arterial puncture during cannulation for

  8. How to achieve proper overbite—Lessons from natural dentoalveolar compensation

    Directory of Open Access Journals (Sweden)

    Jenny Zwei-Chieng Chang

    2013-12-01

    Conclusion: For orthodontically closing the open bite, intruding upper posteriors and extruding lower anteriors are appropriate ways to simulate the natural occurring compensation. To eliminate deep bite in a low mandibular plane patient, intruding upper and lower anteriors and proclining anteriors will achieve good overbite. Imitating the natural dentoalveolar compensation by using temporary anchorage devices at appropriate sites for intruding teeth helps to resolve orthodontic vertical problems.

  9. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  10. Review of the treat upgrade reactor scram system reliability analysis

    International Nuclear Information System (INIS)

    Montague, D.F.; Fussell, J.B.; Krois, P.A.; Morelock, T.C.; Knee, H.E.; Manning, J.J.; Haas, P.M.; West, K.W.

    1984-10-01

    In order to resolve some key LMFBR safety issues, ANL personnel are modifying the TREAT reactor to handle much larger experiments. As a result of these modifications, the upgraded Treat reactor will not always operate in a self-limited mode. During certain experiments in the upgraded TREAT reactor, it is possible that the fuel could be damaged by overheating if, once the computer systems fail, the reactor scram system (RSS) fails on demand. To help ensure that the upgraded TREAT reactor is shut down when required, ANL personnel have designed a triply redundant RSS for the facility. The RSS is designed to meet three reliability goals: (1) a loss of capability failure probability of 10 -9 /demand (independent failures only); (2) an inadvertent shutdown probability of 10 -3 /experiment; and (3) protection agaist any known potential common cause failures. According to ANL's reliability analysis of the RSS, this system substantially meets these goals

  11. Post mitigation impact risk analysis for asteroid deflection demonstration missions

    Science.gov (United States)

    Eggl, Siegfried; Hestroffer, Daniel; Thuillot, William; Bancelin, David; Cano, Juan L.; Cichocki, Filippo

    2015-08-01

    Even though mankind believes to have the capabilities to avert potentially disastrous asteroid impacts, only the realization of mitigation demonstration missions can validate this claim. Such a deflection demonstration attempt has to be cost effective, easy to validate, and safe in the sense that harmless asteroids must not be turned into potentially hazardous objects. Uncertainties in an asteroid's orbital and physical parameters as well as those additionally introduced during a mitigation attempt necessitate an in depth analysis of deflection mission designs in order to dispel planetary safety concerns. We present a post mitigation impact risk analysis of a list of potential kinetic impactor based deflection demonstration missions proposed in the framework of the NEOShield project. Our results confirm that mitigation induced uncertainties have a significant influence on the deflection outcome. Those cannot be neglected in post deflection impact risk studies. We show, furthermore, that deflection missions have to be assessed on an individual basis in order to ensure that asteroids are not inadvertently transported closer to the Earth at a later date. Finally, we present viable targets and mission designs for a kinetic impactor test to be launched between the years 2025 and 2032.

  12. Commonwealth Edison captures intruders on screen

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Commonwealth Edison has developed three software programs, with the supporting hardware, that significantly upgrade security monitoring capabilities at nuclear power stations. These are Video Capture, the Alternate Perimeter Alarm Reporting System, and the Redundant Access Control System. Conventional video systems only display what is happening at the moment and rewinding a VCR to discover what occurred earlier takes time. With Video Capture the images can be instantly restored to the monitor screen and printed out. When one of the security devices used to monitor the perimeter of a Commonwealth Edison nuclear power station is tripped, the Video Capture program stores the visual image digitally. This is done using similar technology to the employed in fax machines. The security staff are thus able to distinguish immediately between disturbances taking place simultaneously at different security zones. They can magnify and compare the stored images and print them out. The Alternate Perimeter Alarm Reporting System was developed to speed the transmission of alarm signals from the security sensors to the security computer. The Redundant Access Control System (RACS) was originally developed to meet the requirement of the Nuclear Regulatory Commission (NRC) for a secondary computer-operated security measure to monitor employee access to a nuclear power station. When employee drug testing became an additional NRC requirement, the Nuclear Division of Commonwealth Edison asked their programmers to modify RACS to generate a random list of personnel to be tested for substance abuse. RACS was then further modified to produce numerous station operating reports that had been previously compiled manually. (author)

  13. Performance assessment review for DOE LLW disposal facilities

    International Nuclear Information System (INIS)

    Wilhite, Elmer L.

    1992-01-01

    The United States Department of Energy (US DOE) disposes of low-level radioactive waste in near-surface disposal facilities. Safety of the disposal operations is evaluated for operational safety as well as long-term safety. Operational safety is evaluated based on the perceived level of hazard of the operation and may vary from a simple safety assessment to a safety analysis report. Long-term safety of all low-level waste disposal systems is evaluated through the conduct of a radiological performance assessment. The US DOE has established radiological performance objectives for disposal of low-level waste. They are to protect a member of the general public from receiving over 25 mrem/y, and an inadvertent intruder into the waste from receiving over 100 mrem/y continuous exposure or 500 mrem from a single exposure. For a disposal system to be acceptable, a performance assessment must be prepared which must be technically accurate and provide reasonable assurance that these performance objectives are met. Technical quality of the performance assessments is reviewed by a panel of experts. The panel of experts is used in two ways to assure the technical quality of performance assessment. A preliminary (generally 2 day) review by the panel is employed in the late stages of development to provide guidance on finalizing the performance assessment. The comments from this review are communicated to the personnel responsible for the performance assessment for consideration and incorporation. After finalizing the performance assessment, it is submitted for a formal review. The formal review is accomplished by a much more thorough analysis of the performance assessment over a multi-week time period. The panel then formally reports their recommendations to the US DOE waste management senior staff who make the final determination on acceptability of the performance assessment. A number of lessons have been learned from conducting several preliminary reviews of performance

  14. Uncertainty analysis for hot channel

    International Nuclear Information System (INIS)

    Panka, I.; Kereszturi, A.

    2006-01-01

    The fulfillment of the safety analysis acceptance criteria is usually evaluated by separate hot channel calculations using the results of neutronic or/and thermo hydraulic system calculations. In case of an ATWS event (inadvertent withdrawal of control assembly), according to the analysis, a number of fuel rods are experiencing DNB for a longer time and must be regarded as failed. Their number must be determined for a further evaluation of the radiological consequences. In the deterministic approach, the global power history must be multiplied by different hot channel factors (kx) taking into account the radial power peaking factors for each fuel pin. If DNB occurs it is necessary to perform a few number of hot channel calculations to determine the limiting kx leading just to DNB and fuel failure (the conservative DNBR limit is 1.33). Knowing the pin power distribution from the core design calculation, the number of failed fuel pins can be calculated. The above procedure can be performed by conservative assumptions (e.g. conservative input parameters in the hot channel calculations), as well. In case of hot channel uncertainty analysis, the relevant input parameters (k x, mass flow, inlet temperature of the coolant, pin average burnup, initial gap size, selection of power history influencing the gap conductance value) of hot channel calculations and the DNBR limit are varied considering the respective uncertainties. An uncertainty analysis methodology was elaborated combining the response surface method with the one sided tolerance limit method of Wilks. The results of deterministic and uncertainty hot channel calculations are compared regarding to the number of failed fuel rods, max. temperature of the clad surface and max. temperature of the fuel (Authors)

  15. Analysis Of Using Firewall And Single Honeypot In Training Attack On Wireless Network

    Science.gov (United States)

    Mohd. Diansyah, Tengku.; Faisal, Ilham; Perdana, Adidtya; Octaviani Sembiring, Boni; Hidayati Sinaga, Tantri

    2017-12-01

    Security issues become one of the important aspects of a network, especially a network security on the server. These problems underlie the need to build a system that can detect threats from parties who do not have access rights (hackers) that are by building a security system honeypot. A Honeypot is a diversion of intruders' attention, in order for intruders to think that it has managed to break down and retrieve data from a network, when in fact the data is not important and the location is isolated. A way to trap or deny unauthorized use of effort in an information system. One type of honeypot is honeyd. Honeyd is a low interaction honeypot that has a smaller risk compared to high interaction types because the interaction with the honeypot does not directly involve the real system. The purpose of the implementation of honeypot and firewall, firewall is used on Mikrotik. Can be used as an administrative tool to view reports of Honeyd generated activity and administrators can also view reports that are stored in the logs in order to assist in determining network security policies.

  16. Can Anyone Hear Me? Does Anyone See Me? A Qualitative Meta-Analysis of Women's Experiences of Heart Disease.

    Science.gov (United States)

    Galick, Aimee; D'Arrigo-Patrick, Elizabeth; Knudson-Martin, Carmen

    2015-08-01

    Female heart patients are underdiagnosed and undertreated. The purpose of this qualitative meta-data-analysis was to explain how societal expectations related to gender and the treatment environment influence women's experiences and can inform optimal care. The authors used grounded theory methodology and a social constructionist gender lens to analyze 43 studies (1993-2012) of women's experiences of heart disease. The analysis illustrates how social expectations within both medical and relational contexts led to women experiencing barriers to diagnosis and treatment and inadvertent minimization of their experience and knowledge. Women's descriptions of their experiences suggest three kinds of health care strategies that have the potential to increase women's engagement with heart disease treatment and rehabilitation: (a) support give and take in relational connections, (b) identify and acknowledge unique health-promoting behavior, and (c) focus on empowerment. These findings have interdisciplinary implications for practice with women with heart disease. © The Author(s) 2015.

  17. Risk analysis and assessment of vertical and incline small winder systems and peripheral activities.

    CSIR Research Space (South Africa)

    Moss, PS

    2000-01-01

    Full Text Available access .......................................................48 3.6.3 "ramped" design of station access ..................................................................49 3.6.4 Handling of material cars... vertical plane using a rope and counterweight mechanism, to allow the passage of cars when required. It is extensively used to prevent the inadvertent entry of material cars from stations into incline shafts, and to derail a runaway car so preventing...

  18. Asymmetries in body condition and order of arrival influence competitive ability and survival in a coral reef fish.

    Science.gov (United States)

    Poulos, Davina E; McCormick, Mark I

    2015-11-01

    Trade-offs between traits that influence an individual's competitive ability are important in determining community assembly and coexistence of individuals sharing the same resources. Populations of coral reef fish are structurally complex, so it is important to understand how these populations are shaped as a result of an individual's suite of traits and those of its competitors. We conducted a 2 × 2 factorial field experiment that manipulated body condition (high or low, manipulated through a feeding regime) and residency (resident or intruder, where the resident arrived at the habitat 3 h before the intruder) to evaluate effects on competitive ability and survival. Prior residency alleviated the disadvantage of a low body condition with respect to aggression, which was similar between low-condition residents and high-condition intruders. However, high-condition residents displayed a significantly greater level of aggression than intruders, regardless of whether intruders were from high- or low-condition treatments. For intruders to have a high probability of becoming dominant, they needed to have a large body condition advantage. Mortality trajectories suggested that body condition modified the effect of prior residency, and intruders were more likely to suffer mortality if they had a low body condition because residents pushed them away from shelter. Our results highlight that the negative effects of some traits may be compensated for by the positive effects of other traits, and that the specific ecological context an individual faces (such as the characteristics of its competitors) can have a major influence on successful establishment and persistence.

  19. Benchmark analysis of three main circulation pump sequential trip event at Ignalina NPP

    International Nuclear Information System (INIS)

    Uspuras, E.; Kaliatka, A.; Urbonas, R.

    2001-01-01

    The Ignalina Nuclear Power Plant is a twin-unit with two RBMK-1500 reactors. The primary circuit consists of two symmetrical loops. Eight Main Circulation Pumps (MCPs) at the Ignalina NPP are employed for the coolant water forced circulation through the reactor core. The MCPs are joined in groups of four pumps for each loop (three for normal operation and one on standby). This paper presents the benchmark analysis of three main circulation pump sequential trip event at RBMK-1500 using RELAP5 code. During this event all three MCPs in one circulation loop at Unit 2 Ignalina NPP were tripped one after another, because of inadvertent activation of the fire protection system. The comparison of calculated and measured parameters led us to establish realistic thermal hydraulic characteristics of different main circulation circuit components and to verify the model of drum separators pressure and water level controllers.(author)

  20. An Analysis of Security System for Intrusion in Smartphone Environment

    OpenAIRE

    Louk, Maya; Lim, Hyotaek; Lee, HoonJae

    2014-01-01

    There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecti...

  1. Disruption of the Glutamate–Glutamine Cycle Involving Astrocytes in an Animal Model of Depression for Males and Females

    Science.gov (United States)

    Rappeneau, Virginie; Blaker, Amanda; Petro, Jeff R.; Yamamoto, Bryan K.; Shimamoto, Akiko

    2016-01-01

    Background: Women are twice as likely as men to develop major depression. The brain mechanisms underlying this sex disparity are not clear. Disruption of the glutamate–glutamine cycle has been implicated in psychiatric disturbances. This study identifies sex-based impairments in the glutamate–glutamine cycle involving astrocytes using an animal model of depression. Methods: Male and female adult Long-Evans rats were exposed to chronic social defeat stress (CSDS) for 21 days, using a modified resident-intruder paradigm. Territorial aggression was used for males and maternal aggression was used for females to induce depressive-like deficits for intruders. The depressive-like phenotype was assessed with intake for saccharin solution, weight gain, estrous cycle, and corticosterone (CORT). Behaviors displayed by the intruders during daily encounters with residents were characterized. Rats with daily handling were used as controls for each sex. Ten days after the last encounter, both the intruders and controls were subjected to a no-net-flux in vivo microdialysis to assess glutamate accumulation and extracellular glutamine in the nucleus accumbens (NAc). The contralateral hemispheres were used for determining changes in astrocytic markers, including glial fibrillary acidic protein (GFAP) and glutamate transporter-1 (GLT-1). Results: Both male and female intruders reduced saccharin intake over the course of CSDS, compared to their pre-stress period and to their respective controls. Male intruders exhibited submissive/defensive behaviors to territorial aggression by receiving sideways threats and bites. These males showed reductions in striatal GLT-1 and spontaneous glutamine in the NAc, compared to controls. Female intruders exhibited isolated behaviors to maternal aggression, including immobility, rearing, and selfgrooming. Their non-reproductive days were extended. Also, they showed reductions in prefrontal and accumbal GFAP+ cells and prefrontal GLT-1, compared to

  2. Reflections on the glass ceiling: women in the experimental analysis of behavior.

    Science.gov (United States)

    Odum, A L

    2000-01-01

    McSweeney and Swindell (1998) sought to determine whether men and women are treated equitably in the experimental analysis of behavior. They purported to show that women participate less in the Journal of the Experimental Analysis of Behavior than in similar journals and that the participation of women decreases with increases in selectivity. Their data were difficult to interpret, however, because they did not present the variability in the mean data drawn from different individuals over time. My analyses were not in accord with their conclusions. When the percentage of associate editors who are women was considered along with the mean percentages McSweeney and Swindell reported for other measures, participation did not systematically decrease with increases in selectivity in recent years. As quantified in terms of their number of publications in the Journal of the Experimental Analysis of Behavior, women who were editorial board members and associate editors were not more highly selected than their male counterparts. Finally, in the recent period from 1996 to 1998, although women submitted fewer manuscripts to the journal, rejection ratios did not differ for men and women. Efforts to increase the participation of women in the experimental analysis of behavior may best be directed toward recruitment and retention rather than some of the suggestions proposed by McSweeney and Swindell (1998), which could inadvertently create different standards for women's work.

  3. Pressurized Thermal Shock Analysis for OPR1000 Pressure Vessel

    Energy Technology Data Exchange (ETDEWEB)

    Bhowmik, P. K.; Shamim, J. A.; Gairola, A.; Suh, Kune Y. [Seoul National Univ., Seoul (Korea, Republic of)

    2014-10-15

    The study provides a brief understanding of the analysis procedure and techniques using ANSYS, such as the acceptance criteria, selection and categorization of events, thermal analysis, structural analysis including fracture mechanics assessment, crack propagation and evaluation of material properties. PTS may result from instrumentation and control malfunction, inadvertent steam dump, and postulated accidents such as smallbreak (SB) LOCA, large-break (LB) LOCA, main steam line break (MSLB), feedwater line breaks and steam generator overfill. In this study our main focus is to consider only the LB LOCA due to a cold leg break of the Optimized Power Reactor 1000 MWe (OPR1000). Consideration is given as well to the emergency core cooling system (ECCS) specific sequence with the operating parameters like pressure, temperature and time sequences. The static structural and thermal analysis to investigate the effects of PTS on RPV is the main motivation of this study. Specific surface crack effects and its propagation is also considered to measure the integrity of the RPV. This study describes the procedure for pressurized thermal shock analysis due to a loss of coolant accidental condition and emergency core cooling system operation for reactor pressure vessel.. Different accidental events that cause pressurized thermal shock to nuclear RPV that can also be analyzed in the same way. Considering the limitations of low speed computer only the static analysis is conducted. The modified LBLOCA phases and simplified geometry can is utilized to analyze the effect of PTS on RPV for general understanding not for specific specialized purpose. However, by integrating the disciplines of thermal and structural analysis, and fracture mechanics analysis a clearer understanding of the total aspect of the PTS problem has resulted. By adopting the CFD, thermal hydraulics, uncertainties and risk analysis for different type of accidental conditions, events and sequences with proper

  4. 78 FR 35217 - Atlantic Coastal Fisheries Cooperative Management Act Provisions; American Lobster Fishery

    Science.gov (United States)

    2013-06-12

    ... Clerical Appeal would allow NMFS to correct clerical and mathematical errors that sometimes inadvertently occur when applications are processed. It is not an appeal on the merits and would involve no analysis... database is being created by the Atlantic Coastal Cooperative Statistics Program (ACCSP) and is a critical...

  5. Pertinent anatomy and analysis for midface volumizing procedures.

    Science.gov (United States)

    Surek, Christopher C; Beut, Javier; Stephens, Robert; Jelks, Glenn; Lamb, Jerome

    2015-05-01

    The study was conducted to construct an anatomically inspired midfacial analysis facilitating safe, accurate, and dynamic nonsurgical rejuvenation. Emphasis is placed on determining injection target areas and adverse event zones. Twelve hemifacial fresh cadavers were dissected in a layered fashion. Dimensional measurements between the midfacial fat compartments, prezygomatic space, mimetic muscles, and neurovascular bundles were used to develop a topographic analysis for clinical injections. A longitudinal line from the base of the alar crease to the medial edge of the levator anguli oris muscle (1.9 cm), lateral edge of the levator anguli oris muscle (2.6 cm), and zygomaticus major muscle (4.6 cm) partitions the cheek into two aesthetic regions. A six-step facial analysis outlines three target zones and two adverse event zones and triangulates the point of maximum cheek projection. The lower adverse event zone yields an anatomical explanation to inadvertent jowling during anterior cheek injection. The upper adverse event zone localizes the palpebral branch of the infraorbital artery. The medial malar target area isolates quadrants for anterior cheek projection and tear trough effacement. The middle malar target area addresses lid-cheek blending and superficial compartment turgor. The lateral malar target area highlights lateral cheek projection and locates the prezygomatic space. This stepwise analysis illustrates target areas and adverse event zones to achieve midfacial support, contour, and profile in the repose position and simultaneous molding of a natural shape during animation. This reproducible method can be used both procedurally and in record-keeping for midface volumizing procedures.

  6. Performance assessment for the class L-II disposal facility

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This draft radiological performance assessment (PA) for the proposed Class L-II Disposal Facility (CIIDF) on the Oak Ridge Reservation (ORR) has been prepared to demonstrate compliance with the requirements of the US Department of Energy Order 5820.2A. This PA considers the disposal of low-level radioactive wastes (LLW) over the operating life of the facility and the long-term performance of the facility in providing protection to public health and the environment. The performance objectives contained in the order require that the facility be managed to accomplish the following: (1) Protect public health and safety in accordance with standards specified in environmental health orders and other DOE orders. (2) Ensure that external exposure to the waste and concentrations of radioactive material that may be released into surface water, groundwater, soil, plants, and animals results in an effective dose equivalent (EDE) that does not exceed 25 mrem/year to a member of the public. Releases to the atmosphere shall meet the requirements of 40 CFR Pt. 61. Reasonable effort should be made to maintain releases of radioactivity in effluents to the general environment as low as reasonably achievable. (1) Ensure that the committed EDEs received by individual who inadvertently may intrude into the facility after the loss of active institutional control (100 years) will not exceed 100 mrem/year for continuous exposure of 500 mrem for a single acute exposure. (4) Protect groundwater resources, consistent with federal, state, and local requirements.

  7. Low-Level Waste Regulation: Putting Principles Into Practice - 13297 - The Richard S. Hodes, M.D., Honor Lecture Award

    International Nuclear Information System (INIS)

    Kennedy, James E.

    2013-01-01

    In carrying out its mission to ensure the safe use of radioactive materials for beneficial civilian purposes while protecting people and the environment, the U.S. Nuclear Regulatory Commission (NRC) adheres to its Principles of Good Regulation. The Principles-Independence, Openness, Efficiency, Clarity, and Reliability-apply to the agency as a whole in its decision-making and to the individual conduct of NRC employees. This paper describes the application of the Principles in a real-life staff activity, a guidance document used in the NRC's low-level radioactive waste (LLW) program, the Concentration Averaging and Encapsulation Branch Technical Position (CA BTP). The staff's process to revise the document, as well as the final content of the document, were influenced by following the Principles. For example, consistent with the Openness Principle, the staff conducted a number of outreach activities and received many comments on three drafts of the document. Stakeholder comments affected the final staff positions in some cases. The revised CA BTP, once implemented, is expected to improve management and disposal of LLW in the United States. Its positions have an improved nexus to health and safety; are more performance-based than previously, thus providing licensees with options for how they achieve the required outcome of protecting an inadvertent human intruder into a disposal facility; and provide for disposal of more sealed radioactive sources, which are a potential threat to national security. (author)

  8. Low-Level Waste Regulation: Putting Principles Into Practice - 13297 - The Richard S. Hodes, M.D., Honor Lecture Award

    Energy Technology Data Exchange (ETDEWEB)

    Kennedy, James E. [Low-Level Waste Branch Division of Waste Management and Environmental Protection, U.S. Nuclear Regulatory Commission, Washington, DC, 20555-0001 (United States)

    2013-07-01

    In carrying out its mission to ensure the safe use of radioactive materials for beneficial civilian purposes while protecting people and the environment, the U.S. Nuclear Regulatory Commission (NRC) adheres to its Principles of Good Regulation. The Principles-Independence, Openness, Efficiency, Clarity, and Reliability-apply to the agency as a whole in its decision-making and to the individual conduct of NRC employees. This paper describes the application of the Principles in a real-life staff activity, a guidance document used in the NRC's low-level radioactive waste (LLW) program, the Concentration Averaging and Encapsulation Branch Technical Position (CA BTP). The staff's process to revise the document, as well as the final content of the document, were influenced by following the Principles. For example, consistent with the Openness Principle, the staff conducted a number of outreach activities and received many comments on three drafts of the document. Stakeholder comments affected the final staff positions in some cases. The revised CA BTP, once implemented, is expected to improve management and disposal of LLW in the United States. Its positions have an improved nexus to health and safety; are more performance-based than previously, thus providing licensees with options for how they achieve the required outcome of protecting an inadvertent human intruder into a disposal facility; and provide for disposal of more sealed radioactive sources, which are a potential threat to national security. (author)

  9. Pengaruh Kepuasan dan Loyalitas Pelanggan terhadap Word Of Mouth pada Pelanggan Honda Motor di Surabaya

    OpenAIRE

    Rahmawati, Yuli; Suminar, Bagus

    2014-01-01

    This study aims to determine whether increased sales and increased production that occurs at the Honda motor company were due to customers satisfaction, loyalty, and word of mouth. The method of analysis was done by means of multiple linear regression analysis andpath analysis. The data were collected through a survey questionnaire. Questionnaires were distributed to Honda customers who were inadvertently encountered. They were the customers of Honda motorcycles with more than one year. The m...

  10. Disruption of the glutamate-glutamine cycle involving astrocytes in an animal model of depression for males and females

    Directory of Open Access Journals (Sweden)

    Virginie Rappeneau

    2016-12-01

    Full Text Available Background: Women are twice as likely as men to develop major depression (MD. The brain mechanisms underlying this sex disparity are not clear. Disruption of the glutamate-glutamine cycle has been implicated in psychiatric disturbances. This study identifies sex-based impairments in the glutamate-glutamine cycle involving astrocytes using an animal model of depression. Methods: Male and female adult Long-Evans rats were exposed to chronic social defeat stress (CSDS for 21 days, using a modified resident-intruder paradigm. Territorial aggression was used for males and maternal aggression was used for females to induce depressive-like deficits for intruders. The depressive-like phenotype was assessed with intake for saccharin solution, weight gain, estrous cycle, and corticosterone (CORT. Behaviors displayed by the intruders during daily encounters with residents were characterized. Rats with daily handling were used as controls for each sex. Ten days after the last encounter, both the intruders and controls were subjected to a no-net-flux in vivo microdialysis to assess glutamate accumulation and extracellular glutamine in the nucleus accumbens (NAc. The contralateral hemispheres were used for determining changes in astrocytic markers, including glial fibrillary acidic protein (GFAP and glutamate transporter-1 (GLT-1. Results: Both male and female intruders reduced saccharin intake over the course of CSDS, compared to their pre-stress period and to their respective controls. Male intruders exhibited submissive/defensive behaviors to territorial aggression by receiving sideways threats and bites. These males showed reductions in striatal GLT-1 and spontaneous glutamine in the NAc, compared to controls. Female intruders exhibited isolated behaviors to maternal aggression, including immobility, rearing, and self-grooming. Their non-reproductive days were extended. Also, they showed reductions in prefrontal and accumbal GFAP+ cells and prefrontal GLT

  11. Physical versus psychological social stress in male rats reveals distinct cardiovascular, inflammatory and behavioral consequences

    Science.gov (United States)

    Padi, Akhila R.; Moffitt, Casey M.; Wilson, L. Britt; Wood, Christopher S.; Wood, Susan K.

    2017-01-01

    Repeated exposure to social stress can precipitate the development of psychosocial disorders including depression and comorbid cardiovascular disease. While a major component of social stress often encompasses physical interactions, purely psychological stressors (i.e. witnessing a traumatic event) also fall under the scope of social stress. The current study determined whether the acute stress response and susceptibility to stress-related consequences differed based on whether the stressor consisted of physical versus purely psychological social stress. Using a modified resident-intruder paradigm, male rats were either directly exposed to repeated social defeat stress (intruder) or witnessed a male rat being defeated. Cardiovascular parameters, behavioral anhedonia, and inflammatory cytokines in plasma and the stress-sensitive locus coeruleus were compared between intruder, witness, and control rats. Surprisingly intruders and witnesses exhibited nearly identical increases in mean arterial pressure and heart rate during acute and repeated stress exposures, yet only intruders exhibited stress-induced arrhythmias. Furthermore, re-exposure to the stress environment in the absence of the resident produced robust pressor and tachycardic responses in both stress conditions indicating the robust and enduring nature of social stress. In contrast, the long-term consequences of these stressors were distinct. Intruders were characterized by enhanced inflammatory sensitivity in plasma, while witnesses were characterized by the emergence of depressive-like anhedonia, transient increases in systolic blood pressure and plasma levels of tissue inhibitor of metalloproteinase. The current study highlights that while the acute cardiovascular responses to stress were identical between intruders and witnesses, these stressors produced distinct differences in the enduring consequences to stress, suggesting that witness stress may be more likely to produce long-term cardiovascular

  12. An Analysis of the Concurrent Certification Program at Fleet Readiness Center Southwest

    Science.gov (United States)

    2009-12-01

    Mapping  5S Methodology  Kanban  Poka - yoke  A3 Problem Solving  Single Point Lesson Plans (SPLP)  Total Productive Maintenance (TPM) 54 What...the actual demand of the customers. Kanban is as a demand signal which immediately propagates through the supply chain. D. POKA - YOKE : A Japanese...term that means "fail-safing" or "mistake- proofing." Avoiding (yokeru) inadvertent errors ( poka ) is a behavior-shaping constraint, or a method of

  13. LMR steam generator blowdown with RETRAN

    International Nuclear Information System (INIS)

    Wei, T.Y.C.

    1985-01-01

    One of the transients being considered in the FSAR Chapter 15 analyses of anticipated LMR transients is the fast blowdown of a steam generator upon inadvertent actuation of the liquid metal/water reaction mitigation system. For the blowdown analysis, a stand-alone steam generator model for the IFR plant was constructed using RETRAN

  14. Aggressive display and territoriality of the bateleur Terathopius ...

    African Journals Online (AJOL)

    1988-07-04

    Jul 4, 1988 ... territorial function because it drives intruders away from the nest, usually by a gain in altitude by the intruder. ... bateleur I saw in the field, also noting the bird's age and ..... benefit of territoriality may change depending on the.

  15. Use of geophysical and geochemical data in the analysis of the mud volcanoes in the absheron block

    International Nuclear Information System (INIS)

    Kulieva, R.; Connor, J.A

    2002-01-01

    Full text: The Absheron exploration block in the South Caspian Sea contains a single elongate anticline, which has structural closure from near the base of the Quaternary to the Middle Miocene, from about 1000 to 10,000 metres below se-level.A large mud volcano is visible on geophysical data close to the crest of the anticline, in the eastern part of the block.It is about 5 kms. In diameter at the sea floor, is almost flat-topped and stands approximately 60 metres above the surrounding seabed.Compressional wave seismic energy is almost completely reflected by the water-mud volcano interface, or absorbed within the upper few tens of metres of the mud volcano, which appears to be active. The surrounding quaternary sediments have had mud-volcanic material intruded into and extruded over them.The conduit for these gas-charged flows is assumed to be a fault,extending to the Oligocene-Early Miocene Mykop source rocks at a depth of 10 kms or more, though the fault is not imaged on seismic due to the lack of energy penetration under the volcano.The extent and nature of the intruded material have been analysed on seismic data.The surface of the mud volcano and its recent flows has been imaged on very high-resolution single channel seismic data and on side-scan sonar.Anomalies seen on gravity data recorded over the volcano have been used to estimate the lateral and vertical extent of the intruded sediments and their densities.Drop-coring surveys have sampled the sediments at the seabed at locations on and adjacent to the mud volcano.These samples have been analysed for geotechnical and geophysical properties, and for the chemical properties of gases extracted from them.The integration of all of these analyses has enabled a preliminary interpretation of the history of the mud volcanic activity, the nature of the breccias brought to the seafloor and the likely origin of the gas source of this activity.

  16. A Policy Analysis and Quantitative Assessment of Key Issues Arising from Climate Change Negotiations Following COP 7

    Energy Technology Data Exchange (ETDEWEB)

    Sager, J M

    2003-04-01

    This paper aims to assess the consequences of the amendments made to the Kyoto Protocol during COP 7 in Marrakech. Following a comprehensive policy analysis, the major issue of 'hot air' and CDM transaction costs is examined using the CERT model. This was done to show that primary supply regions, typically those with 'hot air' availability, might control the emissions reduction permit supply market and maximise net export revenues of permit supply by withholding 40 to 60% of available 'hot air' credits. The assumption that primary permit suppliers control permit price via a restriction of 'hot air' supply to the market will inadvertently leave a portion of the market share open to Non-Annex B CDM supply, despite potentially extreme variance in CDM transaction costs. A summary table of policy implications on the emissions reduction permit market is also included in the Appendix. (author)

  17. Proceedings of the tenth annual DOE low-level waste management conference: Session 2: Site performance assessment

    International Nuclear Information System (INIS)

    1988-12-01

    This document contains twelve papers on various aspects of low-level radioactive waste management. Topics of this volume include: performance assessment methodology; remedial action alternatives; site selection and site characterization procedures; intruder scenarios; sensitivity analysis procedures; mathematical models for mixed waste environmental transport; and risk assessment methodology. Individual papers were processed separately for the database

  18. PHYSICS AND SAFETY ANALYSIS FOR THE NIST RESEARCH REACTOR

    International Nuclear Information System (INIS)

    CHENG, L.; HANSON, A.; DIAMOND, D.; XU, J.; CAREW, J.; RORER, D.

    2004-01-01

    Detailed reactor physics and safety analyses have been performed for the 20 MW D 2 O moderated research reactor (NBSR) at the National Institute of Standards and Technology (NIST). The analyses provide an update to the Final Safety Analysis Report (FSAR) and employ state-of-the-art calculational methods. Three-dimensional Monte Carlo neutron and photon transport calculations were performed with the MCNP code to determine the safety parameters for the NBSR. The core depletion and determination of the fuel compositions were performed with MONTEBURNS. MCNP calculations were performed to determine the beginning, middle, and end-of-cycle power distributions, moderator temperature coefficient, and shim safety arm, beam tube and void reactivity worths. The calculational model included a plate-by-plate description of each fuel assembly, axial mid-plane water gap, beam tubes and the tubular geometry of the shim safety arms. The time-dependent analysis of the primary loop was determined with a RELAP5 transient analysis model that includes the pump, heat exchanger, fuel element geometry, and flow channels for both the six inner and twenty-four outer fuel elements. The statistical analysis used to assure protection from critical heat flux (CHF) was performed using a Monte Carlo simulation of the uncertainties contributing to the CHF calculation. The power distributions used to determine the local fuel conditions and margin to CHF were determined with MCNP. Evaluations were performed for the following accidents: (1) the control rod withdrawal startup accident, (2) the maximum reactivity insertion accident, (3) loss-of-flow resulting from loss of electrical power, (4) loss-of-flow resulting from a primary pump seizure, (5) loss-of-flow resulting from inadvertent throttling of a flow control valve, (6) loss-of-flow resulting from failure of both shutdown cooling pumps and (7) misloading of a fuel element. In both the startup and maximum reactivity insertion accidents, the core

  19. Improving Protection Agains Intruders Using Passive Sonar

    NARCIS (Netherlands)

    Fillinger, L.; Hunter, A.J.; Zampolli, M.; Clarijs, M.C.; Verolme, J.L.

    2011-01-01

    Divers and small vessels are increasingly recognized as a potential threat to high value assets. Harbour and waterside surveillance systems that are used to counter the threat of divers are usually based on active sonar, whose performance can be limited by reverberation in a harbour environment.

  20. Report on the training for an intruder

    International Nuclear Information System (INIS)

    Aoki, Yoshikazu; Fukumoto, Masahiro; Saito, Toru; Tsujinaka, Hideyuki

    2002-12-01

    Crisis management section members of Japan Nuclear Cycle Development Institute (JNC) Tokai Works had implemented two types of trainings against terrorism in last Japanese fiscal year and improved the countermeasure against the terrorism. In this fiscal year we trained against the new type of terrorism in the period of about 1 year later of a series of attacks on America by terrorism. As a result of the training some points which need further improvements and new weak points have been availed as follows. (1) Enlightenment of workers' senses against terrorism. Few members of the Emergency Control Center, workers and guards looked tensionless in the training. The sense against terrorism needs to be enlightened. (2) Speediness of initial response. In this training the events using a car went on more rapidly than expected. The rapid response to counter terrorism needs to be examined. (3) Improvement of fundamental countermeasures. The fundamental response of the workers to the terrorism under limited condition before the guard authorities' arrival has been improved further more through the education and trainings. (4) Completeness of the prevention of terrorism. After terrorism occurs, Tokai Works is helpless until the guard authorities arrive. First of all the measure to avoid terrorism occurrence is important. (5) Strengthen the cooperation with the guard authorities. Besides completeness of the prevention of terrorism it is necessary to cope with the guard authorities at ordinary times against an emergency. (author)

  1. How to recognize intruders in your niche

    DEFF Research Database (Denmark)

    Andersen, Hanne

    2006-01-01

    first show the inconsistency between the basic premises underlying Kuhn’s incommensurability thesis and the two standard responses to the thesis. I shall then argue that if one adopts Kuhn’s position, the response must build on a notion of overlap between phenomenal worlds. Finally, I shall argue...

  2. Resilience to failure and breakdown

    NARCIS (Netherlands)

    Horst, A.R.A. van der

    2012-01-01

    One should take into account inadvertent aberrations of the system (for example a broken signalling device) or of the road user (is not always paying full attention to the driving task). Inadvertent aberrations should not result in accidents (principle of graceful degradation).

  3. Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

    Science.gov (United States)

    2016-12-01

    have begun discussing strategies for securing entities in cyberspace—includ- ing the files and software belonging to corporations , government...through the best strategies for deterring cyber-incursions. The immigration analogy is particularly useful for exploring how would-be intruders learn...analysis, evaluation, and refinement of professional expertise in war, strategy , operations, national security, resource management, and responsible

  4. Proceedings of the tenth annual DOE low-level waste management conference: Session 2: Site performance assessment

    Energy Technology Data Exchange (ETDEWEB)

    1988-12-01

    This document contains twelve papers on various aspects of low-level radioactive waste management. Topics of this volume include: performance assessment methodology; remedial action alternatives; site selection and site characterization procedures; intruder scenarios; sensitivity analysis procedures; mathematical models for mixed waste environmental transport; and risk assessment methodology. Individual papers were processed separately for the database. (TEM)

  5. Horizontal Conflict Resolution Maneuvers with a Cockpit Display of Traffic Information

    Science.gov (United States)

    Palmer, E.; Jago, S.; Dubord, M.

    1981-01-01

    Pilot resolution of potential conflicts in the horizontal plane when the only information available on the other aircraft was presented on a Cockpit Display of Traffic Information (CDTI) is investigated. The pilot's task was to assess the situation and if necessary maneuver so as to avoid the other aircraft. No instructions were given on evasive strategy or on what was considered to be an acceptable minimum separation. The results indicate that pilots had a strong bias of turning toward the intruder aircraft in order to pass behind it. In more than 50% of the encounters with a 90 degree crossing angle in which the intruder aircraft was programmed to pass behind the aircraft, the pilots maneuvered so as to pass behind the intruder. This bias was not as strong with the display which showed a prediction of the intruder's relative velocity. The average miss distance for all encounters was about 4500 feet.

  6. Effects of acute sublethal gamma radiation exposure on aggressive behavior in male mice: A dose-response study

    International Nuclear Information System (INIS)

    Maier, D.M.; Landauer, M.R.

    1989-01-01

    The resident-intruder paradigm was used to assess the effects of gamma radiation (0, 3, 5, 7 Gray [Gy] cobalt-60) on aggressive offensive behavior in resident male mice over a 3-month period. The defensive behavior of nonirradiated intruder mice was also monitored. A dose of 3 Gy had no effect on either the residents' offensive behavior or the defensive behavior of the intruders paired with them. Doses of 5 and 7 Gy produced decreases in offensive behavior of irradiated residents during the second week postirradiation. The nonirradiated intruders paired with these animals displayed decreases in defensive behavior during this time period, indicating a sensitivity to changes in the residents' behavior. After the third week postirradiation, offensive and defensive behavior did not differ significantly between irradiated mice and sham-irradiated controls. This study suggests that sublethal doses of radiation can temporarily suppress aggressive behavior but have no apparent permanent effect on that behavior

  7. 78 FR 61202 - Medicare Program; Prospective Payment System and Consolidated Billing for Skilled Nursing...

    Science.gov (United States)

    2013-10-03

    ... Processing Manual (CMS Publication 100- 04) was inadvertently abbreviated incorrectly. On page 47963, in our... Benefit Policy Manual (CMS Publication 100-02) was inadvertently abbreviated incorrectly. B. Summary of... provisions of a rule take effect in accordance with section 553(b) of the Administrative Procedure Act (APA...

  8. ANALYSIS OF VENTING OF A RESIN SLURRY

    Energy Technology Data Exchange (ETDEWEB)

    Laurinat, J.; Hensel, S.

    2012-03-27

    A resin slurry venting analysis was conducted to address safety issues associated with overpressurization of ion exchange columns used in the Purex process at the Savannah River Site (SRS). If flow to these columns were inadvertently interrupted, an exothermic runaway reaction could occur between the ion exchange resin and the nitric acid used in the feed stream. The nitric acid-resin reaction generates significant quantities of noncondensable gases, which would pressurize the column. To prevent the column from rupturing during such events, rupture disks are installed on the column vent lines. The venting analysis models accelerating rate calorimeter (ARC) tests and data from tests that were performed in a vented test vessel with a rupture disk. The tests showed that the pressure inside the test vessel continued to increase after the rupture disk opened, though at a slower rate than prior to the rupture. Calculated maximum discharge rates for the resin venting tests exceeded the measured rates of gas generation, so the vent size was sufficient to relieve the pressure in the test vessel if the vent flow rate was constant. The increase in the vessel pressure is modeled as a transient phenomenon associated with expansion of the resin slurry/gas mixture upon rupture of the disk. It is postulated that the maximum pressure at the end of this expansion is limited by energy minimization to approximately 1.5 times the rupture disk burst pressure. The magnitude of this pressure increase is consistent with the measured pressure transients. The results of this analysis demonstrate the need to allow for a margin between the design pressure and the rupture disk burst pressure in similar applications.

  9. On Entry Deterrence and Imperfectly Observable Commitment

    DEFF Research Database (Denmark)

    Poulsen, Anders

    2001-01-01

    We analyse a simple entry-deterrence game, where a `Potential Intruder' only imperfectly observes the decision of an `Incumbent' to commit or to not commit to fight any entry by the Potential Intruder. Our game generalises the one studied in Bonanno (1992) by allowing for a richer information tec...

  10. A Retrospective Study of Clinical Effects of Powdered Caffeine Exposures Reported to Three US Poison Control Centers.

    Science.gov (United States)

    Beauchamp, Gillian A; Johnson, Amberly R; Crouch, Barbara I; Valento, Matthew; Horowitz, B Zane; Hendrickson, Robert G

    2016-09-01

    Anhydrous caffeine, often sold on the Internet as a powdered caffeine product, is sold as "pure caffeine" to be used as an additive to beverages and has also been used as an ingredient in energy supplement products. This is a retrospective multiple-poison center chart review of calls regarding powdered caffeine to poison centers covering Oregon, Alaska, Guam, Washington, and Utah between January 1, 2013 and June 30, 2015. There were 40 calls to three poison centers over 30 months for powdered caffeine exposure. The majority of patients were over age 19 (52.5 %; 21/40) and male (70 %; 28/40). Sixty percent (24/40) of the patients were symptomatic but only 10 % (4/40) required admission; 52.5 % (21/40) of the patient calls were for inadvertent overdose of powdered caffeine; one patient overdosed in a self-harm attempt. Powdered caffeine calls to three poison centers during a 30-month study period were rare, and severe caffeine toxicity due to exposure was found in few patients. The majority of symptoms were reported after an inadvertent powdered caffeine overdose. An analysis of calls to three poison centers for powdered caffeine found that exposures were uncommon, but did result in toxicity, and highlighted that the lack of clear dosing instructions on product packaging may place patients at risk of inadvertent overdose.

  11. Morphologic and hemodynamic analysis of dental pulp in dogs after molar intrusion with the skeletal anchorage system.

    Science.gov (United States)

    Konno, Yuichi; Daimaruya, Takayoshi; Iikubo, Masahiro; Kanzaki, Reiko; Takahashi, Ichiro; Sugawara, Junji; Sasano, Takashi

    2007-08-01

    We have successfully treated skeletal open bite by intruding posterior teeth with the skeletal anchorage system. Our aim in this study was to morphologically and hemodynamically evaluate the changes in pulp tissues when molars are radically intruded. The mandibular fourth premolars of 9 adult beagle dogs were divided into 3 groups: a sham operated group (n = 6, 3 dogs), 4-month intrusion group (n = 6, 3 dogs), and a further 4-month retention group (n = 6, 3 dogs). We evaluated the morphological changes of the pulp and dentin-the amount of vacuolar degeneration in the odontoblast layer, the predentin width and nervous continuity in the pulp tissue, and the pulpal blood-flow response evoked by electrical stimulation in the dental pulp. Extreme molar intrusion with the skeletal anchorage system caused slight degenerative changes in the pulp tissue, followed by recovery after the orthodontic force was released. Circulatory system and nervous functions were basically maintained during the intrusion, although a certain level of downregulation was observed. These morphologic and functional regressive changes in the pulp tissue after molar intrusion improved during the retention period. Histologic changes and changes in pulpal blood flow and function are reversible, even during radical intrusion of molars.

  12. 75 FR 75145 - Regulated Navigation Area, Chicago Sanitary and Ship Canal, Romeoville, IL; Safety Zone, Chicago...

    Science.gov (United States)

    2010-12-02

    ... water on board does not allow for inadvertent leakage. Therefore, there is no inconsistency between the regulations. Furthermore, for those vessels that cannot avoid inadvertent leakage of non-potable water, they... any water taken on board to control or maintain trim, draft, stability or stresses of the vessel, or...

  13. The adverse effects of inadvertent intraoperative intravenous ...

    African Journals Online (AJOL)

    2012-03-03

    Mar 3, 2012 ... We present the case of a 24-year-old woman who was scheduled for an elective diagnostic laparoscopy for chronic pelvic pain. ... Shortly afterwards, the patient developed tachycardia with a heart rate up .... healthy 29-year-old male scheduled for an ambulatory coelioscopic cholecystectomy. Their patient ...

  14. Inadvertent filtering bleb following sutureless cataract surgery

    Directory of Open Access Journals (Sweden)

    Jain Sunil

    2005-01-01

    Full Text Available The case history of a sixty-two-year-old lady, who presented with a bleb in the upper part of her left eye following cataract surgery was studied. The patient had no prior history of any glaucoma surgery. Gonioscopy revealed fishmouthing of the internal aspect of the scleral tunnel incision. The diagnosis of post-cataract filtering bleb was made which was managed by resuturing the wound. This case highlights the use of gonioscopy to visualise and evaluate the internal wound and discusses intraoperative recognition of internal leak and its management with horizontal sutures.

  15. A Policy Analysis and Quantitative Assessment of Key Issues Arising from Climate Change Negotiations Following COP 7

    Energy Technology Data Exchange (ETDEWEB)

    Sager, J. M

    2003-04-01

    This paper aims to assess the consequences of the amendments made to the Kyoto Protocol during COP 7 in Marrakech. Following a comprehensive policy analysis, the major issue of 'hot air' and CDM transaction costs is examined using the CERT model. This was done to show that primary supply regions, typically those with 'hot air' availability, might control the emissions reduction permit supply market and maximise net export revenues of permit supply by withholding 40 to 60% of available 'hot air' credits. The assumption that primary permit suppliers control permit price via a restriction of 'hot air' supply to the market will inadvertently leave a portion of the market share open to Non-Annex B CDM supply, despite potentially extreme variance in CDM transaction costs. A summary table of policy implications on the emissions reduction permit market is also included in the Appendix. (author)

  16. Ten Thousand Years of Solitude

    Energy Technology Data Exchange (ETDEWEB)

    Benford, G. (Los Alamos National Lab., NM (USA) California Univ., Irvine, CA (USA). Dept. of Physics); Kirkwood, C.W. (Los Alamos National Lab., NM (USA) Arizona State Univ., Tempe, AZ (USA). Coll. of Business Administration); Harry, O. (Los Alamos National Lab., NM (USA)); Pasqualetti, M.J. (Los Alamos National Lab., NM (USA) Arizona State Univ., Tempe, AZ (USA))

    1991-03-01

    This report documents the authors work as an expert team advising the US Department of Energy on modes of inadvertent intrusion over the next 10,000 years into the Waste Isolation Pilot Project (WIPP) nuclear waste repository. Credible types of potential future accidental intrusion into the WIPP are estimated as a basis for creating warning markers to prevent inadvertent intrusion. A six-step process is used to structure possible scenarios for such intrusion, and it is concluded that the probability of inadvertent intrusion into the WIPP repository over the next ten thousand years lies between one and twenty-five percent. 3 figs., 5 tabs.

  17. Ten Thousand Years of Solitude?

    International Nuclear Information System (INIS)

    Benford, G.; Pasqualetti, M.J.

    1991-03-01

    This report documents the authors work as an expert team advising the US Department of Energy on modes of inadvertent intrusion over the next 10,000 years into the Waste Isolation Pilot Project (WIPP) nuclear waste repository. Credible types of potential future accidental intrusion into the WIPP are estimated as a basis for creating warning markers to prevent inadvertent intrusion. A six-step process is used to structure possible scenarios for such intrusion, and it is concluded that the probability of inadvertent intrusion into the WIPP repository over the next ten thousand years lies between one and twenty-five percent. 3 figs., 5 tabs

  18. 78 FR 66653 - Patient Protection and Affordable Care Act; HHS Notice of Benefit and Payment Parameters for 2014...

    Science.gov (United States)

    2013-11-06

    ... Essential Health Benefits, we inadvertently included the incorrect section reference to the Affordable Care... inadvertently omitted references to paragraphs (f) and (g) of this section. On page 15540, in the regulation... 553(b) of the Administrative Procedure Act (APA) (5 U.S.C. 553(b)). However, we can waive this notice...

  19. Development of Risk Insights for Regulatory Review of a Near-Surface Disposal Facility for Radioactive Waste

    International Nuclear Information System (INIS)

    Esh, D.W.; Ridge, A.C.; Thaggard, M.

    2006-01-01

    Section 3116 of the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 (NDAA) requires the Department of Energy (DOE) to consult with the Nuclear Regulatory Commission (NRC) about non-High Level Waste (HLW) determinations. In its consultative role, NRC performs technical reviews of DOE's waste determinations but does not have regulatory authority over DOE's waste disposal activities. The safety of disposal is evaluated by comparing predicted disposal facility performance to the performance objectives specified in NRC regulations for the disposal of low-level waste (10 CFR Part 61 Subpart C). The performance objectives contain criteria for protection of the public, protection of inadvertent intruders, protection of workers, and stability of the disposal site after closure. The potential radiological dose to receptors typically is evaluated with a performance assessment (PA) model that simulates the release of radionuclides from the disposal site, transport of radionuclides through the environment, and exposure of potential receptors to residual contamination for thousands of years. This paper describes NRC's development and use of independent performance assessment modeling to facilitate review of DOE's non-HLW determination for the Saltstone Disposal Facility (SDF) at the Savannah River Site. NRC's review of the safety of near-surface disposal of radioactive waste at the SDF was facilitated and focused by risk insights developed with an independent PA model. The main components of NRC's performance assessment model are presented. The development of risk insights that allow the staff to focus review efforts on those areas that are most important to satisfying the performance objectives is discussed. Uncertainty analysis was performed of the full stochastic model using genetic variable selection algorithms. The results of the uncertainty analysis were then used to guide the development of simulations of other scenarios to understand the key risk

  20. Accident Analysis for the NIST Research Reactor Before and After Fuel Conversion

    Energy Technology Data Exchange (ETDEWEB)

    Baek J.; Diamond D.; Cuadra, A.; Hanson, A.L.; Cheng, L-Y.; Brown, N.R.

    2012-09-30

    Postulated accidents have been analyzed for the 20 MW D2O-moderated research reactor (NBSR) at the National Institute of Standards and Technology (NIST). The analysis has been carried out for the present core, which contains high enriched uranium (HEU) fuel and for a proposed equilibrium core with low enriched uranium (LEU) fuel. The analyses employ state-of-the-art calculational methods. Three-dimensional Monte Carlo neutron transport calculations were performed with the MCNPX code to determine homogenized fuel compositions in the lower and upper halves of each fuel element and to determine the resulting neutronic properties of the core. The accident analysis employed a model of the primary loop with the RELAP5 code. The model includes the primary pumps, shutdown pumps outlet valves, heat exchanger, fuel elements, and flow channels for both the six inner and twenty-four outer fuel elements. Evaluations were performed for the following accidents: (1) control rod withdrawal startup accident, (2) maximum reactivity insertion accident, (3) loss-of-flow accident resulting from loss of electrical power with an assumption of failure of shutdown cooling pumps, (4) loss-of-flow accident resulting from a primary pump seizure, and (5) loss-of-flow accident resulting from inadvertent throttling of a flow control valve. In addition, natural circulation cooling at low power operation was analyzed. The analysis shows that the conversion will not lead to significant changes in the safety analysis and the calculated minimum critical heat flux ratio and maximum clad temperature assure that there is adequate margin to fuel failure.

  1. Inadvertent P-hacking among trials and systematic reviews of the effect of progestogens in pregnancy? A systematic review and meta-analysis.

    Science.gov (United States)

    Prior, M; Hibberd, R; Asemota, N; Thornton, J G

    2017-06-01

    Progestogens have been evaluated in numerous trials and meta-analyses, many of which concluded they were effective. However, two large trials PROMISE and OPPTIMUM have recently concluded that progesterone was ineffective. This raises the possibility that earlier studies and reviews had been biased by either selective publication or selective choice of outcomes, so called "P-hacking". To compare the findings all progestogen trials and systematic reviews with those of trials with pre-registered primary outcomes which avoided selective outcome reporting. Search of PubMed, the Cochrane Library and trial registries. Registration PROSPERO CRD42016035303. Systematic reviews of randomised trials comparing progestogen with placebo in pregnancy and the individual trials included in those reviews. The subset of trials reporting a pre-registered primary outcome were compared with the totality of trials and reviews. For reviews all outcomes were included. For individual trials all outcomes reported in the systematic reviews were included. For the comparison group we recorded the registered primary outcome from trials that were either registered before they started, or registered during the recruitment phase and also double blind. Nineteen of twenty-nine meta-analyses concluded that progestogens were effective. Twenty-two trials reported their pre-registered primary outcomes. There was no effect of progesterone on primary registered dichotomous outcome RR 1.00 (95% CI 0.94-1.07). Only one of the 22 showed a nominally statistically significant benefit. When evaluated in registered double-blind trials with analysis restricted to predefined primary outcomes, progestational agents in pregnancy are ineffective. Progestogens to prevent pregnancy loss, an example of P-hacking. © 2017 Royal College of Obstetricians and Gynaecologists.

  2. Publisher Correction: Evolutionary adaptations to new environments generally reverse plastic phenotypic changes.

    Science.gov (United States)

    Ho, Wei-Chin; Zhang, Jianzhi

    2018-02-21

    The originally published HTML version of this Article contained errors in the three equations in the Methods sub-section 'Metabolic network analysis', whereby the Greek letter eta (η) was inadvertently used in place of beta (β) during the production process. These errors have now been corrected in the HTML version of the Article; the PDF was correct at the time of publication.

  3. Causal Analysis of the Inadvertent Contact with an Uncontrolled Electrical Hazardous Energy Source (120 Volts AC)

    Energy Technology Data Exchange (ETDEWEB)

    David E. James; Dennis E. Raunig; Sean S. Cunningham

    2014-10-01

    On September 25, 2013, a Health Physics Technician (HPT) was performing preparations to support a pneumatic transfer from the HFEF Decon Cell to the Room 130 Glovebox in HFEF, per HFEF OI 3165 section 3.5, Field Preparations. This activity involves an HPT setting up and climbing a portable ladder to remove the 14-C meter probe from above ball valve HBV-7. The HPT source checks the meter and probe and then replaces the probe above HBV-7, which is located above Hood ID# 130 HP. At approximately 13:20, while reaching past the HBV-7 valve position indicator switches in an attempt to place the 14-C meter probe in the desired location, the HPT’s left forearm came in contact with one of the three sets of exposed terminals on the valve position indication switches for HBV 7. This resulted in the HPT receiving an electrical shock from a 120 Volt AC source. Upon moving the arm, following the electrical shock, the HPT noticed two exposed electrical connections on a switch. The HPT then notified the HFEF HPT Supervisor, who in turn notified the MFC Radiological Controls Manager and HFEF Operations Manager of the situation. Work was stopped in the area and the hazard was roped off and posted to prevent access to the hazard. The HPT was escorted by the HPT Supervisor to the MFC Dispensary and then preceded to CFA medical for further evaluation. The individual was evaluated and released without any medical restrictions. Causal Factor (Root Cause) A3B3C01/A5B2C08: - Knowledge based error/Attention was given to wrong issues - Written Communication content LTA, Incomplete/situation not covered The Causal Factor (root cause) was attention being given to the wrong issues during the creation, reviews, verifications, and actual performance of HFEF OI-3165, which covers the need to perform the weekly source check and ensure placement of the probe prior to performing a “rabbit” transfer. This resulted in the hazard not being identified and mitigated in the procedure. Work activities with in HFEF-OI-3165 placed the HPT in proximity of an unmitigated hazard directly resulting in this event. Contributing Factor A3B3C04/A4B5C04: - Knowledge Based Error, LTA Review Based on Assumption That Process Will Not Change - Change Management LTA, Risks/consequences associated with change not adequately reviewed/assessed Prior to the pneumatic system being out of service, the probe and meter were not being source checked together. The source check issue was identified and addressed during the period of time when the system was out of service. The corrective actions for this issue resulted in the requirement that a meter and probe be source checked together as it is intended to be used. This changed the activity and required an HPT to weekly, when in use, remove and install the probe from above HBV-7 to meet the requirement of LRD 15001 Part 5 Article 551.5. Risks and consequences associated with this change were not adequately reviewed or assessed. Failure to identify the hazard associated with this change directly contributed to this event.

  4. FT4 Data Analysis Summary (SSI-ARC)

    Science.gov (United States)

    Isaacson, Douglas R.; Gong, Chester; Reardon, Scott Edward; Santiago, Confesor

    2016-01-01

    Standards for Unmanned Aircraft System (UAS) Detect-and-Avoid (DAA) systems are currently being developed under the auspices of the RTCA Special Committee 228 (SC-228). To support the development of these standards, a series of flight tests has been conducted at NASAs Armstrong Flight Research Center (NASA-AFRC). The fourth in this series of flight test activities (Flight Test 4, or simply FT4) was conducted during the Spring and Summer of 2016. FT4 supported the objectives of numerous organizations working toward UAS DAA Minimum Operational Performance Standards (MOPS) and UAS DAA Radar MOPS. The summary provided herein is limited to the objectives, analysis and conclusions of the NASA Ames Research Center (NASA-ARC) SSI team toward the refinement of UAS DAA MOPS. This document provides a high-level overview of FT4 and the SSI-ARC objectives, a summary of the data analysis methodology and recommendations for UAS DAA MOPS refinements based on the data analysis results. A total of 72 encounters were flown to support SSI-ARC objectives. Test results were generally consistent with acceptable UAS DAA system performance and will be considered in broader SC-228 requirements validation efforts. Observed alert lead times indicated acceptable UAS DAA alerting performance. Effective interoperability between the UAS DAA system and the Traffic Alert and Collision Avoidance System (TCAS) was observed with one notable exception: TCAS Resolutions Advisories (RA) were observed in the absence of any DAA alert on two occasions, indicating the need for alert parameter refinement. Findings further indicated the need for continued work in the areas of DAA Well Clear Recovery logic and alert stability for Mode-C-only intruders. Finally, results demonstrated a high level of compliance with a set of evaluation criteria designed to provide anecdotal evidence of acceptable UAS DAA system performance.

  5. Determination of operating limits for radionuclides for a proposed landfill at Paducah Gaseous Diffusion Plant

    International Nuclear Information System (INIS)

    Wang, J.C.; Lee, D.W.; Ketelle, R.H.; Lee, R.R.; Kocher, D.C.

    1994-01-01

    The operating limits for radionuclides in sanitary and industrial wastes were determined for a proposed landfill at the Paducah Gaseous Diffusion Plant (PGDP), Kentucky. These limits, which may be very small but nonzero, are not mandated by law or regulation but are needed for rational operation. The approach was based on analyses of the potential contamination of groundwater at the plant boundary and the potential exposure to radioactivity of an intruder at the landfill after closure. The groundwater analysis includes (1) a source model describing the disposal of waste and the release of radionuclides from waste to the groundwater, (2) site-specific groundwater flow and contaminant transport calculations, and (3) calculations of operating limits from the dose limit and conversion factors. The intruder analysis includes pathways through ingestion of contaminated vegetables and soil, external exposure to contaminated soil, and inhalation of suspended activity from contaminated soil particles. In both analyses, a limit on annual effective dose equivalent of 4 mrem (0.04 mSv) was adopted. The intended application of the results is to refine the radiological monitoring standards employed by the PGDP Health Physics personnel to determine what constitutes radioactive wastes, with concurrence of the Commonwealth of Kentucky

  6. Structure of intruder band in "1"1"9"-"1"2"9Xe

    International Nuclear Information System (INIS)

    Sharma, H.P.; Chakraborty, S.; Tiwary, S.S.

    2017-01-01

    Xe isotopes in A∼130 mass region are known for their variety of structural phenomena, such as, unexpected signature splitting, signature inversion, γ-vibration etc. These phenomena are associated to axialy asymmetric shape. The triaxial shape in Xe nuclei are expected to originate due to the availability of prolate driving low-Ω πh_1_1_/_2 orbital and oblate driving high-Ω νh11/2 orbital near Fermi surface. The observed experimental E (4"+)/E (2"+) value (∼2.5) also support the γ-soft nature of these nuclei. Interestingly, both proton and neutron alignments have been observed in νh_1_1_/_2 band in "1"1"9"-"1"2"5Xe and neutron alignment dominates. In "1"2"9Xe, proton alignment reported to dominate. It is also supported by TPRM calculations, although, there are no significant change in the neutron orbitals. Whether this change in the alignment is occurred at N=75 or 73 is not known. Therefore, it is interesting to understand the status of the neutron and proton alignment in "1"2"7Xe, which are not studied well. Hence, in-beam γ-ray spectroscopy of "1"2"7Xe was carried out using "1"2"2Sn("9Be, 4nγ) fusion-evaporation reaction at 48 MeV using INGA facility at Inter-University Accelerator Centre, New Delhi. Details of the analysis and results will be discussed during the conference. (author)

  7. A meta-analysis of executive components of working memory.

    Science.gov (United States)

    Nee, Derek Evan; Brown, Joshua W; Askren, Mary K; Berman, Marc G; Demiralp, Emre; Krawitz, Adam; Jonides, John

    2013-02-01

    Working memory (WM) enables the online maintenance and manipulation of information and is central to intelligent cognitive functioning. Much research has investigated executive processes of WM in order to understand the operations that make WM "work." However, there is yet little consensus regarding how executive processes of WM are organized. Here, we used quantitative meta-analysis to summarize data from 36 experiments that examined executive processes of WM. Experiments were categorized into 4 component functions central to WM: protecting WM from external distraction (distractor resistance), preventing irrelevant memories from intruding into WM (intrusion resistance), shifting attention within WM (shifting), and updating the contents of WM (updating). Data were also sorted by content (verbal, spatial, object). Meta-analytic results suggested that rather than dissociating into distinct functions, 2 separate frontal regions were recruited across diverse executive demands. One region was located dorsally in the caudal superior frontal sulcus and was especially sensitive to spatial content. The other was located laterally in the midlateral prefrontal cortex and showed sensitivity to nonspatial content. We propose that dorsal-"where"/ventral-"what" frameworks that have been applied to WM maintenance also apply to executive processes of WM. Hence, WM can largely be simplified to a dual selection model.

  8. The state of the art of predicting noise-induced sleep disturbance in field settings

    OpenAIRE

    Sanford Fidell; Barbara Tabachnick; Karl S Pearsons

    2010-01-01

    Several relationships between intruding noises (largely aircraft) and sleep disturbance have been inferred from the findings of a handful of field studies. Comparisons of sleep disturbance rates predicted by the various relationships are complicated by inconsistent data collection methods and definitions of predictor variables and predicted quantities. None of the relationships is grounded in theory-based understanding, and some depend on questionable statistical assumptions and analysis proc...

  9. X-ray Tomographic Analysis of Porosity Distributions in Gas Diffusion Layers of Proton Exchange Membrane Fuel Cells

    International Nuclear Information System (INIS)

    Odaya, S.; Phillips, R.K.; Sharma, Y.; Bellerive, J.; Phillion, A.B.; Hoorfar, M.

    2015-01-01

    This paper describes a method to characterize the structure of polytetrafluoroethylene (PTFE) treated gas diffusion layers (GDLs) with and without microporous layers (MPLs) using 3D X-ray micro computed tomographic (μCT) microscopy. In this work, the structure of single and dual layer GDLs is evaluated via μCT for various GDL samples (such as Toray TGP-H-060 and AvCarb EP40) loaded with different MPLs. A new method is presented for separating, or segmenting, the various phases of the GDL, i.e., void space, carbon fiber (including binder and PTFE), and MPL. Through analysis, it was found that the variation in bulk porosity and the average pore diameter of the GDLs depends highly on the GDL series manufacturing and treatment processes. Using advanced image analysis techniques, routines were developed to accurately segment the GDL fibers (including binder/PTFE) and the MPL. The percentage of the intruding MPL material into the carbon fiber paper as a function of the GDL thickness was successfully found for dual layer GDLs, with varying PTFE content and areal weight loading in the MPL. This analysis provides invaluable insight into the physical microstructure of paper-based GDLs, emphasizing the heterogeneous porosity distribution of single layer GDLs and the interaction of the MPL with the carbon fiber paper of dual layer GDLs

  10. RELAP5 Low Temperature Overpressurization Analysis for NPP Krsko

    International Nuclear Information System (INIS)

    Basic, I.; Krajnc, B.; Bajs, T.

    2000-01-01

    NEK has expressed interest in the acceptability of removing the autoclosure interlock (ACI) on the Residual Heat Removal System (RHRS) suction/isolation valves. This interest is in response to growing concerns about the loss of residual heat removal capability during cold shutdown and refueling operations. This article describes effort done to justify removal of the ACI in the light of low temperature overpressure protection of Reactor Coolant System (RCS) and RHRS and interfacing system LOCA potential. The intent of this article is to review the NEK RHRS relief valves sizing design basis and verify if the relief valves provide RHRS overpressure protection for the events possible at cold shutdown. Inadvertent isolation of RHRS during hot and cold shutdown (with reactor coolant system closed and temperatures below 177o Code 4 and5) presents one of the major safety concerns in this mode of operation. Detailed RELAP5 model of NPP Kriko following steam generator (SG) replacement and core uprate has been used in the frame of this analysis verification of RHRS relief valves sizing. The following limiting cases for cold shutdown with RCS solid conditions have been analyzed: - ransients that affect the system input/output mass balance, - ransients that affect the heat input/removal balance. (author)

  11. Petrographic Analysis and Geochemical Source Correlation of Pigeon Peak, Sutter Buttes, CA

    Science.gov (United States)

    Novotny, N. M.; Hausback, B. P.

    2013-12-01

    The Sutter Buttes are a volcanic complex located in the center of the Great Valley north of Sacramento. They are comprised of numerous inter-intruding andesite and rhyolite lava domes of varying compositions surrounded by a shallow rampart of associated tephras. The Pigeon Peak block-and-ash flow sequence is located in the rampart and made up of a porphyritic Biotite bearing Hornblende Andesite. The andesite blocks demonstrate a high degree of propylization in hornblende crystals, highly zoned plagioclase, trace olivine, and display a red to gray color gradation. DAR is an andesite dome located less than one mile from Pigeon Peak. Of the 15 to 25 andesite lava domes within four miles from Pigeon Peak, only DAR displays trace olivine, red to grey color stratification, low biotite content, and propylitized hornblende. These characteristic similarities suggest that DAR may be the source for Pigeon Peak. My investigation used microprobe analysis of the DAR and Pigeon Peak feldspar crystals to identify the magmatic history of the magma body before emplacement. Correlation of the anorthite zoning within the feldspars from both locations support my hypothesis that DAR is the source of the Pigeon Peak block-and-ash flow.

  12. Autoclave nuclear criticality safety analysis

    Energy Technology Data Exchange (ETDEWEB)

    D`Aquila, D.M. [Martin Marietta Energy Systems, Inc., Piketon, OH (United States); Tayloe, R.W. Jr. [Battelle, Columbus, OH (United States)

    1991-12-31

    Steam-heated autoclaves are used in gaseous diffusion uranium enrichment plants to heat large cylinders of UF{sub 6}. Nuclear criticality safety for these autoclaves is evaluated. To enhance criticality safety, systems are incorporated into the design of autoclaves to limit the amount of water present. These safety systems also increase the likelihood that any UF{sub 6} inadvertently released from a cylinder into an autoclave is not released to the environment. Up to 140 pounds of water can be held up in large autoclaves. This mass of water is sufficient to support a nuclear criticality when optimally combined with 125 pounds of UF{sub 6} enriched to 5 percent U{sup 235}. However, water in autoclaves is widely dispersed as condensed droplets and vapor, and is extremely unlikely to form a critical configuration with released UF{sub 6}.

  13. Trip setpoint analysis for the reactor protection system of an advanced integral reactor

    International Nuclear Information System (INIS)

    Yang, Soo Hyung; Kim, Soo Hyung; Chung, Young Jong; Zee, Sung Quun

    2007-01-01

    The trip setpoints for the reactor protection system of a 65-MWt advanced integral reactor have been analyzed through sensitivity evaluations by using the Transients and Setpoint Simulation/System-integrated Modular Reactor code. In the analysis, an inadvertent control rod withdrawal event has been considered as an initiating event because this event results in the worst consequences from the viewpoint of the minimum critical heat flux ratio and its consequences are considerably affected by the trip setpoints. Sensitivity evaluations have been performed by changing the trip setpoints for the ceiling of a variable overpower trip (VOPT) function and the pressure of a high pressurizer pressure trip function. Analysis results show that a VOPT function is an effective means to satisfy the acceptance criteria as the control rod rapidly withdraws: on the other hand, a high pressurizer pressure trip function is an essential measure to preserve the safety margin in the case of a slow withdrawal of the control rod because a reactor trip by a VOPT function does not occur in this case. It is also shown that the adoptions of 122.2% of the rated core power and 16.25 MPa as the trip setpoint for the ceiling of a VOPT function and the pressure of a high pressurizer pressure trip function are good selections to satisfy the acceptance criteria

  14. Apoplastic interactions between plants and plant root intruders

    Directory of Open Access Journals (Sweden)

    Kanako eMitsumasu

    2015-08-01

    Full Text Available Numerous pathogenic or parasitic organisms attack plant roots to obtain nutrients, and the apoplast including the plant cell wall is where the plant cell meets such organisms. Root-parasitic angiosperms and nematodes are two distinct types of plant root parasites but share some common features in their strategies for breaking into plant roots. Striga and Orobanche are obligate root parasitic angiosperms that cause devastating agricultural problems worldwide. Parasitic plants form an invasion organ called a haustorium, where plant cell wall degrading enzymes (PCWDEs are highly expressed. Plant-parasitic nematodes are another type of agriculturally important plant root parasite. These nematodes breach the plant cell walls by protruding a sclerotized stylet from which PCWDEs are secreted. Responding to such parasitic invasion, host plants activate their own defense responses against parasites. Endoparasitic nematodes secrete apoplastic effectors to modulate host immune responses and to facilitate the formation of a feeding site. Apoplastic communication between hosts and parasitic plants also contributes to their interaction. Parasitic plant germination stimulants, strigolactones (SLs, are recently identified apoplastic signals that are transmitted over long distances from biosynthetic sites to functioning sites. Here, we discuss recent advances in understanding the importance of apoplastic signals and cell walls for plant-parasite interactions.

  15. Apoplastic interactions between plants and plant root intruders.

    Science.gov (United States)

    Mitsumasu, Kanako; Seto, Yoshiya; Yoshida, Satoko

    2015-01-01

    Numerous pathogenic or parasitic organisms attack plant roots to obtain nutrients, and the apoplast including the plant cell wall is where the plant cell meets such organisms. Root parasitic angiosperms and nematodes are two distinct types of plant root parasites but share some common features in their strategies for breaking into plant roots. Striga and Orobanche are obligate root parasitic angiosperms that cause devastating agricultural problems worldwide. Parasitic plants form an invasion organ called a haustorium, where plant cell wall degrading enzymes (PCWDEs) are highly expressed. Plant-parasitic nematodes are another type of agriculturally important plant root parasite. These nematodes breach the plant cell walls by protruding a sclerotized stylet from which PCWDEs are secreted. Responding to such parasitic invasion, host plants activate their own defense responses against parasites. Endoparasitic nematodes secrete apoplastic effectors to modulate host immune responses and to facilitate the formation of a feeding site. Apoplastic communication between hosts and parasitic plants also contributes to their interaction. Parasitic plant germination stimulants, strigolactones, are recently identified apoplastic signals that are transmitted over long distances from biosynthetic sites to functioning sites. Here, we discuss recent advances in understanding the importance of apoplastic signals and cell walls for plant-parasite interactions.

  16. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: The ONSITE/MAXI1 computer program

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.; Neuder, S.M.

    1987-02-01

    This document summarizes initial efforts to develop human-intrusion scenarios and a modified version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. Supplement 1 of NUREG/CR-3620 (1986) summarized modifications and improvements to the ONSITE/MAXI1 software package. This document summarizes a modified version of the ONSITE/MAXI1 computer program. This modified version of the computer program operates on a personal computer and permits the user to optionally select radiation dose conversion factors published by the International Commission on Radiological Protection (ICRP) in their Publication No. 30 (ICRP 1979-1982) in place of those published by the ICRP in their Publication No. 2 (ICRP 1959) (as implemented in the previous versions of the ONSITE/MAXI1 computer program). The pathway-to-human models used in the computer program have not been changed from those described previously. Computer listings of the ONSITE/MAXI1 computer program and supporting data bases are included in the appendices of this document

  17. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: the ONSITE/MAXI1 computer program

    International Nuclear Information System (INIS)

    Napier, B.A.; Peloquin, R.A.; Kennedy, W.E. Jr.; Neuder, S.M.

    1984-10-01

    Because of uncertainties associated with assessing the potential risks from onsite burials of radioactive waste, the US Nuclear Regulatory Commission (NRC) has amended its regulations to provide greater assurance that buried radioactive material will not present a hazard to public health and safety. The amended regulations now require licensees to apply for approval of proposed procedures for onsite disposal pursuant to 10 CFR 20.302. The NRC technically reviews these requests on a case-by-case basis. These technical reviews require modeling potential pathways to man and projecting radiation dose commitments. This document contains a summary of our efforts to develop human-intrusion scenarios and to modify a version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. The documentation of the ONSITE/MAXI computer program is written for two audiences. The first (Audience A) includes persons concerned with the mathematical models and computer algorithms. The second (Audience B) includes persons concerned with exercising the computer program and scenarios for specific onsite disposal applications. Five sample problems are presented and discussed to assist the user in operating the computer program. Summaries of the input and output for the sample problems are included along with a discussion of the hand calculations performed to verify the correct operation of the computer program. Computer listings of the ONSITE/MAXI1 computer program with an abbreviated data base listing are included as Appendix 1 to this document. Finally, complete listings of the data base with listings of the special codes used to create the data base are included in Appendix 2 as a microfiche attachment to this document

  18. INITIAL SINGLE-SHELL TANK (SST) SYSTEM PERFORMANCE ASSESSMENT OF THE HANFORD SITE

    International Nuclear Information System (INIS)

    JARAYSI, M.N.

    2007-01-01

    The ''Initial Single-Shell Tank System Performance Assessment for the Hanford Site [1] (SST PA) presents the analysis of the long-term impacts of residual wastes assumed to remain after retrieval of tank waste and closure of the SST farms at the US Department of Energy (DOE) Hanford Site. The SST PA supports key elements of the closure process agreed upon in 2004 by DOE, the Washington State Department of Ecology (Ecology), and the US Environmental Protection Agency (EPA). The SST PA element is defined in Appendix I of the ''Hanford Federal Facility Agreement and Consent Order'' (HFFACO) (Ecology et al. 1989) [2], the document that establishes the overall closure process for the SST and double-shell tank (DST) systems. The approach incorporated in the SST PA integrates substantive features of both hazardous and radioactive waste management regulations into a single analysis. The defense-in-depth approach used in this analysis defined two major engineering barriers (a surface barrier and the grouted tank structure) and one natural barrier (the vadose zone) that will be relied on to control waste release into the accessible environment and attain expected performance metrics. The analysis evaluates specific barrier characteristics and other site features that influence contaminant migration by the various pathways. A ''reference'' case and a suite of sensitivity/uncertainty cases are considered. The ''reference case'' evaluates environmental impacts assuming central tendency estimates of site conditions. ''Reference'' case analysis results show residual tank waste impacts on nearby groundwater, air resources; or inadvertent intruders to be well below most important performance objectives. Conversely, past releases to the soil, from previous tank farm operations, are shown to have groundwater impacts that re significantly above most performance objectives. Sensitivity/uncertainty cases examine single and multiple parameter variability along with plausible alternatives

  19. International clinical volunteering in Tanzania: A postcolonial analysis of a Global Health business.

    Science.gov (United States)

    Sullivan, Noelle

    2018-03-01

    This article traces how scarcities characteristic of health systems in low-income countries (LICs), and increasing popular interest in Global Health, have inadvertently contributed to the popularisation of a specific Global Health business: international clinical volunteering through private volunteer placement organisations (VPOs). VPOs market neglected health facilities as sites where foreigners can 'make a difference', regardless of their skill set. Drawing on online investigation and ethnographic research in Tanzania over four field seasons from 2011 to 2015, including qualitative interviews with 41 foreign volunteers and 90 Tanzanian health workers, this article offers a postcolonial analysis of VPO marketing and volunteer action in health facilities of LICs. Two prevalent postcolonial racialised tropes inform both VPO marketing and foreign volunteers' discourses and practices in Tanzania. The first trope discounts Tanzanian expertise in order to envision volunteers in expert roles despite lacking training, expertise, or contextual knowledge. The second trope envisions Tanzanian patients as so impoverished that insufficiently trained volunteer help is 'better than nothing at all'. These two postcolonial racialised tropes inform the conceptual work undertaken by VPO marketing schemes and foreign volunteers in order to remake Tanzanian health professionals and patients into appropriate and justifiable sites for foreign volunteer intervention.

  20. Simplifying decision making: a practical framework

    OpenAIRE

    Chaudhry, Muhammad Shirjeel Riaz; Sidek, Mohmad Safhree

    2014-01-01

    Approved for public release; distribution is unlimited This thesis proposes a decision-making model based on PESTEL (Political, Economic, Social, Technological, Environmental, and Legal) analysis, AHP (Analytical Hierarchical Process), and game theory. The case study used to demonstrate the concept is a 2013 Malaysian crisis wherein foreign intruders occupied a village in Sabah state. The Malaysian government, ultimately, launched a military operation to clear the area. The focus of our st...

  1. Result Summary for the Area 5 Radioactive Waste Management Site Performance Assessment Model Version 4.110

    International Nuclear Information System (INIS)

    2011-01-01

    Results for Version 4.110 of the Area 5 Radioactive Waste Management Site (RWMS) performance assessment (PA) model are summarized. Version 4.110 includes the fiscal year (FY) 2010 inventory estimate, including a future inventory estimate. Version 4.110 was implemented in GoldSim 10.11(SP4). The following changes have been implemented since the last baseline model, Version 4.105: (1) Updated the inventory and disposal unit configurations with data through the end of FY 2010. (1) Implemented Federal Guidance Report 13 Supplemental CD dose conversion factors (U.S. Environmental Protection Agency, 1999). Version 4.110 PA results comply with air pathway and all-pathways annual total effective dose (TED) performance objectives (Tables 2 and 3, Figures 1 and 2). Air pathways results decrease moderately for all scenarios. The time of the maximum for the air pathway open rangeland scenario shifts from 1,000 to 100 years (y). All-pathways annual TED increases for all scenarios except the resident scenario. The maximum member of public all-pathways dose occurs at 1,000 y for the resident farmer scenario. The resident farmer dose was predominantly due to technetium-99 (Tc-99) (82 percent) and lead-210 (Pb-210) (13 percent). Pb-210 present at 1,000 y is produced predominantly by radioactive decay of uranium-234 (U-234) present at the time of disposal. All results for the postdrilling and intruder-agriculture scenarios comply with the performance objectives (Tables 4 and 5, Figures 3 and 4). The postdrilling intruder results are similar to Version 4.105 results. The intruder-agriculture results are similar to Version 4.105, except for the Pit 6 Radium Disposal Unit (RaDU). The intruder-agriculture result for the Shallow Land Burial (SLB) disposal units is a significant fraction of the performance objective and exceeds the performance objective at the 95th percentile. The intruder-agriculture dose is due predominantly to Tc-99 (75 percent) and U-238 (9.5 percent). The acute

  2. OFFSITE RADIOLOGICAL CONSEQUENCE CALCULATION FOR THE BOUNDING MIXING OF INCOMPATIBLE MATERIALS ACCIDENT

    International Nuclear Information System (INIS)

    SANDGREN, K.R.

    2006-01-01

    This document quantifies the offsite radiological consequence of the bounding mixing of incompatible materials accident for comparison with the 25 rem Evaluation Guideline established in Appendix A of DOE-STD-3009. The bounding accident is an inadvertent addition of acid to a waste tank. The calculated offsite dose does not challenge the Evaluation Guideline. Revision 4 updates the analysis to consider bulk chemical additions to single shell tanks (SSTs)

  3. University of Wisconsin, Nuclear Reactor Laboratory. Annual report, 1985-1986

    International Nuclear Information System (INIS)

    Cashwell, R.J.

    1986-01-01

    Operational activities for the reactor are described concerning nuclear engineering classes from the University of Wisconsin; reactor sharing program; utility personnel training; sample irradiations and neutron activation analysis; and changes in personnel, facility, and procedures. Results of surveillance tests are presented for operating statistics and fuel exposure; emergency shutdowns and inadvertent scrams; maintenance; radioactive waste disposal; radiation exposures; environmental surveys; and publications and presentations on work based on reactor use

  4. Simple preparation of plant epidermal tissue for laser microdissection and downstream quantitative proteome and carbohydrate analysis

    Directory of Open Access Journals (Sweden)

    Christian eFalter

    2015-03-01

    Full Text Available The outwardly directed cell wall and associated plasma membrane of epidermal cells represent the first layers of plant defense against intruding pathogens. Cell wall modifications and the formation of defense structures at sites of attempted pathogen penetration are decisive for plant defense. A precise isolation of these stress-induced structures would allow a specific analysis of regulatory mechanism and cell wall adaption. However, methods for large-scale epidermal tissue preparation from the model plant Arabidopsis thaliana, which would allow proteome and cell wall analysis of complete, laser-microdissected epidermal defense structures, have not been provided. We developed the adhesive tape – liquid cover glass technique for simple leaf epidermis preparation from A. thaliana, which is also applicable on grass leaves. This method is compatible with subsequent staining techniques to visualize stress-related cell wall structures, which were precisely isolated from the epidermal tissue layer by laser microdissection coupled to laser pressure catapulting. We successfully demonstrated that these specific epidermal tissue samples could be used for quantitative downstream proteome and cell wall analysis. The development of the adhesive tape – liquid cover glass technique for simple leaf epidermis preparation and the compatibility to laser microdissection and downstream quantitative analysis opens new possibilities in the precise examination of stress- and pathogen-related cell wall structures in epidermal cells. Because the developed tissue processing is also applicable on A. thaliana, well-established, model pathosystems that include the interaction with powdery mildews can be studied to determine principal regulatory mechanisms in plant-microbe interaction with their potential outreach into crop breeding.

  5. Near-Field Hydrology Data Package for the Immobilized Low-Activity Waste 2001 Performance Assessment

    International Nuclear Information System (INIS)

    PD Meyer; RJ Serne

    1999-01-01

    Lockheed Martin Hanford Company (LMHC) is designing and assessing the performance of disposal facilities to receive radioactive wastes that are currently stored in single- and double-shell tanks at the Hanford Site. The preferred method for disposing of the portion that is classified as immobilized low-activity waste (ILAW) is to vitrify the waste and place the product in new-surface, shallow land burial facilities. The LMHC project to assess the performance of these disposal facilities is the Hanford ILAW Performance Assessment (PA) Activity. The goal of this project is to provide a reasonable expectation that the disposal of the waste is protective of the general public, groundwater resources, air resources, surface water resources, and inadvertent intruders. Achieving this goal will require prediction of contaminant migration from the facilities. This migration is expected to occur primarily via the movement of water through the facilities and the consequent transport of dissolved contaminants in the pore water of the vadose zone. Pacific Northwest National Laboratory (PNNL) assists LMHC in its performance assessment activities. One of PNNL's tasks is to provide estimates of the physical, hydraulic, and transport properties of the materials comprising the disposal facilities and the disturbed region around them. These materials are referred to as the near-field materials. Their properties are expressed as parameters of constitutive models used in simulations of subsurface flow and transport. In addition to the best-estimate parameter values, information on uncertainty in the parameter values and estimates of the changes in parameter values over time are required to complete the PA. These parameter estimates and information are contained in this report, the Near-Field Hydrology Data Package

  6. Analysis to determine the maximum dimensions of flexible apertures in sensored security netting products.

    Energy Technology Data Exchange (ETDEWEB)

    Murton, Mark; Bouchier, Francis A.; vanDongen, Dale T.; Mack, Thomas Kimball; Cutler, Robert P; Ross, Michael P.

    2013-08-01

    Although technological advances provide new capabilities to increase the robustness of security systems, they also potentially introduce new vulnerabilities. New capability sometimes requires new performance requirements. This paper outlines an approach to establishing a key performance requirement for an emerging intrusion detection sensor: the sensored net. Throughout the security industry, the commonly adopted standard for maximum opening size through barriers is a requirement based on square inchestypically 96 square inches. Unlike standard rigid opening, the dimensions of a flexible aperture are not fixed, but variable and conformable. It is demonstrably simple for a human intruder to move through a 96-square-inch opening that is conformable to the human body. The longstanding 96-square-inch requirement itself, though firmly embedded in policy and best practice, lacks a documented empirical basis. This analysis concluded that the traditional 96-square-inch standard for openings is insufficient for flexible openings that are conformable to the human body. Instead, a circumference standard is recommended for these newer types of sensored barriers. The recommended maximum circumference for a flexible opening should be no more than 26 inches, as measured on the inside of the netting material.

  7. An Inadvertent Concurrent Replication: Same Roadmap, Different Journey

    Science.gov (United States)

    Lemons, Christopher J.; King, Seth A.; Davidson, Kimberly A.; Berryessa, Teresa L.; Gajjar, Shimul A.; Sacks, Lia H.

    2016-01-01

    Replication is a critical aspect of scientific inquiry that presents a variety of challenges to researchers, even under the best of conditions. We conducted a review of replication rates in special education journals similar to the review conducted by Makel et al. in this issue. Unknowingly conducting independent reviews allowed for an unexpected…

  8. Inadvertent doping through nutritional supplements is a reality

    African Journals Online (AJOL)

    Enrique

    In 1994 legislation was passed by the United States Food and Drug Administration ... resulting in contamination of nutritional supplements, which may be a possible ... Nutritional supplement manufacturing is not subject to the same stringent ...

  9. Quantitative volcanic susceptibility analysis of Lanzarote and Chinijo Islands based on kernel density estimation via a linear diffusion process

    Science.gov (United States)

    Galindo, I.; Romero, M. C.; Sánchez, N.; Morales, J. M.

    2016-06-01

    Risk management stakeholders in high-populated volcanic islands should be provided with the latest high-quality volcanic information. We present here the first volcanic susceptibility map of Lanzarote and Chinijo Islands and their submarine flanks based on updated chronostratigraphical and volcano structural data, as well as on the geomorphological analysis of the bathymetric data of the submarine flanks. The role of the structural elements in the volcanic susceptibility analysis has been reviewed: vents have been considered since they indicate where previous eruptions took place; eruptive fissures provide information about the stress field as they are the superficial expression of the dyke conduit; eroded dykes have been discarded since they are single non-feeder dykes intruded in deep parts of Miocene-Pliocene volcanic edifices; main faults have been taken into account only in those cases where they could modified the superficial movement of magma. The application of kernel density estimation via a linear diffusion process for the volcanic susceptibility assessment has been applied successfully to Lanzarote and could be applied to other fissure volcanic fields worldwide since the results provide information about the probable area where an eruption could take place but also about the main direction of the probable volcanic fissures.

  10. Performance assessment of Mochovce repository

    Energy Technology Data Exchange (ETDEWEB)

    Mrskova, A; Hanusik, V [Dept. of Accident Management and Risk Assessment, Vyskumny Ustav Jadrovych Elektrarni, Trnava (Slovakia)

    2000-07-01

    The near-surface disposal site at Mochovce is designed for low-level and intermediate level radioactive waste. It is a vault-type concrete structure housing the reinforced concrete containers as the final waste packages. This paper shortly presents the long-term safety analysis methods applied for the post-closure phase of the repository. The main aim of paper is description of the philosophy of analysis, development of the scenarios, their modeling and comparing of the results of normal evolution scenario, alternative scenario and intruders scenario for some radionuclides. (author)

  11. Performance assessment of Mochovce repository

    International Nuclear Information System (INIS)

    Mrskova, A.; Hanusik, V.

    2000-01-01

    The near-surface disposal site at Mochovce is designed for low-level and intermediate level radioactive waste. It is a vault-type concrete structure housing the reinforced concrete containers as the final waste packages. This paper shortly presents the long-term safety analysis methods applied for the post-closure phase of the repository. The main aim of paper is description of the philosophy of analysis, development of the scenarios, their modeling and comparing of the results of normal evolution scenario, alternative scenario and intruders scenario for some radionuclides. (author)

  12. Handling sticky Resin by Stingless Bees: Adhesive Properties of Surface Structures

    Directory of Open Access Journals (Sweden)

    MARKUS GASTAUER

    2013-09-01

    Full Text Available Many Stingless Bees (Hymenoptera: Meliponini like Tetragonisca angustula collect resin to defend their nests against intruders like ants or Robber Bees. Small portions of resin are attached to intruders bodies and extremities causing their immobilization. It has been observed that resin is removed easily from the bee's mandible but adheres strongly to the intruder's cuticle. We tested the hypothesis that resin sticks lesser to the mandibles of Stingless Bees than to the surface of intruders due to special surface structures or adhesive properties of these structures. The surface structures of the mandible of T. angustula and the trochanter of Camponotus sericeiventris were studied by scanning electron microscopy. To measure adhesion properties, selected surfaces were fixed on a fine glass pin and withdrawn from a glass tip covered with resin. The deformation of the glass pin indicates adhesion forces operating between the resin and the selective surface. The absolute value of the forces is computed from the glass pin's stiffness. It has been shown that resin sticks more to the smooth mandible of the bee than to the structured trochanter of the ant. A new hypothesis to be tested says that the bees might lubricate their mandibles with nectar or honey to reduce the resin's adhesion temporarily.

  13. A valence-universal coupled-cluster single- and double-excitations method for atoms: Pt. 3

    International Nuclear Information System (INIS)

    Jankowski, K.; Malinowski, P.

    1994-01-01

    To better understand the problems met when solving the equations of VU-CC approaches in the presence of intruder states, we are concerned with the following aspects of the solvability problem for sets of non-linear equations: the existence and properties of multiple solutions and the attainability of these solutions by means of various numerical methods. Our study is concentrated on the equations obtained for Be within the framework of the recently formulated atomically oriented form of the valence-universal coupled-cluster theory accounting for one- and two-electron excitations (VU-CCSD/R) and based on the complete model space (2s 2 , 2p 2 ). Six pairs of multiple solutions representing four 1 S states are found and discussed. Three of these solutions provide amplitudes describing the 2p 2 1 S state for which the intruder state problem has been considered as extremely serious. Several known numerical methods have been applied to solve the same set of non-linear equations for the two-valence cluster amplitudes. It is shown that these methods perform quite differently in the presence of intruder states, which seems to indicate that the intruder state problem for VU-CC methods is partly caused by the commonly used methods of solving the non-linear equations. (author)

  14. Study on Tower Models for EHV Transmission Line

    Directory of Open Access Journals (Sweden)

    Xu Bao-Qing

    2016-01-01

    Full Text Available Lightning outage accident is one of the main factors that threat seriously the safe and reliable operation of power system. So it is very important to establish reasonable transmission tower model and evaluate the impulse response characteristic of lightning wave traveling on the transmission tower properly for determining reliable lightning protection performance. With the help of Electromagnetic Transient Program (EMTP, six 500kV tower models are built. Aiming at one line to one transformer operating mode of 500kV substation, the intruding wave overvoltage under different tower models is calculated. The effect of tower model on intruding overvoltage has been studied. The results show that different tower models can result in great differences to the calculation results. Hence, reasonable selection of the tower model in the calculation of back- strike intruding wave is very important.

  15. Speaker information affects false recognition of unstudied lexical-semantic associates.

    Science.gov (United States)

    Luthra, Sahil; Fox, Neal P; Blumstein, Sheila E

    2018-05-01

    Recognition of and memory for a spoken word can be facilitated by a prior presentation of that word spoken by the same talker. However, it is less clear whether this speaker congruency advantage generalizes to facilitate recognition of unheard related words. The present investigation employed a false memory paradigm to examine whether information about a speaker's identity in items heard by listeners could influence the recognition of novel items (critical intruders) phonologically or semantically related to the studied items. In Experiment 1, false recognition of semantically associated critical intruders was sensitive to speaker information, though only when subjects attended to talker identity during encoding. Results from Experiment 2 also provide some evidence that talker information affects the false recognition of critical intruders. Taken together, the present findings indicate that indexical information is able to contact the lexical-semantic network to affect the processing of unheard words.

  16. Designing and implementing the logical security framework for e-commerce based on service oriented architecture

    OpenAIRE

    Luhach, Ashish Kr.; Dwivedi, Sanjay K; Jha, C K

    2014-01-01

    Rapid evolution of information technology has contributed to the evolution of more sophisticated E- commerce system with the better transaction time and protection. The currently used E-commerce models lack in quality properties such as logical security because of their poor designing and to face the highly equipped and trained intruders. This editorial proposed a security framework for small and medium sized E-commerce, based on service oriented architecture and gives an analysis of the emin...

  17. A new analysis of Mars "Special Regions": findings of the second MEPAG Special Regions Science Analysis Group (SR-SAG2).

    Science.gov (United States)

    Rummel, John D; Beaty, David W; Jones, Melissa A; Bakermans, Corien; Barlow, Nadine G; Boston, Penelope J; Chevrier, Vincent F; Clark, Benton C; de Vera, Jean-Pierre P; Gough, Raina V; Hallsworth, John E; Head, James W; Hipkin, Victoria J; Kieft, Thomas L; McEwen, Alfred S; Mellon, Michael T; Mikucki, Jill A; Nicholson, Wayne L; Omelon, Christopher R; Peterson, Ronald; Roden, Eric E; Sherwood Lollar, Barbara; Tanaka, Kenneth L; Viola, Donna; Wray, James J

    2014-11-01

    A committee of the Mars Exploration Program Analysis Group (MEPAG) has reviewed and updated the description of Special Regions on Mars as places where terrestrial organisms might replicate (per the COSPAR Planetary Protection Policy). This review and update was conducted by an international team (SR-SAG2) drawn from both the biological science and Mars exploration communities, focused on understanding when and where Special Regions could occur. The study applied recently available data about martian environments and about terrestrial organisms, building on a previous analysis of Mars Special Regions (2006) undertaken by a similar team. Since then, a new body of highly relevant information has been generated from the Mars Reconnaissance Orbiter (launched in 2005) and Phoenix (2007) and data from Mars Express and the twin Mars Exploration Rovers (all 2003). Results have also been gleaned from the Mars Science Laboratory (launched in 2011). In addition to Mars data, there is a considerable body of new data regarding the known environmental limits to life on Earth-including the potential for terrestrial microbial life to survive and replicate under martian environmental conditions. The SR-SAG2 analysis has included an examination of new Mars models relevant to natural environmental variation in water activity and temperature; a review and reconsideration of the current parameters used to define Special Regions; and updated maps and descriptions of the martian environments recommended for treatment as "Uncertain" or "Special" as natural features or those potentially formed by the influence of future landed spacecraft. Significant changes in our knowledge of the capabilities of terrestrial organisms and the existence of possibly habitable martian environments have led to a new appreciation of where Mars Special Regions may be identified and protected. The SR-SAG also considered the impact of Special Regions on potential future human missions to Mars, both as locations of

  18. Financial Liberalisation and the South Korean Financial Crisis: Some Qualitative Evidence

    OpenAIRE

    Kevin Amess; Panicos Demetriades

    2001-01-01

    This paper provides a novel analysis of the South Korean financial crisis drawing on the findings of a unique survey of IMF/World Bank officials and South Korean economists. The survey reveals that over-optimism and inadequate recognition of financial risks inadvertently led to excessive risk taking by Korean financial intermediaries. It also indicates that the sources of over-optimistic assessments of East Asian economies, including Korea, were mainly to be found outside East Asia, including...

  19. Processing Polarity: How the Ungrammatical Intrudes on the Grammatical

    Science.gov (United States)

    Vasishth, Shravan; Brussow, Sven; Lewis, Richard L.; Drenhaus, Heiner

    2008-01-01

    A central question in online human sentence comprehension is, "How are linguistic relations established between different parts of a sentence?" Previous work has shown that this dependency resolution process can be computationally expensive, but the underlying reasons for this are still unclear. This article argues that dependency…

  20. X-ray computed tomography datasets for forensic analysis of vertebrate fossils

    Science.gov (United States)

    Rowe, Timothy B.; Luo, Zhe-Xi; Ketcham, Richard A.; Maisano, Jessica A.; Colbert, Matthew W.

    2016-01-01

    We describe X-ray computed tomography (CT) datasets from three specimens recovered from Early Cretaceous lakebeds of China that illustrate the forensic interpretation of CT imagery for paleontology. Fossil vertebrates from thinly bedded sediments often shatter upon discovery and are commonly repaired as amalgamated mosaics grouted to a solid backing slab of rock or plaster. Such methods are prone to inadvertent error and willful forgery, and once required potentially destructive methods to identify mistakes in reconstruction. CT is an efficient, nondestructive alternative that can disclose many clues about how a specimen was handled and repaired. These annotated datasets illustrate the power of CT in documenting specimen integrity and are intended as a reference in applying CT more broadly to evaluating the authenticity of comparable fossils. PMID:27272251

  1. Defining Privacy Is Supposed to Be Easy

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Gross, Thomas; Viganò, Luca

    2013-01-01

    Formally specifying privacy goals is not trivial. The most widely used approach in formal methods is based on the static equivalence of frames in the applied pi-calculus, basically asking whether or not the intruder is able to distinguish two given worlds. A subtle question is how we can be sure...... that we have specified all pairs of worlds to properly reflect our intuitive privacy goal. To address this problem, we introduce in this paper a novel and declarative way to specify privacy goals, called α-β privacy, and relate it to static equivalence. This new approach is based on specifying two...... formulae α and β in first-order logic with Herbrand universes, where α reflects the intentionally released information and β includes the actual cryptographic (“technical”) messages the intruder can see. Then α-β privacy means that the intruder cannot derive any “non-technical” statement from β that he...

  2. Accidental intravenous infusion of a large dose of magnesium sulphate during labor: A case report

    Directory of Open Access Journals (Sweden)

    Kamal Kumar

    2013-01-01

    Full Text Available During labor and child delivery, a wide range of drugs are administered. Most of these medications are high-alert medications, which can cause significant harm to the patient due to its inadvertent use. Errors could be caused due to unfamiliarity with safe dosage ranges, confusion between similar looking drugs, mislabeling of drugs, equipment misuse, or malfunction and communication errors. We report a case of inadvertent infusion of a large dose of magnesium sulphate in a pregnant woman.

  3. An Analysis of Security System for Intrusion in Smartphone Environment

    Directory of Open Access Journals (Sweden)

    Maya Louk

    2014-01-01

    Full Text Available There are many malware applications in Smartphone. Smartphone’s users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a MDTN process is possible and will be enabled for Smartphone environment. (b The methods are shown to be an advanced security for private sensitive data of the Smartphone user.

  4. An analysis of security system for intrusion in Smartphone environment.

    Science.gov (United States)

    Louk, Maya; Lim, Hyotaek; Lee, HoonJae

    2014-01-01

    There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone--whether for business or personal use--may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user.

  5. Design and Security Analysis of a Fragment of Internet of Things Telecommunication System

    Directory of Open Access Journals (Sweden)

    V. A. Alexandrov

    2016-01-01

    Full Text Available This paper comprises the development and implementation of systems using the concept of Internet of Things. In terms of active development of industries, use the concept of the Internet of Things, the information security problem is urgent. To create a protected module of information-telecommunication system which implements the Internet of Things concept, it is important to take into account all its aspects. To determine relevant threats, it is necessary to use the detailed risk analysis according to existing GOST standards when choosing protection measures, one must rely on identified relevant threats. Actual threats and necessary protective actions are determined in this paper for implementation of Smart House computer appliance module, in order to develop a protected part of Smart House, which is necessary for realization of room access control. We solved the following tasks in the work, namely, a description of the system Smart Home, a description of steps and evaluation system security Smart Home; implementation of hardware assembly and writing a code for the selected fragment of the system; safety evaluation of the selected fragment Smart House and identification of actual threats; make recommendations to counter current threats; software implementation of one of the most urgent threats and software implementation of protective measures for a selected threat. A feature of the work is an integrated approach to the design with the use of the intruder models, analysis of the system’s assets and evaluation of their security.

  6. Supporting patient adherence to antiretrovirals using mobile phone reminders: patient responses from South India.

    Science.gov (United States)

    Sidney, Kristi; Antony, Jimmy; Rodrigues, Rashmi; Arumugam, Karthika; Krishnamurthy, Shubha; D'souza, George; De Costa, Ayesha; Shet, Anita

    2012-01-01

    There has been exponential growth in the use of mobile phones in India over the last few years, and their potential benefits as a healthcare tool has raised tremendous interest. We used mobile phone reminders to help support adherence to antiretroviral therapy (ART) among HIV patients at an infectious disease clinic in a tertiary hospital in Bangalore. Between March and June 2010, 139 adult HIV patients taking regular ART for at least a month received weekly reminders to support adherence. These reminders consisted of a weekly interactive call and a non-interactive neutral pictorial short message service (SMS). After four weeks of the intervention, participants were interviewed to study perceptions on preference, usefulness, potential stigma and privacy concerns associated with this intervention. Majority of the participants were urban (89%), and had at least a secondary education (85%). A total of 744 calls were made, 545 (76%) of which were received by the participants. In addition, all participants received the weekly pictorial SMS reminder. A month later, 90% of participants reported the intervention as being helpful as medication reminders, and did not feel their privacy was intruded. Participants (87%) reported that they preferred the call as reminders, just 11% favoured SMS reminders alone. Only 59% of participants viewed all the SMSs that were delivered, while 15% never viewed any at all. Participants also denied any discomfort or stigma despite 20% and 13%, respectively, reporting that another person had inadvertently received their reminder call or SMS. Mobile phone interventions are an acceptable way of supporting adherence in this setting. Voice calls rather than SMSs alone seem to be preferred as reminders. Further research to study the influence of this intervention on adherence and health maintenance is warranted.

  7. Long-Term Climate Change Assessment Task for the Hanford Site Permanent Isolation Barrier Development Program: Status through FY 1992

    International Nuclear Information System (INIS)

    Petersen, K.L.; Chatters, J.C.

    1993-07-01

    The Hanford Site Permanent Isolation Barrier Development Program (Barrier Development Program) was organized (Adams and Wing 1986) to develop the technology needed to provide an in-place disposal capability for the US Department of Energy at the Hanford Site in southeastern Washington. The goals of the Barrier Development Program are to provide defensible evidence that final barrier design(s) will adequately control water infiltration, plant and animal intrusion, and wind and water erosion for a minimum of 1,000 years; to isolate wastes from the accessible environment; and to use markers to warn inadvertent human intruders. Evidence for barrier performance will be obtained by conducting laboratory experiments, field tests, computer modeling, and other studies that establish confidence in the barrier's ability to meet its 1,000-year design life. The performance and stability of natural barrier analogs that have existed for several millennia and the reconstruction of climate changes during the past 10,000 to 125,000 years also will provide insight into bounding conditions of possible future changes and increase confidence in the barriers design. In the following discussion the term open-quotes long-termclose quotes references periods of time up to 1000's of years, distinguishing it from open-quotes short-termclose quotes weather patterns covering a decade or less. Specific activities focus on planning and conducting a series of studies and tests required to confirm key aspects of the barrier design. The effort is a collaborative one between scientists and engineers from Westinghouse Hanford Company (Westinghouse Hanford) and Pacific Northwest Laboratory (PNL) to design barriers to limit movement of radionuclides and other contaminants to the accessible environment for at least 1,000 years. These activities have been divided into 14 groups of tasks that aid in the complete development of protective barrier and warning marker system

  8. Long-Term Climate Change Assessment Task for the Hanford Site Permanent Isolation Barrier Development Program: Status through FY 1992

    Energy Technology Data Exchange (ETDEWEB)

    Petersen, K.L. [Westinghouse Hanford Co., Richland, WA (US); Chatters, J.C. [Pacific Northwest Lab., Richland, WA (US)

    1993-07-01

    The Hanford Site Permanent Isolation Barrier Development Program (Barrier Development Program) was organized (Adams and Wing 1986) to develop the technology needed to provide an in-place disposal capability for the US Department of Energy at the Hanford Site in southeastern Washington. The goals of the Barrier Development Program are to provide defensible evidence that final barrier design(s) will adequately control water infiltration, plant and animal intrusion, and wind and water erosion for a minimum of 1,000 years; to isolate wastes from the accessible environment; and to use markers to warn inadvertent human intruders. Evidence for barrier performance will be obtained by conducting laboratory experiments, field tests, computer modeling, and other studies that establish confidence in the barrier`s ability to meet its 1,000-year design life. The performance and stability of natural barrier analogs that have existed for several millennia and the reconstruction of climate changes during the past 10,000 to 125,000 years also will provide insight into bounding conditions of possible future changes and increase confidence in the barriers design. In the following discussion the term {open_quotes}long-term{close_quotes} references periods of time up to 1000`s of years, distinguishing it from {open_quotes}short-term{close_quotes} weather patterns covering a decade or less. Specific activities focus on planning and conducting a series of studies and tests required to confirm key aspects of the barrier design. The effort is a collaborative one between scientists and engineers from Westinghouse Hanford Company (Westinghouse Hanford) and Pacific Northwest Laboratory (PNL) to design barriers to limit movement of radionuclides and other contaminants to the accessible environment for at least 1,000 years. These activities have been divided into 14 groups of tasks that aid in the complete development of protective barrier and warning marker system.

  9. Technical Aspects of Cyber Kill Chain

    OpenAIRE

    Yadav, Tarun; Mallari, Rao Arvind

    2016-01-01

    Recent trends in targeted cyber-attacks has increased the interest of research in the field of cyber security. Such attacks have massive disruptive effects on rganizations, enterprises and governments. Cyber kill chain is a model to describe cyber-attacks so as to develop incident response and analysis capabilities. Cyber kill chain in simple terms is an attack chain, the path that an intruder takes to penetrate information systems over time to execute an attack on the target. This paper broa...

  10. Extension of ship accident analysis to multiple-package shipments

    International Nuclear Information System (INIS)

    Mills, G.S.; Neuhauser, K.S.

    1997-11-01

    Severe ship accidents and the probability of radioactive material release from spent reactor fuel casks were investigated previously. Other forms of RAM, e.g., plutonium oxide powder, may be shipped in large numbers of packagings rather than in one to a few casks. These smaller, more numerous packagings are typically placed in ISO containers for ease of handling, and several ISO containers may be placed in one of several holds of a cargo ship. In such cases, the size of a radioactive release resulting from a severe collision with another ship is determined not by the likelihood of compromising a single, robust package but by the probability that a certain fraction of 10's or 100's of individual packagings is compromised. The previous analysis involved a statistical estimation of the frequency of accidents which would result in damage to a cask located in one of seven cargo holds in a collision with another ship. The results were obtained in the form of probabilities (frequencies) of accidents of increasing severity and of release fractions for each level of severity. This paper describes an extension of the same general method in which the multiple packages are assumed to be compacted by an intruding ship's bow until there is no free space in the hold. At such a point, the remaining energy of the colliding ship is assumed to be dissipated by progressively crushing the RAM packagings and the probability of a particular fraction of package failures is estimated by adaptation of the statistical method used previously. The parameters of a common, well characterized packaging, the 6M with 2R inner containment vessel, were employed as an illustrative example of this analysis method. However, the method is readily applicable to other packagings for which crush strengths have been measured or can be estimated with satisfactory confidence

  11. Extension of ship accident analysis to multiple-package shipments

    International Nuclear Information System (INIS)

    Mills, G.S.; Neuhauser, K.S.

    1998-01-01

    Severe ship accidents and the probability of radioactive material release from spent reactor fuel casks were investigated previously (Spring, 1995). Other forms of RAM, e.g., plutonium oxide powder, may be shipped in large numbers of packagings rather than in one to a few casks. These smaller, more numerous packagings are typically placed in ISO containers for ease of handling, and several ISO containers may be placed in one of several holds of a cargo ship. In such cases, the size of a radioactive release resulting from a severe collision with another ship is determined not by the likelihood of compromising a single, robust package but by the probability that a certain fraction of 10's or 100's of individual packagings is compromised. The previous analysis (Spring, 1995) involved a statistical estimation of the frequency of accidents which would result in damage to a cask located in one of seven cargo holds in a collision with another ship. The results were obtained in the form of probabilities (frequencies) of accidents of increasing severity and of release fractions for each level of severity. This paper describes an extension of the same general method in which the multiple packages are assumed to be compacted by an intruding ship's bow until there is no free space in the hold. At such a point, the remaining energy of the colliding ship is assumed to be dissipated by progressively crushing the RAM packagings and the probability of a particular fraction of package failures is estimated by adaptation of the statistical method used previously. The parameters of a common, well-characterized packaging, the 6M with 2R inner containment vessel, were employed as an illustrative example of this analysis method. However, the method is readily applicable to other packagings for which crush strengths have been measured or can be estimated with satisfactory confidence. (authors)

  12. Smallpox: An eradicated infection with persistent sequels - Case report and a brief on smallpox

    International Nuclear Information System (INIS)

    Jastaneiah, Sabah

    2009-01-01

    Sequelae of smallpox infection on the ocular surface are still seen, including corneal scars adherent leukoma and phthisical globes. This paper will report another sequel of smallpox infection causing inadvertent bleb in a 62-year-old diabetic female with no history of ocular surgery or trauma in either eye. The patient had smallpox infection during her childhood. Her follow up extended from May 1997 until August 2007 with a constant eye examinations including controlled intraocular pressure, avascular cystic inadvertent bleb, and up drown peaked pupil. (author)

  13. 'You give us rangoli, we give you talk': using an art-based activity to elicit data from a seldom heard group

    OpenAIRE

    Redwood, Sabi; Gale, Nicola K; Greenfield, Sheila

    2012-01-01

    Abstract Background The exclusion from health research of groups most affected by poor health is an issue not only of poor science, but also of ethics and social justice. Even if exclusion is inadvertent and unplanned, policy makers will be uninformed by the data and experiences of these groups. The effect on the allocation of resources is likely to be an exacerbation of health inequalities. Discussion We subject to critical analysis the notion that certain groups, by virtue of sharing a part...

  14. Defense Programs Transportation Risk Assessment

    International Nuclear Information System (INIS)

    Clauss, D.B.

    1994-01-01

    This paper provides an overview of the methodology used in a probabilistic transportation risk assessment conducted to assess the probabilities and consequences of inadvertent dispersal of radioactive materials arising from severe transportation accidents. The model was developed for the Defense Program Transportation Risk Assessment (DPTRA) study. The analysis incorporates several enhancements relative to previous risk assessments of hazardous materials transportation including newly-developed statistics on the frequencies and severities of tractor semitrailer accidents and detailed route characterization using the 1990 Census data

  15. Inadvertent presence of genetically modified elements in maize food ...

    African Journals Online (AJOL)

    owner

    2013-07-31

    Jul 31, 2013 ... The maize imported into Kenya contained Bt genetic elements. Nevertheless, the .... obtained from various open air markets and retail shops located in ... Magic, Bokomo and Temmy) was not successful. Assessment of cry1Ab ...

  16. Inadvertent injection of succinylcholine as an epidural test dose

    Directory of Open Access Journals (Sweden)

    Chryssa Pourzitaki

    Full Text Available Abstract Background and objectives: Epidural action of neuromuscular blocking agents could be explained under the light of their physicochemical characteristics and epidural space properties. In the literature there are few cases of accidental neuromuscular agent's epidural administration, manifesting mainly with neuromuscular blockade institution or fasciculations. Case report: We report a case of accidental succinylcholine administration as an epidural test dose, in a female patient undergoing scheduled laparotomy, under combined general and epidural anesthesia. Approximately 2 min after the succinylcholine injection the patient complained for shortness of breath, while mild fasciculations appeared in her trunk and face, managed by immediate general anesthesia institution. With the exception of a relatively longer duration of neuromuscular blockade compared with intravenous administration, no neurological or cardiovascular sequelae or other symptoms of local or systemic toxicity were observed. Conclusions: Oral administration of diazepam seems to lessen the adverse effects from accidental epidural administration of succinylcholine. The meticulous and discriminative labeling of syringes, as well as keeping persistent cautions during all anesthesia procedures remains of crucial importance.

  17. Inadvertent destruction of the spinal cord by radiation therapy

    International Nuclear Information System (INIS)

    Bhavilai, D.

    1974-01-01

    A case of radiation myelopathy following cobalt therapy of a carcinoma of the esophagus is presented. A permanent quadriplegia resulted. Radiation myelopathy can result from treatment with x-rays or radioactive cobalt regardless of whether the condition being treated involves the spinal cord. No effective treatment is known. Prevention requires keeping the radiation at low level

  18. Incident of inadvertent radiation exposure in a linac bunker

    International Nuclear Information System (INIS)

    Aerts, M.G.

    2010-01-01

    Full text: Implementation of a new Biomedical Equipment and service database poses special challenges. This paper describes the challenges and solutions during implementation of BEIMS (Mercury Computers) at RPAH and other sites within SSWAHS. During implementation we faced challenges of Code/Label design, workflow redesign, and data cleanup. Considerable time and effort went into the design of descriptive codes for breakdowns, tests, equipment types, meta-categories and the like. Some of the codes are explored and described to allow adoption by other entities if desired. Workflow redesign required us to include considerations of biomedical Technicians and Nurse Requestors. A simplified document was created for the self-education of Requestors and a full user manual (complete with screen shots) was created for Biomeds. More work remains, including simplification of standardised reports and ability to generate KPI's. The result is a system with improved utility compared to the old system and a flexible design enabling future improvements. (author)

  19. Microwave and millimeter-wave remote sensing for security applications

    CERN Document Server

    Nanzer, Jeffrey

    2012-01-01

    Microwave and millimeter-wave remote sensing techniques are fast becoming a necessity in many aspects of security as detection and classification of objects or intruders becomes more difficult. This groundbreaking resource offers you expert guidance in this burgeoning area. It provides you with a thorough treatment of the principles of microwave and millimeter-wave remote sensing for security applications, as well as practical coverage of the design of radiometer, radar, and imaging systems. You learn how to design active and passive sensors for intruder detection, concealed object detection,

  20. Double blocking in the superdeformed {sup 192}Tl nucleus

    Energy Technology Data Exchange (ETDEWEB)

    Liang, Y; Carpenter, M P; Janssens, R V.F.; Ahmad, I; Henry, R; Khoo, T L; Lauritsen, T [Argonne National Lab., IL (United States); Soramel, F [Padova University, Padova (Italy); Pilotte, S [Ottawa Univ., ON (Canada); Lewis, J M; Riedinger, L L; Yu, C H [Tennessee Univ., Knoxville, TN (United States); Garg, U; Reviol, W [Notre Dame Univ., IN (United States); Bearden, I G [Purdue Univ., Lafayette, IN (United States)

    1992-08-01

    Six superdeformed bands have been found in the nucleus {sup 192}Tl. For two of the bands, the dynamic moment of inertia J{sup (2)} is found to be constant with the rotational frequency {Dirac_h}{omega}. This result can be understood in terms of Pauli blocking of quasiparticle alignments in intruder orbitals, and represents the first experimental evidence that the alignment of these intruders is responsible for the smooth rise in J{sup (2)} seen in other superdeformed nuclei of this mass region. (author). 18 refs., 2 figs.

  1. Publisher Correction

    DEFF Research Database (Denmark)

    Bonàs-Guarch, Sílvia; Guindo-Martínez, Marta; Miguel-Escalada, Irene

    2018-01-01

    In the originally published version of this Article, the affiliation details for Santi González, Jian'an Luan and Claudia Langenberg were inadvertently omitted. Santi González should have been affiliated with 'Barcelona Supercomputing Center (BSC), Joint BSC-CRG-IRB Research Program in Computatio......In the originally published version of this Article, the affiliation details for Santi González, Jian'an Luan and Claudia Langenberg were inadvertently omitted. Santi González should have been affiliated with 'Barcelona Supercomputing Center (BSC), Joint BSC-CRG-IRB Research Program...

  2. Perceptions of coercion in the community: a qualitative study of patients in a Danish assertive community treatment team

    DEFF Research Database (Denmark)

    Thøgersen, Marie Høgh; Morthorst, Britt; Nordentoft, Merete

    2010-01-01

    conducted with six purposefully selected patients and analysed using thematic analysis. Patients reported lack of influence on treatment process and a poor alliance with case-mangers, not being recognised as an autonomous person, and experiences of staff crossing the line and intruding privacy, as most...... central to perceptions of coercion. A collaborative and mutually trusting relationship, commitment, persistence and availability of staff, and recognition of the need for social support and help with everyday activities, were most important for counteracting such experiences. Perceptions of coercion were...

  3. ACES M and S: Unmitigated Factorial Encounter Study on DAA/TCAS Interoperability

    Science.gov (United States)

    Thipphavong, David; Cone, Andrew; Park, Chunki; Lee, Seung Man; Santiago, Confesor

    2016-01-01

    Realization of the expected proliferation of Unmanned Aircraft System (UAS) operations in the National Airspace System (NAS) depends on the development and validation of standards for UAS Detect and Avoid (DAA) Systems. The RTCA Special Committee 228 is charged with leading the development of draft Minimum Operational Performance Standards (MOPS) for UAS DAA Systems. NASA, as a participating member of RTCA SC-228 is committed to supporting the development and validation of draft requirements for DAA alerting and guidance systems. This presentation contains the results of two combinatorial encounter analysis studies using NASA's SAA Control fast-time simulation capability for this purpose. In these studies, encounters between two aircraft were simulated one at a time for the full factorial combination of encounter geometries (e.g., encounter angle, CPA offset) and aircraft performance (e.g., ownership and intruder ground speeds and vertical rates). The first study analyzes the relationships (e.g., timeline) between the different alerting-safety regions in the SC-228 MOPS (in order of increasing severity): 1) DAA warning alert, 2) well clear recovery (WCR) guidance, 3) DAA-Collision Avoidance (CA), and 4) TCAS RA. This study will focus primarily on encounter situations in which TCAS RA occurs prior to any of the other alerting-safety boundaries. In particular, this study will investigate whether using vertical distance or vertical distance at closest point of approach (i.e., vertical miss distance or VMD) is more appropriate for the definition of the DAA-CA region. In addition, cases where transitions between different regions skip an intermediate region will be analyzed. The second study in this presentation explores a proposal to use an altitude rate error threshold to determine if vertical maneuvers are acceptable for DAA WCR guidance against non-cooperative intruders. This study incorporates the radar from the Honeywell sensor model and examines a series of

  4. Internet firewalls: questions and answers

    Science.gov (United States)

    Ker, Keith

    1996-03-01

    As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.

  5. Method of preventing criticality of fresh fuel assembly in storage facility

    International Nuclear Information System (INIS)

    Kawamura, Makoto.

    1990-01-01

    With an aim of improving the operation efficiency of a reactor, extention of the operation cycle by increasing U 235 enrichment degree of fuel uranium is planned. However, along with the increase of the enrichment degree of the fuel uranium, there occurs a problem of criticality upon fuel handling. Then, in the present invention, boric acid incorporating B-10 of great neutron absorption effect are packed with water soluble polymeric materials which are further packed with a fuel packing sheet, or the water soluble polymeric materials incorporating boric acids are packed with fuel packing sheets which are disposed to a fresh fuel assembly and stored in a store house as they are. The fuel packing sheet is a perforated sheet having a plurality of water intruding pores. Then, if water should intrude to the store house accidentally, the water soluble polymeric materials are dissolved, so that the intruded water is converted into aqueous boric acid easily and absorbs neutrons effectively to thereby attain the prevention of criticality. (T.M.)

  6. Spherical shock-wave propagation in three-dimensional granular packings.

    Science.gov (United States)

    Xue, Kun; Bai, Chun-Hua

    2011-02-01

    We investigate numerically the spherical shock-wave propagation in an open dense granular packing perturbed by the sudden expansion of a spherical intruder in the interior of the pack, focusing on the correlation between geometrical fabrics and propagating properties. The measurements of the temporal and spatial variations in a variety of propagating properties define a consistent serrated wave substructure with characteristic length on the orders of particle diameters. Further inspection of particle packing reveals a well-defined particle layering that persists several particle diameters away from the intruder, although its dominant effects are only within one to two diameters. This interface-induced layering not only exactly coincides with the serrated wave profile, but also highlights the competition between two energy transmission mechanisms involving distinct transport speeds. The alternating dominances between these two mechanisms contribute to the nonlinear wave propagation on the particle scale. Moreover, the proliferation of intricate three-dimensional contact force networks suggests the anisotropic stress transmission, which is found to also arise from the localized packing structure in the vicinity of the intruder.

  7. Scaling behavior in the convection-driven Brazil nut effect

    Science.gov (United States)

    Hejmady, Prakhyat; Bandyopadhyay, Ranjini; Sabhapandit, Sanjib; Dhar, Abhishek

    2012-11-01

    The Brazil nut effect is the phenomenon in which a large intruder particle immersed in a vertically shaken bed of smaller particles rises to the top, even when it is much denser. The usual practice while describing these experiments has been to use the dimensionless acceleration Γ=aω2/g, where a and ω are, respectively, the amplitude and the angular frequency of vibration and g is the acceleration due to gravity. Considering a vibrated quasi-two-dimensional bed of mustard seeds, we show here that the peak-to-peak velocity of shaking v=aω, rather than Γ, is the relevant parameter in the regime where boundary-driven granular convection is the main driving mechanism. We find that the rise time τ of an intruder is described by the scaling law τ˜(v-vc)-α, where vc is identified as the critical vibration velocity for the onset of convective motion of the mustard seeds. This scaling form holds over a wide range of (a,ω), diameter, and density of the intruder.

  8. Venue-level correlates of female sex worker registration status: A multilevel analysis of bars in Tijuana, Mexico

    Science.gov (United States)

    Gaines, Tommi L.; Rusch, Melanie L.A.; Brouwer, Kimberly C.; Goldenberg, Shira M.; Lozada, Remedios; Robertson, Angela M.; Perkins, Emily; Strathdee, Steffanie A.; Patterson, Thomas L.

    2013-01-01

    In Tijuana, Mexico, sex work is regulated by the municipal government, through registration cards issued to female sex workers (FSWs) for an annual fee. Registration has been associated with decreased drug use and increase condom use and HIV testing. Previously, it was demonstrated that FSWs operating in bars were more likely than street-based FSWs to be registered. This implies that certain venues may be more accessible to local authorities for the enforcement of this type of programme. Taking a novel multilevel approach, we examined whether venue characteristics of bars reflecting greater organised management and visibility affect registration status of FSWs. In an analysis of venue-level characteristics, predictors of being registered were availability of free condoms at work and distance to the main sex strip; however, these were not independently associated after inclusion of FSWs’ income, illicit drug use and history of HIV testing. Our findings suggest that sex work regulations may inadvertently exclude venues in which the more vulnerable and less visible FSWs, such as injection drug users and those with limited financial resources, are situated. Efforts to revise or reconsider sex work regulations to ensure that they best promote FSWs’ health, human and labour rights are recommended. PMID:23534477

  9. Venue-level correlates of female sex worker registration status: a multilevel analysis of bars in Tijuana, Mexico.

    Science.gov (United States)

    Gaines, Tommi L; Rusch, Melanie L A; Brouwer, Kimberly C; Goldenberg, Shira M; Lozada, Remedios; Robertson, Angela M; Perkins, Emily; Strathdee, Steffanie A; Patterson, Thomas L

    2013-01-01

    In Tijuana, Mexico, sex work is regulated by the municipal government, through registration cards issued to female sex workers (FSWs) for an annual fee. Registration has been associated with decreased drug use and increase condom use and HIV testing. Previously, it was demonstrated that FSWs operating in bars were more likely than street-based FSWs to be registered. This implies that certain venues may be more accessible to local authorities for the enforcement of this type of programme. Taking a novel multilevel approach, we examined whether venue characteristics of bars reflecting greater organised management and visibility affect registration status of FSWs. In an analysis of venue-level characteristics, predictors of being registered were availability of free condoms at work and distance to the main sex strip; however, these were not independently associated after inclusion of FSWs' income, illicit drug use and history of HIV testing. Our findings suggest that sex work regulations may inadvertently exclude venues in which the more vulnerable and less visible FSWs, such as injection drug users and those with limited financial resources, are situated. Efforts to revise or reconsider sex work regulations to ensure that they best promote FSWs' health, human and labour rights are recommended.

  10. Basal forebrain projections to the lateral habenula modulate aggression reward.

    Science.gov (United States)

    Golden, Sam A; Heshmati, Mitra; Flanigan, Meghan; Christoffel, Daniel J; Guise, Kevin; Pfau, Madeline L; Aleyasin, Hossein; Menard, Caroline; Zhang, Hongxing; Hodes, Georgia E; Bregman, Dana; Khibnik, Lena; Tai, Jonathan; Rebusi, Nicole; Krawitz, Brian; Chaudhury, Dipesh; Walsh, Jessica J; Han, Ming-Hu; Shapiro, Matt L; Russo, Scott J

    2016-06-30

    Maladaptive aggressive behaviour is associated with a number of neuropsychiatric disorders and is thought to result partly from the inappropriate activation of brain reward systems in response to aggressive or violent social stimuli. Nuclei within the ventromedial hypothalamus, extended amygdala and limbic circuits are known to encode initiation of aggression; however, little is known about the neural mechanisms that directly modulate the motivational component of aggressive behaviour. Here we established a mouse model to measure the valence of aggressive inter-male social interaction with a smaller subordinate intruder as reinforcement for the development of conditioned place preference (CPP). Aggressors develop a CPP, whereas non-aggressors develop a conditioned place aversion to the intruder-paired context. Furthermore, we identify a functional GABAergic projection from the basal forebrain (BF) to the lateral habenula (lHb) that bi-directionally controls the valence of aggressive interactions. Circuit-specific silencing of GABAergic BF-lHb terminals of aggressors with halorhodopsin (NpHR3.0) increases lHb neuronal firing and abolishes CPP to the intruder-paired context. Activation of GABAergic BF-lHb terminals of non-aggressors with channelrhodopsin (ChR2) decreases lHb neuronal firing and promotes CPP to the intruder-paired context. Finally, we show that altering inhibitory transmission at BF-lHb terminals does not control the initiation of aggressive behaviour. These results demonstrate that the BF-lHb circuit has a critical role in regulating the valence of inter-male aggressive behaviour and provide novel mechanistic insight into the neural circuits modulating aggression reward processing.

  11. Optimal parameters to avoid thermal necrosis during bone drilling: A finite element analysis.

    Science.gov (United States)

    Mediouni, Mohamed; Schlatterer, Daniel R; Khoury, Amal; Von Bergen, Tobias; Shetty, Sunil H; Arora, Manit; Dhond, Amit; Vaughan, Neil; Volosnikov, Alexander

    2017-11-01

    The drilling bone may potentially cause excessive frictional heat, which can lead to local bone necrosis. This heat generation and local necrosis has been suggested to contribute to the resorption of bone around the placed screws, ending in loss of screw purchase in the bone and inadvertent loosening and/or the bone-implant construct. In vivo studies on this subject have inherent obstacles not the least of which is controlling the variables and real time bone temperature data acquisition. Theoretical models can be generated using computer software and the inclusion of known constants for the mechanical properties of metal and bone. These known Data points for the variables (drill bit and bone) enables finite element analysis of various bone drilling scenarios. An elastic-plastic three-dimensional (3D) acetabular bone mode was developed and finite element model analysis (FEA) was applied to various simulated drilling procedures. The FEA results clearly indicate that the depth of drilling and the drill speed both have a significant effect on the temperature during drilling procedures. The reduction of the feeding speed leads to a reduction in bone temperature. Our data suggests that reducing the feeding speed regardless of RPMs and pressure applied could be a simple useful and effective way to reduce drilling temperatures. This study is the first step in helping any surgeon who drills bone and places screws to better understand the ideal pressure to apply and drill speed to employ and advance rate to avoid osteonecrosis. © 2017 Orthopaedic Research Society. Published by Wiley Periodicals, Inc. J Orthop Res 35:2386-2391, 2017. © 2017 Orthopaedic Research Society. Published by Wiley Periodicals, Inc.

  12. IPv6 Network Security using Snort

    OpenAIRE

    Kaur, Ravreet; Kumar, Sumit

    2013-01-01

    IPv6 is new routing protocol. IPv6 is introduced by IETF mainly due IPv4 address exhaustion but it is also an enhanced version of IPv4. There are many changes in IPv6 header, some fields from IPv6 header has been deprecated from IPv6 and some are newly added. There is also common misconception among people that IPv6 is more secure than IPv4, which is not true. Now a day's intruders are targeting IPv6 networks as it is widely being accepted by many organization for their network. An intruder c...

  13. Nuclear forensics support. Technical guidance. Reference manual (Chinese Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    Illicit trafficking of nuclear and other radioactive material has been an issue of concern since the first seizures in the early 1990s. By the end of 2004 Member States had confirmed 540 cases, while about another 500 remain unconfirmed. Most of the confirmed cases have a criminal dimension, even if they were not for known terrorist purposes. The attacks of September 2001 in the USA dramatically emphasized the requirement for the enhanced control and security of nuclear and other radioactive material. In response to a resolution by the IAEA General Conference in September 2002 the IAEA has adopted an integrated approach to protection against nuclear terrorism. This brings together IAEA activities concerned with the physical protection of nuclear material and nuclear installations, nuclear material accountancy, detection and response to illicit nuclear trafficking, the security and safety of radioactive sources, emergency response measures - including pre-emergency measures in Member States and at the IAEA - and the promotion of State adherence to relevant international instruments. States have the responsibility for combating illicit trafficking and the inadvertent movements of radioactive material. The IAEA cooperates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by providing relevant advice through a range of technical assistance and documents. In this context, the IAEA issued a group of three technical documents, co-sponsored by the World Customs Organization, Europol and Interpol, on the inadvertent movement and illicit trafficking of radioactive material. The first is Prevention of the Inadvertent Movement and Illicit Trafficking of Radioactive Material (IAEA-TECDOC-1311), the second is called Detection of Radioactive Material at Borders (IAEA-TECDOC-1312) and the third is Response to Events Involving the Inadvertent Movement

  14. Nuclear forensics support. Reference manual

    International Nuclear Information System (INIS)

    2006-01-01

    Illicit trafficking of nuclear and other radioactive material has been an issue of concern since the first seizures in the early 1990s. By the end of 2004 Member States had confirmed 540 cases, while about another 500 remain unconfirmed. Most of the confirmed cases have a criminal dimension, even if they were not for known terrorist purposes. The attacks of September 2001 in the USA dramatically emphasized the requirement for the enhanced control and security of nuclear and other radioactive material. In response to a resolution by the IAEA General Conference in September 2002 the IAEA has adopted an integrated approach to protection against nuclear terrorism. This brings together IAEA activities concerned with the physical protection of nuclear material and nuclear installations, nuclear material accountancy, detection and response to illicit nuclear trafficking, the security and safety of radioactive sources, emergency response measures - including pre-emergency measures in Member States and at the IAEA - and the promotion of State adherence to relevant international instruments. States have the responsibility for combating illicit trafficking and the inadvertent movements of radioactive material. The IAEA cooperates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by providing relevant advice through a range of technical assistance and documents. In this context, the IAEA issued a group of three technical documents, co-sponsored by the World Customs Organization, Europol and Interpol, on the inadvertent movement and illicit trafficking of radioactive material. The first is Prevention of the Inadvertent Movement and Illicit Trafficking of Radioactive Material (IAEA-TECDOC-1311), the second is called Detection of Radioactive Material at Borders (IAEA-TECDOC-1312) and the third is Response to Events Involving the Inadvertent Movement

  15. Planning for a Violent Intruder Event: The School Nurse's Role.

    Science.gov (United States)

    Selekman, Janice; Melvin, Joseph

    2017-05-01

    School shootings occur too frequently and often with devastating results. The key to prevention and mitigation of these events is to have a plan that is simple, up-to-date, disseminated, and practiced. This article discusses the steps that school nurses can take to work with school administration to prepare themselves, their staff, and their students.

  16. Probing intruder configurations in $^{186, 188}$Pb using Coulomb excitation

    CERN Multimedia

    Columb excitation measurements to study the shape coexistence, mixing and quadrupole collectivity of the low-lying levels in neutron-deficient $^{188}$Pb nuclei are proposed with a view to extending similar studies to the $^{186}$Pb midshell nucleus. The HIE-ISOLDE beam of $^{186,188}$Pb nuclei will be delivered to MINIBALL+SPEDE set-up for simultaneous in-beam $\\gamma$-ray and conversion electron spectroscopy. The proposed experiment will allow the sign of the quadrupole deformation parameter to be extracted for the two lowest 2$^{+}$ states in $^{188}$Pb. Moreover, the advent of SPEDE will allow probing of the bandhead 0$^{+}$ states via direct measurements of E0 transitions. Beam development is requested to provide pure and instense $^{186}$Pb beam.

  17. [Dynamic analysis of the rigid fixed bridge and related tissue after intrusion of abutment with micro screw implant].

    Science.gov (United States)

    Zhu, Lin; Xu, Pei-cheng; Lu, Liu-lei

    2013-08-01

    To study the variety of mechanical behavior of fixed bridge after abutments being intruded by micro screw implant and to provide theoretical principles for clinical practice of teeth preparation after intrusion of abutments under dynamic loads. Two-dimensional images of maxilla, teeth and supporting tissues of healthy people were scanned by spiral CT and were synthesized by Mimics10.01, Ansys13.0, etc. The three-dimensional finite element mathematical model of rigid fixed bridge repairing on double end of maxillary molar was developed. Under the condition of 10% simulative abutment alveolar absorption, vertical and oblique dynamic forces were applied in a circle of mastication(0.875 s) to build mathematical model after the abutment had been intruded for 0.5, 1.0, 1.5 and 2.0 mm. Stress variety of prosthesis, teeth, periodontal ligaments and supporting tissues were compared before and after intrusion of abutments. Stress variety of the prosthesis occurred, which had close relationship with the structure of prosthesis and teeth, the areas of periodontal ligaments increased, stress on the whole decreased along with the increase of the length of intrusion. With time accumulating, the stress value in prosthesis, teeth, periodontal ligaments and supporting tissues increased gradually and loads in oblique direction induced peak value stress in a masticatory cycle. Some residual stress left after unloading. By preparing the fixed bridge after abutment intrusion by micro screw implant, the service life of abutment and fixed bridge prosthesis can be reduced. The abutment and its related tissue have time-dependent mechanical behaviors during one mastication. The influence of oblique force on stress was greater than vertical force. There is some residual stress left after one mastication period. With the increase of the intrusion on abutment, residual stress reduced.

  18. Improvement of Tidal Analysis Results by a Priori Rain Fall Modelling at the Vienna and Membach stations

    Science.gov (United States)

    Meurers, B.; van Camp, M.; Petermans, T.

    2005-12-01

    We investigate how far tidal analysis results can be improved when a rain fall admittance model is applied on the superconducting gravity (SG) data. For that purpose both Vienna and Membach data have been analysed with and without a priori rain fall correction. In Membach the residual drop for most events (80%) can be explained by the rain water load, while in Vienna only 50% of all events fit the model in detail. In the other cases the Newtonian effect of vertical air mass redistribution (vertical density variation without air pressure change), predominantly connected with high vertical convection activity, e.g. thunderstorms, plays an essential role: short-term atmospheric signals show up steep gravity residual decreases of a few nms-2 within 10 - 60 min, well correlated with outdoor air temperature in most cases. However, even in those cases the water load model is able to explain the dominating part of the residual drop especially during heavy rain fall. In Vienna more than 110 events have been detected over 10 years. 84% of them are associated with heavy rain starting at or up to 10 min later than the residual drop while the rest (16%) shows no or only little rainfall. The magnitude of the gravity drop depends on the total amount of rainfall accumulated during the meteorological event. Step like signals deteriorate the frequency spectrum estimates. This even holds for tidal analysis. As the drops are of physical origin, they should not be eliminated blindly but corrected using water load modeling constrained by high temporal resolution (1 min) rain data. 3D modeling of the water mass load due to a rain event is based on the following assumptions: (1) Rain water intrudes into the uppermost soil layer (close to the topography surface) and remains there at least until rain has stopped. This is justified for a period of some hours after the rainfall as evapotranspiration is not yet effective. (2) No run-off except of sealed areas or building roofs, where water can

  19. Analysis - what is legal medicine?

    Science.gov (United States)

    Beran, Roy G

    2008-04-01

    Legal medicine addresses the interface between medicine and law in health care. The Australian College of Legal Medicine (ACLM) established itself as the peak body in legal and forensic medicine in Australia. It helped establish the Expert Witness Institute of Australia (EWIA), the legal medicine programme at Griffith University and contributes to government enquiries. Public health, disability assessment, competing priorities of privacy verses notification and determination of fitness for a host of pursuits are aspects of legal medicine. Complementing the EWIA, the ACLM runs training programmes emphasising legal medicine skills additional to clinical practice, advocating clinical relevance. Assessment of athletes' fitness and ensuring that prohibited substances are not inadvertently prescribed represent a growing area of legal medicine. Ethical consideration of health care should respect legal medicine principles rather than armchair commentary. International conventions must be respected by legal medicine and dictate physicians' obligations. The NSW courts imposed a duty to provide emergency medical care. Migration and communicable diseases are aspects of legal medicine. Police surgeons provide a face to legal medicine (which incorporates forensic medicine) underpinning its public perception of specialty recognition. Legal medicine deserves its place as a medical specialty in its own right.

  20. CHARACTERISATION OF MULTIPHASE FLUID-STRUCTURE INTERACTION USING NON-INTRUSIVE OPTICAL TECHNIQUES

    Directory of Open Access Journals (Sweden)

    M. AL-ATABI

    2011-04-01

    Full Text Available The purpose of this study is to determine experimentally the effectiveness of passive drag reduction techniques (which involve adjusting surface geometry within a chaotic multiphase flow system. To quantify the intrusion and disturbance caused, a liquid-air blast atomiser continuously discharges within a test section of air at atmospheric pressure, with a circular cylinder placed 25 cylinder diameters (250 mm downstream of the nozzle. This cylinder is then replaced with other cylinders which have modified surface geometry. The data was obtained using Particle Image Velocimetry (PIV and determines the fluid motion resulting from spray structure interaction of a liquid spray with a circular cylinder. Subtraction of non intruded spray images from intruded spray images at the same locations, using the time averaged analysis allows the direct comparison of the amount of disturbance each geometric variant has on the spray. Using this data alongside velocity profiles time averaged trends were compared. Drag reduction from V-shaped grooves provides the greatest disturbance reduction. This is due to the reduced shear stress around its cross section and the addition of small liquid eddies within each V-groove creates a gliding surface. These features proved to be most effective when monitoring drag reduction in multiphase flow-structure interaction.

  1. Introduction to the police scientific development branch

    International Nuclear Information System (INIS)

    Botten, R.

    2002-01-01

    Full text: The Police Scientific Development Branch (Pdb) of the UK Home Office evaluates technologies, develops equipment and detection standards for the police and security communities. PSDB's guidance helps to protect critical sites, including nuclear sites, in the United Kingdom. PSDB evaluates doors, walls, fences, locks, glazing and other barrier to determine whether they meet national and European standards against conventional physical attack. PSDB also evaluates intruder-detection systems. If solutions for security problems do not exist commercially, it might help to develop them. Examples include computer machine-vision systems to guide a pan-tilt-zoom camera automatically, and to assess intruder alarms. PSDB's automatic alarm verification system (AMETHYST) is now being installed for test at a nuclear power station on England's south coast. PSDB has used its analysis of the effects of exploding bombs on building materials to influence building codes. The PSDB also evaluates technologies for crime investigation, surveillance, explosive detection and bomb search. PSDB uses its experience to help train security practitioners to select, specify, and audit security at critical sites, including sites that handle nuclear materials. PSDB's technologies and advice have helped to protect the UK against terrorist attacks. Its expertise can be made available to help meet other European needs. (author)

  2. Seeking missing pieces in science concept assessments: Reevaluating the Brief Electricity and Magnetism Assessment through Rasch analysis

    Directory of Open Access Journals (Sweden)

    Lin Ding

    2014-02-01

    Full Text Available Discipline-based science concept assessments are powerful tools to measure learners’ disciplinary core ideas. Among many such assessments, the Brief Electricity and Magnetism Assessment (BEMA has been broadly used to gauge student conceptions of key electricity and magnetism (E&M topics in college-level introductory physics courses. Differing from typical concept inventories that focus only on one topic of a subject area, BEMA covers a broad range of topics in the electromagnetism domain. In spite of this fact, prior studies exclusively used a single aggregate score to represent individual students’ overall understanding of E&M without explicating the construct of this assessment. Additionally, BEMA has been used to compare traditional physics courses with a reformed course entitled Matter and Interactions (M&I. While prior findings were in favor of M&I, no empirical evidence was sought to rule out possible differential functioning of BEMA that may have inadvertently advantaged M&I students. In this study, we used Rasch analysis to seek two missing pieces regarding the construct and differential functioning of BEMA. Results suggest that although BEMA items generally can function together to measure the same construct of application and analysis of E&M concepts, several items may need further revision. Additionally, items that demonstrate differential functioning for the two courses are detected. Issues such as item contextual features and student familiarity with question settings may underlie these findings. This study highlights often overlooked threats in science concept assessments and provides an exemplar for using evidence-based reasoning to make valid inferences and arguments.

  3. Seeking missing pieces in science concept assessments: Reevaluating the Brief Electricity and Magnetism Assessment through Rasch analysis

    Science.gov (United States)

    Ding, Lin

    2014-02-01

    Discipline-based science concept assessments are powerful tools to measure learners' disciplinary core ideas. Among many such assessments, the Brief Electricity and Magnetism Assessment (BEMA) has been broadly used to gauge student conceptions of key electricity and magnetism (E&M) topics in college-level introductory physics courses. Differing from typical concept inventories that focus only on one topic of a subject area, BEMA covers a broad range of topics in the electromagnetism domain. In spite of this fact, prior studies exclusively used a single aggregate score to represent individual students' overall understanding of E&M without explicating the construct of this assessment. Additionally, BEMA has been used to compare traditional physics courses with a reformed course entitled Matter and Interactions (M&I). While prior findings were in favor of M&I, no empirical evidence was sought to rule out possible differential functioning of BEMA that may have inadvertently advantaged M&I students. In this study, we used Rasch analysis to seek two missing pieces regarding the construct and differential functioning of BEMA. Results suggest that although BEMA items generally can function together to measure the same construct of application and analysis of E&M concepts, several items may need further revision. Additionally, items that demonstrate differential functioning for the two courses are detected. Issues such as item contextual features and student familiarity with question settings may underlie these findings. This study highlights often overlooked threats in science concept assessments and provides an exemplar for using evidence-based reasoning to make valid inferences and arguments.

  4. Maternal Territoriality Achieved Through Shaking and Lunging: An Investigation of Patterns in Associated Behaviors and Substrate Vibrations in a Colonial Embiopteran, Antipaluria urichi

    Science.gov (United States)

    Dejan, Khaaliq A.; Fresquez, John M.; Meyer, Annika M.; Edgerly, Janice S.

    2013-01-01

    Substrate vibration communication is displayed by a variety of insects that rely on silk for shelter. Such signaling is often associated with territoriality and social interactions. The goal in this study was to explore the use of substrate vibration by subsocial insects of the little-studied order Embioptera (also known as Embiidina). Antipaluria urichi (Saussure) (Embioptera: Clothodidae) from Trinidad and Tobago, a large embiopteran, exhibits maternal care and facultatively colonial behavior. Previous observations suggested that they were aggressive while guarding eggs but gregarious when not. Egg-guarders in particular have been observed shaking and lunging their bodies, but to date these putative signals have not been recorded nor were their contexts known. Staged interactions were conducted in the laboratory using residents that had established silk domiciles enveloping piezo-electric film used to detect vibrations. Predictions from two competing hypotheses, the maternal territoriality hypothesis and the group cohesion hypothesis, were erected to explain the occurrence of signaling. Experiments pitted pre-reproductive and egg-guarding residents against female and male intruders, representing social partners that ranged from potentially threatening to innocuous or even helpful. Behavioral acts were identified and scored along with associated substrate vibrations, which were measured for associated body movements, duration, and frequency spectra. Signals, sorted by the distinct actions used to generate them, were lunge, shake, push up, and snapback. Egg-guarding females produced most signals in response to female intruders, a result that supported the maternal territoriality hypothesis. Female intruders generally responded to such signaling by moving away from egg-guarding residents. In contrast, pre-reproductive residents did not signal much, and intruders settled beside them. Theme software was used to analyze the behavioral event recordings to seek patterns

  5. Gamma-ray spectroscopy of 120-130Te nuclei

    International Nuclear Information System (INIS)

    Vanhoy, J.R.; Champine, B.R.; Coleman, R.T.; Crandell, K.A.; Tanyi, J.A.; Hicks, S.F.; Alexander, G.K.; Burkett, P.G.; Burns, M.C.; Collard, C.J.

    2000-01-01

    Complete text of publication follows. Structure of the even 120-130 Te nuclei have been investigated with prompt gamma-ray spectroscopy following the 122-126,nat Te(n,n'γ) reactions and the (α,2nγ) 120,124,126 Te reactions. Gamma-ray excitation functions, angular distributions, γγ-coincidences, and Doppler shifts have been measured. Level schemes have been constructed to approximately 3.3 MeV excitation energy, and spectroscopic information including level spins and parities, branching and multipole-mixing ratios, and lifetimes have been extracted. Three different types of structure are thought to play an important role in these low-lying excitations. These are: collective, two-particle, and 4p-2h intruder excitations. Because there are seven stable even-even Te nuclei, the evolution of these excitation modes over this wide range in neutron number is investigated. Level sequences and transition rates obtained from these measurements are compared to IBM-2 model calculations both with and without intruder-state mixing by Rikovska et al. (1), and to particle-vibrational coupling model calculations by Lopac (2). The IBM-2 model calculations with intruder mixing well reproduce the level energies in the low-mass Te; however, examination of the electromagnetic transition rates reveals that there is no clear improvement in the description of these nuclei by adding the intruder configurations. Additionally, no evidence of the 2 + mixed-symmetry strength is observed in the 2 3 + and 2 4 + levels in these nuclei. The particle-vibration model calculations appear to do a good job describing both the level scheme and the transition rates in the heavier nuclei investigated. (author)

  6. Detection of radioactive materials at borders

    International Nuclear Information System (INIS)

    2003-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  7. Detection of radioactive materials at borders

    International Nuclear Information System (INIS)

    2004-05-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  8. Detection of radioactive materials at borders

    International Nuclear Information System (INIS)

    2002-09-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  9. Typed Multiset Rewriting Specifications of Security Protocols

    Science.gov (United States)

    2011-10-01

    how to determine a specific set pAq of Dolev-Yao intruder roles from any given derivation A of Σ R. It does so by mapping each rule instance...occurring in A to zero or more intruder roles from Section 8.1. We then define pRq as pAq . This definition entails that the encoding of any active role...privK k,Σ3); ∆ a A k (∆, k′) with ∆′ = (∆, k′). Recall that pAq = (IPV,DUP). E0 :: · . [p∆q] IPV,DUP Σ⊕ΣDY −→ [p∆q] (·→I(k′))I,DUP Σ⊕ΣDY by rule

  10. Detecting Malicious Code by Binary File Checking

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2014-01-01

    Full Text Available The object, library and executable code is stored in binary files. Functionality of a binary file is altered when its content or program source code is changed, causing undesired effects. A direct content change is possible when the intruder knows the structural information of the binary file. The paper describes the structural properties of the binary object files, how the content can be controlled by a possible intruder and what the ways to identify malicious code in such kind of files. Because the object files are inputs in linking processes, early detection of the malicious content is crucial to avoid infection of the binary executable files.

  11. Distributed Intrusion Sensor Using DFB Laser with Optical Feedback and Saturable Absorber

    Directory of Open Access Journals (Sweden)

    Kyoo Nam Choi

    2018-01-01

    Full Text Available Characteristics of a distributed intrusion sensor using a coherent DFB laser diode with an external optical feedback and saturable absorber were experimentally investigated. The stimulus at a location of 2 km using a PZT transducer placed the location of a simulated intruder in Φ-OTDR trace after averaging 32 times. Field trials demonstrated the detection of a vehicle and a pedestrian crossing above the sensing line and a loop in a burial depth of 50 cm. This distributed intrusion sensor using a coherent DFB laser diode as the light source had the advantages of a simple structure and intruder detection capability at the underground burial location.

  12. Globalisation, Mergers and "Inadvertent Multi-Campus Universities": Reflections from Wales

    Science.gov (United States)

    Zeeman, Nadine; Benneworth, Paul

    2017-01-01

    Multi-site universities face the challenge of integrating campuses that may have different profiles and orientations arising from place-specific attachments. Multi-campus universities created via mergers seeking to ensure long-term financial sustainability, and increasing their attractiveness to students, create a tension in campuses' purposes. We…

  13. Intentional and inadvertent chemical contamination of food, water, and medication.

    Science.gov (United States)

    MCKay, Charles; Scharman, Elizabeth J

    2015-02-01

    Numerous examples of chemical contamination of food, water, or medication have led to steps by regulatory agencies to maintain the safety of this critical social infrastructure and supply chain. Identification of contaminant site is important. Environmental testing and biomonitoring can define the nature and extent of the event and are useful for providing objective information, but may be unavailable in time for clinical care. Clinical diagnosis should be based on toxidrome recognition and assessment of public health implications. There are several resources available to assist and these can be accessed through regional poison control centers or local/state public health departments. Copyright © 2015 Elsevier Inc. All rights reserved.

  14. Inadvertent Exemplars: Life History Portraits of Two Socially Just Principals

    Science.gov (United States)

    Scanlan, Martin

    2012-01-01

    This study creates life history portraits of two White middle-class native-English-speaking principals demonstrating commitments to social justice in their work in public elementary schools serving disproportionately high populations of students who are marginalized by poverty, race, and linguistic heritage. Through self-reported life histories of…

  15. Spatio-temporal assessment and trend analysis of surface water salinity in the coastal region of Bangladesh.

    Science.gov (United States)

    Shammi, Mashura; Rahman, Md Mostafizur; Islam, Md Atikul; Bodrud-Doza, Md; Zahid, Anwar; Akter, Yeasmin; Quaiyum, Samia; Kurasaki, Masaaki

    2017-06-01

    The study was designed to collect water samples over two seasons-wet-monsoon season (n = 96) (March-April) and dry-monsoon season (n = 44) (September-October)-to understand the seasonal variation in anion and cation hydrochemistry of the coastal rivers and estuaries contributing in the spatial trend in salinity. Hydrochemical examination of wet-monsoon season primarily revealed Ca-Mg-HCO 3 type (66%) and followed by Na-Cl type (17.70%) water. In the dry-monsoon season, the scenario reversed with primary water being Na-Cl type (52.27%) followed by Ca-Mg-HCO 3 type (31.81%). Analysis of Cl/Br molar ratio vs. Cl (mg/L) depicted sampling area affected by seawater intrusion (SWI). Spatial analysis by ordinary kriging method confirmed approximately 77% sample in the dry-monsoon, and 34% of the wet-monsoon season had shown SWI. The most saline-intruded areas in the wet-monsoon seasons were extreme south-west coastal zone of Bangladesh, lower Meghna River floodplain and Meghna estuarine floodplain and south-eastern part of Chittagong coastal plains containing the districts of Chittagong and Cox's Bazar adjacent to Bay of Bengal. In addition, mid-south zone is also affected slightly in the dry-monsoon season. From the analyses of data, this study could further help to comprehend seasonal trends in the hydrochemistry and water quality of the coastal and estuarine rivers. In addition, it can help policy makers to obligate some important implications for the future initiatives taken for the management of land, water, fishery, agriculture and environment of coastal rivers and estuaries of Bangladesh.

  16. BgTEP: An Antiprotease Involved in Innate Immune Sensing in Biomphalaria glabrata

    Directory of Open Access Journals (Sweden)

    Anaïs Portet

    2018-05-01

    Full Text Available Insect thioester-containing protein (iTEP is the most recently defined group among the thioester-containing protein (TEP superfamily. TEPs are key components of the immune system, and iTEPs from flies and mosquitoes were shown to be major immune weapons. Initially characterized from insects, TEP genes homologous to iTEP were further described from several other invertebrates including arthropods, cniderians, and mollusks albeit with few functional characterizations. In the freshwater snail Biomphalaria glabrata, a vector of the schistosomiasis disease, the presence of a TEP protein (BgTEP was previously described in a well-defined immune complex involving snail lectins (fibrinogen-related proteins and schistosome parasite mucins (SmPoMuc. To investigate the potential role of BgTEP in the immune response of the snail, we first characterized its genomic organization and its predicted protein structure. A phylogenetic analysis clustered BgTEP in a well-conserved subgroup of mollusk TEP. We then investigated the BgTEP expression profile in different snail tissues and followed immune challenges using different kinds of intruders during infection kinetics. Results revealed that BgTEP is particularly expressed in hemocytes, the immune-specialized cells in invertebrates, and is secreted into the hemolymph. Transcriptomic results further evidenced an intruder-dependent differential expression pattern of BgTEP, while interactome experiments showed that BgTEP is capable of binding to the surface of different microbes and parasite either in its full length form or in processed forms. An immunolocalization approach during snail infection by the Schistosoma mansoni parasite revealed that BgTEP is solely expressed by a subtype of hemocytes, the blast-like cells. This hemocyte subtype is present in the hemocytic capsule surrounding the parasite, suggesting a potential role in the parasite clearance by encapsulation. Through this work, we report the first

  17. Recharge Data Package for the Immobilized Low-Activity Waste 2001 Performance Assessment

    International Nuclear Information System (INIS)

    MJ Fayer; EM Murphy; JL Downs; FO Khan; CW Lindenmeier; BN Bjornstad

    2000-01-01

    Lockheed Martin Hanford Company (LMHC) is designing and assessing the performance of disposal facilities to receive radioactive wastes that are currently stored in single- and double-shell tanks at the Hanford Site. The preferred method of disposing of the portion that is classified as immobilized low-activity waste (ILAW) is to vitrify the waste and place the product in near-surface, shallow-land burial facilities. The LMHC project to assess the performance of these disposal facilities is known as the Hanford ILAW Performance Assessment (PA) Activity, hereafter called the ILAW PA project. The goal of this project is to provide a reasonable expectation that the disposal of the waste is protective of the general public, groundwater resources, air resources, surface-water resources, and inadvertent intruders. Achieving this goal will require predictions of contaminant migration from the facility. To make such predictions will require estimates of the fluxes of water moving through the sediments within the vadose zone around and beneath the disposal facility. These fluxes, loosely called recharge rates, are the primary mechanism for transporting contaminants to the groundwater. Pacific Northwest National Laboratory (PNNL) assists LMHC in their performance assessment activities. One of the PNNL tasks is to provide estimates of recharge rates for current conditions and long-term scenarios involving the shallow-land disposal of ILAW. Specifically, recharge estimates are needed for a filly functional surface cover; the cover sideslope, and the immediately surrounding terrain. In addition, recharge estimates are needed for degraded cover conditions. The temporal scope of the analysis is 10,000 years, but could be longer if some contaminant peaks occur after 10,000 years. The elements of this report compose the Recharge Data Package, which provides estimates of recharge rates for the scenarios being considered in the 2001 PA. Table S.1 identifies the surface features and

  18. Recharge Data Package for the Immobilized Low-Activity Waste 2001 Performance Assessment

    Energy Technology Data Exchange (ETDEWEB)

    MJ Fayer; EM Murphy; JL Downs; FO Khan; CW Lindenmeier; BN Bjornstad

    2000-01-18

    Lockheed Martin Hanford Company (LMHC) is designing and assessing the performance of disposal facilities to receive radioactive wastes that are currently stored in single- and double-shell tanks at the Hanford Site. The preferred method of disposing of the portion that is classified as immobilized low-activity waste (ILAW) is to vitrify the waste and place the product in near-surface, shallow-land burial facilities. The LMHC project to assess the performance of these disposal facilities is known as the Hanford ILAW Performance Assessment (PA) Activity, hereafter called the ILAW PA project. The goal of this project is to provide a reasonable expectation that the disposal of the waste is protective of the general public, groundwater resources, air resources, surface-water resources, and inadvertent intruders. Achieving this goal will require predictions of contaminant migration from the facility. To make such predictions will require estimates of the fluxes of water moving through the sediments within the vadose zone around and beneath the disposal facility. These fluxes, loosely called recharge rates, are the primary mechanism for transporting contaminants to the groundwater. Pacific Northwest National Laboratory (PNNL) assists LMHC in their performance assessment activities. One of the PNNL tasks is to provide estimates of recharge rates for current conditions and long-term scenarios involving the shallow-land disposal of ILAW. Specifically, recharge estimates are needed for a filly functional surface cover; the cover sideslope, and the immediately surrounding terrain. In addition, recharge estimates are needed for degraded cover conditions. The temporal scope of the analysis is 10,000 years, but could be longer if some contaminant peaks occur after 10,000 years. The elements of this report compose the Recharge Data Package, which provides estimates of recharge rates for the scenarios being considered in the 2001 PA. Table S.1 identifies the surface features and

  19. Oxygen isotope regional pattern in granitoids from the Cachoeirinha Belt, northeast Brazil

    International Nuclear Information System (INIS)

    Sial, A.N.

    1984-01-01

    Four groups of granitoids are present within the Cachoeirinha belt and in the adjacent migmatitic basement, between 37 0 and 40 0 W long. and 7 0 and 8 0 15' S lat., States of Pernambuco and Paraiba: a) K 2 O - enriched, very porphyritic; b) a calc-alkalic slightly porphyritic group; c) group with trondjemitic affinities; and d) peralkalic group. Petrology and oxygen isotope geochemistry for over 100 samples from these groups were studied. Almost all plutons for which 5 or more samples were analyzed, exhibit a total range of gamma 18 O less than 2% o. A broad range of mean oxygen isotope composition is observed, varying from 6.93 to 12.79% o. There is a systematic regional trend in which the calc-alkalic granitoids (conceicao-type) found within the Cachoeirinha space are the most 18 O - enriched rocks (10.6 to 12.9% o) while the lowest mean gamma 18 O values (4.5 to 9.7% o) are found in the K 2 O - enriched granitoids (Itaporanga-type). Intermediate gamma 18 O values were recorded in the bodies with trondhjemitic affinities (8.9 to 9.8% o) which intruded metasediments of the Salgueiro Group and in the peralkalic granitoids of Catingueira (8.1 to 9.8% o) which intruded Cachoeirinha metamorphics. Among the potassic granitoids, mean gamma 18 O increases from Bodoco to Itaporanga (from west to east). As a whole, the W.R. gamma 18 O of these plutons correlate with the type of grade of metamorphism of the host rocks and, therefore, with the tectonic framework, increasing from those which intruded the gneiss-migmatites to those which intruded the low-grade metamorphics of the Cachoeirinha Group. The possible origin of each rock group is discussed in light of the oxygen isotope geochemistry. (Author) [pt

  20. 78 FR 11745 - Small Business Size Regulations, Small Business Innovation Research (SBIR) Program and Small...

    Science.gov (United States)

    2013-02-20

    .... As published, the final regulations contain two points where the word ``small'' was inadvertently... and procedure, Government procurement, Government property, Loan programs-business, Small businesses...

  1. The National Counterintelligence Strategy of the United States of America

    National Research Council Canada - National Science Library

    McConnell, J. M

    2007-01-01

    .... Our adversaries -- foreign intelligence services, terrorists, foreign criminal enterprises and cyber intruders -- use overt, covert, and clandestine activities to exploit and undermine US national security interests...

  2. Application of artificial intelligence to improve plant availability

    International Nuclear Information System (INIS)

    Frank, M.V.; Epstein, S.A.

    1986-01-01

    Using artificial intelligence software techniques, Management Analysis Company (MAC) has developed two complementary software packages that together provide a workstation environment for maintenance and operations personnel to dramatically reduce inadvertent reactor trips. They are called the Reactor Trip Simulation Environment (RTSE) and the Key Component Generation Environment (KCGE). They are not proposed or being designed. They are in use today. The plants component and process interdependencies are modeled within RTSE - using modeling practices and notations familiar to engineers which accelerated the acceptance of the software. KCGE provides the groups of key components that would cause a reactor trip

  3. Thermal evidence of the invasion of a stingless bee nest by a mammal

    Directory of Open Access Journals (Sweden)

    S. D. Hilário

    Full Text Available Melipona bicolor, an inhabitant of the Atlantic Rainforest, nidifies in hollows of live or dead trees. In order to study thermoregulation of a nest of this species, a temperature data logger was installed inside a hollow tree. After this, an intruder dug a hole, invaded the nest, and probably consumed its honey, pollen and bees, having remained there during three days. Thermal evidence and its behavior allowed the delimitation of a small number of suspects, wich we analized here. The intruder was a small mammal, predominantly nocturnal, that takes shelter in burrows, probably the yellow armadillo (Euphractus sexcinctus. Other evidence, if collected immediately after invasion, could precisely indicate precisely the species.

  4. Pest repelling properties of ant pheromones

    DEFF Research Database (Denmark)

    Offenberg, Joachim

    2014-01-01

    Ants control pests via predation and physical deterrence; however, ant communication is based on chemical cues which may serve as warning signals to potential prey and other intruders. The presence of ant pheromones may, thus, be sufficient to repel pests from ant territories. This mini-review sh......-review shows that four out of five tested ant species deposit pheromones that repel herbivorous prey from their host plants.......Ants control pests via predation and physical deterrence; however, ant communication is based on chemical cues which may serve as warning signals to potential prey and other intruders. The presence of ant pheromones may, thus, be sufficient to repel pests from ant territories. This mini...

  5. A calculational methodology for comparing the accident, occupational, and waste-disposal hazards of fusion reactor designs

    International Nuclear Information System (INIS)

    Fetter, S.

    1985-01-01

    A methodology has been developed for calculating indices of three classes of radiological hazards: reactor accidents, occupational exposures, and waste-disposal hazards. Radionuclide inventories, biological hazard potentials (BHP), and various dose-related indices are calculated. In the case of reactor accidents, the critical, 50-year and chronic dose are computed, as well as the number of early deaths and illnesses and late cancer fatalities. For occupational exposure, the contact dose rate is calculated for several times after reactor shutdown. In the case of waste-disposal hazards, the intruder dose and the intruder hazard potential (IHP) are calculated. Sample calculations for the MARS reactor design show the usefulness of the methodology in exploring design improvements

  6. Thermal evidence of the invasion of a stingless bee nest by a mammal

    Directory of Open Access Journals (Sweden)

    Hilário S. D.

    2003-01-01

    Full Text Available Melipona bicolor, an inhabitant of the Atlantic Rainforest, nidifies in hollows of live or dead trees. In order to study thermoregulation of a nest of this species, a temperature data logger was installed inside a hollow tree. After this, an intruder dug a hole, invaded the nest, and probably consumed its honey, pollen and bees, having remained there during three days. Thermal evidence and its behavior allowed the delimitation of a small number of suspects, wich we analized here. The intruder was a small mammal, predominantly nocturnal, that takes shelter in burrows, probably the yellow armadillo (Euphractus sexcinctus. Other evidence, if collected immediately after invasion, could precisely indicate precisely the species.

  7. Military Assistance to Domestic Consequence Management Operations in Response to a Chemical Biological Radiological, Nuclear, or High-Yield Explosive Situation

    National Research Council Canada - National Science Library

    2001-01-01

    ...) situation, Domestic CBRNE CM support encompasses both deliberate and inadvertent CBRNE situations including terrorism, acts of aggression, industrial accidents, and acts of nature, Domestic CBRNE CM...

  8. Cockpit Displays to Support Hazard Awareness in Free Flight

    Science.gov (United States)

    Wickens, Christopher D.; Carbonari, Ron; Merwin, Dave; Morphew, Ephimia; OBrien, Janelle V.

    1997-01-01

    Three experiments are described which each examine different aspects of the formatting and integration of cockpit displays of traffic information to support pilots in traffic avoidance planning. The first two experiments compared two-dimensional (coplanar) with three-dimensional (perspective) versions of a cockpit display of traffic information. In Experiment 1, 30 certified flight instructors flew a series of traffic conflict detection and avoidance maneuvers around an intruder aircraft, sometimes in the presence of a second intruder. The results revealed an advantage for the coplanar display, particularly when there was vertical intruder behavior. In Experiment 2, 17 instructors flew with the coplanar and perspective formats when weather information was either overlaid or displayed separately. Again performance was best with the coplanar display, particularly when the weather data were overlaid. The results of both experiments are also discussed in ten-ns of the traffic maneuver stereotypes exhibited by the pilots. Experiment 3 examined the benefits of the two different predictor elements used in the coplanar displays of Experiments 1 and 2. The study was carried out in a multitask context. These elements were both found to improve safety (reduce actual and predicted conflicts) and to reduce workload, although the different elements affected workload in different ways. Neither predictor element imposed a cost to concurrent task performance.

  9. Context-dependent responses to neighbours and strangers in wild European rabbits (Oryctolagus cuniculus).

    Science.gov (United States)

    Monclús, Raquel; Saavedra, Irene; de Miguel, Javier

    2014-07-01

    Territorial animals defend their territories against intruders. The level of aggression directed to intruders depends on the familiarity and/or the relative threat they pose, and it could be modified by the context of the interaction. We explored in a wild social mammal, the European rabbit (Oryctolagus cuniculus), whether residents responded more aggressively to strangers or to neighbours (dear enemy or nasty neighbour effects, respectively). We simulated the intrusion of neighbours or strangers in different parts of the territory of wild European rabbits in a suburban area in central Spain. For that, we placed faecal pellets of neighbouring or stranger rabbits in the territory of 5 rabbit colonies. Resident rabbits counter-marked preferably the odour stations with stranger odour, compared to the ones with neighbour odour, and they did not make a difference between neighbour and a non-odour control stimuli. The results suggest that rabbits show a dear enemy effect. However, repeated intrusions escalated the responses of rabbits towards neighbours. The location within the territory or the sex of the stranger did not affect the level of response. We conclude that in rabbits the relative threat posed by the intruder triggers the intensity of the interaction. Copyright © 2014 Elsevier B.V. All rights reserved.

  10. Data fusion concept in multispectral system for perimeter protection of stationary and moving objects

    Science.gov (United States)

    Ciurapiński, Wieslaw; Dulski, Rafal; Kastek, Mariusz; Szustakowski, Mieczyslaw; Bieszczad, Grzegorz; Życzkowski, Marek; Trzaskawka, Piotr; Piszczek, Marek

    2009-09-01

    The paper presents the concept of multispectral protection system for perimeter protection for stationary and moving objects. The system consists of active ground radar, thermal and visible cameras. The radar allows the system to locate potential intruders and to control an observation area for system cameras. The multisensor construction of the system ensures significant improvement of detection probability of intruder and reduction of false alarms. A final decision from system is worked out using image data. The method of data fusion used in the system has been presented. The system is working under control of FLIR Nexus system. The Nexus offers complete technology and components to create network-based, high-end integrated systems for security and surveillance applications. Based on unique "plug and play" architecture, system provides unmatched flexibility and simplistic integration of sensors and devices in TCP/IP networks. Using a graphical user interface it is possible to control sensors and monitor streaming video and other data over the network, visualize the results of data fusion process and obtain detailed information about detected intruders over a digital map. System provides high-level applications and operator workload reduction with features such as sensor to sensor cueing from detection devices, automatic e-mail notification and alarm triggering.

  11. Ultrapotassic rocks geology from Salgueiro region, Pernambuco state, Brazil

    International Nuclear Information System (INIS)

    Silva Filho, A.F. da; Guimaraes, I.P.

    1990-01-01

    The Cachoeirinha-Salgueiro belt has Proterozoic age and is located in the Borborema Province, NE Brazil. The ultrapotassic rocks from Salgueiro region intrudes the Cachoeirinha-Salgueiro belt rocks. The ultrapotassics from Salgueiro region constitutes of three units; Serra do Livramento pluton, and two dyke swarms called respectively beige alkali feldspar granites and green alkali feldspar syenite/quartz-syenite. The Serra do Livramento pluton shows E-W direction, boudin shape, width between 0,15 and 2,10 km, and it is intruded into metamorphic rocks and into the Terra Nova complex. Detailed geological mapping at the Serra das Duas Irmas allowed us to establish the dyke swarm chronology. The mapping reveals seven intrusion episodes, into the Terra Nova pluton, of green alkali feldspar syenite/quartz-syenite and five episodes of bege alkali feldspar granite. They alternate between them in space and time, and there are evidence that they were intruded under the tectonic control of the Pernambuco lineament. A systematic whole-rock Rb-Sr geochronology was done in the green alkali feldspar syenite/quartz-syenite, and an age of 514,8 ± 20,3 Ma was obtained. The initial ratio is 0,710615 + 0,000441. The age obtained shows small error and an initial ratio compatible with a strong crustal contamination. (author)

  12. Safety considerations to avoid current-induced skin burns in MRI

    International Nuclear Information System (INIS)

    Knopp, M.V.; Metzner, R.; Kaick, G. van; Brix, G.; Bundesamt fuer Strahlenschutz, Oberschleissheim

    1998-01-01

    The safety aspects of radiological methods continue to evolve. In this paper we report on two cases of skin burns in MRI caused by induced electrical current. A second- and a third-degree skin burn occurred during imaging in a 1.5 T system. The electromagnetic radiofrequency field inadvertently led to electrical currents caused by a conducting loop through the extremities and trunk. Skin burns induced by electrical current may occur in extremely rare cases even with standard MR imaging protocols operating within all current safety guidelines by inadvertently forming a closed conducting loop. By avoiding focal skin to skin contact of the extremities, this extremely rare adverse event can be avoided. (orig.) [de

  13. Programme for reducing the risk factors due to prenatal exposure

    International Nuclear Information System (INIS)

    Arranz, L.; Ferrer, N.; Sastre, J.M.

    2001-01-01

    When a patient is not aware of her pregnancy, the foetus/embryo may be inadvertently irradiated during a diagnostic exploration or therapeutic intervention. The radiosensitivity of the foetus/embryo changes during the different periods of gestation. For this reason there are different risk factors for each moment at which the patient may suffer irradiation. In the past 7 years, the Department of Radiophysics and Radiation Protection has been consulted 75 times for this reason, to evaluate the dose received in the uterus. Since the establishment of a programme to avoid inadvertent irradiation of the foetus/embryo, these consultations have been reduced. This programme is based on informing the patients and on training the medical staff. (author)

  14. Radiation protection program for fetus and newborn by medical exposition during the pregnancy

    International Nuclear Information System (INIS)

    Arranz, L.; Ferrer, N.; Sastre, J. M.

    2001-01-01

    When a patient is not aware of her pregnancy, the foetus/embryo may be inadvertently irradiated during a diagnostic exploration of therapeutic treatment. The radiosensitivity of the foetus/embryo changes during the different periods of gestation. For this reason there are different risk factors for each moment at which the patient may suffer irradiation. in the past 7 years, the department of Medical Physics and Radiation Protection has been consulted 75 times for this reason, to evaluate the dose received in the uterus. Since the establishment of a programme to avoid inadvertent irradiation of the foetus/embryo, these consultations have been reduced. This programme is based on informing the patients and on training the medical staff. (Author) 15 refs

  15. Program for radiological protection of embryo and new-born baby caused by the exposition of the mother

    International Nuclear Information System (INIS)

    Arranz, Leopoldo; Ferrer, Natividad; Sastre, Jose Maria

    2001-01-01

    When a patient is not aware of her pregnancy, the foetus/embryo may be inadvertently irradiated during a diagnostic exploration or therapeutic intervention. The radiosensitivity of the foetus/embryo changes during the different periods of gestation. For this reason there are different risk factors for each moment at which the patient may suffer irradiation. In the past 7 years, the department of Radiophysics and Radiation Protection has been consulted 75 times for this reason, to evaluate the dose received in the uterus. Since the establishment of a programme to avoid inadvertent irradiation of the foetus/embryo, these consultations have been reduced. This programme is based on informing the patients and on training the medical staff. (author)

  16. Face antispoofing based on frame difference and multilevel representation

    Science.gov (United States)

    Benlamoudi, Azeddine; Aiadi, Kamal Eddine; Ouafi, Abdelkrim; Samai, Djamel; Oussalah, Mourad

    2017-07-01

    Due to advances in technology, today's biometric systems become vulnerable to spoof attacks made by fake faces. These attacks occur when an intruder attempts to fool an established face-based recognition system by presenting a fake face (e.g., print photo or replay attacks) in front of the camera instead of the intruder's genuine face. For this purpose, face antispoofing has become a hot topic in face analysis literature, where several applications with antispoofing task have emerged recently. We propose a solution for distinguishing between real faces and fake ones. Our approach is based on extracting features from the difference between successive frames instead of individual frames. We also used a multilevel representation that divides the frame difference into multiple multiblocks. Different texture descriptors (local binary patterns, local phase quantization, and binarized statistical image features) have then been applied to each block. After the feature extraction step, a Fisher score is applied to sort the features in ascending order according to the associated weights. Finally, a support vector machine is used to differentiate between real and fake faces. We tested our approach on three publicly available databases: CASIA Face Antispoofing database, Replay-Attack database, and MSU Mobile Face Spoofing database. The proposed approach outperforms the other state-of-the-art methods in different media and quality metrics.

  17. Adsorber fires

    International Nuclear Information System (INIS)

    Holmes, W.

    1987-01-01

    The following conclusions are offered with respect to activated charcoal filter systems in nuclear power plants: (1) The use of activated charcoal in nuclear facilities presents a potential for deep-seated fires. (2) The defense-in-depth approach to nuclear fire safety requires that if an ignition should occur, fires must be detected quickly and subsequently suppressed. (3) Deep-seated fires in charcoal beds are difficult to extinguish. (4) Automatic water sprays can be used to extinguish fires rapidly and reliably when properly introduced into the burning medium. The second part of the conclusions offered are more like challenges: (1) The problem associated with inadvertent actuations of fire protection systems is not a major one, and it can be reduced further by proper design review, installation, testing, and maintenance. Eliminating automatic fire extinguishing systems for the protection of charcoal adsorbers is not justified. (2) Removal of automatic fire protection systems due to fear of inadvertent fire protection system operation is a case of treating the effect rather than the cause. On the other hand, properly maintaining automatic fire protection systems will preserve the risk of fire loss at acceptable levels while at the same time reducing the risk of damage presented by inadvertent operation of fire protection systems

  18. Low-lying intruder state of the unbound nucleus {sup 13}Be

    Energy Technology Data Exchange (ETDEWEB)

    Kondo, Y., E-mail: kondo@phys.titech.ac.j [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Nakamura, T.; Satou, Y. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Matsumoto, T.; Aoi, N. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Endo, N. [Department of Physics, Tohoku University, 2-1-1 Katahira, Aoba, Sendai, Miyagi 980-8577 (Japan); Fukuda, N.; Gomi, T. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Hashimoto, Y. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Ishihara, M. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Kawai, S. [Department of Physics, Rikkyo University, 3-34-1 Nishi-Ikebukuro, Toshima, Tokyo 171-8501 (Japan); Kitayama, M.; Kobayashi, T.; Matsuda, Y. [Department of Physics, Tohoku University, 2-1-1 Katahira, Aoba, Sendai, Miyagi 980-8577 (Japan); Matsui, N. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Motobayashi, T. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Nakabayashi, T.; Okumura, T. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Ong, H.J.; Onishi, T.K. [Department of Physics, University of Tokyo, 7-3-1 Hongo, Bunkyo, Tokyo 113-0033 (Japan)

    2010-06-21

    An experimental study for the unbound nucleus {sup 13}Be has been performed by means of the invariant mass method via the one-neutron removal reaction {sup 1}H({sup 14}Be,{sup 12}Be+n). A resonance has been observed at 0.51(1) MeV in the relative energy (E{sub rel}) spectrum of the {sup 12}Be+n system. The transverse momentum distribution of the {sup 12}Be+n system as well as the resonance width of 0.45(3) MeV gives evidence for the p-wave nature of the resonance. A d-wave resonance has also been observed at 2.39(5) MeV in the E{sub rel} spectrum. The observation of the low-lying p-wave resonance indicates the disappearance of the N=8 magicity in the vicinity of the neutron drip line region.

  19. Salient eyes deter conspecific nest intruders in wild jackdaws (Corvus monedula).

    Science.gov (United States)

    Davidson, Gabrielle L; Clayton, Nicola S; Thornton, Alex

    2014-02-01

    Animals often respond fearfully when encountering eyes or eye-like shapes. Although gaze aversion has been documented in mammals when avoiding group-member conflict, the importance of eye coloration during interactions between conspecifics has yet to be examined in non-primate species. Jackdaws (Corvus monedula) have near-white irides, which are conspicuous against their dark feathers and visible when seen from outside the cavities where they nest. Because jackdaws compete for nest sites, their conspicuous eyes may act as a warning signal to indicate that a nest is occupied and deter intrusions by conspecifics. We tested whether jackdaws' pale irides serve as a deterrent to prospecting conspecifics by comparing prospectors' behaviour towards nest-boxes displaying images with bright eyes (BEs) only, a jackdaw face with natural BEs, or a jackdaw face with dark eyes. The jackdaw face with BEs was most effective in deterring birds from making contact with nest-boxes, whereas both BE conditions reduced the amount of time jackdaws spent in proximity to the image. We suggest BEs in jackdaws may function to prevent conspecific competitors from approaching occupied nest sites.

  20. Pressurized thermal shock. Thermo-hydraulic conditions in the CNA-I reactor pressure vessel

    International Nuclear Information System (INIS)

    Ventura, Mirta A.; Rosso, Ricardo D.

    2002-01-01

    In this paper we analyze several reports issued by the Utility (Nucleo Electrica S.A.) and related to Reactor Pressure Vessel (RPV) phenomena in the CNA-I Nuclear Power Plant. These analyses are aimed at obtaining conclusions and establishing criteria ensuring the RPV integrity. Special attention was given to the effects ECCS cold-water injection at the RPV down-comer leading to pressurized thermal shock scenarios. The results deal with hypothetical primary system pipe breaks of different sizes, the inadvertent opening of the pressurizer safety valve, the double guillotine break of a live steam line in the containment and the inadvertent actuation pressurizer heaters. Modeling conditions were setup to represent experiments performed at the UPTF, under the hypothesis that they are representative of those that, hypothetically, may occur at the CNA-I. No system scaling analysis was performed, so this assertion and the inferred conclusions are no fully justified, at least in principle. The above mentioned studies, indicate that the RPV internal wall surface temperature will be nearly 40 degree. It was concluded that they allowed a better approximation of PTS phenomena in the RPV of the CNA-I. Special emphasis was made on the influence of the ECCS systems on the attained RPV wall temperature, particularly the low-pressure TJ water injection system. Some conservative hypothesis made, are discussed in this report. (author)

  1. Designing a holistic end-to-end intelligent network analysis and security platform

    Science.gov (United States)

    Alzahrani, M.

    2018-03-01

    Firewall protects a network from outside attacks, however, once an attack entering a network, it is difficult to detect. Recent significance accidents happened. i.e.: millions of Yahoo email account were stolen and crucial data from institutions are held for ransom. Within two year Yahoo’s system administrators were not aware that there are intruder inside the network. This happened due to the lack of intelligent tools to monitor user behaviour in internal network. This paper discusses a design of an intelligent anomaly/malware detection system with proper proactive actions. The aim is to equip the system administrator with a proper tool to battle the insider attackers. The proposed system adopts machine learning to analyse user’s behaviour through the runtime behaviour of each node in the network. The machine learning techniques include: deep learning, evolving machine learning perceptron, hybrid of Neural Network and Fuzzy, as well as predictive memory techniques. The proposed system is expanded to deal with larger network using agent techniques.

  2. MARAS - a computer code for semi-Markov reliability analysis of alternating systems

    International Nuclear Information System (INIS)

    Lee, Kwang Nam; Cho, Nam Zin

    1989-01-01

    It is now recognized that current testing and maintenance requirements invoke too many inadvertent reactor trips and that operating staff must devote significant amount of time and effort to comply with the requirements. With this recognition, the value and the impact of the proposed changes in the allowed outage time (AOT) and surveillance test interval(STI) are evaluated for the alternating system. Because of the testing and AOT requirements, the alternating system exhibits semi-Markovian characteristics which change states in accordance with a Markov chain but take a nonexponentially distributed amount of time between changes. It is observed from the results that there is an optimal point that gives lowest core damage probability and that the optimal point depends on input parameters. With these results, we can conclude that the methodology developed in this study can be applied to the existing alternating systems to evaluate accurately the various alternatives in the technical specifications

  3. Group territoriality in two populations of African lions

    Science.gov (United States)

    Heinsohn

    1997-06-01

    Lionesses, Panthera leoin the Serengeti ecosystem, Tanzania, assess the odds of winning group-territorial contests by counting the number of opponents they hear roaring. They will approach intruders aggressively only if they outnumber them. Here the lionesses in the Serengeti are compared with another population living nearby but in strikingly different ecological circumstances. The lions of Ngorongoro Crater live at much higher densities owing to year-round availability of non-migratory prey species, but also suffer higher mortality from fighting. Playback experiments showed that lionesses in the crater differ from those in the Serengeti by approaching 'intruders' more quickly when the odds of winning are low. This increased aggression is interpreted in terms of the greater difficulty of holding a territory at high population density.

  4. Spatio-temporal Background Models for Outdoor Surveillance

    Directory of Open Access Journals (Sweden)

    Pless Robert

    2005-01-01

    Full Text Available Video surveillance in outdoor areas is hampered by consistent background motion which defeats systems that use motion to identify intruders. While algorithms exist for masking out regions with motion, a better approach is to develop a statistical model of the typical dynamic video appearance. This allows the detection of potential intruders even in front of trees and grass waving in the wind, waves across a lake, or cars moving past. In this paper we present a general framework for the identification of anomalies in video, and a comparison of statistical models that characterize the local video dynamics at each pixel neighborhood. A real-time implementation of these algorithms runs on an 800 MHz laptop, and we present qualitative results in many application domains.

  5. Management of multiple intrusive luxative injuries: A case report with 7-year follow-up

    Directory of Open Access Journals (Sweden)

    Seema Thakur

    2014-01-01

    Full Text Available This report presents a case of severe intrusive luxation of multiple anterior teeth in an 11-year-old girl. The teeth were repositioned successfully by endodontic and orthodontic management. The case was monitored for 7 years. Depending on the severity of the injury, different clinical approaches for treatment of intrusive luxation may be used. Despite the variety of treatment modalities, rehabilitation of intruded teeth is always a challenge and a multidisciplinary approach is important to achieve a successful result. In this case, intruded teeth were endodontically treated with multiple calcium hydroxide dressings and repositioned orthodontically. The follow-up of such cases is very important as the repair process after intrusion is complex. After 7 years, no clinical or radiographic pathology was detected.

  6. Petrology and chemistry of Jebel Tanumah complex, Khamis Mushayt, Southern Arabian shield, Saudi Arabia

    Science.gov (United States)

    Nassief, M. O.; Ali, H. M.; Zakir, F. A.

    The mafic intrusive complex at Jebel Tanumah is located 15 km north-west of Khamis Mushayt in the southern Arabian Shield and includes olivine-bearing gabbro as well as amphibole-diopside-hornblende gabbro cumulates. These rocks have been generally metamorphosed to upper greeenschist-lower amphibolite facies. Fourteen white rock silicate analyses indicate that the majority of the rocks are calc-alkaline to tholeiitic in composition. The two major structural units in the Khamis Mushayt region identified by Coleman consist of the basement complex of Asir Mountains and the younger metamorphic rocks. Syntectonic granitic rocks intruded the antiforms characterizing the younger rocks whereas the lower parts of the synforms are intruded by post-tectonic intrusions of layered gabbros such as the one studied at Jebel Tanumah.

  7. An Alternative Method of Evaluating 1540NM Exposure Laser Damage using an Optical Tissue Phantom

    National Research Council Canada - National Science Library

    Jindra, Nichole M; Figueroa, Manuel A; Rockwell, Benjamin A; Chavey, Lucas J; Zohner, Justin J

    2006-01-01

    An optical phantom was designed to physically and optically resemble human tissue, in an effort to provide an alternative for detecting visual damage resulting from inadvertent exposure to infrared lasers...

  8. An Intelligent Tutor for Intrusion Detection on Computer Systems

    National Research Council Canada - National Science Library

    Rowe, Neil C; Schiavo, Sandra

    1998-01-01

    ... critical. We describe a tutor incorporating two programs. The first program uses artificial-intelligence planning methods to generate realistic audit files reporting actions of a variety of simulated users (including intruders...

  9. A three-dimensional finite element analysis of molar distalization with a palatal plate, pendulum, and headgear according to molar eruption stage

    Science.gov (United States)

    Kang, Ju-Man; Park, Jae Hyun; Bayome, Mohamed; Oh, Moonbee; Park, Chong Ook; Mo, Sung-Seo

    2016-01-01

    Objective This study aimed to (1) evaluate the effects of maxillary second and third molar eruption status on the distalization of first molars with a modified palatal anchorage plate (MPAP), and (2) compare the results to the outcomes of the use of a pendulum and that of a headgear using three-dimensional finite element analysis. Methods Three eruption stages were established: an erupting second molar at the cervical one-third of the first molar root (Stage 1), a fully erupted second molar (Stage 2), and an erupting third molar at the cervical one-third of the second molar root (Stage 3). Retraction forces were applied via three anchorage appliance models: an MPAP with bracket and archwire, a bone-anchored pendulum appliance, and cervical-pull headgear. Results An MPAP showed greater root movement of the first molar than crown movement, and this was more noticeable in Stages 2 and 3. With the other devices, the first molar showed distal tipping. Transversely, the first molar had mesial-out rotation with headgear and mesial-in rotation with the other devices. Vertically, the first molar was intruded with an MPAP, and extruded with the other appliances. Conclusions The second molar eruption stage had an effect on molar distalization, but the third molar follicle had no effect. The application of an MPAP may be an effective treatment option for maxillary molar distalization. PMID:27668192

  10. Primary LOCA in VVER-1000 by pressurizer PORV failure

    International Nuclear Information System (INIS)

    Sabotinov, L.; Lutsanych, S.; Kadenko, I.

    2013-01-01

    The paper presents the calculations and analysis of the design basis accident of a standard VVER-1000/V320 reactor with inadvertent opening and stuck in open position of the pressurizer pilot operated relief valve (PORV). The objective is the independent assessment of this accident applying the French best estimate thermal-hydraulic computer code CATHARE 2 and verification to meet the safety criteria for such kind of the accident. The 'Inadvertent opening and stuck in open position of PORV' is a design basis accident classified as Medium Break Loss of Coolant Accident (MB LOCA) with the equivalent diameter of the break D- 68 mm. This accident is particularly interesting to be calculated and analyzed, because it took place at operating NPP with VVER-1000 reactors (Rovno NPP) in 2009. The calculations have been carried out with conservative conditions as usual for DBA analysis. The NPP model corresponds to a real VVER-1000/V320 configuration and comprises all safety systems, adopted for one of the latest CATHARE 2 versions. The results of CATHARE 2 calculations are compared with available results of RELAP5 calculations. There is similarity of the thermal-hydraulic parameters behavior, but also some differences can be observed basically due to the break flow prediction, which causes differences in primary pressure evaluation. Both calculations show that there is no boiling crisis in the reactor core and reliable cooldown is achieved. The calculations performed with CATHARE2 code demonstrate the ability of the code to predict reasonably the break flow, pressures, temperatures etc. for considered LOCA scenario and to be applied for safety studies

  11. Risk evaluation of the alternate-3A modification to the ATWS prevention/mitigation system in a BWR-4, MARK-II power plant

    International Nuclear Information System (INIS)

    Papazoglou, I.A.; Bari, R.A.; Karol, R.; Shiu, K.

    1983-01-01

    The authors present a risk evaluation of the ATWS Alternate 3A modification proposed by NRC staff in NUREG-0460 to the ATWS prevention/mitigation system in a BWR nuclear power plant. The evaluation is done relative to three risk indices: the frequency of core damage, the expected early fatalities, and the expected latent fatalities. The ATWS prevention tree includes: the mechanical subsystem of the reactor protection system, the electrical subsystem of the reactor protection system, the recirculation pump trip and the Alternate Rod Insertion System. The mitigation tree includes: standby liquid control system, opening of the relief valves, reclosing the relief valves, failure of coolant injection, inadvertent actuation of the automatic depressurization system, inadvertent operation of high-pressure injection system and containment heat removal

  12. Safety analysis of a high temperature supercritical pressure light water cooled and moderated reactor

    International Nuclear Information System (INIS)

    Ishiwatari, Y.; Oka, Y.; Koshizuka, S.

    2002-01-01

    A safety analysis code for a high temperature supercritical pressure light water cooled reactor (SCLWR-H) with water rods cooled by descending flow, SPRAT-DOWN, is developed. The hottest channel, a water rod, down comer, upper and lower plenums, feed pumps, etc. are modeled as junction of nodes. Partial of the feed water flows downward from the upper dome of the reactor pressure vessel to the water rods. The accidents analyzed here are total loss of feed water flow, feed water pump seizure, and control rods ejection. All the accidents satisfy the criteria. The accident event at which the maximum cladding temperature is the highest is total loss of feedwater flow. The transients analyzed here are loss of feed water heating, inadvertent start-up of an auxiliary water supply system, partial loss of feed water flow, loss of offsite power, loss of load, and abnormal withdrawal of control rods. All the transients satisfied the criteria. The transient event for which the maximum cladding temperature is the highest is control rod withdrawal at normal operation. The behavior of loss of load transient is different from that of BWR. The power does not increase because loss of flow occurs and the density change is small. The sensitivities of the system behavior to various parameters during transients and accidents are analyzed. The parameters having strong influence are the capacity of the auxiliary water supply system, the coast down time of the main feed water pumps, and the time delay of the main feed water pumps trip. The control rod reactivity also has strong influence. (authors)

  13. Lethal Consequences in an Infant with Myelomeningocele Following an Inadvertent Treatment

    Directory of Open Access Journals (Sweden)

    Xuemei Wu

    2016-01-01

    Full Text Available Myelomeningocele (MMC is a protrusion of spinal cord contents and meninges through a vertebral defect. Iatrogenic deaths of patients with MMC are rarely encountered in forensic practice. In our case, a 3-month-old female was born with a lumbosacral cyst, the size of which had been increasing gradually over age. There was no neurological, orthopedic, or urologic dysfunction. On the day of her death, she received a repetitive and rapid lumbosacral cyst puncture drainage procedure, performed by an illegal medical practitioner. Postmortem autopsy findings confirmed a diagnosis of MMC and the cause of death to be cerebellar tonsillar herniation. This is a pathetic case of preventable infant death. This report suggests that the possibility of MMC should be considered in infants born with a lumbosacral cyst, and aspiration is inadvisable. Besides, forensic autopsy has a valuable role in determining the exact cause of death, identifying, or excluding iatrogenic factors that may be relevant to death following a medical procedure. A final point is that prevention programs should be developed, especially by the health care sectors to reduce such tragedy.

  14. Anomalous concentration gradient in NaI solutions inadvertently frozen in transit

    International Nuclear Information System (INIS)

    Billinghurst, M.W.; Abrams, D.N.; Coutts, A.D.

    1990-01-01

    Therapeutic doses of iodine-131 ( 131 I) are frequently dispensed volumetrically from a stock vial containing a solution of sodium iodide. During the winter months the authors have observed that initial aliquots do not always have the same radioactive concentration as that calculated for the bulk solution. In order to evaluate the cause and extent of this problem, they prepared a stock solution of low radioactive concentration sodium iodide with the same concentration of sodium thiosulfate and pH as that in the stock therapeutic iodine vial. Aliquots of this solution were transferred to plastic tubes and were stored at various temperatures. These results clearly show that when there is a risk of freezing during transportation of therapeutic solutions of sodium iodide it is essential to physically mix the liquid once thawing is complete if therapeutic doses are to be dispensed accurately on a volume basis

  15. ITS2 barcoding DNA region combined with high resolution melting (HRM) analysis of Hyoscyami Semen, the mature seed of Hyoscyamus niger.

    Science.gov (United States)

    Xiong, Chao; Hu, Zhi-Gang; Tu, Yuan; Liu, He-Gang; Wang, Ping; Zhao, Ming-Ming; SHIi, Yu-Hua; Wu, Lan; Sun, Wei; Chen, Shi-Lin

    2016-12-01

    Hyoscyami Semen, the mature dried seed of Hyoscyamus niger L., has long been used as a traditional Chinese medicine to treat human diseases. Hyoscyami Semen is found in local markets in China. In markets, sellers and buyers commonly inadvertently mix the seeds of H. niger with the seeds of related species such as Hygrophila salicifolia (Vahl) Nees, Astragalus complanatus R. Br., Cuscuta australis R. Br., Cuscuta chinensis Lam., and Impatiens balsamina L. because of their similar morphologies or similar names. Thus, developing a reliable method for discriminating H. niger seeds from its adulterants is necessary to reduce confusion and ensure the safe use of Hyoscyami Semen. The present study was designed to evaluate the efficiency of high-resolution melting analysis combined with DNA barcoding (Bar-HRM) with internal transcribed spacer 2 to discriminate H. niger. Our results show that Bar-HRM successfully identified the adulterants and detected the proportion of H. niger DNA extract within an admixture. In particular, HRM detected H. niger DNA extract in A. complanatus DNA extract at concentrations as low as 1%. In conclusion, the Bar-HRM method developed in the present study for authenticating H. niger is rapid and cost-effective. It can be used in the future to guarantee the purity of Hyoscyami Semen for the clinical use. Copyright © 2016 China Pharmaceutical University. Published by Elsevier B.V. All rights reserved.

  16. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  17. 77 FR 30238 - Living History Flight Experience (LHFE)-Exemptions for Passenger Carrying Operations Conducted...

    Science.gov (United States)

    2012-05-22

    ... those that were inadvertently included as LHFE? (j) Should the FAA establish an Organizational... computer capable of accommodating Word and PowerPoint presentations from a compact disk (CD) or USB memory...

  18. Metagenomic covariation along densely sampled environmental gradients in the Red Sea

    KAUST Repository

    Thompson, Luke R; Williams, Gareth J; Haroon, Mohamed; Shibl, Ahmed; Larsen, Peter; Shorenstein, Joshua; Knight, Rob; Stingl, Ulrich

    2016-01-01

    functional and not taxonomic covariation patterns were conserved when comparing with an intruding water mass with different physicochemical properties. Temperature explained the most variation in each metric, followed by nitrate, chlorophyll, phosphate

  19. Risks assessment associated with the possibility of intrusion into the low and intermediate level waste disposal facility

    International Nuclear Information System (INIS)

    Didita, L.; Ilie, P.; Pavelescu, M.

    1997-01-01

    In post-closure performance assessment of low and intermediate level waste disposal facilities it is necessary to assess the individual risks associated with the possibility of intrusion into repository. Intruder induced disruptive events can potentially compromise the integrity of the disposal unit and result in exhumation of the waste and radionuclides migration into environment. In this way, the main routes of exposure are: -inhalation of radioactive materials by the intruder; - external gamma irradiation of the intruder, - long-term pathways resulting from the transfer of radioactive materials to the surface of the site. This paper describes the evaluation of conditional and absolute risks associated with each route of exposure as a function of time. To evaluate the risks, it is necessary to calculate the time-dependent activities of each nuclide considered. This is achieved by employing an analytic solution to the Bateman equation at specified times of evaluation. Conditional risks by inhalation, external exposure and long-term pathways and different modes of intrusion are evaluated on the basis of an annual probability of intrusion of unity. Absolute risks are calculated by scaling the user-supplied probabilities of intrusion at various times of evaluation. The evaluation of absolute risks by long-term exposure pathways involves an interpolation procedure in time. The calculations have been performed for the most important radionuclides present in low and intermediate wastes. (authors)

  20. Low temperature nuclear orientation studies of nuclei far from stability

    International Nuclear Information System (INIS)

    Brown, D.E.

    1990-01-01

    One of the major current interests in nuclear physics is to study transitional nuclei which lie between well known regions of spherical and deformed nuclei. The neutron deficient Tellurium and Iodine isotopes are examples of such nuclei. In both cases, the influence of a πg 9/2 intruder orbital is expected to be strong at low excitation energies and at A ∼120. The 120 Te decay scheme has been investigated in detail by LTNO supported by γ-γ coincidences and conversion electron spectroscopy. An interaction of the level scheme using an IBM-2 calculation which allows for mixing between the ground state and a (4p-2h) intruder state is made. The success of this calculation provides strong evidence for the existence of the intruder configuration in 120 Te. In addition, the relative electric quadrupole moments of the ground states in 120-123 I have been measured. The light Platinum isotopes are also transitional nuclei. The ground state magnetic dipole and electric quadrupole moments have been measured for 185,187 Pt which lie inside the region in which the shape transition is known to occur. An interpretation of nuclear moments and level structures in the range 179≤A≤193 using a particle plus triaxial core shows that the shape change takes place gradually via a broad region in which the nuclear shape is triaxial. (author)

  1. Does gender matter? An analysis of men's and women's accounts of responding to symptoms of lung cancer.

    Science.gov (United States)

    MacLean, Alice; Hunt, Kate; Smith, Sarah; Wyke, Sally

    2017-10-01

    Men are often portrayed - in research studies, 'common-sense' accounts and popular media - as reluctant users of health services. They are said to avoid going to the GP whenever possible, while women are portrayed, in presumed opposition, as consulting more readily, more frequently and with less serious complaints. Such stereotypes may inadvertently encourage doctors to pay greater heed to men's symptoms in 'routine' consultations. Although previous research has challenged this view with evidence, and suggested that links between gender identities and help-seeking are complex and fluid, gender comparative studies remain uncommon, and particularly few studies (either qualitative or quantitative) compare men and women with similar morbidity. We contribute here to gender comparative research on help-seeking by investigating men's and women's accounts of responding to symptoms later diagnosed as lung cancer. A secondary analysis of qualitative interviews with 27 men and 18 women attending Scottish cancer centres revealed striking similarities between men's and women's accounts. Participants were seen as negotiating a complex and delicate balance in constructing their moral integrity as, on the one hand, responsible service users who were conscious of the demands on health care professionals' time, and as patients who did not take undue risks with their health, in the context of an illness for which people are often held culpable, on the other. In accounting for their responses to symptoms, men and women drew equally on culturally-embedded moral frameworks of stoicism and responsible service use. Regardless of gender, the accounts portrayed participants as stoic in response to illness and responsible service users; and as people seeking explanations for bodily changes and taking appropriate and timely action. Our analysis challenges simplistic, 'common-sense' views of gendered help-seeking and highlights that both men and women need support to consult their doctor for

  2. Publisher Correction: A cdk1 gradient guides surface contraction waves in oocytes.

    Science.gov (United States)

    Bischof, Johanna; Brand, Christoph A; Somogyi, Kálmán; Májer, Imre; Thome, Sarah; Mori, Masashi; Schwarz, Ulrich S; Lénárt, Péter

    2018-01-10

    A Supplementary Information file from a different paper was inadvertently published with the original version of this Article. This file was replaced with the correct Supplementary Information file on 24 October 2017.

  3. Rapid depressurization event analysis in BWR/6 using RELAP5 and contain

    Energy Technology Data Exchange (ETDEWEB)

    Mueftueoglu, A.K.; Feltus, M.A. [Pennsylvania State Univ., University Park, PA (United States)

    1995-09-01

    Noncondensable gases may become dissolved in Boiling Water Reactor (BWR) water level instrumentation during normal operations. Any dissolved noncondensable gases inside these water columns may come out of solution during rapid depressurization events, and displace water from the reference leg piping resulting in a false high level. These water level errors may cause a delay or failure in actuation, or premature shutdown of the Emergency Core Cooling System. (ECCS). If a rapid depressurization causes an erroneously high water level, preventing automatic ECCS actuation, it becomes important to determine if there would be other adequate indications for operator response and other signals for automatic actuation such as high drywell pressure. It is also important to determine the effect of the level signal on ECCS operation after it is being actuated. The objective of this study is to determine the detailed coupled containment/NSSS response during this rapid depressurization events in BWR/6. The selected scenarios involve: (a) inadvertent opening of all ADS valves, (b) design basis (DB) large break loss of coolant accident (LOCA), and (c) main steam line break (MSLB). The transient behaviors are evaluated in terms of: (a) vessel pressure and collapsed water level response, (b) specific transient boundary conditions, (e.g., scram, MSIV closure timing, feedwater flow, and break blowdown rates), (c) ECCS initiation timing, (d) impact of operator actions, (e) whether indications besides low-low water level were available. The results of the analysis had shown that there would be signals to actuate ECCS other than low reactor level, such as high drywell pressure, low vessel pressure, high suppression pool temperature, and that the plant operators would have significant indications to actuate ECCS.

  4. Safety lock for radiography exposure device

    International Nuclear Information System (INIS)

    Gaines, T.M.

    1982-01-01

    A safety lock for securing a radiation source in a radiography exposure device is disclosed. The safety lock prevents the inadvertent extension of the radiation source from the exposure device. The exposure devices are used extensively in industry for nondestructive testing of metal materials for defect. Unnecessary exposure of the radiographer or operator occurs not infrequently due to operator's error in believing that the radiation source is secured in the exposure device when, in fact, it is not. The present invention solves this problem of unnecessary exposure by releasingly trapping the radiation source in the shield of the radiography exposure device each time the source is retracted therein so that it is not inadvertently extended therefrom without the operator resetting the safety lock, thereby releasing the radiation source. Further, the safety lock includes an indicator which indicates when the source is trapped in the exposure device and also when it is untrapped. The safety lock is so designed that it does not prevent the return of the source to the trapped, shielded position in the exposure device. Further the safety lock includes a key means for locking the radiation source in the trapped position. The key means cannot be actuated until said radiation source is in said trapped position to further insure the safety lock cannot be inadvertently locked with the source untrapped and thus still extendable from the exposure device

  5. Simple battery armor to protect against gastrointestinal injury from accidental ingestion.

    Science.gov (United States)

    Laulicht, Bryan; Traverso, Giovanni; Deshpande, Vikram; Langer, Robert; Karp, Jeffrey M

    2014-11-18

    Inadvertent battery ingestion in children and the associated morbidity and mortality results in thousands of emergency room visits every year. Given the risk for serious electrochemical burns within hours of ingestion, the current standard of care for the treatment of batteries in the esophagus is emergent endoscopic removal. Safety standards now regulate locked battery compartments in toys, which have resulted in a modest reduction in inadvertent battery ingestion; specifically, 3,461 ingestions were reported in 2009, and 3,366 in 2013. Aside from legislation, minimal technological development has taken place at the level of the battery to limit injury. We have constructed a waterproof, pressure-sensitive coating, harnessing a commercially available quantum tunneling composite. Quantum tunneling composite coated (QTCC) batteries are nonconductive in the low-pressure gastrointestinal environment yet conduct within the higher pressure of standard battery housings. Importantly, this coating technology enables most battery-operated equipment to be powered without modification. If these new batteries are swallowed, they limit the external electrolytic currents responsible for tissue injury. We demonstrate in a large-animal model a significant decrease in tissue injury with QTCC batteries compared with uncoated control batteries. In summary, here we describe a facile approach to increasing the safety of batteries by minimizing the risk for electrochemical burn if the batteries are inadvertently ingested, without the need for modification of most battery-powered devices.

  6. Simple battery armor to protect against gastrointestinal injury from accidental ingestion

    Science.gov (United States)

    Laulicht, Bryan; Deshpande, Vikram; Langer, Robert; Karp, Jeffrey M.

    2014-01-01

    Inadvertent battery ingestion in children and the associated morbidity and mortality results in thousands of emergency room visits every year. Given the risk for serious electrochemical burns within hours of ingestion, the current standard of care for the treatment of batteries in the esophagus is emergent endoscopic removal. Safety standards now regulate locked battery compartments in toys, which have resulted in a modest reduction in inadvertent battery ingestion; specifically, 3,461 ingestions were reported in 2009, and 3,366 in 2013. Aside from legislation, minimal technological development has taken place at the level of the battery to limit injury. We have constructed a waterproof, pressure-sensitive coating, harnessing a commercially available quantum tunneling composite. Quantum tunneling composite coated (QTCC) batteries are nonconductive in the low-pressure gastrointestinal environment yet conduct within the higher pressure of standard battery housings. Importantly, this coating technology enables most battery-operated equipment to be powered without modification. If these new batteries are swallowed, they limit the external electrolytic currents responsible for tissue injury. We demonstrate in a large-animal model a significant decrease in tissue injury with QTCC batteries compared with uncoated control batteries. In summary, here we describe a facile approach to increasing the safety of batteries by minimizing the risk for electrochemical burn if the batteries are inadvertently ingested, without the need for modification of most battery-powered devices. PMID:25368176

  7. Geochronology of plutonic rocks and their tectonic terranes in Glacier Bay National Park and Preserve, southeast Alaska: Chapter E in Studies by the U.S. Geological Survey in Alaska, 2008-2009

    Science.gov (United States)

    Brew, David A.; Tellier, Kathleen E.; Lanphere, Marvin A.; Nielsen, Diane C.; Smith, James G.; Sonnevil, Ronald A.

    2014-01-01

    We have identified six major belts and two nonbelt occurrences of plutonic rocks in Glacier Bay National Park and Preserve and characterized them on the basis of geologic mapping, igneous petrology, geochemistry, and isotopic dating. The six plutonic belts and two other occurrences are, from oldest to youngest: (1) Jurassic (201.6–145.5 Ma) diorite and gabbro of the Lituya belt; (2) Late Jurassic (161.0–145.5 Ma) leucotonalite in Johns Hopkins Inlet; (3) Early Cretaceous (145.5–99.6 Ma) granodiorite and tonalite of the Muir-Chichagof belt; (4) Paleocene tonalite in Johns Hopkins Inlet (65.5–55.8 Ma); (5) Eocene granodiorite of the Sanak-Baranof belt; (6) Eocene and Oligocene (55.8–23.0 Ma) granodiorite, quartz diorite, and granite of the Muir-Fairweather felsic-intermediate belt; (7) Eocene and Oligocene (55.8–23.0 Ma) layered gabbros of the Crillon-La Perouse mafic belt; and (8) Oligocene (33.9–23.0 Ma) quartz monzonite and quartz syenite of the Tkope belt. The rocks are further classified into 17 different combination age-compositional units; some younger belts are superimposed on older ones. Almost all these plutonic rocks are related to Cretaceous and Tertiary subduction events. The six major plutonic belts intrude the three southeast Alaska geographic subregions in Glacier Bay National Park and Preserve, from west to east: (1) the Coastal Islands, (2) the Tarr Inlet Suture Zone (which contains the Border Ranges Fault Zone), and (3) the Central Alexander Archipelago. Each subregion includes rocks assigned to one or more tectonic terranes. The various plutonic belts intrude different terranes in different subregions. In general, the Early Cretaceous plutons intrude rocks of the Alexander and Wrangellia terranes in the Central Alexander Archipelago subregion, and the Paleogene plutons intrude rocks of the Chugach, Alexander, and Wrangellia terranes in the Coastal Islands, Tarr Inlet Suture Zone, and Central Alexander Archipelago subregions.

  8. New level schemes with high-spin states of 105,107,109Tc

    International Nuclear Information System (INIS)

    Luo, Y.X.; Rasmussen, J.O.; Lee, I.Y.; Fallon, P.; Hamilton, J.H.; Ramayya, A.V.; Hwang, J.K.; Gore, P.M.; Zhu, S.J.; Wu, S.C.; Ginter, T.N.; Ter-Akopian, G.M.; Daniel, A.V.; Stoyer, M.A.; Donangelo, R.; Gelberg, A.

    2004-01-01

    New level schemes of odd-Z 105,107,109 Tc are proposed based on the 252 Cf spontaneous-fission-gamma data taken with Gammasphere in 2000. Bands of levels are considerably extended and expanded to show rich spectroscopic information. Spin/parity and configuration assignments are made based on determinations of multipolarities of low-lying transitions and the level analogies to the previously reported levels, and to those of the neighboring Rh isotopes. A non-yrast negative-parity band built on the 3/2 - [301] orbital is observed for the first time in 105 Tc. A positive-parity band built on the 1/2 + [431] intruder orbital originating from the π(g 7/2 /d 5/2 ) subshells and having a strong deformation-driving effect is observed for the first time in 105 Tc, and assigned in 107 Tc. A positive-parity band built on the excited 11/2 + level, which has rather low excitation energy and predominantly decays into the 9/2 + level of the ground state band, provides evidence of triaxiality in 107,109 Tc, and probably also in 105 Tc. Rotational constants are calculated and discussed for the K=1/2 intruder bands using the Bohr-Mottelson formula. Level systematics are discussed in terms of the locations of proton Fermi levels and deformations. The band crossings of yrast positive-parity bands are observed, most likely related to h 11/2 neutron alignment. Triaxial-rotor-plus-particle model calculations performed with ε=0.32 and γ=-22.5 deg. on the prolate side of maximum triaxiality yielded the best reproduction of the excitation energies, signature splittings, and branching ratios of the positive-parity bands (except for the intruder bands) of these Tc isotopes. The significant discrepancies between the triaxial-rotor-plus-particle model calculations and experiment for the K=1/2 intruder bands in 105,107 Tc need further theoretical studies

  9. Compendium of ECCS [Emergency Core Cooling Systems] research for realistic LOCA [loss-of-coolant accidents] analysis: Final report

    International Nuclear Information System (INIS)

    1988-12-01

    In the United States, Emergency Core Cooling Systems (ECCS) are required for light water reactors (LWRs) to provide cooling of the reactor core in the event of a break or leak in the reactor piping or an inadvertent opening of a valve. These accidents are called loss-of-coolant accidents (LOCA), and they range from small leaks up to a postulated full break of the largest pipe in the reactor cooling system. Federal government regulations provide that LOCA analysis be performed to show that the ECCS will maintain fuel rod cladding temperatures, cladding oxidation, and hydrogen production within certain limits. The NRC and others have completed a large body of research which investigated fuel rod behavior and LOCA/ECCS performance. It is now possible to make a realistic estimate of the ECCS performance during a LOCA and to quantify the uncertainty of this calculation. The purpose of this report is to summarize this research and to serve as a general reference for the extensive research effort that has been performed. The report: (1) summarizes the understanding of LOCA phenomena in 1974; (2) reviews experimental and analytical programs developed to address the phenomena; (3) describes the best-estimate computer codes developed by the NRC; (4) discusses the salient technical aspects of the physical phenomena and our current understanding of them; (5) discusses probabilistic risk assessment results and perspectives, and (6) evaluates the impact of research results on the ECCS regulations. 736 refs., 412 figs., 66 tabs

  10. Application of mercurometric analysis methods to radioactive (and/or toxic) samples: Pycnometry and porosimetry

    International Nuclear Information System (INIS)

    Sannen, L.

    1991-01-01

    The analytical tools and methods used in the laboratory of High and Medium Activity of the Nuclear Research Centre in Mol to determine the density and the open porosity of radioactive (and/or toxic) samples are described. The density is determined by a vacuum pycnometer with plunger displacement. This home-made apparatus has been automated up to a high degree so that operation is easily performed in the remote handling conditions of a hot cell environment. The amount of mercury displaced by the sample is measured. The accuracy is better than 0.2 %. The porosimeter is a commercial apparatus which was modified to improve the hot cell compatibility and to provide fast processing of the data. The open porosity and its pore size distribution are determined from the measurement of the amount of mercury intruded into the sample under increasing pressure. The paper describes both instruments and the working methods. Also included are some examples of measurement results. (author). 5 figs

  11. 29 CFR 1917.23 - Hazardous atmospheres and substances (see also § 1917.2 Hazardous cargo, material, substance or...

    Science.gov (United States)

    2010-07-01

    ... menhaden and similar species of fish; § 1917.152 Welding, cutting, and heating (hot work); and § 1917.153...-contained breathing apparatus, which shall be utilized. (4) To prevent inadvertent employee entry into...

  12. Self-assembly of ordered graphene nanodot arrays (vol 8, 47, 2017)

    DEFF Research Database (Denmark)

    Camilli, Luca; Jørgensen, Jakob H.; Tersoff, Jerry

    2017-01-01

    An incorrect version of the Supplementary Information was inadvertently published with this article where the wrong file was included. The HTML has been updated to include the correct version of the Supplementary Information....

  13. 78 FR 3377 - Notice of Receipt of Several Pesticide Petitions Filed for Residues of Pesticide Chemicals in or...

    Science.gov (United States)

    2013-01-16

    ... acetanilide) and its metabolites containing either the 2-ethyl-6-methylaniline (EMA) or the 2-(1-hydroxyethyl... inadvertent residues of the herbicide acetochlor (2-chloro-2'-methyl- 6'-ethyl-N-ethoxymethyl acetanilide) and...

  14. Partners Vetting System (PVS)

    Data.gov (United States)

    US Agency for International Development — PVS 2.0 is a database that supports vetting of NGOs and individuals to ensure that USAID-funded assistance does not inadvertently provide support to entities or...

  15. EPA's SF6 Emission Reduction Partnership: Maximizing the Benefits of SF6 Emission Reductions for Electric Utilities

    National Research Council Canada - National Science Library

    Blackman, Jerome; Kantamaneni, Ravi

    2004-01-01

    .... Under ideal conditions, SF6 would remain contained within transmission equipment. In reality, however, SF6 is inadvertently emitted into the atmosphere as leaks develop during various stages of the equipment's life cycle...

  16. Analysis of BWR out-of-phase instabilities in the frequency domain

    International Nuclear Information System (INIS)

    Farawila, Y.M.; Pruitt, D.W.; Kreuter, D.

    1992-01-01

    During startup or because of an inadvertent recirculation pump trip, a boiling water reactor (BWR) may operate at relatively low flow and high power conditions. At these conditions, a BWR is susceptible to coupled flow and power oscillations that could result in undesirable reactor scram unless appropriate countermeasures are taken. This contribution to analytical methods has been developed to address in part a general industrywide and regulatory concern about BWR stability initiated by the LaSalle 2 instability event in March 1988. This work is designed to extend the capability of the one-dimensional parallel channel frequency domain code STAIF to predict the regional oscillation decay ratio. The basic theory follows that developed by March-Leuba and Blakeman, where the oscillation mechanism is identified as the excitation of a subcritical neutronic mode with a constant core pressure drop boundary condition. The improvements to the basic theory include applying the theory to one-dimensional neutronics instead of point kinetics and taking account of the actual three-dimensional harmonic flux distribution

  17. Novel mechanism of network protection against the new generation of cyber attacks

    Science.gov (United States)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  18. New particle-hole symmetries and the extended interacting boson model

    CERN Document Server

    De Coster, C; Decroix, B; Heyde, Kris L G; Oros, A M

    1998-01-01

    We describe shape coexistence and intruder many-particle-hole (mp-nh)excitations in the extended interacting boson model EIBM and EIBM-2,combining both the particle-hole and the charge degree of freedom.Besides the concept of I-spin multiplets and subsequently $SU(4)$ multiplets, we touch upon the existence of particle-hole mixed symmetry states. We furthermore describe regular and intrudermany-particle-hole excitations in one nucleus on an equal footing, creating (annihilating) particle-hole pairs using the K-spin operatorand studying possible mixing between these states. As a limiting case,we treat the coupling of two IBM-1 Hamiltonians, each decribing the regular and intruder excitations respectively, in particular lookingat the $U(5)$-$SU(3)$ dynamical symmetry coupling. We apply such coupling scheme to the Po isotopes.

  19. Proposed Network Intrusion Detection System ‎In Cloud Environment Based on Back ‎Propagation Neural Network

    Directory of Open Access Journals (Sweden)

    Shawq Malik Mehibs

    2017-12-01

    Full Text Available Cloud computing is distributed architecture, providing computing facilities and storage resource as a service over the internet. This low-cost service fulfills the basic requirements of users. Because of the open nature and services introduced by cloud computing intruders impersonate legitimate users and misuse cloud resource and services. To detect intruders and suspicious activities in and around the cloud computing environment, intrusion detection system used to discover the illegitimate users and suspicious action by monitors different user activities on the network .this work proposed based back propagation artificial neural network to construct t network intrusion detection in the cloud environment. The proposed module evaluated with kdd99 dataset the experimental results shows promising approach to detect attack with high detection rate and low false alarm rate

  20. Cyber-security of nuclear facilities: stakes and challenges

    International Nuclear Information System (INIS)

    Marquez, T.

    2016-01-01

    Major players in the French nuclear industry have implemented the concept of cyber-resilience that aims at anticipating and identifying real threats and detecting the weaknesses of the critical installations in order to protect them more efficiently. French law imposes for some categories of installations including nuclear power plants the implementation of advanced protection solutions to reach a high standard of cyber security. Sentryo, a start-up has developed a system that allows the detection of intruders in a digital network by analysing the interactions between the nodes of the network. The intruder is detected when the interaction mapping appears to be different from a configuration considered as normal. The feedback experience shows that any function in an enterprise must be made aware of the cyber risk. (A.C.)

  1. Who can resist Foucault?

    Science.gov (United States)

    Bleakley, Alan; Bligh, John

    2009-08-01

    Michel Foucault's analysis of "the birth of the clinic" describes the genesis of a unified discourse that, in retrospect, has shaped western medicine for two centuries. However, in looking prospectively toward a 21st century medicine, Foucault's analysis is necessary but not sufficient. To better critically address medicine and medical education in the era of simulation, we could draw on frameworks developed by futurists such as Jean Baudrillard. Foucault's analysis does not account for contemporary, complex developments of the clinical gaze as the gaze is distributed across practitioners in increasing use of sophisticated, representational diagnostic imaging. Further, Foucault's antihumanist rhetoric sometimes strays into the antihumane, and this is disturbing for those who support the development of patient-centered medicine. Yet we are increasingly teaching aspects of medicine, such as communication, in simulated learning environments in which complex reality is absent, perhaps inadvertently creating an "inhumanity" in medical education.

  2. Antioxidant Activity in the Blood and Testes of the Mottled Brown ...

    African Journals Online (AJOL)

    IJAAAR

    generation of ROS or produce these toxic metabolites as an inadvertent ... sequestering transition metals (iron, copper) ... 0.154M NaCl (Physiological Saline). The .... dependent in the male quails. ... antioxidant defence mechanisms utilized by.

  3. Floral biology and the effects of plant-pollinator interaction on ...

    African Journals Online (AJOL)

    oyelana

    2012-10-18

    Oct 18, 2012 ... interaction on pollination intensity, fruit and seed set in. Solanum ... which plants offer rewards to flower visitors and they inadvertently ... fragmentation and extinction. Therefore, the ...... Plant resources of tropical Africa 2.

  4. Size distribution and roundness of clasts within pseudotachylytes of ...

    Indian Academy of Sciences (India)

    Bhuban Mohan Behera

    2017-06-06

    Jun 6, 2017 ... alingam 2013) have intruded into the charnockites; they do not show ... Figure 3. Dark pseudotachylyte veins (Ps) within the white to pink colored charnockitic massif. ..... Geochemistry and thermodynamics of an earthquake: A.

  5. Conspicuous female ornamentation and tests of male mate preference in threespine sticklebacks (Gasterosteus aculeatus.

    Directory of Open Access Journals (Sweden)

    Daniel Shane Wright

    Full Text Available Sexual selection drives the evolution of exaggerated male ornaments in many animal species. Female ornamentation is now acknowledged also to be common but is generally less well understood. One example is the recently documented red female throat coloration in some threespine stickleback (Gasterosteus aculeatus populations. Although female sticklebacks often exhibit a preference for red male throat coloration, the possibility of sexual selection on female coloration has been little studied. Using sequential and simultaneous mate choice trials, we examined male mate preferences for female throat color, as well as pelvic spine color and standard length, using wild-captured threespine sticklebacks from the Little Campbell River, British Columbia. In a multivariate analysis, we found no evidence for a population-level mate preference in males, suggesting the absence of directional sexual selection on these traits arising from male mate choice. Significant variation was detected among males in their preference functions, but this appeared to arise from differences in their mean responsiveness across mating trials and not from variation in the strength (i.e., slope of their preference, suggesting the absence of individual-level preferences as well. When presented with conspecific intruder males, male response decreased as intruder red throat coloration increased, suggesting that males can discriminate color and other aspects of phenotype in our experiment and that males may use these traits in intrasexual interactions. The results presented here are the first to explicitly address male preference for female throat color in threespine sticklebacks.

  6. Conspicuous female ornamentation and tests of male mate preference in threespine sticklebacks (Gasterosteus aculeatus).

    Science.gov (United States)

    Wright, Daniel Shane; Pierotti, Michele E R; Rundle, Howard D; McKinnon, Jeffrey S

    2015-01-01

    Sexual selection drives the evolution of exaggerated male ornaments in many animal species. Female ornamentation is now acknowledged also to be common but is generally less well understood. One example is the recently documented red female throat coloration in some threespine stickleback (Gasterosteus aculeatus) populations. Although female sticklebacks often exhibit a preference for red male throat coloration, the possibility of sexual selection on female coloration has been little studied. Using sequential and simultaneous mate choice trials, we examined male mate preferences for female throat color, as well as pelvic spine color and standard length, using wild-captured threespine sticklebacks from the Little Campbell River, British Columbia. In a multivariate analysis, we found no evidence for a population-level mate preference in males, suggesting the absence of directional sexual selection on these traits arising from male mate choice. Significant variation was detected among males in their preference functions, but this appeared to arise from differences in their mean responsiveness across mating trials and not from variation in the strength (i.e., slope) of their preference, suggesting the absence of individual-level preferences as well. When presented with conspecific intruder males, male response decreased as intruder red throat coloration increased, suggesting that males can discriminate color and other aspects of phenotype in our experiment and that males may use these traits in intrasexual interactions. The results presented here are the first to explicitly address male preference for female throat color in threespine sticklebacks.

  7. Criticality detector exclusion zone in a spent-fuel hot cell

    International Nuclear Information System (INIS)

    Kim, S.S.; Sterbentz, J.W.

    1999-01-01

    The main purpose of a criticality alarm system (CAS) is to protect personnel by detecting a criticality event (neutron radiation) and actuating an alarm system to initiate emergency response. Inadvertent criticality alarms from noncritical events, such as spurious voltage spikes or intense gamma radiation fields, can produce work cessation and time-consuming and costly event assessments and may result in harm to personnel during an evacuation. It therefore becomes a major concern to ensure that inadvertent or false criticality alarms do not occur or at least are minimized. Minimization of inadvertent criticality alarms due to intense gamma radiation emitted from spent-nuclear-fuel (SNF) elements as opposed to neutron radiation from an actual criticality event is the primary focus of this calculational and experimental study. The Irradiated Fuel Storage Facility (IFSF) located at the Idaho National Engineering and Environmental Laboratory is a government-owned, contractor-operated facility whose mission is to provide safe handling and dry storage for various types of SNFs. Although other fuel types (lower burnup) are stored in the IFSF, it is the high-burnup elements with the associated intense gamma radiation fields that have the potential to inadvertently set off the criticality alarms in the fuel-handling area adjacent to the storage vault. Typically, in the fuel-handling cave or hot cell of the IFSF, the cask lid is removed, and individual fuel elements are extracted from the cask and placed in special storage canisters. It is during the time period when fuel elements are extracted from their casks or when fully loaded canisters are moved in the hot cell that the CAS detectors are exposed to the intense gamma radiation fields from the spent fuel. The neutron detectors positioned in one of the manipulator ports are designed such that fast neutrons from a criticality event are thermalized by a polyethylene moderator, strike the scintillator detector material, and

  8. Criticality safety issues associated with the introduction of low void reactivity fuel in the Bruce reactors - a management and technical overview

    International Nuclear Information System (INIS)

    Thompson, J.W.; Austman, G.; Iglesias, F.; Schmeing, H.; Elliott, C.; Archinoff, G.

    2004-01-01

    The concept of criticality for operating reactor staff, particularly in a natural uranium-fuelled reactor, is relatively benign - the reactor is controlled at the critical condition by the regulating system. That is, issues related to criticality exist only within the reactor, in a set of carefully managed circumstances. With the introduction of enriched Low Void Reactivity Fuel (LVRF) into this operating environment comes a new 'concept of criticality', one which, although physically the same, cannot be treated in the same fashion. It may be the case that criticality can be achieved outside the reactor, albeit with a set of very pessimistic assumptions. Such 'inadvertent criticality' outside the reactor, should it occur, cannot be controlled. The consequences of such an inadvertent criticality could have far-reaching effects, not only in terms of severe health effects to those nearby, but also in terms of the negative impact on Bruce Power, and the Canadian nuclear industry in general. Thus the introduction of LVRF in the Bruce B reactors, and therefore the introduction of this new hazard, inadvertent criticality, warrants the development of a governance structure for its management. Such a program will consist of various elements, including the establishment of a framework to administer the criticality safety program, analytical assessment to support the process design, the development of operational procedures, the development of enhanced emergency procedures if necessary, and the implementation of a criticality safety training program. The entire package must be sufficient to demonstrate to station management, and the regulator, that the criticality safety risks associated with the implementation of enriched fuel have been properly evaluated, and that all necessary steps have been taken to effectively manage these risks. A well-founded Criticality Safety Program will offer such assurance. In this paper, we describe the establishment of a Criticality Safety

  9. 29 CFR 1918.93 - Hazardous atmospheres and substances (See also § 1918.2).

    Science.gov (United States)

    2010-07-01

    ...; § 1918.94(e), Catch of menhaden and similar species of fish. (b) Determination of the hazard. When the...-contained breathing apparatus which shall be used for entry. (4) To prevent inadvertent employee entry into...

  10. A meta-analysis of personality and workplace safety: addressing unanswered questions.

    Science.gov (United States)

    Beus, Jeremy M; Dhanani, Lindsay Y; McCord, Mallory A

    2015-03-01

    [Correction Notice: An Erratum for this article was reported in Vol 100(2) of Journal of Applied Psychology (see record 2015-08139-001). Table 3 contained formatting errors. Minus signs used to indicate negative statistical estimates within the table were inadvertently changed to m-dashes. All versions of this article have been corrected.] The purpose of this meta-analysis was to address unanswered questions regarding the associations between personality and workplace safety by (a) clarifying the magnitude and meaning of these associations with both broad and facet-level personality traits, (b) delineating how personality is associated with workplace safety, and (c) testing the relative importance of personality in comparison to perceptions of the social context of safety (i.e., safety climate) in predicting safety-related behavior. Our results revealed that whereas agreeableness and conscientiousness were negatively associated with unsafe behaviors, extraversion and neuroticism were positively associated with them. Of these traits, agreeableness accounted for the largest proportion of explained variance in safety-related behavior and openness to experience was unrelated. At the facet level, sensation seeking, altruism, anger, and impulsiveness were all meaningfully associated with safety-related behavior, though sensation seeking was the only facet that demonstrated a stronger relationship than its parent trait (i.e., extraversion). In addition, meta-analytic path modeling supported the theoretical expectation that personality's associations with accidents are mediated by safety-related behavior. Finally, although safety climate perceptions accounted for the majority of explained variance in safety-related behavior, personality traits (i.e., agreeableness, conscientiousness, neuroticism) still accounted for a unique and substantive proportion of the explained variance. Taken together, these results substantiate the value of considering personality traits as key

  11. 21 CFR 2.25 - Grain seed treated with poisonous substances; color identification to prevent adulteration of...

    Science.gov (United States)

    2010-04-01

    ... the natural color of the food seed as to make admixture of treated, denatured seeds with good food... adequately denatured by a suitable color to prevent their subsequent inadvertent use as food for man or feed...

  12. Airway injury during emergency transcutaneous airway access: a comparison at cricothyroid and tracheal sites.

    LENUS (Irish Health Repository)

    Salah, Nazar

    2009-12-01

    Oxygenation via the cricothyroid membrane (CTM) may be required in emergencies, but inadvertent tracheal cannulation may occur. In this study, we compared airway injury between the tracheal and CTM sites using different techniques for airway access.

  13. Children, Status and the Law in Nigeria

    African Journals Online (AJOL)

    FIRST LADY

    In effect, it means that children are appreciated, recognized, and regarded ... occupy in the Nigerian society and the very special recognition accorded their status ..... inadvertently over-react to minor delinquency; not doing or causing any harm.

  14. Pilot visual acquisition of traffic : operational communications from air traffic control operational communication.

    Science.gov (United States)

    2001-05-01

    Avionics devices designed to provide pilots with graphically displayed traffic information will enable pilots to acquire and verify the identity of any intruder aircraft within the general area, either before or in accordance with a controller-issued...

  15. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  16. Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT)

    Science.gov (United States)

    2016-07-27

    munication. Unfortunately, these critical functions are routinely threatened by malware and other cyber security threats. Such threats are expected to...such as network packets, firewall logs, network diagrams, IP address ownership information, etc., to determine if sufficient evidence exists to support...circumstances, network analysts would likely need to consult additional sources of evidence not present in the simulation, such as net- work firewall

  17. Assessment of physical protection systems: EVA method

    International Nuclear Information System (INIS)

    Bernard, J.-L.; Lamotte, C.; Jorda, A.

    2001-01-01

    CEA's missions in various sectors of activity such as nuclear, defence, industrial contracts and the associated regulatory requirements, make it necessary to develop a strategy in the field of physical protection. In particular, firms having nuclear materials are subject to the July 25, 1980 law no.80-572 on the protection and control of nuclear materials. A holding permit delivered by the regulatory authority is conditioned to the protection by the operator of the nuclear materials used. In France it is the nuclear operator who must demonstrate, in the form of a security study, that potential aggressors would be neutralised before they could escape with the material. To meet these requirements, we have developed methods to assess the vulnerability of our facilities. The EVA method, the French acronym for 'Evaluation de la vulnerabilite des Acces' (access vulnerability system) allows dealing with internal and external threats involving brutal actions. In scenarios relating to external threat, the intruders get past the various barriers of our protection system, attempting to steal a large volume of material in one swoop and then escape. In the case of internal threat, the goal is the same. However, as the intruder usually has access to the material in the scope of his activities, the action begins at the level of the target. Our protection system is based on in-depth defense where the intruders are detected and then delayed in their advance towards their target to allow time for intervention forces to intercept them

  18. Tanks 18 And 19-F Structural Flowable Grout Fill Material Evaluation And Recommendations

    International Nuclear Information System (INIS)

    Stefanko, D.; Langton, C.

    2011-01-01

    Cementitious grout will be used to close Tanks 18-F and 19-F. The functions of the grout are to: (1) physically stabilize the final landfill by filling the empty volume in the tanks with a non compressible material; (2) provide a barrier for inadvertent intrusion into the tank; (3) reduce contaminant mobility by (a) limiting the hydraulic conductivity of the closed tank and (b) reducing contact between the residual waste and infiltrating water; and (4) providing an alkaline, chemically reducing environment in the closed tank to control speciation and solubility of selected radionuclides. The objective of this work was to identify a single (all-in-one) grout to stabilize and isolate the residual radionuclides in the tank, provide structural stability of the closed tank and serve as an inadvertent intruder barrier. This work was requested by V. A. Chander, High Level Waste (HLW) Tank Engineering, in HLW-TTR-2011-008. The complete task scope is provided in the Task Technical and QA Plan, SRNL-RP-2011-00587 Revision 0. The specific objectives of this task were to: (1) Identify new admixtures and dosages for formulating a zero bleed flowable tank fill material selected by HLW Tank Closure Project personnel based on earlier tank fill studies performed in 2007. The chemical admixtures used for adjusting the flow properties needed to be updated because the original admixture products are no longer available. Also, the sources of cement and fly ash have changed, and Portland cements currently available contain up to 5 wt. % limestone (calcium carbonate). (2) Prepare and evaluate the placement, compressive strength, and thermal properties of the selected formulation with new admixture dosages. (3) Identify opportunities for improving the mix selected by HLW Closure Project personnel and prepare and evaluate two potentially improved zero bleed flowable fill design concepts; one based on the reactor fill grout and the other based on a shrinkage compensating flowable fill mix

  19. TANKS 18 AND 19-F STRUCTURAL FLOWABLE GROUT FILL MATERIAL EVALUATION AND RECOMMENDATIONS

    Energy Technology Data Exchange (ETDEWEB)

    Stefanko, D.; Langton, C.

    2011-11-01

    Cementitious grout will be used to close Tanks 18-F and 19-F. The functions of the grout are to: (1) physically stabilize the final landfill by filling the empty volume in the tanks with a non compressible material; (2) provide a barrier for inadvertent intrusion into the tank; (3) reduce contaminant mobility by (a) limiting the hydraulic conductivity of the closed tank and (b) reducing contact between the residual waste and infiltrating water; and (4) providing an alkaline, chemically reducing environment in the closed tank to control speciation and solubility of selected radionuclides. The objective of this work was to identify a single (all-in-one) grout to stabilize and isolate the residual radionuclides in the tank, provide structural stability of the closed tank and serve as an inadvertent intruder barrier. This work was requested by V. A. Chander, High Level Waste (HLW) Tank Engineering, in HLW-TTR-2011-008. The complete task scope is provided in the Task Technical and QA Plan, SRNL-RP-2011-00587 Revision 0. The specific objectives of this task were to: (1) Identify new admixtures and dosages for formulating a zero bleed flowable tank fill material selected by HLW Tank Closure Project personnel based on earlier tank fill studies performed in 2007. The chemical admixtures used for adjusting the flow properties needed to be updated because the original admixture products are no longer available. Also, the sources of cement and fly ash have changed, and Portland cements currently available contain up to 5 wt. % limestone (calcium carbonate). (2) Prepare and evaluate the placement, compressive strength, and thermal properties of the selected formulation with new admixture dosages. (3) Identify opportunities for improving the mix selected by HLW Closure Project personnel and prepare and evaluate two potentially improved zero bleed flowable fill design concepts; one based on the reactor fill grout and the other based on a shrinkage compensating flowable fill mix

  20. Research Article Special Issue

    African Journals Online (AJOL)

    pc

    2017-10-17

    Oct 17, 2017 ... or audio feedbacks. Good interface designs will inadvertently push the players to ... certain preferences based on their cultural background [5]. Thus, the ..... Journal of Operations Management, 1998, 16(4):455-469. [10] Ramli ...