WorldWideScience

Sample records for inadvertent intruder analysis

  1. Automated Inadvertent Intruder Application

    International Nuclear Information System (INIS)

    Koffman, Larry D.; Lee, Patricia L.; Cook, James R.; Wilhite, Elmer L.

    2008-01-01

    The Environmental Analysis and Performance Modeling group of Savannah River National Laboratory (SRNL) conducts performance assessments of the Savannah River Site (SRS) low-level waste facilities to meet the requirements of DOE Order 435.1. These performance assessments, which result in limits on the amounts of radiological substances that can be placed in the waste disposal facilities, consider numerous potential exposure pathways that could occur in the future. One set of exposure scenarios, known as inadvertent intruder analysis, considers the impact on hypothetical individuals who are assumed to inadvertently intrude onto the waste disposal site. Inadvertent intruder analysis considers three distinct scenarios for exposure referred to as the agriculture scenario, the resident scenario, and the post-drilling scenario. Each of these scenarios has specific exposure pathways that contribute to the overall dose for the scenario. For the inadvertent intruder analysis, the calculation of dose for the exposure pathways is a relatively straightforward algebraic calculation that utilizes dose conversion factors. Prior to 2004, these calculations were performed using an Excel spreadsheet. However, design checks of the spreadsheet calculations revealed that errors could be introduced inadvertently when copying spreadsheet formulas cell by cell and finding these errors was tedious and time consuming. This weakness led to the specification of functional requirements to create a software application that would automate the calculations for inadvertent intruder analysis using a controlled source of input parameters. This software application, named the Automated Inadvertent Intruder Application, has undergone rigorous testing of the internal calculations and meets software QA requirements. The Automated Inadvertent Intruder Application was intended to replace the previous spreadsheet analyses with an automated application that was verified to produce the same calculations and

  2. AUTOMATED INADVERTENT INTRUDER APPLICATION

    International Nuclear Information System (INIS)

    Koffman, L; Patricia Lee, P; Jim Cook, J; Elmer Wilhite, E

    2007-01-01

    The Environmental Analysis and Performance Modeling group of Savannah River National Laboratory (SRNL) conducts performance assessments of the Savannah River Site (SRS) low-level waste facilities to meet the requirements of DOE Order 435.1. These performance assessments, which result in limits on the amounts of radiological substances that can be placed in the waste disposal facilities, consider numerous potential exposure pathways that could occur in the future. One set of exposure scenarios, known as inadvertent intruder analysis, considers the impact on hypothetical individuals who are assumed to inadvertently intrude onto the waste disposal site. Inadvertent intruder analysis considers three distinct scenarios for exposure referred to as the agriculture scenario, the resident scenario, and the post-drilling scenario. Each of these scenarios has specific exposure pathways that contribute to the overall dose for the scenario. For the inadvertent intruder analysis, the calculation of dose for the exposure pathways is a relatively straightforward algebraic calculation that utilizes dose conversion factors. Prior to 2004, these calculations were performed using an Excel spreadsheet. However, design checks of the spreadsheet calculations revealed that errors could be introduced inadvertently when copying spreadsheet formulas cell by cell and finding these errors was tedious and time consuming. This weakness led to the specification of functional requirements to create a software application that would automate the calculations for inadvertent intruder analysis using a controlled source of input parameters. This software application, named the Automated Inadvertent Intruder Application, has undergone rigorous testing of the internal calculations and meets software QA requirements. The Automated Inadvertent Intruder Application was intended to replace the previous spreadsheet analyses with an automated application that was verified to produce the same calculations and

  3. Inadvertent Intruder Analysis For The Portsmouth On-Site Waste Disposal Facility (OSWDF)

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Frank G. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Phifer, Mark A. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2014-01-22

    The inadvertent intruder analysis considers the radiological impacts to hypothetical persons who are assumed to inadvertently intrude on the Portsmouth OSWDF site after institutional control ceases 100 years after site closure. For the purposes of this analysis, we assume that the waste disposal in the OSWDF occurs at time zero, the site is under institutional control for the next 100 years, and inadvertent intrusion can occur over the following 1,000 year time period. Disposal of low-level radioactive waste in the OSWDF must meet a requirement to assess impacts on such individuals, and demonstrate that the effective dose equivalent to an intruder would not likely exceed 100 mrem per year for scenarios involving continuous exposure (i.e. chronic) or 500 mrem for scenarios involving a single acute exposure. The focus in development of exposure scenarios for inadvertent intruders was on selecting reasonable events that may occur, giving consideration to regional customs and construction practices. An important assumption in all scenarios is that an intruder has no prior knowledge of the existence of a waste disposal facility at the site. Results of the analysis show that a hypothetical inadvertent intruder at the OSWDF who, in the worst case scenario, resides on the site and consumes vegetables from a garden established on the site using contaminated soil (chronic agriculture scenario) would receive a maximum chronic dose of approximately 7.0 mrem/yr during the 1000 year period of assessment. This dose falls well below the DOE chronic dose limit of 100 mrem/yr. Results of the analysis also showed that a hypothetical inadvertent intruder at the OSWDF who, in the worst case scenario, excavates a basement in the soil that reaches the waste (acute basement construction scenario) would receive a maximum acute dose of approximately 0.25 mrem/yr during the 1000 year period of assessment. This dose falls well below the DOE acute dose limit of 500 mrem/yr. Disposal inventory

  4. Potential impact of DOE's performance objective for protection of inadvertent intruders on low-level waste disposals at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1993-01-01

    Performance objectives for disposal of low-level radioactive waste at Department of Energy (DOE) sites include limits on radiation dose to inadvertent intruders. This paper investigates the potential impact of DOE's performance objective for protection of inadvertent intruders on the acceptability of low-level waste disposals at Oak Ridge National Laboratory (ORNL). The analysis is based on waste volumes and radionuclide inventories for recent disposals and estimated doses to an inadvertent intruder for assumed exposure scenarios. The analysis indicates that more than 99% of the total volume of waste in recent disposals meets the performance objective for inadvertent intruders, and the volume of waste found to be unacceptable for disposal is only about 16 m 3 . Therefore, DOE's performance objective for protection of inadvertent intruders probably will not have unreasonably adverse impacts on acceptable waste disposals at ORNL

  5. Potential impact of DOE's performance objective for protection of inadvertent intruders on low-level waste disposals at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1992-01-01

    The Department of Energy's Order 5820.2A, Chapter III, specifies performance objectives for disposal of low-level radioactive waste which include limits on effective dose equivalent for inadvertent intruders. This paper investigates the potential impact of the performance objective for protection of inadvertent intruders on the acceptability of waste disposals in Solid Waste Storage Area (SWSA) 6 at Oak Ridge National Laboratory (ORNL). The analysis is based on radionuclide inventories and waste volumes for recent disposals in SWSA 6 and calculated doses to an inadvertent intruder per unit concentration of radionuclides in disposed waste for assumed exposure scenarios

  6. A proposed alternative approach for protection of inadvertent human intruders from buried Department of Energy low level radioactive wastes

    International Nuclear Information System (INIS)

    Cochran, J.R.

    1995-01-01

    The burial of radioactive wastes creates a legacy. To limit the impact of this legacy on future generations, we establish and comply with performance objectives. This paper reviews performance objectives for the long-term isolation of buried radioactive wastes; identifies regulatorly-defined performance objectives for protecting the inadvertent human intruder (IHI) from buried low-level radioactive waste (LLW); (3) discusses a shortcoming of the current approach; and (4) offers an alternative approach for protecting the IHI. This alternative approach is written specifically for the burial of US Department of Energy (DOE) wastes at the Nevada Test Site (NTS), although the approach might be applied at other DOE burial sites

  7. Analysis of inadvertent containment spray actuation for NPP Krsko

    International Nuclear Information System (INIS)

    Grgic, D.; Spalj, S.; Fancev, T.

    2000-01-01

    Refueling Water Storage Tank (RWST) supplies borated water to the Chemical and Volume Control System, Emergency Core Cooling System and Containment Spray System. In the analyses of the containment external pressure the spray temperature is assumed to be equal to the RWST lower temperature limit. This value ensures that the design negative containment pressure will not be exceeded in the event of inadvertent actuation of the Containment Spray. For NPP Kriko the negative containment pressure has to be kept below 0.1 kp/cm2 to avoid the loss of containment integrity. This paper pursuents the analysis of Inadvertent Containment Spray Actuation in order to check the influence of change in RWST water temperature on containment negative pressure. GOTHIC computer code was used for calculation of containment thermal hydraulic behavior during this accident. (author)

  8. Tracking intruder states

    Energy Technology Data Exchange (ETDEWEB)

    Riedinger, L L; Mueller, W F; Yu, C H [Tennessee Univ., Knoxville, TN (United States). Dept. of Physics

    1992-08-01

    The deformation-driving effects of intruder states are studied by analysis of various types of data on rotational bands in rare-earth deformed nuclei. The sensitivity of four measurables (bandhead energy, B(E2) value, neutron i{sub 13/2} crossing frequency, and signature splitting) to increased deformation in an intruder band is shown. The analysis of signature splitting systematics is extended to known superdeformed bands. (author). 22 refs., 5 figs.

  9. LWRA analysis of inadvertent closing of the main steam isolation valve in NPP Krsko

    International Nuclear Information System (INIS)

    Feretic, D.; Cavlina, N.; Grgic, D.; Spalj, S.

    1996-01-01

    The paper describes the use of system code RELAP5/mod2 and analyzer code LWRA in analysis of inadvertent closing of the main steam isolation valve that happened in NPP Krsko on September, 25 1995. Three cases were calculated in order to address different aspects of the modelled transient. This preliminary calculation showed that, even though the real plant behaviour was not completely reproduced, such kind of analysis can help to better understand plant behaviour and to identify important phenomena in the plant during transient. The results calculated by RELAP5 and LWRA were similar and both codes indicated lack of better understanding of the plant systems status. The LWRA was more than 5 times faster than real time. (author)

  10. Analysis of inadvertent safety injection incident at Kori unit 3 on september 6, 1990

    International Nuclear Information System (INIS)

    Kim, Kyun Tae; Chung, Bub Dong; Kim, In Goo; Kim, Hho Jung

    1992-01-01

    The inadvertent safety injection incident occurred at Kori Unit 3 on September 6, 1990 is analyzed using RELAP5/MOD3 code. The event was initiated by a failure of main feedwater control valve in one of three steam generators. The actual sequence of plant transient with the proper estimations of the operator actions is investigated in the present calculation. The calculational results are compared with the plant transient data. It is shown that the results of the plant behaviors are in good agreement with the plant data. The emergency response guidelines is assessed for the time of the SI termination and the establishment of natural circulation. The changes in the time of the SI termination do not significantly affect the overall plant behaviors, and the natural circulation is established

  11. Lazy Mobile Intruders

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis

    We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching...... that by communication, the malicious code can learn new information that it can use in subsequent operations, or that we may have several pieces of malicious code that can exchange information if they \\meet". To formalize both the platform and the malicious code we use the mobile ambient calculus, since it provides...... a small, abstract formalism that models the essence of mobile code. We provide a decision procedure for security against arbitrary intruder ambients when the honest ambients can only perform a bounded number of steps and without path constraints in communication....

  12. Lazy Mobile Intruders

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis

    2013-01-01

    We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching...... that by communication, the malicious code can learn new information that it can use in subsequent operations, or that we may have several pieces of malicious code that can exchange information if they “meet”. To formalize both the platform and the malicious code we use the mobile ambient calculus, since it provides...... a small, abstract formalism that models the essence of mobile code. We provide a decision procedure for security against arbitrary intruder processes when the honest processes can only perform a bounded number of steps and without path constraints in communication. We show that this problem is NP-complete....

  13. Firewater system inadvertent actuation frequencies

    International Nuclear Information System (INIS)

    Schroeder, J.A.; Eide, S.A.

    1993-01-01

    This paper presents some recommended generic values for fire protection system inadvertent actuation frequencies. The frequencies are based on actual data from Department of Energy and commercial reactor plant facilities

  14. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: the ONSITE/MAXI1 computer program. Supplement No. 1

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.; Neuder, S.M.

    1986-05-01

    The document entitled Intruder Dose Pathway Analysis of the Onsite Disposal of Radioactive Wastes: The ONSITE/MAXI1 Computer Program (1984) summarizes initial efforts to develop human-intrustion scenarios and a modified version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. This document is a supplement to that document and summarizes efforts to further modify and improve the ONSITE/MAXI1 software package. To facilitate cross-referencing, it follows the same format. Notable improvements to the software package include the capability to account for shielding conditions that represent noncompacted trash wastes and the option to indicate alternative land-use condition;s. This supplement contains a description of the implementation of these modifications. In addition, a series of discussions are included in an attempt to increase the user's understanding of the scenarios and dose calculation methods. These discussions respond to frequently asked questions about the mathematical models and use of the software. Computer listings of the ONSITE/MAXI1 computer program are included as Appendices A and B of this document. Appendix C lists external exposure dose-rate factor libraries

  15. Large-scale experiments for the vulnerability analysis of buildings impacted and intruded by fluviatile torrential hazard processes

    Science.gov (United States)

    Sturm, Michael; Gems, Bernhard; Fuchs, Sven; Mazzorana, Bruno; Papathoma-Köhle, Maria; Aufleger, Markus

    2016-04-01

    In European mountain regions, losses due to torrential hazards are still considerable high despite the ongoing debate on an overall increasing or decreasing trend. Recent events in Austria severely revealed that due to technical and economic reasons, an overall protection of settlements in the alpine environment against torrential hazards is not feasible. On the side of the hazard process, events with unpredictable intensities may represent overload scenarios for existent protection structures in the torrent catchments. They bear a particular risk of significant losses in the living space. Although the importance of vulnerability is widely recognised, there is still a research gap concerning its assessment. Currently, potential losses at buildings due to torrential hazards and their comparison with reinstatement costs are determined by the use of empirical functions. Hence, relations of process intensities and the extent of losses, gathered by the analysis of historic hazard events and the information of object-specific restoration values, are used. This approach does not represent a physics-based and integral concept since relevant and often crucial processes, as the intrusion of the fluid-sediment-mixture into elements at risk, are not considered. Based on these findings, our work is targeted at extending these findings and models of present risk research in the context of an integral, more physics-based vulnerability analysis concept. Fluviatile torrential hazard processes and their impacts on the building envelope are experimentally modelled. Material intrusion processes are thereby explicitly considered. Dynamic impacts are gathered quantitatively and spatially distributed by the use of a large set of force transducers. The experimental tests are accomplished with artificial, vertical and skewed plates, including also openings for material intrusion. Further, the impacts on specific buildings within the test site of the work, the fan apex of the Schnannerbach

  16. Compensated intruder-detection systems

    Science.gov (United States)

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  17. Intruder states and low energy nuclear spectroscopy

    International Nuclear Information System (INIS)

    Bengtsson, R.

    1991-01-01

    The crucial role intruder orbitals play is not limited to low spin and small deformations. In fact much of the physics at superdeformed shapes and at very high spin is a direct result of the presence of high-j intruder orbitals in the vicinity of the Fermi surface, including the introduction of intruder orbitals from still higher shells at extreme deformations. Since the intruder subshell has a larger angular momentum (j) than any other subshell close to the Fermi surface it plays an essential role for building up angular momentum in the nucleus, and the alignment of intruder shell (quasi) particles is responsible for a large variety of bandcrossings observed in discrete spectroscopy along or near the yrast line. Intruder shell orbitals are also associated with large quadrupole moments and the occupation of these orbitals may lead to significant changes of the deformation of the nucleus. Under favorable circumstances a nucleus may have totally different shapes depending on the occupation of the intruder orbitals, giving rise to a phenomenon which is usually referred to as shape coexistence. In this paper, shape coexistence in several mass regions will be discussed with specific attention focused on the relation between shape coexistence and the occupation of intruder shell levels. Shape effects associated both with spin aligned and non-aligned intruder orbitals will be investigated

  18. Mitigating Inadvertent Insider Threats with Incentives

    Science.gov (United States)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  19. Intruder bands in Z = 51 nuclei

    International Nuclear Information System (INIS)

    LaFosse, D.R.

    1993-01-01

    Recent investigations of h 11/2 proton intruder bands in odd 51 Sb nuclei are reported. In addition to experiments performed at SUNY Stony Brook and Chalk River, data from Early Implementation of GAMMASPHERE (analysis in progress) are presented. In particular, the nuclei 109 Sb and 111 Sb are discussed. Rotational bands based on the πh 11/2 orbital coupled to a 2p2h deformed state of the 50 Sn core have been observed. These bands have been observed to high spin, and in the case of 109 Sb to a rotational frequency of 1.4 MeV, the highest frequency observed in a heavy nucleus. The dynamic moments of inertia in these bands decrease slowly with frequency, suggesting a gradual band termination. The systematics of such bands in 109-119 Sb will be discussed

  20. Intruder scenarios for site-specific waste classification

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.

    1988-01-01

    The US Department of Energy (DOE) is currently revising its low-level radioactive waste (LLW) management requirements and guidelines for waste generated at its facilities that support defense missions. Specifically, draft DOE 5820.2A, Chapter 3, describes the purpose, policy, and requirements necessary for the management of defense LLW. The draft DOE policy calls for DOE LLW operations to be managed to protect the health and safety of the public, preserve the environment, and ensure that no remedial action will be necessary after termination of operations. The requirements and guidelines apply to radioactive wastes but are also intended to apply to mixed hazardous and radioactive wastes as defined in draft DOE 5400.5, Hazardous and Radioactive Mixed Waste. The basic approach used by DOE is to establish overall performance objectives in terms of ground-water protection and public radiation dose limits and to require site-specific performance assessments to determine compliance. As a result of these performance assessments, each site shall develop waste acceptance criteria that define the allowable quantities and concentrations of specific radioisotopes. Additional limitations on waste disposal design, waste form, and waste treatment shall also be developed on a site-specific basis. As a key step in the site-specific performance assessments, an evaluation must be conducted of potential radiation doses to intruders who may inadvertently move onto a closed DOE LLW disposal site after loss of institutional controls must be conducted. This paper describes the types of intruder scenarios that should be considered when performing this step of the site-specific performance assessment

  1. Safety analysis of increase in heat removal from reactor coolant system with inadvertent operation of passive residual heat removal at no load conditions

    Energy Technology Data Exchange (ETDEWEB)

    Shao, Ge; Cao, Xuewu [School of Mechanical and Engineering, Shanghai Jiao Tong University, Shanghai (China)

    2015-06-15

    The advanced passive pressurized water reactor (PWR) is being constructed in China and the passive residual heat removal (PRHR) system was designed to remove the decay heat. During accident scenarios with increase of heat removal from the primary coolant system, the actuation of the PRHR will enhance the cooldown of the primary coolant system. There is a risk of power excursion during the cooldown of the primary coolant system. Therefore, it is necessary to analyze the thermal hydraulic behavior of the reactor coolant system (RCS) at this condition. The advanced passive PWR model, including major components in the RCS, is built by SCDAP/RELAP5 code. The thermal hydraulic behavior of the core is studied for two typical accident sequences with PRHR actuation to investigate the core cooling capability with conservative assumptions, a main steam line break (MSLB) event and inadvertent opening of a steam generator (SG) safety valve event. The results show that the core is ultimately shut down by the boric acid solution delivered by Core Makeup Tank (CMT) injections. The effects of CMT boric acid concentration and the activation delay time on accident consequences are analyzed for MSLB, which shows that there is no consequential damage to the fuel or reactor coolant system in the selected conditions.

  2. Managing Inadvertent Arterial Catheterization During Central Venous Access Procedures

    International Nuclear Information System (INIS)

    Nicholson, Tony; Ettles, Duncan; Robinson, Graham

    2004-01-01

    Purpose: Approximately 200,000 central venous catheterizations are carried out annually in the National Health Service in the United Kingdom. Inadvertent arterial puncture occurs in up to 3.7%. Significant morbidity and death has been reported. We report on our experience in the endovascular treatment of this iatrogenic complication. Methods: Retrospective analysis was carried out of 9 cases referred for endovascular treatment of inadvertent arterial puncture during central venous catheterization over a 5 year period. Results: It was not possible to obtain accurate figures on the numbers of central venous catheterizations carried out during the time period. Five patients were referred with carotid or subclavian pseudoaneurysms and hemothorax following inadvertent arterial catheter insertion and subsequent removal. These patients all underwent percutaneous balloon tamponade and/or stent-graft insertion. More recently 4 patients were referred with the catheter still in situ and were successfully treated with a percutaneous closure device. Conclusion: If inadvertent arterial catheterization during central venous access procedures is recognized and catheters removed, sequelae can be treated percutaneously. However, once the complication is recognized it is better to leave the catheter in situ and seal the artery percutaneously with a closure device

  3. Human intruder dose assessment for deep geological disposal

    International Nuclear Information System (INIS)

    Smith, G. M.; Molinero, J.; Delos, A.; Valls, A.; Conesa, A.; Smith, K.; Hjerpe, T.

    2013-07-01

    For near-surface disposal, approaches to assessment of inadvertent human intrusion have been developed through international cooperation within the IAEA's ISAM programme. Other assessments have considered intrusion into deep geological disposal facilities, but comparable international cooperation to develop an approach for deep disposal has not taken place. Accordingly, the BIOPROTA collaboration project presented here (1) examined the technical aspects of why and how deep geological intrusion might occur; (2) considered how and to what degree radiation exposure would arise to the people involved in such intrusion; (3) identified the processes which constrain the uncertainties; and hence (4) developed and documented an approach for evaluation of human intruder doses which addresses the criteria adopted by the IAEA and takes account of other international guidance and human intrusion assessment experience. Models for radiation exposure of the drilling workers and geologists were developed and described together with compilation of relevant input data, taking into account relevant combinations of drilling technique, geological formation and repository material. Consideration has been given also to others who might be exposed to contaminated material left at the site after drilling work has ceased. The models have been designed to be simple and stylised, in accordance with international recommendations. The set of combinations comprises 58 different scenarios which cover a very wide range of human intrusion possibilities via deep drilling. (orig.)

  4. The adverse effects of inadvertent intraoperative intravenous ...

    African Journals Online (AJOL)

    Inadvertent intravenous injection of 1% phenylephrine (10 mg) induced severe hypertension and tachycardia in a previously healthy female patient undergoing elective gynaecological surgery. This medical error was investigated using the criticalincident technique that is available in our department. This case report ...

  5. Detection of Intelligent Intruders in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yun Wang

    2016-01-01

    Full Text Available Most of the existing research works on the intrusion detection problem in a wireless sensor network (WSN assume linear or random mobility patterns in abstracting intruders’ models in traversing the WSN field. However, in real-life WSN applications, an intruder is usually an intelligent mobile robot with environment learning and detection avoidance capability (i.e., the capability to avoid surrounding sensors. Due to this, the literature results based on the linear or random mobility models may not be applied to the real-life WSN design and deployment for efficient and effective intrusion detection in practice. This motivates us to investigate the impact of intruder’s intelligence on the intrusion detection problem in a WSN for various applications. To be specific, we propose two intrusion algorithms, the pinball and flood-fill algorithms, to mimic the intelligent motion and behaviors of a mobile intruder in detecting and circumventing nearby sensors for detection avoidance while heading for its destination. The two proposed algorithms are integrated into a WSN framework for intrusion detection analysis in various circumstances. Monte Carlo simulations are conducted, and the results indicate that: (1 the performance of a WSN drastically changes as a result of the intruder’s intelligence in avoiding sensor detections and intrusion algorithms; (2 network parameters, including node density, sensing range and communication range, play a crucial part in the effectiveness of the intruder’s intrusion algorithms; and (3 it is imperative to integrate intruder’s intelligence in the WSN research for intruder detection problems under various application circumstances.

  6. Inadvertent P-hacking among trials and systematic reviews of the effect of progestogens in pregnancy? A systematic review and meta-analysis.

    Science.gov (United States)

    Prior, M; Hibberd, R; Asemota, N; Thornton, J G

    2017-06-01

    Progestogens have been evaluated in numerous trials and meta-analyses, many of which concluded they were effective. However, two large trials PROMISE and OPPTIMUM have recently concluded that progesterone was ineffective. This raises the possibility that earlier studies and reviews had been biased by either selective publication or selective choice of outcomes, so called "P-hacking". To compare the findings all progestogen trials and systematic reviews with those of trials with pre-registered primary outcomes which avoided selective outcome reporting. Search of PubMed, the Cochrane Library and trial registries. Registration PROSPERO CRD42016035303. Systematic reviews of randomised trials comparing progestogen with placebo in pregnancy and the individual trials included in those reviews. The subset of trials reporting a pre-registered primary outcome were compared with the totality of trials and reviews. For reviews all outcomes were included. For individual trials all outcomes reported in the systematic reviews were included. For the comparison group we recorded the registered primary outcome from trials that were either registered before they started, or registered during the recruitment phase and also double blind. Nineteen of twenty-nine meta-analyses concluded that progestogens were effective. Twenty-two trials reported their pre-registered primary outcomes. There was no effect of progesterone on primary registered dichotomous outcome RR 1.00 (95% CI 0.94-1.07). Only one of the 22 showed a nominally statistically significant benefit. When evaluated in registered double-blind trials with analysis restricted to predefined primary outcomes, progestational agents in pregnancy are ineffective. Progestogens to prevent pregnancy loss, an example of P-hacking. © 2017 Royal College of Obstetricians and Gynaecologists.

  7. Interventions for treating inadvertent postoperative hypothermia.

    Science.gov (United States)

    Warttig, Sheryl; Alderson, Phil; Campbell, Gillian; Smith, Andrew F

    2014-11-20

    Inadvertent postoperative hypothermia (a drop in core body temperature to below 36°C) occurs as an effect of surgery when anaesthetic drugs and exposure of the skin for long periods of time during surgery result in interference with normal temperature regulation. Once hypothermia has occurred, it is important that patients are rewarmed promptly to minimise potential complications. Several different interventions are available for rewarming patients. To estimate the effectiveness of treating inadvertent perioperative hypothermia through postoperative interventions to decrease heat loss and apply passive and active warming systems in adult patients who have undergone surgery. We searched the Cochrane Central Register of Controlled Trials (CENTRAL) (2014, Issue 2), MEDLINE (Ovid SP) (1956 to 21 February 2014), EMBASE (Ovid SP) (1982 to 21 February 2014), the Institute for Scientific Information (ISI) Web of Science (1950 to 21 February 2014) and the Cumulative Index to Nursing and Allied Health Literature (CINAHL), EBSCO host (1980 to 21 February 2014), as well as reference lists of articles. We also searched www.controlled-trials.com and www.clincialtrials.gov. Randomized controlled trials of postoperative warming interventions aiming to reverse hypothermia compared with control or with each other. Three review authors identified studies for inclusion in this review. One review author extracted data and completed risk of bias assessments; two review authors checked the details. Meta-analysis was conducted when appropriate by using standard methodological procedures as expected by The Cochrane Collaboration. We included 11 trials with 699 participants. Ten trials provided data for analysis. Trials varied in the numbers and types of participants included and in the types of surgery performed. Most trials were at high or unclear risk of bias because of inappropriate or unclear randomization procedures, and because blinding of assessors and participants generally was

  8. Localization Capability of Cooperative Anti-Intruder Radar Systems

    Directory of Open Access Journals (Sweden)

    Mauro Montanari

    2008-06-01

    Full Text Available System aspects of an anti-intruder multistatic radar based on impulse radio ultrawideband (UWB technology are addressed. The investigated system is composed of one transmitting node and at least three receiving nodes, positioned in the surveillance area with the aim of detecting and locating a human intruder (target that moves inside the area. Such systems, referred to also as UWB radar sensor networks, must satisfy severe power constraints worldwide imposed by, for example, the Federal Communications Commission (FCC and by the European Commission (EC power spectral density masks. A single transmitter-receiver pair (bistatic radar is considered at first. Given the available transmitted power and the capability of the receiving node to resolve the UWB pulses in the time domain, the surveillance area regions where the target is detectable, and those where it is not, are obtained. Moreover, the range estimation error for the transmitter-receiver pair is discussed. By employing this analysis, a multistatic system is then considered, composed of one transmitter and three or four cooperating receivers. For this multistatic system, the impact of the nodes location on area coverage, necessary transmitted power and localization uncertainty is studied, assuming a circular surveillance area. It is highlighted how area coverage and transmitted power, on one side, and localization uncertainty, on the other side, require opposite criteria of nodes placement. Consequently, the need for a system compromising between these factors is shown. Finally, a simple and effective criterion for placing the transmitter and the receivers is drawn.

  9. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    Energy Technology Data Exchange (ETDEWEB)

    Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

  10. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Trauth, K.M.; Hora, S.C.; Guzowski, R.V.

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation

  11. Friction force regimes and the conditions for endless penetration of an intruder into a granular medium.

    Science.gov (United States)

    López-Rodríguez, L A; Pacheco-Vázquez, F

    2017-09-01

    An intruder penetrating into a granular column experiences a depth-dependent friction force F(z). Different regimes of F(z) have been measured depending on the experimental design: a nearly linear dependence for shallow penetrations, total saturation at large depths, and an exponential increase when the intruder approaches the bottom of the granular bed. We report here an experiment that allows us to measure the different regimes in a single run during the quasistatic descent of a sphere in a light granular medium. From the analysis of the resistance in the saturation zone, it was found that F(z) follows a cube-power-law dependence on the intruder diameter and an exponential increase with the packing fraction of the bed. Moreover, we determine the critical mass m_{c} required to observe infinite penetration and its dependence on the above parameters. Finally, we use our results to estimate the final penetration depth reached by intruders of masses mintruder of any density (larger than the density of the granular bed) can sink indefinitely into the granular medium if the bed packing fraction is smaller than a critical value.

  12. Intruder level and deformation in SD-pair shell model

    International Nuclear Information System (INIS)

    Luo Yan'an; Ning Pingzhi; Pan Feng

    2004-01-01

    The influence of intruder level on nuclear deformation is studied within the framework of the nucleon-pair shell model truncated to an SD-pair subspace. The results suggest that the intruder level has a tendency to reduce the deformation and plays an important role in determining the onset of rotational behavior. (authors)

  13. The behaviour of free-flowing granular intruders

    Directory of Open Access Journals (Sweden)

    Wyburn Edward

    2017-01-01

    Full Text Available Particle shape affects both the quasi-static and dynamic behaviour of granular media. There has been significant research devoted to the flowability of systems of irregularly shaped particles, as well as the flow of grains around fixed intruders, however the behaviour of free flowing intruders within granular flows remains comparatively unexplored. Here, the effect of the shape of these intruder particles is studied, looking at the kinematic behaviour of the intruders and in particular their tendency of orientation. Experiments are carried out within the Stadium Shear Device, which is a novel apparatus able to continuously apply simple shear conditions to two-dimensional grain analogues. It is found that the intruder shows different behaviour to that of the bulk flow, and that this behaviour is strongly shape dependent. These insights could lead to the development of admixtures that alter the flowability of granular materials.

  14. Study of intruder band in 112Sn

    International Nuclear Information System (INIS)

    Ganguly, S.; Banerjee, P.; Ray, I.; Kshetri, R.; Raut, R.; Bhattacharya, S.; Saha-Sarkar, M.; Goswami, A.; Mukhopadhyay, S.; Mukherjee, A.; Mukherjee, G.; Basu, S.K.

    2007-01-01

    Excited states of the positive-parity intruder band in 112 Sn, populated in the 100 Mo( 20 Ne,α4n) reaction at a beam energy of 136 MeV, have been studied. The band has been observed up to 11570.0 keV with spin (24 + ). Mean lifetimes have been measured for six states up to the 22 + , 10335.1 keV level and an upper limit of the lifetime has been estimated for the 11570.0 keV (24 + ) state. The B(E2) values, derived from the present lifetime results, correspond to a moderate quadrupole deformation of β 2 ∼0.18 for states with spin J π >=12 + , and the decrease in B(E2) for the 14 + ->12 + transition is consistent with a ν(h 11/2 ) 2 alignment at ω∼0.35 MeV, predicted by a cranked shell-model calculation. Total Routhian surface calculations predict a triaxial shape following the alignment

  15. On the submerging of a spherical intruder into granular beds

    Directory of Open Access Journals (Sweden)

    Wu Chuan-Yu

    2017-01-01

    Full Text Available Granular materials are complex systems and their mechanical behaviours are determined by the material properties of individual particles, the interaction between particles and the surrounding media, which are still incompletely understood. Using an advanced discrete element method (DEM, we simulate the submerging process of a spherical projectile (an intruder into granular materials of various properties with a zero penetration velocity (i.e. the intruder is touching the top surface of the granular bed and released from stationary and examine its settling behaviour. By systematically changing the density and size of the intruder and the particle density (i.e. the density of the particles in the granular bed, we find that the intruder can sink deep into the granular bed even with a zero penetration velocity. Furthermore, we confirm that under certain conditions the granular bed can behave like a Newtonian liquid and the submerging intruder can reach a constant velocity, i.e. the terminal velocity, identical to the settling of a sphere in a liquid, as observed experimentally. A mathematical model is also developed to predict the maximum penetration depth of the intruder. The model predictions are compared with experimental data reported in the literature,good agreement was obtained, demonstrating the model can accurately predict the submerging behaviour of the intruder in the granular media.

  16. Inadvertent pump start with gas expansion modules

    International Nuclear Information System (INIS)

    Campbell, L.R.; Harris, R.A.; Heard, F.J.; Dautel, W.A.

    1992-01-01

    Previous testing demonstrated the effectiveness of gas expansion modules (GEMs) in mitigating the consequences of a loss-of-flow-without-scram transient in Fast Flux Test Facility (FFTF)-sized sodium cooled cores. As a result, GEMs have been included in the advance liquid-metal reactor (PRISM) design project sponsored by the US Department of Energy. The PRISM design is under review at the US Nuclear Regulatory Commission for licensability. In the unlikely event that the reactor does not scram during a loss of low, the GEMs quickly insert sufficient negative reactivity to limit fuel and cladding temperatures to acceptable values. This is the positive benefit of the GEMs; however, the reverse situation must be considered. A primary pump could be inadvertently started from near-critical conditions resulting in a positive reactivity insertion and a power transient. One mitigating aspect of this event is that as the reactivity associated with the GEMs is inserted, the increasing flow increases core cooling. A test was conducted in the FFTF to demonstrate that the GEM and feedback reactivity are well predicted following pump start, and the reactivity transient is benign

  17. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  18. Description of intruded states in a weak-coupling basis

    International Nuclear Information System (INIS)

    Arenas Peris, G.E.

    1989-01-01

    The systematics of intruder states is described in terms of a particle-hole weak-coupling basis, the first-order correction being then reduced to the monopole component of the interaction. The necessary matrix elements can be obtained from experimental data by using a model-consistent method. Calculations are performed for intruder states in the lead region as well as for the Zr isotopes. The agreement with the experimental data is striking in both cases. (Author) [es

  19. Optimizing the Configuration of Sensor Networks to Detect Intruders.

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Nathanael J. K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nozick, Linda Karen [Cornell Univ., Ithaca, NY (United States); Xu, Ningxiong [Cornell Univ., Ithaca, NY (United States)

    2015-03-01

    This paper focuses on optimizing the selection and configuration of detection technologies to protect a target of interest. The ability of an intruder to simply reach the target is assumed to be sufficient to consider the security system a failure. To address this problem, we develop a game theoretic model of the strategic interactions between the system owner and a knowledgeable intruder. A decomposition-based exact method is used to solve the resultant model.

  20. Intruder states at the N=20 shell closure

    International Nuclear Information System (INIS)

    Heyde, K.

    1991-01-01

    It is indicated that mp-mh (multiple) excitations across closed shells can occur at low energy throughout the nuclear mass region. Besides the 4p-4h, 8p-8h configurations, that are deformed, coexisting low-lying excitations are mainly observed for light N=Z nuclei. A new class of 2p-2h intruder O + state is shown to exist in nuclei where a neutron excess is present. In the latter cases, the proton-neutron interaction energy between the excited 2p-2h configuration and the open shell accounts for a very specific mass dependence in the intruder excitation energy. The experimental evidence that corroborates the idea of intruder states will be given. (G.P.) 28 refs.; 13 figs

  1. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  2. The Star Wars Kid and the Bedroom Intruder

    DEFF Research Database (Denmark)

    Christensen, Jørgen Riber

    2011-01-01

    Jørgen Riber Christensen's article Star Wars Kid and the Bedroom Intruder looks at how people may unexpectedly become icons of the Internet, through a transgression of the private sphere. Surveillance and celebrity is revealed to be bound together with a disciplinary effect, at the same time...

  3. Inadvertent presence of genetically modified elements in maize food ...

    African Journals Online (AJOL)

    Kenya has a biosafety law and has tested genetically modified (GM) maize under confinement and containment, but has neither released nor commercialized any GM crop. This study assessed various maize food products from the Kenyan farms and markets for the inadvertent presence of GMOs. It assessed the possibility ...

  4. Preventing Inadvertent Placement of Foley Catheter into Prostatic ...

    African Journals Online (AJOL)

    Percutaneous suprapubic trocar cystostomy (SPC) is often needed to drain the bladder when urethral catheterization either fails or is not advisable.[1] It is ... vertical or slightly tilting its tip toward umbilicus during foley placement, prevents the inadvertent migration of catheter into prostatic urethra and further complications.

  5. Low Cost Night Vision System for Intruder Detection

    Science.gov (United States)

    Ng, Liang S.; Yusoff, Wan Azhar Wan; R, Dhinesh; Sak, J. S.

    2016-02-01

    The growth in production of Android devices has resulted in greater functionalities as well as lower costs. This has made previously more expensive systems such as night vision affordable for more businesses and end users. We designed and implemented robust and low cost night vision systems based on red-green-blue (RGB) colour histogram for a static camera as well as a camera on an unmanned aerial vehicle (UAV), using OpenCV library on Intel compatible notebook computers, running Ubuntu Linux operating system, with less than 8GB of RAM. They were tested against human intruders under low light conditions (indoor, outdoor, night time) and were shown to have successfully detected the intruders.

  6. Reorganization of intruder Using Ad-Hoc Network And RFID

    Directory of Open Access Journals (Sweden)

    Vishakha Hagawane

    2014-05-01

    Full Text Available This system is to develop a centralized computer application that needs to identify moving person in a specific area using wireless network. In this paper, we develop a new indoor tracking algorithm using received signal strength. The RFID is able to detect the humans and provide information about the direction of the movement. The gathered information from the node is to be given to the base station for processing. . This application is able to detect and track person, and report direction of the intruder to a central base station. In this system we design nodes through which we are able to track the person. The human intruder is detected using Zigbee.

  7. Sexual aggression by intruders in hooded crow Corvus cornix

    OpenAIRE

    Zduniak, Piotr; Kosicki, Jakub Z.; Yosef, Reuven

    2015-01-01

    The hooded crow Corvus cornix is a west Palaearctic, solitary nesting, monogamous corvid. In the breeding season, populations are characterized by a social organization wherein breeding pairs are territorial and non-breeding individuals, called floaters, live in flocks. During a study of the breeding ecology of the hooded crow, conducted in a protected flooded area, we monitored nests with video cameras. We recorded two separate incidents when intruders attacked a female at the nest. We belie...

  8. Design and Implementation of an Embedded Smart Intruder Surveillance System

    Directory of Open Access Journals (Sweden)

    Sabri Naseer

    2018-01-01

    Full Text Available Remote and scattered valuable and sensitive locations such as labs and offices inside university campus need efficient monitoring and warning system. As well as scattered area and belonging. This research presents a Real-Time intruder Surveillance System based on a single board computer (SBC. Thus the design and development of a cost effective surveillance management system based SBC that can be deployed efficiently in remote and scattered locations such as universities belonging. The fusion of embedded Python codes with SBC that attached to cameras, Long distance sensors, alerting circuitry and wireless module presents a novel integration based effective cost solution and enhances SBC of much flexibility of improvement and development for pervasive remote locations. The system proves the high integrity of smooth working with web application, it’s cost effective and thus can be deployed as many of units to seize and concisely covered remote and scattered area as well as university belonging and departments. The system can be administrated by a remote user sparsely or geographically away from any networked workstation. The proposed solution offers efficient stand alone, flexibility to upgrade and cheap development and installation as well as cost effective ubiquitous surveillance solution. In conclusion, the system acceptable boundaries of successful intruder recognition and warning alert are computed between 1m and 3m distance of intruder from system camera. Recognition rate of 95% and 83% are achieved and the successful warning alert were in the range of 86-97%.

  9. Intentional and inadvertent non-adherence in adult coeliac disease. A cross-sectional survey.

    Science.gov (United States)

    Hall, Nicola J; Rubin, Gregory P; Charnock, Anne

    2013-09-01

    Adherence to a gluten-free diet is the mainstay of treatment for coeliac disease. Non-adherence is common as the diet is restrictive and can be difficult to follow. This study aimed to determine the rates of intentional and inadvertent non-adherence in adult coeliac disease and to examine the factors associated with both. A self-completion questionnaire was mailed to adult coeliac patients identified from the computer records of 31 family practices within the North East of England. We received 287 responses after one reminder. Intentional gluten consumption was reported by 115 (40%) of respondents. 155 (54%) had made at least one known mistaken lapse over the same period and 82 (29%) reported neither intentional nor mistaken gluten consumption. Using logistic regression analysis, low self-efficacy, perceptions of tolerance to gluten and intention were found to be independently predictive of intentional gluten consumption. A statistical model predicted 71.8% of cases reporting intentional lapses. Intentional non-adherence to the GFD was found to be common but not as frequent as inadvertent lapses. Distinguishing the factors influencing both intentional and inadvertent non-adherence is useful in understanding dietary self-management in coeliac disease. Copyright © 2013 Elsevier Ltd. All rights reserved.

  10. Closure Using a Surgical Closure Device of Inadvertent Subclavian Artery Punctures During Central Venous Catheter Placement

    International Nuclear Information System (INIS)

    Berlet, Matthew H.; Steffen, Diana; Shaughness, George; Hanner, James

    2001-01-01

    Severe complications can and do occur when central venous catheters are inadvertently placed into subclavian arteries. Two cases are discussed that describe how these inadvertent arterial punctures can be closed using the Perclose device (Abbott Laboratories, Redwood City, CA, USA)

  11. Probability of inadvertent operation of electrical components in harsh environments

    International Nuclear Information System (INIS)

    Knoll, A.

    1989-01-01

    Harsh environment, which means humidity and high temperature, may and will affect unsealed electrical components by causing leakage ground currents in ungrounded direct current systems. The concern in a nuclear power plant is that such harsh environment conditions could cause inadvertent operation of normally deenergized components, which may have a safety-related isolation function. Harsh environment is a common cause failure, and one way to approach the problem is to assume that all the unsealed electrical components will simultaneously and inadvertently energize as a result of the environmental common cause failure. This assumption is unrealistically conservative. Test results indicated that insulating resistences of any terminal block in harsh environments have a random distribution in the range of 1 to 270 kΩ, with a mean value ∼59 kΩ. The objective of this paper is to evaluate a realistic conditional failure probability for inadvertent operation of electrical components in harsh environments. This value will be used thereafter in probabilistic safety evaluations of harsh environment events and will replace both the overconservative common cause probability of 1 and the random failure probability used for mild environments

  12. Oblate deformation and intruder configuration in 194,195Bi

    International Nuclear Information System (INIS)

    Mukherjee, G.; Banerjee, K.; Banerjee, S.R.; Basu, S.K.; Bhattacharya, C.; Bhattacharya, S.; Bhattacharya, Srijit; Bhattacharjee, T.; Chanda, S.; Dey, A.; Gupta, D.; Meena, J.K.; Mukhopadhyay, S.; Rana, T.K.; Bhattacharya, Sudeb; Ganguly, S.; Goswami, A.; Kshetri, R.; Pradhan, M.K.; Raut, R.; Dey, G.

    2006-01-01

    The experimental information on 194,195 Bi are very scarce compared to its neighbouring isotopes. Only 6 levels above the ground state band of 195 Bi, based on 9/2, are known with tentative spin parity assignments. Only two low energy gamma rays above the 10 isomeric state are known in 194 Bi. It is interesting not only to extend the presently known bands to higher spins, beyond band crossing but also to search for the intruder quasiparticle configurations to get a clear idea about the structure of these nuclei

  13. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Science.gov (United States)

    Sequeira, Ana F.; Cardoso, Jaime S.

    2015-01-01

    Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system. PMID:26102491

  14. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Directory of Open Access Journals (Sweden)

    Ana F. Sequeira

    2015-06-01

    Full Text Available Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.

  15. Sexual aggression by intruders in hooded crow Corvus cornix.

    Science.gov (United States)

    Zduniak, Piotr; Kosicki, Jakub Z; Yosef, Reuven

    The hooded crow Corvus cornix is a west Palaearctic, solitary nesting, monogamous corvid. In the breeding season, populations are characterized by a social organization wherein breeding pairs are territorial and non-breeding individuals, called floaters, live in flocks. During a study of the breeding ecology of the hooded crow, conducted in a protected flooded area, we monitored nests with video cameras. We recorded two separate incidents when intruders attacked a female at the nest. We believe that she remained in the nest in order to prevent the strangers cannibalizing the nestlings by mantling over the brood. The spatio-temporal occurrence of these attacks suggests that the observed behaviour is intraspecific sexual aggression wherein non-breeding males mounted an immobilized female.

  16. Energy-efficient area coverage for intruder detection in sensor networks

    CERN Document Server

    He, Shibo; Li, Junkun

    2014-01-01

    This Springer Brief presents recent research results on area coverage for intruder detection from an energy-efficient perspective. These results cover a variety of topics, including environmental surveillance and security monitoring. The authors also provide the background and range of applications for area coverage and elaborate on system models such as the formal definition of area coverage and sensing models. Several chapters focus on energy-efficient intruder detection and intruder trapping under the well-known binary sensing model, along with intruder trapping under the probabilistic sens

  17. Intelligent Machine Vision for Automated Fence Intruder Detection Using Self-organizing Map

    Directory of Open Access Journals (Sweden)

    Veldin A. Talorete Jr.

    2017-03-01

    Full Text Available This paper presents an intelligent machine vision for automated fence intruder detection. A series of still captured images that contain fence events using Internet Protocol cameras was used as input data to the system. Two classifiers were used; the first is to classify human posture and the second one will classify intruder location. The system classifiers were implemented using Self-Organizing Map after the implementation of several image segmentation processes. The human posture classifier is in charge of classifying the detected subject’s posture patterns from subject’s silhouette. Moreover, the Intruder Localization Classifier is in charge of classifying the detected pattern’s location classifier will estimate the location of the intruder with respect to the fence using geometric feature from images as inputs. The system is capable of activating the alarm, display the actual image and depict the location of the intruder when an intruder is detected. In detecting intruder posture, the system’s success rate of 88%. Overall system accuracy for day-time intruder localization is 83% and an accuracy of 88% for night-time intruder localization

  18. Evaluation of SPACE code for simulation of inadvertent opening of spray valve in Shin Kori unit 1

    International Nuclear Information System (INIS)

    Kim, Seyun; Youn, Bumsoo

    2013-01-01

    SPACE code is expected to be applied to the safety analysis for LOCA (Loss of Coolant Accident) and Non-LOCA scenarios. SPACE code solves two-fluid, three-field governing equations and programmed with C++ computer language using object-oriented concepts. To evaluate the analysis capability for the transient phenomena in the actual nuclear power plant, an inadvertent opening of spray valve in startup test phase of Shin Kori unit 1 was simulated with SPACE code. To evaluate the analysis capability for the transient phenomena in the actual nuclear power plant, an inadvertent opening of spray valve in startup test phase of Shin Kori unit 1 was simulated with SPACE code

  19. Long-term captures of low-mass intruders by binary stars

    International Nuclear Information System (INIS)

    Hills, J.G.

    1983-01-01

    Intensive computer simulations were made of three families of encounters between a binary star and a low-mass intruder which previous work indicated have a high probability of producing long-lived triple-star systems. For comparison, a fourth family which produces few long-lived trinaries was also studied. In the first two families, the binary components are equally massive and the closest approach of the intruder to the center of mass of the binary is about two times its semimajor axis, a 0 . In Family 1, the orbit of the original binary is circular, e = 0, while in Family 2, e 0 = 0.95. In Family 3 one binary component is 100 times as massive as the other, the orbit is circular, and the low-mass intruder enters the binary at nearly zero impact parameter. The probability that the intruder is trapped for at least one revolution around the binary is 0.24, 0.46, and 0.51, respectively, for these three families of encounters. The fraction of the intruders surviving successive revolutions drops rapidly. However, one encounter in Family 1 and two in Family 3 resulted in the intruder making more than 300 revolutions around the inner binary before escaping. Some intruders remained bound for more than 20 000 revolutions of the inner binary. The longest duration captures occur when the intruder is thrown into an orbit with a very large semimajor axis. About 20% of the encounters in the three families result in the intruder being thrown into an orbit with a semimajor axis a>100 a 0 , while about 2% result in the intruder going into an orbit with a>1000 a 0 . Intruders thrown into these large semimajor axis orbits have the best chance of having their orbits stabilized by passing stars

  20. Expert judgement on inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Hora, S.C.; von Winterfeldt, D.; Trauth, K.M.

    1991-12-01

    Four expert-judgment teams have developed analyses delineating possible future societies in the next 10,000 years in the vicinity of the Waste Isolation Pilot Plant (WIPP). Expert-judgment analysis was used to address the question of future societies because neither experimentation, observation, nor modeling can resolve such uncertainties. Each of the four, four-member teams, comprised of individuals with expertise in the physical, social, or political sciences, developed detailed qualitative assessments of possible future societies. These assessments include detailed discussions of the underlying physical and societal factors that would influence society and the likely modes of human-intrusion at the WIPP, as well as the probabilities of intrusion. Technological development, population growth, economic development, conservation of information, persistence of government control, and mitigation of danger from nuclear waste were the factors the teams believed to be most important. Likely modes of human-intrusion were categorized as excavation, disposal/storage, tunneling, drilling, and offsite activities. Each team also developed quantitative assessments by providing probabilities of various alternative futures, of inadvertent human intrusion, and in some cases, of particular modes of intrusion. The information created throughout this study will be used in conjunction with other types of information, including experimental data, calculations from physical principles and computer models, and perhaps other judgments, as input to ''performance assessment.'' The more qualitative results of this study will be used as input to another expert panel considering markers to deter inadvertent human intrusion at the WIPP

  1. Study of intruder band in {sup 112}Sn

    Energy Technology Data Exchange (ETDEWEB)

    Ganguly, S. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Banerjee, P. [Saha Institute of Nuclear Physics, Kolkata 700064 (India)]. E-mail: polash.banerjee@saha.ac.in; Ray, I. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Kshetri, R. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Raut, R. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Bhattacharya, S. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Saha-Sarkar, M. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Goswami, A. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Mukhopadhyay, S. [UGC-DAE-CSR, Kolkata 700098 (India); Mukherjee, A. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Mukherjee, G. [Variable Energy Cyclotron Centre, Kolkata 700064 (India); Basu, S.K. [Variable Energy Cyclotron Centre, Kolkata 700064 (India)

    2007-06-01

    Excited states of the positive-parity intruder band in {sup 112}Sn, populated in the {sup 100}Mo({sup 20}Ne,{alpha}4n) reaction at a beam energy of 136 MeV, have been studied. The band has been observed up to 11570.0 keV with spin (24{sup +}). Mean lifetimes have been measured for six states up to the 22{sup +}, 10335.1 keV level and an upper limit of the lifetime has been estimated for the 11570.0 keV (24{sup +}) state. The B(E2) values, derived from the present lifetime results, correspond to a moderate quadrupole deformation of {beta}{sub 2}{approx}0.18 for states with spin J{sup {pi}}>=12{sup +}, and the decrease in B(E2) for the 14{sup +}->12{sup +} transition is consistent with a {nu}(h{sub 11/2}){sup 2} alignment at {omega}{approx}0.35 MeV, predicted by a cranked shell-model calculation. Total Routhian surface calculations predict a triaxial shape following the alignment.

  2. Evaluation of periodontal condition in intruded molars using miniscrews

    Directory of Open Access Journals (Sweden)

    Habib Ollah Ghanbari

    2015-12-01

    Full Text Available Introduction: The purpose of this preliminary study was to evaluate the periodontal condition of intruded molars in various phases of treatments. Methods: 30 patients with at least one overerupted upper first molar were selected. Upper molar bands with brackets were cemented. Two miniscrews were placed in the mesiopalatal and mesiobuccal aspect of the aforementioned teeth. A titanium molybdenum alloy (TMA spring was attached to the head of miniscrew in one end and ligated to the bracket in the other end to reach the predetermined force. Plaque index (PI, probing pocket depth (PPD, keratinized gingiva (KG, The distance between miniscrew (M.S and gingival level (GL, and bleeding on probing (BOP were recorded before loading and 1, 2, 3, 4 and 5 months post-loading .Results:  All patients completed the study and no complications were reported. Statistically significant intrusion (2.1 ± 0.9 mm was obtained during active treatment. Inserting miniscrews generally was presented with greater sulcus bleeding, plaque accumulation and plaque formation at follow-up visits. There was a statistically significant increase in PI, PPD and BOP indices. Furthermore, the results showed decrease in KG level and M.S to GL level. Conclusion: Miniscrews can provide a clinical benefit as an absolute anchorage device. However, keeping a good oral hygiene is essential to achieve ideal results, because the presence of miniscrews, as a foreign object in mouth, and intrusion force might be harmful for periodontal tissues

  3. Neonicotinoid insecticides can serve as inadvertent insect contraceptives

    Science.gov (United States)

    Villamar-Bouza, Laura; Bruckner, Selina; Chantawannakul, Panuwan; Gauthier, Laurent; Khongphinitbunjong, Kitiphong; Retschnig, Gina; Troxler, Aline; Vidondo, Beatriz; Neumann, Peter; Williams, Geoffrey R.

    2016-01-01

    There is clear evidence for sublethal effects of neonicotinoid insecticides on non-target ecosystem service-providing insects. However, their possible impact on male insect reproduction is currently unknown, despite the key role of sex. Here, we show that two neonicotinoids (4.5 ppb thiamethoxam and 1.5 ppb clothianidin) significantly reduce the reproductive capacity of male honeybees (drones), Apis mellifera. Drones were obtained from colonies exposed to the neonicotinoid insecticides or controls, and subsequently maintained in laboratory cages until they reached sexual maturity. While no significant effects were observed for male teneral (newly emerged adult) body mass and sperm quantity, the data clearly showed reduced drone lifespan, as well as reduced sperm viability (percentage living versus dead) and living sperm quantity by 39%. Our results demonstrate for the first time that neonicotinoid insecticides can negatively affect male insect reproductive capacity, and provide a possible mechanistic explanation for managed honeybee queen failure and wild insect pollinator decline. The widespread prophylactic use of neonicotinoids may have previously overlooked inadvertent contraceptive effects on non-target insects, thereby limiting conservation efforts. PMID:27466446

  4. Optimal Randomized Surveillance Patterns to Detect Intruders Approaching a Military Installation

    National Research Council Canada - National Science Library

    McLemore, Trevor D

    2007-01-01

    .... The intruder attempts to penetrate the military installation by choosing one of its many entry points, each of which is monitored by a surveillance camera and may require a different amount of time to transit...

  5. Towards a shell-model description of intruder states and the onset of deformation

    International Nuclear Information System (INIS)

    Heyde, K.; Van Isacker, P.; Casten, R.F.; Wood, J.L.

    1985-01-01

    Basing on the nuclear shell-model and concentrating on the monopole, pairing and quadrupole corrections originating from the nucleon-nucleon force, both the appearance of low-lying 0 + intruder states near major closed shells (Z = 50, 82) and sub-shell regions (Z = 40, 64) can be described. Moreover, a number of new facets related to the study of intruder states are presented. 19 refs., 3 figs

  6. Deformed intruders and the onset of deformation at N=20 far from stability

    International Nuclear Information System (INIS)

    Poves, A.; Retamosa, J.

    1991-01-01

    Intruder states, built up of 2p-2h excitations are shown to exhibit rotational features. The combined effects of the reduction of the energy gap between major shells occurring far from stability, and the correlation energy of the valence nucleons, make the intruders dominant in the low energy spectrum of several nuclei. Many experimental puzzles may be solved in this way. (G.P.) 17 refs.; 10 figs

  7. Intelligent Machine Vision for Automated Fence Intruder Detection Using Self-organizing Map

    OpenAIRE

    Veldin A. Talorete Jr.; Sherwin A Guirnaldo

    2017-01-01

    This paper presents an intelligent machine vision for automated fence intruder detection. A series of still captured images that contain fence events using Internet Protocol cameras was used as input data to the system. Two classifiers were used; the first is to classify human posture and the second one will classify intruder location. The system classifiers were implemented using Self-Organizing Map after the implementation of several image segmentation processes. The human posture classifie...

  8. Inadvertent weather modification urban areas - lessons for global climate change

    Energy Technology Data Exchange (ETDEWEB)

    Changnon, S A [Illinois State Water Survey, Champaign, IL (USA)

    1992-05-01

    Large metropolitan areas in North America, home to 65% of the USA's population, have created major changes in their climates over the past 150 years. The rate and amount of the urban climate change approximate those being predicted globally using climate models. Knowledge of urban weather and climate modification holds lessons for the global climate change issue. First, adjustments to urban climate changes can provide guidance for adjusting to global change. A second lesson relates to the difficulty but underscores the necessity of providing scientifically credible proof of change within the noise of natural climatic variability. The evolution of understanding about how urban conditions influence weather reveals several unexpected outcomes, particularly relating to precipitation changes. These suggest that similar future surprises can be expected in a changed global climate, a third lesson. In-depth studies of how urban climate changes affected the hydrologic cycle, the regional economy, and human activities were difficult because of data problems, lack of impact methodology, and necessity for multidisciplinary investigations. Similar impact studies for global climate change will require diverse scientific talents and funding commitments adequate to measure the complexity of impacts and human adjustments. Understanding the processes whereby urban areas and other human activities have altered the atmosphere and changed clouds and precipitation regionally appears highly relevant to the global climate-change issue. Scientific and governmental policy development needs to recognize an old axiom that became evident in the studies of inadvertent urban and regional climate change and their behavioural implications: Think globally but act locally. Global climate change is an international issue, and the atmosphere must be treated globally. But the impacts and the will to act and adjust will occur regionally.

  9. Inadvertent weather modification urban areas - lessons for global climate change

    International Nuclear Information System (INIS)

    Changnon, S.A.

    1992-01-01

    Large metropolitan areas in North America, home to 65% of the USA's population, have created major changes in their climates over the past 150 years. The rate and amount of the urban climate change approximate those being predicted globally using climate models. Knowledge of urban weather and climate modification holds lessons for the global climate change issue. First, adjustments to urban climate changes can provide guidance for adjusting to global change. A second lesson relates to the difficulty but underscores the necessity of providing scientifically credible proof of change within the noise of natural climatic variability. The evolution of understanding about how urban conditions influence weather reveals several unexpected outcomes, particularly relating to precipitation changes. These suggest that similar future surprises can be expected in a changed global climate, a third lesson. In-depth studies of how urban climate changes affected the hydrologic cycle, the regional economy, and human activities were difficult because of data problems, lack of impact methodology, and necessity for multidisciplinary investigations. Similar impact studies for global climate change will require diverse scientific talents and funding commitments adequate to measure the complexity of impacts and human adjustments. Understanding the processes whereby urban areas and other human activities have altered the atmosphere and changed clouds and precipitation regionally appears highly relevant to the global climate-change issue. Scientific and governmental policy development needs to recognize an old axiom that became evident in the studies of inadvertent urban and regional climate change and their behavioural implications: Think globally but act locally. Global climate change is an international issue, and the atmosphere must be treated globally. But the impacts and the will to act and adjust will occur regionally

  10. Exploring key considerations when determining bona fide inadvertent errors resulting in understatements

    Directory of Open Access Journals (Sweden)

    Chrizanne de Villiers

    2016-03-01

    Full Text Available Chapter 16 of the Tax Administration Act (28 of 2011 (the TA Act deals with understatement penalties. In the event of an ‘understatement’, in terms of Section 222 of the TA Act, a taxpayer must pay an understatement penalty, unless the understatement results from a bona fide inadvertent error. The determining of a bona fide inadvertent error on taxpayers’ returns is a totally new concept in the tax fraternity. It is of utmost importance that this section is applied correctly based on sound evaluation principles and not on professional judgement when determining if the error was indeed the result of a bona fide inadvertent error. This research study focuses on exploring key considerations when determining bona fide inadvertent errors resulting in understatements. The role and importance of tax penalty provisions is explored and the meaning of the different components in the term ‘bona fide inadvertent error’ critically analysed with the purpose to find a possible definition for the term ‘bona fide inadvertent error’. The study also compares the provisions of other tax jurisdictions with regards to errors made resulting in tax understatements in order to find possible guidelines on the application of bona fide inadvertent errors as contained in Section 222 of the TA Act. The findings of the research study revealed that the term ‘bona fide inadvertent error’ contained in Section 222 of the TA Act should be defined urgently and that guidelines must be provided by SARS on the application of the new amendment. SARS should also clarify the application of a bona fide inadvertent error in light of the behaviours contained in Section 223 of the TA Act to avoid any confusion.

  11. Ureteroscopic holmium laser cutting for inadvertently sutured drainage tube (report of five cases).

    Science.gov (United States)

    Gao, Xu; Lu, Xin; Ren, Shancheng; Xu, Chuanliang; Sun, Yinghao

    2008-07-01

    The aim of this paper is to report a simple solution for inadvertently sutured drainage tube after urological surgery and discuss the different managements according to different types of this embarrassing complication. From September 2001 to January 2007, five inadvertently sutured drainage tubes were treated with ureteroscopic holmium laser cutting for the suture. All drainage tubes were removed after the operation without other complications. Holmium laser cutting via ureteroscope is a simple solution for the embarrassing problem of inadvertently sutured drainage tube. It can save the patient from undergoing another open surgery.

  12. Adaptive Neuro-Fuzzy Determination of the Effect of Experimental Parameters on Vehicle Agent Speed Relative to Vehicle Intruder.

    Science.gov (United States)

    Shamshirband, Shahaboddin; Banjanovic-Mehmedovic, Lejla; Bosankic, Ivan; Kasapovic, Suad; Abdul Wahab, Ainuddin Wahid Bin

    2016-01-01

    Intelligent Transportation Systems rely on understanding, predicting and affecting the interactions between vehicles. The goal of this paper is to choose a small subset from the larger set so that the resulting regression model is simple, yet have good predictive ability for Vehicle agent speed relative to Vehicle intruder. The method of ANFIS (adaptive neuro fuzzy inference system) was applied to the data resulting from these measurements. The ANFIS process for variable selection was implemented in order to detect the predominant variables affecting the prediction of agent speed relative to intruder. This process includes several ways to discover a subset of the total set of recorded parameters, showing good predictive capability. The ANFIS network was used to perform a variable search. Then, it was used to determine how 9 parameters (Intruder Front sensors active (boolean), Intruder Rear sensors active (boolean), Agent Front sensors active (boolean), Agent Rear sensors active (boolean), RSSI signal intensity/strength (integer), Elapsed time (in seconds), Distance between Agent and Intruder (m), Angle of Agent relative to Intruder (angle between vehicles °), Altitude difference between Agent and Intruder (m)) influence prediction of agent speed relative to intruder. The results indicated that distance between Vehicle agent and Vehicle intruder (m) and angle of Vehicle agent relative to Vehicle Intruder (angle between vehicles °) is the most influential parameters to Vehicle agent speed relative to Vehicle intruder.

  13. Adaptive Neuro-Fuzzy Determination of the Effect of Experimental Parameters on Vehicle Agent Speed Relative to Vehicle Intruder.

    Directory of Open Access Journals (Sweden)

    Shahaboddin Shamshirband

    Full Text Available Intelligent Transportation Systems rely on understanding, predicting and affecting the interactions between vehicles. The goal of this paper is to choose a small subset from the larger set so that the resulting regression model is simple, yet have good predictive ability for Vehicle agent speed relative to Vehicle intruder. The method of ANFIS (adaptive neuro fuzzy inference system was applied to the data resulting from these measurements. The ANFIS process for variable selection was implemented in order to detect the predominant variables affecting the prediction of agent speed relative to intruder. This process includes several ways to discover a subset of the total set of recorded parameters, showing good predictive capability. The ANFIS network was used to perform a variable search. Then, it was used to determine how 9 parameters (Intruder Front sensors active (boolean, Intruder Rear sensors active (boolean, Agent Front sensors active (boolean, Agent Rear sensors active (boolean, RSSI signal intensity/strength (integer, Elapsed time (in seconds, Distance between Agent and Intruder (m, Angle of Agent relative to Intruder (angle between vehicles °, Altitude difference between Agent and Intruder (m influence prediction of agent speed relative to intruder. The results indicated that distance between Vehicle agent and Vehicle intruder (m and angle of Vehicle agent relative to Vehicle Intruder (angle between vehicles ° is the most influential parameters to Vehicle agent speed relative to Vehicle intruder.

  14. Cyclodialysis cleft with late hypotony maculopathy after inadvertent cannula detachment during cataract surgery.

    Science.gov (United States)

    Kahawita, Shyalle; Cugati, Sudha; Casson, Robert

    2015-05-01

    We present the case of a 69-year-old woman who presented with hypotony several years after an inadvertent cannula detachment presumably formed a cyclodialysis cleft during phacoemulsification cataract extraction and posterior chamber intraocular lens implantation in her right eye. To our knowledge, this is the first report of late hypotony maculopathy as a result of inadvertent cannula release. Crown Copyright © 2015. Published by Elsevier Inc. All rights reserved.

  15. Pulling an intruder from a granular material: a novel depinning experiment

    Directory of Open Access Journals (Sweden)

    Zhang Yue

    2017-01-01

    Full Text Available Two-dimensional impact experiments by Clark et al. [2] identified the source of inertial drag to be caused by ‘collisions’ with a latent force network, leading to large fluctuations of the force experienced by the impactor. These collisions provided the major drag on an impacting intruder until the intruder was nearly at rest. As a complement, we consider controlled pull-out experiments where a buried intruder is pulled out of a material, starting from rest. This provides a means to better understand the non-inertial part of the drag force, and to explore the mechanisms associated with the force fluctuations. To some extent, the pull out process is a time reversed version of the impact process. In order to visualize this pulling process, we use 2D photoelastic disks from which circular intruders of different radii are pulled out. We present results about the dynamics of the intruder and the structures of the force chains inside the granular system as captured by slow and high speed imaging.

  16. Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-10-01

    Full Text Available Given that entropy-based IT technology has been applied in homes, office buildings and elsewhere for IT security systems, diverse kinds of intelligent services are currently provided. In particular, IT security systems have become more robust and varied. However, access control systems still depend on tags held by building entrants. Since tags can be obtained by intruders, an approach to counter the disadvantages of tags is required. For example, it is possible to track the movement of tags in intelligent buildings in order to detect intruders. Therefore, each tag owner can be judged by analyzing the movements of their tags. This paper proposes a security approach based on the received signal strength indicators (RSSIs of beacon-based tags to detect intruders. The normal RSSI patterns of moving entrants are obtained and analyzed. Intruders can be detected when abnormal RSSIs are measured in comparison to normal RSSI patterns. In the experiments, one normal and one abnormal scenario are defined for collecting the RSSIs of a Bluetooth-based beacon in order to validate the proposed method. When the RSSIs of both scenarios are compared to pre-collected RSSIs, the RSSIs of the abnormal scenario are about 61% more different compared to the RSSIs of the normal scenario. Therefore, intruders in buildings can be detected by considering RSSI differences.

  17. Pulse-train control of branching processes: Elimination of background and intruder state population

    International Nuclear Information System (INIS)

    Seidl, Markus; Uiberacker, Christoph; Jakubetz, Werner; Etinski, Mihajlo

    2008-01-01

    The authors introduce and describe pulse train control (PTC) of population branching in strongly coupled processes as a novel control tool for the separation of competing multiphoton processes. Control strategies are presented based on the different responses of processes with different photonicities and/or different frequency detunings to the pulse-to-pulse time delay and the pulse-to-pulse phase shift in pulse trains. The control efficiency is further enhanced by the property of pulse trains that complete population transfer can be obtained over an extended frequency range that replaces the resonance frequency of simple pulses. The possibility to freely tune the frequency assists the separation of the competing processes and reduces the number of subpulses required for full control. As a sample application, PTC of leaking multiphoton resonances is demonstrated by numerical simulations. In model systems exhibiting sizable background (intruder) state population if excited with single pulses, PTC leading to complete accumulation of population in the target state and elimination of background population is readily achieved. The analysis of the results reveals different mechanisms of control and provides clues on the mechanisms of the leaking process itself. In an alternative setup, pulse trains can be used as a phase-sensitive tool for level switching. By changing only the pulse-to-pulse phase shift of a train with otherwise unchanged parameters, population can be transferred to any of two different target states in a near-quantitative manner.

  18. Equivalence of the spherical and deformed shell-model approach to intruder states

    International Nuclear Information System (INIS)

    Heyde, K.; Coster, C. de; Ryckebusch, J.; Waroquier, M.

    1989-01-01

    We point out that the description of intruder states, incorporating particle-hole (p-h) excitation across a closed shell in the spherical shell model or a description starting from the Nilsson model are equivalent. We furthermore indicate that the major part of the nucleon-nucleon interaction, responsible for the low excitation energy of intruder states comes as a two-body proton-neutron quadrupole interaction in the spherical shell model. In the deformed shell model, quadrupole binding energy is gained mainly through the one-body part of the potential. (orig.)

  19. Unexpected alignment patterns in high-j intruder bands evidence for a strong residual neutron proton interaction?

    International Nuclear Information System (INIS)

    Wyss, R.; Johnson, A.; Royal Inst. of Tech., Stockholm

    1990-01-01

    The alignment of h 11/12 protons in νi 13/2 intruder bands in mass A = 130 region is investigated. The lack of a clear h 11/12 band crossing is compared with the alignment pattern of i 13/2 neutrons in πi 13/2 intruder bands in mass A = 180 region. The very smooth rise in angular momentum in the intruder bands is related to a possible neutron proton interaction between the single intruder orbital and the aligned two-quasiparticle configuration. 36 refs., 3 figs

  20. Intruder states in the cadmium isotopes and a simple schematic calculation

    International Nuclear Information System (INIS)

    Aprahamian, A.; Brenner, D.S.; Casten, R.F.; Heyde, K.

    1984-01-01

    Angular correlation studies of 118 120 Cd at TRISTAN have allowed the discovery and identification in each nucleus of two new 0 + states and their respective E2 decay properties. The results have been interpreted in terms of a simple schematic model based on the mixing of normal vibration-like and intruder rotation-like 2p-4h configurations

  1. APPROACH TO SYNTHESIS OF PASSIVE INFRARED DETECTORS BASED ON QUASI-POINT MODEL OF QUALIFIED INTRUDER

    Directory of Open Access Journals (Sweden)

    I. V. Bilizhenko

    2017-01-01

    Full Text Available Subject of Research. The paper deals with synthesis of passive infra red (PIR detectors with enhanced detection capability of qualified intruder who uses different types of detection countermeasures: the choice of specific movement direction and disguise in infrared band. Methods. We propose an approach based on quasi-point model of qualified intruder. It includes: separation of model priority parameters, formation of partial detection patterns adapted to those parameters and multi channel signal processing. Main Results. Quasi-pointmodel of qualified intruder consisting of different fragments was suggested. Power density difference was used for model parameters estimation. Criteria were formulated for detection pattern parameters choice on the basis of model parameters. Pyroelectric sensor with nine sensitive elements was applied for increasing the signal information content. Multi-channel processing with multiple partial detection patterns was proposed optimized for detection of intruder's specific movement direction. Practical Relevance. Developed functional device diagram can be realized both by hardware and software and is applicable as one of detection channels for dual technology passive infrared and microwave detectors.

  2. A study of the management of 55 traumatically intruded permanent incisor teeth in children.

    LENUS (Irish Health Repository)

    Stewart, C

    2009-01-01

    These were to examine the main presenting, treatment and outcome factors for intruded permanent incisors in children, the effect of apical development and degree of intrusion on decisions on repositioning, the effect of apical development status on the maintenance of pulp vitality and the time of pulp extirpation and to compare the decisions made to the advice given in existing clinical guidelines.

  3. Lift on side by side intruders of various geometries within a granular flow

    Science.gov (United States)

    Acevedo-Escalante, M. F.; Caballero-Robledo, G. A.

    2017-06-01

    Obstacles within fluids have been widely used in engineering and in physics to study hydrodynamic interactions. In granular matter, objects within a granular flow have helped to understand fundamental features of drag and lift forces. In our group, we have studied numerically the flow mediated interaction between two static disks within a vertical granular flow in a two-dimensional container where the flow velocity and the distance between obstacles were varied. Attractive and repulsive forces were found depending on flow velocity and separation between intruders. The simulations evidenced a relationship between the average flow velocity in a specific section ahead of the obstacles and the attractive-repulsive lift. On the other hand, it was showed that the lift force on an object dragged within a granular medium depends on the shape of the intruder. Here we present experimental results of the interaction between two side-by-side intruders of different shapes within a vertical granular flow. We built a quasi-two-dimensional container in which we placed the intruders and using load cells we measured lift and drag forces during the discharge process for different flow velocities.

  4. The resident-intruder paradigm : a standardized test for aggression, violence and social stress

    NARCIS (Netherlands)

    Koolhaas, Jacob; Coppens, Caroline M.; de Boer, Sietse F.; Buwalda, Bauke; Meerlo, Peter; Timmermans, Paul J. A.

    2013-01-01

    This video publication explains in detail the experimental protocol of the resident-intruder paradigm in rats. This test is a standardized method to measure offensive aggression and defensive behavior in a semi natural setting. The most important behavioral elements performed by the resident and the

  5. Automated electronic intruder simulator for evaluation of odd frequency microwave detectors

    International Nuclear Information System (INIS)

    1979-01-01

    A microwave intruder simulator for testing motion detection sensors is described. This simulator can be used to evaluate a variety of microwave sensors regardless of the value of the center frequency of the signal utilized. Representative curves from the evaluation of one microwave sensor are also presented

  6. Inadvertent intrathecal injection of labetalol in a patient undergoing post-partum tubal ligation.

    Science.gov (United States)

    Balestrieri, P J; Hamza, M S; Ting, P H; Blank, R S; Grubb, C T

    2005-10-01

    After receiving a continuous spinal anesthetic for labor following an inadvertent dural puncture with a 17-gauge epidural needle, a morbidly obese parturient underwent post-partum tubal ligation 12 h after vaginal delivery. The patient received a total of 2 mL of 0.75% hyperbaric bupivacaine for the surgery. In response to moderate hypertension the patient received intravenous labetalol hydrochloride 20 mg. She subsequently was inadvertently administered approximately 15 mg of labetalol through the spinal catheter. The spinal catheter was removed immediately after the procedure. She suffered no apparent adverse neurologic effects.

  7. Beverage can stay-tabs: still a source for inadvertently ingested foreign bodies in children

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, Lane F. [Cincinnati Children' s Hospital Medical Center, Department of Radiology, MLC 5031, Cincinnati, OH (United States); University of Cincinnati, College of Medicine, Departments of Radiology and Pediatrics, Cincinnati, OH (United States)

    2010-09-15

    In the 1970s in part to avoid inadvertent ingestion, the beverage-can industry changed can construction from pull-tabs to the stay-tabs (remain attached to can after opening) used today. Our purpose is to identify the number of inadvertent ingestions of beverage-can stay-tabs by children recognized at our institution. The medical information system of a children's hospital was searched with key terms to identify cases in which a witnessed or self-reported inadvertent ingestion of a beverage-can stay-tab resulted in a radiograph to rule out presence of a foreign body. Demographics, identification of stay-tab on radiographs, associated abnormalities, and patient management were reviewed. Nineteen cases of stay-tab ingestion were identified over 16 years. Mean age of ingesters was 8.5 years with the majority being teenagers and 15 (79%) >5 years of age. The stay-tab could be seen radiographically only in 4 (21%) cases - all with the stay-tab identified in the stomach. The identification of 19 children who inadvertently ingested beverage-can stay-tabs at a single children's hospital suggests that such ingestions still occur. Radiologists should be aware that stay-tabs are radiographically visible in the minority (21%) of cases. (orig.)

  8. Late-Onset Inadvertent Bleb Formation following Pars Plana M3 Molteno Implant Tube Obstruction

    Directory of Open Access Journals (Sweden)

    Anmar M. Abdul-Rahman

    2017-01-01

    Full Text Available Purpose: To report a case of inadvertent bleb formation presenting 18 months after pars plana M3 Molteno implant tube obstruction in a patient with mixed mechanism glaucoma. Materials and Methods: An 84-year-old Caucasian male with mixed mechanism glaucoma underwent slit-lamp examination, gonioscopy, colour anterior segment photography and anterior segment optical coherence tomography (AS-OCT. Results: An inadvertent bleb developed 18 months after pars plana implant tube re-positioning with a 6/0 Vicryl tie ligature. The bleb was located in the area anterior to the implant plate; it was characterised by a thin, transparent, avascular and multi-cystic wall, with a visible stoma at the posterior edge of the bleb. The bleb was functioning as demonstrated by an intraocular pressure of 6 mm Hg at presentation and a punctate fluorescein uptake pattern of the bleb wall. The bleb over the plate of the Molteno implant was non-functioning, likely secondary to tube obstruction by vitreous in the early postoperative period. AS-OCT showed a tract from the anterior chamber commencing at an entry wound through a corneal tunnel to the posterior stoma at the base of the inadvertent bleb. Conclusions: We hypothesise that the pathophysiologic factors resulting in an inadvertent bleb are a result of a combination of apoptosis, late-onset wound dehiscence and internal gaping of a centrally placed corneal wound. In addition, aqueous hydrodynamic factors may play a role.

  9. Beverage can stay-tabs: still a source for inadvertently ingested foreign bodies in children

    International Nuclear Information System (INIS)

    Donnelly, Lane F.

    2010-01-01

    In the 1970s in part to avoid inadvertent ingestion, the beverage-can industry changed can construction from pull-tabs to the stay-tabs (remain attached to can after opening) used today. Our purpose is to identify the number of inadvertent ingestions of beverage-can stay-tabs by children recognized at our institution. The medical information system of a children's hospital was searched with key terms to identify cases in which a witnessed or self-reported inadvertent ingestion of a beverage-can stay-tab resulted in a radiograph to rule out presence of a foreign body. Demographics, identification of stay-tab on radiographs, associated abnormalities, and patient management were reviewed. Nineteen cases of stay-tab ingestion were identified over 16 years. Mean age of ingesters was 8.5 years with the majority being teenagers and 15 (79%) >5 years of age. The stay-tab could be seen radiographically only in 4 (21%) cases - all with the stay-tab identified in the stomach. The identification of 19 children who inadvertently ingested beverage-can stay-tabs at a single children's hospital suggests that such ingestions still occur. Radiologists should be aware that stay-tabs are radiographically visible in the minority (21%) of cases. (orig.)

  10. Attention and Facilitation: Converging Information Versus Inadvertent Reading in Stroop Task Performance

    NARCIS (Netherlands)

    Roelofs, A.P.A.

    2010-01-01

    Disagreement exists about whether color-word Stroop facilitation is caused by converging information (e.g.. Cohen et al.. 1990: Roelofs, 2003) or inadvertent reading (MacLeod & MacDonald, 2000). Four experiments tested between these hypotheses by examining Stroop effects oil response time (RT) both

  11. Attention and Facilitation: Converging Information versus Inadvertent Reading in Stroop Task Performance

    Science.gov (United States)

    Roelofs, Ardi

    2010-01-01

    Disagreement exists about whether color-word Stroop facilitation is caused by converging information (e.g., Cohen et al., 1990; Roelofs, 2003) or inadvertent reading (MacLeod & MacDonald, 2000). Four experiments tested between these hypotheses by examining Stroop effects on response time (RT) both within and between languages. Words cannot be…

  12. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-05-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  13. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-12-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  14. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2003-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  15. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2003-05-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  16. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2002-09-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  17. An i{sub 13/2} neutron intruder band in {sup 141}Gd

    Energy Technology Data Exchange (ETDEWEB)

    Mullins, S M; Omar, A; Persson, L; Prevost, D; Waddington, J C [McMaster Univ., Hamilton, ON (Canada); Andrews, H R; Ball, G C; Galindo-Uribarri, A; Janzen, V P; Radford, D C; Ward, D [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; Drake, T E [Toronto Univ., ON (Canada). Dept. of Physics; Fossan, D B; Lafosse, D; Vaska, P; Waring, M [State Univ. of New York, Stony Brook, NY (United States). Dept. of Physics; Wadsworth, R [York Univ. (United Kingdom). Dept. of Physics

    1992-08-01

    The nucleus {sup 141}Gd has been investigated at high spins for the first time following the reactions {sup 112}Sn({sup 32}S,2pn){sup 141}Gd at 155 MeV and {sup 112}Sn({sup 33}S,2p2n){sup 141}Gd at 170 MeV. The methods of in-beam {gamma}-ray spectroscopy were used to establish a number of different structures, including a band which has been assigned as being based on the {nu}i{sub 13/2}[660]1/2{sup +} Nilsson intruder orbital. This is the heaviest nucleus thus far in which this type of intruder band has been identified. (author). 11 refs., 3 figs.

  18. Identification of low-lying proton-based intruder states in 189-193Pb

    International Nuclear Information System (INIS)

    Vel, K. van de; Andreyev, A.N.; Huyse, M.; Duppen, P. van; Cocks, J.F.C.; Dorvaux, O.; Greenlees, P.T.; Helariutta, K.; Jones, P.; Julin, R.; Juutinen, S.; Kettunen, H.; Kuusiniemi, P.; Leino, M.; Muikku, M.; Nieminen, P.; Eskola, K.; Wyss, R.

    2002-01-01

    Low-lying proton-based intruder states have been observed in the odd-mass isotopes 189,191,193 Pb in experiments at the RITU gas-filled recoil separator. The identification has been performed by observing the fine structure in the α decay of the parent 193,195,197 Po nuclei in prompt coincidence with conversion electrons and γ rays in the daughter lead isotopes. Along with the literature data these results establish a systematics of intruder states in the odd-mass lead isotopes from 197 Pb down to 185 Pb. Interpretation of these states involves the coupling of the 1i 13/2 or 3p 3/2 odd neutron to the 0 + state in the oblate minimum in the even-mass lead core. Conversion coefficients have been determined for some of the transitions, revealing mixing between the coexisting states. The experimental results are compared to potential energy surface calculations

  19. Underwater Intruder Detection Sonar for Harbour Protection: State of the Art Review and Implications

    Science.gov (United States)

    2006-10-01

    intruder would appear as a small moving “ blob ” of energetic echo in the echograph, and the operator could judge whether the contact is a threat that calls...visually then as a small fluctuating “ blob ” against a fluctuating background of sound clutter and reverberation, making it difficult to visually...4. Non-random false alarms caused by genuine underwater contacts that happened not to be intruders—by large fish , or schools of fish , or marine

  20. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  1. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2002-09-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  2. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2002-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  3. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2003-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  4. Intruder states, coexistence, and approaches to deformation: The study of 120Xe and the N = 66 isotones

    International Nuclear Information System (INIS)

    Mantica, P.F. Jr.; Zimmerman, B.E.; Ford, C.E.; Walters, W.B.; Rikovska, J.; Stone, N.J.

    1989-01-01

    In this chapter, new results of γ-ray and conversion-electron spectroscopic studies of the structure of 119,121 Te and 126,127 Xe will be reported. These results will be described along with the results of previous studies of intruder structures in the Te and Xe mass region. The observed structures will be contrasted with other intruder structure identified in the Sn, Cd, and Pd isotopes. Results of IBM mixing calculations will be shown for the even-even Te nuclides. The role of intruder structures in the development of nuclear deformation will be discussed. 52 refs., 8 figs., 1 tab

  5. Restoration of an intruded maxillary central incisor with a uniquely designed dowel and core restoration: a case report.

    Science.gov (United States)

    Polat, Zelal Seyfioğlu; Tacir, Ibrahim Halil

    2007-01-01

    This article describes the restoration of an intruded root using a custom-made metal dowel and metal-ceramic veneer core restoration. The treatment plan for this patient consisted of restoring the missing esthetics and eliminating psychological trauma by utilizing the root of the intruded maxillary left central incisor to replace both missing central incisor crowns. This treatment will preserve space and bone until the patient is old enough for another prosthodontic restoration to be considered. As the lost fragments were not recovered, we considered this restoration of the intruded root to be the best therapeutic option, considering the effect on the patient's psyche. The patient was satisfied with the final result.

  6. Anabolic agents: recent strategies for their detection and protection from inadvertent doping

    Science.gov (United States)

    Geyer, Hans; Schänzer, Wilhelm; Thevis, Mario

    2014-01-01

    According to the World Anti-Doping Agency (WADA) Prohibited List, anabolic agents consist of exogenous anabolic androgenic steroids (AAS), endogenous AAS and other anabolic agents such as clenbuterol and selective androgen receptor modulators (SARMs). Currently employed strategies for their improved detection include the prolongation of the detection windows for exogenous AAS, non-targeted and indirect analytical approaches for the detection of modified steroids (designer steroids), the athlete’s biological passport and isotope ratio mass spectrometry for the detection of the misuse of endogenous AAS, as well as preventive doping research for the detection of SARMs. The recent use of these strategies led to 4–80-fold increases of adverse analytical findings for exogenous AAS, to the detection of the misuse of new designer steroids, to adverse analytical findings of different endogenous AAS and to the first adverse analytical findings of SARMs. The strategies of the antidoping research are not only focused on the development of methods to catch the cheating athlete but also to protect the clean athlete from inadvertent doping. Within the past few years several sources of inadvertent doping with anabolic agents have been identified. Among these are nutritional supplements adulterated with AAS, meat products contaminated with clenbuterol, mycotoxin (zearalenone) contamination leading to zeranol findings, and natural products containing endogenous AAS. The protection strategy consists of further investigations in case of reasonable suspicion of inadvertent doping, publication of the results, education of athletes and development of methods to differentiate between intentional and unintentional doping. PMID:24632537

  7. Motion patterns and phase-transition of a defender-intruder problem and optimal interception strategy of the defender

    Science.gov (United States)

    Wang, Jiangliu; Li, Wei

    2015-10-01

    In this paper, we consider a defense-intrusion interaction, in which an intruder is attracted by a protected stationary target but repulsed by a defender; while the defender tries to move towards an appropriate interception position (IP) between the intruder and the target in order to intercept the intruder and expel the intruder away from the target as maximum as possible. Intuitionally, to keep the intruder further away, one may wonder that: is it a better strategy for the defender trying to approach the intruder as near as possible? Unexpectedly and interestingly enough, this is not always the case. We first introduce the flexibility for IP selection, then investigate the system dynamics and the stable motion patterns, and characterize the phase-transition surface for the motion patterns. We show that, the phase-transition surface just defines the optimal interception strategy of the defender for IP selection; and from the perspective of mobility of agents, the optimal strategy just depends on relative mobility of the two agents.

  8. Central vasopressin V1a receptors modulate neural processing in mothers facing intruder threat to pups

    OpenAIRE

    Caffrey, Martha K.; Nephew, Benjamin C.; Febo, Marcelo

    2009-01-01

    Vasopressin V1a receptors in the rat brain have been studied for their role in modulating aggression and anxiety. In the current study blood-oxygen-level-dependent (BOLD) functional MRI was used to test whether V1a receptors modulate neural processing in the maternal brain when dams are exposed to a male intruder. Primiparous females were given an intracerebroventricular (ICV) injection of vehicle or V1a receptor antagonist ([deamino-Pen1, O-Me-Try, Arg8]-Vasopressin, 125 ng/10 μL) 90-120 min...

  9. Consolidation of a WSN and Minimax method to rapidly neutralise intruders in strategic installations.

    Science.gov (United States)

    Conesa-Muñoz, Jesus; Ribeiro, Angela

    2012-01-01

    Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN). The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders' behaviour is inferred through sequences of sensors' activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final state of the intruders

  10. Inadvertent raising of levels in the FFTF primary sodium pumps. Final unusual occurrence report, HEDL 79-34 (FFTF-58)

    International Nuclear Information System (INIS)

    Kuechle, J.D.

    1981-01-01

    The final unusual occurrence report describes the inadvertent raising of the sodium level in the FFTF primary sodium pumps during system testing. This event is now judged to have caused permanent deformation of the primary pump shaft on loop 1 during a period when pump rotation was stopped and sodium level in the pump tank was inadvertently increased. The shaft was subsequently removed, straightened, and returned to service in the spare FFTF pump

  11. Machine learning approach to detect intruders in database based on hexplet data structure

    Directory of Open Access Journals (Sweden)

    Saad M. Darwish

    2016-09-01

    Full Text Available Most of valuable information resources for any organization are stored in the database; it is a serious subject to protect this information against intruders. However, conventional security mechanisms are not designed to detect anomalous actions of database users. An intrusion detection system (IDS, delivers an extra layer of security that cannot be guaranteed by built-in security tools, is the ideal solution to defend databases from intruders. This paper suggests an anomaly detection approach that summarizes the raw transactional SQL queries into a compact data structure called hexplet, which can model normal database access behavior (abstract the user's profile and recognize impostors specifically tailored for role-based access control (RBAC database system. This hexplet lets us to preserve the correlation among SQL statements in the same transaction by exploiting the information in the transaction-log entry with the aim to improve detection accuracy specially those inside the organization and behave strange behavior. The model utilizes naive Bayes classifier (NBC as the simplest supervised learning technique for creating profiles and evaluating the legitimacy of a transaction. Experimental results show the performance of the proposed model in the term of detection rate.

  12. Intruder bands in odd-A {sup 109-115}Sb

    Energy Technology Data Exchange (ETDEWEB)

    Janzen, V P [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; [McMaster Univ., Hamilton, ON (Canada). Dept. of Physics; Andrews, H R; Galindo-Uribarri, A; Radford, D C; Ward, D [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; Omar, A; Mullins, S; Persson, L; Prevost, D; Rodriguez, J; Sawicki, M; Unrau, P; Waddington, J C [McMaster Univ., Hamilton, ON (Canada). Dept. of Physics; Drake, T E; Zwartz, G [Toronto Univ., ON (Canada). Dept. of Physics; Fossan, D B; Lafosse, D R; Hughes, J R; Schnare, H; Timmers, H; Vaska, P [State Univ. of New York, Stony Brook, NY (United States). Dept. of Physics; Haas, B [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; [Strasbourg-1 Univ., 67 (France). Centre de Recherches Nucleaires; Paul, E S; Wilson, J [Liverpool Univ. (United Kingdom). Oliver Lodge Lab.; Pilotte, S [Ottawa Univ., ON (Canada). Dept. of Physics; Wadsworth, R [York Univ. (United Kingdom). Dept. of Physics; Wyss, R [Joint Inst. for Heavy Ion Research, Oak Ridge, TN (United States)

    1992-08-01

    The existence of rotational structures in nuclei bordering on the spherical Z= 50 closed shell has been known for some time. Nevertheless, our understanding of collective effects in this region is remarkably incomplete; for example, before this work little high-spin data existed and there were no lifetime measurements to confirm the collectivity associated with the rotational bands observed in Sb (Z = 51) and Sn (Z = 50) nuclei. Furthermore, the role of the h{sub 11/2} orbital was virtually unknown, although it has the highest angular momentum of the orbitals in this mass region and therefore is expected to have the most influence on the properties of high-spin states. In the A {approx} 130 and A {approx} 180 mass regions, where highly deformed intruder bands have been observed, it is the neutron i{sub 13/2} orbitals, respectively, which are preferentially lowered in energy by a combination of large deformation and fast rotation In lighter nuclei the h{sub 11/2} orbital is expected to appear as an intruder configuration. (author). 11 refs., 1 tab., 4 figs.

  13. Implementation of coordinated global serotype 2 oral poliovirus vaccine cessation: risks of inadvertent trivalent oral poliovirus vaccine use.

    Science.gov (United States)

    Duintjer Tebbens, Radboud J; Hampton, Lee M; Thompson, Kimberly M

    2016-06-01

    The endgame for polio eradication includes coordinated global cessation of oral poliovirus vaccine (OPV), starting with the cessation of vaccine containing OPV serotype 2 (OPV2) by switching all trivalent OPV (tOPV) to bivalent OPV (bOPV). The logistics associated with this global switch represent a significant undertaking, with some possibility of inadvertent tOPV use after the switch. We used a previously developed poliovirus transmission and OPV evolution model to explore the relationships between the extent of inadvertent tOPV use, the time after the switch of the inadvertent tOPV use and corresponding population immunity to serotype 2 poliovirus transmission, and the ability of the inadvertently introduced viruses to cause a serotype 2 circulating vaccine-derived poliovirus (cVDPV2) outbreak in a hypothetical population. We then estimated the minimum time until inadvertent tOPV use in a supplemental immunization activity (SIA) or in routine immunization (RI) can lead to a cVDPV2 outbreak in realistic populations with properties like those of northern India, northern Pakistan and Afghanistan, northern Nigeria, and Ukraine. At low levels of inadvertent tOPV use, the minimum time after the switch for the inadvertent use to cause a cVDPV2 outbreak decreases sharply with increasing proportions of children inadvertently receiving tOPV. The minimum times until inadvertent tOPV use in an SIA or in RI can lead to a cVDPV2 outbreak varies widely among populations, with higher basic reproduction numbers, lower tOPV-induced population immunity to serotype 2 poliovirus transmission prior to the switch, and a lower proportion of transmission occurring via the oropharyngeal route all resulting in shorter times. In populations with the lowest expected immunity to serotype 2 poliovirus transmission after the switch, inadvertent tOPV use in an SIA leads to a cVDPV2 outbreak if it occurs as soon as 9 months after the switch with 0.5 % of children aged 0-4 years inadvertently

  14. Inadvertent puncture of the aortic noncoronary cusp during postoperative left atrial tachycardia ablation

    Directory of Open Access Journals (Sweden)

    Dursun Aras, MD

    2015-08-01

    Full Text Available Transseptal catheterization has become part of the interventional electrophysiologist׳s technical armamentarium since the development of left atrial catheter ablation and percutaneous technologies for treating mitral and aortic valve disease. Although frequently performed, the procedure׳s most feared complication is aortic root penetration. Focal atrial tachycardia has been described as the most common late sequela of surgical valve replacements. We present a complicated case involving the inadvertent delivery of an 8 French sheath across the noncoronary cusp during radiofrequency catheter ablation for left atrial tachycardia originating from the mitral annulus in a patient with prior mitral valve replacement.

  15. Treatment Approach to Small Inadvertent Injury of the Crystalline Lens Anterior Capsule During Iridodialysis Repair Surgery

    Directory of Open Access Journals (Sweden)

    Gökçen Gökçe

    2013-01-01

    Full Text Available A 22-year-old man presented to our ophthalmology department with photophobia. On ophthalmic examination, iridodialysis secondary to blunt trauma that occurred 5 years ago was diagnosed. During iridodialysis repair surgery, long curved double-armed needle of 10-0 polypropylene suture (PC-9 inserted into the 19 gauge side port turned down inadvertently by its own weight, resulting in crystalline lens anterior capsule perforation. Postoperative clinical observation revealed no lens opacification affecting visual acuity. This case report showed that lens aspiration surgery should be postponed if the capsule injury is small.(Turk J Ophthalmol 2013; 43: 61-3

  16. Inadvertent injection of formalin mistaken for local anesthetic agent: report of a case.

    Science.gov (United States)

    Arakeri, Gururaj; Brennan, Peter A

    2012-05-01

    Chemical facial cellulitis, while commonly seen in domestic accidents or attempted suicide, is uncommon in the dental office and hence rarely addressed in the dental literature. We present an unusual case of chemical facial cellulitis caused by inadvertent injection of formalin into the soft tissues of the oral cavity, which was mistaken for local anesthesia solution. This report comprises the immediate symptoms, possible root cause, and management of the difficult situation. We also provide some guidelines to avoid such unfortunate events. Copyright © 2012 Elsevier Inc. All rights reserved.

  17. Consolidation of a WSN and Minimax Method to Rapidly Neutralise Intruders in Strategic Installations

    Directory of Open Access Journals (Sweden)

    Angela Ribeiro

    2012-03-01

    Full Text Available Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN. The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders’ behaviour is inferred through sequences of sensors’ activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final

  18. Sensing the intruder: a quantitative threshold for recognition cues perception in honeybees

    Science.gov (United States)

    Cappa, Federico; Bruschini, Claudia; Cipollini, Maria; Pieraccini, Giuseppe; Cervo, Rita

    2014-02-01

    The ability to discriminate among nestmates and non-nestmate is essential to defend social insect colonies from intruders. Over the years, nestmate recognition has been extensively studied in the honeybee Apis mellifera; nevertheless, the quantitative perceptual aspects at the basis of the recognition system represent an unexplored subject in this species. To test the existence of a cuticular hydrocarbons' quantitative perception threshold for nestmate recognition cues, we conducted behavioural assays by presenting different amounts of a foreign forager's chemical profile to honeybees at the entrance of their colonies. We found an increase in the explorative and aggressive responses as the amount of cues increased based on a threshold mechanism, highlighting the importance of the quantitative perceptual features for the recognition processes in A. mellifera.

  19. Energy of the 2p1h intruder state in $^{34}$Al

    CERN Multimedia

    The second 0$^{+}$ state in $^{34}$Si, of high importance for the understanding of the island of inversion at N=20, has been recently observed through the $\\beta$- decay of a predicted long-lived low-lying isomeric 1$^{+}$ state in $^{34}$Al. We intend to measure the unknown excitation energy of this isomer using the ISOLTRAP Penning-trap mass spectrometer. Since a recent experiment at ISOLDE (IS-530) showed that the full $\\beta$- strength in the decay of $^{34}$Mg goes through this 1$^{+}$ state in $^{34}$Al, we propose to perform a direct mass measurement of the daughter $^{34}$Al ions trapped after the decay of $^{34}$Mg. Mass measurements indicate that the 4$^{−}$ ground state in $^{34}$Al may be an excited state, the ground state being therefore the intruder 1$^{+}$ state. In another run, we propose to perform a remeasurement of the mass of the 4$^{−}$ ground state.

  20. High spin spectroscopy of near spherical nuclei: Role of intruder orbitals

    Energy Technology Data Exchange (ETDEWEB)

    Bhattacharyya, S.; Bhattacharjee, T.; Mukherjee, G. [Variable Energy Cyclotron Centre, 1/AF Bidhan Nagar, Kolkata - 700064 (India); Chanda, S. [Fakir Chand College, Diamond Herbour, West Bengal (India); Banerjee, D.; Das, S. K.; Guin, R. [Radiochemistry Division, Variable Energy Cyclotron Centre, BARC, Kolkata - 700064 (India); Gupta, S. Das [Variable Energy Cyclotron Centre, 1/AF Bidhan Nagar, Kolkata - 700064, India and Saha Institute of Nuclear Physics, Kolkata-700064 (India); Pai, H. [Variable Energy Cyclotron Centre, 1/AF Bidhan Nagar, Kolkata - 700064, India and Institut für Kernphysik, Technische Universität Darmstadt, Schlossgartenstrasse 9, 64289 Darmstadt (Germany)

    2014-08-14

    High spin states of nuclei in the vicinity of neutron shell closure N = 82 and proton shell closure Z = 82 have been studied using the Clovere Ge detectors of Indian National Gamma Array. The shape driving effects of proton and neutron unique parity intruder orbitals for the structure of nuclei around the above shell closures have been investigated using light and heavy ion beams. Lifetime measurements of excited states in {sup 139}Pr have been done using pulsed-beam-γ coincidence technique. The prompt spectroscopy of {sup 207}Rn has been extended beyond the 181μs 13/2{sup +} isomer. Neutron-rich nuclei around {sup 132}Sn have been produced from proton induced fission of {sup 235}U and lifetime measurement of low-lying states of odd-odd {sup 132}I have been performed from offline decay.

  1. Analyses of natural resources in 10 CFR Part 60 as related to inadvertent human intrusion

    International Nuclear Information System (INIS)

    Miklas, M.P.; Lefevre, H.E.

    1993-01-01

    The purpose of this paper is to examine the intent of the regulatory language of the portions of 10 CFR Part 60 which deal with considerations of the natural resources of a proposed geologic repository for high-level radioactive wastes as they relate to inadvertent human intrusion. Four Potentially Adverse Conditions (PAC) the requirements of 10 CFR 60.21(c)(13) are shown to be related to natural resources. Groundwater is identified as a natural resource known to be present at Yucca Mountain, Nevada. For economic considerations of natural resources, the open-quotes foreseeable futureclose quotes is thought to be no more than 50 years. Two of the topics addressed by the PACs, subsurface mining and drilling at a proposed repository site, are pre-site-characterization activities which must be evaluated in the context of repository performance criteria set by the US EPA standard, 40 CFR Part 191. An alternative US DOE compliance demonstration to another PAC, 10 CFR 60.122(c)(17), might be to use an open-quotes explorationist perspectiveclose quotes of natural resource assessment. The Commission intends for DOE to evaluate the likelihood and consequence of inadvertent human intrusion into a geologic repository as a result of exploration or exploitation of natural resources within or near a proposed high-level radioactive waste geologic repository

  2. The uptake of radionuclides from inadvertent consumption of soil by grazing animals

    International Nuclear Information System (INIS)

    Green, N.; Dodd, N.J.

    1988-01-01

    Investigations of the transfer to man of artificially-produced radionuclides through food chains have shown that the inadvertent consumption of soil by grazing animals can give variations in estimates of transfer coefficients, especially for radionuclides that are poorly absorbed by plant roots. Even small masses of soil adhering to herbage or directly ingested can make a significant contribution to the intake inventory in terms of activity. Although the activity concentrations of soil-contaminated herbage are elevated, the radionuclides associated with the soil may not necessarily be in a form which is easily absorbed by the animal. Attempts must be made, therefore, to quantify soil intake and the subsequent radionuclide uptake by this mechanism. A field investigation of the uptake of radionuclides by farm animals grazing near the Sellafield nuclear reprocessing plant has been pursued. The aims of the study were to estimate the transfer to muscle and other tissues. This paper describes the methods used to estimate both the soil intake and the consequent availability of radionuclides associated with the soil. The measurements were used to evaluate the contribution to tissue content of inadvertent consumption of soil by cows and sheep. 10 refs.; 2 tabs

  3. Prevention of the inadvertent movement and illicit trafficking of radioactive and nuclear materials in Argentine border

    International Nuclear Information System (INIS)

    Bonet Duran, Stella M.; Canibano, Javier A.; Menossi, Sergio A.; Rodriguez, Carlos E.

    2004-01-01

    The inadvertent and illegal movements of radioactive and nuclear materials are issues of increased national and international awareness. States are progressively becoming more conscious of the need to adequately respond to these events. As regards the States' regulatory infrastructure, the design and enforcement of control and verification measures to maintain the continuity of knowledge about possession, use and movements of radioactive and nuclear materials is of critical importance. The existence of an appropriate legislative framework and a regulatory authority empowered to establish effective safety and security measures are essential to prevent inadvertent and illegal movements of nuclear materials and other radioactive materials. The events of Sep. 11, 2001 in the US have increased the States' awareness on the need to review their national infrastructure to identify additional measures against inadvertent and illegal movements of radioactive and nuclear materials as well as against sabotage of nuclear facilities. Argentina has more than a half- century- old tradition regarding the control and supervision of all activities involving the use of nuclear and radioactive materials. The Nuclear Regulatory Authority (ARN) of Argentina is the organization with federal competence in radiation protection, nuclear safety, safeguards and physical protection. It is responsible for issuing licenses and permits to any activity involving radioactive materials and for controlling and verifying that these activities are performed in full compliance with ARN standards and requirements. In the region, Argentina has been playing an important role in the prevention of illicit traffic of nuclear and radioactive materials for the last years within the framework of Security Commission of MERCOSUR. The last goals of this initiative are to define and coordinate actions and to establish a set of common operational procedures in the countries participating in the mentioned multilateral

  4. Intruders: New Neighbors in "Dawn of the Planet of the Apes" and "The Hundred-Foot Journey"

    Science.gov (United States)

    Beck, Bernard

    2015-01-01

    Conflicts over territory are about the power to establish dominant cultures in territories and are often accompanied by cultural claims to legitimacy by each side. The cultural claims, or ideologies, are often expressed in terms of "homeland" dwellers versus "intruders." Two recent movies, "Dawn of the Planet of the…

  5. Resident intruder paradigm-induced aggression relieves depressive-like behaviors in male rats subjected to chronic mild stress

    Science.gov (United States)

    Wei, Sheng; Ji, Xiao-wei; Wu, Chun-ling; Li, Zi-fa; Sun, Peng; Wang, Jie-qiong; Zhao, Qi-tao; Gao, Jie; Guo, Ying-hui; Sun, Shi-guang; Qiao, Ming-qi

    2014-01-01

    Background Accumulating epidemiological evidence shows that life event stressors are major vulnerability factors for psychiatric diseases such as major depression. It is also well known that the resident intruder paradigm (RIP) results in aggressive behavior in male rats. However, it is not known how resident intruder paradigm-induced aggression affects depressive-like behavior in isolated male rats subjected to chronic mild stress (CMS), which is an animal model of depression. Material/Methods Male Wistar rats were divided into 3 groups: non-stressed controls, isolated rats subjected to the CMS protocol, and resident intruder paradigm-exposed rats subjected to the CMS protocol. Results In the sucrose intake test, ingestion of a 1% sucrose solution by rats in the CMS group was significantly lower than in control and CMS+RIP rats after 3 weeks of stress. In the open-field test, CMS rats had significantly lower open-field scores compared to control rats. Furthermore, the total scores given the CMS group were significantly lower than in the CMS+RIP rats. In the forced swimming test (FST), the immobility times of CMS rats were significantly longer than those of the control or CMS+RIP rats. However, no differences were observed between controls and CMS+RIP rats. Conclusions Our data show that aggressive behavior evoked by the resident intruder paradigm could relieve broad-spectrum depressive-like behaviors in isolated adult male rats subjected to CMS. PMID:24911067

  6. Inadvertent yellow fever vaccination of a patient with Crohn's disease treated with infliximab and methotrexate

    DEFF Research Database (Denmark)

    Ekenberg, C.; Friis-Møller, N.; Ulstrup, Thomas

    2016-01-01

    We present a case of a 56-year-old woman with Crohn's disease, treated with methotrexate and infliximab, who inadvertently received yellow fever vaccination (YFV) prior to a journey to Tanzania. She was not previously vaccinated against YF. YFV contains live-attenuated virus, and is contraindicated...... in patients treated with immunosuppressive drugs. Following vaccination, the patient fell ill with influenza-like illness. Elevated transaminase levels and YF viremia were detected. Despite being immunocompromised, the patient did not develop more severe adverse effects. Neutralising antibodies to YF virus...... were detected on day 14 following vaccination and remained protective at least 10 months after vaccination. Limited data is available on outcomes of YFV in patients receiving immunosuppressive therapy, including biologics, and we report this case as a reminder of vigilance of vaccine recommendations...

  7. Method and apparatus for preventing inadvertent criticality in a nuclear fueled electric power generating unit

    International Nuclear Information System (INIS)

    Tuley, C.R.; Bauman, D.A.; Neuner, J.A.; Feilchenfeld, M.M.; Greenberg, L.

    1984-01-01

    An inadvertent approach to criticality in a nuclear fueled electric power generating unit is detected and an alarm is generated through on-line monitoring of the neutron flux. The difficulties of accurately measuring the low levels of neutron flux in a subcritical reactor are overcome by the use of a microcomputer which continuously generates average flux count rate signals for incremental time periods from thousands of samples taken during each such period and which serially stores the average flux count rate signals for a preselected time interval. At the end of each incremental time period, the microcomputer compares the latest average flux count rate signal with the oldest, and preferably each of the intervening stored values, and if it exceeds any of them by at least a preselected multiplication factor, an alarm is generated. (author)

  8. The availability of soil-associated radionuclides for uptake after inadvertent ingestion by humans

    International Nuclear Information System (INIS)

    Shaw, S.; Green, N.

    2002-01-01

    Assessments of the radiological impact of radionuclides released into the environment generally take into account the inadvertent ingestion of radionuclides associated with soil or sediment. Such assessments often assume that gut uptake factors for radionuclides that are biologically incorporated in food are also applicable when the ingested activity is associated with soil. Studies of the availability of soil-associated radionuclides after ingestion have been mainly conducted on ruminant animals and few data exist for humans. The digestive tract of ruminants is totally different from that of a mono-gastric animal and so the availability estimated from the animal studies may not be valid in the case of man. A simple in-vitro enzymolysis procedure was therefore developed to simulate human digestion closely. The measured availability of 137 Cs, 241 Am, 239 PU and 90 Sr associated with loam, sand and peat soils was about 3%, 3%, 10% and 50% respectively. (author)

  9. Inadvertent Apical Extrusion of Sodium Hypochlorite with Evaluation by Dental Volumetric Tomography

    Directory of Open Access Journals (Sweden)

    Elif Delve Başer Can

    2015-01-01

    Full Text Available This case report describes the tissue injury caused by inadvertently extruded NaOCl through the apical constriction. A 56-year-old female patient with complaints of pain, swelling, and ecchymosis on the left side of her face was referred to our clinic. The symptoms had emerged following root canal treatment of the maxillary left first premolar, and a soft tissue complication due to apical extrusion of NaOCl was diagnosed. Antibiotics and analgesics were prescribed. DVT images revealed that the buccal root apex had perforated the maxillary bone. The patient was followed up every other day and became asymptomatic on the 10th day. Endodontic therapy was completed with routine procedures. Determining working length precisely and following irrigation protocols meticulously are indispensable to prevent this type of complication. 3D visualization of the affected area may reveal the cause of the incident.

  10. Investigations on the inadvertent power increase in a PHWR as ASSET experience

    International Nuclear Information System (INIS)

    Kumar, S.H.

    1996-01-01

    Investigations were carried out using the ASSET methodology to find out the root cause of an incident involving inadvertent increase in reactor power in the Unit 1 of Narora Atomic Power Station (NAPS) in India. NAPS is a twin Unit, 220 MWe PHWR based power station. On December 4, 1992, when NPAS Unit 1 was operating at 130 MWe, the reactor power increased steadily on its own and touched 147 MWe, over a period of 14 minutes. The set (demand) power of the triplicated reactor regulating system had increased on its own and in turn has made the reactor to operated at higher power. The power was brought down to 120 MWe by manual intervention. Since adequate system related data during the incident was not available, laboratory studies were carried out using computer simulations for the various process disturbances which could affect the reactor regulating system, for establishing the causes of the event. 4 figs

  11. Investigations on the inadvertent power increase in a PHWR as ASSET experience

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, S H [Operating Plants Safety Div., Atomic Energy Regulatory Board, Mumbai (India)

    1997-12-31

    Investigations were carried out using the ASSET methodology to find out the root cause of an incident involving inadvertent increase in reactor power in the Unit 1 of Narora Atomic Power Station (NAPS) in India. NAPS is a twin Unit, 220 MWe PHWR based power station. On December 4, 1992, when NPAS Unit 1 was operating at 130 MWe, the reactor power increased steadily on its own and touched 147 MWe, over a period of 14 minutes. The set (demand) power of the triplicated reactor regulating system had increased on its own and in turn has made the reactor to operated at higher power. The power was brought down to 120 MWe by manual intervention. Since adequate system related data during the incident was not available, laboratory studies were carried out using computer simulations for the various process disturbances which could affect the reactor regulating system, for establishing the causes of the event. 4 figs.

  12. Management of traumatically intruded permanent maxillary lateral incisor - Case report and review of literature

    Directory of Open Access Journals (Sweden)

    Deepak Sharma

    2016-01-01

    Full Text Available Primary etiologic factors of trauma in the permanent dentition are bicycle accidents, sports accidents, falls, and fights. From the standpoint of therapy, anatomy, and prognosis, five different types of luxation lesions are recognized: Concussion, subluxation, extrusive luxation, lateral luxation, and intrusive luxation. Intrusive luxation is apical displacement of tooth into the alveolar bone. The tooth is driven into the socket, compressing the periodontal ligament, and commonly causes a crushing fracture of the alveolar socket. It is considered one of the most severe luxation injuries to affect permanent teeth. Intrusion injuries are often associated with severe damage to the tooth, periodontium, and pulpal tissue. The rare occurrence of this injury, 0.3–1.9% in the permanent dentition, has resulted in limited studies to support suggested treatment regimens. Clinical treatment for intrusion is especially difficult because of the severe complications accompanying it. These complications include pulp necrosis or obliteration, inflammatory root resorption, ankylosis, replacement root resorption, and loss of marginal bone support. Hence, the aim of presenting this case report of intrusive luxation is to highlight the importance of prompt care and root canal dressing and discuss the several treatments proposed to reposition the intruded teeth.

  13. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    International Nuclear Information System (INIS)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K.

    2016-01-01

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid’s thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  14. Female song rates in response to simulated intruder are positively related to reproductive success.

    Directory of Open Access Journals (Sweden)

    Kristal E Cain

    2015-10-01

    Full Text Available Bird song is well studied in males as a sexually selected behavior. However, although song is also common among females, it is infrequently examined and poorly understood. Research suggests that song is often used as a resource defense behavior and is important in female-female competition for limited resources, e.g. mates and territories. If so, song should be positively related to fitness and related to other resource defense behaviors, but this possibility has rarely been explored. Here we examine fitness estimates in relation to spontaneous song rates and song rates in response to a simulated intruder (playback, in the superb fairy-wren (Malurus cyaneus, a cooperatively breeding songbird. We also determine how song rates relate to other territorial defense behaviors. Song rate in response to playback, but not spontaneous song rate, was positively related to nest success and the number of fledglings produced by successful females. Further, response song rate was also correlated with other territorial defense behaviors (latency to respond and flights. This evidence supports the hypothesis that female song may be used in the context of female-female competition to improve access to limited reproductive resources, and suggests that song may provide direct fitness benefits.

  15. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    Energy Technology Data Exchange (ETDEWEB)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K., E-mail: prodip.das@ncl.ac.uk [School of Mechanical and Systems Engineering Newcastle University Newcastle upon Tyne, NE1 7RU United Kingdom (United Kingdom)

    2016-07-12

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid’s thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  16. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    Science.gov (United States)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K.

    2016-07-01

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid's thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  17. Flight Test Evaluation of AVOID I (Avionic Observation of Intruder Danger) Collision Avoidance System

    Science.gov (United States)

    1975-05-01

    memory registers A through G ( 2048 bit shift registers) for each of the basic altitude bands (1+26, 113 1+6) to store intruder responses. Since the 1...af EV 11z iIIV~ ~l~~ NADlC-75056-60_ _ _- 2 w< -I- LI- ~jw 0IU oo2 W I aJ W %L6fI9~~AVdI tVOV~ aN9Ao ccH % VdI I11813iA-di V GN Ed a3IV0 %AIII1IilV11W...tei mix ;;; c le z - Is’ %~~~~~~~~~~;s AJIiV1 VdI ~ %AIIV~ v~iO VIR 1ý 123 Lz NADC-7056-6 w, M w o ~2IV ONY Ed CIRNIGVNOO at p 00 CLt % 118I3iAVldSIC3

  18. Intruder dose pathway analysis for the onsite disposal of commercial radioactive waste

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.

    1984-10-01

    Because of uncertainties associated with assessing the potential risks from onsite burials of commercial radioactive waste, the US Nuclear Regulatory Commission (NRC) has amended its regulations to provide greater assurance that buried radioactive material will not present a hazard to public health and safety. The amended regulations now require licensees to apply for approval of proposed procedures for onsite disposal pursuant to 10 CFR 20.302. The NRC technically reviews these requests on a case-by-case basis. These technical reviews require modeling potential pathways to man and projecting radiation dose commitments. This paper contains a summary of our efforts to develop human-intrusion scenarios and to modify a version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. The ONSITE/MAXI1 computer software package contains four computer codes. ONSITE is the interactive user interface that allows the end-user to simply and efficiently create and use the radiation-exposure scenarios. MAXI1 is then used with the scenario information to calculate the maximum annual dose to the exposed individual from selected pathways. 1 figure

  19. Endovascular repair of inadvertent arterial injury induced by central venous catheterization using a vascular closure device: A case report

    Energy Technology Data Exchange (ETDEWEB)

    Kim, So Hee; Jang, Woo Jin; Oh, Ju Heyon; Song, Yun Gyu [Samsung Changwon Hospital, Sungkyunkwan University School of Medicine, Changwon (Korea, Republic of)

    2017-04-15

    Central venous catheterization can cause various complications. Inadvertent subclavian artery catheterization was performed during insertion of a central venous catheter in a 73-year-old man suffering from panperitonitis due to small-bowel perforation. Endovascular treatment was conducted to treat the injured subclavian artery with a FemoSeal vascular closure device.

  20. 13 CFR 126.308 - What happens if SBA inadvertently omits a qualified HUBZone SBC from the List?

    Science.gov (United States)

    2010-01-01

    ... writing at U.S. Small Business Administration, 409 Third Street, SW., Washington, DC 20416 or via e-mail... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What happens if SBA inadvertently omits a qualified HUBZone SBC from the List? 126.308 Section 126.308 Business Credit and Assistance...

  1. 46 CFR 308.536 - Declaration where failure to comply with Clause 21 was inadvertent, Form MA-314.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION EMERGENCY OPERATIONS WAR RISK INSURANCE War Risk Cargo Insurance Ii-Open Policy War Risk Cargo... Assured that fails inadvertently to maintain a collateral deposit fund or surety bond in an amount..., which may be obtained from the American War Risk Agency or MARAD. III—Facultative War Risk Cargo...

  2. Influence of i13/2 proton and j15/2 neutron intruding orbitals on the behaviour of 190 mass region superdeformed nuclei

    International Nuclear Information System (INIS)

    Duprat, J.

    1995-01-01

    This work concerns the study of the nuclear superdeformation phenomenon in the A = 190 mass region. The superdeformed (SD) states in 193 Tl, 194 Tl 195 Tl were produced via heavy-ion induced reactions and studied with the EUROGAM gamma multidetector array. The analysis of high-multiplicity events allowed the study of the magnetic properties of the SD states in these nuclei. For the first time, the g-factor of a proton orbital in a SD nucleus in the A = 190 mass region has been extracted. This measurement indicates that the two known bands in 195 Tl-SD are built on the i 13/2 proton intruder orbital. A new SD band has been found in this isotope: it is the first SD band built on an excited proton state found in the A = 190 region. Finally an interaction between two pairs of bands has been established in 194 Tl; this interaction indicate the crossing of two neutron orbitals above the N = 112 gap. The magnetic properties of the states of the SD bands in 194 Tl reveals that these bands are built on configurations in which the single proton and neutron intrinsic spins are aligned. Comparison between different SD bands in the Thallium isotopes shows the prominent role of the i 13/2 proton and the j 15/2 neutron intruder orbitals in the smooth increase of the dynamical moment of inertia as a function of the rotational frequency. In addition, this work reports on the first observation of a SD rotational band produced in a (HI, αxn) reaction channel. The study of the maximum spin reached by the SD bands indicates both a competition between alpha emission and fission of the compound nucleus, and the limitation due to the fission process in the population of the SD nuclei in the A = 190 region. (author). 120 refs., 112 figs., 22 tabs., 2 ann

  3. Anatomy of an intruded coal, I: Effect of contact metamorphism on whole-coal geochemistry, Springfield (No. 5) (Pennsylvanian) coal, Illinois Basin

    Energy Technology Data Exchange (ETDEWEB)

    Rimmer, Susan M. [Department of Geology, Southern Illinois University Carbondale, Carbondale, IL 62901 (United States); Yoksoulian, Lois E. [Department of Earth and Environmental Sciences, University of Kentucky, Lexington, KY 40506 (United States); Hower, James C. [Center for Applied Energy Research, University of Kentucky, 2540 Research Park Drive, Lexington, KY 40511 (United States)

    2009-08-01

    If time and heating rate are important agents in coal maturation, one might expect to see differences in chemical changes in response to maturation depending on the means of increased rank. Using a suite of samples obtained from an intruded Pennsylvanian-age coal in southern Illinois, we present whole-coal chemical data. Comparing these data to extant geochemical data for coals that have undergone normal burial maturation, we evaluated the hypothesis that if coal alteration occurs rapidly (due to intrusion) rather than gradually (burial maturation), then different relationships are seen in chemical composition (proximate and ultimate analyses) and vitrinite reflectance. The Pennsylvanian-age (Asturian [Westphalian D]) Springfield (No. 5) coal is mined at the Big Ridge Mine, near Eldorado, southern Illinois. This high volatile B bituminous coal was intruded by an ultramafic igneous intrusion during the early Permian. Alteration occurs out to {proportional_to} 1.2 x dike thickness and includes an increase in random vitrinite reflectance (R{sub m}) from levels {proportional_to} 0.7% to over 5.3%, loss of liptinites, and formation of devolatilization vacuoles and fine mosaic texture. Decreases in volatile matter (VM) and increases in fixed carbon (FC) appear to be less than would be expected for the level of reflectance seen within the alteration halo. Carbonate minerals have a major influence on proximate analyses but even following the removal of carbonates, the decrease in VM is still less than would be seen in coals of similar vitrinite reflectance that were altered by normal burial maturation. Carbonate mineralization also contributes to variability in ultimate analysis values approaching the intrusion, particularly for %C and %O. After carbonate removal, data for these coals do not appear to follow the normal burial coalification tracks when plotted on a van Krevelen diagram and on a Seyler chart. These differences suggest that a slightly different maturation

  4. Evolution of the Collectivity around 68Ni: role of intruder states

    International Nuclear Information System (INIS)

    Dijon, A.

    2012-01-01

    The evolution of magic numbers as a function of the neutron number for a given chain of isotopes is one of the major goals of nuclear physics today. Changing magic numbers may lead to profound modifications in the structure of exotic nuclei and manifest themselves experimentally in rapid changes of collectivity and shapes. In this thesis we have studied nuclei around 68 Ni produced in deep inelastic collisions at GANIL. The nuclei of interest were selected and identified by the large acceptance VAMOS recoil spectrometer. Their structure was studied via the detection of the gamma rays emitted at the target point by the EXOGAM array. In one of the two experiments we also installed a specific setup dedicated to the measurements of the delayed gamma rays emitted by the nuclei after their implantation at the focal plane of VAMOS. In the first experiment we have observed a new isomeric state in 68 Ni with a proton intruder configuration at an excitation energy which sensitively depends on the Z=28 and N=40 shell gaps. New transitions were also identified in odd-mass isotopes of Co, Fe and Mn. In the second experiment we have measured the lifetimes of the first-excited states in 63,65 Co using the recoil distance Doppler shift method. From these lifetimes electromagnetic transition probabilities could be deduced, which in turn shed light on the collectivity of the studied isotopes. Comparisons with the shell model and with mean field calculations were carried and provided additional information on the proton-neutron interaction as well as on the evolution of the collectivity in this mass region. (author) [fr

  5. Measuring virgin female aggression in the female intruder test (FIT): effects of oxytocin, estrous cycle, and anxiety.

    Science.gov (United States)

    de Jong, Trynke R; Beiderbeck, Daniela I; Neumann, Inga D

    2014-01-01

    The costs of violence and aggression in our society have stimulated the scientific search for the predictors and causes of aggression. The majority of studies have focused on males, which are considered to be more aggressive than females in most species. However, rates of offensive behavior in girls and young women are considerable and are currently rising in Western society. The extrapolation of scientific results from males to young, non-maternal females is a priori limited, based on the profound sex differences in brain areas and functioning of neurotransmitters involved in aggression. Therefore, we established a paradigm to assess aggressive behavior in young virgin female rats, i.e. the female intruder test (FIT). We found that approximately 40% of un-manipulated adult (10-11 weeks old) female Wistar rats attack an intruder female during the FIT, independent of their estrous phase or that of their intruder. In addition, adolescent (7-8 weeks old) female rats selected for high anxiety behavior (HABs) displayed significantly more aggression than non-selected (NAB) or low-anxiety (LAB) rats. Intracerebroventricular infusion of oxytocin (OXT, 0.1 µg/5 µl) inhibited aggressive behavior in adult NAB and LAB, but not HAB females. Adolescent NAB rats that had been aggressive towards their intruder showed increased pERK immunoreactivity (IR) in the hypothalamic attack area and reduced pERK-IR in OXT neurons in the paraventricular hypothalamic nucleus compared to non-aggressive NAB rats. Taken together, aggressive behavior in young virgin female rats is partly dependent on trait anxiety, and appears to be under considerable OXT control.

  6. Measuring virgin female aggression in the female intruder test (FIT: effects of oxytocin, estrous cycle, and anxiety.

    Directory of Open Access Journals (Sweden)

    Trynke R de Jong

    Full Text Available The costs of violence and aggression in our society have stimulated the scientific search for the predictors and causes of aggression. The majority of studies have focused on males, which are considered to be more aggressive than females in most species. However, rates of offensive behavior in girls and young women are considerable and are currently rising in Western society. The extrapolation of scientific results from males to young, non-maternal females is a priori limited, based on the profound sex differences in brain areas and functioning of neurotransmitters involved in aggression. Therefore, we established a paradigm to assess aggressive behavior in young virgin female rats, i.e. the female intruder test (FIT. We found that approximately 40% of un-manipulated adult (10-11 weeks old female Wistar rats attack an intruder female during the FIT, independent of their estrous phase or that of their intruder. In addition, adolescent (7-8 weeks old female rats selected for high anxiety behavior (HABs displayed significantly more aggression than non-selected (NAB or low-anxiety (LAB rats. Intracerebroventricular infusion of oxytocin (OXT, 0.1 µg/5 µl inhibited aggressive behavior in adult NAB and LAB, but not HAB females. Adolescent NAB rats that had been aggressive towards their intruder showed increased pERK immunoreactivity (IR in the hypothalamic attack area and reduced pERK-IR in OXT neurons in the paraventricular hypothalamic nucleus compared to non-aggressive NAB rats. Taken together, aggressive behavior in young virgin female rats is partly dependent on trait anxiety, and appears to be under considerable OXT control.

  7. Passive Barriers to Inadvertent Human Intrusion for Use at the Nevada Test Site

    International Nuclear Information System (INIS)

    NSTec Environmental Management

    2007-01-01

    In July1996, BN transmitted Passive Barriers to Inadvertent Human Intrusion for Use at the Nevada Test Site to the United States Department of Energy, under Contract DE-AC08-91NV10833. The 1996 paper had a limited distribution and was not reviewed for public release. In 2007, National Security Technologies LLC (NSTec) made minor revisions to conform to current editorial standards of the NNSA/NSO and to meet current security requirements for public release. The primary purpose of this study was to identify types of engineered passive barriers that could deter future intrusion into buried low-level radioactive waste, particularly intrusion by drilling water wells. The study considered drilling technology, many natural and man-made materials, and both underground and above-ground barriers. Based on cost and effectiveness, the report recommended underground barriers consisting of a layer of rubble or tires. An aboveground barrier mound might also prove effective, but would cost more, and may become an attractive nuisance (e.g., might, after their purpose has been forgotten, encourage exploration for the sake of satisfying curiosity). Advances in drilling technology could render any engineered barriers ineffective if there is motivation to penetrate the barriers

  8. Inadvertent recovery in communication deficits following the upper limb mirror therapy in stroke: A case report.

    Science.gov (United States)

    Arya, Kamal Narayan; Pandian, Shanta

    2014-10-01

    Broca's aphasia is the most challenging communication deficit in stroke. Left inferior frontal gyrus (IFG), a key region of the mirror-neuron system, gets lesioned in Broca's aphasia. Mirror therapy (MT), a form of action-observation, may trigger the mirror neurons. The aim of this study was to report a case of poststroke subject with Broca's aphasia, who exhibited an inadvertent and significant improvement in speech after MT for the paretic upper limb. The 20-month old stroke patient underwent MT through goal-directed tasks. He received a total absence of spontaneous speech, writing, and naming. After 45 sessions of task-based MT for the upper limb, he showed tremendous recovery in expressive communication. He had fluent and comprehensive communication; however, with a low pitch and minor pronunciation errors. He showed a substantial change (from 18/100 to 79/100) on the Communicative Effective Index, particularly, on items such as expressing emotions, one-to-one conversation, naming, and spontaneous conversation. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Sinus anatomy associated with inadvertent cerebrospinal fluid leak during functional endoscopic sinus surgery.

    Science.gov (United States)

    Heaton, Chase M; Goldberg, Andrew N; Pletcher, Steven D; Glastonbury, Christine M

    2012-07-01

    Anatomic variations in skull base anatomy may predispose the surgeon to inadvertent skull base injury with resultant cerebrospinal fluid (CSF) leak during functional endoscopic sinus surgery (ESS). Our objective was to compare preoperative sinus imaging of patients who underwent FESS with and without CSF leak to elucidate these variations. In this retrospective case-control study, 18 patients with CSF leak following FESS for chronic rhinosinusitis (CRS) from 2000 to 2011 were compared to 18 randomly selected patients who underwent preoperative imaging for FESS for CRS. Measurements were obtained from preoperative computed tomography images with specific attention to anatomic differences in cribriform plate and ethmoid roof heights in the coronal plane, and the skull base angle in the sagittal plane. Mean values of measured variables were compared using a nonparametric Mann-Whitney test. When compared to controls, patients with CSF leak demonstrated a greater angle of the skull base in the sagittal plane (P variations may help to prevent iatrogenic CSF leak. Copyright © 2012 The American Laryngological, Rhinological, and Otological Society, Inc.

  10. Causal Analysis of the Inadvertent Contact with an Uncontrolled Electrical Hazardous Energy Source (120 Volts AC)

    Energy Technology Data Exchange (ETDEWEB)

    David E. James; Dennis E. Raunig; Sean S. Cunningham

    2014-10-01

    On September 25, 2013, a Health Physics Technician (HPT) was performing preparations to support a pneumatic transfer from the HFEF Decon Cell to the Room 130 Glovebox in HFEF, per HFEF OI 3165 section 3.5, Field Preparations. This activity involves an HPT setting up and climbing a portable ladder to remove the 14-C meter probe from above ball valve HBV-7. The HPT source checks the meter and probe and then replaces the probe above HBV-7, which is located above Hood ID# 130 HP. At approximately 13:20, while reaching past the HBV-7 valve position indicator switches in an attempt to place the 14-C meter probe in the desired location, the HPT’s left forearm came in contact with one of the three sets of exposed terminals on the valve position indication switches for HBV 7. This resulted in the HPT receiving an electrical shock from a 120 Volt AC source. Upon moving the arm, following the electrical shock, the HPT noticed two exposed electrical connections on a switch. The HPT then notified the HFEF HPT Supervisor, who in turn notified the MFC Radiological Controls Manager and HFEF Operations Manager of the situation. Work was stopped in the area and the hazard was roped off and posted to prevent access to the hazard. The HPT was escorted by the HPT Supervisor to the MFC Dispensary and then preceded to CFA medical for further evaluation. The individual was evaluated and released without any medical restrictions. Causal Factor (Root Cause) A3B3C01/A5B2C08: - Knowledge based error/Attention was given to wrong issues - Written Communication content LTA, Incomplete/situation not covered The Causal Factor (root cause) was attention being given to the wrong issues during the creation, reviews, verifications, and actual performance of HFEF OI-3165, which covers the need to perform the weekly source check and ensure placement of the probe prior to performing a “rabbit” transfer. This resulted in the hazard not being identified and mitigated in the procedure. Work activities with in HFEF-OI-3165 placed the HPT in proximity of an unmitigated hazard directly resulting in this event. Contributing Factor A3B3C04/A4B5C04: - Knowledge Based Error, LTA Review Based on Assumption That Process Will Not Change - Change Management LTA, Risks/consequences associated with change not adequately reviewed/assessed Prior to the pneumatic system being out of service, the probe and meter were not being source checked together. The source check issue was identified and addressed during the period of time when the system was out of service. The corrective actions for this issue resulted in the requirement that a meter and probe be source checked together as it is intended to be used. This changed the activity and required an HPT to weekly, when in use, remove and install the probe from above HBV-7 to meet the requirement of LRD 15001 Part 5 Article 551.5. Risks and consequences associated with this change were not adequately reviewed or assessed. Failure to identify the hazard associated with this change directly contributed to this event.

  11. Long-Term Performance of Transuranic Waste Inadvertently Disposed in a Shallow Land Burial Trench at the Nevada Test Site

    International Nuclear Information System (INIS)

    Shott, Gregory J.; Yucel, Vefa

    2009-01-01

    In 1986, 21 m3 of transuranic (TRU) waste was inadvertently disposed in a shallow land burial trench at the Area 5 Radioactive Waste Management Site on the Nevada Test Site. U.S. Department of Energy (DOE) TRU waste must be disposed in accordance with Title 40, Code of Federal Regulations (CFR), Part 191, Environmental Radiation Protection Standard for Management and Disposal of Spent Nuclear Fuel, High-Level, and Transuranic Radioactive Wastes. The Waste Isolation Pilot Plant is the only facility meeting these requirements. The National Research Council, however, has found that exhumation of buried TRU waste for disposal in a deep geologic repository may not be warranted when the effort, exposures, and expense of retrieval are not commensurate with the risk reduction achieved. The long-term risks of leaving the TRU waste in-place are evaluated in two probabilistic performance assessments. A composite analysis, assessing the dose from all disposed waste and interacting sources of residual contamination, estimates an annual total effective dose equivalent (TEDE) of 0.01 mSv, or 3 percent of the dose constraint. A 40 CFR 191 performance assessment also indicates there is reasonable assurance of meeting all requirements. The 40 CFR 191.15 annual mean TEDE for a member of the public is estimated to reach a maximum of 0.055 mSv at 10,000 years, or approximately 37 percent of the 0.15 mSv individual protection requirement. In both assessments greater than 99 percent of the dose is from co-disposed low-level waste. The simulated probability of the 40 CFR 191.13 cumulative release exceeding 1 and 10 times the release limit is estimated to be 0.0093 and less than 0.0001, respectively. Site characterization data and hydrologic process modeling support a conclusion of no groundwater pathway within 10,000 years. Monte Carlo uncertainty analysis indicates that there is reasonable assurance of meeting all regulatory requirements. Sensitivity analysis indicates that the results

  12. Inadvertent Splenectomy During Resection for Colorectal Cancer Does Not Increase Long-term Mortality in a Propensity Score Model

    DEFF Research Database (Denmark)

    Lolle, Ida; Pommergaard, Hans-Christian; Schefte, David F

    2016-01-01

    BACKGROUND: Previous studies suggest that long-term mortality is increased in patients who undergo splenectomy during surgery for colorectal cancer. The reason for this association remains unclear. OBJECTIVE: The purpose of this study was to investigate the association between inadvertent...... splenectomy attributed to iatrogenic lesion to the spleen during colorectal cancer resections and long-term mortality in a national cohort of unselected patients. DESIGN: This was a retrospective, nationwide cohort study. SETTINGS: Data were collected from the database of the Danish Colorectal Cancer Group...... for patients surviving 30 days after surgery. Secondary outcomes were 30-day mortality and risk factors for inadvertent splenectomy. Multivariable and propensity-score matched Cox regression analyses were used to adjust for potential confounding. RESULTS: In total, 23,727 patients were included, of which 277...

  13. Les femmes et le langage selon Charles Bally: "des moments de décevante inadvertance"?

    Directory of Open Access Journals (Sweden)

    Durrer, Sylvie

    2002-01-01

    Full Text Available Les problématiques rassemblées parfois sous la désignation de "Language and Gender" figurent également dans les publications du linguiste suisse Charles Bally. Cet axe de réflexion, qui n’a guère été remarqué dans son œuvre, mérite d’être mis en lumière, non pas pour faire de Bally un féministe avant l’heure, mais simplement, parce qu’il nous semble important de documenter l’histoire d’une problématique en plein essor. Cet article a donc pour objectif de montrer que la question du traitement des femmes et du féminin par la langue française suscite de nombreuses réflexions dès la fin du XIXe. Il s’agira de procéder à une histoire critique d’un épisode de la "linguistique générique", afin de voir si les actuelles thématiques de cette orientation sont abordées, sous quels aspects, dans quels contextes, avec quels résultats, etc. On pourrait alors être surpris-e de découvrir que Charles Bally n’était pas un cas isolé, mais qu’un grand nombre de contemporains (Nyrop, Brunot, Vendryès, Damourette & Pichon, Dauzat, etc., se sont eux aussi interrogés, plus ou moins longuement, sur les rapports entre les femmes, le féminin et le langage. Les réflexions "génériques" de Bally et de ses confrères ne sauraient donc être regardées comme de simples "moments décevante inadvertance".

  14. The social image of drinking - mass media campaigns may inadvertently increase binge drinking.

    Science.gov (United States)

    Zimmermann, Friederike; Kohlmann, Karoline; Monter, Anne; Ameis, Nina

    2017-10-01

    Mass media campaigns that promote responsible drinking are rarely tested for their usefulness in reducing heavy alcohol consumption. Existing campaigns that appeal to responsible drinking while simultaneously displaying young people in social drinking situations may even have paradoxical effects. To examine such possible effects, we drew on a real-world media campaign, which we systematically modified on the basis of recent prototype research. We pilot tested questionnaires (using n = 41 participants), developed two different sets of posters in the style of an existing campaign (n = 39) and investigated their effectiveness (n = 102). In the main study, young men were randomly assigned to one of three conditions: sociable or unsociable binge drinker prototype condition or a control group. Outcome variables were intention, behavioural willingness, attitude, subjective norm, self-efficacy, prototype evaluation and prototype similarity with respect to binge drinking. Binge drinking as a habit was included to control for the fact that habitual drinking in social situations is hard to overcome and poses a particular challenge to interventions. The manipulation check showed that the experimental variation (sociable vs. unsociable drinker prototype condition) was successful. Results of the main study showed that the sociable drinker prototype condition resulted in a higher willingness and - for those with less of a habit - a higher intention to binge drink the next weekend. The unsociable drinker prototype condition had no effects. The results imply that the social components of mass media campaigns might inadvertently exacerbate binge drinking in young men. We therefore advocate against campaigns including aspects of alcohol consumption that might be positively associated with drinker prototype perception. Finally, we provide suggestions for future research.

  15. Comparison of resistive heating and forced-air warming to prevent inadvertent perioperative hypothermia.

    Science.gov (United States)

    John, M; Crook, D; Dasari, K; Eljelani, F; El-Haboby, A; Harper, C M

    2016-02-01

    Forced-air warming is a commonly used warming modality, which has been shown to reduce the incidence of inadvertent perioperative hypothermia (heating mattresses offer a potentially cheaper alternative, however, and one of the research recommendations from the National Institute for Health and Care Excellence was to evaluate such devices formally. We conducted a randomized single-blinded study comparing perioperative hypothermia in patients receiving resistive heating or forced-air warming. A total of 160 patients undergoing non-emergency surgery were recruited and randomly allocated to receive either forced-air warming (n=78) or resistive heating (n=82) in the perioperative period. Patient core temperatures were monitored after induction of anaesthesia until the end of surgery and in the recovery room. Our primary outcome measures included the final intraoperative temperature and incidence of hypothermia at the end of surgery. There was a significantly higher rate of hypothermia at the end of surgery in the resistive heating group compared with the forced-air warming group (P=0.017). Final intraoperative temperatures were also significantly lower in the resistive heating group (35.9 compared with 36.1°C, P=0.029). Hypothermia at the end of surgery in both warming groups was common (36% forced air warming, 54% resistive heating). Our results suggest that forced-air warming is more effective than resistive heating in preventing postoperative hypothermia. NCT01056991. © The Author 2016. Published by Oxford University Press on behalf of the British Journal of Anaesthesia. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  16. Experience during the monitoring of inactive scrap for the detection of inadvertent presence of radioactivity

    International Nuclear Information System (INIS)

    Sharma, Ranjit; Kumar, Anoj; Vikas; Patra, R.P.; Kumar, Vikas; Singh, Rajvir; Pradeepkumar, K.S.

    2012-01-01

    The inspection and certification of scrap material from nuclear facilities is a regulatory requirement to ensure that radioactive material will not reach public domain. Around the world, cases involving radioactive contamination of metallic components have occurred due to radioactive sources/contaminated metal scrap reaching the public domain. Radiological monitoring of inactive scrap material is essential as it may get into various usages in public domain where controls cannot be implemented. The method of detection is measurement of gamma dose rates due to any loose/fixed radioactive contamination in the scrap or presence of any radioactive material/source. In addition prevention of any inadvertent/malicious act leading to radioactive material reaching the public domain through scrap being essential, this monitoring gains further importance. This paper describes the methodology and experience in detection of presence of radioactivity at inactive Scrap monitoring facility. Even though radioactive sources of high strength with potential for serious environmental hazard have not been detected, few cases of contaminated material (MS plate/equipments etc with extremely low level of 137 Cs and Uranium contamination) have been detected and identified using portable gamma spectrometer. If proper monitoring is not carried out the dispersal of radioactivity to the environment can be a matter of concern due to metal scrap reaching recycling industry resulting in huge cost of decontamination and waste disposal. These events may also have negative impact on the export from the country resulting in economic losses. The impact of such events can be ruled out by effective scrap monitoring techniques which ensure that even small quantity of radioactivity escaping into public domain can be prevented. The methodology followed for monitoring of inactive scrap is found to be effective even for detection of presence of very low level of radioactivity

  17. Safety significance of inadvertent operation of motor-operated valves in nuclear power plants

    International Nuclear Information System (INIS)

    Ruger, C.J.; Higgins, J.C.; Carbonaro, J.F.; Hall, R.E.

    1994-01-01

    Concerns about the consequences of valve mispositioning were brought to the forefront following an event at Davis Besse in 1985. The concern related to the ability to reposition open-quotes position-changeableclose quotes motor-operated valves (MOVs) from the control room in the event of their inadvertent operation and was documented in U.S. Nuclear Regulatory Commission (USNRC) Bulletin 85-03 and Generic Letter (GL) 89-10. The mispositioned MOVs may not be able to be returned to their required position due to high differential pressure or high flow conditions across the valves. The inability to reposition such valves may have significantly safety consequences, as in the Davis Besse event. However, full consideration of such mispositioning in safety analyses and in MOV test programs can be labor intensive and expensive. Industry raised concerns that consideration of position-changeable valves under GL 89-10 would not decrease the probability of core damage to an extent that would justify licensee costs. As a response, Brookhaven National Laboratory has conducted separate scoping studies for both boiling water reactors (BWRs) and pressurized water reactors (PWRs) using probabilistic risk assessment (PRA) techniques to determine if such valve mispositioning by itself is significant to safety. The approach used internal events PRA models to survey the order of magnitude of the risk-significance of valve mispositioning by considering the failure of selected position-changeable MOVs. The change in core damage frequency was determined for each valve considered, and the results were presented as a risk increase ratio for each of four assumed MOV failure rates. The risk increase ratios resulting from this failure rate sensitivity study can be used as a basis for a determination of the risk-significance of the MOV mispositioning issues for BWRs and PWRs

  18. Effect of intruder mass on collisions with hard binaries. II - Dependence on impact parameter and computations of the interaction cross sections

    Science.gov (United States)

    Hills, J. G.

    1992-06-01

    Over 125,000 encounters between a hard binary with equal mass, components and orbital eccentricity of 0, and intruders with solar masses ranging from 0.01 to 10,000 are simulated. Each encounter was followed up to a maximum of 5 x 10 exp 6 integration steps to allow long-term 'resonances', temporary trinary systems, to break into a binary and a single star. These simulations were done over a range of impact parameters to find the cross sections for various processes occurring in these encounters. A critical impact parameter found in these simulations is the one beyond which no exchange collisions can occur. The energy exchange between the binary and a massive intruder decreases greatly in collisions with Rmin of not less than Rc. The semimajor axes and orbital eccentricity of the surviving binary also drops rapidly at Rc in encounters with massive intruders. The formation of temporary trinary systems is important for all intruder masses.

  19. Active body surface warming systems for preventing complications caused by inadvertent perioperative hypothermia in adults.

    Science.gov (United States)

    Madrid, Eva; Urrútia, Gerard; Roqué i Figuls, Marta; Pardo-Hernandez, Hector; Campos, Juan Manuel; Paniagua, Pilar; Maestre, Luz; Alonso-Coello, Pablo

    2016-04-21

    Inadvertent perioperative hypothermia is a phenomenon that can occur as a result of the suppression of the central mechanisms of temperature regulation due to anaesthesia, and of prolonged exposure of large surfaces of skin to cold temperatures in operating rooms. Inadvertent perioperative hypothermia has been associated with clinical complications such as surgical site infection and wound-healing delay, increased bleeding or cardiovascular events. One of the most frequently used techniques to prevent inadvertent perioperative hypothermia is active body surface warming systems (ABSW), which generate heat mechanically (heating of air, water or gels) that is transferred to the patient via skin contact. To assess the effectiveness of pre- or intraoperative active body surface warming systems (ABSW), or both, to prevent perioperative complications from unintended hypothermia during surgery in adults. We searched the Cochrane Central Register of Controlled Trials (CENTRAL; Issue 9, 2015); MEDLINE (PubMed) (1964 to October 2015), EMBASE (Ovid) (1980 to October 2015), and CINAHL (Ovid) (1982 to October 2015). We included randomized controlled trials (RCTs) that compared an ABSW system aimed at maintaining normothermia perioperatively against a control or against any other ABSW system. Eligible studies also had to include relevant clinical outcomes other than measuring temperature alone. Several authors, by pairs, screened references and determined eligibility, extracted data, and assessed risks of bias. We resolved disagreements by discussion and consensus, with the collaboration of a third author. We included 67 trials with 5438 participants that comprised 79 comparisons. Forty-five RCTs compared ABSW versus control, whereas 18 compared two different types of ABSW, and 10 compared two different techniques to administer the same type of ABSW. Forced-air warming (FAW) was by far the most studied intervention.Trials varied widely regarding whether the interventions were

  20. Prevention of and response to inadvertent exposure of embryo/fetus to ionizing radiation, due to medical exposure of the mother. The Greek regulatory authority initiatives.

    Science.gov (United States)

    Economides, Sotirios; Boziari, Argiro; Vogiatzi, Stavroula; Hourdakis, Konstantinos J; Kamenopoulou, Vassiliki; Dimitriou, Panagiotis

    2014-03-01

    Embryo/fetus (E/F) irradiation as a result of medical exposure of the mother should be avoided, unless there are strong clinical indications. Medical practitioners are assigned the primary task and obligation of ensuring overall patient protection and safety in the prescription of and during the delivery of medical exposure. In cases of unintended exposure of embryo/fetus (E/F), the risk analysis and communication is conducted by or under the supervision of medical physicists at local level. National competent authorities can contribute to the prevention, risk analysis and communication of inadvertent E/F exposure to ionizing radiation by recording, analyzing and disseminating the relevant information. Since 2001, Greek Atomic Energy Commission has established a committee with the mandate to provide advice, to keep records, to analyze and disseminate the experience gained in cases of unintended E/F exposure. During the period 2001-2011, the committee was consulted by 269 pregnant women undergone medical exposures. The conclusions from the relevant data analysis, as well as the experience gained are herein presented and discussed. Copyright © 2013 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  1. Control and Management of Radioactive Material Inadvertently Incorporated into Scrap Metal. Proceedings of an International Conference

    International Nuclear Information System (INIS)

    2011-01-01

    Radioactive substances can become associated with scrap metal in various ways and if not discovered they can be incorporated into steel and non-ferrous metals through the melting process. This can cause health hazards as well as environmental concerns and there can be serious commercial implications. Numerous incidents have occurred in recent years involving the discovery of radioactive substances in scrap metal and, in some cases, in metal from the melting process. These incidents have proved to be very costly in relation to the recovery and cleanup operations required but also in terms of the potential loss of confidence of the industry in scrap metal as a resource. This has led the scrap metal industry to seek ways of managing the problem. In most countries, shipments of scrap metal are monitored but at different points in the distribution chain and to different extents and efficiencies. As yet, only limited efforts towards unifying and harmonizing monitoring strategies and methods in the context of scrap metal have been made at the international level. The Conference was organized into five sessions: the global perspective, national policies and strategies, compliance with radiological criteria, management of incidents with contaminated scrap metal, and improving confidence and protecting the interests of stakeholders. The aim of the first session was to present the views and perspectives of the different organizations concerned with radioactive material in scrap metal, scrap metal recycling, steel making, radiation source security and safety and international trade and economics. The second session covered some of the national policies and strategies being used to address the control of radioactive material that has been inadvertently incorporated into scrap metal were presented. In addition to the oral presentations, contributions describing the situation in many countries of the world in the form of posters were displayed. The many posters reporting national

  2. Warming of intravenous and irrigation fluids for preventing inadvertent perioperative hypothermia.

    Science.gov (United States)

    Campbell, Gillian; Alderson, Phil; Smith, Andrew F; Warttig, Sheryl

    2015-04-13

    Inadvertent perioperative hypothermia (a drop in core temperature to below 36°C) occurs because of interference with normal temperature regulation by anaesthetic drugs, exposure of skin for prolonged periods and receipt of large volumes of intravenous and irrigation fluids. If the temperature of these fluids is below core body temperature, they can cause significant heat loss. Warming intravenous and irrigation fluids to core body temperature or above might prevent some of this heat loss and subsequent hypothermia. To estimate the effectiveness of preoperative or intraoperative warming, or both, of intravenous and irrigation fluids in preventing perioperative hypothermia and its complications during surgery in adults. We searched the Cochrane Central Register of Controlled Trials (CENTRAL) (2014, Issue 2), MEDLINE Ovid SP (1956 to 4 February 2014), EMBASE Ovid SP (1982 to 4 February 2014), the Institute for Scientific Information (ISI) Web of Science (1950 to 4 February 2014), Cumulative Index to Nursing and Allied Health Literature (CINAHL) EBSCOhost (1980 to 4 February 2014) and reference lists of identified articles. We also searched the Current Controlled Trials website and ClinicalTrials.gov. We included randomized controlled trials or quasi-randomized controlled trials comparing fluid warming methods versus standard care or versus other warming methods used to maintain normothermia. Two review authors independently extracted data from eligible trials and settled disputes with a third review author. We contacted study authors to ask for additional details when needed. We collected data on adverse events only if they were reported in the trials. We included in this review 24 studies with a total of 1250 participants. The trials included various numbers and types of participants. Investigators used a range of methods to warm fluids to temperatures between 37°C and 41°C. We found that evidence was of moderate quality because descriptions of trial design were

  3. Control and Management of Radioactive Material Inadvertently Incorporated into Scrap Metal. Proceedings of an International Conference

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-15

    Radioactive substances can become associated with scrap metal in various ways and if not discovered they can be incorporated into steel and non-ferrous metals through the melting process. This can cause health hazards as well as environmental concerns and there can be serious commercial implications. Numerous incidents have occurred in recent years involving the discovery of radioactive substances in scrap metal and, in some cases, in metal from the melting process. These incidents have proved to be very costly in relation to the recovery and cleanup operations required but also in terms of the potential loss of confidence of the industry in scrap metal as a resource. This has led the scrap metal industry to seek ways of managing the problem. In most countries, shipments of scrap metal are monitored but at different points in the distribution chain and to different extents and efficiencies. As yet, only limited efforts towards unifying and harmonizing monitoring strategies and methods in the context of scrap metal have been made at the international level. The Conference was organized into five sessions: the global perspective, national policies and strategies, compliance with radiological criteria, management of incidents with contaminated scrap metal, and improving confidence and protecting the interests of stakeholders. The aim of the first session was to present the views and perspectives of the different organizations concerned with radioactive material in scrap metal, scrap metal recycling, steel making, radiation source security and safety and international trade and economics. The second session covered some of the national policies and strategies being used to address the control of radioactive material that has been inadvertently incorporated into scrap metal were presented. In addition to the oral presentations, contributions describing the situation in many countries of the world in the form of posters were displayed. The many posters reporting national

  4. Radionuclide migration pathways analysis for the Oak Ridge Central Waste Disposal Facility on the West Chestnut Ridge site

    International Nuclear Information System (INIS)

    Pin, F.G.; Witherspoon, J.P.; Lee, D.W.; Cannon, J.B.; Ketelle, R.H.

    1984-10-01

    A dose-to-man pathways analysis is performed for disposal of low-level radioactive waste at the Central Waste Disposal Facility on the West Chestnut Ridge Site. Both shallow land burial (trench) and aboveground (tumulus) disposal methods are considered. The waste volumes, characteristics, and radionuclide concentrations are those of waste streams anticipated from the Oak Ridge National Laboratory, the Y-12 Plant, and the Oak Ridge Gaseous Diffusion Plant. The site capacity for the waste streams is determined on the basis of the pathways analysis. The exposure pathways examined include (1) migration and transport of leachate from the waste disposal units to the Clinch River (via the groundwater medium for trench disposal and Ish Creek for tumulus disposal) and (2) those potentially associated with inadvertent intrusion following a 100-year period of institutional control: an individual resides on the site, inhales suspended particles of contaminated dust, ingests vegetables grown on the plot, consumes contaminated water from either an on-site well or from a nearby surface stream, and receives direct exposure from the contaminated soil. It is found that either disposal method would provide effective containment and isolation for the anticipated waste inventory. However, the proposed trench disposal method would provide more effective containment than tumuli because of sorption of some radionuclides in the soil. Persons outside the site boundary would receive radiation doses well below regulatory limits if they were to ingest water from the Clinch River. An inadvertent intruder could receive doses that approach regulatory limits; however, the likelihood of such intrusions and subsequent exposures is remote. 33 references, 31 figures, 28 tables

  5. Study of 'inadvertent human intrusion or rare natural event scenarios' for sub-surface disposal of radioactive waste

    International Nuclear Information System (INIS)

    Nakatani, Takayoshi; Ishitoya, Kimihide; Funabashi, Hideyuki; Sugaya, Toshikatsu; Sone, Tomoyuki; Shimada, Hidemitsu; Nakai, Kunihiro

    2010-03-01

    Japan Atomic Energy Agency (JAEA) is making preparations for the sub-surface disposal of radioactive wastes, in an integrated fashion according to the properties of the waste material regardless of the generators or waste sources. In this study, 'Inadvertent Human Intrusion or Rare Natural Event Scenarios' of 'Three Types scenarios' was considered according to the standard of the Atomic Energy Society of Japan (AESJ) on the sub-surface disposal system that was based on 'Basic Policy for Safety Regulation Concerning Land Disposal of Low-Level Radioactive Waste (Interim Report)' by Nuclear Safety Commission of Japan (NSC). Selection of the assessed scenarios, development of the assessment tool and preliminary exposure dose assessment for general public were conducted. Among the assessed scenarios, the exposure dose of 'well water drinking scenario' was the highest under the very conservative assessment condition. This scenario assumed that the groundwater in Excavation Disturbed Zone (EDZ) was directly used as drinking water without any dilution. Although this was very conservative condition and the result exceeded 10 mSv/y, it stayed under the upper limit of standard dose value for 'Inadvertent Human Intrusion or Rare Natural Event Scenarios' (10 - 100 mSv/y). (author)

  6. DIRECT USAGE OF MINISCREW ANCHORAGE TO INTRUDE OVERERUPTED MAXILLARY POSTERIOR TEETH BEFORE PROSTHODONTIC PREPARATION:A CASE REPORT

    Directory of Open Access Journals (Sweden)

    Yasemin Bahar Acar

    2016-01-01

    Full Text Available Overeruption of maxillary molars due loss of opposing teeth creates occlusal and functional interferences. Before reconstruction can be initiated, intrusion of overerupted molars becomes essential. This report illustrates treatment of overerupted maxillary premolar and molar via direct use of miniscrew anchorage. A 24-year old female had lost first and second left mandibular molars due to pulpal necrotizing agents, resulting with a large alveolar bone defect and overerupted maxillary premolar and molar. She had a history of unsuccessful alveolar distraction of mandibular left premolars to increase the alveolar bone height prior to implant placement. Patient was satisfied with her smile and refused comprehensive orthodontic treatment. Maxillary premolar and molar were intruded segmentally for 4mm in 8 months, using a combination of a mini-implant and partialfixed edgewise appliances. Biological responses of teeth and surrounding bony structures to intrusion appeared normal and acceptable in radiographic and clinical examination.

  7. U-Pb SHRIMP data and geochemical characterization of granitoids intruded along the Coxixola shear zone, Provincia Borborema, NE Brazil

    Energy Technology Data Exchange (ETDEWEB)

    Guimaraes, Ignez de Pinho; Silva Filho, Adejardo Francisco da; Silva, Francis M.J.V. da, E-mail: ignez@ufpe.br [Universidade Federal de Pernanmbuco (UFPE), Recife, PE (Brazil). Dept. de Geologia; Armstrong, Richard [Australian National University (Australia)

    2011-07-01

    A large volume of granitic magmatism associated with large scale shear zone and metamorphism under high-T amphibolite facies conditions characterize the Brasiliano Orogeny in the Borborema Province, NE Brazil. Granitoids from two plutons and later dykes intruded along the Coxixola shear zone show distinct crystallization ages and geochemical signature. The oldest granitoids (618 ± 5 Ma), Serra de Inacio Pereira Pluton are coeval with the peak of regional metamorphism and they were probably originated by melting of a paleoproterozoic source. The granitoids from the Serra do Marinho Pluton show crystallization age of 563 ± 4 Ma and geochemical signature of post-collisional A-type granites. The later dykes have crystallization age of 526 ± 7 Ma, geochemical signature of A-type granitoids. (author)

  8. 2016 Survey of State-Level Health Resources for Men and Boys: Identification of an Inadvertent and Remediable Service and Health Disparity.

    Science.gov (United States)

    Fadich, Ana; Llamas, Ramon P; Giorgianni, Salvatore; Stephenson, Colin; Nwaiwu, Chimezie

    2018-03-01

    This survey evaluated resources available to men and boys at the state level including state public health departments (SPHDs), other state agencies, and governor's offices. Most of the resources and programs are found in the SPHDs and these administer state-initiated and federally funded health programs to provide services and protection to a broad range of populations; however, many men's health advocates believe that SPHDs have failed to create equivalent services for men and boys, inadvertently creating a health disparity. Men's Health Network conducts a survey of state resources, including those found in SPHDs, every 2 years to identify resources available for men and women, determine the extent of any disparity, and establish a relationship with SPHD officials. Data were obtained from all 50 states and Washington, D.C. An analysis of the 2016 survey data indicates that there are few resources allocated and a lack of readily available information on health and preventive care created specifically for men and boys. The data observed that most health information intended for men and boys was scarce among states or oftentimes included on websites that primarily focused on women's health. A potential result of this is a loss of engagement with appropriate health-care providers due to a lack of information. This study continues to validate the disparity between health outcomes for women and men. It continues to highlight the need for better resource allocation, outreach, and health programs specifically tailored to men and boys in order to improve overall community well-being.

  9. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1992-05-01

    This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicitly displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information

  10. Fully automated radiochemical preparation system for gamma-spectroscopy on fission products and the study of the intruder and vibrational levels in 83Se

    International Nuclear Information System (INIS)

    Lien, O.G. III.

    1983-10-01

    AUTOBATCH was developed to provide a usable source of short-lived neutron-rich nuclides through chemical preparation of the sample from fission products for detailed gamma-ray spectroscopy, which would complement the output of on-line isotope separators. With AUTOBATCH the gamma rays following the β - decay of 83 As were studied to determine the ground state spin and parity of 83 As to be 5/2 - ; the absolute intensity of the β - branch from 83 As to 83 Se/sup m/ to be 0.3%; the absolute intensity of the ground state β - branch from 83 Se/sup m/ to 83 Br to be 39%; the halflife of the 5/2 1 + level to be 3.2 ns; and the structure of 83 Se 49 . Results are used to show that the intruder structure which had been previously observed in the odd mass 49 In isotopes could be observed in the N = 49 isotones. The observed structure is discussed in terms of the unified model calculations of Heyde which has been used to describe the intruder structure in the indium nuclei. The intruder structure is most strongly developed, not at core mid-shell, 89 Zr 49 , but rather at core mid-sub-shell 83 Se. This difference is qualitatively understood to be due to the blocking of collectivity by the Z = 40 subshell closure which prevents the intruder structure from occurring in 87 Sr 49 and 89 Zr 49

  11. Coupling Effect of Intruding Water and Inherent Gas on Coal Strength Based on the Improved (Mohr-Coulomb Failure Criterion

    Directory of Open Access Journals (Sweden)

    Yiyu Lu

    2016-11-01

    Full Text Available When employing hydraulic processes to increase gas drainage efficiency in underground coal mines, coal seams become a three-phase medium, containing water intruding into the coal pores with the inherent occurrence of gas. This can change the stress state of the coal and cause instability. This work studied the mechanical properties of coal containing water and gas and derived an appropriate failure criterion. Based on mixture theory of unsaturated porous media, the effective stress of coal, considering the interaction of water and gas, was analyzed, and the failure criterion established by combining this with the Mohr–Coulomb criterion. By introducing the stress factor of matrix suction and using fitted curves of experimentally determined matrix suction and moisture content, the relationships between coal strength, gas pressure, and moisture content were determined. To verify the established strength theory, a series of triaxial compression strength tests of coal containing water and gas were carried out on samples taken from the Songzao, Pingdingshan, and Tashan mines in China. The experimental results correlated well with the theoretical predictions. The results showed a linear decrease in the peak strength of coal with increasing gas pressure and an exponential reduction in peak strength with increasing moisture content. The strength theory of coal containing water and gas can become an important part of multiphase medium damage theory.

  12. Structure of intruder band in "1"1"9"-"1"2"9Xe

    International Nuclear Information System (INIS)

    Sharma, H.P.; Chakraborty, S.; Tiwary, S.S.

    2017-01-01

    Xe isotopes in A∼130 mass region are known for their variety of structural phenomena, such as, unexpected signature splitting, signature inversion, γ-vibration etc. These phenomena are associated to axialy asymmetric shape. The triaxial shape in Xe nuclei are expected to originate due to the availability of prolate driving low-Ω πh_1_1_/_2 orbital and oblate driving high-Ω νh11/2 orbital near Fermi surface. The observed experimental E (4"+)/E (2"+) value (∼2.5) also support the γ-soft nature of these nuclei. Interestingly, both proton and neutron alignments have been observed in νh_1_1_/_2 band in "1"1"9"-"1"2"5Xe and neutron alignment dominates. In "1"2"9Xe, proton alignment reported to dominate. It is also supported by TPRM calculations, although, there are no significant change in the neutron orbitals. Whether this change in the alignment is occurred at N=75 or 73 is not known. Therefore, it is interesting to understand the status of the neutron and proton alignment in "1"2"7Xe, which are not studied well. Hence, in-beam γ-ray spectroscopy of "1"2"7Xe was carried out using "1"2"2Sn("9Be, 4nγ) fusion-evaporation reaction at 48 MeV using INGA facility at Inter-University Accelerator Centre, New Delhi. Details of the analysis and results will be discussed during the conference. (author)

  13. Inadvertent Splenectomy During Resection for Colorectal Cancer Does Not Increase Long-term Mortality in a Propensity Score Model: A Nationwide Cohort Study.

    Science.gov (United States)

    Lolle, Ida; Pommergaard, Hans-Christian; Schefte, David F; Bulut, Orhan; Krarup, Peter-Martin; Rosenstock, Steffen J

    2016-12-01

    Previous studies suggest that long-term mortality is increased in patients who undergo splenectomy during surgery for colorectal cancer. The reason for this association remains unclear. The purpose of this study was to investigate the association between inadvertent splenectomy attributed to iatrogenic lesion to the spleen during colorectal cancer resections and long-term mortality in a national cohort of unselected patients. This was a retrospective, nationwide cohort study. Data were collected from the database of the Danish Colorectal Cancer Group and merged with data from the National Patient Registry and the National Pathology Databank. Danish patients with colorectal cancer undergoing curatively intended resection between 2001 and 2011 were included in the study. The primary outcome was long-term mortality for patients surviving 30 days after surgery. Secondary outcomes were 30-day mortality and risk factors for inadvertent splenectomy. Multivariable and propensity-score matched Cox regression analyses were used to adjust for potential confounding. In total, 23,727 patients were included, of which 277 (1.2%) underwent inadvertent splenectomy. There was no association between inadvertent splenectomy and long-term mortality (adjusted HR = 1.15 (95% CI, 0.95-1.40); p = 0.16) in the propensity score-matched model, whereas 30-day mortality was significantly increased (adjusted HR = 2.31 (95% CI, 1.71-3.11); p splenectomy was most often seen during left hemicolectomy (left hemicolectomy vs right hemicolectomy: OR = 24.76 (95% CI, 15.30-40.06); p splenectomy during resection for colorectal cancer does not seem to increase long-term mortality. The previously reported reduced overall survival after inadvertent splenectomy may be explained by excess mortality in the immediate postoperative period.

  14. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock -revision 1

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1996-04-01

    Canada has conducted an extensive research program on a concept of safe disposal of nuclear fuel wastes deep In plutonic rock of the Canadian Shield. An essential goal of this program has been to develop and demonstrate a methodology to evaluate the performance of the facility against safety criteria established by Canada's regulatory agency, the Atomic Energy Control Board. These criteria are expressed in terms of risk, where risk is defined as the sum, over all significant scenarios, of the product of the probability of the scenario, the magnitude of the resultant dose, and the probability of a health effect per unit dose. This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicity displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information. (author). 53 refs., 8 tabs., 2 figs

  15. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock -revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Wuschke, D M

    1996-04-01

    Canada has conducted an extensive research program on a concept of safe disposal of nuclear fuel wastes deep In plutonic rock of the Canadian Shield. An essential goal of this program has been to develop and demonstrate a methodology to evaluate the performance of the facility against safety criteria established by Canada`s regulatory agency, the Atomic Energy Control Board. These criteria are expressed in terms of risk, where risk is defined as the sum, over all significant scenarios, of the product of the probability of the scenario, the magnitude of the resultant dose, and the probability of a health effect per unit dose. This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicity displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information. (author). 53 refs., 8 tabs., 2 figs.

  16. Distributed Tracing of Intruders

    National Research Council Canada - National Science Library

    Staniford-Chen, Stuart G

    1995-01-01

    .... One of the things that facilitates this malfeasance is that computer networks provide the ability for a user to log into multiple computer systems in sequence, changing identity with each step...

  17. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: The ONSITE/MAXI1 computer program

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.; Neuder, S.M.

    1987-02-01

    This document summarizes initial efforts to develop human-intrusion scenarios and a modified version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. Supplement 1 of NUREG/CR-3620 (1986) summarized modifications and improvements to the ONSITE/MAXI1 software package. This document summarizes a modified version of the ONSITE/MAXI1 computer program. This modified version of the computer program operates on a personal computer and permits the user to optionally select radiation dose conversion factors published by the International Commission on Radiological Protection (ICRP) in their Publication No. 30 (ICRP 1979-1982) in place of those published by the ICRP in their Publication No. 2 (ICRP 1959) (as implemented in the previous versions of the ONSITE/MAXI1 computer program). The pathway-to-human models used in the computer program have not been changed from those described previously. Computer listings of the ONSITE/MAXI1 computer program and supporting data bases are included in the appendices of this document

  18. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: the ONSITE/MAXI1 computer program

    International Nuclear Information System (INIS)

    Napier, B.A.; Peloquin, R.A.; Kennedy, W.E. Jr.; Neuder, S.M.

    1984-10-01

    Because of uncertainties associated with assessing the potential risks from onsite burials of radioactive waste, the US Nuclear Regulatory Commission (NRC) has amended its regulations to provide greater assurance that buried radioactive material will not present a hazard to public health and safety. The amended regulations now require licensees to apply for approval of proposed procedures for onsite disposal pursuant to 10 CFR 20.302. The NRC technically reviews these requests on a case-by-case basis. These technical reviews require modeling potential pathways to man and projecting radiation dose commitments. This document contains a summary of our efforts to develop human-intrusion scenarios and to modify a version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. The documentation of the ONSITE/MAXI computer program is written for two audiences. The first (Audience A) includes persons concerned with the mathematical models and computer algorithms. The second (Audience B) includes persons concerned with exercising the computer program and scenarios for specific onsite disposal applications. Five sample problems are presented and discussed to assist the user in operating the computer program. Summaries of the input and output for the sample problems are included along with a discussion of the hand calculations performed to verify the correct operation of the computer program. Computer listings of the ONSITE/MAXI1 computer program with an abbreviated data base listing are included as Appendix 1 to this document. Finally, complete listings of the data base with listings of the special codes used to create the data base are included in Appendix 2 as a microfiche attachment to this document

  19. Wellbore enlargement investigation: Potential analogs to the Waste Isolation Pilot Plant during inadvertent intrusion of the repository

    International Nuclear Information System (INIS)

    Boak, D.M.; Dotson, L.; Aguilar, R.

    1997-01-01

    This study involved the evaluation and documentation of cases in which petroleum wellbores were enlarged beyond the nominal hole diameter as a consequence of erosion during exploratory drilling, particularly as a function of gas flow into the wellbore during blowout conditions. A primary objective was to identify analogs to potential wellbore enlargement at the Waste Isolation Pilot Plant (WIPP) during inadvertent human intrusion. Secondary objectives were to identify drilling scenarios associated with enlargement, determine the physical extent of enlargement, and establish the physical properties of the formation in which the enlargement occurred. No analogs of sufficient quality to establish quantitative limits on wellbore enlargement at the WIPP disposal system were identified. However, some information was obtained regarding the frequency of petroleum well blowouts and the likelihood that such blowouts would bridge downhole, self-limiting the surface release of disposal-system material. Further work would be necessary, however, to determine the conditions under which bridging could occur and the extent to which the bridging might be applicable to WIPP. In addition, data on casing sizes of petroleum boreholes in the WIPP vicinity support the use of a 12-1/4 inch borehole size in WIPP performance assessment calculations. Finally, although data are limited, there was no evidence of significant wellbore enlargement in any of three blowouts that occur-red in wellbores in the Delaware Basin (South Culebra Bluff Unit No. 1, Energy Research and Development Administration (ERDA) 6, and WIPP 12)

  20. Evidence utilisation project: Management of inadvertent perioperative hypothermia. The challenges of implementing best practice recommendations in the perioperative environment.

    Science.gov (United States)

    Munday, Judy; Hines, Sonia Jane; Chang, Anne M

    2013-12-01

    The prevention of inadvertent perioperative hypothermia (IPH) remains an important issue in perioperative healthcare. The aims of this project were to: (i) assess current clinical practice in the management of IPH and (ii) promote best practice in the management of IPH in adult operating theatres. This project from August 2010 to March 2012 utilised a system of audit and feedback to implement best practice recommendations. Data were collected via chart audits against criteria developed from best practice recommendations for managing IPH. Evidence-based best practices, such as consistent temperature monitoring and patient warming, were implemented using multifaceted interventions. Perioperative records for 73 patients (baseline) and 72 patients (post-implementation) were audited. Post-implementation audit showed an increase in patients with temperatures >36°C admitted to the post-anaesthetic care unit (PACU) (8%) and discharged from PACU (28%). The percentage of patients receiving preoperative temperature monitoring increased (38%); however, low levels of intraoperative monitoring remained (31% of patients with surgery of 30 min or longer duration). Small increases were found in patient warming of 5% intraoperatively and 8% postoperatively. Preoperative warming was not successfully implemented during this phase of the project. Temperature monitoring, warming and rates of normothermia improved; however, barriers to best practice of IPH management were experienced, which negatively impacted on the project. Further stages of implementation and audit were added to further address IPH management in this department. © 2013 The Authors. International Journal of Evidence-Based Healthcare © 2013 The Joanna Briggs Institute.

  1. Inadvertent chest tube insertion in congenital cystic adenomatoid malformation and congenital lobar emphysema-highlighting an important problem

    International Nuclear Information System (INIS)

    Prabhu, Shailesh M; Choudhury, Subhasis Roy; Solanki, Ravi S; Shetty, Gurucharan S; Agarwala, Surenderkumar

    2013-01-01

    Chest tube insertion in congenital cystic lung lesions is an important problem in children with acute respiratory distress having a cystic lucent lesion on chest radiograph. To evaluate the imaging findings and complications in cases of congenital cystic lung lesions with chest tube insertion and suggest the role of appropriate imaging for management of these patients. Chest radiographs and CT scans of children with congenital cystic lung lesions who had inadvertent chest tube insertion preoperatively were retrospectively reviewed for imaging appearances and complications. Fifteen patients comprising 10 cases of congenital cystic adenomatoid malformation (CCAM) and 5 cases of congenital lobar emphysema (CLE) were included. Majority of the cases were infants. CCAM was misdiagnosed as complicated pneumatocele (n = 5) and pneumothorax (n = 5), while CLE was misdiagnosed as tension pneumothorax (n = 5) on the chest radiograph findings. Final diagnosis was made on CT and operative findings with histopathology. Complications noted were pneumothorax, hydropneumothorax, and infection in cases of CCAM, and change in imaging appearance and pneumothorax in cases of CLE. Chest tube insertion in congenital cystic lesions increases the rate of associated complications. Chest CT has a definite role in early diagnosis and deciding appropriate management in these cases

  2. Simultaneous spectroscopy of $\\gamma$- rays and conversion electrons: Systematic study of EO transitions and intruder states in close vicinity of mid-shell point in odd-Au isotopes

    CERN Multimedia

    Venhart, M; Grant, A F; Petrik, K

    This proposal focuses on detailed systematic studies of the $\\beta$ /EC-decays of $^{179,181,183,185}$Hg leading to excited states in the neutron-deficient Au isotopes in the vicinity of the N=104 midshell. $\\gamma$-ray, X-ray and conversion electron de-excitations of odd-A Au isotopes will be studied simultaneously. These studies will address important structural questions such as the excitation energies of coexisting states, properties of multiple intruder states (i.e. intruder particles coupled to intruder cores) and mixing of coexisting structures. The unique combination of Hg beam purity and yields make ISOLDE a unique facility for these experiments.

  3. TRACE and TRAC-BF1 benchmark against Leibstadt plant data during the event inadvertent opening of relief valves

    Energy Technology Data Exchange (ETDEWEB)

    Sekhri, A.; Baumann, P. [KernkraftwerkLeibstadt AG, 5325 Leibstadt (Switzerland); Wicaksono, D. [Swiss Federal Inst. of Technology Zurich ETH, 8092 Zurich (Switzerland); Miro, R.; Barrachina, T.; Verdu, G. [Inst. for Industrial, Radiophysical and Environmental Safety ISIRYM, Universitat Politecnica de Valencia UPV, Cami de Vera s/n, 46021 Valencia (Spain)

    2012-07-01

    In framework of introducing TRACE code to transient analyses system codes for Leibstadt Power Plant (KKL), a conversion process of existing TRAC-BF1 model to TRACE has been started within KKL. In the first step, TRACE thermal-hydraulic model for KKL has been developed based on existing TRAC-BF1 model. In order to assess the code models a simulation of plant transient event is required. In this matter simulations of inadvertent opening of 8 relief valves event have been performed. The event occurs at KKL during normal operation, and it started when 8 relief valves open resulting in depressurization of the Reactor Pressure Vessel (RPV). The reactor was shutdown safely by SCRAM at low level. The high pressure core spray (HPCS) and the reactor core isolation cooling (RCIC) have been started manually in order to compensate the level drop. The remaining water in the feedwater (FW) lines flashes due to saturation conditions originated from RPV depressurization and refills the reactor downcomer. The plant boundary conditions have been used in the simulations and the FW flow rate has been adjusted for better prediction. The simulations reproduce the plant data with good agreement. It can be concluded that the TRAC-BF1 existing model has been used successfully to develop the TRACE model and the results of the calculations have shown good agreement with plant recorded data. Beside the modeling assessment, the TRACE and TRAC-BF1 capabilities to reproduce plant physical behavior during the transient have shown satisfactory results. The first step of developing KKL model for TRACE has been successfully achieved and this model is further developed in order to simulate more complex plant behavior such as Turbine Trip. (authors)

  4. TRACE and TRAC-BF1 benchmark against Leibstadt plant data during the event inadvertent opening of relief valves

    International Nuclear Information System (INIS)

    Sekhri, A.; Baumann, P.; Wicaksono, D.; Miro, R.; Barrachina, T.; Verdu, G.

    2012-01-01

    In framework of introducing TRACE code to transient analyses system codes for Leibstadt Power Plant (KKL), a conversion process of existing TRAC-BF1 model to TRACE has been started within KKL. In the first step, TRACE thermal-hydraulic model for KKL has been developed based on existing TRAC-BF1 model. In order to assess the code models a simulation of plant transient event is required. In this matter simulations of inadvertent opening of 8 relief valves event have been performed. The event occurs at KKL during normal operation, and it started when 8 relief valves open resulting in depressurization of the Reactor Pressure Vessel (RPV). The reactor was shutdown safely by SCRAM at low level. The high pressure core spray (HPCS) and the reactor core isolation cooling (RCIC) have been started manually in order to compensate the level drop. The remaining water in the feedwater (FW) lines flashes due to saturation conditions originated from RPV depressurization and refills the reactor downcomer. The plant boundary conditions have been used in the simulations and the FW flow rate has been adjusted for better prediction. The simulations reproduce the plant data with good agreement. It can be concluded that the TRAC-BF1 existing model has been used successfully to develop the TRACE model and the results of the calculations have shown good agreement with plant recorded data. Beside the modeling assessment, the TRACE and TRAC-BF1 capabilities to reproduce plant physical behavior during the transient have shown satisfactory results. The first step of developing KKL model for TRACE has been successfully achieved and this model is further developed in order to simulate more complex plant behavior such as Turbine Trip. (authors)

  5. A common-sense probabilistic approach to assessing inadvertent human intrusion into low-level radioactive waste at the Nevada Test Site

    International Nuclear Information System (INIS)

    Black, P.; Hooten, M.; Black, K.; Moore, B.; Rawlinson, S.; Barker, L.

    1997-01-01

    Each site disposing of low-level radioactive waste is required to prepare and maintain a site-specific performance assessment (1) to determine potential risks posed by waste management systems to the public, and the environment, and (2) to compare these risks to established performance objectives. The DOE Nevada Operations Office, Waste Management Program recently completed a one-year study of site-specific scenarios for inadvertent human intrusion by drilling into buried low-level radioactive waste sites, as part of ongoing performance assessment studies. Intrusion scenarios focus on possible penetration of buried waste through drilling for sources of groundwater. The probability of drilling penetration into waste was judged to be driven primarily by two settlement scenarios: (1) scattered individual homesteaders, and (2) a community scenario consisting of a cluster of settlers that share drilling and distribution systems for groundwater. Management control factors include institutional control, site knowledge, placards and markers, surface barriers, and subsurface barriers. The Subject Matter Experts concluded that institutional control and site knowledge may be important factors for the first few centuries, but are not significant over the evaluation period of 10,000 years. Surface barriers can be designed that would deter the siting of a drill rig over the waste site to an effectiveness of 95%. Subsurface barriers and placards and markers will not as effectively prevent inadvertent human intrusion. Homestead and community scenarios were considered by the panel to render a site-specific probability of around 10% for inadvertent human intrusion. If management controls are designed and implemented effectively, then the probability of inadvertent human intrusion can be reduced to less than 1%

  6. Adherence to a Gluten-Free Diet in Mexican Subjects with Gluten-Related Disorders: A High Prevalence of Inadvertent Gluten Intake.

    Science.gov (United States)

    Ramírez-Cervantes, Karen Lizzette; Romero-López, Angélica Viridiana; Núñez-Álvarez, Carlos Alberto; Uscanga-Domínguez, Luis F

    2016-01-01

    The rate of compliance with a gluten-free diet in patients with gluten-related disorders is unknown in most Latin American countries. To study the adherence to a gluten-free diet of Mexican individuals with celiac disease and nonceliac gluten sensitivity at the time of their first medical and nutritional consultation at a tertiary referral center. A cross-sectional study was performed. A specific questionnaire was used to gather information on demographics, clinical condition, and self-reported adherence to a gluten-free diet, and to determine strict compliance and intentional or inadvertent gluten consumption. All questionnaires were applied by a nutritionist with expertise in gluten-related disorders. Fifty-six patients with celiac disease and 24 with non-celiac gluten sensitivity were included. Overall, 46 (57.5%) subjects perceived themselves as strictly adherent; however, inadvertent gluten intake was frequent in both celiac disease and non-celiac gluten sensitivity patients (39.2 vs. 33.3%; p = 0.2). Intentional consumption was more prevalent in subjects with celiac disease (48.8 vs. 29.1%; p = 0.048) and individuals with non-celiac gluten sensitivity showed better adherence (37.5 vs. 12.5%; p = 0.035). The importance of a gluten-free diet is underestimated by Mexican patients with celiac disease. The role of a team with expertise in gluten-related disorders is essential to identify inadvertent gluten intake.

  7. Evaluation of costs accrued through inadvertent continuation of hospital-initiated proton pump inhibitor therapy for stress ulcer prophylaxis beyond hospital discharge: a retrospective chart review

    Directory of Open Access Journals (Sweden)

    Shin S

    2015-04-01

    Full Text Available Sooyoung Shin Ajou University College of Pharmacy, Yeongtong-gu, Suwon-si, Gyeonggi-do, South Korea Background: Stress ulcers and related upper gastrointestinal bleeding are well-known complications in intensive care unit (ICU patients. Proton pump inhibitor (PPI-based stress ulcer prophylaxis (SUP has been widely prescribed in noncritically ill patients who are at low risk for clinically significant bleeding, which is then injudiciously continued after hospital discharge. This study aimed to evaluate the incidence of inappropriate prescribing of PPI-based preventative therapy in ICU versus non-ICU patients that subsequently continued postdischarge, and to estimate the costs incurred by the unwarranted outpatient continuation of PPI therapy.Methods: A retrospective review of patient data at a major teaching hospital in Korea was performed. During the 4-year study period, adult patients who were newly initiated on PPI-based SUP during hospital admission and subsequently discharged on a PPI without a medical indication for such therapy were captured for data analysis. The incidence rates of inappropriate prescribing of PPIs were compared between ICU and non-ICU patients, and the costs associated with such therapy were also examined.Results: A total of 4,410 patients, more than half of the inpatient-initiated PPI users, were deemed to have been inadvertently prescribed a PPI at discharge in the absence of a medical need for acid suppression. The incidence of inappropriate outpatient continuation of the prophylaxis was higher among ICU patients compared with non-ICU patients (57.7% versus 52.2%, respectively; P=0.001. The total expenditure accrued through the continuation of nonindicated PPI therapy was approximately US$40,175.Conclusion: This study confirmed that excess usage of PPIs for SUP has spread to low-risk, non-ICU patients. The overuse of unwarranted PPI therapy can incur large health care expenditure, as well as clinical complications

  8. Genotypic differences in intruder-evoked immediate early gene activation in male, but not female, vasopressin 1b receptor knockout mice.

    Science.gov (United States)

    Witchey, Shannah K; Stevenson, Erica L; Caldwell, Heather K

    2016-11-24

    The neuropeptide arginine vasopressin (Avp) modulates social behaviors via its two centrally expressed receptors, the Avp 1a receptor and the Avp 1b receptor (Avpr1b). Recent work suggests that, at least in mice, Avp signaling through Avpr1b within the CA2 region of the hippocampus is critical for normal aggressive behaviors and social recognition memory. However, this brain area is just one part of a larger neural circuit that is likely to be impacted in Avpr1b knockout (-/-) mice. To identify other brain areas that are affected by altered Avpr1b signaling, genotypic differences in immediate early gene activation, i.e. c-FOS and early growth response factor 1 (EGR-1), were quantified using immunocytochemistry following a single exposure to an intruder. In females, no genotypic differences in intruder-evoked c-FOS or EGR-1 immunoreactivity were observed in any of the brain areas measured. In males, while there were no intruder-evoked genotypic differences in c-FOS immunoreactivity, genotypic differences were observed in EGR-1 immunoreactivity within the ventral bed nucleus of the stria terminalis and the anterior hypothalamus; with Avpr1b -/- males having less EGR-1 immunoreactivity in these regions than controls. These data are the first to identify specific brain areas that may be a part of a neural circuit that includes Avpr1b-expressing cells in the CA2 region of the hippocampus. It is thought that this circuit, when working properly, plays a role in how an animal evaluates its social context.

  9. Pregnancy outcome after 1st-trimester inadvertent exposure to barium sulphate as a contrast media for upper gastrointestinal tract radiography.

    Science.gov (United States)

    Han, B H; Lee, K S; Han, J Y; Choi, J S; Ahn, H K; Ryu, H M; Yang, J H; Han, H W; Nava-Ocampo, A A

    2011-10-01

    Despite barium being used as a contrast media for decades, the specific assessment of its safety in pregnant women is scarce. We are reporting the favourable pregnancy outcome in women who were inadvertently exposed to barium swallow and associated ionising radiation, early in pregnancy. A control group of age- and gravidity-matched unexposed pregnant women was also included. There were 32 live-born babies in the exposed group and 94 in the control group. Women had undergone diagnostic upper gastrointestinal tract (UGT) fluoroscopic examination at 3.3 ± 1.5 weeks' gestation. Estimated maternal radiation dose secondary to barium swallow varied widely, the maximum dose was estimated to be 2.45 mSv. Similar pregnancy outcomes were observed between the groups. The number of babies born with major malformations was not significantly different (p = 1.0) between cases and controls: one (3.1%) vs three (3.2%), respectively. In conclusion, our small prospective cohort study of women suggests no association between inadvertent exposure to ionising radiation and barium sulphate during fluoroscopic barium swallow and adverse fetal outcomes.

  10. Stepping in Place While Voluntarily Turning Around Produces a Long-Lasting Posteffect Consisting in Inadvertent Turning While Stepping Eyes Closed

    Directory of Open Access Journals (Sweden)

    Stefania Sozzi

    2016-01-01

    Full Text Available Training subjects to step in place on a rotating platform while maintaining a fixed body orientation in space produces a posteffect consisting in inadvertent turning around while stepping in place eyes closed (podokinetic after-rotation, PKAR. We tested the hypothesis that voluntary turning around while stepping in place also produces a posteffect similar to PKAR. Sixteen subjects performed 12 min of voluntary turning while stepping around their vertical axis eyes closed and 12 min of stepping in place eyes open on the center of a platform rotating at 60°/s (pretests. Then, subjects continued stepping in place eyes closed for at least 10 min (posteffect. We recorded the positions of markers fixed to head, shoulder, and feet. The posteffect of voluntary turning shared all features of PKAR. Time decay of angular velocity, stepping cadence, head acceleration, and ratio of angular velocity after to angular velocity before were similar between both protocols. Both postrotations took place inadvertently. The posteffects are possibly dependent on the repeated voluntary contraction of leg and foot intrarotating pelvic muscles that rotate the trunk over the stance foot, a synergy common to both protocols. We propose that stepping in place and voluntary turning can be a scheme ancillary to the rotating platform for training body segment coordination in patients with impairment of turning synergies of various origin.

  11. Study for on-line system to identify inadvertent control rod drops in PWR reactors using ex-core detector and thermocouple measures

    International Nuclear Information System (INIS)

    Souza, Thiago J.; Medeiros, Jose A.C.C.; Goncalves, Alessandro C.

    2015-01-01

    Accidental control rod drops event in PWR reactors leads to an unsafe operating condition. It is important to quickly identify the rod to minimize undesirable effects in such a scenario. In this event, there is a distortion in the power distribution and temperature in the reactor core. The goal of this study is to develop an on-line model to identify the inadvertent control rod dropped in PWR reactor. The proposed model is based on physical correlations and pattern recognition of ex-core detector responses and thermocouples measures. The results of the study demonstrated the feasibility of an on-line system, contributing to safer operation conditions and preventing undesirable effects, as its shutdown. (author)

  12. Study for on-line system to identify inadvertent control rod drops in PWR reactors using ex-core detector and thermocouple measures

    Energy Technology Data Exchange (ETDEWEB)

    Souza, Thiago J.; Medeiros, Jose A.C.C.; Goncalves, Alessandro C., E-mail: tsouza@nuclear.ufrj.br, E-mail: canedo@lmp.ufrj.br, E-mail: alessandro@nuclear.ufrj.br [Coordenacao dos Programas de Pos-Graduacao em Engenharia (COPPE/UFRJ), Rio de Janeiro, RJ (Brazil). Programa de Engenharia Nuclear

    2015-07-01

    Accidental control rod drops event in PWR reactors leads to an unsafe operating condition. It is important to quickly identify the rod to minimize undesirable effects in such a scenario. In this event, there is a distortion in the power distribution and temperature in the reactor core. The goal of this study is to develop an on-line model to identify the inadvertent control rod dropped in PWR reactor. The proposed model is based on physical correlations and pattern recognition of ex-core detector responses and thermocouples measures. The results of the study demonstrated the feasibility of an on-line system, contributing to safer operation conditions and preventing undesirable effects, as its shutdown. (author)

  13. The use of protective barriers to deter inadvertent human intrusion into a mined geologic facility for the disposal of radioactive waste: A review of previous investigations and potential concepts

    International Nuclear Information System (INIS)

    Tolan, T.L.

    1993-06-01

    Sandia National Laboratories is evaluating the feasibility of developing protective barrier system for the Waste Isolation Pilot Plant (WIPP) to thwart inadvertent human intrusion into this radioactive-waste disposal system for a period of 9,900 years after assumed loss of active institutional controls. The protective barrier system would be part of a series of enduring passive institutional controls whose long-term function will be to reduce the likelihood of inadvertent human activities (e.g., exploratory drilling for resources) that could disrupt the WIPP disposal system

  14. Properties of low-lying intruder states in $^{34}$Al and $^{34}$Si sequentially populated in $\\beta$-decay of $^{34}$Mg

    CERN Multimedia

    A low-lying long-lived (26±1 ms) isomer in $^{34}$Al has been observed recently and assigned as 1$^{+}$ state of intruder character. It was populated in $^{36}$S fragmentation and feeds, in $\\beta$-decay, the 0$_{2}^{+}$ state in $^{34}$Si whose excitation energy and lifetime were determined in an electron-positron pairs spectroscopy experiment. In the present experiment we intend to measure for the first time the $\\gamma$-rays following the $\\beta$-decay of $^{34}$Mg. Despite the interest for $^{34}$Mg, the up-right corner of the “N$\\thicksim$20 island of inversion”, the only information on its $\\beta$-decay is the lifetime of 20±10 ms, determined from $\\beta$-neutron coincidences. As a result of the proposed experiment, we expect to place the first transitions in the level scheme of $^{34}$Al and to strongly populate the newly observed isomer, measuring its excitation energy, if the branching ratio to 4$^{−}$ ground state is significant. Theoretical estimations for the $\\beta$-decay of the new isome...

  15. Has Therapy Intruded into Education?

    Science.gov (United States)

    Mintz, Avi

    2009-01-01

    For over fifty years, scholars have argued that a therapeutic ethos has begun to change how people think about themselves and others. There is also a growing concern that the therapeutic ethos has influenced educational theory and practice, perhaps to their detriment. This review article discusses three books, "The Dangerous Rise of Therapeutic…

  16. An overlooked environmental issue? A review of the inadvertent formation of PCB-11 and other PCB congeners and their occurrence in consumer products and in the environment.

    Science.gov (United States)

    Vorkamp, Katrin

    2016-01-15

    Polychlorinated biphenyls (PCBs) are banned from production and use in most countries as they are persistent organic pollutants (POPs) of concern for environment and health. Recent research has pointed at a new environment issue resulting from the inadvertent formation of PCBs in certain processes, in particular the pigment production. PCB-11 is a major by-product in these processes, but PCB-28, PCB-52, PCB-77 as well as the nonachlorinated PCBs and PCB-209 have been found in pigments and consumer products as well. In addition to environmental emissions via point sources, in particular related to industrial and municipal wastewater, atmospheric transport seems to be important for the global distribution of PCB-11. Thus, PCB-11 has also been detected in the polar regions. Worldwide air concentrations appear relatively uniform, but maxima have been found in urban and industrialised areas. Data on the uptake and accumulation of PCB-11 in the food chain are still inconclusive: Although food web studies do not show biomagnification, PCB-11 has been detected in humans. The human exposure might originate from the direct contact to consumer products as well as from the omnipresence of PCB-11 in the environment. Copyright © 2015 Elsevier B.V. All rights reserved.

  17. Posterior reversible encephalopathy syndrome following an inadvertent dural puncture during an emergency laparotomy for ischemic colitis – a case report

    Directory of Open Access Journals (Sweden)

    Shah R

    2014-01-01

    Full Text Available Reena Shah, Agnieszka Kubisz-Pudelko, Jeremy Reid Yeovil District Hospital, Yeovil, UK Abstract: Posterior reversible encephalopathy syndrome (PRES is a clinico-neuroradiological syndrome characterized by various symptoms of neurological disease. It has commonly been reported in association with acute hypertension, pre-eclampsia, eclampsia, sepsis, and exposure to immunosuppressants. Here, we report on a normotensive woman who developed a severe frontal headache, visual disturbances, and hypertension 3 days after undergoing an emergency laparotomy for ischemic colitis during which she suffered an inadvertent dural puncture. Neuro-imaging revealed features consistent with PRES. The patient went on to make a good recovery, being discharged 21 days postoperatively, with only minor visual disturbances and memory problems. This case highlights the importance of awareness of PRES to all specialties. On reviewing the literature, we feel that PRES may be a potential differential diagnosis to post-procedural neurological symptoms in those patients undergoing routine procedures such as spinal anesthetics or lumbar punctures. Keywords: PRES, neurological disease, lumbar puncture, spinal anesthetic

  18. Inadvertent intrathecal injection of atracurium.

    Science.gov (United States)

    Zirak, Nahid; Soltani, Ghasem; Ghomian, Naiere; Hasanpour, Mohamad Reza; Mashayekhi, Zahra

    2011-04-01

    This report relates how tracurium was given by mistake, intrathecally, during spinal anesthesia, to a 38-year-old woman, who was a candidate for abdominal hysterectomy. When no analgesia was observed, the mistake in giving the injection was understood. She was evaluated postoperatively by train of four ratio, measuring her breathing rate, eye opening, and protruding of tongue at one, two, twenty-four, and forty-eight hours, and then at one and two weeks, with the final evaluation the following month. The patient had normal timings during the operation and postoperation periods, and no abnormal findings were observed through the first month. This finding was contrary to several studies, which described adverse reactions due to accidental intrathecal injection of neuromuscular blocking drugs.

  19. Inadvertent intrathecal injection of atracurium

    Directory of Open Access Journals (Sweden)

    Nahid Zirak

    2011-01-01

    Full Text Available This report relates how tracurium was given by mistake, intrathecally, during spinal anesthesia, to a 38-year-old woman, who was a candidate for abdominal hysterectomy. When no analgesia was observed, the mistake in giving the injection was understood. She was evaluated postoperatively by train of four ratio, measuring her breathing rate, eye opening, and protruding of tongue at one, two, twenty-four, and forty-eight hours, and then at one and two weeks, with the final evaluation the following month. The patient had normal timings during the operation and postoperation periods, and no abnormal findings were observed through the first month. This finding was contrary to several studies, which described adverse reactions due to accidental intrathecal injection of neuromuscular blocking drugs.

  20. Equine ulnar fracture repair with locking compression plates can be associated with inadvertent penetration of the lateral cortex of the radius.

    Science.gov (United States)

    Kuemmerle, Jan M; Kühn, Karolin; Bryner, Marco; Fürst, Anton E

    2013-10-01

    To evaluate if the use of locking head screws (LHS) in the distal holes of a locking compression plate (LCP) applied to the caudal aspect of the ulna to treat equine ulnar fractures is associated with a risk of injury to the lateral cortex of the radius. Controlled laboratory study. Cadaveric equine forelimbs (n = 8 pair). After transverse ulnar osteotomy, osteosynthesis was performed with a narrow 10-13 hole 4.5/5.0 LCP applied to the caudal aspect of each ulna. The distal 3 holes were filled with 4.5 mm cortex screws (CS) in 1 limb (group 1) and with 5.0 mm LHS contralaterally (group 2). CS were inserted in an angle deemed appropriate by the surgeon and LHS were inserted perpendicular to the plate. Implant position and injury to the lateral cortex of the radius were assessed by radiography, CT, and limb dissection. In group 1, injury of the lateral radius cortex did not occur. In group 2, 4 limbs and 6/24 LHS were associated with injury of the lateral radius cortex by penetration of a LHS. This difference was statistically significant. CS were inserted with a mean angle of 17.6° from the sagittal plane in a caudolateral-craniomedial direction. Use of LHS in the distal part of a LCP applied to the caudal aspect of the ulna is associated with a risk of inadvertent injury to the lateral cortex of the radius. © Copyright 2013 by The American College of Veterinary Surgeons.

  1. Assessment of the long-term risks of inadvertent human intrusion into a disposal vault in deep plutonic rock: reassessment using ICRP recommendations

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1996-06-01

    Canada has conducted an extensive research program on the safe disposal of nuclear fuel waste. The program has focussed on the concept of disposal in durable containers in an engineered facility or 'vault' located 500 to 1000 m deep in plutonic rock on the Canadian Shield. As part of this task, a methodology was developed to assess the long-term risk from inadvertent intrusion scenarios, and applied to a reference conceptual design of a facility for disposal of used fuel. The AECB has specified that 'the predicted radiological risk to individuals from a waste disposal facility shall not exceed 10 -6 fatal cancers and serious genetic effects in a year.' Risk is defined as the sum, of the product of the probability of the scenario, the magnitude of the resultant radiation dose, and the probability of a health effect per unit dose. The AECB also specifies that 'calculations of individual risk should be made by using the risk conversion factor of 2 x 10 -2 per sievert.' Our earlier assessment of four human intrusion scenarios showed that the estimated risk using the risk conversion factor recommended by the AECB was at least 3 orders of magnitude below the AECB risk criterion, at all times up to 10 000 a, for each of the four scenarios analysed. The AECB risk criterion and risk conversion factor are based on the recommendations of the Intemafional Commission on Radiological Protection (ICRP) in their Publication ICRP 26. More recently, in its Publication ICRP 60, the ICRP has recommended dose factors for fatal cancers that are larger than those in ICRP 26 and an increase in the risk factor for serious hereditary effects in all future generations. Another ICRP Publication, ICRP 64, states that 'For potential exposure situations, the consideration of the basic dose response used for stochastic effects must be extended into the range of high doses where deterministic effects also occur.' For the new assessments of risk we use the estimated doses and probabilities of

  2. Special Analysis: Revision of Saltstone Vault 4 Disposal Limits (U)

    Energy Technology Data Exchange (ETDEWEB)

    Cook, J

    2005-05-26

    New disposal limits have been computed for Vault 4 of the Saltstone Disposal Facility based on several revisions to the models in the existing Performance Assessment and the Special Analysis issued in 2002. The most important changes are the use of a more rigorous groundwater flow and transport model, and consideration of radon emanation. Other revisions include refinement of the aquifer mesh to more accurately model the footprint of the vault, a new plutonium chemistry model accounting for the different transport properties of oxidation states III/IV and V/VI, use of variable infiltration rates to simulate degradation of the closure system, explicit calculation of gaseous releases and consideration of the effects of settlement and seismic activity on the vault structure. The disposal limits have been compared with the projected total inventory expected to be disposed in Vault 4. The resulting sum-of-fractions of the 1000-year disposal limits is 0.2, which indicates that the performance objectives and requirements of DOE 435.1 will not be exceeded. This SA has not altered the conceptual model (i.e., migration of radionuclides from the Saltstone waste form and Vault 4 to the environment via the processes of diffusion and advection) of the Saltstone PA (MMES 1992) nor has it altered the conclusions of the PA (i.e., disposal of the proposed waste in the SDF will meet DOE performance measures). Thus a PA revision is not required and this SA serves to update the disposal limits for Vault 4. In addition, projected doses have been calculated for comparison with the performance objectives laid out in 10 CFR 61. These doses are 0.05 mrem/year to a member of the public and 21.5 mrem/year to an inadvertent intruder in the resident scenario over a 10,000-year time-frame, which demonstrates that the 10 CFR 61 performance objectives will not be exceeded. This SA supplements the Saltstone PA and supersedes the two previous SAs (Cook et al. 2002; Cook and Kaplan 2003).

  3. Influence of i{sub 13/2} proton and j{sub 15/2} neutron intruding orbitals on the behaviour of 190 mass region superdeformed nuclei; Influence des orbitales intruses proton i{sub 13/2} et neutron j{sub 15/2} sur le comportement des noyaux superdeformes de la region de masse 190

    Energy Technology Data Exchange (ETDEWEB)

    Duprat, J

    1995-01-01

    This work concerns the study of the nuclear superdeformation phenomenon in the A = 190 mass region. The superdeformed (SD) states in {sup 193}Tl, {sup 194}Tl {sup 195}Tl were produced via heavy-ion induced reactions and studied with the EUROGAM gamma multidetector array. The analysis of high-multiplicity events allowed the study of the magnetic properties of the SD states in these nuclei. For the first time, the g-factor of a proton orbital in a SD nucleus in the A = 190 mass region has been extracted. This measurement indicates that the two known bands in {sup 195}Tl-SD are built on the i{sub 13/2} proton intruder orbital. A new SD band has been found in this isotope: it is the first SD band built on an excited proton state found in the A = 190 region. Finally an interaction between two pairs of bands has been established in {sup 194}Tl; this interaction indicate the crossing of two neutron orbitals above the N = 112 gap. The magnetic properties of the states of the SD bands in {sup 194}Tl reveals that these bands are built on configurations in which the single proton and neutron intrinsic spins are aligned. Comparison between different SD bands in the Thallium isotopes shows the prominent role of the i{sub 13/2} proton and the j{sub 15/2} neutron intruder orbitals in the smooth increase of the dynamical moment of inertia as a function of the rotational frequency. In addition, this work reports on the first observation of a SD rotational band produced in a (HI, {alpha}xn) reaction channel. The study of the maximum spin reached by the SD bands indicates both a competition between alpha emission and fission of the compound nucleus, and the limitation due to the fission process in the population of the SD nuclei in the A = 190 region. (author). 120 refs., 112 figs., 22 tabs., 2 ann.

  4. Control of Transboundary Movement of Radioactive Material Inadvertently Incorporated into Scrap Metal and Semi-finished Products of the Metal Recycling Industries. Results of the Meetings Conducted to Develop a Draft Code of Conduct

    International Nuclear Information System (INIS)

    2014-02-01

    In 2010, the IAEA initiated the development of a code of conduct on the transboundary movement of radioactive material inadvertently incorporated into scrap metal and semi- finished products of the metal recycling industries (Metal Recycling Code of Conduct). The Metal Recycling Code of Conduct was intended to harmonize the approaches of Member States in relation to the discovery of radioactive material that may inadvertently be present in scrap metals and semi-finished products subject to transboundary movement, and their safe handling and management to facilitate regulatory control. The Metal Recycling Code of Conduct was envisaged as being complementary to the Safety Guide on Control of Orphan Sources and Other Radioactive Material in the Metal Recycling and Production Industries (IAEA Safety Standards Series No. SSG-17), which provides recommendations, principally within a national context, on the protection of workers, members of the public and the environment in relation to the control of radioactive material inadvertently incorporated in scrap metal. In February 2013, the third open-ended meeting of technical and legal experts to develop the Metal Recycling Code of Conduct was organized. The objective of this meeting was to address the comments received from Member States and to finalize the text of the draft Metal Recycling Code of Conduct. Representatives from 55 Member States, one non-Member State and the EU, together with seven observers from the metal recycling industry, reviewed the comments and revised the draft accordingly. In September 2013, in Resolution GC(57)/RES/9, the IAEA General Conference recorded that it 'Appreciates the intensive efforts undertaken by the Secretariat to develop a code of conduct on the transboundary movement of scrap metal, or materials produced from scrap metal, that may inadvertently contain radioactive material, and encourages the Secretariat to make the results of the discussion conducted on this issue available to

  5. Identification of deformed intruder states in semi-magic Ni70

    Energy Technology Data Exchange (ETDEWEB)

    Chiara, C. J.; Weisshaar, D.; Janssens, R. V. F.; Tsunoda, Y.; Otsuka, T.; Harker, J. L.; Walters, W. B.; Recchia, F.; Albers, M.; Alcorta, M.; Bader, V. M.; Baugher, T.; Bazin, D.; Berryman, J. S.; Bertone, P. F.; Campbell, C. M.; Carpenter, M. P.; Chen, J.; Crawford, H. L.; David, H. M.; Doherty, D. T.; Gade, A.; Hoffman, C. R.; Honma, M.; Kondev, F. G.; Korichi, A.; Langer, C.; Larson, N.; Lauritsen, T.; Liddick, S. N.; Lunderberg, E.; Macchiavelli, A. O.; Noji, S.; Prokop, C.; Rogers, A. M.; Seweryniak, D.; Shimizu, N.; Stroberg, S. R.; Suchyta, S.; Utsuno, Y.; Williams, S. J.; Wimmer, K.; Zhu, S.

    2015-04-01

    The structure of semi-magic Ni-70(28)42 was investigated following complementary multinucleon-transfer and secondary fragmentation reactions. Changes to the higher-spin, presumed negative-parity states based on observed gamma-ray coincidence relationships result in better agreement with shell-model calculations using effective interactions in the neutron f(5/2)pg(9/2) model space. The second 2(+) and (4(+)) states, however, can only be successfully described when proton excitations across the Z = 28 shell gap are included. Monte Carlo shell-model calculations suggest that the latter two states are part of a prolate-deformed intruder sequence, establishing an instance of shape coexistence at low excitation energies similar to that observed recently in neighboring Ni-68.

  6. Evaluation of stress patterns on maxillary posterior segment when intruded with mini implant anchorage: A three-dimensional finite element study

    Directory of Open Access Journals (Sweden)

    Nikhita Pekhale

    2016-01-01

    Full Text Available Introduction: The aim of this study is to evaluate stress and displacement effects of maxillary posterior intrusion mechanics with mini-implant anchorage by using finite element method. Materials and Methods: A computer stimulation of three-dimensional model maxilla with all teeth, PDL, bone, mini-implants, brackets, arch wire, force element, and transpalatal arch was constructed on the basis of average anatomic morphology. Finite element analysis was done to evaluate the amount of stress and its distribution during orthodontic intrusive force. Results: Increased Von Mises stress values were observed in mesio-cervical region of first molar. The middle third of second premolar and second molar and regions adjacent to force application sites also showed relatively high stress values. Minimum stress values were observed in apical region of first premolar as it is away from force application. Conclusion: Using three mini-implant and transpalatal arches, this study demonstrates that significant amount of true intrusion of maxillary molars could be obtained with lesser concentration of stresses in the apical area recorded.

  7. Improving Protection Agains Intruders Using Passive Sonar

    NARCIS (Netherlands)

    Fillinger, L.; Hunter, A.J.; Zampolli, M.; Clarijs, M.C.; Verolme, J.L.

    2011-01-01

    Divers and small vessels are increasingly recognized as a potential threat to high value assets. Harbour and waterside surveillance systems that are used to counter the threat of divers are usually based on active sonar, whose performance can be limited by reverberation in a harbour environment.

  8. Commonwealth Edison captures intruders on screen

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Commonwealth Edison has developed three software programs, with the supporting hardware, that significantly upgrade security monitoring capabilities at nuclear power stations. These are Video Capture, the Alternate Perimeter Alarm Reporting System, and the Redundant Access Control System. Conventional video systems only display what is happening at the moment and rewinding a VCR to discover what occurred earlier takes time. With Video Capture the images can be instantly restored to the monitor screen and printed out. When one of the security devices used to monitor the perimeter of a Commonwealth Edison nuclear power station is tripped, the Video Capture program stores the visual image digitally. This is done using similar technology to the employed in fax machines. The security staff are thus able to distinguish immediately between disturbances taking place simultaneously at different security zones. They can magnify and compare the stored images and print them out. The Alternate Perimeter Alarm Reporting System was developed to speed the transmission of alarm signals from the security sensors to the security computer. The Redundant Access Control System (RACS) was originally developed to meet the requirement of the Nuclear Regulatory Commission (NRC) for a secondary computer-operated security measure to monitor employee access to a nuclear power station. When employee drug testing became an additional NRC requirement, the Nuclear Division of Commonwealth Edison asked their programmers to modify RACS to generate a random list of personnel to be tested for substance abuse. RACS was then further modified to produce numerous station operating reports that had been previously compiled manually. (author)

  9. Report on the training for an intruder

    International Nuclear Information System (INIS)

    Aoki, Yoshikazu; Fukumoto, Masahiro; Saito, Toru; Tsujinaka, Hideyuki

    2002-12-01

    Crisis management section members of Japan Nuclear Cycle Development Institute (JNC) Tokai Works had implemented two types of trainings against terrorism in last Japanese fiscal year and improved the countermeasure against the terrorism. In this fiscal year we trained against the new type of terrorism in the period of about 1 year later of a series of attacks on America by terrorism. As a result of the training some points which need further improvements and new weak points have been availed as follows. (1) Enlightenment of workers' senses against terrorism. Few members of the Emergency Control Center, workers and guards looked tensionless in the training. The sense against terrorism needs to be enlightened. (2) Speediness of initial response. In this training the events using a car went on more rapidly than expected. The rapid response to counter terrorism needs to be examined. (3) Improvement of fundamental countermeasures. The fundamental response of the workers to the terrorism under limited condition before the guard authorities' arrival has been improved further more through the education and trainings. (4) Completeness of the prevention of terrorism. After terrorism occurs, Tokai Works is helpless until the guard authorities arrive. First of all the measure to avoid terrorism occurrence is important. (5) Strengthen the cooperation with the guard authorities. Besides completeness of the prevention of terrorism it is necessary to cope with the guard authorities at ordinary times against an emergency. (author)

  10. How to recognize intruders in your niche

    DEFF Research Database (Denmark)

    Andersen, Hanne

    2006-01-01

    first show the inconsistency between the basic premises underlying Kuhn’s incommensurability thesis and the two standard responses to the thesis. I shall then argue that if one adopts Kuhn’s position, the response must build on a notion of overlap between phenomenal worlds. Finally, I shall argue...

  11. The adverse effects of inadvertent intraoperative intravenous ...

    African Journals Online (AJOL)

    2012-03-03

    Mar 3, 2012 ... We present the case of a 24-year-old woman who was scheduled for an elective diagnostic laparoscopy for chronic pelvic pain. ... Shortly afterwards, the patient developed tachycardia with a heart rate up .... healthy 29-year-old male scheduled for an ambulatory coelioscopic cholecystectomy. Their patient ...

  12. Inadvertent filtering bleb following sutureless cataract surgery

    Directory of Open Access Journals (Sweden)

    Jain Sunil

    2005-01-01

    Full Text Available The case history of a sixty-two-year-old lady, who presented with a bleb in the upper part of her left eye following cataract surgery was studied. The patient had no prior history of any glaucoma surgery. Gonioscopy revealed fishmouthing of the internal aspect of the scleral tunnel incision. The diagnosis of post-cataract filtering bleb was made which was managed by resuturing the wound. This case highlights the use of gonioscopy to visualise and evaluate the internal wound and discusses intraoperative recognition of internal leak and its management with horizontal sutures.

  13. Radiological pathways analysis for spent solvents from the boiler chemical cleaning at the Pickering Nuclear Site

    International Nuclear Information System (INIS)

    Garisto, N.C.; Eslami, Z.; Hodgins, S.; Beaman, T.; Von Svoboda, S.; Marczak, J.

    2006-01-01

    Spent solvents are generated as a result of Boiler Chemical Cleanings (BCC) at CANDU reactor sites. These solutions contain small amount of radioactivity from a number of different sources including: Cut tubes - short sections of boiler tubes are infrequently removed from the boilers for a detailed characterization. These tubes are typically only plugged at the tubesheet allowing the primary side deposits to be exposed to BCC solvents. Tube leaks - primary to secondary side leaks also occur infrequently as a result of tube degradation. Radioactivity from the leaking fluid can consequently be deposited in the sludge on the secondary side of the tubes. Diffusion of tritium - during normal operation of the reactor units, tritium slowly diffuses from the heavy water in the primary heat-transfer system to the light-water coolant on the secondary side. Some of this tritium is retained in the secondary side deposits. The Pickering Nuclear Generating Station (PNGS) would like the flexibility to have several options for handling the spent solvent waste and associated rinse water from BCC. To this end, a radiological pathways analysis was undertaken to determine dose consequences associated with each option. Sample results from this study are included in this paper. The pathways analysis is used in this study to calculate dose to hypothetical receptors including individuals such as truck drivers, incinerator workers, residue (ash) handlers, residents who live near the landfill, inadvertent intruders into the landfill after closure and residents who live near the outfall. This dose is compared to a de minimis dose. A de minimis dose or dose rate represents a level of risk, which is generally accepted as being of no significance. Shipments of spent solvents and rinse water with corresponding doses below de minimis can be sent to conventional (i.e., non-radioactive) landfills for incineration and disposal as the radioactive dose associated with them is much less than natural

  14. Human intrusion into geologic repositories for high-level radioactive waste: potential and prevention

    Energy Technology Data Exchange (ETDEWEB)

    Cameron, F X [Nuclear Regulatory Commission, Washington, DC (USA). Office of Nuclear Regulatory Research

    1981-12-01

    Isolation of high-level radioactive waste over long periods of time requires protection not only from natural events and processes, but also from the deliberate or inadvertent activities of future societies. This paper evaluates the likelihood of inadvertent human intrusion due to the loss of societal memory of the repository site. In addition measures to prevent inadvertent intrusion, and to guide future societies in any decision to deliberately intrude into the repository are suggested.

  15. Processing Polarity: How the Ungrammatical Intrudes on the Grammatical

    Science.gov (United States)

    Vasishth, Shravan; Brussow, Sven; Lewis, Richard L.; Drenhaus, Heiner

    2008-01-01

    A central question in online human sentence comprehension is, "How are linguistic relations established between different parts of a sentence?" Previous work has shown that this dependency resolution process can be computationally expensive, but the underlying reasons for this are still unclear. This article argues that dependency…

  16. Planning for a Violent Intruder Event: The School Nurse's Role.

    Science.gov (United States)

    Selekman, Janice; Melvin, Joseph

    2017-05-01

    School shootings occur too frequently and often with devastating results. The key to prevention and mitigation of these events is to have a plan that is simple, up-to-date, disseminated, and practiced. This article discusses the steps that school nurses can take to work with school administration to prepare themselves, their staff, and their students.

  17. Apoplastic interactions between plants and plant root intruders

    Directory of Open Access Journals (Sweden)

    Kanako eMitsumasu

    2015-08-01

    Full Text Available Numerous pathogenic or parasitic organisms attack plant roots to obtain nutrients, and the apoplast including the plant cell wall is where the plant cell meets such organisms. Root-parasitic angiosperms and nematodes are two distinct types of plant root parasites but share some common features in their strategies for breaking into plant roots. Striga and Orobanche are obligate root parasitic angiosperms that cause devastating agricultural problems worldwide. Parasitic plants form an invasion organ called a haustorium, where plant cell wall degrading enzymes (PCWDEs are highly expressed. Plant-parasitic nematodes are another type of agriculturally important plant root parasite. These nematodes breach the plant cell walls by protruding a sclerotized stylet from which PCWDEs are secreted. Responding to such parasitic invasion, host plants activate their own defense responses against parasites. Endoparasitic nematodes secrete apoplastic effectors to modulate host immune responses and to facilitate the formation of a feeding site. Apoplastic communication between hosts and parasitic plants also contributes to their interaction. Parasitic plant germination stimulants, strigolactones (SLs, are recently identified apoplastic signals that are transmitted over long distances from biosynthetic sites to functioning sites. Here, we discuss recent advances in understanding the importance of apoplastic signals and cell walls for plant-parasite interactions.

  18. Apoplastic interactions between plants and plant root intruders.

    Science.gov (United States)

    Mitsumasu, Kanako; Seto, Yoshiya; Yoshida, Satoko

    2015-01-01

    Numerous pathogenic or parasitic organisms attack plant roots to obtain nutrients, and the apoplast including the plant cell wall is where the plant cell meets such organisms. Root parasitic angiosperms and nematodes are two distinct types of plant root parasites but share some common features in their strategies for breaking into plant roots. Striga and Orobanche are obligate root parasitic angiosperms that cause devastating agricultural problems worldwide. Parasitic plants form an invasion organ called a haustorium, where plant cell wall degrading enzymes (PCWDEs) are highly expressed. Plant-parasitic nematodes are another type of agriculturally important plant root parasite. These nematodes breach the plant cell walls by protruding a sclerotized stylet from which PCWDEs are secreted. Responding to such parasitic invasion, host plants activate their own defense responses against parasites. Endoparasitic nematodes secrete apoplastic effectors to modulate host immune responses and to facilitate the formation of a feeding site. Apoplastic communication between hosts and parasitic plants also contributes to their interaction. Parasitic plant germination stimulants, strigolactones, are recently identified apoplastic signals that are transmitted over long distances from biosynthetic sites to functioning sites. Here, we discuss recent advances in understanding the importance of apoplastic signals and cell walls for plant-parasite interactions.

  19. Probing intruder configurations in $^{186, 188}$Pb using Coulomb excitation

    CERN Multimedia

    Columb excitation measurements to study the shape coexistence, mixing and quadrupole collectivity of the low-lying levels in neutron-deficient $^{188}$Pb nuclei are proposed with a view to extending similar studies to the $^{186}$Pb midshell nucleus. The HIE-ISOLDE beam of $^{186,188}$Pb nuclei will be delivered to MINIBALL+SPEDE set-up for simultaneous in-beam $\\gamma$-ray and conversion electron spectroscopy. The proposed experiment will allow the sign of the quadrupole deformation parameter to be extracted for the two lowest 2$^{+}$ states in $^{188}$Pb. Moreover, the advent of SPEDE will allow probing of the bandhead 0$^{+}$ states via direct measurements of E0 transitions. Beam development is requested to provide pure and instense $^{186}$Pb beam.

  20. Combining the Sterile Insect Technique with Wolbachia-Based Approaches: II--A Safer Approach to Aedes albopictus Population Suppression Programmes, Designed to Minimize the Consequences of Inadvertent Female Release.

    Directory of Open Access Journals (Sweden)

    Dongjing Zhang

    Full Text Available Due to the absence of a perfect method for mosquito sex separation, the combination of the sterile insect technique and the incompatible insect technique is now being considered as a potentially effective method to control Aedes albopictus. In this present study first we examine the minimum pupal irradiation dose required to induce complete sterility in Wolbachia triple-infected (HC, double-infected (GUA and uninfected (GT female Ae. albopictus. The HC line is a candidate for Ae. albopictus population suppression programmes, but due to the risk of population replacement which characterizes this triple infected line, the individuals to be released need to be additionally irradiated. After determining the minimum irradiation dose required for complete female sterility, we test whether sterilization is sufficient to prevent invasion of the triple infection from the HC females into double-infected (GUA populations. Our results indicate that irradiated Ae. albopictus HC, GUA and GT strain females have decreased fecundity and egg hatch rate when irradiated, inversely proportional to the dose, and the complete sterilization of females can be acquired by pupal irradiation with doses above 28 Gy. PCR-based analysis of F1 and F2 progeny indicate that the irradiated HC females, cannot spread the new Wolbachia wPip strain into a small cage GUA population, released at a 1:5 ratio. Considering the above results, we conclude that irradiation can be used to reduce the risk of population replacement caused by an unintentional release of Wolbachia triple-infected Ae. albopictus HC strain females during male release for population suppression.

  1. Design analysis report: high-integrity container for disposal of EPICOR-II prefilter liners

    International Nuclear Information System (INIS)

    Chapman, R.L.; Reno, H.W.

    1983-06-01

    A high-integrity container has been developed to (a) immobilize the EPIROC-II prefilter liners from Unit-2 of the Three Mile Island (TMI) Nuclear Power Station, and (b) protect possible future, inadvertent intruders from damaging radiation. The container is designed for disposal depths to 90 feet in either wet or dry subsurface conditions. A built-in vent system for each container will permit the release of gas and function as a water barrier at pressures reaching 45 psig. The container has outside dimensions of 62.5 inches diameter by 84 inches high, and is designed to ensure a 300-year functional life. Its design features multiple barriers that prevent corrosives from penetrating container walls. The multiple-barrier approach provides a 1204-year mean time to total failure, based on an assumed single-event-failure probability of 20%. The multiple-corrosion-barrier concept is supplemented by aluminum hydroxide, which reduces the chemical activity of corrosives potentially arising from chemical decomposition of organic resins in the EPICOR-II prefilter liner. Aluminum hydroxide, an effective amphoteric material, tends to neutralize both acids and bases. An epoxy seal between the lid and container body functions as a barrier against any loss of container contents. Two separate epoxy materials fill the space between the lid and container body; they form a seal, mechanically bonding the lid in place. After curing, this epoxy material has a greater strength than the concrete; thus, the concrete has to fail in order for the lid to loosen

  2. Intentional and inadvertent chemical contamination of food, water, and medication.

    Science.gov (United States)

    MCKay, Charles; Scharman, Elizabeth J

    2015-02-01

    Numerous examples of chemical contamination of food, water, or medication have led to steps by regulatory agencies to maintain the safety of this critical social infrastructure and supply chain. Identification of contaminant site is important. Environmental testing and biomonitoring can define the nature and extent of the event and are useful for providing objective information, but may be unavailable in time for clinical care. Clinical diagnosis should be based on toxidrome recognition and assessment of public health implications. There are several resources available to assist and these can be accessed through regional poison control centers or local/state public health departments. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. Inadvertent doping through nutritional supplements is a reality

    African Journals Online (AJOL)

    Enrique

    In 1994 legislation was passed by the United States Food and Drug Administration ... resulting in contamination of nutritional supplements, which may be a possible ... Nutritional supplement manufacturing is not subject to the same stringent ...

  4. An Inadvertent Concurrent Replication: Same Roadmap, Different Journey

    Science.gov (United States)

    Lemons, Christopher J.; King, Seth A.; Davidson, Kimberly A.; Berryessa, Teresa L.; Gajjar, Shimul A.; Sacks, Lia H.

    2016-01-01

    Replication is a critical aspect of scientific inquiry that presents a variety of challenges to researchers, even under the best of conditions. We conducted a review of replication rates in special education journals similar to the review conducted by Makel et al. in this issue. Unknowingly conducting independent reviews allowed for an unexpected…

  5. Inadvertent presence of genetically modified elements in maize food ...

    African Journals Online (AJOL)

    owner

    2013-07-31

    Jul 31, 2013 ... The maize imported into Kenya contained Bt genetic elements. Nevertheless, the .... obtained from various open air markets and retail shops located in ... Magic, Bokomo and Temmy) was not successful. Assessment of cry1Ab ...

  6. Inadvertent injection of succinylcholine as an epidural test dose

    Directory of Open Access Journals (Sweden)

    Chryssa Pourzitaki

    Full Text Available Abstract Background and objectives: Epidural action of neuromuscular blocking agents could be explained under the light of their physicochemical characteristics and epidural space properties. In the literature there are few cases of accidental neuromuscular agent's epidural administration, manifesting mainly with neuromuscular blockade institution or fasciculations. Case report: We report a case of accidental succinylcholine administration as an epidural test dose, in a female patient undergoing scheduled laparotomy, under combined general and epidural anesthesia. Approximately 2 min after the succinylcholine injection the patient complained for shortness of breath, while mild fasciculations appeared in her trunk and face, managed by immediate general anesthesia institution. With the exception of a relatively longer duration of neuromuscular blockade compared with intravenous administration, no neurological or cardiovascular sequelae or other symptoms of local or systemic toxicity were observed. Conclusions: Oral administration of diazepam seems to lessen the adverse effects from accidental epidural administration of succinylcholine. The meticulous and discriminative labeling of syringes, as well as keeping persistent cautions during all anesthesia procedures remains of crucial importance.

  7. Inadvertent Exemplars: Life History Portraits of Two Socially Just Principals

    Science.gov (United States)

    Scanlan, Martin

    2012-01-01

    This study creates life history portraits of two White middle-class native-English-speaking principals demonstrating commitments to social justice in their work in public elementary schools serving disproportionately high populations of students who are marginalized by poverty, race, and linguistic heritage. Through self-reported life histories of…

  8. Inadvertent destruction of the spinal cord by radiation therapy

    International Nuclear Information System (INIS)

    Bhavilai, D.

    1974-01-01

    A case of radiation myelopathy following cobalt therapy of a carcinoma of the esophagus is presented. A permanent quadriplegia resulted. Radiation myelopathy can result from treatment with x-rays or radioactive cobalt regardless of whether the condition being treated involves the spinal cord. No effective treatment is known. Prevention requires keeping the radiation at low level

  9. Incident of inadvertent radiation exposure in a linac bunker

    International Nuclear Information System (INIS)

    Aerts, M.G.

    2010-01-01

    Full text: Implementation of a new Biomedical Equipment and service database poses special challenges. This paper describes the challenges and solutions during implementation of BEIMS (Mercury Computers) at RPAH and other sites within SSWAHS. During implementation we faced challenges of Code/Label design, workflow redesign, and data cleanup. Considerable time and effort went into the design of descriptive codes for breakdowns, tests, equipment types, meta-categories and the like. Some of the codes are explored and described to allow adoption by other entities if desired. Workflow redesign required us to include considerations of biomedical Technicians and Nurse Requestors. A simplified document was created for the self-education of Requestors and a full user manual (complete with screen shots) was created for Biomeds. More work remains, including simplification of standardised reports and ability to generate KPI's. The result is a system with improved utility compared to the old system and a flexible design enabling future improvements. (author)

  10. Analysis of operating experience data in nuclear power plants

    International Nuclear Information System (INIS)

    Watanabe, Norio; Hirano, Masashi; Oikawa, Tetsukuni

    1991-09-01

    This report analyzes pressurized water reactor (PWR) and boiling water reactor (BWR) experience involving loss of decay heat removal (DHR) during reactor shutdown. Referring to USNRC's Licensee Event Reports (LERs), OECD/NEA-IRS reports, etc., we selected 206 loss of DHR events which have occurred in PWRs between 1976 and 1990 and 48 events in BWRs between 1985 and 1990. Analysis of 197 events which have occurred in U.S. PWRs indicates that the following direct causes are major contributions resulting in loss of DHR during reactor shutdown: 1) Inadvertent automatic closure of the suction/isolation valves in residual heat removal (RHR) system, 2) RHR pump cavitation due to air entrainment in reduced coolant inventory condition, and 3) Loss of power to RHR pumps. Human factors deficiencies involving procedural inadequacies and personnel errors were identified as the most significant underlying or root causes of the loss of DHR events. Most of the errors were committed during maintenance, testing and repair works. As for 48 events in U.S. BWRs, the leading category of loss DHR events was the inadvertent automatic closure of the suction/isolation valves in RHR system, most of which were caused by human errors. This report describes the above analysis results and presents the events description for the selected significant events. As well, the brief descriptions of the 206 events in PWRs and 48 events in BWRs are provided in Appendix. (author)

  11. Optimal Stabilization of Social Welfare under Small Variation of Operating Condition with Bifurcation Analysis

    Science.gov (United States)

    Chanda, Sandip; De, Abhinandan

    2016-12-01

    A social welfare optimization technique has been proposed in this paper with a developed state space based model and bifurcation analysis to offer substantial stability margin even in most inadvertent states of power system networks. The restoration of the power market dynamic price equilibrium has been negotiated in this paper, by forming Jacobian of the sensitivity matrix to regulate the state variables for the standardization of the quality of solution in worst possible contingencies of the network and even with co-option of intermittent renewable energy sources. The model has been tested in IEEE 30 bus system and illustrious particle swarm optimization has assisted the fusion of the proposed model and methodology.

  12. Analysis

    DEFF Research Database (Denmark)

    Mathiesen, Brian Vad; Liu, Wen; Zhang, Xiliang

    2014-01-01

    three major technological changes: energy savings on the demand side, efficiency improvements in energy production, and the replacement of fossil fuels by various sources of renewable energy. Consequently, the analysis of these systems must include strategies for integrating renewable sources...

  13. Anticipated transient without scram analysis of the simplified boiling water reactor following main steam isolation valve closure with boron injection

    International Nuclear Information System (INIS)

    Khan, H.J.; Cheng, H.S.; Rohatgi, U.S.

    1996-01-01

    The simplified boiling water reactor (SBWR) operating in natural circulation is designed with many passive safety features. An anticipated transient without scram (ATWS) initiated by inadvertent closure of the main steam isolation valve (MSIV) in an SBWR has been analyzed using the RAMONA-4B code of Brookhaven National Laboratory. This analysis demonstrates the predicted performance of the SBWR during an MSIV closure ATWS, followed by shutdown of the reactor through injection of boron into the reactor core from the standby liquid control system

  14. A Case of Transfusion Error in a Trauma Patient With Subsequent Root Cause Analysis Leading to Institutional Change

    Directory of Open Access Journals (Sweden)

    Sean Patrick Clifford MD

    2016-05-01

    Full Text Available A 28-year-old man presented emergently to the operating room following a gun-shot injury to his right groin. Our hospital’s Massive Transfusion Protocol was initiated as the patient entered the operating room actively hemorrhaging and severely hypotensive. During the aggressive resuscitation efforts, the patient was inadvertently transfused 2 units of packed red blood cells intended for another patient due to a series of errors. Fortunately, the incorrect product was compatible, and the patient recovered from his near-fatal injuries. Root cause analysis was used to review the transfusion error and develop an action plan to help prevent future occurrences.

  15. A Case of Transfusion Error in a Trauma Patient With Subsequent Root Cause Analysis Leading to Institutional Change.

    Science.gov (United States)

    Clifford, Sean Patrick; Mick, Paul Brian; Derhake, Brian Matthew

    2016-01-01

    A 28-year-old man presented emergently to the operating room following a gun-shot injury to his right groin. Our hospital's Massive Transfusion Protocol was initiated as the patient entered the operating room actively hemorrhaging and severely hypotensive. During the aggressive resuscitation efforts, the patient was inadvertently transfused 2 units of packed red blood cells intended for another patient due to a series of errors. Fortunately, the incorrect product was compatible, and the patient recovered from his near-fatal injuries. Root cause analysis was used to review the transfusion error and develop an action plan to help prevent future occurrences.

  16. Analysis of Two Electrocution Accidents in Greece that Occurred due to Unexpected Re-energization of Power Lines

    Directory of Open Access Journals (Sweden)

    Aikaterini D. Baka

    2014-09-01

    Full Text Available Investigation and analysis of accidents are critical elements of safety management. The over-riding purpose of an organization in carrying out an accident investigation is to prevent similar accidents, as well as seek a general improvement in the management of health and safety. Hundreds of workers have suffered injuries while installing, maintaining, or servicing machinery and equipment due to sudden re-energization of power lines. This study presents and analyzes two electrical accidents (1 fatal injury and 1 serious injury that occurred because the power supply was reconnected inadvertently or by mistake.

  17. Analysis of Two Electrocution Accidents in Greece that Occurred due to Unexpected Re-energization of Power Lines.

    Science.gov (United States)

    Baka, Aikaterini D; Uzunoglu, Nikolaos K

    2014-09-01

    Investigation and analysis of accidents are critical elements of safety management. The over-riding purpose of an organization in carrying out an accident investigation is to prevent similar accidents, as well as seek a general improvement in the management of health and safety. Hundreds of workers have suffered injuries while installing, maintaining, or servicing machinery and equipment due to sudden re-energization of power lines. This study presents and analyzes two electrical accidents (1 fatal injury and 1 serious injury) that occurred because the power supply was reconnected inadvertently or by mistake.

  18. Calculations for BDAS Setpoint with Non-conservative Boron Dilution Analysis

    International Nuclear Information System (INIS)

    Lee, Hwan Soo; Shin, Ho Cheol; Kim, Yong Bae

    2014-01-01

    BDAS (Boron Dilution Alarm System) utilizes the ex-core detector instrumentation signals to detect a possible inadvertent boron dilution event during operation mode 3, 4, 5, 6. For boron dilution analysis, discrepancies in the active coolant volume and the assumed linearity of the ex-core instrumentation response were identified for CE type PWR and they were reported by NASL-04-02 These discrepancies have potential to impact to determine BDAS setpoint in a non-conservative manner Therefore, in this study, the calculation of BDAS setpoint with those discrepancies condition about OPR1000 was performed and analyzed for checking the safety of BDAS. The new BDAS setpoint is calculated with conservative condition which recommended from Westinghouse Electric Company. The setpoint of BDAS using non-linear ICRR curve decrease to about 5% compared to the setpoint of that using linear ICRR curve. And this effect of the non-linearity is to slightly delay the boron dilution alarm during the inadvertence boron dilution at mode 3, 4, and 5

  19. Seroepidemiological profile of pregnant women after inadvertent rubella vaccination in the state of Rio de Janeiro, Brazil, 2001-2002 Perfil seroepidemiológico de embarazadas después de recibir inadvertidamente la vacuna antirrubeólica, estado de Rio de Janeiro, Brasil, 2001-2002

    Directory of Open Access Journals (Sweden)

    Gloria Regina da Silva e Sá

    2006-06-01

    Full Text Available OBJECTIVES: To analyze postvaccination serological status in pregnant women inadvertently vaccinated against rubella in the state of Rio de Janeiro, Brazil. METHODS: This was a cross-sectional study of pregnant women 15 to 29 years old, vaccinated against rubella and measles from November 2001 to March 2002, who were unaware of their pregnancy at the time of vaccination or who became pregnant within 30 days thereafter. They were tested for rubella-specific immunoglobulin M (IgM and G (IgG and classified as immune (IgM-negative, IgG-positive, tested within 30 days after vaccination, susceptible (IgM-positive after vaccination or indeterminate (IgM-negative, IgG-positive, vaccination- serological testing interval greater than 30 days. RESULTS: Of 2 292 women, 288 (12.6% were susceptible, 316 (13.8% immune, 1 576 (68.8% indeterminate, 8 (0.3% ineligible, and 104 (4.5% lost to follow-up. IgM seropositivity by vaccination-serological testing interval was 16.1% (d" 30 days, 15.4% (30-60 days, and 14.2% (61-90 days. Considering the campaign's target age, the 20-to-24-year age group had the largest proportion of individuals susceptible to rubella (14.8% and represented 42.4% (122/288 of all susceptible women. In 75% of susceptible pregnant women, gestational age was 5 weeks or less at the time of vaccination. CONCLUSIONS: Mass immunization of childbearing-age women was justified on the basis of epidemiological and serological data. Follow-up of vaccinated pregnant women revealed no cases of congenital rubella syndrome due to rubella vaccination. However, the observed rate of congenital infection supports the recommendation to avoid vaccinating pregnant women, and to avoid conception for up to 1 month following rubella vaccination.OBJETIVOS: Analizar el estado serológico de mujeres embarazadas tras haber recibido inadvertidamente la vacuna antirrubeólica, en el estado de Rio de Janeiro, Brasil. MÉTODOS: Se realizó un estudio transversal de mujeres

  20. Review of the treat upgrade reactor scram system reliability analysis

    International Nuclear Information System (INIS)

    Montague, D.F.; Fussell, J.B.; Krois, P.A.; Morelock, T.C.; Knee, H.E.; Manning, J.J.; Haas, P.M.; West, K.W.

    1984-10-01

    In order to resolve some key LMFBR safety issues, ANL personnel are modifying the TREAT reactor to handle much larger experiments. As a result of these modifications, the upgraded Treat reactor will not always operate in a self-limited mode. During certain experiments in the upgraded TREAT reactor, it is possible that the fuel could be damaged by overheating if, once the computer systems fail, the reactor scram system (RSS) fails on demand. To help ensure that the upgraded TREAT reactor is shut down when required, ANL personnel have designed a triply redundant RSS for the facility. The RSS is designed to meet three reliability goals: (1) a loss of capability failure probability of 10 -9 /demand (independent failures only); (2) an inadvertent shutdown probability of 10 -3 /experiment; and (3) protection agaist any known potential common cause failures. According to ANL's reliability analysis of the RSS, this system substantially meets these goals

  1. Elemental and Microscopic Analysis of Naturally Occurring C-O-Si Hetero-Fullerene-Like Structures.

    Science.gov (United States)

    Hullavarad, Nilima V; Hullavarad, Shiva S; Fochesatto, Javier

    2015-03-01

    Carbon exhibits an ability to form a wide range of structures in nature. Under favorable conditions, carbon condenses to form hollow, spheroid fullerenes in an inert atmosphere. Using high resolution FESEM, we have concealed the existence of giant hetero-fullerene like structures in the natural form. Clear, distinct features of connected hexagons and pentagons were observed. Energy dispersive X-ray analysis depth-profile of natural fullerene structures indicates that Russian-doll-like configurations composed of C, 0, and Si rings exist in nature. The analysis is based on an outstanding molecular feature found in the size fraction of aerosols having diameters 150 nm to 1.0 µm. The fullerene like structures, which are ~ 150 nm in diameter, are observed in large numbers. To the best of our knowledge, this is the first direct detailed observation of natural fullerene-like structures. This article reports inadvertent observation of naturally occurring hetero-fullerene-like structures in the Arctic.

  2. Uncertainty analysis for hot channel

    International Nuclear Information System (INIS)

    Panka, I.; Kereszturi, A.

    2006-01-01

    The fulfillment of the safety analysis acceptance criteria is usually evaluated by separate hot channel calculations using the results of neutronic or/and thermo hydraulic system calculations. In case of an ATWS event (inadvertent withdrawal of control assembly), according to the analysis, a number of fuel rods are experiencing DNB for a longer time and must be regarded as failed. Their number must be determined for a further evaluation of the radiological consequences. In the deterministic approach, the global power history must be multiplied by different hot channel factors (kx) taking into account the radial power peaking factors for each fuel pin. If DNB occurs it is necessary to perform a few number of hot channel calculations to determine the limiting kx leading just to DNB and fuel failure (the conservative DNBR limit is 1.33). Knowing the pin power distribution from the core design calculation, the number of failed fuel pins can be calculated. The above procedure can be performed by conservative assumptions (e.g. conservative input parameters in the hot channel calculations), as well. In case of hot channel uncertainty analysis, the relevant input parameters (k x, mass flow, inlet temperature of the coolant, pin average burnup, initial gap size, selection of power history influencing the gap conductance value) of hot channel calculations and the DNBR limit are varied considering the respective uncertainties. An uncertainty analysis methodology was elaborated combining the response surface method with the one sided tolerance limit method of Wilks. The results of deterministic and uncertainty hot channel calculations are compared regarding to the number of failed fuel rods, max. temperature of the clad surface and max. temperature of the fuel (Authors)

  3. Social instigation and repeated aggressive confrontations in male Swiss mice: analysis of plasma corticosterone, CRF and BDNF levels in limbic brain areas

    Directory of Open Access Journals (Sweden)

    Paula Madeira Fortes

    2017-06-01

    Full Text Available Abstract Introduction: Agonistic behaviors help to ensure survival, provide advantage in competition, and communicate social status. The resident-intruder paradigm, an animal model based on male intraspecific confrontations, can be an ethologically relevant tool to investigate the neurobiology of aggressive behavior. Objectives: To examine behavioral and neurobiological mechanisms of aggressive behavior in male Swiss mice exposed to repeated confrontations in the resident intruder paradigm. Methods: Behavioral analysis was performed in association with measurements of plasma corticosterone of mice repeatedly exposed to a potential rival nearby, but inaccessible (social instigation, or to 10 sessions of social instigation followed by direct aggressive encounters. Moreover, corticotropin-releasing factor (CRF and brain-derived neurotrophic factor (BNDF were measured in the brain of these animals. Control mice were exposed to neither social instigation nor aggressive confrontations. Results: Mice exposed to aggressive confrontations exhibited a similar pattern of species-typical aggressive and non-aggressive behaviors on the first and the last session. Moreover, in contrast to social instigation only, repeated aggressive confrontations promoted an increase in plasma corticosterone. After 10 aggressive confrontation sessions, mice presented a non-significant trend toward reducing hippocampal levels of CRF, which inversely correlated with plasma corticosterone levels. Conversely, repeated sessions of social instigation or aggressive confrontation did not alter BDNF concentrations at the prefrontal cortex and hippocampus. Conclusion: Exposure to repeated episodes of aggressive encounters did not promote habituation over time. Additionally, CRF seems to be involved in physiological responses to social stressors.

  4. The Use Of Computational Human Performance Modeling As Task Analysis Tool

    Energy Technology Data Exchange (ETDEWEB)

    Jacuqes Hugo; David Gertman

    2012-07-01

    During a review of the Advanced Test Reactor safety basis at the Idaho National Laboratory, human factors engineers identified ergonomic and human reliability risks involving the inadvertent exposure of a fuel element to the air during manual fuel movement and inspection in the canal. There were clear indications that these risks increased the probability of human error and possible severe physical outcomes to the operator. In response to this concern, a detailed study was conducted to determine the probability of the inadvertent exposure of a fuel element. Due to practical and safety constraints, the task network analysis technique was employed to study the work procedures at the canal. Discrete-event simulation software was used to model the entire procedure as well as the salient physical attributes of the task environment, such as distances walked, the effect of dropped tools, the effect of hazardous body postures, and physical exertion due to strenuous tool handling. The model also allowed analysis of the effect of cognitive processes such as visual perception demands, auditory information and verbal communication. The model made it possible to obtain reliable predictions of operator performance and workload estimates. It was also found that operator workload as well as the probability of human error in the fuel inspection and transfer task were influenced by the concurrent nature of certain phases of the task and the associated demand on cognitive and physical resources. More importantly, it was possible to determine with reasonable accuracy the stages as well as physical locations in the fuel handling task where operators would be most at risk of losing their balance and falling into the canal. The model also provided sufficient information for a human reliability analysis that indicated that the postulated fuel exposure accident was less than credible.

  5. PWR core safety analysis with 3-dimensional methods

    International Nuclear Information System (INIS)

    Gensler, A.; Kühnel, K.; Kuch, S.

    2015-01-01

    Highlights: • An overview of AREVA’s safety analysis codes their coupling is provided. • The validation base and licensing applications of these codes are summarized. • Coupled codes and methods provide improved margins and non-conservative results. • Examples for REA and inadvertent opening of the pressurizer safety valve are given. - Abstract: The main focus of safety analysis is to demonstrate the required safety level of the reactor core. Because of the demanding requirements, the quality of the safety analysis strongly affects the confidence in the operational safety of a reactor. To ensure the highest quality, it is essential that the methodology consists of appropriate analysis tools, an extensive validation base, and last but not least highly educated engineers applying the methodology. The sophisticated 3-dimensional core models applied by AREVA ensure that all physical effects relevant for safety are treated and the results are reliable and conservative. Presently AREVA employs SCIENCE, CASMO/NEMO and CASCADE-3D for pressurized water reactors. These codes are currently being consolidated into the next generation 3D code system ARCADIA®. AREVA continuously extends the validation base, including measurement campaigns in test facilities and comparisons of the predictions of steady state and transient measured data gathered from plants during many years of operation. Thus, the core models provide reliable and comprehensive results for a wide range of applications. For the application of these powerful tools, AREVA is taking benefit of its interdisciplinary know-how and international teamwork. Experienced engineers of different technical backgrounds are working together to ensure an appropriate interpretation of the calculation results, uncertainty analysis, along with continuously maintaining and enhancing the quality of the analysis methodologies. In this paper, an overview of AREVA’s broad application experience as well as the broad validation

  6. Performance analysis for disposal of mixed low-level waste. 1: Methodology

    International Nuclear Information System (INIS)

    Waters, R.D.; Gruebel, M.M.

    1999-01-01

    A simple methodology has been developed for evaluating the technical capabilities of potential sites for disposal of mixed low-level radioactive waste. The results of the evaluation are expressed as permissible radionuclide concentrations in disposed waste. The methodology includes an analysis of three separate pathways: (1) releases of radionuclides to groundwater; (2) releases of potentially volatile radionuclides to the atmosphere; and (3) the consequences of inadvertent intrusion into a disposal facility. For each radionuclide, its limiting permissible concentration in disposed waste is the lowest of the permissible concentrations determined from each of the three pathways. These permissible concentrations in waste at an evaluated site can be used to assess the capability of the site to dispose of waste streams containing multiple radionuclides

  7. Benchmark analysis of three main circulation pump sequential trip event at Ignalina NPP

    International Nuclear Information System (INIS)

    Uspuras, E.; Kaliatka, A.; Urbonas, R.

    2001-01-01

    The Ignalina Nuclear Power Plant is a twin-unit with two RBMK-1500 reactors. The primary circuit consists of two symmetrical loops. Eight Main Circulation Pumps (MCPs) at the Ignalina NPP are employed for the coolant water forced circulation through the reactor core. The MCPs are joined in groups of four pumps for each loop (three for normal operation and one on standby). This paper presents the benchmark analysis of three main circulation pump sequential trip event at RBMK-1500 using RELAP5 code. During this event all three MCPs in one circulation loop at Unit 2 Ignalina NPP were tripped one after another, because of inadvertent activation of the fire protection system. The comparison of calculated and measured parameters led us to establish realistic thermal hydraulic characteristics of different main circulation circuit components and to verify the model of drum separators pressure and water level controllers.(author)

  8. Can Anyone Hear Me? Does Anyone See Me? A Qualitative Meta-Analysis of Women's Experiences of Heart Disease.

    Science.gov (United States)

    Galick, Aimee; D'Arrigo-Patrick, Elizabeth; Knudson-Martin, Carmen

    2015-08-01

    Female heart patients are underdiagnosed and undertreated. The purpose of this qualitative meta-data-analysis was to explain how societal expectations related to gender and the treatment environment influence women's experiences and can inform optimal care. The authors used grounded theory methodology and a social constructionist gender lens to analyze 43 studies (1993-2012) of women's experiences of heart disease. The analysis illustrates how social expectations within both medical and relational contexts led to women experiencing barriers to diagnosis and treatment and inadvertent minimization of their experience and knowledge. Women's descriptions of their experiences suggest three kinds of health care strategies that have the potential to increase women's engagement with heart disease treatment and rehabilitation: (a) support give and take in relational connections, (b) identify and acknowledge unique health-promoting behavior, and (c) focus on empowerment. These findings have interdisciplinary implications for practice with women with heart disease. © The Author(s) 2015.

  9. Discrimination of source reactor type by multivariate statistical analysis of uranium and plutonium isotopic concentrations in unknown irradiated nuclear fuel material.

    Science.gov (United States)

    Robel, Martin; Kristo, Michael J

    2008-11-01

    The problem of identifying the provenance of unknown nuclear material in the environment by multivariate statistical analysis of its uranium and/or plutonium isotopic composition is considered. Such material can be introduced into the environment as a result of nuclear accidents, inadvertent processing losses, illegal dumping of waste, or deliberate trafficking in nuclear materials. Various combinations of reactor type and fuel composition were analyzed using Principal Components Analysis (PCA) and Partial Least Squares Discriminant Analysis (PLSDA) of the concentrations of nine U and Pu isotopes in fuel as a function of burnup. Real-world variation in the concentrations of (234)U and (236)U in the fresh (unirradiated) fuel was incorporated. The U and Pu were also analyzed separately, with results that suggest that, even after reprocessing or environmental fractionation, Pu isotopes can be used to determine both the source reactor type and the initial fuel composition with good discrimination.

  10. Relationships between hormones and aggressive behavior in green anole lizards: an analysis using structural equation modeling.

    Science.gov (United States)

    Yang, Eun-Jin; Wilczynski, Walter

    2002-09-01

    We investigated the relationship between aggressive behavior and circulating androgens in the context of agonistic social interaction and examined the effect of this interaction on the androgen-aggression relationship in response to a subsequent social challenge in male Anolis carolinensis lizards. Individuals comprising an aggressive encounter group were exposed to an aggressive conspecific male for 10 min per day during a 5-day encounter period, while controls were exposed to a neutral stimulus for the same period. On the sixth day, their responses to an intruder test were observed. At intervals, individuals were sacrificed to monitor plasma androgen levels. Structural equation modeling (SEM) was used to test three a priori interaction models of the relationship between social stimulus, aggressive behavior, and androgen. Model 1 posits that exposure to a social stimulus influences androgen and aggressive behavior independently. In Model 2, a social stimulus triggers aggressive behavior, which in turn increases circulating levels of androgen. In Model 3, exposure to a social stimulus influences circulating androgen levels, which in turn triggers aggressive behavior. During the 5 days of the encounter period, circulating testosterone (T) levels of the aggressive encounter group followed the same pattern as their aggressive behavioral responses, while the control group did not show significant changes in their aggressive behavior or T level. Our SEM results supported Model 2. A means analysis showed that during the intruder test, animals with 5 days of aggressive encounters showed more aggressive responses than did control animals, while their circulating androgen levels did not differ. This further supports Model 2, suggesting that an animal's own aggressive behavior may trigger increases in levels of plasma androgen. Copyright 2002 Elsevier Science (USA)

  11. A Policy Analysis and Quantitative Assessment of Key Issues Arising from Climate Change Negotiations Following COP 7

    Energy Technology Data Exchange (ETDEWEB)

    Sager, J. M

    2003-04-01

    This paper aims to assess the consequences of the amendments made to the Kyoto Protocol during COP 7 in Marrakech. Following a comprehensive policy analysis, the major issue of 'hot air' and CDM transaction costs is examined using the CERT model. This was done to show that primary supply regions, typically those with 'hot air' availability, might control the emissions reduction permit supply market and maximise net export revenues of permit supply by withholding 40 to 60% of available 'hot air' credits. The assumption that primary permit suppliers control permit price via a restriction of 'hot air' supply to the market will inadvertently leave a portion of the market share open to Non-Annex B CDM supply, despite potentially extreme variance in CDM transaction costs. A summary table of policy implications on the emissions reduction permit market is also included in the Appendix. (author)

  12. A Policy Analysis and Quantitative Assessment of Key Issues Arising from Climate Change Negotiations Following COP 7

    Energy Technology Data Exchange (ETDEWEB)

    Sager, J M

    2003-04-01

    This paper aims to assess the consequences of the amendments made to the Kyoto Protocol during COP 7 in Marrakech. Following a comprehensive policy analysis, the major issue of 'hot air' and CDM transaction costs is examined using the CERT model. This was done to show that primary supply regions, typically those with 'hot air' availability, might control the emissions reduction permit supply market and maximise net export revenues of permit supply by withholding 40 to 60% of available 'hot air' credits. The assumption that primary permit suppliers control permit price via a restriction of 'hot air' supply to the market will inadvertently leave a portion of the market share open to Non-Annex B CDM supply, despite potentially extreme variance in CDM transaction costs. A summary table of policy implications on the emissions reduction permit market is also included in the Appendix. (author)

  13. Pressurized Thermal Shock Analysis for OPR1000 Pressure Vessel

    Energy Technology Data Exchange (ETDEWEB)

    Bhowmik, P. K.; Shamim, J. A.; Gairola, A.; Suh, Kune Y. [Seoul National Univ., Seoul (Korea, Republic of)

    2014-10-15

    The study provides a brief understanding of the analysis procedure and techniques using ANSYS, such as the acceptance criteria, selection and categorization of events, thermal analysis, structural analysis including fracture mechanics assessment, crack propagation and evaluation of material properties. PTS may result from instrumentation and control malfunction, inadvertent steam dump, and postulated accidents such as smallbreak (SB) LOCA, large-break (LB) LOCA, main steam line break (MSLB), feedwater line breaks and steam generator overfill. In this study our main focus is to consider only the LB LOCA due to a cold leg break of the Optimized Power Reactor 1000 MWe (OPR1000). Consideration is given as well to the emergency core cooling system (ECCS) specific sequence with the operating parameters like pressure, temperature and time sequences. The static structural and thermal analysis to investigate the effects of PTS on RPV is the main motivation of this study. Specific surface crack effects and its propagation is also considered to measure the integrity of the RPV. This study describes the procedure for pressurized thermal shock analysis due to a loss of coolant accidental condition and emergency core cooling system operation for reactor pressure vessel.. Different accidental events that cause pressurized thermal shock to nuclear RPV that can also be analyzed in the same way. Considering the limitations of low speed computer only the static analysis is conducted. The modified LBLOCA phases and simplified geometry can is utilized to analyze the effect of PTS on RPV for general understanding not for specific specialized purpose. However, by integrating the disciplines of thermal and structural analysis, and fracture mechanics analysis a clearer understanding of the total aspect of the PTS problem has resulted. By adopting the CFD, thermal hydraulics, uncertainties and risk analysis for different type of accidental conditions, events and sequences with proper

  14. Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT)

    Science.gov (United States)

    2016-07-27

    munication. Unfortunately, these critical functions are routinely threatened by malware and other cyber security threats. Such threats are expected to...such as network packets, firewall logs, network diagrams, IP address ownership information, etc., to determine if sufficient evidence exists to support...circumstances, network analysts would likely need to consult additional sources of evidence not present in the simulation, such as net- work firewall

  15. Vulnerabilities of Bluetooth Data Channel that Allow Intruders to Wiretrap User’s Data

    Directory of Open Access Journals (Sweden)

    P. E. Minin

    2012-09-01

    Full Text Available The article is dedicated to the cryptography attack on Bluetooth handsfree headset. The authors describe the situation when hackers could eavesdrop mobile phones talks if a person is using the Bluetooth headset. The vulnerability in the authentication process allows hackers to crack PIN code and to decipher the packets transmitted between the headset and the mobile phone.

  16. Where is the Frame? : Victims and Intruders in the Belgian Press Coverage of the Asylum Issue

    NARCIS (Netherlands)

    Gorp, B. van

    2005-01-01

    In this article an empirically oriented conceptualization of frames is developed, using the issue of asylum and illegal immigration in the Belgian press as a test case. The methodological focus of this study is on the question of how these frames can be detected in the coverage. How can they be

  17. The use of isotope techniques to investigate saltwater intruded aquifers in the Philippines

    International Nuclear Information System (INIS)

    Peralta, G.L.

    1988-01-01

    Studies in Metro Manila area have identified inland bodies of saline water which have been called ''connate water''. It has been refered to in literature as saline water occurring inland at a range of depths, in close association with freshwater. The relationships between these various bodies of saline water are not clear and for groundwater development planning it would be useful to determine whether the inland cases are a series of small isolated residual bodies from the last marine transgression or parts of a large continuous saline body. Furthermore the origin and mechanism of natural groundwater recharges are often not clear from the chemical and hydrogeological data as in the island of Cebu. In these circumstances it was recommended that useful planning data be obtained from a study of the concentrations of natural isotopes in the groundwater, particularly in the areas of Manila, Cebu and Bulacan-Pampanga. (author)

  18. Similarities between the target and the intruder in naturally-occurring repeated person naming errors

    Directory of Open Access Journals (Sweden)

    Serge eBredart

    2015-09-01

    Full Text Available The present study investigated an intriguing phenomenon that did not receive much attention so far: repeatedly calling a familiar person with someone else’s name. From participants’ responses to a questionnaire, these repeated naming errors were characterized with respect to a number of properties (e.g., type of names being substituted, error frequency, error longevity and different features of similarity (e.g., age, gender, type of relationship with the participant, face resemblance and similarity of the contexts of encounter between the bearer of the target name and the bearer of the wrong name. Moreover, it was evaluated whether the phonological similarity between names, the participants’ age, the difference of age between the two persons whose names were substituted, and face resemblance between the two persons predicted the frequency of error. Regression analyses indicated that phonological similarity between the target name and the wrong name predicted the frequency of repeated person naming errors. The age of the participant was also a significant predictor of error frequency: the older the participant the higher the frequency of errors. Consistent with previous research stressing the importance of the age of acquisition of words on lexical access in speech production, results indicated that bearer of the wrong name was on average known for longer than the bearer of the target name.

  19. "Ageing Out": When Policy and Social Orders Intrude on the "Disordered" Realities of Young Mothers

    Science.gov (United States)

    Shoveller, Jean; Chabot, Cathy; Johnson, Joy L.; Prkachin, Ken

    2011-01-01

    Despite a general decline, early-age motherhood continues to manifest disproportionately among young women living in rural/remote Canada. Although public health interventions exist to ameliorate the negative impacts, key determinants of young mothers' well-being exist in sectors outside of health. Moreover, there is no clear understanding of how…

  20. Delayed orthodontic extrusion of a traumatically intruded immature upper permanent incisor - a case report.

    Science.gov (United States)

    Umesan, Uday Kumar; Chua, Kui Lay; Kok, Ei Chuen

    2014-10-01

    Dental injuries are probably the most common orofacial injuries sustained during sports and play. Intrusion or intrusive luxations occur when the teeth are driven into the alveolus by an axially directed impact. This article describes the clinical case of an 8-year-old patient who suffered complete intrusive luxation of an immature permanent central incisor following an accident. An attempt at spontaneous re-eruption failed to facilitate re-emergence of the tooth beyond 2 mm. The recommended wait-and-see strategy in anticipation of spontaneous re-eruption should cease to be an option when no further elongation can be observed. Orthodontic extrusion or surgical re-positioning is a valid treatment alternative when the former fails. In this case, although the recommended time period for effecting orthodontic extrusion had elapsed, this procedure was undertaken successfully presumably owing to the application of controlled, biologically optimal forces. A review of the extruded tooth a year later revealed no clinical or radiographic signs of loss of vitality. This was confirmed radiographically by the completion of root development, an intact lamina dura and no evident signs of resorption. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  1. Stopping the past from intruding the present: Social anxiety disorder and proactive interference.

    Science.gov (United States)

    Moore, Harry T A; Gómez-Ariza, Carlos J; Garcia-Lopez, Luis-Joaquín

    2016-04-30

    It has recently been suggested that social anxiety disorder (SAD) entails a deficit in downregulating unwanted (even non-threatening) memories. In the present study we test this hypothesis by comparing a sample of young adults diagnosed with SAD and healthy controls in their ability to resist proactive interference in a working memory task. Where participants performed similarly in the control condition of the memory task, participants with SAD were more susceptible to interference in the experimental condition than the healthy controls. This finding is in line with previous studies that show anxiety to be associated with impoverished executive control and, specifically, suggests that SAD entails a reduced ability to get rid of interfering memories. Clinical implications are discussed. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  2. Low-lying intruder state of the unbound nucleus {sup 13}Be

    Energy Technology Data Exchange (ETDEWEB)

    Kondo, Y., E-mail: kondo@phys.titech.ac.j [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Nakamura, T.; Satou, Y. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Matsumoto, T.; Aoi, N. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Endo, N. [Department of Physics, Tohoku University, 2-1-1 Katahira, Aoba, Sendai, Miyagi 980-8577 (Japan); Fukuda, N.; Gomi, T. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Hashimoto, Y. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Ishihara, M. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Kawai, S. [Department of Physics, Rikkyo University, 3-34-1 Nishi-Ikebukuro, Toshima, Tokyo 171-8501 (Japan); Kitayama, M.; Kobayashi, T.; Matsuda, Y. [Department of Physics, Tohoku University, 2-1-1 Katahira, Aoba, Sendai, Miyagi 980-8577 (Japan); Matsui, N. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Motobayashi, T. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Nakabayashi, T.; Okumura, T. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Ong, H.J.; Onishi, T.K. [Department of Physics, University of Tokyo, 7-3-1 Hongo, Bunkyo, Tokyo 113-0033 (Japan)

    2010-06-21

    An experimental study for the unbound nucleus {sup 13}Be has been performed by means of the invariant mass method via the one-neutron removal reaction {sup 1}H({sup 14}Be,{sup 12}Be+n). A resonance has been observed at 0.51(1) MeV in the relative energy (E{sub rel}) spectrum of the {sup 12}Be+n system. The transverse momentum distribution of the {sup 12}Be+n system as well as the resonance width of 0.45(3) MeV gives evidence for the p-wave nature of the resonance. A d-wave resonance has also been observed at 2.39(5) MeV in the E{sub rel} spectrum. The observation of the low-lying p-wave resonance indicates the disappearance of the N=8 magicity in the vicinity of the neutron drip line region.

  3. Salient eyes deter conspecific nest intruders in wild jackdaws (Corvus monedula).

    Science.gov (United States)

    Davidson, Gabrielle L; Clayton, Nicola S; Thornton, Alex

    2014-02-01

    Animals often respond fearfully when encountering eyes or eye-like shapes. Although gaze aversion has been documented in mammals when avoiding group-member conflict, the importance of eye coloration during interactions between conspecifics has yet to be examined in non-primate species. Jackdaws (Corvus monedula) have near-white irides, which are conspicuous against their dark feathers and visible when seen from outside the cavities where they nest. Because jackdaws compete for nest sites, their conspicuous eyes may act as a warning signal to indicate that a nest is occupied and deter intrusions by conspecifics. We tested whether jackdaws' pale irides serve as a deterrent to prospecting conspecifics by comparing prospectors' behaviour towards nest-boxes displaying images with bright eyes (BEs) only, a jackdaw face with natural BEs, or a jackdaw face with dark eyes. The jackdaw face with BEs was most effective in deterring birds from making contact with nest-boxes, whereas both BE conditions reduced the amount of time jackdaws spent in proximity to the image. We suggest BEs in jackdaws may function to prevent conspecific competitors from approaching occupied nest sites.

  4. Publisher Correction: Western US volcanism due to intruding oceanic mantle driven by ancient Farallon slabs

    Science.gov (United States)

    Zhou, Quan; Liu, Lijun; Hu, Jiashun

    2018-05-01

    In the version of this Article originally published, data points representing mafic eruptions were missing from Fig. 4b, the corrected version is shown below. Furthermore, the authors omitted to include the following acknowledgements to the provider of the computational resources: "This research is part of the Blue Waters sustained-petascale computing project, which is supported by the National Science Foundation (awards OCI-0725070 and ACI-1238993) and the state of Illinois. Blue Waters is a joint effort of the University of Illinois at Urbana-Champaign and its National Center for Supercomputing Applications. This work is also part of the `PRAC Title 4-D Geodynamic Modeling With Data Assimilation: Origin Of Intra-Plate Volcanism In The Pacific Northwest' PRAC allocation support by the National Science Foundation (award number ACI 1516586). This work also used the Extreme Science and Engineering Discovery Environment (XSEDE), which is supported by National Science Foundation grant number ACI-1548562." Figure 4 and the Acknowledgements section have been updated in the online version of the Article.

  5. Hydrogeochemical characterization and groundwater quality assessment in intruded coastal brine aquifers (Laizhou Bay, China).

    Science.gov (United States)

    Zhang, Xiaoying; Miao, Jinjie; Hu, Bill X; Liu, Hongwei; Zhang, Hanxiong; Ma, Zhen

    2017-09-01

    The aquifer in the coastal area of the Laizhou Bay is affected by salinization processes related to intense groundwater exploitation for brine resource and for agriculture irrigation during the last three decades. As a result, the dynamic balances among freshwater, brine, and seawater have been disturbed and the quality of groundwater has deteriorated. To fully understand the groundwater chemical distribution and evolution in the regional aquifers, hydrogeochemical and isotopic studies have been conducted based on the water samples from 102 observation wells. Groundwater levels and salinities in four monitoring wells are as well measured to inspect the general groundwater flow and chemical patterns and seasonal variations. Chemical components such as Na + , K + , Ca 2+ , Mg 2+ , Sr 2+ , Cl - , SO 4 2- , HCO 3 - , NO 3 - , F - , and TDS during the same period are analyzed to explore geochemical evolution, water-rock interactions, sources of salt, nitrate, and fluoride pollution in fresh, brackish, saline, and brine waters. The decreased water levels without typical seasonal variation in the southeast of the study area confirm an over-exploitation of groundwater. The hydrogeochemical characteristics indicate fresh-saline-brine-saline transition pattern from inland to coast where evaporation is a vital factor to control the chemical evolution. The cation exchange processes are occurred at fresh-saline interfaces of mixtures along the hydraulic gradient. Meanwhile, isotopic data indicate that the brine in aquifers was either originated from older meteoric water with mineral dissolution and evaporation or repeatedly evaporation of retained seawater with fresher water recharge and mixing in geological time. Groundwater suitability for drinking is further evaluated according to water quality standard of China. Results reveal high risks of nitrate and fluoride contamination. The elevated nitrate concentration of 560 mg/L, which as high as 28 times of the standard content in drinking water is identified in the south region. In addition, the nitrate and ammonia data of the Wei River suggests decreasing nitrification rate in the study area from inland to estuary. High fluoride concentration, larger than 1 mg/L, is also detected in an area of about 50% of the study region. The saltwater intrusion is analyzed to be responsible for part of dissolution of minerals containing fluoride. Therefore, water treatment before drinking is needed in urgent to reduce the health expose risk.

  6. Uncertainty analysis of one Main Circulation Pump trip event at the Ignalina NPP

    International Nuclear Information System (INIS)

    Vileiniskis, V.; Kaliatka, A.; Uspuras, E.

    2004-01-01

    One Main Circulation Pump (MCP) trip event is an anticipated transient with expected frequency of approximately one event per year. There were a few events when one MCP was inadvertently tripped. The throughput of the rest running pumps in the affected Main Circulation Circuit loop increased, however, the total coolant flow through the affected loop decreased. The main question arises whether this coolant flow rate is sufficient for adequate core cooling. This paper presents an investigation of one MCP trip event at the Ignalina NPP. According to international practice, the transient analysis should consist of deterministic analysis by employing best-estimate codes and uncertainty analysis. For that purpose, the plant's RELAP5 model and the GRS (Germany) System for Uncertainty and Sensitivity Analysis package (SUSA) were employed. Uncertainty analysis of flow energy loss in different parts of the Main Circulation Circuit, initial conditions and code-selected models was performed. Such analysis allows to estimate the influence of separate parameters on calculation results and to find the modelling parameters that have the largest impact on the event studied. On the basis of this analysis, recommendations for the further improvement of the model have been developed. (author)

  7. ANALYSIS OF VENTING OF A RESIN SLURRY

    Energy Technology Data Exchange (ETDEWEB)

    Laurinat, J.; Hensel, S.

    2012-03-27

    A resin slurry venting analysis was conducted to address safety issues associated with overpressurization of ion exchange columns used in the Purex process at the Savannah River Site (SRS). If flow to these columns were inadvertently interrupted, an exothermic runaway reaction could occur between the ion exchange resin and the nitric acid used in the feed stream. The nitric acid-resin reaction generates significant quantities of noncondensable gases, which would pressurize the column. To prevent the column from rupturing during such events, rupture disks are installed on the column vent lines. The venting analysis models accelerating rate calorimeter (ARC) tests and data from tests that were performed in a vented test vessel with a rupture disk. The tests showed that the pressure inside the test vessel continued to increase after the rupture disk opened, though at a slower rate than prior to the rupture. Calculated maximum discharge rates for the resin venting tests exceeded the measured rates of gas generation, so the vent size was sufficient to relieve the pressure in the test vessel if the vent flow rate was constant. The increase in the vessel pressure is modeled as a transient phenomenon associated with expansion of the resin slurry/gas mixture upon rupture of the disk. It is postulated that the maximum pressure at the end of this expansion is limited by energy minimization to approximately 1.5 times the rupture disk burst pressure. The magnitude of this pressure increase is consistent with the measured pressure transients. The results of this analysis demonstrate the need to allow for a margin between the design pressure and the rupture disk burst pressure in similar applications.

  8. Post mitigation impact risk analysis for asteroid deflection demonstration missions

    Science.gov (United States)

    Eggl, Siegfried; Hestroffer, Daniel; Thuillot, William; Bancelin, David; Cano, Juan L.; Cichocki, Filippo

    2015-08-01

    Even though mankind believes to have the capabilities to avert potentially disastrous asteroid impacts, only the realization of mitigation demonstration missions can validate this claim. Such a deflection demonstration attempt has to be cost effective, easy to validate, and safe in the sense that harmless asteroids must not be turned into potentially hazardous objects. Uncertainties in an asteroid's orbital and physical parameters as well as those additionally introduced during a mitigation attempt necessitate an in depth analysis of deflection mission designs in order to dispel planetary safety concerns. We present a post mitigation impact risk analysis of a list of potential kinetic impactor based deflection demonstration missions proposed in the framework of the NEOShield project. Our results confirm that mitigation induced uncertainties have a significant influence on the deflection outcome. Those cannot be neglected in post deflection impact risk studies. We show, furthermore, that deflection missions have to be assessed on an individual basis in order to ensure that asteroids are not inadvertently transported closer to the Earth at a later date. Finally, we present viable targets and mission designs for a kinetic impactor test to be launched between the years 2025 and 2032.

  9. E AREA LOW LEVEL WASTE FACILITY DOE 435.1 PERFORMANCE ASSESSMENT

    Energy Technology Data Exchange (ETDEWEB)

    Wilhite, E

    2008-03-31

    , situated immediately north of the Mixed Waste Management Facility. The E-Area Low-Level Waste Facility is comprised of 200 acres for waste disposal and a surrounding buffer zone that extends out to the 100-m point of compliance. Disposal units within the footprint of the low-level waste facilities include the Slit Trenches, Engineered Trenches, Component-in-Grout Trenches, the Low-Activity Waste Vault, the Intermediate-Level Vault, and the Naval Reactor Component Disposal Area. Radiological waste disposal operations at the E-Area Low-Level Waste Facility began in 1994. E-Area Low-Level Waste Facility closure will be conducted in three phases: operational closure, interim closure, and final closure. Operational closure will be conducted during the 25-year operation period (30-year period for Slit and Engineered Trenches) as disposal units are filled; interim closure measures will be taken for some units. Interim closure will take place following the end of operations and will consist of an area-wide runoff cover along with additional grading over the trench units. Final closure of all disposal units in the E-Area Low-Level Waste Facility will take place at the end of the 100-year institutional control period and will consist of the installation of an integrated closure system designed to minimize moisture contact with the waste and to serve as a deterrent to intruders. Radiological dose to human receptors is analyzed in this PA in the all-pathways analysis, the inadvertent intruder analysis and the air pathway analysis, and the results are compared to the relevant performance measures. For the all-pathways analysis, the performance measure of relevance is a 25-mrem/yr EDE to representative members of the public, excluding dose from radon and its progeny in air. For the inadvertent intruder, the applicable performance measures are 100-mrem/yr EDE and 500 mrem/yr EDE for chronic and exposure scenarios, respectively. The relevant performance measure for the air pathway is 10

  10. Clenbuterol - regional food contamination a possible source for inadvertent doping in sports.

    Science.gov (United States)

    Guddat, S; Fußhöller, G; Geyer, H; Thomas, A; Braun, H; Haenelt, N; Schwenke, A; Klose, C; Thevis, M; Schänzer, W

    2012-06-01

    The misuse of the sympathomimetic and anabolic agent clenbuterol has been frequently reported in professional sport and in the livestock industry. In 2010, a team of athletes returned from competition in China and regular doping control samples were taken within the next two days. All urine samples contained low amounts (pg/ml) of clenbuterol, drawing the attention to a well-known problem: the possibility of an unintended clenbuterol intake with food. A warning that Chinese meat is possibly contaminated with prohibited substances according to international anti-doping regulations was also given by Chinese officials just before the Bejing Olympic Games in 2008. To investigate if clenbuterol can be found in human urine, a study was initiated comprising 28 volunteers collecting urine samples after their return from China. For the quantification of clenbuterol at a low pg/ml level, a very sensitive and specific isotope dilution liquid chromatography-tandem mass spectrometry (LC-MS/MS) assay was developed using liquid/liquid re-extraction for clean-up with a limit of detection and quantification of 1 and 3 pg/ml, respectively. The method was validated demonstrating good precision (intra-day: 2.9-5.5 %; inter-day: 5.1-8.8%), accuracy (89.5-102.5%) and mean recovery (81.4%). Clenbuterol was detectable in 22 (79%) of the analyzed samples, indicating a general food contamination problem despite an official clenbuterol prohibition in China for livestock. Copyright © 2012 John Wiley & Sons, Ltd.

  11. Estimation of long-term probabilities for inadvertent intrusion into radioactive waste management areas

    International Nuclear Information System (INIS)

    Eedy, W.; Hart, D.

    1988-05-01

    The risk to human health from radioactive waste management sites can be calculated as the product of the probability of accidental exposure (intrusion) times the probability of a health effect from such exposure. This report reviews the literature and evaluates methods used to predict the probabilities for unintentional intrusion into radioactive waste management areas in Canada over a 10,000-year period. Methods to predict such probabilities are available. They generally assume a long-term stability in terms of existing resource uses and society in the management area. The major potential for errors results from the unlikeliness of these assumptions holding true over such lengthy periods of prediction

  12. "Real men don't": constructions of masculinity and inadvertent harm in public health interventions.

    Science.gov (United States)

    Fleming, Paul J; Lee, Joseph G L; Dworkin, Shari L

    2014-06-01

    Research shows that constraining aspects of male gender norms negatively influence both women's and men's health. Messaging that draws on norms of masculinity in health programming has been shown to improve both women's and men's health, but some types of public health messaging (e.g., Man Up Monday, a media campaign to prevent the spread of sexually transmitted infections) can reify harmful aspects of hegemonic masculinity that programs are working to change. We critically assess the deployment of hegemonic male norms in the Man Up Monday campaign. We draw on ethical paradigms in public health to challenge programs that reinforce harmful aspects of gender norms and suggest the use of gender-transformative interventions that challenge constraining masculine norms and have been shown to have a positive effect on health behaviors.

  13. Globalisation, Mergers and "Inadvertent Multi-Campus Universities": Reflections from Wales

    Science.gov (United States)

    Zeeman, Nadine; Benneworth, Paul

    2017-01-01

    Multi-site universities face the challenge of integrating campuses that may have different profiles and orientations arising from place-specific attachments. Multi-campus universities created via mergers seeking to ensure long-term financial sustainability, and increasing their attractiveness to students, create a tension in campuses' purposes. We…

  14. Inadvertently programmed bits in Samsung 128 Mbit flash devices: a flaky investigation

    Science.gov (United States)

    Swift, G.

    2002-01-01

    JPL's X2000 avionics design pioneers new territory by specifying a non-volatile memory (NVM) board based on flash memories. The Samsung 128Mb device chosen was found to demonstrate bit errors (mostly program disturbs) and block-erase failures that increase with cycling. Low temperature, certain pseudo- random patterns, and, probably, higher bias increase the observable bit errors. An experiment was conducted to determine the wearout dependence of the bit errors to 100k cycles at cold temperature using flight-lot devices (some pre-irradiated). The results show an exponential growth rate, a wide part-to-part variation, and some annealing behavior.

  15. Confronting inadvertent stigma and pejorative language in addiction scholarship: a recognition and response.

    Science.gov (United States)

    Broyles, Lauren M; Binswanger, Ingrid A; Jenkins, Jennifer A; Finnell, Deborah S; Faseru, Babalola; Cavaiola, Alan; Pugatch, Marianne; Gordon, Adam J

    2014-01-01

    Appropriate use of language in the field of addiction is important. Inappropriate use of language can negatively impact the way society perceives substance use and the people who are affected by it. Language frames what the public thinks about substance use and recovery, and it can also affect how individuals think about themselves and their own ability to change. But most importantly, language intentionally and unintentionally propagates stigma: the mark of dishonor, disgrace, and difference that depersonalizes people, depriving them of individual or personal qualities and personal identity. Stigma is harmful, distressing, and marginalizing to the individuals, groups, and populations who bear it. For these reasons, the Editorial Team of Substance Abuse seeks to formally operationalize respect for personhood in our mission, our public relations, and our instructions to authors. We ask authors, reviewers, and readers to carefully and intentionally consider the language used to describe alcohol and other drug use and disorders, the individuals affected by these conditions, and their related behaviors, comorbidities, treatment, and recovery in our publication. Specifically, we make an appeal for the use of language that (1) respects the worth and dignity of all persons ("people-first language"); (2) focuses on the medical nature of substance use disorders and treatment; (3) promotes the recovery process; and (4) avoids perpetuating negative stereotypes and biases through the use of slang and idioms. In this paper, we provide a brief overview of each of the above principles, along with examples, as well as some of the nuances and tensions that inherently arise as we give greater attention to the issue of how we talk and write about substance use and addiction.

  16. Inadvertent shipment of a radiographic source from Korea to Amersham Corporation, Burlington, Massachusetts

    International Nuclear Information System (INIS)

    1990-05-01

    Amersham Corporation, Burlington, Massachusetts, a licensee of the US Nuclear Regulatory Commission (NRC), authorized to manufacture and distribute iridium-192 and cobalt-60 source assemblies for use in radiography equipment, received a shipment of 14 source changer son March 8, 1990, that were being returned from their product distributor, NDI Corporation in Seoul, Korea. One source changer contained a small sealed source in an unshielded location. Amersham employees retrieved the source, secured it in a hot cell, and notified NRC's Region I. Subsequently, NRC dispatched an Incident Investigation Team to perform a comprehensive review of this incident and determine the potential for exposure to those who handled the source changer and to members of the general public. This report describes the incident and the methodology used in the investigation and presents the Team's findings and conclusions

  17. MRI findings in 6 cases of children by inadvertent ingestion of diphenoxylate-atropine

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Lianxiang [Shandong University School of Medicine, Shandong Medical Imaging Research Institute , No. 44 West Wenhua Road, Jinan 250012 (China); Lin Xiangtao, E-mail: yishui1982@126.com [Shandong University School of Medicine, Shandong Medical Imaging Research Institute, No. 44 West Wenhua Road, Jinan 250012 (China); Cao Jinfeng [Shandong University School of Medicine, Shandong Medical Imaging Research Institute , No. 44 West Wenhua Road, Jinan 250012 (China); Wang Xueyu [Division of Pediatrics, Shandong Provincial Hospital, Shandong University, No. 324 Jingwu Road, Jinan 250021 (China); Wu Lebin [Shandong Medical Imaging Research Institute, No. 324 Jingwu Road, Jinan 250021 (China)

    2011-09-15

    Purpose: Compound diphenoxylate (diphenoxylate-atropine) poisoning can cause toxic encephalopathy in children, and magnetic resonance imaging (MRI) of the brain in this condition has not been reported. This study is to analyze brain MRI findings and to investigate the relations between MRI features and possible pathophysiological changes in children. Methods: Six children accidentally swallowed compound diphenoxylate, 4 males, 2 females, aged 20-46 months, average 33 months. Quantity of ingested diphenoxylate-atropine was from 6 to 30 tablets, each tablet contains diphenoxylate 2.5 mg and atropine 0.025 mg. These patients were referred to our hospital within 24 h after diphenoxylate-atropine ingestion, and underwent brain MRI scan within 24-72 h after emergency treatment. The characteristics of conventional MRI were analyzed. Results: These pediatric patients had various symptoms of opioid intoxication and atropine toxicity. Brain MRI showed abnormal low signal intensity on T1-weighted images (T1WI) and abnormal high signal intensity on T2-weighted images (T2WI) and fluid-attenuated inversion recovery (FLAIR) imaging in bilateral in all cases; abnormal high signal intensity on T1WI, T2WI and FLAIR in 4 cases. Encephalomalacia was observed in 3 cases during follow-up. Conclusion: In the early stage of compound diphenoxylate poisoning in children, multiple extensive edema-necrosis and hemorrhagic-necrosis focus were observed in basic nucleus, pallium and cerebellum, these resulted in the corresponding brain dysfunction with encephalomalacia. MRI scan in the early stage in this condition may provide evidences of brain impairment, and is beneficial for the early diagnosis, treatment and prognosis assessment.

  18. Skills Training to Avoid Inadvertent Plagiarism: Results from a Randomised Control Study

    Science.gov (United States)

    Newton, Fiona J.; Wright, Jill D.; Newton, Joshua D.

    2014-01-01

    Plagiarism continues to be a concern within academic institutions. The current study utilised a randomised control trial of 137 new entry tertiary students to assess the efficacy of a scalable short training session on paraphrasing, patch writing and plagiarism. The results indicate that the training significantly enhanced students' overall…

  19. Vessel biofouling as an inadvertent vector of benthic invertebrates occurring in Brazil.

    Science.gov (United States)

    Farrapeira, Cristiane Maria Rocha; Tenório, Deusinete de Oliveira; Amaral, Fernanda Duarte do

    2011-04-01

    This article reviews the literature involving benthic invertebrates that are cited in association with hull fouling, reporting the species that occur on the Brazilian coast and evaluating the importance of this vector for the introduction of nonindigenous and cryptogenic invertebrates in Brazil. It discusses some of the strategies that were used by the species that allowed for their overseas transport and made it easier to cross natural barriers that otherwise would have been obstacles to their dispersion. The compiled data list 343 species (65% nonindigenous and 35% cryptogenic), mainly from the northwestern Atlantic Ocean. The traveling fauna, composed mostly of cosmopolitan species (70.3%), is primarily euryhaline and marine stenohaline, with sessile and sedentary habits. After delineating the shipborne species' ecological profiles and traveling strategies and evaluating their overlapping vectors, we concluded that hull vessels were the main vector of introduction to the Brazilian coast for 89.8% of the compiled species. Copyright © 2010 Elsevier Ltd. All rights reserved.

  20. Lethal Consequences in an Infant with Myelomeningocele Following an Inadvertent Treatment

    Directory of Open Access Journals (Sweden)

    Xuemei Wu

    2016-01-01

    Full Text Available Myelomeningocele (MMC is a protrusion of spinal cord contents and meninges through a vertebral defect. Iatrogenic deaths of patients with MMC are rarely encountered in forensic practice. In our case, a 3-month-old female was born with a lumbosacral cyst, the size of which had been increasing gradually over age. There was no neurological, orthopedic, or urologic dysfunction. On the day of her death, she received a repetitive and rapid lumbosacral cyst puncture drainage procedure, performed by an illegal medical practitioner. Postmortem autopsy findings confirmed a diagnosis of MMC and the cause of death to be cerebellar tonsillar herniation. This is a pathetic case of preventable infant death. This report suggests that the possibility of MMC should be considered in infants born with a lumbosacral cyst, and aspiration is inadvisable. Besides, forensic autopsy has a valuable role in determining the exact cause of death, identifying, or excluding iatrogenic factors that may be relevant to death following a medical procedure. A final point is that prevention programs should be developed, especially by the health care sectors to reduce such tragedy.

  1. Chemical Facial Cellulitis Due to Inadvertent Injection of Formalin into Oral Tissue Space.

    Science.gov (United States)

    Bector, Aditi; Virk, Pawandeep Sandhu; Arakeri, Gururaj

    2015-11-05

    This paper reports the accidental injection of formalin into oral tissue space, in an 8-year old child resulting in chemical facial necrotizing cellulitis and its management. The common practice of keeping formalin in local anesthesia vials should be avoided by dental clinics, to prevent such unfortunate incidents.

  2. Experience during the monitoring of inactive scrap for the detection of inadvertent presence of radioactivity

    International Nuclear Information System (INIS)

    Sharma, Ranjit; Anoj Kumar; Vikas; Singh, Rajvir; Patra, R.P.; Vikas Kumar; Pradeepkumar, K.S.

    2012-01-01

    The paper describes about the experience gained during the radiation monitoring of inactive scrap generated at various nuclear facilities. This type surveillance is carried out to prevent the spread of radioactivity in public domain and also as requirement by regulatory authorities. The inspection and certification of scrap material from nuclear facilities is a regulatory requirement to ensure that no radioactive material reaches public domain. This paper describes the methodology and experience in detection of radioactivity at inactive Scrap monitoring facility. Inactive scraps (metallic and non metallic) generated from various nuclear facilities of BARC, Trombay is dispatched to Trombay Village Store (TVS) for temporary storage before auction to the public. The monitoring at the facility includes visual inspection and radiation measurement before loading the scrap in the truck. An online PC based monitoring system and portable monitoring instruments in the range (nSv/h-µSv/h) are used to carry out radiation monitoring of inactive scrap loaded in a vehicle. Radioactive source of high activity with potential for serious environmental hazard has not been detected, but few cases of presence of radioactive/contaminated material (MS plate/equipments with low level of 137 Cs contamination) have been detected and identified using portable gamma spectrometer. Implementation of strict regulatory measures and radiation monitoring at nuclear facilities can minimize the probability of radioactive material reaching the public domain. The methodology followed for monitoring of inactive scrap is found to be effective even for detection of presence of radioactivity in scrap if any. (author)

  3. Anomalous concentration gradient in NaI solutions inadvertently frozen in transit

    International Nuclear Information System (INIS)

    Billinghurst, M.W.; Abrams, D.N.; Coutts, A.D.

    1990-01-01

    Therapeutic doses of iodine-131 ( 131 I) are frequently dispensed volumetrically from a stock vial containing a solution of sodium iodide. During the winter months the authors have observed that initial aliquots do not always have the same radioactive concentration as that calculated for the bulk solution. In order to evaluate the cause and extent of this problem, they prepared a stock solution of low radioactive concentration sodium iodide with the same concentration of sodium thiosulfate and pH as that in the stock therapeutic iodine vial. Aliquots of this solution were transferred to plastic tubes and were stored at various temperatures. These results clearly show that when there is a risk of freezing during transportation of therapeutic solutions of sodium iodide it is essential to physically mix the liquid once thawing is complete if therapeutic doses are to be dispensed accurately on a volume basis

  4. Inadvertent exposure to organochlorine pesticides DDT and derivatives in people from the Canary Islands (Spain)

    International Nuclear Information System (INIS)

    Zumbado, Manuel; Goethals, Muriel; Alvarez-Leon, Eva E.; Luzardo, Octavio P.; Cabrera, Felix; Serra-Majem, Lluis; Dominguez-Boada, Luis

    2005-01-01

    In 1998, one of the largest determinations of organochlorine pesticides in a representative sample of a Spanish population (682 serum samples from the Canary Islands) was made in the context of the 'Canary Islands Nutrition Survey' (ENCA). In the Canary Islands, extensive farming areas have been developed in these last decades, with greenhouses dedicated to intensive cultivation using DDT in huge amounts. In Spain, similarly to other European countries, DDT was banned in the late 1970s. The pesticide residues in human serum are indicative of past and present exposure to them. Our objective is to point out the differences of pesticide contamination between islands; and together with this, if a connection could be established with gender, age, or habitat of subjects. Concentration of selected persistent organochlorine pollutants (p,p'-DDT, o,p'-DDT, p,p'-DDE, o,p'-DDE, p,p'-DDD, and o,p'-DDD) was measured with gas chromatography-electron capture detector. Almost all of the samples (99.3%) presented detectable levels of some DDT-derivatives, being p,p'-DDE the most frequently detected organochlorine. The median concentration of total DDT body burden, expressed in ng/g fat, present in the Canary Islands (370 ng/g fat) was similar to that found in other European countries, although it was noteworthy that a fourth of the population showed a total DDT body burden higher than 715 ng/g. Interestingly, statistical significant differences were found in serum levels of organochlorine pesticides between islands, being these levels higher in people from Tenerife and Gran Canaria (415 and 612 ng/g fat, respectively), the islands that present both highest population and highest surface devoted to intensive agriculture. As expected, serum levels of both total DDT body burden and p,p'-DDE increased with age. Statistically significant differences were also found in relation to gender, women showing higher levels of these organochlorine pesticides than men. One of the most relevant findings of this work is the presence of a very high DDT/DDE ratio in people from the Canary Islands, thus indicating a chronic exposure to DDT that persists nowadays. DDT and its derivatives are considered as xenoestrogens, and they have been linked to breast cancer. Having into account that the Canary Islands present high incidence and mortality for breast cancer, our results point to the possibility that these environmental contaminants may be playing a determining role that must be investigated in detail. The high levels of DDT and its derivatives in serum from people living in this Archipelago should be considered a matter of public health concern

  5. Chemical facial cellulitis due to inadvertent injection of formalin into oral tissue space

    Directory of Open Access Journals (Sweden)

    Aditi Bector

    2015-12-01

    Full Text Available This paper reports the accidental injection of formalin into oral tissue space, in an 8-year old child resulting in chemical facial necrotizing cellulitis and its management. The common practice of keeping formalin in local anesthesia vials should be avoided by dental clinics, to prevent such unfortunate incidents.

  6. MRI findings in 6 cases of children by inadvertent ingestion of diphenoxylate-atropine.

    Science.gov (United States)

    Xiao, Lianxiang; Lin, Xiangtao; Cao, Jinfeng; Wang, Xueyu; Wu, Lebin

    2011-09-01

    Compound diphenoxylate (diphenoxylate-atropine) poisoning can cause toxic encephalopathy in children, and magnetic resonance imaging (MRI) of the brain in this condition has not been reported. This study is to analyze brain MRI findings and to investigate the relations between MRI features and possible pathophysiological changes in children. Six children accidentally swallowed compound diphenoxylate, 4 males, 2 females, aged 20-46 months, average 33 months. Quantity of ingested diphenoxylate-atropine was from 6 to 30 tablets, each tablet contains diphenoxylate 2.5mg and atropine 0.025 mg. These patients were referred to our hospital within 24h after diphenoxylate-atropine ingestion, and underwent brain MRI scan within 24-72 h after emergency treatment. The characteristics of conventional MRI were analyzed. These pediatric patients had various symptoms of opioid intoxication and atropine toxicity. Brain MRI showed abnormal low signal intensity on T1-weighted images (T1WI) and abnormal high signal intensity on T2-weighted images (T2WI) and fluid-attenuated inversion recovery (FLAIR) imaging in bilateral in all cases; abnormal high signal intensity on T1WI, T2WI and FLAIR in 4 cases. Encephalomalacia was observed in 3 cases during follow-up. In the early stage of compound diphenoxylate poisoning in children, multiple extensive edema-necrosis and hemorrhagic-necrosis focus were observed in basic nucleus, pallium and cerebellum, these resulted in the corresponding brain dysfunction with encephalomalacia. MRI scan in the early stage in this condition may provide evidences of brain impairment, and is beneficial for the early diagnosis, treatment and prognosis assessment. Crown Copyright © 2010. Published by Elsevier Ireland Ltd. All rights reserved.

  7. MRI findings in 6 cases of children by inadvertent ingestion of diphenoxylate-atropine

    International Nuclear Information System (INIS)

    Xiao Lianxiang; Lin Xiangtao; Cao Jinfeng; Wang Xueyu; Wu Lebin

    2011-01-01

    Purpose: Compound diphenoxylate (diphenoxylate-atropine) poisoning can cause toxic encephalopathy in children, and magnetic resonance imaging (MRI) of the brain in this condition has not been reported. This study is to analyze brain MRI findings and to investigate the relations between MRI features and possible pathophysiological changes in children. Methods: Six children accidentally swallowed compound diphenoxylate, 4 males, 2 females, aged 20-46 months, average 33 months. Quantity of ingested diphenoxylate-atropine was from 6 to 30 tablets, each tablet contains diphenoxylate 2.5 mg and atropine 0.025 mg. These patients were referred to our hospital within 24 h after diphenoxylate-atropine ingestion, and underwent brain MRI scan within 24-72 h after emergency treatment. The characteristics of conventional MRI were analyzed. Results: These pediatric patients had various symptoms of opioid intoxication and atropine toxicity. Brain MRI showed abnormal low signal intensity on T1-weighted images (T1WI) and abnormal high signal intensity on T2-weighted images (T2WI) and fluid-attenuated inversion recovery (FLAIR) imaging in bilateral in all cases; abnormal high signal intensity on T1WI, T2WI and FLAIR in 4 cases. Encephalomalacia was observed in 3 cases during follow-up. Conclusion: In the early stage of compound diphenoxylate poisoning in children, multiple extensive edema-necrosis and hemorrhagic-necrosis focus were observed in basic nucleus, pallium and cerebellum, these resulted in the corresponding brain dysfunction with encephalomalacia. MRI scan in the early stage in this condition may provide evidences of brain impairment, and is beneficial for the early diagnosis, treatment and prognosis assessment.

  8. Intentional, Inadvertent, or Inevitable? James Burrill Angell and Secularization at the University of Michigan.

    Science.gov (United States)

    Bouman, Jeffrey Paul

    The history of James Burrill Angell as the president of the University of Michigan presents a case study of the role of 19th century liberal Protestant university builders in the eventual marginalization of religion from the mainstream of U.S. higher education. Angell's tenure, which began in 1871, encompassed the period in which the modern…

  9. Ecological Automation Design, Extending Work Domain Analysis

    NARCIS (Netherlands)

    Amelink, M.H.J.

    2010-01-01

    In high–risk domains like aviation, medicine and nuclear power plant control, automation has enabled new capabilities, increased the economy of operation and has greatly contributed to safety. However, automation increases the number of couplings in a system, which can inadvertently lead to more

  10. A meta-analysis of executive components of working memory.

    Science.gov (United States)

    Nee, Derek Evan; Brown, Joshua W; Askren, Mary K; Berman, Marc G; Demiralp, Emre; Krawitz, Adam; Jonides, John

    2013-02-01

    Working memory (WM) enables the online maintenance and manipulation of information and is central to intelligent cognitive functioning. Much research has investigated executive processes of WM in order to understand the operations that make WM "work." However, there is yet little consensus regarding how executive processes of WM are organized. Here, we used quantitative meta-analysis to summarize data from 36 experiments that examined executive processes of WM. Experiments were categorized into 4 component functions central to WM: protecting WM from external distraction (distractor resistance), preventing irrelevant memories from intruding into WM (intrusion resistance), shifting attention within WM (shifting), and updating the contents of WM (updating). Data were also sorted by content (verbal, spatial, object). Meta-analytic results suggested that rather than dissociating into distinct functions, 2 separate frontal regions were recruited across diverse executive demands. One region was located dorsally in the caudal superior frontal sulcus and was especially sensitive to spatial content. The other was located laterally in the midlateral prefrontal cortex and showed sensitivity to nonspatial content. We propose that dorsal-"where"/ventral-"what" frameworks that have been applied to WM maintenance also apply to executive processes of WM. Hence, WM can largely be simplified to a dual selection model.

  11. RELAP5 Low Temperature Overpressurization Analysis for NPP Krsko

    International Nuclear Information System (INIS)

    Basic, I.; Krajnc, B.; Bajs, T.

    2000-01-01

    NEK has expressed interest in the acceptability of removing the autoclosure interlock (ACI) on the Residual Heat Removal System (RHRS) suction/isolation valves. This interest is in response to growing concerns about the loss of residual heat removal capability during cold shutdown and refueling operations. This article describes effort done to justify removal of the ACI in the light of low temperature overpressure protection of Reactor Coolant System (RCS) and RHRS and interfacing system LOCA potential. The intent of this article is to review the NEK RHRS relief valves sizing design basis and verify if the relief valves provide RHRS overpressure protection for the events possible at cold shutdown. Inadvertent isolation of RHRS during hot and cold shutdown (with reactor coolant system closed and temperatures below 177o Code 4 and5) presents one of the major safety concerns in this mode of operation. Detailed RELAP5 model of NPP Kriko following steam generator (SG) replacement and core uprate has been used in the frame of this analysis verification of RHRS relief valves sizing. The following limiting cases for cold shutdown with RCS solid conditions have been analyzed: - ransients that affect the system input/output mass balance, - ransients that affect the heat input/removal balance. (author)

  12. Reflections on the glass ceiling: women in the experimental analysis of behavior.

    Science.gov (United States)

    Odum, A L

    2000-01-01

    McSweeney and Swindell (1998) sought to determine whether men and women are treated equitably in the experimental analysis of behavior. They purported to show that women participate less in the Journal of the Experimental Analysis of Behavior than in similar journals and that the participation of women decreases with increases in selectivity. Their data were difficult to interpret, however, because they did not present the variability in the mean data drawn from different individuals over time. My analyses were not in accord with their conclusions. When the percentage of associate editors who are women was considered along with the mean percentages McSweeney and Swindell reported for other measures, participation did not systematically decrease with increases in selectivity in recent years. As quantified in terms of their number of publications in the Journal of the Experimental Analysis of Behavior, women who were editorial board members and associate editors were not more highly selected than their male counterparts. Finally, in the recent period from 1996 to 1998, although women submitted fewer manuscripts to the journal, rejection ratios did not differ for men and women. Efforts to increase the participation of women in the experimental analysis of behavior may best be directed toward recruitment and retention rather than some of the suggestions proposed by McSweeney and Swindell (1998), which could inadvertently create different standards for women's work.

  13. Special Analysis of Transuranic Waste in Trench T04C at the Area 5 Radioactive Waste Management Site, Nevada Test Site, Nye County, Nevada, Revision 1

    International Nuclear Information System (INIS)

    Greg Shott; Vefa Yucel; Lloyd Desotell

    2008-01-01

    This Special Analysis (SA) was prepared to assess the potential impact of inadvertent disposal of a limited quantity of transuranic (TRU) waste in classified Trench 4 (T04C) within the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada Test Site (NTS). The Area 5 RWMS is a low-level radioactive waste disposal site in northern Frenchman Flat on the Nevada Test Site (NTS). The Area 5 RWMS is regulated by the U.S. Department of Energy (DOE) under DOE Order 435.1 and DOE Manual (DOE M) 435.1-1. The primary objective of the SA is to evaluate if inadvertent disposal of limited quantities of TRU waste in a shallow land burial trench at the Area 5 RWMS is in compliance with the existing, approved Disposal Authorization Statement (DAS) issued under DOE M 435.1-1. In addition, supplemental analyses are performed to determine if there is reasonable assurance that the requirements of Title 40, Code of Federal Regulations (CFR), Part 191, Environmental Radiation Protection Standards for Management and Disposal of Spent Nuclear Fuel, High-Level, and Transuranic Radioactive Wastes, can be met. The 40 CFR 191 analyses provide supplemental information regarding the risk to human health and the environment of leaving the TRU waste in T04C. In 1989, waste management personnel reviewing classified materials records discovered that classified materials buried in trench T04C at the Area 5 RWMS contained TRU waste. Subsequent investigations determined that a total of 102 55-gallon drums of TRU waste from Rocky Flats were buried in trench T04C in 1986. The disposal was inadvertent because unclassified records accompanying the shipment indicated that the waste was low-level. The exact location of the TRU waste in T04C was not recorded and is currently unknown. Under DOE M 435.1-1, Chapter IV, Section P.5, low-level waste disposal facilities must obtain a DAS. The DAS specifies conditions that must be met to operate within the radioactive waste management basis, consisting of a

  14. Special Analysis of Transuranic Waste in Trench T04C at the Area 5 Radioactive Waste Management Site, Nevada Test Site, Nye County, Nevada, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Greg Shott, Vefa Yucel, Lloyd Desotell

    2008-05-01

    This Special Analysis (SA) was prepared to assess the potential impact of inadvertent disposal of a limited quantity of transuranic (TRU) waste in classified Trench 4 (T04C) within the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada Test Site (NTS). The Area 5 RWMS is a low-level radioactive waste disposal site in northern Frenchman Flat on the Nevada Test Site (NTS). The Area 5 RWMS is regulated by the U.S. Department of Energy (DOE) under DOE Order 435.1 and DOE Manual (DOE M) 435.1-1. The primary objective of the SA is to evaluate if inadvertent disposal of limited quantities of TRU waste in a shallow land burial trench at the Area 5 RWMS is in compliance with the existing, approved Disposal Authorization Statement (DAS) issued under DOE M 435.1-1. In addition, supplemental analyses are performed to determine if there is reasonable assurance that the requirements of Title 40, Code of Federal Regulations (CFR), Part 191, Environmental Radiation Protection Standards for Management and Disposal of Spent Nuclear Fuel, High-Level, and Transuranic Radioactive Wastes, can be met. The 40 CFR 191 analyses provide supplemental information regarding the risk to human health and the environment of leaving the TRU waste in T04C. In 1989, waste management personnel reviewing classified materials records discovered that classified materials buried in trench T04C at the Area 5 RWMS contained TRU waste. Subsequent investigations determined that a total of 102 55-gallon drums of TRU waste from Rocky Flats were buried in trench T04C in 1986. The disposal was inadvertent because unclassified records accompanying the shipment indicated that the waste was low-level. The exact location of the TRU waste in T04C was not recorded and is currently unknown. Under DOE M 435.1-1, Chapter IV, Section P.5, low-level waste disposal facilities must obtain a DAS. The DAS specifies conditions that must be met to operate within the radioactive waste management basis, consisting of a

  15. The Tile-map Based Vulnerability Assessment Code of a Physical Protection System: SAPE (Systematic Analysis of Protection Effectiveness)

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Kwak, Sung Woo; Yoo, Ho Sik; Kim, Jung Soo; Yoon, Wan Ki

    2008-01-01

    Increasing threats on nuclear facilities demands stronger physical protection system (PPS) within the limited budget. For this reason we need an efficient physical protection system and before making an efficient PPS we need to evaluate it. This evaluation process should faithfully reflect real situation, reveal weak points and unnecessary protection elements, and give comparable quantitative values. Performance based analysis helps to build an efficient physical protection system. Instead of regulating the number of sensors and barriers, the performance based analysis evaluates a PPS fit to the situation of a facility. The analysis assesses delay (sensors) and detection (barriers) of a PPS against an intrusion, and judges whether a response force arrives before intruders complete their job. Performance based analysis needs complicated calculation and, hence, several assessment codes have been developed. A code called the estimation of adversary sequence interruption (EASI) was developed to analyze vulnerability along a single intrusion path. The systematic analysis of vulnerability to intrusion (SAVI) code investigates multi-paths to a valuable asset in an actual facility. SAVI uses adversary sequence diagram to describe multi-paths

  16. Pertinent anatomy and analysis for midface volumizing procedures.

    Science.gov (United States)

    Surek, Christopher C; Beut, Javier; Stephens, Robert; Jelks, Glenn; Lamb, Jerome

    2015-05-01

    The study was conducted to construct an anatomically inspired midfacial analysis facilitating safe, accurate, and dynamic nonsurgical rejuvenation. Emphasis is placed on determining injection target areas and adverse event zones. Twelve hemifacial fresh cadavers were dissected in a layered fashion. Dimensional measurements between the midfacial fat compartments, prezygomatic space, mimetic muscles, and neurovascular bundles were used to develop a topographic analysis for clinical injections. A longitudinal line from the base of the alar crease to the medial edge of the levator anguli oris muscle (1.9 cm), lateral edge of the levator anguli oris muscle (2.6 cm), and zygomaticus major muscle (4.6 cm) partitions the cheek into two aesthetic regions. A six-step facial analysis outlines three target zones and two adverse event zones and triangulates the point of maximum cheek projection. The lower adverse event zone yields an anatomical explanation to inadvertent jowling during anterior cheek injection. The upper adverse event zone localizes the palpebral branch of the infraorbital artery. The medial malar target area isolates quadrants for anterior cheek projection and tear trough effacement. The middle malar target area addresses lid-cheek blending and superficial compartment turgor. The lateral malar target area highlights lateral cheek projection and locates the prezygomatic space. This stepwise analysis illustrates target areas and adverse event zones to achieve midfacial support, contour, and profile in the repose position and simultaneous molding of a natural shape during animation. This reproducible method can be used both procedurally and in record-keeping for midface volumizing procedures.

  17. PHYSICS AND SAFETY ANALYSIS FOR THE NIST RESEARCH REACTOR

    International Nuclear Information System (INIS)

    CHENG, L.; HANSON, A.; DIAMOND, D.; XU, J.; CAREW, J.; RORER, D.

    2004-01-01

    Detailed reactor physics and safety analyses have been performed for the 20 MW D 2 O moderated research reactor (NBSR) at the National Institute of Standards and Technology (NIST). The analyses provide an update to the Final Safety Analysis Report (FSAR) and employ state-of-the-art calculational methods. Three-dimensional Monte Carlo neutron and photon transport calculations were performed with the MCNP code to determine the safety parameters for the NBSR. The core depletion and determination of the fuel compositions were performed with MONTEBURNS. MCNP calculations were performed to determine the beginning, middle, and end-of-cycle power distributions, moderator temperature coefficient, and shim safety arm, beam tube and void reactivity worths. The calculational model included a plate-by-plate description of each fuel assembly, axial mid-plane water gap, beam tubes and the tubular geometry of the shim safety arms. The time-dependent analysis of the primary loop was determined with a RELAP5 transient analysis model that includes the pump, heat exchanger, fuel element geometry, and flow channels for both the six inner and twenty-four outer fuel elements. The statistical analysis used to assure protection from critical heat flux (CHF) was performed using a Monte Carlo simulation of the uncertainties contributing to the CHF calculation. The power distributions used to determine the local fuel conditions and margin to CHF were determined with MCNP. Evaluations were performed for the following accidents: (1) the control rod withdrawal startup accident, (2) the maximum reactivity insertion accident, (3) loss-of-flow resulting from loss of electrical power, (4) loss-of-flow resulting from a primary pump seizure, (5) loss-of-flow resulting from inadvertent throttling of a flow control valve, (6) loss-of-flow resulting from failure of both shutdown cooling pumps and (7) misloading of a fuel element. In both the startup and maximum reactivity insertion accidents, the core

  18. FT4 Data Analysis Summary (SSI-ARC)

    Science.gov (United States)

    Isaacson, Douglas R.; Gong, Chester; Reardon, Scott Edward; Santiago, Confesor

    2016-01-01

    Standards for Unmanned Aircraft System (UAS) Detect-and-Avoid (DAA) systems are currently being developed under the auspices of the RTCA Special Committee 228 (SC-228). To support the development of these standards, a series of flight tests has been conducted at NASAs Armstrong Flight Research Center (NASA-AFRC). The fourth in this series of flight test activities (Flight Test 4, or simply FT4) was conducted during the Spring and Summer of 2016. FT4 supported the objectives of numerous organizations working toward UAS DAA Minimum Operational Performance Standards (MOPS) and UAS DAA Radar MOPS. The summary provided herein is limited to the objectives, analysis and conclusions of the NASA Ames Research Center (NASA-ARC) SSI team toward the refinement of UAS DAA MOPS. This document provides a high-level overview of FT4 and the SSI-ARC objectives, a summary of the data analysis methodology and recommendations for UAS DAA MOPS refinements based on the data analysis results. A total of 72 encounters were flown to support SSI-ARC objectives. Test results were generally consistent with acceptable UAS DAA system performance and will be considered in broader SC-228 requirements validation efforts. Observed alert lead times indicated acceptable UAS DAA alerting performance. Effective interoperability between the UAS DAA system and the Traffic Alert and Collision Avoidance System (TCAS) was observed with one notable exception: TCAS Resolutions Advisories (RA) were observed in the absence of any DAA alert on two occasions, indicating the need for alert parameter refinement. Findings further indicated the need for continued work in the areas of DAA Well Clear Recovery logic and alert stability for Mode-C-only intruders. Finally, results demonstrated a high level of compliance with a set of evaluation criteria designed to provide anecdotal evidence of acceptable UAS DAA system performance.

  19. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  20. Trip setpoint analysis for the reactor protection system of an advanced integral reactor

    International Nuclear Information System (INIS)

    Yang, Soo Hyung; Kim, Soo Hyung; Chung, Young Jong; Zee, Sung Quun

    2007-01-01

    The trip setpoints for the reactor protection system of a 65-MWt advanced integral reactor have been analyzed through sensitivity evaluations by using the Transients and Setpoint Simulation/System-integrated Modular Reactor code. In the analysis, an inadvertent control rod withdrawal event has been considered as an initiating event because this event results in the worst consequences from the viewpoint of the minimum critical heat flux ratio and its consequences are considerably affected by the trip setpoints. Sensitivity evaluations have been performed by changing the trip setpoints for the ceiling of a variable overpower trip (VOPT) function and the pressure of a high pressurizer pressure trip function. Analysis results show that a VOPT function is an effective means to satisfy the acceptance criteria as the control rod rapidly withdraws: on the other hand, a high pressurizer pressure trip function is an essential measure to preserve the safety margin in the case of a slow withdrawal of the control rod because a reactor trip by a VOPT function does not occur in this case. It is also shown that the adoptions of 122.2% of the rated core power and 16.25 MPa as the trip setpoint for the ceiling of a VOPT function and the pressure of a high pressurizer pressure trip function are good selections to satisfy the acceptance criteria

  1. DOE's performance evaluation project for mixed low-level waste disposal

    International Nuclear Information System (INIS)

    Waters, R.D.; Chu, M.S.Y.; Gruebel, M.M.; Lee, D.W.

    1995-01-01

    A performance evaluation (PE) is an analysis that estimates radionuclide concentration limits for 16 potential Department of Energy (DOE) mixed low-level waste (ULLW) disposal sites based on the analysis of two environmental exposure pathways (air and water) to an off-site individual and an inadvertent-intruder exposure pathway. Sites are analyzed for their ability to attenuate concentrations of specific radionuclides that could be released from wastes in a hypothetical ULLW disposal facility. Site-specific data and knowledge are used within a generic framework that is consistent across all sites being evaluated. After estimates of waste concentrations for the three pathways are calculated, the minimum of the waste concentration values is selected as the permissible waste concentration for each radionuclide. The PE results will be used as input to the process for DOE's ULLW disposal configuration. Preliminary comparisons of results from the PE and site-specific performance assessments indicate that the simple PE results generally agree with results of the performance assessments, even when site conditions are complex. This agreement with performance-assessment results increases confidence that similar results can be obtained at other sites that have good characterization data. In addition, the simple analyses contained in the PE illustrate a potential method to satisfy the needs of many regulators and the general public for a simple, conservative, defensible, and easily understandable analysis that provides results similar to those of more complex analyses

  2. Extension of ship accident analysis to multiple-package shipments

    International Nuclear Information System (INIS)

    Mills, G.S.; Neuhauser, K.S.

    1997-11-01

    Severe ship accidents and the probability of radioactive material release from spent reactor fuel casks were investigated previously. Other forms of RAM, e.g., plutonium oxide powder, may be shipped in large numbers of packagings rather than in one to a few casks. These smaller, more numerous packagings are typically placed in ISO containers for ease of handling, and several ISO containers may be placed in one of several holds of a cargo ship. In such cases, the size of a radioactive release resulting from a severe collision with another ship is determined not by the likelihood of compromising a single, robust package but by the probability that a certain fraction of 10's or 100's of individual packagings is compromised. The previous analysis involved a statistical estimation of the frequency of accidents which would result in damage to a cask located in one of seven cargo holds in a collision with another ship. The results were obtained in the form of probabilities (frequencies) of accidents of increasing severity and of release fractions for each level of severity. This paper describes an extension of the same general method in which the multiple packages are assumed to be compacted by an intruding ship's bow until there is no free space in the hold. At such a point, the remaining energy of the colliding ship is assumed to be dissipated by progressively crushing the RAM packagings and the probability of a particular fraction of package failures is estimated by adaptation of the statistical method used previously. The parameters of a common, well characterized packaging, the 6M with 2R inner containment vessel, were employed as an illustrative example of this analysis method. However, the method is readily applicable to other packagings for which crush strengths have been measured or can be estimated with satisfactory confidence

  3. Extension of ship accident analysis to multiple-package shipments

    International Nuclear Information System (INIS)

    Mills, G.S.; Neuhauser, K.S.

    1998-01-01

    Severe ship accidents and the probability of radioactive material release from spent reactor fuel casks were investigated previously (Spring, 1995). Other forms of RAM, e.g., plutonium oxide powder, may be shipped in large numbers of packagings rather than in one to a few casks. These smaller, more numerous packagings are typically placed in ISO containers for ease of handling, and several ISO containers may be placed in one of several holds of a cargo ship. In such cases, the size of a radioactive release resulting from a severe collision with another ship is determined not by the likelihood of compromising a single, robust package but by the probability that a certain fraction of 10's or 100's of individual packagings is compromised. The previous analysis (Spring, 1995) involved a statistical estimation of the frequency of accidents which would result in damage to a cask located in one of seven cargo holds in a collision with another ship. The results were obtained in the form of probabilities (frequencies) of accidents of increasing severity and of release fractions for each level of severity. This paper describes an extension of the same general method in which the multiple packages are assumed to be compacted by an intruding ship's bow until there is no free space in the hold. At such a point, the remaining energy of the colliding ship is assumed to be dissipated by progressively crushing the RAM packagings and the probability of a particular fraction of package failures is estimated by adaptation of the statistical method used previously. The parameters of a common, well-characterized packaging, the 6M with 2R inner containment vessel, were employed as an illustrative example of this analysis method. However, the method is readily applicable to other packagings for which crush strengths have been measured or can be estimated with satisfactory confidence. (authors)

  4. X-ray Tomographic Analysis of Porosity Distributions in Gas Diffusion Layers of Proton Exchange Membrane Fuel Cells

    International Nuclear Information System (INIS)

    Odaya, S.; Phillips, R.K.; Sharma, Y.; Bellerive, J.; Phillion, A.B.; Hoorfar, M.

    2015-01-01

    This paper describes a method to characterize the structure of polytetrafluoroethylene (PTFE) treated gas diffusion layers (GDLs) with and without microporous layers (MPLs) using 3D X-ray micro computed tomographic (μCT) microscopy. In this work, the structure of single and dual layer GDLs is evaluated via μCT for various GDL samples (such as Toray TGP-H-060 and AvCarb EP40) loaded with different MPLs. A new method is presented for separating, or segmenting, the various phases of the GDL, i.e., void space, carbon fiber (including binder and PTFE), and MPL. Through analysis, it was found that the variation in bulk porosity and the average pore diameter of the GDLs depends highly on the GDL series manufacturing and treatment processes. Using advanced image analysis techniques, routines were developed to accurately segment the GDL fibers (including binder/PTFE) and the MPL. The percentage of the intruding MPL material into the carbon fiber paper as a function of the GDL thickness was successfully found for dual layer GDLs, with varying PTFE content and areal weight loading in the MPL. This analysis provides invaluable insight into the physical microstructure of paper-based GDLs, emphasizing the heterogeneous porosity distribution of single layer GDLs and the interaction of the MPL with the carbon fiber paper of dual layer GDLs

  5. Petrographic Analysis and Geochemical Source Correlation of Pigeon Peak, Sutter Buttes, CA

    Science.gov (United States)

    Novotny, N. M.; Hausback, B. P.

    2013-12-01

    The Sutter Buttes are a volcanic complex located in the center of the Great Valley north of Sacramento. They are comprised of numerous inter-intruding andesite and rhyolite lava domes of varying compositions surrounded by a shallow rampart of associated tephras. The Pigeon Peak block-and-ash flow sequence is located in the rampart and made up of a porphyritic Biotite bearing Hornblende Andesite. The andesite blocks demonstrate a high degree of propylization in hornblende crystals, highly zoned plagioclase, trace olivine, and display a red to gray color gradation. DAR is an andesite dome located less than one mile from Pigeon Peak. Of the 15 to 25 andesite lava domes within four miles from Pigeon Peak, only DAR displays trace olivine, red to grey color stratification, low biotite content, and propylitized hornblende. These characteristic similarities suggest that DAR may be the source for Pigeon Peak. My investigation used microprobe analysis of the DAR and Pigeon Peak feldspar crystals to identify the magmatic history of the magma body before emplacement. Correlation of the anorthite zoning within the feldspars from both locations support my hypothesis that DAR is the source of the Pigeon Peak block-and-ash flow.

  6. Analysis to determine the maximum dimensions of flexible apertures in sensored security netting products.

    Energy Technology Data Exchange (ETDEWEB)

    Murton, Mark; Bouchier, Francis A.; vanDongen, Dale T.; Mack, Thomas Kimball; Cutler, Robert P; Ross, Michael P.

    2013-08-01

    Although technological advances provide new capabilities to increase the robustness of security systems, they also potentially introduce new vulnerabilities. New capability sometimes requires new performance requirements. This paper outlines an approach to establishing a key performance requirement for an emerging intrusion detection sensor: the sensored net. Throughout the security industry, the commonly adopted standard for maximum opening size through barriers is a requirement based on square inchestypically 96 square inches. Unlike standard rigid opening, the dimensions of a flexible aperture are not fixed, but variable and conformable. It is demonstrably simple for a human intruder to move through a 96-square-inch opening that is conformable to the human body. The longstanding 96-square-inch requirement itself, though firmly embedded in policy and best practice, lacks a documented empirical basis. This analysis concluded that the traditional 96-square-inch standard for openings is insufficient for flexible openings that are conformable to the human body. Instead, a circumference standard is recommended for these newer types of sensored barriers. The recommended maximum circumference for a flexible opening should be no more than 26 inches, as measured on the inside of the netting material.

  7. International clinical volunteering in Tanzania: A postcolonial analysis of a Global Health business.

    Science.gov (United States)

    Sullivan, Noelle

    2018-03-01

    This article traces how scarcities characteristic of health systems in low-income countries (LICs), and increasing popular interest in Global Health, have inadvertently contributed to the popularisation of a specific Global Health business: international clinical volunteering through private volunteer placement organisations (VPOs). VPOs market neglected health facilities as sites where foreigners can 'make a difference', regardless of their skill set. Drawing on online investigation and ethnographic research in Tanzania over four field seasons from 2011 to 2015, including qualitative interviews with 41 foreign volunteers and 90 Tanzanian health workers, this article offers a postcolonial analysis of VPO marketing and volunteer action in health facilities of LICs. Two prevalent postcolonial racialised tropes inform both VPO marketing and foreign volunteers' discourses and practices in Tanzania. The first trope discounts Tanzanian expertise in order to envision volunteers in expert roles despite lacking training, expertise, or contextual knowledge. The second trope envisions Tanzanian patients as so impoverished that insufficiently trained volunteer help is 'better than nothing at all'. These two postcolonial racialised tropes inform the conceptual work undertaken by VPO marketing schemes and foreign volunteers in order to remake Tanzanian health professionals and patients into appropriate and justifiable sites for foreign volunteer intervention.

  8. Quantitative volcanic susceptibility analysis of Lanzarote and Chinijo Islands based on kernel density estimation via a linear diffusion process

    Science.gov (United States)

    Galindo, I.; Romero, M. C.; Sánchez, N.; Morales, J. M.

    2016-06-01

    Risk management stakeholders in high-populated volcanic islands should be provided with the latest high-quality volcanic information. We present here the first volcanic susceptibility map of Lanzarote and Chinijo Islands and their submarine flanks based on updated chronostratigraphical and volcano structural data, as well as on the geomorphological analysis of the bathymetric data of the submarine flanks. The role of the structural elements in the volcanic susceptibility analysis has been reviewed: vents have been considered since they indicate where previous eruptions took place; eruptive fissures provide information about the stress field as they are the superficial expression of the dyke conduit; eroded dykes have been discarded since they are single non-feeder dykes intruded in deep parts of Miocene-Pliocene volcanic edifices; main faults have been taken into account only in those cases where they could modified the superficial movement of magma. The application of kernel density estimation via a linear diffusion process for the volcanic susceptibility assessment has been applied successfully to Lanzarote and could be applied to other fissure volcanic fields worldwide since the results provide information about the probable area where an eruption could take place but also about the main direction of the probable volcanic fissures.

  9. Operating limit study for the proposed solid waste landfill at Paducah Gaseous Diffusion Plant

    Energy Technology Data Exchange (ETDEWEB)

    Lee, D.W.; Wang, J.C.; Kocher, D.C.

    1995-06-01

    A proposed solid waste landfill at Paducah Gaseous Diffusion Plant (PGDP) would accept wastes generated during normal operations that are identified as non-radioactive. These wastes may include small amounts of radioactive material from incidental contamination during plant operations. A site-specific analysis of the new solid waste landfill is presented to determine a proposed operating limit that will allow for waste disposal operations to occur such that protection of public health and the environment from the presence of incidentally contaminated waste materials can be assured. Performance objectives for disposal were defined from existing regulatory guidance to establish reasonable dose limits for protection of public health and the environment. Waste concentration limits were determined consistent with these performance objectives for the protection of off-site individuals and inadvertent intruders who might be directly exposed to disposed wastes. Exposures of off-site individuals were estimated using a conservative, site-specific model of the groundwater transport of contamination from the wastes. Direct intrusion was analyzed using an agricultural homesteader scenario. The most limiting concentrations from direct intrusion or groundwater transport were used to establish the concentration limits for radionuclides likely to be present in PGDP wastes.

  10. Operating limit study for the proposed solid waste landfill at Paducah Gaseous Diffusion Plant

    International Nuclear Information System (INIS)

    Lee, D.W.; Wang, J.C.; Kocher, D.C.

    1995-06-01

    A proposed solid waste landfill at Paducah Gaseous Diffusion Plant (PGDP) would accept wastes generated during normal operations that are identified as non-radioactive. These wastes may include small amounts of radioactive material from incidental contamination during plant operations. A site-specific analysis of the new solid waste landfill is presented to determine a proposed operating limit that will allow for waste disposal operations to occur such that protection of public health and the environment from the presence of incidentally contaminated waste materials can be assured. Performance objectives for disposal were defined from existing regulatory guidance to establish reasonable dose limits for protection of public health and the environment. Waste concentration limits were determined consistent with these performance objectives for the protection of off-site individuals and inadvertent intruders who might be directly exposed to disposed wastes. Exposures of off-site individuals were estimated using a conservative, site-specific model of the groundwater transport of contamination from the wastes. Direct intrusion was analyzed using an agricultural homesteader scenario. The most limiting concentrations from direct intrusion or groundwater transport were used to establish the concentration limits for radionuclides likely to be present in PGDP wastes

  11. Performance Assessment for the Idaho National Laboratory Remote-Handled Low-Level Waste Disposal Facility

    Energy Technology Data Exchange (ETDEWEB)

    Annette L. Schafer; A. Jeffrey Sondrup; Arthur S. Rood

    2012-05-01

    This performance assessment for the Remote-Handled Low-Level Radioactive Waste Disposal Facility at the Idaho National Laboratory documents the projected radiological dose impacts associated with the disposal of low-level radioactive waste at the facility. This assessment evaluates compliance with the applicable radiological criteria of the U.S. Department of Energy and the U.S. Environmental Protection Agency for protection of the public and the environment. The calculations involve modeling transport of radionuclides from buried waste to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses are calculated for both offsite receptors and individuals who inadvertently intrude into the waste after site closure. The results of the calculations are used to evaluate the future performance of the low-level radioactive waste disposal facility and to provide input for establishment of waste acceptance criteria. In addition, one-factor-at-a-time, Monte Carlo, and rank correlation analyses are included for sensitivity and uncertainty analysis. The comparison of the performance assessment results to the applicable performance objectives provides reasonable expectation that the performance objectives will be met

  12. Dose and risk assessment for intrusion into mixed waste disposal sites

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Aaberg, R.L.

    1991-10-01

    Sites previously used for disposal of radioactive and hazardous chemical materials have resulted in situations that pose a potential threat to humans from inadvertent intrusion. An example generic scenario analysis was developed to demonstrate the evaluation of potential exposure to either cleanup workers or members of the public who intrude into buried waste containing both radioactive and hazardous chemical contaminants. The example scenarios consist of a collection of exposure routes (or pathways) with specific modeling assumptions for well-drilling and for excavation to construct buildings. These scenarios are used to describe conceptually some potential patterns of activity by non-protected human beings during intrusion into mixed-waste disposal sites. The dose from exposure to radioactive materials is calculated using the GENII software system and converted to risk by using factors from ICRP Publication 60. The hazard assessment for nonradioactive materials is performed using recent guidelines from the US Environmental Protection Agency (EPA). The example results are in the form of cancer risk for carcinogens and radiation exposure

  13. Bending transition in the penetration of a flexible intruder in a two-dimensional dense granular medium.

    Science.gov (United States)

    Algarra, Nicolas; Karagiannopoulos, Panagiotis G; Lazarus, Arnaud; Vandembroucq, Damien; Kolb, Evelyne

    2018-02-01

    We study the quasistatic penetration of a flexible beam into a two-dimensional dense granular medium lying on a horizontal plate. Rather than a buckling-like behavior we observe a transition between a regime of crack-like penetration in which the fiber only shows small fluctuations around a stable straight geometry and a bending regime in which the fiber fully bends and advances through series of loading and unloading steps. We show that the shape reconfiguration of the fiber is controlled by a single nondimensional parameter L/L_{c}, which is the ratio of the length of the flexible beam L to L_{c}, a bending elastogranular length scale that depends on the rigidity of the fiber and on the departure from the jamming packing fraction of the granular medium. We show, moreover, that the dynamics of the bending transition in the course of the penetration experiment is gradual and is accompanied by a symmetry breaking of the granular packing fraction in the vicinity of the fiber. Together with the progressive bending of the fiber, a cavity grows downstream of the fiber and the accumulation of grains upstream of the fiber leads to the development of a jammed cluster of grains. We discuss our experimental results in the framework of a simple model of bending-induced compaction and we show that the rate of the bending transition only depends on the control parameter L/L_{c}.

  14. A brief review of intruder rotational bands and magnetic rotation in the A = 110 mass region

    Science.gov (United States)

    Banerjee, P.

    2018-05-01

    Nuclei in the A ∼ 110 mass region exhibit interesting structural features. One of these relates to the process by which specific configurations, built on the excitation of one or more protons across the Z = 50 shell-gap, manifest as collective rotational bands at intermediate spins and gradually lose their collectivity with increase in spin and terminate in a non-collective state at the maximum spin which the configuration can support. These bands are called terminating bands that co-exist with spherical states. Some of these bands are said to terminate smoothly underlining the continuous character of the process by which the band evolves from significant collectivity at low spin to a pure particle-hole non-collective state at the highest spin. The neutron-deficient A ∼ 110 mass region provides the best examples of smoothly terminating bands. The present experimental and theoretical status of such bands in several nuclei with 48 ≤ Z ≤ 52 spanning the 106 ≤ A ≤ 119 mass region have been reviewed in this article. The other noteworthy feature of nuclei in the A ∼ 110 mass region is the observation of regular rotation-like sequences of strongly enhanced magnetic dipole transitions in near-spherical nuclei. These bands, unlike the well-studied rotational sequences in deformed nuclei, arise from a spontaneous symmetry breaking by the anisotropic currents of a few high-j excited particles and holes. This mode of excitation is called magnetic rotation and was first reported in the Pb region. Evidence in favor of the existence of such structures, also called shears bands, are reported in the literature for a large number of Cd, In, Sn and Sb isotope with A ∼ 110. The present article provides a general overview of these reported structures across this mass region. The review also discusses antimagnetic rotation bands and a few cases of octupole correlations in the A = 110 mass region.

  15. Lifetime in 181Ir and 187Au: enhanced deformation of the πi 13/2 intruder orbital

    International Nuclear Information System (INIS)

    Walpe, J.C.; Garg, U.; Naguleswaran, S.; Ren, Q.W.

    1995-01-01

    Lifetimes have been measured in the πh 9/2 (yrast) and πi 13/2 (excited) bands in the nuclei 181 Ir and 187 Au using the Recoil Distance Method (RDM). The results clearly indicate that the πi 13/2 band exhibits an increased deformation over the πh 9/2 band, in keeping with the premise that the delayed crossing in this band is due to enhanced quadrupole deformation. (author). 3 refs, 1 fig, 2 tab

  16. Bird Killer, Industrial Intruder or Clean Energy? Perceiving Risks to Ecosystem Services Due to an Offshore Wind Farm

    KAUST Repository

    Klain, Sarah C.; Satterfield, Terre; Sinner, Jim; Ellis, Joanne; Chan, Kai M.A.

    2017-01-01

    Proposals to develop renewable energy technologies may threaten local values, which can generate opposition. Efforts to explain this opposition have focused on perceived negative aesthetic and environmental impact. Less attention has been paid to a fuller suite of the perceived risks and benefits associated with new energy technologies. This paper thus investigates impacts of an offshore wind farm pertaining to individual perceptions and judgments, and why risks to some ecosystem services might be cause for greater public concern than others. We find that this difference can be attributed to the affective and intuitive ways in which people perceive risk. Our mixed-methods design used interviews (n=27) that involved risk-benefit weighting tasks and an animated visualization to help people imagine an offshore wind farm in a familiar place. We found that affectively-loaded impacts (harm to charismatic wildlife and visual intrusion) were assigned greater weight than more easily quantifiable impacts (displacement of fishing, impact to tourism, cost of compliance with regulations). Interviewees identified increased regional energy self-sufficiency as the most valued potential benefit of an offshore wind farm. These results have implications for ecosystem service assessments generally and, more specifically, for our understanding of ‘affective’ dimensions of development proposals.

  17. Differentiation of pre-existing trapped methane from thermogenic methane in an igneous-intruded coal by hydrous pyrolysis

    Science.gov (United States)

    Dias, Robert F.; Lewan, Michael D.; Birdwell, Justin E.; Kotarba, Maciej J.

    2014-01-01

    So as to better understand how the gas generation potential of coal changes with increasing rank, same-seam samples of bituminous coal from the Illinois Basin that were naturally matured to varying degrees by the intrusion of an igneous dike were subjected to hydrous pyrolysis (HP) conditions of 360 °C for 72 h. The accumulated methane in the reactor headspace was analyzed for δ13C and δ2H, and mol percent composition. Maximum methane production (9.7 mg/g TOC) occurred in the most immature samples (0.5 %Ro), waning to minimal methane values at 2.44 %Ro (0.67 mg/g TOC), and rebounding to 3.6 mg/g TOC methane in the most mature sample (6.76 %Ro). Methane from coal with the highest initial thermal maturity (6.76 %Ro) shows no isotopic dependence on the reactor water and has a microbial δ13C value of −61‰. However, methane from coal of minimal initial thermal maturity (0.5 %Ro) shows hydrogen isotopic dependence on the reaction water and has a δ13C value of −37‰. The gas released from coals under hydrous pyrolysis conditions represents a quantifiable mixture of ancient (270 Ma) methane (likely microbial) that was generated in situ and trapped within the rock during the rapid heating by the dike, and modern (laboratory) thermogenic methane that was generated from the indigenous organic matter due to thermal maturation induced by hydrous pyrolysis conditions. These findings provide an analytical framework for better assessment of natural gas sources and for differentiating generated gas from pre-existing trapped gas in coals of various ranks.

  18. Bending transition in the penetration of a flexible intruder in a two-dimensional dense granular medium

    Science.gov (United States)

    Algarra, Nicolas; Karagiannopoulos, Panagiotis G.; Lazarus, Arnaud; Vandembroucq, Damien; Kolb, Evelyne

    2018-02-01

    We study the quasistatic penetration of a flexible beam into a two-dimensional dense granular medium lying on a horizontal plate. Rather than a buckling-like behavior we observe a transition between a regime of crack-like penetration in which the fiber only shows small fluctuations around a stable straight geometry and a bending regime in which the fiber fully bends and advances through series of loading and unloading steps. We show that the shape reconfiguration of the fiber is controlled by a single nondimensional parameter L /Lc , which is the ratio of the length of the flexible beam L to Lc, a bending elastogranular length scale that depends on the rigidity of the fiber and on the departure from the jamming packing fraction of the granular medium. We show, moreover, that the dynamics of the bending transition in the course of the penetration experiment is gradual and is accompanied by a symmetry breaking of the granular packing fraction in the vicinity of the fiber. Together with the progressive bending of the fiber, a cavity grows downstream of the fiber and the accumulation of grains upstream of the fiber leads to the development of a jammed cluster of grains. We discuss our experimental results in the framework of a simple model of bending-induced compaction and we show that the rate of the bending transition only depends on the control parameter L /Lc .

  19. Nest defence against conspecific intruders in the common pochard Aythya ferina: natural observations and an experimental test

    Czech Academy of Sciences Publication Activity Database

    Honza, Marcel; Piálková, Radka; Albrecht, Tomáš; Neužilová, Š.

    2009-01-01

    Roč. 44, č. 2 (2009), s. 151-158 ISSN 0001-6454 R&D Projects: GA AV ČR IAA6093403; GA AV ČR KJB600930611 Institutional research plan: CEZ:AV0Z60930519 Keywords : waterfowl * brood parasitism * intraspecific parasitism * breeding strategy * egg rejection Subject RIV: EG - Zoology Impact factor: 1.018, year: 2009 http://www.bioone.org/doi/pdf/10.3161/000164509X482713

  20. Intruder states in sd-shell nuclei: from 1p-1t to np-nt in Si isotopes

    International Nuclear Information System (INIS)

    Goasduff, A.

    2012-01-01

    New large-scale shell-model calculations with full 1ℎω valence space for the sd-nuclei has been used for the first time to predict lifetimes of positive and negative parity states in neutron rich Si isotopes. The predicted lifetimes (1 - 100 ps) fall in the range of the differential Doppler shift method. Using the demonstrator of the European next generation γ-ray array, AGATA, in coincidence with the large acceptance PRISMA magnetic spectrometer from LNL (Legnaro) and the differential plunger of the University of Cologne, lifetimes of excited states in 32;33 Si and 35;36 S nuclei were measured. In a second step, the nℎω structure in the stable 28 Si nucleus was also studied. 28 Si is an important nucleus in order to understand the competition between mean-field and cluster structures. It displays a wealth of structures in terms of deformation and clustering. Light heavy-ion resonant radiative capture 12 C+ 16 O has been performed at energies below the Coulomb barrier. The measure γ-spectra indicate for the first time at these energies that the strongest part of the resonance decay proceeds though intermediate states around 10 MeV. Comparisons with previous radiative capture studies above the Coulomb barrier have been performed and the results have been interpreted in terms of a favoured feeding of T=1 states in the 28 Si self-conjugate nucleus. (author)

  1. Bird Killer, Industrial Intruder or Clean Energy? Perceiving Risks to Ecosystem Services Due to an Offshore Wind Farm

    KAUST Repository

    Klain, Sarah C.

    2017-07-19

    Proposals to develop renewable energy technologies may threaten local values, which can generate opposition. Efforts to explain this opposition have focused on perceived negative aesthetic and environmental impact. Less attention has been paid to a fuller suite of the perceived risks and benefits associated with new energy technologies. This paper thus investigates impacts of an offshore wind farm pertaining to individual perceptions and judgments, and why risks to some ecosystem services might be cause for greater public concern than others. We find that this difference can be attributed to the affective and intuitive ways in which people perceive risk. Our mixed-methods design used interviews (n=27) that involved risk-benefit weighting tasks and an animated visualization to help people imagine an offshore wind farm in a familiar place. We found that affectively-loaded impacts (harm to charismatic wildlife and visual intrusion) were assigned greater weight than more easily quantifiable impacts (displacement of fishing, impact to tourism, cost of compliance with regulations). Interviewees identified increased regional energy self-sufficiency as the most valued potential benefit of an offshore wind farm. These results have implications for ecosystem service assessments generally and, more specifically, for our understanding of ‘affective’ dimensions of development proposals.

  2. Quadrupole collectivity of angular-momentum projected states of nucleons in the high-j intruder single-particle states

    International Nuclear Information System (INIS)

    Raman, S.; Kahane, S.; Bhatt, K.H.

    1999-01-01

    Ever since the pioneering work of Elliott (Elliott J P 1958 London Series A 245 128, 562), quadrupole collectivity in deformed nuclei has been economically described in terms of SU 3 symmetry. Microscopic SU 3 symmetry is not present in the deformed intrinsic states of n nucleons in the abnormal-parity single-particle states j a . However, such (j a ) n states do possess some SU 3 -symmetry-like properties as shown in this work. (author)

  3. Terrain Considerations and Data Base Development for the Design and Testing of Devices to Detect Intruder-Induced Ground Motion

    Science.gov (United States)

    1978-05-01

    4 5-H 03 4) 0 5-. 4)H EL4 +,)r F-4 In5- 5q 4) 0 -r4 (n 0a0 4. ) >. ., m- (d COosv -0 0ca+ H 0a t-4 j~S.~C+H 4 5~C H co A’~ ) 4) U) U30~ ’’C Q 4 V...axial force on the cone. The force is measured by a load cell , and the vertical distance traveled is measured mechanically. Mechanical cone

  4. Simple preparation of plant epidermal tissue for laser microdissection and downstream quantitative proteome and carbohydrate analysis

    Directory of Open Access Journals (Sweden)

    Christian eFalter

    2015-03-01

    Full Text Available The outwardly directed cell wall and associated plasma membrane of epidermal cells represent the first layers of plant defense against intruding pathogens. Cell wall modifications and the formation of defense structures at sites of attempted pathogen penetration are decisive for plant defense. A precise isolation of these stress-induced structures would allow a specific analysis of regulatory mechanism and cell wall adaption. However, methods for large-scale epidermal tissue preparation from the model plant Arabidopsis thaliana, which would allow proteome and cell wall analysis of complete, laser-microdissected epidermal defense structures, have not been provided. We developed the adhesive tape – liquid cover glass technique for simple leaf epidermis preparation from A. thaliana, which is also applicable on grass leaves. This method is compatible with subsequent staining techniques to visualize stress-related cell wall structures, which were precisely isolated from the epidermal tissue layer by laser microdissection coupled to laser pressure catapulting. We successfully demonstrated that these specific epidermal tissue samples could be used for quantitative downstream proteome and cell wall analysis. The development of the adhesive tape – liquid cover glass technique for simple leaf epidermis preparation and the compatibility to laser microdissection and downstream quantitative analysis opens new possibilities in the precise examination of stress- and pathogen-related cell wall structures in epidermal cells. Because the developed tissue processing is also applicable on A. thaliana, well-established, model pathosystems that include the interaction with powdery mildews can be studied to determine principal regulatory mechanisms in plant-microbe interaction with their potential outreach into crop breeding.

  5. A new analysis of Mars "Special Regions": findings of the second MEPAG Special Regions Science Analysis Group (SR-SAG2).

    Science.gov (United States)

    Rummel, John D; Beaty, David W; Jones, Melissa A; Bakermans, Corien; Barlow, Nadine G; Boston, Penelope J; Chevrier, Vincent F; Clark, Benton C; de Vera, Jean-Pierre P; Gough, Raina V; Hallsworth, John E; Head, James W; Hipkin, Victoria J; Kieft, Thomas L; McEwen, Alfred S; Mellon, Michael T; Mikucki, Jill A; Nicholson, Wayne L; Omelon, Christopher R; Peterson, Ronald; Roden, Eric E; Sherwood Lollar, Barbara; Tanaka, Kenneth L; Viola, Donna; Wray, James J

    2014-11-01

    A committee of the Mars Exploration Program Analysis Group (MEPAG) has reviewed and updated the description of Special Regions on Mars as places where terrestrial organisms might replicate (per the COSPAR Planetary Protection Policy). This review and update was conducted by an international team (SR-SAG2) drawn from both the biological science and Mars exploration communities, focused on understanding when and where Special Regions could occur. The study applied recently available data about martian environments and about terrestrial organisms, building on a previous analysis of Mars Special Regions (2006) undertaken by a similar team. Since then, a new body of highly relevant information has been generated from the Mars Reconnaissance Orbiter (launched in 2005) and Phoenix (2007) and data from Mars Express and the twin Mars Exploration Rovers (all 2003). Results have also been gleaned from the Mars Science Laboratory (launched in 2011). In addition to Mars data, there is a considerable body of new data regarding the known environmental limits to life on Earth-including the potential for terrestrial microbial life to survive and replicate under martian environmental conditions. The SR-SAG2 analysis has included an examination of new Mars models relevant to natural environmental variation in water activity and temperature; a review and reconsideration of the current parameters used to define Special Regions; and updated maps and descriptions of the martian environments recommended for treatment as "Uncertain" or "Special" as natural features or those potentially formed by the influence of future landed spacecraft. Significant changes in our knowledge of the capabilities of terrestrial organisms and the existence of possibly habitable martian environments have led to a new appreciation of where Mars Special Regions may be identified and protected. The SR-SAG also considered the impact of Special Regions on potential future human missions to Mars, both as locations of

  6. Accident Analysis for the NIST Research Reactor Before and After Fuel Conversion

    Energy Technology Data Exchange (ETDEWEB)

    Baek J.; Diamond D.; Cuadra, A.; Hanson, A.L.; Cheng, L-Y.; Brown, N.R.

    2012-09-30

    Postulated accidents have been analyzed for the 20 MW D2O-moderated research reactor (NBSR) at the National Institute of Standards and Technology (NIST). The analysis has been carried out for the present core, which contains high enriched uranium (HEU) fuel and for a proposed equilibrium core with low enriched uranium (LEU) fuel. The analyses employ state-of-the-art calculational methods. Three-dimensional Monte Carlo neutron transport calculations were performed with the MCNPX code to determine homogenized fuel compositions in the lower and upper halves of each fuel element and to determine the resulting neutronic properties of the core. The accident analysis employed a model of the primary loop with the RELAP5 code. The model includes the primary pumps, shutdown pumps outlet valves, heat exchanger, fuel elements, and flow channels for both the six inner and twenty-four outer fuel elements. Evaluations were performed for the following accidents: (1) control rod withdrawal startup accident, (2) maximum reactivity insertion accident, (3) loss-of-flow accident resulting from loss of electrical power with an assumption of failure of shutdown cooling pumps, (4) loss-of-flow accident resulting from a primary pump seizure, and (5) loss-of-flow accident resulting from inadvertent throttling of a flow control valve. In addition, natural circulation cooling at low power operation was analyzed. The analysis shows that the conversion will not lead to significant changes in the safety analysis and the calculated minimum critical heat flux ratio and maximum clad temperature assure that there is adequate margin to fuel failure.

  7. Venue-level correlates of female sex worker registration status: A multilevel analysis of bars in Tijuana, Mexico

    Science.gov (United States)

    Gaines, Tommi L.; Rusch, Melanie L.A.; Brouwer, Kimberly C.; Goldenberg, Shira M.; Lozada, Remedios; Robertson, Angela M.; Perkins, Emily; Strathdee, Steffanie A.; Patterson, Thomas L.

    2013-01-01

    In Tijuana, Mexico, sex work is regulated by the municipal government, through registration cards issued to female sex workers (FSWs) for an annual fee. Registration has been associated with decreased drug use and increase condom use and HIV testing. Previously, it was demonstrated that FSWs operating in bars were more likely than street-based FSWs to be registered. This implies that certain venues may be more accessible to local authorities for the enforcement of this type of programme. Taking a novel multilevel approach, we examined whether venue characteristics of bars reflecting greater organised management and visibility affect registration status of FSWs. In an analysis of venue-level characteristics, predictors of being registered were availability of free condoms at work and distance to the main sex strip; however, these were not independently associated after inclusion of FSWs’ income, illicit drug use and history of HIV testing. Our findings suggest that sex work regulations may inadvertently exclude venues in which the more vulnerable and less visible FSWs, such as injection drug users and those with limited financial resources, are situated. Efforts to revise or reconsider sex work regulations to ensure that they best promote FSWs’ health, human and labour rights are recommended. PMID:23534477

  8. Compendium of ECCS [Emergency Core Cooling Systems] research for realistic LOCA [loss-of-coolant accidents] analysis: Final report

    International Nuclear Information System (INIS)

    1988-12-01

    In the United States, Emergency Core Cooling Systems (ECCS) are required for light water reactors (LWRs) to provide cooling of the reactor core in the event of a break or leak in the reactor piping or an inadvertent opening of a valve. These accidents are called loss-of-coolant accidents (LOCA), and they range from small leaks up to a postulated full break of the largest pipe in the reactor cooling system. Federal government regulations provide that LOCA analysis be performed to show that the ECCS will maintain fuel rod cladding temperatures, cladding oxidation, and hydrogen production within certain limits. The NRC and others have completed a large body of research which investigated fuel rod behavior and LOCA/ECCS performance. It is now possible to make a realistic estimate of the ECCS performance during a LOCA and to quantify the uncertainty of this calculation. The purpose of this report is to summarize this research and to serve as a general reference for the extensive research effort that has been performed. The report: (1) summarizes the understanding of LOCA phenomena in 1974; (2) reviews experimental and analytical programs developed to address the phenomena; (3) describes the best-estimate computer codes developed by the NRC; (4) discusses the salient technical aspects of the physical phenomena and our current understanding of them; (5) discusses probabilistic risk assessment results and perspectives, and (6) evaluates the impact of research results on the ECCS regulations. 736 refs., 412 figs., 66 tabs

  9. Venue-level correlates of female sex worker registration status: a multilevel analysis of bars in Tijuana, Mexico.

    Science.gov (United States)

    Gaines, Tommi L; Rusch, Melanie L A; Brouwer, Kimberly C; Goldenberg, Shira M; Lozada, Remedios; Robertson, Angela M; Perkins, Emily; Strathdee, Steffanie A; Patterson, Thomas L

    2013-01-01

    In Tijuana, Mexico, sex work is regulated by the municipal government, through registration cards issued to female sex workers (FSWs) for an annual fee. Registration has been associated with decreased drug use and increase condom use and HIV testing. Previously, it was demonstrated that FSWs operating in bars were more likely than street-based FSWs to be registered. This implies that certain venues may be more accessible to local authorities for the enforcement of this type of programme. Taking a novel multilevel approach, we examined whether venue characteristics of bars reflecting greater organised management and visibility affect registration status of FSWs. In an analysis of venue-level characteristics, predictors of being registered were availability of free condoms at work and distance to the main sex strip; however, these were not independently associated after inclusion of FSWs' income, illicit drug use and history of HIV testing. Our findings suggest that sex work regulations may inadvertently exclude venues in which the more vulnerable and less visible FSWs, such as injection drug users and those with limited financial resources, are situated. Efforts to revise or reconsider sex work regulations to ensure that they best promote FSWs' health, human and labour rights are recommended.

  10. Probabilistic consequence study of residual radiological effects from a hypothetical ten-ton inadvertent nuclear yield. Weapons Safety Program

    International Nuclear Information System (INIS)

    Harvey, T.; Peters, L.; Serduke, F.; Edwards, L.

    1994-01-01

    In this paper we study the potential radiological consequences of a strategic bomber accident, in which one of the assumed on-board nuclear weapons explodes with an arbitrarily chosen 10-ton nuclear yield. The frequency of such an occurrence is infinitesimal. The safety design features in today s nuclear weapons' systems essentially forbid its occurrence. We have a chosen a military base which has the feature of being a representative combination of urban and rural populations. The assumed ''crash site'' is near the northwest comer of the military base, close to civilian housing located just across the street from the base. A worst case wind would be from the ESE (east south east). This would cause fission debris to be dispersed toward the largest population centers and, thus, would lead to the largest Pu ''collective'' doses (i.e., a dose integrated over time and summed over individuals). Also, if an ESE wind were blowing at accident time, some people in nearby housing could receive lethal gamma-ray doses from fallout before evacuation could occur. It is assumed only one weapon undergoes nuclear yield; the other on-board weapons would HE detonate and the Pu would be aerosolized and lofted. We assume an activity-size distribution and lofting similar to those used to predict fallout measured at NTS. The main thrust of our study is to provide estimates of probabilistic radiological risks to the population local to a strategic bomber crash site. The studied radiological consequences are: cloud-passage doses from Pu inhalation; doses from groundshine due to gamma-producing radionuclides; and areal contamination from Pu and the long-lived fission products Cs-137 and Sr-90

  11. “Real Men Don't”: Constructions of Masculinity and Inadvertent Harm in Public Health Interventions

    Science.gov (United States)

    Lee, Joseph G. L.; Dworkin, Shari L.

    2014-01-01

    Research shows that constraining aspects of male gender norms negatively influence both women’s and men’s health. Messaging that draws on norms of masculinity in health programming has been shown to improve both women’s and men’s health, but some types of public health messaging (e.g., Man Up Monday, a media campaign to prevent the spread of sexually transmitted infections) can reify harmful aspects of hegemonic masculinity that programs are working to change. We critically assess the deployment of hegemonic male norms in the Man Up Monday campaign. We draw on ethical paradigms in public health to challenge programs that reinforce harmful aspects of gender norms and suggest the use of gender-transformative interventions that challenge constraining masculine norms and have been shown to have a positive effect on health behaviors. PMID:24825202

  12. Fear and overprotection in Australian residential aged-care facilities: The inadvertent impact of regulation on quality continence care.

    Science.gov (United States)

    Ostaszkiewicz, Joan; O'Connell, Beverly; Dunning, Trisha

    2016-06-01

    Most residents in residential aged-care facilities are incontinent. This study explored how continence care was provided in residential aged-care facilities, and describes a subset of data about staffs' beliefs and experiences of the quality framework and the funding model on residents' continence care. Using grounded theory methodology, 18 residential aged-care staff members were interviewed and 88 hours of field observations conducted in two facilities. Data were analysed using a combination of inductive and deductive analytic procedures. Staffs' beliefs and experiences about the requirements of the quality framework and the funding model fostered a climate of fear and risk adversity that had multiple unintended effects on residents' continence care, incentivising dependence on continence management, and equating effective continence care with effective pad use. There is a need to rethink the quality of continence care and its measurement in Australian residential aged-care facilities. © 2015 AJA Inc.

  13. Study of possible modifications to equipment used for industrial gammagraphy minimizing the risk of inadvertent exposures to radiation

    International Nuclear Information System (INIS)

    Wesenack, Martin P.; Corvalan, Carolina

    2008-01-01

    Full text: The industrial gammagraphy is a practice designed to monitor structural changes in materials used 'in situ' in industries such as nuclear, steel, shipbuilding, etc. This practice involves the use of a source of radiation (such as 137 Cs, 192 Ir) housed in a container. Despite the controls in place, this is the possibility that the source to be 'lost' in the workplace. In this research is analyzed, based on specific instances of accidents such as the one that occurred at a distillery located in the city of La Plata, Buenos Aires, the possibility of introducing simple changes in the containers, increasing safety. In particular evaluates the use of thermocouple to activate an alarm system. (author)

  14. Exclusion, Exemption and Clearance in the Frame of the Control and Management of Inadvertent Radioactive Material in Scrap Metal

    International Nuclear Information System (INIS)

    Gonzalez, Abel J.

    2011-01-01

    Radioactive substances are incorporated into materials, goods, merchandises, products and in scrap and, as scrap would recycle into new produce, the process of introduction of radioactive susbtanaces into commodities will continue. The situation is unstoppable and requires straightforward solutions. The problem is global and therefore the solution(s) should be global. A clear intergovernmental agreement is needed establishing to what extent commodities should be regulated

  15. Inadvertent gene silencing of argininosuccinate synthase (bcass1) in Botrytis cinerea by the pLOB1 vector system

    NARCIS (Netherlands)

    Patel, R.M.; Kan, van J.A.L.; Bailey, A.M.; Foster, G.D.

    2010-01-01

    For several years, researchers working on the plant pathogen Botrytis cinerea and a number of other related fungi have routinely used the pLOB1 vector system, based on hygromycin resistance, under the control of the Aspergillus nidulans oliC promoter and what was reported to be the ß-tubulin (tubA)

  16. Site-Specific Analyses for Demonstrating Compliance with 10 CFR 61 Performance Objectives - 12179

    Energy Technology Data Exchange (ETDEWEB)

    Grossman, C.J.; Esh, D.W.; Yadav, P.; Carrera, A.G. [U.S. Nuclear Regulatory Commission, 11545 Rockville Pike, Rockville, MD 20852 (United States)

    2012-07-01

    performance assessment to demonstrate protection of the general population from releases of radioactivity, an assessment to demonstrate protection of a potential inadvertent intruder, and a long-term analysis to assess how the design of the facility considers the potential radiological impacts associated with disposal of long-lived waste streams. Concurrently, the NRC staff intends to propose associated guidance to facilitate the implementation of the requirements to conduct site-specific analyses. In proposing these amendments to the regulation and associated guidance, the NRC staff has conducted extensive public outreach since 2009 including three public meetings and four briefings of the NRC's Advisory Committee on Reactor Safeguards. The NRC staff plans to submit the proposed amendments to the regulations to the Commission in early 2012. Subsequently, the proposed amendments and associated guidance would be published in the Federal Register for public comment pending approval of the proposed amendments to the regulations by the Commission. Following the public comment period, NRC staff plans to address public comments and revise, as necessary, the regulations and associated guidance before publishing a final rule, which is anticipated in 2013. (authors)

  17. Decision analysis multicriteria analysis

    International Nuclear Information System (INIS)

    Lombard, J.

    1986-09-01

    The ALARA procedure covers a wide range of decisions from the simplest to the most complex one. For the simplest one the engineering judgement is generally enough and the use of a decision aiding technique is therefore not necessary. For some decisions the comparison of the available protection option may be performed from two or a few criteria (or attributes) (protection cost, collective dose,...) and the use of rather simple decision aiding techniques, like the Cost Effectiveness Analysis or the Cost Benefit Analysis, is quite enough. For the more complex decisions, involving numerous criteria or for decisions involving large uncertainties or qualitative judgement the use of these techniques, even the extended cost benefit analysis, is not recommended and appropriate techniques like multi-attribute decision aiding techniques are more relevant. There is a lot of such particular techniques and it is not possible to present all of them. Therefore only two broad categories of multi-attribute decision aiding techniques will be presented here: decision analysis and the outranking analysis

  18. Design and Security Analysis of a Fragment of Internet of Things Telecommunication System

    Directory of Open Access Journals (Sweden)

    V. A. Alexandrov

    2016-01-01

    Full Text Available This paper comprises the development and implementation of systems using the concept of Internet of Things. In terms of active development of industries, use the concept of the Internet of Things, the information security problem is urgent. To create a protected module of information-telecommunication system which implements the Internet of Things concept, it is important to take into account all its aspects. To determine relevant threats, it is necessary to use the detailed risk analysis according to existing GOST standards when choosing protection measures, one must rely on identified relevant threats. Actual threats and necessary protective actions are determined in this paper for implementation of Smart House computer appliance module, in order to develop a protected part of Smart House, which is necessary for realization of room access control. We solved the following tasks in the work, namely, a description of the system Smart Home, a description of steps and evaluation system security Smart Home; implementation of hardware assembly and writing a code for the selected fragment of the system; safety evaluation of the selected fragment Smart House and identification of actual threats; make recommendations to counter current threats; software implementation of one of the most urgent threats and software implementation of protective measures for a selected threat. A feature of the work is an integrated approach to the design with the use of the intruder models, analysis of the system’s assets and evaluation of their security.

  19. Background information for the development of a low-level waste performance assessment methodology

    International Nuclear Information System (INIS)

    Shipers, L.R.

    1989-12-01

    This document identifies and describes the potential postclosure pathways of radionuclide release, migration, and exposure from low-level radioactive waste disposal facilities. Each pathway identified is composed of a combination of migration pathways (air, surface water, ground water, food chain) and exposure pathways (direct gamma, inhalation, ingestion, surface contact). The pathway identification is based on a review and evaluation of existing information, and not all pathways presented in the document would necessarily be of importance at a given low-level waste disposal site. This document presents pathways associated with undisturbed (ground water, gas generation), naturally disturbed (erosion, bathtubbing, earth creep, frost heave, plant and animal intruder), and inadvertent intruder (construction, agriculture) scenarios of a low-level waste disposal facility. 20 refs., 1 fig

  20. Optimal parameters to avoid thermal necrosis during bone drilling: A finite element analysis.

    Science.gov (United States)

    Mediouni, Mohamed; Schlatterer, Daniel R; Khoury, Amal; Von Bergen, Tobias; Shetty, Sunil H; Arora, Manit; Dhond, Amit; Vaughan, Neil; Volosnikov, Alexander

    2017-11-01

    The drilling bone may potentially cause excessive frictional heat, which can lead to local bone necrosis. This heat generation and local necrosis has been suggested to contribute to the resorption of bone around the placed screws, ending in loss of screw purchase in the bone and inadvertent loosening and/or the bone-implant construct. In vivo studies on this subject have inherent obstacles not the least of which is controlling the variables and real time bone temperature data acquisition. Theoretical models can be generated using computer software and the inclusion of known constants for the mechanical properties of metal and bone. These known Data points for the variables (drill bit and bone) enables finite element analysis of various bone drilling scenarios. An elastic-plastic three-dimensional (3D) acetabular bone mode was developed and finite element model analysis (FEA) was applied to various simulated drilling procedures. The FEA results clearly indicate that the depth of drilling and the drill speed both have a significant effect on the temperature during drilling procedures. The reduction of the feeding speed leads to a reduction in bone temperature. Our data suggests that reducing the feeding speed regardless of RPMs and pressure applied could be a simple useful and effective way to reduce drilling temperatures. This study is the first step in helping any surgeon who drills bone and places screws to better understand the ideal pressure to apply and drill speed to employ and advance rate to avoid osteonecrosis. © 2017 Orthopaedic Research Society. Published by Wiley Periodicals, Inc. J Orthop Res 35:2386-2391, 2017. © 2017 Orthopaedic Research Society. Published by Wiley Periodicals, Inc.

  1. Overview of a performance assessment methodology for low-level radioactive waste disposal facilities

    International Nuclear Information System (INIS)

    Kozak, M.W.; Chu, M.S.Y.

    1991-01-01

    A performance assessment methodology has been developed for use by the US Nuclear Regulatory Commission in evaluating license applications for low-level waste disposal facilities. This paper provides a summary and an overview of the modeling approaches selected for the methodology. The overview includes discussions of the philosophy and structure of the methodology. This performance assessment methodology is designed to provide the NRC with a tool for performing confirmatory analyses in support of license reviews related to postclosure performance. The methodology allows analyses of dose to individuals from off-site releases under normal conditions as well as on-site doses to inadvertent intruders. 24 refs., 1 tab

  2. Performance Assessment Position Paper: Time for Compliance

    International Nuclear Information System (INIS)

    Wilhite, E.L.

    2003-01-01

    This study lays out the historical development of the time frame for a low-level waste disposal facility to demonstrate compliance with the DOE performance objectives and requirements. The study recommends that 1,000 years should be used as the time for compliance for all of the performance objectives and requirements (i.e., for the all-pathways, air pathway, radon emanation, water resource protection and inadvertent intruder analyses) for all low-level waste disposal facility performance assessments at the Savannah River Site

  3. Development of polymer concrete radioactive waste management containers

    Energy Technology Data Exchange (ETDEWEB)

    Chung, H.; Lee, M. S.; Ahn, D. H.; Won, H. J.; Kang, H. S.; Lee, H. S.; Lim, S.P.; Kim, Y. E.; Lee, B. O.; Lee, K. P.; Min, B. Y.; Lee, J.K.; Jang, W. S.; Sim, W. B.; Lee, J. C.; Park, M. J.; Choi, Y. J.; Shin, H. E.; Park, H. Y.; Kim, C. Y

    1999-11-01

    A high-integrity radioactive waste container has been developed to immobilize the spent resin wastes from nuclear power plants, protect possible future, inadvertent intruders from damaging radiation. The polymer concrete container is designed to ensure safe and reliable disposal of the radioactive waste for a minimum period of 300 years. A built-in vent system for each container will permit the release of gas. An experimental evaluation of the mechanical, chemical, and biological tests of the container was carried out. The tests showed that the polymer concrete container is adequate for safe disposal of the radioactive wastes. (author)

  4. An Analysis of Security System for Intrusion in Smartphone Environment

    OpenAIRE

    Louk, Maya; Lim, Hyotaek; Lee, HoonJae

    2014-01-01

    There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecti...

  5. Risk analysis and assessment of vertical and incline small winder systems and peripheral activities.

    CSIR Research Space (South Africa)

    Moss, PS

    2000-01-01

    Full Text Available access .......................................................48 3.6.3 "ramped" design of station access ..................................................................49 3.6.4 Handling of material cars... vertical plane using a rope and counterweight mechanism, to allow the passage of cars when required. It is extensively used to prevent the inadvertent entry of material cars from stations into incline shafts, and to derail a runaway car so preventing...

  6. Performance analysis

    International Nuclear Information System (INIS)

    2008-05-01

    This book introduces energy and resource technology development business with performance analysis, which has business division and definition, analysis of current situation of support, substance of basic plan of national energy, resource technique development, selection of analysis index, result of performance analysis by index, performance result of investigation, analysis and appraisal of energy and resource technology development business in 2007.

  7. Autoclave nuclear criticality safety analysis

    Energy Technology Data Exchange (ETDEWEB)

    D`Aquila, D.M. [Martin Marietta Energy Systems, Inc., Piketon, OH (United States); Tayloe, R.W. Jr. [Battelle, Columbus, OH (United States)

    1991-12-31

    Steam-heated autoclaves are used in gaseous diffusion uranium enrichment plants to heat large cylinders of UF{sub 6}. Nuclear criticality safety for these autoclaves is evaluated. To enhance criticality safety, systems are incorporated into the design of autoclaves to limit the amount of water present. These safety systems also increase the likelihood that any UF{sub 6} inadvertently released from a cylinder into an autoclave is not released to the environment. Up to 140 pounds of water can be held up in large autoclaves. This mass of water is sufficient to support a nuclear criticality when optimally combined with 125 pounds of UF{sub 6} enriched to 5 percent U{sup 235}. However, water in autoclaves is widely dispersed as condensed droplets and vapor, and is extremely unlikely to form a critical configuration with released UF{sub 6}.

  8. A three-dimensional finite element analysis of molar distalization with a palatal plate, pendulum, and headgear according to molar eruption stage

    Science.gov (United States)

    Kang, Ju-Man; Park, Jae Hyun; Bayome, Mohamed; Oh, Moonbee; Park, Chong Ook; Mo, Sung-Seo

    2016-01-01

    Objective This study aimed to (1) evaluate the effects of maxillary second and third molar eruption status on the distalization of first molars with a modified palatal anchorage plate (MPAP), and (2) compare the results to the outcomes of the use of a pendulum and that of a headgear using three-dimensional finite element analysis. Methods Three eruption stages were established: an erupting second molar at the cervical one-third of the first molar root (Stage 1), a fully erupted second molar (Stage 2), and an erupting third molar at the cervical one-third of the second molar root (Stage 3). Retraction forces were applied via three anchorage appliance models: an MPAP with bracket and archwire, a bone-anchored pendulum appliance, and cervical-pull headgear. Results An MPAP showed greater root movement of the first molar than crown movement, and this was more noticeable in Stages 2 and 3. With the other devices, the first molar showed distal tipping. Transversely, the first molar had mesial-out rotation with headgear and mesial-in rotation with the other devices. Vertically, the first molar was intruded with an MPAP, and extruded with the other appliances. Conclusions The second molar eruption stage had an effect on molar distalization, but the third molar follicle had no effect. The application of an MPAP may be an effective treatment option for maxillary molar distalization. PMID:27668192

  9. ITS2 barcoding DNA region combined with high resolution melting (HRM) analysis of Hyoscyami Semen, the mature seed of Hyoscyamus niger.

    Science.gov (United States)

    Xiong, Chao; Hu, Zhi-Gang; Tu, Yuan; Liu, He-Gang; Wang, Ping; Zhao, Ming-Ming; SHIi, Yu-Hua; Wu, Lan; Sun, Wei; Chen, Shi-Lin

    2016-12-01

    Hyoscyami Semen, the mature dried seed of Hyoscyamus niger L., has long been used as a traditional Chinese medicine to treat human diseases. Hyoscyami Semen is found in local markets in China. In markets, sellers and buyers commonly inadvertently mix the seeds of H. niger with the seeds of related species such as Hygrophila salicifolia (Vahl) Nees, Astragalus complanatus R. Br., Cuscuta australis R. Br., Cuscuta chinensis Lam., and Impatiens balsamina L. because of their similar morphologies or similar names. Thus, developing a reliable method for discriminating H. niger seeds from its adulterants is necessary to reduce confusion and ensure the safe use of Hyoscyami Semen. The present study was designed to evaluate the efficiency of high-resolution melting analysis combined with DNA barcoding (Bar-HRM) with internal transcribed spacer 2 to discriminate H. niger. Our results show that Bar-HRM successfully identified the adulterants and detected the proportion of H. niger DNA extract within an admixture. In particular, HRM detected H. niger DNA extract in A. complanatus DNA extract at concentrations as low as 1%. In conclusion, the Bar-HRM method developed in the present study for authenticating H. niger is rapid and cost-effective. It can be used in the future to guarantee the purity of Hyoscyami Semen for the clinical use. Copyright © 2016 China Pharmaceutical University. Published by Elsevier B.V. All rights reserved.

  10. Instrumental analysis

    International Nuclear Information System (INIS)

    Jae, Myeong Gi; Lee, Won Seong; Kim, Ha Hyeok

    1989-02-01

    This book give description of electronic engineering such as circuit element and device, circuit analysis and logic digital circuit, the method of electrochemistry like conductometry, potentiometry and current measuring, spectro chemical analysis with electromagnetic radiant rays, optical components, absorption spectroscopy, X-ray analysis, atomic absorption spectrometry and reference, chromatography like gas-chromatography and liquid-chromatography and automated analysis on control system evaluation of automated analysis and automated analysis system and reference.

  11. Instrumental analysis

    Energy Technology Data Exchange (ETDEWEB)

    Jae, Myeong Gi; Lee, Won Seong; Kim, Ha Hyeok

    1989-02-15

    This book give description of electronic engineering such as circuit element and device, circuit analysis and logic digital circuit, the method of electrochemistry like conductometry, potentiometry and current measuring, spectro chemical analysis with electromagnetic radiant rays, optical components, absorption spectroscopy, X-ray analysis, atomic absorption spectrometry and reference, chromatography like gas-chromatography and liquid-chromatography and automated analysis on control system evaluation of automated analysis and automated analysis system and reference.

  12. Safety analysis of a high temperature supercritical pressure light water cooled and moderated reactor

    International Nuclear Information System (INIS)

    Ishiwatari, Y.; Oka, Y.; Koshizuka, S.

    2002-01-01

    A safety analysis code for a high temperature supercritical pressure light water cooled reactor (SCLWR-H) with water rods cooled by descending flow, SPRAT-DOWN, is developed. The hottest channel, a water rod, down comer, upper and lower plenums, feed pumps, etc. are modeled as junction of nodes. Partial of the feed water flows downward from the upper dome of the reactor pressure vessel to the water rods. The accidents analyzed here are total loss of feed water flow, feed water pump seizure, and control rods ejection. All the accidents satisfy the criteria. The accident event at which the maximum cladding temperature is the highest is total loss of feedwater flow. The transients analyzed here are loss of feed water heating, inadvertent start-up of an auxiliary water supply system, partial loss of feed water flow, loss of offsite power, loss of load, and abnormal withdrawal of control rods. All the transients satisfied the criteria. The transient event for which the maximum cladding temperature is the highest is control rod withdrawal at normal operation. The behavior of loss of load transient is different from that of BWR. The power does not increase because loss of flow occurs and the density change is small. The sensitivities of the system behavior to various parameters during transients and accidents are analyzed. The parameters having strong influence are the capacity of the auxiliary water supply system, the coast down time of the main feed water pumps, and the time delay of the main feed water pumps trip. The control rod reactivity also has strong influence. (authors)

  13. A Meta-analysis of the Rates of Listeria monocytogenes and Enterococcus in Febrile Infants.

    Science.gov (United States)

    Leazer, Rianna; Perkins, Amy M; Shomaker, Kyrie; Fine, Bryan

    2016-04-01

    A change in the epidemiology of pathogens causing serious bacterial infection (SBI) has been noted since original recommendations were made for the empirical antibiotic choices for young infants with fever. To assess the prevalence of SBI caused by Listeria monocytogenes and Enterococcus species. A literature search was conducted on keywords related to SBI, L. monocytogenes, and Enterococcus spp. infections. Eligible studies were those conducted in the United States and published between January 1998 and June 2014 focusing on SBI in infants≤90 days of age. The rates of urinary tract infection, bacteremia, and meningitis for each pathogen were recorded for each study. Meta-analysis was performed to calculate the prevalence for each pathogen in a random effects model with 0.5 continuity correction added to studies with zero events. Sixteen studies were included. A total of 20,703 blood cultures were included, with weighted prevalences for L. monocytogenes and Enterococcus spp. bacteremia of 0.03% and 0.09%, respectively. A total of 13,775 cerebrospinal fluid cultures were included with event rates (unweighted prevalences) for L. monocytogenes and Enterococcus spp. meningitis of 0.02% and 0.03%, respectively. A total of 18,283 urine cultures were included, with no cases of L. monocytogenes and a weighted prevalence for Enterococcus spp. urinary tract infection of 0.28%. There may have been reporting bias or incomplete retrieval or inadvertent exclusion of relevant studies. SBI caused by L. monocytogenes and Enterococcus spp. in febrile infants is rare, and therefore clinicians may consider a change in empirical antibiotic choices. Copyright © 2016 by the American Academy of Pediatrics.

  14. Rapid depressurization event analysis in BWR/6 using RELAP5 and contain

    Energy Technology Data Exchange (ETDEWEB)

    Mueftueoglu, A.K.; Feltus, M.A. [Pennsylvania State Univ., University Park, PA (United States)

    1995-09-01

    Noncondensable gases may become dissolved in Boiling Water Reactor (BWR) water level instrumentation during normal operations. Any dissolved noncondensable gases inside these water columns may come out of solution during rapid depressurization events, and displace water from the reference leg piping resulting in a false high level. These water level errors may cause a delay or failure in actuation, or premature shutdown of the Emergency Core Cooling System. (ECCS). If a rapid depressurization causes an erroneously high water level, preventing automatic ECCS actuation, it becomes important to determine if there would be other adequate indications for operator response and other signals for automatic actuation such as high drywell pressure. It is also important to determine the effect of the level signal on ECCS operation after it is being actuated. The objective of this study is to determine the detailed coupled containment/NSSS response during this rapid depressurization events in BWR/6. The selected scenarios involve: (a) inadvertent opening of all ADS valves, (b) design basis (DB) large break loss of coolant accident (LOCA), and (c) main steam line break (MSLB). The transient behaviors are evaluated in terms of: (a) vessel pressure and collapsed water level response, (b) specific transient boundary conditions, (e.g., scram, MSIV closure timing, feedwater flow, and break blowdown rates), (c) ECCS initiation timing, (d) impact of operator actions, (e) whether indications besides low-low water level were available. The results of the analysis had shown that there would be signals to actuate ECCS other than low reactor level, such as high drywell pressure, low vessel pressure, high suppression pool temperature, and that the plant operators would have significant indications to actuate ECCS.

  15. A meta-analysis of personality and workplace safety: addressing unanswered questions.

    Science.gov (United States)

    Beus, Jeremy M; Dhanani, Lindsay Y; McCord, Mallory A

    2015-03-01

    [Correction Notice: An Erratum for this article was reported in Vol 100(2) of Journal of Applied Psychology (see record 2015-08139-001). Table 3 contained formatting errors. Minus signs used to indicate negative statistical estimates within the table were inadvertently changed to m-dashes. All versions of this article have been corrected.] The purpose of this meta-analysis was to address unanswered questions regarding the associations between personality and workplace safety by (a) clarifying the magnitude and meaning of these associations with both broad and facet-level personality traits, (b) delineating how personality is associated with workplace safety, and (c) testing the relative importance of personality in comparison to perceptions of the social context of safety (i.e., safety climate) in predicting safety-related behavior. Our results revealed that whereas agreeableness and conscientiousness were negatively associated with unsafe behaviors, extraversion and neuroticism were positively associated with them. Of these traits, agreeableness accounted for the largest proportion of explained variance in safety-related behavior and openness to experience was unrelated. At the facet level, sensation seeking, altruism, anger, and impulsiveness were all meaningfully associated with safety-related behavior, though sensation seeking was the only facet that demonstrated a stronger relationship than its parent trait (i.e., extraversion). In addition, meta-analytic path modeling supported the theoretical expectation that personality's associations with accidents are mediated by safety-related behavior. Finally, although safety climate perceptions accounted for the majority of explained variance in safety-related behavior, personality traits (i.e., agreeableness, conscientiousness, neuroticism) still accounted for a unique and substantive proportion of the explained variance. Taken together, these results substantiate the value of considering personality traits as key

  16. Polybacterial community analysis in human conjunctiva through 16S rRNA gene libraries.

    Science.gov (United States)

    Deepthi, KrishnanNair Geetha; Jayasudha, Rajagopalaboopathi; Girish, Rameshan Nair; Manikandan, Palanisamy; Ram, Rammohan; Narendran, Venkatapathy; Prabagaran, Solai Ramatchandirane

    2018-05-14

    The conjunctival sac of healthy human harbours a variety of microorganisms. When the eye is compromised, an occasional inadvertent spread happens to the adjacent tissue, resulting in bacterial ocular infections. Microbiological investigation of the conjunctival swab is one of the broadly used modality to study the aetiological agent of conjunctiva. However, most of the time such methods yield unsatisfactory results. Hence, the present study intends to identify the bacterial community in human conjunctiva of pre-operative subjects through 16S rRNA gene libraries. Out of 45 samples collected from preoperative patients undergoing cataract surgery, 36 libraries were constructed with bacterial nested-PCR-positive samples. The representative clones with unique restriction pattern were generated through Amplified Ribosomal DNA Restriction Analysis (ARDRA) which were sequenced for phylogenetic affiliation. A total of 211 representative clones were obtained which were distributed in phyla Actinobacteria, Firmicutes, α-Proteobacteria, β-Proteobacteria, γ-Proteobacteria, Bacteroidetes, and Deinococcus-Thermus. Findings revealed the presence of polybacterial community, especially in some cases even though no bacterium or a single bacterium alone was identified through cultivable method. Remarkably, we identified 17 species which have never been reported in any ocular infections. The sequencing data reported 6 unidentified bacteria suggesting the possibility of novel organisms in the sample. Since, polybacterial community has been identified consisting of both gram positive and gram negative bacteria, a broad spectrum antibiotic therapy is advisable to the patients who are undergoing cataract surgery. Consolidated effort would significantly improve a clear understanding of the nature of microbial community in the human conjunctiva which will promote administration of appropriate antibiotic regimen and also help in the development of oligonucleotide probes to screen the

  17. The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market

    Directory of Open Access Journals (Sweden)

    Andy Jones

    2006-09-01

    Full Text Available All organisations, whether in the public or private sector, use computers for the storage and processing of information relating to their business or services, their employees and their customers. A large proportion of families and individuals in their homes now also use personal computers and, both intentionally and inadvertently, often store on those computers personal information. It is clear that most organisations and individuals continue to be unaware of the information that may be stored on the hard disks that the computers contain, and have not considered what may happen to the information after the disposal of the equipment.In 2005, joint research was carried out by the University of Glamorgan in Wales and Edith Cowan University in Australia to determine whether second hand computer disks that were purchased from a number of sources still contained any information or whether the information had been effectively erased. The research revealed that, for the majority of the disks that were examined, the information had not been effectively removed and as a result, both organisations and individuals were potentially exposed to a range of potential crimes.  It is worthy of note that in the disposal of this equipment, the organisations involved had failed to meet their statutory, regulatory and legal obligations.This paper describes a second research project that was carried out in 2006 which repeated the research carried out the previous year and also extended the scope of the research to include additional countries.  The methodology used was the same as that in the previous year and the disks that were used for the research were again supplied blind by a third party. The research involved the forensic imaging of the disks which was followed by an analysis of the disks to determine what information remained and whether it could be easily recovered using publicly available tools and techniques.

  18. Instrumental analysis

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Seung Jae; Seo, Seong Gyu

    1995-03-15

    This textbook deals with instrumental analysis, which consists of nine chapters. It has Introduction of analysis chemistry, the process of analysis and types and form of the analysis, Electrochemistry on basic theory, potentiometry and conductometry, electromagnetic radiant rays and optical components on introduction and application, Ultraviolet rays and Visible spectrophotometry, Atomic absorption spectrophotometry on introduction, flame emission spectrometry and plasma emission spectrometry. The others like infrared spectrophotometry, X-rays spectrophotometry and mass spectrometry, chromatography and the other instrumental analysis like radiochemistry.

  19. Instrumental analysis

    International Nuclear Information System (INIS)

    Kim, Seung Jae; Seo, Seong Gyu

    1995-03-01

    This textbook deals with instrumental analysis, which consists of nine chapters. It has Introduction of analysis chemistry, the process of analysis and types and form of the analysis, Electrochemistry on basic theory, potentiometry and conductometry, electromagnetic radiant rays and optical components on introduction and application, Ultraviolet rays and Visible spectrophotometry, Atomic absorption spectrophotometry on introduction, flame emission spectrometry and plasma emission spectrometry. The others like infrared spectrophotometry, X-rays spectrophotometry and mass spectrometry, chromatography and the other instrumental analysis like radiochemistry.

  20. Numerical analysis on infiltration-driven decarbonation during skarnification

    Science.gov (United States)

    Chu, X.; Lee, C. T.; Dasgupta, R.

    2017-12-01

    Interaction of arc magmas with carbonate sequences on active margins leads to contact metamorphism and metasomatism by infiltrating magmatic fluids. This skarnification process releases CO2 to the metasomatic fluids, which transport carbon to shallow reservoirs and can affect the long-term carbon budget in the exogenic system [1]. In this study, we apply a self-consistent 1D finite difference model to an impure marble consisting of quartz and calcite, in a similar scheme as ref [2]. The Darcian flow is modeled with a fixed boundary condition of water influx, taking into account the reaction kinetics [3,4] and pore space compaction. The modeling results show that the reaction front lags the fluid infiltration front and propagates at the rate scaling with: = k × [infiltrating fluid flux] / [reactant amount], where k is a function of the reaction kinetics and rock rheology. The reaction front does not advance until one reactant is exhausted; thus a protolith assemblage of 50:50 quartz:calcite has the slowest-moving reaction front. The steady-state carbon flux scales with the distance of reaction front to comply with mass conservation, and thus yields a linear relationship with the infiltrating flux and is largely independent of the protolith quartz:calcite ratio. Assuming that the rate of global magma emplacement on the continental arcs is 3 km3/yr [5], the arc magmas exsolve 5 vol.% water as they crystallize, and 40% of such magmas intrude carbonate sequences, the total steady-state carbon flux due to skarnification is 0.2 Tmol/yr. By contrast, Mount Etna alone emits carbon up to 0.2 Tmol/yr, most of which is the product of magma-carbonate interaction [6]. We note that the infiltration of pure water produces a wollastonite marble; natural metasomatic fluid is saturated with silica and other components, which leads to greater decarbonation and the formation of calc-silicate skarn. Wallrock assimilation also adds to the carbon flux from arcs, so the simplified

  1. Spatio-temporal assessment and trend analysis of surface water salinity in the coastal region of Bangladesh.

    Science.gov (United States)

    Shammi, Mashura; Rahman, Md Mostafizur; Islam, Md Atikul; Bodrud-Doza, Md; Zahid, Anwar; Akter, Yeasmin; Quaiyum, Samia; Kurasaki, Masaaki

    2017-06-01

    The study was designed to collect water samples over two seasons-wet-monsoon season (n = 96) (March-April) and dry-monsoon season (n = 44) (September-October)-to understand the seasonal variation in anion and cation hydrochemistry of the coastal rivers and estuaries contributing in the spatial trend in salinity. Hydrochemical examination of wet-monsoon season primarily revealed Ca-Mg-HCO 3 type (66%) and followed by Na-Cl type (17.70%) water. In the dry-monsoon season, the scenario reversed with primary water being Na-Cl type (52.27%) followed by Ca-Mg-HCO 3 type (31.81%). Analysis of Cl/Br molar ratio vs. Cl (mg/L) depicted sampling area affected by seawater intrusion (SWI). Spatial analysis by ordinary kriging method confirmed approximately 77% sample in the dry-monsoon, and 34% of the wet-monsoon season had shown SWI. The most saline-intruded areas in the wet-monsoon seasons were extreme south-west coastal zone of Bangladesh, lower Meghna River floodplain and Meghna estuarine floodplain and south-eastern part of Chittagong coastal plains containing the districts of Chittagong and Cox's Bazar adjacent to Bay of Bengal. In addition, mid-south zone is also affected slightly in the dry-monsoon season. From the analyses of data, this study could further help to comprehend seasonal trends in the hydrochemistry and water quality of the coastal and estuarine rivers. In addition, it can help policy makers to obligate some important implications for the future initiatives taken for the management of land, water, fishery, agriculture and environment of coastal rivers and estuaries of Bangladesh.

  2. Seeking missing pieces in science concept assessments: Reevaluating the Brief Electricity and Magnetism Assessment through Rasch analysis

    Science.gov (United States)

    Ding, Lin

    2014-02-01

    Discipline-based science concept assessments are powerful tools to measure learners' disciplinary core ideas. Among many such assessments, the Brief Electricity and Magnetism Assessment (BEMA) has been broadly used to gauge student conceptions of key electricity and magnetism (E&M) topics in college-level introductory physics courses. Differing from typical concept inventories that focus only on one topic of a subject area, BEMA covers a broad range of topics in the electromagnetism domain. In spite of this fact, prior studies exclusively used a single aggregate score to represent individual students' overall understanding of E&M without explicating the construct of this assessment. Additionally, BEMA has been used to compare traditional physics courses with a reformed course entitled Matter and Interactions (M&I). While prior findings were in favor of M&I, no empirical evidence was sought to rule out possible differential functioning of BEMA that may have inadvertently advantaged M&I students. In this study, we used Rasch analysis to seek two missing pieces regarding the construct and differential functioning of BEMA. Results suggest that although BEMA items generally can function together to measure the same construct of application and analysis of E&M concepts, several items may need further revision. Additionally, items that demonstrate differential functioning for the two courses are detected. Issues such as item contextual features and student familiarity with question settings may underlie these findings. This study highlights often overlooked threats in science concept assessments and provides an exemplar for using evidence-based reasoning to make valid inferences and arguments.

  3. Seeking missing pieces in science concept assessments: Reevaluating the Brief Electricity and Magnetism Assessment through Rasch analysis

    Directory of Open Access Journals (Sweden)

    Lin Ding

    2014-02-01

    Full Text Available Discipline-based science concept assessments are powerful tools to measure learners’ disciplinary core ideas. Among many such assessments, the Brief Electricity and Magnetism Assessment (BEMA has been broadly used to gauge student conceptions of key electricity and magnetism (E&M topics in college-level introductory physics courses. Differing from typical concept inventories that focus only on one topic of a subject area, BEMA covers a broad range of topics in the electromagnetism domain. In spite of this fact, prior studies exclusively used a single aggregate score to represent individual students’ overall understanding of E&M without explicating the construct of this assessment. Additionally, BEMA has been used to compare traditional physics courses with a reformed course entitled Matter and Interactions (M&I. While prior findings were in favor of M&I, no empirical evidence was sought to rule out possible differential functioning of BEMA that may have inadvertently advantaged M&I students. In this study, we used Rasch analysis to seek two missing pieces regarding the construct and differential functioning of BEMA. Results suggest that although BEMA items generally can function together to measure the same construct of application and analysis of E&M concepts, several items may need further revision. Additionally, items that demonstrate differential functioning for the two courses are detected. Issues such as item contextual features and student familiarity with question settings may underlie these findings. This study highlights often overlooked threats in science concept assessments and provides an exemplar for using evidence-based reasoning to make valid inferences and arguments.

  4. Does gender matter? An analysis of men's and women's accounts of responding to symptoms of lung cancer.

    Science.gov (United States)

    MacLean, Alice; Hunt, Kate; Smith, Sarah; Wyke, Sally

    2017-10-01

    Men are often portrayed - in research studies, 'common-sense' accounts and popular media - as reluctant users of health services. They are said to avoid going to the GP whenever possible, while women are portrayed, in presumed opposition, as consulting more readily, more frequently and with less serious complaints. Such stereotypes may inadvertently encourage doctors to pay greater heed to men's symptoms in 'routine' consultations. Although previous research has challenged this view with evidence, and suggested that links between gender identities and help-seeking are complex and fluid, gender comparative studies remain uncommon, and particularly few studies (either qualitative or quantitative) compare men and women with similar morbidity. We contribute here to gender comparative research on help-seeking by investigating men's and women's accounts of responding to symptoms later diagnosed as lung cancer. A secondary analysis of qualitative interviews with 27 men and 18 women attending Scottish cancer centres revealed striking similarities between men's and women's accounts. Participants were seen as negotiating a complex and delicate balance in constructing their moral integrity as, on the one hand, responsible service users who were conscious of the demands on health care professionals' time, and as patients who did not take undue risks with their health, in the context of an illness for which people are often held culpable, on the other. In accounting for their responses to symptoms, men and women drew equally on culturally-embedded moral frameworks of stoicism and responsible service use. Regardless of gender, the accounts portrayed participants as stoic in response to illness and responsible service users; and as people seeking explanations for bodily changes and taking appropriate and timely action. Our analysis challenges simplistic, 'common-sense' views of gendered help-seeking and highlights that both men and women need support to consult their doctor for

  5. Sensitivity analysis

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/article/003741.htm Sensitivity analysis To use the sharing features on this page, please enable JavaScript. Sensitivity analysis determines the effectiveness of antibiotics against microorganisms (germs) ...

  6. Real analysis

    CERN Document Server

    McShane, Edward James

    2013-01-01

    This text surveys practical elements of real function theory, general topology, and functional analysis. Discusses the maximality principle, the notion of convergence, the Lebesgue-Stieltjes integral, function spaces and harmonic analysis. Includes exercises. 1959 edition.

  7. CSF analysis

    Science.gov (United States)

    Cerebrospinal fluid analysis ... Analysis of CSF can help detect certain conditions and diseases. All of the following can be, but ... An abnormal CSF analysis result may be due to many different causes, ... Encephalitis (such as West Nile and Eastern Equine) Hepatic ...

  8. Semen analysis

    Science.gov (United States)

    ... analysis URL of this page: //medlineplus.gov/ency/article/003627.htm Semen analysis To use the sharing features on this page, please enable JavaScript. Semen analysis measures the amount and quality of a man's semen and sperm. Semen is ...

  9. Functional analysis

    CERN Document Server

    Kantorovich, L V

    1982-01-01

    Functional Analysis examines trends in functional analysis as a mathematical discipline and the ever-increasing role played by its techniques in applications. The theory of topological vector spaces is emphasized, along with the applications of functional analysis to applied analysis. Some topics of functional analysis connected with applications to mathematical economics and control theory are also discussed. Comprised of 18 chapters, this book begins with an introduction to the elements of the theory of topological spaces, the theory of metric spaces, and the theory of abstract measure space

  10. Improvement of Tidal Analysis Results by a Priori Rain Fall Modelling at the Vienna and Membach stations

    Science.gov (United States)

    Meurers, B.; van Camp, M.; Petermans, T.

    2005-12-01

    We investigate how far tidal analysis results can be improved when a rain fall admittance model is applied on the superconducting gravity (SG) data. For that purpose both Vienna and Membach data have been analysed with and without a priori rain fall correction. In Membach the residual drop for most events (80%) can be explained by the rain water load, while in Vienna only 50% of all events fit the model in detail. In the other cases the Newtonian effect of vertical air mass redistribution (vertical density variation without air pressure change), predominantly connected with high vertical convection activity, e.g. thunderstorms, plays an essential role: short-term atmospheric signals show up steep gravity residual decreases of a few nms-2 within 10 - 60 min, well correlated with outdoor air temperature in most cases. However, even in those cases the water load model is able to explain the dominating part of the residual drop especially during heavy rain fall. In Vienna more than 110 events have been detected over 10 years. 84% of them are associated with heavy rain starting at or up to 10 min later than the residual drop while the rest (16%) shows no or only little rainfall. The magnitude of the gravity drop depends on the total amount of rainfall accumulated during the meteorological event. Step like signals deteriorate the frequency spectrum estimates. This even holds for tidal analysis. As the drops are of physical origin, they should not be eliminated blindly but corrected using water load modeling constrained by high temporal resolution (1 min) rain data. 3D modeling of the water mass load due to a rain event is based on the following assumptions: (1) Rain water intrudes into the uppermost soil layer (close to the topography surface) and remains there at least until rain has stopped. This is justified for a period of some hours after the rainfall as evapotranspiration is not yet effective. (2) No run-off except of sealed areas or building roofs, where water can

  11. Image analysis

    International Nuclear Information System (INIS)

    Berman, M.; Bischof, L.M.; Breen, E.J.; Peden, G.M.

    1994-01-01

    This paper provides an overview of modern image analysis techniques pertinent to materials science. The usual approach in image analysis contains two basic steps: first, the image is segmented into its constituent components (e.g. individual grains), and second, measurement and quantitative analysis are performed. Usually, the segmentation part of the process is the harder of the two. Consequently, much of the paper concentrates on this aspect, reviewing both fundamental segmentation tools (commonly found in commercial image analysis packages) and more advanced segmentation tools. There is also a review of the most widely used quantitative analysis methods for measuring the size, shape and spatial arrangements of objects. Many of the segmentation and analysis methods are demonstrated using complex real-world examples. Finally, there is a discussion of hardware and software issues. 42 refs., 17 figs

  12. An analysis of policies for cotrimoxazole, amoxicillin and azithromycin use in Namibia's public sector: Findings and therapeutic implications.

    Science.gov (United States)

    Kibuule, Dan; Mubita, Mwangana; Naikaku, Ester; Kalemeera, Francis; Godman, Brian B; Sagwa, Evans

    2017-02-01

    Despite Namibia's robust medicine use systems and policies, antibiotic use indicators remain suboptimal. Recent medicine use surveys rank cotrimoxazole, amoxicillin and azithromycin (CAA) among the most used medicines. However, there is rising resistance to CAA (55.9%-96.7%). Unfortunately, to date, there have been limited studies evaluating policies to improve antibiotic use in Namibia. To evaluate public sector pharmaceutical policies and guidelines influencing the therapeutic use of CAA antibiotics in Namibia. Evaluate Namibia's pharmaceutical policies and guidelines for CAA use through quantitative text analysis. The main outcome variables were the existence of antibiotic policies, therapeutic indications per antibiotic and the type/level of healthcare facility allowed to use the antibiotic. Policies for antibiotic use were limited, with only the draft Namibia Medicines Policy having a statement on antibiotic use. Several essential antibiotics had no therapeutic indications mentioned in the guidelines. Twenty-nine antibiotics were listed for 69 therapeutic indications; CAA (49.3%) antibiotics and ATC J01C/J01D (48%) having the highest indications per antibiotic. For CAA antibiotics, this suggested use was mainly for acute respiratory infections (n=22, 37.2%). Published policies (58.6%-17/29) recommended antibiotics for use at the primary healthcare (PHC) level, with CAA antibiotics recommended mostly for respiratory tract infections and genitourinary infections. Policy and guidelines for antibiotic use in Namibia are not comprehensive and are skewed towards PHCs. Existing policies promote the wide use of CAA antibiotics, which may inadvertently result in their inappropriate use enhancing resistance rates. This calls for the development of more comprehensive antibiotic guidelines and essential medicine lists in tandem with local antimicrobial resistance patterns. In addition, educational initiatives among all key stakeholder groups. © 2017 John Wiley & Sons Ltd.

  13. Semiotic Analysis.

    Science.gov (United States)

    Thiemann, Francis C.

    Semiotic analysis is a method of analyzing signs (e.g., words) to reduce non-numeric data to their component parts without losing essential meanings. Semiotics dates back to Aristotle's analysis of language; it was much advanced by nineteenth-century analyses of style and logic and by Whitehead and Russell's description in this century of the role…

  14. Dimensional Analysis

    Indian Academy of Sciences (India)

    Dimensional analysis is a useful tool which finds important applications in physics and engineering. It is most effective when there exist a maximal number of dimensionless quantities constructed out of the relevant physical variables. Though a complete theory of dimen- sional analysis was developed way back in 1914 in a.

  15. Job Analysis

    OpenAIRE

    Bravená, Helena

    2009-01-01

    This bacherlor thesis deals with the importance of job analysis for personnel activities in the company. The aim of this work is to find the most suitable method of job analysis in a particular enterprise, and continues creating descriptions and specifications of each job.

  16. From ocean depths to mountain tops: uplift of the Troodos Massif (Cyprus) constrained by (U-Th)/He thermochronology and geomorphic analysis

    Science.gov (United States)

    Morag, N.; Haviv, I.; Katzir, Y.

    2013-12-01

    The Troodos Massif of Cyprus, rising to nearly 2000 meters above sea level, encompasses one of the world's classic ophiolites. Following its formation at a seafloor spreading center in Late Cretaceous times, this slice of the NeoTethyan oceanic lithosphere was uplifted and eventually exposed on mountain tops during the Neogene. The final uplift and exhumation of the Troodos was previously assigned to Pleistocene age by observations in the circum-Troodos sedimentary strata. However, quantitative thermochronological and geomorphological data from the Massif itself were not available. Here we use apatite (U-Th)/He low-temperature thermochronology complemented by zircon (U-Th)/He and apatite fission track data, and combined with geomorphic analysis to constrain the exhumation and uplift history of the Troodos ophiolite. Apatite (U-Th)/He ages vary with depth from ~ 22 Ma at the top of the Gabbro sequence to ~ 6 Ma at the bottom of the sequence. The deepest sample from a Gabbro pegmatitic dyke intruding the ultramafic sequence yielded an age of ~ 3 Ma. Thermal modeling of apatite (U-Th)/He and fission track data delineates Plio - Pleistocene initiation of rapid uplift and exhumation of the Troodos ophiolite. The estimated cumulative exhumation since its initiation is 2-3 km. No evidence was found for significant uplift of the central Troodos area prior to that time. The geomorphic analysis delineates a bull's-eye zone at the center of the Troodos Massif, where local relief and channel steepness index are highest. The boundaries of this zone roughly correspond with the Mt. Olympus mantle outcrop and suggest recent, differential uplift of this zone relative to its surroundings. The most likely mechanism, which could drive such a focused bull's-eye uplift pattern is hydration of ultramafic rocks (serpentinization) leading to a decrease in rock density and subsequent diapiric uplift of the serpentinized lithospheric mantle.

  17. Siting of a low-level radioactive waste disposal facility

    International Nuclear Information System (INIS)

    Alvarado, R.A.

    1983-01-01

    The Texas Low-Level Radioactive Waste Disposal Authority was established by the 67th Legislature to assure safe and effective disposal of the state's low-level radioactive waste. The Authority operates under provisions of the Texas Low-Level Radioactive Waste Disposal Authority Act, VACS 4590f-1. In Texas, low-level radioactive waste is defined as any radioactive material that has a half-life of 35 years or less or that has less than 10 nanocuries per gram of transuranics, and may include radioactive material not excluded by this definition with a half-life or more than 35 years if special disposal criteria are established. Prior to beginning the siting study, the Authority developed both exclusionary and inclusionary criteria. Major requirements of the siting guidelines are that the site shall be located such that it will not interfere with: (1) existing or near-future industrial use, (2) sensitive environmental and ecological areas, and (3) existing and projected population growth. Therefore, the site should be located away from currently known recoverable mineral, energy and water resources, population centers, and areas of projected growth. This would reduce the potential for inadvertent intruders, increasing the likelihood for stability of the disposal site after closure. The identification of potential sites for disposal of low-level radioactive waste involves a phased progression from statewide screening to site-specific exploration, using a set of exclusionary and preferential criteria to guide the process. This methodology applied the criteria in a sequential manner to focus the analysis on progressively smaller and more favorable areas. The study was divided into three phases: (1) statewide screening; (2) site identification; and (3) preliminary site characterization

  18. Incidents analysis

    International Nuclear Information System (INIS)

    Francois, P.

    1996-01-01

    We undertook a study programme at the end of 1991. To start with, we performed some exploratory studies aimed at learning some preliminary lessons on this type of analysis: Assessment of the interest of probabilistic incident analysis; possibility of using PSA scenarios; skills and resources required. At the same time, EPN created a working group whose assignment was to define a new approach for analysis of incidents on NPPs. This working group gave thought to both aspects of Operating Feedback that EPN wished to improve: Analysis of significant incidents; analysis of potential consequences. We took part in the work of this group, and for the second aspects, we proposed a method based on an adaptation of the event-tree method in order to establish a link between existing PSA models and actual incidents. Since PSA provides an exhaustive database of accident scenarios applicable to the two most common types of units in France, they are obviously of interest for this sort of analysis. With this method we performed some incident analyses, and at the same time explores some methods employed abroad, particularly ASP (Accident Sequence Precursor, a method used by the NRC). Early in 1994 EDF began a systematic analysis programme. The first, transient phase will set up methods and an organizational structure. 7 figs

  19. Incidents analysis

    Energy Technology Data Exchange (ETDEWEB)

    Francois, P

    1997-12-31

    We undertook a study programme at the end of 1991. To start with, we performed some exploratory studies aimed at learning some preliminary lessons on this type of analysis: Assessment of the interest of probabilistic incident analysis; possibility of using PSA scenarios; skills and resources required. At the same time, EPN created a working group whose assignment was to define a new approach for analysis of incidents on NPPs. This working group gave thought to both aspects of Operating Feedback that EPN wished to improve: Analysis of significant incidents; analysis of potential consequences. We took part in the work of this group, and for the second aspects, we proposed a method based on an adaptation of the event-tree method in order to establish a link between existing PSA models and actual incidents. Since PSA provides an exhaustive database of accident scenarios applicable to the two most common types of units in France, they are obviously of interest for this sort of analysis. With this method we performed some incident analyses, and at the same time explores some methods employed abroad, particularly ASP (Accident Sequence Precursor, a method used by the NRC). Early in 1994 EDF began a systematic analysis programme. The first, transient phase will set up methods and an organizational structure. 7 figs.

  20. [Ex vivo microCT analysis of possible microfractures of the femoral head during implantation of a cementless hip resurfacing femoral component].

    Science.gov (United States)

    Lerch, M; Olender, G; von der Höh, N; Thorey, F; von Lewinski, G; Meyer-Lindenberg, A; Windhagen, H; Hurschler, C

    2009-01-01

    Microfractures of the femoral head during implantation of the femoral components are suspected to be a cause of fractures at the implant/neck junction which represent a common failure mode in hip resurfacing arthroplasty. Callus formation observed in femoral head retrievals suggests the occurrence of microfractures inside the femoral head, which might be inadvertently caused by the surgeon during implantation. The aim of this biomechanical study was to analyse whether or not the implantation of a cementless femoral component hip resurfacing system causes microfractures in the femoral head. After the preparation of 20 paired human cadaveric femoral heads, the cementless femoral component ESKA Typ BS (ESKA Implants GmbH & Co., Lübeck) was implanted on 9 specimens with an impaction device that generates 4.5 kN impaction force. On 9 specimens the femoral component was implanted by hand. One head was used as a fracture model, 1 specimen served as control without manipulation. The femoral component used for impaction was equipped with hinges to enable its removal without further interfering with the bone stock. Specimens were scanned with a microCT device before and after impaction and the microCT datasets before and after impaction were compared to identify possible microfractures. Twenty strikes per hand or with the impaction device provided sufficient implant seating. Neither the macroscopic examination nor the 2-dimensional microCT analysis revealed any fractures of the femoral heads after impaction. At least macroscopically and in the 2-dimensional microCT analysis, implantation of the cementless hip resurfacing femoral component ESKA Typ BS with 4.5 kN or by hand does not seem to cause fractures of the femoral head. Georg Thieme Verlag KG Stuttgart, New York.

  1. Analysis, by RELAP5 code, of boron dilution phenomena in a mid-loop operation transient, performed in PKL III F2.1 RUN 1 test

    International Nuclear Information System (INIS)

    Mascari, F.; Vella, G.; Del Nevo, A.; D'Auria, F.

    2007-01-01

    The present paper deals with the post test analysis and accuracy quantification of the test PKL III F2.1 RUN 1 by RELAP5/Mod3.3 code performed in the framework of the international OECD/SETH PKL III Project. The PKL III is a full-height integral test facility (ITF) that models the entire primary system and most of the secondary system (except for turbine and condenser) of pressurized water reactor of KWU design of the 1300-MW (electric) class on a scale of 1:145. Detailed design was based to the largest possible extent on the specific data of Philippsburg nuclear power plant, unit 2. As for the test facilities of this size, the scaling concept aims to simulate overall thermal hydraulic behavior of the full-scale power plant [1]. The main purpose of the project is to investigate PWR safety issues related to boron dilution and in particular this experiment investigates (a) the boron dilution issue during mid-loop operation and shutdown conditions, and (b) assessing primary circuit accident management operations to prevent boron dilution as a consequence of loss of heat removal [2]. In this work the authors deal with a systematic procedure (developed at the university of Pisa) for code assessment and uncertainty qualification and its application to RELAP5 system code. It is used to evaluate the capability of RELAP5 to reproduce the thermal hydraulics of an inadvertent boron dilution event in a PWR. The quantitative analysis has been performed adopting the Fast Fourier Transform Based Method (FFTBM), which has the capability to quantify the errors in code predictions as compared to the measured experimental signal. (author)

  2. Numerical analysis

    CERN Document Server

    Khabaza, I M

    1960-01-01

    Numerical Analysis is an elementary introduction to numerical analysis, its applications, limitations, and pitfalls. Methods suitable for digital computers are emphasized, but some desk computations are also described. Topics covered range from the use of digital computers in numerical work to errors in computations using desk machines, finite difference methods, and numerical solution of ordinary differential equations. This book is comprised of eight chapters and begins with an overview of the importance of digital computers in numerical analysis, followed by a discussion on errors in comput

  3. Trace analysis

    International Nuclear Information System (INIS)

    Warner, M.

    1987-01-01

    What is the current state of quantitative trace analytical chemistry? What are today's research efforts? And what challenges does the future hold? These are some of the questions addressed at a recent four-day symposium sponsored by the National Bureau of Standards (NBS) entitled Accuracy in Trace Analysis - Accomplishments, Goals, Challenges. The two plenary sessions held on the first day of the symposium reviewed the history of quantitative trace analysis, discussed the present situation from academic and industrial perspectives, and summarized future needs. The remaining three days of the symposium consisted of parallel sessions dealing with the measurement process; quantitation in materials; environmental, clinical, and nutrient analysis; and advances in analytical techniques

  4. Recursive analysis

    CERN Document Server

    Goodstein, R L

    2010-01-01

    Recursive analysis develops natural number computations into a framework appropriate for real numbers. This text is based upon primary recursive arithmetic and presents a unique combination of classical analysis and intuitional analysis. Written by a master in the field, it is suitable for graduate students of mathematics and computer science and can be read without a detailed knowledge of recursive arithmetic.Introductory chapters on recursive convergence and recursive and relative continuity are succeeded by explorations of recursive and relative differentiability, the relative integral, and

  5. Analysis I

    CERN Document Server

    Tao, Terence

    2016-01-01

    This is part one of a two-volume book on real analysis and is intended for senior undergraduate students of mathematics who have already been exposed to calculus. The emphasis is on rigour and foundations of analysis. Beginning with the construction of the number systems and set theory, the book discusses the basics of analysis (limits, series, continuity, differentiation, Riemann integration), through to power series, several variable calculus and Fourier analysis, and then finally the Lebesgue integral. These are almost entirely set in the concrete setting of the real line and Euclidean spaces, although there is some material on abstract metric and topological spaces. The book also has appendices on mathematical logic and the decimal system. The entire text (omitting some less central topics) can be taught in two quarters of 25–30 lectures each. The course material is deeply intertwined with the exercises, as it is intended that the student actively learn the material (and practice thinking and writing ri...

  6. Analysis II

    CERN Document Server

    Tao, Terence

    2016-01-01

    This is part two of a two-volume book on real analysis and is intended for senior undergraduate students of mathematics who have already been exposed to calculus. The emphasis is on rigour and foundations of analysis. Beginning with the construction of the number systems and set theory, the book discusses the basics of analysis (limits, series, continuity, differentiation, Riemann integration), through to power series, several variable calculus and Fourier analysis, and then finally the Lebesgue integral. These are almost entirely set in the concrete setting of the real line and Euclidean spaces, although there is some material on abstract metric and topological spaces. The book also has appendices on mathematical logic and the decimal system. The entire text (omitting some less central topics) can be taught in two quarters of 25–30 lectures each. The course material is deeply intertwined with the exercises, as it is intended that the student actively learn the material (and practice thinking and writing ri...

  7. Nuclear analysis

    International Nuclear Information System (INIS)

    1988-01-01

    Basic studies in nuclear analytical techniques include the examination of underlying assumptions and the development and extention of techniques involving the use of ion beams for elemental and mass analysis. 1 ref., 1 tab

  8. Biorefinery Analysis

    Energy Technology Data Exchange (ETDEWEB)

    2016-06-01

    Fact sheet summarizing NREL's techno-economic analysis and life-cycle assessment capabilities to connect research with future commercial process integration, a critical step in the scale-up of biomass conversion technologies.

  9. Nonlinear analysis

    CERN Document Server

    Gasinski, Leszek

    2005-01-01

    Hausdorff Measures and Capacity. Lebesgue-Bochner and Sobolev Spaces. Nonlinear Operators and Young Measures. Smooth and Nonsmooth Analysis and Variational Principles. Critical Point Theory. Eigenvalue Problems and Maximum Principles. Fixed Point Theory.

  10. Hydroeconomic analysis

    DEFF Research Database (Denmark)

    Bauer-Gottwein, Peter; Riegels, Niels; Pulido-Velazquez, Manuel

    2017-01-01

    Hydroeconomic analysis and modeling provides a consistent and quantitative framework to assess the links between water resources systems and economic activities related to water use, simultaneously modeling water supply and water demand. It supports water managers and decision makers in assessing...... trade-offs between different water uses, different geographic regions, and various economic sectors and between the present and the future. Hydroeconomic analysis provides consistent economic performance criteria for infrastructure development and institutional reform in water policies and management...... organizations. This chapter presents an introduction to hydroeconomic analysis and modeling, and reviews the state of the art in the field. We review available economic water-valuation techniques and summarize the main types of decision problems encountered in hydroeconomic analysis. Popular solution strategies...

  11. Conversation Analysis.

    Science.gov (United States)

    Schiffrin, Deborah

    1990-01-01

    Summarizes the current state of research in conversation analysis, referring primarily to six different perspectives that have developed from the philosophy, sociology, anthropology, and linguistics disciplines. These include pragmatics; speech act theory; interactional sociolinguistics; ethnomethodology; ethnography of communication; and…

  12. Factor analysis

    CERN Document Server

    Gorsuch, Richard L

    2013-01-01

    Comprehensive and comprehensible, this classic covers the basic and advanced topics essential for using factor analysis as a scientific tool in psychology, education, sociology, and related areas. Emphasizing the usefulness of the techniques, it presents sufficient mathematical background for understanding and sufficient discussion of applications for effective use. This includes not only theory but also the empirical evaluations of the importance of mathematical distinctions for applied scientific analysis.

  13. Radioactivation analysis

    International Nuclear Information System (INIS)

    1959-01-01

    Radioactivation analysis is the technique of radioactivation analysis of the constituents of a very small sample of matter by making the sample artificially radioactive. The first stage is to make the sample radioactive by artificial means, e.g. subject it to neutron bombardment. Once the sample has been activated, or made radioactive, the next task is to analyze the radiations given off by the sample. This analysis would indicate the nature and quantities of the various elements present in the sample. The reason is that the radiation from a particular radioisotope. In 1959 a symposium on 'Radioactivation Analysis' was organized in Vienna by the IAEA and the Joint Commission on Applied Radioactivity (ICSU). It was pointed out that there are certain factors creating uncertainties and elaborated how to overcome them. Attention was drawn to the fact that radioactivation analysis had proven a powerful tool tackling fundamental problems in geo- and cosmochemistry, and a review was given of the recent work in this field. Because of its extreme sensitivity radioactivation analysis had been principally employed for trace detection and its most extensive use has been in control of semiconductors and very pure metals. An account of the experience gained in the USA was given, where radioactivation analysis was being used by many investigators in various scientific fields as a practical and useful tool for elemental analyses. Much of this work had been concerned with determining sub microgramme and microgramme concentration of many different elements in samples of biological materials, drugs, fertilizers, fine chemicals, foods, fuels, glass, ceramic materials, metals, minerals, paints, petroleum products, resinous materials, soils, toxicants, water and other materials. In addition to these studies, radioactivation analysis had been used by other investigators to determine isotopic ratios of the stable isotopes of some of the elements. Another paper dealt with radioactivation

  14. Radioactivation analysis

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1959-07-15

    Radioactivation analysis is the technique of radioactivation analysis of the constituents of a very small sample of matter by making the sample artificially radioactive. The first stage is to make the sample radioactive by artificial means, e.g. subject it to neutron bombardment. Once the sample has been activated, or made radioactive, the next task is to analyze the radiations given off by the sample. This analysis would indicate the nature and quantities of the various elements present in the sample. The reason is that the radiation from a particular radioisotope. In 1959 a symposium on 'Radioactivation Analysis' was organized in Vienna by the IAEA and the Joint Commission on Applied Radioactivity (ICSU). It was pointed out that there are certain factors creating uncertainties and elaborated how to overcome them. Attention was drawn to the fact that radioactivation analysis had proven a powerful tool tackling fundamental problems in geo- and cosmochemistry, and a review was given of the recent work in this field. Because of its extreme sensitivity radioactivation analysis had been principally employed for trace detection and its most extensive use has been in control of semiconductors and very pure metals. An account of the experience gained in the USA was given, where radioactivation analysis was being used by many investigators in various scientific fields as a practical and useful tool for elemental analyses. Much of this work had been concerned with determining sub microgramme and microgramme concentration of many different elements in samples of biological materials, drugs, fertilizers, fine chemicals, foods, fuels, glass, ceramic materials, metals, minerals, paints, petroleum products, resinous materials, soils, toxicants, water and other materials. In addition to these studies, radioactivation analysis had been used by other investigators to determine isotopic ratios of the stable isotopes of some of the elements. Another paper dealt with radioactivation

  15. Safety assessment on the human intrusion scenarios of near surface disposal facility for low and very low level radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Hong, Sung Wook; Park, Jin Baek [Korea Radioactive Waste Agency, Daejeon (Korea, Republic of); Park, Sang Ho [Chungnam National University, Daejeon (Korea, Republic of)

    2016-03-15

    The second-stage near surface disposal facility for low and very low level radioactive waste's permanent disposal is to be built. During the institutional control period, the inadvertent intrusion of the general public is limited. But after the institutional control period, the access to the general public is not restricted. Therefore human who has purpose of residence and resource exploration can intrude the disposal facility. In this case, radioactive effects to the intruder should be limited within regulatory dose limits. This study conducted the safety assessment of human intrusion on the second-stage surface disposal facility through drilling and post drilling scenario. Results of drilling and post drilling scenario were satisfied with regulatory dose limits. The result showed that post-drilling scenario was more significant than drilling scenario. According to the human intrusion time and behavior after the closure of the facility, dominant radionuclide contributing to the intruder was different. Sensitivity analyses on the parameters about the human behavior were also satisfied with regulatory dose limits. Especially, manual redistribution factor was the most sensitive parameter on exposure dose. A loading plan of spent filter waste and dry active waste was more effective than a loading plan of spent filter waste and other wastes for the radiological point of view. These results can be expected to provide both robustness and defense in depth for the development of safety case further.

  16. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  17. An Analysis of the Concurrent Certification Program at Fleet Readiness Center Southwest

    Science.gov (United States)

    2009-12-01

    Mapping  5S Methodology  Kanban  Poka - yoke  A3 Problem Solving  Single Point Lesson Plans (SPLP)  Total Productive Maintenance (TPM) 54 What...the actual demand of the customers. Kanban is as a demand signal which immediately propagates through the supply chain. D. POKA - YOKE : A Japanese...term that means "fail-safing" or "mistake- proofing." Avoiding (yokeru) inadvertent errors ( poka ) is a behavior-shaping constraint, or a method of

  18. Analysis - what is legal medicine?

    Science.gov (United States)

    Beran, Roy G

    2008-04-01

    Legal medicine addresses the interface between medicine and law in health care. The Australian College of Legal Medicine (ACLM) established itself as the peak body in legal and forensic medicine in Australia. It helped establish the Expert Witness Institute of Australia (EWIA), the legal medicine programme at Griffith University and contributes to government enquiries. Public health, disability assessment, competing priorities of privacy verses notification and determination of fitness for a host of pursuits are aspects of legal medicine. Complementing the EWIA, the ACLM runs training programmes emphasising legal medicine skills additional to clinical practice, advocating clinical relevance. Assessment of athletes' fitness and ensuring that prohibited substances are not inadvertently prescribed represent a growing area of legal medicine. Ethical consideration of health care should respect legal medicine principles rather than armchair commentary. International conventions must be respected by legal medicine and dictate physicians' obligations. The NSW courts imposed a duty to provide emergency medical care. Migration and communicable diseases are aspects of legal medicine. Police surgeons provide a face to legal medicine (which incorporates forensic medicine) underpinning its public perception of specialty recognition. Legal medicine deserves its place as a medical specialty in its own right.

  19. Seismic Analysis Code (SAC): Development, porting, and maintenance within a legacy code base

    Science.gov (United States)

    Savage, B.; Snoke, J. A.

    2017-12-01

    The Seismic Analysis Code (SAC) is the result of toil of many developers over almost a 40-year history. Initially a Fortran-based code, it has undergone major transitions in underlying bit size from 16 to 32, in the 1980s, and 32 to 64 in 2009; as well as a change in language from Fortran to C in the late 1990s. Maintenance of SAC, the program and its associated libraries, have tracked changes in hardware and operating systems including the advent of Linux in the early 1990, the emergence and demise of Sun/Solaris, variants of OSX processors (PowerPC and x86), and Windows (Cygwin). Traces of these systems are still visible in source code and associated comments. A major concern while improving and maintaining a routinely used, legacy code is a fear of introducing bugs or inadvertently removing favorite features of long-time users. Prior to 2004, SAC was maintained and distributed by LLNL (Lawrence Livermore National Lab). In that year, the license was transferred from LLNL to IRIS (Incorporated Research Institutions for Seismology), but the license is not open source. However, there have been thousands of downloads a year of the package, either source code or binaries for specific system. Starting in 2004, the co-authors have maintained the SAC package for IRIS. In our updates, we fixed bugs, incorporated newly introduced seismic analysis procedures (such as EVALRESP), added new, accessible features (plotting and parsing), and improved the documentation (now in HTML and PDF formats). Moreover, we have added modern software engineering practices to the development of SAC including use of recent source control systems, high-level tests, and scripted, virtualized environments for rapid testing and building. Finally, a "sac-help" listserv (administered by IRIS) was setup for SAC-related issues and is the primary avenue for users seeking advice and reporting bugs. Attempts are always made to respond to issues and bugs in a timely fashion. For the past thirty-plus years

  20. Panel Analysis

    DEFF Research Database (Denmark)

    Brænder, Morten; Andersen, Lotte Bøgh

    2014-01-01

    Based on our 2013-article, ”Does Deployment to War Affect Soldiers' Public Service Motivation – A Panel Study of Soldiers Before and After their Service in Afghanistan”, we present Panel Analysis as a methodological discipline. Panels consist of multiple units of analysis, observed at two or more...... in research settings where it is not possible to distribute units of analysis randomly or where the independent variables cannot be manipulated. The greatest disadvantage in regard to using panel studies is that data may be difficult to obtain. This is most clearly vivid in regard to the use of panel surveys...... points in time. In comparison with traditional cross-sectional studies, the advantage of using panel studies is that the time dimension enables us to study effects. Whereas experimental designs may have a clear advantage in regard to causal inference, the strength of panel studies is difficult to match...

  1. Real analysis

    CERN Document Server

    Loeb, Peter A

    2016-01-01

    This textbook is designed for a year-long course in real analysis taken by beginning graduate and advanced undergraduate students in mathematics and other areas such as statistics, engineering, and economics. Written by one of the leading scholars in the field, it elegantly explores the core concepts in real analysis and introduces new, accessible methods for both students and instructors. The first half of the book develops both Lebesgue measure and, with essentially no additional work for the student, general Borel measures for the real line. Notation indicates when a result holds only for Lebesgue measure. Differentiation and absolute continuity are presented using a local maximal function, resulting in an exposition that is both simpler and more general than the traditional approach. The second half deals with general measures and functional analysis, including Hilbert spaces, Fourier series, and the Riesz representation theorem for positive linear functionals on continuous functions with compact support....

  2. Numerical analysis

    CERN Document Server

    Scott, L Ridgway

    2011-01-01

    Computational science is fundamentally changing how technological questions are addressed. The design of aircraft, automobiles, and even racing sailboats is now done by computational simulation. The mathematical foundation of this new approach is numerical analysis, which studies algorithms for computing expressions defined with real numbers. Emphasizing the theory behind the computation, this book provides a rigorous and self-contained introduction to numerical analysis and presents the advanced mathematics that underpin industrial software, including complete details that are missing from most textbooks. Using an inquiry-based learning approach, Numerical Analysis is written in a narrative style, provides historical background, and includes many of the proofs and technical details in exercises. Students will be able to go beyond an elementary understanding of numerical simulation and develop deep insights into the foundations of the subject. They will no longer have to accept the mathematical gaps that ex...

  3. Numerical analysis

    CERN Document Server

    Rao, G Shanker

    2006-01-01

    About the Book: This book provides an introduction to Numerical Analysis for the students of Mathematics and Engineering. The book is designed in accordance with the common core syllabus of Numerical Analysis of Universities of Andhra Pradesh and also the syllabus prescribed in most of the Indian Universities. Salient features: Approximate and Numerical Solutions of Algebraic and Transcendental Equation Interpolation of Functions Numerical Differentiation and Integration and Numerical Solution of Ordinary Differential Equations The last three chapters deal with Curve Fitting, Eigen Values and Eigen Vectors of a Matrix and Regression Analysis. Each chapter is supplemented with a number of worked-out examples as well as number of problems to be solved by the students. This would help in the better understanding of the subject. Contents: Errors Solution of Algebraic and Transcendental Equations Finite Differences Interpolation with Equal Intervals Interpolation with Unequal Int...

  4. Numerical analysis

    CERN Document Server

    Jacques, Ian

    1987-01-01

    This book is primarily intended for undergraduates in mathematics, the physical sciences and engineering. It introduces students to most of the techniques forming the core component of courses in numerical analysis. The text is divided into eight chapters which are largely self-contained. However, with a subject as intricately woven as mathematics, there is inevitably some interdependence between them. The level of difficulty varies and, although emphasis is firmly placed on the methods themselves rather than their analysis, we have not hesitated to include theoretical material when we consider it to be sufficiently interesting. However, it should be possible to omit those parts that do seem daunting while still being able to follow the worked examples and to tackle the exercises accompanying each section. Familiarity with the basic results of analysis and linear algebra is assumed since these are normally taught in first courses on mathematical methods. For reference purposes a list of theorems used in the t...

  5. Real analysis

    CERN Document Server

    DiBenedetto, Emmanuele

    2016-01-01

    The second edition of this classic textbook presents a rigorous and self-contained introduction to real analysis with the goal of providing a solid foundation for future coursework and research in applied mathematics. Written in a clear and concise style, it covers all of the necessary subjects as well as those often absent from standard introductory texts. Each chapter features a “Problems and Complements” section that includes additional material that briefly expands on certain topics within the chapter and numerous exercises for practicing the key concepts. The first eight chapters explore all of the basic topics for training in real analysis, beginning with a review of countable sets before moving on to detailed discussions of measure theory, Lebesgue integration, Banach spaces, functional analysis, and weakly differentiable functions. More topical applications are discussed in the remaining chapters, such as maximal functions, functions of bounded mean oscillation, rearrangements, potential theory, a...

  6. Clustering analysis

    International Nuclear Information System (INIS)

    Romli

    1997-01-01

    Cluster analysis is the name of group of multivariate techniques whose principal purpose is to distinguish similar entities from the characteristics they process.To study this analysis, there are several algorithms that can be used. Therefore, this topic focuses to discuss the algorithms, such as, similarity measures, and hierarchical clustering which includes single linkage, complete linkage and average linkage method. also, non-hierarchical clustering method, which is popular name K -mean method ' will be discussed. Finally, this paper will be described the advantages and disadvantages of every methods

  7. Convex analysis

    CERN Document Server

    Rockafellar, Ralph Tyrell

    2015-01-01

    Available for the first time in paperback, R. Tyrrell Rockafellar's classic study presents readers with a coherent branch of nonlinear mathematical analysis that is especially suited to the study of optimization problems. Rockafellar's theory differs from classical analysis in that differentiability assumptions are replaced by convexity assumptions. The topics treated in this volume include: systems of inequalities, the minimum or maximum of a convex function over a convex set, Lagrange multipliers, minimax theorems and duality, as well as basic results about the structure of convex sets and

  8. Numerical analysis

    CERN Document Server

    Brezinski, C

    2012-01-01

    Numerical analysis has witnessed many significant developments in the 20th century. This book brings together 16 papers dealing with historical developments, survey papers and papers on recent trends in selected areas of numerical analysis, such as: approximation and interpolation, solution of linear systems and eigenvalue problems, iterative methods, quadrature rules, solution of ordinary-, partial- and integral equations. The papers are reprinted from the 7-volume project of the Journal of Computational and Applied Mathematics on '/homepage/sac/cam/na2000/index.html<

  9. Reentry analysis

    International Nuclear Information System (INIS)

    Biehl, F.A.

    1984-05-01

    This paper presents the criteria, previous nuclear experience in space, analysis techniques, and possible breakup enhancement devices applicable to an acceptable SP-100 reentry from space. Reactor operation in nuclear-safe orbit will minimize the radiological risk; the remaining safeguards criteria need to be defined. A simple analytical point mass reentry technique and a more comprehensive analysis method that considers vehicle dynamics and orbit insertion malfunctions are presented. Vehicle trajectory, attitude, and possible breakup enhancement devices will be integrated in the simulation as required to ensure an adequate representation of the reentry process

  10. Outlier analysis

    CERN Document Server

    Aggarwal, Charu C

    2013-01-01

    With the increasing advances in hardware technology for data collection, and advances in software technology (databases) for data organization, computer scientists have increasingly participated in the latest advancements of the outlier analysis field. Computer scientists, specifically, approach this field based on their practical experiences in managing large amounts of data, and with far fewer assumptions- the data can be of any type, structured or unstructured, and may be extremely large.Outlier Analysis is a comprehensive exposition, as understood by data mining experts, statisticians and

  11. Cluster analysis

    CERN Document Server

    Everitt, Brian S; Leese, Morven; Stahl, Daniel

    2011-01-01

    Cluster analysis comprises a range of methods for classifying multivariate data into subgroups. By organizing multivariate data into such subgroups, clustering can help reveal the characteristics of any structure or patterns present. These techniques have proven useful in a wide range of areas such as medicine, psychology, market research and bioinformatics.This fifth edition of the highly successful Cluster Analysis includes coverage of the latest developments in the field and a new chapter dealing with finite mixture models for structured data.Real life examples are used throughout to demons

  12. Elementary analysis

    CERN Document Server

    Snell, K S; Langford, W J; Maxwell, E A

    1966-01-01

    Elementary Analysis, Volume 2 introduces several of the ideas of modern mathematics in a casual manner and provides the practical experience in algebraic and analytic operations that lays a sound foundation of basic skills. This book focuses on the nature of number, algebraic and logical structure, groups, rings, fields, vector spaces, matrices, sequences, limits, functions and inverse functions, complex numbers, and probability. The logical structure of analysis given through the treatment of differentiation and integration, with applications to the trigonometric and logarithmic functions, is

  13. Risk analysis

    International Nuclear Information System (INIS)

    Baron, J.H.; Nunez McLeod, J.; Rivera, S.S.

    1997-01-01

    This book contains a selection of research works performed in the CEDIAC Institute (Cuyo National University) in the area of Risk Analysis, with specific orientations to the subjects of uncertainty and sensitivity studies, software reliability, severe accident modeling, etc. This volume presents important material for all those researches who want to have an insight in the risk analysis field, as a tool to solution several problems frequently found in the engineering and applied sciences field, as well as for the academic teachers who want to keep up to date, including the new developments and improvements continuously arising in this field [es

  14. Superdeformed bands in /sup 150/Gd and /sup 151/Tb: Evidence for the influence of high-N intruder states at large deformations

    Energy Technology Data Exchange (ETDEWEB)

    Fallon, P.; Alderson, A.; Bentley, M.A.; Bruce, A.M.; Forsyth, P.D.; Howe, D.; Roberts, J.W.; Sharpey-Schafer, J.F.; Twin, P.J.; Beck, F.A.

    1989-02-16

    Rotational bands, characteristic of a superdeformed prolate shape (epsilon approx. = 0.6) and extending to above spin 60 Planck constant, have been observed in both /sup 150/Gd and /sup 151/Tb. The magnitudes of the moments of inertia I/sup (2)/ were found to vary with frequency and the variation greatly exceeded that seen in /sup 148,149/Gd and /sup 151,152/Dy. The differences in the I/sup (2)/'s are attributed to the occupation of particular high-N orbitals. Moreover, contrary to the previous examples the bands in both /sup 150/Gd and /sup 151/Tb de-excited at a much higher rotational frequency of Planck constant..omega.. approx. = 0.4 MeV and this may indicate that the pair gap extends to higher frequencies in /sup 150/Gd and /sup 151/Tb.

  15. Meaning of 9/11 for two Pakistani communities: from external intruders to the internalisation of a negative self-image.

    Science.gov (United States)

    Rousseau, Cécile; Jamil, Uzma

    2008-12-01

    Since September 11, the increase in international tensions and the subsequent wars in Afghanistan and Iraq have created turmoil and fears in immigrant communities, fanned by the media in the context of the war against terrorism. This paper aims to compare the meaning systems evoked around 9/11 within two Pakistani groups-an immigrant community in Montreal and a group in Karachi. It also intends to examine the representation of themselves and of the 'Other' within these two groups. Results suggest that both Karachi and Montreal Pakistani respondents favour a conspiracy scenario which protects the Muslim community from the responsibility of 9/11 events. They refer to an argumentation process based on 'proofs', thus mirroring the political rhetoric used by the US government and its allies to justify the military intervention in Iraq. In the Montreal group, the pervasive feeling of fear and the bleak image that the community has of itself support the hypothesis of an immigrant internalisation of the negative representations of Muslim and South Asian identities in the North American context. The negative self-image observed in these minority groups indicates that more effort than ever should be dedicated to understanding the impact of the present international context on minority-majority relations in multi-ethnic societies. It is as if America is sitting right here in the living room with us … We have to ask them permission to breathe. (Parveen, Karachi).

  16. Testing the adjustable threshold model for intruder recognition on Myrmica ants in the context of a social parasite

    DEFF Research Database (Denmark)

    Fürst, Matthias Alois; Durey, Maëlle; Nash, David Richard

    2012-01-01

    gains access to the ants' nests by mimicking their cuticular hydrocarbon recognition cues, which allows the parasites to blend in with their host ants. Myrmica rubra may be particularly susceptible to exploitation in this fashion as it has large, polydomous colonies with many queens and a very viscous...... and therefore the less-related workers within a colony, the less aggressively they will behave; and that colonies facing parasitism will be more aggressive than colonies experiencing less parasite pressure. Our results confirm all these predictions, supporting flexible aggression behaviour in Myrmica ants...

  17. a Microgravity Survey to Determine the Extent of AN Andesitic Sill that Intrudes across the Rio Grande River Basin, Rio Grande Rift Valley, Sunland Park, New Mexico

    Science.gov (United States)

    Baker, L. A.; Shinagel, S.; Villalobos, J. I.; Avila, V.; Montana, C. J.; Kaip, G.

    2012-12-01

    In Sunland Park, NM, there is an andesite outcrop near the bank of the Rio Grande (called the River Andesite) which does not match the surrounding sedimentary deposition. Studies of the River Andesite by Garcia (1970) indicate the outcrop is petrologically similar to the Muleros Andesite of Mt. Cristo Rey located several km to the south. A limited GPR and magnetic survey conducted by UTEP students in 2008 suggested the River Andesite was part of a dike, although Garcia mapped smaller outcrops of andesite ~300 m west of the river that may be part of the same body. We have recently (June 2012) found large andesite boulders that may be the outcrops Garcia mapped, although it is uncertain whether these boulders are in-situ. We initially collected microgravity and magnetic data in a small region near the river outcrop in December 2011 to determine the extent of the outcrop. Our preliminary modeling of these data showed the river outcrop appeared to merge with a more extensive igneous body at depth. Ground conductivity data collected near the river outcrop in March 2012 suggested that the outcrop impacts groundwater flow and sediment deposition adjacent to the river. From May through July 2012 we have been collecting additional microgravity data on a grid with 100-200 m spacing extending ~ 500 m from both sides of the river outcrop to better determine the extent of the buried andesite body. We also plan to conduct GPR and magnetic surveys near the recently discovered andesite boulders to determine if these are truly in-situ and part of the same igneous body as the river outcrop. Our eventual goal is to determine how extensive the andesite unit is and how it may impact groundwater flow and flooding in this area of growing urbanization.

  18. Watershed analysis

    Science.gov (United States)

    Alan Gallegos

    2002-01-01

    Watershed analyses and assessments for the Kings River Sustainable Forest Ecosystems Project were done on about 33,000 acres of the 45,500-acre Big Creek watershed and 32,000 acres of the 85,100-acre Dinkey Creek watershed. Following procedures developed for analysis of cumulative watershed effects (CWE) in the Pacific Northwest Region of the USDA Forest Service, the...

  19. Regression Analysis

    CERN Document Server

    Freund, Rudolf J; Sa, Ping

    2006-01-01

    The book provides complete coverage of the classical methods of statistical analysis. It is designed to give students an understanding of the purpose of statistical analyses, to allow the student to determine, at least to some degree, the correct type of statistical analyses to be performed in a given situation, and have some appreciation of what constitutes good experimental design

  20. Relativistic analysis

    International Nuclear Information System (INIS)

    Unterberger, A.

    1987-01-01

    We study the Klein-Gordon symbolic calculus of operators acting on solutions of the free Klein-Gordon equation. It contracts to the Weyl calculus as c→∞. Mathematically, it may also be considered as a pseudodifferential analysis on the unit ball of R n [fr

  1. Consequence analysis

    International Nuclear Information System (INIS)

    Woodard, K.

    1985-01-01

    The objectives of this paper are to: Provide a realistic assessment of consequences; Account for plant and site-specific characteristics; Adjust accident release characteristics to account for results of plant-containment analysis; Produce conditional risk curves for each of five health effects; and Estimate uncertainties

  2. Domain analysis

    DEFF Research Database (Denmark)

    Hjørland, Birger

    2017-01-01

    The domain-analytic approach to knowledge organization (KO) (and to the broader field of library and information science, LIS) is outlined. The article reviews the discussions and proposals on the definition of domains, and provides an example of a domain-analytic study in the field of art studies....... Varieties of domain analysis as well as criticism and controversies are presented and discussed....

  3. IWS analysis

    International Nuclear Information System (INIS)

    Rhoades, W.A.; Dray, B.J.

    1970-01-01

    The effect of Gadolinium-155 on the prompt kinetic behavior of a zirconium hydride reactor has been deduced, using experimental data from the SNAPTRAN machine. The poison material makes the temperature coefficient more positive, and the Type IV sleeves were deduced to give a positive coefficient above 1100 0 F. A thorough discussion of the data and analysis is included. (U.S.)

  4. Analysis report

    International Nuclear Information System (INIS)

    Saadi, Radouan; Marah, Hamid

    2014-01-01

    This report presents results related to Tritium analysis carried out at the CNESTEN DASTE in Rabat (Morocco), on behalf of Senegal, within the framework of the RAF7011 project. It describes analytical method and instrumentation including general uncertainty estimation: Electrolytic enrichment and liquid scintillation counting; The results are expressed in Tritium Unit (TU); Low Limit Detection: 0.02 TU

  5. Survival Analysis

    CERN Document Server

    Miller, Rupert G

    2011-01-01

    A concise summary of the statistical methods used in the analysis of survival data with censoring. Emphasizes recently developed nonparametric techniques. Outlines methods in detail and illustrates them with actual data. Discusses the theory behind each method. Includes numerous worked problems and numerical exercises.

  6. Genetic analysis

    NARCIS (Netherlands)

    Koornneef, M.; Alonso-Blanco, C.; Stam, P.

    2006-01-01

    The Mendelian analysis of genetic variation, available as induced mutants or as natural variation, requires a number of steps that are described in this chapter. These include the determination of the number of genes involved in the observed trait's variation, the determination of dominance

  7. Poetic Analysis

    DEFF Research Database (Denmark)

    Nielsen, Kirsten

    2010-01-01

    The first part of this article presents the characteristics of Hebrew poetry: features associated with rhythm and phonology, grammatical features, structural elements like parallelism, and imagery and intertextuality. The second part consists of an analysis of Psalm 121. It is argued that assonan...

  8. The effect of rigid and non-rigid connections between implants and teeth on biological and technical complications: a systematic review and a meta-analysis.

    Science.gov (United States)

    Tsaousoglou, Phoebus; Michalakis, Konstantinos; Kang, Kiho; Weber, Hans-Peter; Sculean, Anton

    2017-07-01

    To assess survival, as well as technical and biological complication rates of partial fixed dental prostheses (FDPs) supported by implants and teeth. An electronic Medline search was conducted to identify articles, published in dental journals from January 1980 to August 2015, reporting on partial FDPs supported by implants and teeth. The search terms were categorized into four groups comprising the PICO question. Manual searches of published full-text articles and related reviews were also performed. The initial database search produced 3587 relevant titles. Three hundred and eighty-six articles were retrieved for abstract review, while 39 articles were selected for full-text review. A total of 10 studies were selected for inclusion. Overall survival rate for implants ranged between 90% and 100%, after follow-up periods with a mean range of 18-120 months. The survival of the abutment teeth was 94.1-100%, while the prostheses survival was 85-100% for the same time period. The most frequent complications were "periapical lesions" (11.53%). The most frequent technical complication was "porcelain occlusal fracture" (16.6%), followed by "screw loosening" (15%). According to the meta-analysis, no intrusion was noted on the rigid connection group, while five teeth (8.19%) were intruded in the non-rigid connection group [95% CI (0.013-0.151)]. The tooth-implant FDP seems to be a possible alternative to an implant-supported FDP. There is limited evidence that rigid connection between teeth and implants presents better results when compared with the non-rigid one. The major drawback of non-rigidly connected FDPs is tooth intrusion. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  9. Models of Economic Analysis

    OpenAIRE

    Adrian Ioana; Tiberiu Socaciu

    2013-01-01

    The article presents specific aspects of management and models for economic analysis. Thus, we present the main types of economic analysis: statistical analysis, dynamic analysis, static analysis, mathematical analysis, psychological analysis. Also we present the main object of the analysis: the technological activity analysis of a company, the analysis of the production costs, the economic activity analysis of a company, the analysis of equipment, the analysis of labor productivity, the anal...

  10. Trend analysis

    International Nuclear Information System (INIS)

    Smith, M.; Jones, D.R.

    1991-01-01

    The goal of exploration is to find reserves that will earn an adequate rate of return on the capital invested. Neither exploration nor economics is an exact science. The authors must therefore explore in those trends (plays) that have the highest probability of achieving this goal. Trend analysis is a technique for organizing the available data to make these strategic exploration decisions objectively and is in conformance with their goals and risk attitudes. Trend analysis differs from resource estimation in its purpose. It seeks to determine the probability of economic success for an exploration program, not the ultimate results of the total industry effort. Thus the recent past is assumed to be the best estimate of the exploration probabilities for the near future. This information is combined with economic forecasts. The computer software tools necessary for trend analysis are (1) Information data base - requirements and sources. (2) Data conditioning program - assignment to trends, correction of errors, and conversion into usable form. (3) Statistical processing program - calculation of probability of success and discovery size probability distribution. (4) Analytical processing - Monte Carlo simulation to develop the probability distribution of the economic return/investment ratio for a trend. Limited capital (short-run) effects are analyzed using the Gambler's Ruin concept in the Monte Carlo simulation and by a short-cut method. Multiple trend analysis is concerned with comparing and ranking trends, allocating funds among acceptable trends, and characterizing program risk by using risk profiles. In summary, trend analysis is a reality check for long-range exploration planning

  11. Control-rod, pressure and flow-induced accident and transient analysis of a direct-cycle, supercritical-pressure, light-water-cooled fast breeder reactor

    International Nuclear Information System (INIS)

    Kitoh, Kazuaki; Koshizuka, Seiichi; Oka, Yoshiaki

    1996-01-01

    The features of the direct-cycle, supercritical-pressure, light-water-cooled fast breeder reactor (SCFBR) are high thermal efficiency and simple reactor system. The safety principle is basically the same as that of an LWR since it is a water-cooled reactor. Maintaining the core flow is the basic safety requirement of the reactor, since its coolant system is the one through type. The transient behaviors at control rod, pressure and flow-induced abnormalities are analyzed and presented in this paper. The results of flow-induced transients of SCFBR were reported at ICONE-3, though pressure change was neglected. The change of fuel temperature distribution is also considered for the analysis of the rapid reactivity-induced transients such as control rod withdrawal. Total loss of flow and pump seizure are analyzed as the accidents. Loss of load, control rod withdrawal from the normal operation, loss of feedwater heating, inadvertent start of an auxiliary feedwater pump, partial loss of coolant flow and loss of external power are analyzed as the transients. The behavior of the flow-induced transients is not so much different from the analyses assuming constant pressure. Fly wheels should be equipped with the feedwater pumps to prolong the coast-down time more than 10s and to cope with the total loss of flow accident. The coolant density coefficient of the SCFBR is less than one tenth of a BWR in which the recirculation flow is used for the power control. The over pressurization transients at the loss of load is not so severe as that of a BWR. The power reaches 120%. The minimum deterioration heat flux ratio (MDHFR) and the maximum pressure are sufficiently lower than the criteria; MDHFR above 1.0 and pressure ratio below 1.10 of 27.5 MPa, maximum pressure for operation. Among the reactivity abnormalities, the control rod withdrawal transient from the normal operation is analyzed

  12. The Effect of Depressive Symptoms on the Association between Gluten-Free Diet Adherence and Symptoms in Celiac Disease: Analysis of a Patient Powered Research Network.

    Science.gov (United States)

    Joelson, Andrew M; Geller, Marilyn G; Zylberberg, Haley M; Green, Peter H R; Lebwohl, Benjamin

    2018-04-26

    The prevalence of depression in celiac disease (CD) is high, and patients are often burdened socially and financially by a gluten-free diet. However, the relationship between depression, somatic symptoms and dietary adherence in CD is complex and poorly understood. We used a patient powered research network (iCureCeliac ® ) to explore the effect that depression has on patients' symptomatic response to a gluten-free diet (GFD). We identified patients with biopsy-diagnosed celiac disease who answered questions pertaining to symptoms (Celiac Symptom Index (CSI)), GFD adherence (Celiac Dietary Adherence Test (CDAT)), and a 5-point, scaled question regarding depressive symptoms relating to patients' celiac disease. We then measured the correlation between symptoms and adherence (CSI vs. CDAT) in patients with depression versus those without depression. We also tested for interaction of depression with regard to the association with symptoms using a multiple linear regression model. Among 519 patients, 86% were female and the mean age was 40.9 years. 46% of patients indicated that they felt "somewhat," "quite a bit," or "very much" depressed because of their disorder. There was a moderate correlation between worsened celiac symptoms and poorer GFD adherence ( r = 0.6, p symptoms and worsening dietary adherence ( r = 0.5, p symptoms related to their disorder, correlation between adherence and symptoms was weaker than those without depressive symptoms. This finding was confirmed with a linear regression analysis, showing that depressive symptoms may modify the effect of a GFD on celiac symptoms. Depressive symptoms may therefore mask the relationship between inadvertent gluten exposure and symptoms. Additional longitudinal and prospective studies are needed to further explore this potentially important finding.

  13. The prevalence of the ponticulus posticus (arcuate foramen) and its importance in the Goel-Harms procedure: meta-analysis and review of the literature.

    Science.gov (United States)

    Elliott, Robert E; Tanweer, Omar

    2014-01-01

    We reviewed published radiographic and cadaver series describing the incidence of the anatomical anomaly ponticulus posticus and discuss its relevance to C1 lateral mass screw (C1LMS) insertion. Online databases were searched for English-language articles describing the presence of ponticulus posticus in cadaver and radiographic studies. Forty-four reports describing 21,789 patients (n = 15,542) or bony/cadaver specimens (n = 6247) fulfilled inclusion criteria. Meta-analysis techniques were applied to estimate the prevalence of this anomaly. The overall prevalence of ponticulus posticus was 16.7%. The anomaly was identified in 18.8% of cadaver, 17.2% of computed tomographic, and 16.6% on radiographic studies. The anomaly composed a complete foramen in 9.3% of patients and was partial/incomplete in 8.7%. It was present bilaterally in 5.4% of cases and unilateral in 7.6%. There was no significant difference in prevalence between males (15.8%) and females (14.6%). Review of that literature demonstrated a dramatic increase in the number of patients treated with C1LMS through the posterior arch since first described in 2002, necessitating recognition of this anomaly when performing the Goel-Harms procedure. The atlantal anomaly ponticulus posticus is not rare, occurring in 16.7% of patients in radiographic and cadaver studies. This anomaly may give the false impression that the posterior arch of the atlas is of adequate size to accommodate a C1LMS and may lead to inadvertent vertebral artery injury. Careful assessment via preoperative multiplanar computed tomographic imaging should be performed before consideration of C1LMS implantation. Copyright © 2014 Elsevier Inc. All rights reserved.

  14. Image Analysis

    DEFF Research Database (Denmark)

    The 19th Scandinavian Conference on Image Analysis was held at the IT University of Copenhagen in Denmark during June 15-17, 2015. The SCIA conference series has been an ongoing biannual event for more than 30 years and over the years it has nurtured a world-class regional research and development...... area within the four participating Nordic countries. It is a regional meeting of the International Association for Pattern Recognition (IAPR). We would like to thank all authors who submitted works to this year’s SCIA, the invited speakers, and our Program Committee. In total 67 papers were submitted....... The topics of the accepted papers range from novel applications of vision systems, pattern recognition, machine learning, feature extraction, segmentation, 3D vision, to medical and biomedical image analysis. The papers originate from all the Scandinavian countries and several other European countries...

  15. Harmonic analysis

    CERN Document Server

    Helson, Henry

    2010-01-01

    This second edition has been enlarged and considerably rewritten. Among the new topics are infinite product spaces with applications to probability, disintegration of measures on product spaces, positive definite functions on the line, and additional information about Weyl's theorems on equidistribution. Topics that have continued from the first edition include Minkowski's theorem, measures with bounded powers, idempotent measures, spectral sets of bounded functions and a theorem of Szego, and the Wiener Tauberian theorem. Readers of the book should have studied the Lebesgue integral, the elementary theory of analytic and harmonic functions, and the basic theory of Banach spaces. The treatment is classical and as simple as possible. This is an instructional book, not a treatise. Mathematics students interested in analysis will find here what they need to know about Fourier analysis. Physicists and others can use the book as a reference for more advanced topics.

  16. Geometric analysis

    CERN Document Server

    Bray, Hubert L; Mazzeo, Rafe; Sesum, Natasa

    2015-01-01

    This volume includes expanded versions of the lectures delivered in the Graduate Minicourse portion of the 2013 Park City Mathematics Institute session on Geometric Analysis. The papers give excellent high-level introductions, suitable for graduate students wishing to enter the field and experienced researchers alike, to a range of the most important areas of geometric analysis. These include: the general issue of geometric evolution, with more detailed lectures on Ricci flow and Kähler-Ricci flow, new progress on the analytic aspects of the Willmore equation as well as an introduction to the recent proof of the Willmore conjecture and new directions in min-max theory for geometric variational problems, the current state of the art regarding minimal surfaces in R^3, the role of critical metrics in Riemannian geometry, and the modern perspective on the study of eigenfunctions and eigenvalues for Laplace-Beltrami operators.

  17. Complex analysis

    CERN Document Server

    Freitag, Eberhard

    2005-01-01

    The guiding principle of this presentation of ``Classical Complex Analysis'' is to proceed as quickly as possible to the central results while using a small number of notions and concepts from other fields. Thus the prerequisites for understanding this book are minimal; only elementary facts of calculus and algebra are required. The first four chapters cover the essential core of complex analysis: - differentiation in C (including elementary facts about conformal mappings) - integration in C (including complex line integrals, Cauchy's Integral Theorem, and the Integral Formulas) - sequences and series of analytic functions, (isolated) singularities, Laurent series, calculus of residues - construction of analytic functions: the gamma function, Weierstrass' Factorization Theorem, Mittag-Leffler Partial Fraction Decomposition, and -as a particular highlight- the Riemann Mapping Theorem, which characterizes the simply connected domains in C. Further topics included are: - the theory of elliptic functions based on...

  18. Spectrographic analysis

    International Nuclear Information System (INIS)

    Quinn, C.A.

    1983-01-01

    The article deals with spectrographic analysis and the analytical methods based on it. The theory of spectrographic analysis is discussed as well as the layout of a spectrometer system. The infrared absorption spectrum of a compound is probably its most unique property. The absorption of infrared radiation depends on increasing the energy of vibration and rotation associated with a covalent bond. The infrared region is intrinsically low in energy thus the design of infrared spectrometers is always directed toward maximising energy throughput. The article also considers atomic absorption - flame atomizers, non-flame atomizers and the source of radiation. Under the section an emission spectroscopy non-electrical energy sources, electrical energy sources and electrical flames are discussed. Digital computers form a part of the development on spectrographic instrumentation

  19. Wavelet analysis

    CERN Document Server

    Cheng, Lizhi; Luo, Yong; Chen, Bo

    2014-01-01

    This book could be divided into two parts i.e. fundamental wavelet transform theory and method and some important applications of wavelet transform. In the first part, as preliminary knowledge, the Fourier analysis, inner product space, the characteristics of Haar functions, and concepts of multi-resolution analysis, are introduced followed by a description on how to construct wavelet functions both multi-band and multi wavelets, and finally introduces the design of integer wavelets via lifting schemes and its application to integer transform algorithm. In the second part, many applications are discussed in the field of image and signal processing by introducing other wavelet variants such as complex wavelets, ridgelets, and curvelets. Important application examples include image compression, image denoising/restoration, image enhancement, digital watermarking, numerical solution of partial differential equations, and solving ill-conditioned Toeplitz system. The book is intended for senior undergraduate stude...

  20. Electrochemical analysis

    International Nuclear Information System (INIS)

    Hwang, Hun

    2007-02-01

    This book explains potentiometry, voltametry, amperometry and basic conception of conductometry with eleven chapters. It gives the specific descriptions on electrochemical cell and its mode, basic conception of electrochemical analysis on oxidation-reduction reaction, standard electrode potential, formal potential, faradaic current and faradaic process, mass transfer and overvoltage, potentiometry and indirect potentiometry, polarography with TAST, normal pulse and deferential pulse, voltammetry, conductometry and conductometric titration.

  1. Survival analysis

    International Nuclear Information System (INIS)

    Badwe, R.A.

    1999-01-01

    The primary endpoint in the majority of the studies has been either disease recurrence or death. This kind of analysis requires a special method since all patients in the study experience the endpoint. The standard method for estimating such survival distribution is Kaplan Meier method. The survival function is defined as the proportion of individuals who survive beyond certain time. Multi-variate comparison for survival has been carried out with Cox's proportional hazard model

  2. Elastodynamic Analysis

    DEFF Research Database (Denmark)

    Andersen, Lars

    This book contains the lecture notes for the 9th semester course on elastodynamics. The first chapter gives an overview of the basic theory of stress waves propagating in viscoelastic media. In particular, the effect of surfaces and interfaces in a viscoelastic material is studied, and different....... Thus, in Chapter 3, an alternative semi-analytic method is derived, which may be applied for the analysis of layered half-spaces subject to moving or stationary loads....

  3. Cluster analysis

    OpenAIRE

    Mucha, Hans-Joachim; Sofyan, Hizir

    2000-01-01

    As an explorative technique, duster analysis provides a description or a reduction in the dimension of the data. It classifies a set of observations into two or more mutually exclusive unknown groups based on combinations of many variables. Its aim is to construct groups in such a way that the profiles of objects in the same groups are relatively homogenous whereas the profiles of objects in different groups are relatively heterogeneous. Clustering is distinct from classification techniques, ...

  4. Water analysis

    International Nuclear Information System (INIS)

    Garbarino, J.R.; Steinheimer, T.R.; Taylor, H.E.

    1985-01-01

    This is the twenty-first biennial review of the inorganic and organic analytical chemistry of water. The format of this review differs somewhat from previous reviews in this series - the most recent of which appeared in Analytical Chemistry in April 1983. Changes in format have occurred in the presentation of material concerning review articles and the inorganic analysis of water sections. Organic analysis of water sections are organized as in previous reviews. Review articles have been compiled and tabulated in an Appendix with respect to subject, title, author(s), citation, and number of references cited. The inorganic water analysis sections are now grouped by constituent using the periodic chart; for example, alkali, alkaline earth, 1st series transition metals, etc. Within these groupings the references are roughly grouped by instrumental technique; for example, spectrophotometry, atomic absorption spectrometry, etc. Multiconstituent methods for determining analytes that cannot be grouped in this manner are compiled into a separate section sorted by instrumental technique. References used in preparing this review were compiled from nearly 60 major journals published during the period from October 1982 through September 1984. Conference proceedings, most foreign journals, most trade journals, and most government publications are excluded. References cited were obtained using the American Chemical Society's Chemical Abstracts for sections on inorganic analytical chemistry, organic analytical chemistry, water, and sewage waste. Cross-references of these sections were also included. 860 references

  5. Economic analysis

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-06-01

    The Energy Policy and Conservation Act (EPCA) mandated that minimum energy efficiency standards be established for classes of refrigerators and refrigerator-freezers, freezers, clothes dryers, water heaters, room air conditioners, home heating equipment, kitchen ranges and ovens, central air conditioners, and furnaces. EPCA requires that standards be designed to achieve the maximum improvement in energy efficiency that is technologically feasible and economically justified. Following the introductory chapter, Chapter Two describes the methodology used in the economic analysis and its relationship to legislative criteria for consumer product efficiency assessment; details how the CPES Value Model systematically compared and evaluated the economic impacts of regulation on the consumer, manufacturer and Nation. Chapter Three briefly displays the results of the analysis and lists the proposed performance standards by product class. Chapter Four describes the reasons for developing a baseline forecast, characterizes the baseline scenario from which regulatory impacts were calculated and summarizes the primary models, data sources and assumptions used in the baseline formulations. Chapter Five summarizes the methodology used to calculate regulatory impacts; describes the impacts of energy performance standards relative to the baseline discussed in Chapter Four. Also discussed are regional standards and other program alternatives to performance standards. Chapter Six describes the procedure for balancing consumer, manufacturer, and national impacts to select standard levels. Details of models and data bases used in the analysis are included in Appendices A through K.

  6. Major trauma: the unseen financial burden to trauma centres, a descriptive multicentre analysis.

    Science.gov (United States)

    Curtis, Kate; Lam, Mary; Mitchell, Rebecca; Dickson, Cara; McDonnell, Karon

    2014-02-01

    This research examines the existing funding model for in-hospital trauma patient episodes in New South Wales (NSW), Australia and identifies factors that cause above-average treatment costs. Accurate information on the treatment costs of injury is needed to guide health-funding strategy and prevent inadvertent underfunding of specialist trauma centres, which treat a high trauma casemix. Admitted trauma patient data provided by 12 trauma centres were linked with financial data for 2008-09. Actual costs incurred by each hospital were compared with state-wide Australian Refined Diagnostic Related Groups (AR-DRG) average costs. Patient episodes where actual cost was higher than AR-DRG cost allocation were examined. There were 16693 patients at a total cost of AU$178.7million. The total costs incurred by trauma centres were $14.7million above the NSW peer-group average cost estimates. There were 10 AR-DRG where the total cost variance was greater than $500000. The AR-DRG with the largest proportion of patients were the upper limb injury categories, many of whom had multiple body regions injured and/or a traumatic brain injury (P<0.001). AR-DRG classifications do not adequately describe the trauma patient episode and are not commensurate with the expense of trauma treatment. A revision of AR-DRG used for trauma is needed. WHAT IS KNOWN ABOUT THIS TOPIC? Severely injured trauma patients often have multiple injuries, in more than one body region and the determination of appropriate AR-DRG can be difficult. Pilot research suggests that the AR-DRG do not accurately represent the care that is required for these patients. WHAT DOES THIS PAPER ADD? This is the first multicentre analysis of treatment costs and coding variance for major trauma in Australia. This research identifies the limitations of the current AR-DRGS and those that are particularly problematic. The value of linking trauma registry and financial data within each trauma centre is demonstrated. WHAT ARE THE

  7. Vector analysis

    CERN Document Server

    Newell, Homer E

    2006-01-01

    When employed with skill and understanding, vector analysis can be a practical and powerful tool. This text develops the algebra and calculus of vectors in a manner useful to physicists and engineers. Numerous exercises (with answers) not only provide practice in manipulation but also help establish students' physical and geometric intuition in regard to vectors and vector concepts.Part I, the basic portion of the text, consists of a thorough treatment of vector algebra and the vector calculus. Part II presents the illustrative matter, demonstrating applications to kinematics, mechanics, and e

  8. Vector analysis

    CERN Document Server

    Brand, Louis

    2006-01-01

    The use of vectors not only simplifies treatments of differential geometry, mechanics, hydrodynamics, and electrodynamics, but also makes mathematical and physical concepts more tangible and easy to grasp. This text for undergraduates was designed as a short introductory course to give students the tools of vector algebra and calculus, as well as a brief glimpse into these subjects' manifold applications. The applications are developed to the extent that the uses of the potential function, both scalar and vector, are fully illustrated. Moreover, the basic postulates of vector analysis are brou

  9. Inadvertent positioning of suprapubic catheter in urethra: a serious complication during change of suprapubic cystostomy in a spina bifida patient - a case report.

    Science.gov (United States)

    Vaidyanathan, Subramanian; Hughes, Peter L; Soni, Bakul M; Oo, Tun; Singh, Gurpreet

    2009-12-22

    Spinal cord injury patients are at risk for developing unusual complications such as autonomic dysreflexia while changing suprapubic cystostomy. We report a male patient with spina bifida in whom the Foley catheter was placed in the urethra during change of suprapubic cystostomy with serious consequences. A male patient, born in 1972 with spina bifida and paraplaegia, underwent suprapubic cystostomy in 2003 because of increasing problems with urethral catheter. The patient would come to spinal unit for change of suprapubic catheter every four to six weeks. Two days after a routine catheter change in November 2009, this patient woke up in the morning and noticed that the suprapubic catheter had come out. He went straight to Accident and Emergency. The suprapubic catheter was changed by a health professional and this patient was sent home. But the suprapubic catheter did not drain urine. This patient developed increasing degree of pain and swelling in suprapubic region. He did not pass any urine per urethra. He felt sick and came to spinal unit five hours later. About twenty ml of contrast was injected through suprapubic catheter and X-rays were taken. The suprapubic catheter was patent; the catheter was not blocked. The Foley catheter could be seen going around in a circular manner through the urinary bladder into the urethra. The contrast did not opacify urinary bladder; but proximal urethra was seen. The tip of Foley catheter was lying in proximal urethra. The balloon of Foley catheter had been inflated in urethra. When the balloon of Foley catheter was deflated, this patient developed massive bleeding per urethra. A sterile 22 French Foley catheter was inserted through suprapubic track. The catheter drained bloody urine. He was admitted to spinal unit and received intravenous fluids and meropenem. Haematuria subsided after 48 hours. The patient was discharged home a week later in a stable condition. This case shows that serious complications can occur during change of suprapubic catheter in patients with neuropathic bladder. After inserting a new catheter, health professionals should observe spinal cord injury patients for at least thirty minutes and ensure that (1) suprapubic catheter drains clear urine; (2) patients do not develop abdominal spasm or discomfort; (3) symptoms and signs of sepsis or autonomic dysreflexia are absent.

  10. Malignant Range Elevation of Serum Chromogranin A due to Inadvertent Use of Proton Pump Inhibitor in a Subject with Pancreatic Incidentaloma

    Directory of Open Access Journals (Sweden)

    Usman Hammawa Malabu

    2011-01-01

    Full Text Available We present a case of highly elevated tenfold rise of serum chromogranin A in a young, morbidly obese, hypertensive female being investigated for pancreatic mass, weight loss, and elevated ESR. Following extensive noninvasive investigations, an ultrasound-guided pancreatic biopsy confirmed benign haemorrhagic cyst. A clue to the etiology of the hyperchromogranin A was the elevated serum gastrin level leading to suspicion of proton pump inhibitor administration confirmed by admittance to its use. Withdrawal of the medication led to dramatic resolution of the neuroendocrine tumor marker.

  11. Inadvertent Evangalisms (Or Not): Teachers' Views on Religion, Religious Beliefs, Positionality and Presence and Their Influence on Their Curricular Choices in the Classroom

    Science.gov (United States)

    Lipmen, Sara-Jean

    2017-01-01

    There has been very limited research on the possible role religion has in its influence on teacher choices, especially within a Social Science classroom. The purpose of this study was to examine how secondary Social Studies teachers explicitly and implicitly treat religion as a factor in the teaching of history and how their own affinity with/to a…

  12. Violent explosion after inadvertent mixing of nitric acid and isopropanol – Review 15 years later finds basic accident data corrupted, no evidence of broad learning

    DEFF Research Database (Denmark)

    Hedlund, Frank Huess; Folmer Nielsen, Merete; Hagen Mikkelsen, Sonja

    2014-01-01

    to produce isopropyl nitrate (nitric acid 1-methylethyl ester, CAS 1712-64-7), a rocket propellant. It is argued that the accident has broad learning potential because of the widespread usage of the two chemicals across industries, the innocent nature of the human error and the severity of the consequence...

  13. Expansion of Non-Native Brown Trout in South Europe May Be Inadvertently Driven by Stocking: Molecular and Social Survey in the North Iberian Narcea River.

    Science.gov (United States)

    Horreo, Jose L; Abad, David; Dopico, Eduardo; Oberlin, Maud; Garcia-Vazquez, Eva

    2015-07-09

    The biological and anthropogenic (management) factors that may contribute to the expansion of non-native lineages in managed fish have been studied in this work taking brown trout (Salmo trutta) as a model species. The changes of users' opinion about stocking was studied employing social science methodology (surveys). The evolution of hatchery stocks together with the outcome of stocking were analysed with two genetic tools: the LDH-C1* locus (marker of non-native stocks) and six microsatellite loci (for assignment of wild trout to the natural population or putative hatchery stocks). Consulted stakeholders were convinced of the correctness of releasing only native stocks, although in practice the hatcheries managed by them contained important proportions of non-native gene carriers. Our results suggest that allochthonous individuals perform better and grow faster in hatchery conditions than the native ones. We also find a dilution of the impact of this kind of suplementation in wild conditions. The use of only native individuals as hatchery breeders tested for the presence of non-native alleles previously to the artificial crosses must be a priority. Surveys can help steer policy making toward decisions that will be followed by the public, but they should not be used to justify science.

  14. Inadvertent Exposure to Pornography on the Internet: Implications of Peer-to-Peer File-Sharing Networks for Child Development and Families

    Science.gov (United States)

    Greenfield, P.M.

    2004-01-01

    This essay comprises testimony to the Congressional Committee on Government Reform. The Committee's concern was the possibility of exposure to pornography when children and teens participate in peer-to-peer file-sharing networks, which are extremely popular in these age groups. A review of the relevant literature led to three major conclusions:…

  15. The U.K. NICE 2014 Guidelines for Osteoarthritis of the Knee: Lessons Learned in a Narrative Review Addressing Inadvertent Limitations and Bias.

    Science.gov (United States)

    Birch, Stephen; Lee, Myeong Soo; Robinson, Nicola; Alraek, Terje

    2017-04-01

    Several systematic reviews suggest that acupuncture is effective for knee osteoarthritis (OA), and furthermore a safe and cost-effective treatment for this condition. A recent clinical practice guideline (CPG) from the National Institute for Health and Care Excellence (NICE), in the United Kingdom, recommended against the use of acupuncture on the grounds that the effect size (ES) in comparison with sham acupuncture is too small. Safety data were not considered in the review, in addition the levels of evidence for acupuncture against other recommended therapies were not compared. Consequently, it is argued that this NICE guideline has limitations that lead to several potential biases in its evaluation of acupuncture, which were not addressed correctly: (1) NICE's prior scoping process limited its review. (2) NICE introduced the method of developing recommendations based on the consideration of which interventions make "minimal important differences" of an ES of 0.5 or greater, rather than the statistical significance of the effect of an intervention when compared with an appropriate comparison. (3) Evidence that sham acupuncture is not physiologically inert and has some level of beneficial effect, hence artificially reducing the magnitude of the ES in comparison with sham. (4) The low adverse effects profile of acupuncture. (5) Evidence from trials comparing acupuncture with usual or standard care was not considered, nor was cost-effectiveness data. (6) Lack of the usual CPG "head-to-head" comparisons between interventions. If the same criteria and methods that have been applied to acupuncture were applied to other NICE-recommended therapies for knee OA, including patient centeredness, patient education, self-management and weight loss, nonsteroidal anti-inflammatory drug (NSAIDs), and cyclooxygenase-2 inhibitor (COX-2 inhibitors), these too would no longer be recommended and opiates would become the first line of drug prescription. Given the problems with sham acupuncture, perhaps now is the time to embrace pragmatic studies and employ comparative effectiveness studies instead.

  16. Expansion of Non-Native Brown Trout in South Europe May Be Inadvertently Driven by Stocking: Molecular and Social Survey in the North Iberian Narcea River

    Directory of Open Access Journals (Sweden)

    Jose L. Horreo

    2015-07-01

    Full Text Available The biological and anthropogenic (management factors that may contribute to the expansion of non-native lineages in managed fish have been studied in this work taking brown trout (Salmo trutta as a model species. The changes of users’ opinion about stocking was studied employing social science methodology (surveys. The evolution of hatchery stocks together with the outcome of stocking were analysed with two genetic tools: the LDH-C1* locus (marker of non-native stocks and six microsatellite loci (for assignment of wild trout to the natural population or putative hatchery stocks. Consulted stakeholders were convinced of the correctness of releasing only native stocks, although in practice the hatcheries managed by them contained important proportions of non-native gene carriers. Our results suggest that allochthonous individuals perform better and grow faster in hatchery conditions than the native ones. We also find a dilution of the impact of this kind of suplementation in wild conditions. The use of only native individuals as hatchery breeders tested for the presence of non-native alleles previously to the artificial crosses must be a priority. Surveys can help steer policy making toward decisions that will be followed by the public, but they should not be used to justify science.

  17. Understanding analysis

    CERN Document Server

    Abbott, Stephen

    2015-01-01

    This lively introductory text exposes the student to the rewards of a rigorous study of functions of a real variable. In each chapter, informal discussions of questions that give analysis its inherent fascination are followed by precise, but not overly formal, developments of the techniques needed to make sense of them. By focusing on the unifying themes of approximation and the resolution of paradoxes that arise in the transition from the finite to the infinite, the text turns what could be a daunting cascade of definitions and theorems into a coherent and engaging progression of ideas. Acutely aware of the need for rigor, the student is much better prepared to understand what constitutes a proper mathematical proof and how to write one. Fifteen years of classroom experience with the first edition of Understanding Analysis have solidified and refined the central narrative of the second edition. Roughly 150 new exercises join a selection of the best exercises from the first edition, and three more project-sty...

  18. Consensus analysis:

    DEFF Research Database (Denmark)

    Moore, R; Brødsgaard, I; Miller, ML

    1997-01-01

    A quantitative method for validating qualitative interview results and checking sample parameters is described and illustrated using common pain descriptions among a sample of Anglo-American and mandarin Chinese patients and dentists matched by age and gender. Assumptions were that subjects were ...... of covalidating questionnaires that reflect results of qualitative interviews are recommended in order to estimate sample parameters such as intersubject agreement, individual subject accuracy, and minimum required sample sizes.......A quantitative method for validating qualitative interview results and checking sample parameters is described and illustrated using common pain descriptions among a sample of Anglo-American and mandarin Chinese patients and dentists matched by age and gender. Assumptions were that subjects were...... of consistency in use of descriptors within groups, validity of description, accuracy of individuals compared with others in their group, and minimum required sample size were calculated using Cronbach's alpha, factor analysis, and Bayesian probability. Ethnic and professional differences within and across...

  19. Failure Analysis

    International Nuclear Information System (INIS)

    Iorio, A.F.; Crespi, J.C.

    1987-01-01

    After ten years of operation at the Atucha I Nuclear Power Station a gear belonging to a pressurized heavy water reactor refuelling machine, failed. The gear box was used to operate the inlet-outlet heavy-water valve of the machine. Visual examination of the gear device showed an absence of lubricant and that several gear teeth were broken at the root. Motion was transmitted with a speed-reducing device with controlled adjustable times in order to produce a proper fitness of the valve closure. The aim of this paper is to discuss the results of the gear failure analysis in order to recommend the proper solution to prevent further failures. (Author)

  20. Nuclear analysis

    International Nuclear Information System (INIS)

    1988-01-01

    In a search for correlations between the elemental composition of trace elements in human stones and the stone types with relation to their growth pattern, a combined PIXE and x-ray diffraction spectrometry approach was implemented. The combination of scanning PIXE and XRD has proved to be an advance in the methodology of stone analysis and may point to the growth pattern in the body. The exact role of trace elements in the formation and growth of urinary stones is not fully understood. Efforts are thus continuing firstly to solve the analytical problems concerned and secondly to design suitable experiments that would provide information about the occurrence and distribution of trace elements in urine. 1 fig., 1 ref

  1. Development and application of an efficient method for performing modal analysis of steam generator tubes in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Rhee, Huinam [Dept of Mechanical and Aerospace Engineering, Sunchon National University, Sunchon, 540-742 (Korea, Republic of); Boo, Myung-Hwan [Korea Hydro and Nuclear Power Company, Yuseong-Gu, Daejeon 305-343 (Korea, Republic of); Park, Chi-Yong [KEPCO Research Institute, Yuseong-Gu, Daejeon 305-380 (Korea, Republic of); Ryu, Ki-Wahn, E-mail: kwryu@chonbuk.ac.k [Department of Aerospace Engineering, Chonbuk National University, 664-14, Deogjin-Dong, Jeonju 561-756 (Korea, Republic of)

    2010-10-15

    A typical pressurized water reactor (PWR) steam generator has approximately 10,000 tubes. These tubes have different geometries, supporting conditions, and different material properties due to the non-uniform temperature distribution throughout the steam generator. Even though some tubes may have the same geometry and boundary conditions, the non-uniform distribution of coolant densities adjacent to the tubes causes them to have different added mass effects and dynamic characteristics. Therefore, for a reliable design of the steam generator, a separate modal analysis for each tube is necessary to perform the FIV (flow-induced vibration) analysis. However, the modal analysis of a tube including the finite element modeling is cumbersome and takes lots of time. And when a commercial finite element code is used, interfacing the modal analysis result, such as natural frequencies and mode shapes, with the FIV analysis procedure requires an additional significant amount of time and can possibly incur inadvertent error due to the complexity of data processing. It is therefore impossible to perform the complete FIV analysis for ten thousands of tubes when designing or maintaining a steam generator although it is necessary. Rather, to verify the safe design against the FIV, only a couple of tubes are chosen based on engineering judgment or past experience. In this paper, a computer program, PIAT-MODE, was developed which is able to perform modal analysis of all tubes of a PWR steam generator in a very efficient way. The geometries and boundary conditions of every tube were incorporated into PIAT-MODE using appropriate mathematical formulae. Material property data including the added mass effect was also included in the program. Once a specific tube is selected, the program automatically constructs the finite element model and generates the modal data very quickly. Therefore, modal analysis can be performed for every single tube in a straight way. When PIAT-MODE is coupled

  2. Ferrous analysis

    International Nuclear Information System (INIS)

    Straub, W.A.

    1987-01-01

    This review is the seventh in the series compiled by using the Dialog on-line CA Search facilities at the Information Resource Center of USS Technical Center covering the period from Oct. 1984 to Nov. 1, 1986. The quest for better surface properties, through the application of various electrochemical and other coating techniques, seems to have increased and reinforces the notion that only through the value added to a steel by proper finishing steps can a major supplier hope to compete profitably. The detection, determination, and control of microalloying constituents has also been generating a lot of interest as evidenced by the number of publications devoted to this subject in the last few years. Several recent review articles amplify on the recent trends in the application of modern analytical technology to steelmaking. Another review has been devoted to the determination of trace elements and the simultaneous determination of elements in metals by mass spectrometry, atomic absorption spectrometry, and multielement emission spectrometry. Problems associated with the analysis of electroplating wastewaters have been reviewed in a recent publication that has described the use of various spectrophotometric methods for this purpose. The collection and treatment of analytical data in the modern steel making environment have been extensively reviewed emphasis on the interaction of the providers and users of the analytical data, its quality, and the cost of its collection. Raw material treatment and beneficiation was the dominant theme

  3. Matrix analysis

    CERN Document Server

    Bhatia, Rajendra

    1997-01-01

    A good part of matrix theory is functional analytic in spirit. This statement can be turned around. There are many problems in operator theory, where most of the complexities and subtleties are present in the finite-dimensional case. My purpose in writing this book is to present a systematic treatment of methods that are useful in the study of such problems. This book is intended for use as a text for upper division and gradu­ ate courses. Courses based on parts of the material have been given by me at the Indian Statistical Institute and at the University of Toronto (in collaboration with Chandler Davis). The book should also be useful as a reference for research workers in linear algebra, operator theory, mathe­ matical physics and numerical analysis. A possible subtitle of this book could be Matrix Inequalities. A reader who works through the book should expect to become proficient in the art of deriving such inequalities. Other authors have compared this art to that of cutting diamonds. One first has to...

  4. Uncertainty analysis

    International Nuclear Information System (INIS)

    Thomas, R.E.

    1982-03-01

    An evaluation is made of the suitability of analytical and statistical sampling methods for making uncertainty analyses. The adjoint method is found to be well-suited for obtaining sensitivity coefficients for computer programs involving large numbers of equations and input parameters. For this purpose the Latin Hypercube Sampling method is found to be inferior to conventional experimental designs. The Latin hypercube method can be used to estimate output probability density functions, but requires supplementary rank transformations followed by stepwise regression to obtain uncertainty information on individual input parameters. A simple Cork and Bottle problem is used to illustrate the efficiency of the adjoint method relative to certain statistical sampling methods. For linear models of the form Ax=b it is shown that a complete adjoint sensitivity analysis can be made without formulating and solving the adjoint problem. This can be done either by using a special type of statistical sampling or by reformulating the primal problem and using suitable linear programming software

  5. Experimental modal analysis

    Energy Technology Data Exchange (ETDEWEB)

    Ibsen, Lars Bo; Liingaard, M.

    2006-12-15

    This technical report concerns the basic theory and principles for experimental modal analysis. The sections within the report are: Output-only modal analysis software, general digital analysis, basics of structural dynamics and modal analysis and system identification. (au)

  6. Theoretical numerical analysis a functional analysis framework

    CERN Document Server

    Atkinson, Kendall

    2005-01-01

    This textbook prepares graduate students for research in numerical analysis/computational mathematics by giving to them a mathematical framework embedded in functional analysis and focused on numerical analysis. This helps the student to move rapidly into a research program. The text covers basic results of functional analysis, approximation theory, Fourier analysis and wavelets, iteration methods for nonlinear equations, finite difference methods, Sobolev spaces and weak formulations of boundary value problems, finite element methods, elliptic variational inequalities and their numerical solu

  7. Special Analysis: Atmospheric Dose Resulting from the Release of C14 from Reactor Moderator Deionizers in a Disposal Environment

    International Nuclear Information System (INIS)

    Hiergesell, Robert A.; Swingle, Robert F.

    2005-01-01

    The proposed action of disposing of 52 moderator deionizer vessels within the ILV was evaluated in this SA. In particular, a detailed analysis of the release of 14 C via the atmospheric pathway was conducted for these vessels since the major concern has been the nearly 20 Ci of 14 C that is associated with each vessel. The more rigorous evaluation of the atmospheric pathway for 14 C included incorporation of new information about the chemical availability of 14 C when disposed in a grout/cement encapsulation environment, as will be the case in the ILV. This information was utilized to establish the source term for a 1-D numerical model to simulate the diffusion of 14 CO 2 from the ILV Waste Zone to the land surface. The results indicate a peak surface emanation rate from the entire ILV of 1.42E-08 Ci/yr with an associated dose of only 3.83E-05 mrem/yr to the Maximally Exposed Individual (MEI) at 100m. The fact that the atmospheric pathway exposure for 14 C is controlled by chemical solubility limits for 14 C between the solid waste, pore water and pore vapor within the disposal environment rather than the absolute inventory suggests that the establishment of specific facility limits is inappropriate. With the relaxation of the atmospheric pathway restriction, the groundwater pathway becomes the more restrictive in terms of disposing 14 C or 14 C KB within the ILV. Since the resin-based 14 C of the 52 moderator deionizer vessels is highly similar to the 14 C KB waste form, the inventory from the 52 deionizer vessels is compared against the groundwater limits for that waste form. The small groundwater pathway fraction (1.14E-05) calculated for the proposed inventory of the 52 moderator deionizer vessels indicates that the proposed action will have an insignificant impact with respect to possible exposures via the groundwater pathway. This investigation recommends that there be no ILV Atmospheric pathway limit for 14 C and 14 C KB . Further, in the absence of an

  8. Analysis of Heat Transfer

    International Nuclear Information System (INIS)

    2003-08-01

    This book deals with analysis of heat transfer which includes nonlinear analysis examples, radiation heat transfer, analysis of heat transfer in ANSYS, verification of analysis result, analysis of heat transfer of transition with automatic time stepping and open control, analysis of heat transfer using arrangement of ANSYS, resistance of thermal contact, coupled field analysis such as of thermal-structural interaction, cases of coupled field analysis, and phase change.

  9. Information security risk analysis

    CERN Document Server

    Peltier, Thomas R

    2001-01-01

    Effective Risk AnalysisQualitative Risk AnalysisValue AnalysisOther Qualitative MethodsFacilitated Risk Analysis Process (FRAP)Other Uses of Qualitative Risk AnalysisCase StudyAppendix A: QuestionnaireAppendix B: Facilitated Risk Analysis Process FormsAppendix C: Business Impact Analysis FormsAppendix D: Sample of ReportAppendix E: Threat DefinitionsAppendix F: Other Risk Analysis OpinionsIndex

  10. INITIAL SINGLE-SHELL TANK (SST) SYSTEM PERFORMANCE ASSESSMENT OF THE HANFORD SITE

    International Nuclear Information System (INIS)

    JARAYSI, M.N.

    2007-01-01

    The ''Initial Single-Shell Tank System Performance Assessment for the Hanford Site [1] (SST PA) presents the analysis of the long-term impacts of residual wastes assumed to remain after retrieval of tank waste and closure of the SST farms at the US Department of Energy (DOE) Hanford Site. The SST PA supports key elements of the closure process agreed upon in 2004 by DOE, the Washington State Department of Ecology (Ecology), and the US Environmental Protection Agency (EPA). The SST PA element is defined in Appendix I of the ''Hanford Federal Facility Agreement and Consent Order'' (HFFACO) (Ecology et al. 1989) [2], the document that establishes the overall closure process for the SST and double-shell tank (DST) systems. The approach incorporated in the SST PA integrates substantive features of both hazardous and radioactive waste management regulations into a single analysis. The defense-in-depth approach used in this analysis defined two major engineering barriers (a surface barrier and the grouted tank structure) and one natural barrier (the vadose zone) that will be relied on to control waste release into the accessible environment and attain expected performance metrics. The analysis evaluates specific barrier characteristics and other site features that influence contaminant migration by the various pathways. A ''reference'' case and a suite of sensitivity/uncertainty cases are considered. The ''reference case'' evaluates environmental impacts assuming central tendency estimates of site conditions. ''Reference'' case analysis results show residual tank waste impacts on nearby groundwater, air resources; or inadvertent intruders to be well below most important performance objectives. Conversely, past releases to the soil, from previous tank farm operations, are shown to have groundwater impacts that re significantly above most performance objectives. Sensitivity/uncertainty cases examine single and multiple parameter variability along with plausible alternatives

  11. System analysis and design

    International Nuclear Information System (INIS)

    Son, Seung Hui

    2004-02-01

    This book deals with information technology and business process, information system architecture, methods of system development, plan on system development like problem analysis and feasibility analysis, cases for system development, comprehension of analysis of users demands, analysis of users demands using traditional analysis, users demands analysis using integrated information system architecture, system design using integrated information system architecture, system implementation, and system maintenance.

  12. Benchmark for Neutronic Analysis of Sodium-cooled Fast Reactor Cores with Various Fuel Types and Core Sizes

    International Nuclear Information System (INIS)

    Stauff, N.E.; Kim, T.K.; Taiwo, T.A.; Buiron, L.; Rimpault, G.; Brun, E.; Lee, Y.K.; Pataki, I.; Kereszturi, A.; Tota, A.; Parisi, C.; Fridman, E.; Guilliard, N.; Kugo, T.; Sugino, K.; Uematsu, M.M.; Ponomarev, A.; Messaoudi, N.; Lin Tan, R.; Kozlowski, T.; Bernnat, W.; Blanchet, D.; Brun, E.; Buiron, L.; Fridman, E.; Guilliard, N.; Kereszturi, A.; Kim, T.K.; Kozlowski, T.; Kugo, T.; Lee, Y.K.; Lin Tan, R.; Messaoudi, N.; Parisi, C.; Pataki, I.; Ponomarev, A.; Rimpault, G.; Stauff, N.E.; Sugino, K.; Taiwo, T.A.; Tota, A.; Uematsu, M.M.; Monti, S.; Yamaji, A.; Nakahara, Y.; Gulliford, J.

    2016-01-01

    One of the foremost Generation IV International Forum (GIF) objectives is to design nuclear reactor cores that can passively avoid damage of the reactor when control rods fail to scram in response to postulated accident initiators (e.g. inadvertent reactivity insertion or loss of coolant flow). The analysis of such unprotected transients depends primarily on the physical properties of the fuel and the reactivity feedback coefficients of the core. Within the activities of the Working Party on Scientific Issues of Reactor Systems (WPRS), the Sodium Fast Reactor core Feed-back and Transient response (SFR-FT) Task Force was proposed to evaluate core performance characteristics of several Generation IV Sodium-cooled Fast Reactor (SFR) concepts. A set of four numerical benchmark cases was initially developed with different core sizes and fuel types in order to perform neutronic characterisation, evaluation of the feedback coefficients and transient calculations. Two 'large' SFR core designs were proposed by CEA: those generate 3 600 MW(th) and employ oxide and carbide fuel technologies. Two 'medium' SFR core designs proposed by ANL complete the set. These medium SFR cores generate 1 000 MW(th) and employ oxide and metallic fuel technologies. The present report summarises the results obtained by the WPRS for the neutronic characterisation benchmark exercise proposed. The benchmark definition is detailed in Chapter 2. Eleven institutions contributed to this benchmark: Argonne National Laboratory (ANL), Commissariat a l'energie atomique et aux energies alternatives (CEA of Cadarache), Commissariat a l'energie atomique et aux energies alternatives (CEA of Saclay), Centre for Energy Research (CER-EK), Italian National Agency for New Technologies, Energy and Sustainable Economic Development (ENEA), Helmholtz Zentrum Dresden Rossendorf (HZDR), Institute of Nuclear Technology and Energy Systems (IKE), Japan Atomic Energy Agency (JAEA), Karlsruhe Institute of Technology (KIT

  13. Pitfalls of improperly procured adjacent non-neoplastic tissue for somatic mutation analysis using next-generation sequencing

    Directory of Open Access Journals (Sweden)

    Lei Wei

    2016-10-01

    Full Text Available Abstract Background The rapid adoption of next-generation sequencing provides an efficient system for detecting somatic alterations in neoplasms. The detection of such alterations requires a matched non-neoplastic sample for adequate filtering of non-somatic events such as germline polymorphisms. Non-neoplastic tissue adjacent to the excised neoplasm is often used for this purpose as it is simultaneously collected and generally contains the same tissue type as the neoplasm. Following NGS analysis, we and others have frequently observed low-level somatic mutations in these non-neoplastic tissues, which may impose additional challenges to somatic mutation detection as it complicates germline variant filtering. Methods We hypothesized that the low-level somatic mutation observed in non-neoplastic tissues may be entirely or partially caused by inadvertent contamination by neoplastic cells during the surgical pathology gross assessment or tissue procurement process. To test this hypothesis, we applied a systematic protocol designed to collect multiple grossly non-neoplastic tissues using different methods surrounding each single neoplasm. The procedure was applied in two breast cancer lumpectomy specimens. In each case, all samples were first sequenced by whole-exome sequencing to identify somatic mutations in the neoplasm and determine their presence in the adjacent non-neoplastic tissues. We then generated ultra-deep coverage using targeted sequencing to assess the levels of contamination in non-neoplastic tissue samples collected under different conditions. Results Contamination levels in non-neoplastic tissues ranged up to 3.5 and 20.9 % respectively in the two cases tested, with consistent pattern correlated with the manner of grossing and procurement. By carefully controlling the conditions of various steps during this process, we were able to eliminate any detectable contamination in both patients. Conclusion The results demonstrated that the

  14. Mixed low-level waste form evaluation

    International Nuclear Information System (INIS)

    Pohl, P.I.; Cheng, Wu-Ching; Wheeler, T.; Waters, R.D.

    1997-01-01

    A scoping level evaluation of polyethylene encapsulation and vitreous waste forms for safe storage of mixed low-level waste was performed. Maximum permissible radionuclide concentrations were estimated for 15 indicator radionuclides disposed of at the Hanford and Savannah River sites with respect to protection of the groundwater and inadvertent intruder pathways. Nominal performance improvements of polyethylene and glass waste forms relative to grout are reported. These improvements in maximum permissible radionuclide concentrations depend strongly on the radionuclide of concern and pathway. Recommendations for future research include improving the current understanding of the performance of polymer waste forms, particularly macroencapsulation. To provide context to these estimates, the concentrations of radionuclides in treated DOE waste should be compared with the results of this study to determine required performance

  15. Radioactive Waste Management Complex low-level waste radiological performance assessment

    Energy Technology Data Exchange (ETDEWEB)

    Maheras, S.J.; Rood, A.S.; Magnuson, S.O.; Sussman, M.E.; Bhatt, R.N.

    1994-04-01

    This report documents the projected radiological dose impacts associated with the disposal of radioactive low-level waste at the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory. This radiological performance assessment was conducted to evaluate compliance with applicable radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the public and the environment. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses were made for both offsite receptors and individuals inadvertently intruding onto the site after closure. In addition, uncertainty and sensitivity analyses were performed. The results of the analyses indicate compliance with established radiological criteria and provide reasonable assurance that public health and safety will be protected.

  16. Radiological performance assessment for the Z-Area Saltstone Disposal Facility

    Energy Technology Data Exchange (ETDEWEB)

    Cook, J.R.; Fowler, J.R. [Westinghouse Savannah River Co., Aiken, SC (United States)

    1992-12-18

    This radiological performance assessment (RPA) for the Savannah River Site (SRS) Saltstone Disposal Facility (SDF) was prepared in accordance with the requirements of Chapter III of the US Department of Energy Order 5820.2A. The Order specifies that an RPA should provide reasonable assurance that a low-level waste (LLW) disposal facility will comply with the performance objectives of the Order. The performance objectives require that: (1) exposures of the general public to radioactivity in the waste or released from the waste will not result in an effective dose equivalent of 25 mrem per year; (2) releases to the atmosphere will meet the requirements of 40 CFR 61; (3) inadvertent intruders will not be committed to an excess of an effective dose equivalent of 100 mrem per year from chronic exposure, or 500 mrem from a single acute exposure; and (4) groundwater resources will be protected in accordance with Federal, State and local requirements.

  17. Radioactive Waste Management Complex low-level waste radiological performance assessment

    International Nuclear Information System (INIS)

    Maheras, S.J.; Rood, A.S.; Magnuson, S.O.; Sussman, M.E.; Bhatt, R.N.

    1994-04-01

    This report documents the projected radiological dose impacts associated with the disposal of radioactive low-level waste at the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory. This radiological performance assessment was conducted to evaluate compliance with applicable radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the public and the environment. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses were made for both offsite receptors and individuals inadvertently intruding onto the site after closure. In addition, uncertainty and sensitivity analyses were performed. The results of the analyses indicate compliance with established radiological criteria and provide reasonable assurance that public health and safety will be protected

  18. Radiological performance assessment for the Z-Area Saltstone Disposal Facility

    International Nuclear Information System (INIS)

    Cook, J.R.; Fowler, J.R.

    1992-01-01

    This radiological performance assessment (RPA) for the Savannah River Site (SRS) Saltstone Disposal Facility (SDF) was prepared in accordance with the requirements of Chapter III of the US Department of Energy Order 5820.2A. The Order specifies that an RPA should provide reasonable assurance that a low-level waste (LLW) disposal facility will comply with the performance objectives of the Order. The performance objectives require that: (1) exposures of the general public to radioactivity in the waste or released from the waste will not result in an effective dose equivalent of 25 mrem per year; (2) releases to the atmosphere will meet the requirements of 40 CFR 61; (3) inadvertent intruders will not be committed to an excess of an effective dose equivalent of 100 mrem per year from chronic exposure, or 500 mrem from a single acute exposure; and (4) groundwater resources will be protected in accordance with Federal, State and local requirements

  19. Long-term climate change assessment study plan for the Hanford Site Permanent Isolation Barrier Development Program

    International Nuclear Information System (INIS)

    Petersen, K.L.; Chatters, J.C.; Waugh, W.J.

    1993-05-01

    The Hanford Site Permanent Isolation Barrier Development Program (Barrier Development Program) was organized to develop the technology needed to provide an in-place disposal capability for low-level nuclear waste for the US Department of Energy at the Hanford Site in south-central Washington. The goal of the Barrier Development Program is to provide defensible evidence that final barrier design(s) will adequately control water infiltration, plant and animal intrusion, and wind and water erosion for a minimum of 1,000 yr; to isolate wastes from the accessible environment; and to use markers to warn inadvertent human intruders. Evidence for barrier performance will be obtained by conducting laboratory experiments, field tests, computer modeling, and other studies that establish confidence in the barrier's ability to meet its 1,000-yr design life

  20. Characteristics of Pseudoaneurysms in Northern India; Risk Analysis, Clinical Profile, Surgical Management and Outcome.

    Science.gov (United States)

    Lone, Hafeezulla; Ganaie, Farooq Ahmad; Lone, Ghulam Nabi; Dar, Abdul Majeed; Bhat, Mohammad Akbar; Singh, Shyam; Parra, Khursheed Ahmad

    2015-04-01

    To determine the risk factors, clinical characteristics, surgical management and outcome of pseudoaneurysm secondary to iatrogenic or traumatic vascular injury. This was a cross-sectional study being performed in department of cardiovascular and thoracic surgery skims soura during a 4-year period. We included all the patients referring to our center with primary diagnosis of pseudoaneurysm. The pseudoaneurysm was diagnosed with angiography and color Doppler sonography. The clinical and demographic characteristics were recorded and the risk factors were identified accordingly. Patients with small swelling (less than 5-cm) and without any complication were managed conservatively. They were followed for progression and development of complications in relation to swelling. Others underwent surgical repair and excision. The outcome of the patients was also recorded. Overall we included 20 patients with pseudoaneurysm. The mean age of the patients was 42.1±0.6 years. Among them there were 11 (55%) men and 9 (45%) women. Nine (45%) patients with end stage renal disease developed pseudoaneurysm after inadvertent femoral artery puncture for hemodialysis; two patients after interventional cardiology procedure; one after femoral embolectomy; one developed after fire arm splinter injury and one formed femoral artery related pseudoaneurysm after drainage of right inguinal abscess. The most common site of pseudoaneurysm was femoral artery followed by brachial artery. Overall surgical intervention was performed in 17 (85%) patients and 3 (15%) were managed conservatively. End stage renal disease is a major risk factor for pseudoaneurysm formation. Coagulopathy, either therapeutic or pathological is also an important risk factor. Patients with these risk factors need cannulation of venous structures for hemodialysis under ultrasound guide to prevent inadvertent arterial injury. Patients with end stage renal disease who sustain inadvertent arterial puncture during cannulation for

  1. Analysis of Project Finance | Energy Analysis | NREL

    Science.gov (United States)

    Analysis of Project Finance Analysis of Project Finance NREL analysis helps potential renewable energy developers and investors gain insights into the complex world of project finance. Renewable energy project finance is complex, requiring knowledge of federal tax credits, state-level incentives, renewable

  2. An Analysis of Security System for Intrusion in Smartphone Environment

    Directory of Open Access Journals (Sweden)

    Maya Louk

    2014-01-01

    Full Text Available There are many malware applications in Smartphone. Smartphone’s users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a MDTN process is possible and will be enabled for Smartphone environment. (b The methods are shown to be an advanced security for private sensitive data of the Smartphone user.

  3. An analysis of security system for intrusion in Smartphone environment.

    Science.gov (United States)

    Louk, Maya; Lim, Hyotaek; Lee, HoonJae

    2014-01-01

    There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone--whether for business or personal use--may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user.

  4. InSAR analysis for detecting the route of hydrothermal fluid to the surface during the 2015 phreatic eruption of Hakone Volcano, Japan

    Science.gov (United States)

    Doke, Ryosuke; Harada, Masatake; Mannen, Kazutaka; Itadera, Kazuhiro; Takenaka, Jun

    2018-04-01

    Although the 2015 Hakone Volcano eruption was a small-scale phreatic eruption with a discharged mass of only about 100 tons, interferometric synthetic aperture radar successfully detected surface deformations related to the eruption. Inversion model of the underground hydrothermal system based on measured ground displacements by ALOS-2/PALSAR-2 images showed that a crack opened at an elevation of about 530-830 m, probably at the time of the eruption. A geomorphological analysis detected several old NW-SE trending fissures, and the open crack was located just beneath one of the fissures. Thus, the crack that opened during the 2015 eruption could have been a preexisting crack that formed during a more voluminous hydrothermal eruption. In addition, the inversion model implies that a sill deflation occurred at an elevation of about 225 m, probably at the time of the eruption. The deflation of sill-like body represents a preexisting hydrothermal reservoir at an elevation of 100-400 m, which intruded fluid in the open crack prior to eruption. The volume changes of the open crack and the sill were calculated to be 1.14 × 105 m3 (inflation) and 0.49 × 105 m3 (deflation), respectively. A very local swelling (about 200 m in diameter) was also detected at the eruption center 2 months before the eruption. The local swelling, whose rate in satellite line-of-sight was 0.7-0.9 cm/day during May 2015 and declined in June, had been monitored until the time of the eruption, when its uplift halted. This was modeled as a point pressure source at an elevation of about 900 m (at a depth of about 80-90 m from the ground surface) and is considered to be a minor hydrothermal reservoir just beneath the fumarolic field. Our analysis shows that the northernmost tip of the open crack reached within 200 m of the surface. Thus, it is reasonable to assume that the hydrothermal fluid in the open crack found a way to the surface and formed the eruption.[Figure not available: see fulltext.

  5. Safety analysis fundamentals

    International Nuclear Information System (INIS)

    Wright, A.C.D.

    2002-01-01

    This paper discusses the safety analysis fundamentals in reactor design. This study includes safety analysis done to show consequences of postulated accidents are acceptable. Safety analysis is also used to set design of special safety systems and includes design assist analysis to support conceptual design. safety analysis is necessary for licensing a reactor, to maintain an operating license, support changes in plant operations

  6. The Effect of Depressive Symptoms on the Association between Gluten-Free Diet Adherence and Symptoms in Celiac Disease: Analysis of a Patient Powered Research Network

    Directory of Open Access Journals (Sweden)

    Andrew M. Joelson

    2018-04-01

    Full Text Available Background: The prevalence of depression in celiac disease (CD is high, and patients are often burdened socially and financially by a gluten-free diet. However, the relationship between depression, somatic symptoms and dietary adherence in CD is complex and poorly understood. We used a patient powered research network (iCureCeliac® to explore the effect that depression has on patients’ symptomatic response to a gluten-free diet (GFD. Methods: We identified patients with biopsy-diagnosed celiac disease who answered questions pertaining to symptoms (Celiac Symptom Index (CSI, GFD adherence (Celiac Dietary Adherence Test (CDAT, and a 5-point, scaled question regarding depressive symptoms relating to patients’ celiac disease. We then measured the correlation between symptoms and adherence (CSI vs. CDAT in patients with depression versus those without depression. We also tested for interaction of depression with regard to the association with symptoms using a multiple linear regression model. Results: Among 519 patients, 86% were female and the mean age was 40.9 years. 46% of patients indicated that they felt “somewhat,” “quite a bit,” or “very much” depressed because of their disorder. There was a moderate correlation between worsened celiac symptoms and poorer GFD adherence (r = 0.6, p < 0.0001. In those with a positive depression screen, there was a moderate correlation between worsening symptoms and worsening dietary adherence (r = 0.5, p < 0.0001 whereas in those without depression, the correlation was stronger (r = 0.64, p < 0.0001. We performed a linear regression analysis, which suggests that the relationship between CSI and CDAT is modified by depression. Conclusions: In patients with depressive symptoms related to their disorder, correlation between adherence and symptoms was weaker than those without depressive symptoms. This finding was confirmed with a linear regression analysis, showing that depressive symptoms may

  7. An example of multidimensional analysis: Discriminant analysis

    International Nuclear Information System (INIS)

    Lutz, P.

    1990-01-01

    Among the approaches on the data multi-dimensional analysis, lectures on the discriminant analysis including theoretical and practical aspects are presented. The discrimination problem, the analysis steps and the discrimination categories are stressed. Examples on the descriptive historical analysis, the discrimination for decision making, the demonstration and separation of the top quark are given. In the linear discriminant analysis the following subjects are discussed: Huyghens theorem, projection, discriminant variable, geometrical interpretation, case for g=2, classification method, separation of the top events. Criteria allowing the obtention of relevant results are included [fr

  8. Semen Analysis Test

    Science.gov (United States)

    ... Sources Ask Us Also Known As Sperm Analysis Sperm Count Seminal Fluid Analysis Formal Name Semen Analysis This ... semen Viscosity—consistency or thickness of the semen Sperm count—total number of sperm Sperm concentration (density)—number ...

  9. Handbook of Applied Analysis

    CERN Document Server

    Papageorgiou, Nikolaos S

    2009-01-01

    Offers an examination of important theoretical methods and procedures in applied analysis. This book details the important theoretical trends in nonlinear analysis and applications to different fields. It is suitable for those working on nonlinear analysis.

  10. Special Analysis of the Area 3 Radioactive Waste Management Site at the Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    National Security Technologies, LLC, Environmental Management

    2012-09-30

    This report describes the methods and results of a special analysis (SA) of the Area 3 Radioactive Waste Management Site (RWMS) on the Nevada National Security Site (NNSS). The purpose of the SA is to determine if the approved performance assessment (PA) and composite analysis (CA) (Shott et al., 2001) remain valid. The Area 3 RWMS PA and CA were prepared as a single document and received conditional approval on October 6, 1999. A conditional Disposal Authorization Statement (DAS) for the Area 3 RWMS was issued on October 20, 1999. Since preparation of the approved PA and CA, new information and additional environmental monitoring data have been used to update the PA and CA. At the same time, continual advancements in computer processors and software have allowed improvement to the PA and CA models. Annual reviews of the PA and CA required by U.S. Department of Energy (DOE) Order DOE O 435.1 have documented multiple changes occurring since preparation of the PA and CA. Potentially important changes include: Development of a new and improved baseline PA and CA model implemented in the probabilistic GoldSim simulation platform. A significant increase in the waste inventory disposed at the site. Revision and updating of model parameters based on additional years of site monitoring data and new research and development results. Although changes have occurred, many important PA/CA issues remain unchanged, including the site conceptual model, important features, events, and processes, and the points of compliance. The SA is performed to document the current status of the PA/CA model and to quantitatively assess the impact of cumulative changes on the PA and CA results. The results of the SA are used to assess the validity of the approved PA/CA and make a determination if revision of the PA or CA is necessary. The SA was performed using the Area 3 RWMS, version 2.102, GoldSim model, the current baseline PA/CA model. Comparison of the maximum SA results with the PA

  11. Shape analysis in medical image analysis

    CERN Document Server

    Tavares, João

    2014-01-01

    This book contains thirteen contributions from invited experts of international recognition addressing important issues in shape analysis in medical image analysis, including techniques for image segmentation, registration, modelling and classification, and applications in biology, as well as in cardiac, brain, spine, chest, lung and clinical practice. This volume treats topics such as, anatomic and functional shape representation and matching; shape-based medical image segmentation; shape registration; statistical shape analysis; shape deformation; shape-based abnormity detection; shape tracking and longitudinal shape analysis; machine learning for shape modeling and analysis; shape-based computer-aided-diagnosis; shape-based medical navigation; benchmark and validation of shape representation, analysis and modeling algorithms. This work will be of interest to researchers, students, and manufacturers in the fields of artificial intelligence, bioengineering, biomechanics, computational mechanics, computationa...

  12. Thermal Performance Analysis For Small Ion-Exchange Cesium Removal Process

    International Nuclear Information System (INIS)

    Lee, S.; King, W.

    2009-01-01

    The In-Riser Ion Exchange program focuses on the development of in-tank systems to decontaminate high level waste (HLW) salt solutions at the Savannah River Site (SRS) and the Hanford Site. Small Column Ion Exchange (SCIX) treatment for cesium removal is a primary in-riser technology for decontamination prior to final waste immobilization in Saltstone. Through this process, radioactive cesium from the salt solution is adsorbed onto the ion exchange media which is packed within a flow-through column. Spherical Resorcinol-Formaldehyde (RF) is being considered as the ion exchange media for the application of this technology at both sites. A packed column loaded with media containing radioactive cesium generates significant heat from radiolytic decay. Under normal operating conditions, process fluid flow through the column can provide adequate heat removal from the columns. However, in the unexpected event of loss of fluid flow or fluid drainage from the column, the design must be adequate to handle the thermal load to avoid unacceptable temperature excursions. Otherwise, hot spots may develop locally which could degrade the performance of the ion-exchange media or the temperature could rise above column safety limits. Data exists which indicates that performance degradation with regard to cesium removal occurs with RF at 65C. In addition, the waste supernate solution will boil around 130C. As a result, two temperature limits have been assumed for this analysis. An additional upset scenario was considered involving the loss of the supernate solution due to inadvertent fluid drainage through the column boundary. In this case, the column containing the loaded media could be completely dry. This event is expected to result in high temperatures that could damage the column or cause the RF sorbent material to undergo undesired physical changes. One objective of these calculations is to determine the range of temperatures that should be evaluated during testing with the RF

  13. Development of Risk Insights for Regulatory Review of a Near-Surface Disposal Facility for Radioactive Waste

    International Nuclear Information System (INIS)

    Esh, D.W.; Ridge, A.C.; Thaggard, M.

    2006-01-01

    Section 3116 of the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 (NDAA) requires the Department of Energy (DOE) to consult with the Nuclear Regulatory Commission (NRC) about non-High Level Waste (HLW) determinations. In its consultative role, NRC performs technical reviews of DOE's waste determinations but does not have regulatory authority over DOE's waste disposal activities. The safety of disposal is evaluated by comparing predicted disposal facility performance to the performance objectives specified in NRC regulations for the disposal of low-level waste (10 CFR Part 61 Subpart C). The performance objectives contain criteria for protection of the public, protection of inadvertent intruders, protection of workers, and stability of the disposal site after closure. The potential radiological dose to receptors typically is evaluated with a performance assessment (PA) model that simulates the release of radionuclides from the disposal site, transport of radionuclides through the environment, and exposure of potential receptors to residual contamination for thousands of years. This paper describes NRC's development and use of independent performance assessment modeling to facilitate review of DOE's non-HLW determination for the Saltstone Disposal Facility (SDF) at the Savannah River Site. NRC's review of the safety of near-surface disposal of radioactive waste at the SDF was facilitated and focused by risk insights developed with an independent PA model. The main components of NRC's performance assessment model are presented. The development of risk insights that allow the staff to focus review efforts on those areas that are most important to satisfying the performance objectives is discussed. Uncertainty analysis was performed of the full stochastic model using genetic variable selection algorithms. The results of the uncertainty analysis were then used to guide the development of simulations of other scenarios to understand the key risk

  14. Performance assessment review for DOE LLW disposal facilities

    International Nuclear Information System (INIS)

    Wilhite, Elmer L.

    1992-01-01

    The United States Department of Energy (US DOE) disposes of low-level radioactive waste in near-surface disposal facilities. Safety of the disposal operations is evaluated for operational safety as well as long-term safety. Operational safety is evaluated based on the perceived level of hazard of the operation and may vary from a simple safety assessment to a safety analysis report. Long-term safety of all low-level waste disposal systems is evaluated through the conduct of a radiological performance assessment. The US DOE has established radiological performance objectives for disposal of low-level waste. They are to protect a member of the general public from receiving over 25 mrem/y, and an inadvertent intruder into the waste from receiving over 100 mrem/y continuous exposure or 500 mrem from a single exposure. For a disposal system to be acceptable, a performance assessment must be prepared which must be technically accurate and provide reasonable assurance that these performance objectives are met. Technical quality of the performance assessments is reviewed by a panel of experts. The panel of experts is used in two ways to assure the technical quality of performance assessment. A preliminary (generally 2 day) review by the panel is employed in the late stages of development to provide guidance on finalizing the performance assessment. The comments from this review are communicated to the personnel responsible for the performance assessment for consideration and incorporation. After finalizing the performance assessment, it is submitted for a formal review. The formal review is accomplished by a much more thorough analysis of the performance assessment over a multi-week time period. The panel then formally reports their recommendations to the US DOE waste management senior staff who make the final determination on acceptability of the performance assessment. A number of lessons have been learned from conducting several preliminary reviews of performance

  15. NCEP SST Analysis

    Science.gov (United States)

    Organization Search Go Search Polar Go MMAB SST Analysis Main page About MMAB Our Mission Our Personnel EMC Branches Global Climate & Weather Modeling Mesoscale Modeling Marine Modeling and Analysis Contact EMC (RTG_SST_HR) analysis For a regional map, click the desired area in the global SST analysis and anomaly maps

  16. Foundations of factor analysis

    CERN Document Server

    Mulaik, Stanley A

    2009-01-01

    Introduction Factor Analysis and Structural Theories Brief History of Factor Analysis as a Linear Model Example of Factor AnalysisMathematical Foundations for Factor Analysis Introduction Scalar AlgebraVectorsMatrix AlgebraDeterminants Treatment of Variables as Vectors Maxima and Minima of FunctionsComposite Variables and Linear Transformations Introduction Composite Variables Unweighted Composite VariablesDifferentially Weighted Composites Matrix EquationsMulti

  17. K Basin Hazard Analysis

    International Nuclear Information System (INIS)

    PECH, S.H.

    2000-01-01

    This report describes the methodology used in conducting the K Basins Hazard Analysis, which provides the foundation for the K Basins Final Safety Analysis Report. This hazard analysis was performed in accordance with guidance provided by DOE-STD-3009-94, Preparation Guide for U. S. Department of Energy Nonreactor Nuclear Facility Safety Analysis Reports and implements the requirements of DOE Order 5480.23, Nuclear Safety Analysis Report

  18. Quantitative analysis chemistry

    International Nuclear Information System (INIS)

    Ko, Wansuk; Lee, Choongyoung; Jun, Kwangsik; Hwang, Taeksung

    1995-02-01

    This book is about quantitative analysis chemistry. It is divided into ten chapters, which deal with the basic conception of material with the meaning of analysis chemistry and SI units, chemical equilibrium, basic preparation for quantitative analysis, introduction of volumetric analysis, acid-base titration of outline and experiment examples, chelate titration, oxidation-reduction titration with introduction, titration curve, and diazotization titration, precipitation titration, electrometric titration and quantitative analysis.

  19. K Basin Hazard Analysis

    Energy Technology Data Exchange (ETDEWEB)

    PECH, S.H.

    2000-08-23

    This report describes the methodology used in conducting the K Basins Hazard Analysis, which provides the foundation for the K Basins Final Safety Analysis Report. This hazard analysis was performed in accordance with guidance provided by DOE-STD-3009-94, Preparation Guide for U. S. Department of Energy Nonreactor Nuclear Facility Safety Analysis Reports and implements the requirements of DOE Order 5480.23, Nuclear Safety Analysis Report.

  20. K Basins Hazard Analysis

    International Nuclear Information System (INIS)

    WEBB, R.H.

    1999-01-01

    This report describes the methodology used in conducting the K Basins Hazard Analysis, which provides the foundation for the K Basins Safety Analysis Report (HNF-SD-WM-SAR-062/Rev.4). This hazard analysis was performed in accordance with guidance provided by DOE-STD-3009-94, Preparation Guide for U. S. Department of Energy Nonreactor Nuclear Facility Safety Analysis Reports and implements the requirements of DOE Order 5480.23, Nuclear Safety Analysis Report