WorldWideScience

Sample records for inadvertent intruder application

  1. Inadvertent Intruder Calculatios for F Tank Farm

    Energy Technology Data Exchange (ETDEWEB)

    Koffman, L

    2005-09-12

    Savannah River National Laboratory (SRNL) has been providing radiological performance assessment analysis for Savannah River Site (SRS) solid waste disposal facilities (McDowell-Boyer 2000). The performance assessment considers numerous potential exposure pathways that could occur in the future. One set of exposure scenarios, known as inadvertent intruder analysis, considers the impact on hypothetical individuals who are assumed to inadvertently intrude onto the waste disposal site. An Automated Intruder Analysis application was developed by SRNL (Koffman 2004) that simplifies the inadvertent intruder analysis into a routine, automated calculation. Based on SRNL's experience, personnel from Planning Integration & Technology of Closure Business Unit asked SRNL to assist with inadvertent intruder calculations for F Tank Farm to support the development of the Tank Closure Waste Determination Document. Meetings were held to discuss the scenarios to be calculated and the assumptions to be used in the calculations. As a result of the meetings, SRNL was asked to perform four scenario calculations. Two of the scenarios are the same as those calculated by the Automated Intruder Analysis application and these can be calculated directly by providing appropriate inputs. The other two scenarios involve use of groundwater by the intruder and the Automated Intruder Analysis application was adapted to perform these calculations. The four calculations to be performed are: (1) A post-drilling scenario in which the drilling penetrates a transfer line. (2) A calculation of internal exposure due to drinking water from a well located near a waste tank. (3) A post-drilling calculation in which waste is introduced by irrigation of the garden with water from a well located near a waste tank. (4) A resident scenario where a house is built above transfer lines. Note that calculations 1 and 4 use sources from the waste inventory in the transfer line (given in Table 1) whereas

  2. Inadvertent Intruder Analysis For The Portsmouth On-Site Waste Disposal Facility (OSWDF)

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Frank G. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Phifer, Mark A. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2014-01-22

    The inadvertent intruder analysis considers the radiological impacts to hypothetical persons who are assumed to inadvertently intrude on the Portsmouth OSWDF site after institutional control ceases 100 years after site closure. For the purposes of this analysis, we assume that the waste disposal in the OSWDF occurs at time zero, the site is under institutional control for the next 100 years, and inadvertent intrusion can occur over the following 1,000 year time period. Disposal of low-level radioactive waste in the OSWDF must meet a requirement to assess impacts on such individuals, and demonstrate that the effective dose equivalent to an intruder would not likely exceed 100 mrem per year for scenarios involving continuous exposure (i.e. chronic) or 500 mrem for scenarios involving a single acute exposure. The focus in development of exposure scenarios for inadvertent intruders was on selecting reasonable events that may occur, giving consideration to regional customs and construction practices. An important assumption in all scenarios is that an intruder has no prior knowledge of the existence of a waste disposal facility at the site. Results of the analysis show that a hypothetical inadvertent intruder at the OSWDF who, in the worst case scenario, resides on the site and consumes vegetables from a garden established on the site using contaminated soil (chronic agriculture scenario) would receive a maximum chronic dose of approximately 7.0 mrem/yr during the 1000 year period of assessment. This dose falls well below the DOE chronic dose limit of 100 mrem/yr. Results of the analysis also showed that a hypothetical inadvertent intruder at the OSWDF who, in the worst case scenario, excavates a basement in the soil that reaches the waste (acute basement construction scenario) would receive a maximum acute dose of approximately 0.25 mrem/yr during the 1000 year period of assessment. This dose falls well below the DOE acute dose limit of 500 mrem/yr. Disposal inventory

  3. Potential impact of DOE's performance objective for protection of inadvertent intruders on low-level waste disposals at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1993-01-01

    Performance objectives for disposal of low-level radioactive waste at Department of Energy (DOE) sites include limits on radiation dose to inadvertent intruders. This paper investigates the potential impact of DOE's performance objective for protection of inadvertent intruders on the acceptability of low-level waste disposals at Oak Ridge National Laboratory (ORNL). The analysis is based on waste volumes and radionuclide inventories for recent disposals and estimated doses to an inadvertent intruder for assumed exposure scenarios. The analysis indicates that more than 99% of the total volume of waste in recent disposals meets the performance objective for inadvertent intruders, and the volume of waste found to be unacceptable for disposal is only about 16 m 3 . Therefore, DOE's performance objective for protection of inadvertent intruders probably will not have unreasonably adverse impacts on acceptable waste disposals at ORNL

  4. A proposed alternative approach for protection of inadvertent human intruders from buried Department of Energy low level radioactive wastes

    International Nuclear Information System (INIS)

    Cochran, J.R.

    1995-01-01

    The burial of radioactive wastes creates a legacy. To limit the impact of this legacy on future generations, we establish and comply with performance objectives. This paper reviews performance objectives for the long-term isolation of buried radioactive wastes; identifies regulatorly-defined performance objectives for protecting the inadvertent human intruder (IHI) from buried low-level radioactive waste (LLW); (3) discusses a shortcoming of the current approach; and (4) offers an alternative approach for protecting the IHI. This alternative approach is written specifically for the burial of US Department of Energy (DOE) wastes at the Nevada Test Site (NTS), although the approach might be applied at other DOE burial sites

  5. Optical fiber strain sensor for application in intelligent intruder detection systems

    Science.gov (United States)

    Stańczyk, Tomasz; Tenderenda, Tadeusz; Szostkiewicz, Lukasz; Bienkowska, Beata; Kunicki, Daniel; Murawski, Michal; Mergo, Pawel; Nasilowski, Tomasz

    2017-10-01

    Nowadays technology allows to create highly effective Intruder Detection Systems (IDS), that are able to detect the presence of an intruder within a defined area. In such systems the best performance can be achieved by combining different detection techniques in one system. One group of devices that can be applied in an IDS, are devices based on Fiber Optic Sensors (FOS). The FOS benefits from numerous advantages of optical fibers like: small size, light weight or high sensitivity. In this work we present a novel Microstructured Optical Fiber (MOF) characterized by increased strain sensitivity dedicated to distributed acoustic sensing for intelligent intruder detection systems. By designing the MOF with large air holes in close proximity to a fiber core, we increased the effective refractive index sensitivity to longitudinal strain. The presented fiber can be easily integrated in a floor system in order to detect any movement in the investigated area. We believe that sensors, based on the presented MOF, due to its numerous advantages, can find application in intelligent IDS.

  6. Lazy Mobile Intruders

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis

    2013-01-01

    that by communication, the malicious code can learn new information that it can use in subsequent operations, or that we may have several pieces of malicious code that can exchange information if they “meet”. To formalize both the platform and the malicious code we use the mobile ambient calculus, since it provides......We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching...... a small, abstract formalism that models the essence of mobile code. We provide a decision procedure for security against arbitrary intruder processes when the honest processes can only perform a bounded number of steps and without path constraints in communication. We show that this problem is NP-complete....

  7. Lazy Mobile Intruders

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis

    that by communication, the malicious code can learn new information that it can use in subsequent operations, or that we may have several pieces of malicious code that can exchange information if they \\meet". To formalize both the platform and the malicious code we use the mobile ambient calculus, since it provides......We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching...... a small, abstract formalism that models the essence of mobile code. We provide a decision procedure for security against arbitrary intruder ambients when the honest ambients can only perform a bounded number of steps and without path constraints in communication....

  8. Studying the effects of Bite plane application in intruding and extruding the teeth in patients with deep bite

    Directory of Open Access Journals (Sweden)

    M. Shirazi

    1987-08-01

    Full Text Available Deep bite is a major clinical problem manifested as higher than normal overbite in anterior region of the jaws. Various studies were conducted to identify the effects of using bite plan and its results. 14 subjects with deep bite were selected out of 400 students of a school who had not proximal caries and had not lost any permanent teeth with healthy periodontal condition. 8 patients were considered as case group and the 6 other as the control group. In case group, a simple labial arc with acrylic palate that caused a gap in occlusion was placed. 2 lateral radiographs were obtained both pre and post 14 months treatment period. After cephalometric analysis, due to bite plane application significant intrusion in mandibular  incisors were observed as well as elongation in both maxillary and mandibular molars.

  9. Intruder Activity Analysis under Unreliable Sensor Networks

    Energy Technology Data Exchange (ETDEWEB)

    Tae-Sic Yoo; Humberto E. Garcia

    2007-09-01

    This paper addresses the problem of counting intruder activities within a monitored domain by a sensor network. The deployed sensors are unreliable. We characterize imperfect sensors with misdetection and false-alarm probabilities. We model intruder activities with Markov Chains. A set of Hidden Markov Models (HMM) models the imperfect sensors and intruder activities to be monitored. A novel sequential change detection/isolation algorithm is developed to detect and isolate a change from an HMM representing no intruder activity to another HMM representing some intruder activities. Procedures for estimating the entry time and the trace of intruder activities are developed. A domain monitoring example is given to illustrate the presented concepts and computational procedures.

  10. Energy-efficient area coverage for intruder detection in sensor networks

    CERN Document Server

    He, Shibo; Li, Junkun

    2014-01-01

    This Springer Brief presents recent research results on area coverage for intruder detection from an energy-efficient perspective. These results cover a variety of topics, including environmental surveillance and security monitoring. The authors also provide the background and range of applications for area coverage and elaborate on system models such as the formal definition of area coverage and sensing models. Several chapters focus on energy-efficient intruder detection and intruder trapping under the well-known binary sensing model, along with intruder trapping under the probabilistic sens

  11. Intruder scenarios for site-specific waste classification

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.

    1988-01-01

    The US Department of Energy (DOE) is currently revising its low-level radioactive waste (LLW) management requirements and guidelines for waste generated at its facilities that support defense missions. Specifically, draft DOE 5820.2A, Chapter 3, describes the purpose, policy, and requirements necessary for the management of defense LLW. The draft DOE policy calls for DOE LLW operations to be managed to protect the health and safety of the public, preserve the environment, and ensure that no remedial action will be necessary after termination of operations. The requirements and guidelines apply to radioactive wastes but are also intended to apply to mixed hazardous and radioactive wastes as defined in draft DOE 5400.5, Hazardous and Radioactive Mixed Waste. The basic approach used by DOE is to establish overall performance objectives in terms of ground-water protection and public radiation dose limits and to require site-specific performance assessments to determine compliance. As a result of these performance assessments, each site shall develop waste acceptance criteria that define the allowable quantities and concentrations of specific radioisotopes. Additional limitations on waste disposal design, waste form, and waste treatment shall also be developed on a site-specific basis. As a key step in the site-specific performance assessments, an evaluation must be conducted of potential radiation doses to intruders who may inadvertently move onto a closed DOE LLW disposal site after loss of institutional controls must be conducted. This paper describes the types of intruder scenarios that should be considered when performing this step of the site-specific performance assessment

  12. Reorganization of intruder Using Ad-Hoc Network And RFID

    Directory of Open Access Journals (Sweden)

    Vishakha Hagawane

    2014-05-01

    Full Text Available This system is to develop a centralized computer application that needs to identify moving person in a specific area using wireless network. In this paper, we develop a new indoor tracking algorithm using received signal strength. The RFID is able to detect the humans and provide information about the direction of the movement. The gathered information from the node is to be given to the base station for processing. . This application is able to detect and track person, and report direction of the intruder to a central base station. In this system we design nodes through which we are able to track the person. The human intruder is detected using Zigbee.

  13. Human intruder dose assessment for deep geological disposal

    International Nuclear Information System (INIS)

    Smith, G. M.; Molinero, J.; Delos, A.; Valls, A.; Conesa, A.; Smith, K.; Hjerpe, T.

    2013-07-01

    For near-surface disposal, approaches to assessment of inadvertent human intrusion have been developed through international cooperation within the IAEA's ISAM programme. Other assessments have considered intrusion into deep geological disposal facilities, but comparable international cooperation to develop an approach for deep disposal has not taken place. Accordingly, the BIOPROTA collaboration project presented here (1) examined the technical aspects of why and how deep geological intrusion might occur; (2) considered how and to what degree radiation exposure would arise to the people involved in such intrusion; (3) identified the processes which constrain the uncertainties; and hence (4) developed and documented an approach for evaluation of human intruder doses which addresses the criteria adopted by the IAEA and takes account of other international guidance and human intrusion assessment experience. Models for radiation exposure of the drilling workers and geologists were developed and described together with compilation of relevant input data, taking into account relevant combinations of drilling technique, geological formation and repository material. Consideration has been given also to others who might be exposed to contaminated material left at the site after drilling work has ceased. The models have been designed to be simple and stylised, in accordance with international recommendations. The set of combinations comprises 58 different scenarios which cover a very wide range of human intrusion possibilities via deep drilling. (orig.)

  14. Exploring key considerations when determining bona fide inadvertent errors resulting in understatements

    Directory of Open Access Journals (Sweden)

    Chrizanne de Villiers

    2016-03-01

    Full Text Available Chapter 16 of the Tax Administration Act (28 of 2011 (the TA Act deals with understatement penalties. In the event of an ‘understatement’, in terms of Section 222 of the TA Act, a taxpayer must pay an understatement penalty, unless the understatement results from a bona fide inadvertent error. The determining of a bona fide inadvertent error on taxpayers’ returns is a totally new concept in the tax fraternity. It is of utmost importance that this section is applied correctly based on sound evaluation principles and not on professional judgement when determining if the error was indeed the result of a bona fide inadvertent error. This research study focuses on exploring key considerations when determining bona fide inadvertent errors resulting in understatements. The role and importance of tax penalty provisions is explored and the meaning of the different components in the term ‘bona fide inadvertent error’ critically analysed with the purpose to find a possible definition for the term ‘bona fide inadvertent error’. The study also compares the provisions of other tax jurisdictions with regards to errors made resulting in tax understatements in order to find possible guidelines on the application of bona fide inadvertent errors as contained in Section 222 of the TA Act. The findings of the research study revealed that the term ‘bona fide inadvertent error’ contained in Section 222 of the TA Act should be defined urgently and that guidelines must be provided by SARS on the application of the new amendment. SARS should also clarify the application of a bona fide inadvertent error in light of the behaviours contained in Section 223 of the TA Act to avoid any confusion.

  15. Design and Implementation of an Embedded Smart Intruder Surveillance System

    Directory of Open Access Journals (Sweden)

    Sabri Naseer

    2018-01-01

    Full Text Available Remote and scattered valuable and sensitive locations such as labs and offices inside university campus need efficient monitoring and warning system. As well as scattered area and belonging. This research presents a Real-Time intruder Surveillance System based on a single board computer (SBC. Thus the design and development of a cost effective surveillance management system based SBC that can be deployed efficiently in remote and scattered locations such as universities belonging. The fusion of embedded Python codes with SBC that attached to cameras, Long distance sensors, alerting circuitry and wireless module presents a novel integration based effective cost solution and enhances SBC of much flexibility of improvement and development for pervasive remote locations. The system proves the high integrity of smooth working with web application, it’s cost effective and thus can be deployed as many of units to seize and concisely covered remote and scattered area as well as university belonging and departments. The system can be administrated by a remote user sparsely or geographically away from any networked workstation. The proposed solution offers efficient stand alone, flexibility to upgrade and cheap development and installation as well as cost effective ubiquitous surveillance solution. In conclusion, the system acceptable boundaries of successful intruder recognition and warning alert are computed between 1m and 3m distance of intruder from system camera. Recognition rate of 95% and 83% are achieved and the successful warning alert were in the range of 86-97%.

  16. Detection of Intelligent Intruders in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yun Wang

    2016-01-01

    Full Text Available Most of the existing research works on the intrusion detection problem in a wireless sensor network (WSN assume linear or random mobility patterns in abstracting intruders’ models in traversing the WSN field. However, in real-life WSN applications, an intruder is usually an intelligent mobile robot with environment learning and detection avoidance capability (i.e., the capability to avoid surrounding sensors. Due to this, the literature results based on the linear or random mobility models may not be applied to the real-life WSN design and deployment for efficient and effective intrusion detection in practice. This motivates us to investigate the impact of intruder’s intelligence on the intrusion detection problem in a WSN for various applications. To be specific, we propose two intrusion algorithms, the pinball and flood-fill algorithms, to mimic the intelligent motion and behaviors of a mobile intruder in detecting and circumventing nearby sensors for detection avoidance while heading for its destination. The two proposed algorithms are integrated into a WSN framework for intrusion detection analysis in various circumstances. Monte Carlo simulations are conducted, and the results indicate that: (1 the performance of a WSN drastically changes as a result of the intruder’s intelligence in avoiding sensor detections and intrusion algorithms; (2 network parameters, including node density, sensing range and communication range, play a crucial part in the effectiveness of the intruder’s intrusion algorithms; and (3 it is imperative to integrate intruder’s intelligence in the WSN research for intruder detection problems under various application circumstances.

  17. An intruder model for verifying liveness in security protocols

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi

    2006-01-01

    We present a process algebraic intruder model for verifying a class of liveness properties of security protocols. For this class, the proposed intruder model is proved to be equivalent to a Dolev-Yao intruder that does not delay indefinitely the delivery of messages. In order to prove the

  18. An Intruder Model for Verifying Termination in Security Protocols

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    We formally describe an intruder that is suitable for checking fairness properties of security protocols. The intruder is proved to be equivalent to the Dolev-Yao intruder that respects the resilient communication channels assumption, in the sense that, if a fairness property holds in one of these

  19. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    Energy Technology Data Exchange (ETDEWEB)

    Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

  20. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Trauth, K.M.; Hora, S.C.; Guzowski, R.V.

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation

  1. Processor Instructions Execution Models in Computer Systems Supporting Hardware Virtualization When an Intruder Takes Detection Countermeasures

    OpenAIRE

    A. E. Zhukov; I. Y. Korkin; B. M. Sukhinin

    2012-01-01

    We are discussing processor modes switching schemes and analyzing processor instructions execution in the cases when a hypervisor is present in the computer or not. We determine processor instructions execution latency statistics which are applicable for these hypervisors detection when an intruder is modifying time stamp counter.

  2. Capturing intruders based on Voronoi diagrams assisted by information networks

    Directory of Open Access Journals (Sweden)

    Jonghoek Kim

    2017-01-01

    Full Text Available We consider a scenario of deploying multiple robots to capture all intruders in a cluttered workspace with many obstacles. Here, we say that a robot captures an intruder in the case where the intruder is within the maximum range of a weapon on the robot. All robots use the Voronoi diagram as the topological map of the workspace. Due to obstacles, intruders are confined to move along a passage between obstacles. Suppose the weapons on every robot are powerful enough to cover a passage in the workspace. Then, we can consider a simplified scenario such that robots and intruders are restricted to stay on the Voronoi diagram. We assume that a robot can detect the position of any intruder using the information network. This article presents an intruder capturing strategy that is robust to time delay in data transfer using the network. Our strategy does not require the localization of a node or a robot. Based on this strategy, we provide an upper bound for the minimum number of robots required to capture all intruders on a general graph, which leads to a result of the Voronoi diagram. Lastly, we provide MATLAB (version 7.10.0 R2010a simulations to verify the effectiveness of our capturing strategy.

  3. Intruder Motion in Two-Dimensional Shaken Granular Beds

    International Nuclear Information System (INIS)

    Ma Huan-Ping; Lv Yong-Jun; Zheng Ning; Shi Qing-Fan; Li Liang-Sheng

    2014-01-01

    The dynamical behavior of an intruder immersed in a two-dimensional shaken granular bed is experimentally investigated. With two types of background particles, f−Γ phase diagrams depicting the intruder's motion are measured and compared. It is found that even with the same size and density ratio of the intruder to the background particles, the intruder exhibits a distinct behavior at given vibrational conditions: rising behavior in one granular bed; sinking behavior in another granular bed. We slightly tune the size and density ratio to confirm the reliability of the experimental results. In addition, we examine the influences of interstitial air, convection and the initial position on the intruder's motion, speculating that the opposite motion could be traced to the material properties of the background particles

  4. On the submerging of a spherical intruder into granular beds

    Directory of Open Access Journals (Sweden)

    Wu Chuan-Yu

    2017-01-01

    Full Text Available Granular materials are complex systems and their mechanical behaviours are determined by the material properties of individual particles, the interaction between particles and the surrounding media, which are still incompletely understood. Using an advanced discrete element method (DEM, we simulate the submerging process of a spherical projectile (an intruder into granular materials of various properties with a zero penetration velocity (i.e. the intruder is touching the top surface of the granular bed and released from stationary and examine its settling behaviour. By systematically changing the density and size of the intruder and the particle density (i.e. the density of the particles in the granular bed, we find that the intruder can sink deep into the granular bed even with a zero penetration velocity. Furthermore, we confirm that under certain conditions the granular bed can behave like a Newtonian liquid and the submerging intruder can reach a constant velocity, i.e. the terminal velocity, identical to the settling of a sphere in a liquid, as observed experimentally. A mathematical model is also developed to predict the maximum penetration depth of the intruder. The model predictions are compared with experimental data reported in the literature,good agreement was obtained, demonstrating the model can accurately predict the submerging behaviour of the intruder in the granular media.

  5. On the submerging of a spherical intruder into granular beds

    Science.gov (United States)

    Wu, Chuan-Yu; Zhang, Ling; Chen, Lan

    2017-06-01

    Granular materials are complex systems and their mechanical behaviours are determined by the material properties of individual particles, the interaction between particles and the surrounding media, which are still incompletely understood. Using an advanced discrete element method (DEM), we simulate the submerging process of a spherical projectile (an intruder) into granular materials of various properties with a zero penetration velocity (i.e. the intruder is touching the top surface of the granular bed and released from stationary) and examine its settling behaviour. By systematically changing the density and size of the intruder and the particle density (i.e. the density of the particles in the granular bed), we find that the intruder can sink deep into the granular bed even with a zero penetration velocity. Furthermore, we confirm that under certain conditions the granular bed can behave like a Newtonian liquid and the submerging intruder can reach a constant velocity, i.e. the terminal velocity, identical to the settling of a sphere in a liquid, as observed experimentally. A mathematical model is also developed to predict the maximum penetration depth of the intruder. The model predictions are compared with experimental data reported in the literature,good agreement was obtained, demonstrating the model can accurately predict the submerging behaviour of the intruder in the granular media.

  6. Inadvertent polychlorinated biphenyls in commercial paint pigments.

    Science.gov (United States)

    Hu, Dingfei; Hornbuckle, Keri C

    2010-04-15

    A polychlorinated biphenyl (PCB) that was not produced as part of the Aroclor mixtures banned in the 1980s was recently reported in air samples collected in Chicago, Philadelphia, the Arctic, and several sites around the Great Lakes. In Chicago, the congener 3,3'-dichlorobiphenyl or PCB11 was found to be the fifth most concentrated congener and ubiquitous throughout the city. The congener exhibited strong seasonal concentration trends that suggest volatilization of this compound from common outdoor surfaces. Due to these findings and also the compound's presence in waters that received waste from paint manufacturing facilities, we hypothesized that PCB11 may be present in current commercial paint. In this study we measured PCBs in paint sold on the current retail market. We tested 33 commercial paint pigments purchased from three local paint stores. The pigment samples were analyzed for all 209 PCB congeners using gas chromatography with tandem mass spectrometry (GC-MS/MS). More than 50 PCB congeners including several dioxin-like PCBs were detected, and the PCB profiles varied due to different types of pigments and different manufacturing processes. PCB congeners were detected in azo and phthalocyanine pigments which are commonly used in paint but also in inks, textiles, paper, cosmetics, leather, plastics, food and other materials. Our findings suggest several possible mechanisms for the inadvertent production of specific PCB congeners during the manufacturing of paint pigments.

  7. Inadvertent Polychlorinated Biphenyls in Commercial Paint Pigments†

    Science.gov (United States)

    2009-01-01

    A polychlorinated biphenyl (PCB) that was not produced as part of the Aroclor mixtures banned in the 1980s was recently reported in air samples collected in Chicago, Philadelphia, the Arctic, and several sites around the Great Lakes. In Chicago, the congener 3,3′-dichlorobiphenyl or PCB11 was found to be the fifth most concentrated congener and ubiquitous throughout the city. The congener exhibited strong seasonal concentration trends that suggest volatilization of this compound from common outdoor surfaces. Due to these findings and also the compound’s presence in waters that received waste from paint manufacturing facilities, we hypothesized that PCB11 may be present in current commercial paint. In this study we measured PCBs in paint sold on the current retail market. We tested 33 commercial paint pigments purchased from three local paint stores. The pigment samples were analyzed for all 209 PCB congeners using gas chromatography with tandem mass spectrometry (GC-MS/MS). More than 50 PCB congeners including several dioxin-like PCBs were detected, and the PCB profiles varied due to different types of pigments and different manufacturing processes. PCB congeners were detected in azo and phthalocyanine pigments which are commonly used in paint but also in inks, textiles, paper, cosmetics, leather, plastics, food and other materials. Our findings suggest several possible mechanisms for the inadvertent production of specific PCB congeners during the manufacturing of paint pigments. PMID:19957996

  8. APPROACH TO SYNTHESIS OF PASSIVE INFRARED DETECTORS BASED ON QUASI-POINT MODEL OF QUALIFIED INTRUDER

    Directory of Open Access Journals (Sweden)

    I. V. Bilizhenko

    2017-01-01

    Full Text Available Subject of Research. The paper deals with synthesis of passive infra red (PIR detectors with enhanced detection capability of qualified intruder who uses different types of detection countermeasures: the choice of specific movement direction and disguise in infrared band. Methods. We propose an approach based on quasi-point model of qualified intruder. It includes: separation of model priority parameters, formation of partial detection patterns adapted to those parameters and multi channel signal processing. Main Results. Quasi-pointmodel of qualified intruder consisting of different fragments was suggested. Power density difference was used for model parameters estimation. Criteria were formulated for detection pattern parameters choice on the basis of model parameters. Pyroelectric sensor with nine sensitive elements was applied for increasing the signal information content. Multi-channel processing with multiple partial detection patterns was proposed optimized for detection of intruder's specific movement direction. Practical Relevance. Developed functional device diagram can be realized both by hardware and software and is applicable as one of detection channels for dual technology passive infrared and microwave detectors.

  9. Description of intruded states in a weak-coupling basis

    International Nuclear Information System (INIS)

    Arenas Peris, G.E.

    1989-01-01

    The systematics of intruder states is described in terms of a particle-hole weak-coupling basis, the first-order correction being then reduced to the monopole component of the interaction. The necessary matrix elements can be obtained from experimental data by using a model-consistent method. Calculations are performed for intruder states in the lead region as well as for the Zr isotopes. The agreement with the experimental data is striking in both cases. (Author) [es

  10. How sand grains stop a high speed intruder

    Science.gov (United States)

    Behringer, Robert

    When a speeding intruder impacts on a granular material, it comes rapidly to rest after penetrating only a modest distance. Empirical dynamical models, dating to the 19th century (if not earlier), describe the drag on the intruder in terms of two types of depth-dependent forces: one a static force, which also includes gravity, and the other a collisional force proportional to the square of the instantaneous speed of the intruder. What processes occur in the material to so quickly decelerate the intruder? We address this question through experiments and simulations (work of Lou Kondic and collaborators). We first probe the granular response using quasi-two-dimensional granular materials consisting of photoelastic discs. When such a particle experiences a force, it appears bright under cross-polarized illumination. High speed video reveals dynamic force transmission into the material along force chains that form in response to the intruder motion. These chains are nearly normal to the intruder surface, implying that collisional rather than frictional forces dominate the momentum transfer from intruder to grains. These observations allow the formation of a collision-based model that correctly captures the collisional drag force for both 2D and 3D intruders of a variety of shapes. This talk will develop a collisional picture of impact, and also explore the change in the system response as the impact speed increases. Experimental collaborators include Abe Clark, Cacey Stevens Bester, and Alec Petersen. This work supported by DTRA, NSF Grant DMR1206351, NASA Grant NNX15AD38G, and the William M. Keck Foundation.

  11. Intruder states at the N=20 shell closure

    International Nuclear Information System (INIS)

    Heyde, K.

    1991-01-01

    It is indicated that mp-mh (multiple) excitations across closed shells can occur at low energy throughout the nuclear mass region. Besides the 4p-4h, 8p-8h configurations, that are deformed, coexisting low-lying excitations are mainly observed for light N=Z nuclei. A new class of 2p-2h intruder O + state is shown to exist in nuclei where a neutron excess is present. In the latter cases, the proton-neutron interaction energy between the excited 2p-2h configuration and the open shell accounts for a very specific mass dependence in the intruder excitation energy. The experimental evidence that corroborates the idea of intruder states will be given. (G.P.) 28 refs.; 13 figs

  12. Side-by-side intruders within a granular flow

    Science.gov (United States)

    Caballero-Robledo, Gabriel; Cuellar-Galan, Eli A.; Clemente-Lopez, Cesar L.; Malaga, Carlos; Mandujano Sanchez, Francisco J.; Acevedo-Escalante, Manuel F.

    Lift and drag forces on side-by-side intruders within a granular flow are studied using experiments, numerical simulations and a hydrodynamic model. Regimes of attractive and repulsive lift forces are found as a function of the separation of the intruders and flow velocity. The origin of such forces is investigated by correlating them to differences in the mean value and fluctuations of flow velocity in the regions around the intruders. Numerically, our three dimensional system is studied through Discrete Element Particle simulations adapted to use a Graphics Processing Unit (GPU). The hydrodynamic model that we apply to describe the system is kinetic theory extended for dense granular flow. This work has been supported by Conacyt, Mexico, under Grant Fronteras de la Ciencia 2015-02-1178.

  13. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  14. The Star Wars Kid and the Bedroom Intruder

    DEFF Research Database (Denmark)

    Christensen, Jørgen Riber

    2011-01-01

    Jørgen Riber Christensen's article Star Wars Kid and the Bedroom Intruder looks at how people may unexpectedly become icons of the Internet, through a transgression of the private sphere. Surveillance and celebrity is revealed to be bound together with a disciplinary effect, at the same time...

  15. Inadvertent transarterial insertion of atrial and ventricular defibrillator leads.

    Science.gov (United States)

    Issa, Ziad F; Rumman, Syeda S; Mullin, James C

    2009-01-01

    Inadvertent placement of pacemaker and implantable cardioverter-defibrillator (ICD) leads in the left ventricle (LV) is a rare but well-recognized complication of device implantation [1]. We report a case of inadvertent transarterial implantation of dual-chamber ICD leads; the ventricular lead positioned in the LV and the atrial lead positioned in the aortic root. The tip of the atrial lead migrated across the aortic wall and captured the epicardial surface of the left atrium. The diagnosis was made 5 years after the implantation procedure with no apparent adverse events directly related to left heart lead placement.

  16. Inadvertent intrathecal use of ionic contrast agent

    Energy Technology Data Exchange (ETDEWEB)

    Leede, H. van der; Jorens, P.G. [Department of Intensive Care Medicine, University Hospital of Antwerp, Wilrijkstraat 10, 2650 Edegem (Belgium); Parizel, P. [Department of Radiology, University Hospital of Antwerp, Wilrijkstraat 10, 2650 Edegem (Belgium); Cras, P. [Department of Neurology, University Hospital of Antwerp, Wilrijkstraat 10, 2650 Edegem (Belgium)

    2002-07-01

    Intrathecal administration of ionic contrast media may cause severe and fatal neurotoxic reactions due to their hyperosmolarity and ionic nature. They are therefore strictly contraindicated for all radiologic applications involving the central nervous system (e.g., myelography). We present a case in which ioxitalamate was accidentally injected intrathecally. The patient recovered completely due to a combination of the different therapeutic options reported in the literature, including early mechanical ventilation and neuromuscular paralysis, aggressive control of seizures, elevation of head and trunk to prevent cephalad migration of contrast, steroids, cerebrospinal fluid drainage and lavage and prophylactic antibiotics. (orig.)

  17. Inadvertent intrathecal use of ionic contrast agent

    International Nuclear Information System (INIS)

    Leede, H. van der; Jorens, P.G.; Parizel, P.; Cras, P.

    2002-01-01

    Intrathecal administration of ionic contrast media may cause severe and fatal neurotoxic reactions due to their hyperosmolarity and ionic nature. They are therefore strictly contraindicated for all radiologic applications involving the central nervous system (e.g., myelography). We present a case in which ioxitalamate was accidentally injected intrathecally. The patient recovered completely due to a combination of the different therapeutic options reported in the literature, including early mechanical ventilation and neuromuscular paralysis, aggressive control of seizures, elevation of head and trunk to prevent cephalad migration of contrast, steroids, cerebrospinal fluid drainage and lavage and prophylactic antibiotics. (orig.)

  18. Inadvertent doping through nutritional supplements is a reality | van ...

    African Journals Online (AJOL)

    ... contaminated with banned substances and that inadvertent doping through nutritional supplement use is a reality for athletes. The sporting community should therefore be aware that supplements might contain anabolic androgenic steroids and stimulants that are not declared on the labels. SA Sports Medicine Vol.16(2) ...

  19. Inadvertent doping through nutritional supplements is a reality

    African Journals Online (AJOL)

    Enrique

    ephedrines and caffeine. Conclusion. The results showed that approximately 7% of supplements tested may be mislabelled or contaminat- ed with banned substances and that inadvertent doping through nutritional supplement use is a reality for athletes. The sporting community should therefore be aware that supplements ...

  20. Inadvertent presence of genetically modified elements in maize food ...

    African Journals Online (AJOL)

    Kenya has a biosafety law and has tested genetically modified (GM) maize under confinement and containment, but has neither released nor commercialized any GM crop. This study assessed various maize food products from the Kenyan farms and markets for the inadvertent presence of GMOs. It assessed the possibility ...

  1. Preventing Inadvertent Placement of Foley Catheter into Prostatic ...

    African Journals Online (AJOL)

    Percutaneous suprapubic trocar cystostomy (SPC) is often needed to drain the bladder when urethral catheterization either fails or is not advisable.[1] It is ... vertical or slightly tilting its tip toward umbilicus during foley placement, prevents the inadvertent migration of catheter into prostatic urethra and further complications.

  2. Managing Inadvertent Arterial Catheterization During Central Venous Access Procedures

    International Nuclear Information System (INIS)

    Nicholson, Tony; Ettles, Duncan; Robinson, Graham

    2004-01-01

    Purpose: Approximately 200,000 central venous catheterizations are carried out annually in the National Health Service in the United Kingdom. Inadvertent arterial puncture occurs in up to 3.7%. Significant morbidity and death has been reported. We report on our experience in the endovascular treatment of this iatrogenic complication. Methods: Retrospective analysis was carried out of 9 cases referred for endovascular treatment of inadvertent arterial puncture during central venous catheterization over a 5 year period. Results: It was not possible to obtain accurate figures on the numbers of central venous catheterizations carried out during the time period. Five patients were referred with carotid or subclavian pseudoaneurysms and hemothorax following inadvertent arterial catheter insertion and subsequent removal. These patients all underwent percutaneous balloon tamponade and/or stent-graft insertion. More recently 4 patients were referred with the catheter still in situ and were successfully treated with a percutaneous closure device. Conclusion: If inadvertent arterial catheterization during central venous access procedures is recognized and catheters removed, sequelae can be treated percutaneously. However, once the complication is recognized it is better to leave the catheter in situ and seal the artery percutaneously with a closure device

  3. Sexual aggression by intruders in hooded crow Corvus cornix

    OpenAIRE

    Zduniak, Piotr; Kosicki, Jakub Z.; Yosef, Reuven

    2015-01-01

    The hooded crow Corvus cornix is a west Palaearctic, solitary nesting, monogamous corvid. In the breeding season, populations are characterized by a social organization wherein breeding pairs are territorial and non-breeding individuals, called floaters, live in flocks. During a study of the breeding ecology of the hooded crow, conducted in a protected flooded area, we monitored nests with video cameras. We recorded two separate incidents when intruders attacked a female at the nest. We belie...

  4. Closure Using a Surgical Closure Device of Inadvertent Subclavian Artery Punctures During Central Venous Catheter Placement

    International Nuclear Information System (INIS)

    Berlet, Matthew H.; Steffen, Diana; Shaughness, George; Hanner, James

    2001-01-01

    Severe complications can and do occur when central venous catheters are inadvertently placed into subclavian arteries. Two cases are discussed that describe how these inadvertent arterial punctures can be closed using the Perclose device (Abbott Laboratories, Redwood City, CA, USA)

  5. Field Measurements of Inadvertent Ingestion Exposure to Metals.

    Science.gov (United States)

    Gorman Ng, Melanie; MacCalman, Laura; Semple, Sean; van Tongeren, Martie

    2017-11-10

    The determinants of inadvertent occupational ingestion exposure are poorly understood, largely due to a lack of available exposure measurement data. In this study, perioral exposure wipes were used as a surrogate for inadvertent ingestion exposure to measure exposure to eight metals (chromium, nickel, aluminium, cobalt, lead, arsenic, manganese, and tin) among 38 workers at 5 work sites in the UK. This work was done alongside a previously reported observational study of hand/object-to-mouth contact frequency. Systematic wipes of the perioral area, and of both hands were taken with proprietary cellulose wipes pre-moistened with deionized water. Measurements were taken at the beginning, middle and end of the shift. Mixed-effect models of exposure measurements were built with area of skin sampled, time during shift, and job group entered as fixed effects and worker identification as a random effect. Linear regression modelling was used to study the effect of hand/object-to-mouth contact frequency on perioral exposure, adjusting for the measured exposure on the hand and observed respirator use. Hand and perioral exposure measurements were correlated with one another (r = 0.79) but mass per unit area exposure was significantly higher on the perioral area than on the hands for seven of the metals (at P exposure, but hand exposure was significantly positively related to perioral exposure and workers who used respirators had significantly higher perioral exposure than those who did not. The results suggest the levels of exposure on the hand and respirator use are important determinants of potential inadvertent ingestion exposure. The results did not demonstrate a relationship between perioral exposure and hand-to-mouth contact frequency. Perioral wipe sampling may be a useful surrogate measure for exposure by the inadvertent ingestion route, but further research is required to confirm the link between perioral levels and actual exposure, measured using biological

  6. Inadvertent epidural injection of drugs for intravenous use. A review.

    Science.gov (United States)

    Beckers, A; Verelst, P; van Zundert, A

    2012-01-01

    The frequency of inadvertent injection of drugs in the epidural space is probably underestimated and underreported, but it can cause serious morbidity and possibly mortality. The aim of this review is to collate reported incidents of this type, to describe the potential mechanisms of occurrence and to identify possible therapeutic solutions. We searched into medical databases and reviewed reference lists of papers retrieved. A list is reported of more than 50 drugs that were inadvertently injected into the epidural space. This list includes drugs which produce no, little or short-lasting neurological deficits, but also includes drugs that may be more etching and can result in temporary or even permanent neurological deficit. Most drugs do not lead to sequelae other than pain during injection or transient neurological complaints. Other drugs may have more deleterious consequences, such as paraplegia. Both the dose of the inadvertent injected drug and the time frame play an important role in the patient's outcome. "Syringe swap", "ampoule error", and epidural/intravenous line confusion due to inaccurate or absent colour coding of epidural catheters were the main sources of error. Preventive strategies, including non Luer-lock epidural injection ports, might increase safety.

  7. Probability of inadvertent operation of electrical components in harsh environments

    International Nuclear Information System (INIS)

    Knoll, A.

    1989-01-01

    Harsh environment, which means humidity and high temperature, may and will affect unsealed electrical components by causing leakage ground currents in ungrounded direct current systems. The concern in a nuclear power plant is that such harsh environment conditions could cause inadvertent operation of normally deenergized components, which may have a safety-related isolation function. Harsh environment is a common cause failure, and one way to approach the problem is to assume that all the unsealed electrical components will simultaneously and inadvertently energize as a result of the environmental common cause failure. This assumption is unrealistically conservative. Test results indicated that insulating resistences of any terminal block in harsh environments have a random distribution in the range of 1 to 270 kΩ, with a mean value ∼59 kΩ. The objective of this paper is to evaluate a realistic conditional failure probability for inadvertent operation of electrical components in harsh environments. This value will be used thereafter in probabilistic safety evaluations of harsh environment events and will replace both the overconservative common cause probability of 1 and the random failure probability used for mild environments

  8. Oblate deformation and intruder configuration in 194,195Bi

    International Nuclear Information System (INIS)

    Mukherjee, G.; Banerjee, K.; Banerjee, S.R.; Basu, S.K.; Bhattacharya, C.; Bhattacharya, S.; Bhattacharya, Srijit; Bhattacharjee, T.; Chanda, S.; Dey, A.; Gupta, D.; Meena, J.K.; Mukhopadhyay, S.; Rana, T.K.; Bhattacharya, Sudeb; Ganguly, S.; Goswami, A.; Kshetri, R.; Pradhan, M.K.; Raut, R.; Dey, G.

    2006-01-01

    The experimental information on 194,195 Bi are very scarce compared to its neighbouring isotopes. Only 6 levels above the ground state band of 195 Bi, based on 9/2, are known with tentative spin parity assignments. Only two low energy gamma rays above the 10 isomeric state are known in 194 Bi. It is interesting not only to extend the presently known bands to higher spins, beyond band crossing but also to search for the intruder quasiparticle configurations to get a clear idea about the structure of these nuclei

  9. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Directory of Open Access Journals (Sweden)

    Ana F. Sequeira

    2015-06-01

    Full Text Available Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.

  10. Localization Capability of Cooperative Anti-Intruder Radar Systems

    Directory of Open Access Journals (Sweden)

    Mauro Montanari

    2008-06-01

    Full Text Available System aspects of an anti-intruder multistatic radar based on impulse radio ultrawideband (UWB technology are addressed. The investigated system is composed of one transmitting node and at least three receiving nodes, positioned in the surveillance area with the aim of detecting and locating a human intruder (target that moves inside the area. Such systems, referred to also as UWB radar sensor networks, must satisfy severe power constraints worldwide imposed by, for example, the Federal Communications Commission (FCC and by the European Commission (EC power spectral density masks. A single transmitter-receiver pair (bistatic radar is considered at first. Given the available transmitted power and the capability of the receiving node to resolve the UWB pulses in the time domain, the surveillance area regions where the target is detectable, and those where it is not, are obtained. Moreover, the range estimation error for the transmitter-receiver pair is discussed. By employing this analysis, a multistatic system is then considered, composed of one transmitter and three or four cooperating receivers. For this multistatic system, the impact of the nodes location on area coverage, necessary transmitted power and localization uncertainty is studied, assuming a circular surveillance area. It is highlighted how area coverage and transmitted power, on one side, and localization uncertainty, on the other side, require opposite criteria of nodes placement. Consequently, the need for a system compromising between these factors is shown. Finally, a simple and effective criterion for placing the transmitter and the receivers is drawn.

  11. Intruder states of the odd-mass N = 27 isotones

    International Nuclear Information System (INIS)

    Yokoyama, A.; Horie, H.

    1985-01-01

    Energy levels and electromagnetic properties of the N = 27 and 28 nuclei are studied systematically in terms of the shell model within the f/sub 7/2//sup n/+f/sub 7/2//sup n-1/(p/sub 3/2/ ,p/sub 1/2/,f/sub 5/2/) 1 configurations. The effective interactons are made up of empirical matrix elements and phenomenological potentials superposed with two and three central interactions. Least-squares fitting calculations of selected energy levels are performed to fix some of the matrix elements and the strength parameters of the potentials. It is shown that some states with a collective nature appear in 51 Cr and 53 Fe which are connected to each other by the enhanced E2 transitions, whereas no such states appear in 47 Ca and 49 Ti. The anomalously large B(E2) values observed in the transitions between the intruder states can be reproduced very well. The hindrance of the E2 transitions between the intruder state and the normal f/sub 7/2//sup n/ state is obtained in the present model, being in qualitative agreement with the experiments. Both of the proton-neutron (p-n) interactions (1) among the f/sub 7/2/ nucleons and (2) between the f/sub 7/2/ and the other fp nucleons are very important in order to obtain proper understanding of the nuclei in this mass region

  12. Fingerprint Liveness Detection in the Presence of Capable Intruders.

    Science.gov (United States)

    Sequeira, Ana F; Cardoso, Jaime S

    2015-06-19

    Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.

  13. Determination of inadvertent atrial capture during para-Hisian pacing.

    Science.gov (United States)

    Obeyesekere, Manoj; Leong-Sit, Peter; Skanes, Allan; Krahn, Andrew; Yee, Raymond; Gula, Lorne J; Bennett, Matthew; Klein, George J

    2011-08-01

    Inadvertent capture of the atrium will lead to spurious results during para-Hisian pacing. We sought to establish whether the stimulation-to-atrial electrogram interval at the proximal coronary sinus (stim-PCS) or high right atrium (stim-HRA) could signal inadvertent atrial capture. Para-Hisian pacing with and without intentional atrial capture was performed in 31 patients. Stim-HRA and stim-PCS intervals were measured with atrial capture, His plus para-Hisian ventricular (H+V) capture, and para-Hisian ventricular (V) capture alone. The mean stim-HRA interval was significantly shorter with atrial capture (66 ± 18 ms) than with H+V (121 ± 27 ms, P capture alone (174 ± 38 ms, P capture (51 ± 16 ms) than with H+V (92 ± 22 ms, Pcapture alone (146 ± 33 ms, P capture. A stim-PCS >90 ms (stim-HRA >100 ms) was observed only in the absence of atrial capture. A stim-HRA of capture. Stim-HRA intervals of 75 to 97 ms and stim-PCS intervals of 65 to 88 ms were observed with either atrial, His, or para-Hisian ventricular capture without atrial capture. In this overlap zone, all patients demonstrated a stim-PCS or stim-HRA interval prolongation of at least 20 ms when the catheter was advanced to avoid deliberate atrial pacing. The QRS morphology was of limited value in distinguishing atrial capture due to concurrent ventricular or H+V capture, as observed in 20 of 31 (65%) patients. Stim-PCS and stim-HRA intervals can be used to monitor for inadvertent atrial capture during para-Hisian pacing. A stim-PCS 90 ms (or stim-HRA > 100 ms) were observed only with and without atrial capture, respectively, but there was significant overlap between these values. Deliberate atrial capture and loss of capture reliably identifies atrial capture regardless of intervals.

  14. Inadvertent Screw Stripping During Ankle Fracture Fixation in Elderly Bone

    Science.gov (United States)

    Dinah, A. Feroz; Mears, Simon C.; Knight, Trevor A.; Soin, Sandeep P.; Campbell, John T.; Belkoff, Stephen M.

    2011-01-01

    Poor screw purchase because of osteoporosis presents difficulties in ankle fracture fixation. The aim of our study was to determine if cortical thickness, unicortical versus bicortical purchase, and bone mineral density are predictors of inadvertent screw stripping and overtightening. Ten paired cadaver ankles (average donor age, 81.7 years; range, 50-97 years) were used for the study. Computed tomography scanning with phantoms of known density was used to determine the bone density along the distal fibula. A standard small-fragment, 7-hole, one-third tubular plate was applied to the lateral surface of the fibula, with 3 proximal bicortical cortical screws and 2 distal unicortical cancellous screws. A posterior plate, in which all 5 screws were cortical and achieved bicortical purchase, was subsequently applied to the same bones and positioned so that the screw holes did not overlap. A torque sensor was used to measure the torque of each screw during insertion (Ti) and then stripping (Ts). The effect of bone density, screw location, cortical thickness, and unicortical versus bicortical purchase on Ti and Ts was checked for significance (P screws were inadvertently stripped and 12% were overtightened. Despite 21% of the screws being stripped or being at risk for stripping, we found no significant predictors to warn of impending screw stripping. Additional work is needed to identify clinically useful predictors of screw stripping. PMID:23569675

  15. Sexual aggression by intruders in hooded crow Corvus cornix.

    Science.gov (United States)

    Zduniak, Piotr; Kosicki, Jakub Z; Yosef, Reuven

    The hooded crow Corvus cornix is a west Palaearctic, solitary nesting, monogamous corvid. In the breeding season, populations are characterized by a social organization wherein breeding pairs are territorial and non-breeding individuals, called floaters, live in flocks. During a study of the breeding ecology of the hooded crow, conducted in a protected flooded area, we monitored nests with video cameras. We recorded two separate incidents when intruders attacked a female at the nest. We believe that she remained in the nest in order to prevent the strangers cannibalizing the nestlings by mantling over the brood. The spatio-temporal occurrence of these attacks suggests that the observed behaviour is intraspecific sexual aggression wherein non-breeding males mounted an immobilized female.

  16. [Intruding upper incisors using mini-screw anchorage in patients with gummy smile].

    Science.gov (United States)

    Li, Yun-Yi; Zhou, Yan-Heng; Lin, Jiu-Xiang

    2009-08-01

    To evaluate the effectiveness of mini-screw anchorage on intruding upper incisors in patients with gummy smile. Sixteen female patients (mean age: 23.8 years) were involved in this study. The mini-screws were placed between upper lateral incisors and canines on both sides for intruding upper incisors together with fixed appliance. The cephalometric analysis was carried out. Totally 63 teeth in 16 patients were intruded successfully and the deep overbite was decreased by (2.74 +/- 2.00) mm (P gummy smile by intruding upper incisors with mini-screw implant.

  17. Inadvertent Central Arterial Catheterization: An Unusual Cause of Ischemic Stroke

    Science.gov (United States)

    Katyal, Nakul; Korzep, Amanda; Newey, Christopher

    2018-01-01

    Central venous catheter (CVC) insertion is extensively utilized in Intensive Care Units for evaluation of hemodynamic status, administration of intravenous drugs, and for providing nutritional support in critically ill patients. Unfortunately, CVC use is associated with complications including lung injury, bleeding, infection, and thrombosis. We present a patient with an acute ischemic stroke from an inadvertently placed CVC into the right common carotid artery. A 57-year-old male presented to our institution for left hemiplegia and seizures 2 days after a CVC was placed. He was found to have a right frontal ischemic stroke on computed tomography (CT). CT angiography noted that the catheter was arterial and had a thrombosis around it. He was started on a low-dose heparin infusion. A combination of cardiothoracic surgery and interventional cardiology was required to safely remove the catheter. Central arterial catheterization is an unusual cause for acute ischemic stroke and presents management challenges. PMID:29456363

  18. 10 CFR 61.42 - Protection of individuals from inadvertent intrusion.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of individuals from inadvertent intrusion. 61.42 Section 61.42 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSING REQUIREMENTS FOR LAND DISPOSAL OF RADIOACTIVE WASTE Performance Objectives § 61.42 Protection of individuals from inadvertent...

  19. Neonicotinoid insecticides can serve as inadvertent insect contraceptives.

    Science.gov (United States)

    Straub, Lars; Villamar-Bouza, Laura; Bruckner, Selina; Chantawannakul, Panuwan; Gauthier, Laurent; Khongphinitbunjong, Kitiphong; Retschnig, Gina; Troxler, Aline; Vidondo, Beatriz; Neumann, Peter; Williams, Geoffrey R

    2016-07-27

    There is clear evidence for sublethal effects of neonicotinoid insecticides on non-target ecosystem service-providing insects. However, their possible impact on male insect reproduction is currently unknown, despite the key role of sex. Here, we show that two neonicotinoids (4.5 ppb thiamethoxam and 1.5 ppb clothianidin) significantly reduce the reproductive capacity of male honeybees (drones), Apis mellifera Drones were obtained from colonies exposed to the neonicotinoid insecticides or controls, and subsequently maintained in laboratory cages until they reached sexual maturity. While no significant effects were observed for male teneral (newly emerged adult) body mass and sperm quantity, the data clearly showed reduced drone lifespan, as well as reduced sperm viability (percentage living versus dead) and living sperm quantity by 39%. Our results demonstrate for the first time that neonicotinoid insecticides can negatively affect male insect reproductive capacity, and provide a possible mechanistic explanation for managed honeybee queen failure and wild insect pollinator decline. The widespread prophylactic use of neonicotinoids may have previously overlooked inadvertent contraceptive effects on non-target insects, thereby limiting conservation efforts. © 2016 The Authors.

  20. Neonicotinoid insecticides can serve as inadvertent insect contraceptives

    Science.gov (United States)

    Villamar-Bouza, Laura; Bruckner, Selina; Chantawannakul, Panuwan; Gauthier, Laurent; Khongphinitbunjong, Kitiphong; Retschnig, Gina; Troxler, Aline; Vidondo, Beatriz; Neumann, Peter; Williams, Geoffrey R.

    2016-01-01

    There is clear evidence for sublethal effects of neonicotinoid insecticides on non-target ecosystem service-providing insects. However, their possible impact on male insect reproduction is currently unknown, despite the key role of sex. Here, we show that two neonicotinoids (4.5 ppb thiamethoxam and 1.5 ppb clothianidin) significantly reduce the reproductive capacity of male honeybees (drones), Apis mellifera. Drones were obtained from colonies exposed to the neonicotinoid insecticides or controls, and subsequently maintained in laboratory cages until they reached sexual maturity. While no significant effects were observed for male teneral (newly emerged adult) body mass and sperm quantity, the data clearly showed reduced drone lifespan, as well as reduced sperm viability (percentage living versus dead) and living sperm quantity by 39%. Our results demonstrate for the first time that neonicotinoid insecticides can negatively affect male insect reproductive capacity, and provide a possible mechanistic explanation for managed honeybee queen failure and wild insect pollinator decline. The widespread prophylactic use of neonicotinoids may have previously overlooked inadvertent contraceptive effects on non-target insects, thereby limiting conservation efforts. PMID:27466446

  1. Inadvertent weather modification urban areas - lessons for global climate change

    International Nuclear Information System (INIS)

    Changnon, S.A.

    1992-01-01

    Large metropolitan areas in North America, home to 65% of the USA's population, have created major changes in their climates over the past 150 years. The rate and amount of the urban climate change approximate those being predicted globally using climate models. Knowledge of urban weather and climate modification holds lessons for the global climate change issue. First, adjustments to urban climate changes can provide guidance for adjusting to global change. A second lesson relates to the difficulty but underscores the necessity of providing scientifically credible proof of change within the noise of natural climatic variability. The evolution of understanding about how urban conditions influence weather reveals several unexpected outcomes, particularly relating to precipitation changes. These suggest that similar future surprises can be expected in a changed global climate, a third lesson. In-depth studies of how urban climate changes affected the hydrologic cycle, the regional economy, and human activities were difficult because of data problems, lack of impact methodology, and necessity for multidisciplinary investigations. Similar impact studies for global climate change will require diverse scientific talents and funding commitments adequate to measure the complexity of impacts and human adjustments. Understanding the processes whereby urban areas and other human activities have altered the atmosphere and changed clouds and precipitation regionally appears highly relevant to the global climate-change issue. Scientific and governmental policy development needs to recognize an old axiom that became evident in the studies of inadvertent urban and regional climate change and their behavioural implications: Think globally but act locally. Global climate change is an international issue, and the atmosphere must be treated globally. But the impacts and the will to act and adjust will occur regionally

  2. Deformed intruders and the onset of deformation at N=20 far from stability

    International Nuclear Information System (INIS)

    Poves, A.; Retamosa, J.

    1991-01-01

    Intruder states, built up of 2p-2h excitations are shown to exhibit rotational features. The combined effects of the reduction of the energy gap between major shells occurring far from stability, and the correlation energy of the valence nucleons, make the intruders dominant in the low energy spectrum of several nuclei. Many experimental puzzles may be solved in this way. (G.P.) 17 refs.; 10 figs

  3. Towards a shell-model description of intruder states and the onset of deformation

    International Nuclear Information System (INIS)

    Heyde, K.; Van Isacker, P.; Casten, R.F.; Wood, J.L.

    1985-01-01

    Basing on the nuclear shell-model and concentrating on the monopole, pairing and quadrupole corrections originating from the nucleon-nucleon force, both the appearance of low-lying 0 + intruder states near major closed shells (Z = 50, 82) and sub-shell regions (Z = 40, 64) can be described. Moreover, a number of new facets related to the study of intruder states are presented. 19 refs., 3 figs

  4. Technology for the detection of airborne intruders approaching the high-security high-value asset

    Science.gov (United States)

    Greneker, Eugene F., III

    1995-05-01

    Security plans to protect high-value assets usually concentrate on stopping potential ground intruders before they reach the asset. Barriers, such as fences, are the first line of defense against the found intruder, providing a delay mechanism. The sight of 10 to 12 foot high fencing topped with razor wire, guard towers, and roving patrols also serves as a psychological deterrent to the potential ground intrusion sensors between an outer and an inner barrier. This visible 'hardness' of a high-value asset makes airborne penetration more attractive, even though the airborne intruder may require training in the use of an aircraft or other airborne conveyance system. Certain airborne intrusion scenarios allow an adversary to penetrate much deeper and faster through delay and defense systems designed to deter the ground intruder. Since an airborne intruder can quickly reach the high-value asset, early detection critical to asset defense. Early detection of the airborne intruder also ensures appropriate use of the deadly force doctrine because the guard force has time to coordinate the response.

  5. Adaptive Neuro-Fuzzy Determination of the Effect of Experimental Parameters on Vehicle Agent Speed Relative to Vehicle Intruder.

    Science.gov (United States)

    Shamshirband, Shahaboddin; Banjanovic-Mehmedovic, Lejla; Bosankic, Ivan; Kasapovic, Suad; Abdul Wahab, Ainuddin Wahid Bin

    2016-01-01

    Intelligent Transportation Systems rely on understanding, predicting and affecting the interactions between vehicles. The goal of this paper is to choose a small subset from the larger set so that the resulting regression model is simple, yet have good predictive ability for Vehicle agent speed relative to Vehicle intruder. The method of ANFIS (adaptive neuro fuzzy inference system) was applied to the data resulting from these measurements. The ANFIS process for variable selection was implemented in order to detect the predominant variables affecting the prediction of agent speed relative to intruder. This process includes several ways to discover a subset of the total set of recorded parameters, showing good predictive capability. The ANFIS network was used to perform a variable search. Then, it was used to determine how 9 parameters (Intruder Front sensors active (boolean), Intruder Rear sensors active (boolean), Agent Front sensors active (boolean), Agent Rear sensors active (boolean), RSSI signal intensity/strength (integer), Elapsed time (in seconds), Distance between Agent and Intruder (m), Angle of Agent relative to Intruder (angle between vehicles °), Altitude difference between Agent and Intruder (m)) influence prediction of agent speed relative to intruder. The results indicated that distance between Vehicle agent and Vehicle intruder (m) and angle of Vehicle agent relative to Vehicle Intruder (angle between vehicles °) is the most influential parameters to Vehicle agent speed relative to Vehicle intruder.

  6. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    Energy Technology Data Exchange (ETDEWEB)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K., E-mail: prodip.das@ncl.ac.uk [School of Mechanical and Systems Engineering Newcastle University Newcastle upon Tyne, NE1 7RU United Kingdom (United Kingdom)

    2016-07-12

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid’s thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  7. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    Science.gov (United States)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K.

    2016-07-01

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid's thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  8. Lift and drag in intruders moving through hydrostatic granular media at high speeds.

    Science.gov (United States)

    Potiguar, Fabricio Q; Ding, Yang

    2013-07-01

    Recently, experiments showed that forces on intruders dragged horizontally through dense, hydrostatic granular packings mainly depend on the local surface orientation and can be seen as the sum of the forces exerted on small surface elements. In order to understand such forces more deeply, we perform a two-dimensional soft-sphere molecular dynamics simulation, on a similar setup, of an intruder dragged through a 50-50 bi-disperse granular packing, with diameters 0.30 and 0.34 cm. We measure, for both circular and half-circle shapes, the forces parallel (drag) and perpendicular (lift) to the drag direction as functions of the drag speed, with V=10.3-309 cm/s, and intruder depths, with D=3.75-37.5 cm. The drag forces on an intruder monotonically increase with V and D, and are larger for the circle. However, the lift force does not depend monotonically on V and D, and this relationship is affected by the shape of the intruder. The vertical force was negative for the half-circle, but for a small range of V and D, we measure positive lift. We find no sign change for the lift on the circle, which is always positive. The explanation for the nonmonotonic dependence is related to the decrease in contacts on the intruder as V increases. This is qualitatively similar to supersonic flow detachment from an obstacle. The detachment picture is supported by simulation measurements of the velocity field around the intruder and force profiles measured on its surface.

  9. Pulling an intruder from a granular material: a novel depinning experiment

    Science.gov (United States)

    Zhang, Yue; Behringer, Robert

    2017-06-01

    Two-dimensional impact experiments by Clark et al. [2] identified the source of inertial drag to be caused by `collisions' with a latent force network, leading to large fluctuations of the force experienced by the impactor. These collisions provided the major drag on an impacting intruder until the intruder was nearly at rest. As a complement, we consider controlled pull-out experiments where a buried intruder is pulled out of a material, starting from rest. This provides a means to better understand the non-inertial part of the drag force, and to explore the mechanisms associated with the force fluctuations. To some extent, the pull out process is a time reversed version of the impact process. In order to visualize this pulling process, we use 2D photoelastic disks from which circular intruders of different radii are pulled out. We present results about the dynamics of the intruder and the structures of the force chains inside the granular system as captured by slow and high speed imaging.

  10. Friction force regimes and the conditions for endless penetration of an intruder into a granular medium.

    Science.gov (United States)

    López-Rodríguez, L A; Pacheco-Vázquez, F

    2017-09-01

    An intruder penetrating into a granular column experiences a depth-dependent friction force F(z). Different regimes of F(z) have been measured depending on the experimental design: a nearly linear dependence for shallow penetrations, total saturation at large depths, and an exponential increase when the intruder approaches the bottom of the granular bed. We report here an experiment that allows us to measure the different regimes in a single run during the quasistatic descent of a sphere in a light granular medium. From the analysis of the resistance in the saturation zone, it was found that F(z) follows a cube-power-law dependence on the intruder diameter and an exponential increase with the packing fraction of the bed. Moreover, we determine the critical mass m_{c} required to observe infinite penetration and its dependence on the above parameters. Finally, we use our results to estimate the final penetration depth reached by intruders of masses mintruder of any density (larger than the density of the granular bed) can sink indefinitely into the granular medium if the bed packing fraction is smaller than a critical value.

  11. Pulling an intruder from a granular material: a novel depinning experiment

    Directory of Open Access Journals (Sweden)

    Zhang Yue

    2017-01-01

    Full Text Available Two-dimensional impact experiments by Clark et al. [2] identified the source of inertial drag to be caused by ‘collisions’ with a latent force network, leading to large fluctuations of the force experienced by the impactor. These collisions provided the major drag on an impacting intruder until the intruder was nearly at rest. As a complement, we consider controlled pull-out experiments where a buried intruder is pulled out of a material, starting from rest. This provides a means to better understand the non-inertial part of the drag force, and to explore the mechanisms associated with the force fluctuations. To some extent, the pull out process is a time reversed version of the impact process. In order to visualize this pulling process, we use 2D photoelastic disks from which circular intruders of different radii are pulled out. We present results about the dynamics of the intruder and the structures of the force chains inside the granular system as captured by slow and high speed imaging.

  12. Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-10-01

    Full Text Available Given that entropy-based IT technology has been applied in homes, office buildings and elsewhere for IT security systems, diverse kinds of intelligent services are currently provided. In particular, IT security systems have become more robust and varied. However, access control systems still depend on tags held by building entrants. Since tags can be obtained by intruders, an approach to counter the disadvantages of tags is required. For example, it is possible to track the movement of tags in intelligent buildings in order to detect intruders. Therefore, each tag owner can be judged by analyzing the movements of their tags. This paper proposes a security approach based on the received signal strength indicators (RSSIs of beacon-based tags to detect intruders. The normal RSSI patterns of moving entrants are obtained and analyzed. Intruders can be detected when abnormal RSSIs are measured in comparison to normal RSSI patterns. In the experiments, one normal and one abnormal scenario are defined for collecting the RSSIs of a Bluetooth-based beacon in order to validate the proposed method. When the RSSIs of both scenarios are compared to pre-collected RSSIs, the RSSIs of the abnormal scenario are about 61% more different compared to the RSSIs of the normal scenario. Therefore, intruders in buildings can be detected by considering RSSI differences.

  13. Close encounters between star-planet systems and stellar intruders. II. Effect of the mass and impact velocity of the intruder

    International Nuclear Information System (INIS)

    Hills, J.G.; Dissly, R.W.

    1989-01-01

    Results are reported from over 300,000 simulations of encounters between a planet-star binary system and intruders whose masses range from 0.1 to 100 times the mass of the home star of the planet-star system. These calculations were done at a large number of collision velocities and impact parameters. Cross sections for dissociation, for exchange collisions, for changing the orbital energy, and for changing the orbital eccentricity were determined. 16 refs

  14. Does intruder group size and orientation affect flight initiation distance in birds?

    Directory of Open Access Journals (Sweden)

    Geist, C.

    2005-06-01

    Full Text Available Wildlife managers use flight initiation distance (FID, the distance animals flee an approaching predator, to determine set back distances to minimize human impacts on wildlife. FID is typically estimated by a single person; this study examined the effects of intruder number and orientation on FID. Three different group size treatments (solitary person, two people side-by-side, two people one-behind-the-other were applied to Pied Currawongs (Strepera graculina and to Crimson Rosellas (Platycerus elegans. Rosellas flushed at significantly greater distances when approached by two people compared to a single person. This effect was not seen in currawongs. Intruder orientation did not influence the FID of either species. Results suggest that intruder number should be better integrated into estimates of set back distance to manage human visitation around sensitive species.

  15. Intralipid Therapy for Inadvertent Peripheral Nervous System Blockade Resulting from Local Anesthetic Overdose

    Directory of Open Access Journals (Sweden)

    Ihab Kamel

    2015-01-01

    Full Text Available Although local anesthetics have an acceptable safety profile, significant morbidity and mortality have been associated with their use. Inadvertent intravascular injection of local anesthetics and/or the use of excessive doses have been the most frequent causes of local anesthetic systemic toxicity (LAST. Furthermore, excessive doses of local anesthetics injected locally into the tissues may lead to inadvertent peripheral nerve infiltration and blockade. Successful treatment of LAST with intralipid has been reported. We describe a case of local anesthetic overdose that resulted in LAST and in unintentional blockade of peripheral nerves of the lower extremity; both effects completely resolved with administration of intralipid.

  16. Automatic implantable cardioverter/defibrillator: inadvertent discharges during permanent pacemaker magnet tests.

    Science.gov (United States)

    Kim, S G; Furman, S; Matos, J A; Waspe, L E; Brodman, R; Fisher, J D

    1987-05-01

    A patient with an automatic implantable cardioverter defibrillator (AICD) received two inadvertent shocks when a magnet was placed over the pacer during a routine permanent pacer check. Analysis of the rhythm strip suggested that both patients' QRS complexes (133 beats/minute) and asynchronous pacer artifacts (70 beats/minute) were counted by the AICD sensing system and exceeded the rate criteria of 153 beats/minute. This resulted in shocks from the AICD during sinus rhythm at 133 beats/minute. To avoid possible inadvertent shocks, an AICD should be deactivated while a magnet is placed over the pacemaker during a permanent pacer check.

  17. Towards a passive acoustic underwater system for protecting harbours against intruders

    NARCIS (Netherlands)

    Fillinger, L.; Theije, P.A.M. de; Zampolli, M.; Sutin, A.; Salloum, H.; Sedunov, N.; Sedunov, A.

    2010-01-01

    The international rules for the protection of harbors against threats and intruders typically apply to threats emanating from the land side. Protection against actions and threats from the water side is much less regulated, apart from some individual cases. Potential threats from the water side may

  18. INTRUDER STATES IN THE LEAD REGION, STUDIED BY ALPHA-DECAY

    NARCIS (Netherlands)

    WAUTERS, J; DENDOOVEN, P; HUYSE, M; REUSEN, G; VANDUPPEN, P; LIEVENS, P; KIRCHNER, R; KLEPPER, O; ROECKL, E; Neugart, R; Wohr, A

    1993-01-01

    The alpha decay of nuclei around the Z=82 closed proton shell is a powerful tool for the study of shape coexistence and intruder states in the lead region. Systematic measurements of alpha-decay properties of even-even mercury, lead, polonium and radon nuclei have been performed. From the deduced

  19. The resident-intruder paradigm : a standardized test for aggression, violence and social stress

    NARCIS (Netherlands)

    Koolhaas, Jacob; Coppens, Caroline M.; de Boer, Sietse F.; Buwalda, Bauke; Meerlo, Peter; Timmermans, Paul J. A.

    2013-01-01

    This video publication explains in detail the experimental protocol of the resident-intruder paradigm in rats. This test is a standardized method to measure offensive aggression and defensive behavior in a semi natural setting. The most important behavioral elements performed by the resident and the

  20. A study of the management of 55 traumatically intruded permanent incisor teeth in children.

    LENUS (Irish Health Repository)

    Stewart, C

    2009-01-01

    These were to examine the main presenting, treatment and outcome factors for intruded permanent incisors in children, the effect of apical development and degree of intrusion on decisions on repositioning, the effect of apical development status on the maintenance of pulp vitality and the time of pulp extirpation and to compare the decisions made to the advice given in existing clinical guidelines.

  1. Lift on side by side intruders of various geometries within a granular flow

    Directory of Open Access Journals (Sweden)

    Acevedo-Escalante M. F.

    2017-01-01

    Full Text Available Obstacles within fluids have been widely used in engineering and in physics to study hydrodynamic interactions. In granular matter, objects within a granular flow have helped to understand fundamental features of drag and lift forces. In our group, we have studied numerically the flow mediated interaction between two static disks within a vertical granular flow in a two-dimensional container where the flow velocity and the distance between obstacles were varied. Attractive and repulsive forces were found depending on flow velocity and separation between intruders. The simulations evidenced a relationship between the average flow velocity in a specific section ahead of the obstacles and the attractive-repulsive lift. On the other hand, it was showed that the lift force on an object dragged within a granular medium depends on the shape of the intruder. Here we present experimental results of the interaction between two side-by-side intruders of different shapes within a vertical granular flow. We built a quasi-two-dimensional container in which we placed the intruders and using load cells we measured lift and drag forces during the discharge process for different flow velocities.

  2. Endoscopic Removal of an Inadvertently Swallowed Toothbrush in the Emergency Department

    Science.gov (United States)

    Harvey, Martyn; Cave, Grant; Prince, Gaynor

    2012-01-01

    A 16-year-old girl inadvertently swallowed a toothbrush during attempted manual induction of emesis. The 20 cm toothbrush was successfully removed via overtube facilitated endoscopy using a retractable snare while the patient was sedated in the emergency department. PMID:23326718

  3. Endoscopic Removal of an Inadvertently Swallowed Toothbrush in the Emergency Department

    Directory of Open Access Journals (Sweden)

    Martyn Harvey

    2012-01-01

    Full Text Available A 16-year-old girl inadvertently swallowed a toothbrush during attempted manual induction of emesis. The 20 cm toothbrush was successfully removed via overtube facilitated endoscopy using a retractable snare while the patient was sedated in the emergency department.

  4. Attention and Facilitation: Converging Information versus Inadvertent Reading in Stroop Task Performance

    Science.gov (United States)

    Roelofs, Ardi

    2010-01-01

    Disagreement exists about whether color-word Stroop facilitation is caused by converging information (e.g., Cohen et al., 1990; Roelofs, 2003) or inadvertent reading (MacLeod & MacDonald, 2000). Four experiments tested between these hypotheses by examining Stroop effects on response time (RT) both within and between languages. Words cannot be…

  5. Attention and Facilitation: Converging Information Versus Inadvertent Reading in Stroop Task Performance

    NARCIS (Netherlands)

    Roelofs, A.P.A.

    2010-01-01

    Disagreement exists about whether color-word Stroop facilitation is caused by converging information (e.g.. Cohen et al.. 1990: Roelofs, 2003) or inadvertent reading (MacLeod & MacDonald, 2000). Four experiments tested between these hypotheses by examining Stroop effects oil response time (RT) both

  6. Inadvertent yellow fever vaccination of a patient with Crohn's disease treated with infliximab and methotrexate

    DEFF Research Database (Denmark)

    Ekenberg, C.; Friis-Møller, N.; Ulstrup, Thomas

    2016-01-01

    We present a case of a 56-year-old woman with Crohn's disease, treated with methotrexate and infliximab, who inadvertently received yellow fever vaccination (YFV) prior to a journey to Tanzania. She was not previously vaccinated against YF. YFV contains live-attenuated virus, and is contraindicated...

  7. Endoscopic Removal of an Inadvertently Swallowed Toothbrush in the Emergency Department

    OpenAIRE

    Harvey, Martyn; Cave, Grant; Prince, Gaynor

    2012-01-01

    A 16-year-old girl inadvertently swallowed a toothbrush during attempted manual induction of emesis. The 20 cm toothbrush was successfully removed via overtube facilitated endoscopy using a retractable snare while the patient was sedated in the emergency department.

  8. Late-Onset Inadvertent Bleb Formation following Pars Plana M3 Molteno Implant Tube Obstruction

    Directory of Open Access Journals (Sweden)

    Anmar M. Abdul-Rahman

    2017-01-01

    Full Text Available Purpose: To report a case of inadvertent bleb formation presenting 18 months after pars plana M3 Molteno implant tube obstruction in a patient with mixed mechanism glaucoma. Materials and Methods: An 84-year-old Caucasian male with mixed mechanism glaucoma underwent slit-lamp examination, gonioscopy, colour anterior segment photography and anterior segment optical coherence tomography (AS-OCT. Results: An inadvertent bleb developed 18 months after pars plana implant tube re-positioning with a 6/0 Vicryl tie ligature. The bleb was located in the area anterior to the implant plate; it was characterised by a thin, transparent, avascular and multi-cystic wall, with a visible stoma at the posterior edge of the bleb. The bleb was functioning as demonstrated by an intraocular pressure of 6 mm Hg at presentation and a punctate fluorescein uptake pattern of the bleb wall. The bleb over the plate of the Molteno implant was non-functioning, likely secondary to tube obstruction by vitreous in the early postoperative period. AS-OCT showed a tract from the anterior chamber commencing at an entry wound through a corneal tunnel to the posterior stoma at the base of the inadvertent bleb. Conclusions: We hypothesise that the pathophysiologic factors resulting in an inadvertent bleb are a result of a combination of apoptosis, late-onset wound dehiscence and internal gaping of a centrally placed corneal wound. In addition, aqueous hydrodynamic factors may play a role.

  9. Beverage can stay-tabs: still a source for inadvertently ingested foreign bodies in children

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, Lane F. [Cincinnati Children' s Hospital Medical Center, Department of Radiology, MLC 5031, Cincinnati, OH (United States); University of Cincinnati, College of Medicine, Departments of Radiology and Pediatrics, Cincinnati, OH (United States)

    2010-09-15

    In the 1970s in part to avoid inadvertent ingestion, the beverage-can industry changed can construction from pull-tabs to the stay-tabs (remain attached to can after opening) used today. Our purpose is to identify the number of inadvertent ingestions of beverage-can stay-tabs by children recognized at our institution. The medical information system of a children's hospital was searched with key terms to identify cases in which a witnessed or self-reported inadvertent ingestion of a beverage-can stay-tab resulted in a radiograph to rule out presence of a foreign body. Demographics, identification of stay-tab on radiographs, associated abnormalities, and patient management were reviewed. Nineteen cases of stay-tab ingestion were identified over 16 years. Mean age of ingesters was 8.5 years with the majority being teenagers and 15 (79%) >5 years of age. The stay-tab could be seen radiographically only in 4 (21%) cases - all with the stay-tab identified in the stomach. The identification of 19 children who inadvertently ingested beverage-can stay-tabs at a single children's hospital suggests that such ingestions still occur. Radiologists should be aware that stay-tabs are radiographically visible in the minority (21%) of cases. (orig.)

  10. Beverage can stay-tabs: still a source for inadvertently ingested foreign bodies in children

    International Nuclear Information System (INIS)

    Donnelly, Lane F.

    2010-01-01

    In the 1970s in part to avoid inadvertent ingestion, the beverage-can industry changed can construction from pull-tabs to the stay-tabs (remain attached to can after opening) used today. Our purpose is to identify the number of inadvertent ingestions of beverage-can stay-tabs by children recognized at our institution. The medical information system of a children's hospital was searched with key terms to identify cases in which a witnessed or self-reported inadvertent ingestion of a beverage-can stay-tab resulted in a radiograph to rule out presence of a foreign body. Demographics, identification of stay-tab on radiographs, associated abnormalities, and patient management were reviewed. Nineteen cases of stay-tab ingestion were identified over 16 years. Mean age of ingesters was 8.5 years with the majority being teenagers and 15 (79%) >5 years of age. The stay-tab could be seen radiographically only in 4 (21%) cases - all with the stay-tab identified in the stomach. The identification of 19 children who inadvertently ingested beverage-can stay-tabs at a single children's hospital suggests that such ingestions still occur. Radiologists should be aware that stay-tabs are radiographically visible in the minority (21%) of cases. (orig.)

  11. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2002-09-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  12. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-05-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  13. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-12-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  14. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2003-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  15. Intruder Polarization.

    Science.gov (United States)

    1985-12-01

    field coneonenti in the ground-frane in ter-s of j- P... cvcan ’Se ochieved. That result is given in (;.!J-a, b, c) of Ref. !.Tt is re,)eato𔃻 Selo ,: in...steps would leed to tern~s wit’, increasinrjr hipher or ’er veriation with and the ratio 4i). The latter r-tio approaches unity ~ ~ ( a )Ib’)race as

  16. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  17. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2002-09-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  18. Aggression and dominance in cichlids in resident-intruder tests: the role of environmental enrichment

    Directory of Open Access Journals (Sweden)

    Vincent Nijman

    Full Text Available When establishing dominance residents have a greater likelihood to dominate intruders than vice versa, partially because the resident has more to loose that the intruder has to win. This is known as the prior residency effect. In environmentally rich environments this effect should be stronger than in poor environments. Recently Kadry & Barreto (2010, Neotrop Ichthyol 8: 329-332 tested this in the pearl cichlid Geophagus brasiliensis (17 test pairs and reported that environmental enrichment led to a reduction of aggression. We here present data on four other cichlids (332 test pairs showing a stronger prior residency effect in enriched conditions, and, for two species, an increase in aggression. We discuss possible reasons for the differences between studies, focussing on the relationship between aggression and dominance and sample size effects.

  19. A PSDPF interaction to describe the 1 h{omega} intruder states in sd shell nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Bouhelal, M., E-mail: m_bouhelal@yahoo.fr [Laboratoire de Physique Appliquee et Theorique, Universite de Tebessa, Tebessa (Algeria); Haas, F.; Caurier, E.; Nowacki, F. [IPHC, CNRS/IN2P3, Universite de Strasbourg, Strasbourg (France); Bouldjedri, A. [Departement de Physique, Faculte des Sciences, Universite de Batna, Batna (Algeria)

    2011-08-01

    In the level schemes of sd shell nuclei, there is generally at relatively low excitation energies, coexistence of normal 0 h{omega} positive parity states and of intruder 1 h{omega} negative parity states. The aim of the present work is to describe these intruder states in the full p-sd-pf model space with a {sup 4}He core allowing one nucleon jump between the major shells. To construct our PSDPF interaction, we first modified the p-sd and sd-pf cross-monopole terms and then applied a fitting procedure to adjust all PSDPF parameters by comparing an extended set of experimental and calculated excitation energies. Results obtained with the new interaction have been finally compared with experimental data for nuclei throughout the sd shell.

  20. Territoriality evidenced by asymmetric intruder-holder motivation in an amblypygid.

    Science.gov (United States)

    Chapin, Kenneth James; Hill-Lindsay, Sloan

    2016-01-01

    Territoriality has an extensive and thorough history of research, but has been difficult to impossible to test empirically in most species. We offer a method for testing for territoriality by measuring the motivation of territory intruders to win contests in controlled trials. We demonstrated this approach by staging paired trials of the Amblypygi Phrynus longipes (Chelicerata: Arachnida). Amblypygids engaged in agonistic interactions after the opportunity to establish a putative territory on one side of an arena. We found that intruders of putative territories had lower motivation to win contests, thus evidencing territoriality. Physical components of individuals (i.e. energy stores) increased the probability of winning the contest for holders but not intruders, thereby providing insight into the differing decision rules opponents use in territory contests. We discuss why alternative hypotheses, including loser-initiator covariation and home field bourgeois advantage, fail empirical tests. We demonstrated that analyzing animal motivation in territorial contests is tractable even for animals where territories are inconspicuous and cues are outside the normal perceptions of researchers. Copyright © 2015 Elsevier B.V. All rights reserved.

  1. Inadvertent Perioperative Hypothermia: A Literature Review of an Old Overlooked Problem

    Directory of Open Access Journals (Sweden)

    Lotfi Fatemi Seyed Naser

    2016-03-01

    Full Text Available Inadvertent perioperative hypothermia is a common anesthesia-related complication in patients undergoing surgery. This could possibly lead to several clinical consequences, which adversely affect the surgery outcome, particularly in high risk patient. The combination of anesthetic drugs and cold operating room environment are among the most common predisposing factors of perioperative hypothermia. The aim of this comprehensive literature review is to describe the importance, monitoring techniques, potential complications, appropriate pharmacologic interventions and modalities to manage perioperative hypothermia.

  2. Anabolic agents: recent strategies for their detection and protection from inadvertent doping.

    Science.gov (United States)

    Geyer, Hans; Schänzer, Wilhelm; Thevis, Mario

    2014-05-01

    According to the World Anti-Doping Agency (WADA) Prohibited List, anabolic agents consist of exogenous anabolic androgenic steroids (AAS), endogenous AAS and other anabolic agents such as clenbuterol and selective androgen receptor modulators (SARMs). Currently employed strategies for their improved detection include the prolongation of the detection windows for exogenous AAS, non-targeted and indirect analytical approaches for the detection of modified steroids (designer steroids), the athlete's biological passport and isotope ratio mass spectrometry for the detection of the misuse of endogenous AAS, as well as preventive doping research for the detection of SARMs. The recent use of these strategies led to 4-80-fold increases of adverse analytical findings for exogenous AAS, to the detection of the misuse of new designer steroids, to adverse analytical findings of different endogenous AAS and to the first adverse analytical findings of SARMs. The strategies of the antidoping research are not only focused on the development of methods to catch the cheating athlete but also to protect the clean athlete from inadvertent doping. Within the past few years several sources of inadvertent doping with anabolic agents have been identified. Among these are nutritional supplements adulterated with AAS, meat products contaminated with clenbuterol, mycotoxin (zearalenone) contamination leading to zeranol findings, and natural products containing endogenous AAS. The protection strategy consists of further investigations in case of reasonable suspicion of inadvertent doping, publication of the results, education of athletes and development of methods to differentiate between intentional and unintentional doping.

  3. Consolidation of a WSN and Minimax method to rapidly neutralise intruders in strategic installations.

    Science.gov (United States)

    Conesa-Muñoz, Jesus; Ribeiro, Angela

    2012-01-01

    Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN). The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders' behaviour is inferred through sequences of sensors' activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final state of the intruders

  4. Inadvertent raising of levels in the FFTF primary sodium pumps. Final unusual occurrence report, HEDL 79-34 (FFTF-58)

    International Nuclear Information System (INIS)

    Kuechle, J.D.

    1981-01-01

    The final unusual occurrence report describes the inadvertent raising of the sodium level in the FFTF primary sodium pumps during system testing. This event is now judged to have caused permanent deformation of the primary pump shaft on loop 1 during a period when pump rotation was stopped and sodium level in the pump tank was inadvertently increased. The shaft was subsequently removed, straightened, and returned to service in the spare FFTF pump

  5. Vertical slow drag of an intruder in a laterally confined granular medium

    Science.gov (United States)

    Duri, Agnès; Mandato, Sandra; Mabille, Frédéric; Cuq, Bernard; Ruiz, Thierry

    2017-06-01

    The study of force transmission and typologies of motions in a powder bed under low shear solicitation constitutes a challenging issue to achieve a monitoring of most of processes. This work relies on the characterisation of particle mobility in the neighbourhood of a moving intruder in ascendant vertical motion. Vertical force measurements and Particle Image Velocimetry (PIV) technique are used to identify different typologies of particle motions (compaction, loading and rupture of the chain forces, lateral collapsing, avalanches…) of a granular bed ensiled in a semi-confined cell and with a free surface on its top. Force fluctuations during the blade displacement are highlighted and correlated with the dimensionless blade speed but also with the force profile in the static state. The velocity field analysis allows quantifying the shear-banding characteristics corresponding to the blade influence on grain displacements and the impact of the intruder in the motion direction. This signal contains periodical fluctuations which are correlated with the vertical force fluctuations in a specific zone of the granular bed.

  6. Machine learning approach to detect intruders in database based on hexplet data structure

    Directory of Open Access Journals (Sweden)

    Saad M. Darwish

    2016-09-01

    Full Text Available Most of valuable information resources for any organization are stored in the database; it is a serious subject to protect this information against intruders. However, conventional security mechanisms are not designed to detect anomalous actions of database users. An intrusion detection system (IDS, delivers an extra layer of security that cannot be guaranteed by built-in security tools, is the ideal solution to defend databases from intruders. This paper suggests an anomaly detection approach that summarizes the raw transactional SQL queries into a compact data structure called hexplet, which can model normal database access behavior (abstract the user's profile and recognize impostors specifically tailored for role-based access control (RBAC database system. This hexplet lets us to preserve the correlation among SQL statements in the same transaction by exploiting the information in the transaction-log entry with the aim to improve detection accuracy specially those inside the organization and behave strange behavior. The model utilizes naive Bayes classifier (NBC as the simplest supervised learning technique for creating profiles and evaluating the legitimacy of a transaction. Experimental results show the performance of the proposed model in the term of detection rate.

  7. Inadvertent puncture of the aortic noncoronary cusp during postoperative left atrial tachycardia ablation

    Directory of Open Access Journals (Sweden)

    Dursun Aras, MD

    2015-08-01

    Full Text Available Transseptal catheterization has become part of the interventional electrophysiologist׳s technical armamentarium since the development of left atrial catheter ablation and percutaneous technologies for treating mitral and aortic valve disease. Although frequently performed, the procedure׳s most feared complication is aortic root penetration. Focal atrial tachycardia has been described as the most common late sequela of surgical valve replacements. We present a complicated case involving the inadvertent delivery of an 8 French sheath across the noncoronary cusp during radiofrequency catheter ablation for left atrial tachycardia originating from the mitral annulus in a patient with prior mitral valve replacement.

  8. Treatment Approach to Small Inadvertent Injury of the Crystalline Lens Anterior Capsule During Iridodialysis Repair Surgery

    Directory of Open Access Journals (Sweden)

    Gökçen Gökçe

    2013-01-01

    Full Text Available A 22-year-old man presented to our ophthalmology department with photophobia. On ophthalmic examination, iridodialysis secondary to blunt trauma that occurred 5 years ago was diagnosed. During iridodialysis repair surgery, long curved double-armed needle of 10-0 polypropylene suture (PC-9 inserted into the 19 gauge side port turned down inadvertently by its own weight, resulting in crystalline lens anterior capsule perforation. Postoperative clinical observation revealed no lens opacification affecting visual acuity. This case report showed that lens aspiration surgery should be postponed if the capsule injury is small.(Turk J Ophthalmol 2013; 43: 61-3

  9. Wellbore enlargement investigation: Potential analogs to the Waste Isolation Pilot Plant during inadvertent intrusion of the repository

    International Nuclear Information System (INIS)

    Boak, D.M.; Dotson, L.; Aguilar, R.

    1997-01-01

    This study involved the evaluation and documentation of cases in which petroleum wellbores were enlarged beyond the nominal hole diameter as a consequence of erosion during exploratory drilling, particularly as a function of gas flow into the wellbore during blowout conditions. A primary objective was to identify analogs to potential wellbore enlargement at the Waste Isolation Pilot Plant (WIPP) during inadvertent human intrusion. Secondary objectives were to identify drilling scenarios associated with enlargement, determine the physical extent of enlargement, and establish the physical properties of the formation in which the enlargement occurred. No analogs of sufficient quality to establish quantitative limits on wellbore enlargement at the WIPP disposal system were identified. However, some information was obtained regarding the frequency of petroleum well blowouts and the likelihood that such blowouts would bridge downhole, self-limiting the surface release of disposal-system material. Further work would be necessary, however, to determine the conditions under which bridging could occur and the extent to which the bridging might be applicable to WIPP. In addition, data on casing sizes of petroleum boreholes in the WIPP vicinity support the use of a 12-1/4 inch borehole size in WIPP performance assessment calculations. Finally, although data are limited, there was no evidence of significant wellbore enlargement in any of three blowouts that occur-red in wellbores in the Delaware Basin (South Culebra Bluff Unit No. 1, Energy Research and Development Administration (ERDA) 6, and WIPP 12)

  10. [Gummy smile correction by intruding upper incisors with mini-screw implant: an esthetic evaluation by the golden facial mask].

    Science.gov (United States)

    Liu, Da-Wei; Zhou, Yan-Heng; Li, Yun-Yi

    2010-09-01

    to use a golden facial mask to classify the gummy smile and then to evaluate the effectiveness of correction gummy smile by intruding upper incisors and canines with mini-screw implants. sixteen female and 1 male gummy smile patients with an age range of 16 - 40 years, 26.2 years on average, were involved in the study. The mini-screw implants were inserted buccally between upper lateral incisors and canines on both sides for intruding upper incisors together with fixed appliance. The golden facial mask was introduced to analyze the frontal view of smile pre- and post-treatment. gummy smile of all patients involved in the study was reduced by intruding upper incisors and canines, and the average period for intruding about 9.8 months. According to the analysis of the golden facial mask, the reasons of gummy smile in different patients were different before treatment. However, the lips, teeth and gingiva were almost coincident with the golden facial mask after treatment. analyzing the relationship among lip, teeth and gingiva by the golden facial mask, the inprovement of gummy smile by using mini-screw implants to intrude the upper incisors can be evaluated.

  11. A novel adolescent chronic social defeat model: reverse-Resident-Intruder Paradigm (rRIP) in male rats.

    Science.gov (United States)

    Manz, Kevin M; Levine, Wendy A; Seckler, Joshua C; Iskander, Anthony N; Reich, Christian G

    2018-03-01

    Psychosocial stress is linked to the etiology of several neuropsychiatric disorders, including Major Depressive Disorder and Post-Traumatic-Stress-Disorder. Adolescence is a critical neurobehavioral developmental period wherein the maturing nervous system is sensitive to stress-related psychosocial events. The effects of social defeat stress, an animal model of psychosocial stress, on adolescent neurobehavioral phenomena are not well explored. Using the standard Resident-Intruder-Paradigm (RIP), adolescent Long-Evans (LE, residents, n = 100) and Sprague-Dawley (SD, intruders, n = 100) rats interacted for five days to invoke chronic social stress. Tests of depressive behavior (forced-swim-test (FST)), fear conditioning, and long-term synaptic plasticity are affected in various adult rodent chronic stress models, thus we hypothesized that these phenomena would be similarly affected in adolescent rats. Serendipitously, we observed the Intruders became the dominant rats and the Residents were the defeated/submissive rats. This robust and reliable role-reversal resulted in defeated LE-Residents showing a depressive-like state (increased time spent immobile in the FST), enhanced fear conditioning in both hippocampal-dependent and hippocampal-independent fear paradigms and altered hippocampal long-term synaptic plasticity, measured electrophysiologically in vitro in hippocampal slices. Importantly, SD-Intruders, SD and LE controls did not significantly differ from each other in any of these assessments. This reverse-Resident-Intruder-Paradigm (rRIP) represents a novel animal model to study the effects of stress on adolescent neurobehavioral phenomenon.

  12. Analyses of natural resources in 10 CFR Part 60 as related to inadvertent human intrusion

    International Nuclear Information System (INIS)

    Miklas, M.P.; Lefevre, H.E.

    1993-01-01

    The purpose of this paper is to examine the intent of the regulatory language of the portions of 10 CFR Part 60 which deal with considerations of the natural resources of a proposed geologic repository for high-level radioactive wastes as they relate to inadvertent human intrusion. Four Potentially Adverse Conditions (PAC) the requirements of 10 CFR 60.21(c)(13) are shown to be related to natural resources. Groundwater is identified as a natural resource known to be present at Yucca Mountain, Nevada. For economic considerations of natural resources, the open-quotes foreseeable futureclose quotes is thought to be no more than 50 years. Two of the topics addressed by the PACs, subsurface mining and drilling at a proposed repository site, are pre-site-characterization activities which must be evaluated in the context of repository performance criteria set by the US EPA standard, 40 CFR Part 191. An alternative US DOE compliance demonstration to another PAC, 10 CFR 60.122(c)(17), might be to use an open-quotes explorationist perspectiveclose quotes of natural resource assessment. The Commission intends for DOE to evaluate the likelihood and consequence of inadvertent human intrusion into a geologic repository as a result of exploration or exploitation of natural resources within or near a proposed high-level radioactive waste geologic repository

  13. The uptake of radionuclides from inadvertent consumption of soil by grazing animals

    International Nuclear Information System (INIS)

    Green, N.; Dodd, N.J.

    1988-01-01

    Investigations of the transfer to man of artificially-produced radionuclides through food chains have shown that the inadvertent consumption of soil by grazing animals can give variations in estimates of transfer coefficients, especially for radionuclides that are poorly absorbed by plant roots. Even small masses of soil adhering to herbage or directly ingested can make a significant contribution to the intake inventory in terms of activity. Although the activity concentrations of soil-contaminated herbage are elevated, the radionuclides associated with the soil may not necessarily be in a form which is easily absorbed by the animal. Attempts must be made, therefore, to quantify soil intake and the subsequent radionuclide uptake by this mechanism. A field investigation of the uptake of radionuclides by farm animals grazing near the Sellafield nuclear reprocessing plant has been pursued. The aims of the study were to estimate the transfer to muscle and other tissues. This paper describes the methods used to estimate both the soil intake and the consequent availability of radionuclides associated with the soil. The measurements were used to evaluate the contribution to tissue content of inadvertent consumption of soil by cows and sheep. 10 refs.; 2 tabs

  14. Consolidation of a WSN and Minimax Method to Rapidly Neutralise Intruders in Strategic Installations

    Directory of Open Access Journals (Sweden)

    Angela Ribeiro

    2012-03-01

    Full Text Available Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN. The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders’ behaviour is inferred through sequences of sensors’ activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final

  15. Energy of the 2p1h intruder state in $^{34}$Al

    CERN Multimedia

    The second 0$^{+}$ state in $^{34}$Si, of high importance for the understanding of the island of inversion at N=20, has been recently observed through the $\\beta$- decay of a predicted long-lived low-lying isomeric 1$^{+}$ state in $^{34}$Al. We intend to measure the unknown excitation energy of this isomer using the ISOLTRAP Penning-trap mass spectrometer. Since a recent experiment at ISOLDE (IS-530) showed that the full $\\beta$- strength in the decay of $^{34}$Mg goes through this 1$^{+}$ state in $^{34}$Al, we propose to perform a direct mass measurement of the daughter $^{34}$Al ions trapped after the decay of $^{34}$Mg. Mass measurements indicate that the 4$^{−}$ ground state in $^{34}$Al may be an excited state, the ground state being therefore the intruder 1$^{+}$ state. In another run, we propose to perform a remeasurement of the mass of the 4$^{−}$ ground state.

  16. Identification of intruder πi13/2 state in 197Tl

    Directory of Open Access Journals (Sweden)

    Pai H.

    2014-03-01

    Full Text Available The high-spin states in 197Tl were studied by populating them using the 197Au(α, 4n197 Tl reaction at 48 MeV of beam energy. γ−γ coincidence data were taken using a combination of clover, LEPS (low energy photon spectrometer and single crystal HPGe detectors. The polarization and DCO measurements were performed for definite spin and parity assignment of the excited states. The πi13/2 intruder state has been identified for the first time in this nucleus. The total Routhian surface calculations have been performed to study the shape and deformation of 197Tl for different configurations.

  17. Sleep paralysis and "the bedroom intruder": the role of the right superior parietal, phantom pain and body image projection.

    Science.gov (United States)

    Jalal, Baland; Ramachandran, Vilayanur S

    2014-12-01

    Sleep paralysis (SP) is a common condition occurring either at sleep onset or sleep offset. During SP the sleeper experiences gross motor paralysis while the sensory system is clear. Hypnogogic and hypnopompic hallucinations are common during SP and may involve seeing, hearing, and sensing the presence of menacing intruders in one's bedroom. This "intruder" is often perceived as a shadowy humanoid figure. Supernatural accounts of this hallucinated intruder are common across cultures. In this paper, we postulate that a functional disturbance of the right parietal cortex explains the shadowy nocturnal bedroom intruder hallucination during SP. This hallucination may arise due to a disturbance in the multisensory processing of body and self at the temporoparietal junction. We specifically propose that this perceived intruder is the result of a hallucinated projection of the genetically "hard-wired" body image (homunculus), in the right parietal region; namely, the same circuits that dictate aesthetic and sexual preference of body morphology. One way to test this hypothesis would be to study clinical populations who may have genetically acquired "irregularities" in their internal hard-wired body image in the right superior parietal lobule (SPL); for example, individuals with apotemnophilia or anorexia nervosa. If such individuals experience SP (e.g., induced in a sleep lab), and they hallucinate this shadowy figure, one would predict that they would see humanoid shadows and shapes with body irregularities, mirroring their own internal body image morphology. If correct, our hypothesis will offer a neurological explanation for this nocturnal bedroom intruder that has been a source of controversy, and striking and implausible cultural interpretations throughout history. Indeed, if our proposed hypothesis is tested and corroborated, dissemination of such findings would provide great relief to SP experiencers worldwide and could potentially be used in a therapeutic context

  18. Aggression and dominance in cichlids in resident-intruder tests: the role of environmental enrichment

    Directory of Open Access Journals (Sweden)

    Vincent Nijman

    2011-01-01

    Full Text Available When establishing dominance residents have a greater likelihood to dominate intruders than vice versa, partially because the resident has more to loose that the intruder has to win. This is known as the prior residency effect. In environmentally rich environments this effect should be stronger than in poor environments. Recently Kadry & Barreto (2010, Neotrop Ichthyol 8: 329-332 tested this in the pearl cichlid Geophagus brasiliensis (17 test pairs and reported that environmental enrichment led to a reduction of aggression. We here present data on four other cichlids (332 test pairs showing a stronger prior residency effect in enriched conditions, and, for two species, an increase in aggression. We discuss possible reasons for the differences between studies, focussing on the relationship between aggression and dominance and sample size effects.No estabelecimento de dominancia, residentes têm uma maior probabilidade de dominar os intrusos que vice-versa, em parte porque o residente tem mais a perder que o invasor tem a ganhar. Isto é conhecido como o efeito de residência prévia. Em ambientes ecologicamente ricos esse efeito deve ser mais forte do que em ambientes pobres. Recentemente Kadry & Barreto (2010, Neotrop. Ichthyol. 8: 329-332 testaram isso no cará Geophagus brasiliensis (17 pares de teste e relataram que o enriquecimento ambiental levou a uma redução de agressão. Aqui apresentamos dados de quatro outros ciclídeos (332 pares de teste, mostrando um efeito mais forte de residência prévia em condições enriquecidas, e, para duas espécies, o aumento da agressão. Discutimos possíveis razões para as diferenças entre os estudos, concentrando-nos sobre a relação entre agressão e dominação e os efeitos do tamanho da amostra.

  19. Mistaken Identifiers: Gene name errors can be introduced inadvertently when using Excel in bioinformatics

    Science.gov (United States)

    Zeeberg, Barry R; Riss, Joseph; Kane, David W; Bussey, Kimberly J; Uchio, Edward; Linehan, W Marston; Barrett, J Carl; Weinstein, John N

    2004-01-01

    Background When processing microarray data sets, we recently noticed that some gene names were being changed inadvertently to non-gene names. Results A little detective work traced the problem to default date format conversions and floating-point format conversions in the very useful Excel program package. The date conversions affect at least 30 gene names; the floating-point conversions affect at least 2,000 if Riken identifiers are included. These conversions are irreversible; the original gene names cannot be recovered. Conclusions Users of Excel for analyses involving gene names should be aware of this problem, which can cause genes, including medically important ones, to be lost from view and which has contaminated even carefully curated public databases. We provide work-arounds and scripts for circumventing the problem. PMID:15214961

  20. Method and apparatus for preventing inadvertent criticality in a nuclear fueled electric power generating unit

    International Nuclear Information System (INIS)

    Tuley, C.R.; Bauman, D.A.; Neuner, J.A.; Feilchenfeld, M.M.; Greenberg, L.

    1984-01-01

    An inadvertent approach to criticality in a nuclear fueled electric power generating unit is detected and an alarm is generated through on-line monitoring of the neutron flux. The difficulties of accurately measuring the low levels of neutron flux in a subcritical reactor are overcome by the use of a microcomputer which continuously generates average flux count rate signals for incremental time periods from thousands of samples taken during each such period and which serially stores the average flux count rate signals for a preselected time interval. At the end of each incremental time period, the microcomputer compares the latest average flux count rate signal with the oldest, and preferably each of the intervening stored values, and if it exceeds any of them by at least a preselected multiplication factor, an alarm is generated. (author)

  1. Inadvertent 131I therapy for hyperthyroidism in the first trimester of pregnancy

    International Nuclear Information System (INIS)

    Stoffer, S.S.; Hamburger, J.I.

    1976-01-01

    Of 963 physicians surveyed to determine therapeutic attitudes toward, and experience with inadvertent radioiodine therapy for hyperthyroidism during the first trimester of pregnancy, 116 physicians (of 517 responding) reported 237 cases. Therapeutic abortion was advised for 55 patients by 22 physicans. From the 182 remaining pregnancies there were two spontaneous abortions, two stillborn, one neonate with biliary atresia, and one with respiratory distress. This complication rate was not greater than might be expected in a similar number of random pregnancies. On the other hand, six infants were hypothyroid (transient for one) and four of these were mentally deficient. Three mothers of hypothyroid infants had received radioiodine therapy in the second trimester. None of the six mothers of hypothyroid infants had had pregnancy tests prior to radioiodine therapy. Survey responses indicate that routine pregnancy testing prior to radioiodine therapy for patients in the child-bearing age is not yet a standard procedure. It should be

  2. Inadvertent Apical Extrusion of Sodium Hypochlorite with Evaluation by Dental Volumetric Tomography

    Science.gov (United States)

    Başer Can, Elif Delve; Karapınar Kazandağ, Meriç; Kaptan, Rabia Figen

    2015-01-01

    This case report describes the tissue injury caused by inadvertently extruded NaOCl through the apical constriction. A 56-year-old female patient with complaints of pain, swelling, and ecchymosis on the left side of her face was referred to our clinic. The symptoms had emerged following root canal treatment of the maxillary left first premolar, and a soft tissue complication due to apical extrusion of NaOCl was diagnosed. Antibiotics and analgesics were prescribed. DVT images revealed that the buccal root apex had perforated the maxillary bone. The patient was followed up every other day and became asymptomatic on the 10th day. Endodontic therapy was completed with routine procedures. Determining working length precisely and following irrigation protocols meticulously are indispensable to prevent this type of complication. 3D visualization of the affected area may reveal the cause of the incident. PMID:25883812

  3. Inadvertent adverse consequences of clinical and forensic hypnosis: minimizing the risks.

    Science.gov (United States)

    Eimer, Bruce N

    2012-07-01

    Hypnosis is a psychological intervention tool that can make a gamut of psychological, medical, and dental treatments work more rapidly and effectively. It can also be used profitably with some witnesses, victims, and defendants in forensic and investigative contexts as a data gathering tool. As with any other power tool, its use entails some risks. Since risks cannot be totally avoided, this article examines some ways to minimize the risks of inadvertent adverse or negative consequences as a result of the use of the hypnosis tool. Fundamentals of hypnosis risk management are covered as a foundation for beginners and as a review for experienced practitioners. Various straightforward safeguards that should be heeded by all practitioners are discussed.

  4. Intruders: New Neighbors in "Dawn of the Planet of the Apes" and "The Hundred-Foot Journey"

    Science.gov (United States)

    Beck, Bernard

    2015-01-01

    Conflicts over territory are about the power to establish dominant cultures in territories and are often accompanied by cultural claims to legitimacy by each side. The cultural claims, or ideologies, are often expressed in terms of "homeland" dwellers versus "intruders." Two recent movies, "Dawn of the Planet of the…

  5. Territorial responses of male blue tits to simulated dynamic intrusions: effects of song overlap and intruder location

    DEFF Research Database (Denmark)

    Poesel, Angelika; Dabelsteen, Torben

    2005-01-01

    song alternating. A territory owner should therefore perceive an intruder overlapping its songs and staying inside its territory as a greater threat than one alternating and exiting the territory quickly. To test this hypothesis we used playback to interact with territorial male blue tits, Parus...

  6. Stick-slip and force chain evolution in a granular bed in response to a grain intruder.

    Science.gov (United States)

    Tordesillas, Antoinette; Hilton, James E; Tobin, Steven T

    2014-04-01

    The mechanical response of granular beds under applied stresses is often characterized by repeated cycles of stick-slip. Using the discrete element method, we examine stick-slip from a concentrated force loading-imposed by a single grain that is drawn through a densely packed, periodic granular bed via a stiff virtual spring. Force chains continually form and collapse ahead of the intruder grain. A comprehensive characterization of the birth-death evolution of these load-bearing structures, along with their surrounding contact cycles, reveals a well-defined shear zone of around eight particle diameters from the intruder, encapsulating: (i) long force chains that form buttresses with the fixed bottom wall for support, (ii) a region where the collapse of the most stable, persistent three-cycles preferentially occur to the point where they are essentially depleted by the end of the first cycle of stick-slip, and (iii) an inner core where force chain buckling events concentrate. Dilatancy is greatest in this inner core, and in the region next to the free surface. During slip, secondary force chains briefly form behind the intruder: these transient force chains, most of which comprise only 3 particles, form in the direction that is roughly perpendicular to the intruder motion.

  7. Endovascular repair of inadvertent arterial injury induced by central venous catheterization using a vascular closure device: A case report

    Energy Technology Data Exchange (ETDEWEB)

    Kim, So Hee; Jang, Woo Jin; Oh, Ju Heyon; Song, Yun Gyu [Samsung Changwon Hospital, Sungkyunkwan University School of Medicine, Changwon (Korea, Republic of)

    2017-04-15

    Central venous catheterization can cause various complications. Inadvertent subclavian artery catheterization was performed during insertion of a central venous catheter in a 73-year-old man suffering from panperitonitis due to small-bowel perforation. Endovascular treatment was conducted to treat the injured subclavian artery with a FemoSeal vascular closure device.

  8. 46 CFR 308.536 - Declaration where failure to comply with Clause 21 was inadvertent, Form MA-314.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION EMERGENCY OPERATIONS WAR RISK INSURANCE War Risk Cargo Insurance Ii-Open Policy War Risk Cargo... Assured that fails inadvertently to maintain a collateral deposit fund or surety bond in an amount..., which may be obtained from the American War Risk Agency or MARAD. III—Facultative War Risk Cargo...

  9. Management of traumatically intruded permanent maxillary lateral incisor - Case report and review of literature

    Directory of Open Access Journals (Sweden)

    Deepak Sharma

    2016-01-01

    Full Text Available Primary etiologic factors of trauma in the permanent dentition are bicycle accidents, sports accidents, falls, and fights. From the standpoint of therapy, anatomy, and prognosis, five different types of luxation lesions are recognized: Concussion, subluxation, extrusive luxation, lateral luxation, and intrusive luxation. Intrusive luxation is apical displacement of tooth into the alveolar bone. The tooth is driven into the socket, compressing the periodontal ligament, and commonly causes a crushing fracture of the alveolar socket. It is considered one of the most severe luxation injuries to affect permanent teeth. Intrusion injuries are often associated with severe damage to the tooth, periodontium, and pulpal tissue. The rare occurrence of this injury, 0.3–1.9% in the permanent dentition, has resulted in limited studies to support suggested treatment regimens. Clinical treatment for intrusion is especially difficult because of the severe complications accompanying it. These complications include pulp necrosis or obliteration, inflammatory root resorption, ankylosis, replacement root resorption, and loss of marginal bone support. Hence, the aim of presenting this case report of intrusive luxation is to highlight the importance of prompt care and root canal dressing and discuss the several treatments proposed to reposition the intruded teeth.

  10. City Dweller Responses to Multiple Stressors Intruding into Their Homes: Noise, Light, Odour, and Vibration

    Directory of Open Access Journals (Sweden)

    Eja Pedersen

    2015-03-01

    Full Text Available Urban densification increases exposure to noise, light, odour, and vibration in urban dwellings. Exposure from combined environmental stressors intruding into the home could increase the risk of adverse effects on wellbeing, even when the exposure is at a relatively low level. This study assesses the prevalence of annoyance with a combination of potential environmental stressors common in urban areas and the association with wellbeing. A questionnaire was sent by mail to residents in five areas in Halmstad (Sweden with similar socioeconomic and housing characteristics but different exposure (response rate 56%; n = 385. Of the respondents, 50% were annoyed to some degree by at least one of the suggested stressors, most commonly by noise and vibration from local traffic. Structural equation modelling showed that annoyance led to lowered quality of life via the mediating construct residential satisfaction, which in turn was influenced by place attachment and perceived restoration possibilities in the dwelling. Stress had a negative impact on quality of life, but was not directly correlated to annoyance. Stress was however correlated with sensitivity. The findings suggest that dose-response relationships for environmental stressors should be studied in a broader context of environmental and individual factors. Also relatively low levels of exposure should be mitigated, especially if several stressors are present.

  11. Female song rates in response to simulated intruder are positively related to reproductive success.

    Directory of Open Access Journals (Sweden)

    Kristal E Cain

    2015-10-01

    Full Text Available Bird song is well studied in males as a sexually selected behavior. However, although song is also common among females, it is infrequently examined and poorly understood. Research suggests that song is often used as a resource defense behavior and is important in female-female competition for limited resources, e.g. mates and territories. If so, song should be positively related to fitness and related to other resource defense behaviors, but this possibility has rarely been explored. Here we examine fitness estimates in relation to spontaneous song rates and song rates in response to a simulated intruder (playback, in the superb fairy-wren (Malurus cyaneus, a cooperatively breeding songbird. We also determine how song rates relate to other territorial defense behaviors. Song rate in response to playback, but not spontaneous song rate, was positively related to nest success and the number of fledglings produced by successful females. Further, response song rate was also correlated with other territorial defense behaviors (latency to respond and flights. This evidence supports the hypothesis that female song may be used in the context of female-female competition to improve access to limited reproductive resources, and suggests that song may provide direct fitness benefits.

  12. Shape coexistence and shell-model intruder states in the lead region studied by $\\alpha$ -decay

    CERN Multimedia

    2002-01-01

    % IS336 \\\\ \\\\ Low-lying 0$^+$ states in even-even nuclei near closed shells can be a manifestation of the coexistence of different shapes in the same nucleus. Deformed bandstructures built upon these 0$^+$ states, coexisting at low energy with the ground state band, have been observed in several regions of the nuclear chart, including the Z=82 region. Such structures have been found in the neutron-deficient even Pb nuclei and the mixing between intruder and normal states has been studied by the $\\alpha$- decay of $^{194, 196, 198}$Po towards the 0$^+$ excited and ground states in $^{190, 192, 194}$Pb using $\\alpha$-e-t coincidence events. It is expected that shape coexistence will occur in the light Po isotopes as well. Evidence for a deformed band at low excitation energy in $^{196, 198}$Po has been found in in-beam studies and the $\\alpha$-decay of $^{202}$Rn studied at ISOLDE revealed feeding to a 0$^+$~state at 816~keV in $^{198}$Po. \\\\ \\\\It is our intention to investigate the $^{194, 196}$Po nuclei with ...

  13. Passive Barriers to Inadvertent Human Intrusion for Use at the Nevada Test Site

    International Nuclear Information System (INIS)

    NSTec Environmental Management

    2007-01-01

    In July1996, BN transmitted Passive Barriers to Inadvertent Human Intrusion for Use at the Nevada Test Site to the United States Department of Energy, under Contract DE-AC08-91NV10833. The 1996 paper had a limited distribution and was not reviewed for public release. In 2007, National Security Technologies LLC (NSTec) made minor revisions to conform to current editorial standards of the NNSA/NSO and to meet current security requirements for public release. The primary purpose of this study was to identify types of engineered passive barriers that could deter future intrusion into buried low-level radioactive waste, particularly intrusion by drilling water wells. The study considered drilling technology, many natural and man-made materials, and both underground and above-ground barriers. Based on cost and effectiveness, the report recommended underground barriers consisting of a layer of rubble or tires. An aboveground barrier mound might also prove effective, but would cost more, and may become an attractive nuisance (e.g., might, after their purpose has been forgotten, encourage exploration for the sake of satisfying curiosity). Advances in drilling technology could render any engineered barriers ineffective if there is motivation to penetrate the barriers

  14. Inadvertent social information in breeding site selection of natal dispersing birds

    Science.gov (United States)

    Nocera, Joseph J; Forbes, Graham J; Giraldeau, Luc-Alain

    2005-01-01

    Several species use the number of young produced as public information (PI) to assess breeding site quality. PI is inaccessible for synchronously breeding birds because nests are empty by the time the young can collect this information. We investigate if location cues are the next best source of inadvertent social information (ISI) used by young prospectors during breeding site choice. We experimentally deployed ISI as decoys and song playbacks of breeding males in suitable and sub-optimal habitats during pre- and post-breeding periods, and monitored territory establishment during the subsequent breeding season for a social, bobolink (Dolichonyx oryzivorus), and a more solitary species, Nelson's sharp-tailed sparrow (Ammodramus nelsoni). The sparrows did not respond to treatments, but bobolinks responded strongly to post-breeding location cues, irrespective of habitat quality. The following year, 17/20 sub-optimal plots to which bobolink males were recruited were defended for at least two weeks, indicating that song heard the previous year could exert a ‘carry-over attraction’ effect on conspecifics the following year. Sixteen recruited males were natal dispersers, as expected when animals have little opportunity to directly sample their natal habitat quality. We suggest that differences in breeding synchronicity may induce an equivalent clinal distribution of ISI use. PMID:16543178

  15. The role of thromboxane in experimental inadvertent intra-arterial drug injections.

    Science.gov (United States)

    Zachary, L S; Smith, D J; Heggers, J P; Robson, M C; Boertman, J A; Niu, X T; Schileru, R E; Sacks, R J

    1987-03-01

    Inadvertent intra-arterial injection of drugs produces a well-defined clinical syndrome whose pathophysiology remains unclear. This study was designed to determine the role of the inflammatory mediator, thromboxane, in intra-arterial drug injections. The rabbit ear model, as described by Kinmonth and Sheppard, was used. Five of the experimental groups were treated with specific or nonspecific thromboxane blocking agents and two groups served as controls. Immunohistochemical staining of the control ears showed elevated levels of thromboxane within the first 6 hours postinjury. The specific thromboxane blocking agents, methimazole and Aloe vera, showed almost complete blockade of thromboxane production. The percentage of ear survival was significantly greater in the group treated with topical Aloe vera (p less than 0.05) and even greater survival was achieved in the combined Aloe vera/methimazole group (p less than 0.01). On the basis of these results, we have begun treatment of such injuries with specific and nonspecific thromboxane blocking agents.

  16. Measuring virgin female aggression in the female intruder test (FIT: effects of oxytocin, estrous cycle, and anxiety.

    Directory of Open Access Journals (Sweden)

    Trynke R de Jong

    Full Text Available The costs of violence and aggression in our society have stimulated the scientific search for the predictors and causes of aggression. The majority of studies have focused on males, which are considered to be more aggressive than females in most species. However, rates of offensive behavior in girls and young women are considerable and are currently rising in Western society. The extrapolation of scientific results from males to young, non-maternal females is a priori limited, based on the profound sex differences in brain areas and functioning of neurotransmitters involved in aggression. Therefore, we established a paradigm to assess aggressive behavior in young virgin female rats, i.e. the female intruder test (FIT. We found that approximately 40% of un-manipulated adult (10-11 weeks old female Wistar rats attack an intruder female during the FIT, independent of their estrous phase or that of their intruder. In addition, adolescent (7-8 weeks old female rats selected for high anxiety behavior (HABs displayed significantly more aggression than non-selected (NAB or low-anxiety (LAB rats. Intracerebroventricular infusion of oxytocin (OXT, 0.1 µg/5 µl inhibited aggressive behavior in adult NAB and LAB, but not HAB females. Adolescent NAB rats that had been aggressive towards their intruder showed increased pERK immunoreactivity (IR in the hypothalamic attack area and reduced pERK-IR in OXT neurons in the paraventricular hypothalamic nucleus compared to non-aggressive NAB rats. Taken together, aggressive behavior in young virgin female rats is partly dependent on trait anxiety, and appears to be under considerable OXT control.

  17. Measuring virgin female aggression in the female intruder test (FIT): effects of oxytocin, estrous cycle, and anxiety.

    Science.gov (United States)

    de Jong, Trynke R; Beiderbeck, Daniela I; Neumann, Inga D

    2014-01-01

    The costs of violence and aggression in our society have stimulated the scientific search for the predictors and causes of aggression. The majority of studies have focused on males, which are considered to be more aggressive than females in most species. However, rates of offensive behavior in girls and young women are considerable and are currently rising in Western society. The extrapolation of scientific results from males to young, non-maternal females is a priori limited, based on the profound sex differences in brain areas and functioning of neurotransmitters involved in aggression. Therefore, we established a paradigm to assess aggressive behavior in young virgin female rats, i.e. the female intruder test (FIT). We found that approximately 40% of un-manipulated adult (10-11 weeks old) female Wistar rats attack an intruder female during the FIT, independent of their estrous phase or that of their intruder. In addition, adolescent (7-8 weeks old) female rats selected for high anxiety behavior (HABs) displayed significantly more aggression than non-selected (NAB) or low-anxiety (LAB) rats. Intracerebroventricular infusion of oxytocin (OXT, 0.1 µg/5 µl) inhibited aggressive behavior in adult NAB and LAB, but not HAB females. Adolescent NAB rats that had been aggressive towards their intruder showed increased pERK immunoreactivity (IR) in the hypothalamic attack area and reduced pERK-IR in OXT neurons in the paraventricular hypothalamic nucleus compared to non-aggressive NAB rats. Taken together, aggressive behavior in young virgin female rats is partly dependent on trait anxiety, and appears to be under considerable OXT control.

  18. Inadvertent Splenectomy During Resection for Colorectal Cancer Does Not Increase Long-term Mortality in a Propensity Score Model

    DEFF Research Database (Denmark)

    Lolle, Ida; Pommergaard, Hans-Christian; Schefte, David F

    2016-01-01

    BACKGROUND: Previous studies suggest that long-term mortality is increased in patients who undergo splenectomy during surgery for colorectal cancer. The reason for this association remains unclear. OBJECTIVE: The purpose of this study was to investigate the association between inadvertent...... splenectomy attributed to iatrogenic lesion to the spleen during colorectal cancer resections and long-term mortality in a national cohort of unselected patients. DESIGN: This was a retrospective, nationwide cohort study. SETTINGS: Data were collected from the database of the Danish Colorectal Cancer Group...... for patients surviving 30 days after surgery. Secondary outcomes were 30-day mortality and risk factors for inadvertent splenectomy. Multivariable and propensity-score matched Cox regression analyses were used to adjust for potential confounding. RESULTS: In total, 23,727 patients were included, of which 277...

  19. Comparison of resistive heating and forced-air warming to prevent inadvertent perioperative hypothermia.

    Science.gov (United States)

    John, M; Crook, D; Dasari, K; Eljelani, F; El-Haboby, A; Harper, C M

    2016-02-01

    Forced-air warming is a commonly used warming modality, which has been shown to reduce the incidence of inadvertent perioperative hypothermia (heating mattresses offer a potentially cheaper alternative, however, and one of the research recommendations from the National Institute for Health and Care Excellence was to evaluate such devices formally. We conducted a randomized single-blinded study comparing perioperative hypothermia in patients receiving resistive heating or forced-air warming. A total of 160 patients undergoing non-emergency surgery were recruited and randomly allocated to receive either forced-air warming (n=78) or resistive heating (n=82) in the perioperative period. Patient core temperatures were monitored after induction of anaesthesia until the end of surgery and in the recovery room. Our primary outcome measures included the final intraoperative temperature and incidence of hypothermia at the end of surgery. There was a significantly higher rate of hypothermia at the end of surgery in the resistive heating group compared with the forced-air warming group (P=0.017). Final intraoperative temperatures were also significantly lower in the resistive heating group (35.9 compared with 36.1°C, P=0.029). Hypothermia at the end of surgery in both warming groups was common (36% forced air warming, 54% resistive heating). Our results suggest that forced-air warming is more effective than resistive heating in preventing postoperative hypothermia. NCT01056991. © The Author 2016. Published by Oxford University Press on behalf of the British Journal of Anaesthesia. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  20. The social image of drinking - mass media campaigns may inadvertently increase binge drinking.

    Science.gov (United States)

    Zimmermann, Friederike; Kohlmann, Karoline; Monter, Anne; Ameis, Nina

    2017-10-01

    Mass media campaigns that promote responsible drinking are rarely tested for their usefulness in reducing heavy alcohol consumption. Existing campaigns that appeal to responsible drinking while simultaneously displaying young people in social drinking situations may even have paradoxical effects. To examine such possible effects, we drew on a real-world media campaign, which we systematically modified on the basis of recent prototype research. We pilot tested questionnaires (using n = 41 participants), developed two different sets of posters in the style of an existing campaign (n = 39) and investigated their effectiveness (n = 102). In the main study, young men were randomly assigned to one of three conditions: sociable or unsociable binge drinker prototype condition or a control group. Outcome variables were intention, behavioural willingness, attitude, subjective norm, self-efficacy, prototype evaluation and prototype similarity with respect to binge drinking. Binge drinking as a habit was included to control for the fact that habitual drinking in social situations is hard to overcome and poses a particular challenge to interventions. The manipulation check showed that the experimental variation (sociable vs. unsociable drinker prototype condition) was successful. Results of the main study showed that the sociable drinker prototype condition resulted in a higher willingness and - for those with less of a habit - a higher intention to binge drink the next weekend. The unsociable drinker prototype condition had no effects. The results imply that the social components of mass media campaigns might inadvertently exacerbate binge drinking in young men. We therefore advocate against campaigns including aspects of alcohol consumption that might be positively associated with drinker prototype perception. Finally, we provide suggestions for future research.

  1. Les femmes et le langage selon Charles Bally: "des moments de décevante inadvertance"?

    Directory of Open Access Journals (Sweden)

    Durrer, Sylvie

    2002-01-01

    Full Text Available Les problématiques rassemblées parfois sous la désignation de "Language and Gender" figurent également dans les publications du linguiste suisse Charles Bally. Cet axe de réflexion, qui n’a guère été remarqué dans son œuvre, mérite d’être mis en lumière, non pas pour faire de Bally un féministe avant l’heure, mais simplement, parce qu’il nous semble important de documenter l’histoire d’une problématique en plein essor. Cet article a donc pour objectif de montrer que la question du traitement des femmes et du féminin par la langue française suscite de nombreuses réflexions dès la fin du XIXe. Il s’agira de procéder à une histoire critique d’un épisode de la "linguistique générique", afin de voir si les actuelles thématiques de cette orientation sont abordées, sous quels aspects, dans quels contextes, avec quels résultats, etc. On pourrait alors être surpris-e de découvrir que Charles Bally n’était pas un cas isolé, mais qu’un grand nombre de contemporains (Nyrop, Brunot, Vendryès, Damourette & Pichon, Dauzat, etc., se sont eux aussi interrogés, plus ou moins longuement, sur les rapports entre les femmes, le féminin et le langage. Les réflexions "génériques" de Bally et de ses confrères ne sauraient donc être regardées comme de simples "moments décevante inadvertance".

  2. Inadvertent exaggerated anticoagulation following use of bismuth subsalicylate in an enterally fed patient receiving warfarin therapy.

    Science.gov (United States)

    Bingham, Angela L; Brown, Rex O; Dickerson, Roland N

    2013-12-01

    We report a case of an inadvertent increase in the international normalized ratio (INR) after the addition of bismuth subsalicylate for the treatment of diarrhea in an enterally fed patient receiving warfarin therapy. A 56-year-old Caucasian female presented to the trauma intensive care unit (ICU) with multiple lower extremity fractures. Warfarin was initiated for deep vein thrombosis prophylaxis due to the patient's inability to ambulate. The target INR was 2-3. Continuous intragastric enteral feeding was withheld 1 hour before and 1 hour after intragastric administration of warfarin. Bismuth subsalicylate 30 mL every 4 hours was prescribed for diarrhea. Within 3 days after starting bismuth subsalicylate therapy, the patient's INR increased from 2.56 to 3.54 and minor bleeding was noted from the patient's tracheostomy site. No significant change in warfarin dosage, variability in vitamin K intake, or medications that potentially alter warfarin metabolism were present during the unexpected rise in INR. When the bismuth subsalicylate was discontinued, the patient's INR stabilized into the target range on the same warfarin dose given at the time of the supratherapeutic INR. Salicylate displaces warfarin from plasma protein binding sites and may result in a significant increase in INR secondary to redistribution of warfarin to the free active form. Evaluation of this case report using the Drug Interaction Probability Scale and Naranjo Adverse Drug Reaction Probability Scale yielded scores consistent with a probable adverse drug interaction. Bismuth subsalicylate exaggerates warfarin's anticoagulant response and its concurrent use during warfarin therapy should be avoided.

  3. Inadvertent brachial plexus anesthesia associated with local anesthetic infiltration during internal jugular venous cannulation: a case report.

    Science.gov (United States)

    Karabiyik, L; Tezer, T

    2011-01-01

    In the development of neurological complications due to central venous cannulation, the properties of the anatomical region and the experience of the practitioner are important. In this case report, an inadvertent brachial plexus anesthesia after repeated local anesthetic infiltrations during failed attempts of internal jugular venous cannulation by an inexperienced practitioner in cardiovascular intensive care unit is described. The neurological complications due to central venous cannulation are reviewed in the light of actual literature data.

  4. Design characteristics to reduce inadvertent cross-axis coupling during side stick handling of aircraft pitch and roll axis control

    Science.gov (United States)

    Cote, Marie-Eve

    Integrating a manual flight control inceptor with coupled axes such as the side stick within a flight deck creates challenges for the pilot to input a one-axis command without inadvertently inducing inputs in the opposite axis. The present paper studies three design features of the side stick and armrest setup believed to help reduce inadvertent cross-axis coupling occurrences. Design features address the aimed pilot population anthropometry (1.57m woman to 1.9m male) and their variability in upper segment measurements. Seven pilots of varying anthropometric sizes were asked to perform one-axis manoeuvres in pitch and roll for each setup configuration. To compare the setups both the duration and the definite integral of the unintended cross-axis input were processed and analyzed for each manoeuvre. Findings show that a short armrest reduces the occurrences of cross-axis input for the roll manoeuvre, whereas the side stick skew reduces inadvertent cross-axis coupling for the pitch manoeuvres.

  5. Corticosterone response in a resident-intruder-paradigm depends on social state and coping style in adolescent male Balb-C mice.

    Science.gov (United States)

    Pletzer, Belinda; Klimesch, Wolfgang; Oberascher-Holzinger, Karin; Kerschbaum, Hubert H

    2007-10-01

    Social stressors modulate the hypothalamic-pituitary-adrenal axis in rodents. However, reports on the association between corticosterone level and behavioural responses to the stressor are ambivalent. This may depend on the experimental paradigm, species- and strain-differences, duration of exposure to the stressor, but also on using either the social state (dominant or subordinate) or the coping style (proactive or passive) of an animal to correlate the corticosterone level with. We used male Balb-C mice in a resident-intruder paradigm. Adolescent intruders (aged five to eight weeks) were transferred into the cage of an adult resident (aged about four month) for five minutes. The interactions were video-taped for behavioural analysis. Ten minutes after the encounters, intruders were sacrificed and blood samples were collected. Dominant intruders showed offensive behaviours (attack, chase, tail tracking) and won most of the fights, whereas subordinate intrudes showed mainly submissive behaviours (flight, freezing) and were further classified into active and passive subordinates. Active subordinates displayed significantly more flight-behaviour than passive subordinates. Dominant intruders showed significantly higher post-stress levels of corticosterone than subordinates, which did not differ from control mice, which experienced five minutes of novel-cage exposure. Comparing all three behavioural phenotypes we found the lowest corticosterone levels in active subordinates. Social state significantly affects the HPA-axis response to acute social stressors.

  6. Active body surface warming systems for preventing complications caused by inadvertent perioperative hypothermia in adults.

    Science.gov (United States)

    Madrid, Eva; Urrútia, Gerard; Roqué i Figuls, Marta; Pardo-Hernandez, Hector; Campos, Juan Manuel; Paniagua, Pilar; Maestre, Luz; Alonso-Coello, Pablo

    2016-04-21

    Inadvertent perioperative hypothermia is a phenomenon that can occur as a result of the suppression of the central mechanisms of temperature regulation due to anaesthesia, and of prolonged exposure of large surfaces of skin to cold temperatures in operating rooms. Inadvertent perioperative hypothermia has been associated with clinical complications such as surgical site infection and wound-healing delay, increased bleeding or cardiovascular events. One of the most frequently used techniques to prevent inadvertent perioperative hypothermia is active body surface warming systems (ABSW), which generate heat mechanically (heating of air, water or gels) that is transferred to the patient via skin contact. To assess the effectiveness of pre- or intraoperative active body surface warming systems (ABSW), or both, to prevent perioperative complications from unintended hypothermia during surgery in adults. We searched the Cochrane Central Register of Controlled Trials (CENTRAL; Issue 9, 2015); MEDLINE (PubMed) (1964 to October 2015), EMBASE (Ovid) (1980 to October 2015), and CINAHL (Ovid) (1982 to October 2015). We included randomized controlled trials (RCTs) that compared an ABSW system aimed at maintaining normothermia perioperatively against a control or against any other ABSW system. Eligible studies also had to include relevant clinical outcomes other than measuring temperature alone. Several authors, by pairs, screened references and determined eligibility, extracted data, and assessed risks of bias. We resolved disagreements by discussion and consensus, with the collaboration of a third author. We included 67 trials with 5438 participants that comprised 79 comparisons. Forty-five RCTs compared ABSW versus control, whereas 18 compared two different types of ABSW, and 10 compared two different techniques to administer the same type of ABSW. Forced-air warming (FAW) was by far the most studied intervention.Trials varied widely regarding whether the interventions were

  7. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: the ONSITE/MAXI1 computer program. Supplement No. 1

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.; Neuder, S.M.

    1986-05-01

    The document entitled Intruder Dose Pathway Analysis of the Onsite Disposal of Radioactive Wastes: The ONSITE/MAXI1 Computer Program (1984) summarizes initial efforts to develop human-intrustion scenarios and a modified version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. This document is a supplement to that document and summarizes efforts to further modify and improve the ONSITE/MAXI1 software package. To facilitate cross-referencing, it follows the same format. Notable improvements to the software package include the capability to account for shielding conditions that represent noncompacted trash wastes and the option to indicate alternative land-use condition;s. This supplement contains a description of the implementation of these modifications. In addition, a series of discussions are included in an attempt to increase the user's understanding of the scenarios and dose calculation methods. These discussions respond to frequently asked questions about the mathematical models and use of the software. Computer listings of the ONSITE/MAXI1 computer program are included as Appendices A and B of this document. Appendix C lists external exposure dose-rate factor libraries

  8. Warming of intravenous and irrigation fluids for preventing inadvertent perioperative hypothermia.

    Science.gov (United States)

    Campbell, Gillian; Alderson, Phil; Smith, Andrew F; Warttig, Sheryl

    2015-04-13

    Inadvertent perioperative hypothermia (a drop in core temperature to below 36°C) occurs because of interference with normal temperature regulation by anaesthetic drugs, exposure of skin for prolonged periods and receipt of large volumes of intravenous and irrigation fluids. If the temperature of these fluids is below core body temperature, they can cause significant heat loss. Warming intravenous and irrigation fluids to core body temperature or above might prevent some of this heat loss and subsequent hypothermia. To estimate the effectiveness of preoperative or intraoperative warming, or both, of intravenous and irrigation fluids in preventing perioperative hypothermia and its complications during surgery in adults. We searched the Cochrane Central Register of Controlled Trials (CENTRAL) (2014, Issue 2), MEDLINE Ovid SP (1956 to 4 February 2014), EMBASE Ovid SP (1982 to 4 February 2014), the Institute for Scientific Information (ISI) Web of Science (1950 to 4 February 2014), Cumulative Index to Nursing and Allied Health Literature (CINAHL) EBSCOhost (1980 to 4 February 2014) and reference lists of identified articles. We also searched the Current Controlled Trials website and ClinicalTrials.gov. We included randomized controlled trials or quasi-randomized controlled trials comparing fluid warming methods versus standard care or versus other warming methods used to maintain normothermia. Two review authors independently extracted data from eligible trials and settled disputes with a third review author. We contacted study authors to ask for additional details when needed. We collected data on adverse events only if they were reported in the trials. We included in this review 24 studies with a total of 1250 participants. The trials included various numbers and types of participants. Investigators used a range of methods to warm fluids to temperatures between 37°C and 41°C. We found that evidence was of moderate quality because descriptions of trial design were

  9. Indirect usage of miniscrew anchorage to intrude overerupted mandibular incisors in a Class II patient with a deep overbite.

    Science.gov (United States)

    Ishihara, Yoshihito; Kuroda, Shingo; Sugawara, Yasuyo; Balam, Tarek A; Takano-Yamamoto, Teruko; Yamashiro, Takashi

    2013-04-01

    Vertical dentoalveolar discrepancies are a common problem in orthodontic patients but are often difficult to treat with traditional mechanics. This case report illustrates the successful treatment of overerupted mandibular incisors via the indirect use of miniscrew anchorage. A woman (age, 22 years 9 months) had chief complaints of maxillary incisor protrusion and crooked teeth. An excessive curve of Spee caused by elongation of the mandibular incisors was also found. The patient was diagnosed with a severe Class II Division 1 malocclusion and a deep overbite. After extraction of the mandibular first premolars and the subsequent leveling phase, the elongated incisors were intruded with a novel method, which involved the combined use of sectional archwires and miniscrews placed in the premolar areas. After the procedure, the mandibular incisors had been intruded by 6.5 mm with no undesirable side effects. The total active treatment period was 42 months. The resultant occlusion and satisfactory facial profile were maintained after 30 months of retention. Our novel intrusion approach shows potential for correcting a deep overbite. Copyright © 2013 American Association of Orthodontists. Published by Mosby, Inc. All rights reserved.

  10. [Indirect usage of miniscrew anchorage to intrude overerupted mandibular incisors in a Class II patient with a deep overbite].

    Science.gov (United States)

    Ishihara, Yoshihito; Kuroda, Shingo; Sugawara, Yasuyo; Balam, Tarek A; Takano-Yamamoto, Teruko; Yamashiro, Takashi

    2016-06-01

    Vertical dentoalveolar discrepancies are a common problem in orthodontic patients but are often difficult to treat with traditional mechanics. This case report illustrates the successful treatment of overerupted mandibular incisors via the indirect use of miniscrew anchorage. A woman (age, 22 years 9 months) had chief complaints of maxillary incisor protrusion and crooked teeth. An excessive curve of Spee caused by elongation of the mandibular incisors was also found. The patient was diagnosed with a severe Class II Division 1 malocclusion and a deep overbite. After extraction of the mandibular first premolars and the subsequent leveling phase, the elongated incisors were intruded with a novel method, which involved the combined use of sectional archwires and miniscrews placed in the premolar areas. After the procedure, the mandibular incisors had been intruded by 6.5 mm with no undesirable side effects. The total active treatment period was 42 months. The resultant occlusion and satisfactory facial profile were maintained after 30 months of retention. Our novel intrusion approach shows potential for correcting a deep overbite. © EDP Sciences, SFODF, 2016.

  11. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1992-05-01

    This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicitly displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information

  12. [Prewarming according to the AWMF S3 guidelines on preventing inadvertant perioperative hypothermia 2014 : Retrospective analysis of 7786 patients].

    Science.gov (United States)

    Grote, R; Wetz, A J; Bräuer, A; Menzel, M

    2018-01-01

    Inadvertent perioperative hypothermia, which is defined as a core body temperature of less than 36.0 °C, can have serious consequences in surgery patients. These include cardiac complications, increased blood loss, wound infections and postoperative shivering; therefore, the scientific evidence that inadvertent perioperative hypothermia should be avoided is undisputed and several national guidelines have been published summarizing the scientific evidence and recommending specific procedures. The German AWMF guidelines were the first to emphasize the importance of prewarming for surgery patients to avoid inadvertant perioperative hypothermia; however, in contrast to intraoperative warming, prewarming is so far not sufficiently implemented in clinical practice in many hospitals. Furthermore, a recent study has questioned the effectiveness of prewarming. The aim of this retrospective investigation was to evaluate the hypothermia rates that can be achieved when prewarming in the anesthesia induction room is introduced into the clinical practice and performed in addition to intraoperative warming. The ethics committee of the Medical Faculty of the Martin Luther University Halle Wittenberg gave approval for data storage and retrospective data analysis from the anesthesia database. According to the existing local standard operating procedure, prewarming with forced air was performed in addition to intraoperative warming in the anesthesia induction room in 3899 patients receiving general anesthesia with a duration of 30 min or longer from January 2015 to December 2016. The results were compared with a control group of 3887 patients from July 2012 to August 2014 who received intraoperative warming but were not subjected to prewarming. Tracheal intubation was carried out in all patients and temperature measurements after the induction of anesthesia were performed using esophageal, urinary catheter or intra-arterial temperature probes. The mean duration of prewarming

  13. A Technique to Salvage Big-Bubble Deep Anterior Lamellar Keratoplasty after Inadvertent Full-Thickness Trephination

    Directory of Open Access Journals (Sweden)

    Siamak Zarei-Ghanavati

    2011-01-01

    Full Text Available Herein we describe a technique for management of large inadvertent full-thickness trephination during deep anterior lamellar keratoplasty using the big-bubble technique without converting to penetrating keratoplasty. First, the anterior chamber is formed with an ophthalmic viscosurgical device (OVD. Then, the full-thickness wound is secured with one X-type 10-0 nylon suture. A 27-gauge needle is attached to a 2 ml air-filled syringe and inserted into the corneal stroma in the meridian opposite to the site of full-thickness trephination. Air is gently injected to produce a limited area of "big-bubble" detaching Descemet′s membrane (DM from the corneal stroma. The "big bubble" is slowly expanded with injection of OVD. Finally, the recipient stroma is removed, the donor lenticule is placed and the DM tear is secured with one full thickness 10-0 nylon suture.

  14. Influence of sternal size and inadvertent paramedian sternotomy on stability of the closure site: a clinical and mechanical study.

    Science.gov (United States)

    Zeitani, J; Penta de Peppo, A; Moscarelli, M; Guerrieri Wolf, L; Scafuri, A; Nardi, P; Nanni, F; Di Marzio, E; De Vico, P; Chiariello, L

    2006-07-01

    The influence of sternal size and of inadvertent paramedian sternotomy on stability of the closure site is not well defined. Data on 171 consecutive patients undergoing cardiac surgery through a midline sternotomy were prospectively collected. Intraoperative measurements of sternal dimension included thickness and width at the manubrium, the third and fifth intercostal spaces; paramedian sternotomy was defined as width of one side of the sternum equaling 75% or more of the entire width, at any of the three levels. The chest was closed with simple peristernal steel wires and inspected to detect deep wound infection and/or instability for 3 postoperative months. The sternal factors and several patient/surgery-related factors were included in a multivariate analysis model to identify factors affecting stability. An electromechanical traction test was conducted on 6 rewired sternal models after midline or paramedian sternotomy and separation data were analyzed. Chest instability was detected in 12 (7%) patients and wound infection in 2 (1.2%). Patient weight (P = .03), depressed left ventricular function (P = .04), sternum thickness (indexed to body weight, P = .03), and paramedian sternotomy (P = .0001) were risk factors of postoperative instability; paramedian sternotomy was the only independent predictor (P = .001). The electromechanical test showed more lateral displacement of the two rewired sternal halves after paramedian than midline sternotomy (P = .002); accordingly, load at fracture point was lower after paramedian sternotomy (220 +/- 20 N vs 545 +/- 25 N, P = 0.001). Inadvertent paramedian sternomoty strongly affects postoperative chest wound stability independently from sternal size, requiring prompt reinforcement of chest closure.

  15. Medical Professionals and Smartphone Applications.

    Science.gov (United States)

    Arunagiri, Varun; Parimala, M; Ragumani, P; Anbalagan, Kothai

    2017-06-01

    Ever since the advent of Smartphones, Smartphone applications (SAs) are revolutionizing the contemporary medicine. Smartphone application which was created in view of swift communications among the general public has now intruded the medical fraternity. But the ethics for using these applications to transfer patients' medical records through SA is bewildering among the medical professionals (MPs).

  16. Fully automated radiochemical preparation system for gamma-spectroscopy on fission products and the study of the intruder and vibrational levels in 83Se

    International Nuclear Information System (INIS)

    Lien, O.G. III.

    1983-10-01

    AUTOBATCH was developed to provide a usable source of short-lived neutron-rich nuclides through chemical preparation of the sample from fission products for detailed gamma-ray spectroscopy, which would complement the output of on-line isotope separators. With AUTOBATCH the gamma rays following the β - decay of 83 As were studied to determine the ground state spin and parity of 83 As to be 5/2 - ; the absolute intensity of the β - branch from 83 As to 83 Se/sup m/ to be 0.3%; the absolute intensity of the ground state β - branch from 83 Se/sup m/ to 83 Br to be 39%; the halflife of the 5/2 1 + level to be 3.2 ns; and the structure of 83 Se 49 . Results are used to show that the intruder structure which had been previously observed in the odd mass 49 In isotopes could be observed in the N = 49 isotones. The observed structure is discussed in terms of the unified model calculations of Heyde which has been used to describe the intruder structure in the indium nuclei. The intruder structure is most strongly developed, not at core mid-shell, 89 Zr 49 , but rather at core mid-sub-shell 83 Se. This difference is qualitatively understood to be due to the blocking of collectivity by the Z = 40 subshell closure which prevents the intruder structure from occurring in 87 Sr 49 and 89 Zr 49

  17. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock -revision 1

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1996-04-01

    Canada has conducted an extensive research program on a concept of safe disposal of nuclear fuel wastes deep In plutonic rock of the Canadian Shield. An essential goal of this program has been to develop and demonstrate a methodology to evaluate the performance of the facility against safety criteria established by Canada's regulatory agency, the Atomic Energy Control Board. These criteria are expressed in terms of risk, where risk is defined as the sum, over all significant scenarios, of the product of the probability of the scenario, the magnitude of the resultant dose, and the probability of a health effect per unit dose. This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicity displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information. (author). 53 refs., 8 tabs., 2 figs

  18. Infraclavicular brachial plexus block for the management of inadvertent intraarterial drug administration after arterial insertion of a venous cannula during ultrasound-guided venous cannulation.

    Science.gov (United States)

    Leo, Anne-Marie; Mislovic, Branislav

    2014-09-15

    This case report documents the inadvertent placement of an arterial cannula despite using realtime ultrasound to insert a peripheral venous cannula in a child with difficult venous access. The resultant limb ischemia was treated with an infraclavicular ultrasound-guided brachial plexus block as sympatholytic treatment.

  19. Facing the crowd: intruder pressure, within-group competition, and the resolution of conflicts over group-membership

    Science.gov (United States)

    Port, Markus; Johnstone, Rufus A

    2013-01-01

    Recent theory in social evolution has been mainly concerned with competition and cooperation within social groups of animals and their impact on the stability of those groups. Much less attention has been paid to conflicts arising as a result of solitary floaters (outsiders) attempting to join groups of established residents (insiders). We model such conflicts over group-membership using a demographically explicit approach in which the rates of births and deaths in a population determine the availability of group-vacancies and the number of floaters competing over these vacancies. We find that the outcome of within-group competition, reflected in the partitioning of reproduction among group members, exerts surprisingly little influence on the resolution of insider-outsider conflict. The outcome of such conflict is also largely unaffected by differences in resource holding potential between insiders and outsiders. By contrast, whether or not groups form is mainly determined by demographic factors (variation in vital rates such as fecundity and mortality) and the resulting population dynamics. In particular, at high floater densities territory defense becomes too costly, and groups form because insiders give in to the intruder pressure imposed on them by outsiders. We emphasize the importance of insider-outsider conflicts in social evolution theory and highlight avenues for future research. PMID:23762508

  20. Formation of tectonic peperites from alkaline magmas intruded into wet sediments in the Beiya area, western Yunnan, China

    Science.gov (United States)

    Xu, Xing-Wang; Cai, Xin-Ping; Zhong, Jia-You; Song, Bao-Chang; Peters, Stephen G.

    2007-01-01

    Tertiary (3.78 Ma to 3.65 Ma) biotite-K-feldspar porphyritic bodies intrude Tertiary, poorly consolidated lacustrine sedimentary rocks in the Beiya mineral district in southwestern China. The intrusives are characterized by a microcrystalline and vitreous-cryptocrystalline groundmass, by replacement of some tabular K-feldspar phenocrysts with microcrystalline chlorite and calcite, and by Fe-rich rings surrounding biotite phenocrysts. Peculiar structures, such as contemporary contact faults and slickensides, ductile shear zones and flow folds, foliation and lineations, tension fractures, and banded and boudin peperites, are developed along the contact zones of the intrusives. These features are related to the forceful intrusion of the alkaline magmas into the wet Tertiary sediments. The partially consolidated magmas were deformed and flattened by continued forceful magma intrusion that produced boudinaged and banded peperites. These peperites characterized by containing oriented deformation fabrics are classified as tectonic peperites as a new type of peperite, and formation of these tectonic peperites was related to fracturing of magmas caused by forceful intrusion and shear deformation and to contemporary migration and injection of fluidized sediments along fractures that dismembered the porphyritic magma. Emplacement of the magma into the wet sediments in the Beiya area is interpreted to be related to a large pressure difference rather than to the buoyancy force.

  1. Coupling Effect of Intruding Water and Inherent Gas on Coal Strength Based on the Improved (Mohr-Coulomb Failure Criterion

    Directory of Open Access Journals (Sweden)

    Yiyu Lu

    2016-11-01

    Full Text Available When employing hydraulic processes to increase gas drainage efficiency in underground coal mines, coal seams become a three-phase medium, containing water intruding into the coal pores with the inherent occurrence of gas. This can change the stress state of the coal and cause instability. This work studied the mechanical properties of coal containing water and gas and derived an appropriate failure criterion. Based on mixture theory of unsaturated porous media, the effective stress of coal, considering the interaction of water and gas, was analyzed, and the failure criterion established by combining this with the Mohr–Coulomb criterion. By introducing the stress factor of matrix suction and using fitted curves of experimentally determined matrix suction and moisture content, the relationships between coal strength, gas pressure, and moisture content were determined. To verify the established strength theory, a series of triaxial compression strength tests of coal containing water and gas were carried out on samples taken from the Songzao, Pingdingshan, and Tashan mines in China. The experimental results correlated well with the theoretical predictions. The results showed a linear decrease in the peak strength of coal with increasing gas pressure and an exponential reduction in peak strength with increasing moisture content. The strength theory of coal containing water and gas can become an important part of multiphase medium damage theory.

  2. Incidence of Inadvertent Dural Puncture During CT Fluoroscopy-Guided Interlaminar Epidural Corticosteroid Injections in the Cervical Spine: An Analysis of 974 Cases.

    Science.gov (United States)

    Amrhein, T J; Parivash, S N; Gray, L; Kranz, P G

    2017-09-01

    The objective of this study is to determine the rate of inadvertent dural puncture during CT fluoroscopy-guided cervical interlaminar epidural corticosteroid injection. In addition, in a subanalysis, we aim to assess the rate of inadvertent dural puncture superior to C5-C6 occurring during interlaminar epidural corticosteroid injection using CT fluoroscopy guidance because such injections are not performed using conventional fluoroscopy. Images obtained from consecutive CT fluoroscopy-guided cervical interlaminar epidural corticosteroid injections conducted from November 2009 to November 2015 were reviewed. The following information was recorded: the presence of inadvertent dural puncture, the level of the cervical interlaminar space, approach laterality (left or right), anteroposterior spinal canal diameter, and the presence of a trainee. Two-tailed Fisher exact tests were used for assessment of categoric variables, and t tests were used for continuous variables. A total of 974 cervical interlaminar epidural corticosteroid injections were identified in 728 patients. Inadvertent dural punctures were identified in association with 1.4% (14/974) of these injections; all punctures were recognized during the procedure. Needle placements were performed at every cervical level (C1-C2 through C7-T1). The highest rate of dural puncture (2.8%) occurred at C5-C6. No dural punctures occurred superior to C5-C6 (16.6% of cases). The complication rate was 0.4%. Only greater anteroposterior spinal canal diameter was associated with increased dural puncture rates (p = 0.049). CT fluoroscopy-guided cervical interlaminar epidural corticosteroid injections were performed at all levels throughout the cervical spine. A very low complication rate and a minimal rate of inadvertent dural puncture were noted, similar to previously reported rates for conventional fluoroscopy-guided injections limited to the lower cervical spine only.

  3. Inadvertent Splenectomy During Resection for Colorectal Cancer Does Not Increase Long-term Mortality in a Propensity Score Model: A Nationwide Cohort Study.

    Science.gov (United States)

    Lolle, Ida; Pommergaard, Hans-Christian; Schefte, David F; Bulut, Orhan; Krarup, Peter-Martin; Rosenstock, Steffen J

    2016-12-01

    Previous studies suggest that long-term mortality is increased in patients who undergo splenectomy during surgery for colorectal cancer. The reason for this association remains unclear. The purpose of this study was to investigate the association between inadvertent splenectomy attributed to iatrogenic lesion to the spleen during colorectal cancer resections and long-term mortality in a national cohort of unselected patients. This was a retrospective, nationwide cohort study. Data were collected from the database of the Danish Colorectal Cancer Group and merged with data from the National Patient Registry and the National Pathology Databank. Danish patients with colorectal cancer undergoing curatively intended resection between 2001 and 2011 were included in the study. The primary outcome was long-term mortality for patients surviving 30 days after surgery. Secondary outcomes were 30-day mortality and risk factors for inadvertent splenectomy. Multivariable and propensity-score matched Cox regression analyses were used to adjust for potential confounding. In total, 23,727 patients were included, of which 277 (1.2%) underwent inadvertent splenectomy. There was no association between inadvertent splenectomy and long-term mortality (adjusted HR = 1.15 (95% CI, 0.95-1.40); p = 0.16) in the propensity score-matched model, whereas 30-day mortality was significantly increased (adjusted HR = 2.31 (95% CI, 1.71-3.11); p splenectomy was most often seen during left hemicolectomy (left hemicolectomy vs right hemicolectomy: OR = 24.76 (95% CI, 15.30-40.06); p splenectomy during resection for colorectal cancer does not seem to increase long-term mortality. The previously reported reduced overall survival after inadvertent splenectomy may be explained by excess mortality in the immediate postoperative period.

  4. Evidence utilisation project: Management of inadvertent perioperative hypothermia. The challenges of implementing best practice recommendations in the perioperative environment.

    Science.gov (United States)

    Munday, Judy; Hines, Sonia Jane; Chang, Anne M

    2013-12-01

    The prevention of inadvertent perioperative hypothermia (IPH) remains an important issue in perioperative healthcare. The aims of this project were to: (i) assess current clinical practice in the management of IPH and (ii) promote best practice in the management of IPH in adult operating theatres. This project from August 2010 to March 2012 utilised a system of audit and feedback to implement best practice recommendations. Data were collected via chart audits against criteria developed from best practice recommendations for managing IPH. Evidence-based best practices, such as consistent temperature monitoring and patient warming, were implemented using multifaceted interventions. Perioperative records for 73 patients (baseline) and 72 patients (post-implementation) were audited. Post-implementation audit showed an increase in patients with temperatures >36°C admitted to the post-anaesthetic care unit (PACU) (8%) and discharged from PACU (28%). The percentage of patients receiving preoperative temperature monitoring increased (38%); however, low levels of intraoperative monitoring remained (31% of patients with surgery of 30 min or longer duration). Small increases were found in patient warming of 5% intraoperatively and 8% postoperatively. Preoperative warming was not successfully implemented during this phase of the project. Temperature monitoring, warming and rates of normothermia improved; however, barriers to best practice of IPH management were experienced, which negatively impacted on the project. Further stages of implementation and audit were added to further address IPH management in this department. © 2013 The Authors. International Journal of Evidence-Based Healthcare © 2013 The Joanna Briggs Institute.

  5. Inadvertent chest tube insertion in congenital cystic adenomatoid malformation and congenital lobar emphysema-highlighting an important problem

    International Nuclear Information System (INIS)

    Prabhu, Shailesh M; Choudhury, Subhasis Roy; Solanki, Ravi S; Shetty, Gurucharan S; Agarwala, Surenderkumar

    2013-01-01

    Chest tube insertion in congenital cystic lung lesions is an important problem in children with acute respiratory distress having a cystic lucent lesion on chest radiograph. To evaluate the imaging findings and complications in cases of congenital cystic lung lesions with chest tube insertion and suggest the role of appropriate imaging for management of these patients. Chest radiographs and CT scans of children with congenital cystic lung lesions who had inadvertent chest tube insertion preoperatively were retrospectively reviewed for imaging appearances and complications. Fifteen patients comprising 10 cases of congenital cystic adenomatoid malformation (CCAM) and 5 cases of congenital lobar emphysema (CLE) were included. Majority of the cases were infants. CCAM was misdiagnosed as complicated pneumatocele (n = 5) and pneumothorax (n = 5), while CLE was misdiagnosed as tension pneumothorax (n = 5) on the chest radiograph findings. Final diagnosis was made on CT and operative findings with histopathology. Complications noted were pneumothorax, hydropneumothorax, and infection in cases of CCAM, and change in imaging appearance and pneumothorax in cases of CLE. Chest tube insertion in congenital cystic lesions increases the rate of associated complications. Chest CT has a definite role in early diagnosis and deciding appropriate management in these cases

  6. Aids : A Rampant Intruder

    Directory of Open Access Journals (Sweden)

    Suresh Chandra

    2004-12-01

    Full Text Available The HIV/AIDS epidemic represents the most serious public health problem in India. There is no denial of the enormity of the problem. The prevalence of infection in all parts of the world highlights the spread from urban to rural areas and from high risk to general population. It is esti­mated that as on end of year 2004, 39.4 million people were infected with the virus. Migration of labour, low lit­eracy levels leading to low awareness, gender disparities, prevalence of sexually transmitted diseases and reproduc­tive tract infections are some of the factors attributed to the spread of HIV/AIDS.4.9 million ( 4.3 million - 6.4 million people have aquired HIV infection only in one year of span - 2004. The global AIDS epidemic killed 3.1 million ( 2,8 million- 3.5 million people in the past year.

  7. Simultaneous spectroscopy of $\\gamma$- rays and conversion electrons: Systematic study of EO transitions and intruder states in close vicinity of mid-shell point in odd-Au isotopes

    CERN Multimedia

    Venhart, M; Grant, A F; Petrik, K

    This proposal focuses on detailed systematic studies of the $\\beta$ /EC-decays of $^{179,181,183,185}$Hg leading to excited states in the neutron-deficient Au isotopes in the vicinity of the N=104 midshell. $\\gamma$-ray, X-ray and conversion electron de-excitations of odd-A Au isotopes will be studied simultaneously. These studies will address important structural questions such as the excitation energies of coexisting states, properties of multiple intruder states (i.e. intruder particles coupled to intruder cores) and mixing of coexisting structures. The unique combination of Hg beam purity and yields make ISOLDE a unique facility for these experiments.

  8. Can direct immunofluorescence testing still be accurate if performed on biopsy specimens after brief inadvertent immersion in formalin?

    Science.gov (United States)

    Arbesman, Joshua; Grover, Raminder; Helm, Thomas N; Beutner, Ernst H

    2011-07-01

    Direct immunofluorescence is useful in the diagnosis of autoimmune, vesiculobullous, and connective tissue diseases. Michel medium is typically indicated for transport, but clinicians may inadvertently place samples into formalin. We set out to determine the amount of time that specimens can remain in 10% buffered formalin and still retain their diagnostic properties. Biopsy samples were examined from cases with established diagnoses of bullous pemphigoid (n = 12), dermatitis herpetiformis (n = 6), and pemphigus vulgaris (n = 6) and exposed to formalin for time points ranging from 2 minutes to 4 hours. We found that immunoreactants were detectable in the majority of samples when subjected to 2 minutes of formalin exposure. Dermatitis herpetiformis and pemphigoid samples retained immunogenicity for 10 minutes, whereas pemphigus showed reduced immunogenicity for all samples studied. A nonimmunologic nuclear fluorochroming pattern was noted in some of the specimens after formalin immersion. Sample size, only examining 3 disease processes, and samples already having been in Michel medium were the major limitations in the study. In direct immunofluorescence studies, formalin exposure to biopsy specimens causes two types of artifactual changes: (1) the shortest exposure (2 minutes) causes complete loss of diagnostic markers of pemphigus; and (2) prolonged exposure changes tissue to a form that allows fluorescein-labeled antibodies to give fluorochroming reactions of nuclei (which can be mistaken for in vivo antinuclear antibody reactions of lupus erythematosus). After time intervals of 10 minutes to 2 hours, direct immunofluorescence studies of proven cases of bullous pemphigoid and dermatitis herpetiformis retained variable levels of specific reactivity. Copyright © 2010 American Academy of Dermatology, Inc. Published by Mosby, Inc. All rights reserved.

  9. Characterization of LP-MOCVD grown (Al, Ga)As/GaAs heterostructures by photoluminescence - Single heterojunction and inadvertent quantum wells

    Science.gov (United States)

    Zemon, S.; Norris, P.; Lee, J.; Lambert, G.; Black, J.

    1984-12-01

    Photoluminescence (PL) was used to detect rapid alloy compositional fluctuations which were found in (Al, Ga)As/GaAs heterostructures grown by low-pressure metal-organic chemical vapor deposition (LP-MOCVD). PL data are employed to estimate the thickness and aluminum composition of the resulting inadvertent quantum well. A way to eliminate these artifacts was found. Using the improved growth procedures, modulation-doped heterostructures showing two-dimensional electron-gas behavior were then achieved.

  10. A common-sense probabilistic approach to assessing inadvertent human intrusion into low-level radioactive waste at the Nevada Test Site

    International Nuclear Information System (INIS)

    Black, P.; Hooten, M.; Black, K.; Moore, B.; Rawlinson, S.; Barker, L.

    1997-01-01

    Each site disposing of low-level radioactive waste is required to prepare and maintain a site-specific performance assessment (1) to determine potential risks posed by waste management systems to the public, and the environment, and (2) to compare these risks to established performance objectives. The DOE Nevada Operations Office, Waste Management Program recently completed a one-year study of site-specific scenarios for inadvertent human intrusion by drilling into buried low-level radioactive waste sites, as part of ongoing performance assessment studies. Intrusion scenarios focus on possible penetration of buried waste through drilling for sources of groundwater. The probability of drilling penetration into waste was judged to be driven primarily by two settlement scenarios: (1) scattered individual homesteaders, and (2) a community scenario consisting of a cluster of settlers that share drilling and distribution systems for groundwater. Management control factors include institutional control, site knowledge, placards and markers, surface barriers, and subsurface barriers. The Subject Matter Experts concluded that institutional control and site knowledge may be important factors for the first few centuries, but are not significant over the evaluation period of 10,000 years. Surface barriers can be designed that would deter the siting of a drill rig over the waste site to an effectiveness of 95%. Subsurface barriers and placards and markers will not as effectively prevent inadvertent human intrusion. Homestead and community scenarios were considered by the panel to render a site-specific probability of around 10% for inadvertent human intrusion. If management controls are designed and implemented effectively, then the probability of inadvertent human intrusion can be reduced to less than 1%

  11. Adherence to a Gluten-Free Diet in Mexican Subjects with Gluten-Related Disorders: A High Prevalence of Inadvertent Gluten Intake.

    Science.gov (United States)

    Ramírez-Cervantes, Karen Lizzette; Romero-López, Angélica Viridiana; Núñez-Álvarez, Carlos Alberto; Uscanga-Domínguez, Luis F

    2016-01-01

    The rate of compliance with a gluten-free diet in patients with gluten-related disorders is unknown in most Latin American countries. To study the adherence to a gluten-free diet of Mexican individuals with celiac disease and nonceliac gluten sensitivity at the time of their first medical and nutritional consultation at a tertiary referral center. A cross-sectional study was performed. A specific questionnaire was used to gather information on demographics, clinical condition, and self-reported adherence to a gluten-free diet, and to determine strict compliance and intentional or inadvertent gluten consumption. All questionnaires were applied by a nutritionist with expertise in gluten-related disorders. Fifty-six patients with celiac disease and 24 with non-celiac gluten sensitivity were included. Overall, 46 (57.5%) subjects perceived themselves as strictly adherent; however, inadvertent gluten intake was frequent in both celiac disease and non-celiac gluten sensitivity patients (39.2 vs. 33.3%; p = 0.2). Intentional consumption was more prevalent in subjects with celiac disease (48.8 vs. 29.1%; p = 0.048) and individuals with non-celiac gluten sensitivity showed better adherence (37.5 vs. 12.5%; p = 0.035). The importance of a gluten-free diet is underestimated by Mexican patients with celiac disease. The role of a team with expertise in gluten-related disorders is essential to identify inadvertent gluten intake.

  12. Long-Term Performance of Transuranic Waste Inadvertently Disposed in a Shallow Land Burial Trench at the Nevada Test Site

    International Nuclear Information System (INIS)

    Shott, Gregory J.; Yucel, Vefa

    2009-01-01

    In 1986, 21 m3 of transuranic (TRU) waste was inadvertently disposed in a shallow land burial trench at the Area 5 Radioactive Waste Management Site on the Nevada Test Site. U.S. Department of Energy (DOE) TRU waste must be disposed in accordance with Title 40, Code of Federal Regulations (CFR), Part 191, Environmental Radiation Protection Standard for Management and Disposal of Spent Nuclear Fuel, High-Level, and Transuranic Radioactive Wastes. The Waste Isolation Pilot Plant is the only facility meeting these requirements. The National Research Council, however, has found that exhumation of buried TRU waste for disposal in a deep geologic repository may not be warranted when the effort, exposures, and expense of retrieval are not commensurate with the risk reduction achieved. The long-term risks of leaving the TRU waste in-place are evaluated in two probabilistic performance assessments. A composite analysis, assessing the dose from all disposed waste and interacting sources of residual contamination, estimates an annual total effective dose equivalent (TEDE) of 0.01 mSv, or 3 percent of the dose constraint. A 40 CFR 191 performance assessment also indicates there is reasonable assurance of meeting all requirements. The 40 CFR 191.15 annual mean TEDE for a member of the public is estimated to reach a maximum of 0.055 mSv at 10,000 years, or approximately 37 percent of the 0.15 mSv individual protection requirement. In both assessments greater than 99 percent of the dose is from co-disposed low-level waste. The simulated probability of the 40 CFR 191.13 cumulative release exceeding 1 and 10 times the release limit is estimated to be 0.0093 and less than 0.0001, respectively. Site characterization data and hydrologic process modeling support a conclusion of no groundwater pathway within 10,000 years. Monte Carlo uncertainty analysis indicates that there is reasonable assurance of meeting all regulatory requirements. Sensitivity analysis indicates that the results

  13. Further evidence for the role of nitric oxide in maternal aggression: effects of L-NAME on maternal aggression towards female intruders in Wistar rats.

    Science.gov (United States)

    Ankarali, S; Ankarali, H C; Marangoz, C

    2009-01-01

    It has been shown that nitric oxide (NO) increases aggression in male mice, whereas it decreases aggression in lactating female mice and prairie voles. It is also known that aggression can be exhibited at different levels in rodent species, strain or subtypes. The aims of this study were to investigate the proportion of aggressiveness in Wistar rats, the effect of intraperitoneally administered nonspecific nitric oxide synthase (NOS) inhibitor L-NAME (NG-nitro L-arginine methyl ester) on maternal aggression towards female intruders, and whether these effects are due to NO production or not. Rats were given saline intraperitoneally on the postpartum Day 2 and aggression levels were recorded. The same rats were given 60 mg/kg L-NAME or D-NAME (NG-nitro D-arginine methyl ester) on the postpartum Day 3 and their effects on aggression levels were compared to saline. While L-NAME administration did not cause any differences in the total number of aggressive behavior, aggression duration and aggression intensity, it reduced the proportion of animals showing aggressive behavior. In addition, the latency of the first aggression was significantly increased by L-NAME. In the D-NAME group, however, no significant change was found. Our results have shown that L-NAME reduces maternal aggression towards female intruders in Wistar rats through inhibition of NO production. These results suggest that the role of NO in offensive and defensive maternal aggression shares neural mechanisms.

  14. Pregnancy outcome after 1st-trimester inadvertent exposure to barium sulphate as a contrast media for upper gastrointestinal tract radiography.

    Science.gov (United States)

    Han, B H; Lee, K S; Han, J Y; Choi, J S; Ahn, H K; Ryu, H M; Yang, J H; Han, H W; Nava-Ocampo, A A

    2011-10-01

    Despite barium being used as a contrast media for decades, the specific assessment of its safety in pregnant women is scarce. We are reporting the favourable pregnancy outcome in women who were inadvertently exposed to barium swallow and associated ionising radiation, early in pregnancy. A control group of age- and gravidity-matched unexposed pregnant women was also included. There were 32 live-born babies in the exposed group and 94 in the control group. Women had undergone diagnostic upper gastrointestinal tract (UGT) fluoroscopic examination at 3.3 ± 1.5 weeks' gestation. Estimated maternal radiation dose secondary to barium swallow varied widely, the maximum dose was estimated to be 2.45 mSv. Similar pregnancy outcomes were observed between the groups. The number of babies born with major malformations was not significantly different (p = 1.0) between cases and controls: one (3.1%) vs three (3.2%), respectively. In conclusion, our small prospective cohort study of women suggests no association between inadvertent exposure to ionising radiation and barium sulphate during fluoroscopic barium swallow and adverse fetal outcomes.

  15. Stepping in Place While Voluntarily Turning Around Produces a Long-Lasting Posteffect Consisting in Inadvertent Turning While Stepping Eyes Closed

    Directory of Open Access Journals (Sweden)

    Stefania Sozzi

    2016-01-01

    Full Text Available Training subjects to step in place on a rotating platform while maintaining a fixed body orientation in space produces a posteffect consisting in inadvertent turning around while stepping in place eyes closed (podokinetic after-rotation, PKAR. We tested the hypothesis that voluntary turning around while stepping in place also produces a posteffect similar to PKAR. Sixteen subjects performed 12 min of voluntary turning while stepping around their vertical axis eyes closed and 12 min of stepping in place eyes open on the center of a platform rotating at 60°/s (pretests. Then, subjects continued stepping in place eyes closed for at least 10 min (posteffect. We recorded the positions of markers fixed to head, shoulder, and feet. The posteffect of voluntary turning shared all features of PKAR. Time decay of angular velocity, stepping cadence, head acceleration, and ratio of angular velocity after to angular velocity before were similar between both protocols. Both postrotations took place inadvertently. The posteffects are possibly dependent on the repeated voluntary contraction of leg and foot intrarotating pelvic muscles that rotate the trunk over the stance foot, a synergy common to both protocols. We propose that stepping in place and voluntary turning can be a scheme ancillary to the rotating platform for training body segment coordination in patients with impairment of turning synergies of various origin.

  16. Negative-parity intruder states of the neutron-rich N=20, Z=14-16 isotones: a 1{Dirac_h}{omega} shell model description

    Energy Technology Data Exchange (ETDEWEB)

    Bouhelal, M. [Universite de Strasbourg, IPHC, CNRS/IN2P3, Strasbourg (France); Universite de Batna, Departement de Physique, Faculte des Sciences, Batna (Algeria); Haas, F.; Caurier, E.; Nowacki, F. [Universite de Strasbourg, IPHC, CNRS/IN2P3, Strasbourg (France); Bouldjedri, A. [Universite de Batna, Departement de Physique, Faculte des Sciences, Batna (Algeria)

    2009-12-15

    In order to get a consistent shell model description of the negative-parity states throughout the sd shell a new interaction (PSDPFB) has been developed. It was derived in the full p-sd-pf model space and is built on existing interactions for the major shells with adjustments of the cross-shell monopoles. The calculated energy spectra for these 1{Dirac_h}{omega} intruder states are compared to experiment for the N=20 neutron-rich isotones {sup 34}Si, {sup 35}P and {sup 36}S. A systematics for the multiplet configuration {nu}(d{sub 3/2}{sup -1}f{sub 7/2}{sup 1}) in even-even isotones from {sup 34}Si to {sup 40}Ca is also presented. (orig.)

  17. Anatomy of an intruded coal, I: Effect of contact metamorphism on whole-coal geochemistry, Springfield (No. 5) (Pennsylvanian) coal, Illinois Basin

    Energy Technology Data Exchange (ETDEWEB)

    Rimmer, Susan M. [Department of Geology, Southern Illinois University Carbondale, Carbondale, IL 62901 (United States); Yoksoulian, Lois E. [Department of Earth and Environmental Sciences, University of Kentucky, Lexington, KY 40506 (United States); Hower, James C. [Center for Applied Energy Research, University of Kentucky, 2540 Research Park Drive, Lexington, KY 40511 (United States)

    2009-08-01

    If time and heating rate are important agents in coal maturation, one might expect to see differences in chemical changes in response to maturation depending on the means of increased rank. Using a suite of samples obtained from an intruded Pennsylvanian-age coal in southern Illinois, we present whole-coal chemical data. Comparing these data to extant geochemical data for coals that have undergone normal burial maturation, we evaluated the hypothesis that if coal alteration occurs rapidly (due to intrusion) rather than gradually (burial maturation), then different relationships are seen in chemical composition (proximate and ultimate analyses) and vitrinite reflectance. The Pennsylvanian-age (Asturian [Westphalian D]) Springfield (No. 5) coal is mined at the Big Ridge Mine, near Eldorado, southern Illinois. This high volatile B bituminous coal was intruded by an ultramafic igneous intrusion during the early Permian. Alteration occurs out to {proportional_to} 1.2 x dike thickness and includes an increase in random vitrinite reflectance (R{sub m}) from levels {proportional_to} 0.7% to over 5.3%, loss of liptinites, and formation of devolatilization vacuoles and fine mosaic texture. Decreases in volatile matter (VM) and increases in fixed carbon (FC) appear to be less than would be expected for the level of reflectance seen within the alteration halo. Carbonate minerals have a major influence on proximate analyses but even following the removal of carbonates, the decrease in VM is still less than would be seen in coals of similar vitrinite reflectance that were altered by normal burial maturation. Carbonate mineralization also contributes to variability in ultimate analysis values approaching the intrusion, particularly for %C and %O. After carbonate removal, data for these coals do not appear to follow the normal burial coalification tracks when plotted on a van Krevelen diagram and on a Seyler chart. These differences suggest that a slightly different maturation

  18. Influence of i13/2 proton and j15/2 neutron intruding orbitals on the behaviour of 190 mass region superdeformed nuclei

    International Nuclear Information System (INIS)

    Duprat, J.

    1995-01-01

    This work concerns the study of the nuclear superdeformation phenomenon in the A = 190 mass region. The superdeformed (SD) states in 193 Tl, 194 Tl 195 Tl were produced via heavy-ion induced reactions and studied with the EUROGAM gamma multidetector array. The analysis of high-multiplicity events allowed the study of the magnetic properties of the SD states in these nuclei. For the first time, the g-factor of a proton orbital in a SD nucleus in the A = 190 mass region has been extracted. This measurement indicates that the two known bands in 195 Tl-SD are built on the i 13/2 proton intruder orbital. A new SD band has been found in this isotope: it is the first SD band built on an excited proton state found in the A = 190 region. Finally an interaction between two pairs of bands has been established in 194 Tl; this interaction indicate the crossing of two neutron orbitals above the N = 112 gap. The magnetic properties of the states of the SD bands in 194 Tl reveals that these bands are built on configurations in which the single proton and neutron intrinsic spins are aligned. Comparison between different SD bands in the Thallium isotopes shows the prominent role of the i 13/2 proton and the j 15/2 neutron intruder orbitals in the smooth increase of the dynamical moment of inertia as a function of the rotational frequency. In addition, this work reports on the first observation of a SD rotational band produced in a (HI, αxn) reaction channel. The study of the maximum spin reached by the SD bands indicates both a competition between alpha emission and fission of the compound nucleus, and the limitation due to the fission process in the population of the SD nuclei in the A = 190 region. (author). 120 refs., 112 figs., 22 tabs., 2 ann

  19. Study for on-line system to identify inadvertent control rod drops in PWR reactors using ex-core detector and thermocouple measures

    Energy Technology Data Exchange (ETDEWEB)

    Souza, Thiago J.; Medeiros, Jose A.C.C.; Goncalves, Alessandro C., E-mail: tsouza@nuclear.ufrj.br, E-mail: canedo@lmp.ufrj.br, E-mail: alessandro@nuclear.ufrj.br [Coordenacao dos Programas de Pos-Graduacao em Engenharia (COPPE/UFRJ), Rio de Janeiro, RJ (Brazil). Programa de Engenharia Nuclear

    2015-07-01

    Accidental control rod drops event in PWR reactors leads to an unsafe operating condition. It is important to quickly identify the rod to minimize undesirable effects in such a scenario. In this event, there is a distortion in the power distribution and temperature in the reactor core. The goal of this study is to develop an on-line model to identify the inadvertent control rod dropped in PWR reactor. The proposed model is based on physical correlations and pattern recognition of ex-core detector responses and thermocouples measures. The results of the study demonstrated the feasibility of an on-line system, contributing to safer operation conditions and preventing undesirable effects, as its shutdown. (author)

  20. Simulation of transient inadvertent safety injection system during power operation; Simulacao do transitorio de operacao inadvertida do sistema de injecao de seguranca durante operacao em potencia

    Energy Technology Data Exchange (ETDEWEB)

    Vanni, Enio Antonio [ELETROBRAS Termonuclear S.A. (ELETRONUCLEAR), Rio de Janeiro, RJ (Brazil). E-mail: vanni@eletronuclear.gov.br

    2000-07-01

    The Condition II transient Inadvertent Safety Injection System Operation During Power Operation described on item 15.2.14 of Angra 1 Final Safety Analysis Report (FSAR) has been analyzed. Simulations with RETRAN computer code have been performed to evaluate the consequences to the transient as the Boron Injection Tank (BIT) concentration is reduced from 20000 to 2000 ppm. The first simulation has been carried out for a BIT concentration of 20000 ppm, in order to compare RETRAN results with those presented on FSAR. It has been verified that RETRAN models used and the hypotheses adopted were correct. The second simulation has been performed for a BIT concentration of 2000 ppm. It has been proved that even for this lower concentration level the Departure from Nucleate Boiling ratio (DNBR) limit (1,3) has not been violated. (author)

  1. The use of protective barriers to deter inadvertent human intrusion into a mined geologic facility for the disposal of radioactive waste: A review of previous investigations and potential concepts

    International Nuclear Information System (INIS)

    Tolan, T.L.

    1993-06-01

    Sandia National Laboratories is evaluating the feasibility of developing protective barrier system for the Waste Isolation Pilot Plant (WIPP) to thwart inadvertent human intrusion into this radioactive-waste disposal system for a period of 9,900 years after assumed loss of active institutional controls. The protective barrier system would be part of a series of enduring passive institutional controls whose long-term function will be to reduce the likelihood of inadvertent human activities (e.g., exploratory drilling for resources) that could disrupt the WIPP disposal system

  2. The use of protective barriers to deter inadvertent human intrusion into a mined geologic facility for the disposal of radioactive waste: A review of previous investigations and potential concepts

    Energy Technology Data Exchange (ETDEWEB)

    Tolan, T.L. [Tolan, Beeson and Associates, Kennewick, WA (United States)

    1993-06-01

    Sandia National Laboratories is evaluating the feasibility of developing protective barrier system for the Waste Isolation Pilot Plant (WIPP) to thwart inadvertent human intrusion into this radioactive-waste disposal system for a period of 9,900 years after assumed loss of active institutional controls. The protective barrier system would be part of a series of enduring passive institutional controls whose long-term function will be to reduce the likelihood of inadvertent human activities (e.g., exploratory drilling for resources) that could disrupt the WIPP disposal system.

  3. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: the ONSITE/MAXI1 computer program

    International Nuclear Information System (INIS)

    Napier, B.A.; Peloquin, R.A.; Kennedy, W.E. Jr.; Neuder, S.M.

    1984-10-01

    Because of uncertainties associated with assessing the potential risks from onsite burials of radioactive waste, the US Nuclear Regulatory Commission (NRC) has amended its regulations to provide greater assurance that buried radioactive material will not present a hazard to public health and safety. The amended regulations now require licensees to apply for approval of proposed procedures for onsite disposal pursuant to 10 CFR 20.302. The NRC technically reviews these requests on a case-by-case basis. These technical reviews require modeling potential pathways to man and projecting radiation dose commitments. This document contains a summary of our efforts to develop human-intrusion scenarios and to modify a version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. The documentation of the ONSITE/MAXI computer program is written for two audiences. The first (Audience A) includes persons concerned with the mathematical models and computer algorithms. The second (Audience B) includes persons concerned with exercising the computer program and scenarios for specific onsite disposal applications. Five sample problems are presented and discussed to assist the user in operating the computer program. Summaries of the input and output for the sample problems are included along with a discussion of the hand calculations performed to verify the correct operation of the computer program. Computer listings of the ONSITE/MAXI1 computer program with an abbreviated data base listing are included as Appendix 1 to this document. Finally, complete listings of the data base with listings of the special codes used to create the data base are included in Appendix 2 as a microfiche attachment to this document

  4. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: The ONSITE/MAXI1 computer program

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.; Neuder, S.M.

    1987-02-01

    This document summarizes initial efforts to develop human-intrusion scenarios and a modified version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. Supplement 1 of NUREG/CR-3620 (1986) summarized modifications and improvements to the ONSITE/MAXI1 software package. This document summarizes a modified version of the ONSITE/MAXI1 computer program. This modified version of the computer program operates on a personal computer and permits the user to optionally select radiation dose conversion factors published by the International Commission on Radiological Protection (ICRP) in their Publication No. 30 (ICRP 1979-1982) in place of those published by the ICRP in their Publication No. 2 (ICRP 1959) (as implemented in the previous versions of the ONSITE/MAXI1 computer program). The pathway-to-human models used in the computer program have not been changed from those described previously. Computer listings of the ONSITE/MAXI1 computer program and supporting data bases are included in the appendices of this document

  5. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: The ONSITE/MAXI1 computer program

    Energy Technology Data Exchange (ETDEWEB)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.; Neuder, S.M.

    1987-02-01

    This document summarizes initial efforts to develop human-intrusion scenarios and a modified version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. Supplement 1 of NUREG/CR-3620 (1986) summarized modifications and improvements to the ONSITE/MAXI1 software package. This document summarizes a modified version of the ONSITE/MAXI1 computer program. This modified version of the computer program operates on a personal computer and permits the user to optionally select radiation dose conversion factors published by the International Commission on Radiological Protection (ICRP) in their Publication No. 30 (ICRP 1979-1982) in place of those published by the ICRP in their Publication No. 2 (ICRP 1959) (as implemented in the previous versions of the ONSITE/MAXI1 computer program). The pathway-to-human models used in the computer program have not been changed from those described previously. Computer listings of the ONSITE/MAXI1 computer program and supporting data bases are included in the appendices of this document.

  6. Large-scale experiments for the vulnerability analysis of buildings impacted and intruded by fluviatile torrential hazard processes

    Science.gov (United States)

    Sturm, Michael; Gems, Bernhard; Fuchs, Sven; Mazzorana, Bruno; Papathoma-Köhle, Maria; Aufleger, Markus

    2016-04-01

    torrent in Tyrol (Austria), are analysed in detail. A couple of buildings are entirely reconstructed within the physical scale model at the scale 1:30. They include basement and first floor and thereby all relevant openings on the building envelopes. The results from experimental modelling represent the data basis for further physics-based vulnerability analysis. Hence, the applied vulnerability analysis concept significantly extends the methods presently used in flood risk assessment. The results of the study are of basic importance for practical application, as they provide extensive information to support hazard zone mapping and management, as well as the planning of local technical protection measures.

  7. Early treatment of anterior open bite: Comparison of the vertical and horizontal morphological changes induced by magnetic bite-blocks and adjusted rapid molar intruders.

    Science.gov (United States)

    Albogha, Mhd Hassan; Takahashi, Ichiro; Sawan, Mhd Naser

    2015-01-01

    This prospective clinical study aims to determine the differences between two treatment modalities for anterior open bite in growing patients. The treatment modalities involved the use of magnetic bite-blocks (MBBs) or rapid molar intruders (RMIs) applied with posterior bite-blocks. Fifteen consecutive patients with a mean age of 11.2 (standard deviation [SD] = 1.6) years and a mean open bite of -3.9 mm were treated with MBBs. Another 15 consecutive patients with a mean age of 10.9 (SD = 1.8) years and a mean open bite of -3.8 mm were treated with RMIs applied on bite-blocks. Cephalometric radiographs were obtained before (T1) and immediately after appliance removal (T2). The treatments lasted four months, during which the appliances were cemented to the teeth. The morphological changes were measured in each group and compared using logistic regression analysis. The MBB group exhibited significantly greater decreases in SNA angle, ANB angle, overjet, and maxillary incisor angle (p open bites and maxillary incisor protrusions.

  8. Properties of low-lying intruder states in $^{34}$Al and $^{34}$Si sequentially populated in $\\beta$-decay of $^{34}$Mg

    CERN Multimedia

    A low-lying long-lived (26±1 ms) isomer in $^{34}$Al has been observed recently and assigned as 1$^{+}$ state of intruder character. It was populated in $^{36}$S fragmentation and feeds, in $\\beta$-decay, the 0$_{2}^{+}$ state in $^{34}$Si whose excitation energy and lifetime were determined in an electron-positron pairs spectroscopy experiment. In the present experiment we intend to measure for the first time the $\\gamma$-rays following the $\\beta$-decay of $^{34}$Mg. Despite the interest for $^{34}$Mg, the up-right corner of the “N$\\thicksim$20 island of inversion”, the only information on its $\\beta$-decay is the lifetime of 20±10 ms, determined from $\\beta$-neutron coincidences. As a result of the proposed experiment, we expect to place the first transitions in the level scheme of $^{34}$Al and to strongly populate the newly observed isomer, measuring its excitation energy, if the branching ratio to 4$^{−}$ ground state is significant. Theoretical estimations for the $\\beta$-decay of the new isome...

  9. Microwave and millimeter-wave remote sensing for security applications

    CERN Document Server

    Nanzer, Jeffrey

    2012-01-01

    Microwave and millimeter-wave remote sensing techniques are fast becoming a necessity in many aspects of security as detection and classification of objects or intruders becomes more difficult. This groundbreaking resource offers you expert guidance in this burgeoning area. It provides you with a thorough treatment of the principles of microwave and millimeter-wave remote sensing for security applications, as well as practical coverage of the design of radiometer, radar, and imaging systems. You learn how to design active and passive sensors for intruder detection, concealed object detection,

  10. 2016 Survey of State-Level Health Resources for Men and Boys: Identification of an Inadvertent and Remediable Service and Health Disparity.

    Science.gov (United States)

    Fadich, Ana; Llamas, Ramon P; Giorgianni, Salvatore; Stephenson, Colin; Nwaiwu, Chimezie

    2018-03-01

    This survey evaluated resources available to men and boys at the state level including state public health departments (SPHDs), other state agencies, and governor's offices. Most of the resources and programs are found in the SPHDs and these administer state-initiated and federally funded health programs to provide services and protection to a broad range of populations; however, many men's health advocates believe that SPHDs have failed to create equivalent services for men and boys, inadvertently creating a health disparity. Men's Health Network conducts a survey of state resources, including those found in SPHDs, every 2 years to identify resources available for men and women, determine the extent of any disparity, and establish a relationship with SPHD officials. Data were obtained from all 50 states and Washington, D.C. An analysis of the 2016 survey data indicates that there are few resources allocated and a lack of readily available information on health and preventive care created specifically for men and boys. The data observed that most health information intended for men and boys was scarce among states or oftentimes included on websites that primarily focused on women's health. A potential result of this is a loss of engagement with appropriate health-care providers due to a lack of information. This study continues to validate the disparity between health outcomes for women and men. It continues to highlight the need for better resource allocation, outreach, and health programs specifically tailored to men and boys in order to improve overall community well-being.

  11. Safety analysis of increase in heat removal from reactor coolant system with inadvertent operation of passive residual heat removal at no-load conditions

    Directory of Open Access Journals (Sweden)

    Ge Shao

    2015-06-01

    Full Text Available The advanced passive pressurized water reactor (PWR is being constructed in China and the passive residual heat removal (PRHR system was designed to remove the decay heat. During accident scenarios with increase of heat removal from the primary coolant system, the actuation of the PRHR will enhance the cooldown of the primary coolant system. There is a risk of power excursion during the cooldown of the primary coolant system. Therefore, it is necessary to analyze the thermal hydraulic behavior of the reactor coolant system (RCS at this condition. The advanced passive PWR model, including major components in the RCS, is built by SCDAP/RELAP5 code. The thermal hydraulic behavior of the core is studied for two typical accident sequences with PRHR actuation to investigate the core cooling capability with conservative assumptions, a main steam line break (MSLB event and inadvertent opening of a steam generator (SG safety valve event. The results show that the core is ultimately shut down by the boric acid solution delivered by Core Makeup Tank (CMT injections. The effects of CMT boric acid concentration and the activation delay time on accident consequences are analyzed for MSLB, which shows that there is no consequential damage to the fuel or reactor coolant system in the selected conditions.

  12. Prevention of and response to inadvertent exposure of embryo/fetus to ionizing radiation, due to medical exposure of the mother. The Greek regulatory authority initiatives.

    Science.gov (United States)

    Economides, Sotirios; Boziari, Argiro; Vogiatzi, Stavroula; Hourdakis, Konstantinos J; Kamenopoulou, Vassiliki; Dimitriou, Panagiotis

    2014-03-01

    Embryo/fetus (E/F) irradiation as a result of medical exposure of the mother should be avoided, unless there are strong clinical indications. Medical practitioners are assigned the primary task and obligation of ensuring overall patient protection and safety in the prescription of and during the delivery of medical exposure. In cases of unintended exposure of embryo/fetus (E/F), the risk analysis and communication is conducted by or under the supervision of medical physicists at local level. National competent authorities can contribute to the prevention, risk analysis and communication of inadvertent E/F exposure to ionizing radiation by recording, analyzing and disseminating the relevant information. Since 2001, Greek Atomic Energy Commission has established a committee with the mandate to provide advice, to keep records, to analyze and disseminate the experience gained in cases of unintended E/F exposure. During the period 2001-2011, the committee was consulted by 269 pregnant women undergone medical exposures. The conclusions from the relevant data analysis, as well as the experience gained are herein presented and discussed. Copyright © 2013 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  13. Posterior reversible encephalopathy syndrome following an inadvertent dural puncture during an emergency laparotomy for ischemic colitis – a case report

    Directory of Open Access Journals (Sweden)

    Shah R

    2014-01-01

    Full Text Available Reena Shah, Agnieszka Kubisz-Pudelko, Jeremy Reid Yeovil District Hospital, Yeovil, UK Abstract: Posterior reversible encephalopathy syndrome (PRES is a clinico-neuroradiological syndrome characterized by various symptoms of neurological disease. It has commonly been reported in association with acute hypertension, pre-eclampsia, eclampsia, sepsis, and exposure to immunosuppressants. Here, we report on a normotensive woman who developed a severe frontal headache, visual disturbances, and hypertension 3 days after undergoing an emergency laparotomy for ischemic colitis during which she suffered an inadvertent dural puncture. Neuro-imaging revealed features consistent with PRES. The patient went on to make a good recovery, being discharged 21 days postoperatively, with only minor visual disturbances and memory problems. This case highlights the importance of awareness of PRES to all specialties. On reviewing the literature, we feel that PRES may be a potential differential diagnosis to post-procedural neurological symptoms in those patients undergoing routine procedures such as spinal anesthetics or lumbar punctures. Keywords: PRES, neurological disease, lumbar puncture, spinal anesthetic

  14. Has Therapy Intruded into Education?

    Science.gov (United States)

    Mintz, Avi

    2009-01-01

    For over fifty years, scholars have argued that a therapeutic ethos has begun to change how people think about themselves and others. There is also a growing concern that the therapeutic ethos has influenced educational theory and practice, perhaps to their detriment. This review article discusses three books, "The Dangerous Rise of Therapeutic…

  15. Particle-hole intruder levels in {sup 67}Cu, collectivity, monopole shifts, and the hockey-stick behaviour of l - 1/2 5/2{sup -} levels in neutron-rich odd-mass Cu nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Walters, W B; Chiara, C J, E-mail: wwalters@umd.edu [University of Maryland, College Park, MD 20742 (United States)

    2011-01-01

    A new sequence of gamma rays with energies of 572, 499, 585, and 674 keV has been identified in {sup 67}Cu populating the 7/2{sup -} level at 2362 keV. Owing to the strong population of the 2362-keV level via an l = 3 proton pickup reaction, that level is assigned to be an f{sub 7/2}{sup -1} 2-particle-1-hole 'intruder' proton configuration, and the new levels are found to form a sequence consistent with intruder sequences in the adjacent odd-mass Cu isotopes and in the odd-mass Sb isotopes. The changing position of the intruder sequence in the odd-mass Cu isotopes is discussed and related to the onset of collectivity associated with the presence of g{sub 9/2} neutrons beyond N = 40. The increase in collectivity is also discussed for a number of isotonic and isotopic chains as more protons or neutrons, respectively, are added beyond an oscillator shell boundary. For most of these systems, the l -1/2 levels show a systematic 'hockey-stick-like' behaviour with a sharp decrease in energy with the addition of the first protons or neutrons, owing to both the added collectivity and the tensor interaction, and then a lower slope when collectivity changes are diminished and only the tensor interaction is influencing the changes in level positions.

  16. Particle-hole intruder levels in 67Cu, collectivity, monopole shifts, and the hockey-stick behaviour of ell - 1/2 5/2- levels in neutron-rich odd-mass Cu nuclei

    Science.gov (United States)

    Walters, W. B.; Chiara, C. J.

    2011-01-01

    A new sequence of gamma rays with energies of 572, 499, 585, and 674 keV has been identified in 67Cu populating the 7/2- level at 2362 keV. Owing to the strong population of the 2362-keV level via an ell = 3 proton pickup reaction, that level is assigned to be an f7/2-1 2-particle-1-hole "intruder" proton configuration, and the new levels are found to form a sequence consistent with intruder sequences in the adjacent odd-mass Cu isotopes and in the odd-mass Sb isotopes. The changing position of the intruder sequence in the odd-mass Cu isotopes is discussed and related to the onset of collectivity associated with the presence of g9/2 neutrons beyond N = 40. The increase in collectivity is also discussed for a number of isotonic and isotopic chains as more protons or neutrons, respectively, are added beyond an oscillator shell boundary. For most of these systems, the ell -1/2 levels show a systematic "hockey-stick-like" behaviour with a sharp decrease in energy with the addition of the first protons or neutrons, owing to both the added collectivity and the tensor interaction, and then a lower slope when collectivity changes are diminished and only the tensor interaction is influencing the changes in level positions.

  17. Assessment of the long-term risks of inadvertent human intrusion into a disposal vault in deep plutonic rock: reassessment using ICRP recommendations

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1996-06-01

    Canada has conducted an extensive research program on the safe disposal of nuclear fuel waste. The program has focussed on the concept of disposal in durable containers in an engineered facility or 'vault' located 500 to 1000 m deep in plutonic rock on the Canadian Shield. As part of this task, a methodology was developed to assess the long-term risk from inadvertent intrusion scenarios, and applied to a reference conceptual design of a facility for disposal of used fuel. The AECB has specified that 'the predicted radiological risk to individuals from a waste disposal facility shall not exceed 10 -6 fatal cancers and serious genetic effects in a year.' Risk is defined as the sum, of the product of the probability of the scenario, the magnitude of the resultant radiation dose, and the probability of a health effect per unit dose. The AECB also specifies that 'calculations of individual risk should be made by using the risk conversion factor of 2 x 10 -2 per sievert.' Our earlier assessment of four human intrusion scenarios showed that the estimated risk using the risk conversion factor recommended by the AECB was at least 3 orders of magnitude below the AECB risk criterion, at all times up to 10 000 a, for each of the four scenarios analysed. The AECB risk criterion and risk conversion factor are based on the recommendations of the Intemafional Commission on Radiological Protection (ICRP) in their Publication ICRP 26. More recently, in its Publication ICRP 60, the ICRP has recommended dose factors for fatal cancers that are larger than those in ICRP 26 and an increase in the risk factor for serious hereditary effects in all future generations. Another ICRP Publication, ICRP 64, states that 'For potential exposure situations, the consideration of the basic dose response used for stochastic effects must be extended into the range of high doses where deterministic effects also occur.' For the new assessments of risk we use the estimated doses and probabilities of

  18. Reducing pesticide drift by considering propeller rotation effects from aerial application and near buffer zones

    Science.gov (United States)

    Off-target drift of chemical from agricultural spraying can damage sensitive crops, destroy beneficial insects, and intrude on human and domestic animal habitats, threatening environmental quality. Reduction of drift from aerial application can be facilitated at the edge of a field by offsetting spr...

  19. Control of Transboundary Movement of Radioactive Material Inadvertently Incorporated into Scrap Metal and Semi-finished Products of the Metal Recycling Industries. Results of the Meetings Conducted to Develop a Draft Code of Conduct

    International Nuclear Information System (INIS)

    2014-02-01

    In 2010, the IAEA initiated the development of a code of conduct on the transboundary movement of radioactive material inadvertently incorporated into scrap metal and semi- finished products of the metal recycling industries (Metal Recycling Code of Conduct). The Metal Recycling Code of Conduct was intended to harmonize the approaches of Member States in relation to the discovery of radioactive material that may inadvertently be present in scrap metals and semi-finished products subject to transboundary movement, and their safe handling and management to facilitate regulatory control. The Metal Recycling Code of Conduct was envisaged as being complementary to the Safety Guide on Control of Orphan Sources and Other Radioactive Material in the Metal Recycling and Production Industries (IAEA Safety Standards Series No. SSG-17), which provides recommendations, principally within a national context, on the protection of workers, members of the public and the environment in relation to the control of radioactive material inadvertently incorporated in scrap metal. In February 2013, the third open-ended meeting of technical and legal experts to develop the Metal Recycling Code of Conduct was organized. The objective of this meeting was to address the comments received from Member States and to finalize the text of the draft Metal Recycling Code of Conduct. Representatives from 55 Member States, one non-Member State and the EU, together with seven observers from the metal recycling industry, reviewed the comments and revised the draft accordingly. In September 2013, in Resolution GC(57)/RES/9, the IAEA General Conference recorded that it 'Appreciates the intensive efforts undertaken by the Secretariat to develop a code of conduct on the transboundary movement of scrap metal, or materials produced from scrap metal, that may inadvertently contain radioactive material, and encourages the Secretariat to make the results of the discussion conducted on this issue available to

  20. Petrological and geochemical constraints on the origin of mafic dykes intruding the composite Kaçkar Pluton from the eastern Blacksea magmatic arc, NE Turkey

    Science.gov (United States)

    Aydin, Faruk; Oguz, Simge; Baser, Rasim; Uysal, Ibrahim; Sen, Cüneyt; Karsli, Orhan; Kandemir, Raif

    2015-04-01

    Geological, petrographical and geochemical data of mafic dykes intruding the composite Kaçkar Pluton from the eastern Blacksea magmatic arc (EBMA), NE Turkey, provide new insights into the nature of the metasomatizing agents in subcontinental lithospheric mantle beneath the region during the late Mesozoic-early Tertiary. Mafic dykes from the Çaykara and Hayrat (Trabzon), and also Ikizdere (Rize) areas from the northern margin of the EBMA consist of basalts, dolerites, lamprophyres (basic member) and lesser basaltic andesites and trachyandesites (evolved member). All dykes have no deformation and metamorphism. The outcrops of these dykes vary, with thickness from 0.2 to 10 m. and visible length from 3 to 20 m. In general, the mafic dykes dip steeply and cut directly across the Kaçkar Pluton, and show NW- and NE-trending, roughly parallel to the orientations of the EBMA main faults. Most of the dyke samples display subaphyric to porphyritic texture with phenocrysts of plagioclase (up to 10%), clinopyroxene (5-20%), amphibole (5-15%), and some contain variable amount of biotite (5-20%), lesser quartz (1-2%), and minor euhedral zircon, apatite and Fe-Ti oxides. The basic members of the mafic dykes have SiO2 of 44.1-51.9%, MgO of 4.5-12.1%, and TiO2 >mostly 0.8% (up to 2.3%) with K2O+Na2O of 1.3-6.6% with mostly subalkaline character. They are relatively high in mg-number (0.45-0.73) and transition metals (V=171-376 ppm, Co=22-45 ppm, Ni=3-148 ppm, and Sc=21-49 ppm). The evolved members of the dykes exhibit relatively higher SiO2 (57.1-60.2%) and K2O+Na2O (5.6-9.0%), and lower MgO (2.2-5.9%) and TiO2 (0.5-0.8%) contents than those from the basic dykes. Also, these samples have slightly low mg-number (0.41-0.65) and transition metals (V=99-172 ppm, Co=9-22 ppm, Ni=1-43 ppm, and Sc=9-20 ppm). In the Harker diagrams, all samples of the mafic dykes form a continuous array, and exhibit similar geochemical characteristics. In general, SiO2 inversely correlates with MgO, Fe

  1. 'Agony aunt, hostage, intruder or friend?'. The multiple personas of the interviewer during fieldwork 'Agony aunt, hostage, intruder or friend?'. The multiple personas of the interviewer during fieldwork ¿Consultor sentimental, intruso, rehén o amigo? Los múltiples papeles del entrevistador durante el trabajo de campo

    Directory of Open Access Journals (Sweden)

    Valerie Caven

    2012-12-01

    Full Text Available Purpose: This paper examines how the role of the intervieweris manipulated by the interviewees in return for them offering their experiences, opinions and information during qualitative research interviews.Design/methodology: Semi-structured interviews in the qualitative paradigm were carried out with 55 architects from the East Midlands region of the UK. The interview data is supported by research diary evidence.Findings: A typology of four interviewer personas is presented: as ‘agony aunt, hostage, intruder or friend’.Research limitations/implications: The four personas were generated by the interviewees’ responses to one researcher which is a limitation. However, the study could be replicated with other researchers/interviewers in different interview situations.Practical implications: The research has practical value in highlighting the multiple facets of the relationship between interviewer and interviewee in qualitative research. It will be of value to both experienced and new researchers.Originality/value: The development of the typology represents the originality and value of the research. Previous research has focused more on telling the stories rather than the development of new theory relating to interviewing.Purpose: This paper examines how the role of the interviewer is manipulated by the interviewees in return for them offering their experiences, opinions and information during qualitative research interviews. Design/methodology: Semi-structured interviews in the qualitative paradigm were carried out with 55 architects from the East Midlands region of the UK. The interview data is supported by research diary evidence. Findings: A typology of four interviewer personas is presented: as ‘agony aunt, hostage, intruder or friend’. Research limitations/implications: The four personas were generated by the interviewees’ responses to one researcher which is a limitation. However, the study could be replicated with other

  2. Identification of deformed intruder states in semi-magic Ni70

    Energy Technology Data Exchange (ETDEWEB)

    Chiara, C. J.; Weisshaar, D.; Janssens, R. V. F.; Tsunoda, Y.; Otsuka, T.; Harker, J. L.; Walters, W. B.; Recchia, F.; Albers, M.; Alcorta, M.; Bader, V. M.; Baugher, T.; Bazin, D.; Berryman, J. S.; Bertone, P. F.; Campbell, C. M.; Carpenter, M. P.; Chen, J.; Crawford, H. L.; David, H. M.; Doherty, D. T.; Gade, A.; Hoffman, C. R.; Honma, M.; Kondev, F. G.; Korichi, A.; Langer, C.; Larson, N.; Lauritsen, T.; Liddick, S. N.; Lunderberg, E.; Macchiavelli, A. O.; Noji, S.; Prokop, C.; Rogers, A. M.; Seweryniak, D.; Shimizu, N.; Stroberg, S. R.; Suchyta, S.; Utsuno, Y.; Williams, S. J.; Wimmer, K.; Zhu, S.

    2015-04-01

    The structure of semi-magic Ni-70(28)42 was investigated following complementary multinucleon-transfer and secondary fragmentation reactions. Changes to the higher-spin, presumed negative-parity states based on observed gamma-ray coincidence relationships result in better agreement with shell-model calculations using effective interactions in the neutron f(5/2)pg(9/2) model space. The second 2(+) and (4(+)) states, however, can only be successfully described when proton excitations across the Z = 28 shell gap are included. Monte Carlo shell-model calculations suggest that the latter two states are part of a prolate-deformed intruder sequence, establishing an instance of shape coexistence at low excitation energies similar to that observed recently in neighboring Ni-68.

  3. Evaluation of stress patterns on maxillary posterior segment when intruded with mini implant anchorage: A three-dimensional finite element study

    Directory of Open Access Journals (Sweden)

    Nikhita Pekhale

    2016-01-01

    Full Text Available Introduction: The aim of this study is to evaluate stress and displacement effects of maxillary posterior intrusion mechanics with mini-implant anchorage by using finite element method. Materials and Methods: A computer stimulation of three-dimensional model maxilla with all teeth, PDL, bone, mini-implants, brackets, arch wire, force element, and transpalatal arch was constructed on the basis of average anatomic morphology. Finite element analysis was done to evaluate the amount of stress and its distribution during orthodontic intrusive force. Results: Increased Von Mises stress values were observed in mesio-cervical region of first molar. The middle third of second premolar and second molar and regions adjacent to force application sites also showed relatively high stress values. Minimum stress values were observed in apical region of first premolar as it is away from force application. Conclusion: Using three mini-implant and transpalatal arches, this study demonstrates that significant amount of true intrusion of maxillary molars could be obtained with lesser concentration of stresses in the apical area recorded.

  4. Microsensors for border patrol applications

    Science.gov (United States)

    Falkofske, Dwight; Krantz, Brian; Shimazu, Ron; Berglund, Victor

    2005-05-01

    A top concern in homeland security efforts is the lack of ability to monitor the thousands of miles of open border with our neighbors. It is not currently feasible to continually monitor the borders for illegal intrusions. The MicroSensor System (MSS) seeks to achieve a low-cost monitoring solution that can be efficiently deployed for border patrol applications. The modifications and issues regarding the unique requirements of this application will be discussed and presented. The MicroSensor System was developed by the Defense Microelectronics Activity (DMEA) for military applications, but border patrol applications, with their unique sensor requirements, demand careful adaptation and modification from the military application. Adaptation of the existing sensor design for border applications has been initiated. Coverage issues, communications needs, and other requirements need to be explored for the border patrol application. Currently, border patrol has a number of deficiencies that can be addressed with a microsensor network. First, a distributed networked sensor field could mitigate the porous border intruder detection problem. Second, a unified database needs to be available to identify aliens attempting to cross into the United States. This database needs to take unique characteristics (e.g. biometrics, fingerprints) recovered from a specialized field unit to reliably identify intruders. Finally, this sensor network needs to provide a communication ability to allow border patrol officers to have quick access to intrusion information as well as equipment tracking and voice communication. MSS already addresses the sensing portion of the solution, including detection of acoustic, infrared, magnetic, and seismic events. MSS also includes a low-power networking protocol to lengthen the battery life. In addition to current military requirements, MSS needs a solar panel solution to extend its battery life to 5 years, and an additional backbone communication link

  5. Detection of inadvertent catheter movement into the coronary sinus ostium or middle cardiac vein by real-time impedance monitoring prior to radiofrequency ablation in the right atrial posteroseptal region.

    Science.gov (United States)

    Pollak, Scott J; Seckel, Heather; Monir, Joseph; Ebra, George; Monir, George

    2012-09-01

    The objective of this study was to evaluate the use of continuous catheter impedance monitoring prior to ablation to facilitate differentiation of the coronary sinus ostium (CSO) and the middle cardiac vein (MCV) from the right atrial posteroseptal region (RPS). Empiric observations have suggested that continuous catheter impedance monitoring could differentiate the CSO and MCV from the RPS region. Radiofrequency ablation in the MCV or coronary sinus has been associated with coronary artery injury. Differentiation of these areas may be difficult with either fluoroscopy or electrogram characteristics. Continuous impedance measurements using a 4-mm Navistar (Biosense Webster) ablation catheter were conducted in 17 consecutive patients undergoing ablation for supraventricular tachycardia. The average impedance value was recorded at the right atrial septum (RS) posterior to the bundle of His, the RPS region, within 1 cm inside the CSO and in the MCV. These areas were confirmed and demarcated with 3-D mapping and biplane fluoroscopy. A significant increase in impedance was observed between the CSO (X = 146.6 ± 24.8) and RPS [Formula: see text] regions (p regions. Continuous impedance measurements during mapping can facilitate differentiation of catheter locations inside the CSO and MCV from extracoronary sinus regions. This may reduce the risk of inadvertent coronary artery damage during the ablation procedure.

  6. Commonwealth Edison captures intruders on screen

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Commonwealth Edison has developed three software programs, with the supporting hardware, that significantly upgrade security monitoring capabilities at nuclear power stations. These are Video Capture, the Alternate Perimeter Alarm Reporting System, and the Redundant Access Control System. Conventional video systems only display what is happening at the moment and rewinding a VCR to discover what occurred earlier takes time. With Video Capture the images can be instantly restored to the monitor screen and printed out. When one of the security devices used to monitor the perimeter of a Commonwealth Edison nuclear power station is tripped, the Video Capture program stores the visual image digitally. This is done using similar technology to the employed in fax machines. The security staff are thus able to distinguish immediately between disturbances taking place simultaneously at different security zones. They can magnify and compare the stored images and print them out. The Alternate Perimeter Alarm Reporting System was developed to speed the transmission of alarm signals from the security sensors to the security computer. The Redundant Access Control System (RACS) was originally developed to meet the requirement of the Nuclear Regulatory Commission (NRC) for a secondary computer-operated security measure to monitor employee access to a nuclear power station. When employee drug testing became an additional NRC requirement, the Nuclear Division of Commonwealth Edison asked their programmers to modify RACS to generate a random list of personnel to be tested for substance abuse. RACS was then further modified to produce numerous station operating reports that had been previously compiled manually. (author)

  7. Report on the training for an intruder

    International Nuclear Information System (INIS)

    Aoki, Yoshikazu; Fukumoto, Masahiro; Saito, Toru; Tsujinaka, Hideyuki

    2002-12-01

    Crisis management section members of Japan Nuclear Cycle Development Institute (JNC) Tokai Works had implemented two types of trainings against terrorism in last Japanese fiscal year and improved the countermeasure against the terrorism. In this fiscal year we trained against the new type of terrorism in the period of about 1 year later of a series of attacks on America by terrorism. As a result of the training some points which need further improvements and new weak points have been availed as follows. (1) Enlightenment of workers' senses against terrorism. Few members of the Emergency Control Center, workers and guards looked tensionless in the training. The sense against terrorism needs to be enlightened. (2) Speediness of initial response. In this training the events using a car went on more rapidly than expected. The rapid response to counter terrorism needs to be examined. (3) Improvement of fundamental countermeasures. The fundamental response of the workers to the terrorism under limited condition before the guard authorities' arrival has been improved further more through the education and trainings. (4) Completeness of the prevention of terrorism. After terrorism occurs, Tokai Works is helpless until the guard authorities arrive. First of all the measure to avoid terrorism occurrence is important. (5) Strengthen the cooperation with the guard authorities. Besides completeness of the prevention of terrorism it is necessary to cope with the guard authorities at ordinary times against an emergency. (author)

  8. Anomalous intruder response in diverse granular systems

    NARCIS (Netherlands)

    Oyarte Galvez, Loreto Alejandra

    2017-01-01

    The definition of granular matter is extremely broad; any collection of conglomeration of particles larger than 100 micrometers can be considered as part of this group, and virtually the entire universe is composed of them. Examples are found in many fields, e.g. in nature (dunes, avalanches,

  9. The adverse effects of inadvertent intraoperative intravenous ...

    African Journals Online (AJOL)

    This medical error was investigated using the criticalincident technique that is available in our department. This case report highlights the cardiovascular sequelae of phenylephrine overdose and the human factor that is associated with a medication error. We discuss these two factors, as well as the organisational factors ...

  10. The adverse effects of inadvertent intraoperative intravenous ...

    African Journals Online (AJOL)

    2012-03-03

    Mar 3, 2012 ... healthy female patient undergoing elective gynaecological surgery. This medical error was investigated using the critical- incident technique that is available in our department. This case report highlights the cardiovascular sequelae of phenylephrine overdose and the human factor that is associated with a ...

  11. Reproductive, productivity, and mortality outcomes in late-gestation gilts and their litters following simulation of inadvertent exposure to a modified-live vaccine strain of porcine reproductive and respiratory syndrome (PRRS) virus.

    Science.gov (United States)

    Schelkopf, Adam; Nerem, Joel; Cowles, Bobby; Amodie, Deb; Swalla, Richard; Dee, Scott

    2014-08-06

    The study evaluated the safety of a modified live-virus (MLV) porcine reproductive and respiratory syndrome (PRRS) vaccine in susceptible, pregnant gilts. To simulate inadvertent exposure secondary to postvaccination shedding of PRRS-MLV, seronegative gilts (n=51) were exposed by IM vaccination at 90 days of gestation. Vaccinated and nonvaccinated, seronegative control gilts (n=25) were maintained in separate facilities. The PRRS-MLV vaccine was given in a 2mL dose on day 0. On day 7 all vaccinated gilts were PRRSV-PCR-positive for PRRSV and had responded serologically as determined by an ELISA. All control gilts remained PRRSV-PCR- and ELISA-negative throughout the study. Abortions did not occur in gilts from either group. The difference between vaccinated and control gilts in average number of piglets per litter (12.43 and 12.16, respectively), number of live births per litter (11.21 and 11.54), and mean piglet birth weight (3.22 and 3.26 lbs) were not significantly different. Piglets in the control group had significantly greater average daily gain versus piglets from vaccinated gilts (0.52 vs. 0.46 lbs, PPRRS-MLV agent did not significantly affect reproductive outcomes. Lower ADG in piglets from vaccinated gilts may be due to PRRS-MLV viremia following transplacental or post-farrowing exposure. Air sampling results indicated that environmental contamination with PRRS-MLV shed from vaccinated gilts was minimal. Copyright © 2014 Elsevier Ltd. All rights reserved.

  12. Overview of a performance assessment methodology for low-level radioactive waste disposal facilities

    International Nuclear Information System (INIS)

    Kozak, M.W.; Chu, M.S.Y.

    1991-01-01

    A performance assessment methodology has been developed for use by the US Nuclear Regulatory Commission in evaluating license applications for low-level waste disposal facilities. This paper provides a summary and an overview of the modeling approaches selected for the methodology. The overview includes discussions of the philosophy and structure of the methodology. This performance assessment methodology is designed to provide the NRC with a tool for performing confirmatory analyses in support of license reviews related to postclosure performance. The methodology allows analyses of dose to individuals from off-site releases under normal conditions as well as on-site doses to inadvertent intruders. 24 refs., 1 tab

  13. Moving Object Tracking and Its Application to an Indoor Dual-Robot Patrol

    Directory of Open Access Journals (Sweden)

    Cheng-Han Shih

    2016-11-01

    Full Text Available This paper presents an application of image tracking using an omnidirectional wheeled mobile robot (WMR. The objective of this study is to integrate image processing of hue, saturation, and lightness (HSL for fuzzy color space, and use mean shift tracking for object detection and a Radio Frequency Identification (RFID reader for confirming destination. Fuzzy control is applied to omnidirectional WMR for indoor patrol and intruder detection. Experimental results show that the proposed control scheme can make the WMRs perform indoor security service.

  14. Apoplastic interactions between plants and plant root intruders

    Directory of Open Access Journals (Sweden)

    Kanako eMitsumasu

    2015-08-01

    Full Text Available Numerous pathogenic or parasitic organisms attack plant roots to obtain nutrients, and the apoplast including the plant cell wall is where the plant cell meets such organisms. Root-parasitic angiosperms and nematodes are two distinct types of plant root parasites but share some common features in their strategies for breaking into plant roots. Striga and Orobanche are obligate root parasitic angiosperms that cause devastating agricultural problems worldwide. Parasitic plants form an invasion organ called a haustorium, where plant cell wall degrading enzymes (PCWDEs are highly expressed. Plant-parasitic nematodes are another type of agriculturally important plant root parasite. These nematodes breach the plant cell walls by protruding a sclerotized stylet from which PCWDEs are secreted. Responding to such parasitic invasion, host plants activate their own defense responses against parasites. Endoparasitic nematodes secrete apoplastic effectors to modulate host immune responses and to facilitate the formation of a feeding site. Apoplastic communication between hosts and parasitic plants also contributes to their interaction. Parasitic plant germination stimulants, strigolactones (SLs, are recently identified apoplastic signals that are transmitted over long distances from biosynthetic sites to functioning sites. Here, we discuss recent advances in understanding the importance of apoplastic signals and cell walls for plant-parasite interactions.

  15. Probing intruder configurations in $^{186, 188}$Pb using Coulomb excitation

    CERN Multimedia

    Columb excitation measurements to study the shape coexistence, mixing and quadrupole collectivity of the low-lying levels in neutron-deficient $^{188}$Pb nuclei are proposed with a view to extending similar studies to the $^{186}$Pb midshell nucleus. The HIE-ISOLDE beam of $^{186,188}$Pb nuclei will be delivered to MINIBALL+SPEDE set-up for simultaneous in-beam $\\gamma$-ray and conversion electron spectroscopy. The proposed experiment will allow the sign of the quadrupole deformation parameter to be extracted for the two lowest 2$^{+}$ states in $^{188}$Pb. Moreover, the advent of SPEDE will allow probing of the bandhead 0$^{+}$ states via direct measurements of E0 transitions. Beam development is requested to provide pure and instense $^{186}$Pb beam.

  16. Planning for a Violent Intruder Event: The School Nurse's Role.

    Science.gov (United States)

    Selekman, Janice; Melvin, Joseph

    2017-05-01

    School shootings occur too frequently and often with devastating results. The key to prevention and mitigation of these events is to have a plan that is simple, up-to-date, disseminated, and practiced. This article discusses the steps that school nurses can take to work with school administration to prepare themselves, their staff, and their students.

  17. Detection of the under-soil intruder activity

    Science.gov (United States)

    Cechak, Jaroslav

    2007-04-01

    The presented paper focuses on the possibilities of technical methods designed to detect a trespasser under the ground, and in general on the possibilities of detection a trespasser behind an obstruction. The paper analyses method of detection of a trespasser that were practically verified by the author of the paper. The first part of the paper discusses the characteristics and use of piezoelectric films that could be used as a replacement for the traditional geophone for detection of underground mining operation. It also provides a block connection diagram of the measuring chain and photos of the practical implementation of the sensor. The consequent part of the paper then discusses the possibilities of detecting a trespasser based on electromagnetic waves emission by humans in the ELF - Extremely Low Frequency band. The paper is supplemented with illustrative photos and results of numeric processing of signals in the form of graphs and courses. The history of excavating and using tunnels spans long into the past. Tunnels were used not only as storage for food and war material but mainly as effective means of protection against attackers. A significant motivating factor for constructing tunnels lies in the hidden possibility of movement of people and transfer of material under the ground of a protected perimeter. At present some tunnels are used as roads for smuggling drugs, weapons, ammunition or illegal passages of people. There are even cases, not exceptional, when tunnels were excavated with the aim to rob a bank safe etc. The fact that construction of tunnels, often quite primitive ones, is not sporadic, can be continually documented not only by historical sources but often also by the daily news summary. The concurrent lack of proper technological means results in the renaissance of using tunnels for illegal purposes even at present. The presented paper focuses on the above mentioned area and points to little used physical principles of detection underground activities of trespassers.

  18. Temperature profile around a basaltic sill intruded into wet sediments

    Science.gov (United States)

    Baker, Leslie; Bernard, Andrew; Rember, William C.; Milazzo, Moses; Dundas, Colin M.; Abramov, Oleg; Kestay, Laszlo P.

    2015-01-01

    The transfer of heat into wet sediments from magmatic intrusions or lava flows is not well constrained from field data. Such field constraints on numerical models of heat transfer could significantly improve our understanding of water–lava interactions. We use experimentally calibrated pollen darkening to measure the temperature profile around a basaltic sill emplaced into wet lakebed sediments. It is well known that, upon heating, initially transparent palynomorphs darken progressively through golden, brown, and black shades before being destroyed; however, this approach to measuring temperature has not been applied to volcanological questions. We collected sediment samples from established Miocene fossil localities at Clarkia, Idaho. Fossils in the sediments include pollen from numerous tree and shrub species. We experimentally calibrated changes in the color of Clarkia sediment pollen and used this calibration to determine sediment temperatures around a Miocene basaltic sill emplaced in the sediments. Results indicated a flat temperature profile above and below the sill, with T > 325 °C within 1 cm of the basalt-sediment contact, near 300 °C at 1–2 cm from the contact, and ~ 250 °C at 1 m from the sill contact. This profile suggests that heat transport in the sediments was hydrothermally rather than conductively controlled. This information will be used to test numerical models of heat transfer in wet sediments on Earth and Mars.

  19. Mineral Trioxide Aggregate for Intruded Teeth with Incomplete Apex Formation.

    Science.gov (United States)

    T S Oliveira, Caroline; M A de Carvalho, Fredson; C O Gonçalves, Leonardo; M N de Souza, Jessyca; F R Garcia, Lucas; A F Marques, André; N de Souza, Samir

    2018-01-01

    The axial displacement of a tooth within the alveolar bone is called traumatic intrusive luxation. The treatment of immature permanent teeth with incomplete root formation is a challenging procedure, as the prognosis is uncertain. The objective of the present article is to report the successful treatment of traumatic intrusive luxation in teeth with incomplete root formation, where mineral trioxide aggregate (MTA) was used as an apical plug to induce apexification. A 10-year-old boy was referred to our department for emergency treatment of dentoalveolar trauma to the maxillary central incisors. After clinical and radiographic examination, the teeth were surgically repositioned and rigidly fixed. Three months later, a pulp vitality test of both teeth elicited a negative response. Endodontic therapy with an MTA plug was used to induce apexification as root formation was incomplete. The root canals were then filled. Clinical and radiographic examination was then performed again at 2 and 4 months later. The MTA apical plug was effective in inducing apexification and maintaining both teeth.

  20. Apoplastic interactions between plants and plant root intruders.

    Science.gov (United States)

    Mitsumasu, Kanako; Seto, Yoshiya; Yoshida, Satoko

    2015-01-01

    Numerous pathogenic or parasitic organisms attack plant roots to obtain nutrients, and the apoplast including the plant cell wall is where the plant cell meets such organisms. Root parasitic angiosperms and nematodes are two distinct types of plant root parasites but share some common features in their strategies for breaking into plant roots. Striga and Orobanche are obligate root parasitic angiosperms that cause devastating agricultural problems worldwide. Parasitic plants form an invasion organ called a haustorium, where plant cell wall degrading enzymes (PCWDEs) are highly expressed. Plant-parasitic nematodes are another type of agriculturally important plant root parasite. These nematodes breach the plant cell walls by protruding a sclerotized stylet from which PCWDEs are secreted. Responding to such parasitic invasion, host plants activate their own defense responses against parasites. Endoparasitic nematodes secrete apoplastic effectors to modulate host immune responses and to facilitate the formation of a feeding site. Apoplastic communication between hosts and parasitic plants also contributes to their interaction. Parasitic plant germination stimulants, strigolactones, are recently identified apoplastic signals that are transmitted over long distances from biosynthetic sites to functioning sites. Here, we discuss recent advances in understanding the importance of apoplastic signals and cell walls for plant-parasite interactions.

  1. Radar-Based Intruder Detection for a Robotic Security System

    National Research Council Canada - National Science Library

    Cory, Phil

    1998-01-01

    .... The system includes multiple supervised-autonomous platforms equipped with intrusion detection, barrier assessment, and inventory assessment subsystems commanded from an integrated control station...

  2. Inadvertent presence of genetically modified elements in maize food ...

    African Journals Online (AJOL)

    owner

    2013-07-31

    Jul 31, 2013 ... assess the maize food products in the Kenyan market for the presence of genetic elements from GMOs. This was done by testing various maize food products, including grains from open air markets, relief food, maize seeds from seed companies and processed food sampled from various supermarkets in ...

  3. Inadvertent presence of genetically modified elements in maize food ...

    African Journals Online (AJOL)

    owner

    2013-07-31

    Jul 31, 2013 ... such as corn flakes, corn puffs and corn syrup. These results suggest that high temperatures or other factors involved in the processing of the cornflakes degraded the. cry1Ab DNA. PCR is very efficient in detecting genetically modified genes in Bt maize seed and grains because it was able to amplify the ...

  4. Fisheries bycatch as an inadvertent human-induced evolutionary mechanism.

    Directory of Open Access Journals (Sweden)

    Christophe Barbraud

    Full Text Available Selective harvesting of animals by humans can affect the sustainability and genetics of their wild populations. Bycatch - the accidental catch of non-target species - spans the spectrum of marine fauna and constitutes a harvesting pressure. Individual differences in attraction to fishing vessels and consequent susceptibility to bycatch exist, but few studies integrate this individual heterogeneity with demography. Here, we tested for the evidence and consequences of individual heterogeneity on the demography of the wandering albatross, a seabird heavily affected by fisheries bycatch. We found strong evidence for heterogeneity in survival with one group of individuals having a 5.2% lower annual survival probability than another group, and a decrease in the proportion of those individuals with the lowest survival in the population coinciding with a 7.5 fold increase in fishing effort in the foraging areas. Potential causes for the heterogeneity in survival are discussed and we suggest that bycatch removed a large proportion of individuals attracted by fishing vessels and had significant phenotypic and population consequences.

  5. The Inadvertent Effect of Assurance on Nuclear Proliferation

    Science.gov (United States)

    2013-02-14

    despite steady Gross Domestic Product ( GDP ) growth.13 Moreover, China’s space intercept of a defunct weather satellite, fielding of advanced BMD...ponder why the U.S. would want to swap Los Angeles for Taipei . In an uncertain and multi-polar world containing proliferating nuclear weapon states, the...RL33436 (Washington, DC: Congressional Research Service, 04 May 2012), 7. 13 China’s GDP and military budget over the decade between 1996 and 2006

  6. Inadvertent Exemplars: Life History Portraits of Two Socially Just Principals

    Science.gov (United States)

    Scanlan, Martin

    2012-01-01

    This study creates life history portraits of two White middle-class native-English-speaking principals demonstrating commitments to social justice in their work in public elementary schools serving disproportionately high populations of students who are marginalized by poverty, race, and linguistic heritage. Through self-reported life histories of…

  7. Using recruitment source timing and diagnosticity to enhance applicants' occupation-specific human capital.

    Science.gov (United States)

    Campion, Michael C; Ployhart, Robert E; Campion, Michael A

    2017-05-01

    [Correction Notice: An Erratum for this article was reported in Vol 102(5) of Journal of Applied Psychology (see record 2017-14296-001). In the article, the following headings were inadvertently set at the wrong level: Method, Participants and Procedure, Measures, Occupation specific human capital, Symbolic jobs, Relevant majors, Occupation-specific capital hotspots, Source timing, Source diagnosticity, Results, and Discussion. All versions of this article have been corrected.] This study proposes that reaching applicants through more diagnostic recruitment sources earlier in their educational development (e.g., in high school) can lead them to invest more in their occupation-specific human capital (OSHC), thereby making them higher quality candidates. Using a sample of 78,157 applicants applying for jobs within a desirable professional occupation in the public sector, results indicate that applicants who report hearing about the occupation earlier, and applicants who report hearing about the occupation through more diagnostic sources, have higher levels of OSHC upon application. Additionally, source timing and diagnosticity affect the likelihood of candidates applying for jobs symbolic of the occupation, selecting relevant majors, and attending educational institutions with top programs related to the occupation. These findings suggest a firm's recruiting efforts may influence applicants' OSHC investment strategies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  8. Dynamics of biochemical properties associated with soil nitrogen mineralization following nitrification inhibitor and fungicide applications.

    Science.gov (United States)

    Zhang, Manyun; Wang, Weijin; Wang, Jun; Teng, Ying; Xu, Zhihong

    2017-04-01

    Agrochemical applications may have side effects on soil biochemical properties related to soil nitrogen (N) mineralization and thus affect N cycling. The present study aimed to evaluate the effects of nitrification inhibitor 3,4-dimethylpyrazole phosphate (DMPP) and fungicide iprodione on soil neutral protease (NPR), alkaline protease (APR), chitinase (CHI), and their functional genes (nprA, aprA, and chiA) related to soil N mineralization. The following four treatments were included: blank control (CK), single DMPP application (DAA), weekly iprodione applications (IPR), and the combined applications of DMPP and iprodione (DI). Compared with the CK treatment, DMPP application significantly inhibited the CHI activity in the first 14 days of incubation, and iprodione applications, particularly when applied alone, decreased the NPR, APR, and CHI activities. Relative to the IPR treatment, extra DMPP application had the potential to alleviate the inhibitory effects of iprodione on the activities of these enzymes. DMPP application significantly increased aprA gene abundances after 14 days of incubation. However, repeated iprodione applications, alone or with the DMPP, decreased nprA and chiA gene abundances. Relative to the CK treatment, DMPP application generated negligible effects on the positive/negative correlations between soil enzyme activities and the corresponding functional gene abundances. However, the positive correlation between the CHI activity and chiA gene abundance was changed to negative correlation by repeated iprodione applications, alone or together with the DMPP. Our results demonstrated that agrochemical applications, particularly repeated fungicide applications, can have inadvertent effects on enzyme activities and functional gene abundances associated with soil N mineralization.

  9. Radioactive Waste Management Complex low-level waste radiological performance assessment

    Energy Technology Data Exchange (ETDEWEB)

    Maheras, S.J.; Rood, A.S.; Magnuson, S.O.; Sussman, M.E.; Bhatt, R.N.

    1994-04-01

    This report documents the projected radiological dose impacts associated with the disposal of radioactive low-level waste at the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory. This radiological performance assessment was conducted to evaluate compliance with applicable radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the public and the environment. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses were made for both offsite receptors and individuals inadvertently intruding onto the site after closure. In addition, uncertainty and sensitivity analyses were performed. The results of the analyses indicate compliance with established radiological criteria and provide reasonable assurance that public health and safety will be protected.

  10. Seroepidemiological profile of pregnant women after inadvertent rubella vaccination in the state of Rio de Janeiro, Brazil, 2001-2002 Perfil seroepidemiológico de embarazadas después de recibir inadvertidamente la vacuna antirrubeólica, estado de Rio de Janeiro, Brasil, 2001-2002

    Directory of Open Access Journals (Sweden)

    Gloria Regina da Silva e Sá

    2006-06-01

    Full Text Available OBJECTIVES: To analyze postvaccination serological status in pregnant women inadvertently vaccinated against rubella in the state of Rio de Janeiro, Brazil. METHODS: This was a cross-sectional study of pregnant women 15 to 29 years old, vaccinated against rubella and measles from November 2001 to March 2002, who were unaware of their pregnancy at the time of vaccination or who became pregnant within 30 days thereafter. They were tested for rubella-specific immunoglobulin M (IgM and G (IgG and classified as immune (IgM-negative, IgG-positive, tested within 30 days after vaccination, susceptible (IgM-positive after vaccination or indeterminate (IgM-negative, IgG-positive, vaccination- serological testing interval greater than 30 days. RESULTS: Of 2 292 women, 288 (12.6% were susceptible, 316 (13.8% immune, 1 576 (68.8% indeterminate, 8 (0.3% ineligible, and 104 (4.5% lost to follow-up. IgM seropositivity by vaccination-serological testing interval was 16.1% (d" 30 days, 15.4% (30-60 days, and 14.2% (61-90 days. Considering the campaign's target age, the 20-to-24-year age group had the largest proportion of individuals susceptible to rubella (14.8% and represented 42.4% (122/288 of all susceptible women. In 75% of susceptible pregnant women, gestational age was 5 weeks or less at the time of vaccination. CONCLUSIONS: Mass immunization of childbearing-age women was justified on the basis of epidemiological and serological data. Follow-up of vaccinated pregnant women revealed no cases of congenital rubella syndrome due to rubella vaccination. However, the observed rate of congenital infection supports the recommendation to avoid vaccinating pregnant women, and to avoid conception for up to 1 month following rubella vaccination.OBJETIVOS: Analizar el estado serológico de mujeres embarazadas tras haber recibido inadvertidamente la vacuna antirrubeólica, en el estado de Rio de Janeiro, Brasil. MÉTODOS: Se realizó un estudio transversal de mujeres

  11. "Using recruitment source timing and diagnosticity to enhance applicants' occupation-specific human capital": Correction to Campion, Ployhart, and Campion (2017).

    Science.gov (United States)

    2017-05-01

    Reports an error in "Using Recruitment Source Timing and Diagnosticity to Enhance Applicants' Occupation-Specific Human Capital" by Michael C. Campion, Robert E. Ployhart and Michael A. Campion ( Journal of Applied Psychology , Advanced Online Publication, Feb 02, 2017, np). In the article, the following headings were inadvertently set at the wrong level: Method, Participants and Procedure, Measures, Occupation specific human capital, Symbolic jobs, Relevant majors, Occupation-specific capital hotspots, Source timing, Source diagnosticity, Results, and Discussion. All versions of this article have been corrected. (The following abstract of the original article appeared in record 2017-04566-001.) This study proposes that reaching applicants through more diagnostic recruitment sources earlier in their educational development (e.g., in high school) can lead them to invest more in their occupation-specific human capital (OSHC), thereby making them higher quality candidates. Using a sample of 78,157 applicants applying for jobs within a desirable professional occupation in the public sector, results indicate that applicants who report hearing about the occupation earlier, and applicants who report hearing about the occupation through more diagnostic sources, have higher levels of OSHC upon application. Additionally, source timing and diagnosticity affect the likelihood of candidates applying for jobs symbolic of the occupation, selecting relevant majors, and attending educational institutions with top programs related to the occupation. These findings suggest a firm's recruiting efforts may influence applicants' OSHC investment strategies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  12. Potential application of the Motorola MSR-20 Radar to DOE site security

    Energy Technology Data Exchange (ETDEWEB)

    Arlowe, D.; Rebeil, P.; Vigil, R.

    1993-09-01

    This paper describes the results of testing the MSR-20 radar and provides guidance on how this radar may be used to provide early detection and warning of approaching intruders beyond DOE facility site boundaries.

  13. Medical Applications

    OpenAIRE

    Biscari, C.; Falbo, L.

    2016-01-01

    The use of accelerators for medical applications has evolved from initial experimentation to turn-key devices commonly operating in hospitals. New applications are continuously being developed around the world, and the hadrontherapy facilities of the newest generation are placed at the frontier between industrial production and advanced R&D. An introduction to the different medical application accelerators is followed by a description of the hadrontherapy facilities, with special emphasis on ...

  14. LCA Applications

    DEFF Research Database (Denmark)

    Owsianiak, Mikołaj; Bjørn, Anders; Laurent, Alexis

    2017-01-01

    The chapter gives examples of applications of LCA by the central societal actors in government, industry and citizens, and discusses major motivations and challenges for the use of LCA to support science-based decision-making from their respective perspectives. We highlight applications of LCA in...

  15. Medical Applications

    CERN Document Server

    Biscari, C.

    2014-12-19

    The use of accelerators for medical applications has evolved from initial experimentation to turn-key devices commonly operating in hospitals. New applications are continuously being developed around the world, and the hadrontherapy facilities of the newest generation are placed at the frontier between industrial production and advanced R&D. An introduction to the different medical application accelerators is followed by a description of the hadrontherapy facilities, with special emphasis on CNAO, and the report closes with a brief outlook on the future of this field.

  16. Medical Applications

    International Nuclear Information System (INIS)

    Biscari, C; Falbo, L

    2014-01-01

    The use of accelerators for medical applications has evolved from initial experimentation to turn-key devices commonly operating in hospitals. New applications are continuously being developed around the world, and the hadrontherapy facilities of the newest generation are placed at the frontier between industrial production and advanced R&D. An introduction to the different medical application accelerators is followed by a description of the hadrontherapy facilities, with special emphasis on CNAO, and the report closes with a brief outlook on the future of this field

  17. Photovoltaic applications

    International Nuclear Information System (INIS)

    Sidrach, M.

    1992-01-01

    The most common terrestrial applications of photovoltaic plants are reviewed. Classification of applications can be done considering end-use sectors and load profiles (consumption demand). For those systems with direct coupling the working point is determined by the intersection of the load line with the I-V curve Design guidelines are provided for photovoltaic systems. This lecture focusses on the distribution system and safeguards

  18. The regulatory control over radiation sources: the Brazilian experience and some lessons learned from industrial applications

    Energy Technology Data Exchange (ETDEWEB)

    Costa, E.L.C.; Gomes, J.D.R.L.; Gomes, R.S.; Costa, M.L.L.; Thomé, Z.D., E-mail: evaldo@cnen.gov.br, E-mail: jlopes@cnen.gov.br, E-mail: rogeriog@cnen.gov.br, E-mail: mara@cnen.gov.br, E-mail: zielithome@gmail.com [Comissao Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil). Diretoria de Radioproteção e Segurança Nuclear; Instituto Militar de Engenharia (IME), Rio de Janeiro, RJ (Brazil). Seção de Engenharia Nuclear

    2017-11-01

    This study gives an overview of the activities of the National Commission of Nuclear Energy (CNEN), as the Brazilian nuclear regulatory authority. These activities are described, especially those related to management of orphan sources and radioactive material in scrap metal considering the actions already put into place by CNEN during the licensing and controlling of radioactive sources in the industry and other facilities. In Brazil, there is not yet an effective system for controlling the scrap metal and recycling industry, thus a coordinated approach to achieve a harmonized and effective response with the involvement of third parties is needed, especially the metal industries and ores facilities. These practices call for stringent regulatory control, in order to reduce the occurrence of orphan sources, and consequently, radioactive material appearing in scrap metal. Some challenges of managing the national radiation sources register systems will be discussed, in order to cover effectively all the radiation source history (in a 'from the cradle to the grave' basis), and the dynamic maintenance and update of these data. The main industrial applications considered in this work are those dealing with constant movement of sources all over the country, with geographical issues to be considered in the managing and controlling actions, such as gammagraphy and well-logging. This study aims to identify and promote good practices to prevent inadvertent diversion of radioactive material, taking into account existing international recommendations and some lessons learned in national level. (author)

  19. The regulatory control over radiation sources: the Brazilian experience and some lessons learned from industrial applications

    International Nuclear Information System (INIS)

    Costa, E.L.C.; Gomes, J.D.R.L.; Gomes, R.S.; Costa, M.L.L.; Thomé, Z.D.; Instituto Militar de Engenharia

    2017-01-01

    This study gives an overview of the activities of the National Commission of Nuclear Energy (CNEN), as the Brazilian nuclear regulatory authority. These activities are described, especially those related to management of orphan sources and radioactive material in scrap metal considering the actions already put into place by CNEN during the licensing and controlling of radioactive sources in the industry and other facilities. In Brazil, there is not yet an effective system for controlling the scrap metal and recycling industry, thus a coordinated approach to achieve a harmonized and effective response with the involvement of third parties is needed, especially the metal industries and ores facilities. These practices call for stringent regulatory control, in order to reduce the occurrence of orphan sources, and consequently, radioactive material appearing in scrap metal. Some challenges of managing the national radiation sources register systems will be discussed, in order to cover effectively all the radiation source history (in a 'from the cradle to the grave' basis), and the dynamic maintenance and update of these data. The main industrial applications considered in this work are those dealing with constant movement of sources all over the country, with geographical issues to be considered in the managing and controlling actions, such as gammagraphy and well-logging. This study aims to identify and promote good practices to prevent inadvertent diversion of radioactive material, taking into account existing international recommendations and some lessons learned in national level. (author)

  20. Recent advances in biomedical applications of accelerator mass spectrometry

    Directory of Open Access Journals (Sweden)

    Turteltaub Kenneth W

    2009-12-01

    Full Text Available Abstract After publication of our article, it was noted that we inadvertently failed to include the complete list of authors. The full list, including co-authors, has now been added and the Authors' contributions and Competing interests sections modified accordingly.

  1. Development of a self-navigating mobile interior robot application as a security guard/sentry

    International Nuclear Information System (INIS)

    Klarer, P.R.; Harrington, J.J.

    1986-07-01

    This paper describes a mobile robot system designed to function as part of an overall security system at a high security facility. The features of this robot system include specialized software and sensors for navigation without the need for external locator beacons or signposts, sensors for remote imaging and intruder detection, and the ability to communicate information either directly to the electronic portion of the security system or to a manned central control center. Other desirable features of the robot system include low weight, compact size, and low power consumption. The robot system can be operated either by remote manual control, or it can operate autonomously where direct human control can be limited to the global command level. The robot can act as a mobile remote sensing platform for alarm assessment or roving patrol, as a point sensor (sentry) in routine security applications, or as an exploratory device in situations potentially hazardous to humans. This robot system may also be used to ''walk-test'' intrusion detection sensors as part of a routine test and maintenance program for an interior intrusion detection system. The hardware, software, and operation of this robot system will be briefly described herein

  2. Animal experiment of periodontal tissue remodeling in application of ...

    African Journals Online (AJOL)

    In addition, the periodontal tissue on the buccal and the lingual sides also remodeled. In conclusion, the incisor teeth were not only intruded vertically but also showed rotation of the crown towards the labial side and the root towards the palatal side, by using mini-implants as anchorage. Besides, if the force applied was ...

  3. Animal experiment of periodontal tissue remodeling in application of ...

    African Journals Online (AJOL)

    user

    2011-02-21

    Feb 21, 2011 ... In addition, the periodontal tissue on the buccal and the lingual sides also remodeled. In conclusion, the incisor teeth were not only intruded vertically but also showed rotation of the crown towards the labial side and the root towards the palatal side, by using mini-implants as anchorage. Besides, if the force ...

  4. PRIBIC Application

    International Nuclear Information System (INIS)

    Pascual Alonso, J.L.; Barcala Riveira, J.M.

    2002-01-01

    PRIBIC plant (Pollutants Reduction In small Biomass Combustion systems) at CEDER is a facility specifically designed to do biomass combustion tests. In these tests is necessary to know the values of different sensors in real time. With this information the PRIBIC plant is regulated to its optimum point of work and its possible to follow the operation criteria and get test objectives. Different electronic instruments record information about the plant operation. A software application was developed to let a centralised motorization of that information. The application communicates with the instrumentation, recovers data, lets operators see data in real time and saves the information in files. An important part of this document describes that application, and some considerations to generalise this kind of developments to other Experimental Plants, including cost estimations. Descriptions of plant, analysis of the problem, result evaluations, and conclusions can also be found in the document. (Author) 13 refs

  5. Applications of granular-dynamics numerical simulations to asteroid surfaces

    Science.gov (United States)

    Richardson, D. C.; Michel, P.; Schwartz, S. R.; Yu, Y.; Ballouz, R.-L.; Matsumura, S.

    2014-07-01

    Spacecraft images and indirect observations including thermal inertia measurements indicate most small bodies have surface regolith. Evidence of granular flow is also apparent in the images. This material motion occurs in very low gravity, therefore in a totally different gravitational environment than on the Earth. Upcoming sample-return missions to small bodies, and possible future manned missions, will involve interaction with the surface regolith, so it is important to develop tools to predict the surface response. We have added new capabilities to the N-body gravity tree code pkdgrav [1,2] that permit the simulation of granular dynamics, including multi-contact physics and friction forces, using the soft-sphere discrete-element method [3]. The numerical approach has been validated through comparison with laboratory experiments (e.g., [3,4]). (1) We carried out impacts into granular materials using different projectile shapes under Earth's gravity [5] and compared the results to laboratory experiments [6] in support of JAXA's Hayabusa 2 asteroid sample-return mission. We tested different projectile shapes and confirmed that the 90-degree cone was the most efficient at excavating mass when impacting 5-mm-diameter glass beads. Results are sensitive to the normal coefficient of restitution and the coefficient of static friction. Preliminary experiments in micro-gravity for similar impact conditions show both the amount of ejected mass and the timescale of the impact process increase, as expected. (2) It has been found (e.g., [7,8]) that ''fresh'' (unreddened) Q-class asteroids have a high probability of recent planetary encounters (˜1 Myr; also see [9]), suggesting that surface refreshening may have occurred due to tidal effects. As an application of the potential effect of tidal interactions, we carried out simulations of Apophis' predicted 2029 encounter with the Earth to see whether regolith motion might occur, using a range of plausible material parameters

  6. Perimeter Security and Intruder Detection Using Gravity Gradiometry: A Feasibility Study

    Science.gov (United States)

    2011-03-24

    Poisson’s Equation for Gravitational Gradiometry in Free Space [20] Mickus and Hinojosa [23] note the gravitational gradient tensor forms a...L., and Hinojosa , J.H., "The complete gravity gradient tensor derived from the vertical component of gravity: a Fourier transform technique," Journal

  7. Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT)

    Science.gov (United States)

    2016-07-27

    Airman Systems Directorate Warfighter Interface Division Applied Neuroscience Branch Wright-Patterson Air Force Base, OH 45433 AGENCY...Typically, an automated , algorithmic computer program known as an Intrusion Detection System (IDS) is responsible for the initial inspection of network data...rates were varied from 1 to 10 alerts per minute. A SME-provided severity distribution was explored, within which 25 % of alerts were classified as

  8. Similarities between the target and the intruder in naturally-occurring repeated person naming errors

    Directory of Open Access Journals (Sweden)

    Serge eBredart

    2015-09-01

    Full Text Available The present study investigated an intriguing phenomenon that did not receive much attention so far: repeatedly calling a familiar person with someone else’s name. From participants’ responses to a questionnaire, these repeated naming errors were characterized with respect to a number of properties (e.g., type of names being substituted, error frequency, error longevity and different features of similarity (e.g., age, gender, type of relationship with the participant, face resemblance and similarity of the contexts of encounter between the bearer of the target name and the bearer of the wrong name. Moreover, it was evaluated whether the phonological similarity between names, the participants’ age, the difference of age between the two persons whose names were substituted, and face resemblance between the two persons predicted the frequency of error. Regression analyses indicated that phonological similarity between the target name and the wrong name predicted the frequency of repeated person naming errors. The age of the participant was also a significant predictor of error frequency: the older the participant the higher the frequency of errors. Consistent with previous research stressing the importance of the age of acquisition of words on lexical access in speech production, results indicated that bearer of the wrong name was on average known for longer than the bearer of the target name.

  9. The use of isotope techniques to investigate saltwater intruded aquifers in the Philippines

    International Nuclear Information System (INIS)

    Peralta, G.L.

    1988-01-01

    Studies in Metro Manila area have identified inland bodies of saline water which have been called ''connate water''. It has been refered to in literature as saline water occurring inland at a range of depths, in close association with freshwater. The relationships between these various bodies of saline water are not clear and for groundwater development planning it would be useful to determine whether the inland cases are a series of small isolated residual bodies from the last marine transgression or parts of a large continuous saline body. Furthermore the origin and mechanism of natural groundwater recharges are often not clear from the chemical and hydrogeological data as in the island of Cebu. In these circumstances it was recommended that useful planning data be obtained from a study of the concentrations of natural isotopes in the groundwater, particularly in the areas of Manila, Cebu and Bulacan-Pampanga. (author)

  10. Origin of a rhyolite that intruded a geothermal well while drilling at the Krafla volcano, Iceland

    Science.gov (United States)

    Elders, W.A.; Fridleifsson, G.O.; Zierenberg, R.A.; Pope, E.C.; Mortensen, A.K.; Gudmundsson, A.; Lowenstern, J. B.; Marks, N.E.; Owens, L.; Bird, D.K.; Reed, M.; Olsen, N.J.; Schiffman, P.

    2011-01-01

    Magma flowed into an exploratory geothermal well at 2.1 km depth being drilled in the Krafla central volcano in Iceland, creating a unique opportunity to study rhyolite magma in situ in a basaltic environment. The quenched magma is a partly vesicular, sparsely phyric, glass containing ~1.8% of dissolved volatiles. Based on calculated H2O-CO2 saturation pressures, it degassed at a pressure intermediate between hydrostatic and lithostatic, and geothermometry indicates that the crystals in the melt formed at ~900 ??C. The glass shows no signs of hydrothermal alteration, but its hydrogen and oxygen isotopic ratios are much lower than those of typical mantle-derived magmas, indicating that this rhyolite originated by anhydrous mantle-derived magma assimilating partially melted hydrothermally altered basalts. ?? 2011 Geological Society of America.

  11. Strength of Occipital Hair as an Explanation for Pilonidal Sinus Disease Caused by Intruding Hair.

    Science.gov (United States)

    Doll, Dietrich; Bosche, Friederike D; Stauffer, Verena K; Sinicina, Inga; Hoffmann, Sebastian; van der Zypen, Dominic; Luedi, Markus M

    2017-09-01

    Pilonidal sinus disease is thought to be caused by intrusion of hair into healthy skin; loose hair in the intergluteal fold is thought to promote disease. However, compelling evidence to support these postulates is lacking; the cause of pilonidal sinus disease remains uncertain. To determine whether particular properties of hair are associated with susceptibility to pilonidal sinus disease, we compared physical properties of hairs of patients with pilonidal sinus disease with hairs from control subjects who were matched for sex, BMI, and age. This was an experimental study with establishment of a mechanical strength test for single hairs to quantify the maximum vertical force that a hair could exert, following tests of strength of occipital, lumbar, and intergluteal hair. Hair from patients with pilonidal sinus disease and matched control subjects were harvested from patients of the St. Marienhospital Vechta Department of Procto-Surgery. A total of 17 adult patients with pilonidal sinus disease and 217 control subjects were included. ANOVA and intraclass and interclass variations of data gained from mechanical strength tests of occipital, lumbar, and intergluteal hair were included. Vertical hair strength was significantly greater in patients with pilonidal sinus disease. Occipital hair exhibited 20% greater, glabella sacralis 1.1 times greater, and intergluteal hair 2 times greater strength in patients with pilonidal sinus disease than in matched control subjects (all p = 0.0001). In addition, patients with pilonidal sinus disease presented with significantly more hair at the glabella sacralis and in the intergluteal fold. The study was limited by its relatively small number of patients from a specific cohort of European patients. Occipital hair exhibited considerable vertical strength. Because occipital hair exerted the greatest force and cut hair fragments were found in the pilonidal nest in large quantities, these data suggest that pilonidal sinus disease is promoted by occipital hair. See Video Abstract at http://links.lww.com/DCR/A435.

  12. Where is the Frame? : Victims and Intruders in the Belgian Press Coverage of the Asylum Issue

    NARCIS (Netherlands)

    Gorp, B. van

    2005-01-01

    In this article an empirically oriented conceptualization of frames is developed, using the issue of asylum and illegal immigration in the Belgian press as a test case. The methodological focus of this study is on the question of how these frames can be detected in the coverage. How can they be

  13. Playback responses of socially monogamous black-fronted titi monkeys to simulated solitary and paired intruders.

    Science.gov (United States)

    Caselli, Christini B; Mennill, Daniel J; Gestich, Carla C; Setz, Eleonore Z F; Bicca-Marques, Júlio César

    2015-11-01

    Many birds and primates use loud vocalizations to mediate agonistic interactions with conspecifics, either as solos by males or females, or as coordinated duets. The extensive variation in duet complexity, the contribution of each sex, and the context in which duets are produced suggest that duets may serve several functions, including territory and mate defense. Titi monkeys (Callicebus spp.) are believed to defend their home range via solo loud calls or coordinated duets. Yet there are remarkably few experimental studies assessing the function of these calls. Observations of interactions between wild established groups and solitary individuals are rare and, therefore, controlled experiments are required to simulate such situations and evaluate the mate and joint territorial defense hypotheses. We conducted playback experiments with three free-ranging groups of habituated black-fronted titi monkeys (Callicebus nigrifrons) to test these hypotheses. We found that titi monkeys responded to the three conspecific playback treatments (duets, female solos, and male solos) and did not respond to the heterospecific control treatment. The monkeys did not show sex-specific responses to solos (N = 12 trials). Partners started to duet together in 79% of their responses to playback-simulated rivals (N = 14 calls in response to playback). Males started to approach the loudspeaker before females regardless of the type of stimulus. The strength of the response of mated pairs to all three conspecific treatments was similar. Overall, our results are consistent with the idea that black-fronted titi monkeys use their loud calls in intergroup communication as a mechanism of joint territorial defense. © 2015 Wiley Periodicals, Inc.

  14. Hydrogeochemical characterization and groundwater quality assessment in intruded coastal brine aquifers (Laizhou Bay, China).

    Science.gov (United States)

    Zhang, Xiaoying; Miao, Jinjie; Hu, Bill X; Liu, Hongwei; Zhang, Hanxiong; Ma, Zhen

    2017-09-01

    The aquifer in the coastal area of the Laizhou Bay is affected by salinization processes related to intense groundwater exploitation for brine resource and for agriculture irrigation during the last three decades. As a result, the dynamic balances among freshwater, brine, and seawater have been disturbed and the quality of groundwater has deteriorated. To fully understand the groundwater chemical distribution and evolution in the regional aquifers, hydrogeochemical and isotopic studies have been conducted based on the water samples from 102 observation wells. Groundwater levels and salinities in four monitoring wells are as well measured to inspect the general groundwater flow and chemical patterns and seasonal variations. Chemical components such as Na + , K + , Ca 2+ , Mg 2+ , Sr 2+ , Cl - , SO 4 2- , HCO 3 - , NO 3 - , F - , and TDS during the same period are analyzed to explore geochemical evolution, water-rock interactions, sources of salt, nitrate, and fluoride pollution in fresh, brackish, saline, and brine waters. The decreased water levels without typical seasonal variation in the southeast of the study area confirm an over-exploitation of groundwater. The hydrogeochemical characteristics indicate fresh-saline-brine-saline transition pattern from inland to coast where evaporation is a vital factor to control the chemical evolution. The cation exchange processes are occurred at fresh-saline interfaces of mixtures along the hydraulic gradient. Meanwhile, isotopic data indicate that the brine in aquifers was either originated from older meteoric water with mineral dissolution and evaporation or repeatedly evaporation of retained seawater with fresher water recharge and mixing in geological time. Groundwater suitability for drinking is further evaluated according to water quality standard of China. Results reveal high risks of nitrate and fluoride contamination. The elevated nitrate concentration of 560 mg/L, which as high as 28 times of the standard content in drinking water is identified in the south region. In addition, the nitrate and ammonia data of the Wei River suggests decreasing nitrification rate in the study area from inland to estuary. High fluoride concentration, larger than 1 mg/L, is also detected in an area of about 50% of the study region. The saltwater intrusion is analyzed to be responsible for part of dissolution of minerals containing fluoride. Therefore, water treatment before drinking is needed in urgent to reduce the health expose risk.

  15. 'No entry', an invitation to intrude, or both? Reflections on a group of anorexic patients.

    Science.gov (United States)

    Stern, Julian M

    2013-08-01

    This paper describes the twice-weekly psychoanalytic psychotherapy of a young woman who had undergone major bowel surgery in her early 20s, with no clear medical indication for the surgery. Whilst the concept of 'No Entry' described by Williams (, b) aptly describes many features of more 'typical' anorexic patients, this paper describes a particular group of anorexic patients, referred by their physicians for multiple medical procedures; and proposes there is a group of anorexic patients, repeatedly referred for medical investigations, into whom particular types of entries occur. These are entries into the body 'legitimized' as medical, with a trajectory towards multiple procedures, examinations and surgical operations. Other entries (outside the medical setting) may occur in a state of altered consciousness, under the influence of alcohol or drugs, such that any wish for intrusion is disowned and denied. In both sets of events, intrusion is both invited, and consciously denied. The case example illuminates some of these features, and aspects of the countertransference are also described. Attention is drawn to relevant research focusing on surgical intrusion. Finally, there is an exploration as to how such patients may invite intrusions into the body through surgery and medical procedures. Copyright © 2013 Institute of Psychoanalysis.

  16. Technology applications

    Science.gov (United States)

    Anuskiewicz, T.; Johnston, J.; Leavitt, W.; Zimmerman, R. R.

    1972-01-01

    A summary of NASA Technology Utilization programs for the period of 1 December 1971 through 31 May 1972 is presented. An abbreviated description of the overall Technology Utilization Applications Program is provided as a background for the specific applications examples. Subjects discussed are in the broad headings of: (1) cancer, (2) cardiovascular disease, (2) medical instrumentation, (4) urinary system disorders, (5) rehabilitation medicine, (6) air and water pollution, (7) housing and urban construction, (8) fire safety, (9) law enforcement and criminalistics, (10) transportation, and (11) mine safety.

  17. Other applications

    International Nuclear Information System (INIS)

    Ligou, J.; Benoist, P.; Boffi, V.; Stenic, B.

    1981-01-01

    This chapter reports about the work done by four groups in Italy, France, Switzerland and Yugoslavia on the new applications of transport theory. Among them problems dealing with controlled thermonuclear reactions and/or fusion devices, nonlinear electric conductivity, atomic and crystal models were discussed

  18. Servicemembers' Group Life Insurance--Veterans' Group Life Insurance regulation update--ABO, VGLI application, SGLI 2-year disability extension. Final rule.

    Science.gov (United States)

    2014-07-31

    This document amends the Department of Veterans Affairs (VA) insurance regulations concerning Servicemembers' Group Life Insurance (SGLI) to reflect the statutory provisions of the Veterans' Benefits Act of 2010, which became law on October 13, 2010, and resulted in the need for amendments to change the SGLI Disability Extension period from 1 year to 2 years in duration; provide SGLI Traumatic Injury Protection (TSGLI) retroactive coverage effective from October 7, 2001, for all qualifying injuries regardless of the geographic location and military operation in which the injuries were incurred; and remove the SGLI and Veterans' Group Life Insurance (VGLI) Accelerated Benefits Option (ABO) discount rate. This rule also clarifies that ``initial premium'' refers to ``initial Veterans' Group Life Insurance premium,'' updates the current address of the Office of Servicemembers' Group Life Insurance (OSGLI), managed by Prudential Insurance Company of America, to reflect where the ABO application is mailed for processing, and corrects the OSGLI phone number. Finally, this rule removes the ABO application form from the regulation, and it corrects and clarifies language concerning the VGLI application period that was inadvertently incorrectly modified in a prior amendment of the regulations.

  19. The greenhouse theory of climate change - A test by an inadvertent global experiment

    Science.gov (United States)

    Ramanathan, V.

    1988-01-01

    The greenhouse theory of climate change has reached the crucial stage of verification. Surface warming as large as that predicted by models would be unprecedented during an interglacial period such as the present. The theory, its scope for verification, and the emerging complexities of the climate feedback mechanisms are discussed in this paper. The evidence for change is described and competing nonclimatic forcings are discussed.

  20. Vessel biofouling as an inadvertent vector of benthic invertebrates occurring in Brazil.

    Science.gov (United States)

    Farrapeira, Cristiane Maria Rocha; Tenório, Deusinete de Oliveira; Amaral, Fernanda Duarte do

    2011-04-01

    This article reviews the literature involving benthic invertebrates that are cited in association with hull fouling, reporting the species that occur on the Brazilian coast and evaluating the importance of this vector for the introduction of nonindigenous and cryptogenic invertebrates in Brazil. It discusses some of the strategies that were used by the species that allowed for their overseas transport and made it easier to cross natural barriers that otherwise would have been obstacles to their dispersion. The compiled data list 343 species (65% nonindigenous and 35% cryptogenic), mainly from the northwestern Atlantic Ocean. The traveling fauna, composed mostly of cosmopolitan species (70.3%), is primarily euryhaline and marine stenohaline, with sessile and sedentary habits. After delineating the shipborne species' ecological profiles and traveling strategies and evaluating their overlapping vectors, we concluded that hull vessels were the main vector of introduction to the Brazilian coast for 89.8% of the compiled species. Copyright © 2010 Elsevier Ltd. All rights reserved.

  1. MRI findings in 6 cases of children by inadvertent ingestion of diphenoxylate-atropine

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Lianxiang [Shandong University School of Medicine, Shandong Medical Imaging Research Institute , No. 44 West Wenhua Road, Jinan 250012 (China); Lin Xiangtao, E-mail: yishui1982@126.com [Shandong University School of Medicine, Shandong Medical Imaging Research Institute, No. 44 West Wenhua Road, Jinan 250012 (China); Cao Jinfeng [Shandong University School of Medicine, Shandong Medical Imaging Research Institute , No. 44 West Wenhua Road, Jinan 250012 (China); Wang Xueyu [Division of Pediatrics, Shandong Provincial Hospital, Shandong University, No. 324 Jingwu Road, Jinan 250021 (China); Wu Lebin [Shandong Medical Imaging Research Institute, No. 324 Jingwu Road, Jinan 250021 (China)

    2011-09-15

    Purpose: Compound diphenoxylate (diphenoxylate-atropine) poisoning can cause toxic encephalopathy in children, and magnetic resonance imaging (MRI) of the brain in this condition has not been reported. This study is to analyze brain MRI findings and to investigate the relations between MRI features and possible pathophysiological changes in children. Methods: Six children accidentally swallowed compound diphenoxylate, 4 males, 2 females, aged 20-46 months, average 33 months. Quantity of ingested diphenoxylate-atropine was from 6 to 30 tablets, each tablet contains diphenoxylate 2.5 mg and atropine 0.025 mg. These patients were referred to our hospital within 24 h after diphenoxylate-atropine ingestion, and underwent brain MRI scan within 24-72 h after emergency treatment. The characteristics of conventional MRI were analyzed. Results: These pediatric patients had various symptoms of opioid intoxication and atropine toxicity. Brain MRI showed abnormal low signal intensity on T1-weighted images (T1WI) and abnormal high signal intensity on T2-weighted images (T2WI) and fluid-attenuated inversion recovery (FLAIR) imaging in bilateral in all cases; abnormal high signal intensity on T1WI, T2WI and FLAIR in 4 cases. Encephalomalacia was observed in 3 cases during follow-up. Conclusion: In the early stage of compound diphenoxylate poisoning in children, multiple extensive edema-necrosis and hemorrhagic-necrosis focus were observed in basic nucleus, pallium and cerebellum, these resulted in the corresponding brain dysfunction with encephalomalacia. MRI scan in the early stage in this condition may provide evidences of brain impairment, and is beneficial for the early diagnosis, treatment and prognosis assessment.

  2. Causal Analysis of the Inadvertent Contact with an Uncontrolled Electrical Hazardous Energy Source (120 Volts AC)

    Energy Technology Data Exchange (ETDEWEB)

    David E. James; Dennis E. Raunig; Sean S. Cunningham

    2014-10-01

    On September 25, 2013, a Health Physics Technician (HPT) was performing preparations to support a pneumatic transfer from the HFEF Decon Cell to the Room 130 Glovebox in HFEF, per HFEF OI 3165 section 3.5, Field Preparations. This activity involves an HPT setting up and climbing a portable ladder to remove the 14-C meter probe from above ball valve HBV-7. The HPT source checks the meter and probe and then replaces the probe above HBV-7, which is located above Hood ID# 130 HP. At approximately 13:20, while reaching past the HBV-7 valve position indicator switches in an attempt to place the 14-C meter probe in the desired location, the HPT’s left forearm came in contact with one of the three sets of exposed terminals on the valve position indication switches for HBV 7. This resulted in the HPT receiving an electrical shock from a 120 Volt AC source. Upon moving the arm, following the electrical shock, the HPT noticed two exposed electrical connections on a switch. The HPT then notified the HFEF HPT Supervisor, who in turn notified the MFC Radiological Controls Manager and HFEF Operations Manager of the situation. Work was stopped in the area and the hazard was roped off and posted to prevent access to the hazard. The HPT was escorted by the HPT Supervisor to the MFC Dispensary and then preceded to CFA medical for further evaluation. The individual was evaluated and released without any medical restrictions. Causal Factor (Root Cause) A3B3C01/A5B2C08: - Knowledge based error/Attention was given to wrong issues - Written Communication content LTA, Incomplete/situation not covered The Causal Factor (root cause) was attention being given to the wrong issues during the creation, reviews, verifications, and actual performance of HFEF OI-3165, which covers the need to perform the weekly source check and ensure placement of the probe prior to performing a “rabbit” transfer. This resulted in the hazard not being identified and mitigated in the procedure. Work activities with in HFEF-OI-3165 placed the HPT in proximity of an unmitigated hazard directly resulting in this event. Contributing Factor A3B3C04/A4B5C04: - Knowledge Based Error, LTA Review Based on Assumption That Process Will Not Change - Change Management LTA, Risks/consequences associated with change not adequately reviewed/assessed Prior to the pneumatic system being out of service, the probe and meter were not being source checked together. The source check issue was identified and addressed during the period of time when the system was out of service. The corrective actions for this issue resulted in the requirement that a meter and probe be source checked together as it is intended to be used. This changed the activity and required an HPT to weekly, when in use, remove and install the probe from above HBV-7 to meet the requirement of LRD 15001 Part 5 Article 551.5. Risks and consequences associated with this change were not adequately reviewed or assessed. Failure to identify the hazard associated with this change directly contributed to this event.

  3. Lethal Consequences in an Infant with Myelomeningocele Following an Inadvertent Treatment

    Directory of Open Access Journals (Sweden)

    Xuemei Wu

    2016-01-01

    Full Text Available Myelomeningocele (MMC is a protrusion of spinal cord contents and meninges through a vertebral defect. Iatrogenic deaths of patients with MMC are rarely encountered in forensic practice. In our case, a 3-month-old female was born with a lumbosacral cyst, the size of which had been increasing gradually over age. There was no neurological, orthopedic, or urologic dysfunction. On the day of her death, she received a repetitive and rapid lumbosacral cyst puncture drainage procedure, performed by an illegal medical practitioner. Postmortem autopsy findings confirmed a diagnosis of MMC and the cause of death to be cerebellar tonsillar herniation. This is a pathetic case of preventable infant death. This report suggests that the possibility of MMC should be considered in infants born with a lumbosacral cyst, and aspiration is inadvisable. Besides, forensic autopsy has a valuable role in determining the exact cause of death, identifying, or excluding iatrogenic factors that may be relevant to death following a medical procedure. A final point is that prevention programs should be developed, especially by the health care sectors to reduce such tragedy.

  4. Inadvertently programmed bits in Samsung 128 Mbit flash devices: a flaky investigation

    Science.gov (United States)

    Swift, G.

    2002-01-01

    JPL's X2000 avionics design pioneers new territory by specifying a non-volatile memory (NVM) board based on flash memories. The Samsung 128Mb device chosen was found to demonstrate bit errors (mostly program disturbs) and block-erase failures that increase with cycling. Low temperature, certain pseudo- random patterns, and, probably, higher bias increase the observable bit errors. An experiment was conducted to determine the wearout dependence of the bit errors to 100k cycles at cold temperature using flight-lot devices (some pre-irradiated). The results show an exponential growth rate, a wide part-to-part variation, and some annealing behavior.

  5. Aligned Incentives: Could the Army’s Award System Inadvertently be Hindering Counterinsurgency Operations

    Science.gov (United States)

    2009-06-01

    OIF) 5 0 1 1 1 7 Perkins, David G. - (OIF) 6 0 1 3 Peters, Steven - (OIF) 5 0 1 7 Petithory, Daniel Henry - (OEF...Shanaberger, Wentz Jerome Henry , III - (OIF) 7 0 1 1 1 4 Sheetz, Brian M. - (OIF) 4 0 1 1 6 Sims, Sean P. - (OIF) 3 0 1 1...0 Dec-07 0 0 0 Coffman James 1 6 0 1 DSC 1 1 Nov-04 0 1 0 Copeland Willie 1 5 0 1 NC 1 0 Apr-04 0 0 0 Corbin Todd 1

  6. Inadvertent BSA-induced elution of IgE in the BSA-RAST

    NARCIS (Netherlands)

    Kleine Budde, I.; de Heer, P. G.; Stapel, S. O.; van der Zee, J. S.; Aalberse, R. C.

    2001-01-01

    Bovine serum albumin (BSA) is widely used to block nonspecific binding in immunochemical assays. Whereas a previous study had indicated that soluble allergen present during the incubation with anti-IgE in the RAST did not affect bound IgE, we reinvestigated this in the current study, using IgE

  7. Amodiaquine-associated adverse effects after inadvertent overdose and after a standard therapeutic dose

    DEFF Research Database (Denmark)

    Adjei, G O; Goka, B Q; Rodrigues, O P

    2009-01-01

    A case of an acute dystonic reaction in a child presumptively treated for malaria with amodiaquine, and a case of persistent asymptomatic bradycardia in another child with mild pulmonary stenosis treated with a standard dose of amodiaquine for parasitologically confirmed uncomplicated malaria, is...

  8. Inadvertent exposure to organochlorine pesticides DDT and derivatives in people from the Canary Islands (Spain)

    International Nuclear Information System (INIS)

    Zumbado, Manuel; Goethals, Muriel; Alvarez-Leon, Eva E.; Luzardo, Octavio P.; Cabrera, Felix; Serra-Majem, Lluis; Dominguez-Boada, Luis

    2005-01-01

    In 1998, one of the largest determinations of organochlorine pesticides in a representative sample of a Spanish population (682 serum samples from the Canary Islands) was made in the context of the 'Canary Islands Nutrition Survey' (ENCA). In the Canary Islands, extensive farming areas have been developed in these last decades, with greenhouses dedicated to intensive cultivation using DDT in huge amounts. In Spain, similarly to other European countries, DDT was banned in the late 1970s. The pesticide residues in human serum are indicative of past and present exposure to them. Our objective is to point out the differences of pesticide contamination between islands; and together with this, if a connection could be established with gender, age, or habitat of subjects. Concentration of selected persistent organochlorine pollutants (p,p'-DDT, o,p'-DDT, p,p'-DDE, o,p'-DDE, p,p'-DDD, and o,p'-DDD) was measured with gas chromatography-electron capture detector. Almost all of the samples (99.3%) presented detectable levels of some DDT-derivatives, being p,p'-DDE the most frequently detected organochlorine. The median concentration of total DDT body burden, expressed in ng/g fat, present in the Canary Islands (370 ng/g fat) was similar to that found in other European countries, although it was noteworthy that a fourth of the population showed a total DDT body burden higher than 715 ng/g. Interestingly, statistical significant differences were found in serum levels of organochlorine pesticides between islands, being these levels higher in people from Tenerife and Gran Canaria (415 and 612 ng/g fat, respectively), the islands that present both highest population and highest surface devoted to intensive agriculture. As expected, serum levels of both total DDT body burden and p,p'-DDE increased with age. Statistically significant differences were also found in relation to gender, women showing higher levels of these organochlorine pesticides than men. One of the most relevant findings of this work is the presence of a very high DDT/DDE ratio in people from the Canary Islands, thus indicating a chronic exposure to DDT that persists nowadays. DDT and its derivatives are considered as xenoestrogens, and they have been linked to breast cancer. Having into account that the Canary Islands present high incidence and mortality for breast cancer, our results point to the possibility that these environmental contaminants may be playing a determining role that must be investigated in detail. The high levels of DDT and its derivatives in serum from people living in this Archipelago should be considered a matter of public health concern

  9. Inadvertent shipment of a radiographic source from Korea to Amersham Corporation, Burlington, Massachusetts

    International Nuclear Information System (INIS)

    1990-05-01

    Amersham Corporation, Burlington, Massachusetts, a licensee of the US Nuclear Regulatory Commission (NRC), authorized to manufacture and distribute iridium-192 and cobalt-60 source assemblies for use in radiography equipment, received a shipment of 14 source changer son March 8, 1990, that were being returned from their product distributor, NDI Corporation in Seoul, Korea. One source changer contained a small sealed source in an unshielded location. Amersham employees retrieved the source, secured it in a hot cell, and notified NRC's Region I. Subsequently, NRC dispatched an Incident Investigation Team to perform a comprehensive review of this incident and determine the potential for exposure to those who handled the source changer and to members of the general public. This report describes the incident and the methodology used in the investigation and presents the Team's findings and conclusions

  10. Clenbuterol - regional food contamination a possible source for inadvertent doping in sports.

    Science.gov (United States)

    Guddat, S; Fußhöller, G; Geyer, H; Thomas, A; Braun, H; Haenelt, N; Schwenke, A; Klose, C; Thevis, M; Schänzer, W

    2012-06-01

    The misuse of the sympathomimetic and anabolic agent clenbuterol has been frequently reported in professional sport and in the livestock industry. In 2010, a team of athletes returned from competition in China and regular doping control samples were taken within the next two days. All urine samples contained low amounts (pg/ml) of clenbuterol, drawing the attention to a well-known problem: the possibility of an unintended clenbuterol intake with food. A warning that Chinese meat is possibly contaminated with prohibited substances according to international anti-doping regulations was also given by Chinese officials just before the Bejing Olympic Games in 2008. To investigate if clenbuterol can be found in human urine, a study was initiated comprising 28 volunteers collecting urine samples after their return from China. For the quantification of clenbuterol at a low pg/ml level, a very sensitive and specific isotope dilution liquid chromatography-tandem mass spectrometry (LC-MS/MS) assay was developed using liquid/liquid re-extraction for clean-up with a limit of detection and quantification of 1 and 3 pg/ml, respectively. The method was validated demonstrating good precision (intra-day: 2.9-5.5 %; inter-day: 5.1-8.8%), accuracy (89.5-102.5%) and mean recovery (81.4%). Clenbuterol was detectable in 22 (79%) of the analyzed samples, indicating a general food contamination problem despite an official clenbuterol prohibition in China for livestock. Copyright © 2012 John Wiley & Sons, Ltd.

  11. Globalisation, Mergers and "Inadvertent Multi-Campus Universities": Reflections from Wales

    Science.gov (United States)

    Zeeman, Nadine; Benneworth, Paul

    2017-01-01

    Multi-site universities face the challenge of integrating campuses that may have different profiles and orientations arising from place-specific attachments. Multi-campus universities created via mergers seeking to ensure long-term financial sustainability, and increasing their attractiveness to students, create a tension in campuses' purposes. We…

  12. Skills Training to Avoid Inadvertent Plagiarism: Results from a Randomised Control Study

    Science.gov (United States)

    Newton, Fiona J.; Wright, Jill D.; Newton, Joshua D.

    2014-01-01

    Plagiarism continues to be a concern within academic institutions. The current study utilised a randomised control trial of 137 new entry tertiary students to assess the efficacy of a scalable short training session on paraphrasing, patch writing and plagiarism. The results indicate that the training significantly enhanced students' overall…

  13. Inadvertent propagation of factor VII deficiency in a canine mucopolysaccharidosis type I research breeding colony.

    Science.gov (United States)

    Carlstrom, Lucas P; Jens, Jackie K; Dobyns, Marley E; Passage, Merry; Dickson, Patricia I; Ellinwood, N Matthew

    2009-08-01

    Issues of cost and genetics can result in inbreeding of canine genetic disease colonies. Beagles often are used to maintain such colonies, providing stock for outcrosses. Factor VII (FVII) deficiency is a hemostatic disorder found at increased frequency in beagles and has been characterized at the DNA level. Deficiency of FVII presents obstacles in colonies founded with beagles. An initial finding of a FVII-deficient pup from a longstanding colony prompted us to evaluate FVII deficiency fully in this colony. Current and archival records and tissues were used to reconstruct the colony pedigree, assess the contribution from beagles, and test samples to document the source and frequency of the mutant FVII allele. As part of this study we developed a PCR-based diagnostic assay that was simpler than what was previously available. Pedigree analysis revealed a founder effect implicating beagles that led to high frequency (55%) of the mutant allele. In addition, affected animals were identified. The complete picture of the clinical effect within the colony remains unclear, but unusual neonatal presentations, including hemoabdomen, have occurred in pups affected with FVII deficiency. Use of a PCR-based diagnostic assay to screen all potential beagle breeding stock will prevent similar occurrences of FVII deficiency in future canine research colonies.

  14. Application note :

    Energy Technology Data Exchange (ETDEWEB)

    Russo, Thomas V.

    2013-08-01

    The development of the XyceTM Parallel Electronic Simulator has focused entirely on the creation of a fast, scalable simulation tool, and has not included any schematic capture or data visualization tools. This application note will describe how to use the open source schematic capture tool gschem and its associated netlist creation tool gnetlist to create basic circuit designs for Xyce, and how to access advanced features of Xyce that are not directly supported by either gschem or gnetlist.

  15. Application of acoustic agglomeration to enhance air filtration efficiency in air-conditioning and mechanical ventilation (ACMV systems.

    Directory of Open Access Journals (Sweden)

    Bing Feng Ng

    Full Text Available The recent episodes of haze in Southeast Asia have caused some of the worst regional atmospheric pollution ever recorded in history. In order to control the levels of airborne fine particulate matters (PM indoors, filtration systems providing high PM capturing efficiency are often sought, which inadvertently also results in high airflow resistance (or pressure drop that increases the energy consumption for air distribution. A pre-conditioning mechanism promoting the formation of particle clusters to enhance PM capturing efficiency without adding flow resistance in the air distribution ductwork could provide an energy-efficient solution. This pre-conditioning mechanism can be fulfilled by acoustic agglomeration, which is a phenomenon that promotes the coagulation of suspended particles by acoustic waves propagating in the fluid medium. This paper discusses the basic mechanisms of acoustic agglomeration along with influencing factors that could affect the agglomeration efficiency. The feasibility to apply acoustic agglomeration to improve filtration in air-conditioning and mechanical ventilation (ACMV systems is investigated experimentally in a small-scale wind tunnel. Experimental results indicate that this novel application of acoustic pre-conditioning improves the PM2.5 filtration efficiency of the test filters by up to 10% without introducing additional pressure drop. The fan energy savings from not having to switch to a high capturing efficiency filter largely outstrip the additional energy consumed by the acoustics system. This, as a whole, demonstrates potential energy savings from the combined acoustic-enhanced filtration system without compromising on PM capturing efficiency.

  16. A four-part working bibliography of neuroethics: Part 4 - Ethical issues in clinical and social applications of neuroscience.

    Science.gov (United States)

    Becker, Kira; Shook, John R; Darragh, Martina; Giordano, James

    2017-05-31

    As a discipline, neuroethics addresses a range of questions and issues generated by basic neuroscientific research (inclusive of studies of putative neurobiological processes involved in moral and ethical cognition and behavior), and its use and meanings in the clinical and social spheres. Here, we present Part 4 of a four-part bibliography of the neuroethics literature focusing on clinical and social applications of neuroscience, to include: the treatment-enhancement discourse; issues arising in neurology, psychiatry, and pain care; neuroethics education and training; neuroethics and the law; neuroethics and policy and political issues; international neuroethics; and discourses addressing "trans-" and "post-" humanity. To complete a systematic survey of the literature, 19 databases and 4 individual open-access journals were employed. Searches were conducted using the indexing language of the U.S. National Library of Medicine (NLM). A Python code was used to eliminate duplications in the final bibliography. When taken with Parts 1-3, this bibliography aims to provide a listing of international peerreviewed papers, books, and book chapters published from 2002 through 2016. While seeking to be as comprehensive as possible, it may be that some works were inadvertently and unintentionally not included. We therefore invite commentary from the field to afford completeness and contribute to this bibliography as a participatory work-in-progress.

  17. Application of acoustic agglomeration to enhance air filtration efficiency in air-conditioning and mechanical ventilation (ACMV) systems.

    Science.gov (United States)

    Ng, Bing Feng; Xiong, Jin Wen; Wan, Man Pun

    2017-01-01

    The recent episodes of haze in Southeast Asia have caused some of the worst regional atmospheric pollution ever recorded in history. In order to control the levels of airborne fine particulate matters (PM) indoors, filtration systems providing high PM capturing efficiency are often sought, which inadvertently also results in high airflow resistance (or pressure drop) that increases the energy consumption for air distribution. A pre-conditioning mechanism promoting the formation of particle clusters to enhance PM capturing efficiency without adding flow resistance in the air distribution ductwork could provide an energy-efficient solution. This pre-conditioning mechanism can be fulfilled by acoustic agglomeration, which is a phenomenon that promotes the coagulation of suspended particles by acoustic waves propagating in the fluid medium. This paper discusses the basic mechanisms of acoustic agglomeration along with influencing factors that could affect the agglomeration efficiency. The feasibility to apply acoustic agglomeration to improve filtration in air-conditioning and mechanical ventilation (ACMV) systems is investigated experimentally in a small-scale wind tunnel. Experimental results indicate that this novel application of acoustic pre-conditioning improves the PM2.5 filtration efficiency of the test filters by up to 10% without introducing additional pressure drop. The fan energy savings from not having to switch to a high capturing efficiency filter largely outstrip the additional energy consumed by the acoustics system. This, as a whole, demonstrates potential energy savings from the combined acoustic-enhanced filtration system without compromising on PM capturing efficiency.

  18. Determination Application

    Directory of Open Access Journals (Sweden)

    Paula Cristiane Pinto Mesquita Pardal

    2015-01-01

    Full Text Available The paper aims at discussing techniques for administering one implementation issue that often arises in the application of particle filters: sample impoverishment. Dealing with such problem can significantly improve the performance of particle filters and can make the difference between success and failure. Sample impoverishment occurs because of the reduction in the number of truly distinct sample values. A simple solution can be to increase the number of particles, which can quickly lead to unreasonable computational demands, which only delays the inevitable sample impoverishment. There are more intelligent ways of dealing with this problem, such as roughening and prior editing, procedures to be discussed herein. The nonlinear particle filter is based on the bootstrap filter for implementing recursive Bayesian filters. The application consists of determining the orbit of an artificial satellite using real data from the GPS receivers. The standard differential equations describing the orbital motion and the GPS measurements equations are adapted for the nonlinear particle filter, so that the bootstrap algorithm is also used for estimating the orbital state. The evaluation will be done through convergence speed and computational implementation complexity, comparing the bootstrap algorithm results obtained for each technique that deals with sample impoverishment.

  19. E AREA LOW LEVEL WASTE FACILITY DOE 435.1 PERFORMANCE ASSESSMENT

    Energy Technology Data Exchange (ETDEWEB)

    Wilhite, E

    2008-03-31

    , situated immediately north of the Mixed Waste Management Facility. The E-Area Low-Level Waste Facility is comprised of 200 acres for waste disposal and a surrounding buffer zone that extends out to the 100-m point of compliance. Disposal units within the footprint of the low-level waste facilities include the Slit Trenches, Engineered Trenches, Component-in-Grout Trenches, the Low-Activity Waste Vault, the Intermediate-Level Vault, and the Naval Reactor Component Disposal Area. Radiological waste disposal operations at the E-Area Low-Level Waste Facility began in 1994. E-Area Low-Level Waste Facility closure will be conducted in three phases: operational closure, interim closure, and final closure. Operational closure will be conducted during the 25-year operation period (30-year period for Slit and Engineered Trenches) as disposal units are filled; interim closure measures will be taken for some units. Interim closure will take place following the end of operations and will consist of an area-wide runoff cover along with additional grading over the trench units. Final closure of all disposal units in the E-Area Low-Level Waste Facility will take place at the end of the 100-year institutional control period and will consist of the installation of an integrated closure system designed to minimize moisture contact with the waste and to serve as a deterrent to intruders. Radiological dose to human receptors is analyzed in this PA in the all-pathways analysis, the inadvertent intruder analysis and the air pathway analysis, and the results are compared to the relevant performance measures. For the all-pathways analysis, the performance measure of relevance is a 25-mrem/yr EDE to representative members of the public, excluding dose from radon and its progeny in air. For the inadvertent intruder, the applicable performance measures are 100-mrem/yr EDE and 500 mrem/yr EDE for chronic and exposure scenarios, respectively. The relevant performance measure for the air pathway is 10

  20. Automating Geospatial Visualizations with Smart Default Renderers for Data Exploration Web Applications

    Science.gov (United States)

    Ekenes, K.

    2017-12-01

    This presentation will outline the process of creating a web application for exploring large amounts of scientific geospatial data using modern automated cartographic techniques. Traditional cartographic methods, including data classification, may inadvertently hide geospatial and statistical patterns in the underlying data. This presentation demonstrates how to use smart web APIs that quickly analyze the data when it loads, and provides suggestions for the most appropriate visualizations based on the statistics of the data. Since there are just a few ways to visualize any given dataset well, it is imperative to provide smart default color schemes tailored to the dataset as opposed to static defaults. Since many users don't go beyond default values, it is imperative that they are provided with smart default visualizations. Multiple functions for automating visualizations are available in the Smart APIs, along with UI elements allowing users to create more than one visualization for a dataset since there isn't a single best way to visualize a given dataset. Since bivariate and multivariate visualizations are particularly difficult to create effectively, this automated approach removes the guesswork out of the process and provides a number of ways to generate multivariate visualizations for the same variables. This allows the user to choose which visualization is most appropriate for their presentation. The methods used in these APIs and the renderers generated by them are not available elsewhere. The presentation will show how statistics can be used as the basis for automating default visualizations of data along continuous ramps, creating more refined visualizations while revealing the spread and outliers of the data. Adding interactive components to instantaneously alter visualizations allows users to unearth spatial patterns previously unknown among one or more variables. These applications may focus on a single dataset that is frequently updated, or configurable

  1. Detector applications

    International Nuclear Information System (INIS)

    Pehl, R.H.

    1977-10-01

    Semiconductor detectors are now applied to a very wide range of problems. The combination of relatively low cost, excellent energy resolution, and simultaneous broad energy-spectrum analysis is uniquely suited to many applications in both basic and applied physics. Alternative techniques, such as magnetic spectrometers for charged-particle spectroscopy, while offering better energy resolution, are bulky, expensive, and usually far more difficult to use. Furthermore, they do not directly provide the broad energy-spectrum measurements easily accomplished using semiconductor detectors. Scintillation detectors, which are approximately equivalent to semiconductor detectors in convenience and cost, exhibit 10 to 100 times worse energy resolution. However, their high efficiency and large potential size recommend their use in some measurements

  2. Modeling Applications.

    Science.gov (United States)

    McMEEKIN, Thomas A; Ross, Thomas

    1996-12-01

    The concept of predictive microbiology has developed rapidly through the initial phases of experimental design and model development and the subsequent phase of model validation. A fully validated model represents a general rule which may be brought to bear on particular cases. For some microorganism/food combinations, sufficient confidence now exists to indicate substantial benefits to the food industry from use of predictive models. Several types of devices are available to monitor and record environmental conditions (particularly temperature). These "environmental histories" can be interpreted, using predictive models, in terms of microbial proliferation. The current challenge is to provide systems for the collection and interpretation of environmental information which combine ease of use, reliability, and security, providing the industrial user with the ability to make informed and precise decisions regarding the quality and safety of foods. Many specific applications for predictive modeling can be developed from a basis of understanding the inherent qualities of a fully validated model. These include increased precision and confidence in predictions based on accumulation of quantitative data, objective and rapid assessment of the effect of environmental conditions on microbial proliferation, and flexibility in monitoring the relative contribution of component parts of processing, distribution, and storage systems for assurance of shelf life and safety.

  3. Performance Assessment for the Idaho National Laboratory Remote-Handled Low-Level Waste Disposal Facility

    Energy Technology Data Exchange (ETDEWEB)

    Annette L. Schafer; A. Jeffrey Sondrup; Arthur S. Rood

    2012-05-01

    This performance assessment for the Remote-Handled Low-Level Radioactive Waste Disposal Facility at the Idaho National Laboratory documents the projected radiological dose impacts associated with the disposal of low-level radioactive waste at the facility. This assessment evaluates compliance with the applicable radiological criteria of the U.S. Department of Energy and the U.S. Environmental Protection Agency for protection of the public and the environment. The calculations involve modeling transport of radionuclides from buried waste to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses are calculated for both offsite receptors and individuals who inadvertently intrude into the waste after site closure. The results of the calculations are used to evaluate the future performance of the low-level radioactive waste disposal facility and to provide input for establishment of waste acceptance criteria. In addition, one-factor-at-a-time, Monte Carlo, and rank correlation analyses are included for sensitivity and uncertainty analysis. The comparison of the performance assessment results to the applicable performance objectives provides reasonable expectation that the performance objectives will be met

  4. Definition of intrusion scenarios and example concentration ranges for the disposal of near-surface waste at the Hanford Site

    International Nuclear Information System (INIS)

    Aaberg, R.L.; Kennedy, W.E. Jr.

    1990-10-01

    The US Department of Energy (DOE) is in the process of conducting performance assessments of its radioactive waste sites and disposal systems to ensure that public health and safety are protected, the environment is preserved, and that no remedial actions after disposal are required. Hanford Site low-level waste performance assessments are technical evaluations of waste sites or disposal systems that provide a basis for making decisions using established criteria. The purpose of this document is to provide a family of scenarios to be considered when calculating radionuclide exposure to individuals who may inadvertently intrude into near-surface waste disposal sites. Specific performance assessments will use modifications of the general scenarios described here to include additional site/system details concerning the engineering design, waste form, inventory, and environmental setting. This document also describes and example application of the Hanford-specific scenarios in the development of example concentration ranges for the disposal of near-surface wastes. The overall goal of the example calculations is to illustrate the application of the scenarios in a performance assessment to assure that people in the future cannot receive a dose greater than an established limit. 24 refs., 2 figs., 5 tabs

  5. Context for performance assessment

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1997-01-01

    In developing its recommendations on performance assessment for disposal of low-level radioactive waste, Scientific committee 87-3 of the National Council on Radiation Protection and Measurements (NCRP) has considered a number of topics that provide a context for the development of suitable approaches to performance assessment. This paper summarizes the Committee' discussions on these topics, including (1) the definition of low-level waste and its sources and properties, as they affect the variety of wastes that must be considered, (2) fundamental objectives and principles of radioactive waste disposal and their application to low-level waste, (3) current performance objectives for low-level waste disposal in the US, with particular emphasis on such unresolved issues of importance to performance assessment as the time frame for compliance, requirements for protection of groundwater and surface water, inclusion of doses from radon, demonstrating compliance with fixed performance objectives using highly uncertain model projections, and application of the principle that releases to the environment should be maintained as low as reasonably achievable (ALARA), (4) the role of active and passive institutional controls over disposal sites, (5) the role of the inadvertent human intruder in low-level waste disposal, (6) model validation and confidence in model outcomes, and (7) the concept of reasonable assurance of compliance

  6. Validation of a Rapid Bacteria Endospore Enumeration System for Planetary Protection Application

    Science.gov (United States)

    Chen, Fei; Kern, Roger; Kazarians, Gayane; Venkateswaran, Kasthuri

    NASA monitors spacecraft surfaces to assure that the presence of bacterial endospores meets strict criteria at launch, to minimize the risk of inadvertent contamination of the surface of Mars. Currently, the only approved method for enumerating the spores is a culture based assay that requires three days to produce results. In order to meet the demanding schedules of spacecraft assembly, a more rapid spore detection assay is being considered as an alternate method to the NASA standard culture-based assay. The Millipore Rapid Microbiology Detection System (RMDS) has been used successfully for rapid bioburden enumeration in the pharmaceutical and food industries. The RMDS is rapid and simple, shows high sensitivity (to 1 colony forming unit [CFU]/sample), and correlates well with traditional culture-based methods. It combines membrane filtration, adenosine triphosphate (ATP) bioluminescence chemistry, and image analysis based on photon detection with a Charge Coupled Device (CCD) camera. In this study, we have optimized the assay conditions and evaluated the use of the RMDS as a rapid spore detection tool for NASA applications. In order to select for spores, the samples were subjected to a heat shock step before proceeding with the RMDS incubation protocol. Seven species of Bacillus (nine strains) that have been repeatedly isolated from clean room environments were assayed. All strains were detected by the RMDS in 5 hours and these assay times were repeatedly demonstrated along with low image background noise. Validation experiments to compare the Rapid Sore Assay (RSA) and NASA standard assay (NSA) were also performed. The evaluation criteria were modeled after the FDA Guideline of Process Validation, and Analytical Test Methods. This body of research demonstrates that the Rapid Spore Assay (RSA) is quick, and of equivalent sensitivity to the NASA standard assay, potentially reducing the assay time for bacterial endospores from over 72 hours to less than 8 hours

  7. A general modeling and visualization tool for comparing different members of a group: application to studying tau-mediated regulation of microtubule dynamics

    Directory of Open Access Journals (Sweden)

    Wilson Leslie

    2008-08-01

    Full Text Available Abstract Background Innumerable biological investigations require comparing collections of molecules, cells or organisms to one another with respect to one or more of their properties. Almost all of these comparisons are performed manually, which can be susceptible to inadvertent bias as well as miss subtle effects. The development and application of computer-assisted analytical and interpretive tools could help address these issues and thereby dramatically improve these investigations. Results We have developed novel computer-assisted analytical and interpretive tools and applied them to recent studies examining the ability of 3-repeat and 4-repeat tau to regulate the dynamic behavior of microtubules in vitro. More specifically, we have developed an automated and objective method to define growth, shortening and attenuation events from real time videos of dynamic microtubules, and demonstrated its validity by comparing it to manually assessed data. Additionally, we have used the same data to develop a general strategy of building different models of interest, computing appropriate dissimilarity functions to compare them, and embedding them on a two-dimensional plot for visualization and easy comparison. Application of these methods to assess microtubule growth rates and growth rate distributions established the validity of the embedding procedure and revealed non-linearity in the relationship between the tau:tubulin molar ratio and growth rate distribution. Conclusion This work addresses the need of the biological community for rigorously quantitative and generally applicable computational tools for comparative studies. The two-dimensional embedding method retains the inherent structure of the data, and yet markedly simplifies comparison between models and parameters of different samples. Most notably, even in cases where numerous parameters exist by which to compare the different samples, our embedding procedure provides a generally applicable

  8. Safety Framework for Nuclear Power Source Applications in Outer Space

    International Nuclear Information System (INIS)

    2009-01-01

    Nuclear power sources (NPS) for use in outer space have been developed and used in space applications where unique mission requirements and constraints on electrical power and thermal management precluded the use of non-nuclear power sources. Such missions have included interplanetary missions to the outer limits of the Solar System, for which solar panels were not suitable as a source of electrical power because of the long duration of these missions at great distances from the Sun. According to current knowledge and capabilities, space NPS are the only viable energy option to power some space missions and significantly enhance others. Several ongoing and foreseeable missions would not be possible without the use of space NPS. Past, present and foreseeable space NPS applications include radioisotope power systems (for example, radioisotope thermoelectric generators and radioisotope heater units) and nuclear reactor systems for power and propulsion. The presence of radioactive materials or nuclear fuels in space NPS and their consequent potential for harm to people and the environment in Earth's biosphere due to an accident require that safety should always be an inherent part of the design and application of space NPS. NPS applications in outer space have unique safety considerations compared with terrestrial applications. Unlike many terrestrial nuclear applications, space applications tend to be used infrequently and their requirements can vary significantly depending upon the specific mission. Mission launch and outer space operational requirements impose size, mass and other space environment limitations not present for many terrestrial nuclear facilities. For some applications, space NPS must operate autonomously at great distances from Earth in harsh environments. Potential accident conditions resulting from launch failures and inadvertent re-entry could expose NPS to extreme physical conditions. These and other unique safety considerations for the use of

  9. Promise Zones for Applicants

    Data.gov (United States)

    Department of Housing and Urban Development — This tool assists applicants to HUD's Promise Zone initiative prepare data to submit with their application by allowing applicants to draw the exact location of the...

  10. Learning Android application testing

    CERN Document Server

    Blundell, Paul

    2015-01-01

    If you are an Android developer looking to test your applications or optimize your application development process, then this book is for you. No previous experience in application testing is required.

  11. Connected vehicle applications : environment.

    Science.gov (United States)

    2016-01-01

    The U.S. Department of Transportation has developed a number of connected vehicle environmental : applications, including the Applications for the Environment Real-Time Information Synthesis (AERIS) : research program applications and road weather ap...

  12. Performance objectives for disposal of low-level radioactive wastes on the Oak Ridge Reservation

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1987-07-01

    This report presents a set of performance objectives for disposal of low-level radioactive wastes in a new facility on the Oak Ridge Reservation. The principal performance objectives include a limit on annual committed effective dose equivalent averaged over a lifetime of 0.25 mSv (25 mrem) for any member of the public beyond the boundary of the disposal facility, and a limit on annual committed effective dose equivalent averaged over a lifetime of 1 mSv (0.1 rem) and a limit on committed effective dose equivalent in any year of 5 mSv (0.5 rem) for any individual who inadvertently intrudes onto the disposal site after loss of active institutional controls. In addition, releases of radioactivity beyond the site boundary shall not result in annual dose equivalents to any number of the public from all sources of exposure that exceed limits established by Federal regulatory authorities and shall be kept as low as reasonably achievable. This report reviews generally applicable radiation protection standards for the public and environmental radiation standards for specific practices that have been developed by national and international authorities and discusses the use of limits on risk rather than dose as performance objectives and consideration of chemical toxicity rather than radiation dose in establishing limits on intakes of uranium. 63 refs., 7 figs., 2 tabs

  13. Performance objectives for disposal of low-level radioactive wastes on the Oak Ridge Reservation

    Energy Technology Data Exchange (ETDEWEB)

    Kocher, D.C.

    1987-07-01

    This report presents a set of performance objectives for disposal of low-level radioactive wastes in a new facility on the Oak Ridge Reservation. The principal performance objectives include a limit on annual committed effective dose equivalent averaged over a lifetime of 0.25 mSv (25 mrem) for any member of the public beyond the boundary of the disposal facility, and a limit on annual committed effective dose equivalent averaged over a lifetime of 1 mSv (0.1 rem) and a limit on committed effective dose equivalent in any year of 5 mSv (0.5 rem) for any individual who inadvertently intrudes onto the disposal site after loss of active institutional controls. In addition, releases of radioactivity beyond the site boundary shall not result in annual dose equivalents to any number of the public from all sources of exposure that exceed limits established by Federal regulatory authorities and shall be kept as low as reasonably achievable. This report reviews generally applicable radiation protection standards for the public and environmental radiation standards for specific practices that have been developed by national and international authorities and discusses the use of limits on risk rather than dose as performance objectives and consideration of chemical toxicity rather than radiation dose in establishing limits on intakes of uranium. 63 refs., 7 figs., 2 tabs.

  14. Development of closure criteria for inactive radioactive waste-disposal sites at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1990-01-01

    The Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) specifies that the U.S. Department of Energy shall comply with the procedural and substantive requirements of CERCLA regarding cleanup of inactive waste-disposal sites. Remedial actions require a level of control for hazardous substances that at least attains legally applicable or relevant and appropriate requirements (ARAR). This requirement may be waived if compliance with ARAR results in greater risk to human health and the environment than alternatives or is technically impractical. It will review potential ARAR for cleanup of inactive radioactive waste-disposal sites and propose a set of closure criteria for such sites at Oak Ridge National Laboratory. Important potential ARAR include federal standards for radiation protection of the public, radioactivity in drinking water, and near-surface land disposal of radioactive wastes. Proposed criteria for cleanup of inactive radioactive waste-disposal sites are: (1) a limit of 0.25 mSv on annual effective dose equivalent for offsite individuals; (2) limits of 1 mSv for continuous exposures and 5 mSv for occasional exposures on annual effective dose equivalent for inadvertent intruders, following loss of institutional controls over disposal sites; and (3) limits on concentrations of radionuclides in potable ground and surface waters in accordance with federal drinking-water standards, to the extent reasonably achievable

  15. Development of closure criteria for inactive radioactive waste disposal sites at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1989-01-01

    The Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA), as amended, specifies that cleanup of inactive waste disposal sites at Department of Energy (DOE) facilities shall at least attain legally applicable or relevant and appropriate requirements (ARARs) for cleanup or control of environmental contamination. This paper discusses potential ARARs for cleanup of inactive radioactive waste disposal sites and proposes a set of closure criteria for such sites at Oak Ridge National Laboratory (ORNL). The most important potential ARARs include Federal standards for radiation protection of the public, radioactivity in drinking water, and near-surface land disposal of radioactive wastes. On the basis of these standards, we propose that cleanup and closure of inactive radioactive waste disposal sites at ORNL shall achieve (1) limits on annual effective dose equivalent for off-site individuals and inadvertent intruders that conform to the DOE's performance objectives for new low-level waste disposal facilities and (2) to the extent reasonably achievable, limits on radionuclide concentrations in ground water and surface waters in accordance with Federal drinking water standards and ground-water protection requirements

  16. The NRC/SNL [Nuclear Regulatory Commission]/[Sandia National Laboratory] performance assessment methodology for low-level radioactive waste facilities

    International Nuclear Information System (INIS)

    Kozak, M.W.

    1991-01-01

    A performance assessment methodology has been developed for use by the US Nuclear Regulatory Commission (NRC) in evaluating license applications for low-level waste disposal facilities. This paper provides a summary of the modeling approaches selected for the methodology, and includes discussions of the philosophy and structure of the methodology. The performance assessment methodology is designed to provide the NRC with a tool for performing confirmatory analyses in support of license reviews related to postclosure performance. The methodology allows analyses of dose to individuals from off-site releases under normal conditions as well as on-site doses to inadvertent intruders. Computer codes have been chosen for source-term analysis, for vadose-zone flow and transport, for saturated-zone flow and transport, for surface-water transport, for transport via the air pathway, and for food chain and dosimetry analyses. More than one computer code is recommended for each module in the methodology, which increases its flexibility, but also increases the amount of user effort required to provide interfaces between the modules. 25 refs., 2 figs

  17. Sight Application Analysis Tool

    Energy Technology Data Exchange (ETDEWEB)

    Bronevetsky, G. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-09-17

    The scale and complexity of scientific applications makes it very difficult to optimize, debug and extend them to support new capabilities. We have developed a tool that supports developers’ efforts to understand the logical flow of their applications and interactions between application components and hardware in a way that scales with application complexity and parallelism.

  18. Microwave power engineering applications

    CERN Document Server

    Okress, Ernest C

    2013-01-01

    Microwave Power Engineering, Volume 2: Applications introduces the electronics technology of microwave power and its applications. This technology emphasizes microwave electronics for direct power utilization and transmission purposes. This volume presents the accomplishments with respect to components, systems, and applications and their prevailing limitations in the light of knowledge of the microwave power technology. The applications discussed include the microwave heating and other processes of materials, which utilize the magnetron predominantly. Other applications include microwave ioni

  19. Web applications quality assessment

    OpenAIRE

    Tamulynaitė, Donaira

    2017-01-01

    Web applications are becoming more and more popular. Web application quality may determine its success, however, there is no one generally accepted standard or quality model for web applications quality evaluation. The aim of this thesis is to provide a quality model for web applications. The constructed quality model is based on ISO Systems and software Quality evaluation standard, as well as on theoretical research results analysed in this topic. 18 web application characteristics have been...

  20. Ruby on Rails Applications

    Science.gov (United States)

    Hochstadt, Jake

    2011-01-01

    Ruby on Rails is an open source web application framework for the Ruby programming language. The first application I built was a web application to manage and authenticate other applications. One of the main requirements for this application was a single sign-on service. This allowed authentication to be built in one location and be implemented in many different applications. For example, users would be able to login using their existing credentials, and be able to access other NASA applications without authenticating again. The second application I worked on was an internal qualification plan app. Previously, the viewing of employee qualifications was managed through Excel spread sheets. I built a database driven application to streamline the process of managing qualifications. Employees would be able to login securely to view, edit and update their personal qualifications.

  1. Engineering Adaptive Applications

    DEFF Research Database (Denmark)

    Dolog, Peter

    . The different requirements might be satisfied by different variants of features maintained and provided by Web applications. An adaptive Web application can be seen as a family of Web applications where application instances are those generated for particular user based on his characteristics relevant...... for a domain.In this book, we propose a new domain engineering framework which extends a development process of Web applications with techniques required when designing such adaptive customizable Web applications. The framework is provided with design abstractions which deal separately with information served...

  2. Application of experimental stressors in laboratory rodents.

    Science.gov (United States)

    Heinrichs, Stephen C; Koob, George F

    2006-02-01

    This unit presents eight separate stressor protocols for laboratory rodents. Stress induction is a critical element in the study of neural and neuroendocrine mechanisms involved in establishing and maintaining a state of stress. The first four procedures, immobilization, footshock, swimming, and noise, involve acute exposure to noxious stimuli. The next three procedures, social isolation, resident/intruder aggression, and maternal deprivation, induce social disruption by withdrawal from a group housing condition, attack within the unfamiliar territory of a dominant male, or segregation of a preweanling pup from its mother, respectively. The final procedure, sleep deprivation, involves passive denial of the opportunity to sleep. Support protocols are provided to address the need for environmental acclimation and calming procedures prior to any stress-related studies (including, for rats, handling of the animals as a calming measure) and to detail a simple method of quantifying the response to a given stressor by direct measurement of levels of the stress hormones adrenocorticotropic hormone (ACTH) and corticosterone.

  3. Approaches for quantifying reactive and low-volatility biogenic organic compound emissions by vegetation enclosure techniques - part B: applications.

    Science.gov (United States)

    Ortega, John; Helmig, Detlev; Daly, Ryan W; Tanner, David M; Guenther, Alex B; Herrick, Jeffrey D

    2008-06-01

    The focus of the studies presented in the preceding companion paper (Part A: Review) and here (Part B: Applications) is on defining representative emission rates from vegetation for determining the roles of biogenic volatile organic compound (BVOC) emissions in atmospheric chemistry and aerosol processes. The review of previously published procedures for identifying and quantifying BVOC emissions has revealed a wide variety of experimental methods used by various researchers. Experimental details become increasingly critical for quantitative emission measurements of low volatility monoterpenes (MT) and sesquiterpenes (SQT). These compounds are prone to be lost inadvertently by uptake to materials in contact with the sample air or by reactions with atmospheric oxidants. These losses become more prominent with higher molecular weight compounds, potentially leading to an underestimation of their emission rates. We present MT and SQT emission rate data from numerous experiments that include 23 deciduous tree species, 14 coniferous tree species, 8 crops, and 2 shrubs. These data indicate total, normalized (30 degrees C) basal emission rates from emissions have exponential dependencies on temperature (i.e. rates are proportional to e(betaT)). The inter-quartile range of beta-values for MT was between 0.12 and 0.17K(-1), which is higher than the value commonly used in models (0.09K(-1)). However many of the MT emissions also exhibited light dependencies, making it difficult to separate light and temperature influences. The primary light-dependent MT was ocimene, whose emissions were up to a factor of 10 higher than light-independent MT emissions. The inner-quartile range of beta-values for SQT was between 0.15 and 0.21K(-1).

  4. Apprehensive about applications

    International Nuclear Information System (INIS)

    Anon.

    1989-01-01

    Current predictions for high Tc applications range from six months to twenty years, depending on the application. Many companies are also understandably reluctant to discuss the progress of proprietary work, which in all probability means that they are close to being able to produce a final product. Many researchers are claiming that they will have device applications ready in one to two years. But these applications will be demonstration prototypes and most will take many more years of engineering before they will become commercially viable applications, at which point they become dependant on economic factors, not performance factors, for their ultimate acceptance or ejection by the commercial marketplace. As in low Tc superconductivity, economics, not performance, may determine which applications are eventually successful. Military applications are discussed as being the first which will utilize high Tc materials, primarily through SQUIDS. Other possible applications, including electronics, wires, and microwave devices, are addressed

  5. AHA: Anagram Hashing Application

    NARCIS (Netherlands)

    Reynaert, Martin; Borin, Lars

    2016-01-01

    We briefly present AHA, the Anagram Hashing Application, a new web application and service that allows researchers to effortlessly analyse the lexical variation present in their Gold Standard data and to publish the results.

  6. Connected vehicle applications : safety.

    Science.gov (United States)

    2016-01-01

    Connected vehicle safety applications are designed to increase situational awareness : and reduce or eliminate crashes through vehicle-to-infrastructure, vehicle-to-vehicle, : and vehicle-to-pedestrian data transmissions. Applications support advisor...

  7. Applicant Satisfaction Survey

    Data.gov (United States)

    Office of Personnel Management — The Chief Human Capital Officers developed 3 surveys that asks applicants to assess their satisfaction with the application process on a 1-10 point scale, with 10...

  8. Biomedical Applications of Graphene

    Science.gov (United States)

    Shen, He; Zhang, Liming; Liu, Min; Zhang, Zhijun

    2012-01-01

    Graphene exhibits unique 2-D structure and exceptional phyiscal and chemical properties that lead to many potential applications. Among various applications, biomedical applications of graphene have attracted ever-increasing interests over the last three years. In this review, we present an overview of current advances in applications of graphene in biomedicine with focus on drug delivery, cancer therapy and biological imaging, together with a brief discussion on the challenges and perspectives for future research in this field. PMID:22448195

  9. Nanoplasmonics advanced device applications

    CERN Document Server

    Chon, James W M

    2013-01-01

    Focusing on control and manipulation of plasmons at nanometer dimensions, nanoplasmonics combines the strength of electronics and photonics, and is predicted to replace existing integrated circuits and photonic devices. It is one of the fastest growing fields of science, with applications in telecommunication, consumer electronics, data storage, medical diagnostics, and energy.Nanoplasmonics: Advanced Device Applications provides a scientific and technological background of a particular nanoplasmonic application and outlines the progress and challenges of the application. It reviews the latest

  10. SIMS applications workshop. Proceedings

    International Nuclear Information System (INIS)

    1997-04-01

    The first ANSTO/AINSE SIMS Workshop drew together a mixture of Surface Analysis experts and Surface Analysis users with the concept that SIMS analysis has to be enfolded within the spectrum of surface analysis techniques and that the user should select the technique most applicable to the problem. With this concept in mind the program was structured as sessions on SIMS Facilities; Applications to Mineral Surfaces; Applications to Biological Systems, Applications to Surfaces as Semi- conductors, Catalysts and Surface Coatings; and Applications to Ceramics

  11. SNS application programming plan

    International Nuclear Information System (INIS)

    Chu, C.M.; Galambos, J.D.; Wei, J.; Allen, C.; McGehee, P.M.; Malitsky, N.

    2001-01-01

    The plan for Spallation Neutron Source accelerator physics application programs is presented. These high level applications involve processing and managing information from the diagnostic instruments, the machine control system, models and static databases and will be used to investigate and control beam behavior. Primary components include an SNS global database and Java-based XAL Application Toolkit. A key element in the SNS application programs is time synchronization of data used in these applications, due to the short pulse (1 ms), pulsed (60 Hz) nature of the device. The data synchronization progress is also presented.

  12. Nest defence against conspecific intruders in the common pochard Aythya ferina: natural observations and an experimental test

    Czech Academy of Sciences Publication Activity Database

    Honza, Marcel; Piálková, Radka; Albrecht, Tomáš; Neužilová, Š.

    2009-01-01

    Roč. 44, č. 2 (2009), s. 151-158 ISSN 0001-6454 R&D Projects: GA AV ČR IAA6093403; GA AV ČR KJB600930611 Institutional research plan: CEZ:AV0Z60930519 Keywords : waterfowl * brood parasitism * intraspecific parasitism * breeding strategy * egg rejection Subject RIV: EG - Zoology Impact factor: 1.018, year: 2009 http://www.bioone.org/doi/pdf/10.3161/000164509X482713

  13. A brief review of intruder rotational bands and magnetic rotation in the A = 110 mass region

    Science.gov (United States)

    Banerjee, P.

    2018-05-01

    Nuclei in the A ∼ 110 mass region exhibit interesting structural features. One of these relates to the process by which specific configurations, built on the excitation of one or more protons across the Z = 50 shell-gap, manifest as collective rotational bands at intermediate spins and gradually lose their collectivity with increase in spin and terminate in a non-collective state at the maximum spin which the configuration can support. These bands are called terminating bands that co-exist with spherical states. Some of these bands are said to terminate smoothly underlining the continuous character of the process by which the band evolves from significant collectivity at low spin to a pure particle-hole non-collective state at the highest spin. The neutron-deficient A ∼ 110 mass region provides the best examples of smoothly terminating bands. The present experimental and theoretical status of such bands in several nuclei with 48 ≤ Z ≤ 52 spanning the 106 ≤ A ≤ 119 mass region have been reviewed in this article. The other noteworthy feature of nuclei in the A ∼ 110 mass region is the observation of regular rotation-like sequences of strongly enhanced magnetic dipole transitions in near-spherical nuclei. These bands, unlike the well-studied rotational sequences in deformed nuclei, arise from a spontaneous symmetry breaking by the anisotropic currents of a few high-j excited particles and holes. This mode of excitation is called magnetic rotation and was first reported in the Pb region. Evidence in favor of the existence of such structures, also called shears bands, are reported in the literature for a large number of Cd, In, Sn and Sb isotope with A ∼ 110. The present article provides a general overview of these reported structures across this mass region. The review also discusses antimagnetic rotation bands and a few cases of octupole correlations in the A = 110 mass region.

  14. Testing the adjustable threshold model for intruder recognition on Myrmica ants in the context of a social parasite.

    Science.gov (United States)

    Fürst, Matthias A; Durey, Maëlle; Nash, David R

    2012-02-07

    Social insect colonies are like fortresses, well protected and rich in shared stored resources. This makes them ideal targets for exploitation by predators, parasites and competitors. Colonies of Myrmica rubra ants are sometimes exploited by the parasitic butterfly Maculinea alcon. Maculinea alcon gains access to the ants' nests by mimicking their cuticular hydrocarbon recognition cues, which allows the parasites to blend in with their host ants. Myrmica rubra may be particularly susceptible to exploitation in this fashion as it has large, polydomous colonies with many queens and a very viscous population structure. We studied the mutual aggressive behaviour of My. rubra colonies based on predictions for recognition effectiveness. Three hypotheses were tested: first, that aggression increases with distance (geographical, genetic and chemical); second, that the more queens present in a colony and therefore the less-related workers within a colony, the less aggressively they will behave; and that colonies facing parasitism will be more aggressive than colonies experiencing less parasite pressure. Our results confirm all these predictions, supporting flexible aggression behaviour in Myrmica ants depending on context.

  15. Seal dynamics on the Swedish west coast: Scenarios of competition as Baltic grey seal intrude on harbour seal territory

    Science.gov (United States)

    Svensson, Carl Johan

    2012-07-01

    The Kattegat-Skagerrak region on the Swedish west coast is home to an abundant harbour seal population (Phoca vitulina) and a small scattered grey seal population (Halichoerus grypus). In addition, grey seal from the growing population in the Baltic Sea frequently migrate into the Kattegat-Skagerrak. Harbour seals on the west coast of Sweden show relatively high population growth (approximately 9%) compared to the Baltic grey seal in ice-free habitats (approximately 6%), which, in theory, makes harbour seal the stronger competitor of the two in this region. However, incidents of disease in harbour seals that lower population growth are becoming more frequent. These epidemics are primarily caused by the Phocine Distemper Virus (PDV), and may reduce population size with up to 70%. This study models the average development under potential scenarios of competing harbour- and Baltic grey seal populations using Leslie matrices and the Lotka-Volterra model of inter-specific competition. The model is parameterised with previously published data, and resource overlap is incorporated through density dependent pup survival. Using numerical methods short- and long-term abundances are simulated under weak, moderate and strong competition and for different frequencies of PDV epidemics. Results show that the harbour seals are resilient to competition while exerting a negative effect on grey seal abundance under moderate to strong competition. Hence Baltic grey seal benefit from weaker levels of competition. Under moderate and strong competition grey seal abundance is a direct function of the PDV frequency as this reduces the competitive strength of harbour seals. Theoretically this means that higher frequencies of PDV or other pathogens epidemics could facilitate an expansion of Baltic grey seal into Kattegat-Skagerrak. Independent of interaction strength and frequency of epidemics the projected changes to abundances are slow (50-100 years), and even in exceedingly stable populations very long time-series of population size estimates are necessary to determine interaction strength. From a management perspective, a more permanent grey seal population in Kattegat-Skagerrak is likely to increase the predation pressure on overfished regional cod populations, and also lead to higher prevalence of the cod parasite Pseudoterranova decipiens, which uses grey seal as end host. From a population ecology perspective, abundant Baltic grey seal in this region would facilitate the mixing of grey seals from the North Atlantic and the Baltic Sea, with unknown implications for the genetically divergent Baltic population.

  16. Trapping the intruder - immune receptor domain fusions provide new molecular leads for improving disease resistance in plants.

    Science.gov (United States)

    Krattinger, Simon G; Keller, Beat

    2016-02-19

    A new study uses genomics to show that fusions of plant immune receptors and other protein domains occur in significant numbers. This finding will generate many new research hypotheses and provide new opportunities for breeding resistant plant varieties.

  17. Differentiation of pre-existing trapped methane from thermogenic methane in an igneous-intruded coal by hydrous pyrolysis

    Science.gov (United States)

    Dias, Robert F.; Lewan, Michael D.; Birdwell, Justin E.; Kotarba, Maciej J.

    2014-01-01

    So as to better understand how the gas generation potential of coal changes with increasing rank, same-seam samples of bituminous coal from the Illinois Basin that were naturally matured to varying degrees by the intrusion of an igneous dike were subjected to hydrous pyrolysis (HP) conditions of 360 °C for 72 h. The accumulated methane in the reactor headspace was analyzed for δ13C and δ2H, and mol percent composition. Maximum methane production (9.7 mg/g TOC) occurred in the most immature samples (0.5 %Ro), waning to minimal methane values at 2.44 %Ro (0.67 mg/g TOC), and rebounding to 3.6 mg/g TOC methane in the most mature sample (6.76 %Ro). Methane from coal with the highest initial thermal maturity (6.76 %Ro) shows no isotopic dependence on the reactor water and has a microbial δ13C value of −61‰. However, methane from coal of minimal initial thermal maturity (0.5 %Ro) shows hydrogen isotopic dependence on the reaction water and has a δ13C value of −37‰. The gas released from coals under hydrous pyrolysis conditions represents a quantifiable mixture of ancient (270 Ma) methane (likely microbial) that was generated in situ and trapped within the rock during the rapid heating by the dike, and modern (laboratory) thermogenic methane that was generated from the indigenous organic matter due to thermal maturation induced by hydrous pyrolysis conditions. These findings provide an analytical framework for better assessment of natural gas sources and for differentiating generated gas from pre-existing trapped gas in coals of various ranks.

  18. Intruder states in sd-shell nuclei: from 1p-1t to np-nt in Si isotopes

    International Nuclear Information System (INIS)

    Goasduff, A.

    2012-01-01

    New large-scale shell-model calculations with full 1ℎω valence space for the sd-nuclei has been used for the first time to predict lifetimes of positive and negative parity states in neutron rich Si isotopes. The predicted lifetimes (1 - 100 ps) fall in the range of the differential Doppler shift method. Using the demonstrator of the European next generation γ-ray array, AGATA, in coincidence with the large acceptance PRISMA magnetic spectrometer from LNL (Legnaro) and the differential plunger of the University of Cologne, lifetimes of excited states in 32;33 Si and 35;36 S nuclei were measured. In a second step, the nℎω structure in the stable 28 Si nucleus was also studied. 28 Si is an important nucleus in order to understand the competition between mean-field and cluster structures. It displays a wealth of structures in terms of deformation and clustering. Light heavy-ion resonant radiative capture 12 C+ 16 O has been performed at energies below the Coulomb barrier. The measure γ-spectra indicate for the first time at these energies that the strongest part of the resonance decay proceeds though intermediate states around 10 MeV. Comparisons with previous radiative capture studies above the Coulomb barrier have been performed and the results have been interpreted in terms of a favoured feeding of T=1 states in the 28 Si self-conjugate nucleus. (author)

  19. Bending transition in the penetration of a flexible intruder in a two-dimensional dense granular medium

    Science.gov (United States)

    Algarra, Nicolas; Karagiannopoulos, Panagiotis G.; Lazarus, Arnaud; Vandembroucq, Damien; Kolb, Evelyne

    2018-02-01

    We study the quasistatic penetration of a flexible beam into a two-dimensional dense granular medium lying on a horizontal plate. Rather than a buckling-like behavior we observe a transition between a regime of crack-like penetration in which the fiber only shows small fluctuations around a stable straight geometry and a bending regime in which the fiber fully bends and advances through series of loading and unloading steps. We show that the shape reconfiguration of the fiber is controlled by a single nondimensional parameter L /Lc , which is the ratio of the length of the flexible beam L to Lc, a bending elastogranular length scale that depends on the rigidity of the fiber and on the departure from the jamming packing fraction of the granular medium. We show, moreover, that the dynamics of the bending transition in the course of the penetration experiment is gradual and is accompanied by a symmetry breaking of the granular packing fraction in the vicinity of the fiber. Together with the progressive bending of the fiber, a cavity grows downstream of the fiber and the accumulation of grains upstream of the fiber leads to the development of a jammed cluster of grains. We discuss our experimental results in the framework of a simple model of bending-induced compaction and we show that the rate of the bending transition only depends on the control parameter L /Lc .

  20. Testing the adjustable threshold model for intruder recognition on Myrmica ants in the context of a social parasite

    DEFF Research Database (Denmark)

    Fürst, Matthias Alois; Durey, Maëlle; Nash, David Richard

    2012-01-01

    gains access to the ants' nests by mimicking their cuticular hydrocarbon recognition cues, which allows the parasites to blend in with their host ants. Myrmica rubra may be particularly susceptible to exploitation in this fashion as it has large, polydomous colonies with many queens and a very viscous...... population structure. We studied the mutual aggressive behaviour of My. rubra colonies based on predictions for recognition effectiveness. Three hypotheses were tested: first, that aggression increases with distance (geographical, genetic and chemical); second, that the more queens present in a colony...... and therefore the less-related workers within a colony, the less aggressively they will behave; and that colonies facing parasitism will be more aggressive than colonies experiencing less parasite pressure. Our results confirm all these predictions, supporting flexible aggression behaviour in Myrmica ants...

  1. Bending transition in the penetration of a flexible intruder in a two-dimensional dense granular medium.

    Science.gov (United States)

    Algarra, Nicolas; Karagiannopoulos, Panagiotis G; Lazarus, Arnaud; Vandembroucq, Damien; Kolb, Evelyne

    2018-02-01

    We study the quasistatic penetration of a flexible beam into a two-dimensional dense granular medium lying on a horizontal plate. Rather than a buckling-like behavior we observe a transition between a regime of crack-like penetration in which the fiber only shows small fluctuations around a stable straight geometry and a bending regime in which the fiber fully bends and advances through series of loading and unloading steps. We show that the shape reconfiguration of the fiber is controlled by a single nondimensional parameter L/L_{c}, which is the ratio of the length of the flexible beam L to L_{c}, a bending elastogranular length scale that depends on the rigidity of the fiber and on the departure from the jamming packing fraction of the granular medium. We show, moreover, that the dynamics of the bending transition in the course of the penetration experiment is gradual and is accompanied by a symmetry breaking of the granular packing fraction in the vicinity of the fiber. Together with the progressive bending of the fiber, a cavity grows downstream of the fiber and the accumulation of grains upstream of the fiber leads to the development of a jammed cluster of grains. We discuss our experimental results in the framework of a simple model of bending-induced compaction and we show that the rate of the bending transition only depends on the control parameter L/L_{c}.

  2. Bird Killer, Industrial Intruder or Clean Energy? Perceiving Risks to Ecosystem Services Due to an Offshore Wind Farm

    KAUST Repository

    Klain, Sarah C.

    2017-07-19

    Proposals to develop renewable energy technologies may threaten local values, which can generate opposition. Efforts to explain this opposition have focused on perceived negative aesthetic and environmental impact. Less attention has been paid to a fuller suite of the perceived risks and benefits associated with new energy technologies. This paper thus investigates impacts of an offshore wind farm pertaining to individual perceptions and judgments, and why risks to some ecosystem services might be cause for greater public concern than others. We find that this difference can be attributed to the affective and intuitive ways in which people perceive risk. Our mixed-methods design used interviews (n=27) that involved risk-benefit weighting tasks and an animated visualization to help people imagine an offshore wind farm in a familiar place. We found that affectively-loaded impacts (harm to charismatic wildlife and visual intrusion) were assigned greater weight than more easily quantifiable impacts (displacement of fishing, impact to tourism, cost of compliance with regulations). Interviewees identified increased regional energy self-sufficiency as the most valued potential benefit of an offshore wind farm. These results have implications for ecosystem service assessments generally and, more specifically, for our understanding of ‘affective’ dimensions of development proposals.

  3. Criteria for Social Applications

    DEFF Research Database (Denmark)

    Atzenbeck, Claus; Tzagarakis, Manolis

    2007-01-01

    relationships between individuals thus creating social networks. Although Web 2.0 applications are a popular and characteristic class of such applications they are not the only representatives that permit such functionality. Applications in the Personal Information Management domain exhibit similar......Social networks are becoming increasingly important for a wide number of applications. This is in particular true in the context of the Web 2.0 movement where a number of Web-based applications emerged - termed social networking applications or services - that allow the articulation of social...... characteristics but have never been mentioned in the context of social networking. The increasing number and diversity of such applications makes their study, analysis and evaluation from a systems point of view critical and important as their study may help identify relationships that are useful when attempting...

  4. Application of artificial intelligence to improve plant availability

    International Nuclear Information System (INIS)

    Frank, M.V.; Epstein, S.A.

    1986-01-01

    Using artificial intelligence software techniques, Management Analysis Company (MAC) has developed two complementary software packages that together provide a workstation environment for maintenance and operations personnel to dramatically reduce inadvertent reactor trips. They are called the Reactor Trip Simulation Environment (RTSE) and the Key Component Generation Environment (KCGE). They are not proposed or being designed. They are in use today. The plants component and process interdependencies are modeled within RTSE - using modeling practices and notations familiar to engineers which accelerated the acceptance of the software. KCGE provides the groups of key components that would cause a reactor trip

  5. Electronic Submissions of Pesticide Applications

    Science.gov (United States)

    Applications for pesticide registration can be submitted electronically, including forms, studies, and draft product labeling. Applicants need not submit multiple electronic copies of any pieces of their applications.

  6. Technical applications of aerogels

    International Nuclear Information System (INIS)

    Hrubesh, L.W.

    1997-01-01

    Aerogel materials posses such a wide variety of exceptional properties that a striking number of applications have developed for them. Many of the commercial applications of aerogels such as catalysts, thermal insulation, windows, and particle detectors are still under development and new application as have been publicized since the ISA4 Conference in 1994: e.g.; supercapacitors, insulation for heat storage in automobiles, electrodes for capacitive deionization, etc. More applications are evolving as the scientific and engineering community becomes familiar with the unusual and exceptional physical properties of aerogels, there are also scientific and technical application, as well. This paper discusses a variety of applications under development at Lawrence Livermore National Laboratory for which several types of aerogels are formed in custom sizes and shapes. Particular discussions will focus on the uses of aerogels for physics experiments which rely on the exceptional, sometimes unique, properties of aerogels

  7. Applications of Photocatalytic Disinfection

    Directory of Open Access Journals (Sweden)

    Joanne Gamage

    2010-01-01

    Full Text Available Due to the superior ability of photocatalysis to inactivate a wide range of harmful microorganisms, it is being examined as a viable alternative to traditional disinfection methods such as chlorination, which can produce harmful byproducts. Photocatalysis is a versatile and effective process that can be adapted for use in many applications for disinfection in both air and water matrices. Additionally, photocatalytic surfaces are being developed and tested for use in the context of “self-disinfecting” materials. Studies on the photocatalytic technique for disinfection demonstrate this process to have potential for widespread applications in indoor air and environmental health, biological, and medical applications, laboratory and hospital applications, pharmaceutical and food industry, plant protection applications, wastewater and effluents treatment, and drinking water disinfection. Studies on photocatalytic disinfection using a variety of techniques and test organisms are reviewed, with an emphasis on the end-use application of developed technologies and methods.

  8. Industrial Application of Accelerators

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    At CERN, we are very familiar with large, high energy particle accelerators. However, in the world outside CERN, there are more than 35000 accelerators which are used for applications ranging from treating cancer, through making better electronics to removing harmful micro-organisms from food and water. These are responsible for around $0.5T of commerce each year. Almost all are less than 20 MeV and most use accelerator types that are somewhat different from what is at CERN. These lectures will describe some of the most common applications, some of the newer applications in development and the accelerator technology used for them. It will also show examples of where technology developed for particle physics is now being studied for these applications. Rob Edgecock is a Professor of Accelerator Science, with a particular interest in the medical applications of accelerators. He works jointly for the STFC Rutherford Appleton Laboratory and the International Institute for Accelerator Applications at the Univer...

  9. Industrial Application of Accelerators

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    At CERN, we are very familiar with large, high energy particle accelerators. However, in the world outside CERN, there are more than 35000 accelerators which are used for applications ranging from treating cancer, through making better electronics to removing harmful micro-organisms from food and water. These are responsible for around $0.5T of commerce each year. Almost all are less than 20 MeV and most use accelerator types that are somewhat different from what is at CERN. These lectures will describe some of the most common applications, some of the newer applications in development and the accelerator technology used for them. It will also show examples of where technology developed for particle physics is now being studied for these applications. Rob Edgecock is a Professor of Accelerator Science, with a particular interest in the medical applications of accelerators. He works jointly for the STFC Rutherford Appleton Laboratory and the International Institute for Accelerator Applications at the Uni...

  10. Technical applications of aerogels

    Energy Technology Data Exchange (ETDEWEB)

    Hrubesh, L.W.

    1997-08-18

    Aerogel materials posses such a wide variety of exceptional properties that a striking number of applications have developed for them. Many of the commercial applications of aerogels such as catalysts, thermal insulation, windows, and particle detectors are still under development and new application as have been publicized since the ISA4 Conference in 1994: e.g.; supercapacitors, insulation for heat storage in automobiles, electrodes for capacitive deionization, etc. More applications are evolving as the scientific and engineering community becomes familiar with the unusual and exceptional physical properties of aerogels, there are also scientific and technical application, as well. This paper discusses a variety of applications under development at Lawrence Livermore National Laboratory for which several types of aerogels are formed in custom sizes and shapes. Particular discussions will focus on the uses of aerogels for physics experiments which rely on the exceptional, sometimes unique, properties of aerogels.

  11. Inadvertent insertion of a nasogastric tube into both main bronchi of an awake patient: a case report

    Science.gov (United States)

    2009-01-01

    The use of nasogastric tube is desirable for the short-term administration of calories when oral feeding is not possible. Although the insertion of nasogastric tubes has been described as being easy this is not without risks. An unusual case of malpositioning of a fine bore nasogastric tube into both main bronchi in a patient that was awake is reported. Respiratory complications of misplaced nasogastric tubes and the importance of a check chest x-ray following tube placement are discussed. PMID:19829883

  12. Side effects and quality of life after inadvertent radiation overdosage in brachytherapy of head-and-neck cancer

    International Nuclear Information System (INIS)

    Evensen, Jan F.; Bjordal, Kristin; Knutsen, Bjoern H.; Olsen, Dag R.; Stoere, Geir; Tausjoe, Johan E.

    2002-01-01

    Purpose: By comparing our old (DP5, in use from 1978 to 1994) and new (Plato, Nucletron) dose planning system, we found that the old system underestimated doses by 20-25%. To study the possible consequences for the patients treated between 1978 and 1994, all who were still alive were invited to undergo an examination with respect to side effects and quality of life (QOL). Methods and Materials: The degree of overdosage was calculated by comparing the isodose distribution generated on the two dose planning systems. Eighty-four patients were then invited to undergo an examination with respect to side effects and QOL. The side effects were scored according to the LENT SOMA system and QOL according to European Organization for Research and Treatment of Cancer (EORTC) Quality of Life Questionnaire-Core 30 (QLQ-C30), and EORTC Quality of Life Questionnaire-Head and Neck 35 (QLQ-H and N35). Results: The mean overdosage of brachytherapy was 19.3%. No association was found between overdosage and side effects or QOL. For implants in the lateral border of the tongue, we found a statistically significant correlation between osteoradionecrosis and the following parameters: linear activity, total activity, dose rate, and extrapolated response dose. By multivariate analysis, only total implanted activity and the use of lead protection during brachytherapy were found to be of prognostic significance with respect to development of osteoradionecrosis. Conclusion: The incidence of side effects after brachytherapy at the Norwegian Radium Hospital seems to have been somewhat higher in the period under investigation than at other institutions. There may be several explanations, including the use of external beam radiotherapy before brachytherapy and departure from the Paris system among others. However, the side effects were not associated with the overdosage that was the basis for the study. As opposed to the general consensus of opinion, long-term QOL was found to be worse after brachytherapy than after external beam radiotherapy. This calls for increased awareness and a systematic prospective registration of the long-term side effects of brachytherapy

  13. Prolonged mydriasis after inadvertent topical administration of the calcium channel antagonist amlodipine: implications for glaucoma drug development.

    Science.gov (United States)

    Roos, Jonathan C P; Haridas, Anjana S

    2015-03-01

    Calcium channel inhibitors are being investigated as potential therapeutic adjuncts to reduce painful ciliary muscle spasm and control intraocular pressure in glaucoma. Relatively little is known about the effect of topical administration of calcium channel blockers in humans. (1) To describe prolonged fixed pupil dilation resulting from exposure to topical amlodipine (2) to review the evidence that links calcium channel blockers with mydriasis and (3) to discuss the implications for glaucoma pharmacotherapy. Single interventional case report, literature review (including human and animal studies) and analysis of reported adverse drug reactions (ADRs) records in the USA and UK. A 35-year-old female doctor presented to eye casualty with blurred vision and bilateral, fixed, dilated pupils. A history of exposure to liquid amlodipine while preparing a paediatric chemotherapy regimen for a neuroblastoma patient was elicited. The patient was reassured and observed. Pupil function returned to normal within 48 h. A multi-national review of adverse drug reactions reports was conducted, as well as an extensive literature search for case reports and experimental studies. To the authors' knowledge this is the first report of amlodipine causing mydriasis and we discuss the potential molecular mechanism. This case is the first to suggest that calcium channel blockers can cause prolonged mydriasis. These agents have been investigated as potential adjuncts in glaucoma therapy. As accidental topical exposure to amlodipine can cause prolonged pupil dilation, it could precipitate angle closure in predisposed patients.

  14. Inadvertent venous air embolism during cesarean section: Collapsible intravenous fluid bags without self-sealing outlet have risks. Case report.

    Science.gov (United States)

    Bakan, Mefkur; Topuz, Ufuk; Esen, Asim; Basaranoglu, Gokcen; Ozturk, Erdogan

    2013-01-01

    The anesthesiologist must be aware of the causes, diagnosis and treatment of venous air embolism and adopt the practice patterns to prevent its occurrence. Although venous air embolism is a known complication of cesarean section, we describe an unusual inattention that causes iatrogenic near fatal venous air embolism during a cesarean section under spinal anesthesia. One of the reasons for using self-collapsible intravenous (IV) infusion bags instead of conventional glass or plastic bottles is to take precaution against air embolism. We also demonstrated the risk of air embolism for two kinds of plastic collapsible intravenous fluid bags: polyvinyl chloride (PVC) and polypropylene-based. Fluid bags without self-sealing outlets pose a risk for air embolism if the closed system is broken down, while the flexibility of the bag limits the amount of air entry. PVC-based bags, which have more flexibility, have significantly less risk of air entry when IV administration set is disconnected from the outlet. Using a pressure bag for rapid infusion can be dangerous without checking and emptying all air from the IV bag. Copyright © 2013 Sociedade Brasileira de Anestesiologia. Published by Elsevier Editora Ltda. All rights reserved.

  15. Fear and overprotection in Australian residential aged-care facilities: The inadvertent impact of regulation on quality continence care.

    Science.gov (United States)

    Ostaszkiewicz, Joan; O'Connell, Beverly; Dunning, Trisha

    2016-06-01

    Most residents in residential aged-care facilities are incontinent. This study explored how continence care was provided in residential aged-care facilities, and describes a subset of data about staffs' beliefs and experiences of the quality framework and the funding model on residents' continence care. Using grounded theory methodology, 18 residential aged-care staff members were interviewed and 88 hours of field observations conducted in two facilities. Data were analysed using a combination of inductive and deductive analytic procedures. Staffs' beliefs and experiences about the requirements of the quality framework and the funding model fostered a climate of fear and risk adversity that had multiple unintended effects on residents' continence care, incentivising dependence on continence management, and equating effective continence care with effective pad use. There is a need to rethink the quality of continence care and its measurement in Australian residential aged-care facilities. © 2015 AJA Inc.

  16. Probabilistic consequence study of residual radiological effects from a hypothetical ten-ton inadvertent nuclear yield. Weapons Safety Program

    International Nuclear Information System (INIS)

    Harvey, T.; Peters, L.; Serduke, F.; Edwards, L.

    1994-01-01

    In this paper we study the potential radiological consequences of a strategic bomber accident, in which one of the assumed on-board nuclear weapons explodes with an arbitrarily chosen 10-ton nuclear yield. The frequency of such an occurrence is infinitesimal. The safety design features in today s nuclear weapons' systems essentially forbid its occurrence. We have a chosen a military base which has the feature of being a representative combination of urban and rural populations. The assumed ''crash site'' is near the northwest comer of the military base, close to civilian housing located just across the street from the base. A worst case wind would be from the ESE (east south east). This would cause fission debris to be dispersed toward the largest population centers and, thus, would lead to the largest Pu ''collective'' doses (i.e., a dose integrated over time and summed over individuals). Also, if an ESE wind were blowing at accident time, some people in nearby housing could receive lethal gamma-ray doses from fallout before evacuation could occur. It is assumed only one weapon undergoes nuclear yield; the other on-board weapons would HE detonate and the Pu would be aerosolized and lofted. We assume an activity-size distribution and lofting similar to those used to predict fallout measured at NTS. The main thrust of our study is to provide estimates of probabilistic radiological risks to the population local to a strategic bomber crash site. The studied radiological consequences are: cloud-passage doses from Pu inhalation; doses from groundshine due to gamma-producing radionuclides; and areal contamination from Pu and the long-lived fission products Cs-137 and Sr-90

  17. Inadvertent gene silencing of argininosuccinate synthase (bcass1) in Botrytis cinerea by the pLOB1 vector system

    NARCIS (Netherlands)

    Patel, R.M.; Kan, van J.A.L.; Bailey, A.M.; Foster, G.D.

    2010-01-01

    For several years, researchers working on the plant pathogen Botrytis cinerea and a number of other related fungi have routinely used the pLOB1 vector system, based on hygromycin resistance, under the control of the Aspergillus nidulans oliC promoter and what was reported to be the ß-tubulin (tubA)

  18. (Inadvertently) Instructing Missionaries in (Public University) World Religions Courses: Examining a Pedagogical Dilemma, Its Dimensions, and a Course Section Solution

    Science.gov (United States)

    Karapanagiotis, Nicole

    2017-01-01

    In this article, I explore an ethical and pedagogical dilemma that I encounter each semester in my world religions courses: namely, that a great number of students enroll in the courses as part of their missionary training programs, and come to class understanding successful learning to mean gathering enough information about the world's religious…

  19. Assignment Tracking Android Application

    OpenAIRE

    Akanni, Feranmi Timothy

    2016-01-01

    One of the common ways of checking that knowledge is impacted into students at every level of education is by giving various tasks to students and part of the responsibilities of the teacher is to give assignments to students and check the solution provided by the students. Increase in technology development involves a number of mobile applications that are being developed and released on a daily basis, out of which Android operating application is one of the dominant mobile application. T...

  20. REST based mobile applications

    Science.gov (United States)

    Rambow, Mark; Preuss, Thomas; Berdux, Jörg; Conrad, Marc

    2008-02-01

    Simplicity is the major advantage of REST based webservices. Whereas SOAP is widespread in complex, security sensitive business-to-business aplications, REST is widely used for mashups and end-user centric applicatons. In that context we give an overview of REST and compare it to SOAP. Furthermore we apply the GeoDrawing application as an example for REST based mobile applications and emphasize on pros and cons for the use of REST in mobile application scenarios.

  1. Microcomputer interfacing and applications

    CERN Document Server

    Mustafa, M A

    1990-01-01

    This is the applications guide to interfacing microcomputers. It offers practical non-mathematical solutions to interfacing problems in many applications including data acquisition and control. Emphasis is given to the definition of the objectives of the interface, then comparing possible solutions and producing the best interface for every situation. Dr Mustafa A Mustafa is a senior designer of control equipment and has written many technical articles and papers on the subject of computers and their application to control engineering.

  2. Applications of combinatorial optimization

    CERN Document Server

    Paschos, Vangelis Th

    2013-01-01

    Combinatorial optimization is a multidisciplinary scientific area, lying in the interface of three major scientific domains: mathematics, theoretical computer science and management. The three volumes of the Combinatorial Optimization series aims to cover a wide range of topics in this area. These topics also deal with fundamental notions and approaches as with several classical applications of combinatorial optimization. "Applications of Combinatorial Optimization" is presenting a certain number among the most common and well-known applications of Combinatorial Optimization.

  3. Refrigeration systems and applications

    CERN Document Server

    Dincer, Ibrahim

    2010-01-01

    Refrigeration Systems and Applications, 2nd edition offers a comprehensive treatise that addresses real-life technical and operational problems, enabling the reader to gain an understanding of the fundamental principles and the practical applications of refrigeration technology. New and unique analysis techniques (including exergy as a potential tool), models, correlations, procedures and applications are covered, and recent developments in the field are included - many of which are taken from the author's own research activities in this area. The book also includes so

  4. Application Layer Multicast

    Science.gov (United States)

    Allani, Mouna; Garbinato, Benoît; Pedone, Fernando

    An increasing number of Peer-to-Peer (P2P) Internet applications rely today on data dissemination as their cornerstone, e.g., audio or video streaming, multi-party games. These applications typically depend on some support for multicast communication, where peers interested in a given data stream can join a corresponding multicast group. As a consequence, the efficiency, scalability, and reliability guarantees of these applications are tightly coupled with that of the underlying multicast mechanism.

  5. Microprocessors principles and applications

    CERN Document Server

    Debenham, Michael J

    1979-01-01

    Microprocessors: Principles and Applications deals with the principles and applications of microprocessors and covers topics ranging from computer architecture and programmed machines to microprocessor programming, support systems and software, and system design. A number of microprocessor applications are considered, including data processing, process control, and telephone switching. This book is comprised of 10 chapters and begins with a historical overview of computers and computing, followed by a discussion on computer architecture and programmed machines, paying particular attention to t

  6. Support vector machines applications

    CERN Document Server

    Guo, Guodong

    2014-01-01

    Support vector machines (SVM) have both a solid mathematical background and good performance in practical applications. This book focuses on the recent advances and applications of the SVM in different areas, such as image processing, medical practice, computer vision, pattern recognition, machine learning, applied statistics, business intelligence, and artificial intelligence. The aim of this book is to create a comprehensive source on support vector machine applications, especially some recent advances.

  7. Legacy application integration architecture

    OpenAIRE

    Grom, Jure

    2009-01-01

    Information needs of modern businesses are constantly growing. Own development of a business information system is time consuming and expensive but, as an alternative, using smaller partial solutions doesn’t cover all user needs. Decision to buy a universal solution, often results in only part of it being actively and efficiently used. By application integration we manage to achieve efficient use of applications, since by linking them, we enable sharing of business logics among applications a...

  8. AFRL POSS Applications Research

    National Research Council Canada - National Science Library

    Phillips, Shawn

    2002-01-01

    .... New applications are being investigated (e.g. batteries, capacitors, radomes). The technology transfer to Hybrid Plastics is a success story with significant volume increase and price reduction...

  9. Electrical applications 2

    CERN Document Server

    Tyler, David W

    1998-01-01

    Electrical Applications 2 covers the BTEC NII level objectives in Electrical Applications U86/330. To understand the applications, a knowledge of the underlying principles is needed and these are covered briefly in the text. Key topics discussed are: the transmission and distribution of electrical energy; safety and regulations; tariffs and power factor correction; materials and their applications in the electrical industry; transformers; DC machines; illumination; and fuse protection. Included in each chapter are worked examples which should be carefully worked through before progressing to t

  10. Nanotechnology in Aerospace Applications

    National Research Council Canada - National Science Library

    Meyyappan, M

    2007-01-01

    The aerospace applications for nanotechnology include high strength, low weight composites, improved electronics and displays with low power consumption, variety of physical sensors, multifunctional...

  11. Mongoose for application development

    CERN Document Server

    Holmes, Simon

    2013-01-01

    This book is a mini tutorial full of code examples and strategies to give you plenty of options when building your own applications with MongoDB.This book is ideal for people who want to develop applications on the Node.js stack quickly and efficiently. Prior knowledge of the stack is not essential as the book briefly covers the installation of the core components and builds all aspects of the example application. The focus of the book is on what Mongoose adds to you applications, so experienced Node.js developers will also benefit.

  12. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  13. Application Technology Research Unit

    Data.gov (United States)

    Federal Laboratory Consortium — To conduct fundamental and developmental research on new and improved application technologies to protect floricultural, nursery, landscape, turf, horticultural, and...

  14. Hardening Azure applications

    CERN Document Server

    Gaurav, Suraj

    2015-01-01

    Learn what it takes to build large scale, mission critical applications -hardened applications- on the Azure cloud platform. This 208 page book covers the techniques and engineering principles that every architect and developer needs to know to harden their Azure/.NET applications to ensure maximum reliability and high availability when deployed at scale. While the techniques are implemented in .NET and optimized for Azure, the principles here will also be valuable for users of other cloud-based development platforms. Applications come in a variety of forms, from simple apps that can be bui

  15. Nanomaterials in biomedical applications

    DEFF Research Database (Denmark)

    Christiansen, Jesper de Claville; Potarniche, Catalina-Gabriela; Vuluga, Z.

    2011-01-01

    Advances in nano materials have lead to applications in many areas from automotive to electronics and medicine. Nano composites are a popular group of nano materials. Nanocomposites in medical applications provide novel solutions to common problems. Materials for implants, biosensors and drug del...

  16. Nanomaterials in biomedical applications

    DEFF Research Database (Denmark)

    Christiansen, Jesper de Claville; Potarniche, Catalina-Gabriela; Vuluga, Z.

    2011-01-01

    Advances in nano materials have lead to applications in many areas from automotive to electronics and medicine. Nano composites are a popular group of nano materials. Nanocomposites in medical applications provide novel solutions to common problems. Materials for implants, biosensors and drug...

  17. Neoglycoconjugates: preparation and applications

    National Research Council Canada - National Science Library

    Lee, Reiko T; Lee, Y. C

    1994-01-01

    ... and ApplicationsNeoglycoconjugates: Preparation and Applications Edited by Y. C. LEE Biology The Johns Baltimore, D e p a r t m e n t Hopkins University M a r y l a n d REIKO T. LEE Biology D e...

  18. Application Security Automation

    Science.gov (United States)

    Malaika, Majid A.

    2011-01-01

    With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…

  19. Advertising on mobile applications

    OpenAIRE

    Sobolevsky, Alexandr

    2015-01-01

    The article analyzes the new method of mobile advertising. Advertising in mobile applications - a subspecies of mobile marketing, where advertising is distributed using mobile phones and smartphones. Ad placement is going on inside of applications and games for smartphones. It has a high potential due to the large number of mobile phone users (over 6.5 billion in 2013).

  20. Computer algebra applications

    International Nuclear Information System (INIS)

    Calmet, J.

    1982-01-01

    A survey of applications based either on fundamental algorithms in computer algebra or on the use of a computer algebra system is presented. Recent work in biology, chemistry, physics, mathematics and computer science is discussed. In particular, applications in high energy physics (quantum electrodynamics), celestial mechanics and general relativity are reviewed. (Auth.)

  1. Progressive Web applications

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Progressive Web Applications are native-like applications running inside of a browser context. In my presentation I would like describe their characteristics, benchmarks and building process using a quick and simple case study example with focus on Service Workers api.

  2. Connected vehicle application : safety.

    Science.gov (United States)

    2015-01-01

    Connected vehicle safety applications are designed to increase situational awareness : and reduce or eliminate crashes through vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and vehicle-to-pedestrian (V2P) data transmissions. Applications...

  3. Dilemmas in SEA application

    DEFF Research Database (Denmark)

    Lyhne, Ivar

    Dilemmas in SEA Application: The DK Energy SectorIvar Lyhne - lyhne@plan.aau.dk. Based on three years of collaborative research, this paper outlines dilemmas in the application of SEA in the strategic development of the Danish energy sector. The dilemmas are based on concrete examples from practice...

  4. Applications of Evolutionary Computation

    NARCIS (Netherlands)

    Mora, Antonio M.; Squillero, Giovanni; Di Chio, C; Agapitos, Alexandros; Cagnoni, Stefano; Cotta, Carlos; Fernández De Vega, F; Di Caro, G A; Drechsler, R.; Ekárt, A; Esparcia-Alcázar, Anna I.; Farooq, M; Langdon, W B; Merelo-Guervós, J.J.; Preuss, M; Richter, O.-M.H.; Silva, Sara; Sim$\\$~oes, A; Squillero, Giovanni; Tarantino, Ernesto; Tettamanzi, Andrea G B; Togelius, J; Urquhart, Neil; Uyar, A S; Yannakakis, G N; Smith, Stephen L; Caserta, Marco; Ramirez, Adriana; Voß, Stefan; Squillero, Giovanni; Burelli, Paolo; Mora, Antonio M.; Squillero, Giovanni; Jan, Mathieu; Matthias, M; Di Chio, C; Agapitos, Alexandros; Cagnoni, Stefano; Cotta, Carlos; Fernández De Vega, F; Di Caro, G A; Drechsler, R.; Ekárt, A; Esparcia-Alcázar, Anna I.; Farooq, M; Langdon, W B; Merelo-Guervós, J.J.; Preuss, M; Richter, O.-M.H.; Silva, Sara; Sim$\\$~oes, A; Squillero, Giovanni; Tarantino, Ernesto; Tettamanzi, Andrea G B; Togelius, J; Urquhart, Neil; Uyar, A S; Yannakakis, G N; Caserta, Marco; Ramirez, Adriana; Voß, Stefan; Squillero, Giovanni; Burelli, Paolo; Esparcia-Alcazar, Anna I; Silva, Sara; Agapitos, Alexandros; Cotta, Carlos; De Falco, Ivanoe; Cioppa, Antonio Della; Diwold, Konrad; Ekart, Aniko; Tarantino, Ernesto; Vega, Francisco Fernandez De; Burelli, Paolo; Sim, Kevin; Cagnoni, Stefano; Simoes, Anabela; Merelo, J.J.; Urquhart, Neil; Haasdijk, Evert; Zhang, Mengjie; Squillero, Giovanni; Eiben, A E; Tettamanzi, Andrea G B; Glette, Kyrre; Rohlfshagen, Philipp; Schaefer, Robert; Caserta, Marco; Ramirez, Adriana; Voß, Stefan

    2015-01-01

    The application of genetic and evolutionary computation to problems in medicine has increased rapidly over the past five years, but there are specific issues and challenges that distinguish it from other real-world applications. Obtaining reliable and coherent patient data, establishing the clinical

  5. The Measurement of Capacity, Utilization, and Economic Performance: An Application to North Pacific Groundfish Fisheries

    OpenAIRE

    Felthoven, Ronald G.

    2001-01-01

    The North Pacific groundfish fisheries (NPGF) of the Bering Sea and Aleutian Islands (BSAI) are among the largest and most valuable fisheries in the world. However, relatively little is known about the economic performance of the industry and concerns loom over the presence of excess fishing capacity. Aside from dissipating rents and shortening fishing seasons, excess capacity can pressure for managers to inadvertently keep the total allowable catch above sustainable levels in order to preser...

  6. Geometry and its applications

    CERN Document Server

    Meyer, Walter J

    2006-01-01

    Meyer''s Geometry and Its Applications, Second Edition, combines traditional geometry with current ideas to present a modern approach that is grounded in real-world applications. It balances the deductive approach with discovery learning, and introduces axiomatic, Euclidean geometry, non-Euclidean geometry, and transformational geometry. The text integrates applications and examples throughout and includes historical notes in many chapters. The Second Edition of Geometry and Its Applications is a significant text for any college or university that focuses on geometry''s usefulness in other disciplines. It is especially appropriate for engineering and science majors, as well as future mathematics teachers.* Realistic applications integrated throughout the text, including (but not limited to): - Symmetries of artistic patterns- Physics- Robotics- Computer vision- Computer graphics- Stability of architectural structures- Molecular biology- Medicine- Pattern recognition* Historical notes included in many chapters...

  7. Lasers Fundamentals and Applications

    CERN Document Server

    Thyagarajan, K

    2010-01-01

    Lasers: Fundamentals and Applications, serves as a vital textbook to accompany undergraduate and graduate courses on lasers and their applications. Ever since their invention in 1960, lasers have assumed tremendous importance in the fields of science, engineering and technology because of their diverse uses in basic research and countless technological applications. This book provides a coherent presentation of the basic physics behind the way lasers work, and presents some of their most important applications in vivid detail. After reading this book, students will understand how to apply the concepts found within to practical, tangible situations. This textbook includes worked-out examples and exercises to enhance understanding, and the preface shows lecturers how to most beneficially match the textbook with their course curricula. The book includes several recent Nobel Lectures, which will further expose students to the emerging applications and excitement of working with lasers. Students who study lasers, ...

  8. Applications of ionizing radiations

    International Nuclear Information System (INIS)

    2014-01-01

    Developments in standard applications and brand new nuclear technologies, with high impact on the future of the agriculture, medicine, industry and the environmental preservation. The Radiation Technology Center (CTR) mission is to apply the radiation and radioisotope technologies in Industry, Health, Agriculture, and Environmental Protection, expanding the scientific knowledge, improving human power resources, transferring technology, generating products and offering services for the Brazilian society. The CTR main R and D activities are in consonance with the IPEN Director Plan (2011-2013) and the Applications of Ionizing Radiation Program, with four subprograms: Irradiation of Food and Agricultural Products; Radiation and Radioisotopes Applications in Industry and Environment; Radioactive Sources and Radiation Applications in Human Health; and Radioactive Facilities and Equipment for the Applications of Nuclear Techniques

  9. GPU computing and applications

    CERN Document Server

    See, Simon

    2015-01-01

    This book presents a collection of state of the art research on GPU Computing and Application. The major part of this book is selected from the work presented at the 2013 Symposium on GPU Computing and Applications held in Nanyang Technological University, Singapore (Oct 9, 2013). Three major domains of GPU application are covered in the book including (1) Engineering design and simulation; (2) Biomedical Sciences; and (3) Interactive & Digital Media. The book also addresses the fundamental issues in GPU computing with a focus on big data processing. Researchers and developers in GPU Computing and Applications will benefit from this book. Training professionals and educators can also benefit from this book to learn the possible application of GPU technology in various areas.

  10. Mobile Learning Applications Audit

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2010-01-01

    Full Text Available While mobile learning (m-learning applications have proven their value in educational activities, there is a need to measure their reliability, accessibility and further more their trustworthiness. Mobile devices are far more vulnerable then classic computers and present inconvenient interfaces due to their size, hardware limitations and their mobile connectivity. Mobile learning applications should be audited to determine if they should be trusted or not, while multimedia contents like automatic speech recognition (ASR can improve their accessibility. This article will start with a brief introduction on m-learning applications, then it will present the audit process for m-learning applications, it will iterate their specific security threats, it will define the ASR process, and it will elaborate how ASR can enhance accessibility of these types of applications.

  11. Database Application Schema Forensics

    Directory of Open Access Journals (Sweden)

    Hector Quintus Beyers

    2014-12-01

    Full Text Available The application schema layer of a Database Management System (DBMS can be modified to deliver results that may warrant a forensic investigation. Table structures can be corrupted by changing the metadata of a database or operators of the database can be altered to deliver incorrect results when used in queries. This paper will discuss categories of possibilities that exist to alter the application schema with some practical examples. Two forensic environments are introduced where a forensic investigation can take place in. Arguments are provided why these environments are important. Methods are presented how these environments can be achieved for the application schema layer of a DBMS. A process is proposed on how forensic evidence should be extracted from the application schema layer of a DBMS. The application schema forensic evidence identification process can be applied to a wide range of forensic settings.

  12. Operator agency in process intervention: tampering versus application of tacit knowledge

    Science.gov (United States)

    Van Gestel, P.; Pons, D. J.; Pulakanam, V.

    2015-09-01

    Statistical process control (SPC) theory takes a negative view of adjustment of process settings, which is termed tampering. In contrast, quality and lean programmes actively encourage operators to acts of intervention and personal agency in the improvement of production outcomes. This creates a conflict that requires operator judgement: How does one differentiate between unnecessary tampering and needful intervention? Also, difficult is that operators apply tacit knowledge to such judgements. There is a need to determine where in a given production process the operators are applying tacit knowledge, and whether this is hindering or aiding quality outcomes. The work involved the conjoint application of systems engineering, statistics, and knowledge management principles, in the context of a case study. Systems engineering was used to create a functional model of a real plant. Actual plant data were analysed with the statistical methods of ANOVA, feature selection, and link analysis. This identified the variables to which the output quality was most sensitive. These key variables were mapped back to the functional model. Fieldwork was then directed to those areas to prospect for operator judgement activities. A natural conversational approach was used to determine where and how operators were applying judgement. This contrasts to the interrogative approach of conventional knowledge management. Data are presented for a case study of a meat rendering plant. The results identify specific areas where operators' tacit knowledge and mental model contribute to quality outcomes and untangles the motivations behind their agency. Also evident is how novice and expert operators apply their knowledge differently. Novices were focussed on meeting throughput objectives, and their incomplete understanding of the plant characteristics led them to inadvertently sacrifice quality in the pursuit of productivity in certain situations. Operators' responses to the plant are affected by

  13. Fabrication and characterization of two-layered nanofibrous membrane for guided bone and tissue regeneration application.

    Science.gov (United States)

    Masoudi Rad, Maryam; Nouri Khorasani, Saied; Ghasemi-Mobarakeh, Laleh; Prabhakaran, Molamma P; Foroughi, Mohammad Reza; Kharaziha, Mahshid; Saadatkish, Niloufar; Ramakrishna, Seeram

    2017-11-01

    Membranes used in dentistry act as a barrier to prevent invasion of intruder cells to defected area and obtains spaces that are to be subsequently filled with new bone and provide required bone volume for implant therapy when there is insufficient volume of healthy bone at implant site. In this study a two-layered bioactive membrane were fabricated by electrospinning whereas one layer provides guided bone regeneration (GBR) and fabricated using poly glycerol sebacate (PGS)/polycaprolactone (PCL) and Beta tri-calcium phosphate (β-TCP) (5, 10 and 15%) and another one containing PCL/PGS and chitosan acts as guided tissue regeneration (GTR). The morphology, chemical, physical and mechanical characterizations of the membranes were studied using scanning electron microscopy (SEM), Fourier transform infrared spectroscopy (FTIR), X-ray diffraction (XRD), tensile testing, then biodegradability and bioactivity properties were evaluated. In vitro cell culture study was also carried out to investigate proliferation and mineralization of cells on different membranes. Transmission electron microscope (TEM) and SEM results indicated agglomeration of β-TCP nanoparticles in the structure of nanofibers containing 15% β-TCP. Moreover by addition of β-TCP from 5% to 15%, contact angle decreased due to hydrophilicity of nanoparticles and bioactivity was found to increase. Mechanical properties of the membrane increased by incorporation of 5% and 10% of β-TCP in the structure of nanofibers, while addition of 15% of β-TCP was found to deteriorate mechanical properties of nanofibers. Although the presence of 5% and 10% of nanoparticles in the nanofibers increased proliferation of cells on GBR layer, cell proliferation was observed to decrease by addition of 15% β-TCP in the structure of nanofibers which is likely due to agglomeration of nanoparticles in the nanofiber structure. Our overall results revealed PCL/PGS containing 10% β-TCP could be selected as the optimum GBR membrane

  14. Background information for the development of a low-level waste performance assessment methodology

    International Nuclear Information System (INIS)

    Shipers, L.R.

    1989-12-01

    This document identifies and describes the potential postclosure pathways of radionuclide release, migration, and exposure from low-level radioactive waste disposal facilities. Each pathway identified is composed of a combination of migration pathways (air, surface water, ground water, food chain) and exposure pathways (direct gamma, inhalation, ingestion, surface contact). The pathway identification is based on a review and evaluation of existing information, and not all pathways presented in the document would necessarily be of importance at a given low-level waste disposal site. This document presents pathways associated with undisturbed (ground water, gas generation), naturally disturbed (erosion, bathtubbing, earth creep, frost heave, plant and animal intruder), and inadvertent intruder (construction, agriculture) scenarios of a low-level waste disposal facility. 20 refs., 1 fig

  15. Building Social Web Applications

    CERN Document Server

    Bell, Gavin

    2009-01-01

    Building a web application that attracts and retains regular visitors is tricky enough, but creating a social application that encourages visitors to interact with one another requires careful planning. This book provides practical solutions to the tough questions you'll face when building an effective community site -- one that makes visitors feel like they've found a new home on the Web. If your company is ready to take part in the social web, this book will help you get started. Whether you're creating a new site from scratch or reworking an existing site, Building Social Web Applications

  16. Wind energy applications guide

    Energy Technology Data Exchange (ETDEWEB)

    anon.

    2001-01-01

    The brochure is an introduction to various wind power applications for locations with underdeveloped transmission systems, from remote water pumping to village electrification. It includes an introductory section on wind energy, including wind power basics and system components and then provides examples of applications, including water pumping, stand-alone systems for home and business, systems for community centers, schools, and health clinics, and examples in the industrial area. There is also a page of contacts, plus two specific example applications for a wind-diesel system for a remote station in Antarctica and one on wind-diesel village electrification in Russia.

  17. Handbook of satellite applications

    CERN Document Server

    Madry, Scott; Camacho-Lara, Sergio

    2017-01-01

    The first edition of this ground breaking reference work was the most comprehensive reference source available about the key aspects of the satellite applications field. This updated second edition covers the technology, the markets, applications and regulations related to satellite telecommunications, broadcasting and networking—including civilian and military systems; precise satellite navigation and timing networks (i.e. GPS and others); remote sensing and meteorological satellite systems. Created under the auspices of the International Space University based in France, this brand new edition is now expanded to cover new innovative small satellite constellations, new commercial launching systems, innovation in military application satellites and their acquisition, updated appendices, a useful glossary and more.

  18. Developing Large Web Applications

    CERN Document Server

    Loudon, Kyle

    2010-01-01

    How do you create a mission-critical site that provides exceptional performance while remaining flexible, adaptable, and reliable 24/7? Written by the manager of a UI group at Yahoo!, Developing Large Web Applications offers practical steps for building rock-solid applications that remain effective even as you add features, functions, and users. You'll learn how to develop large web applications with the extreme precision required for other types of software. Avoid common coding and maintenance headaches as small websites add more pages, more code, and more programmersGet comprehensive soluti

  19. Professional Tizen application development

    CERN Document Server

    Jaygarl, HoJun; Kim, YoonSoo; Choi, Eunyoung; Bradwick, Kevin; Lansdell

    2014-01-01

    Create powerful, marketable applications with Tizen for the smartphone and beyond  Tizen is the only platform designed for multiple device categories that is HTML5-centric and entirely open source. Written by experts in the field, this comprehensive guide includes chapters on both web and native application development, covering subjects such as location and social features, advanced UIs, animations, sensors and multimedia. This book is a comprehensive resource for learning how to develop Tizen web and native applications that are polished, bug-free and ready to sell on a range of smart dev

  20. Biomaterials and therapeutic applications

    Science.gov (United States)

    Ferraro, Angelo

    2016-03-01

    A number of organic and inorganic, synthetic or natural derived materials have been classified as not harmful for the human body and are appropriate for medical applications. These materials are usually named biomaterials since they are suitable for introduction into living human tissues of prosthesis, as well as for drug delivery, diagnosis, therapies, tissue regeneration and many other clinical applications. Recently, nanomaterials and bioabsorbable polymers have greatly enlarged the fields of application of biomaterials attracting much more the attention of the biomedical community. In this review paper I am going to discuss the most recent advances in the use of magnetic nanoparticles and biodegradable materials as new biomedical tools.

  1. Superconductivity and its application

    International Nuclear Information System (INIS)

    Spadoni, M.

    1988-01-01

    This paper, after a short introduction to superconductivity and to multifilamentary superconducting composites is aiming to review the state of the art and the future perspective of some of the applications of the superconducting materials. The main interest is focussed to large scale applications like, for istance, magnets for accelerators or fusion reactors, superconducting system for NMR thomography, etc. A short paragraph is dedicated to applications for high sensitivity instrumentation. The paper is then concluded by some considerations about the potentialities of the newly discovered high critical temperature materials

  2. Android Applications Security

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2011-01-01

    Full Text Available The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the architecture of a mobile security system for Android devices.

  3. The application of RFQs

    International Nuclear Information System (INIS)

    Schempp, A.

    1992-01-01

    The Radio Frequency Quadrupole Accelerator (RFQ) has found wide application, not only as the preinjector linac for new high energy light ion accelerators but also in a variety of other projects. Progress in development has made ion linacs practical for medical and industrial applications including radiation therapy, isotope and neutron production, material modification and ion beam diagnostic. The paper discusses various projects together with applications in science where RFQs serve as stand-alone tools, for example for the calibration of detectors, as decelerators or as small compact beam sources for atomic physics and materials research. (Author) 7 figs., 40 refs

  4. Professional mobile application development

    CERN Document Server

    McWherter, Jeff

    2012-01-01

    Create applications for all major smartphone platforms Creating applications for the myriad versions and varieties of mobile phone platforms on the market can be daunting to even the most seasoned developer. This authoritative guide is written in such as way that it takes your existing skills and experience and uses that background as a solid foundation for developing applications that cross over between platforms, thereby freeing you from having to learn a new platform from scratch each time. Concise explanations walk you through the tools and patterns for developing for all the mobile platfo

  5. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  6. Biomedical applications of polymers

    CERN Document Server

    Gebelein, C G

    1991-01-01

    The biomedical applications of polymers span an extremely wide spectrum of uses, including artificial organs, skin and soft tissue replacements, orthopaedic applications, dental applications, and controlled release of medications. No single, short review can possibly cover all these items in detail, and dozens of books andhundreds of reviews exist on biomedical polymers. Only a few relatively recent examples will be cited here;additional reviews are listed under most of the major topics in this book. We will consider each of the majorclassifications of biomedical polymers to some extent, inclu

  7. Excimer laser applications

    International Nuclear Information System (INIS)

    Fantoni, R.

    1988-01-01

    This lecture deals with laser induced material photoprocessing, especially concerning those processes which are initiated by u.v. lasers (mostly excimer laser). Advantages of using the u.v. radiation emitted by excimer lasers, both in photophysical and photochemical processes of different materials, are discussed in detail. Applications concerning microelectronics are stressed with respect to other applications in different fields (organic chemistry, medicine). As further applications of excimer lasers, main spectroscopic techniques for ''on line'' diagnostics which employ excimer pumped dye lasers, emitting tunable radiation in the visible and near u.v. are reviewed

  8. Express web application development

    CERN Document Server

    Yaapa, Hage

    2013-01-01

    Express Web Application Development is a practical introduction to learning about Express. Each chapter introduces you to a different area of Express, using screenshots and examples to get you up and running as quickly as possible.If you are looking to use Express to build your next web application, ""Express Web Application Development"" will help you get started and take you right through to Express' advanced features. You will need to have an intermediate knowledge of JavaScript to get the most out of this book.

  9. Lift application development cookbook

    CERN Document Server

    Garcia, Gilberto T

    2013-01-01

    Lift Application Development Cookbook contains practical recipes on everything you will need to create secure web applications using this amazing framework.The book first teaches you basic topics such as starting a new application and gradually moves on to teach you advanced topics to achieve a certain task. Then, it explains every step in detail so that you can build your knowledge about how things work.This book is for developers who have at least some basic knowledge about Scala and who are looking for a functional, secure, and modern web framework. Prior experience with HTML and JavaScript

  10. User Types in Online Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2011-08-01

    Full Text Available Online applications are presented in the context of information society. Online applications characteristics are analyzed. Quality characteristics are presented in relation to online applications users. Types of users for AVIO application are presented. Use cases for AVIO application are identified. The limitations of AVIO application are defined. Types of users in online applications are identified. The threedimensional matrix of access to the online application resources is built. The user type-oriented database is structured. Access management of the fields related to the database tables is analyzed. The classification of online applications users is done.

  11. Development of polymer concrete radioactive waste management containers

    Energy Technology Data Exchange (ETDEWEB)

    Chung, H.; Lee, M. S.; Ahn, D. H.; Won, H. J.; Kang, H. S.; Lee, H. S.; Lim, S.P.; Kim, Y. E.; Lee, B. O.; Lee, K. P.; Min, B. Y.; Lee, J.K.; Jang, W. S.; Sim, W. B.; Lee, J. C.; Park, M. J.; Choi, Y. J.; Shin, H. E.; Park, H. Y.; Kim, C. Y

    1999-11-01

    A high-integrity radioactive waste container has been developed to immobilize the spent resin wastes from nuclear power plants, protect possible future, inadvertent intruders from damaging radiation. The polymer concrete container is designed to ensure safe and reliable disposal of the radioactive waste for a minimum period of 300 years. A built-in vent system for each container will permit the release of gas. An experimental evaluation of the mechanical, chemical, and biological tests of the container was carried out. The tests showed that the polymer concrete container is adequate for safe disposal of the radioactive wastes. (author)

  12. Thermodynamics foundations and applications

    CERN Document Server

    Gyftopoulos, Elias P

    2005-01-01

    Designed by two MIT professors, this authoritative text discusses basic concepts and applications in detail, emphasizing generality, definitions, and logical consistency. More than 300 solved problems cover realistic energy systems and processes.

  13. Capital Projects Application (CPA)

    Data.gov (United States)

    General Services Administration — Capital Projects application (CPA) provides users with the ability to maintain project related financial data for Budget Activity (BA) 51, 55, 64, 01, 02, 03, 04....

  14. Food Applications and Regulation

    Science.gov (United States)

    Gálvez, Antonio; Abriouel, Hikmate; Omar, Nabil Ben; Lucas, Rosario

    This chapter deals with food applications of bacteriocins. Regulatory issues on the different possibilities for incorporating bacteriocins as bioprotectants are discussed. Specific applications of bacteriocins or bacteriocin-producing strains are described for main food categories, including milk and dairy products, raw meats, ready-to-eat meat and poultry products, fermented meats, fish and fish products or fermented fish. The last section of the chapter deals with applications in foods and beverages derived from plant materials, such as raw vegetable foods, fruits and fruit juices, cooked food products, fermented vegetable foods and ­fermented beverages. Results obtained for application of bacteriocins in combination with other hurdles are also discussed for each specific case, with a special emphasis on novel food packaging and food-processing technologies, such as irradiation, pulsed electric field treatments or high hydrostatic pressure treatment.

  15. Nuclear Technology applications

    International Nuclear Information System (INIS)

    Cibils Machado, W. E- mail: wrcibils@adinet.com.uy

    2002-01-01

    The present work tries on the applications of the nuclear technology in the life daily, such as agriculture and feeding, human health, industry, non destructive essays, isotopic hydrology, and the nuclear power stations for electricity production and radioisotopes production

  16. Industrial applications of radiochemistry

    International Nuclear Information System (INIS)

    Kobayashi, Masatoshi

    1979-01-01

    The industrial application of radiochemistry is summarized, mainly in regard to the application of tracers and activation analysis. Changes in the utilization of radioisotopes in Japan are quoted according to the statistics of the Japan Information Center of Science and Technology (JICST) and reports of the Japan Isotope Conference since 1956. In order to clarify the application of industrial tracers, especially physical tracers in the manufacturing process, serial changes in the concentration of radioactive tracers retained in a bath and in Hg in a soda factory were determined. A radiorelease method used for analysis of exhaust fumes from automobiles is introduced and purification of Al by means by activation analysis, which is used to analyze extremely small amounts of impurities in highly pure materials, is described. Also, application of 252 Cf for activation analysis and its legal intricacies are discussed. (Namekawa, K.)

  17. Condom application - slideshow

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/presentations/100109.htm Condom application - series—Procedure, part 1 To use the ... Go to slide 3 out of 3 Overview Condoms are made of latex rubber, polyurethane or lamb ...

  18. Special functions & their applications

    CERN Document Server

    Lebedev, N N

    1972-01-01

    Famous Russian work discusses the application of cylinder functions and spherical harmonics; gamma function; probability integral and related functions; Airy functions; hyper-geometric functions; more. Translated by Richard Silverman.

  19. Thermoluminescence and their applications

    International Nuclear Information System (INIS)

    Rodrigues, G.V.

    1986-01-01

    The theory involved in the phenomenon of thermoluminescence emission, the characteristics of the main thermoluminescent phosphorus and some of their applications are presented. Some of the main thermoluminescent dosemeters used in dosimetry are described. (M.C.K.) [pt

  20. Designing Adaptive Web Applications

    DEFF Research Database (Denmark)

    Dolog, Peter

    2008-01-01

    Learning system to study a discipline. In business to business interaction, different requirements and parameters of exchanged business requests might be served by different services from third parties. Such applications require certain intelligence and a slightly different approach to design. Adpative web......The unique characteristic of web applications is that they are supposed to be used by much bigger and diverse set of users and stakeholders. An example application area is e-Learning or business to business interaction. In eLearning environment, various users with different background use the e......-based applications aim to leave some of their features at the design stage in the form of variables which are dependent on several criteria. The resolution of the variables is called adaptation and can be seen from two perspectives: adaptation by humans to the changed requirements of stakeholders and dynamic system...

  1. Applications of decelerated ions

    International Nuclear Information System (INIS)

    Johnson, B.M.

    1985-03-01

    Many facilities whose sole purpose had been to accelerate ion beams are now becoming decelerators as well. The development and current status of accel-decel operations is reviewed here. Applications of decelerated ions in atomic physics experiments are discussed

  2. Microtron for radiation applications

    International Nuclear Information System (INIS)

    Soni, H.C.; Ramamurthi, S.S.

    1993-01-01

    The electron accelerator called microtron is a powerful tool for research, medical and industrial applications which need electron beam in energy range of few tens of MeV. Either electron beam from microtron is directly used for radiation applications or electron beam is utilized to produce x-rays or neutrons which are eventually used for radiation applications. After considering the vast potential, lower cost, simpler construction and excellent quality of electron beam from microtron, it was decided to develop this machine at Centre for Advanced Technology (CAT). The microtrons in two standard models have been developed which will cover all the above mentioned applications except free electron lasers. The microtron of model 1 provides electron beam of 20 MeV, 15/30 mA and that of model 2 provides electron beam of 8/12 MeV, 50/30 mA. (author). 2 figs., 1 tab

  3. Applications of Clustering

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Applications of Clustering. Biology – medical imaging, bioinformatics, ecology, phylogenies problems etc. Market research. Data Mining. Social Networks. Any problem measuring similarity/correlation. (dimensions represent different parameters)

  4. Neutron sources and applications

    Energy Technology Data Exchange (ETDEWEB)

    Price, D.L. [ed.] [Argonne National Lab., IL (United States); Rush, J.J. [ed.] [National Inst. of Standards and Technology, Gaithersburg, MD (United States)

    1994-01-01

    Review of Neutron Sources and Applications was held at Oak Brook, Illinois, during September 8--10, 1992. This review involved some 70 national and international experts in different areas of neutron research, sources, and applications. Separate working groups were asked to (1) review the current status of advanced research reactors and spallation sources; and (2) provide an update on scientific, technological, and medical applications, including neutron scattering research in a number of disciplines, isotope production, materials irradiation, and other important uses of neutron sources such as materials analysis and fundamental neutron physics. This report summarizes the findings and conclusions of the different working groups involved in the review, and contains some of the best current expertise on neutron sources and applications.

  5. Neutron sources and applications

    International Nuclear Information System (INIS)

    Price, D.L.; Rush, J.J.

    1994-01-01

    Review of Neutron Sources and Applications was held at Oak Brook, Illinois, during September 8--10, 1992. This review involved some 70 national and international experts in different areas of neutron research, sources, and applications. Separate working groups were asked to (1) review the current status of advanced research reactors and spallation sources; and (2) provide an update on scientific, technological, and medical applications, including neutron scattering research in a number of disciplines, isotope production, materials irradiation, and other important uses of neutron sources such as materials analysis and fundamental neutron physics. This report summarizes the findings and conclusions of the different working groups involved in the review, and contains some of the best current expertise on neutron sources and applications

  6. Thermoluminescence and applications

    International Nuclear Information System (INIS)

    Rodrigues, G.V.

    1986-01-01

    The theory of thermoluminescent emission, the characteristics of main thermoluminescent phosphorus, and some applications are presented. The main thermoluminescent dosemeters used in dosimetry are related. (M.C.K.)

  7. Engineering Adaptive Web Applications

    DEFF Research Database (Denmark)

    Dolog, Peter

    2007-01-01

    Information and services on the web are accessible for everyone. Users of the web differ in their background, culture, political and social environment, interests and so on. Ambient intelligence was envisioned as a concept for systems which are able to adapt to user actions and needs....... With the growing amount of information and services, the web applications become natural candidates to adopt the concepts of ambient intelligence. Such applications can deal with divers user intentions and actions based on the user profile and can suggest the combination of information content and services which...... suit the user profile the most. This paper summarizes the domain engineering framework for such adaptive web applications. The framework provides guidelines to develop adaptive web applications as members of a family. It suggests how to utilize the design artifacts as knowledge which can be used...

  8. Wordpress web application development

    CERN Document Server

    Ratnayake, Rakhitha Nimesh

    2015-01-01

    This book is intended for WordPress developers and designers who want to develop quality web applications within a limited time frame and for maximum profit. Prior knowledge of basic web development and design is assumed.

  9. Pedal Application Errors

    Science.gov (United States)

    2012-03-01

    This project examined the prevalence of pedal application errors and the driver, vehicle, roadway and/or environmental characteristics associated with pedal misapplication crashes based on a literature review, analysis of news media reports, a panel ...

  10. BIOSENSORS FOR ENVIRONMENTAL APPLICATIONS

    Science.gov (United States)

    A review, with 19 references, is given on challenges and possible opportunities for the development of biosensors for environmental monitoring applications. The high cost and slow turnaround times typically associated with the measurement of regulated pollutants clearly indicates...

  11. 76 FR 60836 - Applicants

    Science.gov (United States)

    2011-09-30

    .... Safeway Global Shipping LLC (NVO), 9630 Clarewood Street, Building D6, Houston, TX 77054, Officers...), Margaret J. Zimmer, President, Application Type: Add NVO Service. ] Zur-Go, Inc (NVO & OFF), 6907 NW., 82nd...

  12. Evolution of Mobile Applications

    Directory of Open Access Journals (Sweden)

    Phongtraychack Anachack

    2018-01-01

    Full Text Available Currently, we can see the rapid evolution of mobile technology, which involves mobile communication, mobile hardware, and mobile software. Features of mobile phones largely depend on software. In contemporary information and communication age [1–4], mobile application is one of the most concerned and rapidly developing areas. At the same time, the development of mobile application undergoes great changes with the introduction of new software, service platforms and software development kits (SDK. These changes lead to appearance of many new service platforms such as Google with Android and Apple with iOS. This article presents the information about the evolution of mobile application, gives some statistical data on the past and present situation, demonstrates how individual users of mobile devices can benefit, and shows how mobile applications affect society from the ethical perspective.

  13. Photovoltaic systems and applications

    Energy Technology Data Exchange (ETDEWEB)

    1982-01-01

    Abstracts are given of presentations given at a project review meeting held at Albuquerque, NM. The proceedings cover the past accomplishments and current activities of the Photovoltaic Systems Research, Balance-of-System Technology Development and System Application Experiments Projects at Sandia National Laboratories. The status of intermediate system application experiments and residential system analysis is emphasized. Some discussion of the future of the Photovoltaic Program in general, and the Sandia projects in particular is also presented.

  14. Applications for alliform carbon

    Energy Technology Data Exchange (ETDEWEB)

    Gogotsi, Yury; Mochalin, Vadym; McDonough, IV, John Kenneth; Simon, Patrice; Taberna, Pierre Louis

    2017-02-21

    This invention relates to novel applications for alliform carbon, useful in conductors and energy storage devices, including electrical double layer capacitor devices and articles incorporating such conductors and devices. Said alliform carbon particles are in the range of 2 to about 20 percent by weight, relative to the weight of the entire electrode. Said novel applications include supercapacitors and associated electrode devices, batteries, bandages and wound healing, and thin-film devices, including display devices.

  15. Industrial Robot Label Applicator

    OpenAIRE

    Kukasch, Kai

    2017-01-01

    The thesis deals with a project carried out for developing and setting up a robot label applicator system. The requirement was that RFID tracking labels can be applied on flexible positions, without manual effort and rearrangement, via programming. The purpose of the robot label applicator system is to increase the efficiency in production sites, where the RFID label position can change, depending on product or other reasons. New label positions should be programmed easily with a human-m...

  16. Superconductivity and their applications

    OpenAIRE

    Roque, António

    2017-01-01

    Trabalho apresentado em International Conference on Renewable Energies and Power Quality (ICREPQ’17), 4 a 6 de Abril de 2017, Málaga, Espanha The research in the field of superconductivity has led to the synthesis of superconducting materials with features that allow you to expand the applicability of this kind of materials. Among the superconducting materials characteristics, the critical temperature of the superconductor is framing the range and type of industrial applications that can b...

  17. Formal groups and applications

    CERN Document Server

    Hazewinkel, Michiel

    2012-01-01

    This book is a comprehensive treatment of the theory of formal groups and its numerous applications in several areas of mathematics. The seven chapters of the book present basics and main results of the theory, as well as very important applications in algebraic topology, number theory, and algebraic geometry. Each chapter ends with several pages of historical and bibliographic summary. One prerequisite for reading the book is an introductory graduate algebra course, including certain familiarity with category theory.

  18. Magnesium motorcycle applications

    International Nuclear Information System (INIS)

    Jianyong Cao; Zonghe Zhang; Dongxia Xiang; Jun Wang

    2005-01-01

    Magnesium, the lightest engineering structural metal, has been comprehensively used in castings of aviation and aerospace, communication and transportation, and IT components. This paper introduced the history, advantages and difficulties of magnesium castings for motorcycle application as well as its application state in China. It also indicated the production situation of magnesium motorcycle components in CQMST and difficulties need to overcome for further development. (orig.)

  19. Superconductor electronic device applications

    International Nuclear Information System (INIS)

    VanDuzer, T.

    1989-01-01

    Superconductors are becoming important in many applications where high sensitivity or speed is required. In this paper the authors give brief introduction to superconductive device physics and some comments on the role of high-temperature superconductors. They then present the basic principles of a number of applications in metrology, electromagnetic sensing, and analog and digital circuits. They conclude with the prospects for hybrid semiconductor-superconductor devices, circuits, and systems

  20. Applications of Genetic Programming

    DEFF Research Database (Denmark)

    Gaunholt, Hans; Toma, Laura

    1996-01-01

    In this report a study of genetic programming (GP) has been performed with respect to a number of applications such as Symbolic function regression, Solving Symbolic Differential Equations, Image encoding, the ant problem etc.......In this report a study of genetic programming (GP) has been performed with respect to a number of applications such as Symbolic function regression, Solving Symbolic Differential Equations, Image encoding, the ant problem etc....

  1. Applications of Nuclear Physics

    OpenAIRE

    Hayes, Anna C.

    2017-01-01

    Today the applications of nuclear physics span a very broad range of topics and fields. This review discusses a number of aspects of these applications, including selected topics and concepts in nuclear reactor physics, nuclear fusion, nuclear non-proliferation, nuclear-geophysics, and nuclear medicine. The review begins with a historic summary of the early years in applied nuclear physics, with an emphasis on the huge developments that took place around the time of World War II, and that und...

  2. Modelling Foundations and Applications

    DEFF Research Database (Denmark)

    This book constitutes the refereed proceedings of the 8th European Conference on Modelling Foundations and Applications, held in Kgs. Lyngby, Denmark, in July 2012. The 20 revised full foundations track papers and 10 revised full applications track papers presented were carefully reviewed......, as well as the high quality of the results presented in these accepted papers, demonstrate the maturity and vibrancy of the field....

  3. Technology Applications Team: Applications of aerospace technology

    Science.gov (United States)

    1993-01-01

    Highlights of the Research Triangle Institute (RTI) Applications Team activities over the past quarter are presented in Section 1.0. The Team's progress in fulfilling the requirements of the contract is summarized in Section 2.0. In addition to our market-driven approach to applications project development, RTI has placed increased effort on activities to commercialize technologies developed at NASA Centers. These Technology Commercialization efforts are summarized in Section 3.0. New problem statements prepared by the Team in the reporting period are presented in Section 4.0. The Team's transfer activities for ongoing projects with the NASA Centers are presented in Section 5.0. Section 6.0 summarizes the status of four add-on tasks. Travel for the reporting period is described in Section 7.0. The RTI Team staff and consultants and their project responsibilities are listed in Appendix A. The authors gratefully acknowledge the contributions of many individuals to the RTI Technology Applications Team program. The time and effort contributed by managers, engineers, and scientists throughout NASA were essential to program success. Most important to the program has been a productive working relationship with the NASA Field Center Technology Utilization (TU) Offices. The RTI Team continues to strive for improved effectiveness as a resource to these offices. Industry managers, technical staff, medical researchers, and clinicians have been cooperative and open in their participation. The RTI Team looks forward to continuing expansion of its interaction with U.S. industry to facilitate the transfer of aerospace technology to the private sector.

  4. Radioisotopes production and applications

    International Nuclear Information System (INIS)

    Dash, Ashutosh

    2015-01-01

    Application of radioisotopes for both medical and industrial applications constitutes one of the most important peaceful uses of atomic energy. The striking diffusion and the exciting perspective of radioisotope for a plethora of medical and industrial applications are mainly attributable to the penetrating and ionization properties of radiation emanating from radioisotopes. The revolutionary medical applications of radioisotopes for the diagnosis and treatment of a multitude of diseases are causing a rapid expansion of the nuclear medicine field. While the industrial uses of radioisotopes are not expanding as quickly, also require large amounts of radioisotopes. Production of radioisotopes is not only the first step, but also the most crucial for the success as well as sustainable growth of radioisotope applications. With the rapid growth and expanding areas of applications, the demands for isotopes have increased several folds. A number of radioisotopes of different physical half-life, energy of the particle or gamma emission, specific activity and chemistry are now regularly produced both at commercial centers as well as at selected nuclear science research institutes utilizing reactors and cyclotrons to meet the ever growing need

  5. LCS Content Document Application

    Science.gov (United States)

    Hochstadt, Jake

    2011-01-01

    My project at KSC during my spring 2011 internship was to develop a Ruby on Rails application to manage Content Documents..A Content Document is a collection of documents and information that describes what software is installed on a Launch Control System Computer. It's important for us to make sure the tools we use everyday are secure, up-to-date, and properly licensed. Previously, keeping track of the information was done by Excel and Word files between different personnel. The goal of the new application is to be able to manage and access the Content Documents through a single database backed web application. Our LCS team will benefit greatly with this app. Admin's will be able to login securely to keep track and update the software installed on each computer in a timely manner. We also included exportability such as attaching additional documents that can be downloaded from the web application. The finished application will ease the process of managing Content Documents while streamlining the procedure. Ruby on Rails is a very powerful programming language and I am grateful to have the opportunity to build this application.

  6. Summary of Remediated and Unremediated Nitrate Salt Surrogate Testing in Support of the Waste Treatment Permit Application to the New Mexico Environment Department (NMED)

    Energy Technology Data Exchange (ETDEWEB)

    Funk, David John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-06-22

    The inadvertent creation of transuranic waste carrying hazardous waste codes D001 and D002 requires the treatment of the material to eliminate the hazardous characteristics and allow its eventual shipment and disposal at the Waste Isolation Pilot Plant (WIPP). This report briefly summarizes the surrogate testing that was done in support of our understanding of this waste form.

  7. Nonlinear Optics and Applications

    Science.gov (United States)

    Abdeldayem, Hossin A. (Editor); Frazier, Donald O. (Editor)

    2007-01-01

    Nonlinear optics is the result of laser beam interaction with materials and started with the advent of lasers in the early 1960s. The field is growing daily and plays a major role in emerging photonic technology. Nonlinear optics play a major role in many of the optical applications such as optical signal processing, optical computers, ultrafast switches, ultra-short pulsed lasers, sensors, laser amplifiers, and many others. This special review volume on Nonlinear Optics and Applications is intended for those who want to be aware of the most recent technology. This book presents a survey of the recent advances of nonlinear optical applications. Emphasis will be on novel devices and materials, switching technology, optical computing, and important experimental results. Recent developments in topics which are of historical interest to researchers, and in the same time of potential use in the fields of all-optical communication and computing technologies, are also included. Additionally, a few new related topics which might provoke discussion are presented. The book includes chapters on nonlinear optics and applications; the nonlinear Schrodinger and associated equations that model spatio-temporal propagation; the supercontinuum light source; wideband ultrashort pulse fiber laser sources; lattice fabrication as well as their linear and nonlinear light guiding properties; the second-order EO effect (Pockels), the third-order (Kerr) and thermo-optical effects in optical waveguides and their applications in optical communication; and, the effect of magnetic field and its role in nonlinear optics, among other chapters.

  8. Applications of Cell Microencapsulation.

    Science.gov (United States)

    Opara, Emmanuel C

    2017-01-01

    The goal of this chapter is to provide an overview of the different purposes for which the cell microencapsulation technology can be used. These include immunoisolation of non-autologous cells used for cell therapy; immobilization of cells for localized (targeted) delivery of therapeutic products to ablate, repair, or regenerate tissue; simultaneous delivery of multiple therapeutic agents in cell therapy; spatial compartmentalization of cells in complex tissue engineering; expansion of cells in culture; and production of different probiotics and metabolites for industrial applications. For each of these applications, specific examples are provided to illustrate how the microencapsulation technology can be utilized to achieve the purpose. However, successful use of the cell microencapsulation technology for whatever purpose will ultimately depend upon careful consideration for the choice of the encapsulating polymers, the method of fabrication (cross-linking) of the microbeads, which affects the permselectivity, the biocompatibility and the mechanical strength of the microbeads as well as environmental parameters such as temperature, humidity, osmotic pressure, and storage solutions.The various applications discussed in this chapter are illustrated in the different chapters of this book and where appropriate relevant images of the microencapsulation products are provided. It is hoped that this outline of the different applications of cell microencapsulation would provide a good platform for tissue engineers, scientists, and clinicians to design novel tissue constructs and products for therapeutic and industrial applications.

  9. Discrete mathematics with applications

    CERN Document Server

    Koshy, Thomas

    2003-01-01

    This approachable text studies discrete objects and the relationsips that bind them. It helps students understand and apply the power of discrete math to digital computer systems and other modern applications. It provides excellent preparation for courses in linear algebra, number theory, and modern/abstract algebra and for computer science courses in data structures, algorithms, programming languages, compilers, databases, and computation.* Covers all recommended topics in a self-contained, comprehensive, and understandable format for students and new professionals * Emphasizes problem-solving techniques, pattern recognition, conjecturing, induction, applications of varying nature, proof techniques, algorithm development and correctness, and numeric computations* Weaves numerous applications into the text* Helps students learn by doing with a wealth of examples and exercises: - 560 examples worked out in detail - More than 3,700 exercises - More than 150 computer assignments - More than 600 writing projects*...

  10. Optimized packings with applications

    CERN Document Server

    Pintér, János

    2015-01-01

    This volume presents a selection of case studies that address a substantial range of optimized object packings (OOP) and their applications. The contributing authors are well-recognized researchers and practitioners. The mathematical modelling and numerical solution aspects of each application case study are presented in sufficient detail. A broad range of OOP problems are discussed: these include various specific and non-standard container loading and object packing problems, as well as the stowing of hazardous and other materials on container ships, data centre resource management, automotive engineering design, space station logistic support, cutting and packing problems with placement constraints, the optimal design of LED street lighting, robust sensor deployment strategies, spatial scheduling problems, and graph coloring models and metaheuristics for packing applications. Novel points of view related to model development and to computational nonlinear, global, mixed integer optimization and heuristic st...

  11. Radioisotope applications in industry

    International Nuclear Information System (INIS)

    Frevert, E.

    1983-03-01

    The practical applications of the isotope technique are reported and illustrated by examples of works of the Department of Isotope Application of the Austrian Research Centre Seibersdorf. First the field of process controlling device and controll is described, including thickness, density and moisture gauging, the estimation of coatings and material compounds, the location of material defects and the level control. After this a detailed description of all kinds of tracer investigations is given like measurements of flow rate, intermixture, distribution and volume, investigations of corrosion, wear and lubrication and locations of all kind. A short description of gas ionisation, sources of light and isotope batteries is mentioned. Finally a general view of the applications in the fields of chemistry, biology, agriculture and medicine and the most important of the Austrian law of protective screen and its enactment are given. (Author) [de

  12. Applications of photovoltaics

    International Nuclear Information System (INIS)

    Pearsall, N.

    1999-01-01

    The author points out that although photovoltaics can be used for generating electricity for the same applications as many other means of generation, they really come into their own where disadvantages associated with an intermittent unpredictable supply are not severe. The paper discusses the advantages and disadvantages to be taken into account when considering a photovoltaic power system. Five main applications, based on the system features, are listed and explained. They are: consumer, professional, rural electrification, building-integrated, centralised grid connected and space power. A brief history of the applications of photovoltaics is presented with statistical data on the growth of installed capacity since 1992. The developing market for photovoltaics is discussed together with how environmental issues have become a driver for development of building-integrated photovoltaics

  13. Applications of interval computations

    CERN Document Server

    Kreinovich, Vladik

    1996-01-01

    Primary Audience for the Book • Specialists in numerical computations who are interested in algorithms with automatic result verification. • Engineers, scientists, and practitioners who desire results with automatic verification and who would therefore benefit from the experience of suc­ cessful applications. • Students in applied mathematics and computer science who want to learn these methods. Goal Of the Book This book contains surveys of applications of interval computations, i. e. , appli­ cations of numerical methods with automatic result verification, that were pre­ sented at an international workshop on the subject in EI Paso, Texas, February 23-25, 1995. The purpose of this book is to disseminate detailed and surveyed information about existing and potential applications of this new growing field. Brief Description of the Papers At the most fundamental level, interval arithmetic operations work with sets: The result of a single arithmetic operation is the set of all possible results as the o...

  14. Applications of stable isotopes

    International Nuclear Information System (INIS)

    Gregg, C.T.

    1977-01-01

    Clinical applications include the galactose breath test which consists of oral administration of 13 C-labeled galactose and measurement of the 13 C content of respired CO 2 as a function of time in patients with cirrhotic livers for diagnosis of liver dysfunction. Another application was the breath test to study glucose metabolism in children. Respired 13 CO 2 from ingested glucose- 13 C was measured for normal and diabetic children. Studies on mice in which 60 percent of the body carbon was replaced with 13 C failed to show significant effects of the isotope. Studies on biochemical applications include nuclear magnetic resonance studies of 13 C-labeled amino acids from Chlorella pyrenoidosa; studies on 15 N nmr spectra of arginine-guanidino- 13 C-2,3-- 15 N 2 as a function of pH; and isolation of fatty acids from algae

  15. Practical applications of phosphors

    CERN Document Server

    Yen, William M; Yamamoto, Hajime

    2006-01-01

    Drawn from the second edition of the best-selling Phosphor Handbook, Practical Applications of Phosphors outlines methods for the production of various phosphors and discusses a broad spectrum of applications. Beginning with methods for synthesis and related technologies, the book sets the stage by classifying and then explaining practical phosphors according to usage. It describes the operating principle and structure of phosphor devices and the phosphor characteristics required for a given device, then covers the manufacturing processes and characteristics of phosphors. The book discusses research and development currently under way on phosphors with potential for practical usage and touches briefly on phosphors that have played a historical role, but are no longer of practical use. It provides a comprehensive treatment of applications including lamps and cathode-ray tubes, x-ray and ionizing radiation, and for vacuum fluorescent and field emission displays and covers inorganic and organic electroluminescen...

  16. Engineering Web Applications

    DEFF Research Database (Denmark)

    Casteleyn, Sven; Daniel, Florian; Dolog, Peter

    Nowadays, Web applications are almost omnipresent. The Web has become a platform not only for information delivery, but also for eCommerce systems, social networks, mobile services, and distributed learning environments. Engineering Web applications involves many intrinsic challenges due...... design and implementation to deployment and maintenance. They stress the importance of models in Web application development, and they compare well-known Web-specific development processes like WebML, WSDM and OOHDM to traditional software development approaches like the waterfall model and the spiral...... model. Important problem areas inherent to the Web, like localization, personalization, accessibility, and usage analysis, are dealt with in detail, and a final chapter provides both a description of and an outlook on recent Semantic Web and Web 2.0 developments. Overall, their book delivers...

  17. Lie algebras and applications

    CERN Document Server

    Iachello, Francesco

    2015-01-01

    This course-based primer provides an introduction to Lie algebras and some of their applications to the spectroscopy of molecules, atoms, nuclei and hadrons. In the first part, it concisely presents the basic concepts of Lie algebras, their representations and their invariants. The second part includes a description of how Lie algebras are used in practice in the treatment of bosonic and fermionic systems. Physical applications considered include rotations and vibrations of molecules (vibron model), collective modes in nuclei (interacting boson model), the atomic shell model, the nuclear shell model, and the quark model of hadrons. One of the key concepts in the application of Lie algebraic methods in physics, that of spectrum generating algebras and their associated dynamic symmetries, is also discussed. The book highlights a number of examples that help to illustrate the abstract algebraic definitions and includes a summary of many formulas of practical interest, such as the eigenvalues of Casimir operators...

  18. Clinical applications of magnetoencephalography.

    Science.gov (United States)

    Stufflebeam, Steven M; Tanaka, Naoaki; Ahlfors, Seppo P

    2009-06-01

    Magnetoencephalography (MEG), in which magnetic fields generated by brain activity are recorded outside of the head, is now in routine clinical practice throughout the world. MEG has become a recognized and vital part of the presurgical evaluation of patients with epilepsy and patients with brain tumors. We review investigations that show an improvement in the postsurgical outcomes of patients with epilepsy by localizing epileptic discharges. We also describe the most common clinical MEG applications that affect the management of patients, and discuss some applications that are close to having a clinical impact on patients. (c) 2009 Wiley-Liss, Inc.

  19. Mixtures Estimation and Applications

    CERN Document Server

    Mengersen, Kerrie; Titterington, Mike

    2011-01-01

    This book uses the EM (expectation maximization) algorithm to simultaneously estimate the missing data and unknown parameter(s) associated with a data set. The parameters describe the component distributions of the mixture; the distributions may be continuous or discrete. The editors provide a complete account of the applications, mathematical structure and statistical analysis of finite mixture distributions along with MCMC computational methods, together with a range of detailed discussions covering the applications of the methods and features chapters from the leading experts on the subject

  20. Current military laser applications

    Energy Technology Data Exchange (ETDEWEB)

    Flinchbaugh, D.E.

    1975-08-01

    Several important military applications with the predominant laser type used are reviewed. Most of these lasers are infrared lasers of one sort or another. Airborne tactical programs utilizing laser designator/illuminators are pictorially summarized, including range finding, target seeking, designation, tracking, reconnaissance, and surveillance. A typical designator optical system configuration is presented and discussed. Examples of operational laser systems are given. It is seen that many of the laser applications in the civilian community have either direct or indirect analogs in the military field. A self-contained HF/DF chemical laser weapon that recirculates its by-products is examined.

  1. Laravel application development blueprints

    CERN Document Server

    Kiliçdagi, Arda

    2013-01-01

    Follow along as we work together to build 10 different applications using Laravel 4. Since each chapter is devoted to the design of a different application, there is no need to read the book in any particular order. Instead, you can pick and choose the blueprints that are of most interest to you and dive right in.This book is for intermediate to advanced level PHP programmers who want to master Laravel. It's assumed that you will have some experience with PHP already. This book is also for those who are already using a different PHP framework and are looking for better solutions.

  2. Science Application Teams

    Science.gov (United States)

    2000-01-01

    This paper discusses the science application team activities. Science Application team are: (1) Represent the diversity of NASA onboard computing of the future. (2) Drive architecture and system software requirements. (3) Demonstrate the benefit of highly capable computing onboard. (4) Study the birth of the first galaxies. (5) Study formation of stars. (6) Discusses the next generation space telescope hardware/software requirement: image processing and on-board optical calibration. Also discusses gamma ray large area space telescope; orbital thermal imaging spectrometer; solar terrestrial probe program; autonomous Mars rover;fault tolerance and errors.

  3. Modular Mobile Application Design

    Directory of Open Access Journals (Sweden)

    Jim Hahn

    2012-10-01

    Full Text Available This article describes the development of the Minrva library app for Android phones. The decisions to build a native application with Java and use a modular design are discussed. The application includes five modules: catalog search, in-building navigation, a barcode scanning feature, and up to date notifications of circulating technology availability. A sixth module, Amazon recommendations, that is not included in the version of the app that was released is also discussed. The article also reports on the findings of two rounds of usability testing and the plans for future development of the app.

  4. PSA in application

    International Nuclear Information System (INIS)

    Thadani, A.C.

    1989-01-01

    This paper reports on Probabilistic Safety Assessment methodologies which are finding wide application within the nuclear power industry. Plant specific studies have been useful in identifying design vulnerabilities, providing a basis for prioritization of plant modifications and in an operations management role. PSA applications in regulatory activities have also proven very beneficial to the US NRC in assessing significance of operating plant events/issues, consideration of potential design improvements, standard plant licensing and conducting regulatory and cost-benefit analyses on proposed generic issue resolution. The benefits from such studies are concluded to be well worth their cost

  5. Location Based Application Availability

    Science.gov (United States)

    Naeem Akram, Raja; Markantonakis, Konstantinos; Mayes, Keith

    Smart cards are being integrated into a diverse range of industries: ranging from banking, telecom, transport, home/office access control to health and E-passport. Traditionally, cardholders are required to carry a smart card for each application. However, recent developments in the Near Field Communication (NFC) have renewed the interest in multiple applications for different services on a single device. This paper builds onto the NFC initiative and avoids the smart card ownership issues that hinder the adoption of such devices. The proposal integrates the Global Positioning System with the NFC in mobile phones to provide a ubiquitously and flexible service access model.

  6. Optimization : insights and applications

    CERN Document Server

    Brinkhuis, Jan

    2005-01-01

    This self-contained textbook is an informal introduction to optimization through the use of numerous illustrations and applications. The focus is on analytically solving optimization problems with a finite number of continuous variables. In addition, the authors provide introductions to classical and modern numerical methods of optimization and to dynamic optimization. The book's overarching point is that most problems may be solved by the direct application of the theorems of Fermat, Lagrange, and Weierstrass. The authors show how the intuition for each of the theoretical results can be s

  7. Erokovnik mobile application

    OpenAIRE

    Barlič, Gregor

    2009-01-01

    The object of this dissertation is to describe a mobile application eRokovnik for managing different types of events. The application is primarily intended for modern mobile phones and as such allows to effectively monitor all functions and other events by user. The user has a transparent, simple and efficient user interface for easy management of data. Data is stored in the database on your mobile device locally. A backup copy of saved data can be made on user request using the integrate...

  8. Application of stepping motor

    International Nuclear Information System (INIS)

    1980-10-01

    This book is divided into three parts, which is about practical using of stepping motor. The first part has six chapters. The contents of the first part are about stepping motor, classification of stepping motor, basic theory og stepping motor, characteristic and basic words, types and characteristic of stepping motor in hybrid type and basic control of stepping motor. The second part deals with application of stepping motor with hardware of stepping motor control, stepping motor control by microcomputer and software of stepping motor control. The last part mentions choice of stepping motor system, examples of stepping motor, measurement of stepping motor and practical cases of application of stepping motor.

  9. Cluster analysis for applications

    CERN Document Server

    Anderberg, Michael R

    1973-01-01

    Cluster Analysis for Applications deals with methods and various applications of cluster analysis. Topics covered range from variables and scales to measures of association among variables and among data units. Conceptual problems in cluster analysis are discussed, along with hierarchical and non-hierarchical clustering methods. The necessary elements of data analysis, statistics, cluster analysis, and computer implementation are integrated vertically to cover the complete path from raw data to a finished analysis.Comprised of 10 chapters, this book begins with an introduction to the subject o

  10. Nanoelectronic device applications handbook

    CERN Document Server

    Morris, James E

    2013-01-01

    Nanoelectronic Device Applications Handbook gives a comprehensive snapshot of the state of the art in nanodevices for nanoelectronics applications. Combining breadth and depth, the book includes 68 chapters on topics that range from nano-scaled complementary metal-oxide-semiconductor (CMOS) devices through recent developments in nano capacitors and AlGaAs/GaAs devices. The contributors are world-renowned experts from academia and industry from around the globe. The handbook explores current research into potentially disruptive technologies for a post-CMOS world.These include: Nanoscale advance

  11. Plasmonics theory and applications

    CERN Document Server

    Shahbazyan, Tigran V

    2014-01-01

    This contributed volume summarizes recent theoretical developments in plasmonics and its applications in physics, chemistry, materials science, engineering, and medicine. It focuses on recent advances in several major areas of plasmonics including plasmon-enhanced spectroscopies, light scattering, many-body effects, nonlinear optics, and ultrafast dynamics. The theoretical and computational methods used in these investigations include electromagnetic calculations, density functional theory calculations, and nonequilibrium electron dynamics calculations. The book presents a comprehensive overview of these methods as well as their applications to various current problems of interest.

  12. Tunable laser applications

    CERN Document Server

    Duarte, FJ

    2008-01-01

    Introduction F. J. Duarte Spectroscopic Applications of Tunable Optical Parametric Oscillators B. J. Orr, R. T. White, and Y. He Solid-State Dye Lasers Costela, I. García-Moreno, and R. Sastre Tunable Lasers Based on Dye-Doped Polymer Gain Media Incorporating Homogeneous Distributions of Functional Nanoparticles F. J. Duarte and R. O. James Broadly Tunable External-Cavity Semiconductor Lasers F. J. Duarte Tunable Fiber Lasers T. M. Shay and F. J. Duarte Fiber Laser Overview and Medical Applications

  13. Gas solubilities widespread applications

    CERN Document Server

    Gerrard, William

    1980-01-01

    Gas Solubilities: Widespread Applications discusses several topics concerning the various applications of gas solubilities. The first chapter of the book reviews Henr's law, while the second chapter covers the effect of temperature on gas solubility. The third chapter discusses the various gases used by Horiuti, and the following chapters evaluate the data on sulfur dioxide, chlorine data, and solubility data for hydrogen sulfide. Chapter 7 concerns itself with solubility of radon, thoron, and actinon. Chapter 8 tackles the solubilities of diborane and the gaseous hydrides of groups IV, V, and

  14. Pump characteristics and applications

    CERN Document Server

    Volk, Michael

    2013-01-01

    Providing a wealth of information on pumps and pump systems, Pump Characteristics and Applications, Third Edition details how pump equipment is selected, sized, operated, maintained, and repaired. The book identifies the key components of pumps and pump accessories, introduces the basics of pump and system hydraulics as well as more advanced hydraulic topics, and details various pump types, as well as special materials on seals, motors, variable frequency drives, and other pump-related subjects. It uses example problems throughout the text, reinforcing the practical application of the formulae

  15. Graphs Theory and Applications

    CERN Document Server

    Fournier, Jean-Claude

    2008-01-01

    This book provides a pedagogical and comprehensive introduction to graph theory and its applications. It contains all the standard basic material and develops significant topics and applications, such as: colorings and the timetabling problem, matchings and the optimal assignment problem, and Hamiltonian cycles and the traveling salesman problem, to name but a few. Exercises at various levels are given at the end of each chapter, and a final chapter presents a few general problems with hints for solutions, thus providing the reader with the opportunity to test and refine their knowledge on the

  16. Experimental approaches and applications

    CERN Document Server

    Crasemann, Bernd

    1975-01-01

    Atomic Inner-Shell Processes, Volume II: Experimental Approaches and Applications focuses on the physics of atomic inner shells, with emphasis on experimental aspects including the use of radioactive atoms for studies of atomic transition probabilities. Surveys of modern techniques of electron and photon spectrometry are also presented, and selected practical applications of inner-shell processes are outlined. Comprised of six chapters, this volume begins with an overview of the general principles underlying the experimental techniques that make use of radioactive isotopes for inner-sh

  17. Developing Web Applications

    CERN Document Server

    Moseley, Ralph

    2007-01-01

    Building applications for the Internet is a complex and fast-moving field which utilizes a variety of continually evolving technologies. Whether your perspective is from the client or server side, there are many languages to master - X(HTML), JavaScript, PHP, XML and CSS to name but a few. These languages have to work together cleanly, logically and in harmony with the systems they run on, and be compatible with any browsers with which they interact. Developing Web Applications presents script writing and good programming practice but also allows students to see how the individual technologi

  18. Medical applications of accelerators

    CERN Document Server

    Rossi, Sandro

    1998-01-01

    At Present, about five thousands accelerators are devoted to biomedical applications. They are mainly used in radiotherapy, research and medical radioisotopes production. In this framework oncological hadron-therapy deserves particular attention since it represents a field in rapid evolution thanks to the joint efforts of laboratories with long experiences in particle physics. It is the case of CERN where the design of an optimised synchrotron for medical applications has been pursued. These lectures present these activities with particular attention to the new developments which are scientifically interesting and/or economically promising.

  19. Special Analysis: 2004 General Revision of Slit and Engineered Trench Limits

    Energy Technology Data Exchange (ETDEWEB)

    COLLARD, LEONARDB.

    2004-06-14

    This Special Analysis revises the Slit Trench and Engineered Trench inventory limits. Changes have been made in the methods of analyses and in the implementation of those methods. General changes applicable to multiple pathways/scenarios are discussed in this section, while changes specific to individual pathways/scenarios are discussed in their applicable sections. This report provides limits for each nuclide for each pathway/scenario in a single table to help implement the approach introduced in the ''timed sum-of-fractions'' report. The pathways/scenarios include the following: (1) Groundwater; (2) Inadvertent Intruder; (3) Air; (4) Radon. In the timed sum-of-fractions report, the time intervals were selected to be 0-100 years, 100-1000 years, and 1000-10,000 years. The time intervals for this report were refined to 0-12 years, 12-100 years, and 100-1000 years to account for the separation of the tritium groundwater peak from those of other radionuclides. This report includes nuclides not previously included in the process analysis. Some of these nuclides are included because they have been disposed in Slit or Engineered Trenches and the latest screening analysis indicates that they survived the screening process. Other nuclides are only included because they survived the screening process and they have been disposed in other disposal units. Inventory limits for Slit Trenches and Engineered Trenches were recalculated while imposing a multitude of changes. The most important changes both tended to increase limits, such as changing the time of compliance from 10,000 years to 1000 years and tended to decrease limits, such as modifying the aquifer source node selection. The net effect for the groundwater pathway reduced some limits for nuclides that dominate the sum-of-fractions.

  20. 78 FR 29062 - 2006 Biennial Regulatory Review

    Science.gov (United States)

    2013-05-17

    ... introductory text in Sec. 25.221(b) and, due to paragraph mis- numbering, inadvertently replaced Sec. 25.221(a... two GSO FSS satellites. * * * * * (b) Applications for ESV operation in the 5925-6425 MHz (Earth-to...

  1. 48 CFR 1322.302 - Liquidated damages and overtime pay.

    Science.gov (United States)

    2010-10-01

    ... SOCIOECONOMIC PROGRAMS APPLICATION OF LABOR LAWS TO GOVERNMENT ACQUISITIONS Contract Work Hours and Safety... subcontractor inadvertently violated the Contract Work Hours and Safety Standards Act is set forth in CAM 1301...

  2. Permit application modifications

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-11-01

    This document contains the Permit Application Modifications for the Y-12 Industrial Landfill V site on the Oak Ridge Reservation. These modifications include the assessment of stability of the proposed Landfill V under static and loading conditions. Analyses performed include the general slope stability, veneer stability of the bottom liner and cover system, and a liquefaction potential assessment of the foundation soils.

  3. Business Applications of WAP.

    Science.gov (United States)

    van Steenderen, Margaret

    2002-01-01

    Explains the development of WAP (wireless application protocol), how it works, and what the major advantages and disadvantages are, especially when applied to the use of information. Topics include standardization; mobile communications; the effect of WAP on business tools, electronic commerce, and information services; consumers; corporate users;…

  4. Clinical Application of Electrocardiography.

    Science.gov (United States)

    Brammell, H. L.; Orr, William

    The scalar electrocardiogram (ECG) is one of the most important and commonly used clinical tools in medicine. A detailed description of the recordings of cardiac electrical activity made by the ECG is presented, and the vast numbers of uses made with the data provided by this diagnostic tool are cited. Clinical applications of the ECG are listed.…

  5. Computer applications in radiology.

    Science.gov (United States)

    Vannier, M W

    1991-04-01

    Computer applications in radiology are evolving rapidly, tied to incremental improvements in hardware, software, and methods. In computer hardware, the emergence of dramatically improved graphic and computational performance for engineering workstations enables their use for visualization. Major changes in networking, storage, and display technology play a major role in influencing applications. The use of three-dimensional digitizers to perform localization of real three-dimensional points in conjunction with images and the rendering of objects using rapid prototyping methods, such as stereolithography, were recently reported. Major software advances have taken place through the availability of applications packages that are operated with menu-driven or point-and-click user interfaces, data flow languages, or complete turnkey applications. Imaging methods including CT, MR imaging, digital radiography, biomagnetism, and optical range sensing, which take advantage of advanced computer technology, are new this year. Image processing for multimodality fusion or image registration, visualization, reconstruction, and quantification of images, have been reported at a wide variety of conferences and in key publications. New computer methods to fabricate custom orthopaedic implants, and to improve imaging technology assessment were introduced.

  6. Knotoids, Braidoids and Applications

    Directory of Open Access Journals (Sweden)

    Neslihan Gügümcü

    2017-12-01

    Full Text Available This paper is an introduction to the theory of braidoids. Braidoids are geometric objects analogous to classical braids, forming a counterpart theory to the theory of knotoids. We introduce these objects and their topological equivalences, and we conclude with a potential application to the study of proteins.

  7. Medical applications of colloids

    CERN Document Server

    Matijevic, Egon

    2008-01-01

    The first book of its type on the medical and biomedical applications of colloids, although there are some related titles on different topicsDiscusses the effects of uniform particles in drug formulations and releaseEvaluates particle transport and deposition in the human body.

  8. Process intensification : Industrial applications

    NARCIS (Netherlands)

    Kiss, Anton A.

    2016-01-01

    The chapter presents process intensification technologies used in industrial applications, for increasing the eco-efficiency of the chemical equipment with the benefit of lower capital costs, substantial energy saving, reduced footprint, and safety by design. The key topics cover compact heat

  9. Applications of QCD

    International Nuclear Information System (INIS)

    Landshoff, P.V.

    1983-01-01

    The author describes the application of quantum chromodynamics to deep inelastic lepton scattering, the Drell-Yan process, e + e - -annihilation, #betta##betta#-physics, large psub(T) processes, and wide angle quark-quark scattering. Furthermore higher order terms are considered. (HSI)

  10. Applications of fluid dynamics

    International Nuclear Information System (INIS)

    Round, G.R.; Garg, V.K.

    1986-01-01

    This book describes flexible and practical approach to learning the basics of fluid dynamics. Each chapter is a self-contained work session and includes a fluid dynamics concept, an explanation of the principles involved, an illustration of their application and references on where more detailed discussions can be found

  11. Zirconia in biomedical applications.

    Science.gov (United States)

    Chen, Yen-Wei; Moussi, Joelle; Drury, Jeanie L; Wataha, John C

    2016-10-01

    The use of zirconia in medicine and dentistry has rapidly expanded over the past decade, driven by its advantageous physical, biological, esthetic, and corrosion properties. Zirconia orthopedic hip replacements have shown superior wear-resistance over other systems; however, risk of catastrophic fracture remains a concern. In dentistry, zirconia has been widely adopted for endosseous implants, implant abutments, and all-ceramic crowns. Because of an increasing demand for esthetically pleasing dental restorations, zirconia-based ceramic restorations have become one of the dominant restorative choices. Areas covered: This review provides an updated overview of the applications of zirconia in medicine and dentistry with a focus on dental applications. The MEDLINE electronic database (via PubMed) was searched, and relevant original and review articles from 2010 to 2016 were included. Expert commentary: Recent data suggest that zirconia performs favorably in both orthopedic and dental applications, but quality long-term clinical data remain scarce. Concerns about the effects of wear, crystalline degradation, crack propagation, and catastrophic fracture are still debated. The future of zirconia in biomedical applications will depend on the generation of these data to resolve concerns.

  12. Biomedical applications engineering tasks

    Science.gov (United States)

    Laenger, C. J., Sr.

    1976-01-01

    The engineering tasks performed in response to needs articulated by clinicians are described. Initial contacts were made with these clinician-technology requestors by the Southwest Research Institute NASA Biomedical Applications Team. The basic purpose of the program was to effectively transfer aerospace technology into functional hardware to solve real biomedical problems.

  13. Star Products and Applications

    OpenAIRE

    Iida, Mari; Yoshioka, Akira

    2010-01-01

    Star products parametrized by complex matrices are defined. Especially commutative associative star products are treated, and star exponentials with respect to these star products are considered. Jacobi's theta functions are given as infinite sums of star exponentials. As application, several concrete identities are obtained by properties of the star exponentials.

  14. Membrane contactor applications

    NARCIS (Netherlands)

    Klaassen, R.; Feron, P.H.M.; Jansen, A.

    2008-01-01

    In a membrane contactor the membrane separation is completely integrated with an extraction or absorption operation in order to exploit the benefits of both technologies fully. Membrane contactor applications that have been developed can be found in both water and gas treatment. Several recently

  15. Technology and applications

    International Nuclear Information System (INIS)

    Bogdany, J.; Vesztergombi, G.

    1994-07-01

    The workshop on Parallel Processing, Technology and Applications, held February 10-11, Budapest, Hungary, covered a variety of topics on computer data processing and parallel computing. One of the 17 presentations discussed the need for massively parallel processing in support of future high energy experiments

  16. Applications Using AIRS Data

    Science.gov (United States)

    Ray, S. E.; Pagano, T. S.; Fetzer, E. J.; Lambrigtsen, B.; Olsen, E. T.; Teixeira, J.; Licata, S. J.; Hall, J. R.; Thompson, C. K.

    2015-12-01

    The Atmospheric Infrared Sounder (AIRS) on NASA's Aqua spacecraft has been returning daily global observations of Earth's atmospheric constituents and properties since 2002. With a 12-year data record and daily, global observations in near real-time, AIRS data can play a role in applications that fall under many of the NASA Applied Sciences focus areas. For vector-borne disease, research is underway using AIRS near surface retrievals to assess outbreak risk, mosquito incubation periods and epidemic potential for dengue fever, malaria, and West Nile virus. For drought applications, AIRS temperature and humidity data are being used in the development of new drought indicators and improvement in the understanding of drought development. For volcanic hazards, new algorithms using AIRS data are in development to improve the reporting of sulfur dioxide concentration, the burden and height of volcanic ash and dust, all of which pose a safety threat to aircraft. In addition, anomaly maps of many of AIRS standard products are being produced to help highlight "hot spots" and illustrate trends. To distribute it's applications imagery, AIRS is leveraging existing NASA data frameworks and organizations to facilitate archiving, distribution and participation in the BEDI. This poster will communicate the status of the applications effort for the AIRS Project and provide examples of new maps designed to best communicate the AIRS data.

  17. Beaming teaching application

    DEFF Research Database (Denmark)

    Markovic, Milos; Madsen, Esben; Olesen, Søren Krarup

    2012-01-01

    BEAMING is a telepresence research project aiming at providing a multimodal interaction between two or more participants located at distant locations. One of the BEAMING applications allows a distant teacher to give a xylophone playing lecture to the students. Therefore, rendering of the xylophon...

  18. Permit application modifications

    International Nuclear Information System (INIS)

    1995-11-01

    This document contains the Permit Application Modifications for the Y-12 Industrial Landfill V site on the Oak Ridge Reservation. These modifications include the assessment of stability of the proposed Landfill V under static and loading conditions. Analyses performed include the general slope stability, veneer stability of the bottom liner and cover system, and a liquefaction potential assessment of the foundation soils

  19. Microfluidics for medical applications

    NARCIS (Netherlands)

    van den Berg, Albert; van den Berg, A.; Segerink, L.I.; Segerink, Loes Irene; Unknown, [Unknown

    2015-01-01

    Lab-on-a-chip devices for point of care diagnostics have been present in clinics for several years now. Alongside their continual development, research is underway to bring the organs and tissue on-a-chip to the patient, amongst other medical applications of microfluidics. This book provides the

  20. Polymeric Microspheres for Medical Applications

    Directory of Open Access Journals (Sweden)

    Ketie Saralidze

    2010-06-01

    Full Text Available Synthetic polymeric microspheres find application in a wide range of medical applications. Among other applications, microspheres are being used as bulking agents, embolic- or drug-delivery particles. The exact composition of the spheres varies with the application and therefore a large array of materials has been used to produce microspheres. In this review, the relation between microsphere synthesis and application is discussed for a number of microspheres that are used for different treatment strategies.

  1. Prospective radiological dose assessment. Amersham plc (Amersham site) variation application December 1998[Dosimetry; Exposure

    Energy Technology Data Exchange (ETDEWEB)

    Allott, R

    2001-09-01

    Amersham plc (previously Nycomed-Amersham plc) submitted an application to the Environment Agency in December 1998 for a variation to their radioactive waste discharge authorisations granted under the Radioactive Substances Act 1993. The application requested a reduction in the discharge limits for certain radionuclides and no change for the remaining radionuclides. Amersham plc undertook a further review of their discharge requirements and submitted a new assessment for revised limits in January 2001. This report provides an assessment of the radiological implications of discharges at these revised limits requested by Amersham plc and the limits proposed by the Agency. It has been prepared by the National Compliance Assessment Service at the request of Thames Region to support their determination of the application. Four candidate critical groups were identified who could be exposed to discharges from the Amersham site: 1) Sewage workers at the Maple Lodge sewage works who might be exposed to external radiation from discharges contained within sewage and inadvertently inhale or ingest sewage. 2) Anglers on the Grand Union Canal who eat a small proportion of their annual catch of freshwater fish, who drink water abstracted solely from the River Colne and eat vegetables irrigated by water from the canal. 3) Persons living closest to site who eat locally produced food. 4) Dog walkers living near to site who eat locally produced food. For continuous discharges at the Agency's proposed annual limits, the highest dose of 160 {mu}Sv/y is predicted to be received by infants who live closest to the site and eat locally produced food. Therefore, this has been identified as the critical group. Children and adults living at the same location and eating locally produced food receive doses of 140 {mu}Sv/y and 130 {mu}Sv/y respectively. The critical group dose is less than the source constraint of 300 {mu}Sv/y. The dose is dominated by direct radiation from the site (110

  2. Novel Applications of Peroxidase

    Science.gov (United States)

    Rob, Abdul; Ball, Andrew S.; Tuncer, Munir; Wilson, Michael T.

    1997-02-01

    The article entitled "Novel Biocatalysts Will Work Even Better for Industry" published recently in this Journal (1) was informative and interesting. However it touched only briefly on the application of peroxidase as catalyst. Here, we would like to mention in more detail the novel applications of peroxidase in agricultural, paper pulp, water treatment, pharmaceutical, and medical situations. Firstly, the peroxidase isolated from Phanerochaete chyrosporium has been shown to detoxify herbicides such as atrazine to less toxic compounds and would certainly find potential application in agriculture (2). Secondly, the peroxidase produced by Streptomyces thermoviolaceus may find application in the paper pulp industry as a delignifying agent (3). Thirdly, it has been shown that extracellular peroxidase produced by Streptomyces avermitilis can remove the intense color from paper-mill effluent obtained after semichemical alkaline pulping of wheat straw (4), and thus this enzyme might find application as a catalyst in water treatment plants. Fourthly, the heme-containing horseradish peroxidase enzyme has been exploited in several diagnostic applications in pharmaceutics and medicine, such as the detection of human immunodeficiency virus and cystic fibrosis (5-10). Finally, recent work from our laboratory has suggested that thermophilic nonheme peroxidase produced by Thermomonospora fusca BD25 may find medical use in the diagnosis of myocardial infarction (11, 12). Literature Cited 1. Wiseman, A. J. Chem. Educ. 1996, 73, 55-58. 2. Mougin, C. Appl. Environ. Microbiol. 1994, 60, 705-708. 3. McCarthy A. J.; Peace, W.; Broda, P. Appl. Microbiol. Technol. 1985, 23, 238-244. 4. Hernandez, M; Rodriguez J; Soliveri, J; Copa, J. L; Perez, M. I; Arias, M. E. Appl. Environ. Microbiol. 1994, 60, 3909-3913. 5. Hopfer, S. M.; Aslanzadeh, J. Ann. Clin. Lab. Sci. 1995, 25, 475-480. 6. Suzuki, K; Iman, M. J. Virol. Methods 1995, 55, 347-356. 7. Nielsen, K. J. Immunoassay 1995, 16, 183-197. 8

  3. Application of acoustic agglomeration to enhance air filtration efficiency in air-conditioning and mechanical ventilation (ACMV) systems

    OpenAIRE

    Ng, Bing Feng; Xiong, Jin Wen; Wan, Man Pun

    2017-01-01

    The recent episodes of haze in Southeast Asia have caused some of the worst regional atmospheric pollution ever recorded in history. In order to control the levels of airborne fine particulate matters (PM) indoors, filtration systems providing high PM capturing efficiency are often sought, which inadvertently also results in high airflow resistance (or pressure drop) that increases the energy consumption for air distribution. A pre-conditioning mechanism promoting the formation of particle cl...

  4. The fusion applications study - FAME

    International Nuclear Information System (INIS)

    Schultz, K.R.; Engholm, B.A.; Bourque, R.F.; Cheng, E.T.; Schaffer, M.J.; Wong, C.P.C.

    1986-01-01

    The Fusion Applications and Market Evaluation (''FAME'') study, being conducted by GA Technologies for Lawrence Livermore National Laboratory (LLNL) and US Department of Energy, Office of Fusion Energy, (US DOE) is described. This two-year program has a FY86 objective of Evaluating Alternative Applications of Fusion, and a FY87 goal of Exploring Innovative Applications. Applications are being reviewed and categorized into Baseline, Nuclear, Chemical, Electromagnetic, and Thermal application categories. The ''traditional'' applications of electricity generation, fissile fuel and tritium production, and hydrogen production continue to look attractive. Particularly promising new applications to date, with potential for near-term markets, are isotope production and radiation processing, especially when allied with the traditional application of electricity production. The economics of separate applications as well as coproduction are discussed. The combination of electricity and /sup 60/Co production appears to be one of the most attractive

  5. Optical Polarizationin Biomedical Applications

    CERN Document Server

    Tuchin, Valery V; Zimnyakov, Dmitry A

    2006-01-01

    Optical Polarization in Biomedical Applications introduces key developments in optical polarization methods for quantitative studies of tissues, while presenting the theory of polarization transfer in a random medium as a basis for the quantitative description of polarized light interaction with tissues. This theory uses the modified transfer equation for Stokes parameters and predicts the polarization structure of multiple scattered optical fields. The backscattering polarization matrices (Jones matrix and Mueller matrix) important for noninvasive medical diagnostic are introduced. The text also describes a number of diagnostic techniques such as CW polarization imaging and spectroscopy, polarization microscopy and cytometry. As a new tool for medical diagnosis, optical coherent polarization tomography is analyzed. The monograph also covers a range of biomedical applications, among them cataract and glaucoma diagnostics, glucose sensing, and the detection of bacteria.

  6. Thin film device applications

    CERN Document Server

    Kaur, Inderjeet

    1983-01-01

    Two-dimensional materials created ab initio by the process of condensation of atoms, molecules, or ions, called thin films, have unique properties significantly different from the corresponding bulk materials as a result of their physical dimensions, geometry, nonequilibrium microstructure, and metallurgy. Further, these characteristic features of thin films can be drasti­ cally modified and tailored to obtain the desired and required physical characteristics. These features form the basis of development of a host of extraordinary active and passive thin film device applications in the last two decades. On the one extreme, these applications are in the submicron dimensions in such areas as very large scale integration (VLSI), Josephson junction quantum interference devices, magnetic bubbles, and integrated optics. On the other extreme, large-area thin films are being used as selective coatings for solar thermal conversion, solar cells for photovoltaic conver­ sion, and protection and passivating layers. Ind...

  7. Magnetoplasmadynamic thruster applications

    International Nuclear Information System (INIS)

    Pawlik, E.V.

    1976-01-01

    Advance study activities within NASA indicate that electric propulsion will be required to make certain types of potential missions feasible. The large power levels under consideration make magnetoplasmadynamic thrusters a good candidate for these applications since this type of electric thruster is best suited to operation at high power levels. The status of the magnetoplasmadynamic thruster is examined and compared to the ion thruster which also is a candidate. The use of these two types of electric propulsion devices for orbit raising of a self-powered large satellite is examined from a cost standpoint. In addition the use of nuclear electric propulsion is described for use as both a near-earth space tug and for an interplanetary exploration vehicle. These preliminary examinations indicate that the magnetoplasmadynamic thruster is the lowest cost thruster and therefore merits serious consideration for these applications

  8. Diverse applications of radioimmunoassay

    International Nuclear Information System (INIS)

    Yalow, R.S.

    1981-01-01

    The author discussed the issues concerning insulins of the different species (pig, dog and sperm whale) and the applications of species specific antisera in experimental and clinical settings. The possible role of a new form of ACTH as a hormonal marker was also discussed. Three species of insulin (pig, dog, and sperm whale) were separated by human antisera. Immune reaction was utilized to distinguish between endogenous human insulin and exogenously administered animal insulin. The longer acting insulins was found to be more immunogenic than regular crystalline insulins. Insulin concentrations in acid/ethanol extracts of the whole rat brain was about 25 times higher than plasma insulin. Plasma concentration of ACTH could be applicable to effect the distinction between tumor primary in or metastatic to the lung. (Nakanishi, T.)

  9. Nanotechnology applications in osteodistraction

    Directory of Open Access Journals (Sweden)

    Adam E Singleton

    2014-06-01

    Full Text Available Most current strategies for bone regeneration have relatively satisfactory results. However, there are drawbacks and limitations associated with their use and availability, and even controversial reports about their efficacy and cost-effectiveness. The induction of new bone formation through distraction osteogenesis (DO is widespread clinical application in the treatment of bone defects, limb deformities, and fracture nonunions. However, a lengthy period of external fixation is usually needed to allow the new bone to consolidate, and complications such as refracture at the distraction gap often occur. Although various biomaterials have been used as injectable delivery systems in DO models, little has been reported on the use of nanobiomaterials as carrier materials for the sustained release of growth factors in bone regeneration. One area of focus in nanotechnology is the delivery of osteogenic factors in an attempt to modulate the formation of bone. This review article seeks to demonstrate the potential of nanobiomaterials to improve biological applications pertinent to osteodistraction.

  10. Nonlocal diffusion and applications

    CERN Document Server

    Bucur, Claudia

    2016-01-01

    Working in the fractional Laplace framework, this book provides models and theorems related to nonlocal diffusion phenomena. In addition to a simple probabilistic interpretation, some applications to water waves, crystal dislocations, nonlocal phase transitions, nonlocal minimal surfaces and Schrödinger equations are given. Furthermore, an example of an s-harmonic function, its harmonic extension and some insight into a fractional version of a classical conjecture due to De Giorgi are presented. Although the aim is primarily to gather some introductory material concerning applications of the fractional Laplacian, some of the proofs and results are new. The work is entirely self-contained, and readers who wish to pursue related subjects of interest are invited to consult the rich bibliography for guidance.

  11. Quality Control Applications

    CERN Document Server

    Chorafas, Dimitris N

    2013-01-01

    Quality control is a constant priority in electrical, mechanical, aeronautical, and nuclear engineering – as well as in the vast domain of electronics, from home appliances to computers and telecommunications. Quality Control Applications provides guidance and valuable insight into quality control policies; their methods, their implementation, constant observation and associated technical audits. What has previously been a mostly mathematical topic is translated here for engineers concerned with the practical implementation of quality control. Once the fundamentals of quality control are established, Quality Control Applications goes on to develop this knowledge and explain how to apply it in the most effective way. Techniques are described and supported using relevant, real-life, case studies to provide detail and clarity for those without a mathematical background. Among the many practical examples, two case studies dramatize the importance of quality assurance: A shot-by-shot analysis of the errors made ...

  12. Handbook of satellite applications

    CERN Document Server

    Madry, Scott; Camacho-Lara, Sergio

    2013-01-01

    Top space experts from around the world have collaborated to produce this comprehensive, authoritative, and clearly illustrated reference guide to the fast growing, multi-billion dollar field of satellite applications and space communications. This handbook, done under the auspices of the International Space University based in France, addresses not only system technologies but also examines market dynamics, technical standards and regulatory constraints. The handbook is a completely multi-disciplinary reference book that covers, in an in-depth fashion, the fields of satellite telecommunications, Earth observation, remote sensing, satellite navigation, geographical information systems, and geosynchronous meteorological systems. It covers current practices and designs as well as advanced concepts and future systems. It provides a comparative analysis of the common technologies and design elements for satellite application bus structures, thermal controls, power systems, stabilization techniques, telemetry, com...

  13. Information Engineering and Applications

    CERN Document Server

    Ma, Yan; International Conference on Information Engineering and Applications (IEA) 2011

    2012-01-01

    The International Conference on Information Engineering and Applications (IEA) 2011 will be held on October 21-24, 2011, in Chongqing, China. It is organized by Chongqing Normal University, Chongqing University, Shanghai Jiao Tong University, Nanyang Technological University, the University of Michigan, Chongqing University of Arts and Sciences, and sponsored by the National Natural Science Foundation of China. The objective of IEA 2011 is to facilitate an exchange of information on best practices for the latest research advances in the area of information engineering and intelligence applications, which mainly includes computer science and engineering, informatics, communications and control, electrical engineering, information computing, business intelligence and management. IEA 2011 will provide a forum for engineers and scientists in academia, industry, and government to address the most innovative research and development including technical challenges, social and economic issues, and to present and disc...

  14. Application of ecological mapping

    International Nuclear Information System (INIS)

    Sherk, J.A.

    1982-01-01

    The US Fish and Wildlife Service has initiated the production of a comprehensive ecological inventory map series for use as a major new planning tool. Important species data along with special land use designations are displayed on 1:250,000 scale topographic base maps. Sets of maps have been published for the Atlantic and Pacific coastal areas of the United States. Preparation of a map set for the Gulf of Mexico is underway at the present time. Potential application of ecological inventory map series information to a typical land disposal facility could occur during the narrowing of the number of possible disposal sites, the design of potential disposal site studies of ecological resources, the preparation of the environmental report, and the regulatory review of license applications. 3 figures, 3 tables

  15. Biophotonics concepts to applications

    CERN Document Server

    Keiser, Gerd

    2016-01-01

    This book is designed to introduce senior-level and postgraduate students to the principles and applications of biophotonics. It also will serve well as a working reference to practicing physicians, clinicians, biomedical researchers, and biomedical engineers dealing with photonics-based tools and instruments. The book topics include the fundamentals of optics and photonics, the optical properties of biological tissues, various types of light-tissue interactions, microscopy for visualizing tissue components, spectroscopy for optically analyzing the properties of healthy and diseased tissue, and optical biomedical imaging. The tools and techniques described in the book include laser and LED optical sources, photodetectors, optical fibers, bioluminescent probes for labeling cells, optical-based biosensors, nanophotonics, surface plasmon resonance, and lab-on-a-chip technologies. Among the applications are optical coherence tomography (OCT), flow cytometery, photodynamic therapy (PDT), low-level light therapy (L...

  16. Technology applications bulletins

    International Nuclear Information System (INIS)

    Koncinski, W. Jr.

    1989-02-01

    Martin Marietta Energy Systems, Inc. (Energy Systems), operates five facilities for the US Department of Energy (DOE): the Oak Ridge National Laboratory (ORNL), which is a large, multidisciplinary research and development (R and D) center whose primary mission is energy research; the Oak Ridge Y-12 Plant, which engages in defense research, development, and production; and the uranium-enrichment plants at Oak Ridge; Paducah, Kentucky; and Portsmouth, Ohio. Much of the research carried out at these facilities is of interest to industry and to state or local governments. To make information about this research available, the Energy Systems Office of Technology Applications publishes brief descriptions of selected technologies and reports. These technology applications bulletins describe the new technology and inform the reader about how to obtain further information, gain access to technical resources, and initiate direct contact with Energy Systems researchers

  17. Ceramics for fusion applications

    International Nuclear Information System (INIS)

    Clinard, F.W. Jr.

    1987-01-01

    Ceramics are required for a variety of uses in both near-term fusion devices and in commercial powerplants. These materials must retain adequate structural and electrical properties under conditions of neutron, particle and ionizing irradiation; thermal and applied stresses; and physical and chemical sputtering. Ceramics such as Al 2 O 3 , MgAl 2 O 4 , BeO, Si 3 N 4 and SiC are currently under study for fusion applications, and results to date show widely-varying responses to the fusion environment. Materials can be identified today that will meet initial operating requirements, but improvements in physical properties are needed to achieve satisfactory lifetimes for critical applications. (author)

  18. [Industrial application of lipases].

    Science.gov (United States)

    Bancerz, Renata

    2017-01-01

    The ability of lipases to perform specific reactions of transformation (biotransformation) makes these enzymes a useful tool used in many syntheses, for example: in the production of detergents, cosmetics, biosurfactants, in the oil-chemical, paper, dairy, food or pharmaceutical industries. Lipases are ubiquitous enzymes but only lipases produced by microorganisms are important for industrial applications due to their wide variety of properties such as stability in organic solvents, action under mild conditions, high substrate specificity and region- and enantioselectivity, as well as the relatively simple methods of their production in fermentors and recovery from the culture medium. This paper reviews the latest achievements in the production of lipases in the submerged fermentation and solid state fermentation using waste products from the agricultural industry. In addition, new applications of lipases were described, including those for the synthesis of biopolymers and biodiesel and for the production of enantiomeric pharmaceuticals, agrochemicals and flavoring compounds.

  19. Mechanisms, Transmissions and Applications

    CERN Document Server

    Corves, Burkhard

    2012-01-01

    The first Workshop on Mechanisms, Transmissions and Applications -- MeTrApp-2011 was organized by the Mechatronics Department at the Mechanical Engineering Faculty, “Politehnica” University of Timisoara, Romania, under the patronage of the IFToMM Technical Committees Linkages and Mechanical Controls and Micromachines. The workshop brought together researchers and students who work in disciplines associated with mechanisms science and offered a great opportunity for scientists from all over the world to present their achievements, exchange innovative ideas and create solid international links, setting the trend for future developments in this important and creative field. The topics treated in this volume are mechanisms and machine design, mechanical transmissions, mechatronic and biomechanic applications, computational and experimental methods, history of mechanism and machine science and teaching methods.

  20. Quantum mechanics with applications

    CERN Document Server

    Beard, David B

    2014-01-01

    This introductory text emphasizes Feynman's development of path integrals and its application to wave theory for particles. Suitable for undergraduate and graduate students of physics, the well-written, clear, and rigorous text was written by two of the nation's leading authorities on quantum physics. A solid foundation in quantum mechanics and atomic physics is assumed. Early chapters provide background in the mathematical treatment and particular properties of ordinary wave motion that also apply to particle motion. The close relation of quantum theory to physical optics is stressed. Subsequent sections emphasize the physical consequences of a wave theory of material properties, and they offer extensive applications in atomic physics, nuclear physics, solid state physics, and diatomic molecules. Four helpful Appendixes supplement the text.