WorldWideScience

Sample records for inadvertent intruder application

  1. Automated Inadvertent Intruder Application

    International Nuclear Information System (INIS)

    Koffman, Larry D.; Lee, Patricia L.; Cook, James R.; Wilhite, Elmer L.

    2008-01-01

    The Environmental Analysis and Performance Modeling group of Savannah River National Laboratory (SRNL) conducts performance assessments of the Savannah River Site (SRS) low-level waste facilities to meet the requirements of DOE Order 435.1. These performance assessments, which result in limits on the amounts of radiological substances that can be placed in the waste disposal facilities, consider numerous potential exposure pathways that could occur in the future. One set of exposure scenarios, known as inadvertent intruder analysis, considers the impact on hypothetical individuals who are assumed to inadvertently intrude onto the waste disposal site. Inadvertent intruder analysis considers three distinct scenarios for exposure referred to as the agriculture scenario, the resident scenario, and the post-drilling scenario. Each of these scenarios has specific exposure pathways that contribute to the overall dose for the scenario. For the inadvertent intruder analysis, the calculation of dose for the exposure pathways is a relatively straightforward algebraic calculation that utilizes dose conversion factors. Prior to 2004, these calculations were performed using an Excel spreadsheet. However, design checks of the spreadsheet calculations revealed that errors could be introduced inadvertently when copying spreadsheet formulas cell by cell and finding these errors was tedious and time consuming. This weakness led to the specification of functional requirements to create a software application that would automate the calculations for inadvertent intruder analysis using a controlled source of input parameters. This software application, named the Automated Inadvertent Intruder Application, has undergone rigorous testing of the internal calculations and meets software QA requirements. The Automated Inadvertent Intruder Application was intended to replace the previous spreadsheet analyses with an automated application that was verified to produce the same calculations and

  2. AUTOMATED INADVERTENT INTRUDER APPLICATION

    International Nuclear Information System (INIS)

    Koffman, L; Patricia Lee, P; Jim Cook, J; Elmer Wilhite, E

    2007-01-01

    The Environmental Analysis and Performance Modeling group of Savannah River National Laboratory (SRNL) conducts performance assessments of the Savannah River Site (SRS) low-level waste facilities to meet the requirements of DOE Order 435.1. These performance assessments, which result in limits on the amounts of radiological substances that can be placed in the waste disposal facilities, consider numerous potential exposure pathways that could occur in the future. One set of exposure scenarios, known as inadvertent intruder analysis, considers the impact on hypothetical individuals who are assumed to inadvertently intrude onto the waste disposal site. Inadvertent intruder analysis considers three distinct scenarios for exposure referred to as the agriculture scenario, the resident scenario, and the post-drilling scenario. Each of these scenarios has specific exposure pathways that contribute to the overall dose for the scenario. For the inadvertent intruder analysis, the calculation of dose for the exposure pathways is a relatively straightforward algebraic calculation that utilizes dose conversion factors. Prior to 2004, these calculations were performed using an Excel spreadsheet. However, design checks of the spreadsheet calculations revealed that errors could be introduced inadvertently when copying spreadsheet formulas cell by cell and finding these errors was tedious and time consuming. This weakness led to the specification of functional requirements to create a software application that would automate the calculations for inadvertent intruder analysis using a controlled source of input parameters. This software application, named the Automated Inadvertent Intruder Application, has undergone rigorous testing of the internal calculations and meets software QA requirements. The Automated Inadvertent Intruder Application was intended to replace the previous spreadsheet analyses with an automated application that was verified to produce the same calculations and

  3. Inadvertent Intruder Analysis For The Portsmouth On-Site Waste Disposal Facility (OSWDF)

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Frank G. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Phifer, Mark A. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2014-01-22

    The inadvertent intruder analysis considers the radiological impacts to hypothetical persons who are assumed to inadvertently intrude on the Portsmouth OSWDF site after institutional control ceases 100 years after site closure. For the purposes of this analysis, we assume that the waste disposal in the OSWDF occurs at time zero, the site is under institutional control for the next 100 years, and inadvertent intrusion can occur over the following 1,000 year time period. Disposal of low-level radioactive waste in the OSWDF must meet a requirement to assess impacts on such individuals, and demonstrate that the effective dose equivalent to an intruder would not likely exceed 100 mrem per year for scenarios involving continuous exposure (i.e. chronic) or 500 mrem for scenarios involving a single acute exposure. The focus in development of exposure scenarios for inadvertent intruders was on selecting reasonable events that may occur, giving consideration to regional customs and construction practices. An important assumption in all scenarios is that an intruder has no prior knowledge of the existence of a waste disposal facility at the site. Results of the analysis show that a hypothetical inadvertent intruder at the OSWDF who, in the worst case scenario, resides on the site and consumes vegetables from a garden established on the site using contaminated soil (chronic agriculture scenario) would receive a maximum chronic dose of approximately 7.0 mrem/yr during the 1000 year period of assessment. This dose falls well below the DOE chronic dose limit of 100 mrem/yr. Results of the analysis also showed that a hypothetical inadvertent intruder at the OSWDF who, in the worst case scenario, excavates a basement in the soil that reaches the waste (acute basement construction scenario) would receive a maximum acute dose of approximately 0.25 mrem/yr during the 1000 year period of assessment. This dose falls well below the DOE acute dose limit of 500 mrem/yr. Disposal inventory

  4. Potential impact of DOE's performance objective for protection of inadvertent intruders on low-level waste disposals at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1993-01-01

    Performance objectives for disposal of low-level radioactive waste at Department of Energy (DOE) sites include limits on radiation dose to inadvertent intruders. This paper investigates the potential impact of DOE's performance objective for protection of inadvertent intruders on the acceptability of low-level waste disposals at Oak Ridge National Laboratory (ORNL). The analysis is based on waste volumes and radionuclide inventories for recent disposals and estimated doses to an inadvertent intruder for assumed exposure scenarios. The analysis indicates that more than 99% of the total volume of waste in recent disposals meets the performance objective for inadvertent intruders, and the volume of waste found to be unacceptable for disposal is only about 16 m 3 . Therefore, DOE's performance objective for protection of inadvertent intruders probably will not have unreasonably adverse impacts on acceptable waste disposals at ORNL

  5. Potential impact of DOE's performance objective for protection of inadvertent intruders on low-level waste disposals at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1992-01-01

    The Department of Energy's Order 5820.2A, Chapter III, specifies performance objectives for disposal of low-level radioactive waste which include limits on effective dose equivalent for inadvertent intruders. This paper investigates the potential impact of the performance objective for protection of inadvertent intruders on the acceptability of waste disposals in Solid Waste Storage Area (SWSA) 6 at Oak Ridge National Laboratory (ORNL). The analysis is based on radionuclide inventories and waste volumes for recent disposals in SWSA 6 and calculated doses to an inadvertent intruder per unit concentration of radionuclides in disposed waste for assumed exposure scenarios

  6. A proposed alternative approach for protection of inadvertent human intruders from buried Department of Energy low level radioactive wastes

    International Nuclear Information System (INIS)

    Cochran, J.R.

    1995-01-01

    The burial of radioactive wastes creates a legacy. To limit the impact of this legacy on future generations, we establish and comply with performance objectives. This paper reviews performance objectives for the long-term isolation of buried radioactive wastes; identifies regulatorly-defined performance objectives for protecting the inadvertent human intruder (IHI) from buried low-level radioactive waste (LLW); (3) discusses a shortcoming of the current approach; and (4) offers an alternative approach for protecting the IHI. This alternative approach is written specifically for the burial of US Department of Energy (DOE) wastes at the Nevada Test Site (NTS), although the approach might be applied at other DOE burial sites

  7. Energy-efficient area coverage for intruder detection in sensor networks

    CERN Document Server

    He, Shibo; Li, Junkun

    2014-01-01

    This Springer Brief presents recent research results on area coverage for intruder detection from an energy-efficient perspective. These results cover a variety of topics, including environmental surveillance and security monitoring. The authors also provide the background and range of applications for area coverage and elaborate on system models such as the formal definition of area coverage and sensing models. Several chapters focus on energy-efficient intruder detection and intruder trapping under the well-known binary sensing model, along with intruder trapping under the probabilistic sens

  8. Intruder scenarios for site-specific waste classification

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.

    1988-01-01

    The US Department of Energy (DOE) is currently revising its low-level radioactive waste (LLW) management requirements and guidelines for waste generated at its facilities that support defense missions. Specifically, draft DOE 5820.2A, Chapter 3, describes the purpose, policy, and requirements necessary for the management of defense LLW. The draft DOE policy calls for DOE LLW operations to be managed to protect the health and safety of the public, preserve the environment, and ensure that no remedial action will be necessary after termination of operations. The requirements and guidelines apply to radioactive wastes but are also intended to apply to mixed hazardous and radioactive wastes as defined in draft DOE 5400.5, Hazardous and Radioactive Mixed Waste. The basic approach used by DOE is to establish overall performance objectives in terms of ground-water protection and public radiation dose limits and to require site-specific performance assessments to determine compliance. As a result of these performance assessments, each site shall develop waste acceptance criteria that define the allowable quantities and concentrations of specific radioisotopes. Additional limitations on waste disposal design, waste form, and waste treatment shall also be developed on a site-specific basis. As a key step in the site-specific performance assessments, an evaluation must be conducted of potential radiation doses to intruders who may inadvertently move onto a closed DOE LLW disposal site after loss of institutional controls must be conducted. This paper describes the types of intruder scenarios that should be considered when performing this step of the site-specific performance assessment

  9. Exploring key considerations when determining bona fide inadvertent errors resulting in understatements

    Directory of Open Access Journals (Sweden)

    Chrizanne de Villiers

    2016-03-01

    Full Text Available Chapter 16 of the Tax Administration Act (28 of 2011 (the TA Act deals with understatement penalties. In the event of an ‘understatement’, in terms of Section 222 of the TA Act, a taxpayer must pay an understatement penalty, unless the understatement results from a bona fide inadvertent error. The determining of a bona fide inadvertent error on taxpayers’ returns is a totally new concept in the tax fraternity. It is of utmost importance that this section is applied correctly based on sound evaluation principles and not on professional judgement when determining if the error was indeed the result of a bona fide inadvertent error. This research study focuses on exploring key considerations when determining bona fide inadvertent errors resulting in understatements. The role and importance of tax penalty provisions is explored and the meaning of the different components in the term ‘bona fide inadvertent error’ critically analysed with the purpose to find a possible definition for the term ‘bona fide inadvertent error’. The study also compares the provisions of other tax jurisdictions with regards to errors made resulting in tax understatements in order to find possible guidelines on the application of bona fide inadvertent errors as contained in Section 222 of the TA Act. The findings of the research study revealed that the term ‘bona fide inadvertent error’ contained in Section 222 of the TA Act should be defined urgently and that guidelines must be provided by SARS on the application of the new amendment. SARS should also clarify the application of a bona fide inadvertent error in light of the behaviours contained in Section 223 of the TA Act to avoid any confusion.

  10. Tracking intruder states

    Energy Technology Data Exchange (ETDEWEB)

    Riedinger, L L; Mueller, W F; Yu, C H [Tennessee Univ., Knoxville, TN (United States). Dept. of Physics

    1992-08-01

    The deformation-driving effects of intruder states are studied by analysis of various types of data on rotational bands in rare-earth deformed nuclei. The sensitivity of four measurables (bandhead energy, B(E2) value, neutron i{sub 13/2} crossing frequency, and signature splitting) to increased deformation in an intruder band is shown. The analysis of signature splitting systematics is extended to known superdeformed bands. (author). 22 refs., 5 figs.

  11. Reorganization of intruder Using Ad-Hoc Network And RFID

    Directory of Open Access Journals (Sweden)

    Vishakha Hagawane

    2014-05-01

    Full Text Available This system is to develop a centralized computer application that needs to identify moving person in a specific area using wireless network. In this paper, we develop a new indoor tracking algorithm using received signal strength. The RFID is able to detect the humans and provide information about the direction of the movement. The gathered information from the node is to be given to the base station for processing. . This application is able to detect and track person, and report direction of the intruder to a central base station. In this system we design nodes through which we are able to track the person. The human intruder is detected using Zigbee.

  12. Intruder states and low energy nuclear spectroscopy

    International Nuclear Information System (INIS)

    Bengtsson, R.

    1991-01-01

    The crucial role intruder orbitals play is not limited to low spin and small deformations. In fact much of the physics at superdeformed shapes and at very high spin is a direct result of the presence of high-j intruder orbitals in the vicinity of the Fermi surface, including the introduction of intruder orbitals from still higher shells at extreme deformations. Since the intruder subshell has a larger angular momentum (j) than any other subshell close to the Fermi surface it plays an essential role for building up angular momentum in the nucleus, and the alignment of intruder shell (quasi) particles is responsible for a large variety of bandcrossings observed in discrete spectroscopy along or near the yrast line. Intruder shell orbitals are also associated with large quadrupole moments and the occupation of these orbitals may lead to significant changes of the deformation of the nucleus. Under favorable circumstances a nucleus may have totally different shapes depending on the occupation of the intruder orbitals, giving rise to a phenomenon which is usually referred to as shape coexistence. In this paper, shape coexistence in several mass regions will be discussed with specific attention focused on the relation between shape coexistence and the occupation of intruder shell levels. Shape effects associated both with spin aligned and non-aligned intruder orbitals will be investigated

  13. Detection of Intelligent Intruders in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yun Wang

    2016-01-01

    Full Text Available Most of the existing research works on the intrusion detection problem in a wireless sensor network (WSN assume linear or random mobility patterns in abstracting intruders’ models in traversing the WSN field. However, in real-life WSN applications, an intruder is usually an intelligent mobile robot with environment learning and detection avoidance capability (i.e., the capability to avoid surrounding sensors. Due to this, the literature results based on the linear or random mobility models may not be applied to the real-life WSN design and deployment for efficient and effective intrusion detection in practice. This motivates us to investigate the impact of intruder’s intelligence on the intrusion detection problem in a WSN for various applications. To be specific, we propose two intrusion algorithms, the pinball and flood-fill algorithms, to mimic the intelligent motion and behaviors of a mobile intruder in detecting and circumventing nearby sensors for detection avoidance while heading for its destination. The two proposed algorithms are integrated into a WSN framework for intrusion detection analysis in various circumstances. Monte Carlo simulations are conducted, and the results indicate that: (1 the performance of a WSN drastically changes as a result of the intruder’s intelligence in avoiding sensor detections and intrusion algorithms; (2 network parameters, including node density, sensing range and communication range, play a crucial part in the effectiveness of the intruder’s intrusion algorithms; and (3 it is imperative to integrate intruder’s intelligence in the WSN research for intruder detection problems under various application circumstances.

  14. The behaviour of free-flowing granular intruders

    Directory of Open Access Journals (Sweden)

    Wyburn Edward

    2017-01-01

    Full Text Available Particle shape affects both the quasi-static and dynamic behaviour of granular media. There has been significant research devoted to the flowability of systems of irregularly shaped particles, as well as the flow of grains around fixed intruders, however the behaviour of free flowing intruders within granular flows remains comparatively unexplored. Here, the effect of the shape of these intruder particles is studied, looking at the kinematic behaviour of the intruders and in particular their tendency of orientation. Experiments are carried out within the Stadium Shear Device, which is a novel apparatus able to continuously apply simple shear conditions to two-dimensional grain analogues. It is found that the intruder shows different behaviour to that of the bulk flow, and that this behaviour is strongly shape dependent. These insights could lead to the development of admixtures that alter the flowability of granular materials.

  15. Human intruder dose assessment for deep geological disposal

    International Nuclear Information System (INIS)

    Smith, G. M.; Molinero, J.; Delos, A.; Valls, A.; Conesa, A.; Smith, K.; Hjerpe, T.

    2013-07-01

    For near-surface disposal, approaches to assessment of inadvertent human intrusion have been developed through international cooperation within the IAEA's ISAM programme. Other assessments have considered intrusion into deep geological disposal facilities, but comparable international cooperation to develop an approach for deep disposal has not taken place. Accordingly, the BIOPROTA collaboration project presented here (1) examined the technical aspects of why and how deep geological intrusion might occur; (2) considered how and to what degree radiation exposure would arise to the people involved in such intrusion; (3) identified the processes which constrain the uncertainties; and hence (4) developed and documented an approach for evaluation of human intruder doses which addresses the criteria adopted by the IAEA and takes account of other international guidance and human intrusion assessment experience. Models for radiation exposure of the drilling workers and geologists were developed and described together with compilation of relevant input data, taking into account relevant combinations of drilling technique, geological formation and repository material. Consideration has been given also to others who might be exposed to contaminated material left at the site after drilling work has ceased. The models have been designed to be simple and stylised, in accordance with international recommendations. The set of combinations comprises 58 different scenarios which cover a very wide range of human intrusion possibilities via deep drilling. (orig.)

  16. Lazy Mobile Intruders

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis

    We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching...... that by communication, the malicious code can learn new information that it can use in subsequent operations, or that we may have several pieces of malicious code that can exchange information if they \\meet". To formalize both the platform and the malicious code we use the mobile ambient calculus, since it provides...... a small, abstract formalism that models the essence of mobile code. We provide a decision procedure for security against arbitrary intruder ambients when the honest ambients can only perform a bounded number of steps and without path constraints in communication....

  17. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    Energy Technology Data Exchange (ETDEWEB)

    Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

  18. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Trauth, K.M.; Hora, S.C.; Guzowski, R.V.

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation

  19. Lazy Mobile Intruders

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis

    2013-01-01

    We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching...... that by communication, the malicious code can learn new information that it can use in subsequent operations, or that we may have several pieces of malicious code that can exchange information if they “meet”. To formalize both the platform and the malicious code we use the mobile ambient calculus, since it provides...... a small, abstract formalism that models the essence of mobile code. We provide a decision procedure for security against arbitrary intruder processes when the honest processes can only perform a bounded number of steps and without path constraints in communication. We show that this problem is NP-complete....

  20. Long-term captures of low-mass intruders by binary stars

    International Nuclear Information System (INIS)

    Hills, J.G.

    1983-01-01

    Intensive computer simulations were made of three families of encounters between a binary star and a low-mass intruder which previous work indicated have a high probability of producing long-lived triple-star systems. For comparison, a fourth family which produces few long-lived trinaries was also studied. In the first two families, the binary components are equally massive and the closest approach of the intruder to the center of mass of the binary is about two times its semimajor axis, a 0 . In Family 1, the orbit of the original binary is circular, e = 0, while in Family 2, e 0 = 0.95. In Family 3 one binary component is 100 times as massive as the other, the orbit is circular, and the low-mass intruder enters the binary at nearly zero impact parameter. The probability that the intruder is trapped for at least one revolution around the binary is 0.24, 0.46, and 0.51, respectively, for these three families of encounters. The fraction of the intruders surviving successive revolutions drops rapidly. However, one encounter in Family 1 and two in Family 3 resulted in the intruder making more than 300 revolutions around the inner binary before escaping. Some intruders remained bound for more than 20 000 revolutions of the inner binary. The longest duration captures occur when the intruder is thrown into an orbit with a very large semimajor axis. About 20% of the encounters in the three families result in the intruder being thrown into an orbit with a semimajor axis a>100 a 0 , while about 2% result in the intruder going into an orbit with a>1000 a 0 . Intruders thrown into these large semimajor axis orbits have the best chance of having their orbits stabilized by passing stars

  1. Intelligent Machine Vision for Automated Fence Intruder Detection Using Self-organizing Map

    Directory of Open Access Journals (Sweden)

    Veldin A. Talorete Jr.

    2017-03-01

    Full Text Available This paper presents an intelligent machine vision for automated fence intruder detection. A series of still captured images that contain fence events using Internet Protocol cameras was used as input data to the system. Two classifiers were used; the first is to classify human posture and the second one will classify intruder location. The system classifiers were implemented using Self-Organizing Map after the implementation of several image segmentation processes. The human posture classifier is in charge of classifying the detected subject’s posture patterns from subject’s silhouette. Moreover, the Intruder Localization Classifier is in charge of classifying the detected pattern’s location classifier will estimate the location of the intruder with respect to the fence using geometric feature from images as inputs. The system is capable of activating the alarm, display the actual image and depict the location of the intruder when an intruder is detected. In detecting intruder posture, the system’s success rate of 88%. Overall system accuracy for day-time intruder localization is 83% and an accuracy of 88% for night-time intruder localization

  2. On the submerging of a spherical intruder into granular beds

    Directory of Open Access Journals (Sweden)

    Wu Chuan-Yu

    2017-01-01

    Full Text Available Granular materials are complex systems and their mechanical behaviours are determined by the material properties of individual particles, the interaction between particles and the surrounding media, which are still incompletely understood. Using an advanced discrete element method (DEM, we simulate the submerging process of a spherical projectile (an intruder into granular materials of various properties with a zero penetration velocity (i.e. the intruder is touching the top surface of the granular bed and released from stationary and examine its settling behaviour. By systematically changing the density and size of the intruder and the particle density (i.e. the density of the particles in the granular bed, we find that the intruder can sink deep into the granular bed even with a zero penetration velocity. Furthermore, we confirm that under certain conditions the granular bed can behave like a Newtonian liquid and the submerging intruder can reach a constant velocity, i.e. the terminal velocity, identical to the settling of a sphere in a liquid, as observed experimentally. A mathematical model is also developed to predict the maximum penetration depth of the intruder. The model predictions are compared with experimental data reported in the literature,good agreement was obtained, demonstrating the model can accurately predict the submerging behaviour of the intruder in the granular media.

  3. APPROACH TO SYNTHESIS OF PASSIVE INFRARED DETECTORS BASED ON QUASI-POINT MODEL OF QUALIFIED INTRUDER

    Directory of Open Access Journals (Sweden)

    I. V. Bilizhenko

    2017-01-01

    Full Text Available Subject of Research. The paper deals with synthesis of passive infra red (PIR detectors with enhanced detection capability of qualified intruder who uses different types of detection countermeasures: the choice of specific movement direction and disguise in infrared band. Methods. We propose an approach based on quasi-point model of qualified intruder. It includes: separation of model priority parameters, formation of partial detection patterns adapted to those parameters and multi channel signal processing. Main Results. Quasi-pointmodel of qualified intruder consisting of different fragments was suggested. Power density difference was used for model parameters estimation. Criteria were formulated for detection pattern parameters choice on the basis of model parameters. Pyroelectric sensor with nine sensitive elements was applied for increasing the signal information content. Multi-channel processing with multiple partial detection patterns was proposed optimized for detection of intruder's specific movement direction. Practical Relevance. Developed functional device diagram can be realized both by hardware and software and is applicable as one of detection channels for dual technology passive infrared and microwave detectors.

  4. Intruder states at the N=20 shell closure

    International Nuclear Information System (INIS)

    Heyde, K.

    1991-01-01

    It is indicated that mp-mh (multiple) excitations across closed shells can occur at low energy throughout the nuclear mass region. Besides the 4p-4h, 8p-8h configurations, that are deformed, coexisting low-lying excitations are mainly observed for light N=Z nuclei. A new class of 2p-2h intruder O + state is shown to exist in nuclei where a neutron excess is present. In the latter cases, the proton-neutron interaction energy between the excited 2p-2h configuration and the open shell accounts for a very specific mass dependence in the intruder excitation energy. The experimental evidence that corroborates the idea of intruder states will be given. (G.P.) 28 refs.; 13 figs

  5. Firewater system inadvertent actuation frequencies

    International Nuclear Information System (INIS)

    Schroeder, J.A.; Eide, S.A.

    1993-01-01

    This paper presents some recommended generic values for fire protection system inadvertent actuation frequencies. The frequencies are based on actual data from Department of Energy and commercial reactor plant facilities

  6. Intruder level and deformation in SD-pair shell model

    International Nuclear Information System (INIS)

    Luo Yan'an; Ning Pingzhi; Pan Feng

    2004-01-01

    The influence of intruder level on nuclear deformation is studied within the framework of the nucleon-pair shell model truncated to an SD-pair subspace. The results suggest that the intruder level has a tendency to reduce the deformation and plays an important role in determining the onset of rotational behavior. (authors)

  7. Design and Implementation of an Embedded Smart Intruder Surveillance System

    Directory of Open Access Journals (Sweden)

    Sabri Naseer

    2018-01-01

    Full Text Available Remote and scattered valuable and sensitive locations such as labs and offices inside university campus need efficient monitoring and warning system. As well as scattered area and belonging. This research presents a Real-Time intruder Surveillance System based on a single board computer (SBC. Thus the design and development of a cost effective surveillance management system based SBC that can be deployed efficiently in remote and scattered locations such as universities belonging. The fusion of embedded Python codes with SBC that attached to cameras, Long distance sensors, alerting circuitry and wireless module presents a novel integration based effective cost solution and enhances SBC of much flexibility of improvement and development for pervasive remote locations. The system proves the high integrity of smooth working with web application, it’s cost effective and thus can be deployed as many of units to seize and concisely covered remote and scattered area as well as university belonging and departments. The system can be administrated by a remote user sparsely or geographically away from any networked workstation. The proposed solution offers efficient stand alone, flexibility to upgrade and cheap development and installation as well as cost effective ubiquitous surveillance solution. In conclusion, the system acceptable boundaries of successful intruder recognition and warning alert are computed between 1m and 3m distance of intruder from system camera. Recognition rate of 95% and 83% are achieved and the successful warning alert were in the range of 86-97%.

  8. Compensated intruder-detection systems

    Science.gov (United States)

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  9. Pulling an intruder from a granular material: a novel depinning experiment

    Directory of Open Access Journals (Sweden)

    Zhang Yue

    2017-01-01

    Full Text Available Two-dimensional impact experiments by Clark et al. [2] identified the source of inertial drag to be caused by ‘collisions’ with a latent force network, leading to large fluctuations of the force experienced by the impactor. These collisions provided the major drag on an impacting intruder until the intruder was nearly at rest. As a complement, we consider controlled pull-out experiments where a buried intruder is pulled out of a material, starting from rest. This provides a means to better understand the non-inertial part of the drag force, and to explore the mechanisms associated with the force fluctuations. To some extent, the pull out process is a time reversed version of the impact process. In order to visualize this pulling process, we use 2D photoelastic disks from which circular intruders of different radii are pulled out. We present results about the dynamics of the intruder and the structures of the force chains inside the granular system as captured by slow and high speed imaging.

  10. Managing Inadvertent Arterial Catheterization During Central Venous Access Procedures

    International Nuclear Information System (INIS)

    Nicholson, Tony; Ettles, Duncan; Robinson, Graham

    2004-01-01

    Purpose: Approximately 200,000 central venous catheterizations are carried out annually in the National Health Service in the United Kingdom. Inadvertent arterial puncture occurs in up to 3.7%. Significant morbidity and death has been reported. We report on our experience in the endovascular treatment of this iatrogenic complication. Methods: Retrospective analysis was carried out of 9 cases referred for endovascular treatment of inadvertent arterial puncture during central venous catheterization over a 5 year period. Results: It was not possible to obtain accurate figures on the numbers of central venous catheterizations carried out during the time period. Five patients were referred with carotid or subclavian pseudoaneurysms and hemothorax following inadvertent arterial catheter insertion and subsequent removal. These patients all underwent percutaneous balloon tamponade and/or stent-graft insertion. More recently 4 patients were referred with the catheter still in situ and were successfully treated with a percutaneous closure device. Conclusion: If inadvertent arterial catheterization during central venous access procedures is recognized and catheters removed, sequelae can be treated percutaneously. However, once the complication is recognized it is better to leave the catheter in situ and seal the artery percutaneously with a closure device

  11. Optimizing the Configuration of Sensor Networks to Detect Intruders.

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Nathanael J. K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nozick, Linda Karen [Cornell Univ., Ithaca, NY (United States); Xu, Ningxiong [Cornell Univ., Ithaca, NY (United States)

    2015-03-01

    This paper focuses on optimizing the selection and configuration of detection technologies to protect a target of interest. The ability of an intruder to simply reach the target is assumed to be sufficient to consider the security system a failure. To address this problem, we develop a game theoretic model of the strategic interactions between the system owner and a knowledgeable intruder. A decomposition-based exact method is used to solve the resultant model.

  12. Description of intruded states in a weak-coupling basis

    International Nuclear Information System (INIS)

    Arenas Peris, G.E.

    1989-01-01

    The systematics of intruder states is described in terms of a particle-hole weak-coupling basis, the first-order correction being then reduced to the monopole component of the interaction. The necessary matrix elements can be obtained from experimental data by using a model-consistent method. Calculations are performed for intruder states in the lead region as well as for the Zr isotopes. The agreement with the experimental data is striking in both cases. (Author) [es

  13. Low Cost Night Vision System for Intruder Detection

    Science.gov (United States)

    Ng, Liang S.; Yusoff, Wan Azhar Wan; R, Dhinesh; Sak, J. S.

    2016-02-01

    The growth in production of Android devices has resulted in greater functionalities as well as lower costs. This has made previously more expensive systems such as night vision affordable for more businesses and end users. We designed and implemented robust and low cost night vision systems based on red-green-blue (RGB) colour histogram for a static camera as well as a camera on an unmanned aerial vehicle (UAV), using OpenCV library on Intel compatible notebook computers, running Ubuntu Linux operating system, with less than 8GB of RAM. They were tested against human intruders under low light conditions (indoor, outdoor, night time) and were shown to have successfully detected the intruders.

  14. Adaptive Neuro-Fuzzy Determination of the Effect of Experimental Parameters on Vehicle Agent Speed Relative to Vehicle Intruder.

    Directory of Open Access Journals (Sweden)

    Shahaboddin Shamshirband

    Full Text Available Intelligent Transportation Systems rely on understanding, predicting and affecting the interactions between vehicles. The goal of this paper is to choose a small subset from the larger set so that the resulting regression model is simple, yet have good predictive ability for Vehicle agent speed relative to Vehicle intruder. The method of ANFIS (adaptive neuro fuzzy inference system was applied to the data resulting from these measurements. The ANFIS process for variable selection was implemented in order to detect the predominant variables affecting the prediction of agent speed relative to intruder. This process includes several ways to discover a subset of the total set of recorded parameters, showing good predictive capability. The ANFIS network was used to perform a variable search. Then, it was used to determine how 9 parameters (Intruder Front sensors active (boolean, Intruder Rear sensors active (boolean, Agent Front sensors active (boolean, Agent Rear sensors active (boolean, RSSI signal intensity/strength (integer, Elapsed time (in seconds, Distance between Agent and Intruder (m, Angle of Agent relative to Intruder (angle between vehicles °, Altitude difference between Agent and Intruder (m influence prediction of agent speed relative to intruder. The results indicated that distance between Vehicle agent and Vehicle intruder (m and angle of Vehicle agent relative to Vehicle Intruder (angle between vehicles ° is the most influential parameters to Vehicle agent speed relative to Vehicle intruder.

  15. Adaptive Neuro-Fuzzy Determination of the Effect of Experimental Parameters on Vehicle Agent Speed Relative to Vehicle Intruder.

    Science.gov (United States)

    Shamshirband, Shahaboddin; Banjanovic-Mehmedovic, Lejla; Bosankic, Ivan; Kasapovic, Suad; Abdul Wahab, Ainuddin Wahid Bin

    2016-01-01

    Intelligent Transportation Systems rely on understanding, predicting and affecting the interactions between vehicles. The goal of this paper is to choose a small subset from the larger set so that the resulting regression model is simple, yet have good predictive ability for Vehicle agent speed relative to Vehicle intruder. The method of ANFIS (adaptive neuro fuzzy inference system) was applied to the data resulting from these measurements. The ANFIS process for variable selection was implemented in order to detect the predominant variables affecting the prediction of agent speed relative to intruder. This process includes several ways to discover a subset of the total set of recorded parameters, showing good predictive capability. The ANFIS network was used to perform a variable search. Then, it was used to determine how 9 parameters (Intruder Front sensors active (boolean), Intruder Rear sensors active (boolean), Agent Front sensors active (boolean), Agent Rear sensors active (boolean), RSSI signal intensity/strength (integer), Elapsed time (in seconds), Distance between Agent and Intruder (m), Angle of Agent relative to Intruder (angle between vehicles °), Altitude difference between Agent and Intruder (m)) influence prediction of agent speed relative to intruder. The results indicated that distance between Vehicle agent and Vehicle intruder (m) and angle of Vehicle agent relative to Vehicle Intruder (angle between vehicles °) is the most influential parameters to Vehicle agent speed relative to Vehicle intruder.

  16. The adverse effects of inadvertent intraoperative intravenous ...

    African Journals Online (AJOL)

    Inadvertent intravenous injection of 1% phenylephrine (10 mg) induced severe hypertension and tachycardia in a previously healthy female patient undergoing elective gynaecological surgery. This medical error was investigated using the criticalincident technique that is available in our department. This case report ...

  17. Ureteroscopic holmium laser cutting for inadvertently sutured drainage tube (report of five cases).

    Science.gov (United States)

    Gao, Xu; Lu, Xin; Ren, Shancheng; Xu, Chuanliang; Sun, Yinghao

    2008-07-01

    The aim of this paper is to report a simple solution for inadvertently sutured drainage tube after urological surgery and discuss the different managements according to different types of this embarrassing complication. From September 2001 to January 2007, five inadvertently sutured drainage tubes were treated with ureteroscopic holmium laser cutting for the suture. All drainage tubes were removed after the operation without other complications. Holmium laser cutting via ureteroscope is a simple solution for the embarrassing problem of inadvertently sutured drainage tube. It can save the patient from undergoing another open surgery.

  18. Unexpected alignment patterns in high-j intruder bands evidence for a strong residual neutron proton interaction?

    International Nuclear Information System (INIS)

    Wyss, R.; Johnson, A.; Royal Inst. of Tech., Stockholm

    1990-01-01

    The alignment of h 11/12 protons in νi 13/2 intruder bands in mass A = 130 region is investigated. The lack of a clear h 11/12 band crossing is compared with the alignment pattern of i 13/2 neutrons in πi 13/2 intruder bands in mass A = 180 region. The very smooth rise in angular momentum in the intruder bands is related to a possible neutron proton interaction between the single intruder orbital and the aligned two-quasiparticle configuration. 36 refs., 3 figs

  19. Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-10-01

    Full Text Available Given that entropy-based IT technology has been applied in homes, office buildings and elsewhere for IT security systems, diverse kinds of intelligent services are currently provided. In particular, IT security systems have become more robust and varied. However, access control systems still depend on tags held by building entrants. Since tags can be obtained by intruders, an approach to counter the disadvantages of tags is required. For example, it is possible to track the movement of tags in intelligent buildings in order to detect intruders. Therefore, each tag owner can be judged by analyzing the movements of their tags. This paper proposes a security approach based on the received signal strength indicators (RSSIs of beacon-based tags to detect intruders. The normal RSSI patterns of moving entrants are obtained and analyzed. Intruders can be detected when abnormal RSSIs are measured in comparison to normal RSSI patterns. In the experiments, one normal and one abnormal scenario are defined for collecting the RSSIs of a Bluetooth-based beacon in order to validate the proposed method. When the RSSIs of both scenarios are compared to pre-collected RSSIs, the RSSIs of the abnormal scenario are about 61% more different compared to the RSSIs of the normal scenario. Therefore, intruders in buildings can be detected by considering RSSI differences.

  20. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-05-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  1. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-12-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  2. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2003-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  3. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2003-05-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  4. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2002-09-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  5. Motion patterns and phase-transition of a defender-intruder problem and optimal interception strategy of the defender

    Science.gov (United States)

    Wang, Jiangliu; Li, Wei

    2015-10-01

    In this paper, we consider a defense-intrusion interaction, in which an intruder is attracted by a protected stationary target but repulsed by a defender; while the defender tries to move towards an appropriate interception position (IP) between the intruder and the target in order to intercept the intruder and expel the intruder away from the target as maximum as possible. Intuitionally, to keep the intruder further away, one may wonder that: is it a better strategy for the defender trying to approach the intruder as near as possible? Unexpectedly and interestingly enough, this is not always the case. We first introduce the flexibility for IP selection, then investigate the system dynamics and the stable motion patterns, and characterize the phase-transition surface for the motion patterns. We show that, the phase-transition surface just defines the optimal interception strategy of the defender for IP selection; and from the perspective of mobility of agents, the optimal strategy just depends on relative mobility of the two agents.

  6. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  7. Intelligent Machine Vision for Automated Fence Intruder Detection Using Self-organizing Map

    OpenAIRE

    Veldin A. Talorete Jr.; Sherwin A Guirnaldo

    2017-01-01

    This paper presents an intelligent machine vision for automated fence intruder detection. A series of still captured images that contain fence events using Internet Protocol cameras was used as input data to the system. Two classifiers were used; the first is to classify human posture and the second one will classify intruder location. The system classifiers were implemented using Self-Organizing Map after the implementation of several image segmentation processes. The human posture classifie...

  8. The Star Wars Kid and the Bedroom Intruder

    DEFF Research Database (Denmark)

    Christensen, Jørgen Riber

    2011-01-01

    Jørgen Riber Christensen's article Star Wars Kid and the Bedroom Intruder looks at how people may unexpectedly become icons of the Internet, through a transgression of the private sphere. Surveillance and celebrity is revealed to be bound together with a disciplinary effect, at the same time...

  9. Human intrusion into geologic repositories for high-level radioactive waste: potential and prevention

    Energy Technology Data Exchange (ETDEWEB)

    Cameron, F X [Nuclear Regulatory Commission, Washington, DC (USA). Office of Nuclear Regulatory Research

    1981-12-01

    Isolation of high-level radioactive waste over long periods of time requires protection not only from natural events and processes, but also from the deliberate or inadvertent activities of future societies. This paper evaluates the likelihood of inadvertent human intrusion due to the loss of societal memory of the repository site. In addition measures to prevent inadvertent intrusion, and to guide future societies in any decision to deliberately intrude into the repository are suggested.

  10. Lift on side by side intruders of various geometries within a granular flow

    Science.gov (United States)

    Acevedo-Escalante, M. F.; Caballero-Robledo, G. A.

    2017-06-01

    Obstacles within fluids have been widely used in engineering and in physics to study hydrodynamic interactions. In granular matter, objects within a granular flow have helped to understand fundamental features of drag and lift forces. In our group, we have studied numerically the flow mediated interaction between two static disks within a vertical granular flow in a two-dimensional container where the flow velocity and the distance between obstacles were varied. Attractive and repulsive forces were found depending on flow velocity and separation between intruders. The simulations evidenced a relationship between the average flow velocity in a specific section ahead of the obstacles and the attractive-repulsive lift. On the other hand, it was showed that the lift force on an object dragged within a granular medium depends on the shape of the intruder. Here we present experimental results of the interaction between two side-by-side intruders of different shapes within a vertical granular flow. We built a quasi-two-dimensional container in which we placed the intruders and using load cells we measured lift and drag forces during the discharge process for different flow velocities.

  11. Towards a shell-model description of intruder states and the onset of deformation

    International Nuclear Information System (INIS)

    Heyde, K.; Van Isacker, P.; Casten, R.F.; Wood, J.L.

    1985-01-01

    Basing on the nuclear shell-model and concentrating on the monopole, pairing and quadrupole corrections originating from the nucleon-nucleon force, both the appearance of low-lying 0 + intruder states near major closed shells (Z = 50, 82) and sub-shell regions (Z = 40, 64) can be described. Moreover, a number of new facets related to the study of intruder states are presented. 19 refs., 3 figs

  12. Probability of inadvertent operation of electrical components in harsh environments

    International Nuclear Information System (INIS)

    Knoll, A.

    1989-01-01

    Harsh environment, which means humidity and high temperature, may and will affect unsealed electrical components by causing leakage ground currents in ungrounded direct current systems. The concern in a nuclear power plant is that such harsh environment conditions could cause inadvertent operation of normally deenergized components, which may have a safety-related isolation function. Harsh environment is a common cause failure, and one way to approach the problem is to assume that all the unsealed electrical components will simultaneously and inadvertently energize as a result of the environmental common cause failure. This assumption is unrealistically conservative. Test results indicated that insulating resistences of any terminal block in harsh environments have a random distribution in the range of 1 to 270 kΩ, with a mean value ∼59 kΩ. The objective of this paper is to evaluate a realistic conditional failure probability for inadvertent operation of electrical components in harsh environments. This value will be used thereafter in probabilistic safety evaluations of harsh environment events and will replace both the overconservative common cause probability of 1 and the random failure probability used for mild environments

  13. Deformed intruders and the onset of deformation at N=20 far from stability

    International Nuclear Information System (INIS)

    Poves, A.; Retamosa, J.

    1991-01-01

    Intruder states, built up of 2p-2h excitations are shown to exhibit rotational features. The combined effects of the reduction of the energy gap between major shells occurring far from stability, and the correlation energy of the valence nucleons, make the intruders dominant in the low energy spectrum of several nuclei. Many experimental puzzles may be solved in this way. (G.P.) 17 refs.; 10 figs

  14. Analysis of inadvertent containment spray actuation for NPP Krsko

    International Nuclear Information System (INIS)

    Grgic, D.; Spalj, S.; Fancev, T.

    2000-01-01

    Refueling Water Storage Tank (RWST) supplies borated water to the Chemical and Volume Control System, Emergency Core Cooling System and Containment Spray System. In the analyses of the containment external pressure the spray temperature is assumed to be equal to the RWST lower temperature limit. This value ensures that the design negative containment pressure will not be exceeded in the event of inadvertent actuation of the Containment Spray. For NPP Kriko the negative containment pressure has to be kept below 0.1 kp/cm2 to avoid the loss of containment integrity. This paper pursuents the analysis of Inadvertent Containment Spray Actuation in order to check the influence of change in RWST water temperature on containment negative pressure. GOTHIC computer code was used for calculation of containment thermal hydraulic behavior during this accident. (author)

  15. Preventing Inadvertent Placement of Foley Catheter into Prostatic ...

    African Journals Online (AJOL)

    Percutaneous suprapubic trocar cystostomy (SPC) is often needed to drain the bladder when urethral catheterization either fails or is not advisable.[1] It is ... vertical or slightly tilting its tip toward umbilicus during foley placement, prevents the inadvertent migration of catheter into prostatic urethra and further complications.

  16. Implementation of coordinated global serotype 2 oral poliovirus vaccine cessation: risks of inadvertent trivalent oral poliovirus vaccine use.

    Science.gov (United States)

    Duintjer Tebbens, Radboud J; Hampton, Lee M; Thompson, Kimberly M

    2016-06-01

    The endgame for polio eradication includes coordinated global cessation of oral poliovirus vaccine (OPV), starting with the cessation of vaccine containing OPV serotype 2 (OPV2) by switching all trivalent OPV (tOPV) to bivalent OPV (bOPV). The logistics associated with this global switch represent a significant undertaking, with some possibility of inadvertent tOPV use after the switch. We used a previously developed poliovirus transmission and OPV evolution model to explore the relationships between the extent of inadvertent tOPV use, the time after the switch of the inadvertent tOPV use and corresponding population immunity to serotype 2 poliovirus transmission, and the ability of the inadvertently introduced viruses to cause a serotype 2 circulating vaccine-derived poliovirus (cVDPV2) outbreak in a hypothetical population. We then estimated the minimum time until inadvertent tOPV use in a supplemental immunization activity (SIA) or in routine immunization (RI) can lead to a cVDPV2 outbreak in realistic populations with properties like those of northern India, northern Pakistan and Afghanistan, northern Nigeria, and Ukraine. At low levels of inadvertent tOPV use, the minimum time after the switch for the inadvertent use to cause a cVDPV2 outbreak decreases sharply with increasing proportions of children inadvertently receiving tOPV. The minimum times until inadvertent tOPV use in an SIA or in RI can lead to a cVDPV2 outbreak varies widely among populations, with higher basic reproduction numbers, lower tOPV-induced population immunity to serotype 2 poliovirus transmission prior to the switch, and a lower proportion of transmission occurring via the oropharyngeal route all resulting in shorter times. In populations with the lowest expected immunity to serotype 2 poliovirus transmission after the switch, inadvertent tOPV use in an SIA leads to a cVDPV2 outbreak if it occurs as soon as 9 months after the switch with 0.5 % of children aged 0-4 years inadvertently

  17. Friction force regimes and the conditions for endless penetration of an intruder into a granular medium.

    Science.gov (United States)

    López-Rodríguez, L A; Pacheco-Vázquez, F

    2017-09-01

    An intruder penetrating into a granular column experiences a depth-dependent friction force F(z). Different regimes of F(z) have been measured depending on the experimental design: a nearly linear dependence for shallow penetrations, total saturation at large depths, and an exponential increase when the intruder approaches the bottom of the granular bed. We report here an experiment that allows us to measure the different regimes in a single run during the quasistatic descent of a sphere in a light granular medium. From the analysis of the resistance in the saturation zone, it was found that F(z) follows a cube-power-law dependence on the intruder diameter and an exponential increase with the packing fraction of the bed. Moreover, we determine the critical mass m_{c} required to observe infinite penetration and its dependence on the above parameters. Finally, we use our results to estimate the final penetration depth reached by intruders of masses mintruder of any density (larger than the density of the granular bed) can sink indefinitely into the granular medium if the bed packing fraction is smaller than a critical value.

  18. Equivalence of the spherical and deformed shell-model approach to intruder states

    International Nuclear Information System (INIS)

    Heyde, K.; Coster, C. de; Ryckebusch, J.; Waroquier, M.

    1989-01-01

    We point out that the description of intruder states, incorporating particle-hole (p-h) excitation across a closed shell in the spherical shell model or a description starting from the Nilsson model are equivalent. We furthermore indicate that the major part of the nucleon-nucleon interaction, responsible for the low excitation energy of intruder states comes as a two-body proton-neutron quadrupole interaction in the spherical shell model. In the deformed shell model, quadrupole binding energy is gained mainly through the one-body part of the potential. (orig.)

  19. Cyclodialysis cleft with late hypotony maculopathy after inadvertent cannula detachment during cataract surgery.

    Science.gov (United States)

    Kahawita, Shyalle; Cugati, Sudha; Casson, Robert

    2015-05-01

    We present the case of a 69-year-old woman who presented with hypotony several years after an inadvertent cannula detachment presumably formed a cyclodialysis cleft during phacoemulsification cataract extraction and posterior chamber intraocular lens implantation in her right eye. To our knowledge, this is the first report of late hypotony maculopathy as a result of inadvertent cannula release. Crown Copyright © 2015. Published by Elsevier Inc. All rights reserved.

  20. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  1. Closure Using a Surgical Closure Device of Inadvertent Subclavian Artery Punctures During Central Venous Catheter Placement

    International Nuclear Information System (INIS)

    Berlet, Matthew H.; Steffen, Diana; Shaughness, George; Hanner, James

    2001-01-01

    Severe complications can and do occur when central venous catheters are inadvertently placed into subclavian arteries. Two cases are discussed that describe how these inadvertent arterial punctures can be closed using the Perclose device (Abbott Laboratories, Redwood City, CA, USA)

  2. Mitigating Inadvertent Insider Threats with Incentives

    Science.gov (United States)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  3. Inadvertent presence of genetically modified elements in maize food ...

    African Journals Online (AJOL)

    Kenya has a biosafety law and has tested genetically modified (GM) maize under confinement and containment, but has neither released nor commercialized any GM crop. This study assessed various maize food products from the Kenyan farms and markets for the inadvertent presence of GMOs. It assessed the possibility ...

  4. Beverage can stay-tabs: still a source for inadvertently ingested foreign bodies in children

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, Lane F. [Cincinnati Children' s Hospital Medical Center, Department of Radiology, MLC 5031, Cincinnati, OH (United States); University of Cincinnati, College of Medicine, Departments of Radiology and Pediatrics, Cincinnati, OH (United States)

    2010-09-15

    In the 1970s in part to avoid inadvertent ingestion, the beverage-can industry changed can construction from pull-tabs to the stay-tabs (remain attached to can after opening) used today. Our purpose is to identify the number of inadvertent ingestions of beverage-can stay-tabs by children recognized at our institution. The medical information system of a children's hospital was searched with key terms to identify cases in which a witnessed or self-reported inadvertent ingestion of a beverage-can stay-tab resulted in a radiograph to rule out presence of a foreign body. Demographics, identification of stay-tab on radiographs, associated abnormalities, and patient management were reviewed. Nineteen cases of stay-tab ingestion were identified over 16 years. Mean age of ingesters was 8.5 years with the majority being teenagers and 15 (79%) >5 years of age. The stay-tab could be seen radiographically only in 4 (21%) cases - all with the stay-tab identified in the stomach. The identification of 19 children who inadvertently ingested beverage-can stay-tabs at a single children's hospital suggests that such ingestions still occur. Radiologists should be aware that stay-tabs are radiographically visible in the minority (21%) of cases. (orig.)

  5. Beverage can stay-tabs: still a source for inadvertently ingested foreign bodies in children

    International Nuclear Information System (INIS)

    Donnelly, Lane F.

    2010-01-01

    In the 1970s in part to avoid inadvertent ingestion, the beverage-can industry changed can construction from pull-tabs to the stay-tabs (remain attached to can after opening) used today. Our purpose is to identify the number of inadvertent ingestions of beverage-can stay-tabs by children recognized at our institution. The medical information system of a children's hospital was searched with key terms to identify cases in which a witnessed or self-reported inadvertent ingestion of a beverage-can stay-tab resulted in a radiograph to rule out presence of a foreign body. Demographics, identification of stay-tab on radiographs, associated abnormalities, and patient management were reviewed. Nineteen cases of stay-tab ingestion were identified over 16 years. Mean age of ingesters was 8.5 years with the majority being teenagers and 15 (79%) >5 years of age. The stay-tab could be seen radiographically only in 4 (21%) cases - all with the stay-tab identified in the stomach. The identification of 19 children who inadvertently ingested beverage-can stay-tabs at a single children's hospital suggests that such ingestions still occur. Radiologists should be aware that stay-tabs are radiographically visible in the minority (21%) of cases. (orig.)

  6. Intruder states, coexistence, and approaches to deformation: The study of 120Xe and the N = 66 isotones

    International Nuclear Information System (INIS)

    Mantica, P.F. Jr.; Zimmerman, B.E.; Ford, C.E.; Walters, W.B.; Rikovska, J.; Stone, N.J.

    1989-01-01

    In this chapter, new results of γ-ray and conversion-electron spectroscopic studies of the structure of 119,121 Te and 126,127 Xe will be reported. These results will be described along with the results of previous studies of intruder structures in the Te and Xe mass region. The observed structures will be contrasted with other intruder structure identified in the Sn, Cd, and Pd isotopes. Results of IBM mixing calculations will be shown for the even-even Te nuclides. The role of intruder structures in the development of nuclear deformation will be discussed. 52 refs., 8 figs., 1 tab

  7. Intruder bands in odd-A {sup 109-115}Sb

    Energy Technology Data Exchange (ETDEWEB)

    Janzen, V P [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; [McMaster Univ., Hamilton, ON (Canada). Dept. of Physics; Andrews, H R; Galindo-Uribarri, A; Radford, D C; Ward, D [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; Omar, A; Mullins, S; Persson, L; Prevost, D; Rodriguez, J; Sawicki, M; Unrau, P; Waddington, J C [McMaster Univ., Hamilton, ON (Canada). Dept. of Physics; Drake, T E; Zwartz, G [Toronto Univ., ON (Canada). Dept. of Physics; Fossan, D B; Lafosse, D R; Hughes, J R; Schnare, H; Timmers, H; Vaska, P [State Univ. of New York, Stony Brook, NY (United States). Dept. of Physics; Haas, B [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; [Strasbourg-1 Univ., 67 (France). Centre de Recherches Nucleaires; Paul, E S; Wilson, J [Liverpool Univ. (United Kingdom). Oliver Lodge Lab.; Pilotte, S [Ottawa Univ., ON (Canada). Dept. of Physics; Wadsworth, R [York Univ. (United Kingdom). Dept. of Physics; Wyss, R [Joint Inst. for Heavy Ion Research, Oak Ridge, TN (United States)

    1992-08-01

    The existence of rotational structures in nuclei bordering on the spherical Z= 50 closed shell has been known for some time. Nevertheless, our understanding of collective effects in this region is remarkably incomplete; for example, before this work little high-spin data existed and there were no lifetime measurements to confirm the collectivity associated with the rotational bands observed in Sb (Z = 51) and Sn (Z = 50) nuclei. Furthermore, the role of the h{sub 11/2} orbital was virtually unknown, although it has the highest angular momentum of the orbitals in this mass region and therefore is expected to have the most influence on the properties of high-spin states. In the A {approx} 130 and A {approx} 180 mass regions, where highly deformed intruder bands have been observed, it is the neutron i{sub 13/2} orbitals, respectively, which are preferentially lowered in energy by a combination of large deformation and fast rotation In lighter nuclei the h{sub 11/2} orbital is expected to appear as an intruder configuration. (author). 11 refs., 1 tab., 4 figs.

  8. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2002-09-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  9. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  10. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2002-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  11. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2003-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  12. Optimal Randomized Surveillance Patterns to Detect Intruders Approaching a Military Installation

    National Research Council Canada - National Science Library

    McLemore, Trevor D

    2007-01-01

    .... The intruder attempts to penetrate the military installation by choosing one of its many entry points, each of which is monitored by a surveillance camera and may require a different amount of time to transit...

  13. Inadvertent intrathecal injection of labetalol in a patient undergoing post-partum tubal ligation.

    Science.gov (United States)

    Balestrieri, P J; Hamza, M S; Ting, P H; Blank, R S; Grubb, C T

    2005-10-01

    After receiving a continuous spinal anesthetic for labor following an inadvertent dural puncture with a 17-gauge epidural needle, a morbidly obese parturient underwent post-partum tubal ligation 12 h after vaginal delivery. The patient received a total of 2 mL of 0.75% hyperbaric bupivacaine for the surgery. In response to moderate hypertension the patient received intravenous labetalol hydrochloride 20 mg. She subsequently was inadvertently administered approximately 15 mg of labetalol through the spinal catheter. The spinal catheter was removed immediately after the procedure. She suffered no apparent adverse neurologic effects.

  14. An i{sub 13/2} neutron intruder band in {sup 141}Gd

    Energy Technology Data Exchange (ETDEWEB)

    Mullins, S M; Omar, A; Persson, L; Prevost, D; Waddington, J C [McMaster Univ., Hamilton, ON (Canada); Andrews, H R; Ball, G C; Galindo-Uribarri, A; Janzen, V P; Radford, D C; Ward, D [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; Drake, T E [Toronto Univ., ON (Canada). Dept. of Physics; Fossan, D B; Lafosse, D; Vaska, P; Waring, M [State Univ. of New York, Stony Brook, NY (United States). Dept. of Physics; Wadsworth, R [York Univ. (United Kingdom). Dept. of Physics

    1992-08-01

    The nucleus {sup 141}Gd has been investigated at high spins for the first time following the reactions {sup 112}Sn({sup 32}S,2pn){sup 141}Gd at 155 MeV and {sup 112}Sn({sup 33}S,2p2n){sup 141}Gd at 170 MeV. The methods of in-beam {gamma}-ray spectroscopy were used to establish a number of different structures, including a band which has been assigned as being based on the {nu}i{sub 13/2}[660]1/2{sup +} Nilsson intruder orbital. This is the heaviest nucleus thus far in which this type of intruder band has been identified. (author). 11 refs., 3 figs.

  15. Late-Onset Inadvertent Bleb Formation following Pars Plana M3 Molteno Implant Tube Obstruction

    Directory of Open Access Journals (Sweden)

    Anmar M. Abdul-Rahman

    2017-01-01

    Full Text Available Purpose: To report a case of inadvertent bleb formation presenting 18 months after pars plana M3 Molteno implant tube obstruction in a patient with mixed mechanism glaucoma. Materials and Methods: An 84-year-old Caucasian male with mixed mechanism glaucoma underwent slit-lamp examination, gonioscopy, colour anterior segment photography and anterior segment optical coherence tomography (AS-OCT. Results: An inadvertent bleb developed 18 months after pars plana implant tube re-positioning with a 6/0 Vicryl tie ligature. The bleb was located in the area anterior to the implant plate; it was characterised by a thin, transparent, avascular and multi-cystic wall, with a visible stoma at the posterior edge of the bleb. The bleb was functioning as demonstrated by an intraocular pressure of 6 mm Hg at presentation and a punctate fluorescein uptake pattern of the bleb wall. The bleb over the plate of the Molteno implant was non-functioning, likely secondary to tube obstruction by vitreous in the early postoperative period. AS-OCT showed a tract from the anterior chamber commencing at an entry wound through a corneal tunnel to the posterior stoma at the base of the inadvertent bleb. Conclusions: We hypothesise that the pathophysiologic factors resulting in an inadvertent bleb are a result of a combination of apoptosis, late-onset wound dehiscence and internal gaping of a centrally placed corneal wound. In addition, aqueous hydrodynamic factors may play a role.

  16. Restoration of an intruded maxillary central incisor with a uniquely designed dowel and core restoration: a case report.

    Science.gov (United States)

    Polat, Zelal Seyfioğlu; Tacir, Ibrahim Halil

    2007-01-01

    This article describes the restoration of an intruded root using a custom-made metal dowel and metal-ceramic veneer core restoration. The treatment plan for this patient consisted of restoring the missing esthetics and eliminating psychological trauma by utilizing the root of the intruded maxillary left central incisor to replace both missing central incisor crowns. This treatment will preserve space and bone until the patient is old enough for another prosthodontic restoration to be considered. As the lost fragments were not recovered, we considered this restoration of the intruded root to be the best therapeutic option, considering the effect on the patient's psyche. The patient was satisfied with the final result.

  17. Automated electronic intruder simulator for evaluation of odd frequency microwave detectors

    International Nuclear Information System (INIS)

    1979-01-01

    A microwave intruder simulator for testing motion detection sensors is described. This simulator can be used to evaluate a variety of microwave sensors regardless of the value of the center frequency of the signal utilized. Representative curves from the evaluation of one microwave sensor are also presented

  18. Intentional and inadvertent non-adherence in adult coeliac disease. A cross-sectional survey.

    Science.gov (United States)

    Hall, Nicola J; Rubin, Gregory P; Charnock, Anne

    2013-09-01

    Adherence to a gluten-free diet is the mainstay of treatment for coeliac disease. Non-adherence is common as the diet is restrictive and can be difficult to follow. This study aimed to determine the rates of intentional and inadvertent non-adherence in adult coeliac disease and to examine the factors associated with both. A self-completion questionnaire was mailed to adult coeliac patients identified from the computer records of 31 family practices within the North East of England. We received 287 responses after one reminder. Intentional gluten consumption was reported by 115 (40%) of respondents. 155 (54%) had made at least one known mistaken lapse over the same period and 82 (29%) reported neither intentional nor mistaken gluten consumption. Using logistic regression analysis, low self-efficacy, perceptions of tolerance to gluten and intention were found to be independently predictive of intentional gluten consumption. A statistical model predicted 71.8% of cases reporting intentional lapses. Intentional non-adherence to the GFD was found to be common but not as frequent as inadvertent lapses. Distinguishing the factors influencing both intentional and inadvertent non-adherence is useful in understanding dietary self-management in coeliac disease. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. Sexual aggression by intruders in hooded crow Corvus cornix

    OpenAIRE

    Zduniak, Piotr; Kosicki, Jakub Z.; Yosef, Reuven

    2015-01-01

    The hooded crow Corvus cornix is a west Palaearctic, solitary nesting, monogamous corvid. In the breeding season, populations are characterized by a social organization wherein breeding pairs are territorial and non-breeding individuals, called floaters, live in flocks. During a study of the breeding ecology of the hooded crow, conducted in a protected flooded area, we monitored nests with video cameras. We recorded two separate incidents when intruders attacked a female at the nest. We belie...

  20. Identification of low-lying proton-based intruder states in 189-193Pb

    International Nuclear Information System (INIS)

    Vel, K. van de; Andreyev, A.N.; Huyse, M.; Duppen, P. van; Cocks, J.F.C.; Dorvaux, O.; Greenlees, P.T.; Helariutta, K.; Jones, P.; Julin, R.; Juutinen, S.; Kettunen, H.; Kuusiniemi, P.; Leino, M.; Muikku, M.; Nieminen, P.; Eskola, K.; Wyss, R.

    2002-01-01

    Low-lying proton-based intruder states have been observed in the odd-mass isotopes 189,191,193 Pb in experiments at the RITU gas-filled recoil separator. The identification has been performed by observing the fine structure in the α decay of the parent 193,195,197 Po nuclei in prompt coincidence with conversion electrons and γ rays in the daughter lead isotopes. Along with the literature data these results establish a systematics of intruder states in the odd-mass lead isotopes from 197 Pb down to 185 Pb. Interpretation of these states involves the coupling of the 1i 13/2 or 3p 3/2 odd neutron to the 0 + state in the oblate minimum in the even-mass lead core. Conversion coefficients have been determined for some of the transitions, revealing mixing between the coexisting states. The experimental results are compared to potential energy surface calculations

  1. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Science.gov (United States)

    Sequeira, Ana F.; Cardoso, Jaime S.

    2015-01-01

    Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system. PMID:26102491

  2. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Directory of Open Access Journals (Sweden)

    Ana F. Sequeira

    2015-06-01

    Full Text Available Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.

  3. Localization Capability of Cooperative Anti-Intruder Radar Systems

    Directory of Open Access Journals (Sweden)

    Mauro Montanari

    2008-06-01

    Full Text Available System aspects of an anti-intruder multistatic radar based on impulse radio ultrawideband (UWB technology are addressed. The investigated system is composed of one transmitting node and at least three receiving nodes, positioned in the surveillance area with the aim of detecting and locating a human intruder (target that moves inside the area. Such systems, referred to also as UWB radar sensor networks, must satisfy severe power constraints worldwide imposed by, for example, the Federal Communications Commission (FCC and by the European Commission (EC power spectral density masks. A single transmitter-receiver pair (bistatic radar is considered at first. Given the available transmitted power and the capability of the receiving node to resolve the UWB pulses in the time domain, the surveillance area regions where the target is detectable, and those where it is not, are obtained. Moreover, the range estimation error for the transmitter-receiver pair is discussed. By employing this analysis, a multistatic system is then considered, composed of one transmitter and three or four cooperating receivers. For this multistatic system, the impact of the nodes location on area coverage, necessary transmitted power and localization uncertainty is studied, assuming a circular surveillance area. It is highlighted how area coverage and transmitted power, on one side, and localization uncertainty, on the other side, require opposite criteria of nodes placement. Consequently, the need for a system compromising between these factors is shown. Finally, a simple and effective criterion for placing the transmitter and the receivers is drawn.

  4. Intruder bands in Z = 51 nuclei

    International Nuclear Information System (INIS)

    LaFosse, D.R.

    1993-01-01

    Recent investigations of h 11/2 proton intruder bands in odd 51 Sb nuclei are reported. In addition to experiments performed at SUNY Stony Brook and Chalk River, data from Early Implementation of GAMMASPHERE (analysis in progress) are presented. In particular, the nuclei 109 Sb and 111 Sb are discussed. Rotational bands based on the πh 11/2 orbital coupled to a 2p2h deformed state of the 50 Sn core have been observed. These bands have been observed to high spin, and in the case of 109 Sb to a rotational frequency of 1.4 MeV, the highest frequency observed in a heavy nucleus. The dynamic moments of inertia in these bands decrease slowly with frequency, suggesting a gradual band termination. The systematics of such bands in 109-119 Sb will be discussed

  5. Intruder states in the cadmium isotopes and a simple schematic calculation

    International Nuclear Information System (INIS)

    Aprahamian, A.; Brenner, D.S.; Casten, R.F.; Heyde, K.

    1984-01-01

    Angular correlation studies of 118 120 Cd at TRISTAN have allowed the discovery and identification in each nucleus of two new 0 + states and their respective E2 decay properties. The results have been interpreted in terms of a simple schematic model based on the mixing of normal vibration-like and intruder rotation-like 2p-4h configurations

  6. Anabolic agents: recent strategies for their detection and protection from inadvertent doping

    Science.gov (United States)

    Geyer, Hans; Schänzer, Wilhelm; Thevis, Mario

    2014-01-01

    According to the World Anti-Doping Agency (WADA) Prohibited List, anabolic agents consist of exogenous anabolic androgenic steroids (AAS), endogenous AAS and other anabolic agents such as clenbuterol and selective androgen receptor modulators (SARMs). Currently employed strategies for their improved detection include the prolongation of the detection windows for exogenous AAS, non-targeted and indirect analytical approaches for the detection of modified steroids (designer steroids), the athlete’s biological passport and isotope ratio mass spectrometry for the detection of the misuse of endogenous AAS, as well as preventive doping research for the detection of SARMs. The recent use of these strategies led to 4–80-fold increases of adverse analytical findings for exogenous AAS, to the detection of the misuse of new designer steroids, to adverse analytical findings of different endogenous AAS and to the first adverse analytical findings of SARMs. The strategies of the antidoping research are not only focused on the development of methods to catch the cheating athlete but also to protect the clean athlete from inadvertent doping. Within the past few years several sources of inadvertent doping with anabolic agents have been identified. Among these are nutritional supplements adulterated with AAS, meat products contaminated with clenbuterol, mycotoxin (zearalenone) contamination leading to zeranol findings, and natural products containing endogenous AAS. The protection strategy consists of further investigations in case of reasonable suspicion of inadvertent doping, publication of the results, education of athletes and development of methods to differentiate between intentional and unintentional doping. PMID:24632537

  7. Attention and Facilitation: Converging Information Versus Inadvertent Reading in Stroop Task Performance

    NARCIS (Netherlands)

    Roelofs, A.P.A.

    2010-01-01

    Disagreement exists about whether color-word Stroop facilitation is caused by converging information (e.g.. Cohen et al.. 1990: Roelofs, 2003) or inadvertent reading (MacLeod & MacDonald, 2000). Four experiments tested between these hypotheses by examining Stroop effects oil response time (RT) both

  8. Effect of intruder mass on collisions with hard binaries. II - Dependence on impact parameter and computations of the interaction cross sections

    Science.gov (United States)

    Hills, J. G.

    1992-06-01

    Over 125,000 encounters between a hard binary with equal mass, components and orbital eccentricity of 0, and intruders with solar masses ranging from 0.01 to 10,000 are simulated. Each encounter was followed up to a maximum of 5 x 10 exp 6 integration steps to allow long-term 'resonances', temporary trinary systems, to break into a binary and a single star. These simulations were done over a range of impact parameters to find the cross sections for various processes occurring in these encounters. A critical impact parameter found in these simulations is the one beyond which no exchange collisions can occur. The energy exchange between the binary and a massive intruder decreases greatly in collisions with Rmin of not less than Rc. The semimajor axes and orbital eccentricity of the surviving binary also drops rapidly at Rc in encounters with massive intruders. The formation of temporary trinary systems is important for all intruder masses.

  9. Consolidation of a WSN and Minimax method to rapidly neutralise intruders in strategic installations.

    Science.gov (United States)

    Conesa-Muñoz, Jesus; Ribeiro, Angela

    2012-01-01

    Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN). The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders' behaviour is inferred through sequences of sensors' activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final state of the intruders

  10. Resident intruder paradigm-induced aggression relieves depressive-like behaviors in male rats subjected to chronic mild stress

    Science.gov (United States)

    Wei, Sheng; Ji, Xiao-wei; Wu, Chun-ling; Li, Zi-fa; Sun, Peng; Wang, Jie-qiong; Zhao, Qi-tao; Gao, Jie; Guo, Ying-hui; Sun, Shi-guang; Qiao, Ming-qi

    2014-01-01

    Background Accumulating epidemiological evidence shows that life event stressors are major vulnerability factors for psychiatric diseases such as major depression. It is also well known that the resident intruder paradigm (RIP) results in aggressive behavior in male rats. However, it is not known how resident intruder paradigm-induced aggression affects depressive-like behavior in isolated male rats subjected to chronic mild stress (CMS), which is an animal model of depression. Material/Methods Male Wistar rats were divided into 3 groups: non-stressed controls, isolated rats subjected to the CMS protocol, and resident intruder paradigm-exposed rats subjected to the CMS protocol. Results In the sucrose intake test, ingestion of a 1% sucrose solution by rats in the CMS group was significantly lower than in control and CMS+RIP rats after 3 weeks of stress. In the open-field test, CMS rats had significantly lower open-field scores compared to control rats. Furthermore, the total scores given the CMS group were significantly lower than in the CMS+RIP rats. In the forced swimming test (FST), the immobility times of CMS rats were significantly longer than those of the control or CMS+RIP rats. However, no differences were observed between controls and CMS+RIP rats. Conclusions Our data show that aggressive behavior evoked by the resident intruder paradigm could relieve broad-spectrum depressive-like behaviors in isolated adult male rats subjected to CMS. PMID:24911067

  11. Oblate deformation and intruder configuration in 194,195Bi

    International Nuclear Information System (INIS)

    Mukherjee, G.; Banerjee, K.; Banerjee, S.R.; Basu, S.K.; Bhattacharya, C.; Bhattacharya, S.; Bhattacharya, Srijit; Bhattacharjee, T.; Chanda, S.; Dey, A.; Gupta, D.; Meena, J.K.; Mukhopadhyay, S.; Rana, T.K.; Bhattacharya, Sudeb; Ganguly, S.; Goswami, A.; Kshetri, R.; Pradhan, M.K.; Raut, R.; Dey, G.

    2006-01-01

    The experimental information on 194,195 Bi are very scarce compared to its neighbouring isotopes. Only 6 levels above the ground state band of 195 Bi, based on 9/2, are known with tentative spin parity assignments. Only two low energy gamma rays above the 10 isomeric state are known in 194 Bi. It is interesting not only to extend the presently known bands to higher spins, beyond band crossing but also to search for the intruder quasiparticle configurations to get a clear idea about the structure of these nuclei

  12. The resident-intruder paradigm : a standardized test for aggression, violence and social stress

    NARCIS (Netherlands)

    Koolhaas, Jacob; Coppens, Caroline M.; de Boer, Sietse F.; Buwalda, Bauke; Meerlo, Peter; Timmermans, Paul J. A.

    2013-01-01

    This video publication explains in detail the experimental protocol of the resident-intruder paradigm in rats. This test is a standardized method to measure offensive aggression and defensive behavior in a semi natural setting. The most important behavioral elements performed by the resident and the

  13. Attention and Facilitation: Converging Information versus Inadvertent Reading in Stroop Task Performance

    Science.gov (United States)

    Roelofs, Ardi

    2010-01-01

    Disagreement exists about whether color-word Stroop facilitation is caused by converging information (e.g., Cohen et al., 1990; Roelofs, 2003) or inadvertent reading (MacLeod & MacDonald, 2000). Four experiments tested between these hypotheses by examining Stroop effects on response time (RT) both within and between languages. Words cannot be…

  14. Measuring virgin female aggression in the female intruder test (FIT): effects of oxytocin, estrous cycle, and anxiety.

    Science.gov (United States)

    de Jong, Trynke R; Beiderbeck, Daniela I; Neumann, Inga D

    2014-01-01

    The costs of violence and aggression in our society have stimulated the scientific search for the predictors and causes of aggression. The majority of studies have focused on males, which are considered to be more aggressive than females in most species. However, rates of offensive behavior in girls and young women are considerable and are currently rising in Western society. The extrapolation of scientific results from males to young, non-maternal females is a priori limited, based on the profound sex differences in brain areas and functioning of neurotransmitters involved in aggression. Therefore, we established a paradigm to assess aggressive behavior in young virgin female rats, i.e. the female intruder test (FIT). We found that approximately 40% of un-manipulated adult (10-11 weeks old) female Wistar rats attack an intruder female during the FIT, independent of their estrous phase or that of their intruder. In addition, adolescent (7-8 weeks old) female rats selected for high anxiety behavior (HABs) displayed significantly more aggression than non-selected (NAB) or low-anxiety (LAB) rats. Intracerebroventricular infusion of oxytocin (OXT, 0.1 µg/5 µl) inhibited aggressive behavior in adult NAB and LAB, but not HAB females. Adolescent NAB rats that had been aggressive towards their intruder showed increased pERK immunoreactivity (IR) in the hypothalamic attack area and reduced pERK-IR in OXT neurons in the paraventricular hypothalamic nucleus compared to non-aggressive NAB rats. Taken together, aggressive behavior in young virgin female rats is partly dependent on trait anxiety, and appears to be under considerable OXT control.

  15. Measuring virgin female aggression in the female intruder test (FIT: effects of oxytocin, estrous cycle, and anxiety.

    Directory of Open Access Journals (Sweden)

    Trynke R de Jong

    Full Text Available The costs of violence and aggression in our society have stimulated the scientific search for the predictors and causes of aggression. The majority of studies have focused on males, which are considered to be more aggressive than females in most species. However, rates of offensive behavior in girls and young women are considerable and are currently rising in Western society. The extrapolation of scientific results from males to young, non-maternal females is a priori limited, based on the profound sex differences in brain areas and functioning of neurotransmitters involved in aggression. Therefore, we established a paradigm to assess aggressive behavior in young virgin female rats, i.e. the female intruder test (FIT. We found that approximately 40% of un-manipulated adult (10-11 weeks old female Wistar rats attack an intruder female during the FIT, independent of their estrous phase or that of their intruder. In addition, adolescent (7-8 weeks old female rats selected for high anxiety behavior (HABs displayed significantly more aggression than non-selected (NAB or low-anxiety (LAB rats. Intracerebroventricular infusion of oxytocin (OXT, 0.1 µg/5 µl inhibited aggressive behavior in adult NAB and LAB, but not HAB females. Adolescent NAB rats that had been aggressive towards their intruder showed increased pERK immunoreactivity (IR in the hypothalamic attack area and reduced pERK-IR in OXT neurons in the paraventricular hypothalamic nucleus compared to non-aggressive NAB rats. Taken together, aggressive behavior in young virgin female rats is partly dependent on trait anxiety, and appears to be under considerable OXT control.

  16. The availability of soil-associated radionuclides for uptake after inadvertent ingestion by humans

    International Nuclear Information System (INIS)

    Shaw, S.; Green, N.

    2002-01-01

    Assessments of the radiological impact of radionuclides released into the environment generally take into account the inadvertent ingestion of radionuclides associated with soil or sediment. Such assessments often assume that gut uptake factors for radionuclides that are biologically incorporated in food are also applicable when the ingested activity is associated with soil. Studies of the availability of soil-associated radionuclides after ingestion have been mainly conducted on ruminant animals and few data exist for humans. The digestive tract of ruminants is totally different from that of a mono-gastric animal and so the availability estimated from the animal studies may not be valid in the case of man. A simple in-vitro enzymolysis procedure was therefore developed to simulate human digestion closely. The measured availability of 137 Cs, 241 Am, 239 PU and 90 Sr associated with loam, sand and peat soils was about 3%, 3%, 10% and 50% respectively. (author)

  17. Inadvertent raising of levels in the FFTF primary sodium pumps. Final unusual occurrence report, HEDL 79-34 (FFTF-58)

    International Nuclear Information System (INIS)

    Kuechle, J.D.

    1981-01-01

    The final unusual occurrence report describes the inadvertent raising of the sodium level in the FFTF primary sodium pumps during system testing. This event is now judged to have caused permanent deformation of the primary pump shaft on loop 1 during a period when pump rotation was stopped and sodium level in the pump tank was inadvertently increased. The shaft was subsequently removed, straightened, and returned to service in the spare FFTF pump

  18. Evaluation of SPACE code for simulation of inadvertent opening of spray valve in Shin Kori unit 1

    International Nuclear Information System (INIS)

    Kim, Seyun; Youn, Bumsoo

    2013-01-01

    SPACE code is expected to be applied to the safety analysis for LOCA (Loss of Coolant Accident) and Non-LOCA scenarios. SPACE code solves two-fluid, three-field governing equations and programmed with C++ computer language using object-oriented concepts. To evaluate the analysis capability for the transient phenomena in the actual nuclear power plant, an inadvertent opening of spray valve in startup test phase of Shin Kori unit 1 was simulated with SPACE code. To evaluate the analysis capability for the transient phenomena in the actual nuclear power plant, an inadvertent opening of spray valve in startup test phase of Shin Kori unit 1 was simulated with SPACE code

  19. The uptake of radionuclides from inadvertent consumption of soil by grazing animals

    International Nuclear Information System (INIS)

    Green, N.; Dodd, N.J.

    1988-01-01

    Investigations of the transfer to man of artificially-produced radionuclides through food chains have shown that the inadvertent consumption of soil by grazing animals can give variations in estimates of transfer coefficients, especially for radionuclides that are poorly absorbed by plant roots. Even small masses of soil adhering to herbage or directly ingested can make a significant contribution to the intake inventory in terms of activity. Although the activity concentrations of soil-contaminated herbage are elevated, the radionuclides associated with the soil may not necessarily be in a form which is easily absorbed by the animal. Attempts must be made, therefore, to quantify soil intake and the subsequent radionuclide uptake by this mechanism. A field investigation of the uptake of radionuclides by farm animals grazing near the Sellafield nuclear reprocessing plant has been pursued. The aims of the study were to estimate the transfer to muscle and other tissues. This paper describes the methods used to estimate both the soil intake and the consequent availability of radionuclides associated with the soil. The measurements were used to evaluate the contribution to tissue content of inadvertent consumption of soil by cows and sheep. 10 refs.; 2 tabs

  20. Study of intruder band in 112Sn

    International Nuclear Information System (INIS)

    Ganguly, S.; Banerjee, P.; Ray, I.; Kshetri, R.; Raut, R.; Bhattacharya, S.; Saha-Sarkar, M.; Goswami, A.; Mukhopadhyay, S.; Mukherjee, A.; Mukherjee, G.; Basu, S.K.

    2007-01-01

    Excited states of the positive-parity intruder band in 112 Sn, populated in the 100 Mo( 20 Ne,α4n) reaction at a beam energy of 136 MeV, have been studied. The band has been observed up to 11570.0 keV with spin (24 + ). Mean lifetimes have been measured for six states up to the 22 + , 10335.1 keV level and an upper limit of the lifetime has been estimated for the 11570.0 keV (24 + ) state. The B(E2) values, derived from the present lifetime results, correspond to a moderate quadrupole deformation of β 2 ∼0.18 for states with spin J π >=12 + , and the decrease in B(E2) for the 14 + ->12 + transition is consistent with a ν(h 11/2 ) 2 alignment at ω∼0.35 MeV, predicted by a cranked shell-model calculation. Total Routhian surface calculations predict a triaxial shape following the alignment

  1. Machine learning approach to detect intruders in database based on hexplet data structure

    Directory of Open Access Journals (Sweden)

    Saad M. Darwish

    2016-09-01

    Full Text Available Most of valuable information resources for any organization are stored in the database; it is a serious subject to protect this information against intruders. However, conventional security mechanisms are not designed to detect anomalous actions of database users. An intrusion detection system (IDS, delivers an extra layer of security that cannot be guaranteed by built-in security tools, is the ideal solution to defend databases from intruders. This paper suggests an anomaly detection approach that summarizes the raw transactional SQL queries into a compact data structure called hexplet, which can model normal database access behavior (abstract the user's profile and recognize impostors specifically tailored for role-based access control (RBAC database system. This hexplet lets us to preserve the correlation among SQL statements in the same transaction by exploiting the information in the transaction-log entry with the aim to improve detection accuracy specially those inside the organization and behave strange behavior. The model utilizes naive Bayes classifier (NBC as the simplest supervised learning technique for creating profiles and evaluating the legitimacy of a transaction. Experimental results show the performance of the proposed model in the term of detection rate.

  2. Overview of a performance assessment methodology for low-level radioactive waste disposal facilities

    International Nuclear Information System (INIS)

    Kozak, M.W.; Chu, M.S.Y.

    1991-01-01

    A performance assessment methodology has been developed for use by the US Nuclear Regulatory Commission in evaluating license applications for low-level waste disposal facilities. This paper provides a summary and an overview of the modeling approaches selected for the methodology. The overview includes discussions of the philosophy and structure of the methodology. This performance assessment methodology is designed to provide the NRC with a tool for performing confirmatory analyses in support of license reviews related to postclosure performance. The methodology allows analyses of dose to individuals from off-site releases under normal conditions as well as on-site doses to inadvertent intruders. 24 refs., 1 tab

  3. Sexual aggression by intruders in hooded crow Corvus cornix.

    Science.gov (United States)

    Zduniak, Piotr; Kosicki, Jakub Z; Yosef, Reuven

    The hooded crow Corvus cornix is a west Palaearctic, solitary nesting, monogamous corvid. In the breeding season, populations are characterized by a social organization wherein breeding pairs are territorial and non-breeding individuals, called floaters, live in flocks. During a study of the breeding ecology of the hooded crow, conducted in a protected flooded area, we monitored nests with video cameras. We recorded two separate incidents when intruders attacked a female at the nest. We believe that she remained in the nest in order to prevent the strangers cannibalizing the nestlings by mantling over the brood. The spatio-temporal occurrence of these attacks suggests that the observed behaviour is intraspecific sexual aggression wherein non-breeding males mounted an immobilized female.

  4. Inadvertent Splenectomy During Resection for Colorectal Cancer Does Not Increase Long-term Mortality in a Propensity Score Model: A Nationwide Cohort Study.

    Science.gov (United States)

    Lolle, Ida; Pommergaard, Hans-Christian; Schefte, David F; Bulut, Orhan; Krarup, Peter-Martin; Rosenstock, Steffen J

    2016-12-01

    Previous studies suggest that long-term mortality is increased in patients who undergo splenectomy during surgery for colorectal cancer. The reason for this association remains unclear. The purpose of this study was to investigate the association between inadvertent splenectomy attributed to iatrogenic lesion to the spleen during colorectal cancer resections and long-term mortality in a national cohort of unselected patients. This was a retrospective, nationwide cohort study. Data were collected from the database of the Danish Colorectal Cancer Group and merged with data from the National Patient Registry and the National Pathology Databank. Danish patients with colorectal cancer undergoing curatively intended resection between 2001 and 2011 were included in the study. The primary outcome was long-term mortality for patients surviving 30 days after surgery. Secondary outcomes were 30-day mortality and risk factors for inadvertent splenectomy. Multivariable and propensity-score matched Cox regression analyses were used to adjust for potential confounding. In total, 23,727 patients were included, of which 277 (1.2%) underwent inadvertent splenectomy. There was no association between inadvertent splenectomy and long-term mortality (adjusted HR = 1.15 (95% CI, 0.95-1.40); p = 0.16) in the propensity score-matched model, whereas 30-day mortality was significantly increased (adjusted HR = 2.31 (95% CI, 1.71-3.11); p splenectomy was most often seen during left hemicolectomy (left hemicolectomy vs right hemicolectomy: OR = 24.76 (95% CI, 15.30-40.06); p splenectomy during resection for colorectal cancer does not seem to increase long-term mortality. The previously reported reduced overall survival after inadvertent splenectomy may be explained by excess mortality in the immediate postoperative period.

  5. A study of the management of 55 traumatically intruded permanent incisor teeth in children.

    LENUS (Irish Health Repository)

    Stewart, C

    2009-01-01

    These were to examine the main presenting, treatment and outcome factors for intruded permanent incisors in children, the effect of apical development and degree of intrusion on decisions on repositioning, the effect of apical development status on the maintenance of pulp vitality and the time of pulp extirpation and to compare the decisions made to the advice given in existing clinical guidelines.

  6. Consolidation of a WSN and Minimax Method to Rapidly Neutralise Intruders in Strategic Installations

    Directory of Open Access Journals (Sweden)

    Angela Ribeiro

    2012-03-01

    Full Text Available Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN. The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders’ behaviour is inferred through sequences of sensors’ activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final

  7. Intruders: New Neighbors in "Dawn of the Planet of the Apes" and "The Hundred-Foot Journey"

    Science.gov (United States)

    Beck, Bernard

    2015-01-01

    Conflicts over territory are about the power to establish dominant cultures in territories and are often accompanied by cultural claims to legitimacy by each side. The cultural claims, or ideologies, are often expressed in terms of "homeland" dwellers versus "intruders." Two recent movies, "Dawn of the Planet of the…

  8. Simultaneous spectroscopy of $\\gamma$- rays and conversion electrons: Systematic study of EO transitions and intruder states in close vicinity of mid-shell point in odd-Au isotopes

    CERN Multimedia

    Venhart, M; Grant, A F; Petrik, K

    This proposal focuses on detailed systematic studies of the $\\beta$ /EC-decays of $^{179,181,183,185}$Hg leading to excited states in the neutron-deficient Au isotopes in the vicinity of the N=104 midshell. $\\gamma$-ray, X-ray and conversion electron de-excitations of odd-A Au isotopes will be studied simultaneously. These studies will address important structural questions such as the excitation energies of coexisting states, properties of multiple intruder states (i.e. intruder particles coupled to intruder cores) and mixing of coexisting structures. The unique combination of Hg beam purity and yields make ISOLDE a unique facility for these experiments.

  9. A common-sense probabilistic approach to assessing inadvertent human intrusion into low-level radioactive waste at the Nevada Test Site

    International Nuclear Information System (INIS)

    Black, P.; Hooten, M.; Black, K.; Moore, B.; Rawlinson, S.; Barker, L.

    1997-01-01

    Each site disposing of low-level radioactive waste is required to prepare and maintain a site-specific performance assessment (1) to determine potential risks posed by waste management systems to the public, and the environment, and (2) to compare these risks to established performance objectives. The DOE Nevada Operations Office, Waste Management Program recently completed a one-year study of site-specific scenarios for inadvertent human intrusion by drilling into buried low-level radioactive waste sites, as part of ongoing performance assessment studies. Intrusion scenarios focus on possible penetration of buried waste through drilling for sources of groundwater. The probability of drilling penetration into waste was judged to be driven primarily by two settlement scenarios: (1) scattered individual homesteaders, and (2) a community scenario consisting of a cluster of settlers that share drilling and distribution systems for groundwater. Management control factors include institutional control, site knowledge, placards and markers, surface barriers, and subsurface barriers. The Subject Matter Experts concluded that institutional control and site knowledge may be important factors for the first few centuries, but are not significant over the evaluation period of 10,000 years. Surface barriers can be designed that would deter the siting of a drill rig over the waste site to an effectiveness of 95%. Subsurface barriers and placards and markers will not as effectively prevent inadvertent human intrusion. Homestead and community scenarios were considered by the panel to render a site-specific probability of around 10% for inadvertent human intrusion. If management controls are designed and implemented effectively, then the probability of inadvertent human intrusion can be reduced to less than 1%

  10. Expert judgement on inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Hora, S.C.; von Winterfeldt, D.; Trauth, K.M.

    1991-12-01

    Four expert-judgment teams have developed analyses delineating possible future societies in the next 10,000 years in the vicinity of the Waste Isolation Pilot Plant (WIPP). Expert-judgment analysis was used to address the question of future societies because neither experimentation, observation, nor modeling can resolve such uncertainties. Each of the four, four-member teams, comprised of individuals with expertise in the physical, social, or political sciences, developed detailed qualitative assessments of possible future societies. These assessments include detailed discussions of the underlying physical and societal factors that would influence society and the likely modes of human-intrusion at the WIPP, as well as the probabilities of intrusion. Technological development, population growth, economic development, conservation of information, persistence of government control, and mitigation of danger from nuclear waste were the factors the teams believed to be most important. Likely modes of human-intrusion were categorized as excavation, disposal/storage, tunneling, drilling, and offsite activities. Each team also developed quantitative assessments by providing probabilities of various alternative futures, of inadvertent human intrusion, and in some cases, of particular modes of intrusion. The information created throughout this study will be used in conjunction with other types of information, including experimental data, calculations from physical principles and computer models, and perhaps other judgments, as input to ''performance assessment.'' The more qualitative results of this study will be used as input to another expert panel considering markers to deter inadvertent human intrusion at the WIPP

  11. Inadvertent Splenectomy During Resection for Colorectal Cancer Does Not Increase Long-term Mortality in a Propensity Score Model

    DEFF Research Database (Denmark)

    Lolle, Ida; Pommergaard, Hans-Christian; Schefte, David F

    2016-01-01

    BACKGROUND: Previous studies suggest that long-term mortality is increased in patients who undergo splenectomy during surgery for colorectal cancer. The reason for this association remains unclear. OBJECTIVE: The purpose of this study was to investigate the association between inadvertent...... splenectomy attributed to iatrogenic lesion to the spleen during colorectal cancer resections and long-term mortality in a national cohort of unselected patients. DESIGN: This was a retrospective, nationwide cohort study. SETTINGS: Data were collected from the database of the Danish Colorectal Cancer Group...... for patients surviving 30 days after surgery. Secondary outcomes were 30-day mortality and risk factors for inadvertent splenectomy. Multivariable and propensity-score matched Cox regression analyses were used to adjust for potential confounding. RESULTS: In total, 23,727 patients were included, of which 277...

  12. Fully automated radiochemical preparation system for gamma-spectroscopy on fission products and the study of the intruder and vibrational levels in 83Se

    International Nuclear Information System (INIS)

    Lien, O.G. III.

    1983-10-01

    AUTOBATCH was developed to provide a usable source of short-lived neutron-rich nuclides through chemical preparation of the sample from fission products for detailed gamma-ray spectroscopy, which would complement the output of on-line isotope separators. With AUTOBATCH the gamma rays following the β - decay of 83 As were studied to determine the ground state spin and parity of 83 As to be 5/2 - ; the absolute intensity of the β - branch from 83 As to 83 Se/sup m/ to be 0.3%; the absolute intensity of the ground state β - branch from 83 Se/sup m/ to 83 Br to be 39%; the halflife of the 5/2 1 + level to be 3.2 ns; and the structure of 83 Se 49 . Results are used to show that the intruder structure which had been previously observed in the odd mass 49 In isotopes could be observed in the N = 49 isotones. The observed structure is discussed in terms of the unified model calculations of Heyde which has been used to describe the intruder structure in the indium nuclei. The intruder structure is most strongly developed, not at core mid-shell, 89 Zr 49 , but rather at core mid-sub-shell 83 Se. This difference is qualitatively understood to be due to the blocking of collectivity by the Z = 40 subshell closure which prevents the intruder structure from occurring in 87 Sr 49 and 89 Zr 49

  13. Study of intruder band in {sup 112}Sn

    Energy Technology Data Exchange (ETDEWEB)

    Ganguly, S. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Banerjee, P. [Saha Institute of Nuclear Physics, Kolkata 700064 (India)]. E-mail: polash.banerjee@saha.ac.in; Ray, I. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Kshetri, R. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Raut, R. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Bhattacharya, S. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Saha-Sarkar, M. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Goswami, A. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Mukhopadhyay, S. [UGC-DAE-CSR, Kolkata 700098 (India); Mukherjee, A. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Mukherjee, G. [Variable Energy Cyclotron Centre, Kolkata 700064 (India); Basu, S.K. [Variable Energy Cyclotron Centre, Kolkata 700064 (India)

    2007-06-01

    Excited states of the positive-parity intruder band in {sup 112}Sn, populated in the {sup 100}Mo({sup 20}Ne,{alpha}4n) reaction at a beam energy of 136 MeV, have been studied. The band has been observed up to 11570.0 keV with spin (24{sup +}). Mean lifetimes have been measured for six states up to the 22{sup +}, 10335.1 keV level and an upper limit of the lifetime has been estimated for the 11570.0 keV (24{sup +}) state. The B(E2) values, derived from the present lifetime results, correspond to a moderate quadrupole deformation of {beta}{sub 2}{approx}0.18 for states with spin J{sup {pi}}>=12{sup +}, and the decrease in B(E2) for the 14{sup +}->12{sup +} transition is consistent with a {nu}(h{sub 11/2}){sup 2} alignment at {omega}{approx}0.35 MeV, predicted by a cranked shell-model calculation. Total Routhian surface calculations predict a triaxial shape following the alignment.

  14. Inadvertent pump start with gas expansion modules

    International Nuclear Information System (INIS)

    Campbell, L.R.; Harris, R.A.; Heard, F.J.; Dautel, W.A.

    1992-01-01

    Previous testing demonstrated the effectiveness of gas expansion modules (GEMs) in mitigating the consequences of a loss-of-flow-without-scram transient in Fast Flux Test Facility (FFTF)-sized sodium cooled cores. As a result, GEMs have been included in the advance liquid-metal reactor (PRISM) design project sponsored by the US Department of Energy. The PRISM design is under review at the US Nuclear Regulatory Commission for licensability. In the unlikely event that the reactor does not scram during a loss of low, the GEMs quickly insert sufficient negative reactivity to limit fuel and cladding temperatures to acceptable values. This is the positive benefit of the GEMs; however, the reverse situation must be considered. A primary pump could be inadvertently started from near-critical conditions resulting in a positive reactivity insertion and a power transient. One mitigating aspect of this event is that as the reactivity associated with the GEMs is inserted, the increasing flow increases core cooling. A test was conducted in the FFTF to demonstrate that the GEM and feedback reactivity are well predicted following pump start, and the reactivity transient is benign

  15. Underwater Intruder Detection Sonar for Harbour Protection: State of the Art Review and Implications

    Science.gov (United States)

    2006-10-01

    intruder would appear as a small moving “ blob ” of energetic echo in the echograph, and the operator could judge whether the contact is a threat that calls...visually then as a small fluctuating “ blob ” against a fluctuating background of sound clutter and reverberation, making it difficult to visually...4. Non-random false alarms caused by genuine underwater contacts that happened not to be intruders—by large fish , or schools of fish , or marine

  16. 46 CFR 308.536 - Declaration where failure to comply with Clause 21 was inadvertent, Form MA-314.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION EMERGENCY OPERATIONS WAR RISK INSURANCE War Risk Cargo Insurance Ii-Open Policy War Risk Cargo... Assured that fails inadvertently to maintain a collateral deposit fund or surety bond in an amount..., which may be obtained from the American War Risk Agency or MARAD. III—Facultative War Risk Cargo...

  17. Neonicotinoid insecticides can serve as inadvertent insect contraceptives

    Science.gov (United States)

    Villamar-Bouza, Laura; Bruckner, Selina; Chantawannakul, Panuwan; Gauthier, Laurent; Khongphinitbunjong, Kitiphong; Retschnig, Gina; Troxler, Aline; Vidondo, Beatriz; Neumann, Peter; Williams, Geoffrey R.

    2016-01-01

    There is clear evidence for sublethal effects of neonicotinoid insecticides on non-target ecosystem service-providing insects. However, their possible impact on male insect reproduction is currently unknown, despite the key role of sex. Here, we show that two neonicotinoids (4.5 ppb thiamethoxam and 1.5 ppb clothianidin) significantly reduce the reproductive capacity of male honeybees (drones), Apis mellifera. Drones were obtained from colonies exposed to the neonicotinoid insecticides or controls, and subsequently maintained in laboratory cages until they reached sexual maturity. While no significant effects were observed for male teneral (newly emerged adult) body mass and sperm quantity, the data clearly showed reduced drone lifespan, as well as reduced sperm viability (percentage living versus dead) and living sperm quantity by 39%. Our results demonstrate for the first time that neonicotinoid insecticides can negatively affect male insect reproductive capacity, and provide a possible mechanistic explanation for managed honeybee queen failure and wild insect pollinator decline. The widespread prophylactic use of neonicotinoids may have previously overlooked inadvertent contraceptive effects on non-target insects, thereby limiting conservation efforts. PMID:27466446

  18. Inadvertent injection of formalin mistaken for local anesthetic agent: report of a case.

    Science.gov (United States)

    Arakeri, Gururaj; Brennan, Peter A

    2012-05-01

    Chemical facial cellulitis, while commonly seen in domestic accidents or attempted suicide, is uncommon in the dental office and hence rarely addressed in the dental literature. We present an unusual case of chemical facial cellulitis caused by inadvertent injection of formalin into the soft tissues of the oral cavity, which was mistaken for local anesthesia solution. This report comprises the immediate symptoms, possible root cause, and management of the difficult situation. We also provide some guidelines to avoid such unfortunate events. Copyright © 2012 Elsevier Inc. All rights reserved.

  19. Adherence to a Gluten-Free Diet in Mexican Subjects with Gluten-Related Disorders: A High Prevalence of Inadvertent Gluten Intake.

    Science.gov (United States)

    Ramírez-Cervantes, Karen Lizzette; Romero-López, Angélica Viridiana; Núñez-Álvarez, Carlos Alberto; Uscanga-Domínguez, Luis F

    2016-01-01

    The rate of compliance with a gluten-free diet in patients with gluten-related disorders is unknown in most Latin American countries. To study the adherence to a gluten-free diet of Mexican individuals with celiac disease and nonceliac gluten sensitivity at the time of their first medical and nutritional consultation at a tertiary referral center. A cross-sectional study was performed. A specific questionnaire was used to gather information on demographics, clinical condition, and self-reported adherence to a gluten-free diet, and to determine strict compliance and intentional or inadvertent gluten consumption. All questionnaires were applied by a nutritionist with expertise in gluten-related disorders. Fifty-six patients with celiac disease and 24 with non-celiac gluten sensitivity were included. Overall, 46 (57.5%) subjects perceived themselves as strictly adherent; however, inadvertent gluten intake was frequent in both celiac disease and non-celiac gluten sensitivity patients (39.2 vs. 33.3%; p = 0.2). Intentional consumption was more prevalent in subjects with celiac disease (48.8 vs. 29.1%; p = 0.048) and individuals with non-celiac gluten sensitivity showed better adherence (37.5 vs. 12.5%; p = 0.035). The importance of a gluten-free diet is underestimated by Mexican patients with celiac disease. The role of a team with expertise in gluten-related disorders is essential to identify inadvertent gluten intake.

  20. 13 CFR 126.308 - What happens if SBA inadvertently omits a qualified HUBZone SBC from the List?

    Science.gov (United States)

    2010-01-01

    ... writing at U.S. Small Business Administration, 409 Third Street, SW., Washington, DC 20416 or via e-mail... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What happens if SBA inadvertently omits a qualified HUBZone SBC from the List? 126.308 Section 126.308 Business Credit and Assistance...

  1. Background information for the development of a low-level waste performance assessment methodology

    International Nuclear Information System (INIS)

    Shipers, L.R.

    1989-12-01

    This document identifies and describes the potential postclosure pathways of radionuclide release, migration, and exposure from low-level radioactive waste disposal facilities. Each pathway identified is composed of a combination of migration pathways (air, surface water, ground water, food chain) and exposure pathways (direct gamma, inhalation, ingestion, surface contact). The pathway identification is based on a review and evaluation of existing information, and not all pathways presented in the document would necessarily be of importance at a given low-level waste disposal site. This document presents pathways associated with undisturbed (ground water, gas generation), naturally disturbed (erosion, bathtubbing, earth creep, frost heave, plant and animal intruder), and inadvertent intruder (construction, agriculture) scenarios of a low-level waste disposal facility. 20 refs., 1 fig

  2. Prevention of the inadvertent movement and illicit trafficking of radioactive and nuclear materials in Argentine border

    International Nuclear Information System (INIS)

    Bonet Duran, Stella M.; Canibano, Javier A.; Menossi, Sergio A.; Rodriguez, Carlos E.

    2004-01-01

    The inadvertent and illegal movements of radioactive and nuclear materials are issues of increased national and international awareness. States are progressively becoming more conscious of the need to adequately respond to these events. As regards the States' regulatory infrastructure, the design and enforcement of control and verification measures to maintain the continuity of knowledge about possession, use and movements of radioactive and nuclear materials is of critical importance. The existence of an appropriate legislative framework and a regulatory authority empowered to establish effective safety and security measures are essential to prevent inadvertent and illegal movements of nuclear materials and other radioactive materials. The events of Sep. 11, 2001 in the US have increased the States' awareness on the need to review their national infrastructure to identify additional measures against inadvertent and illegal movements of radioactive and nuclear materials as well as against sabotage of nuclear facilities. Argentina has more than a half- century- old tradition regarding the control and supervision of all activities involving the use of nuclear and radioactive materials. The Nuclear Regulatory Authority (ARN) of Argentina is the organization with federal competence in radiation protection, nuclear safety, safeguards and physical protection. It is responsible for issuing licenses and permits to any activity involving radioactive materials and for controlling and verifying that these activities are performed in full compliance with ARN standards and requirements. In the region, Argentina has been playing an important role in the prevention of illicit traffic of nuclear and radioactive materials for the last years within the framework of Security Commission of MERCOSUR. The last goals of this initiative are to define and coordinate actions and to establish a set of common operational procedures in the countries participating in the mentioned multilateral

  3. Inadvertent puncture of the aortic noncoronary cusp during postoperative left atrial tachycardia ablation

    Directory of Open Access Journals (Sweden)

    Dursun Aras, MD

    2015-08-01

    Full Text Available Transseptal catheterization has become part of the interventional electrophysiologist׳s technical armamentarium since the development of left atrial catheter ablation and percutaneous technologies for treating mitral and aortic valve disease. Although frequently performed, the procedure׳s most feared complication is aortic root penetration. Focal atrial tachycardia has been described as the most common late sequela of surgical valve replacements. We present a complicated case involving the inadvertent delivery of an 8 French sheath across the noncoronary cusp during radiofrequency catheter ablation for left atrial tachycardia originating from the mitral annulus in a patient with prior mitral valve replacement.

  4. Genotypic differences in intruder-evoked immediate early gene activation in male, but not female, vasopressin 1b receptor knockout mice.

    Science.gov (United States)

    Witchey, Shannah K; Stevenson, Erica L; Caldwell, Heather K

    2016-11-24

    The neuropeptide arginine vasopressin (Avp) modulates social behaviors via its two centrally expressed receptors, the Avp 1a receptor and the Avp 1b receptor (Avpr1b). Recent work suggests that, at least in mice, Avp signaling through Avpr1b within the CA2 region of the hippocampus is critical for normal aggressive behaviors and social recognition memory. However, this brain area is just one part of a larger neural circuit that is likely to be impacted in Avpr1b knockout (-/-) mice. To identify other brain areas that are affected by altered Avpr1b signaling, genotypic differences in immediate early gene activation, i.e. c-FOS and early growth response factor 1 (EGR-1), were quantified using immunocytochemistry following a single exposure to an intruder. In females, no genotypic differences in intruder-evoked c-FOS or EGR-1 immunoreactivity were observed in any of the brain areas measured. In males, while there were no intruder-evoked genotypic differences in c-FOS immunoreactivity, genotypic differences were observed in EGR-1 immunoreactivity within the ventral bed nucleus of the stria terminalis and the anterior hypothalamus; with Avpr1b -/- males having less EGR-1 immunoreactivity in these regions than controls. These data are the first to identify specific brain areas that may be a part of a neural circuit that includes Avpr1b-expressing cells in the CA2 region of the hippocampus. It is thought that this circuit, when working properly, plays a role in how an animal evaluates its social context.

  5. Sensing the intruder: a quantitative threshold for recognition cues perception in honeybees

    Science.gov (United States)

    Cappa, Federico; Bruschini, Claudia; Cipollini, Maria; Pieraccini, Giuseppe; Cervo, Rita

    2014-02-01

    The ability to discriminate among nestmates and non-nestmate is essential to defend social insect colonies from intruders. Over the years, nestmate recognition has been extensively studied in the honeybee Apis mellifera; nevertheless, the quantitative perceptual aspects at the basis of the recognition system represent an unexplored subject in this species. To test the existence of a cuticular hydrocarbons' quantitative perception threshold for nestmate recognition cues, we conducted behavioural assays by presenting different amounts of a foreign forager's chemical profile to honeybees at the entrance of their colonies. We found an increase in the explorative and aggressive responses as the amount of cues increased based on a threshold mechanism, highlighting the importance of the quantitative perceptual features for the recognition processes in A. mellifera.

  6. High spin spectroscopy of near spherical nuclei: Role of intruder orbitals

    Energy Technology Data Exchange (ETDEWEB)

    Bhattacharyya, S.; Bhattacharjee, T.; Mukherjee, G. [Variable Energy Cyclotron Centre, 1/AF Bidhan Nagar, Kolkata - 700064 (India); Chanda, S. [Fakir Chand College, Diamond Herbour, West Bengal (India); Banerjee, D.; Das, S. K.; Guin, R. [Radiochemistry Division, Variable Energy Cyclotron Centre, BARC, Kolkata - 700064 (India); Gupta, S. Das [Variable Energy Cyclotron Centre, 1/AF Bidhan Nagar, Kolkata - 700064, India and Saha Institute of Nuclear Physics, Kolkata-700064 (India); Pai, H. [Variable Energy Cyclotron Centre, 1/AF Bidhan Nagar, Kolkata - 700064, India and Institut für Kernphysik, Technische Universität Darmstadt, Schlossgartenstrasse 9, 64289 Darmstadt (Germany)

    2014-08-14

    High spin states of nuclei in the vicinity of neutron shell closure N = 82 and proton shell closure Z = 82 have been studied using the Clovere Ge detectors of Indian National Gamma Array. The shape driving effects of proton and neutron unique parity intruder orbitals for the structure of nuclei around the above shell closures have been investigated using light and heavy ion beams. Lifetime measurements of excited states in {sup 139}Pr have been done using pulsed-beam-γ coincidence technique. The prompt spectroscopy of {sup 207}Rn has been extended beyond the 181μs 13/2{sup +} isomer. Neutron-rich nuclei around {sup 132}Sn have been produced from proton induced fission of {sup 235}U and lifetime measurement of low-lying states of odd-odd {sup 132}I have been performed from offline decay.

  7. Analyses of natural resources in 10 CFR Part 60 as related to inadvertent human intrusion

    International Nuclear Information System (INIS)

    Miklas, M.P.; Lefevre, H.E.

    1993-01-01

    The purpose of this paper is to examine the intent of the regulatory language of the portions of 10 CFR Part 60 which deal with considerations of the natural resources of a proposed geologic repository for high-level radioactive wastes as they relate to inadvertent human intrusion. Four Potentially Adverse Conditions (PAC) the requirements of 10 CFR 60.21(c)(13) are shown to be related to natural resources. Groundwater is identified as a natural resource known to be present at Yucca Mountain, Nevada. For economic considerations of natural resources, the open-quotes foreseeable futureclose quotes is thought to be no more than 50 years. Two of the topics addressed by the PACs, subsurface mining and drilling at a proposed repository site, are pre-site-characterization activities which must be evaluated in the context of repository performance criteria set by the US EPA standard, 40 CFR Part 191. An alternative US DOE compliance demonstration to another PAC, 10 CFR 60.122(c)(17), might be to use an open-quotes explorationist perspectiveclose quotes of natural resource assessment. The Commission intends for DOE to evaluate the likelihood and consequence of inadvertent human intrusion into a geologic repository as a result of exploration or exploitation of natural resources within or near a proposed high-level radioactive waste geologic repository

  8. Study of 'inadvertent human intrusion or rare natural event scenarios' for sub-surface disposal of radioactive waste

    International Nuclear Information System (INIS)

    Nakatani, Takayoshi; Ishitoya, Kimihide; Funabashi, Hideyuki; Sugaya, Toshikatsu; Sone, Tomoyuki; Shimada, Hidemitsu; Nakai, Kunihiro

    2010-03-01

    Japan Atomic Energy Agency (JAEA) is making preparations for the sub-surface disposal of radioactive wastes, in an integrated fashion according to the properties of the waste material regardless of the generators or waste sources. In this study, 'Inadvertent Human Intrusion or Rare Natural Event Scenarios' of 'Three Types scenarios' was considered according to the standard of the Atomic Energy Society of Japan (AESJ) on the sub-surface disposal system that was based on 'Basic Policy for Safety Regulation Concerning Land Disposal of Low-Level Radioactive Waste (Interim Report)' by Nuclear Safety Commission of Japan (NSC). Selection of the assessed scenarios, development of the assessment tool and preliminary exposure dose assessment for general public were conducted. Among the assessed scenarios, the exposure dose of 'well water drinking scenario' was the highest under the very conservative assessment condition. This scenario assumed that the groundwater in Excavation Disturbed Zone (EDZ) was directly used as drinking water without any dilution. Although this was very conservative condition and the result exceeded 10 mSv/y, it stayed under the upper limit of standard dose value for 'Inadvertent Human Intrusion or Rare Natural Event Scenarios' (10 - 100 mSv/y). (author)

  9. Endovascular repair of inadvertent arterial injury induced by central venous catheterization using a vascular closure device: A case report

    Energy Technology Data Exchange (ETDEWEB)

    Kim, So Hee; Jang, Woo Jin; Oh, Ju Heyon; Song, Yun Gyu [Samsung Changwon Hospital, Sungkyunkwan University School of Medicine, Changwon (Korea, Republic of)

    2017-04-15

    Central venous catheterization can cause various complications. Inadvertent subclavian artery catheterization was performed during insertion of a central venous catheter in a 73-year-old man suffering from panperitonitis due to small-bowel perforation. Endovascular treatment was conducted to treat the injured subclavian artery with a FemoSeal vascular closure device.

  10. Pulse-train control of branching processes: Elimination of background and intruder state population

    International Nuclear Information System (INIS)

    Seidl, Markus; Uiberacker, Christoph; Jakubetz, Werner; Etinski, Mihajlo

    2008-01-01

    The authors introduce and describe pulse train control (PTC) of population branching in strongly coupled processes as a novel control tool for the separation of competing multiphoton processes. Control strategies are presented based on the different responses of processes with different photonicities and/or different frequency detunings to the pulse-to-pulse time delay and the pulse-to-pulse phase shift in pulse trains. The control efficiency is further enhanced by the property of pulse trains that complete population transfer can be obtained over an extended frequency range that replaces the resonance frequency of simple pulses. The possibility to freely tune the frequency assists the separation of the competing processes and reduces the number of subpulses required for full control. As a sample application, PTC of leaking multiphoton resonances is demonstrated by numerical simulations. In model systems exhibiting sizable background (intruder) state population if excited with single pulses, PTC leading to complete accumulation of population in the target state and elimination of background population is readily achieved. The analysis of the results reveals different mechanisms of control and provides clues on the mechanisms of the leaking process itself. In an alternative setup, pulse trains can be used as a phase-sensitive tool for level switching. By changing only the pulse-to-pulse phase shift of a train with otherwise unchanged parameters, population can be transferred to any of two different target states in a near-quantitative manner.

  11. Grout treatment facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1988-01-01

    The long-term performance of the grout disposal system for Phosphate/Sulfate Waste (PSW) was analyzed. PSW is a low-level liquid generated by activities associated with N Reactor operations. The waste will be mixed with dry solids and permanently disposed of as a cementitious grout in sub-surface concrete vaults at Hanford's 200-East Area. Two categories of scenarios were analyzed that could cause humans to be exposed to radionuclides and chemicals from the grouted waste: contaminated groundwater and direct intrusion. In the groundwater scenario, contaminants are released from the buried grout monoliths, then eventually transported via the groundwater to the Columbia River. As modeled, the contaminants are assumed to leach out of the monoliths at a constant rate over a 10,000-year period. The other category of exposure involves intruders who inadvertently contact the waste directly, either by drilling, excavating, or gardening. Long-term impacts that could result from disposal of PSW grout were expressed in terms of incremental increases of (1) chemical concentrations in the groundwater and surface waters, and (2) radiation doses. None of the calculated impacts exceeded the corresponding regulatory limits set by Washington State, Department of Energy, or the Nuclear Regulatory Commission

  12. Microwave and millimeter-wave remote sensing for security applications

    CERN Document Server

    Nanzer, Jeffrey

    2012-01-01

    Microwave and millimeter-wave remote sensing techniques are fast becoming a necessity in many aspects of security as detection and classification of objects or intruders becomes more difficult. This groundbreaking resource offers you expert guidance in this burgeoning area. It provides you with a thorough treatment of the principles of microwave and millimeter-wave remote sensing for security applications, as well as practical coverage of the design of radiometer, radar, and imaging systems. You learn how to design active and passive sensors for intruder detection, concealed object detection,

  13. Performance Assessment Position Paper: Time for Compliance

    International Nuclear Information System (INIS)

    Wilhite, E.L.

    2003-01-01

    This study lays out the historical development of the time frame for a low-level waste disposal facility to demonstrate compliance with the DOE performance objectives and requirements. The study recommends that 1,000 years should be used as the time for compliance for all of the performance objectives and requirements (i.e., for the all-pathways, air pathway, radon emanation, water resource protection and inadvertent intruder analyses) for all low-level waste disposal facility performance assessments at the Savannah River Site

  14. Central vasopressin V1a receptors modulate neural processing in mothers facing intruder threat to pups

    OpenAIRE

    Caffrey, Martha K.; Nephew, Benjamin C.; Febo, Marcelo

    2009-01-01

    Vasopressin V1a receptors in the rat brain have been studied for their role in modulating aggression and anxiety. In the current study blood-oxygen-level-dependent (BOLD) functional MRI was used to test whether V1a receptors modulate neural processing in the maternal brain when dams are exposed to a male intruder. Primiparous females were given an intracerebroventricular (ICV) injection of vehicle or V1a receptor antagonist ([deamino-Pen1, O-Me-Try, Arg8]-Vasopressin, 125 ng/10 μL) 90-120 min...

  15. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    International Nuclear Information System (INIS)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K.

    2016-01-01

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid’s thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  16. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    Energy Technology Data Exchange (ETDEWEB)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K., E-mail: prodip.das@ncl.ac.uk [School of Mechanical and Systems Engineering Newcastle University Newcastle upon Tyne, NE1 7RU United Kingdom (United Kingdom)

    2016-07-12

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid’s thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  17. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    Science.gov (United States)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K.

    2016-07-01

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid's thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  18. The use of protective barriers to deter inadvertent human intrusion into a mined geologic facility for the disposal of radioactive waste: A review of previous investigations and potential concepts

    International Nuclear Information System (INIS)

    Tolan, T.L.

    1993-06-01

    Sandia National Laboratories is evaluating the feasibility of developing protective barrier system for the Waste Isolation Pilot Plant (WIPP) to thwart inadvertent human intrusion into this radioactive-waste disposal system for a period of 9,900 years after assumed loss of active institutional controls. The protective barrier system would be part of a series of enduring passive institutional controls whose long-term function will be to reduce the likelihood of inadvertent human activities (e.g., exploratory drilling for resources) that could disrupt the WIPP disposal system

  19. Radioactive Waste Management Complex low-level waste radiological performance assessment

    Energy Technology Data Exchange (ETDEWEB)

    Maheras, S.J.; Rood, A.S.; Magnuson, S.O.; Sussman, M.E.; Bhatt, R.N.

    1994-04-01

    This report documents the projected radiological dose impacts associated with the disposal of radioactive low-level waste at the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory. This radiological performance assessment was conducted to evaluate compliance with applicable radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the public and the environment. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses were made for both offsite receptors and individuals inadvertently intruding onto the site after closure. In addition, uncertainty and sensitivity analyses were performed. The results of the analyses indicate compliance with established radiological criteria and provide reasonable assurance that public health and safety will be protected.

  20. Radioactive Waste Management Complex low-level waste radiological performance assessment

    International Nuclear Information System (INIS)

    Maheras, S.J.; Rood, A.S.; Magnuson, S.O.; Sussman, M.E.; Bhatt, R.N.

    1994-04-01

    This report documents the projected radiological dose impacts associated with the disposal of radioactive low-level waste at the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory. This radiological performance assessment was conducted to evaluate compliance with applicable radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the public and the environment. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses were made for both offsite receptors and individuals inadvertently intruding onto the site after closure. In addition, uncertainty and sensitivity analyses were performed. The results of the analyses indicate compliance with established radiological criteria and provide reasonable assurance that public health and safety will be protected

  1. Interventions for treating inadvertent postoperative hypothermia.

    Science.gov (United States)

    Warttig, Sheryl; Alderson, Phil; Campbell, Gillian; Smith, Andrew F

    2014-11-20

    Inadvertent postoperative hypothermia (a drop in core body temperature to below 36°C) occurs as an effect of surgery when anaesthetic drugs and exposure of the skin for long periods of time during surgery result in interference with normal temperature regulation. Once hypothermia has occurred, it is important that patients are rewarmed promptly to minimise potential complications. Several different interventions are available for rewarming patients. To estimate the effectiveness of treating inadvertent perioperative hypothermia through postoperative interventions to decrease heat loss and apply passive and active warming systems in adult patients who have undergone surgery. We searched the Cochrane Central Register of Controlled Trials (CENTRAL) (2014, Issue 2), MEDLINE (Ovid SP) (1956 to 21 February 2014), EMBASE (Ovid SP) (1982 to 21 February 2014), the Institute for Scientific Information (ISI) Web of Science (1950 to 21 February 2014) and the Cumulative Index to Nursing and Allied Health Literature (CINAHL), EBSCO host (1980 to 21 February 2014), as well as reference lists of articles. We also searched www.controlled-trials.com and www.clincialtrials.gov. Randomized controlled trials of postoperative warming interventions aiming to reverse hypothermia compared with control or with each other. Three review authors identified studies for inclusion in this review. One review author extracted data and completed risk of bias assessments; two review authors checked the details. Meta-analysis was conducted when appropriate by using standard methodological procedures as expected by The Cochrane Collaboration. We included 11 trials with 699 participants. Ten trials provided data for analysis. Trials varied in the numbers and types of participants included and in the types of surgery performed. Most trials were at high or unclear risk of bias because of inappropriate or unclear randomization procedures, and because blinding of assessors and participants generally was

  2. Pregnancy outcome after 1st-trimester inadvertent exposure to barium sulphate as a contrast media for upper gastrointestinal tract radiography.

    Science.gov (United States)

    Han, B H; Lee, K S; Han, J Y; Choi, J S; Ahn, H K; Ryu, H M; Yang, J H; Han, H W; Nava-Ocampo, A A

    2011-10-01

    Despite barium being used as a contrast media for decades, the specific assessment of its safety in pregnant women is scarce. We are reporting the favourable pregnancy outcome in women who were inadvertently exposed to barium swallow and associated ionising radiation, early in pregnancy. A control group of age- and gravidity-matched unexposed pregnant women was also included. There were 32 live-born babies in the exposed group and 94 in the control group. Women had undergone diagnostic upper gastrointestinal tract (UGT) fluoroscopic examination at 3.3 ± 1.5 weeks' gestation. Estimated maternal radiation dose secondary to barium swallow varied widely, the maximum dose was estimated to be 2.45 mSv. Similar pregnancy outcomes were observed between the groups. The number of babies born with major malformations was not significantly different (p = 1.0) between cases and controls: one (3.1%) vs three (3.2%), respectively. In conclusion, our small prospective cohort study of women suggests no association between inadvertent exposure to ionising radiation and barium sulphate during fluoroscopic barium swallow and adverse fetal outcomes.

  3. E AREA LOW LEVEL WASTE FACILITY DOE 435.1 PERFORMANCE ASSESSMENT

    Energy Technology Data Exchange (ETDEWEB)

    Wilhite, E

    2008-03-31

    , situated immediately north of the Mixed Waste Management Facility. The E-Area Low-Level Waste Facility is comprised of 200 acres for waste disposal and a surrounding buffer zone that extends out to the 100-m point of compliance. Disposal units within the footprint of the low-level waste facilities include the Slit Trenches, Engineered Trenches, Component-in-Grout Trenches, the Low-Activity Waste Vault, the Intermediate-Level Vault, and the Naval Reactor Component Disposal Area. Radiological waste disposal operations at the E-Area Low-Level Waste Facility began in 1994. E-Area Low-Level Waste Facility closure will be conducted in three phases: operational closure, interim closure, and final closure. Operational closure will be conducted during the 25-year operation period (30-year period for Slit and Engineered Trenches) as disposal units are filled; interim closure measures will be taken for some units. Interim closure will take place following the end of operations and will consist of an area-wide runoff cover along with additional grading over the trench units. Final closure of all disposal units in the E-Area Low-Level Waste Facility will take place at the end of the 100-year institutional control period and will consist of the installation of an integrated closure system designed to minimize moisture contact with the waste and to serve as a deterrent to intruders. Radiological dose to human receptors is analyzed in this PA in the all-pathways analysis, the inadvertent intruder analysis and the air pathway analysis, and the results are compared to the relevant performance measures. For the all-pathways analysis, the performance measure of relevance is a 25-mrem/yr EDE to representative members of the public, excluding dose from radon and its progeny in air. For the inadvertent intruder, the applicable performance measures are 100-mrem/yr EDE and 500 mrem/yr EDE for chronic and exposure scenarios, respectively. The relevant performance measure for the air pathway is 10

  4. Energy of the 2p1h intruder state in $^{34}$Al

    CERN Multimedia

    The second 0$^{+}$ state in $^{34}$Si, of high importance for the understanding of the island of inversion at N=20, has been recently observed through the $\\beta$- decay of a predicted long-lived low-lying isomeric 1$^{+}$ state in $^{34}$Al. We intend to measure the unknown excitation energy of this isomer using the ISOLTRAP Penning-trap mass spectrometer. Since a recent experiment at ISOLDE (IS-530) showed that the full $\\beta$- strength in the decay of $^{34}$Mg goes through this 1$^{+}$ state in $^{34}$Al, we propose to perform a direct mass measurement of the daughter $^{34}$Al ions trapped after the decay of $^{34}$Mg. Mass measurements indicate that the 4$^{−}$ ground state in $^{34}$Al may be an excited state, the ground state being therefore the intruder 1$^{+}$ state. In another run, we propose to perform a remeasurement of the mass of the 4$^{−}$ ground state.

  5. Inadvertent Apical Extrusion of Sodium Hypochlorite with Evaluation by Dental Volumetric Tomography

    Directory of Open Access Journals (Sweden)

    Elif Delve Başer Can

    2015-01-01

    Full Text Available This case report describes the tissue injury caused by inadvertently extruded NaOCl through the apical constriction. A 56-year-old female patient with complaints of pain, swelling, and ecchymosis on the left side of her face was referred to our clinic. The symptoms had emerged following root canal treatment of the maxillary left first premolar, and a soft tissue complication due to apical extrusion of NaOCl was diagnosed. Antibiotics and analgesics were prescribed. DVT images revealed that the buccal root apex had perforated the maxillary bone. The patient was followed up every other day and became asymptomatic on the 10th day. Endodontic therapy was completed with routine procedures. Determining working length precisely and following irrigation protocols meticulously are indispensable to prevent this type of complication. 3D visualization of the affected area may reveal the cause of the incident.

  6. Treatment Approach to Small Inadvertent Injury of the Crystalline Lens Anterior Capsule During Iridodialysis Repair Surgery

    Directory of Open Access Journals (Sweden)

    Gökçen Gökçe

    2013-01-01

    Full Text Available A 22-year-old man presented to our ophthalmology department with photophobia. On ophthalmic examination, iridodialysis secondary to blunt trauma that occurred 5 years ago was diagnosed. During iridodialysis repair surgery, long curved double-armed needle of 10-0 polypropylene suture (PC-9 inserted into the 19 gauge side port turned down inadvertently by its own weight, resulting in crystalline lens anterior capsule perforation. Postoperative clinical observation revealed no lens opacification affecting visual acuity. This case report showed that lens aspiration surgery should be postponed if the capsule injury is small.(Turk J Ophthalmol 2013; 43: 61-3

  7. LWRA analysis of inadvertent closing of the main steam isolation valve in NPP Krsko

    International Nuclear Information System (INIS)

    Feretic, D.; Cavlina, N.; Grgic, D.; Spalj, S.

    1996-01-01

    The paper describes the use of system code RELAP5/mod2 and analyzer code LWRA in analysis of inadvertent closing of the main steam isolation valve that happened in NPP Krsko on September, 25 1995. Three cases were calculated in order to address different aspects of the modelled transient. This preliminary calculation showed that, even though the real plant behaviour was not completely reproduced, such kind of analysis can help to better understand plant behaviour and to identify important phenomena in the plant during transient. The results calculated by RELAP5 and LWRA were similar and both codes indicated lack of better understanding of the plant systems status. The LWRA was more than 5 times faster than real time. (author)

  8. Investigations on the inadvertent power increase in a PHWR as ASSET experience

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, S H [Operating Plants Safety Div., Atomic Energy Regulatory Board, Mumbai (India)

    1997-12-31

    Investigations were carried out using the ASSET methodology to find out the root cause of an incident involving inadvertent increase in reactor power in the Unit 1 of Narora Atomic Power Station (NAPS) in India. NAPS is a twin Unit, 220 MWe PHWR based power station. On December 4, 1992, when NPAS Unit 1 was operating at 130 MWe, the reactor power increased steadily on its own and touched 147 MWe, over a period of 14 minutes. The set (demand) power of the triplicated reactor regulating system had increased on its own and in turn has made the reactor to operated at higher power. The power was brought down to 120 MWe by manual intervention. Since adequate system related data during the incident was not available, laboratory studies were carried out using computer simulations for the various process disturbances which could affect the reactor regulating system, for establishing the causes of the event. 4 figs.

  9. Investigations on the inadvertent power increase in a PHWR as ASSET experience

    International Nuclear Information System (INIS)

    Kumar, S.H.

    1996-01-01

    Investigations were carried out using the ASSET methodology to find out the root cause of an incident involving inadvertent increase in reactor power in the Unit 1 of Narora Atomic Power Station (NAPS) in India. NAPS is a twin Unit, 220 MWe PHWR based power station. On December 4, 1992, when NPAS Unit 1 was operating at 130 MWe, the reactor power increased steadily on its own and touched 147 MWe, over a period of 14 minutes. The set (demand) power of the triplicated reactor regulating system had increased on its own and in turn has made the reactor to operated at higher power. The power was brought down to 120 MWe by manual intervention. Since adequate system related data during the incident was not available, laboratory studies were carried out using computer simulations for the various process disturbances which could affect the reactor regulating system, for establishing the causes of the event. 4 figs

  10. Evaluation of periodontal condition in intruded molars using miniscrews

    Directory of Open Access Journals (Sweden)

    Habib Ollah Ghanbari

    2015-12-01

    Full Text Available Introduction: The purpose of this preliminary study was to evaluate the periodontal condition of intruded molars in various phases of treatments. Methods: 30 patients with at least one overerupted upper first molar were selected. Upper molar bands with brackets were cemented. Two miniscrews were placed in the mesiopalatal and mesiobuccal aspect of the aforementioned teeth. A titanium molybdenum alloy (TMA spring was attached to the head of miniscrew in one end and ligated to the bracket in the other end to reach the predetermined force. Plaque index (PI, probing pocket depth (PPD, keratinized gingiva (KG, The distance between miniscrew (M.S and gingival level (GL, and bleeding on probing (BOP were recorded before loading and 1, 2, 3, 4 and 5 months post-loading .Results:  All patients completed the study and no complications were reported. Statistically significant intrusion (2.1 ± 0.9 mm was obtained during active treatment. Inserting miniscrews generally was presented with greater sulcus bleeding, plaque accumulation and plaque formation at follow-up visits. There was a statistically significant increase in PI, PPD and BOP indices. Furthermore, the results showed decrease in KG level and M.S to GL level. Conclusion: Miniscrews can provide a clinical benefit as an absolute anchorage device. However, keeping a good oral hygiene is essential to achieve ideal results, because the presence of miniscrews, as a foreign object in mouth, and intrusion force might be harmful for periodontal tissues

  11. Analysis of inadvertent safety injection incident at Kori unit 3 on september 6, 1990

    International Nuclear Information System (INIS)

    Kim, Kyun Tae; Chung, Bub Dong; Kim, In Goo; Kim, Hho Jung

    1992-01-01

    The inadvertent safety injection incident occurred at Kori Unit 3 on September 6, 1990 is analyzed using RELAP5/MOD3 code. The event was initiated by a failure of main feedwater control valve in one of three steam generators. The actual sequence of plant transient with the proper estimations of the operator actions is investigated in the present calculation. The calculational results are compared with the plant transient data. It is shown that the results of the plant behaviors are in good agreement with the plant data. The emergency response guidelines is assessed for the time of the SI termination and the establishment of natural circulation. The changes in the time of the SI termination do not significantly affect the overall plant behaviors, and the natural circulation is established

  12. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1992-05-01

    This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicitly displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information

  13. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: the ONSITE/MAXI1 computer program. Supplement No. 1

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.; Neuder, S.M.

    1986-05-01

    The document entitled Intruder Dose Pathway Analysis of the Onsite Disposal of Radioactive Wastes: The ONSITE/MAXI1 Computer Program (1984) summarizes initial efforts to develop human-intrustion scenarios and a modified version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. This document is a supplement to that document and summarizes efforts to further modify and improve the ONSITE/MAXI1 software package. To facilitate cross-referencing, it follows the same format. Notable improvements to the software package include the capability to account for shielding conditions that represent noncompacted trash wastes and the option to indicate alternative land-use condition;s. This supplement contains a description of the implementation of these modifications. In addition, a series of discussions are included in an attempt to increase the user's understanding of the scenarios and dose calculation methods. These discussions respond to frequently asked questions about the mathematical models and use of the software. Computer listings of the ONSITE/MAXI1 computer program are included as Appendices A and B of this document. Appendix C lists external exposure dose-rate factor libraries

  14. Flight Test Evaluation of AVOID I (Avionic Observation of Intruder Danger) Collision Avoidance System

    Science.gov (United States)

    1975-05-01

    memory registers A through G ( 2048 bit shift registers) for each of the basic altitude bands (1+26, 113 1+6) to store intruder responses. Since the 1...af EV 11z iIIV~ ~l~~ NADlC-75056-60_ _ _- 2 w< -I- LI- ~jw 0IU oo2 W I aJ W %L6fI9~~AVdI tVOV~ aN9Ao ccH % VdI I11813iA-di V GN Ed a3IV0 %AIII1IilV11W...tei mix ;;; c le z - Is’ %~~~~~~~~~~;s AJIiV1 VdI ~ %AIIV~ v~iO VIR 1ý 123 Lz NADC-7056-6 w, M w o ~2IV ONY Ed CIRNIGVNOO at p 00 CLt % 118I3iAVldSIC3

  15. Stepping in Place While Voluntarily Turning Around Produces a Long-Lasting Posteffect Consisting in Inadvertent Turning While Stepping Eyes Closed

    Directory of Open Access Journals (Sweden)

    Stefania Sozzi

    2016-01-01

    Full Text Available Training subjects to step in place on a rotating platform while maintaining a fixed body orientation in space produces a posteffect consisting in inadvertent turning around while stepping in place eyes closed (podokinetic after-rotation, PKAR. We tested the hypothesis that voluntary turning around while stepping in place also produces a posteffect similar to PKAR. Sixteen subjects performed 12 min of voluntary turning while stepping around their vertical axis eyes closed and 12 min of stepping in place eyes open on the center of a platform rotating at 60°/s (pretests. Then, subjects continued stepping in place eyes closed for at least 10 min (posteffect. We recorded the positions of markers fixed to head, shoulder, and feet. The posteffect of voluntary turning shared all features of PKAR. Time decay of angular velocity, stepping cadence, head acceleration, and ratio of angular velocity after to angular velocity before were similar between both protocols. Both postrotations took place inadvertently. The posteffects are possibly dependent on the repeated voluntary contraction of leg and foot intrarotating pelvic muscles that rotate the trunk over the stance foot, a synergy common to both protocols. We propose that stepping in place and voluntary turning can be a scheme ancillary to the rotating platform for training body segment coordination in patients with impairment of turning synergies of various origin.

  16. Method and apparatus for preventing inadvertent criticality in a nuclear fueled electric power generating unit

    International Nuclear Information System (INIS)

    Tuley, C.R.; Bauman, D.A.; Neuner, J.A.; Feilchenfeld, M.M.; Greenberg, L.

    1984-01-01

    An inadvertent approach to criticality in a nuclear fueled electric power generating unit is detected and an alarm is generated through on-line monitoring of the neutron flux. The difficulties of accurately measuring the low levels of neutron flux in a subcritical reactor are overcome by the use of a microcomputer which continuously generates average flux count rate signals for incremental time periods from thousands of samples taken during each such period and which serially stores the average flux count rate signals for a preselected time interval. At the end of each incremental time period, the microcomputer compares the latest average flux count rate signal with the oldest, and preferably each of the intervening stored values, and if it exceeds any of them by at least a preselected multiplication factor, an alarm is generated. (author)

  17. Inadvertent yellow fever vaccination of a patient with Crohn's disease treated with infliximab and methotrexate

    DEFF Research Database (Denmark)

    Ekenberg, C.; Friis-Møller, N.; Ulstrup, Thomas

    2016-01-01

    We present a case of a 56-year-old woman with Crohn's disease, treated with methotrexate and infliximab, who inadvertently received yellow fever vaccination (YFV) prior to a journey to Tanzania. She was not previously vaccinated against YF. YFV contains live-attenuated virus, and is contraindicated...... in patients treated with immunosuppressive drugs. Following vaccination, the patient fell ill with influenza-like illness. Elevated transaminase levels and YF viremia were detected. Despite being immunocompromised, the patient did not develop more severe adverse effects. Neutralising antibodies to YF virus...... were detected on day 14 following vaccination and remained protective at least 10 months after vaccination. Limited data is available on outcomes of YFV in patients receiving immunosuppressive therapy, including biologics, and we report this case as a reminder of vigilance of vaccine recommendations...

  18. Development of polymer concrete radioactive waste management containers

    Energy Technology Data Exchange (ETDEWEB)

    Chung, H.; Lee, M. S.; Ahn, D. H.; Won, H. J.; Kang, H. S.; Lee, H. S.; Lim, S.P.; Kim, Y. E.; Lee, B. O.; Lee, K. P.; Min, B. Y.; Lee, J.K.; Jang, W. S.; Sim, W. B.; Lee, J. C.; Park, M. J.; Choi, Y. J.; Shin, H. E.; Park, H. Y.; Kim, C. Y

    1999-11-01

    A high-integrity radioactive waste container has been developed to immobilize the spent resin wastes from nuclear power plants, protect possible future, inadvertent intruders from damaging radiation. The polymer concrete container is designed to ensure safe and reliable disposal of the radioactive waste for a minimum period of 300 years. A built-in vent system for each container will permit the release of gas. An experimental evaluation of the mechanical, chemical, and biological tests of the container was carried out. The tests showed that the polymer concrete container is adequate for safe disposal of the radioactive wastes. (author)

  19. Wellbore enlargement investigation: Potential analogs to the Waste Isolation Pilot Plant during inadvertent intrusion of the repository

    International Nuclear Information System (INIS)

    Boak, D.M.; Dotson, L.; Aguilar, R.

    1997-01-01

    This study involved the evaluation and documentation of cases in which petroleum wellbores were enlarged beyond the nominal hole diameter as a consequence of erosion during exploratory drilling, particularly as a function of gas flow into the wellbore during blowout conditions. A primary objective was to identify analogs to potential wellbore enlargement at the Waste Isolation Pilot Plant (WIPP) during inadvertent human intrusion. Secondary objectives were to identify drilling scenarios associated with enlargement, determine the physical extent of enlargement, and establish the physical properties of the formation in which the enlargement occurred. No analogs of sufficient quality to establish quantitative limits on wellbore enlargement at the WIPP disposal system were identified. However, some information was obtained regarding the frequency of petroleum well blowouts and the likelihood that such blowouts would bridge downhole, self-limiting the surface release of disposal-system material. Further work would be necessary, however, to determine the conditions under which bridging could occur and the extent to which the bridging might be applicable to WIPP. In addition, data on casing sizes of petroleum boreholes in the WIPP vicinity support the use of a 12-1/4 inch borehole size in WIPP performance assessment calculations. Finally, although data are limited, there was no evidence of significant wellbore enlargement in any of three blowouts that occur-red in wellbores in the Delaware Basin (South Culebra Bluff Unit No. 1, Energy Research and Development Administration (ERDA) 6, and WIPP 12)

  20. Sinus anatomy associated with inadvertent cerebrospinal fluid leak during functional endoscopic sinus surgery.

    Science.gov (United States)

    Heaton, Chase M; Goldberg, Andrew N; Pletcher, Steven D; Glastonbury, Christine M

    2012-07-01

    Anatomic variations in skull base anatomy may predispose the surgeon to inadvertent skull base injury with resultant cerebrospinal fluid (CSF) leak during functional endoscopic sinus surgery (ESS). Our objective was to compare preoperative sinus imaging of patients who underwent FESS with and without CSF leak to elucidate these variations. In this retrospective case-control study, 18 patients with CSF leak following FESS for chronic rhinosinusitis (CRS) from 2000 to 2011 were compared to 18 randomly selected patients who underwent preoperative imaging for FESS for CRS. Measurements were obtained from preoperative computed tomography images with specific attention to anatomic differences in cribriform plate and ethmoid roof heights in the coronal plane, and the skull base angle in the sagittal plane. Mean values of measured variables were compared using a nonparametric Mann-Whitney test. When compared to controls, patients with CSF leak demonstrated a greater angle of the skull base in the sagittal plane (P variations may help to prevent iatrogenic CSF leak. Copyright © 2012 The American Laryngological, Rhinological, and Otological Society, Inc.

  1. Safety assessment on the human intrusion scenarios of near surface disposal facility for low and very low level radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Hong, Sung Wook; Park, Jin Baek [Korea Radioactive Waste Agency, Daejeon (Korea, Republic of); Park, Sang Ho [Chungnam National University, Daejeon (Korea, Republic of)

    2016-03-15

    The second-stage near surface disposal facility for low and very low level radioactive waste's permanent disposal is to be built. During the institutional control period, the inadvertent intrusion of the general public is limited. But after the institutional control period, the access to the general public is not restricted. Therefore human who has purpose of residence and resource exploration can intrude the disposal facility. In this case, radioactive effects to the intruder should be limited within regulatory dose limits. This study conducted the safety assessment of human intrusion on the second-stage surface disposal facility through drilling and post drilling scenario. Results of drilling and post drilling scenario were satisfied with regulatory dose limits. The result showed that post-drilling scenario was more significant than drilling scenario. According to the human intrusion time and behavior after the closure of the facility, dominant radionuclide contributing to the intruder was different. Sensitivity analyses on the parameters about the human behavior were also satisfied with regulatory dose limits. Especially, manual redistribution factor was the most sensitive parameter on exposure dose. A loading plan of spent filter waste and dry active waste was more effective than a loading plan of spent filter waste and other wastes for the radiological point of view. These results can be expected to provide both robustness and defense in depth for the development of safety case further.

  2. Definition of intrusion scenarios and example concentration ranges for the disposal of near-surface waste at the Hanford Site

    International Nuclear Information System (INIS)

    Aaberg, R.L.; Kennedy, W.E. Jr.

    1990-10-01

    The US Department of Energy (DOE) is in the process of conducting performance assessments of its radioactive waste sites and disposal systems to ensure that public health and safety are protected, the environment is preserved, and that no remedial actions after disposal are required. Hanford Site low-level waste performance assessments are technical evaluations of waste sites or disposal systems that provide a basis for making decisions using established criteria. The purpose of this document is to provide a family of scenarios to be considered when calculating radionuclide exposure to individuals who may inadvertently intrude into near-surface waste disposal sites. Specific performance assessments will use modifications of the general scenarios described here to include additional site/system details concerning the engineering design, waste form, inventory, and environmental setting. This document also describes and example application of the Hanford-specific scenarios in the development of example concentration ranges for the disposal of near-surface wastes. The overall goal of the example calculations is to illustrate the application of the scenarios in a performance assessment to assure that people in the future cannot receive a dose greater than an established limit. 24 refs., 2 figs., 5 tabs

  3. Performance Assessment for the Idaho National Laboratory Remote-Handled Low-Level Waste Disposal Facility

    Energy Technology Data Exchange (ETDEWEB)

    Annette L. Schafer; A. Jeffrey Sondrup; Arthur S. Rood

    2012-05-01

    This performance assessment for the Remote-Handled Low-Level Radioactive Waste Disposal Facility at the Idaho National Laboratory documents the projected radiological dose impacts associated with the disposal of low-level radioactive waste at the facility. This assessment evaluates compliance with the applicable radiological criteria of the U.S. Department of Energy and the U.S. Environmental Protection Agency for protection of the public and the environment. The calculations involve modeling transport of radionuclides from buried waste to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses are calculated for both offsite receptors and individuals who inadvertently intrude into the waste after site closure. The results of the calculations are used to evaluate the future performance of the low-level radioactive waste disposal facility and to provide input for establishment of waste acceptance criteria. In addition, one-factor-at-a-time, Monte Carlo, and rank correlation analyses are included for sensitivity and uncertainty analysis. The comparison of the performance assessment results to the applicable performance objectives provides reasonable expectation that the performance objectives will be met

  4. Reducing pesticide drift by considering propeller rotation effects from aerial application and near buffer zones

    Science.gov (United States)

    Off-target drift of chemical from agricultural spraying can damage sensitive crops, destroy beneficial insects, and intrude on human and domestic animal habitats, threatening environmental quality. Reduction of drift from aerial application can be facilitated at the edge of a field by offsetting spr...

  5. Passive Barriers to Inadvertent Human Intrusion for Use at the Nevada Test Site

    International Nuclear Information System (INIS)

    NSTec Environmental Management

    2007-01-01

    In July1996, BN transmitted Passive Barriers to Inadvertent Human Intrusion for Use at the Nevada Test Site to the United States Department of Energy, under Contract DE-AC08-91NV10833. The 1996 paper had a limited distribution and was not reviewed for public release. In 2007, National Security Technologies LLC (NSTec) made minor revisions to conform to current editorial standards of the NNSA/NSO and to meet current security requirements for public release. The primary purpose of this study was to identify types of engineered passive barriers that could deter future intrusion into buried low-level radioactive waste, particularly intrusion by drilling water wells. The study considered drilling technology, many natural and man-made materials, and both underground and above-ground barriers. Based on cost and effectiveness, the report recommended underground barriers consisting of a layer of rubble or tires. An aboveground barrier mound might also prove effective, but would cost more, and may become an attractive nuisance (e.g., might, after their purpose has been forgotten, encourage exploration for the sake of satisfying curiosity). Advances in drilling technology could render any engineered barriers ineffective if there is motivation to penetrate the barriers

  6. Inadvertent weather modification urban areas - lessons for global climate change

    Energy Technology Data Exchange (ETDEWEB)

    Changnon, S A [Illinois State Water Survey, Champaign, IL (USA)

    1992-05-01

    Large metropolitan areas in North America, home to 65% of the USA's population, have created major changes in their climates over the past 150 years. The rate and amount of the urban climate change approximate those being predicted globally using climate models. Knowledge of urban weather and climate modification holds lessons for the global climate change issue. First, adjustments to urban climate changes can provide guidance for adjusting to global change. A second lesson relates to the difficulty but underscores the necessity of providing scientifically credible proof of change within the noise of natural climatic variability. The evolution of understanding about how urban conditions influence weather reveals several unexpected outcomes, particularly relating to precipitation changes. These suggest that similar future surprises can be expected in a changed global climate, a third lesson. In-depth studies of how urban climate changes affected the hydrologic cycle, the regional economy, and human activities were difficult because of data problems, lack of impact methodology, and necessity for multidisciplinary investigations. Similar impact studies for global climate change will require diverse scientific talents and funding commitments adequate to measure the complexity of impacts and human adjustments. Understanding the processes whereby urban areas and other human activities have altered the atmosphere and changed clouds and precipitation regionally appears highly relevant to the global climate-change issue. Scientific and governmental policy development needs to recognize an old axiom that became evident in the studies of inadvertent urban and regional climate change and their behavioural implications: Think globally but act locally. Global climate change is an international issue, and the atmosphere must be treated globally. But the impacts and the will to act and adjust will occur regionally.

  7. Inadvertent weather modification urban areas - lessons for global climate change

    International Nuclear Information System (INIS)

    Changnon, S.A.

    1992-01-01

    Large metropolitan areas in North America, home to 65% of the USA's population, have created major changes in their climates over the past 150 years. The rate and amount of the urban climate change approximate those being predicted globally using climate models. Knowledge of urban weather and climate modification holds lessons for the global climate change issue. First, adjustments to urban climate changes can provide guidance for adjusting to global change. A second lesson relates to the difficulty but underscores the necessity of providing scientifically credible proof of change within the noise of natural climatic variability. The evolution of understanding about how urban conditions influence weather reveals several unexpected outcomes, particularly relating to precipitation changes. These suggest that similar future surprises can be expected in a changed global climate, a third lesson. In-depth studies of how urban climate changes affected the hydrologic cycle, the regional economy, and human activities were difficult because of data problems, lack of impact methodology, and necessity for multidisciplinary investigations. Similar impact studies for global climate change will require diverse scientific talents and funding commitments adequate to measure the complexity of impacts and human adjustments. Understanding the processes whereby urban areas and other human activities have altered the atmosphere and changed clouds and precipitation regionally appears highly relevant to the global climate-change issue. Scientific and governmental policy development needs to recognize an old axiom that became evident in the studies of inadvertent urban and regional climate change and their behavioural implications: Think globally but act locally. Global climate change is an international issue, and the atmosphere must be treated globally. But the impacts and the will to act and adjust will occur regionally

  8. Control of Transboundary Movement of Radioactive Material Inadvertently Incorporated into Scrap Metal and Semi-finished Products of the Metal Recycling Industries. Results of the Meetings Conducted to Develop a Draft Code of Conduct

    International Nuclear Information System (INIS)

    2014-02-01

    In 2010, the IAEA initiated the development of a code of conduct on the transboundary movement of radioactive material inadvertently incorporated into scrap metal and semi- finished products of the metal recycling industries (Metal Recycling Code of Conduct). The Metal Recycling Code of Conduct was intended to harmonize the approaches of Member States in relation to the discovery of radioactive material that may inadvertently be present in scrap metals and semi-finished products subject to transboundary movement, and their safe handling and management to facilitate regulatory control. The Metal Recycling Code of Conduct was envisaged as being complementary to the Safety Guide on Control of Orphan Sources and Other Radioactive Material in the Metal Recycling and Production Industries (IAEA Safety Standards Series No. SSG-17), which provides recommendations, principally within a national context, on the protection of workers, members of the public and the environment in relation to the control of radioactive material inadvertently incorporated in scrap metal. In February 2013, the third open-ended meeting of technical and legal experts to develop the Metal Recycling Code of Conduct was organized. The objective of this meeting was to address the comments received from Member States and to finalize the text of the draft Metal Recycling Code of Conduct. Representatives from 55 Member States, one non-Member State and the EU, together with seven observers from the metal recycling industry, reviewed the comments and revised the draft accordingly. In September 2013, in Resolution GC(57)/RES/9, the IAEA General Conference recorded that it 'Appreciates the intensive efforts undertaken by the Secretariat to develop a code of conduct on the transboundary movement of scrap metal, or materials produced from scrap metal, that may inadvertently contain radioactive material, and encourages the Secretariat to make the results of the discussion conducted on this issue available to

  9. Management of traumatically intruded permanent maxillary lateral incisor - Case report and review of literature

    Directory of Open Access Journals (Sweden)

    Deepak Sharma

    2016-01-01

    Full Text Available Primary etiologic factors of trauma in the permanent dentition are bicycle accidents, sports accidents, falls, and fights. From the standpoint of therapy, anatomy, and prognosis, five different types of luxation lesions are recognized: Concussion, subluxation, extrusive luxation, lateral luxation, and intrusive luxation. Intrusive luxation is apical displacement of tooth into the alveolar bone. The tooth is driven into the socket, compressing the periodontal ligament, and commonly causes a crushing fracture of the alveolar socket. It is considered one of the most severe luxation injuries to affect permanent teeth. Intrusion injuries are often associated with severe damage to the tooth, periodontium, and pulpal tissue. The rare occurrence of this injury, 0.3–1.9% in the permanent dentition, has resulted in limited studies to support suggested treatment regimens. Clinical treatment for intrusion is especially difficult because of the severe complications accompanying it. These complications include pulp necrosis or obliteration, inflammatory root resorption, ankylosis, replacement root resorption, and loss of marginal bone support. Hence, the aim of presenting this case report of intrusive luxation is to highlight the importance of prompt care and root canal dressing and discuss the several treatments proposed to reposition the intruded teeth.

  10. Development of closure criteria for inactive radioactive waste disposal sites at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1989-01-01

    The Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA), as amended, specifies that cleanup of inactive waste disposal sites at Department of Energy (DOE) facilities shall at least attain legally applicable or relevant and appropriate requirements (ARARs) for cleanup or control of environmental contamination. This paper discusses potential ARARs for cleanup of inactive radioactive waste disposal sites and proposes a set of closure criteria for such sites at Oak Ridge National Laboratory (ORNL). The most important potential ARARs include Federal standards for radiation protection of the public, radioactivity in drinking water, and near-surface land disposal of radioactive wastes. On the basis of these standards, we propose that cleanup and closure of inactive radioactive waste disposal sites at ORNL shall achieve (1) limits on annual effective dose equivalent for off-site individuals and inadvertent intruders that conform to the DOE's performance objectives for new low-level waste disposal facilities and (2) to the extent reasonably achievable, limits on radionuclide concentrations in ground water and surface waters in accordance with Federal drinking water standards and ground-water protection requirements

  11. Selection of Computer Codes for Shallow Land Waste Disposal in PPTA Serpong

    International Nuclear Information System (INIS)

    Syahrir

    1996-01-01

    Selection of Computer Codes for Shallow Land Waste Disposal in PPTA Serpong. Models and computer codes have been selected for safety assessment of near surface waste disposal facility. This paper provides a summary and overview of the methodology and codes selected. The methodology allows analyses of dose to individuals from offsite releases under normal conditions as well as on-site doses to inadvertent intruders. A demonstration in the case of shallow land waste disposal in Nuclear Research Establishment are in Serpong has been given for normal release scenario. The assessment includes infiltration of rainfall, source-term, ground water (well) and surface water transport, food-chain and dosimetry. The results show dose history of maximally exposed individuals. The codes used are VS2DT, PAGAN and GENII. The application of 1 m silt loam as a moisture barrier cover decreases flow in the disposal unit by a factor of 27. The selected radionuclides show variety of dose histories according to their chemical and physical characteristics and behavior in the environment

  12. U-Pb SHRIMP data and geochemical characterization of granitoids intruded along the Coxixola shear zone, Provincia Borborema, NE Brazil

    Energy Technology Data Exchange (ETDEWEB)

    Guimaraes, Ignez de Pinho; Silva Filho, Adejardo Francisco da; Silva, Francis M.J.V. da, E-mail: ignez@ufpe.br [Universidade Federal de Pernanmbuco (UFPE), Recife, PE (Brazil). Dept. de Geologia; Armstrong, Richard [Australian National University (Australia)

    2011-07-01

    A large volume of granitic magmatism associated with large scale shear zone and metamorphism under high-T amphibolite facies conditions characterize the Brasiliano Orogeny in the Borborema Province, NE Brazil. Granitoids from two plutons and later dykes intruded along the Coxixola shear zone show distinct crystallization ages and geochemical signature. The oldest granitoids (618 ± 5 Ma), Serra de Inacio Pereira Pluton are coeval with the peak of regional metamorphism and they were probably originated by melting of a paleoproterozoic source. The granitoids from the Serra do Marinho Pluton show crystallization age of 563 ± 4 Ma and geochemical signature of post-collisional A-type granites. The later dykes have crystallization age of 526 ± 7 Ma, geochemical signature of A-type granitoids. (author)

  13. DIRECT USAGE OF MINISCREW ANCHORAGE TO INTRUDE OVERERUPTED MAXILLARY POSTERIOR TEETH BEFORE PROSTHODONTIC PREPARATION:A CASE REPORT

    Directory of Open Access Journals (Sweden)

    Yasemin Bahar Acar

    2016-01-01

    Full Text Available Overeruption of maxillary molars due loss of opposing teeth creates occlusal and functional interferences. Before reconstruction can be initiated, intrusion of overerupted molars becomes essential. This report illustrates treatment of overerupted maxillary premolar and molar via direct use of miniscrew anchorage. A 24-year old female had lost first and second left mandibular molars due to pulpal necrotizing agents, resulting with a large alveolar bone defect and overerupted maxillary premolar and molar. She had a history of unsuccessful alveolar distraction of mandibular left premolars to increase the alveolar bone height prior to implant placement. Patient was satisfied with her smile and refused comprehensive orthodontic treatment. Maxillary premolar and molar were intruded segmentally for 4mm in 8 months, using a combination of a mini-implant and partialfixed edgewise appliances. Biological responses of teeth and surrounding bony structures to intrusion appeared normal and acceptable in radiographic and clinical examination.

  14. Applications of radio frequency identification systems in the mining industry

    Energy Technology Data Exchange (ETDEWEB)

    Hind, D [Davis Derby Limited (United Kingdom)

    1994-12-31

    The paper describes the application of Radio Frequency Identification (RFID) systems in the mining industry for both surface and underground mines. The history of the RFID system, types available, the transponder, and the various techniques used are described and compared. The design and certification of a system for use in a hazardous area are described, noting the hazard of inadvertent detonator ignition. 2 refs.

  15. Evolution of the Collectivity around 68Ni: role of intruder states

    International Nuclear Information System (INIS)

    Dijon, A.

    2012-01-01

    The evolution of magic numbers as a function of the neutron number for a given chain of isotopes is one of the major goals of nuclear physics today. Changing magic numbers may lead to profound modifications in the structure of exotic nuclei and manifest themselves experimentally in rapid changes of collectivity and shapes. In this thesis we have studied nuclei around 68 Ni produced in deep inelastic collisions at GANIL. The nuclei of interest were selected and identified by the large acceptance VAMOS recoil spectrometer. Their structure was studied via the detection of the gamma rays emitted at the target point by the EXOGAM array. In one of the two experiments we also installed a specific setup dedicated to the measurements of the delayed gamma rays emitted by the nuclei after their implantation at the focal plane of VAMOS. In the first experiment we have observed a new isomeric state in 68 Ni with a proton intruder configuration at an excitation energy which sensitively depends on the Z=28 and N=40 shell gaps. New transitions were also identified in odd-mass isotopes of Co, Fe and Mn. In the second experiment we have measured the lifetimes of the first-excited states in 63,65 Co using the recoil distance Doppler shift method. From these lifetimes electromagnetic transition probabilities could be deduced, which in turn shed light on the collectivity of the studied isotopes. Comparisons with the shell model and with mean field calculations were carried and provided additional information on the proton-neutron interaction as well as on the evolution of the collectivity in this mass region. (author) [fr

  16. Female song rates in response to simulated intruder are positively related to reproductive success.

    Directory of Open Access Journals (Sweden)

    Kristal E Cain

    2015-10-01

    Full Text Available Bird song is well studied in males as a sexually selected behavior. However, although song is also common among females, it is infrequently examined and poorly understood. Research suggests that song is often used as a resource defense behavior and is important in female-female competition for limited resources, e.g. mates and territories. If so, song should be positively related to fitness and related to other resource defense behaviors, but this possibility has rarely been explored. Here we examine fitness estimates in relation to spontaneous song rates and song rates in response to a simulated intruder (playback, in the superb fairy-wren (Malurus cyaneus, a cooperatively breeding songbird. We also determine how song rates relate to other territorial defense behaviors. Song rate in response to playback, but not spontaneous song rate, was positively related to nest success and the number of fledglings produced by successful females. Further, response song rate was also correlated with other territorial defense behaviors (latency to respond and flights. This evidence supports the hypothesis that female song may be used in the context of female-female competition to improve access to limited reproductive resources, and suggests that song may provide direct fitness benefits.

  17. Context for performance assessment

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1997-01-01

    In developing its recommendations on performance assessment for disposal of low-level radioactive waste, Scientific committee 87-3 of the National Council on Radiation Protection and Measurements (NCRP) has considered a number of topics that provide a context for the development of suitable approaches to performance assessment. This paper summarizes the Committee' discussions on these topics, including (1) the definition of low-level waste and its sources and properties, as they affect the variety of wastes that must be considered, (2) fundamental objectives and principles of radioactive waste disposal and their application to low-level waste, (3) current performance objectives for low-level waste disposal in the US, with particular emphasis on such unresolved issues of importance to performance assessment as the time frame for compliance, requirements for protection of groundwater and surface water, inclusion of doses from radon, demonstrating compliance with fixed performance objectives using highly uncertain model projections, and application of the principle that releases to the environment should be maintained as low as reasonably achievable (ALARA), (4) the role of active and passive institutional controls over disposal sites, (5) the role of the inadvertent human intruder in low-level waste disposal, (6) model validation and confidence in model outcomes, and (7) the concept of reasonable assurance of compliance

  18. Task-oriented quality assessment and adaptation in real-time mission critical video streaming applications

    Science.gov (United States)

    Nightingale, James; Wang, Qi; Grecos, Christos

    2015-02-01

    In recent years video traffic has become the dominant application on the Internet with global year-on-year increases in video-oriented consumer services. Driven by improved bandwidth in both mobile and fixed networks, steadily reducing hardware costs and the development of new technologies, many existing and new classes of commercial and industrial video applications are now being upgraded or emerging. Some of the use cases for these applications include areas such as public and private security monitoring for loss prevention or intruder detection, industrial process monitoring and critical infrastructure monitoring. The use of video is becoming commonplace in defence, security, commercial, industrial, educational and health contexts. Towards optimal performances, the design or optimisation in each of these applications should be context aware and task oriented with the characteristics of the video stream (frame rate, spatial resolution, bandwidth etc.) chosen to match the use case requirements. For example, in the security domain, a task-oriented consideration may be that higher resolution video would be required to identify an intruder than to simply detect his presence. Whilst in the same case, contextual factors such as the requirement to transmit over a resource-limited wireless link, may impose constraints on the selection of optimum task-oriented parameters. This paper presents a novel, conceptually simple and easily implemented method of assessing video quality relative to its suitability for a particular task and dynamically adapting videos streams during transmission to ensure that the task can be successfully completed. Firstly we defined two principle classes of tasks: recognition tasks and event detection tasks. These task classes are further subdivided into a set of task-related profiles, each of which is associated with a set of taskoriented attributes (minimum spatial resolution, minimum frame rate etc.). For example, in the detection class

  19. Inadvertent recovery in communication deficits following the upper limb mirror therapy in stroke: A case report.

    Science.gov (United States)

    Arya, Kamal Narayan; Pandian, Shanta

    2014-10-01

    Broca's aphasia is the most challenging communication deficit in stroke. Left inferior frontal gyrus (IFG), a key region of the mirror-neuron system, gets lesioned in Broca's aphasia. Mirror therapy (MT), a form of action-observation, may trigger the mirror neurons. The aim of this study was to report a case of poststroke subject with Broca's aphasia, who exhibited an inadvertent and significant improvement in speech after MT for the paretic upper limb. The 20-month old stroke patient underwent MT through goal-directed tasks. He received a total absence of spontaneous speech, writing, and naming. After 45 sessions of task-based MT for the upper limb, he showed tremendous recovery in expressive communication. He had fluent and comprehensive communication; however, with a low pitch and minor pronunciation errors. He showed a substantial change (from 18/100 to 79/100) on the Communicative Effective Index, particularly, on items such as expressing emotions, one-to-one conversation, naming, and spontaneous conversation. Copyright © 2014 Elsevier Ltd. All rights reserved.

  20. Study for on-line system to identify inadvertent control rod drops in PWR reactors using ex-core detector and thermocouple measures

    International Nuclear Information System (INIS)

    Souza, Thiago J.; Medeiros, Jose A.C.C.; Goncalves, Alessandro C.

    2015-01-01

    Accidental control rod drops event in PWR reactors leads to an unsafe operating condition. It is important to quickly identify the rod to minimize undesirable effects in such a scenario. In this event, there is a distortion in the power distribution and temperature in the reactor core. The goal of this study is to develop an on-line model to identify the inadvertent control rod dropped in PWR reactor. The proposed model is based on physical correlations and pattern recognition of ex-core detector responses and thermocouples measures. The results of the study demonstrated the feasibility of an on-line system, contributing to safer operation conditions and preventing undesirable effects, as its shutdown. (author)

  1. Study for on-line system to identify inadvertent control rod drops in PWR reactors using ex-core detector and thermocouple measures

    Energy Technology Data Exchange (ETDEWEB)

    Souza, Thiago J.; Medeiros, Jose A.C.C.; Goncalves, Alessandro C., E-mail: tsouza@nuclear.ufrj.br, E-mail: canedo@lmp.ufrj.br, E-mail: alessandro@nuclear.ufrj.br [Coordenacao dos Programas de Pos-Graduacao em Engenharia (COPPE/UFRJ), Rio de Janeiro, RJ (Brazil). Programa de Engenharia Nuclear

    2015-07-01

    Accidental control rod drops event in PWR reactors leads to an unsafe operating condition. It is important to quickly identify the rod to minimize undesirable effects in such a scenario. In this event, there is a distortion in the power distribution and temperature in the reactor core. The goal of this study is to develop an on-line model to identify the inadvertent control rod dropped in PWR reactor. The proposed model is based on physical correlations and pattern recognition of ex-core detector responses and thermocouples measures. The results of the study demonstrated the feasibility of an on-line system, contributing to safer operation conditions and preventing undesirable effects, as its shutdown. (author)

  2. Mixed low-level waste form evaluation

    International Nuclear Information System (INIS)

    Pohl, P.I.; Cheng, Wu-Ching; Wheeler, T.; Waters, R.D.

    1997-01-01

    A scoping level evaluation of polyethylene encapsulation and vitreous waste forms for safe storage of mixed low-level waste was performed. Maximum permissible radionuclide concentrations were estimated for 15 indicator radionuclides disposed of at the Hanford and Savannah River sites with respect to protection of the groundwater and inadvertent intruder pathways. Nominal performance improvements of polyethylene and glass waste forms relative to grout are reported. These improvements in maximum permissible radionuclide concentrations depend strongly on the radionuclide of concern and pathway. Recommendations for future research include improving the current understanding of the performance of polymer waste forms, particularly macroencapsulation. To provide context to these estimates, the concentrations of radionuclides in treated DOE waste should be compared with the results of this study to determine required performance

  3. Anatomy of an intruded coal, I: Effect of contact metamorphism on whole-coal geochemistry, Springfield (No. 5) (Pennsylvanian) coal, Illinois Basin

    Energy Technology Data Exchange (ETDEWEB)

    Rimmer, Susan M. [Department of Geology, Southern Illinois University Carbondale, Carbondale, IL 62901 (United States); Yoksoulian, Lois E. [Department of Earth and Environmental Sciences, University of Kentucky, Lexington, KY 40506 (United States); Hower, James C. [Center for Applied Energy Research, University of Kentucky, 2540 Research Park Drive, Lexington, KY 40511 (United States)

    2009-08-01

    If time and heating rate are important agents in coal maturation, one might expect to see differences in chemical changes in response to maturation depending on the means of increased rank. Using a suite of samples obtained from an intruded Pennsylvanian-age coal in southern Illinois, we present whole-coal chemical data. Comparing these data to extant geochemical data for coals that have undergone normal burial maturation, we evaluated the hypothesis that if coal alteration occurs rapidly (due to intrusion) rather than gradually (burial maturation), then different relationships are seen in chemical composition (proximate and ultimate analyses) and vitrinite reflectance. The Pennsylvanian-age (Asturian [Westphalian D]) Springfield (No. 5) coal is mined at the Big Ridge Mine, near Eldorado, southern Illinois. This high volatile B bituminous coal was intruded by an ultramafic igneous intrusion during the early Permian. Alteration occurs out to {proportional_to} 1.2 x dike thickness and includes an increase in random vitrinite reflectance (R{sub m}) from levels {proportional_to} 0.7% to over 5.3%, loss of liptinites, and formation of devolatilization vacuoles and fine mosaic texture. Decreases in volatile matter (VM) and increases in fixed carbon (FC) appear to be less than would be expected for the level of reflectance seen within the alteration halo. Carbonate minerals have a major influence on proximate analyses but even following the removal of carbonates, the decrease in VM is still less than would be seen in coals of similar vitrinite reflectance that were altered by normal burial maturation. Carbonate mineralization also contributes to variability in ultimate analysis values approaching the intrusion, particularly for %C and %O. After carbonate removal, data for these coals do not appear to follow the normal burial coalification tracks when plotted on a van Krevelen diagram and on a Seyler chart. These differences suggest that a slightly different maturation

  4. Comparison of resistive heating and forced-air warming to prevent inadvertent perioperative hypothermia.

    Science.gov (United States)

    John, M; Crook, D; Dasari, K; Eljelani, F; El-Haboby, A; Harper, C M

    2016-02-01

    Forced-air warming is a commonly used warming modality, which has been shown to reduce the incidence of inadvertent perioperative hypothermia (heating mattresses offer a potentially cheaper alternative, however, and one of the research recommendations from the National Institute for Health and Care Excellence was to evaluate such devices formally. We conducted a randomized single-blinded study comparing perioperative hypothermia in patients receiving resistive heating or forced-air warming. A total of 160 patients undergoing non-emergency surgery were recruited and randomly allocated to receive either forced-air warming (n=78) or resistive heating (n=82) in the perioperative period. Patient core temperatures were monitored after induction of anaesthesia until the end of surgery and in the recovery room. Our primary outcome measures included the final intraoperative temperature and incidence of hypothermia at the end of surgery. There was a significantly higher rate of hypothermia at the end of surgery in the resistive heating group compared with the forced-air warming group (P=0.017). Final intraoperative temperatures were also significantly lower in the resistive heating group (35.9 compared with 36.1°C, P=0.029). Hypothermia at the end of surgery in both warming groups was common (36% forced air warming, 54% resistive heating). Our results suggest that forced-air warming is more effective than resistive heating in preventing postoperative hypothermia. NCT01056991. © The Author 2016. Published by Oxford University Press on behalf of the British Journal of Anaesthesia. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  5. Influence of i13/2 proton and j15/2 neutron intruding orbitals on the behaviour of 190 mass region superdeformed nuclei

    International Nuclear Information System (INIS)

    Duprat, J.

    1995-01-01

    This work concerns the study of the nuclear superdeformation phenomenon in the A = 190 mass region. The superdeformed (SD) states in 193 Tl, 194 Tl 195 Tl were produced via heavy-ion induced reactions and studied with the EUROGAM gamma multidetector array. The analysis of high-multiplicity events allowed the study of the magnetic properties of the SD states in these nuclei. For the first time, the g-factor of a proton orbital in a SD nucleus in the A = 190 mass region has been extracted. This measurement indicates that the two known bands in 195 Tl-SD are built on the i 13/2 proton intruder orbital. A new SD band has been found in this isotope: it is the first SD band built on an excited proton state found in the A = 190 region. Finally an interaction between two pairs of bands has been established in 194 Tl; this interaction indicate the crossing of two neutron orbitals above the N = 112 gap. The magnetic properties of the states of the SD bands in 194 Tl reveals that these bands are built on configurations in which the single proton and neutron intrinsic spins are aligned. Comparison between different SD bands in the Thallium isotopes shows the prominent role of the i 13/2 proton and the j 15/2 neutron intruder orbitals in the smooth increase of the dynamical moment of inertia as a function of the rotational frequency. In addition, this work reports on the first observation of a SD rotational band produced in a (HI, αxn) reaction channel. The study of the maximum spin reached by the SD bands indicates both a competition between alpha emission and fission of the compound nucleus, and the limitation due to the fission process in the population of the SD nuclei in the A = 190 region. (author). 120 refs., 112 figs., 22 tabs., 2 ann

  6. Long-term climate change assessment study plan for the Hanford Site Permanent Isolation Barrier Development Program

    International Nuclear Information System (INIS)

    Petersen, K.L.; Chatters, J.C.; Waugh, W.J.

    1993-05-01

    The Hanford Site Permanent Isolation Barrier Development Program (Barrier Development Program) was organized to develop the technology needed to provide an in-place disposal capability for low-level nuclear waste for the US Department of Energy at the Hanford Site in south-central Washington. The goal of the Barrier Development Program is to provide defensible evidence that final barrier design(s) will adequately control water infiltration, plant and animal intrusion, and wind and water erosion for a minimum of 1,000 yr; to isolate wastes from the accessible environment; and to use markers to warn inadvertent human intruders. Evidence for barrier performance will be obtained by conducting laboratory experiments, field tests, computer modeling, and other studies that establish confidence in the barrier's ability to meet its 1,000-yr design life

  7. Inadvertent chest tube insertion in congenital cystic adenomatoid malformation and congenital lobar emphysema-highlighting an important problem

    International Nuclear Information System (INIS)

    Prabhu, Shailesh M; Choudhury, Subhasis Roy; Solanki, Ravi S; Shetty, Gurucharan S; Agarwala, Surenderkumar

    2013-01-01

    Chest tube insertion in congenital cystic lung lesions is an important problem in children with acute respiratory distress having a cystic lucent lesion on chest radiograph. To evaluate the imaging findings and complications in cases of congenital cystic lung lesions with chest tube insertion and suggest the role of appropriate imaging for management of these patients. Chest radiographs and CT scans of children with congenital cystic lung lesions who had inadvertent chest tube insertion preoperatively were retrospectively reviewed for imaging appearances and complications. Fifteen patients comprising 10 cases of congenital cystic adenomatoid malformation (CCAM) and 5 cases of congenital lobar emphysema (CLE) were included. Majority of the cases were infants. CCAM was misdiagnosed as complicated pneumatocele (n = 5) and pneumothorax (n = 5), while CLE was misdiagnosed as tension pneumothorax (n = 5) on the chest radiograph findings. Final diagnosis was made on CT and operative findings with histopathology. Complications noted were pneumothorax, hydropneumothorax, and infection in cases of CCAM, and change in imaging appearance and pneumothorax in cases of CLE. Chest tube insertion in congenital cystic lesions increases the rate of associated complications. Chest CT has a definite role in early diagnosis and deciding appropriate management in these cases

  8. The social image of drinking - mass media campaigns may inadvertently increase binge drinking.

    Science.gov (United States)

    Zimmermann, Friederike; Kohlmann, Karoline; Monter, Anne; Ameis, Nina

    2017-10-01

    Mass media campaigns that promote responsible drinking are rarely tested for their usefulness in reducing heavy alcohol consumption. Existing campaigns that appeal to responsible drinking while simultaneously displaying young people in social drinking situations may even have paradoxical effects. To examine such possible effects, we drew on a real-world media campaign, which we systematically modified on the basis of recent prototype research. We pilot tested questionnaires (using n = 41 participants), developed two different sets of posters in the style of an existing campaign (n = 39) and investigated their effectiveness (n = 102). In the main study, young men were randomly assigned to one of three conditions: sociable or unsociable binge drinker prototype condition or a control group. Outcome variables were intention, behavioural willingness, attitude, subjective norm, self-efficacy, prototype evaluation and prototype similarity with respect to binge drinking. Binge drinking as a habit was included to control for the fact that habitual drinking in social situations is hard to overcome and poses a particular challenge to interventions. The manipulation check showed that the experimental variation (sociable vs. unsociable drinker prototype condition) was successful. Results of the main study showed that the sociable drinker prototype condition resulted in a higher willingness and - for those with less of a habit - a higher intention to binge drink the next weekend. The unsociable drinker prototype condition had no effects. The results imply that the social components of mass media campaigns might inadvertently exacerbate binge drinking in young men. We therefore advocate against campaigns including aspects of alcohol consumption that might be positively associated with drinker prototype perception. Finally, we provide suggestions for future research.

  9. Moving Object Tracking and Its Application to an Indoor Dual-Robot Patrol

    Directory of Open Access Journals (Sweden)

    Cheng-Han Shih

    2016-11-01

    Full Text Available This paper presents an application of image tracking using an omnidirectional wheeled mobile robot (WMR. The objective of this study is to integrate image processing of hue, saturation, and lightness (HSL for fuzzy color space, and use mean shift tracking for object detection and a Radio Frequency Identification (RFID reader for confirming destination. Fuzzy control is applied to omnidirectional WMR for indoor patrol and intruder detection. Experimental results show that the proposed control scheme can make the WMRs perform indoor security service.

  10. Safety significance of inadvertent operation of motor-operated valves in nuclear power plants

    International Nuclear Information System (INIS)

    Ruger, C.J.; Higgins, J.C.; Carbonaro, J.F.; Hall, R.E.

    1994-01-01

    Concerns about the consequences of valve mispositioning were brought to the forefront following an event at Davis Besse in 1985. The concern related to the ability to reposition open-quotes position-changeableclose quotes motor-operated valves (MOVs) from the control room in the event of their inadvertent operation and was documented in U.S. Nuclear Regulatory Commission (USNRC) Bulletin 85-03 and Generic Letter (GL) 89-10. The mispositioned MOVs may not be able to be returned to their required position due to high differential pressure or high flow conditions across the valves. The inability to reposition such valves may have significantly safety consequences, as in the Davis Besse event. However, full consideration of such mispositioning in safety analyses and in MOV test programs can be labor intensive and expensive. Industry raised concerns that consideration of position-changeable valves under GL 89-10 would not decrease the probability of core damage to an extent that would justify licensee costs. As a response, Brookhaven National Laboratory has conducted separate scoping studies for both boiling water reactors (BWRs) and pressurized water reactors (PWRs) using probabilistic risk assessment (PRA) techniques to determine if such valve mispositioning by itself is significant to safety. The approach used internal events PRA models to survey the order of magnitude of the risk-significance of valve mispositioning by considering the failure of selected position-changeable MOVs. The change in core damage frequency was determined for each valve considered, and the results were presented as a risk increase ratio for each of four assumed MOV failure rates. The risk increase ratios resulting from this failure rate sensitivity study can be used as a basis for a determination of the risk-significance of the MOV mispositioning issues for BWRs and PWRs

  11. A Study on Establishment of Buffer Zone of Radioactive Waste Repository

    International Nuclear Information System (INIS)

    Yoon, Jeong Hyoun; Park, Joo Wan; Ju, Min Su; Kim, Chang Lak; Park, Jin Baek

    2008-01-01

    A new proposed repository has a final capacity of 800,000 drums radioactive waste. Most of foreign repositories have a general practice of segregating control zones which mainly contributes to classification of degree of control, whether it is called buffer zone or not. Domestic regulatory requirements of establishment of buffer zone in a repository are not much different from those of nuclear power plants for operation period, in which satisfactory design objective or performance objective is the most important factor in determination of the buffer zone. The meaning of buffer zone after closure is a minimum requested area which can prevent inadvertent intruders from leading to non-allowable exposure during institutional control period. Safety assessment with drinking well scenario giving rise to the highest probability of exposure among the intruder's actions can verify fulfillment of the buffer zone which is determined by operational safety of the repository. At present. for the repository to be constructed in a few years, the same procedure and concept as described in this paper are applied that can satisfy regulatory requirements and radiological safety as well. However, the capacity of the repository will be stepwise extended upto 800,000 drums, consequently its layout will be varied too. Timely considerations will be necessary for current boundary of the buffer zone which has been established on the basis of 100,000 drums disposal.

  12. Identification of deformed intruder states in semi-magic Ni70

    Energy Technology Data Exchange (ETDEWEB)

    Chiara, C. J.; Weisshaar, D.; Janssens, R. V. F.; Tsunoda, Y.; Otsuka, T.; Harker, J. L.; Walters, W. B.; Recchia, F.; Albers, M.; Alcorta, M.; Bader, V. M.; Baugher, T.; Bazin, D.; Berryman, J. S.; Bertone, P. F.; Campbell, C. M.; Carpenter, M. P.; Chen, J.; Crawford, H. L.; David, H. M.; Doherty, D. T.; Gade, A.; Hoffman, C. R.; Honma, M.; Kondev, F. G.; Korichi, A.; Langer, C.; Larson, N.; Lauritsen, T.; Liddick, S. N.; Lunderberg, E.; Macchiavelli, A. O.; Noji, S.; Prokop, C.; Rogers, A. M.; Seweryniak, D.; Shimizu, N.; Stroberg, S. R.; Suchyta, S.; Utsuno, Y.; Williams, S. J.; Wimmer, K.; Zhu, S.

    2015-04-01

    The structure of semi-magic Ni-70(28)42 was investigated following complementary multinucleon-transfer and secondary fragmentation reactions. Changes to the higher-spin, presumed negative-parity states based on observed gamma-ray coincidence relationships result in better agreement with shell-model calculations using effective interactions in the neutron f(5/2)pg(9/2) model space. The second 2(+) and (4(+)) states, however, can only be successfully described when proton excitations across the Z = 28 shell gap are included. Monte Carlo shell-model calculations suggest that the latter two states are part of a prolate-deformed intruder sequence, establishing an instance of shape coexistence at low excitation energies similar to that observed recently in neighboring Ni-68.

  13. Properties of low-lying intruder states in $^{34}$Al and $^{34}$Si sequentially populated in $\\beta$-decay of $^{34}$Mg

    CERN Multimedia

    A low-lying long-lived (26±1 ms) isomer in $^{34}$Al has been observed recently and assigned as 1$^{+}$ state of intruder character. It was populated in $^{36}$S fragmentation and feeds, in $\\beta$-decay, the 0$_{2}^{+}$ state in $^{34}$Si whose excitation energy and lifetime were determined in an electron-positron pairs spectroscopy experiment. In the present experiment we intend to measure for the first time the $\\gamma$-rays following the $\\beta$-decay of $^{34}$Mg. Despite the interest for $^{34}$Mg, the up-right corner of the “N$\\thicksim$20 island of inversion”, the only information on its $\\beta$-decay is the lifetime of 20±10 ms, determined from $\\beta$-neutron coincidences. As a result of the proposed experiment, we expect to place the first transitions in the level scheme of $^{34}$Al and to strongly populate the newly observed isomer, measuring its excitation energy, if the branching ratio to 4$^{−}$ ground state is significant. Theoretical estimations for the $\\beta$-decay of the new isome...

  14. Posterior reversible encephalopathy syndrome following an inadvertent dural puncture during an emergency laparotomy for ischemic colitis – a case report

    Directory of Open Access Journals (Sweden)

    Shah R

    2014-01-01

    Full Text Available Reena Shah, Agnieszka Kubisz-Pudelko, Jeremy Reid Yeovil District Hospital, Yeovil, UK Abstract: Posterior reversible encephalopathy syndrome (PRES is a clinico-neuroradiological syndrome characterized by various symptoms of neurological disease. It has commonly been reported in association with acute hypertension, pre-eclampsia, eclampsia, sepsis, and exposure to immunosuppressants. Here, we report on a normotensive woman who developed a severe frontal headache, visual disturbances, and hypertension 3 days after undergoing an emergency laparotomy for ischemic colitis during which she suffered an inadvertent dural puncture. Neuro-imaging revealed features consistent with PRES. The patient went on to make a good recovery, being discharged 21 days postoperatively, with only minor visual disturbances and memory problems. This case highlights the importance of awareness of PRES to all specialties. On reviewing the literature, we feel that PRES may be a potential differential diagnosis to post-procedural neurological symptoms in those patients undergoing routine procedures such as spinal anesthetics or lumbar punctures. Keywords: PRES, neurological disease, lumbar puncture, spinal anesthetic

  15. Applications of radio frequency identification systems in the mining industry

    Energy Technology Data Exchange (ETDEWEB)

    Hind, D J [Davis Derby Ltd., Derby (United Kingdom)

    1994-01-01

    Radio Frequency Identification Systems (RFID) are one of the automatic data capture technologies taking over from bar codes and magnetic swipe cards in many applications involving automatic hands free operation in arduous environments. RFID systems are based on the use of miniature radio transponders carrying encoded electronic data that is used to uniquely identify the identity of transponders. The paper reviews the types of system available and compares the various techniques involved in the different systems. The various types of transponder are described including the latest state of the art passive read/write high performance types. The problems involved in designing and certifying a system for use in hazardous areas are described, with particular reference to the problems of inadvertent detonator ignition by radio systems. Applications of RFID systems in the mining industry are described, covering applications both on the surface and underground. 1 ref., 10 figs.

  16. Site-Specific Analyses for Demonstrating Compliance with 10 CFR 61 Performance Objectives - 12179

    Energy Technology Data Exchange (ETDEWEB)

    Grossman, C.J.; Esh, D.W.; Yadav, P.; Carrera, A.G. [U.S. Nuclear Regulatory Commission, 11545 Rockville Pike, Rockville, MD 20852 (United States)

    2012-07-01

    The U.S. Nuclear Regulatory Commission (NRC) is proposing to amend its regulations at 10 CFR Part 61 to require low-level radioactive waste disposal facilities to conduct site-specific analyses to demonstrate compliance with the performance objectives in Subpart C. The amendments would require licensees to conduct site-specific analyses for protection of the public and inadvertent intruders as well as analyses for long-lived waste. The amendments would ensure protection of public health and safety, while providing flexibility to demonstrate compliance with the performance objectives, for current and potential future waste streams. NRC staff intends to submit proposed rule language and associated regulatory basis to the Commission for its approval in early 2012. The NRC staff also intends to develop associated guidance to accompany any proposed amendments. The guidance is intended to supplement existing low-level radioactive waste guidance on issues pertinent to conducting site-specific analyses to demonstrate compliance with the performance objectives. The guidance will facilitate implementation of the proposed amendments by licensees and assist competent regulatory authorities in reviewing the site-specific analyses. Specifically, the guidance provides staff recommendations on general considerations for the site-specific analyses, modeling issues for assessments to demonstrate compliance with the performance objectives including the performance assessment, intruder assessment, stability assessment, and analyses for long-lived waste. This paper describes the technical basis for changes to the rule language and the proposed guidance associated with implementation of the rule language. The NRC staff, per Commission direction, intends to propose amendments to 10 CFR Part 61 to require licensees to conduct site-specific analyses to demonstrate compliance with performance objectives for the protection of public health and the environment. The amendments would require a

  17. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock -revision 1

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1996-04-01

    Canada has conducted an extensive research program on a concept of safe disposal of nuclear fuel wastes deep In plutonic rock of the Canadian Shield. An essential goal of this program has been to develop and demonstrate a methodology to evaluate the performance of the facility against safety criteria established by Canada's regulatory agency, the Atomic Energy Control Board. These criteria are expressed in terms of risk, where risk is defined as the sum, over all significant scenarios, of the product of the probability of the scenario, the magnitude of the resultant dose, and the probability of a health effect per unit dose. This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicity displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information. (author). 53 refs., 8 tabs., 2 figs

  18. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock -revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Wuschke, D M

    1996-04-01

    Canada has conducted an extensive research program on a concept of safe disposal of nuclear fuel wastes deep In plutonic rock of the Canadian Shield. An essential goal of this program has been to develop and demonstrate a methodology to evaluate the performance of the facility against safety criteria established by Canada`s regulatory agency, the Atomic Energy Control Board. These criteria are expressed in terms of risk, where risk is defined as the sum, over all significant scenarios, of the product of the probability of the scenario, the magnitude of the resultant dose, and the probability of a health effect per unit dose. This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicity displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information. (author). 53 refs., 8 tabs., 2 figs.

  19. Les femmes et le langage selon Charles Bally: "des moments de décevante inadvertance"?

    Directory of Open Access Journals (Sweden)

    Durrer, Sylvie

    2002-01-01

    Full Text Available Les problématiques rassemblées parfois sous la désignation de "Language and Gender" figurent également dans les publications du linguiste suisse Charles Bally. Cet axe de réflexion, qui n’a guère été remarqué dans son œuvre, mérite d’être mis en lumière, non pas pour faire de Bally un féministe avant l’heure, mais simplement, parce qu’il nous semble important de documenter l’histoire d’une problématique en plein essor. Cet article a donc pour objectif de montrer que la question du traitement des femmes et du féminin par la langue française suscite de nombreuses réflexions dès la fin du XIXe. Il s’agira de procéder à une histoire critique d’un épisode de la "linguistique générique", afin de voir si les actuelles thématiques de cette orientation sont abordées, sous quels aspects, dans quels contextes, avec quels résultats, etc. On pourrait alors être surpris-e de découvrir que Charles Bally n’était pas un cas isolé, mais qu’un grand nombre de contemporains (Nyrop, Brunot, Vendryès, Damourette & Pichon, Dauzat, etc., se sont eux aussi interrogés, plus ou moins longuement, sur les rapports entre les femmes, le féminin et le langage. Les réflexions "génériques" de Bally et de ses confrères ne sauraient donc être regardées comme de simples "moments décevante inadvertance".

  20. Experience during the monitoring of inactive scrap for the detection of inadvertent presence of radioactivity

    International Nuclear Information System (INIS)

    Sharma, Ranjit; Kumar, Anoj; Vikas; Patra, R.P.; Kumar, Vikas; Singh, Rajvir; Pradeepkumar, K.S.

    2012-01-01

    The inspection and certification of scrap material from nuclear facilities is a regulatory requirement to ensure that radioactive material will not reach public domain. Around the world, cases involving radioactive contamination of metallic components have occurred due to radioactive sources/contaminated metal scrap reaching the public domain. Radiological monitoring of inactive scrap material is essential as it may get into various usages in public domain where controls cannot be implemented. The method of detection is measurement of gamma dose rates due to any loose/fixed radioactive contamination in the scrap or presence of any radioactive material/source. In addition prevention of any inadvertent/malicious act leading to radioactive material reaching the public domain through scrap being essential, this monitoring gains further importance. This paper describes the methodology and experience in detection of presence of radioactivity at inactive Scrap monitoring facility. Even though radioactive sources of high strength with potential for serious environmental hazard have not been detected, few cases of contaminated material (MS plate/equipments etc with extremely low level of 137 Cs and Uranium contamination) have been detected and identified using portable gamma spectrometer. If proper monitoring is not carried out the dispersal of radioactivity to the environment can be a matter of concern due to metal scrap reaching recycling industry resulting in huge cost of decontamination and waste disposal. These events may also have negative impact on the export from the country resulting in economic losses. The impact of such events can be ruled out by effective scrap monitoring techniques which ensure that even small quantity of radioactivity escaping into public domain can be prevented. The methodology followed for monitoring of inactive scrap is found to be effective even for detection of presence of very low level of radioactivity

  1. Coupling Effect of Intruding Water and Inherent Gas on Coal Strength Based on the Improved (Mohr-Coulomb Failure Criterion

    Directory of Open Access Journals (Sweden)

    Yiyu Lu

    2016-11-01

    Full Text Available When employing hydraulic processes to increase gas drainage efficiency in underground coal mines, coal seams become a three-phase medium, containing water intruding into the coal pores with the inherent occurrence of gas. This can change the stress state of the coal and cause instability. This work studied the mechanical properties of coal containing water and gas and derived an appropriate failure criterion. Based on mixture theory of unsaturated porous media, the effective stress of coal, considering the interaction of water and gas, was analyzed, and the failure criterion established by combining this with the Mohr–Coulomb criterion. By introducing the stress factor of matrix suction and using fitted curves of experimentally determined matrix suction and moisture content, the relationships between coal strength, gas pressure, and moisture content were determined. To verify the established strength theory, a series of triaxial compression strength tests of coal containing water and gas were carried out on samples taken from the Songzao, Pingdingshan, and Tashan mines in China. The experimental results correlated well with the theoretical predictions. The results showed a linear decrease in the peak strength of coal with increasing gas pressure and an exponential reduction in peak strength with increasing moisture content. The strength theory of coal containing water and gas can become an important part of multiphase medium damage theory.

  2. FIRESTORM: a collaborative network suite application for rapid sensor data processing and precise decisive responses

    Science.gov (United States)

    Kaniyantethu, Shaji

    2011-06-01

    This paper discusses the many features and composed technologies in Firestorm™ - a Distributed Collaborative Fires and Effects software. Modern response management systems capitalize on the capabilities of a plethora of sensors and its output for situational awareness. Firestorm utilizes a unique networked lethality approach by integrating unmanned air and ground vehicles to provide target handoff and sharing of data between humans and sensors. The system employs Bayesian networks for track management of sensor data, and distributed auction algorithms for allocating targets and delivering the right effect without information overload to the Warfighter. Firestorm Networked Effects Component provides joint weapon-target pairing, attack guidance, target selection standards, and other fires and effects components. Moreover, the open and modular architecture allows for easy integration with new data sources. Versatility and adaptability of the application enable it to devise and dispense a suitable response to a wide variety of scenarios. Recently, this application was used for detecting and countering a vehicle intruder with the help of radio frequency spotter sensor, command driven cameras, remote weapon system, portable vehicle arresting barrier, and an unmanned aerial vehicle - which confirmed the presence of the intruder, as well as provided lethal/non-lethal response and battle damage assessment. The completed demonstrations have proved Firestorm's™ validity and feasibility to predict, detect, neutralize, and protect key assets and/or area against a variety of possible threats. The sensors and responding assets can be deployed with numerous configurations to cover the various terrain and environmental conditions, and can be integrated to a number of platforms.

  3. Performance objectives for disposal of low-level radioactive wastes on the Oak Ridge Reservation

    Energy Technology Data Exchange (ETDEWEB)

    Kocher, D.C.

    1987-07-01

    This report presents a set of performance objectives for disposal of low-level radioactive wastes in a new facility on the Oak Ridge Reservation. The principal performance objectives include a limit on annual committed effective dose equivalent averaged over a lifetime of 0.25 mSv (25 mrem) for any member of the public beyond the boundary of the disposal facility, and a limit on annual committed effective dose equivalent averaged over a lifetime of 1 mSv (0.1 rem) and a limit on committed effective dose equivalent in any year of 5 mSv (0.5 rem) for any individual who inadvertently intrudes onto the disposal site after loss of active institutional controls. In addition, releases of radioactivity beyond the site boundary shall not result in annual dose equivalents to any number of the public from all sources of exposure that exceed limits established by Federal regulatory authorities and shall be kept as low as reasonably achievable. This report reviews generally applicable radiation protection standards for the public and environmental radiation standards for specific practices that have been developed by national and international authorities and discusses the use of limits on risk rather than dose as performance objectives and consideration of chemical toxicity rather than radiation dose in establishing limits on intakes of uranium. 63 refs., 7 figs., 2 tabs.

  4. Performance objectives for disposal of low-level radioactive wastes on the Oak Ridge Reservation

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1987-07-01

    This report presents a set of performance objectives for disposal of low-level radioactive wastes in a new facility on the Oak Ridge Reservation. The principal performance objectives include a limit on annual committed effective dose equivalent averaged over a lifetime of 0.25 mSv (25 mrem) for any member of the public beyond the boundary of the disposal facility, and a limit on annual committed effective dose equivalent averaged over a lifetime of 1 mSv (0.1 rem) and a limit on committed effective dose equivalent in any year of 5 mSv (0.5 rem) for any individual who inadvertently intrudes onto the disposal site after loss of active institutional controls. In addition, releases of radioactivity beyond the site boundary shall not result in annual dose equivalents to any number of the public from all sources of exposure that exceed limits established by Federal regulatory authorities and shall be kept as low as reasonably achievable. This report reviews generally applicable radiation protection standards for the public and environmental radiation standards for specific practices that have been developed by national and international authorities and discusses the use of limits on risk rather than dose as performance objectives and consideration of chemical toxicity rather than radiation dose in establishing limits on intakes of uranium. 63 refs., 7 figs., 2 tabs

  5. Development of closure criteria for inactive radioactive waste-disposal sites at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1990-01-01

    The Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) specifies that the U.S. Department of Energy shall comply with the procedural and substantive requirements of CERCLA regarding cleanup of inactive waste-disposal sites. Remedial actions require a level of control for hazardous substances that at least attains legally applicable or relevant and appropriate requirements (ARAR). This requirement may be waived if compliance with ARAR results in greater risk to human health and the environment than alternatives or is technically impractical. It will review potential ARAR for cleanup of inactive radioactive waste-disposal sites and propose a set of closure criteria for such sites at Oak Ridge National Laboratory. Important potential ARAR include federal standards for radiation protection of the public, radioactivity in drinking water, and near-surface land disposal of radioactive wastes. Proposed criteria for cleanup of inactive radioactive waste-disposal sites are: (1) a limit of 0.25 mSv on annual effective dose equivalent for offsite individuals; (2) limits of 1 mSv for continuous exposures and 5 mSv for occasional exposures on annual effective dose equivalent for inadvertent intruders, following loss of institutional controls over disposal sites; and (3) limits on concentrations of radionuclides in potable ground and surface waters in accordance with federal drinking-water standards, to the extent reasonably achievable

  6. Active body surface warming systems for preventing complications caused by inadvertent perioperative hypothermia in adults.

    Science.gov (United States)

    Madrid, Eva; Urrútia, Gerard; Roqué i Figuls, Marta; Pardo-Hernandez, Hector; Campos, Juan Manuel; Paniagua, Pilar; Maestre, Luz; Alonso-Coello, Pablo

    2016-04-21

    Inadvertent perioperative hypothermia is a phenomenon that can occur as a result of the suppression of the central mechanisms of temperature regulation due to anaesthesia, and of prolonged exposure of large surfaces of skin to cold temperatures in operating rooms. Inadvertent perioperative hypothermia has been associated with clinical complications such as surgical site infection and wound-healing delay, increased bleeding or cardiovascular events. One of the most frequently used techniques to prevent inadvertent perioperative hypothermia is active body surface warming systems (ABSW), which generate heat mechanically (heating of air, water or gels) that is transferred to the patient via skin contact. To assess the effectiveness of pre- or intraoperative active body surface warming systems (ABSW), or both, to prevent perioperative complications from unintended hypothermia during surgery in adults. We searched the Cochrane Central Register of Controlled Trials (CENTRAL; Issue 9, 2015); MEDLINE (PubMed) (1964 to October 2015), EMBASE (Ovid) (1980 to October 2015), and CINAHL (Ovid) (1982 to October 2015). We included randomized controlled trials (RCTs) that compared an ABSW system aimed at maintaining normothermia perioperatively against a control or against any other ABSW system. Eligible studies also had to include relevant clinical outcomes other than measuring temperature alone. Several authors, by pairs, screened references and determined eligibility, extracted data, and assessed risks of bias. We resolved disagreements by discussion and consensus, with the collaboration of a third author. We included 67 trials with 5438 participants that comprised 79 comparisons. Forty-five RCTs compared ABSW versus control, whereas 18 compared two different types of ABSW, and 10 compared two different techniques to administer the same type of ABSW. Forced-air warming (FAW) was by far the most studied intervention.Trials varied widely regarding whether the interventions were

  7. Radiological performance assessment for the Z-Area Saltstone Disposal Facility

    Energy Technology Data Exchange (ETDEWEB)

    Cook, J.R.; Fowler, J.R. [Westinghouse Savannah River Co., Aiken, SC (United States)

    1992-12-18

    This radiological performance assessment (RPA) for the Savannah River Site (SRS) Saltstone Disposal Facility (SDF) was prepared in accordance with the requirements of Chapter III of the US Department of Energy Order 5820.2A. The Order specifies that an RPA should provide reasonable assurance that a low-level waste (LLW) disposal facility will comply with the performance objectives of the Order. The performance objectives require that: (1) exposures of the general public to radioactivity in the waste or released from the waste will not result in an effective dose equivalent of 25 mrem per year; (2) releases to the atmosphere will meet the requirements of 40 CFR 61; (3) inadvertent intruders will not be committed to an excess of an effective dose equivalent of 100 mrem per year from chronic exposure, or 500 mrem from a single acute exposure; and (4) groundwater resources will be protected in accordance with Federal, State and local requirements.

  8. Radiological performance assessment for the Z-Area Saltstone Disposal Facility

    International Nuclear Information System (INIS)

    Cook, J.R.; Fowler, J.R.

    1992-01-01

    This radiological performance assessment (RPA) for the Savannah River Site (SRS) Saltstone Disposal Facility (SDF) was prepared in accordance with the requirements of Chapter III of the US Department of Energy Order 5820.2A. The Order specifies that an RPA should provide reasonable assurance that a low-level waste (LLW) disposal facility will comply with the performance objectives of the Order. The performance objectives require that: (1) exposures of the general public to radioactivity in the waste or released from the waste will not result in an effective dose equivalent of 25 mrem per year; (2) releases to the atmosphere will meet the requirements of 40 CFR 61; (3) inadvertent intruders will not be committed to an excess of an effective dose equivalent of 100 mrem per year from chronic exposure, or 500 mrem from a single acute exposure; and (4) groundwater resources will be protected in accordance with Federal, State and local requirements

  9. Dose and risk assessment for intrusion into mixed waste disposal sites

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Aaberg, R.L.

    1991-10-01

    Sites previously used for disposal of radioactive and hazardous chemical materials have resulted in situations that pose a potential threat to humans from inadvertent intrusion. An example generic scenario analysis was developed to demonstrate the evaluation of potential exposure to either cleanup workers or members of the public who intrude into buried waste containing both radioactive and hazardous chemical contaminants. The example scenarios consist of a collection of exposure routes (or pathways) with specific modeling assumptions for well-drilling and for excavation to construct buildings. These scenarios are used to describe conceptually some potential patterns of activity by non-protected human beings during intrusion into mixed-waste disposal sites. The dose from exposure to radioactive materials is calculated using the GENII software system and converted to risk by using factors from ICRP Publication 60. The hazard assessment for nonradioactive materials is performed using recent guidelines from the US Environmental Protection Agency (EPA). The example results are in the form of cancer risk for carcinogens and radiation exposure

  10. Applications of radio frequency identification systems in the mining industry

    Energy Technology Data Exchange (ETDEWEB)

    Hind, D J [Davis Derby Ltd., Derby (United Kingdom)

    1995-07-01

    Radio Frequency Identification Systems (RFID) are one of the automatic data capture technologies taking over from bar codes and magnetic swipe cards in many applications involving automatic hands free operation in arduous environments. RFID systems are based on the use of miniature radio transponders carrying encoded electronic data that is used to uniquely identify the identity of transponders. This paper reviews the types of system available and compares the various techniques involved in the different systems. The various types of transponder are described including the latest state of the art passive read/write high performance types. A review of the history of RFID systems in the mining industry is also given in the paper. The problems involved in designing and certifying a system for use in hazardous areas are also described, with particular reference to the problems of inadvertent detonator ignition by radio systems. Applications of RFID systems in the mining industry are described in considerable detail, covering applications both on the surface and underground. 1 ref., 12 figs., 1 tab.

  11. Microwave and Millimeter-Wave Remote Sensing for Security Applications. By Jeffrey A. Nanzer, Artech House, 2012; 372 pages. Price £109.00, ISBN 978-1-60807-172-2

    Directory of Open Access Journals (Sweden)

    Shu-Kun Lin

    2013-01-01

    Full Text Available Microwave and millimeter-wave remote sensing techniques are fast becoming a necessity in many aspects of security as detection and classification of objects or intruders becomes more difficult. This groundbreaking resource offers you expert guidance in this burgeoning area. It provides you with a thorough treatment of the principles of microwave and millimeter-wave remote sensing for security applications, as well as practical coverage of the design of radiometer, radar, and imaging systems. You learn how to design active and passive sensors for intruder detection, concealed object detection, and human activity classification. This detailed book presents the fundamental concepts practitioners need to understand, including electromagnetic wave propagation in free space and in media, antenna theory, and the principles of receiver design. You find in-depth discussions on the interactions of electromagnetic waves with human tissues, the atmosphere and various building and clothing materials. This timely volume explores recently developed detection techniques, such as micro-Doppler radar signatures and correlation radiometry. The book is supported with over 200 illustrations and 1,135 equations.

  12. Evidence utilisation project: Management of inadvertent perioperative hypothermia. The challenges of implementing best practice recommendations in the perioperative environment.

    Science.gov (United States)

    Munday, Judy; Hines, Sonia Jane; Chang, Anne M

    2013-12-01

    The prevention of inadvertent perioperative hypothermia (IPH) remains an important issue in perioperative healthcare. The aims of this project were to: (i) assess current clinical practice in the management of IPH and (ii) promote best practice in the management of IPH in adult operating theatres. This project from August 2010 to March 2012 utilised a system of audit and feedback to implement best practice recommendations. Data were collected via chart audits against criteria developed from best practice recommendations for managing IPH. Evidence-based best practices, such as consistent temperature monitoring and patient warming, were implemented using multifaceted interventions. Perioperative records for 73 patients (baseline) and 72 patients (post-implementation) were audited. Post-implementation audit showed an increase in patients with temperatures >36°C admitted to the post-anaesthetic care unit (PACU) (8%) and discharged from PACU (28%). The percentage of patients receiving preoperative temperature monitoring increased (38%); however, low levels of intraoperative monitoring remained (31% of patients with surgery of 30 min or longer duration). Small increases were found in patient warming of 5% intraoperatively and 8% postoperatively. Preoperative warming was not successfully implemented during this phase of the project. Temperature monitoring, warming and rates of normothermia improved; however, barriers to best practice of IPH management were experienced, which negatively impacted on the project. Further stages of implementation and audit were added to further address IPH management in this department. © 2013 The Authors. International Journal of Evidence-Based Healthcare © 2013 The Joanna Briggs Institute.

  13. Low-Level Waste Regulation: Putting Principles Into Practice - 13297 - The Richard S. Hodes, M.D., Honor Lecture Award

    International Nuclear Information System (INIS)

    Kennedy, James E.

    2013-01-01

    In carrying out its mission to ensure the safe use of radioactive materials for beneficial civilian purposes while protecting people and the environment, the U.S. Nuclear Regulatory Commission (NRC) adheres to its Principles of Good Regulation. The Principles-Independence, Openness, Efficiency, Clarity, and Reliability-apply to the agency as a whole in its decision-making and to the individual conduct of NRC employees. This paper describes the application of the Principles in a real-life staff activity, a guidance document used in the NRC's low-level radioactive waste (LLW) program, the Concentration Averaging and Encapsulation Branch Technical Position (CA BTP). The staff's process to revise the document, as well as the final content of the document, were influenced by following the Principles. For example, consistent with the Openness Principle, the staff conducted a number of outreach activities and received many comments on three drafts of the document. Stakeholder comments affected the final staff positions in some cases. The revised CA BTP, once implemented, is expected to improve management and disposal of LLW in the United States. Its positions have an improved nexus to health and safety; are more performance-based than previously, thus providing licensees with options for how they achieve the required outcome of protecting an inadvertent human intruder into a disposal facility; and provide for disposal of more sealed radioactive sources, which are a potential threat to national security. (author)

  14. Low-Level Waste Regulation: Putting Principles Into Practice - 13297 - The Richard S. Hodes, M.D., Honor Lecture Award

    Energy Technology Data Exchange (ETDEWEB)

    Kennedy, James E. [Low-Level Waste Branch Division of Waste Management and Environmental Protection, U.S. Nuclear Regulatory Commission, Washington, DC, 20555-0001 (United States)

    2013-07-01

    In carrying out its mission to ensure the safe use of radioactive materials for beneficial civilian purposes while protecting people and the environment, the U.S. Nuclear Regulatory Commission (NRC) adheres to its Principles of Good Regulation. The Principles-Independence, Openness, Efficiency, Clarity, and Reliability-apply to the agency as a whole in its decision-making and to the individual conduct of NRC employees. This paper describes the application of the Principles in a real-life staff activity, a guidance document used in the NRC's low-level radioactive waste (LLW) program, the Concentration Averaging and Encapsulation Branch Technical Position (CA BTP). The staff's process to revise the document, as well as the final content of the document, were influenced by following the Principles. For example, consistent with the Openness Principle, the staff conducted a number of outreach activities and received many comments on three drafts of the document. Stakeholder comments affected the final staff positions in some cases. The revised CA BTP, once implemented, is expected to improve management and disposal of LLW in the United States. Its positions have an improved nexus to health and safety; are more performance-based than previously, thus providing licensees with options for how they achieve the required outcome of protecting an inadvertent human intruder into a disposal facility; and provide for disposal of more sealed radioactive sources, which are a potential threat to national security. (author)

  15. Using recruitment source timing and diagnosticity to enhance applicants' occupation-specific human capital.

    Science.gov (United States)

    Campion, Michael C; Ployhart, Robert E; Campion, Michael A

    2017-05-01

    [Correction Notice: An Erratum for this article was reported in Vol 102(5) of Journal of Applied Psychology (see record 2017-14296-001). In the article, the following headings were inadvertently set at the wrong level: Method, Participants and Procedure, Measures, Occupation specific human capital, Symbolic jobs, Relevant majors, Occupation-specific capital hotspots, Source timing, Source diagnosticity, Results, and Discussion. All versions of this article have been corrected.] This study proposes that reaching applicants through more diagnostic recruitment sources earlier in their educational development (e.g., in high school) can lead them to invest more in their occupation-specific human capital (OSHC), thereby making them higher quality candidates. Using a sample of 78,157 applicants applying for jobs within a desirable professional occupation in the public sector, results indicate that applicants who report hearing about the occupation earlier, and applicants who report hearing about the occupation through more diagnostic sources, have higher levels of OSHC upon application. Additionally, source timing and diagnosticity affect the likelihood of candidates applying for jobs symbolic of the occupation, selecting relevant majors, and attending educational institutions with top programs related to the occupation. These findings suggest a firm's recruiting efforts may influence applicants' OSHC investment strategies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  16. Warming of intravenous and irrigation fluids for preventing inadvertent perioperative hypothermia.

    Science.gov (United States)

    Campbell, Gillian; Alderson, Phil; Smith, Andrew F; Warttig, Sheryl

    2015-04-13

    Inadvertent perioperative hypothermia (a drop in core temperature to below 36°C) occurs because of interference with normal temperature regulation by anaesthetic drugs, exposure of skin for prolonged periods and receipt of large volumes of intravenous and irrigation fluids. If the temperature of these fluids is below core body temperature, they can cause significant heat loss. Warming intravenous and irrigation fluids to core body temperature or above might prevent some of this heat loss and subsequent hypothermia. To estimate the effectiveness of preoperative or intraoperative warming, or both, of intravenous and irrigation fluids in preventing perioperative hypothermia and its complications during surgery in adults. We searched the Cochrane Central Register of Controlled Trials (CENTRAL) (2014, Issue 2), MEDLINE Ovid SP (1956 to 4 February 2014), EMBASE Ovid SP (1982 to 4 February 2014), the Institute for Scientific Information (ISI) Web of Science (1950 to 4 February 2014), Cumulative Index to Nursing and Allied Health Literature (CINAHL) EBSCOhost (1980 to 4 February 2014) and reference lists of identified articles. We also searched the Current Controlled Trials website and ClinicalTrials.gov. We included randomized controlled trials or quasi-randomized controlled trials comparing fluid warming methods versus standard care or versus other warming methods used to maintain normothermia. Two review authors independently extracted data from eligible trials and settled disputes with a third review author. We contacted study authors to ask for additional details when needed. We collected data on adverse events only if they were reported in the trials. We included in this review 24 studies with a total of 1250 participants. The trials included various numbers and types of participants. Investigators used a range of methods to warm fluids to temperatures between 37°C and 41°C. We found that evidence was of moderate quality because descriptions of trial design were

  17. Bio-inspired motion planning algorithms for autonomous robots facilitating greater plasticity for security applications

    Science.gov (United States)

    Guo, Yi; Hohil, Myron; Desai, Sachi V.

    2007-10-01

    Proposed are techniques toward using collaborative robots for infrastructure security applications by utilizing them for mobile sensor suites. A vast number of critical facilities/technologies must be protected against unauthorized intruders. Employing a team of mobile robots working cooperatively can alleviate valuable human resources. Addressed are the technical challenges for multi-robot teams in security applications and the implementation of multi-robot motion planning algorithm based on the patrolling and threat response scenario. A neural network based methodology is exploited to plan a patrolling path with complete coverage. Also described is a proof-of-principle experimental setup with a group of Pioneer 3-AT and Centibot robots. A block diagram of the system integration of sensing and planning will illustrate the robot to robot interaction to operate as a collaborative unit. The proposed approach singular goal is to overcome the limits of previous approaches of robots in security applications and enabling systems to be deployed for autonomous operation in an unaltered environment providing access to an all encompassing sensor suite.

  18. Performance objectives for disposal of low-level radioactive wastes on the Oak Ridge Reservation

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1986-01-01

    This paper presents a set of performance objectives for disposal of low-level radioactive wastes in a new facility on the Oak Ridge Reservation. The principal performance objectives include (1) a limit on annual committed effective dose equivalent averaged over a lifetime of 0.25 mSv (25 mrem) for any member of the general public beyond the boundary of the disposal facility, and (2) a limit on annual committed effective dose equivalent averaged over a lifetime of 1 mSv (100 mrem) and a limit on committed effective dose equivalent in any year of 5 mSv (500 mrem) for any individual who inadvertently intrudes onto the disposal site after loss of active institutional controls. The use of annual committed effective dose equivalents averaged over a lifetime departs from customary practice in environmental radiation standards in the U.S. of specifying limits on actual dose received in any year to whole body or the critical organ, but provides a set of performance objectives that are more closely related to the fundamental goal of limiting risk from chronic lifetime exposures. (Auth.)

  19. Radionuclide migration pathways analysis for the Oak Ridge Central Waste Disposal Facility on the West Chestnut Ridge site

    International Nuclear Information System (INIS)

    Pin, F.G.; Witherspoon, J.P.; Lee, D.W.; Cannon, J.B.; Ketelle, R.H.

    1984-10-01

    A dose-to-man pathways analysis is performed for disposal of low-level radioactive waste at the Central Waste Disposal Facility on the West Chestnut Ridge Site. Both shallow land burial (trench) and aboveground (tumulus) disposal methods are considered. The waste volumes, characteristics, and radionuclide concentrations are those of waste streams anticipated from the Oak Ridge National Laboratory, the Y-12 Plant, and the Oak Ridge Gaseous Diffusion Plant. The site capacity for the waste streams is determined on the basis of the pathways analysis. The exposure pathways examined include (1) migration and transport of leachate from the waste disposal units to the Clinch River (via the groundwater medium for trench disposal and Ish Creek for tumulus disposal) and (2) those potentially associated with inadvertent intrusion following a 100-year period of institutional control: an individual resides on the site, inhales suspended particles of contaminated dust, ingests vegetables grown on the plot, consumes contaminated water from either an on-site well or from a nearby surface stream, and receives direct exposure from the contaminated soil. It is found that either disposal method would provide effective containment and isolation for the anticipated waste inventory. However, the proposed trench disposal method would provide more effective containment than tumuli because of sorption of some radionuclides in the soil. Persons outside the site boundary would receive radiation doses well below regulatory limits if they were to ingest water from the Clinch River. An inadvertent intruder could receive doses that approach regulatory limits; however, the likelihood of such intrusions and subsequent exposures is remote. 33 references, 31 figures, 28 tables

  20. TRACE and TRAC-BF1 benchmark against Leibstadt plant data during the event inadvertent opening of relief valves

    Energy Technology Data Exchange (ETDEWEB)

    Sekhri, A.; Baumann, P. [KernkraftwerkLeibstadt AG, 5325 Leibstadt (Switzerland); Wicaksono, D. [Swiss Federal Inst. of Technology Zurich ETH, 8092 Zurich (Switzerland); Miro, R.; Barrachina, T.; Verdu, G. [Inst. for Industrial, Radiophysical and Environmental Safety ISIRYM, Universitat Politecnica de Valencia UPV, Cami de Vera s/n, 46021 Valencia (Spain)

    2012-07-01

    In framework of introducing TRACE code to transient analyses system codes for Leibstadt Power Plant (KKL), a conversion process of existing TRAC-BF1 model to TRACE has been started within KKL. In the first step, TRACE thermal-hydraulic model for KKL has been developed based on existing TRAC-BF1 model. In order to assess the code models a simulation of plant transient event is required. In this matter simulations of inadvertent opening of 8 relief valves event have been performed. The event occurs at KKL during normal operation, and it started when 8 relief valves open resulting in depressurization of the Reactor Pressure Vessel (RPV). The reactor was shutdown safely by SCRAM at low level. The high pressure core spray (HPCS) and the reactor core isolation cooling (RCIC) have been started manually in order to compensate the level drop. The remaining water in the feedwater (FW) lines flashes due to saturation conditions originated from RPV depressurization and refills the reactor downcomer. The plant boundary conditions have been used in the simulations and the FW flow rate has been adjusted for better prediction. The simulations reproduce the plant data with good agreement. It can be concluded that the TRAC-BF1 existing model has been used successfully to develop the TRACE model and the results of the calculations have shown good agreement with plant recorded data. Beside the modeling assessment, the TRACE and TRAC-BF1 capabilities to reproduce plant physical behavior during the transient have shown satisfactory results. The first step of developing KKL model for TRACE has been successfully achieved and this model is further developed in order to simulate more complex plant behavior such as Turbine Trip. (authors)

  1. TRACE and TRAC-BF1 benchmark against Leibstadt plant data during the event inadvertent opening of relief valves

    International Nuclear Information System (INIS)

    Sekhri, A.; Baumann, P.; Wicaksono, D.; Miro, R.; Barrachina, T.; Verdu, G.

    2012-01-01

    In framework of introducing TRACE code to transient analyses system codes for Leibstadt Power Plant (KKL), a conversion process of existing TRAC-BF1 model to TRACE has been started within KKL. In the first step, TRACE thermal-hydraulic model for KKL has been developed based on existing TRAC-BF1 model. In order to assess the code models a simulation of plant transient event is required. In this matter simulations of inadvertent opening of 8 relief valves event have been performed. The event occurs at KKL during normal operation, and it started when 8 relief valves open resulting in depressurization of the Reactor Pressure Vessel (RPV). The reactor was shutdown safely by SCRAM at low level. The high pressure core spray (HPCS) and the reactor core isolation cooling (RCIC) have been started manually in order to compensate the level drop. The remaining water in the feedwater (FW) lines flashes due to saturation conditions originated from RPV depressurization and refills the reactor downcomer. The plant boundary conditions have been used in the simulations and the FW flow rate has been adjusted for better prediction. The simulations reproduce the plant data with good agreement. It can be concluded that the TRAC-BF1 existing model has been used successfully to develop the TRACE model and the results of the calculations have shown good agreement with plant recorded data. Beside the modeling assessment, the TRACE and TRAC-BF1 capabilities to reproduce plant physical behavior during the transient have shown satisfactory results. The first step of developing KKL model for TRACE has been successfully achieved and this model is further developed in order to simulate more complex plant behavior such as Turbine Trip. (authors)

  2. Safety analysis of increase in heat removal from reactor coolant system with inadvertent operation of passive residual heat removal at no load conditions

    Energy Technology Data Exchange (ETDEWEB)

    Shao, Ge; Cao, Xuewu [School of Mechanical and Engineering, Shanghai Jiao Tong University, Shanghai (China)

    2015-06-15

    The advanced passive pressurized water reactor (PWR) is being constructed in China and the passive residual heat removal (PRHR) system was designed to remove the decay heat. During accident scenarios with increase of heat removal from the primary coolant system, the actuation of the PRHR will enhance the cooldown of the primary coolant system. There is a risk of power excursion during the cooldown of the primary coolant system. Therefore, it is necessary to analyze the thermal hydraulic behavior of the reactor coolant system (RCS) at this condition. The advanced passive PWR model, including major components in the RCS, is built by SCDAP/RELAP5 code. The thermal hydraulic behavior of the core is studied for two typical accident sequences with PRHR actuation to investigate the core cooling capability with conservative assumptions, a main steam line break (MSLB) event and inadvertent opening of a steam generator (SG) safety valve event. The results show that the core is ultimately shut down by the boric acid solution delivered by Core Makeup Tank (CMT) injections. The effects of CMT boric acid concentration and the activation delay time on accident consequences are analyzed for MSLB, which shows that there is no consequential damage to the fuel or reactor coolant system in the selected conditions.

  3. Prevention of and response to inadvertent exposure of embryo/fetus to ionizing radiation, due to medical exposure of the mother. The Greek regulatory authority initiatives.

    Science.gov (United States)

    Economides, Sotirios; Boziari, Argiro; Vogiatzi, Stavroula; Hourdakis, Konstantinos J; Kamenopoulou, Vassiliki; Dimitriou, Panagiotis

    2014-03-01

    Embryo/fetus (E/F) irradiation as a result of medical exposure of the mother should be avoided, unless there are strong clinical indications. Medical practitioners are assigned the primary task and obligation of ensuring overall patient protection and safety in the prescription of and during the delivery of medical exposure. In cases of unintended exposure of embryo/fetus (E/F), the risk analysis and communication is conducted by or under the supervision of medical physicists at local level. National competent authorities can contribute to the prevention, risk analysis and communication of inadvertent E/F exposure to ionizing radiation by recording, analyzing and disseminating the relevant information. Since 2001, Greek Atomic Energy Commission has established a committee with the mandate to provide advice, to keep records, to analyze and disseminate the experience gained in cases of unintended E/F exposure. During the period 2001-2011, the committee was consulted by 269 pregnant women undergone medical exposures. The conclusions from the relevant data analysis, as well as the experience gained are herein presented and discussed. Copyright © 2013 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  4. 2016 Survey of State-Level Health Resources for Men and Boys: Identification of an Inadvertent and Remediable Service and Health Disparity.

    Science.gov (United States)

    Fadich, Ana; Llamas, Ramon P; Giorgianni, Salvatore; Stephenson, Colin; Nwaiwu, Chimezie

    2018-03-01

    This survey evaluated resources available to men and boys at the state level including state public health departments (SPHDs), other state agencies, and governor's offices. Most of the resources and programs are found in the SPHDs and these administer state-initiated and federally funded health programs to provide services and protection to a broad range of populations; however, many men's health advocates believe that SPHDs have failed to create equivalent services for men and boys, inadvertently creating a health disparity. Men's Health Network conducts a survey of state resources, including those found in SPHDs, every 2 years to identify resources available for men and women, determine the extent of any disparity, and establish a relationship with SPHD officials. Data were obtained from all 50 states and Washington, D.C. An analysis of the 2016 survey data indicates that there are few resources allocated and a lack of readily available information on health and preventive care created specifically for men and boys. The data observed that most health information intended for men and boys was scarce among states or oftentimes included on websites that primarily focused on women's health. A potential result of this is a loss of engagement with appropriate health-care providers due to a lack of information. This study continues to validate the disparity between health outcomes for women and men. It continues to highlight the need for better resource allocation, outreach, and health programs specifically tailored to men and boys in order to improve overall community well-being.

  5. Equine ulnar fracture repair with locking compression plates can be associated with inadvertent penetration of the lateral cortex of the radius.

    Science.gov (United States)

    Kuemmerle, Jan M; Kühn, Karolin; Bryner, Marco; Fürst, Anton E

    2013-10-01

    To evaluate if the use of locking head screws (LHS) in the distal holes of a locking compression plate (LCP) applied to the caudal aspect of the ulna to treat equine ulnar fractures is associated with a risk of injury to the lateral cortex of the radius. Controlled laboratory study. Cadaveric equine forelimbs (n = 8 pair). After transverse ulnar osteotomy, osteosynthesis was performed with a narrow 10-13 hole 4.5/5.0 LCP applied to the caudal aspect of each ulna. The distal 3 holes were filled with 4.5 mm cortex screws (CS) in 1 limb (group 1) and with 5.0 mm LHS contralaterally (group 2). CS were inserted in an angle deemed appropriate by the surgeon and LHS were inserted perpendicular to the plate. Implant position and injury to the lateral cortex of the radius were assessed by radiography, CT, and limb dissection. In group 1, injury of the lateral radius cortex did not occur. In group 2, 4 limbs and 6/24 LHS were associated with injury of the lateral radius cortex by penetration of a LHS. This difference was statistically significant. CS were inserted with a mean angle of 17.6° from the sagittal plane in a caudolateral-craniomedial direction. Use of LHS in the distal part of a LCP applied to the caudal aspect of the ulna is associated with a risk of inadvertent injury to the lateral cortex of the radius. © Copyright 2013 by The American College of Veterinary Surgeons.

  6. Are Brazil nuts attractive?

    Science.gov (United States)

    Sanders, Duncan A; Swift, Michael R; Bowley, R M; King, P J

    2004-11-12

    We present event-driven simulation results for single and multiple intruders in a vertically vibrated granular bed. Under our vibratory conditions, the mean vertical position of a single intruder is governed primarily by a buoyancylike effect. Multiple intruders also exhibit buoyancy governed behavior; however, multiple neutrally buoyant intruders cluster spontaneously and undergo horizontal segregation. These effects can be understood by considering the dynamics of two neutrally buoyant intruders. We have measured an attractive force between such intruders which has a range of five intruder diameters, and we provide a mechanistic explanation for the origins of this force.

  7. The development of surface barriers at the Hanford Site

    International Nuclear Information System (INIS)

    Wing, N.R.; Gee, G.W.

    1994-03-01

    Engineered barriers are being developed to isolate wastes disposed of near the earth's surface at the US Department of Energy's (DOE) Hanford Site near Richland, Washington. Much of the waste that would be disposed of by in-place stabilization currently is located in relatively shallow subsurface structures such as solid waste burial grounds, tanks, vaults, and cribs. Unless protected in some way, the wastes could be transported to the accessible environment via the following pathways: plant, animal, and human intrusion; water infiltration; erosion; and the exhalation of noxious gases. Permanent isolation surface barriers have been proposed to protect wastes disposed of ''in place'' from the transport pathways identified previously (Figure 1). The protective barrier consists of a variety of different materials (e.g., fine soil, sand, gravel, riprap, asphalt, etc.) placed in layers to form an above-grade mound directly over the waste zone. Surface markers are being considered for placement around the periphery of the waste sites to inform future generations of the nature and hazards of the buried wastes. In addition, throughout the protective barrier, subsurface markers could be placed to warn any inadvertent human intruders of the dangers of the buried wastes (Figure 2)

  8. U.S. Nuclear Regulatory Commission Role and Activities Related to U.S. Department of Energy Incidental Waste Determinations

    International Nuclear Information System (INIS)

    Bradford, A.H.; Esh, D.W.; Ridge, A.C.

    2006-01-01

    Section 3116 of the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 (NDAA) requires the U.S. Department of Energy (DOE) to consult with the U.S. Nuclear Regulatory Commission (NRC) for certain non-high level waste (HLW) determinations. Under the NDAA, NRC performs consultative technical reviews of DOE's waste determinations and monitors DOE's disposal actions for such waste, but the NRC does not have regulatory authority over DOE's waste disposal activities. The NDAA provides the criteria that must be met to determine that waste is not HLW. The criteria require that the waste does not need to be disposed of in a geologic repository, that highly radioactive radionuclides be removed to the maximum extent practical, and that the performance objectives of 10 CFR 61, Subpart C, be met. The performance objectives contain criteria for protection of the public, protection of inadvertent intruders, protection of workers, and stability of the disposal site after closure. This paper describes NRC's approach to implementing its responsibilities under the NDAA, as well as similar activities being performed for sites not covered by the NDAA. (authors)

  9. Operating limit study for the proposed solid waste landfill at Paducah Gaseous Diffusion Plant

    Energy Technology Data Exchange (ETDEWEB)

    Lee, D.W.; Wang, J.C.; Kocher, D.C.

    1995-06-01

    A proposed solid waste landfill at Paducah Gaseous Diffusion Plant (PGDP) would accept wastes generated during normal operations that are identified as non-radioactive. These wastes may include small amounts of radioactive material from incidental contamination during plant operations. A site-specific analysis of the new solid waste landfill is presented to determine a proposed operating limit that will allow for waste disposal operations to occur such that protection of public health and the environment from the presence of incidentally contaminated waste materials can be assured. Performance objectives for disposal were defined from existing regulatory guidance to establish reasonable dose limits for protection of public health and the environment. Waste concentration limits were determined consistent with these performance objectives for the protection of off-site individuals and inadvertent intruders who might be directly exposed to disposed wastes. Exposures of off-site individuals were estimated using a conservative, site-specific model of the groundwater transport of contamination from the wastes. Direct intrusion was analyzed using an agricultural homesteader scenario. The most limiting concentrations from direct intrusion or groundwater transport were used to establish the concentration limits for radionuclides likely to be present in PGDP wastes.

  10. Operating limit study for the proposed solid waste landfill at Paducah Gaseous Diffusion Plant

    International Nuclear Information System (INIS)

    Lee, D.W.; Wang, J.C.; Kocher, D.C.

    1995-06-01

    A proposed solid waste landfill at Paducah Gaseous Diffusion Plant (PGDP) would accept wastes generated during normal operations that are identified as non-radioactive. These wastes may include small amounts of radioactive material from incidental contamination during plant operations. A site-specific analysis of the new solid waste landfill is presented to determine a proposed operating limit that will allow for waste disposal operations to occur such that protection of public health and the environment from the presence of incidentally contaminated waste materials can be assured. Performance objectives for disposal were defined from existing regulatory guidance to establish reasonable dose limits for protection of public health and the environment. Waste concentration limits were determined consistent with these performance objectives for the protection of off-site individuals and inadvertent intruders who might be directly exposed to disposed wastes. Exposures of off-site individuals were estimated using a conservative, site-specific model of the groundwater transport of contamination from the wastes. Direct intrusion was analyzed using an agricultural homesteader scenario. The most limiting concentrations from direct intrusion or groundwater transport were used to establish the concentration limits for radionuclides likely to be present in PGDP wastes

  11. Long-term climate change assessment study plan for the Hanford Site permanent isolation Barrier Development Program

    International Nuclear Information System (INIS)

    Petersen, K.L.; Chatters, J.C.; Waugh, W.J.

    1992-07-01

    The Hanford Site Permanent Isolation Barrier Development Program (Barrier Development Program) was organized to develop the technology needed to provide an in-place disposal capability for the Hanford Site (Adams and Wing 1986; Wig and Gee 1990). The goal of the Barrier Development Program is to provide defensible evidence that final barrier design(s) will adequately control water infiltration; plant and animal intrusion; and wind and water erosion for a minimum of 1,000 yr and isolate wastes from the accessible environment and warm inadvertent human intruders using markers. This document describes the long-term climate change studies planned to support the Barrier Development Program. The plan outlines a multi-year and multi-discipline approach to assess long-term climate change issues and to help optimize the design of the permanent isolation barriers. A multi-disciplinary approach to climatic data acquisition will be responsible for obtaining needed information for concurrent barrier tasks and for developing a local climate forecast model. This model will couple past climate patterns with models of regional and global climate drivers to provide bounding conditions for barrier performance assessment analyses

  12. Data fusion concept in multispectral system for perimeter protection of stationary and moving objects

    Science.gov (United States)

    Ciurapiński, Wieslaw; Dulski, Rafal; Kastek, Mariusz; Szustakowski, Mieczyslaw; Bieszczad, Grzegorz; Życzkowski, Marek; Trzaskawka, Piotr; Piszczek, Marek

    2009-09-01

    The paper presents the concept of multispectral protection system for perimeter protection for stationary and moving objects. The system consists of active ground radar, thermal and visible cameras. The radar allows the system to locate potential intruders and to control an observation area for system cameras. The multisensor construction of the system ensures significant improvement of detection probability of intruder and reduction of false alarms. A final decision from system is worked out using image data. The method of data fusion used in the system has been presented. The system is working under control of FLIR Nexus system. The Nexus offers complete technology and components to create network-based, high-end integrated systems for security and surveillance applications. Based on unique "plug and play" architecture, system provides unmatched flexibility and simplistic integration of sensors and devices in TCP/IP networks. Using a graphical user interface it is possible to control sensors and monitor streaming video and other data over the network, visualize the results of data fusion process and obtain detailed information about detected intruders over a digital map. System provides high-level applications and operator workload reduction with features such as sensor to sensor cueing from detection devices, automatic e-mail notification and alarm triggering.

  13. Distributed Tracing of Intruders

    National Research Council Canada - National Science Library

    Staniford-Chen, Stuart G

    1995-01-01

    .... One of the things that facilitates this malfeasance is that computer networks provide the ability for a user to log into multiple computer systems in sequence, changing identity with each step...

  14. An overlooked environmental issue? A review of the inadvertent formation of PCB-11 and other PCB congeners and their occurrence in consumer products and in the environment.

    Science.gov (United States)

    Vorkamp, Katrin

    2016-01-15

    Polychlorinated biphenyls (PCBs) are banned from production and use in most countries as they are persistent organic pollutants (POPs) of concern for environment and health. Recent research has pointed at a new environment issue resulting from the inadvertent formation of PCBs in certain processes, in particular the pigment production. PCB-11 is a major by-product in these processes, but PCB-28, PCB-52, PCB-77 as well as the nonachlorinated PCBs and PCB-209 have been found in pigments and consumer products as well. In addition to environmental emissions via point sources, in particular related to industrial and municipal wastewater, atmospheric transport seems to be important for the global distribution of PCB-11. Thus, PCB-11 has also been detected in the polar regions. Worldwide air concentrations appear relatively uniform, but maxima have been found in urban and industrialised areas. Data on the uptake and accumulation of PCB-11 in the food chain are still inconclusive: Although food web studies do not show biomagnification, PCB-11 has been detected in humans. The human exposure might originate from the direct contact to consumer products as well as from the omnipresence of PCB-11 in the environment. Copyright © 2015 Elsevier B.V. All rights reserved.

  15. Historic perspective: Prebiotics, probiotics, and other alternatives to antibiotics

    Science.gov (United States)

    Antibiotic applications in agricultural and human medical arenas have resulted in tremendous increases in food animal production and historically unprecedented gains in human health protection. Successes attributed to wide-spread antibiotic use have been accompanied by the inadvertent emergence of r...

  16. Internet firewalls: questions and answers

    Science.gov (United States)

    Ker, Keith

    1996-03-01

    As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.

  17. 40 CFR 194.33 - Consideration of drilling events in performance assessments.

    Science.gov (United States)

    2010-07-01

    ... assessments. (a) Performance assessments shall examine deep drilling and shallow drilling that may potentially affect the disposal system during the regulatory time frame. (b) The following assumptions and process... process shall be documented in any compliance application: (1) Inadvertent and intermittent intrusion by...

  18. Technical description of the CANDU nuclear power system

    International Nuclear Information System (INIS)

    Husseini, S.D.

    1977-01-01

    The lecture consists of: 1.) KANUPP description: general - Containment- Reactor Cooling System - Moderator Helium System. 2.) Operating experience: Plant Performances (as applicable to Kanupp) - Major failures of primary system - Performance of primary circulating pumps. - Heavy Water Leakage Control. - Radiation Dose Control - Inadvertant Operations. (orig.) [de

  19. "Using recruitment source timing and diagnosticity to enhance applicants' occupation-specific human capital": Correction to Campion, Ployhart, and Campion (2017).

    Science.gov (United States)

    2017-05-01

    Reports an error in "Using Recruitment Source Timing and Diagnosticity to Enhance Applicants' Occupation-Specific Human Capital" by Michael C. Campion, Robert E. Ployhart and Michael A. Campion ( Journal of Applied Psychology , Advanced Online Publication, Feb 02, 2017, np). In the article, the following headings were inadvertently set at the wrong level: Method, Participants and Procedure, Measures, Occupation specific human capital, Symbolic jobs, Relevant majors, Occupation-specific capital hotspots, Source timing, Source diagnosticity, Results, and Discussion. All versions of this article have been corrected. (The following abstract of the original article appeared in record 2017-04566-001.) This study proposes that reaching applicants through more diagnostic recruitment sources earlier in their educational development (e.g., in high school) can lead them to invest more in their occupation-specific human capital (OSHC), thereby making them higher quality candidates. Using a sample of 78,157 applicants applying for jobs within a desirable professional occupation in the public sector, results indicate that applicants who report hearing about the occupation earlier, and applicants who report hearing about the occupation through more diagnostic sources, have higher levels of OSHC upon application. Additionally, source timing and diagnosticity affect the likelihood of candidates applying for jobs symbolic of the occupation, selecting relevant majors, and attending educational institutions with top programs related to the occupation. These findings suggest a firm's recruiting efforts may influence applicants' OSHC investment strategies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  20. 78 FR 19164 - Amendments to Compliance Certification Content Requirements for State and Federal Operating...

    Science.gov (United States)

    2013-03-29

    ... sources to use credible evidence in compliance certifications. A review of a sample of recent part 71... title V contexts, the EPA has not previously devoted its limited resources to correcting the inadvertent..., representation, or certification in, or omits material information from, * * * any notice, application, record...

  1. A Simple Technique for Safe Mesenteric Defect Closure Following ...

    African Journals Online (AJOL)

    mesentery, inadvertent ligation of blood vessels and/or mesenteric hematoma formation and could, therefore, compromise the blood supply to the bowel anastomosis and lead to anastomotic dehiscence.[6,7] Here we propose a simple technique, applicable to both open and laparoscopy-assisted colectomies, that enables ...

  2. Control and Management of Radioactive Material Inadvertently Incorporated into Scrap Metal. Proceedings of an International Conference

    International Nuclear Information System (INIS)

    2011-01-01

    Radioactive substances can become associated with scrap metal in various ways and if not discovered they can be incorporated into steel and non-ferrous metals through the melting process. This can cause health hazards as well as environmental concerns and there can be serious commercial implications. Numerous incidents have occurred in recent years involving the discovery of radioactive substances in scrap metal and, in some cases, in metal from the melting process. These incidents have proved to be very costly in relation to the recovery and cleanup operations required but also in terms of the potential loss of confidence of the industry in scrap metal as a resource. This has led the scrap metal industry to seek ways of managing the problem. In most countries, shipments of scrap metal are monitored but at different points in the distribution chain and to different extents and efficiencies. As yet, only limited efforts towards unifying and harmonizing monitoring strategies and methods in the context of scrap metal have been made at the international level. The Conference was organized into five sessions: the global perspective, national policies and strategies, compliance with radiological criteria, management of incidents with contaminated scrap metal, and improving confidence and protecting the interests of stakeholders. The aim of the first session was to present the views and perspectives of the different organizations concerned with radioactive material in scrap metal, scrap metal recycling, steel making, radiation source security and safety and international trade and economics. The second session covered some of the national policies and strategies being used to address the control of radioactive material that has been inadvertently incorporated into scrap metal were presented. In addition to the oral presentations, contributions describing the situation in many countries of the world in the form of posters were displayed. The many posters reporting national

  3. Control and Management of Radioactive Material Inadvertently Incorporated into Scrap Metal. Proceedings of an International Conference

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-15

    Radioactive substances can become associated with scrap metal in various ways and if not discovered they can be incorporated into steel and non-ferrous metals through the melting process. This can cause health hazards as well as environmental concerns and there can be serious commercial implications. Numerous incidents have occurred in recent years involving the discovery of radioactive substances in scrap metal and, in some cases, in metal from the melting process. These incidents have proved to be very costly in relation to the recovery and cleanup operations required but also in terms of the potential loss of confidence of the industry in scrap metal as a resource. This has led the scrap metal industry to seek ways of managing the problem. In most countries, shipments of scrap metal are monitored but at different points in the distribution chain and to different extents and efficiencies. As yet, only limited efforts towards unifying and harmonizing monitoring strategies and methods in the context of scrap metal have been made at the international level. The Conference was organized into five sessions: the global perspective, national policies and strategies, compliance with radiological criteria, management of incidents with contaminated scrap metal, and improving confidence and protecting the interests of stakeholders. The aim of the first session was to present the views and perspectives of the different organizations concerned with radioactive material in scrap metal, scrap metal recycling, steel making, radiation source security and safety and international trade and economics. The second session covered some of the national policies and strategies being used to address the control of radioactive material that has been inadvertently incorporated into scrap metal were presented. In addition to the oral presentations, contributions describing the situation in many countries of the world in the form of posters were displayed. The many posters reporting national

  4. Collisional model for granular impact dynamics.

    Science.gov (United States)

    Clark, Abram H; Petersen, Alec J; Behringer, Robert P

    2014-01-01

    When an intruder strikes a granular material from above, the grains exert a stopping force which decelerates and stops the intruder. Many previous studies have used a macroscopic force law, including a drag force which is quadratic in velocity, to characterize the decelerating force on the intruder. However, the microscopic origins of the force-law terms are still a subject of debate. Here, drawing from previous experiments with photoelastic particles, we present a model which describes the velocity-squared force in terms of repeated collisions with clusters of grains. From our high speed photoelastic data, we infer that "clusters" correspond to segments of the strong force network that are excited by the advancing intruder. The model predicts a scaling relation for the velocity-squared drag force that accounts for the intruder shape. Additionally, we show that the collisional model predicts an instability to rotations, which depends on the intruder shape. To test this model, we perform a comprehensive experimental study of the dynamics of two-dimensional granular impacts on beds of photoelastic disks, with different profiles for the leading edge of the intruder. We particularly focus on a simple and useful case for testing shape effects by using triangular-nosed intruders. We show that the collisional model effectively captures the dynamics of intruder deceleration and rotation; i.e., these two dynamical effects can be described as two different manifestations of the same grain-scale physical processes.

  5. Root resorption after orthodontic intrusion and extrusion:.

    NARCIS (Netherlands)

    Han, G.; Huang, S.; Hoff, J.W. Von den; Zeng, X.; Kuijpers-Jagtman, A.M.

    2005-01-01

    The aim of this investigation was to compare root resorption in the same individual after application of continuous intrusive and extrusive forces. In nine patients (mean age 15.3 years), the maxillary first premolars were randomly intruded or extruded with a continuous force of 100 cN for eight

  6. Spatio-temporal Background Models for Outdoor Surveillance

    Directory of Open Access Journals (Sweden)

    Pless Robert

    2005-01-01

    Full Text Available Video surveillance in outdoor areas is hampered by consistent background motion which defeats systems that use motion to identify intruders. While algorithms exist for masking out regions with motion, a better approach is to develop a statistical model of the typical dynamic video appearance. This allows the detection of potential intruders even in front of trees and grass waving in the wind, waves across a lake, or cars moving past. In this paper we present a general framework for the identification of anomalies in video, and a comparison of statistical models that characterize the local video dynamics at each pixel neighborhood. A real-time implementation of these algorithms runs on an 800 MHz laptop, and we present qualitative results in many application domains.

  7. Long-Term Performance of Transuranic Waste Inadvertently Disposed in a Shallow Land Burial Trench at the Nevada Test Site

    International Nuclear Information System (INIS)

    Shott, Gregory J.; Yucel, Vefa

    2009-01-01

    In 1986, 21 m3 of transuranic (TRU) waste was inadvertently disposed in a shallow land burial trench at the Area 5 Radioactive Waste Management Site on the Nevada Test Site. U.S. Department of Energy (DOE) TRU waste must be disposed in accordance with Title 40, Code of Federal Regulations (CFR), Part 191, Environmental Radiation Protection Standard for Management and Disposal of Spent Nuclear Fuel, High-Level, and Transuranic Radioactive Wastes. The Waste Isolation Pilot Plant is the only facility meeting these requirements. The National Research Council, however, has found that exhumation of buried TRU waste for disposal in a deep geologic repository may not be warranted when the effort, exposures, and expense of retrieval are not commensurate with the risk reduction achieved. The long-term risks of leaving the TRU waste in-place are evaluated in two probabilistic performance assessments. A composite analysis, assessing the dose from all disposed waste and interacting sources of residual contamination, estimates an annual total effective dose equivalent (TEDE) of 0.01 mSv, or 3 percent of the dose constraint. A 40 CFR 191 performance assessment also indicates there is reasonable assurance of meeting all requirements. The 40 CFR 191.15 annual mean TEDE for a member of the public is estimated to reach a maximum of 0.055 mSv at 10,000 years, or approximately 37 percent of the 0.15 mSv individual protection requirement. In both assessments greater than 99 percent of the dose is from co-disposed low-level waste. The simulated probability of the 40 CFR 191.13 cumulative release exceeding 1 and 10 times the release limit is estimated to be 0.0093 and less than 0.0001, respectively. Site characterization data and hydrologic process modeling support a conclusion of no groundwater pathway within 10,000 years. Monte Carlo uncertainty analysis indicates that there is reasonable assurance of meeting all regulatory requirements. Sensitivity analysis indicates that the results

  8. Has Therapy Intruded into Education?

    Science.gov (United States)

    Mintz, Avi

    2009-01-01

    For over fifty years, scholars have argued that a therapeutic ethos has begun to change how people think about themselves and others. There is also a growing concern that the therapeutic ethos has influenced educational theory and practice, perhaps to their detriment. This review article discusses three books, "The Dangerous Rise of Therapeutic…

  9. 78 FR 35217 - Atlantic Coastal Fisheries Cooperative Management Act Provisions; American Lobster Fishery

    Science.gov (United States)

    2013-06-12

    ... Clerical Appeal would allow NMFS to correct clerical and mathematical errors that sometimes inadvertently occur when applications are processed. It is not an appeal on the merits and would involve no analysis... database is being created by the Atlantic Coastal Cooperative Statistics Program (ACCSP) and is a critical...

  10. Differential Reinforcement of Alternative Behavior Increases Resistance to Extinction: Clinical Demonstration, Animal Modeling, and Clinical Test of One Solution

    Science.gov (United States)

    Mace, F. Charles; McComas, Jennifer J.; Mauro, Benjamin C.; Progar, Patrick R.; Taylor, Bridget; Ervin, Ruth; Zangrillo, Amanda N.

    2010-01-01

    Basic research with pigeons on behavioral momentum suggests that differential reinforcement of alternative behavior (DRA) can increase the resistance of target behavior to change. This finding suggests that clinical applications of DRA may inadvertently increase the persistence of target behavior even as it decreases its frequency. We conducted…

  11. Inadvertent intrathecal injection of atracurium.

    Science.gov (United States)

    Zirak, Nahid; Soltani, Ghasem; Ghomian, Naiere; Hasanpour, Mohamad Reza; Mashayekhi, Zahra

    2011-04-01

    This report relates how tracurium was given by mistake, intrathecally, during spinal anesthesia, to a 38-year-old woman, who was a candidate for abdominal hysterectomy. When no analgesia was observed, the mistake in giving the injection was understood. She was evaluated postoperatively by train of four ratio, measuring her breathing rate, eye opening, and protruding of tongue at one, two, twenty-four, and forty-eight hours, and then at one and two weeks, with the final evaluation the following month. The patient had normal timings during the operation and postoperation periods, and no abnormal findings were observed through the first month. This finding was contrary to several studies, which described adverse reactions due to accidental intrathecal injection of neuromuscular blocking drugs.

  12. Inadvertent intrathecal injection of atracurium

    Directory of Open Access Journals (Sweden)

    Nahid Zirak

    2011-01-01

    Full Text Available This report relates how tracurium was given by mistake, intrathecally, during spinal anesthesia, to a 38-year-old woman, who was a candidate for abdominal hysterectomy. When no analgesia was observed, the mistake in giving the injection was understood. She was evaluated postoperatively by train of four ratio, measuring her breathing rate, eye opening, and protruding of tongue at one, two, twenty-four, and forty-eight hours, and then at one and two weeks, with the final evaluation the following month. The patient had normal timings during the operation and postoperation periods, and no abnormal findings were observed through the first month. This finding was contrary to several studies, which described adverse reactions due to accidental intrathecal injection of neuromuscular blocking drugs.

  13. Residency in white-eared hummingbirds (Hylocharis leucotis and its effect in territorial contest resolution

    Directory of Open Access Journals (Sweden)

    Verónica Mendiola-Islas

    2016-10-01

    Full Text Available Background Territory owners usually defeat intruders. One explanation for this observation is the uncorrelated asymmetry hypothesis which argues that contests might be settled by an arbitrary convention such as “owners win.” We studied the effect of territorial residency on contest asymmetries in the white-eared hummingbird (Hylocharis leucotis in a fir forest from central Mexico. Methods Twenty white-eared male adult hummingbird territories were monitored during a winter season, recording the territorial behavior of the resident against intruding hummingbirds. The size and quality of the territory were related to the probability that the resident would allow the use of flowers by the intruder. Various generalized models (logistical models were generated to describe the probabilities of victory for each individual resident depending on the different combinations of three predictor variables (territory size, territory quality, and intruder identity. Results In general, small and low quality territory owners tend to prevent conspecific intruders from foraging at a higher rate, while they frequently fail to exclude heterospecific intruders such as the magnificent hummingbird (Eugenes fulgens or the green violetear hummingbird (Colibri thalassinus on any territory size. Our results showed that the identity of the intruder and the size and quality of the territory determined the result of the contests, but not the intensity of defense. Discussion Initially, the rule that “the resident always wins” was supported, since no resident was expelled from its territory during the study. Nevertheless, the resident-intruder asymmetries during the course of a day depended on different factors, such as the size and quality of the territory and, mainly, the identity of the intruders. Our results showed that flexibility observed in contest tactics suggests that these tactics are not fixed but are socially plastic instead and they can be adjusted to

  14. Residency in white-eared hummingbirds (Hylocharis leucotis) and its effect in territorial contest resolution.

    Science.gov (United States)

    Mendiola-Islas, Verónica; Lara, Carlos; Corcuera, Pablo; Valverde, Pedro Luis

    2016-01-01

    Territory owners usually defeat intruders. One explanation for this observation is the uncorrelated asymmetry hypothesis which argues that contests might be settled by an arbitrary convention such as "owners win." We studied the effect of territorial residency on contest asymmetries in the white-eared hummingbird ( Hylocharis leucotis ) in a fir forest from central Mexico. Twenty white-eared male adult hummingbird territories were monitored during a winter season, recording the territorial behavior of the resident against intruding hummingbirds. The size and quality of the territory were related to the probability that the resident would allow the use of flowers by the intruder. Various generalized models (logistical models) were generated to describe the probabilities of victory for each individual resident depending on the different combinations of three predictor variables (territory size, territory quality, and intruder identity). In general, small and low quality territory owners tend to prevent conspecific intruders from foraging at a higher rate, while they frequently fail to exclude heterospecific intruders such as the magnificent hummingbird ( Eugenes fulgens ) or the green violetear hummingbird ( Colibri thalassinus ) on any territory size. Our results showed that the identity of the intruder and the size and quality of the territory determined the result of the contests, but not the intensity of defense. Initially, the rule that "the resident always wins" was supported, since no resident was expelled from its territory during the study. Nevertheless, the resident-intruder asymmetries during the course of a day depended on different factors, such as the size and quality of the territory and, mainly, the identity of the intruders. Our results showed that flexibility observed in contest tactics suggests that these tactics are not fixed but are socially plastic instead and they can be adjusted to specific circumstances.

  15. Application of artificial intelligence to improve plant availability

    International Nuclear Information System (INIS)

    Frank, M.V.; Epstein, S.A.

    1986-01-01

    Using artificial intelligence software techniques, Management Analysis Company (MAC) has developed two complementary software packages that together provide a workstation environment for maintenance and operations personnel to dramatically reduce inadvertent reactor trips. They are called the Reactor Trip Simulation Environment (RTSE) and the Key Component Generation Environment (KCGE). They are not proposed or being designed. They are in use today. The plants component and process interdependencies are modeled within RTSE - using modeling practices and notations familiar to engineers which accelerated the acceptance of the software. KCGE provides the groups of key components that would cause a reactor trip

  16. Assessment of the long-term risks of inadvertent human intrusion into a disposal vault in deep plutonic rock: reassessment using ICRP recommendations

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1996-06-01

    Canada has conducted an extensive research program on the safe disposal of nuclear fuel waste. The program has focussed on the concept of disposal in durable containers in an engineered facility or 'vault' located 500 to 1000 m deep in plutonic rock on the Canadian Shield. As part of this task, a methodology was developed to assess the long-term risk from inadvertent intrusion scenarios, and applied to a reference conceptual design of a facility for disposal of used fuel. The AECB has specified that 'the predicted radiological risk to individuals from a waste disposal facility shall not exceed 10 -6 fatal cancers and serious genetic effects in a year.' Risk is defined as the sum, of the product of the probability of the scenario, the magnitude of the resultant radiation dose, and the probability of a health effect per unit dose. The AECB also specifies that 'calculations of individual risk should be made by using the risk conversion factor of 2 x 10 -2 per sievert.' Our earlier assessment of four human intrusion scenarios showed that the estimated risk using the risk conversion factor recommended by the AECB was at least 3 orders of magnitude below the AECB risk criterion, at all times up to 10 000 a, for each of the four scenarios analysed. The AECB risk criterion and risk conversion factor are based on the recommendations of the Intemafional Commission on Radiological Protection (ICRP) in their Publication ICRP 26. More recently, in its Publication ICRP 60, the ICRP has recommended dose factors for fatal cancers that are larger than those in ICRP 26 and an increase in the risk factor for serious hereditary effects in all future generations. Another ICRP Publication, ICRP 64, states that 'For potential exposure situations, the consideration of the basic dose response used for stochastic effects must be extended into the range of high doses where deterministic effects also occur.' For the new assessments of risk we use the estimated doses and probabilities of

  17. Home range defense in the red fox, Vulpes vulpes L

    Science.gov (United States)

    Preston, E.M.

    1975-01-01

    This paper describes the home range defense behavior observed when nonresident male red foxes were introduced into established home ranges of resident male-female pairs. In 12 observation periods, four intruders were introduced to each of three mated pairs which had been given three weeks to acclimate to a 4.05-hectare, fenced enclosure. The residents centered their activities around a natural den and the frequency of intruder-resident encounters decreased rapidly with increasing distance from the den. The primary home range defense was continual harassment of the intruders by the resident males through agonistic displays and chases. Physical contact was rare. Even though the resident males were dominant in less than a majority of the interactions observed, they were usually successful in displacing the intruders within a few hours. The resident females seldom interacted with the intruders.

  18. How to achieve proper overbite—Lessons from natural dentoalveolar compensation

    Directory of Open Access Journals (Sweden)

    Jenny Zwei-Chieng Chang

    2013-12-01

    Conclusion: For orthodontically closing the open bite, intruding upper posteriors and extruding lower anteriors are appropriate ways to simulate the natural occurring compensation. To eliminate deep bite in a low mandibular plane patient, intruding upper and lower anteriors and proclining anteriors will achieve good overbite. Imitating the natural dentoalveolar compensation by using temporary anchorage devices at appropriate sites for intruding teeth helps to resolve orthodontic vertical problems.

  19. Influence of i{sub 13/2} proton and j{sub 15/2} neutron intruding orbitals on the behaviour of 190 mass region superdeformed nuclei; Influence des orbitales intruses proton i{sub 13/2} et neutron j{sub 15/2} sur le comportement des noyaux superdeformes de la region de masse 190

    Energy Technology Data Exchange (ETDEWEB)

    Duprat, J

    1995-01-01

    This work concerns the study of the nuclear superdeformation phenomenon in the A = 190 mass region. The superdeformed (SD) states in {sup 193}Tl, {sup 194}Tl {sup 195}Tl were produced via heavy-ion induced reactions and studied with the EUROGAM gamma multidetector array. The analysis of high-multiplicity events allowed the study of the magnetic properties of the SD states in these nuclei. For the first time, the g-factor of a proton orbital in a SD nucleus in the A = 190 mass region has been extracted. This measurement indicates that the two known bands in {sup 195}Tl-SD are built on the i{sub 13/2} proton intruder orbital. A new SD band has been found in this isotope: it is the first SD band built on an excited proton state found in the A = 190 region. Finally an interaction between two pairs of bands has been established in {sup 194}Tl; this interaction indicate the crossing of two neutron orbitals above the N = 112 gap. The magnetic properties of the states of the SD bands in {sup 194}Tl reveals that these bands are built on configurations in which the single proton and neutron intrinsic spins are aligned. Comparison between different SD bands in the Thallium isotopes shows the prominent role of the i{sub 13/2} proton and the j{sub 15/2} neutron intruder orbitals in the smooth increase of the dynamical moment of inertia as a function of the rotational frequency. In addition, this work reports on the first observation of a SD rotational band produced in a (HI, {alpha}xn) reaction channel. The study of the maximum spin reached by the SD bands indicates both a competition between alpha emission and fission of the compound nucleus, and the limitation due to the fission process in the population of the SD nuclei in the A = 190 region. (author). 120 refs., 112 figs., 22 tabs., 2 ann.

  20. Development of a self-navigating mobile interior robot application as a security guard/sentry

    International Nuclear Information System (INIS)

    Klarer, P.R.; Harrington, J.J.

    1986-07-01

    This paper describes a mobile robot system designed to function as part of an overall security system at a high security facility. The features of this robot system include specialized software and sensors for navigation without the need for external locator beacons or signposts, sensors for remote imaging and intruder detection, and the ability to communicate information either directly to the electronic portion of the security system or to a manned central control center. Other desirable features of the robot system include low weight, compact size, and low power consumption. The robot system can be operated either by remote manual control, or it can operate autonomously where direct human control can be limited to the global command level. The robot can act as a mobile remote sensing platform for alarm assessment or roving patrol, as a point sensor (sentry) in routine security applications, or as an exploratory device in situations potentially hazardous to humans. This robot system may also be used to ''walk-test'' intrusion detection sensors as part of a routine test and maintenance program for an interior intrusion detection system. The hardware, software, and operation of this robot system will be briefly described herein

  1. Commonwealth Edison captures intruders on screen

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Commonwealth Edison has developed three software programs, with the supporting hardware, that significantly upgrade security monitoring capabilities at nuclear power stations. These are Video Capture, the Alternate Perimeter Alarm Reporting System, and the Redundant Access Control System. Conventional video systems only display what is happening at the moment and rewinding a VCR to discover what occurred earlier takes time. With Video Capture the images can be instantly restored to the monitor screen and printed out. When one of the security devices used to monitor the perimeter of a Commonwealth Edison nuclear power station is tripped, the Video Capture program stores the visual image digitally. This is done using similar technology to the employed in fax machines. The security staff are thus able to distinguish immediately between disturbances taking place simultaneously at different security zones. They can magnify and compare the stored images and print them out. The Alternate Perimeter Alarm Reporting System was developed to speed the transmission of alarm signals from the security sensors to the security computer. The Redundant Access Control System (RACS) was originally developed to meet the requirement of the Nuclear Regulatory Commission (NRC) for a secondary computer-operated security measure to monitor employee access to a nuclear power station. When employee drug testing became an additional NRC requirement, the Nuclear Division of Commonwealth Edison asked their programmers to modify RACS to generate a random list of personnel to be tested for substance abuse. RACS was then further modified to produce numerous station operating reports that had been previously compiled manually. (author)

  2. Applications of Derandomization Theory in Coding

    Science.gov (United States)

    Cheraghchi, Mahdi

    2011-07-01

    Randomized techniques play a fundamental role in theoretical computer science and discrete mathematics, in particular for the design of efficient algorithms and construction of combinatorial objects. The basic goal in derandomization theory is to eliminate or reduce the need for randomness in such randomized constructions. In this thesis, we explore some applications of the fundamental notions in derandomization theory to problems outside the core of theoretical computer science, and in particular, certain problems related to coding theory. First, we consider the wiretap channel problem which involves a communication system in which an intruder can eavesdrop a limited portion of the transmissions, and construct efficient and information-theoretically optimal communication protocols for this model. Then we consider the combinatorial group testing problem. In this classical problem, one aims to determine a set of defective items within a large population by asking a number of queries, where each query reveals whether a defective item is present within a specified group of items. We use randomness condensers to explicitly construct optimal, or nearly optimal, group testing schemes for a setting where the query outcomes can be highly unreliable, as well as the threshold model where a query returns positive if the number of defectives pass a certain threshold. Finally, we design ensembles of error-correcting codes that achieve the information-theoretic capacity of a large class of communication channels, and then use the obtained ensembles for construction of explicit capacity achieving codes. [This is a shortened version of the actual abstract in the thesis.

  3. Asymmetries in body condition and order of arrival influence competitive ability and survival in a coral reef fish.

    Science.gov (United States)

    Poulos, Davina E; McCormick, Mark I

    2015-11-01

    Trade-offs between traits that influence an individual's competitive ability are important in determining community assembly and coexistence of individuals sharing the same resources. Populations of coral reef fish are structurally complex, so it is important to understand how these populations are shaped as a result of an individual's suite of traits and those of its competitors. We conducted a 2 × 2 factorial field experiment that manipulated body condition (high or low, manipulated through a feeding regime) and residency (resident or intruder, where the resident arrived at the habitat 3 h before the intruder) to evaluate effects on competitive ability and survival. Prior residency alleviated the disadvantage of a low body condition with respect to aggression, which was similar between low-condition residents and high-condition intruders. However, high-condition residents displayed a significantly greater level of aggression than intruders, regardless of whether intruders were from high- or low-condition treatments. For intruders to have a high probability of becoming dominant, they needed to have a large body condition advantage. Mortality trajectories suggested that body condition modified the effect of prior residency, and intruders were more likely to suffer mortality if they had a low body condition because residents pushed them away from shelter. Our results highlight that the negative effects of some traits may be compensated for by the positive effects of other traits, and that the specific ecological context an individual faces (such as the characteristics of its competitors) can have a major influence on successful establishment and persistence.

  4. Intruder dose pathway analysis for the onsite disposal of commercial radioactive waste

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.

    1984-10-01

    Because of uncertainties associated with assessing the potential risks from onsite burials of commercial radioactive waste, the US Nuclear Regulatory Commission (NRC) has amended its regulations to provide greater assurance that buried radioactive material will not present a hazard to public health and safety. The amended regulations now require licensees to apply for approval of proposed procedures for onsite disposal pursuant to 10 CFR 20.302. The NRC technically reviews these requests on a case-by-case basis. These technical reviews require modeling potential pathways to man and projecting radiation dose commitments. This paper contains a summary of our efforts to develop human-intrusion scenarios and to modify a version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. The ONSITE/MAXI1 computer software package contains four computer codes. ONSITE is the interactive user interface that allows the end-user to simply and efficiently create and use the radiation-exposure scenarios. MAXI1 is then used with the scenario information to calculate the maximum annual dose to the exposed individual from selected pathways. 1 figure

  5. Disruption of the Glutamate–Glutamine Cycle Involving Astrocytes in an Animal Model of Depression for Males and Females

    Science.gov (United States)

    Rappeneau, Virginie; Blaker, Amanda; Petro, Jeff R.; Yamamoto, Bryan K.; Shimamoto, Akiko

    2016-01-01

    Background: Women are twice as likely as men to develop major depression. The brain mechanisms underlying this sex disparity are not clear. Disruption of the glutamate–glutamine cycle has been implicated in psychiatric disturbances. This study identifies sex-based impairments in the glutamate–glutamine cycle involving astrocytes using an animal model of depression. Methods: Male and female adult Long-Evans rats were exposed to chronic social defeat stress (CSDS) for 21 days, using a modified resident-intruder paradigm. Territorial aggression was used for males and maternal aggression was used for females to induce depressive-like deficits for intruders. The depressive-like phenotype was assessed with intake for saccharin solution, weight gain, estrous cycle, and corticosterone (CORT). Behaviors displayed by the intruders during daily encounters with residents were characterized. Rats with daily handling were used as controls for each sex. Ten days after the last encounter, both the intruders and controls were subjected to a no-net-flux in vivo microdialysis to assess glutamate accumulation and extracellular glutamine in the nucleus accumbens (NAc). The contralateral hemispheres were used for determining changes in astrocytic markers, including glial fibrillary acidic protein (GFAP) and glutamate transporter-1 (GLT-1). Results: Both male and female intruders reduced saccharin intake over the course of CSDS, compared to their pre-stress period and to their respective controls. Male intruders exhibited submissive/defensive behaviors to territorial aggression by receiving sideways threats and bites. These males showed reductions in striatal GLT-1 and spontaneous glutamine in the NAc, compared to controls. Female intruders exhibited isolated behaviors to maternal aggression, including immobility, rearing, and selfgrooming. Their non-reproductive days were extended. Also, they showed reductions in prefrontal and accumbal GFAP+ cells and prefrontal GLT-1, compared to

  6. Armored Combat Vehicles Science and Technology Plan

    Science.gov (United States)

    1982-11-01

    APPLICATION OF SENSORS Investigate the seismic, acoustic, and electromagnetic signatures of military and intruder -type targets and the theoretical aspects...a prototype sampling system which has the capability to monitor ambieut air both outside and inside vehicles and provide an early warning to the crew...and through various processing modules provide automated functions for simultaneous tracking of targets and automitic recognition, 74 f’," SENSING

  7. Application of acoustic agglomeration to enhance air filtration efficiency in air-conditioning and mechanical ventilation (ACMV) systems

    OpenAIRE

    Ng, Bing Feng; Xiong, Jin Wen; Wan, Man Pun

    2017-01-01

    The recent episodes of haze in Southeast Asia have caused some of the worst regional atmospheric pollution ever recorded in history. In order to control the levels of airborne fine particulate matters (PM) indoors, filtration systems providing high PM capturing efficiency are often sought, which inadvertently also results in high airflow resistance (or pressure drop) that increases the energy consumption for air distribution. A pre-conditioning mechanism promoting the formation of particle cl...

  8. Summary of Remediated and Unremediated Nitrate Salt Surrogate Testing in Support of the Waste Treatment Permit Application to the New Mexico Environment Department (NMED)

    Energy Technology Data Exchange (ETDEWEB)

    Funk, David John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-06-22

    The inadvertent creation of transuranic waste carrying hazardous waste codes D001 and D002 requires the treatment of the material to eliminate the hazardous characteristics and allow its eventual shipment and disposal at the Waste Isolation Pilot Plant (WIPP). This report briefly summarizes the surrogate testing that was done in support of our understanding of this waste form.

  9. The Management and Security Expert (MASE)

    Science.gov (United States)

    Miller, Mark D.; Barr, Stanley J.; Gryphon, Coranth D.; Keegan, Jeff; Kniker, Catherine A.; Krolak, Patrick D.

    1991-01-01

    The Management and Security Expert (MASE) is a distributed expert system that monitors the operating systems and applications of a network. It is capable of gleaning the information provided by the different operating systems in order to optimize hardware and software performance; recognize potential hardware and/or software failure, and either repair the problem before it becomes an emergency, or notify the systems manager of the problem; and monitor applications and known security holes for indications of an intruder or virus. MASE can eradicate much of the guess work of system management.

  10. Automated Groundwater Screening

    International Nuclear Information System (INIS)

    Taylor, Glenn A.; Collard, Leonard B.

    2005-01-01

    The Automated Intruder Analysis has been extended to include an Automated Ground Water Screening option. This option screens 825 radionuclides while rigorously applying the National Council on Radiation Protection (NCRP) methodology. An extension to that methodology is presented to give a more realistic screening factor for those radionuclides which have significant daughters. The extension has the promise of reducing the number of radionuclides which must be tracked by the customer. By combining the Automated Intruder Analysis with the Automated Groundwater Screening a consistent set of assumptions and databases is used. A method is proposed to eliminate trigger values by performing rigorous calculation of the screening factor thereby reducing the number of radionuclides sent to further analysis. Using the same problem definitions as in previous groundwater screenings, the automated groundwater screening found one additional nuclide, Ge-68, which failed the screening. It also found that 18 of the 57 radionuclides contained in NCRP Table 3.1 failed the screening. This report describes the automated groundwater screening computer application

  11. Performance assessment for the class L-II disposal facility

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This draft radiological performance assessment (PA) for the proposed Class L-II Disposal Facility (CIIDF) on the Oak Ridge Reservation (ORR) has been prepared to demonstrate compliance with the requirements of the US Department of Energy Order 5820.2A. This PA considers the disposal of low-level radioactive wastes (LLW) over the operating life of the facility and the long-term performance of the facility in providing protection to public health and the environment. The performance objectives contained in the order require that the facility be managed to accomplish the following: (1) Protect public health and safety in accordance with standards specified in environmental health orders and other DOE orders. (2) Ensure that external exposure to the waste and concentrations of radioactive material that may be released into surface water, groundwater, soil, plants, and animals results in an effective dose equivalent (EDE) that does not exceed 25 mrem/year to a member of the public. Releases to the atmosphere shall meet the requirements of 40 CFR Pt. 61. Reasonable effort should be made to maintain releases of radioactivity in effluents to the general environment as low as reasonably achievable. (1) Ensure that the committed EDEs received by individual who inadvertently may intrude into the facility after the loss of active institutional control (100 years) will not exceed 100 mrem/year for continuous exposure of 500 mrem for a single acute exposure. (4) Protect groundwater resources, consistent with federal, state, and local requirements.

  12. DOE's performance evaluation project for mixed low-level waste disposal

    International Nuclear Information System (INIS)

    Waters, R.D.; Chu, M.S.Y.; Gruebel, M.M.; Lee, D.W.

    1995-01-01

    A performance evaluation (PE) is an analysis that estimates radionuclide concentration limits for 16 potential Department of Energy (DOE) mixed low-level waste (ULLW) disposal sites based on the analysis of two environmental exposure pathways (air and water) to an off-site individual and an inadvertent-intruder exposure pathway. Sites are analyzed for their ability to attenuate concentrations of specific radionuclides that could be released from wastes in a hypothetical ULLW disposal facility. Site-specific data and knowledge are used within a generic framework that is consistent across all sites being evaluated. After estimates of waste concentrations for the three pathways are calculated, the minimum of the waste concentration values is selected as the permissible waste concentration for each radionuclide. The PE results will be used as input to the process for DOE's ULLW disposal configuration. Preliminary comparisons of results from the PE and site-specific performance assessments indicate that the simple PE results generally agree with results of the performance assessments, even when site conditions are complex. This agreement with performance-assessment results increases confidence that similar results can be obtained at other sites that have good characterization data. In addition, the simple analyses contained in the PE illustrate a potential method to satisfy the needs of many regulators and the general public for a simple, conservative, defensible, and easily understandable analysis that provides results similar to those of more complex analyses

  13. Disruption of the glutamate-glutamine cycle involving astrocytes in an animal model of depression for males and females

    Directory of Open Access Journals (Sweden)

    Virginie Rappeneau

    2016-12-01

    Full Text Available Background: Women are twice as likely as men to develop major depression (MD. The brain mechanisms underlying this sex disparity are not clear. Disruption of the glutamate-glutamine cycle has been implicated in psychiatric disturbances. This study identifies sex-based impairments in the glutamate-glutamine cycle involving astrocytes using an animal model of depression. Methods: Male and female adult Long-Evans rats were exposed to chronic social defeat stress (CSDS for 21 days, using a modified resident-intruder paradigm. Territorial aggression was used for males and maternal aggression was used for females to induce depressive-like deficits for intruders. The depressive-like phenotype was assessed with intake for saccharin solution, weight gain, estrous cycle, and corticosterone (CORT. Behaviors displayed by the intruders during daily encounters with residents were characterized. Rats with daily handling were used as controls for each sex. Ten days after the last encounter, both the intruders and controls were subjected to a no-net-flux in vivo microdialysis to assess glutamate accumulation and extracellular glutamine in the nucleus accumbens (NAc. The contralateral hemispheres were used for determining changes in astrocytic markers, including glial fibrillary acidic protein (GFAP and glutamate transporter-1 (GLT-1. Results: Both male and female intruders reduced saccharin intake over the course of CSDS, compared to their pre-stress period and to their respective controls. Male intruders exhibited submissive/defensive behaviors to territorial aggression by receiving sideways threats and bites. These males showed reductions in striatal GLT-1 and spontaneous glutamine in the NAc, compared to controls. Female intruders exhibited isolated behaviors to maternal aggression, including immobility, rearing, and self-grooming. Their non-reproductive days were extended. Also, they showed reductions in prefrontal and accumbal GFAP+ cells and prefrontal GLT

  14. Physical versus psychological social stress in male rats reveals distinct cardiovascular, inflammatory and behavioral consequences

    Science.gov (United States)

    Padi, Akhila R.; Moffitt, Casey M.; Wilson, L. Britt; Wood, Christopher S.; Wood, Susan K.

    2017-01-01

    Repeated exposure to social stress can precipitate the development of psychosocial disorders including depression and comorbid cardiovascular disease. While a major component of social stress often encompasses physical interactions, purely psychological stressors (i.e. witnessing a traumatic event) also fall under the scope of social stress. The current study determined whether the acute stress response and susceptibility to stress-related consequences differed based on whether the stressor consisted of physical versus purely psychological social stress. Using a modified resident-intruder paradigm, male rats were either directly exposed to repeated social defeat stress (intruder) or witnessed a male rat being defeated. Cardiovascular parameters, behavioral anhedonia, and inflammatory cytokines in plasma and the stress-sensitive locus coeruleus were compared between intruder, witness, and control rats. Surprisingly intruders and witnesses exhibited nearly identical increases in mean arterial pressure and heart rate during acute and repeated stress exposures, yet only intruders exhibited stress-induced arrhythmias. Furthermore, re-exposure to the stress environment in the absence of the resident produced robust pressor and tachycardic responses in both stress conditions indicating the robust and enduring nature of social stress. In contrast, the long-term consequences of these stressors were distinct. Intruders were characterized by enhanced inflammatory sensitivity in plasma, while witnesses were characterized by the emergence of depressive-like anhedonia, transient increases in systolic blood pressure and plasma levels of tissue inhibitor of metalloproteinase. The current study highlights that while the acute cardiovascular responses to stress were identical between intruders and witnesses, these stressors produced distinct differences in the enduring consequences to stress, suggesting that witness stress may be more likely to produce long-term cardiovascular

  15. Identification of risk factors for post-endoscopic retrograde cholangiopancreatography pancreatitis in a high volume center.

    Science.gov (United States)

    Phillip, Veit; Schwab, Miriam; Haf, David; Algül, Hana

    2017-01-01

    Pancreatitis is the most common complication of endoscopic retrograde cholangiopancreatography (ERCP). Several patients´ or procedure related risk factors for post-ERCP pancreatitis (PEP) have been suggested. The aim of this study was to validate the risk factors for PEP in a high-volume center. All patients undergoing first time ERCP at a tertiary referral center between December 2010 and October 2013 were retrospectively included. PEP was defined according to the Atlanta Classification. 344 patients were included in the final analysis. The risk to develop PEP was increased in patients with chronic pancreatitis (odds ratio 3.7) and after inadvertent cannulation of the pancreatic duct (odds ratio 2.2), which occurred in 26.5% of the patients. Inadvertent cannulation occurred significantly more frequently in patients with difficult cannulation of the papilla duodeni major (odds ratio 12.7; passociated with an increased risk for difficult cannulation (odds ratio 3.0). Inadvertent cannulation of the pancreatic duct is a procedure related risk factor for PEP. Measurements on preventing inadvertent cannulation of the pancreatic duct should be established and studies on prophylactic measurements should focus particularly on patients with inadvertent cannulation of the pancreatic duct.

  16. Aggressive display and territoriality of the bateleur Terathopius ...

    African Journals Online (AJOL)

    1988-07-04

    Jul 4, 1988 ... territorial function because it drives intruders away from the nest, usually by a gain in altitude by the intruder. ... bateleur I saw in the field, also noting the bird's age and ..... benefit of territoriality may change depending on the.

  17. Improving Protection Agains Intruders Using Passive Sonar

    NARCIS (Netherlands)

    Fillinger, L.; Hunter, A.J.; Zampolli, M.; Clarijs, M.C.; Verolme, J.L.

    2011-01-01

    Divers and small vessels are increasingly recognized as a potential threat to high value assets. Harbour and waterside surveillance systems that are used to counter the threat of divers are usually based on active sonar, whose performance can be limited by reverberation in a harbour environment.

  18. Report on the training for an intruder

    International Nuclear Information System (INIS)

    Aoki, Yoshikazu; Fukumoto, Masahiro; Saito, Toru; Tsujinaka, Hideyuki

    2002-12-01

    Crisis management section members of Japan Nuclear Cycle Development Institute (JNC) Tokai Works had implemented two types of trainings against terrorism in last Japanese fiscal year and improved the countermeasure against the terrorism. In this fiscal year we trained against the new type of terrorism in the period of about 1 year later of a series of attacks on America by terrorism. As a result of the training some points which need further improvements and new weak points have been availed as follows. (1) Enlightenment of workers' senses against terrorism. Few members of the Emergency Control Center, workers and guards looked tensionless in the training. The sense against terrorism needs to be enlightened. (2) Speediness of initial response. In this training the events using a car went on more rapidly than expected. The rapid response to counter terrorism needs to be examined. (3) Improvement of fundamental countermeasures. The fundamental response of the workers to the terrorism under limited condition before the guard authorities' arrival has been improved further more through the education and trainings. (4) Completeness of the prevention of terrorism. After terrorism occurs, Tokai Works is helpless until the guard authorities arrive. First of all the measure to avoid terrorism occurrence is important. (5) Strengthen the cooperation with the guard authorities. Besides completeness of the prevention of terrorism it is necessary to cope with the guard authorities at ordinary times against an emergency. (author)

  19. How to recognize intruders in your niche

    DEFF Research Database (Denmark)

    Andersen, Hanne

    2006-01-01

    first show the inconsistency between the basic premises underlying Kuhn’s incommensurability thesis and the two standard responses to the thesis. I shall then argue that if one adopts Kuhn’s position, the response must build on a notion of overlap between phenomenal worlds. Finally, I shall argue...

  20. Resilience to failure and breakdown

    NARCIS (Netherlands)

    Horst, A.R.A. van der

    2012-01-01

    One should take into account inadvertent aberrations of the system (for example a broken signalling device) or of the road user (is not always paying full attention to the driving task). Inadvertent aberrations should not result in accidents (principle of graceful degradation).

  1. Evaluation of costs accrued through inadvertent continuation of hospital-initiated proton pump inhibitor therapy for stress ulcer prophylaxis beyond hospital discharge: a retrospective chart review

    Directory of Open Access Journals (Sweden)

    Shin S

    2015-04-01

    Full Text Available Sooyoung Shin Ajou University College of Pharmacy, Yeongtong-gu, Suwon-si, Gyeonggi-do, South Korea Background: Stress ulcers and related upper gastrointestinal bleeding are well-known complications in intensive care unit (ICU patients. Proton pump inhibitor (PPI-based stress ulcer prophylaxis (SUP has been widely prescribed in noncritically ill patients who are at low risk for clinically significant bleeding, which is then injudiciously continued after hospital discharge. This study aimed to evaluate the incidence of inappropriate prescribing of PPI-based preventative therapy in ICU versus non-ICU patients that subsequently continued postdischarge, and to estimate the costs incurred by the unwarranted outpatient continuation of PPI therapy.Methods: A retrospective review of patient data at a major teaching hospital in Korea was performed. During the 4-year study period, adult patients who were newly initiated on PPI-based SUP during hospital admission and subsequently discharged on a PPI without a medical indication for such therapy were captured for data analysis. The incidence rates of inappropriate prescribing of PPIs were compared between ICU and non-ICU patients, and the costs associated with such therapy were also examined.Results: A total of 4,410 patients, more than half of the inpatient-initiated PPI users, were deemed to have been inadvertently prescribed a PPI at discharge in the absence of a medical need for acid suppression. The incidence of inappropriate outpatient continuation of the prophylaxis was higher among ICU patients compared with non-ICU patients (57.7% versus 52.2%, respectively; P=0.001. The total expenditure accrued through the continuation of nonindicated PPI therapy was approximately US$40,175.Conclusion: This study confirmed that excess usage of PPIs for SUP has spread to low-risk, non-ICU patients. The overuse of unwarranted PPI therapy can incur large health care expenditure, as well as clinical complications

  2. Identification of risk factors for post-endoscopic retrograde cholangiopancreatography pancreatitis in a high volume center.

    Directory of Open Access Journals (Sweden)

    Veit Phillip

    Full Text Available Pancreatitis is the most common complication of endoscopic retrograde cholangiopancreatography (ERCP. Several patients´ or procedure related risk factors for post-ERCP pancreatitis (PEP have been suggested. The aim of this study was to validate the risk factors for PEP in a high-volume center.All patients undergoing first time ERCP at a tertiary referral center between December 2010 and October 2013 were retrospectively included. PEP was defined according to the Atlanta Classification.344 patients were included in the final analysis. The risk to develop PEP was increased in patients with chronic pancreatitis (odds ratio 3.7 and after inadvertent cannulation of the pancreatic duct (odds ratio 2.2, which occurred in 26.5% of the patients. Inadvertent cannulation occurred significantly more frequently in patients with difficult cannulation of the papilla duodeni major (odds ratio 12.7; p<0.001. ERCP on call was associated with an increased risk for difficult cannulation (odds ratio 3.0.Inadvertent cannulation of the pancreatic duct is a procedure related risk factor for PEP. Measurements on preventing inadvertent cannulation of the pancreatic duct should be established and studies on prophylactic measurements should focus particularly on patients with inadvertent cannulation of the pancreatic duct.

  3. Horizontal Conflict Resolution Maneuvers with a Cockpit Display of Traffic Information

    Science.gov (United States)

    Palmer, E.; Jago, S.; Dubord, M.

    1981-01-01

    Pilot resolution of potential conflicts in the horizontal plane when the only information available on the other aircraft was presented on a Cockpit Display of Traffic Information (CDTI) is investigated. The pilot's task was to assess the situation and if necessary maneuver so as to avoid the other aircraft. No instructions were given on evasive strategy or on what was considered to be an acceptable minimum separation. The results indicate that pilots had a strong bias of turning toward the intruder aircraft in order to pass behind it. In more than 50% of the encounters with a 90 degree crossing angle in which the intruder aircraft was programmed to pass behind the aircraft, the pilots maneuvered so as to pass behind the intruder. This bias was not as strong with the display which showed a prediction of the intruder's relative velocity. The average miss distance for all encounters was about 4500 feet.

  4. Effects of acute sublethal gamma radiation exposure on aggressive behavior in male mice: A dose-response study

    International Nuclear Information System (INIS)

    Maier, D.M.; Landauer, M.R.

    1989-01-01

    The resident-intruder paradigm was used to assess the effects of gamma radiation (0, 3, 5, 7 Gray [Gy] cobalt-60) on aggressive offensive behavior in resident male mice over a 3-month period. The defensive behavior of nonirradiated intruder mice was also monitored. A dose of 3 Gy had no effect on either the residents' offensive behavior or the defensive behavior of the intruders paired with them. Doses of 5 and 7 Gy produced decreases in offensive behavior of irradiated residents during the second week postirradiation. The nonirradiated intruders paired with these animals displayed decreases in defensive behavior during this time period, indicating a sensitivity to changes in the residents' behavior. After the third week postirradiation, offensive and defensive behavior did not differ significantly between irradiated mice and sham-irradiated controls. This study suggests that sublethal doses of radiation can temporarily suppress aggressive behavior but have no apparent permanent effect on that behavior

  5. 78 FR 61202 - Medicare Program; Prospective Payment System and Consolidated Billing for Skilled Nursing...

    Science.gov (United States)

    2013-10-03

    ... Processing Manual (CMS Publication 100- 04) was inadvertently abbreviated incorrectly. On page 47963, in our... Benefit Policy Manual (CMS Publication 100-02) was inadvertently abbreviated incorrectly. B. Summary of... provisions of a rule take effect in accordance with section 553(b) of the Administrative Procedure Act (APA...

  6. On Entry Deterrence and Imperfectly Observable Commitment

    DEFF Research Database (Denmark)

    Poulsen, Anders

    2001-01-01

    We analyse a simple entry-deterrence game, where a `Potential Intruder' only imperfectly observes the decision of an `Incumbent' to commit or to not commit to fight any entry by the Potential Intruder. Our game generalises the one studied in Bonanno (1992) by allowing for a richer information tec...

  7. Automating Geospatial Visualizations with Smart Default Renderers for Data Exploration Web Applications

    Science.gov (United States)

    Ekenes, K.

    2017-12-01

    This presentation will outline the process of creating a web application for exploring large amounts of scientific geospatial data using modern automated cartographic techniques. Traditional cartographic methods, including data classification, may inadvertently hide geospatial and statistical patterns in the underlying data. This presentation demonstrates how to use smart web APIs that quickly analyze the data when it loads, and provides suggestions for the most appropriate visualizations based on the statistics of the data. Since there are just a few ways to visualize any given dataset well, it is imperative to provide smart default color schemes tailored to the dataset as opposed to static defaults. Since many users don't go beyond default values, it is imperative that they are provided with smart default visualizations. Multiple functions for automating visualizations are available in the Smart APIs, along with UI elements allowing users to create more than one visualization for a dataset since there isn't a single best way to visualize a given dataset. Since bivariate and multivariate visualizations are particularly difficult to create effectively, this automated approach removes the guesswork out of the process and provides a number of ways to generate multivariate visualizations for the same variables. This allows the user to choose which visualization is most appropriate for their presentation. The methods used in these APIs and the renderers generated by them are not available elsewhere. The presentation will show how statistics can be used as the basis for automating default visualizations of data along continuous ramps, creating more refined visualizations while revealing the spread and outliers of the data. Adding interactive components to instantaneously alter visualizations allows users to unearth spatial patterns previously unknown among one or more variables. These applications may focus on a single dataset that is frequently updated, or configurable

  8. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  9. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  10. Improving the physical layer security of wireless communication networks using spread spectrum coding and artificial noise approach

    CSIR Research Space (South Africa)

    Adedeji, K

    2016-09-01

    Full Text Available at the application layer to protect the messages against eavesdropping. However, the evolution of strong deciphering mechanisms has made conventional cryptography-based security techniques ineffective against attacks from an intruder. Figure 1: Layer protocol... communication networks with passive and active eavesdropper,” IEEE Globecom; Wireless Communication System, pp. 4868-4873, 2012. [9] Y. Zou, X. Wang and W. Shen, “Optimal relay selection for physical layer security in cooperative wireless networks,” IEEE...

  11. An Analysis of Security System for Intrusion in Smartphone Environment

    OpenAIRE

    Louk, Maya; Lim, Hyotaek; Lee, HoonJae

    2014-01-01

    There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecti...

  12. A Framework for Detecting Cloning Attacks in OSN Based on a Novel Social Graph Topology

    OpenAIRE

    Ali M. Meligy; Hani M. Ibrahim; Mohamed F. Torky

    2015-01-01

    — Online Social Networks (OSN) are considering one of the most popular internet applications which attract millions of users around the world to build several social relationships. Emerging the Web 2.0 technology allowed OSN users to create, share, or exchange types of contents in a popular fashion. The other hand, OSN are considering one of the most popular platforms for the intruders to spread several types of OSN attacks. Creating fake profiles for launching cloning at...

  13. Autonomous mobile robotic system for supporting counterterrorist and surveillance operations

    Science.gov (United States)

    Adamczyk, Marek; Bulandra, Kazimierz; Moczulski, Wojciech

    2017-10-01

    Contemporary research on mobile robots concerns applications to counterterrorist and surveillance operations. The goal is to develop systems that are capable of supporting the police and special forces by carrying out such operations. The paper deals with a dedicated robotic system for surveillance of large objects such as airports, factories, military bases, and many others. The goal is to trace unauthorised persons who try to enter to the guarded area, document the intrusion and report it to the surveillance centre, and then warn the intruder by sound messages and eventually subdue him/her by stunning through acoustic effect of great power. The system consists of several parts. An armoured four-wheeled robot assures required mobility of the system. The robot is equipped with a set of sensors including 3D mapping system, IR and video cameras, and microphones. It communicates with the central control station (CCS) by means of a wideband wireless encrypted system. A control system of the robot can operate autonomously, and under remote control. In the autonomous mode the robot follows the path planned by the CCS. Once an intruder has been detected, the robot can adopt its plan to allow tracking him/her. Furthermore, special procedures of treatment of the intruder are applied including warning about the breach of the border of the protected area, and incapacitation of an appropriately selected very loud sound until a patrol of guards arrives. Once getting stuck the robot can contact the operator who can remotely solve the problem the robot is faced with.

  14. 75 FR 75145 - Regulated Navigation Area, Chicago Sanitary and Ship Canal, Romeoville, IL; Safety Zone, Chicago...

    Science.gov (United States)

    2010-12-02

    ... water on board does not allow for inadvertent leakage. Therefore, there is no inconsistency between the regulations. Furthermore, for those vessels that cannot avoid inadvertent leakage of non-potable water, they... any water taken on board to control or maintain trim, draft, stability or stresses of the vessel, or...

  15. The adverse effects of inadvertent intraoperative intravenous ...

    African Journals Online (AJOL)

    2012-03-03

    Mar 3, 2012 ... We present the case of a 24-year-old woman who was scheduled for an elective diagnostic laparoscopy for chronic pelvic pain. ... Shortly afterwards, the patient developed tachycardia with a heart rate up .... healthy 29-year-old male scheduled for an ambulatory coelioscopic cholecystectomy. Their patient ...

  16. Inadvertent filtering bleb following sutureless cataract surgery

    Directory of Open Access Journals (Sweden)

    Jain Sunil

    2005-01-01

    Full Text Available The case history of a sixty-two-year-old lady, who presented with a bleb in the upper part of her left eye following cataract surgery was studied. The patient had no prior history of any glaucoma surgery. Gonioscopy revealed fishmouthing of the internal aspect of the scleral tunnel incision. The diagnosis of post-cataract filtering bleb was made which was managed by resuturing the wound. This case highlights the use of gonioscopy to visualise and evaluate the internal wound and discusses intraoperative recognition of internal leak and its management with horizontal sutures.

  17. Ten Thousand Years of Solitude

    Energy Technology Data Exchange (ETDEWEB)

    Benford, G. (Los Alamos National Lab., NM (USA) California Univ., Irvine, CA (USA). Dept. of Physics); Kirkwood, C.W. (Los Alamos National Lab., NM (USA) Arizona State Univ., Tempe, AZ (USA). Coll. of Business Administration); Harry, O. (Los Alamos National Lab., NM (USA)); Pasqualetti, M.J. (Los Alamos National Lab., NM (USA) Arizona State Univ., Tempe, AZ (USA))

    1991-03-01

    This report documents the authors work as an expert team advising the US Department of Energy on modes of inadvertent intrusion over the next 10,000 years into the Waste Isolation Pilot Project (WIPP) nuclear waste repository. Credible types of potential future accidental intrusion into the WIPP are estimated as a basis for creating warning markers to prevent inadvertent intrusion. A six-step process is used to structure possible scenarios for such intrusion, and it is concluded that the probability of inadvertent intrusion into the WIPP repository over the next ten thousand years lies between one and twenty-five percent. 3 figs., 5 tabs.

  18. Ten Thousand Years of Solitude?

    International Nuclear Information System (INIS)

    Benford, G.; Pasqualetti, M.J.

    1991-03-01

    This report documents the authors work as an expert team advising the US Department of Energy on modes of inadvertent intrusion over the next 10,000 years into the Waste Isolation Pilot Project (WIPP) nuclear waste repository. Credible types of potential future accidental intrusion into the WIPP are estimated as a basis for creating warning markers to prevent inadvertent intrusion. A six-step process is used to structure possible scenarios for such intrusion, and it is concluded that the probability of inadvertent intrusion into the WIPP repository over the next ten thousand years lies between one and twenty-five percent. 3 figs., 5 tabs

  19. Design analysis report: high-integrity container for disposal of EPICOR-II prefilter liners

    International Nuclear Information System (INIS)

    Chapman, R.L.; Reno, H.W.

    1983-06-01

    A high-integrity container has been developed to (a) immobilize the EPIROC-II prefilter liners from Unit-2 of the Three Mile Island (TMI) Nuclear Power Station, and (b) protect possible future, inadvertent intruders from damaging radiation. The container is designed for disposal depths to 90 feet in either wet or dry subsurface conditions. A built-in vent system for each container will permit the release of gas and function as a water barrier at pressures reaching 45 psig. The container has outside dimensions of 62.5 inches diameter by 84 inches high, and is designed to ensure a 300-year functional life. Its design features multiple barriers that prevent corrosives from penetrating container walls. The multiple-barrier approach provides a 1204-year mean time to total failure, based on an assumed single-event-failure probability of 20%. The multiple-corrosion-barrier concept is supplemented by aluminum hydroxide, which reduces the chemical activity of corrosives potentially arising from chemical decomposition of organic resins in the EPICOR-II prefilter liner. Aluminum hydroxide, an effective amphoteric material, tends to neutralize both acids and bases. An epoxy seal between the lid and container body functions as a barrier against any loss of container contents. Two separate epoxy materials fill the space between the lid and container body; they form a seal, mechanically bonding the lid in place. After curing, this epoxy material has a greater strength than the concrete; thus, the concrete has to fail in order for the lid to loosen

  20. 78 FR 66653 - Patient Protection and Affordable Care Act; HHS Notice of Benefit and Payment Parameters for 2014...

    Science.gov (United States)

    2013-11-06

    ... Essential Health Benefits, we inadvertently included the incorrect section reference to the Affordable Care... inadvertently omitted references to paragraphs (f) and (g) of this section. On page 15540, in the regulation... 553(b) of the Administrative Procedure Act (APA) (5 U.S.C. 553(b)). However, we can waive this notice...

  1. First application of hollow fiber filter for PWR condensate polishing

    International Nuclear Information System (INIS)

    Tsuda, S.; Otoha, K.; Takiguchi, H.

    2002-01-01

    In Tsuruga Unit-2 (PWR 1160 MWe commenced commercial operation in 1987), current procedure for secondary system clean-up before start-up had prolonged outage time and had consumed a huge amount of de-ionized (DI) water. In addition, iron oxide in condensate had accelerated the degradation of condensate demineralizer (CD) resin. The corrosion product of iron could also influence the secondary side corrosion of steam generator (SG) tubing if it intruded into SG through CD. To solve these problems, Japan Atomic Power Company (JAPC) decided to introduce hollow fiber filter (HFF) type condensate filter into Tsuruga-2, as the first application to PWR in the world. Because of retro-fitted HFF in Tsuruga Unit-2, limitations for installation space and flow resistance in condensate system and cost reduction required new design for compact and low differential pressure system and for long life filter module. JAPC and ORGANO assessed methodologies to achieve these goals. An advanced HFF system, including a newly developed compact HFF module design, was installed at Tsuruga Unit-2 in 1997 based on the assessment. During the 5 years since the installation, the HFF system has provided excellent crud removal that enables to shorten the outage period and to reduce DI water consumption drastically. Stable differential pressure (dP) trend of the HFF system indicates an expected module life of more than 7 years, with backwash cleaning required only 2 or 3 times per year. In addition to providing the expected operating cost reduction and improved SG tube integrity, numerous additional benefits have resulted from the retrofit. (authors)

  2. A four-part working bibliography of neuroethics: Part 4 - Ethical issues in clinical and social applications of neuroscience.

    Science.gov (United States)

    Becker, Kira; Shook, John R; Darragh, Martina; Giordano, James

    2017-05-31

    As a discipline, neuroethics addresses a range of questions and issues generated by basic neuroscientific research (inclusive of studies of putative neurobiological processes involved in moral and ethical cognition and behavior), and its use and meanings in the clinical and social spheres. Here, we present Part 4 of a four-part bibliography of the neuroethics literature focusing on clinical and social applications of neuroscience, to include: the treatment-enhancement discourse; issues arising in neurology, psychiatry, and pain care; neuroethics education and training; neuroethics and the law; neuroethics and policy and political issues; international neuroethics; and discourses addressing "trans-" and "post-" humanity. To complete a systematic survey of the literature, 19 databases and 4 individual open-access journals were employed. Searches were conducted using the indexing language of the U.S. National Library of Medicine (NLM). A Python code was used to eliminate duplications in the final bibliography. When taken with Parts 1-3, this bibliography aims to provide a listing of international peerreviewed papers, books, and book chapters published from 2002 through 2016. While seeking to be as comprehensive as possible, it may be that some works were inadvertently and unintentionally not included. We therefore invite commentary from the field to afford completeness and contribute to this bibliography as a participatory work-in-progress.

  3. Delayed orthodontic extrusion of a traumatically intruded immature upper permanent incisor - a case report.

    Science.gov (United States)

    Umesan, Uday Kumar; Chua, Kui Lay; Kok, Ei Chuen

    2014-10-01

    Dental injuries are probably the most common orofacial injuries sustained during sports and play. Intrusion or intrusive luxations occur when the teeth are driven into the alveolus by an axially directed impact. This article describes the clinical case of an 8-year-old patient who suffered complete intrusive luxation of an immature permanent central incisor following an accident. An attempt at spontaneous re-eruption failed to facilitate re-emergence of the tooth beyond 2 mm. The recommended wait-and-see strategy in anticipation of spontaneous re-eruption should cease to be an option when no further elongation can be observed. Orthodontic extrusion or surgical re-positioning is a valid treatment alternative when the former fails. In this case, although the recommended time period for effecting orthodontic extrusion had elapsed, this procedure was undertaken successfully presumably owing to the application of controlled, biologically optimal forces. A review of the extruded tooth a year later revealed no clinical or radiographic signs of loss of vitality. This was confirmed radiographically by the completion of root development, an intact lamina dura and no evident signs of resorption. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  4. Proton-neutron interaction and nuclear structure

    International Nuclear Information System (INIS)

    Casten, R.F.

    1986-01-01

    The pervasive role of the proton-neutron interaction in nuclear structure is discussed. Particular emphasis is given to its influence on the onset of collectivity and deformation, on intruder states, and on the evolution of subshell structure. The N/sub p/N/sub n/ scheme is outlined and some applications of it to collective model calculations and to nuclei far off stability are described. The concept of N/sub p/N/sub n/ multiplets is introduced. 32 refs., 20 figs

  5. Analytical scaling relations to evaluate leakage and intrusion in intermittent water supply systems

    Science.gov (United States)

    Slocum, Alexander H.; Whittle, Andrew J.

    2018-01-01

    Intermittent water supplies (IWS) deliver piped water to one billion people; this water is often microbially contaminated. Contaminants that accumulate while IWS are depressurized are flushed into customers’ homes when these systems become pressurized. In addition, during the steady-state phase of IWS, contaminants from higher-pressure sources (e.g., sewers) may continue to intrude where pipe pressure is low. To guide the operation and improvement of IWS, this paper proposes an analytic model relating supply pressure, supply duration, leakage, and the volume of intruded, potentially-contaminated, fluids present during flushing and steady-state. The proposed model suggests that increasing the supply duration may improve water quality during the flushing phase, but decrease the subsequent steady-state water quality. As such, regulators and academics should take more care in reporting if water quality samples are taken during flushing or steady-state operational conditions. Pipe leakage increases with increased supply pressure and/or duration. We propose using an equivalent orifice area (EOA) to quantify pipe quality. This provides a more stable metric for regulators and utilities tracking pipe repairs. Finally, we show that the volume of intruded fluid decreases in proportion to reductions in EOA. The proposed relationships are applied to self-reported performance indicators for IWS serving 108 million people described in the IBNET database and in the Benchmarking and Data Book of Water Utilities in India. This application shows that current high-pressure, continuous water supply targets will require extensive EOA reductions. For example, in order to achieve national targets, utilities in India will need to reduce their EOA by a median of at least 90%. PMID:29775462

  6. Analytical scaling relations to evaluate leakage and intrusion in intermittent water supply systems.

    Science.gov (United States)

    Taylor, David D J; Slocum, Alexander H; Whittle, Andrew J

    2018-01-01

    Intermittent water supplies (IWS) deliver piped water to one billion people; this water is often microbially contaminated. Contaminants that accumulate while IWS are depressurized are flushed into customers' homes when these systems become pressurized. In addition, during the steady-state phase of IWS, contaminants from higher-pressure sources (e.g., sewers) may continue to intrude where pipe pressure is low. To guide the operation and improvement of IWS, this paper proposes an analytic model relating supply pressure, supply duration, leakage, and the volume of intruded, potentially-contaminated, fluids present during flushing and steady-state. The proposed model suggests that increasing the supply duration may improve water quality during the flushing phase, but decrease the subsequent steady-state water quality. As such, regulators and academics should take more care in reporting if water quality samples are taken during flushing or steady-state operational conditions. Pipe leakage increases with increased supply pressure and/or duration. We propose using an equivalent orifice area (EOA) to quantify pipe quality. This provides a more stable metric for regulators and utilities tracking pipe repairs. Finally, we show that the volume of intruded fluid decreases in proportion to reductions in EOA. The proposed relationships are applied to self-reported performance indicators for IWS serving 108 million people described in the IBNET database and in the Benchmarking and Data Book of Water Utilities in India. This application shows that current high-pressure, continuous water supply targets will require extensive EOA reductions. For example, in order to achieve national targets, utilities in India will need to reduce their EOA by a median of at least 90%.

  7. Electronic security systems better ways to crime prevention

    CERN Document Server

    Walker, Philip

    2013-01-01

    Electronic Security Systems: Better Ways to Crime Prevention teaches the reader about the application of electronics for security purposes through the use of case histories, analogies, anecdotes, and other related materials. The book is divided into three parts. Part 1 covers the concepts behind security systems - its objectives, limitations, and components; the fundamentals of space detection; detection of intruder movement indoors and outdoors; surveillance; and alarm communication and control. Part 2 discusses equipments involved in security systems such as the different types of sensors,

  8. Apoplastic interactions between plants and plant root intruders

    Directory of Open Access Journals (Sweden)

    Kanako eMitsumasu

    2015-08-01

    Full Text Available Numerous pathogenic or parasitic organisms attack plant roots to obtain nutrients, and the apoplast including the plant cell wall is where the plant cell meets such organisms. Root-parasitic angiosperms and nematodes are two distinct types of plant root parasites but share some common features in their strategies for breaking into plant roots. Striga and Orobanche are obligate root parasitic angiosperms that cause devastating agricultural problems worldwide. Parasitic plants form an invasion organ called a haustorium, where plant cell wall degrading enzymes (PCWDEs are highly expressed. Plant-parasitic nematodes are another type of agriculturally important plant root parasite. These nematodes breach the plant cell walls by protruding a sclerotized stylet from which PCWDEs are secreted. Responding to such parasitic invasion, host plants activate their own defense responses against parasites. Endoparasitic nematodes secrete apoplastic effectors to modulate host immune responses and to facilitate the formation of a feeding site. Apoplastic communication between hosts and parasitic plants also contributes to their interaction. Parasitic plant germination stimulants, strigolactones (SLs, are recently identified apoplastic signals that are transmitted over long distances from biosynthetic sites to functioning sites. Here, we discuss recent advances in understanding the importance of apoplastic signals and cell walls for plant-parasite interactions.

  9. Apoplastic interactions between plants and plant root intruders.

    Science.gov (United States)

    Mitsumasu, Kanako; Seto, Yoshiya; Yoshida, Satoko

    2015-01-01

    Numerous pathogenic or parasitic organisms attack plant roots to obtain nutrients, and the apoplast including the plant cell wall is where the plant cell meets such organisms. Root parasitic angiosperms and nematodes are two distinct types of plant root parasites but share some common features in their strategies for breaking into plant roots. Striga and Orobanche are obligate root parasitic angiosperms that cause devastating agricultural problems worldwide. Parasitic plants form an invasion organ called a haustorium, where plant cell wall degrading enzymes (PCWDEs) are highly expressed. Plant-parasitic nematodes are another type of agriculturally important plant root parasite. These nematodes breach the plant cell walls by protruding a sclerotized stylet from which PCWDEs are secreted. Responding to such parasitic invasion, host plants activate their own defense responses against parasites. Endoparasitic nematodes secrete apoplastic effectors to modulate host immune responses and to facilitate the formation of a feeding site. Apoplastic communication between hosts and parasitic plants also contributes to their interaction. Parasitic plant germination stimulants, strigolactones, are recently identified apoplastic signals that are transmitted over long distances from biosynthetic sites to functioning sites. Here, we discuss recent advances in understanding the importance of apoplastic signals and cell walls for plant-parasite interactions.

  10. Publisher Correction: Western US volcanism due to intruding oceanic mantle driven by ancient Farallon slabs

    Science.gov (United States)

    Zhou, Quan; Liu, Lijun; Hu, Jiashun

    2018-05-01

    In the version of this Article originally published, data points representing mafic eruptions were missing from Fig. 4b, the corrected version is shown below. Furthermore, the authors omitted to include the following acknowledgements to the provider of the computational resources: "This research is part of the Blue Waters sustained-petascale computing project, which is supported by the National Science Foundation (awards OCI-0725070 and ACI-1238993) and the state of Illinois. Blue Waters is a joint effort of the University of Illinois at Urbana-Champaign and its National Center for Supercomputing Applications. This work is also part of the `PRAC Title 4-D Geodynamic Modeling With Data Assimilation: Origin Of Intra-Plate Volcanism In The Pacific Northwest' PRAC allocation support by the National Science Foundation (award number ACI 1516586). This work also used the Extreme Science and Engineering Discovery Environment (XSEDE), which is supported by National Science Foundation grant number ACI-1548562." Figure 4 and the Acknowledgements section have been updated in the online version of the Article.

  11. Methodology and results of risk assessment of interconnections within the JET active gas handling system

    International Nuclear Information System (INIS)

    Ballantyne, P.R.; Bell, A.C.; Konstantellos, A.; Hemmerich, J.L.

    1992-01-01

    The Joint European Torus (JET) Active Gas Handling System (AGHS) is a complex interconnection of numerous subsystems. While individual subsystems were assessed for their risk of operation, an assessment of the effects of inadvertent interconnections was needed. A systematic method to document the assessment was devised to ease the assessment of complex plant and was applied to the AGHS. The methodology, application to AGHS, the four critical issues and required plant modifications as a result of this assessment are briefly discussed in this paper

  12. Determination of operating limits for radionuclides for a proposed landfill at Paducah Gaseous Diffusion Plant

    International Nuclear Information System (INIS)

    Wang, J.C.; Lee, D.W.; Ketelle, R.H.; Lee, R.R.; Kocher, D.C.

    1994-01-01

    The operating limits for radionuclides in sanitary and industrial wastes were determined for a proposed landfill at the Paducah Gaseous Diffusion Plant (PGDP), Kentucky. These limits, which may be very small but nonzero, are not mandated by law or regulation but are needed for rational operation. The approach was based on analyses of the potential contamination of groundwater at the plant boundary and the potential exposure to radioactivity of an intruder at the landfill after closure. The groundwater analysis includes (1) a source model describing the disposal of waste and the release of radionuclides from waste to the groundwater, (2) site-specific groundwater flow and contaminant transport calculations, and (3) calculations of operating limits from the dose limit and conversion factors. The intruder analysis includes pathways through ingestion of contaminated vegetables and soil, external exposure to contaminated soil, and inhalation of suspended activity from contaminated soil particles. In both analyses, a limit on annual effective dose equivalent of 4 mrem (0.04 mSv) was adopted. The intended application of the results is to refine the radiological monitoring standards employed by the PGDP Health Physics personnel to determine what constitutes radioactive wastes, with concurrence of the Commonwealth of Kentucky

  13. Impact of sensor-scene interaction on the design of an IR security surveillance system

    International Nuclear Information System (INIS)

    Claassen, J.P.; Phipps, G.S.

    1982-01-01

    Recent encouraging developments in infrared staring arrays with CCD readouts and in real time image processors working on and off the focal plane have suggested that technologies suitable for infrared security surveillance may be available in a two-to-five year time frame. In anticipation of these emerging technologies, an investigation has been undertaken to establish the design potential of a passive IR perimeter security system incorporating both detection and verification capabilities. To establish the design potential, it is necessary to characterize the interactions between the scene ad the sensor. To this end, theoretical and experimental findings were employed to document (1) the emission properties of scenes to include an intruder, (2) the propagation and emission characteristics of the intervening atmosphere, and (3) the reception properties of the imaging sensor. The impact of these findings are summarized in the light of the application constraints. Optimal wavelengths, intruder and background emission characteristics, weather limitations, and basic sensor design considerations are treated. Although many system design features have been identified to this date, continued efforts are required to complete a detailed system design to include the identifying processing requirements. A program to accomplish these objectives is presented

  14. A Compact Diffusion Sampler for Environmental Applications Requiring HTO or HTO + HT Determinations

    International Nuclear Information System (INIS)

    Otlet, R.L.; Walker, A.J.; Mather, I.D.

    2005-01-01

    Passive diffusion samplers have now been in use in the UK for the measurement of tritium at environmental levels in the form of HTO and HTO + HT for more than ten years. At the outset their main purpose was to identify the direction of a possible inadvertent release of tritium into the environment. More recently, however, there has been growing interest in their use as stand-alone devices for tritium determination at environmental levels. This has necessitated a more rigorous design to reduce the 'draughts effect' in exposed locations and has also required modifications to enable the measurement of HTO + HT. The paper describes the recent design improvements and the results of validation tests carried out against dynamic, discriminating (dry-bed) samplers

  15. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: the ONSITE/MAXI1 computer program

    International Nuclear Information System (INIS)

    Napier, B.A.; Peloquin, R.A.; Kennedy, W.E. Jr.; Neuder, S.M.

    1984-10-01

    Because of uncertainties associated with assessing the potential risks from onsite burials of radioactive waste, the US Nuclear Regulatory Commission (NRC) has amended its regulations to provide greater assurance that buried radioactive material will not present a hazard to public health and safety. The amended regulations now require licensees to apply for approval of proposed procedures for onsite disposal pursuant to 10 CFR 20.302. The NRC technically reviews these requests on a case-by-case basis. These technical reviews require modeling potential pathways to man and projecting radiation dose commitments. This document contains a summary of our efforts to develop human-intrusion scenarios and to modify a version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. The documentation of the ONSITE/MAXI computer program is written for two audiences. The first (Audience A) includes persons concerned with the mathematical models and computer algorithms. The second (Audience B) includes persons concerned with exercising the computer program and scenarios for specific onsite disposal applications. Five sample problems are presented and discussed to assist the user in operating the computer program. Summaries of the input and output for the sample problems are included along with a discussion of the hand calculations performed to verify the correct operation of the computer program. Computer listings of the ONSITE/MAXI1 computer program with an abbreviated data base listing are included as Appendix 1 to this document. Finally, complete listings of the data base with listings of the special codes used to create the data base are included in Appendix 2 as a microfiche attachment to this document

  16. Result Summary for the Area 5 Radioactive Waste Management Site Performance Assessment Model Version 4.110

    International Nuclear Information System (INIS)

    2011-01-01

    Results for Version 4.110 of the Area 5 Radioactive Waste Management Site (RWMS) performance assessment (PA) model are summarized. Version 4.110 includes the fiscal year (FY) 2010 inventory estimate, including a future inventory estimate. Version 4.110 was implemented in GoldSim 10.11(SP4). The following changes have been implemented since the last baseline model, Version 4.105: (1) Updated the inventory and disposal unit configurations with data through the end of FY 2010. (1) Implemented Federal Guidance Report 13 Supplemental CD dose conversion factors (U.S. Environmental Protection Agency, 1999). Version 4.110 PA results comply with air pathway and all-pathways annual total effective dose (TED) performance objectives (Tables 2 and 3, Figures 1 and 2). Air pathways results decrease moderately for all scenarios. The time of the maximum for the air pathway open rangeland scenario shifts from 1,000 to 100 years (y). All-pathways annual TED increases for all scenarios except the resident scenario. The maximum member of public all-pathways dose occurs at 1,000 y for the resident farmer scenario. The resident farmer dose was predominantly due to technetium-99 (Tc-99) (82 percent) and lead-210 (Pb-210) (13 percent). Pb-210 present at 1,000 y is produced predominantly by radioactive decay of uranium-234 (U-234) present at the time of disposal. All results for the postdrilling and intruder-agriculture scenarios comply with the performance objectives (Tables 4 and 5, Figures 3 and 4). The postdrilling intruder results are similar to Version 4.105 results. The intruder-agriculture results are similar to Version 4.105, except for the Pit 6 Radium Disposal Unit (RaDU). The intruder-agriculture result for the Shallow Land Burial (SLB) disposal units is a significant fraction of the performance objective and exceeds the performance objective at the 95th percentile. The intruder-agriculture dose is due predominantly to Tc-99 (75 percent) and U-238 (9.5 percent). The acute

  17. Siting of a low-level radioactive waste disposal facility

    International Nuclear Information System (INIS)

    Alvarado, R.A.

    1983-01-01

    The Texas Low-Level Radioactive Waste Disposal Authority was established by the 67th Legislature to assure safe and effective disposal of the state's low-level radioactive waste. The Authority operates under provisions of the Texas Low-Level Radioactive Waste Disposal Authority Act, VACS 4590f-1. In Texas, low-level radioactive waste is defined as any radioactive material that has a half-life of 35 years or less or that has less than 10 nanocuries per gram of transuranics, and may include radioactive material not excluded by this definition with a half-life or more than 35 years if special disposal criteria are established. Prior to beginning the siting study, the Authority developed both exclusionary and inclusionary criteria. Major requirements of the siting guidelines are that the site shall be located such that it will not interfere with: (1) existing or near-future industrial use, (2) sensitive environmental and ecological areas, and (3) existing and projected population growth. Therefore, the site should be located away from currently known recoverable mineral, energy and water resources, population centers, and areas of projected growth. This would reduce the potential for inadvertent intruders, increasing the likelihood for stability of the disposal site after closure. The identification of potential sites for disposal of low-level radioactive waste involves a phased progression from statewide screening to site-specific exploration, using a set of exclusionary and preferential criteria to guide the process. This methodology applied the criteria in a sequential manner to focus the analysis on progressively smaller and more favorable areas. The study was divided into three phases: (1) statewide screening; (2) site identification; and (3) preliminary site characterization

  18. Near-Field Hydrology Data Package for the Immobilized Low-Activity Waste 2001 Performance Assessment

    International Nuclear Information System (INIS)

    PD Meyer; RJ Serne

    1999-01-01

    Lockheed Martin Hanford Company (LMHC) is designing and assessing the performance of disposal facilities to receive radioactive wastes that are currently stored in single- and double-shell tanks at the Hanford Site. The preferred method for disposing of the portion that is classified as immobilized low-activity waste (ILAW) is to vitrify the waste and place the product in new-surface, shallow land burial facilities. The LMHC project to assess the performance of these disposal facilities is the Hanford ILAW Performance Assessment (PA) Activity. The goal of this project is to provide a reasonable expectation that the disposal of the waste is protective of the general public, groundwater resources, air resources, surface water resources, and inadvertent intruders. Achieving this goal will require prediction of contaminant migration from the facilities. This migration is expected to occur primarily via the movement of water through the facilities and the consequent transport of dissolved contaminants in the pore water of the vadose zone. Pacific Northwest National Laboratory (PNNL) assists LMHC in its performance assessment activities. One of PNNL's tasks is to provide estimates of the physical, hydraulic, and transport properties of the materials comprising the disposal facilities and the disturbed region around them. These materials are referred to as the near-field materials. Their properties are expressed as parameters of constitutive models used in simulations of subsurface flow and transport. In addition to the best-estimate parameter values, information on uncertainty in the parameter values and estimates of the changes in parameter values over time are required to complete the PA. These parameter estimates and information are contained in this report, the Near-Field Hydrology Data Package

  19. An Inadvertent Concurrent Replication: Same Roadmap, Different Journey

    Science.gov (United States)

    Lemons, Christopher J.; King, Seth A.; Davidson, Kimberly A.; Berryessa, Teresa L.; Gajjar, Shimul A.; Sacks, Lia H.

    2016-01-01

    Replication is a critical aspect of scientific inquiry that presents a variety of challenges to researchers, even under the best of conditions. We conducted a review of replication rates in special education journals similar to the review conducted by Makel et al. in this issue. Unknowingly conducting independent reviews allowed for an unexpected…

  20. Inadvertent doping through nutritional supplements is a reality

    African Journals Online (AJOL)

    Enrique

    In 1994 legislation was passed by the United States Food and Drug Administration ... resulting in contamination of nutritional supplements, which may be a possible ... Nutritional supplement manufacturing is not subject to the same stringent ...

  1. Ground-penetrating radar in characterizing and monitoring waste-burial sites

    International Nuclear Information System (INIS)

    Sandness, G.A.; Kimball, C.S.

    1982-02-01

    Potential environmental hazards are associated with buried chemical and nuclear wastes because of the possibilities of inadvertent excavation or migration of toxic chemicals or radionuclides into groundwater or surface water bodies. Concern is often related to the fact that many existing waste burial sites have been found to be inadequately designed and/or poorly documented. New technology and innovative applications of current technology are needed to locate, characterize, and monitor the wastes contained in such sites. The work described in this paper is focused on the use of ground-penetrating radar (GPR) for those purposes

  2. Use of the E. J. Brooks 'Multi-Lok' for material safeguards at the Y- 12 Plant

    International Nuclear Information System (INIS)

    Key, C.D.

    1995-01-01

    The Oak Ridge Y-12 Plant has begun using the E. J. Brooks 'Multi-Lok' as the replacement of the cup seal. The cup seal in previous years of usage has proved to be difficult to apply and verify, along with easily broken during handling. Replacement of the cup seal with the Multi-Lok has resulted in operations satisfaction in ease of application and verification. Inadvertent breakage of the previous fragile seal has been completely eliminated. Cost savings are abundant. The final result is customer satisfaction with optimum product performance

  3. State-specific Multi-reference Perturbation Theories with Relaxed Coefficients: Molecular Applications

    Directory of Open Access Journals (Sweden)

    Debashis Mukherjee

    2002-06-01

    Full Text Available Abstract: We present in this paper two new versions of Rayleigh-Schr¨odinger (RS and the Brillouin-Wigner (BW state-specific multi-reference perturbative theories (SSMRPT which stem from our state-specific multi-reference coupled-cluster formalism (SS-MRCC, developed with a complete active space (CAS. They are manifestly sizeextensive and are designed to avoid intruders. The combining coefficients cμ for the model functions φμ are completely relaxed and are obtained by diagonalizing an effective operator in the model space, one root of which is the target eigenvalue of interest. By invoking suitable partitioning of the hamiltonian, very convenient perturbative versions of the formalism in both the RS and the BW forms are developed for the second order energy. The unperturbed hamiltonians for these theories can be chosen to be of both Mφller-Plesset (MP and Epstein-Nesbet (EN type. However, we choose the corresponding Fock operator fμ for each model function φμ, whose diagonal elements are used to define the unperturbed hamiltonian in the MP partition. In the EN partition, we additionally include all the diagonal direct and exchange ladders. Our SS-MRPT thus utilizes a multi-partitioning strategy. Illustrative numerical applications are presented for potential energy surfaces (PES of the ground (1Σ+ and the first delta (1Δ states of CH+ which possess pronounced multi-reference character. Comparison of the results with the corresponding full CI values indicates the efficacy of our formalisms.

  4. Tanks 18 And 19-F Structural Flowable Grout Fill Material Evaluation And Recommendations

    International Nuclear Information System (INIS)

    Stefanko, D.; Langton, C.

    2011-01-01

    Cementitious grout will be used to close Tanks 18-F and 19-F. The functions of the grout are to: (1) physically stabilize the final landfill by filling the empty volume in the tanks with a non compressible material; (2) provide a barrier for inadvertent intrusion into the tank; (3) reduce contaminant mobility by (a) limiting the hydraulic conductivity of the closed tank and (b) reducing contact between the residual waste and infiltrating water; and (4) providing an alkaline, chemically reducing environment in the closed tank to control speciation and solubility of selected radionuclides. The objective of this work was to identify a single (all-in-one) grout to stabilize and isolate the residual radionuclides in the tank, provide structural stability of the closed tank and serve as an inadvertent intruder barrier. This work was requested by V. A. Chander, High Level Waste (HLW) Tank Engineering, in HLW-TTR-2011-008. The complete task scope is provided in the Task Technical and QA Plan, SRNL-RP-2011-00587 Revision 0. The specific objectives of this task were to: (1) Identify new admixtures and dosages for formulating a zero bleed flowable tank fill material selected by HLW Tank Closure Project personnel based on earlier tank fill studies performed in 2007. The chemical admixtures used for adjusting the flow properties needed to be updated because the original admixture products are no longer available. Also, the sources of cement and fly ash have changed, and Portland cements currently available contain up to 5 wt. % limestone (calcium carbonate). (2) Prepare and evaluate the placement, compressive strength, and thermal properties of the selected formulation with new admixture dosages. (3) Identify opportunities for improving the mix selected by HLW Closure Project personnel and prepare and evaluate two potentially improved zero bleed flowable fill design concepts; one based on the reactor fill grout and the other based on a shrinkage compensating flowable fill mix

  5. TANKS 18 AND 19-F STRUCTURAL FLOWABLE GROUT FILL MATERIAL EVALUATION AND RECOMMENDATIONS

    Energy Technology Data Exchange (ETDEWEB)

    Stefanko, D.; Langton, C.

    2011-11-01

    Cementitious grout will be used to close Tanks 18-F and 19-F. The functions of the grout are to: (1) physically stabilize the final landfill by filling the empty volume in the tanks with a non compressible material; (2) provide a barrier for inadvertent intrusion into the tank; (3) reduce contaminant mobility by (a) limiting the hydraulic conductivity of the closed tank and (b) reducing contact between the residual waste and infiltrating water; and (4) providing an alkaline, chemically reducing environment in the closed tank to control speciation and solubility of selected radionuclides. The objective of this work was to identify a single (all-in-one) grout to stabilize and isolate the residual radionuclides in the tank, provide structural stability of the closed tank and serve as an inadvertent intruder barrier. This work was requested by V. A. Chander, High Level Waste (HLW) Tank Engineering, in HLW-TTR-2011-008. The complete task scope is provided in the Task Technical and QA Plan, SRNL-RP-2011-00587 Revision 0. The specific objectives of this task were to: (1) Identify new admixtures and dosages for formulating a zero bleed flowable tank fill material selected by HLW Tank Closure Project personnel based on earlier tank fill studies performed in 2007. The chemical admixtures used for adjusting the flow properties needed to be updated because the original admixture products are no longer available. Also, the sources of cement and fly ash have changed, and Portland cements currently available contain up to 5 wt. % limestone (calcium carbonate). (2) Prepare and evaluate the placement, compressive strength, and thermal properties of the selected formulation with new admixture dosages. (3) Identify opportunities for improving the mix selected by HLW Closure Project personnel and prepare and evaluate two potentially improved zero bleed flowable fill design concepts; one based on the reactor fill grout and the other based on a shrinkage compensating flowable fill mix

  6. Handling sticky Resin by Stingless Bees: Adhesive Properties of Surface Structures

    Directory of Open Access Journals (Sweden)

    MARKUS GASTAUER

    2013-09-01

    Full Text Available Many Stingless Bees (Hymenoptera: Meliponini like Tetragonisca angustula collect resin to defend their nests against intruders like ants or Robber Bees. Small portions of resin are attached to intruders bodies and extremities causing their immobilization. It has been observed that resin is removed easily from the bee's mandible but adheres strongly to the intruder's cuticle. We tested the hypothesis that resin sticks lesser to the mandibles of Stingless Bees than to the surface of intruders due to special surface structures or adhesive properties of these structures. The surface structures of the mandible of T. angustula and the trochanter of Camponotus sericeiventris were studied by scanning electron microscopy. To measure adhesion properties, selected surfaces were fixed on a fine glass pin and withdrawn from a glass tip covered with resin. The deformation of the glass pin indicates adhesion forces operating between the resin and the selective surface. The absolute value of the forces is computed from the glass pin's stiffness. It has been shown that resin sticks more to the smooth mandible of the bee than to the structured trochanter of the ant. A new hypothesis to be tested says that the bees might lubricate their mandibles with nectar or honey to reduce the resin's adhesion temporarily.

  7. A valence-universal coupled-cluster single- and double-excitations method for atoms: Pt. 3

    International Nuclear Information System (INIS)

    Jankowski, K.; Malinowski, P.

    1994-01-01

    To better understand the problems met when solving the equations of VU-CC approaches in the presence of intruder states, we are concerned with the following aspects of the solvability problem for sets of non-linear equations: the existence and properties of multiple solutions and the attainability of these solutions by means of various numerical methods. Our study is concentrated on the equations obtained for Be within the framework of the recently formulated atomically oriented form of the valence-universal coupled-cluster theory accounting for one- and two-electron excitations (VU-CCSD/R) and based on the complete model space (2s 2 , 2p 2 ). Six pairs of multiple solutions representing four 1 S states are found and discussed. Three of these solutions provide amplitudes describing the 2p 2 1 S state for which the intruder state problem has been considered as extremely serious. Several known numerical methods have been applied to solve the same set of non-linear equations for the two-valence cluster amplitudes. It is shown that these methods perform quite differently in the presence of intruder states, which seems to indicate that the intruder state problem for VU-CC methods is partly caused by the commonly used methods of solving the non-linear equations. (author)

  8. Study on Tower Models for EHV Transmission Line

    Directory of Open Access Journals (Sweden)

    Xu Bao-Qing

    2016-01-01

    Full Text Available Lightning outage accident is one of the main factors that threat seriously the safe and reliable operation of power system. So it is very important to establish reasonable transmission tower model and evaluate the impulse response characteristic of lightning wave traveling on the transmission tower properly for determining reliable lightning protection performance. With the help of Electromagnetic Transient Program (EMTP, six 500kV tower models are built. Aiming at one line to one transformer operating mode of 500kV substation, the intruding wave overvoltage under different tower models is calculated. The effect of tower model on intruding overvoltage has been studied. The results show that different tower models can result in great differences to the calculation results. Hence, reasonable selection of the tower model in the calculation of back- strike intruding wave is very important.

  9. The regulatory control over radiation sources: the Brazilian experience and some lessons learned from industrial applications

    International Nuclear Information System (INIS)

    Costa, E.L.C.; Gomes, J.D.R.L.; Gomes, R.S.; Costa, M.L.L.; Thomé, Z.D.; Instituto Militar de Engenharia

    2017-01-01

    This study gives an overview of the activities of the National Commission of Nuclear Energy (CNEN), as the Brazilian nuclear regulatory authority. These activities are described, especially those related to management of orphan sources and radioactive material in scrap metal considering the actions already put into place by CNEN during the licensing and controlling of radioactive sources in the industry and other facilities. In Brazil, there is not yet an effective system for controlling the scrap metal and recycling industry, thus a coordinated approach to achieve a harmonized and effective response with the involvement of third parties is needed, especially the metal industries and ores facilities. These practices call for stringent regulatory control, in order to reduce the occurrence of orphan sources, and consequently, radioactive material appearing in scrap metal. Some challenges of managing the national radiation sources register systems will be discussed, in order to cover effectively all the radiation source history (in a 'from the cradle to the grave' basis), and the dynamic maintenance and update of these data. The main industrial applications considered in this work are those dealing with constant movement of sources all over the country, with geographical issues to be considered in the managing and controlling actions, such as gammagraphy and well-logging. This study aims to identify and promote good practices to prevent inadvertent diversion of radioactive material, taking into account existing international recommendations and some lessons learned in national level. (author)

  10. The regulatory control over radiation sources: the Brazilian experience and some lessons learned from industrial applications

    Energy Technology Data Exchange (ETDEWEB)

    Costa, E.L.C.; Gomes, J.D.R.L.; Gomes, R.S.; Costa, M.L.L.; Thomé, Z.D., E-mail: evaldo@cnen.gov.br, E-mail: jlopes@cnen.gov.br, E-mail: rogeriog@cnen.gov.br, E-mail: mara@cnen.gov.br, E-mail: zielithome@gmail.com [Comissao Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil). Diretoria de Radioproteção e Segurança Nuclear; Instituto Militar de Engenharia (IME), Rio de Janeiro, RJ (Brazil). Seção de Engenharia Nuclear

    2017-11-01

    This study gives an overview of the activities of the National Commission of Nuclear Energy (CNEN), as the Brazilian nuclear regulatory authority. These activities are described, especially those related to management of orphan sources and radioactive material in scrap metal considering the actions already put into place by CNEN during the licensing and controlling of radioactive sources in the industry and other facilities. In Brazil, there is not yet an effective system for controlling the scrap metal and recycling industry, thus a coordinated approach to achieve a harmonized and effective response with the involvement of third parties is needed, especially the metal industries and ores facilities. These practices call for stringent regulatory control, in order to reduce the occurrence of orphan sources, and consequently, radioactive material appearing in scrap metal. Some challenges of managing the national radiation sources register systems will be discussed, in order to cover effectively all the radiation source history (in a 'from the cradle to the grave' basis), and the dynamic maintenance and update of these data. The main industrial applications considered in this work are those dealing with constant movement of sources all over the country, with geographical issues to be considered in the managing and controlling actions, such as gammagraphy and well-logging. This study aims to identify and promote good practices to prevent inadvertent diversion of radioactive material, taking into account existing international recommendations and some lessons learned in national level. (author)

  11. The application of Markov decision process with penalty function in restaurant delivery robot

    Science.gov (United States)

    Wang, Yong; Hu, Zhen; Wang, Ying

    2017-05-01

    As the restaurant delivery robot is often in a dynamic and complex environment, including the chairs inadvertently moved to the channel and customers coming and going. The traditional Markov decision process path planning algorithm is not save, the robot is very close to the table and chairs. To solve this problem, this paper proposes the Markov Decision Process with a penalty term called MDPPT path planning algorithm according to the traditional Markov decision process (MDP). For MDP, if the restaurant delivery robot bumps into an obstacle, the reward it receives is part of the current status reward. For the MDPPT, the reward it receives not only the part of the current status but also a negative constant term. Simulation results show that the MDPPT algorithm can plan a more secure path.

  12. Applications of granular-dynamics numerical simulations to asteroid surfaces

    Science.gov (United States)

    Richardson, D. C.; Michel, P.; Schwartz, S. R.; Yu, Y.; Ballouz, R.-L.; Matsumura, S.

    2014-07-01

    Spacecraft images and indirect observations including thermal inertia measurements indicate most small bodies have surface regolith. Evidence of granular flow is also apparent in the images. This material motion occurs in very low gravity, therefore in a totally different gravitational environment than on the Earth. Upcoming sample-return missions to small bodies, and possible future manned missions, will involve interaction with the surface regolith, so it is important to develop tools to predict the surface response. We have added new capabilities to the N-body gravity tree code pkdgrav [1,2] that permit the simulation of granular dynamics, including multi-contact physics and friction forces, using the soft-sphere discrete-element method [3]. The numerical approach has been validated through comparison with laboratory experiments (e.g., [3,4]). (1) We carried out impacts into granular materials using different projectile shapes under Earth's gravity [5] and compared the results to laboratory experiments [6] in support of JAXA's Hayabusa 2 asteroid sample-return mission. We tested different projectile shapes and confirmed that the 90-degree cone was the most efficient at excavating mass when impacting 5-mm-diameter glass beads. Results are sensitive to the normal coefficient of restitution and the coefficient of static friction. Preliminary experiments in micro-gravity for similar impact conditions show both the amount of ejected mass and the timescale of the impact process increase, as expected. (2) It has been found (e.g., [7,8]) that ''fresh'' (unreddened) Q-class asteroids have a high probability of recent planetary encounters (˜1 Myr; also see [9]), suggesting that surface refreshening may have occurred due to tidal effects. As an application of the potential effect of tidal interactions, we carried out simulations of Apophis' predicted 2029 encounter with the Earth to see whether regolith motion might occur, using a range of plausible material parameters

  13. Application of acoustic agglomeration to enhance air filtration efficiency in air-conditioning and mechanical ventilation (ACMV) systems.

    Science.gov (United States)

    Ng, Bing Feng; Xiong, Jin Wen; Wan, Man Pun

    2017-01-01

    The recent episodes of haze in Southeast Asia have caused some of the worst regional atmospheric pollution ever recorded in history. In order to control the levels of airborne fine particulate matters (PM) indoors, filtration systems providing high PM capturing efficiency are often sought, which inadvertently also results in high airflow resistance (or pressure drop) that increases the energy consumption for air distribution. A pre-conditioning mechanism promoting the formation of particle clusters to enhance PM capturing efficiency without adding flow resistance in the air distribution ductwork could provide an energy-efficient solution. This pre-conditioning mechanism can be fulfilled by acoustic agglomeration, which is a phenomenon that promotes the coagulation of suspended particles by acoustic waves propagating in the fluid medium. This paper discusses the basic mechanisms of acoustic agglomeration along with influencing factors that could affect the agglomeration efficiency. The feasibility to apply acoustic agglomeration to improve filtration in air-conditioning and mechanical ventilation (ACMV) systems is investigated experimentally in a small-scale wind tunnel. Experimental results indicate that this novel application of acoustic pre-conditioning improves the PM2.5 filtration efficiency of the test filters by up to 10% without introducing additional pressure drop. The fan energy savings from not having to switch to a high capturing efficiency filter largely outstrip the additional energy consumed by the acoustics system. This, as a whole, demonstrates potential energy savings from the combined acoustic-enhanced filtration system without compromising on PM capturing efficiency.

  14. Application of acoustic agglomeration to enhance air filtration efficiency in air-conditioning and mechanical ventilation (ACMV systems.

    Directory of Open Access Journals (Sweden)

    Bing Feng Ng

    Full Text Available The recent episodes of haze in Southeast Asia have caused some of the worst regional atmospheric pollution ever recorded in history. In order to control the levels of airborne fine particulate matters (PM indoors, filtration systems providing high PM capturing efficiency are often sought, which inadvertently also results in high airflow resistance (or pressure drop that increases the energy consumption for air distribution. A pre-conditioning mechanism promoting the formation of particle clusters to enhance PM capturing efficiency without adding flow resistance in the air distribution ductwork could provide an energy-efficient solution. This pre-conditioning mechanism can be fulfilled by acoustic agglomeration, which is a phenomenon that promotes the coagulation of suspended particles by acoustic waves propagating in the fluid medium. This paper discusses the basic mechanisms of acoustic agglomeration along with influencing factors that could affect the agglomeration efficiency. The feasibility to apply acoustic agglomeration to improve filtration in air-conditioning and mechanical ventilation (ACMV systems is investigated experimentally in a small-scale wind tunnel. Experimental results indicate that this novel application of acoustic pre-conditioning improves the PM2.5 filtration efficiency of the test filters by up to 10% without introducing additional pressure drop. The fan energy savings from not having to switch to a high capturing efficiency filter largely outstrip the additional energy consumed by the acoustics system. This, as a whole, demonstrates potential energy savings from the combined acoustic-enhanced filtration system without compromising on PM capturing efficiency.

  15. Overview of resuspension model: application to low level waste management

    International Nuclear Information System (INIS)

    Healy, J.W.

    1980-01-01

    Resuspension is one of the potential pathways to man for radioactive or chemical contaminants that are in the biosphere. In waste management, spills or other surface contamination can serve as a source for resuspension during the operational phase. After the low-level waste disposal area is closed, radioactive materials can be brought to the surface by animals or insects or, in the long term, the surface can be removed by erosion. Any of these methods expose the material to resuspension in the atmosphere. Intrusion into the waste mass can produce resuspension of potential hazard to the intruder. Removal of items from the waste mass by scavengers or archeologists can result in potential resuspension exposure to others handling or working with the object. The ways in which resuspension can occur are wind resuspension, mechanical resuspension and local resuspension. While methods of predicting exposure are not accurate, they include the use of the resuspension factor, the resuspension rate and mass loading of the air

  16. Speaker information affects false recognition of unstudied lexical-semantic associates.

    Science.gov (United States)

    Luthra, Sahil; Fox, Neal P; Blumstein, Sheila E

    2018-05-01

    Recognition of and memory for a spoken word can be facilitated by a prior presentation of that word spoken by the same talker. However, it is less clear whether this speaker congruency advantage generalizes to facilitate recognition of unheard related words. The present investigation employed a false memory paradigm to examine whether information about a speaker's identity in items heard by listeners could influence the recognition of novel items (critical intruders) phonologically or semantically related to the studied items. In Experiment 1, false recognition of semantically associated critical intruders was sensitive to speaker information, though only when subjects attended to talker identity during encoding. Results from Experiment 2 also provide some evidence that talker information affects the false recognition of critical intruders. Taken together, the present findings indicate that indexical information is able to contact the lexical-semantic network to affect the processing of unheard words.

  17. Evaluation of stress patterns on maxillary posterior segment when intruded with mini implant anchorage: A three-dimensional finite element study

    Directory of Open Access Journals (Sweden)

    Nikhita Pekhale

    2016-01-01

    Full Text Available Introduction: The aim of this study is to evaluate stress and displacement effects of maxillary posterior intrusion mechanics with mini-implant anchorage by using finite element method. Materials and Methods: A computer stimulation of three-dimensional model maxilla with all teeth, PDL, bone, mini-implants, brackets, arch wire, force element, and transpalatal arch was constructed on the basis of average anatomic morphology. Finite element analysis was done to evaluate the amount of stress and its distribution during orthodontic intrusive force. Results: Increased Von Mises stress values were observed in mesio-cervical region of first molar. The middle third of second premolar and second molar and regions adjacent to force application sites also showed relatively high stress values. Minimum stress values were observed in apical region of first premolar as it is away from force application. Conclusion: Using three mini-implant and transpalatal arches, this study demonstrates that significant amount of true intrusion of maxillary molars could be obtained with lesser concentration of stresses in the apical area recorded.

  18. An Intrusion Detection System for the Protection of Railway Assets Using Fiber Bragg Grating Sensors

    Directory of Open Access Journals (Sweden)

    Angelo Catalano

    2014-09-01

    Full Text Available We demonstrate the ability of Fiber Bragg Gratings (FBGs sensors to protect large areas from unauthorized activities in railway scenarios such as stations or tunnels. We report on the technological strategy adopted to protect a specific depot, representative of a common scenario for security applications in the railway environment. One of the concerns in the protection of a railway area centers on the presence of rail-tracks, which cannot be obstructed with physical barriers. We propose an integrated optical fiber system composed of FBG strain sensors that can detect human intrusion for protection of the perimeter combined with FBG accelerometer sensors for protection of rail-track access. Several trials were carried out in indoor and outdoor environments. The results demonstrate that FBG strain sensors bonded under a ribbed rubber mat enable the detection of intruder break-in via the pressure induced on the mat, whereas the FBG accelerometers installed under the rails enable the detection of intruders walking close to the railroad tracks via the acoustic surface waves generated by footsteps. Based on a single enabling technology, this integrated system represents a valuable intrusion detection system for railway security and could be integrated with other sensing functionalities in the railway field using fiber optic technology.

  19. PixEye Virtual Reality Training has the Potential of Enhancing Proficiency of Laser Trabeculoplasty Performed by Medical Students: A Pilot Study.

    Science.gov (United States)

    Alwadani, Fahad; Morsi, Mohammed Saad

    2012-01-01

    To compare the surgical proficiency of medical students who underwent traditional training or virtual reality training for argon laser trabeculoplasty with the PixEye simulator. The cohort comprised of 47 fifth year male medical students from the College of Medicine, King Faisal University, Saudi Arabia. The cohort was divided into two groups: students (n = 24), who received virtual reality training (VR Group) and students (n = 23), who underwent traditional training (Control Group). After training, the students performed the trabeculoplasty procedure. All trainings were included concurrent power point presentations describing the details of the procedure. Evaluation of surgical performance was based on the following variables: missing the exact location with the laser, overtreatment, undertreatment and inadvertent laser shots to iris and cornea. The target was missed by 8% of the VR Group compared to 55% in the Control Group. Overtreatment and undertreatment was observed in 7% of the VR Group compared to 46% of the Control Group. Inadvertent laser application to the cornea or iris was performed by 4.5% of the VR Group compared to 34% of the Control Group. Virtual reality training on PixEye simulator may enhance the proficiency of medical students and limit possible surgical errors during laser trabeculoplasty. The authors have no financial interest in the material mentioned in this study.

  20. Safety Framework for Nuclear Power Source Applications in Outer Space

    International Nuclear Information System (INIS)

    2009-01-01

    Nuclear power sources (NPS) for use in outer space have been developed and used in space applications where unique mission requirements and constraints on electrical power and thermal management precluded the use of non-nuclear power sources. Such missions have included interplanetary missions to the outer limits of the Solar System, for which solar panels were not suitable as a source of electrical power because of the long duration of these missions at great distances from the Sun. According to current knowledge and capabilities, space NPS are the only viable energy option to power some space missions and significantly enhance others. Several ongoing and foreseeable missions would not be possible without the use of space NPS. Past, present and foreseeable space NPS applications include radioisotope power systems (for example, radioisotope thermoelectric generators and radioisotope heater units) and nuclear reactor systems for power and propulsion. The presence of radioactive materials or nuclear fuels in space NPS and their consequent potential for harm to people and the environment in Earth's biosphere due to an accident require that safety should always be an inherent part of the design and application of space NPS. NPS applications in outer space have unique safety considerations compared with terrestrial applications. Unlike many terrestrial nuclear applications, space applications tend to be used infrequently and their requirements can vary significantly depending upon the specific mission. Mission launch and outer space operational requirements impose size, mass and other space environment limitations not present for many terrestrial nuclear facilities. For some applications, space NPS must operate autonomously at great distances from Earth in harsh environments. Potential accident conditions resulting from launch failures and inadvertent re-entry could expose NPS to extreme physical conditions. These and other unique safety considerations for the use of

  1. Application of the UNECE Recommendations on Monitoring and Response Procedures for Radioactive Scrap Metal: From Theory to Practice

    Energy Technology Data Exchange (ETDEWEB)

    Magold, M.; Mansourian-Stephenson, S., E-mail: stephanie.mansourian-stephenson@unece.org [United Nations Economic Council for Europe, Geneva (Switzerland)

    2011-07-15

    The work of the United Nations Economic Commission for Europe (UNECE) in addressing the issue of radioactive material appearing inadvertently in scrap metal is summarized. After hosting several meetings of national and international representatives of the scrap metal industry and radiation protection experts, the UNECE issued recommendations in 2006 on Monitoring and Response Procedures for Radioactive Scrap Metal. Since then, the UNECE has been exploring, with its Member States, the extent to which the Recommendations have been utilized - by means of a questionnaire. In this paper the results of the questionnaire are presented and, on the basis of the results of the questionnaire, conclusions are drawn and recommendations made for international action in this field for the future. (author)

  2. 10th KES Conference on Agent and Multi-Agent Systems : Technologies and Applications

    CERN Document Server

    Chen-Burger, Yun-Heh; Howlett, Robert; Jain, Lakhmi

    2016-01-01

    The modern economy is driven by technologies and knowledge. Digital technologies can free, shift and multiply choices, often intruding on the space of other industries, by providing new ways of conducting business operations and creating values for customers and companies. The topics covered in this volume include software agents, multi-agent systems, agent modelling, mobile and cloud computing, big data analysis, business intelligence, artificial intelligence, social systems, computer embedded systems and nature inspired manufacturing, etc. that contribute to the modern Digital Economy. This volume highlights new trends and challenges in agent, new digital and knowledge economy research and includes 28 papers classified in the following specific topics: business process management, agent-based modeling and simulation, anthropic-oriented computing, learning paradigms, business informatics and gaming, digital economy, and advances in networked virtual enterprises. Published papers were selected for presentatio...

  3. B(E2)s of high-spin isomers in generalized seniority scheme

    International Nuclear Information System (INIS)

    Maheshwari, Bhoomika; Jain, Ashok Kumar

    2015-01-01

    In this paper, we focus on the isomers that arise due to the seniority selection rules and the role played by generalized seniority when multi-j configurations are involved. In particular, we concentrate on explaining the B(E2) values in the semi-magic isomeric chains by using a simple approach. In this paper, we study the B(E2) variation of these isomers by using the generalized seniority scheme, applicable to many-j degenerate orbits. We show that the isomers known to arise mainly from the high-j intruder orbitals, do require the configuration mixing as an essential requirement

  4. Institutional arrangements for the reduction of proliferation risks. Formulation, evaluation, and implementation of institutional concepts

    International Nuclear Information System (INIS)

    Kratzer, M.B.; Wonder, E.F.; Gray, J.E.; Shantzis, S.B.; Sievering, N.F.; Paige, H.W.; Jones, B.M.

    1979-12-01

    The purpose of this study was to: (1) identify alternative institutional arrangements applicable to the sensitive steps in the back-end of the fuel cycle that might reduce their associated proliferation risks; and (2) assess their advantages and disadvantages from the standpoint of nonproliferation effectiveness and political, economic, and operational acceptability. The concept of international or multinational custody of sensitive materials and facilities was found to offer a high degree of proliferation resistance and to likely be more acceptable to prospective participants than other institutional arrangements that intrude upon proprietary areas, such as facility ownership and management

  5. Institutional arrangements for the reduction of proliferation risks formulation, evaluation, and implementation of institutional concepts

    International Nuclear Information System (INIS)

    Kratzer, M.B.; Wonder, E.F.; Gray, J.E.; Shantzis, S.B.; Sievering, N.F.; Paige, H.W.; Jones, B.M.

    1979-12-01

    The purpose of this study was to: (1) identify alternative institutional arrangements applicable to the sensitive steps in the back-end of the fuel cycle that might reduce their associated proliferation risks; and (2) assess their advantages and disadvantages from the standpoint of nonproliferation effectiveness and political, economic, and operational acceptability. The concept of international or multinational custody of sensitive materials and facilities was found to offer a high degree of proliferation resistance and to likely be more acceptable to prospective participants than other institutional arrangements that intrude upon proprietary areas, such as facility ownership and management

  6. Institutional arrangements for the reduction of proliferation risks formulation, evaluation, and implementation of institutional concepts

    Energy Technology Data Exchange (ETDEWEB)

    Kratzer, M.B.; Wonder, E.F.; Gray, J.E.; Shantzis, S.B.; Sievering, N.F.; Paige, H.W.; Jones, B.M.

    1979-12-01

    The purpose of this study was to: (1) identify alternative institutional arrangements applicable to the sensitive steps in the back-end of the fuel cycle that might reduce their associated proliferation risks; and (2) assess their advantages and disadvantages from the standpoint of nonproliferation effectiveness and political, economic, and operational acceptability. The concept of international or multinational custody of sensitive materials and facilities was found to offer a high degree of proliferation resistance and to likely be more acceptable to prospective participants than other institutional arrangements that intrude upon proprietary areas, such as facility ownership and management.

  7. Processing Polarity: How the Ungrammatical Intrudes on the Grammatical

    Science.gov (United States)

    Vasishth, Shravan; Brussow, Sven; Lewis, Richard L.; Drenhaus, Heiner

    2008-01-01

    A central question in online human sentence comprehension is, "How are linguistic relations established between different parts of a sentence?" Previous work has shown that this dependency resolution process can be computationally expensive, but the underlying reasons for this are still unclear. This article argues that dependency…

  8. Defining Privacy Is Supposed to Be Easy

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Gross, Thomas; Viganò, Luca

    2013-01-01

    Formally specifying privacy goals is not trivial. The most widely used approach in formal methods is based on the static equivalence of frames in the applied pi-calculus, basically asking whether or not the intruder is able to distinguish two given worlds. A subtle question is how we can be sure...... that we have specified all pairs of worlds to properly reflect our intuitive privacy goal. To address this problem, we introduce in this paper a novel and declarative way to specify privacy goals, called α-β privacy, and relate it to static equivalence. This new approach is based on specifying two...... formulae α and β in first-order logic with Herbrand universes, where α reflects the intentionally released information and β includes the actual cryptographic (“technical”) messages the intruder can see. Then α-β privacy means that the intruder cannot derive any “non-technical” statement from β that he...

  9. Accidental intravenous infusion of a large dose of magnesium sulphate during labor: A case report

    Directory of Open Access Journals (Sweden)

    Kamal Kumar

    2013-01-01

    Full Text Available During labor and child delivery, a wide range of drugs are administered. Most of these medications are high-alert medications, which can cause significant harm to the patient due to its inadvertent use. Errors could be caused due to unfamiliarity with safe dosage ranges, confusion between similar looking drugs, mislabeling of drugs, equipment misuse, or malfunction and communication errors. We report a case of inadvertent infusion of a large dose of magnesium sulphate in a pregnant woman.

  10. Supporting patient adherence to antiretrovirals using mobile phone reminders: patient responses from South India.

    Science.gov (United States)

    Sidney, Kristi; Antony, Jimmy; Rodrigues, Rashmi; Arumugam, Karthika; Krishnamurthy, Shubha; D'souza, George; De Costa, Ayesha; Shet, Anita

    2012-01-01

    There has been exponential growth in the use of mobile phones in India over the last few years, and their potential benefits as a healthcare tool has raised tremendous interest. We used mobile phone reminders to help support adherence to antiretroviral therapy (ART) among HIV patients at an infectious disease clinic in a tertiary hospital in Bangalore. Between March and June 2010, 139 adult HIV patients taking regular ART for at least a month received weekly reminders to support adherence. These reminders consisted of a weekly interactive call and a non-interactive neutral pictorial short message service (SMS). After four weeks of the intervention, participants were interviewed to study perceptions on preference, usefulness, potential stigma and privacy concerns associated with this intervention. Majority of the participants were urban (89%), and had at least a secondary education (85%). A total of 744 calls were made, 545 (76%) of which were received by the participants. In addition, all participants received the weekly pictorial SMS reminder. A month later, 90% of participants reported the intervention as being helpful as medication reminders, and did not feel their privacy was intruded. Participants (87%) reported that they preferred the call as reminders, just 11% favoured SMS reminders alone. Only 59% of participants viewed all the SMSs that were delivered, while 15% never viewed any at all. Participants also denied any discomfort or stigma despite 20% and 13%, respectively, reporting that another person had inadvertently received their reminder call or SMS. Mobile phone interventions are an acceptable way of supporting adherence in this setting. Voice calls rather than SMSs alone seem to be preferred as reminders. Further research to study the influence of this intervention on adherence and health maintenance is warranted.

  11. Long-Term Climate Change Assessment Task for the Hanford Site Permanent Isolation Barrier Development Program: Status through FY 1992

    International Nuclear Information System (INIS)

    Petersen, K.L.; Chatters, J.C.

    1993-07-01

    The Hanford Site Permanent Isolation Barrier Development Program (Barrier Development Program) was organized (Adams and Wing 1986) to develop the technology needed to provide an in-place disposal capability for the US Department of Energy at the Hanford Site in southeastern Washington. The goals of the Barrier Development Program are to provide defensible evidence that final barrier design(s) will adequately control water infiltration, plant and animal intrusion, and wind and water erosion for a minimum of 1,000 years; to isolate wastes from the accessible environment; and to use markers to warn inadvertent human intruders. Evidence for barrier performance will be obtained by conducting laboratory experiments, field tests, computer modeling, and other studies that establish confidence in the barrier's ability to meet its 1,000-year design life. The performance and stability of natural barrier analogs that have existed for several millennia and the reconstruction of climate changes during the past 10,000 to 125,000 years also will provide insight into bounding conditions of possible future changes and increase confidence in the barriers design. In the following discussion the term open-quotes long-termclose quotes references periods of time up to 1000's of years, distinguishing it from open-quotes short-termclose quotes weather patterns covering a decade or less. Specific activities focus on planning and conducting a series of studies and tests required to confirm key aspects of the barrier design. The effort is a collaborative one between scientists and engineers from Westinghouse Hanford Company (Westinghouse Hanford) and Pacific Northwest Laboratory (PNL) to design barriers to limit movement of radionuclides and other contaminants to the accessible environment for at least 1,000 years. These activities have been divided into 14 groups of tasks that aid in the complete development of protective barrier and warning marker system

  12. Long-Term Climate Change Assessment Task for the Hanford Site Permanent Isolation Barrier Development Program: Status through FY 1992

    Energy Technology Data Exchange (ETDEWEB)

    Petersen, K.L. [Westinghouse Hanford Co., Richland, WA (US); Chatters, J.C. [Pacific Northwest Lab., Richland, WA (US)

    1993-07-01

    The Hanford Site Permanent Isolation Barrier Development Program (Barrier Development Program) was organized (Adams and Wing 1986) to develop the technology needed to provide an in-place disposal capability for the US Department of Energy at the Hanford Site in southeastern Washington. The goals of the Barrier Development Program are to provide defensible evidence that final barrier design(s) will adequately control water infiltration, plant and animal intrusion, and wind and water erosion for a minimum of 1,000 years; to isolate wastes from the accessible environment; and to use markers to warn inadvertent human intruders. Evidence for barrier performance will be obtained by conducting laboratory experiments, field tests, computer modeling, and other studies that establish confidence in the barrier`s ability to meet its 1,000-year design life. The performance and stability of natural barrier analogs that have existed for several millennia and the reconstruction of climate changes during the past 10,000 to 125,000 years also will provide insight into bounding conditions of possible future changes and increase confidence in the barriers design. In the following discussion the term {open_quotes}long-term{close_quotes} references periods of time up to 1000`s of years, distinguishing it from {open_quotes}short-term{close_quotes} weather patterns covering a decade or less. Specific activities focus on planning and conducting a series of studies and tests required to confirm key aspects of the barrier design. The effort is a collaborative one between scientists and engineers from Westinghouse Hanford Company (Westinghouse Hanford) and Pacific Northwest Laboratory (PNL) to design barriers to limit movement of radionuclides and other contaminants to the accessible environment for at least 1,000 years. These activities have been divided into 14 groups of tasks that aid in the complete development of protective barrier and warning marker system.

  13. Integrated security system definition

    International Nuclear Information System (INIS)

    Campbell, G.K.; Hall, J.R. II

    1985-01-01

    The objectives of an integrated security system are to detect intruders and unauthorized activities with a high degree of reliability and the to deter and delay them until effective response/engagement can be accomplished. Definition of an effective integrated security system requires proper application of a system engineering methodology. This paper summarizes a methodology and describes its application to the problem of integrated security system definition. This process includes requirements identification and analysis, allocation of identified system requirements to the subsystem level and provides a basis for identification of synergistic subsystem elements and for synthesis into an integrated system. The paper discusses how this is accomplished, emphasizing at each step how system integration and subsystem synergism is considered. The paper concludes with the product of the process: implementation of an integrated security system

  14. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: The ONSITE/MAXI1 computer program

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.; Neuder, S.M.

    1987-02-01

    This document summarizes initial efforts to develop human-intrusion scenarios and a modified version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. Supplement 1 of NUREG/CR-3620 (1986) summarized modifications and improvements to the ONSITE/MAXI1 software package. This document summarizes a modified version of the ONSITE/MAXI1 computer program. This modified version of the computer program operates on a personal computer and permits the user to optionally select radiation dose conversion factors published by the International Commission on Radiological Protection (ICRP) in their Publication No. 30 (ICRP 1979-1982) in place of those published by the ICRP in their Publication No. 2 (ICRP 1959) (as implemented in the previous versions of the ONSITE/MAXI1 computer program). The pathway-to-human models used in the computer program have not been changed from those described previously. Computer listings of the ONSITE/MAXI1 computer program and supporting data bases are included in the appendices of this document

  15. Smallpox: An eradicated infection with persistent sequels - Case report and a brief on smallpox

    International Nuclear Information System (INIS)

    Jastaneiah, Sabah

    2009-01-01

    Sequelae of smallpox infection on the ocular surface are still seen, including corneal scars adherent leukoma and phthisical globes. This paper will report another sequel of smallpox infection causing inadvertent bleb in a 62-year-old diabetic female with no history of ocular surgery or trauma in either eye. The patient had smallpox infection during her childhood. Her follow up extended from May 1997 until August 2007 with a constant eye examinations including controlled intraocular pressure, avascular cystic inadvertent bleb, and up drown peaked pupil. (author)

  16. Inadvertent presence of genetically modified elements in maize food ...

    African Journals Online (AJOL)

    owner

    2013-07-31

    Jul 31, 2013 ... The maize imported into Kenya contained Bt genetic elements. Nevertheless, the .... obtained from various open air markets and retail shops located in ... Magic, Bokomo and Temmy) was not successful. Assessment of cry1Ab ...

  17. Inadvertent injection of succinylcholine as an epidural test dose

    Directory of Open Access Journals (Sweden)

    Chryssa Pourzitaki

    Full Text Available Abstract Background and objectives: Epidural action of neuromuscular blocking agents could be explained under the light of their physicochemical characteristics and epidural space properties. In the literature there are few cases of accidental neuromuscular agent's epidural administration, manifesting mainly with neuromuscular blockade institution or fasciculations. Case report: We report a case of accidental succinylcholine administration as an epidural test dose, in a female patient undergoing scheduled laparotomy, under combined general and epidural anesthesia. Approximately 2 min after the succinylcholine injection the patient complained for shortness of breath, while mild fasciculations appeared in her trunk and face, managed by immediate general anesthesia institution. With the exception of a relatively longer duration of neuromuscular blockade compared with intravenous administration, no neurological or cardiovascular sequelae or other symptoms of local or systemic toxicity were observed. Conclusions: Oral administration of diazepam seems to lessen the adverse effects from accidental epidural administration of succinylcholine. The meticulous and discriminative labeling of syringes, as well as keeping persistent cautions during all anesthesia procedures remains of crucial importance.

  18. Inadvertent destruction of the spinal cord by radiation therapy

    International Nuclear Information System (INIS)

    Bhavilai, D.

    1974-01-01

    A case of radiation myelopathy following cobalt therapy of a carcinoma of the esophagus is presented. A permanent quadriplegia resulted. Radiation myelopathy can result from treatment with x-rays or radioactive cobalt regardless of whether the condition being treated involves the spinal cord. No effective treatment is known. Prevention requires keeping the radiation at low level

  19. Incident of inadvertent radiation exposure in a linac bunker

    International Nuclear Information System (INIS)

    Aerts, M.G.

    2010-01-01

    Full text: Implementation of a new Biomedical Equipment and service database poses special challenges. This paper describes the challenges and solutions during implementation of BEIMS (Mercury Computers) at RPAH and other sites within SSWAHS. During implementation we faced challenges of Code/Label design, workflow redesign, and data cleanup. Considerable time and effort went into the design of descriptive codes for breakdowns, tests, equipment types, meta-categories and the like. Some of the codes are explored and described to allow adoption by other entities if desired. Workflow redesign required us to include considerations of biomedical Technicians and Nurse Requestors. A simplified document was created for the self-education of Requestors and a full user manual (complete with screen shots) was created for Biomeds. More work remains, including simplification of standardised reports and ability to generate KPI's. The result is a system with improved utility compared to the old system and a flexible design enabling future improvements. (author)

  20. Derivation of upper bound concentration of LLW for land disposal in Taiwan

    International Nuclear Information System (INIS)

    Chang, F.D.; Liou, C.T.; Su, M.F.; Tsai, S.C.

    1989-01-01

    The upper bound concentrations of radionuclides in the low level waste to be disposed in Taiwan are investigated based on a proposed reference site with all of the scenarios and exposure pathways reflecting the local conditions and environmental characteristics. The analysis reveals that most of the upper bound concentrations are determined from the scenario of intruder-agriculture. It can also be found that the Transuranic radionuclides and those with long half-lives are the dominant radionuclides which result in major radiological impact to the environment in this intruder-agriculture scenario

  1. Double blocking in the superdeformed {sup 192}Tl nucleus

    Energy Technology Data Exchange (ETDEWEB)

    Liang, Y; Carpenter, M P; Janssens, R V.F.; Ahmad, I; Henry, R; Khoo, T L; Lauritsen, T [Argonne National Lab., IL (United States); Soramel, F [Padova University, Padova (Italy); Pilotte, S [Ottawa Univ., ON (Canada); Lewis, J M; Riedinger, L L; Yu, C H [Tennessee Univ., Knoxville, TN (United States); Garg, U; Reviol, W [Notre Dame Univ., IN (United States); Bearden, I G [Purdue Univ., Lafayette, IN (United States)

    1992-08-01

    Six superdeformed bands have been found in the nucleus {sup 192}Tl. For two of the bands, the dynamic moment of inertia J{sup (2)} is found to be constant with the rotational frequency {Dirac_h}{omega}. This result can be understood in terms of Pauli blocking of quasiparticle alignments in intruder orbitals, and represents the first experimental evidence that the alignment of these intruders is responsible for the smooth rise in J{sup (2)} seen in other superdeformed nuclei of this mass region. (author). 18 refs., 2 figs.

  2. Tanks 18 And 19-F Structural Flowable Grout Fill Material Evaluation And Recommendations

    International Nuclear Information System (INIS)

    Langton, C. A.; Stefanko, D. B.

    2013-01-01

    Cementitious grout will be used to close Tanks 18-F and 19-F. The functions of the grout are to: 1) physically stabilize the final landfill by filling the empty volume in the tanks with a non-compressible material; 2) provide a barrier for inadvertent intrusion into the tank; 3) reduce contaminant mobility by a) limiting the hydraulic conductivity of the closed tank and b) reducing contact between the residual waste and infiltrating water; and 4) providing an alkaline, chemically reducing environment in the closed tank to control speciation and solubility of selected radionuclides. The objective of this work was to identify a single (all-in-one) grout to stabilize and isolate the residual radionuclides in the tank, provide structural stability of the closed tank and serve as an inadvertent intruder barrier. This work was requested by V. A. Chander, High Level Waste (HLW) Tank Engineering, in HLW-TTR-2011-008. The complete task scope is provided in the Task Technical and QA Plan, SRNL-RP-2011-00587 Revision 0. The specific objectives of this task were to: 1) Identify new admixtures and dosages for formulating a zero bleed flowable tank fill material selected by HLW Tank Closure Project personnel based on earlier tank fill studies performed in 2007. The chemical admixtures used for adjusting the flow properties needed to be updated because the original admixture products are no longer available. Also, the sources of cement and fly ash have changed, and Portland cements currently available contain up to 5 wt. % limestone (calcium carbonate). 2) Prepare and evaluate the placement, compressive strength, and thermal properties of the selected formulation with new admixture dosages. 3) Identify opportunities for improving the mix selected by HLW Closure Project personnel and prepare and evaluate two potentially improved zero bleed flowable fill design concepts; one based on the reactor fill grout and the other based on a shrinkage compensating flowable fill mix design. 4

  3. Tanks 18 And 19-F Structural Flowable Grout Fill Material Evaluation And Recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Langton, C. A.; Stefanko, D. B.

    2013-04-23

    Cementitious grout will be used to close Tanks 18-F and 19-F. The functions of the grout are to: 1) physically stabilize the final landfill by filling the empty volume in the tanks with a non-compressible material; 2) provide a barrier for inadvertent intrusion into the tank; 3) reduce contaminant mobility by a) limiting the hydraulic conductivity of the closed tank and b) reducing contact between the residual waste and infiltrating water; and 4) providing an alkaline, chemically reducing environment in the closed tank to control speciation and solubility of selected radionuclides. The objective of this work was to identify a single (all-in-one) grout to stabilize and isolate the residual radionuclides in the tank, provide structural stability of the closed tank and serve as an inadvertent intruder barrier. This work was requested by V. A. Chander, High Level Waste (HLW) Tank Engineering, in HLW-TTR-2011-008. The complete task scope is provided in the Task Technical and QA Plan, SRNL-RP-2011-00587 Revision 0. The specific objectives of this task were to: 1) Identify new admixtures and dosages for formulating a zero bleed flowable tank fill material selected by HLW Tank Closure Project personnel based on earlier tank fill studies performed in 2007. The chemical admixtures used for adjusting the flow properties needed to be updated because the original admixture products are no longer available. Also, the sources of cement and fly ash have changed, and Portland cements currently available contain up to 5 wt. % limestone (calcium carbonate). 2) Prepare and evaluate the placement, compressive strength, and thermal properties of the selected formulation with new admixture dosages. 3) Identify opportunities for improving the mix selected by HLW Closure Project personnel and prepare and evaluate two potentially improved zero bleed flowable fill design concepts; one based on the reactor fill grout and the other based on a shrinkage compensating flowable fill mix design. 4

  4. Publisher Correction

    DEFF Research Database (Denmark)

    Bonàs-Guarch, Sílvia; Guindo-Martínez, Marta; Miguel-Escalada, Irene

    2018-01-01

    In the originally published version of this Article, the affiliation details for Santi González, Jian'an Luan and Claudia Langenberg were inadvertently omitted. Santi González should have been affiliated with 'Barcelona Supercomputing Center (BSC), Joint BSC-CRG-IRB Research Program in Computatio......In the originally published version of this Article, the affiliation details for Santi González, Jian'an Luan and Claudia Langenberg were inadvertently omitted. Santi González should have been affiliated with 'Barcelona Supercomputing Center (BSC), Joint BSC-CRG-IRB Research Program...

  5. The application of Markov decision process in restaurant delivery robot

    Science.gov (United States)

    Wang, Yong; Hu, Zhen; Wang, Ying

    2017-05-01

    As the restaurant delivery robot is often in a dynamic and complex environment, including the chairs inadvertently moved to the channel and customers coming and going. The traditional path planning algorithm is not very ideal. To solve this problem, this paper proposes the Markov dynamic state immediate reward (MDR) path planning algorithm according to the traditional Markov decision process. First of all, it uses MDR to plan a global path, then navigates along this path. When the sensor detects there is no obstructions in front state, increase its immediate state reward value; when the sensor detects there is an obstacle in front, plan a global path that can avoid obstacle with the current position as the new starting point and reduce its state immediate reward value. This continues until the target is reached. When the robot learns for a period of time, it can avoid those places where obstacles are often present when planning the path. By analyzing the simulation experiment, the algorithm has achieved good results in the global path planning under the dynamic environment.

  6. Nuclear shape transition in light gold isotopes

    International Nuclear Information System (INIS)

    Wallmeroth, K.; Bollen, G.; Dohn, A.; Egelhof, P.; Kroenert, U.; Heyde, K.; Coster, C. de; Wood, J.L.; Kluge, H.J.; European Organization for Nuclear Research, Geneva; European Organization for Nuclear Research, Geneva

    1989-01-01

    The hyperfine structure and isotope shifts of short-lived gold isotopes with 185≤A≤190 and the 11/2 - isomer of 189 Au have been investigated by application of on-line resonance ionization mass spectroscopy. A detection efficiency of ε=10 -8 for gold atoms was observed at a background of about one event per 1000 laser shots. The deduced charge radii show a drastic change between A=187 and A=186 which is interpreted as an onset of strong deformation (β 2 ≅ 0.25) in 186 Au and 185 Au due to the influence of the π1h 9/2 intruder orbital. (orig.)

  7. Inertial fusion reactors and magnetic fields

    International Nuclear Information System (INIS)

    Cornwell, J.B.; Pendergrass, J.H.

    1985-01-01

    The application of magnetic fields of simple configurations and modest strengths to direct target debris ions out of cavities can alleviate recognized shortcomings of several classes of inertial confinement fusion (ICF) reactors. Complex fringes of the strong magnetic fields of heavy-ion fusion (HIF) focusing magnets may intrude into reactor cavities and significantly affect the trajectories of target debris ions. The results of an assessment of potential benefits from the use of magnetic fields in ICF reactors and of potential problems with focusing-magnet fields in HIF reactors conducted to set priorities for continuing studies are reported. Computational tools are described and some preliminary results are presented

  8. Face antispoofing based on frame difference and multilevel representation

    Science.gov (United States)

    Benlamoudi, Azeddine; Aiadi, Kamal Eddine; Ouafi, Abdelkrim; Samai, Djamel; Oussalah, Mourad

    2017-07-01

    Due to advances in technology, today's biometric systems become vulnerable to spoof attacks made by fake faces. These attacks occur when an intruder attempts to fool an established face-based recognition system by presenting a fake face (e.g., print photo or replay attacks) in front of the camera instead of the intruder's genuine face. For this purpose, face antispoofing has become a hot topic in face analysis literature, where several applications with antispoofing task have emerged recently. We propose a solution for distinguishing between real faces and fake ones. Our approach is based on extracting features from the difference between successive frames instead of individual frames. We also used a multilevel representation that divides the frame difference into multiple multiblocks. Different texture descriptors (local binary patterns, local phase quantization, and binarized statistical image features) have then been applied to each block. After the feature extraction step, a Fisher score is applied to sort the features in ascending order according to the associated weights. Finally, a support vector machine is used to differentiate between real and fake faces. We tested our approach on three publicly available databases: CASIA Face Antispoofing database, Replay-Attack database, and MSU Mobile Face Spoofing database. The proposed approach outperforms the other state-of-the-art methods in different media and quality metrics.

  9. Portable reconfigurable line sensor (PRLS) and technology transfer

    International Nuclear Information System (INIS)

    MacKenzie, D.P.; Buckle, T.H.; Blattman, D.A.

    1993-01-01

    The Portable Reconfigurable Line Sensor (PRLS) is a bistatic, pulsed-Doppler, microwave intrusion detection system developed at Sandia National Laboratories for the US Air Force. The PRLS is rapidly and easily deployed, and can detect intruders ranging from a slow creeping intruder to a high speed vehicle. The system has a sharply defined detection zone and will not falsely alarm on nearby traffic. Unlike most microwave sensors, the PRLS requires no alignment or calibration. Its portability, battery operation, ease of setup, and RF alarm reporting capability make it an excellent choice for perimeter, portal, and gap-filler applications in the important new field of rapidly-deployable sensor systems. In October 1992, the US Air Force and Racon, Inc., entered into a Cooperative Research and Development Agreement (CRADA) to commercialize the PRLS, jointly sharing government and industry resources. The Air Force brings the user's perspective and requirements to the cooperative effort. Sandia, serving as the technical arm of the Air Force, adds the actual PRLS technology to the joint effort, and provides security systems and radar development expertise. Racon puts the Air Force requirements and Sandia technology together into a commercial product, making the system meet important commercial manufacturing constraints. The result is a true ''win-win'' situation, with reduced government investment during the commercial development of the PRLS, and industry access to technology not otherwise available

  10. Method of preventing criticality of fresh fuel assembly in storage facility

    International Nuclear Information System (INIS)

    Kawamura, Makoto.

    1990-01-01

    With an aim of improving the operation efficiency of a reactor, extention of the operation cycle by increasing U 235 enrichment degree of fuel uranium is planned. However, along with the increase of the enrichment degree of the fuel uranium, there occurs a problem of criticality upon fuel handling. Then, in the present invention, boric acid incorporating B-10 of great neutron absorption effect are packed with water soluble polymeric materials which are further packed with a fuel packing sheet, or the water soluble polymeric materials incorporating boric acids are packed with fuel packing sheets which are disposed to a fresh fuel assembly and stored in a store house as they are. The fuel packing sheet is a perforated sheet having a plurality of water intruding pores. Then, if water should intrude to the store house accidentally, the water soluble polymeric materials are dissolved, so that the intruded water is converted into aqueous boric acid easily and absorbs neutrons effectively to thereby attain the prevention of criticality. (T.M.)

  11. Spherical shock-wave propagation in three-dimensional granular packings.

    Science.gov (United States)

    Xue, Kun; Bai, Chun-Hua

    2011-02-01

    We investigate numerically the spherical shock-wave propagation in an open dense granular packing perturbed by the sudden expansion of a spherical intruder in the interior of the pack, focusing on the correlation between geometrical fabrics and propagating properties. The measurements of the temporal and spatial variations in a variety of propagating properties define a consistent serrated wave substructure with characteristic length on the orders of particle diameters. Further inspection of particle packing reveals a well-defined particle layering that persists several particle diameters away from the intruder, although its dominant effects are only within one to two diameters. This interface-induced layering not only exactly coincides with the serrated wave profile, but also highlights the competition between two energy transmission mechanisms involving distinct transport speeds. The alternating dominances between these two mechanisms contribute to the nonlinear wave propagation on the particle scale. Moreover, the proliferation of intricate three-dimensional contact force networks suggests the anisotropic stress transmission, which is found to also arise from the localized packing structure in the vicinity of the intruder.

  12. Scaling behavior in the convection-driven Brazil nut effect

    Science.gov (United States)

    Hejmady, Prakhyat; Bandyopadhyay, Ranjini; Sabhapandit, Sanjib; Dhar, Abhishek

    2012-11-01

    The Brazil nut effect is the phenomenon in which a large intruder particle immersed in a vertically shaken bed of smaller particles rises to the top, even when it is much denser. The usual practice while describing these experiments has been to use the dimensionless acceleration Γ=aω2/g, where a and ω are, respectively, the amplitude and the angular frequency of vibration and g is the acceleration due to gravity. Considering a vibrated quasi-two-dimensional bed of mustard seeds, we show here that the peak-to-peak velocity of shaking v=aω, rather than Γ, is the relevant parameter in the regime where boundary-driven granular convection is the main driving mechanism. We find that the rise time τ of an intruder is described by the scaling law τ˜(v-vc)-α, where vc is identified as the critical vibration velocity for the onset of convective motion of the mustard seeds. This scaling form holds over a wide range of (a,ω), diameter, and density of the intruder.

  13. Basal forebrain projections to the lateral habenula modulate aggression reward.

    Science.gov (United States)

    Golden, Sam A; Heshmati, Mitra; Flanigan, Meghan; Christoffel, Daniel J; Guise, Kevin; Pfau, Madeline L; Aleyasin, Hossein; Menard, Caroline; Zhang, Hongxing; Hodes, Georgia E; Bregman, Dana; Khibnik, Lena; Tai, Jonathan; Rebusi, Nicole; Krawitz, Brian; Chaudhury, Dipesh; Walsh, Jessica J; Han, Ming-Hu; Shapiro, Matt L; Russo, Scott J

    2016-06-30

    Maladaptive aggressive behaviour is associated with a number of neuropsychiatric disorders and is thought to result partly from the inappropriate activation of brain reward systems in response to aggressive or violent social stimuli. Nuclei within the ventromedial hypothalamus, extended amygdala and limbic circuits are known to encode initiation of aggression; however, little is known about the neural mechanisms that directly modulate the motivational component of aggressive behaviour. Here we established a mouse model to measure the valence of aggressive inter-male social interaction with a smaller subordinate intruder as reinforcement for the development of conditioned place preference (CPP). Aggressors develop a CPP, whereas non-aggressors develop a conditioned place aversion to the intruder-paired context. Furthermore, we identify a functional GABAergic projection from the basal forebrain (BF) to the lateral habenula (lHb) that bi-directionally controls the valence of aggressive interactions. Circuit-specific silencing of GABAergic BF-lHb terminals of aggressors with halorhodopsin (NpHR3.0) increases lHb neuronal firing and abolishes CPP to the intruder-paired context. Activation of GABAergic BF-lHb terminals of non-aggressors with channelrhodopsin (ChR2) decreases lHb neuronal firing and promotes CPP to the intruder-paired context. Finally, we show that altering inhibitory transmission at BF-lHb terminals does not control the initiation of aggressive behaviour. These results demonstrate that the BF-lHb circuit has a critical role in regulating the valence of inter-male aggressive behaviour and provide novel mechanistic insight into the neural circuits modulating aggression reward processing.

  14. IPv6 Network Security using Snort

    OpenAIRE

    Kaur, Ravreet; Kumar, Sumit

    2013-01-01

    IPv6 is new routing protocol. IPv6 is introduced by IETF mainly due IPv4 address exhaustion but it is also an enhanced version of IPv4. There are many changes in IPv6 header, some fields from IPv6 header has been deprecated from IPv6 and some are newly added. There is also common misconception among people that IPv6 is more secure than IPv4, which is not true. Now a day's intruders are targeting IPv6 networks as it is widely being accepted by many organization for their network. An intruder c...

  15. Geiger Muller (GM) detector as online monitor: an experimental study

    International Nuclear Information System (INIS)

    Jayan, M.P.; Pawar, V.J.; Krishnakumar, P.; Sureshkumar, M.

    2014-01-01

    Monitoring the inadvertent release of radioactivity into otherwise inactive liquid streams is a common requirement in nuclear industry. In addition to conventional off-line sampling and measurement methods, nuclear facilities usually uses online methods to get real-time detection of activity contents in process cooling water lines and steam condensate lines. Due to its simplicity, ruggedness and cost effectiveness, Geiger Muller counter is obviously the first choice for online application. Though GM based monitors for such online application were in industrial use for a long time, practical data on the response of the detector with respect low level activities in the effluents is scarce in literature. This work was carried out to fill this information gap. The data generated in these experiments may be useful in giving a realistic interpretation of the response of the existing monitors and setting up their alarm limits

  16. Planning for a Violent Intruder Event: The School Nurse's Role.

    Science.gov (United States)

    Selekman, Janice; Melvin, Joseph

    2017-05-01

    School shootings occur too frequently and often with devastating results. The key to prevention and mitigation of these events is to have a plan that is simple, up-to-date, disseminated, and practiced. This article discusses the steps that school nurses can take to work with school administration to prepare themselves, their staff, and their students.

  17. Probing intruder configurations in $^{186, 188}$Pb using Coulomb excitation

    CERN Multimedia

    Columb excitation measurements to study the shape coexistence, mixing and quadrupole collectivity of the low-lying levels in neutron-deficient $^{188}$Pb nuclei are proposed with a view to extending similar studies to the $^{186}$Pb midshell nucleus. The HIE-ISOLDE beam of $^{186,188}$Pb nuclei will be delivered to MINIBALL+SPEDE set-up for simultaneous in-beam $\\gamma$-ray and conversion electron spectroscopy. The proposed experiment will allow the sign of the quadrupole deformation parameter to be extracted for the two lowest 2$^{+}$ states in $^{188}$Pb. Moreover, the advent of SPEDE will allow probing of the bandhead 0$^{+}$ states via direct measurements of E0 transitions. Beam development is requested to provide pure and instense $^{186}$Pb beam.

  18. Application of mercurometric analysis methods to radioactive (and/or toxic) samples: Pycnometry and porosimetry

    International Nuclear Information System (INIS)

    Sannen, L.

    1991-01-01

    The analytical tools and methods used in the laboratory of High and Medium Activity of the Nuclear Research Centre in Mol to determine the density and the open porosity of radioactive (and/or toxic) samples are described. The density is determined by a vacuum pycnometer with plunger displacement. This home-made apparatus has been automated up to a high degree so that operation is easily performed in the remote handling conditions of a hot cell environment. The amount of mercury displaced by the sample is measured. The accuracy is better than 0.2 %. The porosimeter is a commercial apparatus which was modified to improve the hot cell compatibility and to provide fast processing of the data. The open porosity and its pore size distribution are determined from the measurement of the amount of mercury intruded into the sample under increasing pressure. The paper describes both instruments and the working methods. Also included are some examples of measurement results. (author). 5 figs

  19. Maternal Territoriality Achieved Through Shaking and Lunging: An Investigation of Patterns in Associated Behaviors and Substrate Vibrations in a Colonial Embiopteran, Antipaluria urichi

    Science.gov (United States)

    Dejan, Khaaliq A.; Fresquez, John M.; Meyer, Annika M.; Edgerly, Janice S.

    2013-01-01

    Substrate vibration communication is displayed by a variety of insects that rely on silk for shelter. Such signaling is often associated with territoriality and social interactions. The goal in this study was to explore the use of substrate vibration by subsocial insects of the little-studied order Embioptera (also known as Embiidina). Antipaluria urichi (Saussure) (Embioptera: Clothodidae) from Trinidad and Tobago, a large embiopteran, exhibits maternal care and facultatively colonial behavior. Previous observations suggested that they were aggressive while guarding eggs but gregarious when not. Egg-guarders in particular have been observed shaking and lunging their bodies, but to date these putative signals have not been recorded nor were their contexts known. Staged interactions were conducted in the laboratory using residents that had established silk domiciles enveloping piezo-electric film used to detect vibrations. Predictions from two competing hypotheses, the maternal territoriality hypothesis and the group cohesion hypothesis, were erected to explain the occurrence of signaling. Experiments pitted pre-reproductive and egg-guarding residents against female and male intruders, representing social partners that ranged from potentially threatening to innocuous or even helpful. Behavioral acts were identified and scored along with associated substrate vibrations, which were measured for associated body movements, duration, and frequency spectra. Signals, sorted by the distinct actions used to generate them, were lunge, shake, push up, and snapback. Egg-guarding females produced most signals in response to female intruders, a result that supported the maternal territoriality hypothesis. Female intruders generally responded to such signaling by moving away from egg-guarding residents. In contrast, pre-reproductive residents did not signal much, and intruders settled beside them. Theme software was used to analyze the behavioral event recordings to seek patterns

  20. Gamma-ray spectroscopy of 120-130Te nuclei

    International Nuclear Information System (INIS)

    Vanhoy, J.R.; Champine, B.R.; Coleman, R.T.; Crandell, K.A.; Tanyi, J.A.; Hicks, S.F.; Alexander, G.K.; Burkett, P.G.; Burns, M.C.; Collard, C.J.

    2000-01-01

    Complete text of publication follows. Structure of the even 120-130 Te nuclei have been investigated with prompt gamma-ray spectroscopy following the 122-126,nat Te(n,n'γ) reactions and the (α,2nγ) 120,124,126 Te reactions. Gamma-ray excitation functions, angular distributions, γγ-coincidences, and Doppler shifts have been measured. Level schemes have been constructed to approximately 3.3 MeV excitation energy, and spectroscopic information including level spins and parities, branching and multipole-mixing ratios, and lifetimes have been extracted. Three different types of structure are thought to play an important role in these low-lying excitations. These are: collective, two-particle, and 4p-2h intruder excitations. Because there are seven stable even-even Te nuclei, the evolution of these excitation modes over this wide range in neutron number is investigated. Level sequences and transition rates obtained from these measurements are compared to IBM-2 model calculations both with and without intruder-state mixing by Rikovska et al. (1), and to particle-vibrational coupling model calculations by Lopac (2). The IBM-2 model calculations with intruder mixing well reproduce the level energies in the low-mass Te; however, examination of the electromagnetic transition rates reveals that there is no clear improvement in the description of these nuclei by adding the intruder configurations. Additionally, no evidence of the 2 + mixed-symmetry strength is observed in the 2 3 + and 2 4 + levels in these nuclei. The particle-vibration model calculations appear to do a good job describing both the level scheme and the transition rates in the heavier nuclei investigated. (author)

  1. Detection of radioactive materials at borders

    International Nuclear Information System (INIS)

    2003-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  2. Detection of radioactive materials at borders

    International Nuclear Information System (INIS)

    2004-05-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  3. Detection of radioactive materials at borders

    International Nuclear Information System (INIS)

    2002-09-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  4. Approaches for quantifying reactive and low-volatility biogenic organic compound emissions by vegetation enclosure techniques - part B: applications.

    Science.gov (United States)

    Ortega, John; Helmig, Detlev; Daly, Ryan W; Tanner, David M; Guenther, Alex B; Herrick, Jeffrey D

    2008-06-01

    The focus of the studies presented in the preceding companion paper (Part A: Review) and here (Part B: Applications) is on defining representative emission rates from vegetation for determining the roles of biogenic volatile organic compound (BVOC) emissions in atmospheric chemistry and aerosol processes. The review of previously published procedures for identifying and quantifying BVOC emissions has revealed a wide variety of experimental methods used by various researchers. Experimental details become increasingly critical for quantitative emission measurements of low volatility monoterpenes (MT) and sesquiterpenes (SQT). These compounds are prone to be lost inadvertently by uptake to materials in contact with the sample air or by reactions with atmospheric oxidants. These losses become more prominent with higher molecular weight compounds, potentially leading to an underestimation of their emission rates. We present MT and SQT emission rate data from numerous experiments that include 23 deciduous tree species, 14 coniferous tree species, 8 crops, and 2 shrubs. These data indicate total, normalized (30 degrees C) basal emission rates from emissions have exponential dependencies on temperature (i.e. rates are proportional to e(betaT)). The inter-quartile range of beta-values for MT was between 0.12 and 0.17K(-1), which is higher than the value commonly used in models (0.09K(-1)). However many of the MT emissions also exhibited light dependencies, making it difficult to separate light and temperature influences. The primary light-dependent MT was ocimene, whose emissions were up to a factor of 10 higher than light-independent MT emissions. The inner-quartile range of beta-values for SQT was between 0.15 and 0.21K(-1).

  5. Typed Multiset Rewriting Specifications of Security Protocols

    Science.gov (United States)

    2011-10-01

    how to determine a specific set pAq of Dolev-Yao intruder roles from any given derivation A of Σ R. It does so by mapping each rule instance...occurring in A to zero or more intruder roles from Section 8.1. We then define pRq as pAq . This definition entails that the encoding of any active role...privK k,Σ3); ∆ a A k (∆, k′) with ∆′ = (∆, k′). Recall that pAq = (IPV,DUP). E0 :: · . [p∆q] IPV,DUP Σ⊕ΣDY −→ [p∆q] (·→I(k′))I,DUP Σ⊕ΣDY by rule

  6. Detecting Malicious Code by Binary File Checking

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2014-01-01

    Full Text Available The object, library and executable code is stored in binary files. Functionality of a binary file is altered when its content or program source code is changed, causing undesired effects. A direct content change is possible when the intruder knows the structural information of the binary file. The paper describes the structural properties of the binary object files, how the content can be controlled by a possible intruder and what the ways to identify malicious code in such kind of files. Because the object files are inputs in linking processes, early detection of the malicious content is crucial to avoid infection of the binary executable files.

  7. Distributed Intrusion Sensor Using DFB Laser with Optical Feedback and Saturable Absorber

    Directory of Open Access Journals (Sweden)

    Kyoo Nam Choi

    2018-01-01

    Full Text Available Characteristics of a distributed intrusion sensor using a coherent DFB laser diode with an external optical feedback and saturable absorber were experimentally investigated. The stimulus at a location of 2 km using a PZT transducer placed the location of a simulated intruder in Φ-OTDR trace after averaging 32 times. Field trials demonstrated the detection of a vehicle and a pedestrian crossing above the sensing line and a loop in a burial depth of 50 cm. This distributed intrusion sensor using a coherent DFB laser diode as the light source had the advantages of a simple structure and intruder detection capability at the underground burial location.

  8. PWR core safety analysis with 3-dimensional methods

    International Nuclear Information System (INIS)

    Gensler, A.; Kühnel, K.; Kuch, S.

    2015-01-01

    Highlights: • An overview of AREVA’s safety analysis codes their coupling is provided. • The validation base and licensing applications of these codes are summarized. • Coupled codes and methods provide improved margins and non-conservative results. • Examples for REA and inadvertent opening of the pressurizer safety valve are given. - Abstract: The main focus of safety analysis is to demonstrate the required safety level of the reactor core. Because of the demanding requirements, the quality of the safety analysis strongly affects the confidence in the operational safety of a reactor. To ensure the highest quality, it is essential that the methodology consists of appropriate analysis tools, an extensive validation base, and last but not least highly educated engineers applying the methodology. The sophisticated 3-dimensional core models applied by AREVA ensure that all physical effects relevant for safety are treated and the results are reliable and conservative. Presently AREVA employs SCIENCE, CASMO/NEMO and CASCADE-3D for pressurized water reactors. These codes are currently being consolidated into the next generation 3D code system ARCADIA®. AREVA continuously extends the validation base, including measurement campaigns in test facilities and comparisons of the predictions of steady state and transient measured data gathered from plants during many years of operation. Thus, the core models provide reliable and comprehensive results for a wide range of applications. For the application of these powerful tools, AREVA is taking benefit of its interdisciplinary know-how and international teamwork. Experienced engineers of different technical backgrounds are working together to ensure an appropriate interpretation of the calculation results, uncertainty analysis, along with continuously maintaining and enhancing the quality of the analysis methodologies. In this paper, an overview of AREVA’s broad application experience as well as the broad validation

  9. Globalisation, Mergers and "Inadvertent Multi-Campus Universities": Reflections from Wales

    Science.gov (United States)

    Zeeman, Nadine; Benneworth, Paul

    2017-01-01

    Multi-site universities face the challenge of integrating campuses that may have different profiles and orientations arising from place-specific attachments. Multi-campus universities created via mergers seeking to ensure long-term financial sustainability, and increasing their attractiveness to students, create a tension in campuses' purposes. We…

  10. Intentional and inadvertent chemical contamination of food, water, and medication.

    Science.gov (United States)

    MCKay, Charles; Scharman, Elizabeth J

    2015-02-01

    Numerous examples of chemical contamination of food, water, or medication have led to steps by regulatory agencies to maintain the safety of this critical social infrastructure and supply chain. Identification of contaminant site is important. Environmental testing and biomonitoring can define the nature and extent of the event and are useful for providing objective information, but may be unavailable in time for clinical care. Clinical diagnosis should be based on toxidrome recognition and assessment of public health implications. There are several resources available to assist and these can be accessed through regional poison control centers or local/state public health departments. Copyright © 2015 Elsevier Inc. All rights reserved.

  11. Inadvertent Exemplars: Life History Portraits of Two Socially Just Principals

    Science.gov (United States)

    Scanlan, Martin

    2012-01-01

    This study creates life history portraits of two White middle-class native-English-speaking principals demonstrating commitments to social justice in their work in public elementary schools serving disproportionately high populations of students who are marginalized by poverty, race, and linguistic heritage. Through self-reported life histories of…

  12. Validation of a Rapid Bacteria Endospore Enumeration System for Planetary Protection Application

    Science.gov (United States)

    Chen, Fei; Kern, Roger; Kazarians, Gayane; Venkateswaran, Kasthuri

    NASA monitors spacecraft surfaces to assure that the presence of bacterial endospores meets strict criteria at launch, to minimize the risk of inadvertent contamination of the surface of Mars. Currently, the only approved method for enumerating the spores is a culture based assay that requires three days to produce results. In order to meet the demanding schedules of spacecraft assembly, a more rapid spore detection assay is being considered as an alternate method to the NASA standard culture-based assay. The Millipore Rapid Microbiology Detection System (RMDS) has been used successfully for rapid bioburden enumeration in the pharmaceutical and food industries. The RMDS is rapid and simple, shows high sensitivity (to 1 colony forming unit [CFU]/sample), and correlates well with traditional culture-based methods. It combines membrane filtration, adenosine triphosphate (ATP) bioluminescence chemistry, and image analysis based on photon detection with a Charge Coupled Device (CCD) camera. In this study, we have optimized the assay conditions and evaluated the use of the RMDS as a rapid spore detection tool for NASA applications. In order to select for spores, the samples were subjected to a heat shock step before proceeding with the RMDS incubation protocol. Seven species of Bacillus (nine strains) that have been repeatedly isolated from clean room environments were assayed. All strains were detected by the RMDS in 5 hours and these assay times were repeatedly demonstrated along with low image background noise. Validation experiments to compare the Rapid Sore Assay (RSA) and NASA standard assay (NSA) were also performed. The evaluation criteria were modeled after the FDA Guideline of Process Validation, and Analytical Test Methods. This body of research demonstrates that the Rapid Spore Assay (RSA) is quick, and of equivalent sensitivity to the NASA standard assay, potentially reducing the assay time for bacterial endospores from over 72 hours to less than 8 hours

  13. Oxygen isotope regional pattern in granitoids from the Cachoeirinha Belt, northeast Brazil

    International Nuclear Information System (INIS)

    Sial, A.N.

    1984-01-01

    Four groups of granitoids are present within the Cachoeirinha belt and in the adjacent migmatitic basement, between 37 0 and 40 0 W long. and 7 0 and 8 0 15' S lat., States of Pernambuco and Paraiba: a) K 2 O - enriched, very porphyritic; b) a calc-alkalic slightly porphyritic group; c) group with trondjemitic affinities; and d) peralkalic group. Petrology and oxygen isotope geochemistry for over 100 samples from these groups were studied. Almost all plutons for which 5 or more samples were analyzed, exhibit a total range of gamma 18 O less than 2% o. A broad range of mean oxygen isotope composition is observed, varying from 6.93 to 12.79% o. There is a systematic regional trend in which the calc-alkalic granitoids (conceicao-type) found within the Cachoeirinha space are the most 18 O - enriched rocks (10.6 to 12.9% o) while the lowest mean gamma 18 O values (4.5 to 9.7% o) are found in the K 2 O - enriched granitoids (Itaporanga-type). Intermediate gamma 18 O values were recorded in the bodies with trondhjemitic affinities (8.9 to 9.8% o) which intruded metasediments of the Salgueiro Group and in the peralkalic granitoids of Catingueira (8.1 to 9.8% o) which intruded Cachoeirinha metamorphics. Among the potassic granitoids, mean gamma 18 O increases from Bodoco to Itaporanga (from west to east). As a whole, the W.R. gamma 18 O of these plutons correlate with the type of grade of metamorphism of the host rocks and, therefore, with the tectonic framework, increasing from those which intruded the gneiss-migmatites to those which intruded the low-grade metamorphics of the Cachoeirinha Group. The possible origin of each rock group is discussed in light of the oxygen isotope geochemistry. (Author) [pt

  14. 78 FR 11745 - Small Business Size Regulations, Small Business Innovation Research (SBIR) Program and Small...

    Science.gov (United States)

    2013-02-20

    .... As published, the final regulations contain two points where the word ``small'' was inadvertently... and procedure, Government procurement, Government property, Loan programs-business, Small businesses...

  15. The National Counterintelligence Strategy of the United States of America

    National Research Council Canada - National Science Library

    McConnell, J. M

    2007-01-01

    .... Our adversaries -- foreign intelligence services, terrorists, foreign criminal enterprises and cyber intruders -- use overt, covert, and clandestine activities to exploit and undermine US national security interests...

  16. Thermal evidence of the invasion of a stingless bee nest by a mammal

    Directory of Open Access Journals (Sweden)

    S. D. Hilário

    Full Text Available Melipona bicolor, an inhabitant of the Atlantic Rainforest, nidifies in hollows of live or dead trees. In order to study thermoregulation of a nest of this species, a temperature data logger was installed inside a hollow tree. After this, an intruder dug a hole, invaded the nest, and probably consumed its honey, pollen and bees, having remained there during three days. Thermal evidence and its behavior allowed the delimitation of a small number of suspects, wich we analized here. The intruder was a small mammal, predominantly nocturnal, that takes shelter in burrows, probably the yellow armadillo (Euphractus sexcinctus. Other evidence, if collected immediately after invasion, could precisely indicate precisely the species.

  17. Pest repelling properties of ant pheromones

    DEFF Research Database (Denmark)

    Offenberg, Joachim

    2014-01-01

    Ants control pests via predation and physical deterrence; however, ant communication is based on chemical cues which may serve as warning signals to potential prey and other intruders. The presence of ant pheromones may, thus, be sufficient to repel pests from ant territories. This mini-review sh......-review shows that four out of five tested ant species deposit pheromones that repel herbivorous prey from their host plants.......Ants control pests via predation and physical deterrence; however, ant communication is based on chemical cues which may serve as warning signals to potential prey and other intruders. The presence of ant pheromones may, thus, be sufficient to repel pests from ant territories. This mini...

  18. A numerical study of variable density flow and mixing in porous media

    Science.gov (United States)

    Fan, Yin; Kahawita, René

    1994-10-01

    A numerical study of a negatively buoyant plume intruding into a neutrally stratified porous medium has been undertaken using finite different methods. Of particular interest has been to ascertain whether the experimentally observed gravitational instabilities that form along the lower edge of the plume are reproduced in the numerical model. The model has been found to faithfully reproduce the mean flow as well as the gravitational instabilities in the intruding plume. A linear stability analysis has confirmed the fact that the negatively buoyant plume is in fact gravitationally unstable and that the stability depends on two parameters: a concentration Rayleigh number and a characteristic length scale which is dependent on the transverse dispersivity.

  19. A calculational methodology for comparing the accident, occupational, and waste-disposal hazards of fusion reactor designs

    International Nuclear Information System (INIS)

    Fetter, S.

    1985-01-01

    A methodology has been developed for calculating indices of three classes of radiological hazards: reactor accidents, occupational exposures, and waste-disposal hazards. Radionuclide inventories, biological hazard potentials (BHP), and various dose-related indices are calculated. In the case of reactor accidents, the critical, 50-year and chronic dose are computed, as well as the number of early deaths and illnesses and late cancer fatalities. For occupational exposure, the contact dose rate is calculated for several times after reactor shutdown. In the case of waste-disposal hazards, the intruder dose and the intruder hazard potential (IHP) are calculated. Sample calculations for the MARS reactor design show the usefulness of the methodology in exploring design improvements

  20. Thermal evidence of the invasion of a stingless bee nest by a mammal

    Directory of Open Access Journals (Sweden)

    Hilário S. D.

    2003-01-01

    Full Text Available Melipona bicolor, an inhabitant of the Atlantic Rainforest, nidifies in hollows of live or dead trees. In order to study thermoregulation of a nest of this species, a temperature data logger was installed inside a hollow tree. After this, an intruder dug a hole, invaded the nest, and probably consumed its honey, pollen and bees, having remained there during three days. Thermal evidence and its behavior allowed the delimitation of a small number of suspects, wich we analized here. The intruder was a small mammal, predominantly nocturnal, that takes shelter in burrows, probably the yellow armadillo (Euphractus sexcinctus. Other evidence, if collected immediately after invasion, could precisely indicate precisely the species.

  1. Some design constraints required for the use of generic software in embedded systems: Packages which manage abstract dynamic structures without the need for garbage collection

    Science.gov (United States)

    Johnson, Charles S.

    1986-01-01

    The embedded systems running real-time applications, for which Ada was designed, require their own mechanisms for the management of dynamically allocated storage. There is a need for packages which manage their own internalo structures to control their deallocation as well, due to the performance implications of garbage collection by the KAPSE. This places a requirement upon the design of generic packages which manage generically structured private types built-up from application-defined input types. These kinds of generic packages should figure greatly in the development of lower-level software such as operating systems, schedulers, controllers, and device driver; and will manage structures such as queues, stacks, link-lists, files, and binary multary (hierarchical) trees. Controlled to prevent inadvertent de-designation of dynamic elements, which is implicit in the assignment operation A study was made of the use of limited private type, in solving the problems of controlling the accumulation of anonymous, detached objects in running systems. The use of deallocator prodecures for run-down of application-defined input types during deallocation operations during satellites.

  2. Military Assistance to Domestic Consequence Management Operations in Response to a Chemical Biological Radiological, Nuclear, or High-Yield Explosive Situation

    National Research Council Canada - National Science Library

    2001-01-01

    ...) situation, Domestic CBRNE CM support encompasses both deliberate and inadvertent CBRNE situations including terrorism, acts of aggression, industrial accidents, and acts of nature, Domestic CBRNE CM...

  3. Cockpit Displays to Support Hazard Awareness in Free Flight

    Science.gov (United States)

    Wickens, Christopher D.; Carbonari, Ron; Merwin, Dave; Morphew, Ephimia; OBrien, Janelle V.

    1997-01-01

    Three experiments are described which each examine different aspects of the formatting and integration of cockpit displays of traffic information to support pilots in traffic avoidance planning. The first two experiments compared two-dimensional (coplanar) with three-dimensional (perspective) versions of a cockpit display of traffic information. In Experiment 1, 30 certified flight instructors flew a series of traffic conflict detection and avoidance maneuvers around an intruder aircraft, sometimes in the presence of a second intruder. The results revealed an advantage for the coplanar display, particularly when there was vertical intruder behavior. In Experiment 2, 17 instructors flew with the coplanar and perspective formats when weather information was either overlaid or displayed separately. Again performance was best with the coplanar display, particularly when the weather data were overlaid. The results of both experiments are also discussed in ten-ns of the traffic maneuver stereotypes exhibited by the pilots. Experiment 3 examined the benefits of the two different predictor elements used in the coplanar displays of Experiments 1 and 2. The study was carried out in a multitask context. These elements were both found to improve safety (reduce actual and predicted conflicts) and to reduce workload, although the different elements affected workload in different ways. Neither predictor element imposed a cost to concurrent task performance.

  4. Context-dependent responses to neighbours and strangers in wild European rabbits (Oryctolagus cuniculus).

    Science.gov (United States)

    Monclús, Raquel; Saavedra, Irene; de Miguel, Javier

    2014-07-01

    Territorial animals defend their territories against intruders. The level of aggression directed to intruders depends on the familiarity and/or the relative threat they pose, and it could be modified by the context of the interaction. We explored in a wild social mammal, the European rabbit (Oryctolagus cuniculus), whether residents responded more aggressively to strangers or to neighbours (dear enemy or nasty neighbour effects, respectively). We simulated the intrusion of neighbours or strangers in different parts of the territory of wild European rabbits in a suburban area in central Spain. For that, we placed faecal pellets of neighbouring or stranger rabbits in the territory of 5 rabbit colonies. Resident rabbits counter-marked preferably the odour stations with stranger odour, compared to the ones with neighbour odour, and they did not make a difference between neighbour and a non-odour control stimuli. The results suggest that rabbits show a dear enemy effect. However, repeated intrusions escalated the responses of rabbits towards neighbours. The location within the territory or the sex of the stranger did not affect the level of response. We conclude that in rabbits the relative threat posed by the intruder triggers the intensity of the interaction. Copyright © 2014 Elsevier B.V. All rights reserved.

  5. Ultrapotassic rocks geology from Salgueiro region, Pernambuco state, Brazil

    International Nuclear Information System (INIS)

    Silva Filho, A.F. da; Guimaraes, I.P.

    1990-01-01

    The Cachoeirinha-Salgueiro belt has Proterozoic age and is located in the Borborema Province, NE Brazil. The ultrapotassic rocks from Salgueiro region intrudes the Cachoeirinha-Salgueiro belt rocks. The ultrapotassics from Salgueiro region constitutes of three units; Serra do Livramento pluton, and two dyke swarms called respectively beige alkali feldspar granites and green alkali feldspar syenite/quartz-syenite. The Serra do Livramento pluton shows E-W direction, boudin shape, width between 0,15 and 2,10 km, and it is intruded into metamorphic rocks and into the Terra Nova complex. Detailed geological mapping at the Serra das Duas Irmas allowed us to establish the dyke swarm chronology. The mapping reveals seven intrusion episodes, into the Terra Nova pluton, of green alkali feldspar syenite/quartz-syenite and five episodes of bege alkali feldspar granite. They alternate between them in space and time, and there are evidence that they were intruded under the tectonic control of the Pernambuco lineament. A systematic whole-rock Rb-Sr geochronology was done in the green alkali feldspar syenite/quartz-syenite, and an age of 514,8 ± 20,3 Ma was obtained. The initial ratio is 0,710615 + 0,000441. The age obtained shows small error and an initial ratio compatible with a strong crustal contamination. (author)

  6. Safety considerations to avoid current-induced skin burns in MRI

    International Nuclear Information System (INIS)

    Knopp, M.V.; Metzner, R.; Kaick, G. van; Brix, G.; Bundesamt fuer Strahlenschutz, Oberschleissheim

    1998-01-01

    The safety aspects of radiological methods continue to evolve. In this paper we report on two cases of skin burns in MRI caused by induced electrical current. A second- and a third-degree skin burn occurred during imaging in a 1.5 T system. The electromagnetic radiofrequency field inadvertently led to electrical currents caused by a conducting loop through the extremities and trunk. Skin burns induced by electrical current may occur in extremely rare cases even with standard MR imaging protocols operating within all current safety guidelines by inadvertently forming a closed conducting loop. By avoiding focal skin to skin contact of the extremities, this extremely rare adverse event can be avoided. (orig.) [de

  7. Programme for reducing the risk factors due to prenatal exposure

    International Nuclear Information System (INIS)

    Arranz, L.; Ferrer, N.; Sastre, J.M.

    2001-01-01

    When a patient is not aware of her pregnancy, the foetus/embryo may be inadvertently irradiated during a diagnostic exploration or therapeutic intervention. The radiosensitivity of the foetus/embryo changes during the different periods of gestation. For this reason there are different risk factors for each moment at which the patient may suffer irradiation. In the past 7 years, the Department of Radiophysics and Radiation Protection has been consulted 75 times for this reason, to evaluate the dose received in the uterus. Since the establishment of a programme to avoid inadvertent irradiation of the foetus/embryo, these consultations have been reduced. This programme is based on informing the patients and on training the medical staff. (author)

  8. Radiation protection program for fetus and newborn by medical exposition during the pregnancy

    International Nuclear Information System (INIS)

    Arranz, L.; Ferrer, N.; Sastre, J. M.

    2001-01-01

    When a patient is not aware of her pregnancy, the foetus/embryo may be inadvertently irradiated during a diagnostic exploration of therapeutic treatment. The radiosensitivity of the foetus/embryo changes during the different periods of gestation. For this reason there are different risk factors for each moment at which the patient may suffer irradiation. in the past 7 years, the department of Medical Physics and Radiation Protection has been consulted 75 times for this reason, to evaluate the dose received in the uterus. Since the establishment of a programme to avoid inadvertent irradiation of the foetus/embryo, these consultations have been reduced. This programme is based on informing the patients and on training the medical staff. (Author) 15 refs

  9. Program for radiological protection of embryo and new-born baby caused by the exposition of the mother

    International Nuclear Information System (INIS)

    Arranz, Leopoldo; Ferrer, Natividad; Sastre, Jose Maria

    2001-01-01

    When a patient is not aware of her pregnancy, the foetus/embryo may be inadvertently irradiated during a diagnostic exploration or therapeutic intervention. The radiosensitivity of the foetus/embryo changes during the different periods of gestation. For this reason there are different risk factors for each moment at which the patient may suffer irradiation. In the past 7 years, the department of Radiophysics and Radiation Protection has been consulted 75 times for this reason, to evaluate the dose received in the uterus. Since the establishment of a programme to avoid inadvertent irradiation of the foetus/embryo, these consultations have been reduced. This programme is based on informing the patients and on training the medical staff. (author)

  10. Crack Mitigation in Concrete: Superabsorbent Polymers as Key to Success?

    Science.gov (United States)

    Mignon, Arn; Snoeck, Didier; Dubruel, Peter; Van Vlierberghe, Sandra; De Belie, Nele

    2017-02-28

    Cracking is a major concern in building applications. Cracks may arise from shrinkage, freeze/thawing and/or structural stresses, amongst others. Several solutions can be found but superabsorbent polymers (SAPs) seem to be interesting to counteract these problems. At an early age, the absorbed water by the SAPs may be used to mitigate autogenous and plastic shrinkage. The formed macro pores may increase the freeze/thaw resistance. The swelling upon water ingress may seal a crack from intruding fluids and may regain the overall water-tightness. The latter water may promote autogenous healing. The use of superabsorbent polymers is thus very interesting. This review paper summarizes the current research and gives a critical note towards the use of superabsorbent polymers in cementitious materials.

  11. Crack Mitigation in Concrete: Superabsorbent Polymers as Key to Success?

    Directory of Open Access Journals (Sweden)

    Arn Mignon

    2017-02-01

    Full Text Available Cracking is a major concern in building applications. Cracks may arise from shrinkage, freeze/thawing and/or structural stresses, amongst others. Several solutions can be found but superabsorbent polymers (SAPs seem to be interesting to counteract these problems. At an early age, the absorbed water by the SAPs may be used to mitigate autogenous and plastic shrinkage. The formed macro pores may increase the freeze/thaw resistance. The swelling upon water ingress may seal a crack from intruding fluids and may regain the overall water-tightness. The latter water may promote autogenous healing. The use of superabsorbent polymers is thus very interesting. This review paper summarizes the current research and gives a critical note towards the use of superabsorbent polymers in cementitious materials.

  12. Adsorber fires

    International Nuclear Information System (INIS)

    Holmes, W.

    1987-01-01

    The following conclusions are offered with respect to activated charcoal filter systems in nuclear power plants: (1) The use of activated charcoal in nuclear facilities presents a potential for deep-seated fires. (2) The defense-in-depth approach to nuclear fire safety requires that if an ignition should occur, fires must be detected quickly and subsequently suppressed. (3) Deep-seated fires in charcoal beds are difficult to extinguish. (4) Automatic water sprays can be used to extinguish fires rapidly and reliably when properly introduced into the burning medium. The second part of the conclusions offered are more like challenges: (1) The problem associated with inadvertent actuations of fire protection systems is not a major one, and it can be reduced further by proper design review, installation, testing, and maintenance. Eliminating automatic fire extinguishing systems for the protection of charcoal adsorbers is not justified. (2) Removal of automatic fire protection systems due to fear of inadvertent fire protection system operation is a case of treating the effect rather than the cause. On the other hand, properly maintaining automatic fire protection systems will preserve the risk of fire loss at acceptable levels while at the same time reducing the risk of damage presented by inadvertent operation of fire protection systems

  13. Performance assessment review for DOE LLW disposal facilities

    International Nuclear Information System (INIS)

    Wilhite, Elmer L.

    1992-01-01

    The United States Department of Energy (US DOE) disposes of low-level radioactive waste in near-surface disposal facilities. Safety of the disposal operations is evaluated for operational safety as well as long-term safety. Operational safety is evaluated based on the perceived level of hazard of the operation and may vary from a simple safety assessment to a safety analysis report. Long-term safety of all low-level waste disposal systems is evaluated through the conduct of a radiological performance assessment. The US DOE has established radiological performance objectives for disposal of low-level waste. They are to protect a member of the general public from receiving over 25 mrem/y, and an inadvertent intruder into the waste from receiving over 100 mrem/y continuous exposure or 500 mrem from a single exposure. For a disposal system to be acceptable, a performance assessment must be prepared which must be technically accurate and provide reasonable assurance that these performance objectives are met. Technical quality of the performance assessments is reviewed by a panel of experts. The panel of experts is used in two ways to assure the technical quality of performance assessment. A preliminary (generally 2 day) review by the panel is employed in the late stages of development to provide guidance on finalizing the performance assessment. The comments from this review are communicated to the personnel responsible for the performance assessment for consideration and incorporation. After finalizing the performance assessment, it is submitted for a formal review. The formal review is accomplished by a much more thorough analysis of the performance assessment over a multi-week time period. The panel then formally reports their recommendations to the US DOE waste management senior staff who make the final determination on acceptability of the performance assessment. A number of lessons have been learned from conducting several preliminary reviews of performance

  14. Special Analysis: Revision of Saltstone Vault 4 Disposal Limits (U)

    Energy Technology Data Exchange (ETDEWEB)

    Cook, J

    2005-05-26

    New disposal limits have been computed for Vault 4 of the Saltstone Disposal Facility based on several revisions to the models in the existing Performance Assessment and the Special Analysis issued in 2002. The most important changes are the use of a more rigorous groundwater flow and transport model, and consideration of radon emanation. Other revisions include refinement of the aquifer mesh to more accurately model the footprint of the vault, a new plutonium chemistry model accounting for the different transport properties of oxidation states III/IV and V/VI, use of variable infiltration rates to simulate degradation of the closure system, explicit calculation of gaseous releases and consideration of the effects of settlement and seismic activity on the vault structure. The disposal limits have been compared with the projected total inventory expected to be disposed in Vault 4. The resulting sum-of-fractions of the 1000-year disposal limits is 0.2, which indicates that the performance objectives and requirements of DOE 435.1 will not be exceeded. This SA has not altered the conceptual model (i.e., migration of radionuclides from the Saltstone waste form and Vault 4 to the environment via the processes of diffusion and advection) of the Saltstone PA (MMES 1992) nor has it altered the conclusions of the PA (i.e., disposal of the proposed waste in the SDF will meet DOE performance measures). Thus a PA revision is not required and this SA serves to update the disposal limits for Vault 4. In addition, projected doses have been calculated for comparison with the performance objectives laid out in 10 CFR 61. These doses are 0.05 mrem/year to a member of the public and 21.5 mrem/year to an inadvertent intruder in the resident scenario over a 10,000-year time-frame, which demonstrates that the 10 CFR 61 performance objectives will not be exceeded. This SA supplements the Saltstone PA and supersedes the two previous SAs (Cook et al. 2002; Cook and Kaplan 2003).

  15. Low-lying intruder state of the unbound nucleus {sup 13}Be

    Energy Technology Data Exchange (ETDEWEB)

    Kondo, Y., E-mail: kondo@phys.titech.ac.j [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Nakamura, T.; Satou, Y. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Matsumoto, T.; Aoi, N. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Endo, N. [Department of Physics, Tohoku University, 2-1-1 Katahira, Aoba, Sendai, Miyagi 980-8577 (Japan); Fukuda, N.; Gomi, T. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Hashimoto, Y. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Ishihara, M. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Kawai, S. [Department of Physics, Rikkyo University, 3-34-1 Nishi-Ikebukuro, Toshima, Tokyo 171-8501 (Japan); Kitayama, M.; Kobayashi, T.; Matsuda, Y. [Department of Physics, Tohoku University, 2-1-1 Katahira, Aoba, Sendai, Miyagi 980-8577 (Japan); Matsui, N. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Motobayashi, T. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Nakabayashi, T.; Okumura, T. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Ong, H.J.; Onishi, T.K. [Department of Physics, University of Tokyo, 7-3-1 Hongo, Bunkyo, Tokyo 113-0033 (Japan)

    2010-06-21

    An experimental study for the unbound nucleus {sup 13}Be has been performed by means of the invariant mass method via the one-neutron removal reaction {sup 1}H({sup 14}Be,{sup 12}Be+n). A resonance has been observed at 0.51(1) MeV in the relative energy (E{sub rel}) spectrum of the {sup 12}Be+n system. The transverse momentum distribution of the {sup 12}Be+n system as well as the resonance width of 0.45(3) MeV gives evidence for the p-wave nature of the resonance. A d-wave resonance has also been observed at 2.39(5) MeV in the E{sub rel} spectrum. The observation of the low-lying p-wave resonance indicates the disappearance of the N=8 magicity in the vicinity of the neutron drip line region.

  16. Salient eyes deter conspecific nest intruders in wild jackdaws (Corvus monedula).

    Science.gov (United States)

    Davidson, Gabrielle L; Clayton, Nicola S; Thornton, Alex

    2014-02-01

    Animals often respond fearfully when encountering eyes or eye-like shapes. Although gaze aversion has been documented in mammals when avoiding group-member conflict, the importance of eye coloration during interactions between conspecifics has yet to be examined in non-primate species. Jackdaws (Corvus monedula) have near-white irides, which are conspicuous against their dark feathers and visible when seen from outside the cavities where they nest. Because jackdaws compete for nest sites, their conspicuous eyes may act as a warning signal to indicate that a nest is occupied and deter intrusions by conspecifics. We tested whether jackdaws' pale irides serve as a deterrent to prospecting conspecifics by comparing prospectors' behaviour towards nest-boxes displaying images with bright eyes (BEs) only, a jackdaw face with natural BEs, or a jackdaw face with dark eyes. The jackdaw face with BEs was most effective in deterring birds from making contact with nest-boxes, whereas both BE conditions reduced the amount of time jackdaws spent in proximity to the image. We suggest BEs in jackdaws may function to prevent conspecific competitors from approaching occupied nest sites.

  17. Evaluation of Generic Issue 57: Effects of fire protection system actuation on safety-related equipment

    International Nuclear Information System (INIS)

    Lambright, J.; Bohn, M.; Lynch, J.; Ross, S.; Brosseau, D.

    1992-12-01

    Nuclear power plants have experienced actuations of fire protection systems (FPSs) under conditions for which these systems were not intended to actuate and also have experienced advertent actuations with the presence of a fire. These actuations have often damaged safety-related equipment. A review of the impact of past occurrences of both types of such events and their impact on plant safety systems, an analysis of the risk impacts of such events on nuclear power plant safety, and a cost-benefit analysis of potential corrective measures have been performed. Thirteen different scenarios leading to actuation of fire protection systems due to a variety of causes were identified. These scenarios ranged from inadvertent actuation caused by human error to hardware failure, and include seismic root causes and seismic/fire interactions. A quantification of these thirteen root causes, where applicable, was performed on generically applicable scenarios. This document, Volume 4, contains appendices E and F of this report

  18. Opinions and decisions of the Nuclear Regulatory Commission with selected orders, July 1, 1995--December 31, 1995. Volume 42, Pages 1-258

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-11-01

    This is the 42nd volume of issuances of the U.S. Nuclear Regulatory Commission (NRC) and its Atomic Safety and Licensing Boards, Administrative Law Judges, and Office Directors. This book is a reprinting, containing corrections of numerous printing errors in a previously distributed book. It covers the period from July 1, 1995 to December 31, 1995. Atomic Safety and Licensing Boards conduct adjudicatory hearings on applications to construct and operate nuclear power plants and related facilities, and issue initial decisions which, subject to internal review and appellate procedures, become the final Commission action with respect to those applications. The hardbound edition of the Nuclear Regulatory Commission Issuances is a final compilation of the monthly issuances. It includes all of the legal precedents for the agency within a 6-month period. Any opinions, decisions, denials, memoranda and orders of the Commission inadvertently omitted from the monthly editions and any corrections submitted by the NRC legal staff to the printed softbound issuances are contained in the hardbound edition.

  19. Opinions and decisions of the Nuclear Regulatory Commission with selected orders, July 1, 1995--December 31, 1995. Volume 42, Pages 1-258

    International Nuclear Information System (INIS)

    1996-01-01

    This is the 42nd volume of issuances of the U.S. Nuclear Regulatory Commission (NRC) and its Atomic Safety and Licensing Boards, Administrative Law Judges, and Office Directors. This book is a reprinting, containing corrections of numerous printing errors in a previously distributed book. It covers the period from July 1, 1995 to December 31, 1995. Atomic Safety and Licensing Boards conduct adjudicatory hearings on applications to construct and operate nuclear power plants and related facilities, and issue initial decisions which, subject to internal review and appellate procedures, become the final Commission action with respect to those applications. The hardbound edition of the Nuclear Regulatory Commission Issuances is a final compilation of the monthly issuances. It includes all of the legal precedents for the agency within a 6-month period. Any opinions, decisions, denials, memoranda and orders of the Commission inadvertently omitted from the monthly editions and any corrections submitted by the NRC legal staff to the printed softbound issuances are contained in the hardbound edition

  20. Intrinsic Tryptophan Fluorescence in the Detection and Analysis of Proteins: A Focus on Förster Resonance Energy Transfer Techniques

    Directory of Open Access Journals (Sweden)

    Amar B. T. Ghisaidoobe

    2014-12-01

    Full Text Available F resonance energy transfer (FRET occurs when the distance between a donor fluorophore and an acceptor is within 10 nm, and its application often necessitates fluorescent labeling of biological targets. However, covalent modification of biomolecules can inadvertently give rise to conformational and/or functional changes. This review describes the application of intrinsic protein fluorescence, predominantly derived from tryptophan (\\(\\uplambda_{\\textsc{ex}}\\sim\\ nm, \\(\\uplambda_{\\textsc{em}}\\sim\\ 350 nm, in protein-related research and mainly focuses on label-free FRET techniques. In terms of wavelength and intensity, tryptophan fluorescence is strongly influenced by its (or the proteinlocal environment, which, in addition to fluorescence quenching, has been applied to study protein conformational changes. Intrinsic F resonance energy transfer (iFRET, a recently developed technique, utilizes the intrinsic fluorescence of tryptophan in conjunction with target-specific fluorescent probes as FRET donors and acceptors, respectively, for real time detection of native proteins.

  1. On the scientific and ethical issues of fetal somatic gene therapy.

    Science.gov (United States)

    Coutelle, C; Rodeck, C

    2002-06-01

    Fetal somatic gene therapy is often seen as an ethically particularly controversial field of gene therapy. This review outlines the hypothesis and scientific background of in utero gene therapy and addresses some of the frequently raised questions and concerns in relation to this still experimental, potentially preventive gene therapy approach. We discuss here the choice of vectors, of animal models and routes of administration to the fetus. We address the relation of fetal gene therapy to abortion, to post-implantation selection and postnatal gene therapy and the concerns of inadvertent germ-line modification. Our views on the specific risks of prenatal gene therapy and on the particular prerequisites that have to be met before human application can be considered are presented.

  2. Qualification of Magnesium/Teflon/Viton Pyrotechnic Composition Used in Rocket Motors Ignition System

    Directory of Open Access Journals (Sweden)

    Luciana de Barros

    2016-04-01

    Full Text Available The application of fluoropolymers in high-energy-release pyrotechnic compositions is common in the space and defense areas. Pyrotechnic compositions of magnesium/Teflon/Viton are widely used in military flares and pyrogen igniters for igniting the solid propellant of a rocket motor. Pyrotechnic components are considered high-risk products as they may cause catastrophic accidents if initiated or ignited inadvertently. To reduce the hazards involved in the handling, storage and transportation of these devices, the magnesium/Teflon/Viton composition was subjected to various sensitivity tests, DSC and had its stability and compatibility tested with other materials. This composition obtained satisfactory results in all the tests, which qualifies it as safe for production, handling, use, storage and transportation.

  3. Low level light therapy and tattoos: A case report.

    Science.gov (United States)

    Ingenito, Teresa

    2016-10-01

    Physical therapists (PTs) frequently provide neuromusculoskeletal treatment for patients who incidentally may have one or more tattoos. Low level light therapy (LLLT) is one of the modalities commonly used by physical therapists to decrease pain and facilitate healing. This case report describes a 22 year old man who was given LLLT to address his complaints of musculoskeletal pain. Blistering of the skin was documented over the LLLT application site, a black tattoo. The blisters, which formed after the LLLT treatment were most likely caused by the inadvertent and unexpected heating of the iron oxides and/or the metal salts in the tattoo's black pigment. PTs should exercise caution when applying LLLT in the presence of dark tattoos. Copyright © 2016 Elsevier Ltd. All rights reserved.

  4. Group territoriality in two populations of African lions

    Science.gov (United States)

    Heinsohn

    1997-06-01

    Lionesses, Panthera leoin the Serengeti ecosystem, Tanzania, assess the odds of winning group-territorial contests by counting the number of opponents they hear roaring. They will approach intruders aggressively only if they outnumber them. Here the lionesses in the Serengeti are compared with another population living nearby but in strikingly different ecological circumstances. The lions of Ngorongoro Crater live at much higher densities owing to year-round availability of non-migratory prey species, but also suffer higher mortality from fighting. Playback experiments showed that lionesses in the crater differ from those in the Serengeti by approaching 'intruders' more quickly when the odds of winning are low. This increased aggression is interpreted in terms of the greater difficulty of holding a territory at high population density.

  5. Management of multiple intrusive luxative injuries: A case report with 7-year follow-up

    Directory of Open Access Journals (Sweden)

    Seema Thakur

    2014-01-01

    Full Text Available This report presents a case of severe intrusive luxation of multiple anterior teeth in an 11-year-old girl. The teeth were repositioned successfully by endodontic and orthodontic management. The case was monitored for 7 years. Depending on the severity of the injury, different clinical approaches for treatment of intrusive luxation may be used. Despite the variety of treatment modalities, rehabilitation of intruded teeth is always a challenge and a multidisciplinary approach is important to achieve a successful result. In this case, intruded teeth were endodontically treated with multiple calcium hydroxide dressings and repositioned orthodontically. The follow-up of such cases is very important as the repair process after intrusion is complex. After 7 years, no clinical or radiographic pathology was detected.

  6. Petrology and chemistry of Jebel Tanumah complex, Khamis Mushayt, Southern Arabian shield, Saudi Arabia

    Science.gov (United States)

    Nassief, M. O.; Ali, H. M.; Zakir, F. A.

    The mafic intrusive complex at Jebel Tanumah is located 15 km north-west of Khamis Mushayt in the southern Arabian Shield and includes olivine-bearing gabbro as well as amphibole-diopside-hornblende gabbro cumulates. These rocks have been generally metamorphosed to upper greeenschist-lower amphibolite facies. Fourteen white rock silicate analyses indicate that the majority of the rocks are calc-alkaline to tholeiitic in composition. The two major structural units in the Khamis Mushayt region identified by Coleman consist of the basement complex of Asir Mountains and the younger metamorphic rocks. Syntectonic granitic rocks intruded the antiforms characterizing the younger rocks whereas the lower parts of the synforms are intruded by post-tectonic intrusions of layered gabbros such as the one studied at Jebel Tanumah.

  7. An Alternative Method of Evaluating 1540NM Exposure Laser Damage using an Optical Tissue Phantom

    National Research Council Canada - National Science Library

    Jindra, Nichole M; Figueroa, Manuel A; Rockwell, Benjamin A; Chavey, Lucas J; Zohner, Justin J

    2006-01-01

    An optical phantom was designed to physically and optically resemble human tissue, in an effort to provide an alternative for detecting visual damage resulting from inadvertent exposure to infrared lasers...

  8. An Intelligent Tutor for Intrusion Detection on Computer Systems

    National Research Council Canada - National Science Library

    Rowe, Neil C; Schiavo, Sandra

    1998-01-01

    ... critical. We describe a tutor incorporating two programs. The first program uses artificial-intelligence planning methods to generate realistic audit files reporting actions of a variety of simulated users (including intruders...

  9. Monitored Natural Attenuation as a Remediation Strategy for Nuclear Power Plant Applications

    Science.gov (United States)

    Kim, K.; Bushart, S.

    2009-12-01

    A NRC Information Notice (IN 2006-13) was produced to inform holders of nuclear operating licenses “of the occurrence of radioactive contamination of ground water at multiple facilities due to undetected leakage from facility structures, systems, or components (SSCs) that contain or transport radioactive fluids” so that they could consider actions, as appropriate, to avoid similar problems. To reinforce their commitment to environmental stewardship the nuclear energy industry has committed to improving management of situations that have the potential to lead to the inadvertent release of radioactive fluids. This Industry Groundwater Protection Initiative, finalized in June 2007 as [NEI 07-07], calls for implementation and improvement of on-site groundwater monitoring programs and enhanced communications with stakeholders and regulators about situations related to inadvertent releases. EPRI developed its Groundwater Protection Program to provide the nuclear energy industry with the technical support needed to implement the Industry Groundwater Initiative. An objective of the EPRI Groundwater Protection Program is to provide the nuclear industry with technically sound guidance for implementing and enhancing on-site groundwater monitoring programs. EPRI, in collaboration with the EPRI Groundwater Protection Committee of utility members, developed the EPRI Groundwater Protection Guidelines for Nuclear Power Plants (EPRI Report 1015118, November 2007), which provides site-specific guidance for implementing a technically sound groundwater monitoring program. The guidance applies a graded approach for nuclear plants to tailor a technically effective and cost efficient groundwater monitoring program to the site’s hydrogeology and risk for groundwater contamination. As part of the Groundwater Protection Program, EPRI is also investigating innovative remediation technologies for addressing low-level radioactive contamination in soils and groundwater at nuclear power

  10. Risk evaluation of the alternate-3A modification to the ATWS prevention/mitigation system in a BWR-4, MARK-II power plant

    International Nuclear Information System (INIS)

    Papazoglou, I.A.; Bari, R.A.; Karol, R.; Shiu, K.

    1983-01-01

    The authors present a risk evaluation of the ATWS Alternate 3A modification proposed by NRC staff in NUREG-0460 to the ATWS prevention/mitigation system in a BWR nuclear power plant. The evaluation is done relative to three risk indices: the frequency of core damage, the expected early fatalities, and the expected latent fatalities. The ATWS prevention tree includes: the mechanical subsystem of the reactor protection system, the electrical subsystem of the reactor protection system, the recirculation pump trip and the Alternate Rod Insertion System. The mitigation tree includes: standby liquid control system, opening of the relief valves, reclosing the relief valves, failure of coolant injection, inadvertent actuation of the automatic depressurization system, inadvertent operation of high-pressure injection system and containment heat removal

  11. Lethal Consequences in an Infant with Myelomeningocele Following an Inadvertent Treatment

    Directory of Open Access Journals (Sweden)

    Xuemei Wu

    2016-01-01

    Full Text Available Myelomeningocele (MMC is a protrusion of spinal cord contents and meninges through a vertebral defect. Iatrogenic deaths of patients with MMC are rarely encountered in forensic practice. In our case, a 3-month-old female was born with a lumbosacral cyst, the size of which had been increasing gradually over age. There was no neurological, orthopedic, or urologic dysfunction. On the day of her death, she received a repetitive and rapid lumbosacral cyst puncture drainage procedure, performed by an illegal medical practitioner. Postmortem autopsy findings confirmed a diagnosis of MMC and the cause of death to be cerebellar tonsillar herniation. This is a pathetic case of preventable infant death. This report suggests that the possibility of MMC should be considered in infants born with a lumbosacral cyst, and aspiration is inadvisable. Besides, forensic autopsy has a valuable role in determining the exact cause of death, identifying, or excluding iatrogenic factors that may be relevant to death following a medical procedure. A final point is that prevention programs should be developed, especially by the health care sectors to reduce such tragedy.

  12. Anomalous concentration gradient in NaI solutions inadvertently frozen in transit

    International Nuclear Information System (INIS)

    Billinghurst, M.W.; Abrams, D.N.; Coutts, A.D.

    1990-01-01

    Therapeutic doses of iodine-131 ( 131 I) are frequently dispensed volumetrically from a stock vial containing a solution of sodium iodide. During the winter months the authors have observed that initial aliquots do not always have the same radioactive concentration as that calculated for the bulk solution. In order to evaluate the cause and extent of this problem, they prepared a stock solution of low radioactive concentration sodium iodide with the same concentration of sodium thiosulfate and pH as that in the stock therapeutic iodine vial. Aliquots of this solution were transferred to plastic tubes and were stored at various temperatures. These results clearly show that when there is a risk of freezing during transportation of therapeutic solutions of sodium iodide it is essential to physically mix the liquid once thawing is complete if therapeutic doses are to be dispensed accurately on a volume basis

  13. In situ vitrification of transuranic wastes: systems evaluation and applications assessment

    International Nuclear Information System (INIS)

    Fitzpatrick, V.F.; Brown; Buelt, J.L.; King, S.E.; Napier, B.A.; Oma, K.H.; Silviera, D.J.; Timmerman, C.L.

    1984-01-01

    In situ vitrification is an emerging technology, suitable for the stabilization of radioactive waste. In just under three years in situ vitrification has moved from a concept tested in the laboratory to an achievable reality, with a series of 18 laboratory (engineering-scale) tests and 7 field (pilot-scale) tests. A radioactive make-up site of TRU wastes and mixed fission products has been stabilized with the pilot-scale system. In this test, approximately 25 kg of contaminated soil, containing about 600 nCi/g of 239 Pu/ 241 Am, was successfully vitrified without release of radionuclides to the environment. The ISV tests have been supplemented by public and occupational exposure calculations which show that releases fall below the limits set by the federal government for both routine and accident conditions. Performance analysis has verified the process effectiveness in terms of preventing the migration of radionuclides into the biosphere in the far-distant (1000 and 10,000 year) future under an array of intrusion scenarios including inadvertent and deliberate human intrusion. Cost analyses have shown that for both Hanford and a generic site, processing costs are less than the cost of disposal of low-level waste at U.S. Department of Energy disposal sites

  14. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  15. 77 FR 30238 - Living History Flight Experience (LHFE)-Exemptions for Passenger Carrying Operations Conducted...

    Science.gov (United States)

    2012-05-22

    ... those that were inadvertently included as LHFE? (j) Should the FAA establish an Organizational... computer capable of accommodating Word and PowerPoint presentations from a compact disk (CD) or USB memory...

  16. Metagenomic covariation along densely sampled environmental gradients in the Red Sea

    KAUST Repository

    Thompson, Luke R; Williams, Gareth J; Haroon, Mohamed; Shibl, Ahmed; Larsen, Peter; Shorenstein, Joshua; Knight, Rob; Stingl, Ulrich

    2016-01-01

    functional and not taxonomic covariation patterns were conserved when comparing with an intruding water mass with different physicochemical properties. Temperature explained the most variation in each metric, followed by nitrate, chlorophyll, phosphate

  17. Large-scale experiments for the vulnerability analysis of buildings impacted and intruded by fluviatile torrential hazard processes

    Science.gov (United States)

    Sturm, Michael; Gems, Bernhard; Fuchs, Sven; Mazzorana, Bruno; Papathoma-Köhle, Maria; Aufleger, Markus

    2016-04-01

    torrent in Tyrol (Austria), are analysed in detail. A couple of buildings are entirely reconstructed within the physical scale model at the scale 1:30. They include basement and first floor and thereby all relevant openings on the building envelopes. The results from experimental modelling represent the data basis for further physics-based vulnerability analysis. Hence, the applied vulnerability analysis concept significantly extends the methods presently used in flood risk assessment. The results of the study are of basic importance for practical application, as they provide extensive information to support hazard zone mapping and management, as well as the planning of local technical protection measures.

  18. Risks assessment associated with the possibility of intrusion into the low and intermediate level waste disposal facility

    International Nuclear Information System (INIS)

    Didita, L.; Ilie, P.; Pavelescu, M.

    1997-01-01

    In post-closure performance assessment of low and intermediate level waste disposal facilities it is necessary to assess the individual risks associated with the possibility of intrusion into repository. Intruder induced disruptive events can potentially compromise the integrity of the disposal unit and result in exhumation of the waste and radionuclides migration into environment. In this way, the main routes of exposure are: -inhalation of radioactive materials by the intruder; - external gamma irradiation of the intruder, - long-term pathways resulting from the transfer of radioactive materials to the surface of the site. This paper describes the evaluation of conditional and absolute risks associated with each route of exposure as a function of time. To evaluate the risks, it is necessary to calculate the time-dependent activities of each nuclide considered. This is achieved by employing an analytic solution to the Bateman equation at specified times of evaluation. Conditional risks by inhalation, external exposure and long-term pathways and different modes of intrusion are evaluated on the basis of an annual probability of intrusion of unity. Absolute risks are calculated by scaling the user-supplied probabilities of intrusion at various times of evaluation. The evaluation of absolute risks by long-term exposure pathways involves an interpolation procedure in time. The calculations have been performed for the most important radionuclides present in low and intermediate wastes. (authors)

  19. Low temperature nuclear orientation studies of nuclei far from stability

    International Nuclear Information System (INIS)

    Brown, D.E.

    1990-01-01

    One of the major current interests in nuclear physics is to study transitional nuclei which lie between well known regions of spherical and deformed nuclei. The neutron deficient Tellurium and Iodine isotopes are examples of such nuclei. In both cases, the influence of a πg 9/2 intruder orbital is expected to be strong at low excitation energies and at A ∼120. The 120 Te decay scheme has been investigated in detail by LTNO supported by γ-γ coincidences and conversion electron spectroscopy. An interaction of the level scheme using an IBM-2 calculation which allows for mixing between the ground state and a (4p-2h) intruder state is made. The success of this calculation provides strong evidence for the existence of the intruder configuration in 120 Te. In addition, the relative electric quadrupole moments of the ground states in 120-123 I have been measured. The light Platinum isotopes are also transitional nuclei. The ground state magnetic dipole and electric quadrupole moments have been measured for 185,187 Pt which lie inside the region in which the shape transition is known to occur. An interpretation of nuclear moments and level structures in the range 179≤A≤193 using a particle plus triaxial core shows that the shape change takes place gradually via a broad region in which the nuclear shape is triaxial. (author)

  20. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    International Nuclear Information System (INIS)

    P. Bernot

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  1. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  2. Publisher Correction: A cdk1 gradient guides surface contraction waves in oocytes.

    Science.gov (United States)

    Bischof, Johanna; Brand, Christoph A; Somogyi, Kálmán; Májer, Imre; Thome, Sarah; Mori, Masashi; Schwarz, Ulrich S; Lénárt, Péter

    2018-01-10

    A Supplementary Information file from a different paper was inadvertently published with the original version of this Article. This file was replaced with the correct Supplementary Information file on 24 October 2017.

  3. Safety lock for radiography exposure device

    International Nuclear Information System (INIS)

    Gaines, T.M.

    1982-01-01

    A safety lock for securing a radiation source in a radiography exposure device is disclosed. The safety lock prevents the inadvertent extension of the radiation source from the exposure device. The exposure devices are used extensively in industry for nondestructive testing of metal materials for defect. Unnecessary exposure of the radiographer or operator occurs not infrequently due to operator's error in believing that the radiation source is secured in the exposure device when, in fact, it is not. The present invention solves this problem of unnecessary exposure by releasingly trapping the radiation source in the shield of the radiography exposure device each time the source is retracted therein so that it is not inadvertently extended therefrom without the operator resetting the safety lock, thereby releasing the radiation source. Further, the safety lock includes an indicator which indicates when the source is trapped in the exposure device and also when it is untrapped. The safety lock is so designed that it does not prevent the return of the source to the trapped, shielded position in the exposure device. Further the safety lock includes a key means for locking the radiation source in the trapped position. The key means cannot be actuated until said radiation source is in said trapped position to further insure the safety lock cannot be inadvertently locked with the source untrapped and thus still extendable from the exposure device

  4. Simple battery armor to protect against gastrointestinal injury from accidental ingestion.

    Science.gov (United States)

    Laulicht, Bryan; Traverso, Giovanni; Deshpande, Vikram; Langer, Robert; Karp, Jeffrey M

    2014-11-18

    Inadvertent battery ingestion in children and the associated morbidity and mortality results in thousands of emergency room visits every year. Given the risk for serious electrochemical burns within hours of ingestion, the current standard of care for the treatment of batteries in the esophagus is emergent endoscopic removal. Safety standards now regulate locked battery compartments in toys, which have resulted in a modest reduction in inadvertent battery ingestion; specifically, 3,461 ingestions were reported in 2009, and 3,366 in 2013. Aside from legislation, minimal technological development has taken place at the level of the battery to limit injury. We have constructed a waterproof, pressure-sensitive coating, harnessing a commercially available quantum tunneling composite. Quantum tunneling composite coated (QTCC) batteries are nonconductive in the low-pressure gastrointestinal environment yet conduct within the higher pressure of standard battery housings. Importantly, this coating technology enables most battery-operated equipment to be powered without modification. If these new batteries are swallowed, they limit the external electrolytic currents responsible for tissue injury. We demonstrate in a large-animal model a significant decrease in tissue injury with QTCC batteries compared with uncoated control batteries. In summary, here we describe a facile approach to increasing the safety of batteries by minimizing the risk for electrochemical burn if the batteries are inadvertently ingested, without the need for modification of most battery-powered devices.

  5. Simple battery armor to protect against gastrointestinal injury from accidental ingestion

    Science.gov (United States)

    Laulicht, Bryan; Deshpande, Vikram; Langer, Robert; Karp, Jeffrey M.

    2014-01-01

    Inadvertent battery ingestion in children and the associated morbidity and mortality results in thousands of emergency room visits every year. Given the risk for serious electrochemical burns within hours of ingestion, the current standard of care for the treatment of batteries in the esophagus is emergent endoscopic removal. Safety standards now regulate locked battery compartments in toys, which have resulted in a modest reduction in inadvertent battery ingestion; specifically, 3,461 ingestions were reported in 2009, and 3,366 in 2013. Aside from legislation, minimal technological development has taken place at the level of the battery to limit injury. We have constructed a waterproof, pressure-sensitive coating, harnessing a commercially available quantum tunneling composite. Quantum tunneling composite coated (QTCC) batteries are nonconductive in the low-pressure gastrointestinal environment yet conduct within the higher pressure of standard battery housings. Importantly, this coating technology enables most battery-operated equipment to be powered without modification. If these new batteries are swallowed, they limit the external electrolytic currents responsible for tissue injury. We demonstrate in a large-animal model a significant decrease in tissue injury with QTCC batteries compared with uncoated control batteries. In summary, here we describe a facile approach to increasing the safety of batteries by minimizing the risk for electrochemical burn if the batteries are inadvertently ingested, without the need for modification of most battery-powered devices. PMID:25368176

  6. A Retrospective Study of Clinical Effects of Powdered Caffeine Exposures Reported to Three US Poison Control Centers.

    Science.gov (United States)

    Beauchamp, Gillian A; Johnson, Amberly R; Crouch, Barbara I; Valento, Matthew; Horowitz, B Zane; Hendrickson, Robert G

    2016-09-01

    Anhydrous caffeine, often sold on the Internet as a powdered caffeine product, is sold as "pure caffeine" to be used as an additive to beverages and has also been used as an ingredient in energy supplement products. This is a retrospective multiple-poison center chart review of calls regarding powdered caffeine to poison centers covering Oregon, Alaska, Guam, Washington, and Utah between January 1, 2013 and June 30, 2015. There were 40 calls to three poison centers over 30 months for powdered caffeine exposure. The majority of patients were over age 19 (52.5 %; 21/40) and male (70 %; 28/40). Sixty percent (24/40) of the patients were symptomatic but only 10 % (4/40) required admission; 52.5 % (21/40) of the patient calls were for inadvertent overdose of powdered caffeine; one patient overdosed in a self-harm attempt. Powdered caffeine calls to three poison centers during a 30-month study period were rare, and severe caffeine toxicity due to exposure was found in few patients. The majority of symptoms were reported after an inadvertent powdered caffeine overdose. An analysis of calls to three poison centers for powdered caffeine found that exposures were uncommon, but did result in toxicity, and highlighted that the lack of clear dosing instructions on product packaging may place patients at risk of inadvertent overdose.

  7. Geochronology of plutonic rocks and their tectonic terranes in Glacier Bay National Park and Preserve, southeast Alaska: Chapter E in Studies by the U.S. Geological Survey in Alaska, 2008-2009

    Science.gov (United States)

    Brew, David A.; Tellier, Kathleen E.; Lanphere, Marvin A.; Nielsen, Diane C.; Smith, James G.; Sonnevil, Ronald A.

    2014-01-01

    We have identified six major belts and two nonbelt occurrences of plutonic rocks in Glacier Bay National Park and Preserve and characterized them on the basis of geologic mapping, igneous petrology, geochemistry, and isotopic dating. The six plutonic belts and two other occurrences are, from oldest to youngest: (1) Jurassic (201.6–145.5 Ma) diorite and gabbro of the Lituya belt; (2) Late Jurassic (161.0–145.5 Ma) leucotonalite in Johns Hopkins Inlet; (3) Early Cretaceous (145.5–99.6 Ma) granodiorite and tonalite of the Muir-Chichagof belt; (4) Paleocene tonalite in Johns Hopkins Inlet (65.5–55.8 Ma); (5) Eocene granodiorite of the Sanak-Baranof belt; (6) Eocene and Oligocene (55.8–23.0 Ma) granodiorite, quartz diorite, and granite of the Muir-Fairweather felsic-intermediate belt; (7) Eocene and Oligocene (55.8–23.0 Ma) layered gabbros of the Crillon-La Perouse mafic belt; and (8) Oligocene (33.9–23.0 Ma) quartz monzonite and quartz syenite of the Tkope belt. The rocks are further classified into 17 different combination age-compositional units; some younger belts are superimposed on older ones. Almost all these plutonic rocks are related to Cretaceous and Tertiary subduction events. The six major plutonic belts intrude the three southeast Alaska geographic subregions in Glacier Bay National Park and Preserve, from west to east: (1) the Coastal Islands, (2) the Tarr Inlet Suture Zone (which contains the Border Ranges Fault Zone), and (3) the Central Alexander Archipelago. Each subregion includes rocks assigned to one or more tectonic terranes. The various plutonic belts intrude different terranes in different subregions. In general, the Early Cretaceous plutons intrude rocks of the Alexander and Wrangellia terranes in the Central Alexander Archipelago subregion, and the Paleogene plutons intrude rocks of the Chugach, Alexander, and Wrangellia terranes in the Coastal Islands, Tarr Inlet Suture Zone, and Central Alexander Archipelago subregions.

  8. New level schemes with high-spin states of 105,107,109Tc

    International Nuclear Information System (INIS)

    Luo, Y.X.; Rasmussen, J.O.; Lee, I.Y.; Fallon, P.; Hamilton, J.H.; Ramayya, A.V.; Hwang, J.K.; Gore, P.M.; Zhu, S.J.; Wu, S.C.; Ginter, T.N.; Ter-Akopian, G.M.; Daniel, A.V.; Stoyer, M.A.; Donangelo, R.; Gelberg, A.

    2004-01-01

    New level schemes of odd-Z 105,107,109 Tc are proposed based on the 252 Cf spontaneous-fission-gamma data taken with Gammasphere in 2000. Bands of levels are considerably extended and expanded to show rich spectroscopic information. Spin/parity and configuration assignments are made based on determinations of multipolarities of low-lying transitions and the level analogies to the previously reported levels, and to those of the neighboring Rh isotopes. A non-yrast negative-parity band built on the 3/2 - [301] orbital is observed for the first time in 105 Tc. A positive-parity band built on the 1/2 + [431] intruder orbital originating from the π(g 7/2 /d 5/2 ) subshells and having a strong deformation-driving effect is observed for the first time in 105 Tc, and assigned in 107 Tc. A positive-parity band built on the excited 11/2 + level, which has rather low excitation energy and predominantly decays into the 9/2 + level of the ground state band, provides evidence of triaxiality in 107,109 Tc, and probably also in 105 Tc. Rotational constants are calculated and discussed for the K=1/2 intruder bands using the Bohr-Mottelson formula. Level systematics are discussed in terms of the locations of proton Fermi levels and deformations. The band crossings of yrast positive-parity bands are observed, most likely related to h 11/2 neutron alignment. Triaxial-rotor-plus-particle model calculations performed with ε=0.32 and γ=-22.5 deg. on the prolate side of maximum triaxiality yielded the best reproduction of the excitation energies, signature splittings, and branching ratios of the positive-parity bands (except for the intruder bands) of these Tc isotopes. The significant discrepancies between the triaxial-rotor-plus-particle model calculations and experiment for the K=1/2 intruder bands in 105,107 Tc need further theoretical studies

  9. 29 CFR 1917.23 - Hazardous atmospheres and substances (see also § 1917.2 Hazardous cargo, material, substance or...

    Science.gov (United States)

    2010-07-01

    ... menhaden and similar species of fish; § 1917.152 Welding, cutting, and heating (hot work); and § 1917.153...-contained breathing apparatus, which shall be utilized. (4) To prevent inadvertent employee entry into...

  10. Self-assembly of ordered graphene nanodot arrays (vol 8, 47, 2017)

    DEFF Research Database (Denmark)

    Camilli, Luca; Jørgensen, Jakob H.; Tersoff, Jerry

    2017-01-01

    An incorrect version of the Supplementary Information was inadvertently published with this article where the wrong file was included. The HTML has been updated to include the correct version of the Supplementary Information....

  11. 78 FR 3377 - Notice of Receipt of Several Pesticide Petitions Filed for Residues of Pesticide Chemicals in or...

    Science.gov (United States)

    2013-01-16

    ... acetanilide) and its metabolites containing either the 2-ethyl-6-methylaniline (EMA) or the 2-(1-hydroxyethyl... inadvertent residues of the herbicide acetochlor (2-chloro-2'-methyl- 6'-ethyl-N-ethoxymethyl acetanilide) and...

  12. Partners Vetting System (PVS)

    Data.gov (United States)

    US Agency for International Development — PVS 2.0 is a database that supports vetting of NGOs and individuals to ensure that USAID-funded assistance does not inadvertently provide support to entities or...

  13. EPA's SF6 Emission Reduction Partnership: Maximizing the Benefits of SF6 Emission Reductions for Electric Utilities

    National Research Council Canada - National Science Library

    Blackman, Jerome; Kantamaneni, Ravi

    2004-01-01

    .... Under ideal conditions, SF6 would remain contained within transmission equipment. In reality, however, SF6 is inadvertently emitted into the atmosphere as leaks develop during various stages of the equipment's life cycle...

  14. An Analysis of Security System for Intrusion in Smartphone Environment

    Directory of Open Access Journals (Sweden)

    Maya Louk

    2014-01-01

    Full Text Available There are many malware applications in Smartphone. Smartphone’s users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a MDTN process is possible and will be enabled for Smartphone environment. (b The methods are shown to be an advanced security for private sensitive data of the Smartphone user.

  15. An analysis of security system for intrusion in Smartphone environment.

    Science.gov (United States)

    Louk, Maya; Lim, Hyotaek; Lee, HoonJae

    2014-01-01

    There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone--whether for business or personal use--may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user.

  16. Recurrence models of volcanic events: Applications to volcanic risk assessment

    International Nuclear Information System (INIS)

    Crowe, B.M.; Picard, R.; Valentine, G.; Perry, F.V.

    1992-01-01

    An assessment of the risk of future volcanism has been conducted for isolation of high-level radioactive waste at the potential Yucca Mountain site in southern Nevada. Risk used in this context refers to a combined assessment of the probability and consequences of future volcanic activity. Past studies established bounds on the probability of magmatic disruption of a repository. These bounds were revised as additional data were gathered from site characterization studies. The probability of direct intersection of a potential repository located in an eight km 2 area of Yucca Mountain by ascending basalt magma was bounded by the range of 10 -8 to 10 -10 yr -1 2 . The consequences of magmatic disruption of a repository were estimated in previous studies to be limited. The exact releases from such an event are dependent on the strike of an intruding basalt dike relative to the repository geometry, the timing of the basaltic event relative to the age of the radioactive waste and the mechanisms of release and dispersal of the waste radionuclides in the accessible environment. The combined low probability of repository disruption and the limited releases associated with this event established the basis for the judgement that the risk of future volcanism was relatively low. It was reasoned that that risk of future volcanism was not likely to result in disqualification of the potential Yucca Mountain site

  17. Novel mechanism of network protection against the new generation of cyber attacks

    Science.gov (United States)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  18. New particle-hole symmetries and the extended interacting boson model

    CERN Document Server

    De Coster, C; Decroix, B; Heyde, Kris L G; Oros, A M

    1998-01-01

    We describe shape coexistence and intruder many-particle-hole (mp-nh)excitations in the extended interacting boson model EIBM and EIBM-2,combining both the particle-hole and the charge degree of freedom.Besides the concept of I-spin multiplets and subsequently $SU(4)$ multiplets, we touch upon the existence of particle-hole mixed symmetry states. We furthermore describe regular and intrudermany-particle-hole excitations in one nucleus on an equal footing, creating (annihilating) particle-hole pairs using the K-spin operatorand studying possible mixing between these states. As a limiting case,we treat the coupling of two IBM-1 Hamiltonians, each decribing the regular and intruder excitations respectively, in particular lookingat the $U(5)$-$SU(3)$ dynamical symmetry coupling. We apply such coupling scheme to the Po isotopes.

  19. Proposed Network Intrusion Detection System ‎In Cloud Environment Based on Back ‎Propagation Neural Network

    Directory of Open Access Journals (Sweden)

    Shawq Malik Mehibs

    2017-12-01

    Full Text Available Cloud computing is distributed architecture, providing computing facilities and storage resource as a service over the internet. This low-cost service fulfills the basic requirements of users. Because of the open nature and services introduced by cloud computing intruders impersonate legitimate users and misuse cloud resource and services. To detect intruders and suspicious activities in and around the cloud computing environment, intrusion detection system used to discover the illegitimate users and suspicious action by monitors different user activities on the network .this work proposed based back propagation artificial neural network to construct t network intrusion detection in the cloud environment. The proposed module evaluated with kdd99 dataset the experimental results shows promising approach to detect attack with high detection rate and low false alarm rate

  20. Cyber-security of nuclear facilities: stakes and challenges

    International Nuclear Information System (INIS)

    Marquez, T.

    2016-01-01

    Major players in the French nuclear industry have implemented the concept of cyber-resilience that aims at anticipating and identifying real threats and detecting the weaknesses of the critical installations in order to protect them more efficiently. French law imposes for some categories of installations including nuclear power plants the implementation of advanced protection solutions to reach a high standard of cyber security. Sentryo, a start-up has developed a system that allows the detection of intruders in a digital network by analysing the interactions between the nodes of the network. The intruder is detected when the interaction mapping appears to be different from a configuration considered as normal. The feedback experience shows that any function in an enterprise must be made aware of the cyber risk. (A.C.)

  1. Buried waste remediation: A new application for in situ vitrification

    International Nuclear Information System (INIS)

    Kindle, C.H.; Thompson, L.E.

    1991-04-01

    Buried wastes represent a significant environmental concern and a major financial and technological challenge facing many private firms, local and state governments, and federal agencies. Numerous radioactive and hazardous mixed buried waste sites managed by the US Department of Energy (DOE) require timely clean up to comply with state or federal environmental regulations. Hazardous wastes, biomedical wastes, and common household wastes disposed at many municipal landfills represent a significant environmental health concern. New programs and regulations that result in a greater reduction of waste via recycling and stricter controls regarding generation and disposal of many wastes will help to stem the environmental consequences of wastes currently being generated. Groundwater contamination, methane generation, and potential exposures to biohazards and chemically hazardous materials from inadvertent intrusion will continue to be potential environmental health consequences until effective and permanent closure is achieved. In situ vitrification (ISV) is being considered by the DOE as a permanent closure option for radioactive buried waste sites. The results of several ISV tests on simulated and actual buried wastes conducted during 1990 are presented here. The test results illustrate the feasibility of the ISV process for permanent remediation and closure of buried waste sites in commercial landfills. The tests were successful in immobilizing or destroying hazardous and radioactive contaminants while providing up to 75 vol % waste reduction. 6 refs., 7 figs., 5 tabs

  2. A practical tip to engage the left main coronary artery in patients presenting with aortic aneurysms

    Directory of Open Access Journals (Sweden)

    Kudret Keskin

    2017-09-01

    Full Text Available Coronary angiography in patients presenting with ascending aortic aneurysms can be challenging since standard catheters may fail to reach the left main coronary artery. A widely accepted approach is the mother-in-child catheter technique whereby a catheter with a smaller diameter is telescoped through one with a bigger diameter, a procedure that helps to lengthen the catheter. However, this technique is associated with several disadvantages such as thrombus formation within the catheters, inadvertent damage to the left main ostium, and the necessity of manipulation, which the operator may not be familiar with. Therefore, in our case we present a method, which involves the application of a regular Judkins Right 4 catheter for left main engagement. We propose that this method can be safely attempted prior to using telescoping techniques.

  3. Source zone remediation by zero valent iron technologies

    DEFF Research Database (Denmark)

    Fjordbøge, Annika Sidelmann

    at a fifth of these contaminated sites. These source zones pose a serious threat to soil and groundwater quality. Remediation of the heterogeneous source zones is challenging due to irregular downwards migration patterns in the subsurface, low aqueous solubility and matrix diffusion. To protect the soil...... and groundwater resources from long-term deterioration, the development of in situ technologies suitable for remediation of DNAPL is warranted. Currently, an array of aggressive in situ remediation technologies remediation exists. These technologies may be suitable under various site specific conditions; however......, most of them are limited by subsurface heterogeneities and/or the risk of inadvertent DNAPL displacement during field application. This thesis presents the results of an investigation of the potential for remediation of chlorinated solvent source zones by emerging zero valent iron (ZVI) based...

  4. Antioxidant Activity in the Blood and Testes of the Mottled Brown ...

    African Journals Online (AJOL)

    IJAAAR

    generation of ROS or produce these toxic metabolites as an inadvertent ... sequestering transition metals (iron, copper) ... 0.154M NaCl (Physiological Saline). The .... dependent in the male quails. ... antioxidant defence mechanisms utilized by.

  5. Floral biology and the effects of plant-pollinator interaction on ...

    African Journals Online (AJOL)

    oyelana

    2012-10-18

    Oct 18, 2012 ... interaction on pollination intensity, fruit and seed set in. Solanum ... which plants offer rewards to flower visitors and they inadvertently ... fragmentation and extinction. Therefore, the ...... Plant resources of tropical Africa 2.

  6. Size distribution and roundness of clasts within pseudotachylytes of ...

    Indian Academy of Sciences (India)

    Bhuban Mohan Behera

    2017-06-06

    Jun 6, 2017 ... alingam 2013) have intruded into the charnockites; they do not show ... Figure 3. Dark pseudotachylyte veins (Ps) within the white to pink colored charnockitic massif. ..... Geochemistry and thermodynamics of an earthquake: A.

  7. Historic perspective: prebiotics, probiotics, and other alternatives to antibiotics.

    Science.gov (United States)

    Hume, M E

    2011-11-01

    Applications of antimicrobials in food production and human health have found favor throughout human history. Antibiotic applications in agricultural and human medical arenas have resulted in tremendous increases in food animal production and historically unprecedented gains in human health protection. Successes attributed to widespread antibiotic use have been accompanied by the inadvertent emergence of antibiotic-resistant bacteria. A major problem associated with this emerging resistance is the crossover use of some antibiotics in agricultural settings as well as in the prevention and treatment of human disease. This outcome led to calls to restrict the use of human health-related antibiotics in food animal production. Calls for restricted antibiotic use have heightened existing searches for alternatives to antibiotics that give similar or enhanced production qualities as highly reliable as the antibiotics currently provided to food animals. Agricultural and scientific advances, mainly within the last 100 yr, have given us insights into sources, structures, and actions of materials that have found widespread application in our modern world. The purpose of this presentation is to provide a historic perspective on the search for what are generally known as antibiotics and alternative antimicrobials, probiotics, prebiotics, bacteriophages, bacteriocins, and phytotherapeutics.

  8. Criticality detector exclusion zone in a spent-fuel hot cell

    International Nuclear Information System (INIS)

    Kim, S.S.; Sterbentz, J.W.

    1999-01-01

    The main purpose of a criticality alarm system (CAS) is to protect personnel by detecting a criticality event (neutron radiation) and actuating an alarm system to initiate emergency response. Inadvertent criticality alarms from noncritical events, such as spurious voltage spikes or intense gamma radiation fields, can produce work cessation and time-consuming and costly event assessments and may result in harm to personnel during an evacuation. It therefore becomes a major concern to ensure that inadvertent or false criticality alarms do not occur or at least are minimized. Minimization of inadvertent criticality alarms due to intense gamma radiation emitted from spent-nuclear-fuel (SNF) elements as opposed to neutron radiation from an actual criticality event is the primary focus of this calculational and experimental study. The Irradiated Fuel Storage Facility (IFSF) located at the Idaho National Engineering and Environmental Laboratory is a government-owned, contractor-operated facility whose mission is to provide safe handling and dry storage for various types of SNFs. Although other fuel types (lower burnup) are stored in the IFSF, it is the high-burnup elements with the associated intense gamma radiation fields that have the potential to inadvertently set off the criticality alarms in the fuel-handling area adjacent to the storage vault. Typically, in the fuel-handling cave or hot cell of the IFSF, the cask lid is removed, and individual fuel elements are extracted from the cask and placed in special storage canisters. It is during the time period when fuel elements are extracted from their casks or when fully loaded canisters are moved in the hot cell that the CAS detectors are exposed to the intense gamma radiation fields from the spent fuel. The neutron detectors positioned in one of the manipulator ports are designed such that fast neutrons from a criticality event are thermalized by a polyethylene moderator, strike the scintillator detector material, and

  9. 29 CFR 1918.93 - Hazardous atmospheres and substances (See also § 1918.2).

    Science.gov (United States)

    2010-07-01

    ...; § 1918.94(e), Catch of menhaden and similar species of fish. (b) Determination of the hazard. When the...-contained breathing apparatus which shall be used for entry. (4) To prevent inadvertent employee entry into...

  10. 21 CFR 2.25 - Grain seed treated with poisonous substances; color identification to prevent adulteration of...

    Science.gov (United States)

    2010-04-01

    ... the natural color of the food seed as to make admixture of treated, denatured seeds with good food... adequately denatured by a suitable color to prevent their subsequent inadvertent use as food for man or feed...

  11. Airway injury during emergency transcutaneous airway access: a comparison at cricothyroid and tracheal sites.

    LENUS (Irish Health Repository)

    Salah, Nazar

    2009-12-01

    Oxygenation via the cricothyroid membrane (CTM) may be required in emergencies, but inadvertent tracheal cannulation may occur. In this study, we compared airway injury between the tracheal and CTM sites using different techniques for airway access.

  12. Children, Status and the Law in Nigeria

    African Journals Online (AJOL)

    FIRST LADY

    In effect, it means that children are appreciated, recognized, and regarded ... occupy in the Nigerian society and the very special recognition accorded their status ..... inadvertently over-react to minor delinquency; not doing or causing any harm.

  13. Fracture assessment for a dissimilar metal weld of low alloy steel and Ni-base alloy

    Energy Technology Data Exchange (ETDEWEB)

    Ogawa, Takuya, E-mail: takuya4.ogawa@toshiba.co.jp [Toshiba Corporation Power Systems Company, Power and Industrial Systems Research and Development Center, 8, Shinsugita-cho, Isogo-ku, Yokohama 235-8523 (Japan); Itatani, Masao; Saito, Toshiyuki; Hayashi, Takahiro; Narazaki, Chihiro; Tsuchihashi, Kentaro [Toshiba Corporation Power Systems Company, Power and Industrial Systems Research and Development Center, 8, Shinsugita-cho, Isogo-ku, Yokohama 235-8523 (Japan)

    2012-02-15

    Recently, instances of SCC in Ni-base alloy weld metal of light water reactor components have been reported. Despite the possibility of propagation of SCC crack to the fusion line between low alloy steel (LAS) of pressure vessel and Ni-base alloy of internal structure, a fracture assessment method of dissimilar metal welded joint has not been established. The objective of this study is to investigate a fracture mode of dissimilar metal weld of LAS and Ni-base alloy for development of a fracture assessment method for dissimilar metal weld. Fracture tests were conducted using two types of dissimilar metal weld test plates with semi-elliptical surface crack. In one of the test plates, the fusion line lies around the surface points of the surface crack and the crack tips at the surface points have intruded into LAS. Material ahead of the crack tip at the deepest point is Ni-base alloy. In the other, the fusion line lies around the deepest point of the surface crack and the crack tip at the deepest point has intruded into LAS. Material ahead of the crack tip at the deepest point is LAS. The results of fracture tests using the former type of test plate reveal that the collapse load considering the proportion of ligament area of each material gives a good estimation for fracture load. That is, fracture assessment based on plastic collapse mode is applicable to the former type of test plate. It is also understood that a fracture assessment method based on the elastic-plastic fracture mode is suitable for the latter type of test plate.

  14. Pilot visual acquisition of traffic : operational communications from air traffic control operational communication.

    Science.gov (United States)

    2001-05-01

    Avionics devices designed to provide pilots with graphically displayed traffic information will enable pilots to acquire and verify the identity of any intruder aircraft within the general area, either before or in accordance with a controller-issued...

  15. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  16. Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT)

    Science.gov (United States)

    2016-07-27

    munication. Unfortunately, these critical functions are routinely threatened by malware and other cyber security threats. Such threats are expected to...such as network packets, firewall logs, network diagrams, IP address ownership information, etc., to determine if sufficient evidence exists to support...circumstances, network analysts would likely need to consult additional sources of evidence not present in the simulation, such as net- work firewall

  17. Structure of intruder band in "1"1"9"-"1"2"9Xe

    International Nuclear Information System (INIS)

    Sharma, H.P.; Chakraborty, S.; Tiwary, S.S.

    2017-01-01

    Xe isotopes in A∼130 mass region are known for their variety of structural phenomena, such as, unexpected signature splitting, signature inversion, γ-vibration etc. These phenomena are associated to axialy asymmetric shape. The triaxial shape in Xe nuclei are expected to originate due to the availability of prolate driving low-Ω πh_1_1_/_2 orbital and oblate driving high-Ω νh11/2 orbital near Fermi surface. The observed experimental E (4"+)/E (2"+) value (∼2.5) also support the γ-soft nature of these nuclei. Interestingly, both proton and neutron alignments have been observed in νh_1_1_/_2 band in "1"1"9"-"1"2"5Xe and neutron alignment dominates. In "1"2"9Xe, proton alignment reported to dominate. It is also supported by TPRM calculations, although, there are no significant change in the neutron orbitals. Whether this change in the alignment is occurred at N=75 or 73 is not known. Therefore, it is interesting to understand the status of the neutron and proton alignment in "1"2"7Xe, which are not studied well. Hence, in-beam γ-ray spectroscopy of "1"2"7Xe was carried out using "1"2"2Sn("9Be, 4nγ) fusion-evaporation reaction at 48 MeV using INGA facility at Inter-University Accelerator Centre, New Delhi. Details of the analysis and results will be discussed during the conference. (author)

  18. Computational modeling and experimental characterization of indoor aerosol transport

    International Nuclear Information System (INIS)

    Konecni, Snezana; Whicker, Jeffrey J.; Martin, Richard A.

    2002-01-01

    When a hazardous aerosol or gas is inadvertently or deliberately released in an occupied facility, the airborne material presents a hazard to people. Inadvertent accidents and exposures continue to occur in Los Alamos and other nuclear facilities despite state-of-art engineering and administrative controls, and heightened diligence. Despite the obvious need in occupational settings and for homeland defense, the body of research in hazardous aerosol dispersion and control in large, complex, ventilated enclosures is extremely limited. The science governing generation, transport, inhalation, and detection of airborne hazards is lacking and must be developed to where it can be used by engineers or safety professionals in the prediction of worker exposure, in the prevention of accidents, or in the mitigation of terrorist actions. In this study, a commercial computational fluid dynamics (CFD) code, CFX5.4, and experiments were used to assess flow field characteristics, and to investigate aerosol release and transport in a large, ventilated workroom in a facility at Savannah River Site. Steady state CFD results illustrating a complex, ventilation-induced, flow field with vortices, velocity gradients, and quiet zones are presented, as are time-dependent CFD and experimental aerosol dispersion results. The comparison of response times between CFD and experimental results was favorable. It is believed that future applications of CFD and experiments can have a favorable impact on the design of ventilation (HVAC) systems and worker safety with consideration to facility costs. Ultimately, statistical methods will be used in conjunction with CFD calculations to determine the optimal number and location of detectors, as well as optimal egress routes in event of a release.

  19. Assessment of physical protection systems: EVA method

    International Nuclear Information System (INIS)

    Bernard, J.-L.; Lamotte, C.; Jorda, A.

    2001-01-01

    CEA's missions in various sectors of activity such as nuclear, defence, industrial contracts and the associated regulatory requirements, make it necessary to develop a strategy in the field of physical protection. In particular, firms having nuclear materials are subject to the July 25, 1980 law no.80-572 on the protection and control of nuclear materials. A holding permit delivered by the regulatory authority is conditioned to the protection by the operator of the nuclear materials used. In France it is the nuclear operator who must demonstrate, in the form of a security study, that potential aggressors would be neutralised before they could escape with the material. To meet these requirements, we have developed methods to assess the vulnerability of our facilities. The EVA method, the French acronym for 'Evaluation de la vulnerabilite des Acces' (access vulnerability system) allows dealing with internal and external threats involving brutal actions. In scenarios relating to external threat, the intruders get past the various barriers of our protection system, attempting to steal a large volume of material in one swoop and then escape. In the case of internal threat, the goal is the same. However, as the intruder usually has access to the material in the scope of his activities, the action begins at the level of the target. Our protection system is based on in-depth defense where the intruders are detected and then delayed in their advance towards their target to allow time for intervention forces to intercept them

  20. Research Article Special Issue

    African Journals Online (AJOL)

    pc

    2017-10-17

    Oct 17, 2017 ... or audio feedbacks. Good interface designs will inadvertently push the players to ... certain preferences based on their cultural background [5]. Thus, the ..... Journal of Operations Management, 1998, 16(4):455-469. [10] Ramli ...

  1. Anaesthetic safety of the Macintosh® oral laryngeal spray device

    African Journals Online (AJOL)

    2013-01-14

    Jan 14, 2013 ... is there a difference in the amount of local anaesthetic delivered when two ... pairwise comparisons were made among the factors using Student's t-test with Tukey's ... a dangerous outlier (Figure 1). This amount, inadvertently.

  2. Conflict resolution maneuvers during near miss encounters with cockpit traffic displays

    Science.gov (United States)

    Palmer, E.

    1983-01-01

    The benefits and liabilities associated with pilots' use of a cockpit traffic display to assess the threat posed by air traffic and to make small maneuvers to avoid situations which would result in collision avoidance advisories are experimentally studied. The crew's task was to fly a simulated wide-body aircraft along a straight course at constant altitude while intruder aircraft appeared on a variety of converging trajectories. The main experimental variables were the amount and quality of the information displayed on the intruder aircraft's estimated future position. Pilots were to maintain a horizontal separation of at least 1.5 nautical miles or a vertical separation of 500 ft, so that collision avoidance advisories would not be triggered. The results show that pilots could usually maneuver to provide the specified separation but often made course deviations greater than 1.5 nm or 500 ft.

  3. A brief review comparing the effects of sex steroids on two forms of aggression in laboratory mice.

    Science.gov (United States)

    Haug, M; Brain, P F; Kamis, A B

    1986-01-01

    This brief review examines the roles of sex steroids in two forms of "aggression" in laboratory mice. The social conflict induced in male mice by individual housing or reproductive experience was contrasted with the attack shown by small groups of female mice on lactating intruders. Gonadectomy of males largely abolishes the former response but actually augments the latter activity in male subjects. Testosterone, estradiol and 5 alpha-dihydrotestosterone all restore social conflict in gonadectomized male mice but these sex steroids inhibit attack on lactating female intruders by gonadectomized males. The data clearly confirm that there is no simple relationship between a particular hormone and "aggression." These forms of attack may serve very different functions even though they involve similar action patterns and distributions of bites on the attacked animal. A tentative discussion is included about the roles of these activities.

  4. Characteristics and its uranium metallogenic potential of the granite belt between Bange and Jiali county, tibet

    International Nuclear Information System (INIS)

    Zhao Baoguang; Wang Qin; Liu Zhipeng; Chen Yuliang; Xu Wei

    2012-01-01

    The granite belt between Bange and Jiali county is a composite batholith which intruded at multistage, it con- trolled by several groups of the fault system, the alteration is developed, with the alaskite, aplite, pegmatitic vein intruded, it is type Ⅰ in the beginning of forming, and change to type S in the late time. There is a large of geochemical anomalies of uranium (U>6.8 X 10 -6 ) in Gulu town and Sangba village, of which middle of the granite belt and Bianba county of which east of the granite belt, that anomalies area have 1200 km 2 , 800 km”2 and 1500 km 2 . All the anomalies is considered that its forming relate to batholith and its external contact, so it shows that it has favorite geological conditions for granite type uranium metallogenesis. (authors)

  5. Enemy recognition is linked to soldier size in a polymorphic stingless bee.

    Science.gov (United States)

    Grüter, Christoph; Segers, Francisca H I D; Santos, Luana L G; Hammel, Benedikt; Zimmermann, Uwe; Nascimento, Fabio S

    2017-10-01

    Many ant and termite colonies are defended by soldiers with powerful mandibles or chemical weaponry. Recently, it was reported that several stingless bee species also have soldiers for colony defence. These soldiers are larger than foragers, but otherwise lack obvious morphological adaptations for defence. Thus, how these soldiers improve colony fitness is not well understood. Robbing is common in stingless bees and we hypothesized that increased body size improves the ability to recognize intruders based on chemosensory cues. We studied the Neotropical species Tetragonisca angustula and found that large soldiers were better than small soldiers at recognizing potential intruders. Larger soldiers also had more olfactory pore plates on their antennae, which is likely to increase their chemosensory sensitivity. Our results suggest that improved enemy recognition might select for increased guard size in stingless bees. © 2017 The Author(s).

  6. Yrast-yrare interaction strength and bandcrossing frequency

    International Nuclear Information System (INIS)

    Wu, C.S.; Zeng, J.Y.

    1991-01-01

    Accurate particle-number-conserving calculation shows that in a single-j model the yrast-yrare interaction V is always strong and no periodic oscillation of V with the degree of shell filling is found, in contrast to the results obtained by the Hartree-Fock-Bogoliubov approximation. To understand the behavior of V and bandcrossing frequency ω c , the spin-alignment, seniority structure, configuration structure, and ''quasiparticle structure'' of the yrast and yrare bands are analyzed in detail. Calculation in a two-j model (high-j intruder orbits plus normal orbits of opposite parity) was also carried out to illustrate schematically that a weak yrast-yrare interaction may occur for certain single-particle level scheme. The coexistence of normal low-j orbits with high-j intruder orbits is indispensible for a sharp backbending observed in some realistic nuclei

  7. Enhancing the safety culture of non-power nuclear installations: Initiatives within the forum for nuclear cooperation in Asia

    International Nuclear Information System (INIS)

    Cameron, R.F.; Bastin, S.J.

    2002-01-01

    The development and application of safety culture principles has naturally focused on nuclear power plants and fuel cycle facilities and has been based on studies in Europe, North America, Japan and Korea. However, most radiation injuries and deaths have resulted from the mishandling of radioactive sources, inadvertent over-exposure to X-rays and criticality incidents, unrelated to nuclear power plant operations. Within the Forum on Nuclear Cooperation in Asia (FNCA), Australia has promoted initiatives to apply safety culture principles across all nuclear and radiation application activities and in a manner that is culturally appropriate for Asian countries. The major focus has been on research reactors and to a lesser extent on fuel cycle facilities. The process has been motivated by annual workshops, where participants have reported against agreed indicators and shared their experiences in initiating safety culture programmes in these non-power nuclear activities. This paper provides a summary of some of the outcomes and conclusions on the effectiveness of these initiatives and some experiences from reviews of incidents in the participating countries. (author)

  8. 7 CFR 160.34 - Responsibility of interested person.

    Science.gov (United States)

    2010-01-01

    ... 160.34 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE (CONTINUED) NAVAL STORES... incorrect certificate inadvertently to cover the contents, because of inability of the inspector to observe...

  9. 40 CFR 180.434 - Propiconazole; tolerances for residues.

    Science.gov (United States)

    2010-07-01

    ...: Commodity Parts per million Cranberry 1.0 Rice, wild, grain 0.5 (d) Indirect or inadvertent residues... 4.5 Pineapple, process residue 7.0 Pistachio 0.1 Rice, bran 15 Rice, grain 7.0 Rice, hulls 20 Rice...

  10. Role of autophagy in disease resistance and hypersensitive response-associated cell death

    DEFF Research Database (Denmark)

    Hofius, Daniel; Munch, David; Bressendorff, Simon

    2011-01-01

    Ancient autophagy pathways are emerging as key defense modules in host eukaryotic cells against microbial pathogens. Apart from actively eliminating intracellular intruders, autophagy is also responsible for cell survival, for example by reducing the deleterious effects of endoplasmic reticulum...

  11. Publisher Correction: Precision cosmology from future lensed gravitational wave and electromagnetic signals.

    Science.gov (United States)

    Liao, Kai; Fan, Xi-Long; Ding, Xuheng; Biesiada, Marek; Zhu, Zong-Hong

    2017-12-12

    The original PDF version of this Article inadvertently highlighted the author surnames and omitted the publication date. These have now been corrected in the PDF version of the Article. The HTML version was correct from the time of publication.

  12. 77 FR 40358 - Federal Management Regulation; FMR Bulletin PBS-2012-03; Redesignations of Federal Buildings...

    Science.gov (United States)

    2012-07-09

    ... Management Regulation; FMR Bulletin PBS-2012-03; Redesignations of Federal Buildings: Correction AGENCY: Public Buildings Service (PBS), General Services Administration (GSA). ACTION: Notice of a bulletin..., 2012, a bulletin announcing the designation and redesignation of three Federal buildings. Inadvertently...

  13. 76 FR 60754 - Preserving the Open Internet

    Science.gov (United States)

    2011-09-30

    ...-201] Preserving the Open Internet AGENCY: Federal Communications Commission. ACTION: Final rule..., 2011, a document establishing rules to preserve the open Internet. Inadvertently the wrong paragraph... alleging violations of the open Internet rules. Federal Communications Commission. Matt Warner, Attorney...

  14. 75 FR 37732 - National Emission Standards for Hazardous Air Pollutants for Reciprocating Internal Combustion...

    Science.gov (United States)

    2010-06-30

    ... National Emission Standards for Hazardous Air Pollutants for Reciprocating Internal Combustion Engines... hazardous air pollutants for existing stationary compression ignition reciprocating internal combustion... combustion engines. 40 CFR 63.6590 was amended by revising paragraphs (b)(1) and (3). Inadvertently...

  15. Effects of previous intrusion pressure on territorial responses in nightingales

    NARCIS (Netherlands)

    Sprau, P.; Roth, T.; Amrhrein, V.; Naguib, M.

    2014-01-01

    In territorial animals, establishing and defending a territory against rivals is commonly a prerequisite for successful reproduction. Yet, often, non-territorial males that are seeking to establish their own territory may intrude into occupied territories and persistently challenge residents in

  16. Spectroscopy of 37Ar, 36Cl and the role of fp orbitals

    International Nuclear Information System (INIS)

    Ray, Sudatta; Ray, I.; Raut, R.; Pradhan, M.K.; Kanjilal, D.; Mukherjee, A.; Bhattacharya, S.; Banerjee, P.; Goswami, A.; Saha Sarkar, M.; Kshetri, Ritesh; Ganguly, S.; Ray Basu, M.; Ganguly, G.; Chakraborty, A.; Ghugre, S.S.; Krishichayan; Deo, A.; Kumar, S.; Jain, H.C.; Mazumdar, I.; Palit, R.; Sarkar, S.

    2008-01-01

    In the present work 36 Cl and 37 Ar have been studied using gamma spectroscopic techniques. Large basis cross-shell shell model calculations have been done to understand the role of the intruder orbitals in the structure of these nuclei

  17. Work Zone Intrusion Report Interface Design

    Science.gov (United States)

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  18. Iterative approach to effective interactions in nuclei

    International Nuclear Information System (INIS)

    Heiss, W.D.

    1982-01-01

    Starting from a non-linear equation for the effective interaction in a model space, various iteration procedures converge to a correct solution irrespective of the presence of intruder states. The physical significance of the procedures and the respective solution is discussed

  19. The evolution of Interior Intrusion Detection Technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  20. International safeguards for spent fuel storage

    International Nuclear Information System (INIS)

    Kratzer, M.; Wonder, E.; Immerman, W.; Crane, F.

    1981-08-01

    This report analyzes the nonproliferation effectiveness and political and economic acceptability of prospective improvements in international safeguard techniques for LWR spent fuel storage. Although the applicability of item accounting considerably eases the safeguarding of stored spent fuel, the problem of verification is potentially serious. A number of simple gamma and neutron nondestructive assay techniques were found to offer considerable improvements, of a qualitative rather than quantitative nature, in verification-related data and information, and possess the major advantage of intruding very little on facility operations. A number of improved seals and monitors appear feasible as well, but improvements in the timeliness of detection will not occur unless the frequency of inspection is increased or a remote monitoring capability is established. Limitations on IAEA Safeguards resources and on the integration of results from material accounting and containment and surveillance remain problems