WorldWideScience

Sample records for inadvertent intruder application

  1. Automated Inadvertent Intruder Application

    International Nuclear Information System (INIS)

    Koffman, Larry D.; Lee, Patricia L.; Cook, James R.; Wilhite, Elmer L.

    2008-01-01

    The Environmental Analysis and Performance Modeling group of Savannah River National Laboratory (SRNL) conducts performance assessments of the Savannah River Site (SRS) low-level waste facilities to meet the requirements of DOE Order 435.1. These performance assessments, which result in limits on the amounts of radiological substances that can be placed in the waste disposal facilities, consider numerous potential exposure pathways that could occur in the future. One set of exposure scenarios, known as inadvertent intruder analysis, considers the impact on hypothetical individuals who are assumed to inadvertently intrude onto the waste disposal site. Inadvertent intruder analysis considers three distinct scenarios for exposure referred to as the agriculture scenario, the resident scenario, and the post-drilling scenario. Each of these scenarios has specific exposure pathways that contribute to the overall dose for the scenario. For the inadvertent intruder analysis, the calculation of dose for the exposure pathways is a relatively straightforward algebraic calculation that utilizes dose conversion factors. Prior to 2004, these calculations were performed using an Excel spreadsheet. However, design checks of the spreadsheet calculations revealed that errors could be introduced inadvertently when copying spreadsheet formulas cell by cell and finding these errors was tedious and time consuming. This weakness led to the specification of functional requirements to create a software application that would automate the calculations for inadvertent intruder analysis using a controlled source of input parameters. This software application, named the Automated Inadvertent Intruder Application, has undergone rigorous testing of the internal calculations and meets software QA requirements. The Automated Inadvertent Intruder Application was intended to replace the previous spreadsheet analyses with an automated application that was verified to produce the same calculations and

  2. AUTOMATED INADVERTENT INTRUDER APPLICATION

    International Nuclear Information System (INIS)

    Koffman, L; Patricia Lee, P; Jim Cook, J; Elmer Wilhite, E

    2007-01-01

    The Environmental Analysis and Performance Modeling group of Savannah River National Laboratory (SRNL) conducts performance assessments of the Savannah River Site (SRS) low-level waste facilities to meet the requirements of DOE Order 435.1. These performance assessments, which result in limits on the amounts of radiological substances that can be placed in the waste disposal facilities, consider numerous potential exposure pathways that could occur in the future. One set of exposure scenarios, known as inadvertent intruder analysis, considers the impact on hypothetical individuals who are assumed to inadvertently intrude onto the waste disposal site. Inadvertent intruder analysis considers three distinct scenarios for exposure referred to as the agriculture scenario, the resident scenario, and the post-drilling scenario. Each of these scenarios has specific exposure pathways that contribute to the overall dose for the scenario. For the inadvertent intruder analysis, the calculation of dose for the exposure pathways is a relatively straightforward algebraic calculation that utilizes dose conversion factors. Prior to 2004, these calculations were performed using an Excel spreadsheet. However, design checks of the spreadsheet calculations revealed that errors could be introduced inadvertently when copying spreadsheet formulas cell by cell and finding these errors was tedious and time consuming. This weakness led to the specification of functional requirements to create a software application that would automate the calculations for inadvertent intruder analysis using a controlled source of input parameters. This software application, named the Automated Inadvertent Intruder Application, has undergone rigorous testing of the internal calculations and meets software QA requirements. The Automated Inadvertent Intruder Application was intended to replace the previous spreadsheet analyses with an automated application that was verified to produce the same calculations and

  3. Inadvertent Intruder Analysis For The Portsmouth On-Site Waste Disposal Facility (OSWDF)

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Frank G. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Phifer, Mark A. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2014-01-22

    The inadvertent intruder analysis considers the radiological impacts to hypothetical persons who are assumed to inadvertently intrude on the Portsmouth OSWDF site after institutional control ceases 100 years after site closure. For the purposes of this analysis, we assume that the waste disposal in the OSWDF occurs at time zero, the site is under institutional control for the next 100 years, and inadvertent intrusion can occur over the following 1,000 year time period. Disposal of low-level radioactive waste in the OSWDF must meet a requirement to assess impacts on such individuals, and demonstrate that the effective dose equivalent to an intruder would not likely exceed 100 mrem per year for scenarios involving continuous exposure (i.e. chronic) or 500 mrem for scenarios involving a single acute exposure. The focus in development of exposure scenarios for inadvertent intruders was on selecting reasonable events that may occur, giving consideration to regional customs and construction practices. An important assumption in all scenarios is that an intruder has no prior knowledge of the existence of a waste disposal facility at the site. Results of the analysis show that a hypothetical inadvertent intruder at the OSWDF who, in the worst case scenario, resides on the site and consumes vegetables from a garden established on the site using contaminated soil (chronic agriculture scenario) would receive a maximum chronic dose of approximately 7.0 mrem/yr during the 1000 year period of assessment. This dose falls well below the DOE chronic dose limit of 100 mrem/yr. Results of the analysis also showed that a hypothetical inadvertent intruder at the OSWDF who, in the worst case scenario, excavates a basement in the soil that reaches the waste (acute basement construction scenario) would receive a maximum acute dose of approximately 0.25 mrem/yr during the 1000 year period of assessment. This dose falls well below the DOE acute dose limit of 500 mrem/yr. Disposal inventory

  4. Potential impact of DOE's performance objective for protection of inadvertent intruders on low-level waste disposals at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1993-01-01

    Performance objectives for disposal of low-level radioactive waste at Department of Energy (DOE) sites include limits on radiation dose to inadvertent intruders. This paper investigates the potential impact of DOE's performance objective for protection of inadvertent intruders on the acceptability of low-level waste disposals at Oak Ridge National Laboratory (ORNL). The analysis is based on waste volumes and radionuclide inventories for recent disposals and estimated doses to an inadvertent intruder for assumed exposure scenarios. The analysis indicates that more than 99% of the total volume of waste in recent disposals meets the performance objective for inadvertent intruders, and the volume of waste found to be unacceptable for disposal is only about 16 m 3 . Therefore, DOE's performance objective for protection of inadvertent intruders probably will not have unreasonably adverse impacts on acceptable waste disposals at ORNL

  5. Potential impact of DOE's performance objective for protection of inadvertent intruders on low-level waste disposals at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1992-01-01

    The Department of Energy's Order 5820.2A, Chapter III, specifies performance objectives for disposal of low-level radioactive waste which include limits on effective dose equivalent for inadvertent intruders. This paper investigates the potential impact of the performance objective for protection of inadvertent intruders on the acceptability of waste disposals in Solid Waste Storage Area (SWSA) 6 at Oak Ridge National Laboratory (ORNL). The analysis is based on radionuclide inventories and waste volumes for recent disposals in SWSA 6 and calculated doses to an inadvertent intruder per unit concentration of radionuclides in disposed waste for assumed exposure scenarios

  6. A proposed alternative approach for protection of inadvertent human intruders from buried Department of Energy low level radioactive wastes

    International Nuclear Information System (INIS)

    Cochran, J.R.

    1995-01-01

    The burial of radioactive wastes creates a legacy. To limit the impact of this legacy on future generations, we establish and comply with performance objectives. This paper reviews performance objectives for the long-term isolation of buried radioactive wastes; identifies regulatorly-defined performance objectives for protecting the inadvertent human intruder (IHI) from buried low-level radioactive waste (LLW); (3) discusses a shortcoming of the current approach; and (4) offers an alternative approach for protecting the IHI. This alternative approach is written specifically for the burial of US Department of Energy (DOE) wastes at the Nevada Test Site (NTS), although the approach might be applied at other DOE burial sites

  7. Tracking intruder states

    Energy Technology Data Exchange (ETDEWEB)

    Riedinger, L L; Mueller, W F; Yu, C H [Tennessee Univ., Knoxville, TN (United States). Dept. of Physics

    1992-08-01

    The deformation-driving effects of intruder states are studied by analysis of various types of data on rotational bands in rare-earth deformed nuclei. The sensitivity of four measurables (bandhead energy, B(E2) value, neutron i{sub 13/2} crossing frequency, and signature splitting) to increased deformation in an intruder band is shown. The analysis of signature splitting systematics is extended to known superdeformed bands. (author). 22 refs., 5 figs.

  8. Lazy Mobile Intruders

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis

    We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching...... that by communication, the malicious code can learn new information that it can use in subsequent operations, or that we may have several pieces of malicious code that can exchange information if they \\meet". To formalize both the platform and the malicious code we use the mobile ambient calculus, since it provides...... a small, abstract formalism that models the essence of mobile code. We provide a decision procedure for security against arbitrary intruder ambients when the honest ambients can only perform a bounded number of steps and without path constraints in communication....

  9. Lazy Mobile Intruders

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis

    2013-01-01

    We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching...... that by communication, the malicious code can learn new information that it can use in subsequent operations, or that we may have several pieces of malicious code that can exchange information if they “meet”. To formalize both the platform and the malicious code we use the mobile ambient calculus, since it provides...... a small, abstract formalism that models the essence of mobile code. We provide a decision procedure for security against arbitrary intruder processes when the honest processes can only perform a bounded number of steps and without path constraints in communication. We show that this problem is NP-complete....

  10. Firewater system inadvertent actuation frequencies

    International Nuclear Information System (INIS)

    Schroeder, J.A.; Eide, S.A.

    1993-01-01

    This paper presents some recommended generic values for fire protection system inadvertent actuation frequencies. The frequencies are based on actual data from Department of Energy and commercial reactor plant facilities

  11. Compensated intruder-detection systems

    Science.gov (United States)

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  12. Intruder states and low energy nuclear spectroscopy

    International Nuclear Information System (INIS)

    Bengtsson, R.

    1991-01-01

    The crucial role intruder orbitals play is not limited to low spin and small deformations. In fact much of the physics at superdeformed shapes and at very high spin is a direct result of the presence of high-j intruder orbitals in the vicinity of the Fermi surface, including the introduction of intruder orbitals from still higher shells at extreme deformations. Since the intruder subshell has a larger angular momentum (j) than any other subshell close to the Fermi surface it plays an essential role for building up angular momentum in the nucleus, and the alignment of intruder shell (quasi) particles is responsible for a large variety of bandcrossings observed in discrete spectroscopy along or near the yrast line. Intruder shell orbitals are also associated with large quadrupole moments and the occupation of these orbitals may lead to significant changes of the deformation of the nucleus. Under favorable circumstances a nucleus may have totally different shapes depending on the occupation of the intruder orbitals, giving rise to a phenomenon which is usually referred to as shape coexistence. In this paper, shape coexistence in several mass regions will be discussed with specific attention focused on the relation between shape coexistence and the occupation of intruder shell levels. Shape effects associated both with spin aligned and non-aligned intruder orbitals will be investigated

  13. Energy-efficient area coverage for intruder detection in sensor networks

    CERN Document Server

    He, Shibo; Li, Junkun

    2014-01-01

    This Springer Brief presents recent research results on area coverage for intruder detection from an energy-efficient perspective. These results cover a variety of topics, including environmental surveillance and security monitoring. The authors also provide the background and range of applications for area coverage and elaborate on system models such as the formal definition of area coverage and sensing models. Several chapters focus on energy-efficient intruder detection and intruder trapping under the well-known binary sensing model, along with intruder trapping under the probabilistic sens

  14. Intruder scenarios for site-specific waste classification

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.

    1988-01-01

    The US Department of Energy (DOE) is currently revising its low-level radioactive waste (LLW) management requirements and guidelines for waste generated at its facilities that support defense missions. Specifically, draft DOE 5820.2A, Chapter 3, describes the purpose, policy, and requirements necessary for the management of defense LLW. The draft DOE policy calls for DOE LLW operations to be managed to protect the health and safety of the public, preserve the environment, and ensure that no remedial action will be necessary after termination of operations. The requirements and guidelines apply to radioactive wastes but are also intended to apply to mixed hazardous and radioactive wastes as defined in draft DOE 5400.5, Hazardous and Radioactive Mixed Waste. The basic approach used by DOE is to establish overall performance objectives in terms of ground-water protection and public radiation dose limits and to require site-specific performance assessments to determine compliance. As a result of these performance assessments, each site shall develop waste acceptance criteria that define the allowable quantities and concentrations of specific radioisotopes. Additional limitations on waste disposal design, waste form, and waste treatment shall also be developed on a site-specific basis. As a key step in the site-specific performance assessments, an evaluation must be conducted of potential radiation doses to intruders who may inadvertently move onto a closed DOE LLW disposal site after loss of institutional controls must be conducted. This paper describes the types of intruder scenarios that should be considered when performing this step of the site-specific performance assessment

  15. Reorganization of intruder Using Ad-Hoc Network And RFID

    Directory of Open Access Journals (Sweden)

    Vishakha Hagawane

    2014-05-01

    Full Text Available This system is to develop a centralized computer application that needs to identify moving person in a specific area using wireless network. In this paper, we develop a new indoor tracking algorithm using received signal strength. The RFID is able to detect the humans and provide information about the direction of the movement. The gathered information from the node is to be given to the base station for processing. . This application is able to detect and track person, and report direction of the intruder to a central base station. In this system we design nodes through which we are able to track the person. The human intruder is detected using Zigbee.

  16. Human intruder dose assessment for deep geological disposal

    International Nuclear Information System (INIS)

    Smith, G. M.; Molinero, J.; Delos, A.; Valls, A.; Conesa, A.; Smith, K.; Hjerpe, T.

    2013-07-01

    For near-surface disposal, approaches to assessment of inadvertent human intrusion have been developed through international cooperation within the IAEA's ISAM programme. Other assessments have considered intrusion into deep geological disposal facilities, but comparable international cooperation to develop an approach for deep disposal has not taken place. Accordingly, the BIOPROTA collaboration project presented here (1) examined the technical aspects of why and how deep geological intrusion might occur; (2) considered how and to what degree radiation exposure would arise to the people involved in such intrusion; (3) identified the processes which constrain the uncertainties; and hence (4) developed and documented an approach for evaluation of human intruder doses which addresses the criteria adopted by the IAEA and takes account of other international guidance and human intrusion assessment experience. Models for radiation exposure of the drilling workers and geologists were developed and described together with compilation of relevant input data, taking into account relevant combinations of drilling technique, geological formation and repository material. Consideration has been given also to others who might be exposed to contaminated material left at the site after drilling work has ceased. The models have been designed to be simple and stylised, in accordance with international recommendations. The set of combinations comprises 58 different scenarios which cover a very wide range of human intrusion possibilities via deep drilling. (orig.)

  17. Design and Implementation of an Embedded Smart Intruder Surveillance System

    Directory of Open Access Journals (Sweden)

    Sabri Naseer

    2018-01-01

    Full Text Available Remote and scattered valuable and sensitive locations such as labs and offices inside university campus need efficient monitoring and warning system. As well as scattered area and belonging. This research presents a Real-Time intruder Surveillance System based on a single board computer (SBC. Thus the design and development of a cost effective surveillance management system based SBC that can be deployed efficiently in remote and scattered locations such as universities belonging. The fusion of embedded Python codes with SBC that attached to cameras, Long distance sensors, alerting circuitry and wireless module presents a novel integration based effective cost solution and enhances SBC of much flexibility of improvement and development for pervasive remote locations. The system proves the high integrity of smooth working with web application, it’s cost effective and thus can be deployed as many of units to seize and concisely covered remote and scattered area as well as university belonging and departments. The system can be administrated by a remote user sparsely or geographically away from any networked workstation. The proposed solution offers efficient stand alone, flexibility to upgrade and cheap development and installation as well as cost effective ubiquitous surveillance solution. In conclusion, the system acceptable boundaries of successful intruder recognition and warning alert are computed between 1m and 3m distance of intruder from system camera. Recognition rate of 95% and 83% are achieved and the successful warning alert were in the range of 86-97%.

  18. Exploring key considerations when determining bona fide inadvertent errors resulting in understatements

    Directory of Open Access Journals (Sweden)

    Chrizanne de Villiers

    2016-03-01

    Full Text Available Chapter 16 of the Tax Administration Act (28 of 2011 (the TA Act deals with understatement penalties. In the event of an ‘understatement’, in terms of Section 222 of the TA Act, a taxpayer must pay an understatement penalty, unless the understatement results from a bona fide inadvertent error. The determining of a bona fide inadvertent error on taxpayers’ returns is a totally new concept in the tax fraternity. It is of utmost importance that this section is applied correctly based on sound evaluation principles and not on professional judgement when determining if the error was indeed the result of a bona fide inadvertent error. This research study focuses on exploring key considerations when determining bona fide inadvertent errors resulting in understatements. The role and importance of tax penalty provisions is explored and the meaning of the different components in the term ‘bona fide inadvertent error’ critically analysed with the purpose to find a possible definition for the term ‘bona fide inadvertent error’. The study also compares the provisions of other tax jurisdictions with regards to errors made resulting in tax understatements in order to find possible guidelines on the application of bona fide inadvertent errors as contained in Section 222 of the TA Act. The findings of the research study revealed that the term ‘bona fide inadvertent error’ contained in Section 222 of the TA Act should be defined urgently and that guidelines must be provided by SARS on the application of the new amendment. SARS should also clarify the application of a bona fide inadvertent error in light of the behaviours contained in Section 223 of the TA Act to avoid any confusion.

  19. The adverse effects of inadvertent intraoperative intravenous ...

    African Journals Online (AJOL)

    Inadvertent intravenous injection of 1% phenylephrine (10 mg) induced severe hypertension and tachycardia in a previously healthy female patient undergoing elective gynaecological surgery. This medical error was investigated using the criticalincident technique that is available in our department. This case report ...

  20. Detection of Intelligent Intruders in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yun Wang

    2016-01-01

    Full Text Available Most of the existing research works on the intrusion detection problem in a wireless sensor network (WSN assume linear or random mobility patterns in abstracting intruders’ models in traversing the WSN field. However, in real-life WSN applications, an intruder is usually an intelligent mobile robot with environment learning and detection avoidance capability (i.e., the capability to avoid surrounding sensors. Due to this, the literature results based on the linear or random mobility models may not be applied to the real-life WSN design and deployment for efficient and effective intrusion detection in practice. This motivates us to investigate the impact of intruder’s intelligence on the intrusion detection problem in a WSN for various applications. To be specific, we propose two intrusion algorithms, the pinball and flood-fill algorithms, to mimic the intelligent motion and behaviors of a mobile intruder in detecting and circumventing nearby sensors for detection avoidance while heading for its destination. The two proposed algorithms are integrated into a WSN framework for intrusion detection analysis in various circumstances. Monte Carlo simulations are conducted, and the results indicate that: (1 the performance of a WSN drastically changes as a result of the intruder’s intelligence in avoiding sensor detections and intrusion algorithms; (2 network parameters, including node density, sensing range and communication range, play a crucial part in the effectiveness of the intruder’s intrusion algorithms; and (3 it is imperative to integrate intruder’s intelligence in the WSN research for intruder detection problems under various application circumstances.

  1. Intruder bands in Z = 51 nuclei

    International Nuclear Information System (INIS)

    LaFosse, D.R.

    1993-01-01

    Recent investigations of h 11/2 proton intruder bands in odd 51 Sb nuclei are reported. In addition to experiments performed at SUNY Stony Brook and Chalk River, data from Early Implementation of GAMMASPHERE (analysis in progress) are presented. In particular, the nuclei 109 Sb and 111 Sb are discussed. Rotational bands based on the πh 11/2 orbital coupled to a 2p2h deformed state of the 50 Sn core have been observed. These bands have been observed to high spin, and in the case of 109 Sb to a rotational frequency of 1.4 MeV, the highest frequency observed in a heavy nucleus. The dynamic moments of inertia in these bands decrease slowly with frequency, suggesting a gradual band termination. The systematics of such bands in 109-119 Sb will be discussed

  2. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    Energy Technology Data Exchange (ETDEWEB)

    Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

  3. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Trauth, K.M.; Hora, S.C.; Guzowski, R.V.

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation

  4. Mitigating Inadvertent Insider Threats with Incentives

    Science.gov (United States)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  5. Intruder level and deformation in SD-pair shell model

    International Nuclear Information System (INIS)

    Luo Yan'an; Ning Pingzhi; Pan Feng

    2004-01-01

    The influence of intruder level on nuclear deformation is studied within the framework of the nucleon-pair shell model truncated to an SD-pair subspace. The results suggest that the intruder level has a tendency to reduce the deformation and plays an important role in determining the onset of rotational behavior. (authors)

  6. The behaviour of free-flowing granular intruders

    Directory of Open Access Journals (Sweden)

    Wyburn Edward

    2017-01-01

    Full Text Available Particle shape affects both the quasi-static and dynamic behaviour of granular media. There has been significant research devoted to the flowability of systems of irregularly shaped particles, as well as the flow of grains around fixed intruders, however the behaviour of free flowing intruders within granular flows remains comparatively unexplored. Here, the effect of the shape of these intruder particles is studied, looking at the kinematic behaviour of the intruders and in particular their tendency of orientation. Experiments are carried out within the Stadium Shear Device, which is a novel apparatus able to continuously apply simple shear conditions to two-dimensional grain analogues. It is found that the intruder shows different behaviour to that of the bulk flow, and that this behaviour is strongly shape dependent. These insights could lead to the development of admixtures that alter the flowability of granular materials.

  7. Study of intruder band in 112Sn

    International Nuclear Information System (INIS)

    Ganguly, S.; Banerjee, P.; Ray, I.; Kshetri, R.; Raut, R.; Bhattacharya, S.; Saha-Sarkar, M.; Goswami, A.; Mukhopadhyay, S.; Mukherjee, A.; Mukherjee, G.; Basu, S.K.

    2007-01-01

    Excited states of the positive-parity intruder band in 112 Sn, populated in the 100 Mo( 20 Ne,α4n) reaction at a beam energy of 136 MeV, have been studied. The band has been observed up to 11570.0 keV with spin (24 + ). Mean lifetimes have been measured for six states up to the 22 + , 10335.1 keV level and an upper limit of the lifetime has been estimated for the 11570.0 keV (24 + ) state. The B(E2) values, derived from the present lifetime results, correspond to a moderate quadrupole deformation of β 2 ∼0.18 for states with spin J π >=12 + , and the decrease in B(E2) for the 14 + ->12 + transition is consistent with a ν(h 11/2 ) 2 alignment at ω∼0.35 MeV, predicted by a cranked shell-model calculation. Total Routhian surface calculations predict a triaxial shape following the alignment

  8. On the submerging of a spherical intruder into granular beds

    Directory of Open Access Journals (Sweden)

    Wu Chuan-Yu

    2017-01-01

    Full Text Available Granular materials are complex systems and their mechanical behaviours are determined by the material properties of individual particles, the interaction between particles and the surrounding media, which are still incompletely understood. Using an advanced discrete element method (DEM, we simulate the submerging process of a spherical projectile (an intruder into granular materials of various properties with a zero penetration velocity (i.e. the intruder is touching the top surface of the granular bed and released from stationary and examine its settling behaviour. By systematically changing the density and size of the intruder and the particle density (i.e. the density of the particles in the granular bed, we find that the intruder can sink deep into the granular bed even with a zero penetration velocity. Furthermore, we confirm that under certain conditions the granular bed can behave like a Newtonian liquid and the submerging intruder can reach a constant velocity, i.e. the terminal velocity, identical to the settling of a sphere in a liquid, as observed experimentally. A mathematical model is also developed to predict the maximum penetration depth of the intruder. The model predictions are compared with experimental data reported in the literature,good agreement was obtained, demonstrating the model can accurately predict the submerging behaviour of the intruder in the granular media.

  9. Inadvertent pump start with gas expansion modules

    International Nuclear Information System (INIS)

    Campbell, L.R.; Harris, R.A.; Heard, F.J.; Dautel, W.A.

    1992-01-01

    Previous testing demonstrated the effectiveness of gas expansion modules (GEMs) in mitigating the consequences of a loss-of-flow-without-scram transient in Fast Flux Test Facility (FFTF)-sized sodium cooled cores. As a result, GEMs have been included in the advance liquid-metal reactor (PRISM) design project sponsored by the US Department of Energy. The PRISM design is under review at the US Nuclear Regulatory Commission for licensability. In the unlikely event that the reactor does not scram during a loss of low, the GEMs quickly insert sufficient negative reactivity to limit fuel and cladding temperatures to acceptable values. This is the positive benefit of the GEMs; however, the reverse situation must be considered. A primary pump could be inadvertently started from near-critical conditions resulting in a positive reactivity insertion and a power transient. One mitigating aspect of this event is that as the reactivity associated with the GEMs is inserted, the increasing flow increases core cooling. A test was conducted in the FFTF to demonstrate that the GEM and feedback reactivity are well predicted following pump start, and the reactivity transient is benign

  10. APPROACH TO SYNTHESIS OF PASSIVE INFRARED DETECTORS BASED ON QUASI-POINT MODEL OF QUALIFIED INTRUDER

    Directory of Open Access Journals (Sweden)

    I. V. Bilizhenko

    2017-01-01

    Full Text Available Subject of Research. The paper deals with synthesis of passive infra red (PIR detectors with enhanced detection capability of qualified intruder who uses different types of detection countermeasures: the choice of specific movement direction and disguise in infrared band. Methods. We propose an approach based on quasi-point model of qualified intruder. It includes: separation of model priority parameters, formation of partial detection patterns adapted to those parameters and multi channel signal processing. Main Results. Quasi-pointmodel of qualified intruder consisting of different fragments was suggested. Power density difference was used for model parameters estimation. Criteria were formulated for detection pattern parameters choice on the basis of model parameters. Pyroelectric sensor with nine sensitive elements was applied for increasing the signal information content. Multi-channel processing with multiple partial detection patterns was proposed optimized for detection of intruder's specific movement direction. Practical Relevance. Developed functional device diagram can be realized both by hardware and software and is applicable as one of detection channels for dual technology passive infrared and microwave detectors.

  11. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  12. Description of intruded states in a weak-coupling basis

    International Nuclear Information System (INIS)

    Arenas Peris, G.E.

    1989-01-01

    The systematics of intruder states is described in terms of a particle-hole weak-coupling basis, the first-order correction being then reduced to the monopole component of the interaction. The necessary matrix elements can be obtained from experimental data by using a model-consistent method. Calculations are performed for intruder states in the lead region as well as for the Zr isotopes. The agreement with the experimental data is striking in both cases. (Author) [es

  13. Optimizing the Configuration of Sensor Networks to Detect Intruders.

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Nathanael J. K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nozick, Linda Karen [Cornell Univ., Ithaca, NY (United States); Xu, Ningxiong [Cornell Univ., Ithaca, NY (United States)

    2015-03-01

    This paper focuses on optimizing the selection and configuration of detection technologies to protect a target of interest. The ability of an intruder to simply reach the target is assumed to be sufficient to consider the security system a failure. To address this problem, we develop a game theoretic model of the strategic interactions between the system owner and a knowledgeable intruder. A decomposition-based exact method is used to solve the resultant model.

  14. Interventions for treating inadvertent postoperative hypothermia.

    Science.gov (United States)

    Warttig, Sheryl; Alderson, Phil; Campbell, Gillian; Smith, Andrew F

    2014-11-20

    Inadvertent postoperative hypothermia (a drop in core body temperature to below 36°C) occurs as an effect of surgery when anaesthetic drugs and exposure of the skin for long periods of time during surgery result in interference with normal temperature regulation. Once hypothermia has occurred, it is important that patients are rewarmed promptly to minimise potential complications. Several different interventions are available for rewarming patients. To estimate the effectiveness of treating inadvertent perioperative hypothermia through postoperative interventions to decrease heat loss and apply passive and active warming systems in adult patients who have undergone surgery. We searched the Cochrane Central Register of Controlled Trials (CENTRAL) (2014, Issue 2), MEDLINE (Ovid SP) (1956 to 21 February 2014), EMBASE (Ovid SP) (1982 to 21 February 2014), the Institute for Scientific Information (ISI) Web of Science (1950 to 21 February 2014) and the Cumulative Index to Nursing and Allied Health Literature (CINAHL), EBSCO host (1980 to 21 February 2014), as well as reference lists of articles. We also searched www.controlled-trials.com and www.clincialtrials.gov. Randomized controlled trials of postoperative warming interventions aiming to reverse hypothermia compared with control or with each other. Three review authors identified studies for inclusion in this review. One review author extracted data and completed risk of bias assessments; two review authors checked the details. Meta-analysis was conducted when appropriate by using standard methodological procedures as expected by The Cochrane Collaboration. We included 11 trials with 699 participants. Ten trials provided data for analysis. Trials varied in the numbers and types of participants included and in the types of surgery performed. Most trials were at high or unclear risk of bias because of inappropriate or unclear randomization procedures, and because blinding of assessors and participants generally was

  15. Intruder states at the N=20 shell closure

    International Nuclear Information System (INIS)

    Heyde, K.

    1991-01-01

    It is indicated that mp-mh (multiple) excitations across closed shells can occur at low energy throughout the nuclear mass region. Besides the 4p-4h, 8p-8h configurations, that are deformed, coexisting low-lying excitations are mainly observed for light N=Z nuclei. A new class of 2p-2h intruder O + state is shown to exist in nuclei where a neutron excess is present. In the latter cases, the proton-neutron interaction energy between the excited 2p-2h configuration and the open shell accounts for a very specific mass dependence in the intruder excitation energy. The experimental evidence that corroborates the idea of intruder states will be given. (G.P.) 28 refs.; 13 figs

  16. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  17. The Star Wars Kid and the Bedroom Intruder

    DEFF Research Database (Denmark)

    Christensen, Jørgen Riber

    2011-01-01

    Jørgen Riber Christensen's article Star Wars Kid and the Bedroom Intruder looks at how people may unexpectedly become icons of the Internet, through a transgression of the private sphere. Surveillance and celebrity is revealed to be bound together with a disciplinary effect, at the same time...

  18. Inadvertent presence of genetically modified elements in maize food ...

    African Journals Online (AJOL)

    Kenya has a biosafety law and has tested genetically modified (GM) maize under confinement and containment, but has neither released nor commercialized any GM crop. This study assessed various maize food products from the Kenyan farms and markets for the inadvertent presence of GMOs. It assessed the possibility ...

  19. Preventing Inadvertent Placement of Foley Catheter into Prostatic ...

    African Journals Online (AJOL)

    Percutaneous suprapubic trocar cystostomy (SPC) is often needed to drain the bladder when urethral catheterization either fails or is not advisable.[1] It is ... vertical or slightly tilting its tip toward umbilicus during foley placement, prevents the inadvertent migration of catheter into prostatic urethra and further complications.

  20. Managing Inadvertent Arterial Catheterization During Central Venous Access Procedures

    International Nuclear Information System (INIS)

    Nicholson, Tony; Ettles, Duncan; Robinson, Graham

    2004-01-01

    Purpose: Approximately 200,000 central venous catheterizations are carried out annually in the National Health Service in the United Kingdom. Inadvertent arterial puncture occurs in up to 3.7%. Significant morbidity and death has been reported. We report on our experience in the endovascular treatment of this iatrogenic complication. Methods: Retrospective analysis was carried out of 9 cases referred for endovascular treatment of inadvertent arterial puncture during central venous catheterization over a 5 year period. Results: It was not possible to obtain accurate figures on the numbers of central venous catheterizations carried out during the time period. Five patients were referred with carotid or subclavian pseudoaneurysms and hemothorax following inadvertent arterial catheter insertion and subsequent removal. These patients all underwent percutaneous balloon tamponade and/or stent-graft insertion. More recently 4 patients were referred with the catheter still in situ and were successfully treated with a percutaneous closure device. Conclusion: If inadvertent arterial catheterization during central venous access procedures is recognized and catheters removed, sequelae can be treated percutaneously. However, once the complication is recognized it is better to leave the catheter in situ and seal the artery percutaneously with a closure device

  1. Low Cost Night Vision System for Intruder Detection

    Science.gov (United States)

    Ng, Liang S.; Yusoff, Wan Azhar Wan; R, Dhinesh; Sak, J. S.

    2016-02-01

    The growth in production of Android devices has resulted in greater functionalities as well as lower costs. This has made previously more expensive systems such as night vision affordable for more businesses and end users. We designed and implemented robust and low cost night vision systems based on red-green-blue (RGB) colour histogram for a static camera as well as a camera on an unmanned aerial vehicle (UAV), using OpenCV library on Intel compatible notebook computers, running Ubuntu Linux operating system, with less than 8GB of RAM. They were tested against human intruders under low light conditions (indoor, outdoor, night time) and were shown to have successfully detected the intruders.

  2. Sexual aggression by intruders in hooded crow Corvus cornix

    OpenAIRE

    Zduniak, Piotr; Kosicki, Jakub Z.; Yosef, Reuven

    2015-01-01

    The hooded crow Corvus cornix is a west Palaearctic, solitary nesting, monogamous corvid. In the breeding season, populations are characterized by a social organization wherein breeding pairs are territorial and non-breeding individuals, called floaters, live in flocks. During a study of the breeding ecology of the hooded crow, conducted in a protected flooded area, we monitored nests with video cameras. We recorded two separate incidents when intruders attacked a female at the nest. We belie...

  3. Closure Using a Surgical Closure Device of Inadvertent Subclavian Artery Punctures During Central Venous Catheter Placement

    International Nuclear Information System (INIS)

    Berlet, Matthew H.; Steffen, Diana; Shaughness, George; Hanner, James

    2001-01-01

    Severe complications can and do occur when central venous catheters are inadvertently placed into subclavian arteries. Two cases are discussed that describe how these inadvertent arterial punctures can be closed using the Perclose device (Abbott Laboratories, Redwood City, CA, USA)

  4. Analysis of inadvertent containment spray actuation for NPP Krsko

    International Nuclear Information System (INIS)

    Grgic, D.; Spalj, S.; Fancev, T.

    2000-01-01

    Refueling Water Storage Tank (RWST) supplies borated water to the Chemical and Volume Control System, Emergency Core Cooling System and Containment Spray System. In the analyses of the containment external pressure the spray temperature is assumed to be equal to the RWST lower temperature limit. This value ensures that the design negative containment pressure will not be exceeded in the event of inadvertent actuation of the Containment Spray. For NPP Kriko the negative containment pressure has to be kept below 0.1 kp/cm2 to avoid the loss of containment integrity. This paper pursuents the analysis of Inadvertent Containment Spray Actuation in order to check the influence of change in RWST water temperature on containment negative pressure. GOTHIC computer code was used for calculation of containment thermal hydraulic behavior during this accident. (author)

  5. Probability of inadvertent operation of electrical components in harsh environments

    International Nuclear Information System (INIS)

    Knoll, A.

    1989-01-01

    Harsh environment, which means humidity and high temperature, may and will affect unsealed electrical components by causing leakage ground currents in ungrounded direct current systems. The concern in a nuclear power plant is that such harsh environment conditions could cause inadvertent operation of normally deenergized components, which may have a safety-related isolation function. Harsh environment is a common cause failure, and one way to approach the problem is to assume that all the unsealed electrical components will simultaneously and inadvertently energize as a result of the environmental common cause failure. This assumption is unrealistically conservative. Test results indicated that insulating resistences of any terminal block in harsh environments have a random distribution in the range of 1 to 270 kΩ, with a mean value ∼59 kΩ. The objective of this paper is to evaluate a realistic conditional failure probability for inadvertent operation of electrical components in harsh environments. This value will be used thereafter in probabilistic safety evaluations of harsh environment events and will replace both the overconservative common cause probability of 1 and the random failure probability used for mild environments

  6. Oblate deformation and intruder configuration in 194,195Bi

    International Nuclear Information System (INIS)

    Mukherjee, G.; Banerjee, K.; Banerjee, S.R.; Basu, S.K.; Bhattacharya, C.; Bhattacharya, S.; Bhattacharya, Srijit; Bhattacharjee, T.; Chanda, S.; Dey, A.; Gupta, D.; Meena, J.K.; Mukhopadhyay, S.; Rana, T.K.; Bhattacharya, Sudeb; Ganguly, S.; Goswami, A.; Kshetri, R.; Pradhan, M.K.; Raut, R.; Dey, G.

    2006-01-01

    The experimental information on 194,195 Bi are very scarce compared to its neighbouring isotopes. Only 6 levels above the ground state band of 195 Bi, based on 9/2, are known with tentative spin parity assignments. Only two low energy gamma rays above the 10 isomeric state are known in 194 Bi. It is interesting not only to extend the presently known bands to higher spins, beyond band crossing but also to search for the intruder quasiparticle configurations to get a clear idea about the structure of these nuclei

  7. Localization Capability of Cooperative Anti-Intruder Radar Systems

    Directory of Open Access Journals (Sweden)

    Mauro Montanari

    2008-06-01

    Full Text Available System aspects of an anti-intruder multistatic radar based on impulse radio ultrawideband (UWB technology are addressed. The investigated system is composed of one transmitting node and at least three receiving nodes, positioned in the surveillance area with the aim of detecting and locating a human intruder (target that moves inside the area. Such systems, referred to also as UWB radar sensor networks, must satisfy severe power constraints worldwide imposed by, for example, the Federal Communications Commission (FCC and by the European Commission (EC power spectral density masks. A single transmitter-receiver pair (bistatic radar is considered at first. Given the available transmitted power and the capability of the receiving node to resolve the UWB pulses in the time domain, the surveillance area regions where the target is detectable, and those where it is not, are obtained. Moreover, the range estimation error for the transmitter-receiver pair is discussed. By employing this analysis, a multistatic system is then considered, composed of one transmitter and three or four cooperating receivers. For this multistatic system, the impact of the nodes location on area coverage, necessary transmitted power and localization uncertainty is studied, assuming a circular surveillance area. It is highlighted how area coverage and transmitted power, on one side, and localization uncertainty, on the other side, require opposite criteria of nodes placement. Consequently, the need for a system compromising between these factors is shown. Finally, a simple and effective criterion for placing the transmitter and the receivers is drawn.

  8. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Science.gov (United States)

    Sequeira, Ana F.; Cardoso, Jaime S.

    2015-01-01

    Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system. PMID:26102491

  9. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Directory of Open Access Journals (Sweden)

    Ana F. Sequeira

    2015-06-01

    Full Text Available Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.

  10. Sexual aggression by intruders in hooded crow Corvus cornix.

    Science.gov (United States)

    Zduniak, Piotr; Kosicki, Jakub Z; Yosef, Reuven

    The hooded crow Corvus cornix is a west Palaearctic, solitary nesting, monogamous corvid. In the breeding season, populations are characterized by a social organization wherein breeding pairs are territorial and non-breeding individuals, called floaters, live in flocks. During a study of the breeding ecology of the hooded crow, conducted in a protected flooded area, we monitored nests with video cameras. We recorded two separate incidents when intruders attacked a female at the nest. We believe that she remained in the nest in order to prevent the strangers cannibalizing the nestlings by mantling over the brood. The spatio-temporal occurrence of these attacks suggests that the observed behaviour is intraspecific sexual aggression wherein non-breeding males mounted an immobilized female.

  11. Intelligent Machine Vision for Automated Fence Intruder Detection Using Self-organizing Map

    Directory of Open Access Journals (Sweden)

    Veldin A. Talorete Jr.

    2017-03-01

    Full Text Available This paper presents an intelligent machine vision for automated fence intruder detection. A series of still captured images that contain fence events using Internet Protocol cameras was used as input data to the system. Two classifiers were used; the first is to classify human posture and the second one will classify intruder location. The system classifiers were implemented using Self-Organizing Map after the implementation of several image segmentation processes. The human posture classifier is in charge of classifying the detected subject’s posture patterns from subject’s silhouette. Moreover, the Intruder Localization Classifier is in charge of classifying the detected pattern’s location classifier will estimate the location of the intruder with respect to the fence using geometric feature from images as inputs. The system is capable of activating the alarm, display the actual image and depict the location of the intruder when an intruder is detected. In detecting intruder posture, the system’s success rate of 88%. Overall system accuracy for day-time intruder localization is 83% and an accuracy of 88% for night-time intruder localization

  12. Long-term captures of low-mass intruders by binary stars

    International Nuclear Information System (INIS)

    Hills, J.G.

    1983-01-01

    Intensive computer simulations were made of three families of encounters between a binary star and a low-mass intruder which previous work indicated have a high probability of producing long-lived triple-star systems. For comparison, a fourth family which produces few long-lived trinaries was also studied. In the first two families, the binary components are equally massive and the closest approach of the intruder to the center of mass of the binary is about two times its semimajor axis, a 0 . In Family 1, the orbit of the original binary is circular, e = 0, while in Family 2, e 0 = 0.95. In Family 3 one binary component is 100 times as massive as the other, the orbit is circular, and the low-mass intruder enters the binary at nearly zero impact parameter. The probability that the intruder is trapped for at least one revolution around the binary is 0.24, 0.46, and 0.51, respectively, for these three families of encounters. The fraction of the intruders surviving successive revolutions drops rapidly. However, one encounter in Family 1 and two in Family 3 resulted in the intruder making more than 300 revolutions around the inner binary before escaping. Some intruders remained bound for more than 20 000 revolutions of the inner binary. The longest duration captures occur when the intruder is thrown into an orbit with a very large semimajor axis. About 20% of the encounters in the three families result in the intruder being thrown into an orbit with a semimajor axis a>100 a 0 , while about 2% result in the intruder going into an orbit with a>1000 a 0 . Intruders thrown into these large semimajor axis orbits have the best chance of having their orbits stabilized by passing stars

  13. Study of intruder band in {sup 112}Sn

    Energy Technology Data Exchange (ETDEWEB)

    Ganguly, S. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Banerjee, P. [Saha Institute of Nuclear Physics, Kolkata 700064 (India)]. E-mail: polash.banerjee@saha.ac.in; Ray, I. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Kshetri, R. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Raut, R. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Bhattacharya, S. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Saha-Sarkar, M. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Goswami, A. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Mukhopadhyay, S. [UGC-DAE-CSR, Kolkata 700098 (India); Mukherjee, A. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Mukherjee, G. [Variable Energy Cyclotron Centre, Kolkata 700064 (India); Basu, S.K. [Variable Energy Cyclotron Centre, Kolkata 700064 (India)

    2007-06-01

    Excited states of the positive-parity intruder band in {sup 112}Sn, populated in the {sup 100}Mo({sup 20}Ne,{alpha}4n) reaction at a beam energy of 136 MeV, have been studied. The band has been observed up to 11570.0 keV with spin (24{sup +}). Mean lifetimes have been measured for six states up to the 22{sup +}, 10335.1 keV level and an upper limit of the lifetime has been estimated for the 11570.0 keV (24{sup +}) state. The B(E2) values, derived from the present lifetime results, correspond to a moderate quadrupole deformation of {beta}{sub 2}{approx}0.18 for states with spin J{sup {pi}}>=12{sup +}, and the decrease in B(E2) for the 14{sup +}->12{sup +} transition is consistent with a {nu}(h{sub 11/2}){sup 2} alignment at {omega}{approx}0.35 MeV, predicted by a cranked shell-model calculation. Total Routhian surface calculations predict a triaxial shape following the alignment.

  14. Evaluation of periodontal condition in intruded molars using miniscrews

    Directory of Open Access Journals (Sweden)

    Habib Ollah Ghanbari

    2015-12-01

    Full Text Available Introduction: The purpose of this preliminary study was to evaluate the periodontal condition of intruded molars in various phases of treatments. Methods: 30 patients with at least one overerupted upper first molar were selected. Upper molar bands with brackets were cemented. Two miniscrews were placed in the mesiopalatal and mesiobuccal aspect of the aforementioned teeth. A titanium molybdenum alloy (TMA spring was attached to the head of miniscrew in one end and ligated to the bracket in the other end to reach the predetermined force. Plaque index (PI, probing pocket depth (PPD, keratinized gingiva (KG, The distance between miniscrew (M.S and gingival level (GL, and bleeding on probing (BOP were recorded before loading and 1, 2, 3, 4 and 5 months post-loading .Results:  All patients completed the study and no complications were reported. Statistically significant intrusion (2.1 ± 0.9 mm was obtained during active treatment. Inserting miniscrews generally was presented with greater sulcus bleeding, plaque accumulation and plaque formation at follow-up visits. There was a statistically significant increase in PI, PPD and BOP indices. Furthermore, the results showed decrease in KG level and M.S to GL level. Conclusion: Miniscrews can provide a clinical benefit as an absolute anchorage device. However, keeping a good oral hygiene is essential to achieve ideal results, because the presence of miniscrews, as a foreign object in mouth, and intrusion force might be harmful for periodontal tissues

  15. The availability of soil-associated radionuclides for uptake after inadvertent ingestion by humans

    International Nuclear Information System (INIS)

    Shaw, S.; Green, N.

    2002-01-01

    Assessments of the radiological impact of radionuclides released into the environment generally take into account the inadvertent ingestion of radionuclides associated with soil or sediment. Such assessments often assume that gut uptake factors for radionuclides that are biologically incorporated in food are also applicable when the ingested activity is associated with soil. Studies of the availability of soil-associated radionuclides after ingestion have been mainly conducted on ruminant animals and few data exist for humans. The digestive tract of ruminants is totally different from that of a mono-gastric animal and so the availability estimated from the animal studies may not be valid in the case of man. A simple in-vitro enzymolysis procedure was therefore developed to simulate human digestion closely. The measured availability of 137 Cs, 241 Am, 239 PU and 90 Sr associated with loam, sand and peat soils was about 3%, 3%, 10% and 50% respectively. (author)

  16. Neonicotinoid insecticides can serve as inadvertent insect contraceptives

    Science.gov (United States)

    Villamar-Bouza, Laura; Bruckner, Selina; Chantawannakul, Panuwan; Gauthier, Laurent; Khongphinitbunjong, Kitiphong; Retschnig, Gina; Troxler, Aline; Vidondo, Beatriz; Neumann, Peter; Williams, Geoffrey R.

    2016-01-01

    There is clear evidence for sublethal effects of neonicotinoid insecticides on non-target ecosystem service-providing insects. However, their possible impact on male insect reproduction is currently unknown, despite the key role of sex. Here, we show that two neonicotinoids (4.5 ppb thiamethoxam and 1.5 ppb clothianidin) significantly reduce the reproductive capacity of male honeybees (drones), Apis mellifera. Drones were obtained from colonies exposed to the neonicotinoid insecticides or controls, and subsequently maintained in laboratory cages until they reached sexual maturity. While no significant effects were observed for male teneral (newly emerged adult) body mass and sperm quantity, the data clearly showed reduced drone lifespan, as well as reduced sperm viability (percentage living versus dead) and living sperm quantity by 39%. Our results demonstrate for the first time that neonicotinoid insecticides can negatively affect male insect reproductive capacity, and provide a possible mechanistic explanation for managed honeybee queen failure and wild insect pollinator decline. The widespread prophylactic use of neonicotinoids may have previously overlooked inadvertent contraceptive effects on non-target insects, thereby limiting conservation efforts. PMID:27466446

  17. Optimal Randomized Surveillance Patterns to Detect Intruders Approaching a Military Installation

    National Research Council Canada - National Science Library

    McLemore, Trevor D

    2007-01-01

    .... The intruder attempts to penetrate the military installation by choosing one of its many entry points, each of which is monitored by a surveillance camera and may require a different amount of time to transit...

  18. Towards a shell-model description of intruder states and the onset of deformation

    International Nuclear Information System (INIS)

    Heyde, K.; Van Isacker, P.; Casten, R.F.; Wood, J.L.

    1985-01-01

    Basing on the nuclear shell-model and concentrating on the monopole, pairing and quadrupole corrections originating from the nucleon-nucleon force, both the appearance of low-lying 0 + intruder states near major closed shells (Z = 50, 82) and sub-shell regions (Z = 40, 64) can be described. Moreover, a number of new facets related to the study of intruder states are presented. 19 refs., 3 figs

  19. Deformed intruders and the onset of deformation at N=20 far from stability

    International Nuclear Information System (INIS)

    Poves, A.; Retamosa, J.

    1991-01-01

    Intruder states, built up of 2p-2h excitations are shown to exhibit rotational features. The combined effects of the reduction of the energy gap between major shells occurring far from stability, and the correlation energy of the valence nucleons, make the intruders dominant in the low energy spectrum of several nuclei. Many experimental puzzles may be solved in this way. (G.P.) 17 refs.; 10 figs

  20. Intelligent Machine Vision for Automated Fence Intruder Detection Using Self-organizing Map

    OpenAIRE

    Veldin A. Talorete Jr.; Sherwin A Guirnaldo

    2017-01-01

    This paper presents an intelligent machine vision for automated fence intruder detection. A series of still captured images that contain fence events using Internet Protocol cameras was used as input data to the system. Two classifiers were used; the first is to classify human posture and the second one will classify intruder location. The system classifiers were implemented using Self-Organizing Map after the implementation of several image segmentation processes. The human posture classifie...

  1. Inadvertent weather modification urban areas - lessons for global climate change

    Energy Technology Data Exchange (ETDEWEB)

    Changnon, S A [Illinois State Water Survey, Champaign, IL (USA)

    1992-05-01

    Large metropolitan areas in North America, home to 65% of the USA's population, have created major changes in their climates over the past 150 years. The rate and amount of the urban climate change approximate those being predicted globally using climate models. Knowledge of urban weather and climate modification holds lessons for the global climate change issue. First, adjustments to urban climate changes can provide guidance for adjusting to global change. A second lesson relates to the difficulty but underscores the necessity of providing scientifically credible proof of change within the noise of natural climatic variability. The evolution of understanding about how urban conditions influence weather reveals several unexpected outcomes, particularly relating to precipitation changes. These suggest that similar future surprises can be expected in a changed global climate, a third lesson. In-depth studies of how urban climate changes affected the hydrologic cycle, the regional economy, and human activities were difficult because of data problems, lack of impact methodology, and necessity for multidisciplinary investigations. Similar impact studies for global climate change will require diverse scientific talents and funding commitments adequate to measure the complexity of impacts and human adjustments. Understanding the processes whereby urban areas and other human activities have altered the atmosphere and changed clouds and precipitation regionally appears highly relevant to the global climate-change issue. Scientific and governmental policy development needs to recognize an old axiom that became evident in the studies of inadvertent urban and regional climate change and their behavioural implications: Think globally but act locally. Global climate change is an international issue, and the atmosphere must be treated globally. But the impacts and the will to act and adjust will occur regionally.

  2. Inadvertent weather modification urban areas - lessons for global climate change

    International Nuclear Information System (INIS)

    Changnon, S.A.

    1992-01-01

    Large metropolitan areas in North America, home to 65% of the USA's population, have created major changes in their climates over the past 150 years. The rate and amount of the urban climate change approximate those being predicted globally using climate models. Knowledge of urban weather and climate modification holds lessons for the global climate change issue. First, adjustments to urban climate changes can provide guidance for adjusting to global change. A second lesson relates to the difficulty but underscores the necessity of providing scientifically credible proof of change within the noise of natural climatic variability. The evolution of understanding about how urban conditions influence weather reveals several unexpected outcomes, particularly relating to precipitation changes. These suggest that similar future surprises can be expected in a changed global climate, a third lesson. In-depth studies of how urban climate changes affected the hydrologic cycle, the regional economy, and human activities were difficult because of data problems, lack of impact methodology, and necessity for multidisciplinary investigations. Similar impact studies for global climate change will require diverse scientific talents and funding commitments adequate to measure the complexity of impacts and human adjustments. Understanding the processes whereby urban areas and other human activities have altered the atmosphere and changed clouds and precipitation regionally appears highly relevant to the global climate-change issue. Scientific and governmental policy development needs to recognize an old axiom that became evident in the studies of inadvertent urban and regional climate change and their behavioural implications: Think globally but act locally. Global climate change is an international issue, and the atmosphere must be treated globally. But the impacts and the will to act and adjust will occur regionally

  3. Ureteroscopic holmium laser cutting for inadvertently sutured drainage tube (report of five cases).

    Science.gov (United States)

    Gao, Xu; Lu, Xin; Ren, Shancheng; Xu, Chuanliang; Sun, Yinghao

    2008-07-01

    The aim of this paper is to report a simple solution for inadvertently sutured drainage tube after urological surgery and discuss the different managements according to different types of this embarrassing complication. From September 2001 to January 2007, five inadvertently sutured drainage tubes were treated with ureteroscopic holmium laser cutting for the suture. All drainage tubes were removed after the operation without other complications. Holmium laser cutting via ureteroscope is a simple solution for the embarrassing problem of inadvertently sutured drainage tube. It can save the patient from undergoing another open surgery.

  4. Adaptive Neuro-Fuzzy Determination of the Effect of Experimental Parameters on Vehicle Agent Speed Relative to Vehicle Intruder.

    Science.gov (United States)

    Shamshirband, Shahaboddin; Banjanovic-Mehmedovic, Lejla; Bosankic, Ivan; Kasapovic, Suad; Abdul Wahab, Ainuddin Wahid Bin

    2016-01-01

    Intelligent Transportation Systems rely on understanding, predicting and affecting the interactions between vehicles. The goal of this paper is to choose a small subset from the larger set so that the resulting regression model is simple, yet have good predictive ability for Vehicle agent speed relative to Vehicle intruder. The method of ANFIS (adaptive neuro fuzzy inference system) was applied to the data resulting from these measurements. The ANFIS process for variable selection was implemented in order to detect the predominant variables affecting the prediction of agent speed relative to intruder. This process includes several ways to discover a subset of the total set of recorded parameters, showing good predictive capability. The ANFIS network was used to perform a variable search. Then, it was used to determine how 9 parameters (Intruder Front sensors active (boolean), Intruder Rear sensors active (boolean), Agent Front sensors active (boolean), Agent Rear sensors active (boolean), RSSI signal intensity/strength (integer), Elapsed time (in seconds), Distance between Agent and Intruder (m), Angle of Agent relative to Intruder (angle between vehicles °), Altitude difference between Agent and Intruder (m)) influence prediction of agent speed relative to intruder. The results indicated that distance between Vehicle agent and Vehicle intruder (m) and angle of Vehicle agent relative to Vehicle Intruder (angle between vehicles °) is the most influential parameters to Vehicle agent speed relative to Vehicle intruder.

  5. Adaptive Neuro-Fuzzy Determination of the Effect of Experimental Parameters on Vehicle Agent Speed Relative to Vehicle Intruder.

    Directory of Open Access Journals (Sweden)

    Shahaboddin Shamshirband

    Full Text Available Intelligent Transportation Systems rely on understanding, predicting and affecting the interactions between vehicles. The goal of this paper is to choose a small subset from the larger set so that the resulting regression model is simple, yet have good predictive ability for Vehicle agent speed relative to Vehicle intruder. The method of ANFIS (adaptive neuro fuzzy inference system was applied to the data resulting from these measurements. The ANFIS process for variable selection was implemented in order to detect the predominant variables affecting the prediction of agent speed relative to intruder. This process includes several ways to discover a subset of the total set of recorded parameters, showing good predictive capability. The ANFIS network was used to perform a variable search. Then, it was used to determine how 9 parameters (Intruder Front sensors active (boolean, Intruder Rear sensors active (boolean, Agent Front sensors active (boolean, Agent Rear sensors active (boolean, RSSI signal intensity/strength (integer, Elapsed time (in seconds, Distance between Agent and Intruder (m, Angle of Agent relative to Intruder (angle between vehicles °, Altitude difference between Agent and Intruder (m influence prediction of agent speed relative to intruder. The results indicated that distance between Vehicle agent and Vehicle intruder (m and angle of Vehicle agent relative to Vehicle Intruder (angle between vehicles ° is the most influential parameters to Vehicle agent speed relative to Vehicle intruder.

  6. Pulse-train control of branching processes: Elimination of background and intruder state population

    International Nuclear Information System (INIS)

    Seidl, Markus; Uiberacker, Christoph; Jakubetz, Werner; Etinski, Mihajlo

    2008-01-01

    The authors introduce and describe pulse train control (PTC) of population branching in strongly coupled processes as a novel control tool for the separation of competing multiphoton processes. Control strategies are presented based on the different responses of processes with different photonicities and/or different frequency detunings to the pulse-to-pulse time delay and the pulse-to-pulse phase shift in pulse trains. The control efficiency is further enhanced by the property of pulse trains that complete population transfer can be obtained over an extended frequency range that replaces the resonance frequency of simple pulses. The possibility to freely tune the frequency assists the separation of the competing processes and reduces the number of subpulses required for full control. As a sample application, PTC of leaking multiphoton resonances is demonstrated by numerical simulations. In model systems exhibiting sizable background (intruder) state population if excited with single pulses, PTC leading to complete accumulation of population in the target state and elimination of background population is readily achieved. The analysis of the results reveals different mechanisms of control and provides clues on the mechanisms of the leaking process itself. In an alternative setup, pulse trains can be used as a phase-sensitive tool for level switching. By changing only the pulse-to-pulse phase shift of a train with otherwise unchanged parameters, population can be transferred to any of two different target states in a near-quantitative manner.

  7. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    International Nuclear Information System (INIS)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K.

    2016-01-01

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid’s thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  8. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    Energy Technology Data Exchange (ETDEWEB)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K., E-mail: prodip.das@ncl.ac.uk [School of Mechanical and Systems Engineering Newcastle University Newcastle upon Tyne, NE1 7RU United Kingdom (United Kingdom)

    2016-07-12

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid’s thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  9. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    Science.gov (United States)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K.

    2016-07-01

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid's thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  10. Cyclodialysis cleft with late hypotony maculopathy after inadvertent cannula detachment during cataract surgery.

    Science.gov (United States)

    Kahawita, Shyalle; Cugati, Sudha; Casson, Robert

    2015-05-01

    We present the case of a 69-year-old woman who presented with hypotony several years after an inadvertent cannula detachment presumably formed a cyclodialysis cleft during phacoemulsification cataract extraction and posterior chamber intraocular lens implantation in her right eye. To our knowledge, this is the first report of late hypotony maculopathy as a result of inadvertent cannula release. Crown Copyright © 2015. Published by Elsevier Inc. All rights reserved.

  11. Pulling an intruder from a granular material: a novel depinning experiment

    Directory of Open Access Journals (Sweden)

    Zhang Yue

    2017-01-01

    Full Text Available Two-dimensional impact experiments by Clark et al. [2] identified the source of inertial drag to be caused by ‘collisions’ with a latent force network, leading to large fluctuations of the force experienced by the impactor. These collisions provided the major drag on an impacting intruder until the intruder was nearly at rest. As a complement, we consider controlled pull-out experiments where a buried intruder is pulled out of a material, starting from rest. This provides a means to better understand the non-inertial part of the drag force, and to explore the mechanisms associated with the force fluctuations. To some extent, the pull out process is a time reversed version of the impact process. In order to visualize this pulling process, we use 2D photoelastic disks from which circular intruders of different radii are pulled out. We present results about the dynamics of the intruder and the structures of the force chains inside the granular system as captured by slow and high speed imaging.

  12. Friction force regimes and the conditions for endless penetration of an intruder into a granular medium.

    Science.gov (United States)

    López-Rodríguez, L A; Pacheco-Vázquez, F

    2017-09-01

    An intruder penetrating into a granular column experiences a depth-dependent friction force F(z). Different regimes of F(z) have been measured depending on the experimental design: a nearly linear dependence for shallow penetrations, total saturation at large depths, and an exponential increase when the intruder approaches the bottom of the granular bed. We report here an experiment that allows us to measure the different regimes in a single run during the quasistatic descent of a sphere in a light granular medium. From the analysis of the resistance in the saturation zone, it was found that F(z) follows a cube-power-law dependence on the intruder diameter and an exponential increase with the packing fraction of the bed. Moreover, we determine the critical mass m_{c} required to observe infinite penetration and its dependence on the above parameters. Finally, we use our results to estimate the final penetration depth reached by intruders of masses mintruder of any density (larger than the density of the granular bed) can sink indefinitely into the granular medium if the bed packing fraction is smaller than a critical value.

  13. Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-10-01

    Full Text Available Given that entropy-based IT technology has been applied in homes, office buildings and elsewhere for IT security systems, diverse kinds of intelligent services are currently provided. In particular, IT security systems have become more robust and varied. However, access control systems still depend on tags held by building entrants. Since tags can be obtained by intruders, an approach to counter the disadvantages of tags is required. For example, it is possible to track the movement of tags in intelligent buildings in order to detect intruders. Therefore, each tag owner can be judged by analyzing the movements of their tags. This paper proposes a security approach based on the received signal strength indicators (RSSIs of beacon-based tags to detect intruders. The normal RSSI patterns of moving entrants are obtained and analyzed. Intruders can be detected when abnormal RSSIs are measured in comparison to normal RSSI patterns. In the experiments, one normal and one abnormal scenario are defined for collecting the RSSIs of a Bluetooth-based beacon in order to validate the proposed method. When the RSSIs of both scenarios are compared to pre-collected RSSIs, the RSSIs of the abnormal scenario are about 61% more different compared to the RSSIs of the normal scenario. Therefore, intruders in buildings can be detected by considering RSSI differences.

  14. Equivalence of the spherical and deformed shell-model approach to intruder states

    International Nuclear Information System (INIS)

    Heyde, K.; Coster, C. de; Ryckebusch, J.; Waroquier, M.

    1989-01-01

    We point out that the description of intruder states, incorporating particle-hole (p-h) excitation across a closed shell in the spherical shell model or a description starting from the Nilsson model are equivalent. We furthermore indicate that the major part of the nucleon-nucleon interaction, responsible for the low excitation energy of intruder states comes as a two-body proton-neutron quadrupole interaction in the spherical shell model. In the deformed shell model, quadrupole binding energy is gained mainly through the one-body part of the potential. (orig.)

  15. Unexpected alignment patterns in high-j intruder bands evidence for a strong residual neutron proton interaction?

    International Nuclear Information System (INIS)

    Wyss, R.; Johnson, A.; Royal Inst. of Tech., Stockholm

    1990-01-01

    The alignment of h 11/12 protons in νi 13/2 intruder bands in mass A = 130 region is investigated. The lack of a clear h 11/12 band crossing is compared with the alignment pattern of i 13/2 neutrons in πi 13/2 intruder bands in mass A = 180 region. The very smooth rise in angular momentum in the intruder bands is related to a possible neutron proton interaction between the single intruder orbital and the aligned two-quasiparticle configuration. 36 refs., 3 figs

  16. Intruder states in the cadmium isotopes and a simple schematic calculation

    International Nuclear Information System (INIS)

    Aprahamian, A.; Brenner, D.S.; Casten, R.F.; Heyde, K.

    1984-01-01

    Angular correlation studies of 118 120 Cd at TRISTAN have allowed the discovery and identification in each nucleus of two new 0 + states and their respective E2 decay properties. The results have been interpreted in terms of a simple schematic model based on the mixing of normal vibration-like and intruder rotation-like 2p-4h configurations

  17. A study of the management of 55 traumatically intruded permanent incisor teeth in children.

    LENUS (Irish Health Repository)

    Stewart, C

    2009-01-01

    These were to examine the main presenting, treatment and outcome factors for intruded permanent incisors in children, the effect of apical development and degree of intrusion on decisions on repositioning, the effect of apical development status on the maintenance of pulp vitality and the time of pulp extirpation and to compare the decisions made to the advice given in existing clinical guidelines.

  18. Lift on side by side intruders of various geometries within a granular flow

    Science.gov (United States)

    Acevedo-Escalante, M. F.; Caballero-Robledo, G. A.

    2017-06-01

    Obstacles within fluids have been widely used in engineering and in physics to study hydrodynamic interactions. In granular matter, objects within a granular flow have helped to understand fundamental features of drag and lift forces. In our group, we have studied numerically the flow mediated interaction between two static disks within a vertical granular flow in a two-dimensional container where the flow velocity and the distance between obstacles were varied. Attractive and repulsive forces were found depending on flow velocity and separation between intruders. The simulations evidenced a relationship between the average flow velocity in a specific section ahead of the obstacles and the attractive-repulsive lift. On the other hand, it was showed that the lift force on an object dragged within a granular medium depends on the shape of the intruder. Here we present experimental results of the interaction between two side-by-side intruders of different shapes within a vertical granular flow. We built a quasi-two-dimensional container in which we placed the intruders and using load cells we measured lift and drag forces during the discharge process for different flow velocities.

  19. The resident-intruder paradigm : a standardized test for aggression, violence and social stress

    NARCIS (Netherlands)

    Koolhaas, Jacob; Coppens, Caroline M.; de Boer, Sietse F.; Buwalda, Bauke; Meerlo, Peter; Timmermans, Paul J. A.

    2013-01-01

    This video publication explains in detail the experimental protocol of the resident-intruder paradigm in rats. This test is a standardized method to measure offensive aggression and defensive behavior in a semi natural setting. The most important behavioral elements performed by the resident and the

  20. Automated electronic intruder simulator for evaluation of odd frequency microwave detectors

    International Nuclear Information System (INIS)

    1979-01-01

    A microwave intruder simulator for testing motion detection sensors is described. This simulator can be used to evaluate a variety of microwave sensors regardless of the value of the center frequency of the signal utilized. Representative curves from the evaluation of one microwave sensor are also presented

  1. Inadvertent intrathecal injection of labetalol in a patient undergoing post-partum tubal ligation.

    Science.gov (United States)

    Balestrieri, P J; Hamza, M S; Ting, P H; Blank, R S; Grubb, C T

    2005-10-01

    After receiving a continuous spinal anesthetic for labor following an inadvertent dural puncture with a 17-gauge epidural needle, a morbidly obese parturient underwent post-partum tubal ligation 12 h after vaginal delivery. The patient received a total of 2 mL of 0.75% hyperbaric bupivacaine for the surgery. In response to moderate hypertension the patient received intravenous labetalol hydrochloride 20 mg. She subsequently was inadvertently administered approximately 15 mg of labetalol through the spinal catheter. The spinal catheter was removed immediately after the procedure. She suffered no apparent adverse neurologic effects.

  2. Beverage can stay-tabs: still a source for inadvertently ingested foreign bodies in children

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, Lane F. [Cincinnati Children' s Hospital Medical Center, Department of Radiology, MLC 5031, Cincinnati, OH (United States); University of Cincinnati, College of Medicine, Departments of Radiology and Pediatrics, Cincinnati, OH (United States)

    2010-09-15

    In the 1970s in part to avoid inadvertent ingestion, the beverage-can industry changed can construction from pull-tabs to the stay-tabs (remain attached to can after opening) used today. Our purpose is to identify the number of inadvertent ingestions of beverage-can stay-tabs by children recognized at our institution. The medical information system of a children's hospital was searched with key terms to identify cases in which a witnessed or self-reported inadvertent ingestion of a beverage-can stay-tab resulted in a radiograph to rule out presence of a foreign body. Demographics, identification of stay-tab on radiographs, associated abnormalities, and patient management were reviewed. Nineteen cases of stay-tab ingestion were identified over 16 years. Mean age of ingesters was 8.5 years with the majority being teenagers and 15 (79%) >5 years of age. The stay-tab could be seen radiographically only in 4 (21%) cases - all with the stay-tab identified in the stomach. The identification of 19 children who inadvertently ingested beverage-can stay-tabs at a single children's hospital suggests that such ingestions still occur. Radiologists should be aware that stay-tabs are radiographically visible in the minority (21%) of cases. (orig.)

  3. Late-Onset Inadvertent Bleb Formation following Pars Plana M3 Molteno Implant Tube Obstruction

    Directory of Open Access Journals (Sweden)

    Anmar M. Abdul-Rahman

    2017-01-01

    Full Text Available Purpose: To report a case of inadvertent bleb formation presenting 18 months after pars plana M3 Molteno implant tube obstruction in a patient with mixed mechanism glaucoma. Materials and Methods: An 84-year-old Caucasian male with mixed mechanism glaucoma underwent slit-lamp examination, gonioscopy, colour anterior segment photography and anterior segment optical coherence tomography (AS-OCT. Results: An inadvertent bleb developed 18 months after pars plana implant tube re-positioning with a 6/0 Vicryl tie ligature. The bleb was located in the area anterior to the implant plate; it was characterised by a thin, transparent, avascular and multi-cystic wall, with a visible stoma at the posterior edge of the bleb. The bleb was functioning as demonstrated by an intraocular pressure of 6 mm Hg at presentation and a punctate fluorescein uptake pattern of the bleb wall. The bleb over the plate of the Molteno implant was non-functioning, likely secondary to tube obstruction by vitreous in the early postoperative period. AS-OCT showed a tract from the anterior chamber commencing at an entry wound through a corneal tunnel to the posterior stoma at the base of the inadvertent bleb. Conclusions: We hypothesise that the pathophysiologic factors resulting in an inadvertent bleb are a result of a combination of apoptosis, late-onset wound dehiscence and internal gaping of a centrally placed corneal wound. In addition, aqueous hydrodynamic factors may play a role.

  4. Beverage can stay-tabs: still a source for inadvertently ingested foreign bodies in children

    International Nuclear Information System (INIS)

    Donnelly, Lane F.

    2010-01-01

    In the 1970s in part to avoid inadvertent ingestion, the beverage-can industry changed can construction from pull-tabs to the stay-tabs (remain attached to can after opening) used today. Our purpose is to identify the number of inadvertent ingestions of beverage-can stay-tabs by children recognized at our institution. The medical information system of a children's hospital was searched with key terms to identify cases in which a witnessed or self-reported inadvertent ingestion of a beverage-can stay-tab resulted in a radiograph to rule out presence of a foreign body. Demographics, identification of stay-tab on radiographs, associated abnormalities, and patient management were reviewed. Nineteen cases of stay-tab ingestion were identified over 16 years. Mean age of ingesters was 8.5 years with the majority being teenagers and 15 (79%) >5 years of age. The stay-tab could be seen radiographically only in 4 (21%) cases - all with the stay-tab identified in the stomach. The identification of 19 children who inadvertently ingested beverage-can stay-tabs at a single children's hospital suggests that such ingestions still occur. Radiologists should be aware that stay-tabs are radiographically visible in the minority (21%) of cases. (orig.)

  5. Attention and Facilitation: Converging Information Versus Inadvertent Reading in Stroop Task Performance

    NARCIS (Netherlands)

    Roelofs, A.P.A.

    2010-01-01

    Disagreement exists about whether color-word Stroop facilitation is caused by converging information (e.g.. Cohen et al.. 1990: Roelofs, 2003) or inadvertent reading (MacLeod & MacDonald, 2000). Four experiments tested between these hypotheses by examining Stroop effects oil response time (RT) both

  6. Attention and Facilitation: Converging Information versus Inadvertent Reading in Stroop Task Performance

    Science.gov (United States)

    Roelofs, Ardi

    2010-01-01

    Disagreement exists about whether color-word Stroop facilitation is caused by converging information (e.g., Cohen et al., 1990; Roelofs, 2003) or inadvertent reading (MacLeod & MacDonald, 2000). Four experiments tested between these hypotheses by examining Stroop effects on response time (RT) both within and between languages. Words cannot be…

  7. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-05-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  8. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-12-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  9. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2003-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  10. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2003-05-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  11. Prevention of the inadvertent movement and illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2002-09-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  12. An i{sub 13/2} neutron intruder band in {sup 141}Gd

    Energy Technology Data Exchange (ETDEWEB)

    Mullins, S M; Omar, A; Persson, L; Prevost, D; Waddington, J C [McMaster Univ., Hamilton, ON (Canada); Andrews, H R; Ball, G C; Galindo-Uribarri, A; Janzen, V P; Radford, D C; Ward, D [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; Drake, T E [Toronto Univ., ON (Canada). Dept. of Physics; Fossan, D B; Lafosse, D; Vaska, P; Waring, M [State Univ. of New York, Stony Brook, NY (United States). Dept. of Physics; Wadsworth, R [York Univ. (United Kingdom). Dept. of Physics

    1992-08-01

    The nucleus {sup 141}Gd has been investigated at high spins for the first time following the reactions {sup 112}Sn({sup 32}S,2pn){sup 141}Gd at 155 MeV and {sup 112}Sn({sup 33}S,2p2n){sup 141}Gd at 170 MeV. The methods of in-beam {gamma}-ray spectroscopy were used to establish a number of different structures, including a band which has been assigned as being based on the {nu}i{sub 13/2}[660]1/2{sup +} Nilsson intruder orbital. This is the heaviest nucleus thus far in which this type of intruder band has been identified. (author). 11 refs., 3 figs.

  13. Identification of low-lying proton-based intruder states in 189-193Pb

    International Nuclear Information System (INIS)

    Vel, K. van de; Andreyev, A.N.; Huyse, M.; Duppen, P. van; Cocks, J.F.C.; Dorvaux, O.; Greenlees, P.T.; Helariutta, K.; Jones, P.; Julin, R.; Juutinen, S.; Kettunen, H.; Kuusiniemi, P.; Leino, M.; Muikku, M.; Nieminen, P.; Eskola, K.; Wyss, R.

    2002-01-01

    Low-lying proton-based intruder states have been observed in the odd-mass isotopes 189,191,193 Pb in experiments at the RITU gas-filled recoil separator. The identification has been performed by observing the fine structure in the α decay of the parent 193,195,197 Po nuclei in prompt coincidence with conversion electrons and γ rays in the daughter lead isotopes. Along with the literature data these results establish a systematics of intruder states in the odd-mass lead isotopes from 197 Pb down to 185 Pb. Interpretation of these states involves the coupling of the 1i 13/2 or 3p 3/2 odd neutron to the 0 + state in the oblate minimum in the even-mass lead core. Conversion coefficients have been determined for some of the transitions, revealing mixing between the coexisting states. The experimental results are compared to potential energy surface calculations

  14. Underwater Intruder Detection Sonar for Harbour Protection: State of the Art Review and Implications

    Science.gov (United States)

    2006-10-01

    intruder would appear as a small moving “ blob ” of energetic echo in the echograph, and the operator could judge whether the contact is a threat that calls...visually then as a small fluctuating “ blob ” against a fluctuating background of sound clutter and reverberation, making it difficult to visually...4. Non-random false alarms caused by genuine underwater contacts that happened not to be intruders—by large fish , or schools of fish , or marine

  15. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2004-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  16. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2002-09-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  17. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2002-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  18. Response to events involving the inadvertent movement or illicit trafficking of radioactive materials

    International Nuclear Information System (INIS)

    2003-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  19. Intruder states, coexistence, and approaches to deformation: The study of 120Xe and the N = 66 isotones

    International Nuclear Information System (INIS)

    Mantica, P.F. Jr.; Zimmerman, B.E.; Ford, C.E.; Walters, W.B.; Rikovska, J.; Stone, N.J.

    1989-01-01

    In this chapter, new results of γ-ray and conversion-electron spectroscopic studies of the structure of 119,121 Te and 126,127 Xe will be reported. These results will be described along with the results of previous studies of intruder structures in the Te and Xe mass region. The observed structures will be contrasted with other intruder structure identified in the Sn, Cd, and Pd isotopes. Results of IBM mixing calculations will be shown for the even-even Te nuclides. The role of intruder structures in the development of nuclear deformation will be discussed. 52 refs., 8 figs., 1 tab

  20. Restoration of an intruded maxillary central incisor with a uniquely designed dowel and core restoration: a case report.

    Science.gov (United States)

    Polat, Zelal Seyfioğlu; Tacir, Ibrahim Halil

    2007-01-01

    This article describes the restoration of an intruded root using a custom-made metal dowel and metal-ceramic veneer core restoration. The treatment plan for this patient consisted of restoring the missing esthetics and eliminating psychological trauma by utilizing the root of the intruded maxillary left central incisor to replace both missing central incisor crowns. This treatment will preserve space and bone until the patient is old enough for another prosthodontic restoration to be considered. As the lost fragments were not recovered, we considered this restoration of the intruded root to be the best therapeutic option, considering the effect on the patient's psyche. The patient was satisfied with the final result.

  1. Anabolic agents: recent strategies for their detection and protection from inadvertent doping

    Science.gov (United States)

    Geyer, Hans; Schänzer, Wilhelm; Thevis, Mario

    2014-01-01

    According to the World Anti-Doping Agency (WADA) Prohibited List, anabolic agents consist of exogenous anabolic androgenic steroids (AAS), endogenous AAS and other anabolic agents such as clenbuterol and selective androgen receptor modulators (SARMs). Currently employed strategies for their improved detection include the prolongation of the detection windows for exogenous AAS, non-targeted and indirect analytical approaches for the detection of modified steroids (designer steroids), the athlete’s biological passport and isotope ratio mass spectrometry for the detection of the misuse of endogenous AAS, as well as preventive doping research for the detection of SARMs. The recent use of these strategies led to 4–80-fold increases of adverse analytical findings for exogenous AAS, to the detection of the misuse of new designer steroids, to adverse analytical findings of different endogenous AAS and to the first adverse analytical findings of SARMs. The strategies of the antidoping research are not only focused on the development of methods to catch the cheating athlete but also to protect the clean athlete from inadvertent doping. Within the past few years several sources of inadvertent doping with anabolic agents have been identified. Among these are nutritional supplements adulterated with AAS, meat products contaminated with clenbuterol, mycotoxin (zearalenone) contamination leading to zeranol findings, and natural products containing endogenous AAS. The protection strategy consists of further investigations in case of reasonable suspicion of inadvertent doping, publication of the results, education of athletes and development of methods to differentiate between intentional and unintentional doping. PMID:24632537

  2. Intentional and inadvertent non-adherence in adult coeliac disease. A cross-sectional survey.

    Science.gov (United States)

    Hall, Nicola J; Rubin, Gregory P; Charnock, Anne

    2013-09-01

    Adherence to a gluten-free diet is the mainstay of treatment for coeliac disease. Non-adherence is common as the diet is restrictive and can be difficult to follow. This study aimed to determine the rates of intentional and inadvertent non-adherence in adult coeliac disease and to examine the factors associated with both. A self-completion questionnaire was mailed to adult coeliac patients identified from the computer records of 31 family practices within the North East of England. We received 287 responses after one reminder. Intentional gluten consumption was reported by 115 (40%) of respondents. 155 (54%) had made at least one known mistaken lapse over the same period and 82 (29%) reported neither intentional nor mistaken gluten consumption. Using logistic regression analysis, low self-efficacy, perceptions of tolerance to gluten and intention were found to be independently predictive of intentional gluten consumption. A statistical model predicted 71.8% of cases reporting intentional lapses. Intentional non-adherence to the GFD was found to be common but not as frequent as inadvertent lapses. Distinguishing the factors influencing both intentional and inadvertent non-adherence is useful in understanding dietary self-management in coeliac disease. Copyright © 2013 Elsevier Ltd. All rights reserved.

  3. Motion patterns and phase-transition of a defender-intruder problem and optimal interception strategy of the defender

    Science.gov (United States)

    Wang, Jiangliu; Li, Wei

    2015-10-01

    In this paper, we consider a defense-intrusion interaction, in which an intruder is attracted by a protected stationary target but repulsed by a defender; while the defender tries to move towards an appropriate interception position (IP) between the intruder and the target in order to intercept the intruder and expel the intruder away from the target as maximum as possible. Intuitionally, to keep the intruder further away, one may wonder that: is it a better strategy for the defender trying to approach the intruder as near as possible? Unexpectedly and interestingly enough, this is not always the case. We first introduce the flexibility for IP selection, then investigate the system dynamics and the stable motion patterns, and characterize the phase-transition surface for the motion patterns. We show that, the phase-transition surface just defines the optimal interception strategy of the defender for IP selection; and from the perspective of mobility of agents, the optimal strategy just depends on relative mobility of the two agents.

  4. Central vasopressin V1a receptors modulate neural processing in mothers facing intruder threat to pups

    OpenAIRE

    Caffrey, Martha K.; Nephew, Benjamin C.; Febo, Marcelo

    2009-01-01

    Vasopressin V1a receptors in the rat brain have been studied for their role in modulating aggression and anxiety. In the current study blood-oxygen-level-dependent (BOLD) functional MRI was used to test whether V1a receptors modulate neural processing in the maternal brain when dams are exposed to a male intruder. Primiparous females were given an intracerebroventricular (ICV) injection of vehicle or V1a receptor antagonist ([deamino-Pen1, O-Me-Try, Arg8]-Vasopressin, 125 ng/10 μL) 90-120 min...

  5. Consolidation of a WSN and Minimax method to rapidly neutralise intruders in strategic installations.

    Science.gov (United States)

    Conesa-Muñoz, Jesus; Ribeiro, Angela

    2012-01-01

    Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN). The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders' behaviour is inferred through sequences of sensors' activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final state of the intruders

  6. Inadvertent raising of levels in the FFTF primary sodium pumps. Final unusual occurrence report, HEDL 79-34 (FFTF-58)

    International Nuclear Information System (INIS)

    Kuechle, J.D.

    1981-01-01

    The final unusual occurrence report describes the inadvertent raising of the sodium level in the FFTF primary sodium pumps during system testing. This event is now judged to have caused permanent deformation of the primary pump shaft on loop 1 during a period when pump rotation was stopped and sodium level in the pump tank was inadvertently increased. The shaft was subsequently removed, straightened, and returned to service in the spare FFTF pump

  7. Machine learning approach to detect intruders in database based on hexplet data structure

    Directory of Open Access Journals (Sweden)

    Saad M. Darwish

    2016-09-01

    Full Text Available Most of valuable information resources for any organization are stored in the database; it is a serious subject to protect this information against intruders. However, conventional security mechanisms are not designed to detect anomalous actions of database users. An intrusion detection system (IDS, delivers an extra layer of security that cannot be guaranteed by built-in security tools, is the ideal solution to defend databases from intruders. This paper suggests an anomaly detection approach that summarizes the raw transactional SQL queries into a compact data structure called hexplet, which can model normal database access behavior (abstract the user's profile and recognize impostors specifically tailored for role-based access control (RBAC database system. This hexplet lets us to preserve the correlation among SQL statements in the same transaction by exploiting the information in the transaction-log entry with the aim to improve detection accuracy specially those inside the organization and behave strange behavior. The model utilizes naive Bayes classifier (NBC as the simplest supervised learning technique for creating profiles and evaluating the legitimacy of a transaction. Experimental results show the performance of the proposed model in the term of detection rate.

  8. Intruder bands in odd-A {sup 109-115}Sb

    Energy Technology Data Exchange (ETDEWEB)

    Janzen, V P [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; [McMaster Univ., Hamilton, ON (Canada). Dept. of Physics; Andrews, H R; Galindo-Uribarri, A; Radford, D C; Ward, D [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; Omar, A; Mullins, S; Persson, L; Prevost, D; Rodriguez, J; Sawicki, M; Unrau, P; Waddington, J C [McMaster Univ., Hamilton, ON (Canada). Dept. of Physics; Drake, T E; Zwartz, G [Toronto Univ., ON (Canada). Dept. of Physics; Fossan, D B; Lafosse, D R; Hughes, J R; Schnare, H; Timmers, H; Vaska, P [State Univ. of New York, Stony Brook, NY (United States). Dept. of Physics; Haas, B [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; [Strasbourg-1 Univ., 67 (France). Centre de Recherches Nucleaires; Paul, E S; Wilson, J [Liverpool Univ. (United Kingdom). Oliver Lodge Lab.; Pilotte, S [Ottawa Univ., ON (Canada). Dept. of Physics; Wadsworth, R [York Univ. (United Kingdom). Dept. of Physics; Wyss, R [Joint Inst. for Heavy Ion Research, Oak Ridge, TN (United States)

    1992-08-01

    The existence of rotational structures in nuclei bordering on the spherical Z= 50 closed shell has been known for some time. Nevertheless, our understanding of collective effects in this region is remarkably incomplete; for example, before this work little high-spin data existed and there were no lifetime measurements to confirm the collectivity associated with the rotational bands observed in Sb (Z = 51) and Sn (Z = 50) nuclei. Furthermore, the role of the h{sub 11/2} orbital was virtually unknown, although it has the highest angular momentum of the orbitals in this mass region and therefore is expected to have the most influence on the properties of high-spin states. In the A {approx} 130 and A {approx} 180 mass regions, where highly deformed intruder bands have been observed, it is the neutron i{sub 13/2} orbitals, respectively, which are preferentially lowered in energy by a combination of large deformation and fast rotation In lighter nuclei the h{sub 11/2} orbital is expected to appear as an intruder configuration. (author). 11 refs., 1 tab., 4 figs.

  9. Implementation of coordinated global serotype 2 oral poliovirus vaccine cessation: risks of inadvertent trivalent oral poliovirus vaccine use.

    Science.gov (United States)

    Duintjer Tebbens, Radboud J; Hampton, Lee M; Thompson, Kimberly M

    2016-06-01

    The endgame for polio eradication includes coordinated global cessation of oral poliovirus vaccine (OPV), starting with the cessation of vaccine containing OPV serotype 2 (OPV2) by switching all trivalent OPV (tOPV) to bivalent OPV (bOPV). The logistics associated with this global switch represent a significant undertaking, with some possibility of inadvertent tOPV use after the switch. We used a previously developed poliovirus transmission and OPV evolution model to explore the relationships between the extent of inadvertent tOPV use, the time after the switch of the inadvertent tOPV use and corresponding population immunity to serotype 2 poliovirus transmission, and the ability of the inadvertently introduced viruses to cause a serotype 2 circulating vaccine-derived poliovirus (cVDPV2) outbreak in a hypothetical population. We then estimated the minimum time until inadvertent tOPV use in a supplemental immunization activity (SIA) or in routine immunization (RI) can lead to a cVDPV2 outbreak in realistic populations with properties like those of northern India, northern Pakistan and Afghanistan, northern Nigeria, and Ukraine. At low levels of inadvertent tOPV use, the minimum time after the switch for the inadvertent use to cause a cVDPV2 outbreak decreases sharply with increasing proportions of children inadvertently receiving tOPV. The minimum times until inadvertent tOPV use in an SIA or in RI can lead to a cVDPV2 outbreak varies widely among populations, with higher basic reproduction numbers, lower tOPV-induced population immunity to serotype 2 poliovirus transmission prior to the switch, and a lower proportion of transmission occurring via the oropharyngeal route all resulting in shorter times. In populations with the lowest expected immunity to serotype 2 poliovirus transmission after the switch, inadvertent tOPV use in an SIA leads to a cVDPV2 outbreak if it occurs as soon as 9 months after the switch with 0.5 % of children aged 0-4 years inadvertently

  10. Inadvertent puncture of the aortic noncoronary cusp during postoperative left atrial tachycardia ablation

    Directory of Open Access Journals (Sweden)

    Dursun Aras, MD

    2015-08-01

    Full Text Available Transseptal catheterization has become part of the interventional electrophysiologist׳s technical armamentarium since the development of left atrial catheter ablation and percutaneous technologies for treating mitral and aortic valve disease. Although frequently performed, the procedure׳s most feared complication is aortic root penetration. Focal atrial tachycardia has been described as the most common late sequela of surgical valve replacements. We present a complicated case involving the inadvertent delivery of an 8 French sheath across the noncoronary cusp during radiofrequency catheter ablation for left atrial tachycardia originating from the mitral annulus in a patient with prior mitral valve replacement.

  11. Treatment Approach to Small Inadvertent Injury of the Crystalline Lens Anterior Capsule During Iridodialysis Repair Surgery

    Directory of Open Access Journals (Sweden)

    Gökçen Gökçe

    2013-01-01

    Full Text Available A 22-year-old man presented to our ophthalmology department with photophobia. On ophthalmic examination, iridodialysis secondary to blunt trauma that occurred 5 years ago was diagnosed. During iridodialysis repair surgery, long curved double-armed needle of 10-0 polypropylene suture (PC-9 inserted into the 19 gauge side port turned down inadvertently by its own weight, resulting in crystalline lens anterior capsule perforation. Postoperative clinical observation revealed no lens opacification affecting visual acuity. This case report showed that lens aspiration surgery should be postponed if the capsule injury is small.(Turk J Ophthalmol 2013; 43: 61-3

  12. Inadvertent injection of formalin mistaken for local anesthetic agent: report of a case.

    Science.gov (United States)

    Arakeri, Gururaj; Brennan, Peter A

    2012-05-01

    Chemical facial cellulitis, while commonly seen in domestic accidents or attempted suicide, is uncommon in the dental office and hence rarely addressed in the dental literature. We present an unusual case of chemical facial cellulitis caused by inadvertent injection of formalin into the soft tissues of the oral cavity, which was mistaken for local anesthesia solution. This report comprises the immediate symptoms, possible root cause, and management of the difficult situation. We also provide some guidelines to avoid such unfortunate events. Copyright © 2012 Elsevier Inc. All rights reserved.

  13. Consolidation of a WSN and Minimax Method to Rapidly Neutralise Intruders in Strategic Installations

    Directory of Open Access Journals (Sweden)

    Angela Ribeiro

    2012-03-01

    Full Text Available Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN. The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders’ behaviour is inferred through sequences of sensors’ activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final

  14. Wellbore enlargement investigation: Potential analogs to the Waste Isolation Pilot Plant during inadvertent intrusion of the repository

    International Nuclear Information System (INIS)

    Boak, D.M.; Dotson, L.; Aguilar, R.

    1997-01-01

    This study involved the evaluation and documentation of cases in which petroleum wellbores were enlarged beyond the nominal hole diameter as a consequence of erosion during exploratory drilling, particularly as a function of gas flow into the wellbore during blowout conditions. A primary objective was to identify analogs to potential wellbore enlargement at the Waste Isolation Pilot Plant (WIPP) during inadvertent human intrusion. Secondary objectives were to identify drilling scenarios associated with enlargement, determine the physical extent of enlargement, and establish the physical properties of the formation in which the enlargement occurred. No analogs of sufficient quality to establish quantitative limits on wellbore enlargement at the WIPP disposal system were identified. However, some information was obtained regarding the frequency of petroleum well blowouts and the likelihood that such blowouts would bridge downhole, self-limiting the surface release of disposal-system material. Further work would be necessary, however, to determine the conditions under which bridging could occur and the extent to which the bridging might be applicable to WIPP. In addition, data on casing sizes of petroleum boreholes in the WIPP vicinity support the use of a 12-1/4 inch borehole size in WIPP performance assessment calculations. Finally, although data are limited, there was no evidence of significant wellbore enlargement in any of three blowouts that occur-red in wellbores in the Delaware Basin (South Culebra Bluff Unit No. 1, Energy Research and Development Administration (ERDA) 6, and WIPP 12)

  15. Sensing the intruder: a quantitative threshold for recognition cues perception in honeybees

    Science.gov (United States)

    Cappa, Federico; Bruschini, Claudia; Cipollini, Maria; Pieraccini, Giuseppe; Cervo, Rita

    2014-02-01

    The ability to discriminate among nestmates and non-nestmate is essential to defend social insect colonies from intruders. Over the years, nestmate recognition has been extensively studied in the honeybee Apis mellifera; nevertheless, the quantitative perceptual aspects at the basis of the recognition system represent an unexplored subject in this species. To test the existence of a cuticular hydrocarbons' quantitative perception threshold for nestmate recognition cues, we conducted behavioural assays by presenting different amounts of a foreign forager's chemical profile to honeybees at the entrance of their colonies. We found an increase in the explorative and aggressive responses as the amount of cues increased based on a threshold mechanism, highlighting the importance of the quantitative perceptual features for the recognition processes in A. mellifera.

  16. Energy of the 2p1h intruder state in $^{34}$Al

    CERN Multimedia

    The second 0$^{+}$ state in $^{34}$Si, of high importance for the understanding of the island of inversion at N=20, has been recently observed through the $\\beta$- decay of a predicted long-lived low-lying isomeric 1$^{+}$ state in $^{34}$Al. We intend to measure the unknown excitation energy of this isomer using the ISOLTRAP Penning-trap mass spectrometer. Since a recent experiment at ISOLDE (IS-530) showed that the full $\\beta$- strength in the decay of $^{34}$Mg goes through this 1$^{+}$ state in $^{34}$Al, we propose to perform a direct mass measurement of the daughter $^{34}$Al ions trapped after the decay of $^{34}$Mg. Mass measurements indicate that the 4$^{−}$ ground state in $^{34}$Al may be an excited state, the ground state being therefore the intruder 1$^{+}$ state. In another run, we propose to perform a remeasurement of the mass of the 4$^{−}$ ground state.

  17. High spin spectroscopy of near spherical nuclei: Role of intruder orbitals

    Energy Technology Data Exchange (ETDEWEB)

    Bhattacharyya, S.; Bhattacharjee, T.; Mukherjee, G. [Variable Energy Cyclotron Centre, 1/AF Bidhan Nagar, Kolkata - 700064 (India); Chanda, S. [Fakir Chand College, Diamond Herbour, West Bengal (India); Banerjee, D.; Das, S. K.; Guin, R. [Radiochemistry Division, Variable Energy Cyclotron Centre, BARC, Kolkata - 700064 (India); Gupta, S. Das [Variable Energy Cyclotron Centre, 1/AF Bidhan Nagar, Kolkata - 700064, India and Saha Institute of Nuclear Physics, Kolkata-700064 (India); Pai, H. [Variable Energy Cyclotron Centre, 1/AF Bidhan Nagar, Kolkata - 700064, India and Institut für Kernphysik, Technische Universität Darmstadt, Schlossgartenstrasse 9, 64289 Darmstadt (Germany)

    2014-08-14

    High spin states of nuclei in the vicinity of neutron shell closure N = 82 and proton shell closure Z = 82 have been studied using the Clovere Ge detectors of Indian National Gamma Array. The shape driving effects of proton and neutron unique parity intruder orbitals for the structure of nuclei around the above shell closures have been investigated using light and heavy ion beams. Lifetime measurements of excited states in {sup 139}Pr have been done using pulsed-beam-γ coincidence technique. The prompt spectroscopy of {sup 207}Rn has been extended beyond the 181μs 13/2{sup +} isomer. Neutron-rich nuclei around {sup 132}Sn have been produced from proton induced fission of {sup 235}U and lifetime measurement of low-lying states of odd-odd {sup 132}I have been performed from offline decay.

  18. Expert judgement on inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Hora, S.C.; von Winterfeldt, D.; Trauth, K.M.

    1991-12-01

    Four expert-judgment teams have developed analyses delineating possible future societies in the next 10,000 years in the vicinity of the Waste Isolation Pilot Plant (WIPP). Expert-judgment analysis was used to address the question of future societies because neither experimentation, observation, nor modeling can resolve such uncertainties. Each of the four, four-member teams, comprised of individuals with expertise in the physical, social, or political sciences, developed detailed qualitative assessments of possible future societies. These assessments include detailed discussions of the underlying physical and societal factors that would influence society and the likely modes of human-intrusion at the WIPP, as well as the probabilities of intrusion. Technological development, population growth, economic development, conservation of information, persistence of government control, and mitigation of danger from nuclear waste were the factors the teams believed to be most important. Likely modes of human-intrusion were categorized as excavation, disposal/storage, tunneling, drilling, and offsite activities. Each team also developed quantitative assessments by providing probabilities of various alternative futures, of inadvertent human intrusion, and in some cases, of particular modes of intrusion. The information created throughout this study will be used in conjunction with other types of information, including experimental data, calculations from physical principles and computer models, and perhaps other judgments, as input to ''performance assessment.'' The more qualitative results of this study will be used as input to another expert panel considering markers to deter inadvertent human intrusion at the WIPP

  19. Analyses of natural resources in 10 CFR Part 60 as related to inadvertent human intrusion

    International Nuclear Information System (INIS)

    Miklas, M.P.; Lefevre, H.E.

    1993-01-01

    The purpose of this paper is to examine the intent of the regulatory language of the portions of 10 CFR Part 60 which deal with considerations of the natural resources of a proposed geologic repository for high-level radioactive wastes as they relate to inadvertent human intrusion. Four Potentially Adverse Conditions (PAC) the requirements of 10 CFR 60.21(c)(13) are shown to be related to natural resources. Groundwater is identified as a natural resource known to be present at Yucca Mountain, Nevada. For economic considerations of natural resources, the open-quotes foreseeable futureclose quotes is thought to be no more than 50 years. Two of the topics addressed by the PACs, subsurface mining and drilling at a proposed repository site, are pre-site-characterization activities which must be evaluated in the context of repository performance criteria set by the US EPA standard, 40 CFR Part 191. An alternative US DOE compliance demonstration to another PAC, 10 CFR 60.122(c)(17), might be to use an open-quotes explorationist perspectiveclose quotes of natural resource assessment. The Commission intends for DOE to evaluate the likelihood and consequence of inadvertent human intrusion into a geologic repository as a result of exploration or exploitation of natural resources within or near a proposed high-level radioactive waste geologic repository

  20. The uptake of radionuclides from inadvertent consumption of soil by grazing animals

    International Nuclear Information System (INIS)

    Green, N.; Dodd, N.J.

    1988-01-01

    Investigations of the transfer to man of artificially-produced radionuclides through food chains have shown that the inadvertent consumption of soil by grazing animals can give variations in estimates of transfer coefficients, especially for radionuclides that are poorly absorbed by plant roots. Even small masses of soil adhering to herbage or directly ingested can make a significant contribution to the intake inventory in terms of activity. Although the activity concentrations of soil-contaminated herbage are elevated, the radionuclides associated with the soil may not necessarily be in a form which is easily absorbed by the animal. Attempts must be made, therefore, to quantify soil intake and the subsequent radionuclide uptake by this mechanism. A field investigation of the uptake of radionuclides by farm animals grazing near the Sellafield nuclear reprocessing plant has been pursued. The aims of the study were to estimate the transfer to muscle and other tissues. This paper describes the methods used to estimate both the soil intake and the consequent availability of radionuclides associated with the soil. The measurements were used to evaluate the contribution to tissue content of inadvertent consumption of soil by cows and sheep. 10 refs.; 2 tabs

  1. Prevention of the inadvertent movement and illicit trafficking of radioactive and nuclear materials in Argentine border

    International Nuclear Information System (INIS)

    Bonet Duran, Stella M.; Canibano, Javier A.; Menossi, Sergio A.; Rodriguez, Carlos E.

    2004-01-01

    The inadvertent and illegal movements of radioactive and nuclear materials are issues of increased national and international awareness. States are progressively becoming more conscious of the need to adequately respond to these events. As regards the States' regulatory infrastructure, the design and enforcement of control and verification measures to maintain the continuity of knowledge about possession, use and movements of radioactive and nuclear materials is of critical importance. The existence of an appropriate legislative framework and a regulatory authority empowered to establish effective safety and security measures are essential to prevent inadvertent and illegal movements of nuclear materials and other radioactive materials. The events of Sep. 11, 2001 in the US have increased the States' awareness on the need to review their national infrastructure to identify additional measures against inadvertent and illegal movements of radioactive and nuclear materials as well as against sabotage of nuclear facilities. Argentina has more than a half- century- old tradition regarding the control and supervision of all activities involving the use of nuclear and radioactive materials. The Nuclear Regulatory Authority (ARN) of Argentina is the organization with federal competence in radiation protection, nuclear safety, safeguards and physical protection. It is responsible for issuing licenses and permits to any activity involving radioactive materials and for controlling and verifying that these activities are performed in full compliance with ARN standards and requirements. In the region, Argentina has been playing an important role in the prevention of illicit traffic of nuclear and radioactive materials for the last years within the framework of Security Commission of MERCOSUR. The last goals of this initiative are to define and coordinate actions and to establish a set of common operational procedures in the countries participating in the mentioned multilateral

  2. Intruders: New Neighbors in "Dawn of the Planet of the Apes" and "The Hundred-Foot Journey"

    Science.gov (United States)

    Beck, Bernard

    2015-01-01

    Conflicts over territory are about the power to establish dominant cultures in territories and are often accompanied by cultural claims to legitimacy by each side. The cultural claims, or ideologies, are often expressed in terms of "homeland" dwellers versus "intruders." Two recent movies, "Dawn of the Planet of the…

  3. Resident intruder paradigm-induced aggression relieves depressive-like behaviors in male rats subjected to chronic mild stress

    Science.gov (United States)

    Wei, Sheng; Ji, Xiao-wei; Wu, Chun-ling; Li, Zi-fa; Sun, Peng; Wang, Jie-qiong; Zhao, Qi-tao; Gao, Jie; Guo, Ying-hui; Sun, Shi-guang; Qiao, Ming-qi

    2014-01-01

    Background Accumulating epidemiological evidence shows that life event stressors are major vulnerability factors for psychiatric diseases such as major depression. It is also well known that the resident intruder paradigm (RIP) results in aggressive behavior in male rats. However, it is not known how resident intruder paradigm-induced aggression affects depressive-like behavior in isolated male rats subjected to chronic mild stress (CMS), which is an animal model of depression. Material/Methods Male Wistar rats were divided into 3 groups: non-stressed controls, isolated rats subjected to the CMS protocol, and resident intruder paradigm-exposed rats subjected to the CMS protocol. Results In the sucrose intake test, ingestion of a 1% sucrose solution by rats in the CMS group was significantly lower than in control and CMS+RIP rats after 3 weeks of stress. In the open-field test, CMS rats had significantly lower open-field scores compared to control rats. Furthermore, the total scores given the CMS group were significantly lower than in the CMS+RIP rats. In the forced swimming test (FST), the immobility times of CMS rats were significantly longer than those of the control or CMS+RIP rats. However, no differences were observed between controls and CMS+RIP rats. Conclusions Our data show that aggressive behavior evoked by the resident intruder paradigm could relieve broad-spectrum depressive-like behaviors in isolated adult male rats subjected to CMS. PMID:24911067

  4. Inadvertent yellow fever vaccination of a patient with Crohn's disease treated with infliximab and methotrexate

    DEFF Research Database (Denmark)

    Ekenberg, C.; Friis-Møller, N.; Ulstrup, Thomas

    2016-01-01

    We present a case of a 56-year-old woman with Crohn's disease, treated with methotrexate and infliximab, who inadvertently received yellow fever vaccination (YFV) prior to a journey to Tanzania. She was not previously vaccinated against YF. YFV contains live-attenuated virus, and is contraindicated...... in patients treated with immunosuppressive drugs. Following vaccination, the patient fell ill with influenza-like illness. Elevated transaminase levels and YF viremia were detected. Despite being immunocompromised, the patient did not develop more severe adverse effects. Neutralising antibodies to YF virus...... were detected on day 14 following vaccination and remained protective at least 10 months after vaccination. Limited data is available on outcomes of YFV in patients receiving immunosuppressive therapy, including biologics, and we report this case as a reminder of vigilance of vaccine recommendations...

  5. Method and apparatus for preventing inadvertent criticality in a nuclear fueled electric power generating unit

    International Nuclear Information System (INIS)

    Tuley, C.R.; Bauman, D.A.; Neuner, J.A.; Feilchenfeld, M.M.; Greenberg, L.

    1984-01-01

    An inadvertent approach to criticality in a nuclear fueled electric power generating unit is detected and an alarm is generated through on-line monitoring of the neutron flux. The difficulties of accurately measuring the low levels of neutron flux in a subcritical reactor are overcome by the use of a microcomputer which continuously generates average flux count rate signals for incremental time periods from thousands of samples taken during each such period and which serially stores the average flux count rate signals for a preselected time interval. At the end of each incremental time period, the microcomputer compares the latest average flux count rate signal with the oldest, and preferably each of the intervening stored values, and if it exceeds any of them by at least a preselected multiplication factor, an alarm is generated. (author)

  6. LWRA analysis of inadvertent closing of the main steam isolation valve in NPP Krsko

    International Nuclear Information System (INIS)

    Feretic, D.; Cavlina, N.; Grgic, D.; Spalj, S.

    1996-01-01

    The paper describes the use of system code RELAP5/mod2 and analyzer code LWRA in analysis of inadvertent closing of the main steam isolation valve that happened in NPP Krsko on September, 25 1995. Three cases were calculated in order to address different aspects of the modelled transient. This preliminary calculation showed that, even though the real plant behaviour was not completely reproduced, such kind of analysis can help to better understand plant behaviour and to identify important phenomena in the plant during transient. The results calculated by RELAP5 and LWRA were similar and both codes indicated lack of better understanding of the plant systems status. The LWRA was more than 5 times faster than real time. (author)

  7. Inadvertent Apical Extrusion of Sodium Hypochlorite with Evaluation by Dental Volumetric Tomography

    Directory of Open Access Journals (Sweden)

    Elif Delve Başer Can

    2015-01-01

    Full Text Available This case report describes the tissue injury caused by inadvertently extruded NaOCl through the apical constriction. A 56-year-old female patient with complaints of pain, swelling, and ecchymosis on the left side of her face was referred to our clinic. The symptoms had emerged following root canal treatment of the maxillary left first premolar, and a soft tissue complication due to apical extrusion of NaOCl was diagnosed. Antibiotics and analgesics were prescribed. DVT images revealed that the buccal root apex had perforated the maxillary bone. The patient was followed up every other day and became asymptomatic on the 10th day. Endodontic therapy was completed with routine procedures. Determining working length precisely and following irrigation protocols meticulously are indispensable to prevent this type of complication. 3D visualization of the affected area may reveal the cause of the incident.

  8. Investigations on the inadvertent power increase in a PHWR as ASSET experience

    International Nuclear Information System (INIS)

    Kumar, S.H.

    1996-01-01

    Investigations were carried out using the ASSET methodology to find out the root cause of an incident involving inadvertent increase in reactor power in the Unit 1 of Narora Atomic Power Station (NAPS) in India. NAPS is a twin Unit, 220 MWe PHWR based power station. On December 4, 1992, when NPAS Unit 1 was operating at 130 MWe, the reactor power increased steadily on its own and touched 147 MWe, over a period of 14 minutes. The set (demand) power of the triplicated reactor regulating system had increased on its own and in turn has made the reactor to operated at higher power. The power was brought down to 120 MWe by manual intervention. Since adequate system related data during the incident was not available, laboratory studies were carried out using computer simulations for the various process disturbances which could affect the reactor regulating system, for establishing the causes of the event. 4 figs

  9. Investigations on the inadvertent power increase in a PHWR as ASSET experience

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, S H [Operating Plants Safety Div., Atomic Energy Regulatory Board, Mumbai (India)

    1997-12-31

    Investigations were carried out using the ASSET methodology to find out the root cause of an incident involving inadvertent increase in reactor power in the Unit 1 of Narora Atomic Power Station (NAPS) in India. NAPS is a twin Unit, 220 MWe PHWR based power station. On December 4, 1992, when NPAS Unit 1 was operating at 130 MWe, the reactor power increased steadily on its own and touched 147 MWe, over a period of 14 minutes. The set (demand) power of the triplicated reactor regulating system had increased on its own and in turn has made the reactor to operated at higher power. The power was brought down to 120 MWe by manual intervention. Since adequate system related data during the incident was not available, laboratory studies were carried out using computer simulations for the various process disturbances which could affect the reactor regulating system, for establishing the causes of the event. 4 figs.

  10. Analysis of inadvertent safety injection incident at Kori unit 3 on september 6, 1990

    International Nuclear Information System (INIS)

    Kim, Kyun Tae; Chung, Bub Dong; Kim, In Goo; Kim, Hho Jung

    1992-01-01

    The inadvertent safety injection incident occurred at Kori Unit 3 on September 6, 1990 is analyzed using RELAP5/MOD3 code. The event was initiated by a failure of main feedwater control valve in one of three steam generators. The actual sequence of plant transient with the proper estimations of the operator actions is investigated in the present calculation. The calculational results are compared with the plant transient data. It is shown that the results of the plant behaviors are in good agreement with the plant data. The emergency response guidelines is assessed for the time of the SI termination and the establishment of natural circulation. The changes in the time of the SI termination do not significantly affect the overall plant behaviors, and the natural circulation is established

  11. Management of traumatically intruded permanent maxillary lateral incisor - Case report and review of literature

    Directory of Open Access Journals (Sweden)

    Deepak Sharma

    2016-01-01

    Full Text Available Primary etiologic factors of trauma in the permanent dentition are bicycle accidents, sports accidents, falls, and fights. From the standpoint of therapy, anatomy, and prognosis, five different types of luxation lesions are recognized: Concussion, subluxation, extrusive luxation, lateral luxation, and intrusive luxation. Intrusive luxation is apical displacement of tooth into the alveolar bone. The tooth is driven into the socket, compressing the periodontal ligament, and commonly causes a crushing fracture of the alveolar socket. It is considered one of the most severe luxation injuries to affect permanent teeth. Intrusion injuries are often associated with severe damage to the tooth, periodontium, and pulpal tissue. The rare occurrence of this injury, 0.3–1.9% in the permanent dentition, has resulted in limited studies to support suggested treatment regimens. Clinical treatment for intrusion is especially difficult because of the severe complications accompanying it. These complications include pulp necrosis or obliteration, inflammatory root resorption, ankylosis, replacement root resorption, and loss of marginal bone support. Hence, the aim of presenting this case report of intrusive luxation is to highlight the importance of prompt care and root canal dressing and discuss the several treatments proposed to reposition the intruded teeth.

  12. Female song rates in response to simulated intruder are positively related to reproductive success.

    Directory of Open Access Journals (Sweden)

    Kristal E Cain

    2015-10-01

    Full Text Available Bird song is well studied in males as a sexually selected behavior. However, although song is also common among females, it is infrequently examined and poorly understood. Research suggests that song is often used as a resource defense behavior and is important in female-female competition for limited resources, e.g. mates and territories. If so, song should be positively related to fitness and related to other resource defense behaviors, but this possibility has rarely been explored. Here we examine fitness estimates in relation to spontaneous song rates and song rates in response to a simulated intruder (playback, in the superb fairy-wren (Malurus cyaneus, a cooperatively breeding songbird. We also determine how song rates relate to other territorial defense behaviors. Song rate in response to playback, but not spontaneous song rate, was positively related to nest success and the number of fledglings produced by successful females. Further, response song rate was also correlated with other territorial defense behaviors (latency to respond and flights. This evidence supports the hypothesis that female song may be used in the context of female-female competition to improve access to limited reproductive resources, and suggests that song may provide direct fitness benefits.

  13. Flight Test Evaluation of AVOID I (Avionic Observation of Intruder Danger) Collision Avoidance System

    Science.gov (United States)

    1975-05-01

    memory registers A through G ( 2048 bit shift registers) for each of the basic altitude bands (1+26, 113 1+6) to store intruder responses. Since the 1...af EV 11z iIIV~ ~l~~ NADlC-75056-60_ _ _- 2 w< -I- LI- ~jw 0IU oo2 W I aJ W %L6fI9~~AVdI tVOV~ aN9Ao ccH % VdI I11813iA-di V GN Ed a3IV0 %AIII1IilV11W...tei mix ;;; c le z - Is’ %~~~~~~~~~~;s AJIiV1 VdI ~ %AIIV~ v~iO VIR 1ý 123 Lz NADC-7056-6 w, M w o ~2IV ONY Ed CIRNIGVNOO at p 00 CLt % 118I3iAVldSIC3

  14. Endovascular repair of inadvertent arterial injury induced by central venous catheterization using a vascular closure device: A case report

    Energy Technology Data Exchange (ETDEWEB)

    Kim, So Hee; Jang, Woo Jin; Oh, Ju Heyon; Song, Yun Gyu [Samsung Changwon Hospital, Sungkyunkwan University School of Medicine, Changwon (Korea, Republic of)

    2017-04-15

    Central venous catheterization can cause various complications. Inadvertent subclavian artery catheterization was performed during insertion of a central venous catheter in a 73-year-old man suffering from panperitonitis due to small-bowel perforation. Endovascular treatment was conducted to treat the injured subclavian artery with a FemoSeal vascular closure device.

  15. 13 CFR 126.308 - What happens if SBA inadvertently omits a qualified HUBZone SBC from the List?

    Science.gov (United States)

    2010-01-01

    ... writing at U.S. Small Business Administration, 409 Third Street, SW., Washington, DC 20416 or via e-mail... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What happens if SBA inadvertently omits a qualified HUBZone SBC from the List? 126.308 Section 126.308 Business Credit and Assistance...

  16. 46 CFR 308.536 - Declaration where failure to comply with Clause 21 was inadvertent, Form MA-314.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION EMERGENCY OPERATIONS WAR RISK INSURANCE War Risk Cargo Insurance Ii-Open Policy War Risk Cargo... Assured that fails inadvertently to maintain a collateral deposit fund or surety bond in an amount..., which may be obtained from the American War Risk Agency or MARAD. III—Facultative War Risk Cargo...

  17. Evolution of the Collectivity around 68Ni: role of intruder states

    International Nuclear Information System (INIS)

    Dijon, A.

    2012-01-01

    The evolution of magic numbers as a function of the neutron number for a given chain of isotopes is one of the major goals of nuclear physics today. Changing magic numbers may lead to profound modifications in the structure of exotic nuclei and manifest themselves experimentally in rapid changes of collectivity and shapes. In this thesis we have studied nuclei around 68 Ni produced in deep inelastic collisions at GANIL. The nuclei of interest were selected and identified by the large acceptance VAMOS recoil spectrometer. Their structure was studied via the detection of the gamma rays emitted at the target point by the EXOGAM array. In one of the two experiments we also installed a specific setup dedicated to the measurements of the delayed gamma rays emitted by the nuclei after their implantation at the focal plane of VAMOS. In the first experiment we have observed a new isomeric state in 68 Ni with a proton intruder configuration at an excitation energy which sensitively depends on the Z=28 and N=40 shell gaps. New transitions were also identified in odd-mass isotopes of Co, Fe and Mn. In the second experiment we have measured the lifetimes of the first-excited states in 63,65 Co using the recoil distance Doppler shift method. From these lifetimes electromagnetic transition probabilities could be deduced, which in turn shed light on the collectivity of the studied isotopes. Comparisons with the shell model and with mean field calculations were carried and provided additional information on the proton-neutron interaction as well as on the evolution of the collectivity in this mass region. (author) [fr

  18. Measuring virgin female aggression in the female intruder test (FIT): effects of oxytocin, estrous cycle, and anxiety.

    Science.gov (United States)

    de Jong, Trynke R; Beiderbeck, Daniela I; Neumann, Inga D

    2014-01-01

    The costs of violence and aggression in our society have stimulated the scientific search for the predictors and causes of aggression. The majority of studies have focused on males, which are considered to be more aggressive than females in most species. However, rates of offensive behavior in girls and young women are considerable and are currently rising in Western society. The extrapolation of scientific results from males to young, non-maternal females is a priori limited, based on the profound sex differences in brain areas and functioning of neurotransmitters involved in aggression. Therefore, we established a paradigm to assess aggressive behavior in young virgin female rats, i.e. the female intruder test (FIT). We found that approximately 40% of un-manipulated adult (10-11 weeks old) female Wistar rats attack an intruder female during the FIT, independent of their estrous phase or that of their intruder. In addition, adolescent (7-8 weeks old) female rats selected for high anxiety behavior (HABs) displayed significantly more aggression than non-selected (NAB) or low-anxiety (LAB) rats. Intracerebroventricular infusion of oxytocin (OXT, 0.1 µg/5 µl) inhibited aggressive behavior in adult NAB and LAB, but not HAB females. Adolescent NAB rats that had been aggressive towards their intruder showed increased pERK immunoreactivity (IR) in the hypothalamic attack area and reduced pERK-IR in OXT neurons in the paraventricular hypothalamic nucleus compared to non-aggressive NAB rats. Taken together, aggressive behavior in young virgin female rats is partly dependent on trait anxiety, and appears to be under considerable OXT control.

  19. Measuring virgin female aggression in the female intruder test (FIT: effects of oxytocin, estrous cycle, and anxiety.

    Directory of Open Access Journals (Sweden)

    Trynke R de Jong

    Full Text Available The costs of violence and aggression in our society have stimulated the scientific search for the predictors and causes of aggression. The majority of studies have focused on males, which are considered to be more aggressive than females in most species. However, rates of offensive behavior in girls and young women are considerable and are currently rising in Western society. The extrapolation of scientific results from males to young, non-maternal females is a priori limited, based on the profound sex differences in brain areas and functioning of neurotransmitters involved in aggression. Therefore, we established a paradigm to assess aggressive behavior in young virgin female rats, i.e. the female intruder test (FIT. We found that approximately 40% of un-manipulated adult (10-11 weeks old female Wistar rats attack an intruder female during the FIT, independent of their estrous phase or that of their intruder. In addition, adolescent (7-8 weeks old female rats selected for high anxiety behavior (HABs displayed significantly more aggression than non-selected (NAB or low-anxiety (LAB rats. Intracerebroventricular infusion of oxytocin (OXT, 0.1 µg/5 µl inhibited aggressive behavior in adult NAB and LAB, but not HAB females. Adolescent NAB rats that had been aggressive towards their intruder showed increased pERK immunoreactivity (IR in the hypothalamic attack area and reduced pERK-IR in OXT neurons in the paraventricular hypothalamic nucleus compared to non-aggressive NAB rats. Taken together, aggressive behavior in young virgin female rats is partly dependent on trait anxiety, and appears to be under considerable OXT control.

  20. Passive Barriers to Inadvertent Human Intrusion for Use at the Nevada Test Site

    International Nuclear Information System (INIS)

    NSTec Environmental Management

    2007-01-01

    In July1996, BN transmitted Passive Barriers to Inadvertent Human Intrusion for Use at the Nevada Test Site to the United States Department of Energy, under Contract DE-AC08-91NV10833. The 1996 paper had a limited distribution and was not reviewed for public release. In 2007, National Security Technologies LLC (NSTec) made minor revisions to conform to current editorial standards of the NNSA/NSO and to meet current security requirements for public release. The primary purpose of this study was to identify types of engineered passive barriers that could deter future intrusion into buried low-level radioactive waste, particularly intrusion by drilling water wells. The study considered drilling technology, many natural and man-made materials, and both underground and above-ground barriers. Based on cost and effectiveness, the report recommended underground barriers consisting of a layer of rubble or tires. An aboveground barrier mound might also prove effective, but would cost more, and may become an attractive nuisance (e.g., might, after their purpose has been forgotten, encourage exploration for the sake of satisfying curiosity). Advances in drilling technology could render any engineered barriers ineffective if there is motivation to penetrate the barriers

  1. Inadvertent recovery in communication deficits following the upper limb mirror therapy in stroke: A case report.

    Science.gov (United States)

    Arya, Kamal Narayan; Pandian, Shanta

    2014-10-01

    Broca's aphasia is the most challenging communication deficit in stroke. Left inferior frontal gyrus (IFG), a key region of the mirror-neuron system, gets lesioned in Broca's aphasia. Mirror therapy (MT), a form of action-observation, may trigger the mirror neurons. The aim of this study was to report a case of poststroke subject with Broca's aphasia, who exhibited an inadvertent and significant improvement in speech after MT for the paretic upper limb. The 20-month old stroke patient underwent MT through goal-directed tasks. He received a total absence of spontaneous speech, writing, and naming. After 45 sessions of task-based MT for the upper limb, he showed tremendous recovery in expressive communication. He had fluent and comprehensive communication; however, with a low pitch and minor pronunciation errors. He showed a substantial change (from 18/100 to 79/100) on the Communicative Effective Index, particularly, on items such as expressing emotions, one-to-one conversation, naming, and spontaneous conversation. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. Sinus anatomy associated with inadvertent cerebrospinal fluid leak during functional endoscopic sinus surgery.

    Science.gov (United States)

    Heaton, Chase M; Goldberg, Andrew N; Pletcher, Steven D; Glastonbury, Christine M

    2012-07-01

    Anatomic variations in skull base anatomy may predispose the surgeon to inadvertent skull base injury with resultant cerebrospinal fluid (CSF) leak during functional endoscopic sinus surgery (ESS). Our objective was to compare preoperative sinus imaging of patients who underwent FESS with and without CSF leak to elucidate these variations. In this retrospective case-control study, 18 patients with CSF leak following FESS for chronic rhinosinusitis (CRS) from 2000 to 2011 were compared to 18 randomly selected patients who underwent preoperative imaging for FESS for CRS. Measurements were obtained from preoperative computed tomography images with specific attention to anatomic differences in cribriform plate and ethmoid roof heights in the coronal plane, and the skull base angle in the sagittal plane. Mean values of measured variables were compared using a nonparametric Mann-Whitney test. When compared to controls, patients with CSF leak demonstrated a greater angle of the skull base in the sagittal plane (P variations may help to prevent iatrogenic CSF leak. Copyright © 2012 The American Laryngological, Rhinological, and Otological Society, Inc.

  3. Evaluation of SPACE code for simulation of inadvertent opening of spray valve in Shin Kori unit 1

    International Nuclear Information System (INIS)

    Kim, Seyun; Youn, Bumsoo

    2013-01-01

    SPACE code is expected to be applied to the safety analysis for LOCA (Loss of Coolant Accident) and Non-LOCA scenarios. SPACE code solves two-fluid, three-field governing equations and programmed with C++ computer language using object-oriented concepts. To evaluate the analysis capability for the transient phenomena in the actual nuclear power plant, an inadvertent opening of spray valve in startup test phase of Shin Kori unit 1 was simulated with SPACE code. To evaluate the analysis capability for the transient phenomena in the actual nuclear power plant, an inadvertent opening of spray valve in startup test phase of Shin Kori unit 1 was simulated with SPACE code

  4. Inadvertent Splenectomy During Resection for Colorectal Cancer Does Not Increase Long-term Mortality in a Propensity Score Model

    DEFF Research Database (Denmark)

    Lolle, Ida; Pommergaard, Hans-Christian; Schefte, David F

    2016-01-01

    BACKGROUND: Previous studies suggest that long-term mortality is increased in patients who undergo splenectomy during surgery for colorectal cancer. The reason for this association remains unclear. OBJECTIVE: The purpose of this study was to investigate the association between inadvertent...... splenectomy attributed to iatrogenic lesion to the spleen during colorectal cancer resections and long-term mortality in a national cohort of unselected patients. DESIGN: This was a retrospective, nationwide cohort study. SETTINGS: Data were collected from the database of the Danish Colorectal Cancer Group...... for patients surviving 30 days after surgery. Secondary outcomes were 30-day mortality and risk factors for inadvertent splenectomy. Multivariable and propensity-score matched Cox regression analyses were used to adjust for potential confounding. RESULTS: In total, 23,727 patients were included, of which 277...

  5. Les femmes et le langage selon Charles Bally: "des moments de décevante inadvertance"?

    Directory of Open Access Journals (Sweden)

    Durrer, Sylvie

    2002-01-01

    Full Text Available Les problématiques rassemblées parfois sous la désignation de "Language and Gender" figurent également dans les publications du linguiste suisse Charles Bally. Cet axe de réflexion, qui n’a guère été remarqué dans son œuvre, mérite d’être mis en lumière, non pas pour faire de Bally un féministe avant l’heure, mais simplement, parce qu’il nous semble important de documenter l’histoire d’une problématique en plein essor. Cet article a donc pour objectif de montrer que la question du traitement des femmes et du féminin par la langue française suscite de nombreuses réflexions dès la fin du XIXe. Il s’agira de procéder à une histoire critique d’un épisode de la "linguistique générique", afin de voir si les actuelles thématiques de cette orientation sont abordées, sous quels aspects, dans quels contextes, avec quels résultats, etc. On pourrait alors être surpris-e de découvrir que Charles Bally n’était pas un cas isolé, mais qu’un grand nombre de contemporains (Nyrop, Brunot, Vendryès, Damourette & Pichon, Dauzat, etc., se sont eux aussi interrogés, plus ou moins longuement, sur les rapports entre les femmes, le féminin et le langage. Les réflexions "génériques" de Bally et de ses confrères ne sauraient donc être regardées comme de simples "moments décevante inadvertance".

  6. The social image of drinking - mass media campaigns may inadvertently increase binge drinking.

    Science.gov (United States)

    Zimmermann, Friederike; Kohlmann, Karoline; Monter, Anne; Ameis, Nina

    2017-10-01

    Mass media campaigns that promote responsible drinking are rarely tested for their usefulness in reducing heavy alcohol consumption. Existing campaigns that appeal to responsible drinking while simultaneously displaying young people in social drinking situations may even have paradoxical effects. To examine such possible effects, we drew on a real-world media campaign, which we systematically modified on the basis of recent prototype research. We pilot tested questionnaires (using n = 41 participants), developed two different sets of posters in the style of an existing campaign (n = 39) and investigated their effectiveness (n = 102). In the main study, young men were randomly assigned to one of three conditions: sociable or unsociable binge drinker prototype condition or a control group. Outcome variables were intention, behavioural willingness, attitude, subjective norm, self-efficacy, prototype evaluation and prototype similarity with respect to binge drinking. Binge drinking as a habit was included to control for the fact that habitual drinking in social situations is hard to overcome and poses a particular challenge to interventions. The manipulation check showed that the experimental variation (sociable vs. unsociable drinker prototype condition) was successful. Results of the main study showed that the sociable drinker prototype condition resulted in a higher willingness and - for those with less of a habit - a higher intention to binge drink the next weekend. The unsociable drinker prototype condition had no effects. The results imply that the social components of mass media campaigns might inadvertently exacerbate binge drinking in young men. We therefore advocate against campaigns including aspects of alcohol consumption that might be positively associated with drinker prototype perception. Finally, we provide suggestions for future research.

  7. Comparison of resistive heating and forced-air warming to prevent inadvertent perioperative hypothermia.

    Science.gov (United States)

    John, M; Crook, D; Dasari, K; Eljelani, F; El-Haboby, A; Harper, C M

    2016-02-01

    Forced-air warming is a commonly used warming modality, which has been shown to reduce the incidence of inadvertent perioperative hypothermia (heating mattresses offer a potentially cheaper alternative, however, and one of the research recommendations from the National Institute for Health and Care Excellence was to evaluate such devices formally. We conducted a randomized single-blinded study comparing perioperative hypothermia in patients receiving resistive heating or forced-air warming. A total of 160 patients undergoing non-emergency surgery were recruited and randomly allocated to receive either forced-air warming (n=78) or resistive heating (n=82) in the perioperative period. Patient core temperatures were monitored after induction of anaesthesia until the end of surgery and in the recovery room. Our primary outcome measures included the final intraoperative temperature and incidence of hypothermia at the end of surgery. There was a significantly higher rate of hypothermia at the end of surgery in the resistive heating group compared with the forced-air warming group (P=0.017). Final intraoperative temperatures were also significantly lower in the resistive heating group (35.9 compared with 36.1°C, P=0.029). Hypothermia at the end of surgery in both warming groups was common (36% forced air warming, 54% resistive heating). Our results suggest that forced-air warming is more effective than resistive heating in preventing postoperative hypothermia. NCT01056991. © The Author 2016. Published by Oxford University Press on behalf of the British Journal of Anaesthesia. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  8. Experience during the monitoring of inactive scrap for the detection of inadvertent presence of radioactivity

    International Nuclear Information System (INIS)

    Sharma, Ranjit; Kumar, Anoj; Vikas; Patra, R.P.; Kumar, Vikas; Singh, Rajvir; Pradeepkumar, K.S.

    2012-01-01

    The inspection and certification of scrap material from nuclear facilities is a regulatory requirement to ensure that radioactive material will not reach public domain. Around the world, cases involving radioactive contamination of metallic components have occurred due to radioactive sources/contaminated metal scrap reaching the public domain. Radiological monitoring of inactive scrap material is essential as it may get into various usages in public domain where controls cannot be implemented. The method of detection is measurement of gamma dose rates due to any loose/fixed radioactive contamination in the scrap or presence of any radioactive material/source. In addition prevention of any inadvertent/malicious act leading to radioactive material reaching the public domain through scrap being essential, this monitoring gains further importance. This paper describes the methodology and experience in detection of presence of radioactivity at inactive Scrap monitoring facility. Even though radioactive sources of high strength with potential for serious environmental hazard have not been detected, few cases of contaminated material (MS plate/equipments etc with extremely low level of 137 Cs and Uranium contamination) have been detected and identified using portable gamma spectrometer. If proper monitoring is not carried out the dispersal of radioactivity to the environment can be a matter of concern due to metal scrap reaching recycling industry resulting in huge cost of decontamination and waste disposal. These events may also have negative impact on the export from the country resulting in economic losses. The impact of such events can be ruled out by effective scrap monitoring techniques which ensure that even small quantity of radioactivity escaping into public domain can be prevented. The methodology followed for monitoring of inactive scrap is found to be effective even for detection of presence of very low level of radioactivity

  9. Safety significance of inadvertent operation of motor-operated valves in nuclear power plants

    International Nuclear Information System (INIS)

    Ruger, C.J.; Higgins, J.C.; Carbonaro, J.F.; Hall, R.E.

    1994-01-01

    Concerns about the consequences of valve mispositioning were brought to the forefront following an event at Davis Besse in 1985. The concern related to the ability to reposition open-quotes position-changeableclose quotes motor-operated valves (MOVs) from the control room in the event of their inadvertent operation and was documented in U.S. Nuclear Regulatory Commission (USNRC) Bulletin 85-03 and Generic Letter (GL) 89-10. The mispositioned MOVs may not be able to be returned to their required position due to high differential pressure or high flow conditions across the valves. The inability to reposition such valves may have significantly safety consequences, as in the Davis Besse event. However, full consideration of such mispositioning in safety analyses and in MOV test programs can be labor intensive and expensive. Industry raised concerns that consideration of position-changeable valves under GL 89-10 would not decrease the probability of core damage to an extent that would justify licensee costs. As a response, Brookhaven National Laboratory has conducted separate scoping studies for both boiling water reactors (BWRs) and pressurized water reactors (PWRs) using probabilistic risk assessment (PRA) techniques to determine if such valve mispositioning by itself is significant to safety. The approach used internal events PRA models to survey the order of magnitude of the risk-significance of valve mispositioning by considering the failure of selected position-changeable MOVs. The change in core damage frequency was determined for each valve considered, and the results were presented as a risk increase ratio for each of four assumed MOV failure rates. The risk increase ratios resulting from this failure rate sensitivity study can be used as a basis for a determination of the risk-significance of the MOV mispositioning issues for BWRs and PWRs

  10. Effect of intruder mass on collisions with hard binaries. II - Dependence on impact parameter and computations of the interaction cross sections

    Science.gov (United States)

    Hills, J. G.

    1992-06-01

    Over 125,000 encounters between a hard binary with equal mass, components and orbital eccentricity of 0, and intruders with solar masses ranging from 0.01 to 10,000 are simulated. Each encounter was followed up to a maximum of 5 x 10 exp 6 integration steps to allow long-term 'resonances', temporary trinary systems, to break into a binary and a single star. These simulations were done over a range of impact parameters to find the cross sections for various processes occurring in these encounters. A critical impact parameter found in these simulations is the one beyond which no exchange collisions can occur. The energy exchange between the binary and a massive intruder decreases greatly in collisions with Rmin of not less than Rc. The semimajor axes and orbital eccentricity of the surviving binary also drops rapidly at Rc in encounters with massive intruders. The formation of temporary trinary systems is important for all intruder masses.

  11. Active body surface warming systems for preventing complications caused by inadvertent perioperative hypothermia in adults.

    Science.gov (United States)

    Madrid, Eva; Urrútia, Gerard; Roqué i Figuls, Marta; Pardo-Hernandez, Hector; Campos, Juan Manuel; Paniagua, Pilar; Maestre, Luz; Alonso-Coello, Pablo

    2016-04-21

    Inadvertent perioperative hypothermia is a phenomenon that can occur as a result of the suppression of the central mechanisms of temperature regulation due to anaesthesia, and of prolonged exposure of large surfaces of skin to cold temperatures in operating rooms. Inadvertent perioperative hypothermia has been associated with clinical complications such as surgical site infection and wound-healing delay, increased bleeding or cardiovascular events. One of the most frequently used techniques to prevent inadvertent perioperative hypothermia is active body surface warming systems (ABSW), which generate heat mechanically (heating of air, water or gels) that is transferred to the patient via skin contact. To assess the effectiveness of pre- or intraoperative active body surface warming systems (ABSW), or both, to prevent perioperative complications from unintended hypothermia during surgery in adults. We searched the Cochrane Central Register of Controlled Trials (CENTRAL; Issue 9, 2015); MEDLINE (PubMed) (1964 to October 2015), EMBASE (Ovid) (1980 to October 2015), and CINAHL (Ovid) (1982 to October 2015). We included randomized controlled trials (RCTs) that compared an ABSW system aimed at maintaining normothermia perioperatively against a control or against any other ABSW system. Eligible studies also had to include relevant clinical outcomes other than measuring temperature alone. Several authors, by pairs, screened references and determined eligibility, extracted data, and assessed risks of bias. We resolved disagreements by discussion and consensus, with the collaboration of a third author. We included 67 trials with 5438 participants that comprised 79 comparisons. Forty-five RCTs compared ABSW versus control, whereas 18 compared two different types of ABSW, and 10 compared two different techniques to administer the same type of ABSW. Forced-air warming (FAW) was by far the most studied intervention.Trials varied widely regarding whether the interventions were

  12. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: the ONSITE/MAXI1 computer program. Supplement No. 1

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.; Neuder, S.M.

    1986-05-01

    The document entitled Intruder Dose Pathway Analysis of the Onsite Disposal of Radioactive Wastes: The ONSITE/MAXI1 Computer Program (1984) summarizes initial efforts to develop human-intrustion scenarios and a modified version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. This document is a supplement to that document and summarizes efforts to further modify and improve the ONSITE/MAXI1 software package. To facilitate cross-referencing, it follows the same format. Notable improvements to the software package include the capability to account for shielding conditions that represent noncompacted trash wastes and the option to indicate alternative land-use condition;s. This supplement contains a description of the implementation of these modifications. In addition, a series of discussions are included in an attempt to increase the user's understanding of the scenarios and dose calculation methods. These discussions respond to frequently asked questions about the mathematical models and use of the software. Computer listings of the ONSITE/MAXI1 computer program are included as Appendices A and B of this document. Appendix C lists external exposure dose-rate factor libraries

  13. Control and Management of Radioactive Material Inadvertently Incorporated into Scrap Metal. Proceedings of an International Conference

    International Nuclear Information System (INIS)

    2011-01-01

    Radioactive substances can become associated with scrap metal in various ways and if not discovered they can be incorporated into steel and non-ferrous metals through the melting process. This can cause health hazards as well as environmental concerns and there can be serious commercial implications. Numerous incidents have occurred in recent years involving the discovery of radioactive substances in scrap metal and, in some cases, in metal from the melting process. These incidents have proved to be very costly in relation to the recovery and cleanup operations required but also in terms of the potential loss of confidence of the industry in scrap metal as a resource. This has led the scrap metal industry to seek ways of managing the problem. In most countries, shipments of scrap metal are monitored but at different points in the distribution chain and to different extents and efficiencies. As yet, only limited efforts towards unifying and harmonizing monitoring strategies and methods in the context of scrap metal have been made at the international level. The Conference was organized into five sessions: the global perspective, national policies and strategies, compliance with radiological criteria, management of incidents with contaminated scrap metal, and improving confidence and protecting the interests of stakeholders. The aim of the first session was to present the views and perspectives of the different organizations concerned with radioactive material in scrap metal, scrap metal recycling, steel making, radiation source security and safety and international trade and economics. The second session covered some of the national policies and strategies being used to address the control of radioactive material that has been inadvertently incorporated into scrap metal were presented. In addition to the oral presentations, contributions describing the situation in many countries of the world in the form of posters were displayed. The many posters reporting national

  14. Warming of intravenous and irrigation fluids for preventing inadvertent perioperative hypothermia.

    Science.gov (United States)

    Campbell, Gillian; Alderson, Phil; Smith, Andrew F; Warttig, Sheryl

    2015-04-13

    Inadvertent perioperative hypothermia (a drop in core temperature to below 36°C) occurs because of interference with normal temperature regulation by anaesthetic drugs, exposure of skin for prolonged periods and receipt of large volumes of intravenous and irrigation fluids. If the temperature of these fluids is below core body temperature, they can cause significant heat loss. Warming intravenous and irrigation fluids to core body temperature or above might prevent some of this heat loss and subsequent hypothermia. To estimate the effectiveness of preoperative or intraoperative warming, or both, of intravenous and irrigation fluids in preventing perioperative hypothermia and its complications during surgery in adults. We searched the Cochrane Central Register of Controlled Trials (CENTRAL) (2014, Issue 2), MEDLINE Ovid SP (1956 to 4 February 2014), EMBASE Ovid SP (1982 to 4 February 2014), the Institute for Scientific Information (ISI) Web of Science (1950 to 4 February 2014), Cumulative Index to Nursing and Allied Health Literature (CINAHL) EBSCOhost (1980 to 4 February 2014) and reference lists of identified articles. We also searched the Current Controlled Trials website and ClinicalTrials.gov. We included randomized controlled trials or quasi-randomized controlled trials comparing fluid warming methods versus standard care or versus other warming methods used to maintain normothermia. Two review authors independently extracted data from eligible trials and settled disputes with a third review author. We contacted study authors to ask for additional details when needed. We collected data on adverse events only if they were reported in the trials. We included in this review 24 studies with a total of 1250 participants. The trials included various numbers and types of participants. Investigators used a range of methods to warm fluids to temperatures between 37°C and 41°C. We found that evidence was of moderate quality because descriptions of trial design were

  15. Control and Management of Radioactive Material Inadvertently Incorporated into Scrap Metal. Proceedings of an International Conference

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-15

    Radioactive substances can become associated with scrap metal in various ways and if not discovered they can be incorporated into steel and non-ferrous metals through the melting process. This can cause health hazards as well as environmental concerns and there can be serious commercial implications. Numerous incidents have occurred in recent years involving the discovery of radioactive substances in scrap metal and, in some cases, in metal from the melting process. These incidents have proved to be very costly in relation to the recovery and cleanup operations required but also in terms of the potential loss of confidence of the industry in scrap metal as a resource. This has led the scrap metal industry to seek ways of managing the problem. In most countries, shipments of scrap metal are monitored but at different points in the distribution chain and to different extents and efficiencies. As yet, only limited efforts towards unifying and harmonizing monitoring strategies and methods in the context of scrap metal have been made at the international level. The Conference was organized into five sessions: the global perspective, national policies and strategies, compliance with radiological criteria, management of incidents with contaminated scrap metal, and improving confidence and protecting the interests of stakeholders. The aim of the first session was to present the views and perspectives of the different organizations concerned with radioactive material in scrap metal, scrap metal recycling, steel making, radiation source security and safety and international trade and economics. The second session covered some of the national policies and strategies being used to address the control of radioactive material that has been inadvertently incorporated into scrap metal were presented. In addition to the oral presentations, contributions describing the situation in many countries of the world in the form of posters were displayed. The many posters reporting national

  16. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1992-05-01

    This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicitly displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information

  17. Study of 'inadvertent human intrusion or rare natural event scenarios' for sub-surface disposal of radioactive waste

    International Nuclear Information System (INIS)

    Nakatani, Takayoshi; Ishitoya, Kimihide; Funabashi, Hideyuki; Sugaya, Toshikatsu; Sone, Tomoyuki; Shimada, Hidemitsu; Nakai, Kunihiro

    2010-03-01

    Japan Atomic Energy Agency (JAEA) is making preparations for the sub-surface disposal of radioactive wastes, in an integrated fashion according to the properties of the waste material regardless of the generators or waste sources. In this study, 'Inadvertent Human Intrusion or Rare Natural Event Scenarios' of 'Three Types scenarios' was considered according to the standard of the Atomic Energy Society of Japan (AESJ) on the sub-surface disposal system that was based on 'Basic Policy for Safety Regulation Concerning Land Disposal of Low-Level Radioactive Waste (Interim Report)' by Nuclear Safety Commission of Japan (NSC). Selection of the assessed scenarios, development of the assessment tool and preliminary exposure dose assessment for general public were conducted. Among the assessed scenarios, the exposure dose of 'well water drinking scenario' was the highest under the very conservative assessment condition. This scenario assumed that the groundwater in Excavation Disturbed Zone (EDZ) was directly used as drinking water without any dilution. Although this was very conservative condition and the result exceeded 10 mSv/y, it stayed under the upper limit of standard dose value for 'Inadvertent Human Intrusion or Rare Natural Event Scenarios' (10 - 100 mSv/y). (author)

  18. DIRECT USAGE OF MINISCREW ANCHORAGE TO INTRUDE OVERERUPTED MAXILLARY POSTERIOR TEETH BEFORE PROSTHODONTIC PREPARATION:A CASE REPORT

    Directory of Open Access Journals (Sweden)

    Yasemin Bahar Acar

    2016-01-01

    Full Text Available Overeruption of maxillary molars due loss of opposing teeth creates occlusal and functional interferences. Before reconstruction can be initiated, intrusion of overerupted molars becomes essential. This report illustrates treatment of overerupted maxillary premolar and molar via direct use of miniscrew anchorage. A 24-year old female had lost first and second left mandibular molars due to pulpal necrotizing agents, resulting with a large alveolar bone defect and overerupted maxillary premolar and molar. She had a history of unsuccessful alveolar distraction of mandibular left premolars to increase the alveolar bone height prior to implant placement. Patient was satisfied with her smile and refused comprehensive orthodontic treatment. Maxillary premolar and molar were intruded segmentally for 4mm in 8 months, using a combination of a mini-implant and partialfixed edgewise appliances. Biological responses of teeth and surrounding bony structures to intrusion appeared normal and acceptable in radiographic and clinical examination.

  19. U-Pb SHRIMP data and geochemical characterization of granitoids intruded along the Coxixola shear zone, Provincia Borborema, NE Brazil

    Energy Technology Data Exchange (ETDEWEB)

    Guimaraes, Ignez de Pinho; Silva Filho, Adejardo Francisco da; Silva, Francis M.J.V. da, E-mail: ignez@ufpe.br [Universidade Federal de Pernanmbuco (UFPE), Recife, PE (Brazil). Dept. de Geologia; Armstrong, Richard [Australian National University (Australia)

    2011-07-01

    A large volume of granitic magmatism associated with large scale shear zone and metamorphism under high-T amphibolite facies conditions characterize the Brasiliano Orogeny in the Borborema Province, NE Brazil. Granitoids from two plutons and later dykes intruded along the Coxixola shear zone show distinct crystallization ages and geochemical signature. The oldest granitoids (618 ± 5 Ma), Serra de Inacio Pereira Pluton are coeval with the peak of regional metamorphism and they were probably originated by melting of a paleoproterozoic source. The granitoids from the Serra do Marinho Pluton show crystallization age of 563 ± 4 Ma and geochemical signature of post-collisional A-type granites. The later dykes have crystallization age of 526 ± 7 Ma, geochemical signature of A-type granitoids. (author)

  20. Fully automated radiochemical preparation system for gamma-spectroscopy on fission products and the study of the intruder and vibrational levels in 83Se

    International Nuclear Information System (INIS)

    Lien, O.G. III.

    1983-10-01

    AUTOBATCH was developed to provide a usable source of short-lived neutron-rich nuclides through chemical preparation of the sample from fission products for detailed gamma-ray spectroscopy, which would complement the output of on-line isotope separators. With AUTOBATCH the gamma rays following the β - decay of 83 As were studied to determine the ground state spin and parity of 83 As to be 5/2 - ; the absolute intensity of the β - branch from 83 As to 83 Se/sup m/ to be 0.3%; the absolute intensity of the ground state β - branch from 83 Se/sup m/ to 83 Br to be 39%; the halflife of the 5/2 1 + level to be 3.2 ns; and the structure of 83 Se 49 . Results are used to show that the intruder structure which had been previously observed in the odd mass 49 In isotopes could be observed in the N = 49 isotones. The observed structure is discussed in terms of the unified model calculations of Heyde which has been used to describe the intruder structure in the indium nuclei. The intruder structure is most strongly developed, not at core mid-shell, 89 Zr 49 , but rather at core mid-sub-shell 83 Se. This difference is qualitatively understood to be due to the blocking of collectivity by the Z = 40 subshell closure which prevents the intruder structure from occurring in 87 Sr 49 and 89 Zr 49

  1. Intruder dose pathway analysis for the onsite disposal of commercial radioactive waste

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.

    1984-10-01

    Because of uncertainties associated with assessing the potential risks from onsite burials of commercial radioactive waste, the US Nuclear Regulatory Commission (NRC) has amended its regulations to provide greater assurance that buried radioactive material will not present a hazard to public health and safety. The amended regulations now require licensees to apply for approval of proposed procedures for onsite disposal pursuant to 10 CFR 20.302. The NRC technically reviews these requests on a case-by-case basis. These technical reviews require modeling potential pathways to man and projecting radiation dose commitments. This paper contains a summary of our efforts to develop human-intrusion scenarios and to modify a version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. The ONSITE/MAXI1 computer software package contains four computer codes. ONSITE is the interactive user interface that allows the end-user to simply and efficiently create and use the radiation-exposure scenarios. MAXI1 is then used with the scenario information to calculate the maximum annual dose to the exposed individual from selected pathways. 1 figure

  2. Delayed orthodontic extrusion of a traumatically intruded immature upper permanent incisor - a case report.

    Science.gov (United States)

    Umesan, Uday Kumar; Chua, Kui Lay; Kok, Ei Chuen

    2014-10-01

    Dental injuries are probably the most common orofacial injuries sustained during sports and play. Intrusion or intrusive luxations occur when the teeth are driven into the alveolus by an axially directed impact. This article describes the clinical case of an 8-year-old patient who suffered complete intrusive luxation of an immature permanent central incisor following an accident. An attempt at spontaneous re-eruption failed to facilitate re-emergence of the tooth beyond 2 mm. The recommended wait-and-see strategy in anticipation of spontaneous re-eruption should cease to be an option when no further elongation can be observed. Orthodontic extrusion or surgical re-positioning is a valid treatment alternative when the former fails. In this case, although the recommended time period for effecting orthodontic extrusion had elapsed, this procedure was undertaken successfully presumably owing to the application of controlled, biologically optimal forces. A review of the extruded tooth a year later revealed no clinical or radiographic signs of loss of vitality. This was confirmed radiographically by the completion of root development, an intact lamina dura and no evident signs of resorption. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  3. Publisher Correction: Western US volcanism due to intruding oceanic mantle driven by ancient Farallon slabs

    Science.gov (United States)

    Zhou, Quan; Liu, Lijun; Hu, Jiashun

    2018-05-01

    In the version of this Article originally published, data points representing mafic eruptions were missing from Fig. 4b, the corrected version is shown below. Furthermore, the authors omitted to include the following acknowledgements to the provider of the computational resources: "This research is part of the Blue Waters sustained-petascale computing project, which is supported by the National Science Foundation (awards OCI-0725070 and ACI-1238993) and the state of Illinois. Blue Waters is a joint effort of the University of Illinois at Urbana-Champaign and its National Center for Supercomputing Applications. This work is also part of the `PRAC Title 4-D Geodynamic Modeling With Data Assimilation: Origin Of Intra-Plate Volcanism In The Pacific Northwest' PRAC allocation support by the National Science Foundation (award number ACI 1516586). This work also used the Extreme Science and Engineering Discovery Environment (XSEDE), which is supported by National Science Foundation grant number ACI-1548562." Figure 4 and the Acknowledgements section have been updated in the online version of the Article.

  4. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock -revision 1

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1996-04-01

    Canada has conducted an extensive research program on a concept of safe disposal of nuclear fuel wastes deep In plutonic rock of the Canadian Shield. An essential goal of this program has been to develop and demonstrate a methodology to evaluate the performance of the facility against safety criteria established by Canada's regulatory agency, the Atomic Energy Control Board. These criteria are expressed in terms of risk, where risk is defined as the sum, over all significant scenarios, of the product of the probability of the scenario, the magnitude of the resultant dose, and the probability of a health effect per unit dose. This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicity displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information. (author). 53 refs., 8 tabs., 2 figs

  5. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock -revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Wuschke, D M

    1996-04-01

    Canada has conducted an extensive research program on a concept of safe disposal of nuclear fuel wastes deep In plutonic rock of the Canadian Shield. An essential goal of this program has been to develop and demonstrate a methodology to evaluate the performance of the facility against safety criteria established by Canada`s regulatory agency, the Atomic Energy Control Board. These criteria are expressed in terms of risk, where risk is defined as the sum, over all significant scenarios, of the product of the probability of the scenario, the magnitude of the resultant dose, and the probability of a health effect per unit dose. This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicity displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information. (author). 53 refs., 8 tabs., 2 figs.

  6. Coupling Effect of Intruding Water and Inherent Gas on Coal Strength Based on the Improved (Mohr-Coulomb Failure Criterion

    Directory of Open Access Journals (Sweden)

    Yiyu Lu

    2016-11-01

    Full Text Available When employing hydraulic processes to increase gas drainage efficiency in underground coal mines, coal seams become a three-phase medium, containing water intruding into the coal pores with the inherent occurrence of gas. This can change the stress state of the coal and cause instability. This work studied the mechanical properties of coal containing water and gas and derived an appropriate failure criterion. Based on mixture theory of unsaturated porous media, the effective stress of coal, considering the interaction of water and gas, was analyzed, and the failure criterion established by combining this with the Mohr–Coulomb criterion. By introducing the stress factor of matrix suction and using fitted curves of experimentally determined matrix suction and moisture content, the relationships between coal strength, gas pressure, and moisture content were determined. To verify the established strength theory, a series of triaxial compression strength tests of coal containing water and gas were carried out on samples taken from the Songzao, Pingdingshan, and Tashan mines in China. The experimental results correlated well with the theoretical predictions. The results showed a linear decrease in the peak strength of coal with increasing gas pressure and an exponential reduction in peak strength with increasing moisture content. The strength theory of coal containing water and gas can become an important part of multiphase medium damage theory.

  7. Inadvertent Splenectomy During Resection for Colorectal Cancer Does Not Increase Long-term Mortality in a Propensity Score Model: A Nationwide Cohort Study.

    Science.gov (United States)

    Lolle, Ida; Pommergaard, Hans-Christian; Schefte, David F; Bulut, Orhan; Krarup, Peter-Martin; Rosenstock, Steffen J

    2016-12-01

    Previous studies suggest that long-term mortality is increased in patients who undergo splenectomy during surgery for colorectal cancer. The reason for this association remains unclear. The purpose of this study was to investigate the association between inadvertent splenectomy attributed to iatrogenic lesion to the spleen during colorectal cancer resections and long-term mortality in a national cohort of unselected patients. This was a retrospective, nationwide cohort study. Data were collected from the database of the Danish Colorectal Cancer Group and merged with data from the National Patient Registry and the National Pathology Databank. Danish patients with colorectal cancer undergoing curatively intended resection between 2001 and 2011 were included in the study. The primary outcome was long-term mortality for patients surviving 30 days after surgery. Secondary outcomes were 30-day mortality and risk factors for inadvertent splenectomy. Multivariable and propensity-score matched Cox regression analyses were used to adjust for potential confounding. In total, 23,727 patients were included, of which 277 (1.2%) underwent inadvertent splenectomy. There was no association between inadvertent splenectomy and long-term mortality (adjusted HR = 1.15 (95% CI, 0.95-1.40); p = 0.16) in the propensity score-matched model, whereas 30-day mortality was significantly increased (adjusted HR = 2.31 (95% CI, 1.71-3.11); p splenectomy was most often seen during left hemicolectomy (left hemicolectomy vs right hemicolectomy: OR = 24.76 (95% CI, 15.30-40.06); p splenectomy during resection for colorectal cancer does not seem to increase long-term mortality. The previously reported reduced overall survival after inadvertent splenectomy may be explained by excess mortality in the immediate postoperative period.

  8. Distributed Tracing of Intruders

    National Research Council Canada - National Science Library

    Staniford-Chen, Stuart G

    1995-01-01

    .... One of the things that facilitates this malfeasance is that computer networks provide the ability for a user to log into multiple computer systems in sequence, changing identity with each step...

  9. Evidence utilisation project: Management of inadvertent perioperative hypothermia. The challenges of implementing best practice recommendations in the perioperative environment.

    Science.gov (United States)

    Munday, Judy; Hines, Sonia Jane; Chang, Anne M

    2013-12-01

    The prevention of inadvertent perioperative hypothermia (IPH) remains an important issue in perioperative healthcare. The aims of this project were to: (i) assess current clinical practice in the management of IPH and (ii) promote best practice in the management of IPH in adult operating theatres. This project from August 2010 to March 2012 utilised a system of audit and feedback to implement best practice recommendations. Data were collected via chart audits against criteria developed from best practice recommendations for managing IPH. Evidence-based best practices, such as consistent temperature monitoring and patient warming, were implemented using multifaceted interventions. Perioperative records for 73 patients (baseline) and 72 patients (post-implementation) were audited. Post-implementation audit showed an increase in patients with temperatures >36°C admitted to the post-anaesthetic care unit (PACU) (8%) and discharged from PACU (28%). The percentage of patients receiving preoperative temperature monitoring increased (38%); however, low levels of intraoperative monitoring remained (31% of patients with surgery of 30 min or longer duration). Small increases were found in patient warming of 5% intraoperatively and 8% postoperatively. Preoperative warming was not successfully implemented during this phase of the project. Temperature monitoring, warming and rates of normothermia improved; however, barriers to best practice of IPH management were experienced, which negatively impacted on the project. Further stages of implementation and audit were added to further address IPH management in this department. © 2013 The Authors. International Journal of Evidence-Based Healthcare © 2013 The Joanna Briggs Institute.

  10. Inadvertent chest tube insertion in congenital cystic adenomatoid malformation and congenital lobar emphysema-highlighting an important problem

    International Nuclear Information System (INIS)

    Prabhu, Shailesh M; Choudhury, Subhasis Roy; Solanki, Ravi S; Shetty, Gurucharan S; Agarwala, Surenderkumar

    2013-01-01

    Chest tube insertion in congenital cystic lung lesions is an important problem in children with acute respiratory distress having a cystic lucent lesion on chest radiograph. To evaluate the imaging findings and complications in cases of congenital cystic lung lesions with chest tube insertion and suggest the role of appropriate imaging for management of these patients. Chest radiographs and CT scans of children with congenital cystic lung lesions who had inadvertent chest tube insertion preoperatively were retrospectively reviewed for imaging appearances and complications. Fifteen patients comprising 10 cases of congenital cystic adenomatoid malformation (CCAM) and 5 cases of congenital lobar emphysema (CLE) were included. Majority of the cases were infants. CCAM was misdiagnosed as complicated pneumatocele (n = 5) and pneumothorax (n = 5), while CLE was misdiagnosed as tension pneumothorax (n = 5) on the chest radiograph findings. Final diagnosis was made on CT and operative findings with histopathology. Complications noted were pneumothorax, hydropneumothorax, and infection in cases of CCAM, and change in imaging appearance and pneumothorax in cases of CLE. Chest tube insertion in congenital cystic lesions increases the rate of associated complications. Chest CT has a definite role in early diagnosis and deciding appropriate management in these cases

  11. Simultaneous spectroscopy of $\\gamma$- rays and conversion electrons: Systematic study of EO transitions and intruder states in close vicinity of mid-shell point in odd-Au isotopes

    CERN Multimedia

    Venhart, M; Grant, A F; Petrik, K

    This proposal focuses on detailed systematic studies of the $\\beta$ /EC-decays of $^{179,181,183,185}$Hg leading to excited states in the neutron-deficient Au isotopes in the vicinity of the N=104 midshell. $\\gamma$-ray, X-ray and conversion electron de-excitations of odd-A Au isotopes will be studied simultaneously. These studies will address important structural questions such as the excitation energies of coexisting states, properties of multiple intruder states (i.e. intruder particles coupled to intruder cores) and mixing of coexisting structures. The unique combination of Hg beam purity and yields make ISOLDE a unique facility for these experiments.

  12. TRACE and TRAC-BF1 benchmark against Leibstadt plant data during the event inadvertent opening of relief valves

    Energy Technology Data Exchange (ETDEWEB)

    Sekhri, A.; Baumann, P. [KernkraftwerkLeibstadt AG, 5325 Leibstadt (Switzerland); Wicaksono, D. [Swiss Federal Inst. of Technology Zurich ETH, 8092 Zurich (Switzerland); Miro, R.; Barrachina, T.; Verdu, G. [Inst. for Industrial, Radiophysical and Environmental Safety ISIRYM, Universitat Politecnica de Valencia UPV, Cami de Vera s/n, 46021 Valencia (Spain)

    2012-07-01

    In framework of introducing TRACE code to transient analyses system codes for Leibstadt Power Plant (KKL), a conversion process of existing TRAC-BF1 model to TRACE has been started within KKL. In the first step, TRACE thermal-hydraulic model for KKL has been developed based on existing TRAC-BF1 model. In order to assess the code models a simulation of plant transient event is required. In this matter simulations of inadvertent opening of 8 relief valves event have been performed. The event occurs at KKL during normal operation, and it started when 8 relief valves open resulting in depressurization of the Reactor Pressure Vessel (RPV). The reactor was shutdown safely by SCRAM at low level. The high pressure core spray (HPCS) and the reactor core isolation cooling (RCIC) have been started manually in order to compensate the level drop. The remaining water in the feedwater (FW) lines flashes due to saturation conditions originated from RPV depressurization and refills the reactor downcomer. The plant boundary conditions have been used in the simulations and the FW flow rate has been adjusted for better prediction. The simulations reproduce the plant data with good agreement. It can be concluded that the TRAC-BF1 existing model has been used successfully to develop the TRACE model and the results of the calculations have shown good agreement with plant recorded data. Beside the modeling assessment, the TRACE and TRAC-BF1 capabilities to reproduce plant physical behavior during the transient have shown satisfactory results. The first step of developing KKL model for TRACE has been successfully achieved and this model is further developed in order to simulate more complex plant behavior such as Turbine Trip. (authors)

  13. TRACE and TRAC-BF1 benchmark against Leibstadt plant data during the event inadvertent opening of relief valves

    International Nuclear Information System (INIS)

    Sekhri, A.; Baumann, P.; Wicaksono, D.; Miro, R.; Barrachina, T.; Verdu, G.

    2012-01-01

    In framework of introducing TRACE code to transient analyses system codes for Leibstadt Power Plant (KKL), a conversion process of existing TRAC-BF1 model to TRACE has been started within KKL. In the first step, TRACE thermal-hydraulic model for KKL has been developed based on existing TRAC-BF1 model. In order to assess the code models a simulation of plant transient event is required. In this matter simulations of inadvertent opening of 8 relief valves event have been performed. The event occurs at KKL during normal operation, and it started when 8 relief valves open resulting in depressurization of the Reactor Pressure Vessel (RPV). The reactor was shutdown safely by SCRAM at low level. The high pressure core spray (HPCS) and the reactor core isolation cooling (RCIC) have been started manually in order to compensate the level drop. The remaining water in the feedwater (FW) lines flashes due to saturation conditions originated from RPV depressurization and refills the reactor downcomer. The plant boundary conditions have been used in the simulations and the FW flow rate has been adjusted for better prediction. The simulations reproduce the plant data with good agreement. It can be concluded that the TRAC-BF1 existing model has been used successfully to develop the TRACE model and the results of the calculations have shown good agreement with plant recorded data. Beside the modeling assessment, the TRACE and TRAC-BF1 capabilities to reproduce plant physical behavior during the transient have shown satisfactory results. The first step of developing KKL model for TRACE has been successfully achieved and this model is further developed in order to simulate more complex plant behavior such as Turbine Trip. (authors)

  14. A common-sense probabilistic approach to assessing inadvertent human intrusion into low-level radioactive waste at the Nevada Test Site

    International Nuclear Information System (INIS)

    Black, P.; Hooten, M.; Black, K.; Moore, B.; Rawlinson, S.; Barker, L.

    1997-01-01

    Each site disposing of low-level radioactive waste is required to prepare and maintain a site-specific performance assessment (1) to determine potential risks posed by waste management systems to the public, and the environment, and (2) to compare these risks to established performance objectives. The DOE Nevada Operations Office, Waste Management Program recently completed a one-year study of site-specific scenarios for inadvertent human intrusion by drilling into buried low-level radioactive waste sites, as part of ongoing performance assessment studies. Intrusion scenarios focus on possible penetration of buried waste through drilling for sources of groundwater. The probability of drilling penetration into waste was judged to be driven primarily by two settlement scenarios: (1) scattered individual homesteaders, and (2) a community scenario consisting of a cluster of settlers that share drilling and distribution systems for groundwater. Management control factors include institutional control, site knowledge, placards and markers, surface barriers, and subsurface barriers. The Subject Matter Experts concluded that institutional control and site knowledge may be important factors for the first few centuries, but are not significant over the evaluation period of 10,000 years. Surface barriers can be designed that would deter the siting of a drill rig over the waste site to an effectiveness of 95%. Subsurface barriers and placards and markers will not as effectively prevent inadvertent human intrusion. Homestead and community scenarios were considered by the panel to render a site-specific probability of around 10% for inadvertent human intrusion. If management controls are designed and implemented effectively, then the probability of inadvertent human intrusion can be reduced to less than 1%

  15. Adherence to a Gluten-Free Diet in Mexican Subjects with Gluten-Related Disorders: A High Prevalence of Inadvertent Gluten Intake.

    Science.gov (United States)

    Ramírez-Cervantes, Karen Lizzette; Romero-López, Angélica Viridiana; Núñez-Álvarez, Carlos Alberto; Uscanga-Domínguez, Luis F

    2016-01-01

    The rate of compliance with a gluten-free diet in patients with gluten-related disorders is unknown in most Latin American countries. To study the adherence to a gluten-free diet of Mexican individuals with celiac disease and nonceliac gluten sensitivity at the time of their first medical and nutritional consultation at a tertiary referral center. A cross-sectional study was performed. A specific questionnaire was used to gather information on demographics, clinical condition, and self-reported adherence to a gluten-free diet, and to determine strict compliance and intentional or inadvertent gluten consumption. All questionnaires were applied by a nutritionist with expertise in gluten-related disorders. Fifty-six patients with celiac disease and 24 with non-celiac gluten sensitivity were included. Overall, 46 (57.5%) subjects perceived themselves as strictly adherent; however, inadvertent gluten intake was frequent in both celiac disease and non-celiac gluten sensitivity patients (39.2 vs. 33.3%; p = 0.2). Intentional consumption was more prevalent in subjects with celiac disease (48.8 vs. 29.1%; p = 0.048) and individuals with non-celiac gluten sensitivity showed better adherence (37.5 vs. 12.5%; p = 0.035). The importance of a gluten-free diet is underestimated by Mexican patients with celiac disease. The role of a team with expertise in gluten-related disorders is essential to identify inadvertent gluten intake.

  16. Genotypic differences in intruder-evoked immediate early gene activation in male, but not female, vasopressin 1b receptor knockout mice.

    Science.gov (United States)

    Witchey, Shannah K; Stevenson, Erica L; Caldwell, Heather K

    2016-11-24

    The neuropeptide arginine vasopressin (Avp) modulates social behaviors via its two centrally expressed receptors, the Avp 1a receptor and the Avp 1b receptor (Avpr1b). Recent work suggests that, at least in mice, Avp signaling through Avpr1b within the CA2 region of the hippocampus is critical for normal aggressive behaviors and social recognition memory. However, this brain area is just one part of a larger neural circuit that is likely to be impacted in Avpr1b knockout (-/-) mice. To identify other brain areas that are affected by altered Avpr1b signaling, genotypic differences in immediate early gene activation, i.e. c-FOS and early growth response factor 1 (EGR-1), were quantified using immunocytochemistry following a single exposure to an intruder. In females, no genotypic differences in intruder-evoked c-FOS or EGR-1 immunoreactivity were observed in any of the brain areas measured. In males, while there were no intruder-evoked genotypic differences in c-FOS immunoreactivity, genotypic differences were observed in EGR-1 immunoreactivity within the ventral bed nucleus of the stria terminalis and the anterior hypothalamus; with Avpr1b -/- males having less EGR-1 immunoreactivity in these regions than controls. These data are the first to identify specific brain areas that may be a part of a neural circuit that includes Avpr1b-expressing cells in the CA2 region of the hippocampus. It is thought that this circuit, when working properly, plays a role in how an animal evaluates its social context.

  17. Long-Term Performance of Transuranic Waste Inadvertently Disposed in a Shallow Land Burial Trench at the Nevada Test Site

    International Nuclear Information System (INIS)

    Shott, Gregory J.; Yucel, Vefa

    2009-01-01

    In 1986, 21 m3 of transuranic (TRU) waste was inadvertently disposed in a shallow land burial trench at the Area 5 Radioactive Waste Management Site on the Nevada Test Site. U.S. Department of Energy (DOE) TRU waste must be disposed in accordance with Title 40, Code of Federal Regulations (CFR), Part 191, Environmental Radiation Protection Standard for Management and Disposal of Spent Nuclear Fuel, High-Level, and Transuranic Radioactive Wastes. The Waste Isolation Pilot Plant is the only facility meeting these requirements. The National Research Council, however, has found that exhumation of buried TRU waste for disposal in a deep geologic repository may not be warranted when the effort, exposures, and expense of retrieval are not commensurate with the risk reduction achieved. The long-term risks of leaving the TRU waste in-place are evaluated in two probabilistic performance assessments. A composite analysis, assessing the dose from all disposed waste and interacting sources of residual contamination, estimates an annual total effective dose equivalent (TEDE) of 0.01 mSv, or 3 percent of the dose constraint. A 40 CFR 191 performance assessment also indicates there is reasonable assurance of meeting all requirements. The 40 CFR 191.15 annual mean TEDE for a member of the public is estimated to reach a maximum of 0.055 mSv at 10,000 years, or approximately 37 percent of the 0.15 mSv individual protection requirement. In both assessments greater than 99 percent of the dose is from co-disposed low-level waste. The simulated probability of the 40 CFR 191.13 cumulative release exceeding 1 and 10 times the release limit is estimated to be 0.0093 and less than 0.0001, respectively. Site characterization data and hydrologic process modeling support a conclusion of no groundwater pathway within 10,000 years. Monte Carlo uncertainty analysis indicates that there is reasonable assurance of meeting all regulatory requirements. Sensitivity analysis indicates that the results

  18. Pregnancy outcome after 1st-trimester inadvertent exposure to barium sulphate as a contrast media for upper gastrointestinal tract radiography.

    Science.gov (United States)

    Han, B H; Lee, K S; Han, J Y; Choi, J S; Ahn, H K; Ryu, H M; Yang, J H; Han, H W; Nava-Ocampo, A A

    2011-10-01

    Despite barium being used as a contrast media for decades, the specific assessment of its safety in pregnant women is scarce. We are reporting the favourable pregnancy outcome in women who were inadvertently exposed to barium swallow and associated ionising radiation, early in pregnancy. A control group of age- and gravidity-matched unexposed pregnant women was also included. There were 32 live-born babies in the exposed group and 94 in the control group. Women had undergone diagnostic upper gastrointestinal tract (UGT) fluoroscopic examination at 3.3 ± 1.5 weeks' gestation. Estimated maternal radiation dose secondary to barium swallow varied widely, the maximum dose was estimated to be 2.45 mSv. Similar pregnancy outcomes were observed between the groups. The number of babies born with major malformations was not significantly different (p = 1.0) between cases and controls: one (3.1%) vs three (3.2%), respectively. In conclusion, our small prospective cohort study of women suggests no association between inadvertent exposure to ionising radiation and barium sulphate during fluoroscopic barium swallow and adverse fetal outcomes.

  19. Stepping in Place While Voluntarily Turning Around Produces a Long-Lasting Posteffect Consisting in Inadvertent Turning While Stepping Eyes Closed

    Directory of Open Access Journals (Sweden)

    Stefania Sozzi

    2016-01-01

    Full Text Available Training subjects to step in place on a rotating platform while maintaining a fixed body orientation in space produces a posteffect consisting in inadvertent turning around while stepping in place eyes closed (podokinetic after-rotation, PKAR. We tested the hypothesis that voluntary turning around while stepping in place also produces a posteffect similar to PKAR. Sixteen subjects performed 12 min of voluntary turning while stepping around their vertical axis eyes closed and 12 min of stepping in place eyes open on the center of a platform rotating at 60°/s (pretests. Then, subjects continued stepping in place eyes closed for at least 10 min (posteffect. We recorded the positions of markers fixed to head, shoulder, and feet. The posteffect of voluntary turning shared all features of PKAR. Time decay of angular velocity, stepping cadence, head acceleration, and ratio of angular velocity after to angular velocity before were similar between both protocols. Both postrotations took place inadvertently. The posteffects are possibly dependent on the repeated voluntary contraction of leg and foot intrarotating pelvic muscles that rotate the trunk over the stance foot, a synergy common to both protocols. We propose that stepping in place and voluntary turning can be a scheme ancillary to the rotating platform for training body segment coordination in patients with impairment of turning synergies of various origin.

  20. Influence of i13/2 proton and j15/2 neutron intruding orbitals on the behaviour of 190 mass region superdeformed nuclei

    International Nuclear Information System (INIS)

    Duprat, J.

    1995-01-01

    This work concerns the study of the nuclear superdeformation phenomenon in the A = 190 mass region. The superdeformed (SD) states in 193 Tl, 194 Tl 195 Tl were produced via heavy-ion induced reactions and studied with the EUROGAM gamma multidetector array. The analysis of high-multiplicity events allowed the study of the magnetic properties of the SD states in these nuclei. For the first time, the g-factor of a proton orbital in a SD nucleus in the A = 190 mass region has been extracted. This measurement indicates that the two known bands in 195 Tl-SD are built on the i 13/2 proton intruder orbital. A new SD band has been found in this isotope: it is the first SD band built on an excited proton state found in the A = 190 region. Finally an interaction between two pairs of bands has been established in 194 Tl; this interaction indicate the crossing of two neutron orbitals above the N = 112 gap. The magnetic properties of the states of the SD bands in 194 Tl reveals that these bands are built on configurations in which the single proton and neutron intrinsic spins are aligned. Comparison between different SD bands in the Thallium isotopes shows the prominent role of the i 13/2 proton and the j 15/2 neutron intruder orbitals in the smooth increase of the dynamical moment of inertia as a function of the rotational frequency. In addition, this work reports on the first observation of a SD rotational band produced in a (HI, αxn) reaction channel. The study of the maximum spin reached by the SD bands indicates both a competition between alpha emission and fission of the compound nucleus, and the limitation due to the fission process in the population of the SD nuclei in the A = 190 region. (author). 120 refs., 112 figs., 22 tabs., 2 ann

  1. Anatomy of an intruded coal, I: Effect of contact metamorphism on whole-coal geochemistry, Springfield (No. 5) (Pennsylvanian) coal, Illinois Basin

    Energy Technology Data Exchange (ETDEWEB)

    Rimmer, Susan M. [Department of Geology, Southern Illinois University Carbondale, Carbondale, IL 62901 (United States); Yoksoulian, Lois E. [Department of Earth and Environmental Sciences, University of Kentucky, Lexington, KY 40506 (United States); Hower, James C. [Center for Applied Energy Research, University of Kentucky, 2540 Research Park Drive, Lexington, KY 40511 (United States)

    2009-08-01

    If time and heating rate are important agents in coal maturation, one might expect to see differences in chemical changes in response to maturation depending on the means of increased rank. Using a suite of samples obtained from an intruded Pennsylvanian-age coal in southern Illinois, we present whole-coal chemical data. Comparing these data to extant geochemical data for coals that have undergone normal burial maturation, we evaluated the hypothesis that if coal alteration occurs rapidly (due to intrusion) rather than gradually (burial maturation), then different relationships are seen in chemical composition (proximate and ultimate analyses) and vitrinite reflectance. The Pennsylvanian-age (Asturian [Westphalian D]) Springfield (No. 5) coal is mined at the Big Ridge Mine, near Eldorado, southern Illinois. This high volatile B bituminous coal was intruded by an ultramafic igneous intrusion during the early Permian. Alteration occurs out to {proportional_to} 1.2 x dike thickness and includes an increase in random vitrinite reflectance (R{sub m}) from levels {proportional_to} 0.7% to over 5.3%, loss of liptinites, and formation of devolatilization vacuoles and fine mosaic texture. Decreases in volatile matter (VM) and increases in fixed carbon (FC) appear to be less than would be expected for the level of reflectance seen within the alteration halo. Carbonate minerals have a major influence on proximate analyses but even following the removal of carbonates, the decrease in VM is still less than would be seen in coals of similar vitrinite reflectance that were altered by normal burial maturation. Carbonate mineralization also contributes to variability in ultimate analysis values approaching the intrusion, particularly for %C and %O. After carbonate removal, data for these coals do not appear to follow the normal burial coalification tracks when plotted on a van Krevelen diagram and on a Seyler chart. These differences suggest that a slightly different maturation

  2. Study for on-line system to identify inadvertent control rod drops in PWR reactors using ex-core detector and thermocouple measures

    International Nuclear Information System (INIS)

    Souza, Thiago J.; Medeiros, Jose A.C.C.; Goncalves, Alessandro C.

    2015-01-01

    Accidental control rod drops event in PWR reactors leads to an unsafe operating condition. It is important to quickly identify the rod to minimize undesirable effects in such a scenario. In this event, there is a distortion in the power distribution and temperature in the reactor core. The goal of this study is to develop an on-line model to identify the inadvertent control rod dropped in PWR reactor. The proposed model is based on physical correlations and pattern recognition of ex-core detector responses and thermocouples measures. The results of the study demonstrated the feasibility of an on-line system, contributing to safer operation conditions and preventing undesirable effects, as its shutdown. (author)

  3. Study for on-line system to identify inadvertent control rod drops in PWR reactors using ex-core detector and thermocouple measures

    Energy Technology Data Exchange (ETDEWEB)

    Souza, Thiago J.; Medeiros, Jose A.C.C.; Goncalves, Alessandro C., E-mail: tsouza@nuclear.ufrj.br, E-mail: canedo@lmp.ufrj.br, E-mail: alessandro@nuclear.ufrj.br [Coordenacao dos Programas de Pos-Graduacao em Engenharia (COPPE/UFRJ), Rio de Janeiro, RJ (Brazil). Programa de Engenharia Nuclear

    2015-07-01

    Accidental control rod drops event in PWR reactors leads to an unsafe operating condition. It is important to quickly identify the rod to minimize undesirable effects in such a scenario. In this event, there is a distortion in the power distribution and temperature in the reactor core. The goal of this study is to develop an on-line model to identify the inadvertent control rod dropped in PWR reactor. The proposed model is based on physical correlations and pattern recognition of ex-core detector responses and thermocouples measures. The results of the study demonstrated the feasibility of an on-line system, contributing to safer operation conditions and preventing undesirable effects, as its shutdown. (author)

  4. The use of protective barriers to deter inadvertent human intrusion into a mined geologic facility for the disposal of radioactive waste: A review of previous investigations and potential concepts

    International Nuclear Information System (INIS)

    Tolan, T.L.

    1993-06-01

    Sandia National Laboratories is evaluating the feasibility of developing protective barrier system for the Waste Isolation Pilot Plant (WIPP) to thwart inadvertent human intrusion into this radioactive-waste disposal system for a period of 9,900 years after assumed loss of active institutional controls. The protective barrier system would be part of a series of enduring passive institutional controls whose long-term function will be to reduce the likelihood of inadvertent human activities (e.g., exploratory drilling for resources) that could disrupt the WIPP disposal system

  5. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: the ONSITE/MAXI1 computer program

    International Nuclear Information System (INIS)

    Napier, B.A.; Peloquin, R.A.; Kennedy, W.E. Jr.; Neuder, S.M.

    1984-10-01

    Because of uncertainties associated with assessing the potential risks from onsite burials of radioactive waste, the US Nuclear Regulatory Commission (NRC) has amended its regulations to provide greater assurance that buried radioactive material will not present a hazard to public health and safety. The amended regulations now require licensees to apply for approval of proposed procedures for onsite disposal pursuant to 10 CFR 20.302. The NRC technically reviews these requests on a case-by-case basis. These technical reviews require modeling potential pathways to man and projecting radiation dose commitments. This document contains a summary of our efforts to develop human-intrusion scenarios and to modify a version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. The documentation of the ONSITE/MAXI computer program is written for two audiences. The first (Audience A) includes persons concerned with the mathematical models and computer algorithms. The second (Audience B) includes persons concerned with exercising the computer program and scenarios for specific onsite disposal applications. Five sample problems are presented and discussed to assist the user in operating the computer program. Summaries of the input and output for the sample problems are included along with a discussion of the hand calculations performed to verify the correct operation of the computer program. Computer listings of the ONSITE/MAXI1 computer program with an abbreviated data base listing are included as Appendix 1 to this document. Finally, complete listings of the data base with listings of the special codes used to create the data base are included in Appendix 2 as a microfiche attachment to this document

  6. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: The ONSITE/MAXI1 computer program

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.; Neuder, S.M.

    1987-02-01

    This document summarizes initial efforts to develop human-intrusion scenarios and a modified version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. Supplement 1 of NUREG/CR-3620 (1986) summarized modifications and improvements to the ONSITE/MAXI1 software package. This document summarizes a modified version of the ONSITE/MAXI1 computer program. This modified version of the computer program operates on a personal computer and permits the user to optionally select radiation dose conversion factors published by the International Commission on Radiological Protection (ICRP) in their Publication No. 30 (ICRP 1979-1982) in place of those published by the ICRP in their Publication No. 2 (ICRP 1959) (as implemented in the previous versions of the ONSITE/MAXI1 computer program). The pathway-to-human models used in the computer program have not been changed from those described previously. Computer listings of the ONSITE/MAXI1 computer program and supporting data bases are included in the appendices of this document

  7. Large-scale experiments for the vulnerability analysis of buildings impacted and intruded by fluviatile torrential hazard processes

    Science.gov (United States)

    Sturm, Michael; Gems, Bernhard; Fuchs, Sven; Mazzorana, Bruno; Papathoma-Köhle, Maria; Aufleger, Markus

    2016-04-01

    torrent in Tyrol (Austria), are analysed in detail. A couple of buildings are entirely reconstructed within the physical scale model at the scale 1:30. They include basement and first floor and thereby all relevant openings on the building envelopes. The results from experimental modelling represent the data basis for further physics-based vulnerability analysis. Hence, the applied vulnerability analysis concept significantly extends the methods presently used in flood risk assessment. The results of the study are of basic importance for practical application, as they provide extensive information to support hazard zone mapping and management, as well as the planning of local technical protection measures.

  8. Properties of low-lying intruder states in $^{34}$Al and $^{34}$Si sequentially populated in $\\beta$-decay of $^{34}$Mg

    CERN Multimedia

    A low-lying long-lived (26±1 ms) isomer in $^{34}$Al has been observed recently and assigned as 1$^{+}$ state of intruder character. It was populated in $^{36}$S fragmentation and feeds, in $\\beta$-decay, the 0$_{2}^{+}$ state in $^{34}$Si whose excitation energy and lifetime were determined in an electron-positron pairs spectroscopy experiment. In the present experiment we intend to measure for the first time the $\\gamma$-rays following the $\\beta$-decay of $^{34}$Mg. Despite the interest for $^{34}$Mg, the up-right corner of the “N$\\thicksim$20 island of inversion”, the only information on its $\\beta$-decay is the lifetime of 20±10 ms, determined from $\\beta$-neutron coincidences. As a result of the proposed experiment, we expect to place the first transitions in the level scheme of $^{34}$Al and to strongly populate the newly observed isomer, measuring its excitation energy, if the branching ratio to 4$^{−}$ ground state is significant. Theoretical estimations for the $\\beta$-decay of the new isome...

  9. Microwave and millimeter-wave remote sensing for security applications

    CERN Document Server

    Nanzer, Jeffrey

    2012-01-01

    Microwave and millimeter-wave remote sensing techniques are fast becoming a necessity in many aspects of security as detection and classification of objects or intruders becomes more difficult. This groundbreaking resource offers you expert guidance in this burgeoning area. It provides you with a thorough treatment of the principles of microwave and millimeter-wave remote sensing for security applications, as well as practical coverage of the design of radiometer, radar, and imaging systems. You learn how to design active and passive sensors for intruder detection, concealed object detection,

  10. Has Therapy Intruded into Education?

    Science.gov (United States)

    Mintz, Avi

    2009-01-01

    For over fifty years, scholars have argued that a therapeutic ethos has begun to change how people think about themselves and others. There is also a growing concern that the therapeutic ethos has influenced educational theory and practice, perhaps to their detriment. This review article discusses three books, "The Dangerous Rise of Therapeutic…

  11. Prevention of and response to inadvertent exposure of embryo/fetus to ionizing radiation, due to medical exposure of the mother. The Greek regulatory authority initiatives.

    Science.gov (United States)

    Economides, Sotirios; Boziari, Argiro; Vogiatzi, Stavroula; Hourdakis, Konstantinos J; Kamenopoulou, Vassiliki; Dimitriou, Panagiotis

    2014-03-01

    Embryo/fetus (E/F) irradiation as a result of medical exposure of the mother should be avoided, unless there are strong clinical indications. Medical practitioners are assigned the primary task and obligation of ensuring overall patient protection and safety in the prescription of and during the delivery of medical exposure. In cases of unintended exposure of embryo/fetus (E/F), the risk analysis and communication is conducted by or under the supervision of medical physicists at local level. National competent authorities can contribute to the prevention, risk analysis and communication of inadvertent E/F exposure to ionizing radiation by recording, analyzing and disseminating the relevant information. Since 2001, Greek Atomic Energy Commission has established a committee with the mandate to provide advice, to keep records, to analyze and disseminate the experience gained in cases of unintended E/F exposure. During the period 2001-2011, the committee was consulted by 269 pregnant women undergone medical exposures. The conclusions from the relevant data analysis, as well as the experience gained are herein presented and discussed. Copyright © 2013 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  12. Safety analysis of increase in heat removal from reactor coolant system with inadvertent operation of passive residual heat removal at no load conditions

    Energy Technology Data Exchange (ETDEWEB)

    Shao, Ge; Cao, Xuewu [School of Mechanical and Engineering, Shanghai Jiao Tong University, Shanghai (China)

    2015-06-15

    The advanced passive pressurized water reactor (PWR) is being constructed in China and the passive residual heat removal (PRHR) system was designed to remove the decay heat. During accident scenarios with increase of heat removal from the primary coolant system, the actuation of the PRHR will enhance the cooldown of the primary coolant system. There is a risk of power excursion during the cooldown of the primary coolant system. Therefore, it is necessary to analyze the thermal hydraulic behavior of the reactor coolant system (RCS) at this condition. The advanced passive PWR model, including major components in the RCS, is built by SCDAP/RELAP5 code. The thermal hydraulic behavior of the core is studied for two typical accident sequences with PRHR actuation to investigate the core cooling capability with conservative assumptions, a main steam line break (MSLB) event and inadvertent opening of a steam generator (SG) safety valve event. The results show that the core is ultimately shut down by the boric acid solution delivered by Core Makeup Tank (CMT) injections. The effects of CMT boric acid concentration and the activation delay time on accident consequences are analyzed for MSLB, which shows that there is no consequential damage to the fuel or reactor coolant system in the selected conditions.

  13. 2016 Survey of State-Level Health Resources for Men and Boys: Identification of an Inadvertent and Remediable Service and Health Disparity.

    Science.gov (United States)

    Fadich, Ana; Llamas, Ramon P; Giorgianni, Salvatore; Stephenson, Colin; Nwaiwu, Chimezie

    2018-03-01

    This survey evaluated resources available to men and boys at the state level including state public health departments (SPHDs), other state agencies, and governor's offices. Most of the resources and programs are found in the SPHDs and these administer state-initiated and federally funded health programs to provide services and protection to a broad range of populations; however, many men's health advocates believe that SPHDs have failed to create equivalent services for men and boys, inadvertently creating a health disparity. Men's Health Network conducts a survey of state resources, including those found in SPHDs, every 2 years to identify resources available for men and women, determine the extent of any disparity, and establish a relationship with SPHD officials. Data were obtained from all 50 states and Washington, D.C. An analysis of the 2016 survey data indicates that there are few resources allocated and a lack of readily available information on health and preventive care created specifically for men and boys. The data observed that most health information intended for men and boys was scarce among states or oftentimes included on websites that primarily focused on women's health. A potential result of this is a loss of engagement with appropriate health-care providers due to a lack of information. This study continues to validate the disparity between health outcomes for women and men. It continues to highlight the need for better resource allocation, outreach, and health programs specifically tailored to men and boys in order to improve overall community well-being.

  14. An overlooked environmental issue? A review of the inadvertent formation of PCB-11 and other PCB congeners and their occurrence in consumer products and in the environment.

    Science.gov (United States)

    Vorkamp, Katrin

    2016-01-15

    Polychlorinated biphenyls (PCBs) are banned from production and use in most countries as they are persistent organic pollutants (POPs) of concern for environment and health. Recent research has pointed at a new environment issue resulting from the inadvertent formation of PCBs in certain processes, in particular the pigment production. PCB-11 is a major by-product in these processes, but PCB-28, PCB-52, PCB-77 as well as the nonachlorinated PCBs and PCB-209 have been found in pigments and consumer products as well. In addition to environmental emissions via point sources, in particular related to industrial and municipal wastewater, atmospheric transport seems to be important for the global distribution of PCB-11. Thus, PCB-11 has also been detected in the polar regions. Worldwide air concentrations appear relatively uniform, but maxima have been found in urban and industrialised areas. Data on the uptake and accumulation of PCB-11 in the food chain are still inconclusive: Although food web studies do not show biomagnification, PCB-11 has been detected in humans. The human exposure might originate from the direct contact to consumer products as well as from the omnipresence of PCB-11 in the environment. Copyright © 2015 Elsevier B.V. All rights reserved.

  15. Posterior reversible encephalopathy syndrome following an inadvertent dural puncture during an emergency laparotomy for ischemic colitis – a case report

    Directory of Open Access Journals (Sweden)

    Shah R

    2014-01-01

    Full Text Available Reena Shah, Agnieszka Kubisz-Pudelko, Jeremy Reid Yeovil District Hospital, Yeovil, UK Abstract: Posterior reversible encephalopathy syndrome (PRES is a clinico-neuroradiological syndrome characterized by various symptoms of neurological disease. It has commonly been reported in association with acute hypertension, pre-eclampsia, eclampsia, sepsis, and exposure to immunosuppressants. Here, we report on a normotensive woman who developed a severe frontal headache, visual disturbances, and hypertension 3 days after undergoing an emergency laparotomy for ischemic colitis during which she suffered an inadvertent dural puncture. Neuro-imaging revealed features consistent with PRES. The patient went on to make a good recovery, being discharged 21 days postoperatively, with only minor visual disturbances and memory problems. This case highlights the importance of awareness of PRES to all specialties. On reviewing the literature, we feel that PRES may be a potential differential diagnosis to post-procedural neurological symptoms in those patients undergoing routine procedures such as spinal anesthetics or lumbar punctures. Keywords: PRES, neurological disease, lumbar puncture, spinal anesthetic

  16. Applications of radio frequency identification systems in the mining industry

    Energy Technology Data Exchange (ETDEWEB)

    Hind, D [Davis Derby Limited (United Kingdom)

    1994-12-31

    The paper describes the application of Radio Frequency Identification (RFID) systems in the mining industry for both surface and underground mines. The history of the RFID system, types available, the transponder, and the various techniques used are described and compared. The design and certification of a system for use in a hazardous area are described, noting the hazard of inadvertent detonator ignition. 2 refs.

  17. Inadvertent intrathecal injection of atracurium.

    Science.gov (United States)

    Zirak, Nahid; Soltani, Ghasem; Ghomian, Naiere; Hasanpour, Mohamad Reza; Mashayekhi, Zahra

    2011-04-01

    This report relates how tracurium was given by mistake, intrathecally, during spinal anesthesia, to a 38-year-old woman, who was a candidate for abdominal hysterectomy. When no analgesia was observed, the mistake in giving the injection was understood. She was evaluated postoperatively by train of four ratio, measuring her breathing rate, eye opening, and protruding of tongue at one, two, twenty-four, and forty-eight hours, and then at one and two weeks, with the final evaluation the following month. The patient had normal timings during the operation and postoperation periods, and no abnormal findings were observed through the first month. This finding was contrary to several studies, which described adverse reactions due to accidental intrathecal injection of neuromuscular blocking drugs.

  18. Inadvertent intrathecal injection of atracurium

    Directory of Open Access Journals (Sweden)

    Nahid Zirak

    2011-01-01

    Full Text Available This report relates how tracurium was given by mistake, intrathecally, during spinal anesthesia, to a 38-year-old woman, who was a candidate for abdominal hysterectomy. When no analgesia was observed, the mistake in giving the injection was understood. She was evaluated postoperatively by train of four ratio, measuring her breathing rate, eye opening, and protruding of tongue at one, two, twenty-four, and forty-eight hours, and then at one and two weeks, with the final evaluation the following month. The patient had normal timings during the operation and postoperation periods, and no abnormal findings were observed through the first month. This finding was contrary to several studies, which described adverse reactions due to accidental intrathecal injection of neuromuscular blocking drugs.

  19. Equine ulnar fracture repair with locking compression plates can be associated with inadvertent penetration of the lateral cortex of the radius.

    Science.gov (United States)

    Kuemmerle, Jan M; Kühn, Karolin; Bryner, Marco; Fürst, Anton E

    2013-10-01

    To evaluate if the use of locking head screws (LHS) in the distal holes of a locking compression plate (LCP) applied to the caudal aspect of the ulna to treat equine ulnar fractures is associated with a risk of injury to the lateral cortex of the radius. Controlled laboratory study. Cadaveric equine forelimbs (n = 8 pair). After transverse ulnar osteotomy, osteosynthesis was performed with a narrow 10-13 hole 4.5/5.0 LCP applied to the caudal aspect of each ulna. The distal 3 holes were filled with 4.5 mm cortex screws (CS) in 1 limb (group 1) and with 5.0 mm LHS contralaterally (group 2). CS were inserted in an angle deemed appropriate by the surgeon and LHS were inserted perpendicular to the plate. Implant position and injury to the lateral cortex of the radius were assessed by radiography, CT, and limb dissection. In group 1, injury of the lateral radius cortex did not occur. In group 2, 4 limbs and 6/24 LHS were associated with injury of the lateral radius cortex by penetration of a LHS. This difference was statistically significant. CS were inserted with a mean angle of 17.6° from the sagittal plane in a caudolateral-craniomedial direction. Use of LHS in the distal part of a LCP applied to the caudal aspect of the ulna is associated with a risk of inadvertent injury to the lateral cortex of the radius. © Copyright 2013 by The American College of Veterinary Surgeons.

  20. Assessment of the long-term risks of inadvertent human intrusion into a disposal vault in deep plutonic rock: reassessment using ICRP recommendations

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1996-06-01

    Canada has conducted an extensive research program on the safe disposal of nuclear fuel waste. The program has focussed on the concept of disposal in durable containers in an engineered facility or 'vault' located 500 to 1000 m deep in plutonic rock on the Canadian Shield. As part of this task, a methodology was developed to assess the long-term risk from inadvertent intrusion scenarios, and applied to a reference conceptual design of a facility for disposal of used fuel. The AECB has specified that 'the predicted radiological risk to individuals from a waste disposal facility shall not exceed 10 -6 fatal cancers and serious genetic effects in a year.' Risk is defined as the sum, of the product of the probability of the scenario, the magnitude of the resultant radiation dose, and the probability of a health effect per unit dose. The AECB also specifies that 'calculations of individual risk should be made by using the risk conversion factor of 2 x 10 -2 per sievert.' Our earlier assessment of four human intrusion scenarios showed that the estimated risk using the risk conversion factor recommended by the AECB was at least 3 orders of magnitude below the AECB risk criterion, at all times up to 10 000 a, for each of the four scenarios analysed. The AECB risk criterion and risk conversion factor are based on the recommendations of the Intemafional Commission on Radiological Protection (ICRP) in their Publication ICRP 26. More recently, in its Publication ICRP 60, the ICRP has recommended dose factors for fatal cancers that are larger than those in ICRP 26 and an increase in the risk factor for serious hereditary effects in all future generations. Another ICRP Publication, ICRP 64, states that 'For potential exposure situations, the consideration of the basic dose response used for stochastic effects must be extended into the range of high doses where deterministic effects also occur.' For the new assessments of risk we use the estimated doses and probabilities of

  1. Evaluation of costs accrued through inadvertent continuation of hospital-initiated proton pump inhibitor therapy for stress ulcer prophylaxis beyond hospital discharge: a retrospective chart review

    Directory of Open Access Journals (Sweden)

    Shin S

    2015-04-01

    Full Text Available Sooyoung Shin Ajou University College of Pharmacy, Yeongtong-gu, Suwon-si, Gyeonggi-do, South Korea Background: Stress ulcers and related upper gastrointestinal bleeding are well-known complications in intensive care unit (ICU patients. Proton pump inhibitor (PPI-based stress ulcer prophylaxis (SUP has been widely prescribed in noncritically ill patients who are at low risk for clinically significant bleeding, which is then injudiciously continued after hospital discharge. This study aimed to evaluate the incidence of inappropriate prescribing of PPI-based preventative therapy in ICU versus non-ICU patients that subsequently continued postdischarge, and to estimate the costs incurred by the unwarranted outpatient continuation of PPI therapy.Methods: A retrospective review of patient data at a major teaching hospital in Korea was performed. During the 4-year study period, adult patients who were newly initiated on PPI-based SUP during hospital admission and subsequently discharged on a PPI without a medical indication for such therapy were captured for data analysis. The incidence rates of inappropriate prescribing of PPIs were compared between ICU and non-ICU patients, and the costs associated with such therapy were also examined.Results: A total of 4,410 patients, more than half of the inpatient-initiated PPI users, were deemed to have been inadvertently prescribed a PPI at discharge in the absence of a medical need for acid suppression. The incidence of inappropriate outpatient continuation of the prophylaxis was higher among ICU patients compared with non-ICU patients (57.7% versus 52.2%, respectively; P=0.001. The total expenditure accrued through the continuation of nonindicated PPI therapy was approximately US$40,175.Conclusion: This study confirmed that excess usage of PPIs for SUP has spread to low-risk, non-ICU patients. The overuse of unwarranted PPI therapy can incur large health care expenditure, as well as clinical complications

  2. Reducing pesticide drift by considering propeller rotation effects from aerial application and near buffer zones

    Science.gov (United States)

    Off-target drift of chemical from agricultural spraying can damage sensitive crops, destroy beneficial insects, and intrude on human and domestic animal habitats, threatening environmental quality. Reduction of drift from aerial application can be facilitated at the edge of a field by offsetting spr...

  3. Grout treatment facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1988-01-01

    The long-term performance of the grout disposal system for Phosphate/Sulfate Waste (PSW) was analyzed. PSW is a low-level liquid generated by activities associated with N Reactor operations. The waste will be mixed with dry solids and permanently disposed of as a cementitious grout in sub-surface concrete vaults at Hanford's 200-East Area. Two categories of scenarios were analyzed that could cause humans to be exposed to radionuclides and chemicals from the grouted waste: contaminated groundwater and direct intrusion. In the groundwater scenario, contaminants are released from the buried grout monoliths, then eventually transported via the groundwater to the Columbia River. As modeled, the contaminants are assumed to leach out of the monoliths at a constant rate over a 10,000-year period. The other category of exposure involves intruders who inadvertently contact the waste directly, either by drilling, excavating, or gardening. Long-term impacts that could result from disposal of PSW grout were expressed in terms of incremental increases of (1) chemical concentrations in the groundwater and surface waters, and (2) radiation doses. None of the calculated impacts exceeded the corresponding regulatory limits set by Washington State, Department of Energy, or the Nuclear Regulatory Commission

  4. Control of Transboundary Movement of Radioactive Material Inadvertently Incorporated into Scrap Metal and Semi-finished Products of the Metal Recycling Industries. Results of the Meetings Conducted to Develop a Draft Code of Conduct

    International Nuclear Information System (INIS)

    2014-02-01

    In 2010, the IAEA initiated the development of a code of conduct on the transboundary movement of radioactive material inadvertently incorporated into scrap metal and semi- finished products of the metal recycling industries (Metal Recycling Code of Conduct). The Metal Recycling Code of Conduct was intended to harmonize the approaches of Member States in relation to the discovery of radioactive material that may inadvertently be present in scrap metals and semi-finished products subject to transboundary movement, and their safe handling and management to facilitate regulatory control. The Metal Recycling Code of Conduct was envisaged as being complementary to the Safety Guide on Control of Orphan Sources and Other Radioactive Material in the Metal Recycling and Production Industries (IAEA Safety Standards Series No. SSG-17), which provides recommendations, principally within a national context, on the protection of workers, members of the public and the environment in relation to the control of radioactive material inadvertently incorporated in scrap metal. In February 2013, the third open-ended meeting of technical and legal experts to develop the Metal Recycling Code of Conduct was organized. The objective of this meeting was to address the comments received from Member States and to finalize the text of the draft Metal Recycling Code of Conduct. Representatives from 55 Member States, one non-Member State and the EU, together with seven observers from the metal recycling industry, reviewed the comments and revised the draft accordingly. In September 2013, in Resolution GC(57)/RES/9, the IAEA General Conference recorded that it 'Appreciates the intensive efforts undertaken by the Secretariat to develop a code of conduct on the transboundary movement of scrap metal, or materials produced from scrap metal, that may inadvertently contain radioactive material, and encourages the Secretariat to make the results of the discussion conducted on this issue available to

  5. Identification of deformed intruder states in semi-magic Ni70

    Energy Technology Data Exchange (ETDEWEB)

    Chiara, C. J.; Weisshaar, D.; Janssens, R. V. F.; Tsunoda, Y.; Otsuka, T.; Harker, J. L.; Walters, W. B.; Recchia, F.; Albers, M.; Alcorta, M.; Bader, V. M.; Baugher, T.; Bazin, D.; Berryman, J. S.; Bertone, P. F.; Campbell, C. M.; Carpenter, M. P.; Chen, J.; Crawford, H. L.; David, H. M.; Doherty, D. T.; Gade, A.; Hoffman, C. R.; Honma, M.; Kondev, F. G.; Korichi, A.; Langer, C.; Larson, N.; Lauritsen, T.; Liddick, S. N.; Lunderberg, E.; Macchiavelli, A. O.; Noji, S.; Prokop, C.; Rogers, A. M.; Seweryniak, D.; Shimizu, N.; Stroberg, S. R.; Suchyta, S.; Utsuno, Y.; Williams, S. J.; Wimmer, K.; Zhu, S.

    2015-04-01

    The structure of semi-magic Ni-70(28)42 was investigated following complementary multinucleon-transfer and secondary fragmentation reactions. Changes to the higher-spin, presumed negative-parity states based on observed gamma-ray coincidence relationships result in better agreement with shell-model calculations using effective interactions in the neutron f(5/2)pg(9/2) model space. The second 2(+) and (4(+)) states, however, can only be successfully described when proton excitations across the Z = 28 shell gap are included. Monte Carlo shell-model calculations suggest that the latter two states are part of a prolate-deformed intruder sequence, establishing an instance of shape coexistence at low excitation energies similar to that observed recently in neighboring Ni-68.

  6. Evaluation of stress patterns on maxillary posterior segment when intruded with mini implant anchorage: A three-dimensional finite element study

    Directory of Open Access Journals (Sweden)

    Nikhita Pekhale

    2016-01-01

    Full Text Available Introduction: The aim of this study is to evaluate stress and displacement effects of maxillary posterior intrusion mechanics with mini-implant anchorage by using finite element method. Materials and Methods: A computer stimulation of three-dimensional model maxilla with all teeth, PDL, bone, mini-implants, brackets, arch wire, force element, and transpalatal arch was constructed on the basis of average anatomic morphology. Finite element analysis was done to evaluate the amount of stress and its distribution during orthodontic intrusive force. Results: Increased Von Mises stress values were observed in mesio-cervical region of first molar. The middle third of second premolar and second molar and regions adjacent to force application sites also showed relatively high stress values. Minimum stress values were observed in apical region of first premolar as it is away from force application. Conclusion: Using three mini-implant and transpalatal arches, this study demonstrates that significant amount of true intrusion of maxillary molars could be obtained with lesser concentration of stresses in the apical area recorded.

  7. Improving Protection Agains Intruders Using Passive Sonar

    NARCIS (Netherlands)

    Fillinger, L.; Hunter, A.J.; Zampolli, M.; Clarijs, M.C.; Verolme, J.L.

    2011-01-01

    Divers and small vessels are increasingly recognized as a potential threat to high value assets. Harbour and waterside surveillance systems that are used to counter the threat of divers are usually based on active sonar, whose performance can be limited by reverberation in a harbour environment.

  8. Commonwealth Edison captures intruders on screen

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Commonwealth Edison has developed three software programs, with the supporting hardware, that significantly upgrade security monitoring capabilities at nuclear power stations. These are Video Capture, the Alternate Perimeter Alarm Reporting System, and the Redundant Access Control System. Conventional video systems only display what is happening at the moment and rewinding a VCR to discover what occurred earlier takes time. With Video Capture the images can be instantly restored to the monitor screen and printed out. When one of the security devices used to monitor the perimeter of a Commonwealth Edison nuclear power station is tripped, the Video Capture program stores the visual image digitally. This is done using similar technology to the employed in fax machines. The security staff are thus able to distinguish immediately between disturbances taking place simultaneously at different security zones. They can magnify and compare the stored images and print them out. The Alternate Perimeter Alarm Reporting System was developed to speed the transmission of alarm signals from the security sensors to the security computer. The Redundant Access Control System (RACS) was originally developed to meet the requirement of the Nuclear Regulatory Commission (NRC) for a secondary computer-operated security measure to monitor employee access to a nuclear power station. When employee drug testing became an additional NRC requirement, the Nuclear Division of Commonwealth Edison asked their programmers to modify RACS to generate a random list of personnel to be tested for substance abuse. RACS was then further modified to produce numerous station operating reports that had been previously compiled manually. (author)

  9. Report on the training for an intruder

    International Nuclear Information System (INIS)

    Aoki, Yoshikazu; Fukumoto, Masahiro; Saito, Toru; Tsujinaka, Hideyuki

    2002-12-01

    Crisis management section members of Japan Nuclear Cycle Development Institute (JNC) Tokai Works had implemented two types of trainings against terrorism in last Japanese fiscal year and improved the countermeasure against the terrorism. In this fiscal year we trained against the new type of terrorism in the period of about 1 year later of a series of attacks on America by terrorism. As a result of the training some points which need further improvements and new weak points have been availed as follows. (1) Enlightenment of workers' senses against terrorism. Few members of the Emergency Control Center, workers and guards looked tensionless in the training. The sense against terrorism needs to be enlightened. (2) Speediness of initial response. In this training the events using a car went on more rapidly than expected. The rapid response to counter terrorism needs to be examined. (3) Improvement of fundamental countermeasures. The fundamental response of the workers to the terrorism under limited condition before the guard authorities' arrival has been improved further more through the education and trainings. (4) Completeness of the prevention of terrorism. After terrorism occurs, Tokai Works is helpless until the guard authorities arrive. First of all the measure to avoid terrorism occurrence is important. (5) Strengthen the cooperation with the guard authorities. Besides completeness of the prevention of terrorism it is necessary to cope with the guard authorities at ordinary times against an emergency. (author)

  10. How to recognize intruders in your niche

    DEFF Research Database (Denmark)

    Andersen, Hanne

    2006-01-01

    first show the inconsistency between the basic premises underlying Kuhn’s incommensurability thesis and the two standard responses to the thesis. I shall then argue that if one adopts Kuhn’s position, the response must build on a notion of overlap between phenomenal worlds. Finally, I shall argue...

  11. The adverse effects of inadvertent intraoperative intravenous ...

    African Journals Online (AJOL)

    2012-03-03

    Mar 3, 2012 ... We present the case of a 24-year-old woman who was scheduled for an elective diagnostic laparoscopy for chronic pelvic pain. ... Shortly afterwards, the patient developed tachycardia with a heart rate up .... healthy 29-year-old male scheduled for an ambulatory coelioscopic cholecystectomy. Their patient ...

  12. Inadvertent filtering bleb following sutureless cataract surgery

    Directory of Open Access Journals (Sweden)

    Jain Sunil

    2005-01-01

    Full Text Available The case history of a sixty-two-year-old lady, who presented with a bleb in the upper part of her left eye following cataract surgery was studied. The patient had no prior history of any glaucoma surgery. Gonioscopy revealed fishmouthing of the internal aspect of the scleral tunnel incision. The diagnosis of post-cataract filtering bleb was made which was managed by resuturing the wound. This case highlights the use of gonioscopy to visualise and evaluate the internal wound and discusses intraoperative recognition of internal leak and its management with horizontal sutures.

  13. Overview of a performance assessment methodology for low-level radioactive waste disposal facilities

    International Nuclear Information System (INIS)

    Kozak, M.W.; Chu, M.S.Y.

    1991-01-01

    A performance assessment methodology has been developed for use by the US Nuclear Regulatory Commission in evaluating license applications for low-level waste disposal facilities. This paper provides a summary and an overview of the modeling approaches selected for the methodology. The overview includes discussions of the philosophy and structure of the methodology. This performance assessment methodology is designed to provide the NRC with a tool for performing confirmatory analyses in support of license reviews related to postclosure performance. The methodology allows analyses of dose to individuals from off-site releases under normal conditions as well as on-site doses to inadvertent intruders. 24 refs., 1 tab

  14. Applications of radio frequency identification systems in the mining industry

    Energy Technology Data Exchange (ETDEWEB)

    Hind, D J [Davis Derby Ltd., Derby (United Kingdom)

    1994-01-01

    Radio Frequency Identification Systems (RFID) are one of the automatic data capture technologies taking over from bar codes and magnetic swipe cards in many applications involving automatic hands free operation in arduous environments. RFID systems are based on the use of miniature radio transponders carrying encoded electronic data that is used to uniquely identify the identity of transponders. The paper reviews the types of system available and compares the various techniques involved in the different systems. The various types of transponder are described including the latest state of the art passive read/write high performance types. The problems involved in designing and certifying a system for use in hazardous areas are described, with particular reference to the problems of inadvertent detonator ignition by radio systems. Applications of RFID systems in the mining industry are described, covering applications both on the surface and underground. 1 ref., 10 figs.

  15. Human intrusion into geologic repositories for high-level radioactive waste: potential and prevention

    Energy Technology Data Exchange (ETDEWEB)

    Cameron, F X [Nuclear Regulatory Commission, Washington, DC (USA). Office of Nuclear Regulatory Research

    1981-12-01

    Isolation of high-level radioactive waste over long periods of time requires protection not only from natural events and processes, but also from the deliberate or inadvertent activities of future societies. This paper evaluates the likelihood of inadvertent human intrusion due to the loss of societal memory of the repository site. In addition measures to prevent inadvertent intrusion, and to guide future societies in any decision to deliberately intrude into the repository are suggested.

  16. Moving Object Tracking and Its Application to an Indoor Dual-Robot Patrol

    Directory of Open Access Journals (Sweden)

    Cheng-Han Shih

    2016-11-01

    Full Text Available This paper presents an application of image tracking using an omnidirectional wheeled mobile robot (WMR. The objective of this study is to integrate image processing of hue, saturation, and lightness (HSL for fuzzy color space, and use mean shift tracking for object detection and a Radio Frequency Identification (RFID reader for confirming destination. Fuzzy control is applied to omnidirectional WMR for indoor patrol and intruder detection. Experimental results show that the proposed control scheme can make the WMRs perform indoor security service.

  17. Influence of i{sub 13/2} proton and j{sub 15/2} neutron intruding orbitals on the behaviour of 190 mass region superdeformed nuclei; Influence des orbitales intruses proton i{sub 13/2} et neutron j{sub 15/2} sur le comportement des noyaux superdeformes de la region de masse 190

    Energy Technology Data Exchange (ETDEWEB)

    Duprat, J

    1995-01-01

    This work concerns the study of the nuclear superdeformation phenomenon in the A = 190 mass region. The superdeformed (SD) states in {sup 193}Tl, {sup 194}Tl {sup 195}Tl were produced via heavy-ion induced reactions and studied with the EUROGAM gamma multidetector array. The analysis of high-multiplicity events allowed the study of the magnetic properties of the SD states in these nuclei. For the first time, the g-factor of a proton orbital in a SD nucleus in the A = 190 mass region has been extracted. This measurement indicates that the two known bands in {sup 195}Tl-SD are built on the i{sub 13/2} proton intruder orbital. A new SD band has been found in this isotope: it is the first SD band built on an excited proton state found in the A = 190 region. Finally an interaction between two pairs of bands has been established in {sup 194}Tl; this interaction indicate the crossing of two neutron orbitals above the N = 112 gap. The magnetic properties of the states of the SD bands in {sup 194}Tl reveals that these bands are built on configurations in which the single proton and neutron intrinsic spins are aligned. Comparison between different SD bands in the Thallium isotopes shows the prominent role of the i{sub 13/2} proton and the j{sub 15/2} neutron intruder orbitals in the smooth increase of the dynamical moment of inertia as a function of the rotational frequency. In addition, this work reports on the first observation of a SD rotational band produced in a (HI, {alpha}xn) reaction channel. The study of the maximum spin reached by the SD bands indicates both a competition between alpha emission and fission of the compound nucleus, and the limitation due to the fission process in the population of the SD nuclei in the A = 190 region. (author). 120 refs., 112 figs., 22 tabs., 2 ann.

  18. Processing Polarity: How the Ungrammatical Intrudes on the Grammatical

    Science.gov (United States)

    Vasishth, Shravan; Brussow, Sven; Lewis, Richard L.; Drenhaus, Heiner

    2008-01-01

    A central question in online human sentence comprehension is, "How are linguistic relations established between different parts of a sentence?" Previous work has shown that this dependency resolution process can be computationally expensive, but the underlying reasons for this are still unclear. This article argues that dependency…

  19. Planning for a Violent Intruder Event: The School Nurse's Role.

    Science.gov (United States)

    Selekman, Janice; Melvin, Joseph

    2017-05-01

    School shootings occur too frequently and often with devastating results. The key to prevention and mitigation of these events is to have a plan that is simple, up-to-date, disseminated, and practiced. This article discusses the steps that school nurses can take to work with school administration to prepare themselves, their staff, and their students.

  20. Apoplastic interactions between plants and plant root intruders

    Directory of Open Access Journals (Sweden)

    Kanako eMitsumasu

    2015-08-01

    Full Text Available Numerous pathogenic or parasitic organisms attack plant roots to obtain nutrients, and the apoplast including the plant cell wall is where the plant cell meets such organisms. Root-parasitic angiosperms and nematodes are two distinct types of plant root parasites but share some common features in their strategies for breaking into plant roots. Striga and Orobanche are obligate root parasitic angiosperms that cause devastating agricultural problems worldwide. Parasitic plants form an invasion organ called a haustorium, where plant cell wall degrading enzymes (PCWDEs are highly expressed. Plant-parasitic nematodes are another type of agriculturally important plant root parasite. These nematodes breach the plant cell walls by protruding a sclerotized stylet from which PCWDEs are secreted. Responding to such parasitic invasion, host plants activate their own defense responses against parasites. Endoparasitic nematodes secrete apoplastic effectors to modulate host immune responses and to facilitate the formation of a feeding site. Apoplastic communication between hosts and parasitic plants also contributes to their interaction. Parasitic plant germination stimulants, strigolactones (SLs, are recently identified apoplastic signals that are transmitted over long distances from biosynthetic sites to functioning sites. Here, we discuss recent advances in understanding the importance of apoplastic signals and cell walls for plant-parasite interactions.

  1. Apoplastic interactions between plants and plant root intruders.

    Science.gov (United States)

    Mitsumasu, Kanako; Seto, Yoshiya; Yoshida, Satoko

    2015-01-01

    Numerous pathogenic or parasitic organisms attack plant roots to obtain nutrients, and the apoplast including the plant cell wall is where the plant cell meets such organisms. Root parasitic angiosperms and nematodes are two distinct types of plant root parasites but share some common features in their strategies for breaking into plant roots. Striga and Orobanche are obligate root parasitic angiosperms that cause devastating agricultural problems worldwide. Parasitic plants form an invasion organ called a haustorium, where plant cell wall degrading enzymes (PCWDEs) are highly expressed. Plant-parasitic nematodes are another type of agriculturally important plant root parasite. These nematodes breach the plant cell walls by protruding a sclerotized stylet from which PCWDEs are secreted. Responding to such parasitic invasion, host plants activate their own defense responses against parasites. Endoparasitic nematodes secrete apoplastic effectors to modulate host immune responses and to facilitate the formation of a feeding site. Apoplastic communication between hosts and parasitic plants also contributes to their interaction. Parasitic plant germination stimulants, strigolactones, are recently identified apoplastic signals that are transmitted over long distances from biosynthetic sites to functioning sites. Here, we discuss recent advances in understanding the importance of apoplastic signals and cell walls for plant-parasite interactions.

  2. Probing intruder configurations in $^{186, 188}$Pb using Coulomb excitation

    CERN Multimedia

    Columb excitation measurements to study the shape coexistence, mixing and quadrupole collectivity of the low-lying levels in neutron-deficient $^{188}$Pb nuclei are proposed with a view to extending similar studies to the $^{186}$Pb midshell nucleus. The HIE-ISOLDE beam of $^{186,188}$Pb nuclei will be delivered to MINIBALL+SPEDE set-up for simultaneous in-beam $\\gamma$-ray and conversion electron spectroscopy. The proposed experiment will allow the sign of the quadrupole deformation parameter to be extracted for the two lowest 2$^{+}$ states in $^{188}$Pb. Moreover, the advent of SPEDE will allow probing of the bandhead 0$^{+}$ states via direct measurements of E0 transitions. Beam development is requested to provide pure and instense $^{186}$Pb beam.

  3. Task-oriented quality assessment and adaptation in real-time mission critical video streaming applications

    Science.gov (United States)

    Nightingale, James; Wang, Qi; Grecos, Christos

    2015-02-01

    In recent years video traffic has become the dominant application on the Internet with global year-on-year increases in video-oriented consumer services. Driven by improved bandwidth in both mobile and fixed networks, steadily reducing hardware costs and the development of new technologies, many existing and new classes of commercial and industrial video applications are now being upgraded or emerging. Some of the use cases for these applications include areas such as public and private security monitoring for loss prevention or intruder detection, industrial process monitoring and critical infrastructure monitoring. The use of video is becoming commonplace in defence, security, commercial, industrial, educational and health contexts. Towards optimal performances, the design or optimisation in each of these applications should be context aware and task oriented with the characteristics of the video stream (frame rate, spatial resolution, bandwidth etc.) chosen to match the use case requirements. For example, in the security domain, a task-oriented consideration may be that higher resolution video would be required to identify an intruder than to simply detect his presence. Whilst in the same case, contextual factors such as the requirement to transmit over a resource-limited wireless link, may impose constraints on the selection of optimum task-oriented parameters. This paper presents a novel, conceptually simple and easily implemented method of assessing video quality relative to its suitability for a particular task and dynamically adapting videos streams during transmission to ensure that the task can be successfully completed. Firstly we defined two principle classes of tasks: recognition tasks and event detection tasks. These task classes are further subdivided into a set of task-related profiles, each of which is associated with a set of taskoriented attributes (minimum spatial resolution, minimum frame rate etc.). For example, in the detection class

  4. Intentional and inadvertent chemical contamination of food, water, and medication.

    Science.gov (United States)

    MCKay, Charles; Scharman, Elizabeth J

    2015-02-01

    Numerous examples of chemical contamination of food, water, or medication have led to steps by regulatory agencies to maintain the safety of this critical social infrastructure and supply chain. Identification of contaminant site is important. Environmental testing and biomonitoring can define the nature and extent of the event and are useful for providing objective information, but may be unavailable in time for clinical care. Clinical diagnosis should be based on toxidrome recognition and assessment of public health implications. There are several resources available to assist and these can be accessed through regional poison control centers or local/state public health departments. Copyright © 2015 Elsevier Inc. All rights reserved.

  5. Inadvertent doping through nutritional supplements is a reality

    African Journals Online (AJOL)

    Enrique

    In 1994 legislation was passed by the United States Food and Drug Administration ... resulting in contamination of nutritional supplements, which may be a possible ... Nutritional supplement manufacturing is not subject to the same stringent ...

  6. An Inadvertent Concurrent Replication: Same Roadmap, Different Journey

    Science.gov (United States)

    Lemons, Christopher J.; King, Seth A.; Davidson, Kimberly A.; Berryessa, Teresa L.; Gajjar, Shimul A.; Sacks, Lia H.

    2016-01-01

    Replication is a critical aspect of scientific inquiry that presents a variety of challenges to researchers, even under the best of conditions. We conducted a review of replication rates in special education journals similar to the review conducted by Makel et al. in this issue. Unknowingly conducting independent reviews allowed for an unexpected…

  7. Inadvertent presence of genetically modified elements in maize food ...

    African Journals Online (AJOL)

    owner

    2013-07-31

    Jul 31, 2013 ... The maize imported into Kenya contained Bt genetic elements. Nevertheless, the .... obtained from various open air markets and retail shops located in ... Magic, Bokomo and Temmy) was not successful. Assessment of cry1Ab ...

  8. Inadvertent injection of succinylcholine as an epidural test dose

    Directory of Open Access Journals (Sweden)

    Chryssa Pourzitaki

    Full Text Available Abstract Background and objectives: Epidural action of neuromuscular blocking agents could be explained under the light of their physicochemical characteristics and epidural space properties. In the literature there are few cases of accidental neuromuscular agent's epidural administration, manifesting mainly with neuromuscular blockade institution or fasciculations. Case report: We report a case of accidental succinylcholine administration as an epidural test dose, in a female patient undergoing scheduled laparotomy, under combined general and epidural anesthesia. Approximately 2 min after the succinylcholine injection the patient complained for shortness of breath, while mild fasciculations appeared in her trunk and face, managed by immediate general anesthesia institution. With the exception of a relatively longer duration of neuromuscular blockade compared with intravenous administration, no neurological or cardiovascular sequelae or other symptoms of local or systemic toxicity were observed. Conclusions: Oral administration of diazepam seems to lessen the adverse effects from accidental epidural administration of succinylcholine. The meticulous and discriminative labeling of syringes, as well as keeping persistent cautions during all anesthesia procedures remains of crucial importance.

  9. Inadvertent Exemplars: Life History Portraits of Two Socially Just Principals

    Science.gov (United States)

    Scanlan, Martin

    2012-01-01

    This study creates life history portraits of two White middle-class native-English-speaking principals demonstrating commitments to social justice in their work in public elementary schools serving disproportionately high populations of students who are marginalized by poverty, race, and linguistic heritage. Through self-reported life histories of…

  10. Inadvertent destruction of the spinal cord by radiation therapy

    International Nuclear Information System (INIS)

    Bhavilai, D.

    1974-01-01

    A case of radiation myelopathy following cobalt therapy of a carcinoma of the esophagus is presented. A permanent quadriplegia resulted. Radiation myelopathy can result from treatment with x-rays or radioactive cobalt regardless of whether the condition being treated involves the spinal cord. No effective treatment is known. Prevention requires keeping the radiation at low level

  11. Incident of inadvertent radiation exposure in a linac bunker

    International Nuclear Information System (INIS)

    Aerts, M.G.

    2010-01-01

    Full text: Implementation of a new Biomedical Equipment and service database poses special challenges. This paper describes the challenges and solutions during implementation of BEIMS (Mercury Computers) at RPAH and other sites within SSWAHS. During implementation we faced challenges of Code/Label design, workflow redesign, and data cleanup. Considerable time and effort went into the design of descriptive codes for breakdowns, tests, equipment types, meta-categories and the like. Some of the codes are explored and described to allow adoption by other entities if desired. Workflow redesign required us to include considerations of biomedical Technicians and Nurse Requestors. A simplified document was created for the self-education of Requestors and a full user manual (complete with screen shots) was created for Biomeds. More work remains, including simplification of standardised reports and ability to generate KPI's. The result is a system with improved utility compared to the old system and a flexible design enabling future improvements. (author)

  12. Applications of Derandomization Theory in Coding

    Science.gov (United States)

    Cheraghchi, Mahdi

    2011-07-01

    Randomized techniques play a fundamental role in theoretical computer science and discrete mathematics, in particular for the design of efficient algorithms and construction of combinatorial objects. The basic goal in derandomization theory is to eliminate or reduce the need for randomness in such randomized constructions. In this thesis, we explore some applications of the fundamental notions in derandomization theory to problems outside the core of theoretical computer science, and in particular, certain problems related to coding theory. First, we consider the wiretap channel problem which involves a communication system in which an intruder can eavesdrop a limited portion of the transmissions, and construct efficient and information-theoretically optimal communication protocols for this model. Then we consider the combinatorial group testing problem. In this classical problem, one aims to determine a set of defective items within a large population by asking a number of queries, where each query reveals whether a defective item is present within a specified group of items. We use randomness condensers to explicitly construct optimal, or nearly optimal, group testing schemes for a setting where the query outcomes can be highly unreliable, as well as the threshold model where a query returns positive if the number of defectives pass a certain threshold. Finally, we design ensembles of error-correcting codes that achieve the information-theoretic capacity of a large class of communication channels, and then use the obtained ensembles for construction of explicit capacity achieving codes. [This is a shortened version of the actual abstract in the thesis.

  13. FIRESTORM: a collaborative network suite application for rapid sensor data processing and precise decisive responses

    Science.gov (United States)

    Kaniyantethu, Shaji

    2011-06-01

    This paper discusses the many features and composed technologies in Firestorm™ - a Distributed Collaborative Fires and Effects software. Modern response management systems capitalize on the capabilities of a plethora of sensors and its output for situational awareness. Firestorm utilizes a unique networked lethality approach by integrating unmanned air and ground vehicles to provide target handoff and sharing of data between humans and sensors. The system employs Bayesian networks for track management of sensor data, and distributed auction algorithms for allocating targets and delivering the right effect without information overload to the Warfighter. Firestorm Networked Effects Component provides joint weapon-target pairing, attack guidance, target selection standards, and other fires and effects components. Moreover, the open and modular architecture allows for easy integration with new data sources. Versatility and adaptability of the application enable it to devise and dispense a suitable response to a wide variety of scenarios. Recently, this application was used for detecting and countering a vehicle intruder with the help of radio frequency spotter sensor, command driven cameras, remote weapon system, portable vehicle arresting barrier, and an unmanned aerial vehicle - which confirmed the presence of the intruder, as well as provided lethal/non-lethal response and battle damage assessment. The completed demonstrations have proved Firestorm's™ validity and feasibility to predict, detect, neutralize, and protect key assets and/or area against a variety of possible threats. The sensors and responding assets can be deployed with numerous configurations to cover the various terrain and environmental conditions, and can be integrated to a number of platforms.

  14. Applications of radio frequency identification systems in the mining industry

    Energy Technology Data Exchange (ETDEWEB)

    Hind, D J [Davis Derby Ltd., Derby (United Kingdom)

    1995-07-01

    Radio Frequency Identification Systems (RFID) are one of the automatic data capture technologies taking over from bar codes and magnetic swipe cards in many applications involving automatic hands free operation in arduous environments. RFID systems are based on the use of miniature radio transponders carrying encoded electronic data that is used to uniquely identify the identity of transponders. This paper reviews the types of system available and compares the various techniques involved in the different systems. The various types of transponder are described including the latest state of the art passive read/write high performance types. A review of the history of RFID systems in the mining industry is also given in the paper. The problems involved in designing and certifying a system for use in hazardous areas are also described, with particular reference to the problems of inadvertent detonator ignition by radio systems. Applications of RFID systems in the mining industry are described in considerable detail, covering applications both on the surface and underground. 1 ref., 12 figs., 1 tab.

  15. Using recruitment source timing and diagnosticity to enhance applicants' occupation-specific human capital.

    Science.gov (United States)

    Campion, Michael C; Ployhart, Robert E; Campion, Michael A

    2017-05-01

    [Correction Notice: An Erratum for this article was reported in Vol 102(5) of Journal of Applied Psychology (see record 2017-14296-001). In the article, the following headings were inadvertently set at the wrong level: Method, Participants and Procedure, Measures, Occupation specific human capital, Symbolic jobs, Relevant majors, Occupation-specific capital hotspots, Source timing, Source diagnosticity, Results, and Discussion. All versions of this article have been corrected.] This study proposes that reaching applicants through more diagnostic recruitment sources earlier in their educational development (e.g., in high school) can lead them to invest more in their occupation-specific human capital (OSHC), thereby making them higher quality candidates. Using a sample of 78,157 applicants applying for jobs within a desirable professional occupation in the public sector, results indicate that applicants who report hearing about the occupation earlier, and applicants who report hearing about the occupation through more diagnostic sources, have higher levels of OSHC upon application. Additionally, source timing and diagnosticity affect the likelihood of candidates applying for jobs symbolic of the occupation, selecting relevant majors, and attending educational institutions with top programs related to the occupation. These findings suggest a firm's recruiting efforts may influence applicants' OSHC investment strategies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  16. Radioactive Waste Management Complex low-level waste radiological performance assessment

    Energy Technology Data Exchange (ETDEWEB)

    Maheras, S.J.; Rood, A.S.; Magnuson, S.O.; Sussman, M.E.; Bhatt, R.N.

    1994-04-01

    This report documents the projected radiological dose impacts associated with the disposal of radioactive low-level waste at the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory. This radiological performance assessment was conducted to evaluate compliance with applicable radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the public and the environment. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses were made for both offsite receptors and individuals inadvertently intruding onto the site after closure. In addition, uncertainty and sensitivity analyses were performed. The results of the analyses indicate compliance with established radiological criteria and provide reasonable assurance that public health and safety will be protected.

  17. Radioactive Waste Management Complex low-level waste radiological performance assessment

    International Nuclear Information System (INIS)

    Maheras, S.J.; Rood, A.S.; Magnuson, S.O.; Sussman, M.E.; Bhatt, R.N.

    1994-04-01

    This report documents the projected radiological dose impacts associated with the disposal of radioactive low-level waste at the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory. This radiological performance assessment was conducted to evaluate compliance with applicable radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the public and the environment. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses were made for both offsite receptors and individuals inadvertently intruding onto the site after closure. In addition, uncertainty and sensitivity analyses were performed. The results of the analyses indicate compliance with established radiological criteria and provide reasonable assurance that public health and safety will be protected

  18. Seroepidemiological profile of pregnant women after inadvertent rubella vaccination in the state of Rio de Janeiro, Brazil, 2001-2002 Perfil seroepidemiológico de embarazadas después de recibir inadvertidamente la vacuna antirrubeólica, estado de Rio de Janeiro, Brasil, 2001-2002

    Directory of Open Access Journals (Sweden)

    Gloria Regina da Silva e Sá

    2006-06-01

    Full Text Available OBJECTIVES: To analyze postvaccination serological status in pregnant women inadvertently vaccinated against rubella in the state of Rio de Janeiro, Brazil. METHODS: This was a cross-sectional study of pregnant women 15 to 29 years old, vaccinated against rubella and measles from November 2001 to March 2002, who were unaware of their pregnancy at the time of vaccination or who became pregnant within 30 days thereafter. They were tested for rubella-specific immunoglobulin M (IgM and G (IgG and classified as immune (IgM-negative, IgG-positive, tested within 30 days after vaccination, susceptible (IgM-positive after vaccination or indeterminate (IgM-negative, IgG-positive, vaccination- serological testing interval greater than 30 days. RESULTS: Of 2 292 women, 288 (12.6% were susceptible, 316 (13.8% immune, 1 576 (68.8% indeterminate, 8 (0.3% ineligible, and 104 (4.5% lost to follow-up. IgM seropositivity by vaccination-serological testing interval was 16.1% (d" 30 days, 15.4% (30-60 days, and 14.2% (61-90 days. Considering the campaign's target age, the 20-to-24-year age group had the largest proportion of individuals susceptible to rubella (14.8% and represented 42.4% (122/288 of all susceptible women. In 75% of susceptible pregnant women, gestational age was 5 weeks or less at the time of vaccination. CONCLUSIONS: Mass immunization of childbearing-age women was justified on the basis of epidemiological and serological data. Follow-up of vaccinated pregnant women revealed no cases of congenital rubella syndrome due to rubella vaccination. However, the observed rate of congenital infection supports the recommendation to avoid vaccinating pregnant women, and to avoid conception for up to 1 month following rubella vaccination.OBJETIVOS: Analizar el estado serológico de mujeres embarazadas tras haber recibido inadvertidamente la vacuna antirrubeólica, en el estado de Rio de Janeiro, Brasil. MÉTODOS: Se realizó un estudio transversal de mujeres

  19. Microwave and Millimeter-Wave Remote Sensing for Security Applications. By Jeffrey A. Nanzer, Artech House, 2012; 372 pages. Price £109.00, ISBN 978-1-60807-172-2

    Directory of Open Access Journals (Sweden)

    Shu-Kun Lin

    2013-01-01

    Full Text Available Microwave and millimeter-wave remote sensing techniques are fast becoming a necessity in many aspects of security as detection and classification of objects or intruders becomes more difficult. This groundbreaking resource offers you expert guidance in this burgeoning area. It provides you with a thorough treatment of the principles of microwave and millimeter-wave remote sensing for security applications, as well as practical coverage of the design of radiometer, radar, and imaging systems. You learn how to design active and passive sensors for intruder detection, concealed object detection, and human activity classification. This detailed book presents the fundamental concepts practitioners need to understand, including electromagnetic wave propagation in free space and in media, antenna theory, and the principles of receiver design. You find in-depth discussions on the interactions of electromagnetic waves with human tissues, the atmosphere and various building and clothing materials. This timely volume explores recently developed detection techniques, such as micro-Doppler radar signatures and correlation radiometry. The book is supported with over 200 illustrations and 1,135 equations.

  20. Bio-inspired motion planning algorithms for autonomous robots facilitating greater plasticity for security applications

    Science.gov (United States)

    Guo, Yi; Hohil, Myron; Desai, Sachi V.

    2007-10-01

    Proposed are techniques toward using collaborative robots for infrastructure security applications by utilizing them for mobile sensor suites. A vast number of critical facilities/technologies must be protected against unauthorized intruders. Employing a team of mobile robots working cooperatively can alleviate valuable human resources. Addressed are the technical challenges for multi-robot teams in security applications and the implementation of multi-robot motion planning algorithm based on the patrolling and threat response scenario. A neural network based methodology is exploited to plan a patrolling path with complete coverage. Also described is a proof-of-principle experimental setup with a group of Pioneer 3-AT and Centibot robots. A block diagram of the system integration of sensing and planning will illustrate the robot to robot interaction to operate as a collaborative unit. The proposed approach singular goal is to overcome the limits of previous approaches of robots in security applications and enabling systems to be deployed for autonomous operation in an unaltered environment providing access to an all encompassing sensor suite.

  1. "Using recruitment source timing and diagnosticity to enhance applicants' occupation-specific human capital": Correction to Campion, Ployhart, and Campion (2017).

    Science.gov (United States)

    2017-05-01

    Reports an error in "Using Recruitment Source Timing and Diagnosticity to Enhance Applicants' Occupation-Specific Human Capital" by Michael C. Campion, Robert E. Ployhart and Michael A. Campion ( Journal of Applied Psychology , Advanced Online Publication, Feb 02, 2017, np). In the article, the following headings were inadvertently set at the wrong level: Method, Participants and Procedure, Measures, Occupation specific human capital, Symbolic jobs, Relevant majors, Occupation-specific capital hotspots, Source timing, Source diagnosticity, Results, and Discussion. All versions of this article have been corrected. (The following abstract of the original article appeared in record 2017-04566-001.) This study proposes that reaching applicants through more diagnostic recruitment sources earlier in their educational development (e.g., in high school) can lead them to invest more in their occupation-specific human capital (OSHC), thereby making them higher quality candidates. Using a sample of 78,157 applicants applying for jobs within a desirable professional occupation in the public sector, results indicate that applicants who report hearing about the occupation earlier, and applicants who report hearing about the occupation through more diagnostic sources, have higher levels of OSHC upon application. Additionally, source timing and diagnosticity affect the likelihood of candidates applying for jobs symbolic of the occupation, selecting relevant majors, and attending educational institutions with top programs related to the occupation. These findings suggest a firm's recruiting efforts may influence applicants' OSHC investment strategies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  2. Medical Applications

    OpenAIRE

    Biscari, C.; Falbo, L.

    2016-01-01

    The use of accelerators for medical applications has evolved from initial experimentation to turn-key devices commonly operating in hospitals. New applications are continuously being developed around the world, and the hadrontherapy facilities of the newest generation are placed at the frontier between industrial production and advanced R&D. An introduction to the different medical application accelerators is followed by a description of the hadrontherapy facilities, with special emphasis on ...

  3. LCA Applications

    DEFF Research Database (Denmark)

    Owsianiak, Mikołaj; Bjørn, Anders; Laurent, Alexis

    2018-01-01

    The chapter gives examples of applications of LCA by the central societal actors in government, industry and citizens, and discusses major motivations and challenges for the use of LCA to support science-based decision-making from their respective perspectives. We highlight applications of LCA...... environmental impacts of products and systems and support decisions around production and consumption and highlights factors that prevent its even more widespread application....

  4. PSA applications

    Energy Technology Data Exchange (ETDEWEB)

    Dubreuil Chambardel, A

    1997-12-31

    The IAEA now defines three types of PSA applications: Validation of design and of operation procedures; optimization of plant operation; and regulatory applications. The applications of PSA are manifold: only a few are dealt with here (precursor analysis is dealt with in session 3, topic 4). For each of them, we will do the utmost to demonstrate the main difficulties encountered, EDF`s viewpoint on the matter, and the points remaining to be solved. In what follows, unless explicitly stated otherwise, we have made every effort to represent the different applications as they are practiced by all concerned in the international community, and to describe the inherent difficulties the international community has encountered with these applications with all objectivity. It goes without saying that the comments below are simply those of the ESF department, and are submitted here for discussion by the experts. 13 refs.

  5. PSA applications

    International Nuclear Information System (INIS)

    Dubreuil Chambardel, A.

    1996-01-01

    The IAEA now defines three types of PSA applications: Validation of design and of operation procedures; optimization of plant operation; and regulatory applications. The applications of PSA are manifold: only a few are dealt with here (precursor analysis is dealt with in session 3, topic 4). For each of them, we will do the utmost to demonstrate the main difficulties encountered, EDF's viewpoint on the matter, and the points remaining to be solved. In what follows, unless explicitly stated otherwise, we have made every effort to represent the different applications as they are practiced by all concerned in the international community, and to describe the inherent difficulties the international community has encountered with these applications with all objectivity. It goes without saying that the comments below are simply those of the ESF department, and are submitted here for discussion by the experts. 13 refs

  6. First application of hollow fiber filter for PWR condensate polishing

    International Nuclear Information System (INIS)

    Tsuda, S.; Otoha, K.; Takiguchi, H.

    2002-01-01

    In Tsuruga Unit-2 (PWR 1160 MWe commenced commercial operation in 1987), current procedure for secondary system clean-up before start-up had prolonged outage time and had consumed a huge amount of de-ionized (DI) water. In addition, iron oxide in condensate had accelerated the degradation of condensate demineralizer (CD) resin. The corrosion product of iron could also influence the secondary side corrosion of steam generator (SG) tubing if it intruded into SG through CD. To solve these problems, Japan Atomic Power Company (JAPC) decided to introduce hollow fiber filter (HFF) type condensate filter into Tsuruga-2, as the first application to PWR in the world. Because of retro-fitted HFF in Tsuruga Unit-2, limitations for installation space and flow resistance in condensate system and cost reduction required new design for compact and low differential pressure system and for long life filter module. JAPC and ORGANO assessed methodologies to achieve these goals. An advanced HFF system, including a newly developed compact HFF module design, was installed at Tsuruga Unit-2 in 1997 based on the assessment. During the 5 years since the installation, the HFF system has provided excellent crud removal that enables to shorten the outage period and to reduce DI water consumption drastically. Stable differential pressure (dP) trend of the HFF system indicates an expected module life of more than 7 years, with backwash cleaning required only 2 or 3 times per year. In addition to providing the expected operating cost reduction and improved SG tube integrity, numerous additional benefits have resulted from the retrofit. (authors)

  7. Development of a self-navigating mobile interior robot application as a security guard/sentry

    International Nuclear Information System (INIS)

    Klarer, P.R.; Harrington, J.J.

    1986-07-01

    This paper describes a mobile robot system designed to function as part of an overall security system at a high security facility. The features of this robot system include specialized software and sensors for navigation without the need for external locator beacons or signposts, sensors for remote imaging and intruder detection, and the ability to communicate information either directly to the electronic portion of the security system or to a manned central control center. Other desirable features of the robot system include low weight, compact size, and low power consumption. The robot system can be operated either by remote manual control, or it can operate autonomously where direct human control can be limited to the global command level. The robot can act as a mobile remote sensing platform for alarm assessment or roving patrol, as a point sensor (sentry) in routine security applications, or as an exploratory device in situations potentially hazardous to humans. This robot system may also be used to ''walk-test'' intrusion detection sensors as part of a routine test and maintenance program for an interior intrusion detection system. The hardware, software, and operation of this robot system will be briefly described herein

  8. Medical Applications

    CERN Document Server

    Biscari, C.

    2014-12-19

    The use of accelerators for medical applications has evolved from initial experimentation to turn-key devices commonly operating in hospitals. New applications are continuously being developed around the world, and the hadrontherapy facilities of the newest generation are placed at the frontier between industrial production and advanced R&D. An introduction to the different medical application accelerators is followed by a description of the hadrontherapy facilities, with special emphasis on CNAO, and the report closes with a brief outlook on the future of this field.

  9. Medical Applications

    International Nuclear Information System (INIS)

    Biscari, C; Falbo, L

    2014-01-01

    The use of accelerators for medical applications has evolved from initial experimentation to turn-key devices commonly operating in hospitals. New applications are continuously being developed around the world, and the hadrontherapy facilities of the newest generation are placed at the frontier between industrial production and advanced R&D. An introduction to the different medical application accelerators is followed by a description of the hadrontherapy facilities, with special emphasis on CNAO, and the report closes with a brief outlook on the future of this field

  10. Structure of intruder band in "1"1"9"-"1"2"9Xe

    International Nuclear Information System (INIS)

    Sharma, H.P.; Chakraborty, S.; Tiwary, S.S.

    2017-01-01

    Xe isotopes in A∼130 mass region are known for their variety of structural phenomena, such as, unexpected signature splitting, signature inversion, γ-vibration etc. These phenomena are associated to axialy asymmetric shape. The triaxial shape in Xe nuclei are expected to originate due to the availability of prolate driving low-Ω πh_1_1_/_2 orbital and oblate driving high-Ω νh11/2 orbital near Fermi surface. The observed experimental E (4"+)/E (2"+) value (∼2.5) also support the γ-soft nature of these nuclei. Interestingly, both proton and neutron alignments have been observed in νh_1_1_/_2 band in "1"1"9"-"1"2"5Xe and neutron alignment dominates. In "1"2"9Xe, proton alignment reported to dominate. It is also supported by TPRM calculations, although, there are no significant change in the neutron orbitals. Whether this change in the alignment is occurred at N=75 or 73 is not known. Therefore, it is interesting to understand the status of the neutron and proton alignment in "1"2"7Xe, which are not studied well. Hence, in-beam γ-ray spectroscopy of "1"2"7Xe was carried out using "1"2"2Sn("9Be, 4nγ) fusion-evaporation reaction at 48 MeV using INGA facility at Inter-University Accelerator Centre, New Delhi. Details of the analysis and results will be discussed during the conference. (author)

  11. Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT)

    Science.gov (United States)

    2016-07-27

    munication. Unfortunately, these critical functions are routinely threatened by malware and other cyber security threats. Such threats are expected to...such as network packets, firewall logs, network diagrams, IP address ownership information, etc., to determine if sufficient evidence exists to support...circumstances, network analysts would likely need to consult additional sources of evidence not present in the simulation, such as net- work firewall

  12. Vulnerabilities of Bluetooth Data Channel that Allow Intruders to Wiretrap User’s Data

    Directory of Open Access Journals (Sweden)

    P. E. Minin

    2012-09-01

    Full Text Available The article is dedicated to the cryptography attack on Bluetooth handsfree headset. The authors describe the situation when hackers could eavesdrop mobile phones talks if a person is using the Bluetooth headset. The vulnerability in the authentication process allows hackers to crack PIN code and to decipher the packets transmitted between the headset and the mobile phone.

  13. Where is the Frame? : Victims and Intruders in the Belgian Press Coverage of the Asylum Issue

    NARCIS (Netherlands)

    Gorp, B. van

    2005-01-01

    In this article an empirically oriented conceptualization of frames is developed, using the issue of asylum and illegal immigration in the Belgian press as a test case. The methodological focus of this study is on the question of how these frames can be detected in the coverage. How can they be

  14. The use of isotope techniques to investigate saltwater intruded aquifers in the Philippines

    International Nuclear Information System (INIS)

    Peralta, G.L.

    1988-01-01

    Studies in Metro Manila area have identified inland bodies of saline water which have been called ''connate water''. It has been refered to in literature as saline water occurring inland at a range of depths, in close association with freshwater. The relationships between these various bodies of saline water are not clear and for groundwater development planning it would be useful to determine whether the inland cases are a series of small isolated residual bodies from the last marine transgression or parts of a large continuous saline body. Furthermore the origin and mechanism of natural groundwater recharges are often not clear from the chemical and hydrogeological data as in the island of Cebu. In these circumstances it was recommended that useful planning data be obtained from a study of the concentrations of natural isotopes in the groundwater, particularly in the areas of Manila, Cebu and Bulacan-Pampanga. (author)

  15. Similarities between the target and the intruder in naturally-occurring repeated person naming errors

    Directory of Open Access Journals (Sweden)

    Serge eBredart

    2015-09-01

    Full Text Available The present study investigated an intriguing phenomenon that did not receive much attention so far: repeatedly calling a familiar person with someone else’s name. From participants’ responses to a questionnaire, these repeated naming errors were characterized with respect to a number of properties (e.g., type of names being substituted, error frequency, error longevity and different features of similarity (e.g., age, gender, type of relationship with the participant, face resemblance and similarity of the contexts of encounter between the bearer of the target name and the bearer of the wrong name. Moreover, it was evaluated whether the phonological similarity between names, the participants’ age, the difference of age between the two persons whose names were substituted, and face resemblance between the two persons predicted the frequency of error. Regression analyses indicated that phonological similarity between the target name and the wrong name predicted the frequency of repeated person naming errors. The age of the participant was also a significant predictor of error frequency: the older the participant the higher the frequency of errors. Consistent with previous research stressing the importance of the age of acquisition of words on lexical access in speech production, results indicated that bearer of the wrong name was on average known for longer than the bearer of the target name.

  16. "Ageing Out": When Policy and Social Orders Intrude on the "Disordered" Realities of Young Mothers

    Science.gov (United States)

    Shoveller, Jean; Chabot, Cathy; Johnson, Joy L.; Prkachin, Ken

    2011-01-01

    Despite a general decline, early-age motherhood continues to manifest disproportionately among young women living in rural/remote Canada. Although public health interventions exist to ameliorate the negative impacts, key determinants of young mothers' well-being exist in sectors outside of health. Moreover, there is no clear understanding of how…

  17. Stopping the past from intruding the present: Social anxiety disorder and proactive interference.

    Science.gov (United States)

    Moore, Harry T A; Gómez-Ariza, Carlos J; Garcia-Lopez, Luis-Joaquín

    2016-04-30

    It has recently been suggested that social anxiety disorder (SAD) entails a deficit in downregulating unwanted (even non-threatening) memories. In the present study we test this hypothesis by comparing a sample of young adults diagnosed with SAD and healthy controls in their ability to resist proactive interference in a working memory task. Where participants performed similarly in the control condition of the memory task, participants with SAD were more susceptible to interference in the experimental condition than the healthy controls. This finding is in line with previous studies that show anxiety to be associated with impoverished executive control and, specifically, suggests that SAD entails a reduced ability to get rid of interfering memories. Clinical implications are discussed. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  18. Low-lying intruder state of the unbound nucleus {sup 13}Be

    Energy Technology Data Exchange (ETDEWEB)

    Kondo, Y., E-mail: kondo@phys.titech.ac.j [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Nakamura, T.; Satou, Y. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Matsumoto, T.; Aoi, N. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Endo, N. [Department of Physics, Tohoku University, 2-1-1 Katahira, Aoba, Sendai, Miyagi 980-8577 (Japan); Fukuda, N.; Gomi, T. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Hashimoto, Y. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Ishihara, M. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Kawai, S. [Department of Physics, Rikkyo University, 3-34-1 Nishi-Ikebukuro, Toshima, Tokyo 171-8501 (Japan); Kitayama, M.; Kobayashi, T.; Matsuda, Y. [Department of Physics, Tohoku University, 2-1-1 Katahira, Aoba, Sendai, Miyagi 980-8577 (Japan); Matsui, N. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Motobayashi, T. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Nakabayashi, T.; Okumura, T. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Ong, H.J.; Onishi, T.K. [Department of Physics, University of Tokyo, 7-3-1 Hongo, Bunkyo, Tokyo 113-0033 (Japan)

    2010-06-21

    An experimental study for the unbound nucleus {sup 13}Be has been performed by means of the invariant mass method via the one-neutron removal reaction {sup 1}H({sup 14}Be,{sup 12}Be+n). A resonance has been observed at 0.51(1) MeV in the relative energy (E{sub rel}) spectrum of the {sup 12}Be+n system. The transverse momentum distribution of the {sup 12}Be+n system as well as the resonance width of 0.45(3) MeV gives evidence for the p-wave nature of the resonance. A d-wave resonance has also been observed at 2.39(5) MeV in the E{sub rel} spectrum. The observation of the low-lying p-wave resonance indicates the disappearance of the N=8 magicity in the vicinity of the neutron drip line region.

  19. Salient eyes deter conspecific nest intruders in wild jackdaws (Corvus monedula).

    Science.gov (United States)

    Davidson, Gabrielle L; Clayton, Nicola S; Thornton, Alex

    2014-02-01

    Animals often respond fearfully when encountering eyes or eye-like shapes. Although gaze aversion has been documented in mammals when avoiding group-member conflict, the importance of eye coloration during interactions between conspecifics has yet to be examined in non-primate species. Jackdaws (Corvus monedula) have near-white irides, which are conspicuous against their dark feathers and visible when seen from outside the cavities where they nest. Because jackdaws compete for nest sites, their conspicuous eyes may act as a warning signal to indicate that a nest is occupied and deter intrusions by conspecifics. We tested whether jackdaws' pale irides serve as a deterrent to prospecting conspecifics by comparing prospectors' behaviour towards nest-boxes displaying images with bright eyes (BEs) only, a jackdaw face with natural BEs, or a jackdaw face with dark eyes. The jackdaw face with BEs was most effective in deterring birds from making contact with nest-boxes, whereas both BE conditions reduced the amount of time jackdaws spent in proximity to the image. We suggest BEs in jackdaws may function to prevent conspecific competitors from approaching occupied nest sites.

  20. Hydrogeochemical characterization and groundwater quality assessment in intruded coastal brine aquifers (Laizhou Bay, China).

    Science.gov (United States)

    Zhang, Xiaoying; Miao, Jinjie; Hu, Bill X; Liu, Hongwei; Zhang, Hanxiong; Ma, Zhen

    2017-09-01

    The aquifer in the coastal area of the Laizhou Bay is affected by salinization processes related to intense groundwater exploitation for brine resource and for agriculture irrigation during the last three decades. As a result, the dynamic balances among freshwater, brine, and seawater have been disturbed and the quality of groundwater has deteriorated. To fully understand the groundwater chemical distribution and evolution in the regional aquifers, hydrogeochemical and isotopic studies have been conducted based on the water samples from 102 observation wells. Groundwater levels and salinities in four monitoring wells are as well measured to inspect the general groundwater flow and chemical patterns and seasonal variations. Chemical components such as Na + , K + , Ca 2+ , Mg 2+ , Sr 2+ , Cl - , SO 4 2- , HCO 3 - , NO 3 - , F - , and TDS during the same period are analyzed to explore geochemical evolution, water-rock interactions, sources of salt, nitrate, and fluoride pollution in fresh, brackish, saline, and brine waters. The decreased water levels without typical seasonal variation in the southeast of the study area confirm an over-exploitation of groundwater. The hydrogeochemical characteristics indicate fresh-saline-brine-saline transition pattern from inland to coast where evaporation is a vital factor to control the chemical evolution. The cation exchange processes are occurred at fresh-saline interfaces of mixtures along the hydraulic gradient. Meanwhile, isotopic data indicate that the brine in aquifers was either originated from older meteoric water with mineral dissolution and evaporation or repeatedly evaporation of retained seawater with fresher water recharge and mixing in geological time. Groundwater suitability for drinking is further evaluated according to water quality standard of China. Results reveal high risks of nitrate and fluoride contamination. The elevated nitrate concentration of 560 mg/L, which as high as 28 times of the standard content in drinking water is identified in the south region. In addition, the nitrate and ammonia data of the Wei River suggests decreasing nitrification rate in the study area from inland to estuary. High fluoride concentration, larger than 1 mg/L, is also detected in an area of about 50% of the study region. The saltwater intrusion is analyzed to be responsible for part of dissolution of minerals containing fluoride. Therefore, water treatment before drinking is needed in urgent to reduce the health expose risk.

  1. The regulatory control over radiation sources: the Brazilian experience and some lessons learned from industrial applications

    International Nuclear Information System (INIS)

    Costa, E.L.C.; Gomes, J.D.R.L.; Gomes, R.S.; Costa, M.L.L.; Thomé, Z.D.; Instituto Militar de Engenharia

    2017-01-01

    This study gives an overview of the activities of the National Commission of Nuclear Energy (CNEN), as the Brazilian nuclear regulatory authority. These activities are described, especially those related to management of orphan sources and radioactive material in scrap metal considering the actions already put into place by CNEN during the licensing and controlling of radioactive sources in the industry and other facilities. In Brazil, there is not yet an effective system for controlling the scrap metal and recycling industry, thus a coordinated approach to achieve a harmonized and effective response with the involvement of third parties is needed, especially the metal industries and ores facilities. These practices call for stringent regulatory control, in order to reduce the occurrence of orphan sources, and consequently, radioactive material appearing in scrap metal. Some challenges of managing the national radiation sources register systems will be discussed, in order to cover effectively all the radiation source history (in a 'from the cradle to the grave' basis), and the dynamic maintenance and update of these data. The main industrial applications considered in this work are those dealing with constant movement of sources all over the country, with geographical issues to be considered in the managing and controlling actions, such as gammagraphy and well-logging. This study aims to identify and promote good practices to prevent inadvertent diversion of radioactive material, taking into account existing international recommendations and some lessons learned in national level. (author)

  2. The regulatory control over radiation sources: the Brazilian experience and some lessons learned from industrial applications

    Energy Technology Data Exchange (ETDEWEB)

    Costa, E.L.C.; Gomes, J.D.R.L.; Gomes, R.S.; Costa, M.L.L.; Thomé, Z.D., E-mail: evaldo@cnen.gov.br, E-mail: jlopes@cnen.gov.br, E-mail: rogeriog@cnen.gov.br, E-mail: mara@cnen.gov.br, E-mail: zielithome@gmail.com [Comissao Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil). Diretoria de Radioproteção e Segurança Nuclear; Instituto Militar de Engenharia (IME), Rio de Janeiro, RJ (Brazil). Seção de Engenharia Nuclear

    2017-11-01

    This study gives an overview of the activities of the National Commission of Nuclear Energy (CNEN), as the Brazilian nuclear regulatory authority. These activities are described, especially those related to management of orphan sources and radioactive material in scrap metal considering the actions already put into place by CNEN during the licensing and controlling of radioactive sources in the industry and other facilities. In Brazil, there is not yet an effective system for controlling the scrap metal and recycling industry, thus a coordinated approach to achieve a harmonized and effective response with the involvement of third parties is needed, especially the metal industries and ores facilities. These practices call for stringent regulatory control, in order to reduce the occurrence of orphan sources, and consequently, radioactive material appearing in scrap metal. Some challenges of managing the national radiation sources register systems will be discussed, in order to cover effectively all the radiation source history (in a 'from the cradle to the grave' basis), and the dynamic maintenance and update of these data. The main industrial applications considered in this work are those dealing with constant movement of sources all over the country, with geographical issues to be considered in the managing and controlling actions, such as gammagraphy and well-logging. This study aims to identify and promote good practices to prevent inadvertent diversion of radioactive material, taking into account existing international recommendations and some lessons learned in national level. (author)

  3. Superconductivity - applications

    International Nuclear Information System (INIS)

    The paper deals with the following subjects: 1) Electronics and high-frequency technology, 2) Superconductors for energy technology, 3) Superconducting magnets and their applications, 4) Electric machinery, 5) Superconducting cables. (WBU) [de

  4. Photovoltaic applications

    International Nuclear Information System (INIS)

    Sidrach, M.

    1992-01-01

    The most common terrestrial applications of photovoltaic plants are reviewed. Classification of applications can be done considering end-use sectors and load profiles (consumption demand). For those systems with direct coupling the working point is determined by the intersection of the load line with the I-V curve Design guidelines are provided for photovoltaic systems. This lecture focusses on the distribution system and safeguards

  5. Applications of granular-dynamics numerical simulations to asteroid surfaces

    Science.gov (United States)

    Richardson, D. C.; Michel, P.; Schwartz, S. R.; Yu, Y.; Ballouz, R.-L.; Matsumura, S.

    2014-07-01

    Spacecraft images and indirect observations including thermal inertia measurements indicate most small bodies have surface regolith. Evidence of granular flow is also apparent in the images. This material motion occurs in very low gravity, therefore in a totally different gravitational environment than on the Earth. Upcoming sample-return missions to small bodies, and possible future manned missions, will involve interaction with the surface regolith, so it is important to develop tools to predict the surface response. We have added new capabilities to the N-body gravity tree code pkdgrav [1,2] that permit the simulation of granular dynamics, including multi-contact physics and friction forces, using the soft-sphere discrete-element method [3]. The numerical approach has been validated through comparison with laboratory experiments (e.g., [3,4]). (1) We carried out impacts into granular materials using different projectile shapes under Earth's gravity [5] and compared the results to laboratory experiments [6] in support of JAXA's Hayabusa 2 asteroid sample-return mission. We tested different projectile shapes and confirmed that the 90-degree cone was the most efficient at excavating mass when impacting 5-mm-diameter glass beads. Results are sensitive to the normal coefficient of restitution and the coefficient of static friction. Preliminary experiments in micro-gravity for similar impact conditions show both the amount of ejected mass and the timescale of the impact process increase, as expected. (2) It has been found (e.g., [7,8]) that ''fresh'' (unreddened) Q-class asteroids have a high probability of recent planetary encounters (˜1 Myr; also see [9]), suggesting that surface refreshening may have occurred due to tidal effects. As an application of the potential effect of tidal interactions, we carried out simulations of Apophis' predicted 2029 encounter with the Earth to see whether regolith motion might occur, using a range of plausible material parameters

  6. PRIBIC Application

    International Nuclear Information System (INIS)

    Pascual Alonso, J.L.; Barcala Riveira, J.M.

    2002-01-01

    PRIBIC plant (Pollutants Reduction In small Biomass Combustion systems) at CEDER is a facility specifically designed to do biomass combustion tests. In these tests is necessary to know the values of different sensors in real time. With this information the PRIBIC plant is regulated to its optimum point of work and its possible to follow the operation criteria and get test objectives. Different electronic instruments record information about the plant operation. A software application was developed to let a centralised motorization of that information. The application communicates with the instrumentation, recovers data, lets operators see data in real time and saves the information in files. An important part of this document describes that application, and some considerations to generalise this kind of developments to other Experimental Plants, including cost estimations. Descriptions of plant, analysis of the problem, result evaluations, and conclusions can also be found in the document. (Author) 13 refs

  7. Clenbuterol - regional food contamination a possible source for inadvertent doping in sports.

    Science.gov (United States)

    Guddat, S; Fußhöller, G; Geyer, H; Thomas, A; Braun, H; Haenelt, N; Schwenke, A; Klose, C; Thevis, M; Schänzer, W

    2012-06-01

    The misuse of the sympathomimetic and anabolic agent clenbuterol has been frequently reported in professional sport and in the livestock industry. In 2010, a team of athletes returned from competition in China and regular doping control samples were taken within the next two days. All urine samples contained low amounts (pg/ml) of clenbuterol, drawing the attention to a well-known problem: the possibility of an unintended clenbuterol intake with food. A warning that Chinese meat is possibly contaminated with prohibited substances according to international anti-doping regulations was also given by Chinese officials just before the Bejing Olympic Games in 2008. To investigate if clenbuterol can be found in human urine, a study was initiated comprising 28 volunteers collecting urine samples after their return from China. For the quantification of clenbuterol at a low pg/ml level, a very sensitive and specific isotope dilution liquid chromatography-tandem mass spectrometry (LC-MS/MS) assay was developed using liquid/liquid re-extraction for clean-up with a limit of detection and quantification of 1 and 3 pg/ml, respectively. The method was validated demonstrating good precision (intra-day: 2.9-5.5 %; inter-day: 5.1-8.8%), accuracy (89.5-102.5%) and mean recovery (81.4%). Clenbuterol was detectable in 22 (79%) of the analyzed samples, indicating a general food contamination problem despite an official clenbuterol prohibition in China for livestock. Copyright © 2012 John Wiley & Sons, Ltd.

  8. Estimation of long-term probabilities for inadvertent intrusion into radioactive waste management areas

    International Nuclear Information System (INIS)

    Eedy, W.; Hart, D.

    1988-05-01

    The risk to human health from radioactive waste management sites can be calculated as the product of the probability of accidental exposure (intrusion) times the probability of a health effect from such exposure. This report reviews the literature and evaluates methods used to predict the probabilities for unintentional intrusion into radioactive waste management areas in Canada over a 10,000-year period. Methods to predict such probabilities are available. They generally assume a long-term stability in terms of existing resource uses and society in the management area. The major potential for errors results from the unlikeliness of these assumptions holding true over such lengthy periods of prediction

  9. "Real men don't": constructions of masculinity and inadvertent harm in public health interventions.

    Science.gov (United States)

    Fleming, Paul J; Lee, Joseph G L; Dworkin, Shari L

    2014-06-01

    Research shows that constraining aspects of male gender norms negatively influence both women's and men's health. Messaging that draws on norms of masculinity in health programming has been shown to improve both women's and men's health, but some types of public health messaging (e.g., Man Up Monday, a media campaign to prevent the spread of sexually transmitted infections) can reify harmful aspects of hegemonic masculinity that programs are working to change. We critically assess the deployment of hegemonic male norms in the Man Up Monday campaign. We draw on ethical paradigms in public health to challenge programs that reinforce harmful aspects of gender norms and suggest the use of gender-transformative interventions that challenge constraining masculine norms and have been shown to have a positive effect on health behaviors.

  10. Globalisation, Mergers and "Inadvertent Multi-Campus Universities": Reflections from Wales

    Science.gov (United States)

    Zeeman, Nadine; Benneworth, Paul

    2017-01-01

    Multi-site universities face the challenge of integrating campuses that may have different profiles and orientations arising from place-specific attachments. Multi-campus universities created via mergers seeking to ensure long-term financial sustainability, and increasing their attractiveness to students, create a tension in campuses' purposes. We…

  11. Inadvertently programmed bits in Samsung 128 Mbit flash devices: a flaky investigation

    Science.gov (United States)

    Swift, G.

    2002-01-01

    JPL's X2000 avionics design pioneers new territory by specifying a non-volatile memory (NVM) board based on flash memories. The Samsung 128Mb device chosen was found to demonstrate bit errors (mostly program disturbs) and block-erase failures that increase with cycling. Low temperature, certain pseudo- random patterns, and, probably, higher bias increase the observable bit errors. An experiment was conducted to determine the wearout dependence of the bit errors to 100k cycles at cold temperature using flight-lot devices (some pre-irradiated). The results show an exponential growth rate, a wide part-to-part variation, and some annealing behavior.

  12. Confronting inadvertent stigma and pejorative language in addiction scholarship: a recognition and response.

    Science.gov (United States)

    Broyles, Lauren M; Binswanger, Ingrid A; Jenkins, Jennifer A; Finnell, Deborah S; Faseru, Babalola; Cavaiola, Alan; Pugatch, Marianne; Gordon, Adam J

    2014-01-01

    Appropriate use of language in the field of addiction is important. Inappropriate use of language can negatively impact the way society perceives substance use and the people who are affected by it. Language frames what the public thinks about substance use and recovery, and it can also affect how individuals think about themselves and their own ability to change. But most importantly, language intentionally and unintentionally propagates stigma: the mark of dishonor, disgrace, and difference that depersonalizes people, depriving them of individual or personal qualities and personal identity. Stigma is harmful, distressing, and marginalizing to the individuals, groups, and populations who bear it. For these reasons, the Editorial Team of Substance Abuse seeks to formally operationalize respect for personhood in our mission, our public relations, and our instructions to authors. We ask authors, reviewers, and readers to carefully and intentionally consider the language used to describe alcohol and other drug use and disorders, the individuals affected by these conditions, and their related behaviors, comorbidities, treatment, and recovery in our publication. Specifically, we make an appeal for the use of language that (1) respects the worth and dignity of all persons ("people-first language"); (2) focuses on the medical nature of substance use disorders and treatment; (3) promotes the recovery process; and (4) avoids perpetuating negative stereotypes and biases through the use of slang and idioms. In this paper, we provide a brief overview of each of the above principles, along with examples, as well as some of the nuances and tensions that inherently arise as we give greater attention to the issue of how we talk and write about substance use and addiction.

  13. Inadvertent shipment of a radiographic source from Korea to Amersham Corporation, Burlington, Massachusetts

    International Nuclear Information System (INIS)

    1990-05-01

    Amersham Corporation, Burlington, Massachusetts, a licensee of the US Nuclear Regulatory Commission (NRC), authorized to manufacture and distribute iridium-192 and cobalt-60 source assemblies for use in radiography equipment, received a shipment of 14 source changer son March 8, 1990, that were being returned from their product distributor, NDI Corporation in Seoul, Korea. One source changer contained a small sealed source in an unshielded location. Amersham employees retrieved the source, secured it in a hot cell, and notified NRC's Region I. Subsequently, NRC dispatched an Incident Investigation Team to perform a comprehensive review of this incident and determine the potential for exposure to those who handled the source changer and to members of the general public. This report describes the incident and the methodology used in the investigation and presents the Team's findings and conclusions

  14. MRI findings in 6 cases of children by inadvertent ingestion of diphenoxylate-atropine

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Lianxiang [Shandong University School of Medicine, Shandong Medical Imaging Research Institute , No. 44 West Wenhua Road, Jinan 250012 (China); Lin Xiangtao, E-mail: yishui1982@126.com [Shandong University School of Medicine, Shandong Medical Imaging Research Institute, No. 44 West Wenhua Road, Jinan 250012 (China); Cao Jinfeng [Shandong University School of Medicine, Shandong Medical Imaging Research Institute , No. 44 West Wenhua Road, Jinan 250012 (China); Wang Xueyu [Division of Pediatrics, Shandong Provincial Hospital, Shandong University, No. 324 Jingwu Road, Jinan 250021 (China); Wu Lebin [Shandong Medical Imaging Research Institute, No. 324 Jingwu Road, Jinan 250021 (China)

    2011-09-15

    Purpose: Compound diphenoxylate (diphenoxylate-atropine) poisoning can cause toxic encephalopathy in children, and magnetic resonance imaging (MRI) of the brain in this condition has not been reported. This study is to analyze brain MRI findings and to investigate the relations between MRI features and possible pathophysiological changes in children. Methods: Six children accidentally swallowed compound diphenoxylate, 4 males, 2 females, aged 20-46 months, average 33 months. Quantity of ingested diphenoxylate-atropine was from 6 to 30 tablets, each tablet contains diphenoxylate 2.5 mg and atropine 0.025 mg. These patients were referred to our hospital within 24 h after diphenoxylate-atropine ingestion, and underwent brain MRI scan within 24-72 h after emergency treatment. The characteristics of conventional MRI were analyzed. Results: These pediatric patients had various symptoms of opioid intoxication and atropine toxicity. Brain MRI showed abnormal low signal intensity on T1-weighted images (T1WI) and abnormal high signal intensity on T2-weighted images (T2WI) and fluid-attenuated inversion recovery (FLAIR) imaging in bilateral in all cases; abnormal high signal intensity on T1WI, T2WI and FLAIR in 4 cases. Encephalomalacia was observed in 3 cases during follow-up. Conclusion: In the early stage of compound diphenoxylate poisoning in children, multiple extensive edema-necrosis and hemorrhagic-necrosis focus were observed in basic nucleus, pallium and cerebellum, these resulted in the corresponding brain dysfunction with encephalomalacia. MRI scan in the early stage in this condition may provide evidences of brain impairment, and is beneficial for the early diagnosis, treatment and prognosis assessment.

  15. Skills Training to Avoid Inadvertent Plagiarism: Results from a Randomised Control Study

    Science.gov (United States)

    Newton, Fiona J.; Wright, Jill D.; Newton, Joshua D.

    2014-01-01

    Plagiarism continues to be a concern within academic institutions. The current study utilised a randomised control trial of 137 new entry tertiary students to assess the efficacy of a scalable short training session on paraphrasing, patch writing and plagiarism. The results indicate that the training significantly enhanced students' overall…

  16. Vessel biofouling as an inadvertent vector of benthic invertebrates occurring in Brazil.

    Science.gov (United States)

    Farrapeira, Cristiane Maria Rocha; Tenório, Deusinete de Oliveira; Amaral, Fernanda Duarte do

    2011-04-01

    This article reviews the literature involving benthic invertebrates that are cited in association with hull fouling, reporting the species that occur on the Brazilian coast and evaluating the importance of this vector for the introduction of nonindigenous and cryptogenic invertebrates in Brazil. It discusses some of the strategies that were used by the species that allowed for their overseas transport and made it easier to cross natural barriers that otherwise would have been obstacles to their dispersion. The compiled data list 343 species (65% nonindigenous and 35% cryptogenic), mainly from the northwestern Atlantic Ocean. The traveling fauna, composed mostly of cosmopolitan species (70.3%), is primarily euryhaline and marine stenohaline, with sessile and sedentary habits. After delineating the shipborne species' ecological profiles and traveling strategies and evaluating their overlapping vectors, we concluded that hull vessels were the main vector of introduction to the Brazilian coast for 89.8% of the compiled species. Copyright © 2010 Elsevier Ltd. All rights reserved.

  17. Lethal Consequences in an Infant with Myelomeningocele Following an Inadvertent Treatment

    Directory of Open Access Journals (Sweden)

    Xuemei Wu

    2016-01-01

    Full Text Available Myelomeningocele (MMC is a protrusion of spinal cord contents and meninges through a vertebral defect. Iatrogenic deaths of patients with MMC are rarely encountered in forensic practice. In our case, a 3-month-old female was born with a lumbosacral cyst, the size of which had been increasing gradually over age. There was no neurological, orthopedic, or urologic dysfunction. On the day of her death, she received a repetitive and rapid lumbosacral cyst puncture drainage procedure, performed by an illegal medical practitioner. Postmortem autopsy findings confirmed a diagnosis of MMC and the cause of death to be cerebellar tonsillar herniation. This is a pathetic case of preventable infant death. This report suggests that the possibility of MMC should be considered in infants born with a lumbosacral cyst, and aspiration is inadvisable. Besides, forensic autopsy has a valuable role in determining the exact cause of death, identifying, or excluding iatrogenic factors that may be relevant to death following a medical procedure. A final point is that prevention programs should be developed, especially by the health care sectors to reduce such tragedy.

  18. Chemical Facial Cellulitis Due to Inadvertent Injection of Formalin into Oral Tissue Space.

    Science.gov (United States)

    Bector, Aditi; Virk, Pawandeep Sandhu; Arakeri, Gururaj

    2015-11-05

    This paper reports the accidental injection of formalin into oral tissue space, in an 8-year old child resulting in chemical facial necrotizing cellulitis and its management. The common practice of keeping formalin in local anesthesia vials should be avoided by dental clinics, to prevent such unfortunate incidents.

  19. Experience during the monitoring of inactive scrap for the detection of inadvertent presence of radioactivity

    International Nuclear Information System (INIS)

    Sharma, Ranjit; Anoj Kumar; Vikas; Singh, Rajvir; Patra, R.P.; Vikas Kumar; Pradeepkumar, K.S.

    2012-01-01

    The paper describes about the experience gained during the radiation monitoring of inactive scrap generated at various nuclear facilities. This type surveillance is carried out to prevent the spread of radioactivity in public domain and also as requirement by regulatory authorities. The inspection and certification of scrap material from nuclear facilities is a regulatory requirement to ensure that no radioactive material reaches public domain. This paper describes the methodology and experience in detection of radioactivity at inactive Scrap monitoring facility. Inactive scraps (metallic and non metallic) generated from various nuclear facilities of BARC, Trombay is dispatched to Trombay Village Store (TVS) for temporary storage before auction to the public. The monitoring at the facility includes visual inspection and radiation measurement before loading the scrap in the truck. An online PC based monitoring system and portable monitoring instruments in the range (nSv/h-µSv/h) are used to carry out radiation monitoring of inactive scrap loaded in a vehicle. Radioactive source of high activity with potential for serious environmental hazard has not been detected, but few cases of presence of radioactive/contaminated material (MS plate/equipments with low level of 137 Cs contamination) have been detected and identified using portable gamma spectrometer. Implementation of strict regulatory measures and radiation monitoring at nuclear facilities can minimize the probability of radioactive material reaching the public domain. The methodology followed for monitoring of inactive scrap is found to be effective even for detection of presence of radioactivity in scrap if any. (author)

  20. Anomalous concentration gradient in NaI solutions inadvertently frozen in transit

    International Nuclear Information System (INIS)

    Billinghurst, M.W.; Abrams, D.N.; Coutts, A.D.

    1990-01-01

    Therapeutic doses of iodine-131 ( 131 I) are frequently dispensed volumetrically from a stock vial containing a solution of sodium iodide. During the winter months the authors have observed that initial aliquots do not always have the same radioactive concentration as that calculated for the bulk solution. In order to evaluate the cause and extent of this problem, they prepared a stock solution of low radioactive concentration sodium iodide with the same concentration of sodium thiosulfate and pH as that in the stock therapeutic iodine vial. Aliquots of this solution were transferred to plastic tubes and were stored at various temperatures. These results clearly show that when there is a risk of freezing during transportation of therapeutic solutions of sodium iodide it is essential to physically mix the liquid once thawing is complete if therapeutic doses are to be dispensed accurately on a volume basis

  1. Causal Analysis of the Inadvertent Contact with an Uncontrolled Electrical Hazardous Energy Source (120 Volts AC)

    Energy Technology Data Exchange (ETDEWEB)

    David E. James; Dennis E. Raunig; Sean S. Cunningham

    2014-10-01

    On September 25, 2013, a Health Physics Technician (HPT) was performing preparations to support a pneumatic transfer from the HFEF Decon Cell to the Room 130 Glovebox in HFEF, per HFEF OI 3165 section 3.5, Field Preparations. This activity involves an HPT setting up and climbing a portable ladder to remove the 14-C meter probe from above ball valve HBV-7. The HPT source checks the meter and probe and then replaces the probe above HBV-7, which is located above Hood ID# 130 HP. At approximately 13:20, while reaching past the HBV-7 valve position indicator switches in an attempt to place the 14-C meter probe in the desired location, the HPT’s left forearm came in contact with one of the three sets of exposed terminals on the valve position indication switches for HBV 7. This resulted in the HPT receiving an electrical shock from a 120 Volt AC source. Upon moving the arm, following the electrical shock, the HPT noticed two exposed electrical connections on a switch. The HPT then notified the HFEF HPT Supervisor, who in turn notified the MFC Radiological Controls Manager and HFEF Operations Manager of the situation. Work was stopped in the area and the hazard was roped off and posted to prevent access to the hazard. The HPT was escorted by the HPT Supervisor to the MFC Dispensary and then preceded to CFA medical for further evaluation. The individual was evaluated and released without any medical restrictions. Causal Factor (Root Cause) A3B3C01/A5B2C08: - Knowledge based error/Attention was given to wrong issues - Written Communication content LTA, Incomplete/situation not covered The Causal Factor (root cause) was attention being given to the wrong issues during the creation, reviews, verifications, and actual performance of HFEF OI-3165, which covers the need to perform the weekly source check and ensure placement of the probe prior to performing a “rabbit” transfer. This resulted in the hazard not being identified and mitigated in the procedure. Work activities with in HFEF-OI-3165 placed the HPT in proximity of an unmitigated hazard directly resulting in this event. Contributing Factor A3B3C04/A4B5C04: - Knowledge Based Error, LTA Review Based on Assumption That Process Will Not Change - Change Management LTA, Risks/consequences associated with change not adequately reviewed/assessed Prior to the pneumatic system being out of service, the probe and meter were not being source checked together. The source check issue was identified and addressed during the period of time when the system was out of service. The corrective actions for this issue resulted in the requirement that a meter and probe be source checked together as it is intended to be used. This changed the activity and required an HPT to weekly, when in use, remove and install the probe from above HBV-7 to meet the requirement of LRD 15001 Part 5 Article 551.5. Risks and consequences associated with this change were not adequately reviewed or assessed. Failure to identify the hazard associated with this change directly contributed to this event.

  2. Inadvertent exposure to organochlorine pesticides DDT and derivatives in people from the Canary Islands (Spain)

    International Nuclear Information System (INIS)

    Zumbado, Manuel; Goethals, Muriel; Alvarez-Leon, Eva E.; Luzardo, Octavio P.; Cabrera, Felix; Serra-Majem, Lluis; Dominguez-Boada, Luis

    2005-01-01

    In 1998, one of the largest determinations of organochlorine pesticides in a representative sample of a Spanish population (682 serum samples from the Canary Islands) was made in the context of the 'Canary Islands Nutrition Survey' (ENCA). In the Canary Islands, extensive farming areas have been developed in these last decades, with greenhouses dedicated to intensive cultivation using DDT in huge amounts. In Spain, similarly to other European countries, DDT was banned in the late 1970s. The pesticide residues in human serum are indicative of past and present exposure to them. Our objective is to point out the differences of pesticide contamination between islands; and together with this, if a connection could be established with gender, age, or habitat of subjects. Concentration of selected persistent organochlorine pollutants (p,p'-DDT, o,p'-DDT, p,p'-DDE, o,p'-DDE, p,p'-DDD, and o,p'-DDD) was measured with gas chromatography-electron capture detector. Almost all of the samples (99.3%) presented detectable levels of some DDT-derivatives, being p,p'-DDE the most frequently detected organochlorine. The median concentration of total DDT body burden, expressed in ng/g fat, present in the Canary Islands (370 ng/g fat) was similar to that found in other European countries, although it was noteworthy that a fourth of the population showed a total DDT body burden higher than 715 ng/g. Interestingly, statistical significant differences were found in serum levels of organochlorine pesticides between islands, being these levels higher in people from Tenerife and Gran Canaria (415 and 612 ng/g fat, respectively), the islands that present both highest population and highest surface devoted to intensive agriculture. As expected, serum levels of both total DDT body burden and p,p'-DDE increased with age. Statistically significant differences were also found in relation to gender, women showing higher levels of these organochlorine pesticides than men. One of the most relevant findings of this work is the presence of a very high DDT/DDE ratio in people from the Canary Islands, thus indicating a chronic exposure to DDT that persists nowadays. DDT and its derivatives are considered as xenoestrogens, and they have been linked to breast cancer. Having into account that the Canary Islands present high incidence and mortality for breast cancer, our results point to the possibility that these environmental contaminants may be playing a determining role that must be investigated in detail. The high levels of DDT and its derivatives in serum from people living in this Archipelago should be considered a matter of public health concern

  3. Chemical facial cellulitis due to inadvertent injection of formalin into oral tissue space

    Directory of Open Access Journals (Sweden)

    Aditi Bector

    2015-12-01

    Full Text Available This paper reports the accidental injection of formalin into oral tissue space, in an 8-year old child resulting in chemical facial necrotizing cellulitis and its management. The common practice of keeping formalin in local anesthesia vials should be avoided by dental clinics, to prevent such unfortunate incidents.

  4. MRI findings in 6 cases of children by inadvertent ingestion of diphenoxylate-atropine.

    Science.gov (United States)

    Xiao, Lianxiang; Lin, Xiangtao; Cao, Jinfeng; Wang, Xueyu; Wu, Lebin

    2011-09-01

    Compound diphenoxylate (diphenoxylate-atropine) poisoning can cause toxic encephalopathy in children, and magnetic resonance imaging (MRI) of the brain in this condition has not been reported. This study is to analyze brain MRI findings and to investigate the relations between MRI features and possible pathophysiological changes in children. Six children accidentally swallowed compound diphenoxylate, 4 males, 2 females, aged 20-46 months, average 33 months. Quantity of ingested diphenoxylate-atropine was from 6 to 30 tablets, each tablet contains diphenoxylate 2.5mg and atropine 0.025 mg. These patients were referred to our hospital within 24h after diphenoxylate-atropine ingestion, and underwent brain MRI scan within 24-72 h after emergency treatment. The characteristics of conventional MRI were analyzed. These pediatric patients had various symptoms of opioid intoxication and atropine toxicity. Brain MRI showed abnormal low signal intensity on T1-weighted images (T1WI) and abnormal high signal intensity on T2-weighted images (T2WI) and fluid-attenuated inversion recovery (FLAIR) imaging in bilateral in all cases; abnormal high signal intensity on T1WI, T2WI and FLAIR in 4 cases. Encephalomalacia was observed in 3 cases during follow-up. In the early stage of compound diphenoxylate poisoning in children, multiple extensive edema-necrosis and hemorrhagic-necrosis focus were observed in basic nucleus, pallium and cerebellum, these resulted in the corresponding brain dysfunction with encephalomalacia. MRI scan in the early stage in this condition may provide evidences of brain impairment, and is beneficial for the early diagnosis, treatment and prognosis assessment. Crown Copyright © 2010. Published by Elsevier Ireland Ltd. All rights reserved.

  5. MRI findings in 6 cases of children by inadvertent ingestion of diphenoxylate-atropine

    International Nuclear Information System (INIS)

    Xiao Lianxiang; Lin Xiangtao; Cao Jinfeng; Wang Xueyu; Wu Lebin

    2011-01-01

    Purpose: Compound diphenoxylate (diphenoxylate-atropine) poisoning can cause toxic encephalopathy in children, and magnetic resonance imaging (MRI) of the brain in this condition has not been reported. This study is to analyze brain MRI findings and to investigate the relations between MRI features and possible pathophysiological changes in children. Methods: Six children accidentally swallowed compound diphenoxylate, 4 males, 2 females, aged 20-46 months, average 33 months. Quantity of ingested diphenoxylate-atropine was from 6 to 30 tablets, each tablet contains diphenoxylate 2.5 mg and atropine 0.025 mg. These patients were referred to our hospital within 24 h after diphenoxylate-atropine ingestion, and underwent brain MRI scan within 24-72 h after emergency treatment. The characteristics of conventional MRI were analyzed. Results: These pediatric patients had various symptoms of opioid intoxication and atropine toxicity. Brain MRI showed abnormal low signal intensity on T1-weighted images (T1WI) and abnormal high signal intensity on T2-weighted images (T2WI) and fluid-attenuated inversion recovery (FLAIR) imaging in bilateral in all cases; abnormal high signal intensity on T1WI, T2WI and FLAIR in 4 cases. Encephalomalacia was observed in 3 cases during follow-up. Conclusion: In the early stage of compound diphenoxylate poisoning in children, multiple extensive edema-necrosis and hemorrhagic-necrosis focus were observed in basic nucleus, pallium and cerebellum, these resulted in the corresponding brain dysfunction with encephalomalacia. MRI scan in the early stage in this condition may provide evidences of brain impairment, and is beneficial for the early diagnosis, treatment and prognosis assessment.

  6. Intentional, Inadvertent, or Inevitable? James Burrill Angell and Secularization at the University of Michigan.

    Science.gov (United States)

    Bouman, Jeffrey Paul

    The history of James Burrill Angell as the president of the University of Michigan presents a case study of the role of 19th century liberal Protestant university builders in the eventual marginalization of religion from the mainstream of U.S. higher education. Angell's tenure, which began in 1871, encompassed the period in which the modern…

  7. Other applications

    International Nuclear Information System (INIS)

    Ligou, J.; Benoist, P.; Boffi, V.; Stenic, B.

    1981-01-01

    This chapter reports about the work done by four groups in Italy, France, Switzerland and Yugoslavia on the new applications of transport theory. Among them problems dealing with controlled thermonuclear reactions and/or fusion devices, nonlinear electric conductivity, atomic and crystal models were discussed

  8. Application note :

    Energy Technology Data Exchange (ETDEWEB)

    Russo, Thomas V.

    2013-08-01

    The development of the XyceTM Parallel Electronic Simulator has focused entirely on the creation of a fast, scalable simulation tool, and has not included any schematic capture or data visualization tools. This application note will describe how to use the open source schematic capture tool gschem and its associated netlist creation tool gnetlist to create basic circuit designs for Xyce, and how to access advanced features of Xyce that are not directly supported by either gschem or gnetlist.

  9. E AREA LOW LEVEL WASTE FACILITY DOE 435.1 PERFORMANCE ASSESSMENT

    Energy Technology Data Exchange (ETDEWEB)

    Wilhite, E

    2008-03-31

    , situated immediately north of the Mixed Waste Management Facility. The E-Area Low-Level Waste Facility is comprised of 200 acres for waste disposal and a surrounding buffer zone that extends out to the 100-m point of compliance. Disposal units within the footprint of the low-level waste facilities include the Slit Trenches, Engineered Trenches, Component-in-Grout Trenches, the Low-Activity Waste Vault, the Intermediate-Level Vault, and the Naval Reactor Component Disposal Area. Radiological waste disposal operations at the E-Area Low-Level Waste Facility began in 1994. E-Area Low-Level Waste Facility closure will be conducted in three phases: operational closure, interim closure, and final closure. Operational closure will be conducted during the 25-year operation period (30-year period for Slit and Engineered Trenches) as disposal units are filled; interim closure measures will be taken for some units. Interim closure will take place following the end of operations and will consist of an area-wide runoff cover along with additional grading over the trench units. Final closure of all disposal units in the E-Area Low-Level Waste Facility will take place at the end of the 100-year institutional control period and will consist of the installation of an integrated closure system designed to minimize moisture contact with the waste and to serve as a deterrent to intruders. Radiological dose to human receptors is analyzed in this PA in the all-pathways analysis, the inadvertent intruder analysis and the air pathway analysis, and the results are compared to the relevant performance measures. For the all-pathways analysis, the performance measure of relevance is a 25-mrem/yr EDE to representative members of the public, excluding dose from radon and its progeny in air. For the inadvertent intruder, the applicable performance measures are 100-mrem/yr EDE and 500 mrem/yr EDE for chronic and exposure scenarios, respectively. The relevant performance measure for the air pathway is 10

  10. Application of acoustic agglomeration to enhance air filtration efficiency in air-conditioning and mechanical ventilation (ACMV) systems.

    Science.gov (United States)

    Ng, Bing Feng; Xiong, Jin Wen; Wan, Man Pun

    2017-01-01

    The recent episodes of haze in Southeast Asia have caused some of the worst regional atmospheric pollution ever recorded in history. In order to control the levels of airborne fine particulate matters (PM) indoors, filtration systems providing high PM capturing efficiency are often sought, which inadvertently also results in high airflow resistance (or pressure drop) that increases the energy consumption for air distribution. A pre-conditioning mechanism promoting the formation of particle clusters to enhance PM capturing efficiency without adding flow resistance in the air distribution ductwork could provide an energy-efficient solution. This pre-conditioning mechanism can be fulfilled by acoustic agglomeration, which is a phenomenon that promotes the coagulation of suspended particles by acoustic waves propagating in the fluid medium. This paper discusses the basic mechanisms of acoustic agglomeration along with influencing factors that could affect the agglomeration efficiency. The feasibility to apply acoustic agglomeration to improve filtration in air-conditioning and mechanical ventilation (ACMV) systems is investigated experimentally in a small-scale wind tunnel. Experimental results indicate that this novel application of acoustic pre-conditioning improves the PM2.5 filtration efficiency of the test filters by up to 10% without introducing additional pressure drop. The fan energy savings from not having to switch to a high capturing efficiency filter largely outstrip the additional energy consumed by the acoustics system. This, as a whole, demonstrates potential energy savings from the combined acoustic-enhanced filtration system without compromising on PM capturing efficiency.

  11. Application of acoustic agglomeration to enhance air filtration efficiency in air-conditioning and mechanical ventilation (ACMV systems.

    Directory of Open Access Journals (Sweden)

    Bing Feng Ng

    Full Text Available The recent episodes of haze in Southeast Asia have caused some of the worst regional atmospheric pollution ever recorded in history. In order to control the levels of airborne fine particulate matters (PM indoors, filtration systems providing high PM capturing efficiency are often sought, which inadvertently also results in high airflow resistance (or pressure drop that increases the energy consumption for air distribution. A pre-conditioning mechanism promoting the formation of particle clusters to enhance PM capturing efficiency without adding flow resistance in the air distribution ductwork could provide an energy-efficient solution. This pre-conditioning mechanism can be fulfilled by acoustic agglomeration, which is a phenomenon that promotes the coagulation of suspended particles by acoustic waves propagating in the fluid medium. This paper discusses the basic mechanisms of acoustic agglomeration along with influencing factors that could affect the agglomeration efficiency. The feasibility to apply acoustic agglomeration to improve filtration in air-conditioning and mechanical ventilation (ACMV systems is investigated experimentally in a small-scale wind tunnel. Experimental results indicate that this novel application of acoustic pre-conditioning improves the PM2.5 filtration efficiency of the test filters by up to 10% without introducing additional pressure drop. The fan energy savings from not having to switch to a high capturing efficiency filter largely outstrip the additional energy consumed by the acoustics system. This, as a whole, demonstrates potential energy savings from the combined acoustic-enhanced filtration system without compromising on PM capturing efficiency.

  12. A four-part working bibliography of neuroethics: Part 4 - Ethical issues in clinical and social applications of neuroscience.

    Science.gov (United States)

    Becker, Kira; Shook, John R; Darragh, Martina; Giordano, James

    2017-05-31

    As a discipline, neuroethics addresses a range of questions and issues generated by basic neuroscientific research (inclusive of studies of putative neurobiological processes involved in moral and ethical cognition and behavior), and its use and meanings in the clinical and social spheres. Here, we present Part 4 of a four-part bibliography of the neuroethics literature focusing on clinical and social applications of neuroscience, to include: the treatment-enhancement discourse; issues arising in neurology, psychiatry, and pain care; neuroethics education and training; neuroethics and the law; neuroethics and policy and political issues; international neuroethics; and discourses addressing "trans-" and "post-" humanity. To complete a systematic survey of the literature, 19 databases and 4 individual open-access journals were employed. Searches were conducted using the indexing language of the U.S. National Library of Medicine (NLM). A Python code was used to eliminate duplications in the final bibliography. When taken with Parts 1-3, this bibliography aims to provide a listing of international peerreviewed papers, books, and book chapters published from 2002 through 2016. While seeking to be as comprehensive as possible, it may be that some works were inadvertently and unintentionally not included. We therefore invite commentary from the field to afford completeness and contribute to this bibliography as a participatory work-in-progress.

  13. Photography applications

    Science.gov (United States)

    Cochran, Susan A.; Goodman, James A.; Purkis, Samuel J.; Phinn, Stuart R.

    2013-01-01

    Photographic imaging is the oldest form of remote sensing used in coral reef studies. This chapter briefly explores the history of photography from the 1850s to the present, and delves into its application for coral reef research. The investigation focuses on both photographs collected from low-altitude fixed-wing and rotary aircraft, and those collected from space by astronauts. Different types of classification and analysis techniques are discussed, and several case studies are presented as examples of the broad use of photographs as a tool in coral reef research.

  14. Automating Geospatial Visualizations with Smart Default Renderers for Data Exploration Web Applications

    Science.gov (United States)

    Ekenes, K.

    2017-12-01

    This presentation will outline the process of creating a web application for exploring large amounts of scientific geospatial data using modern automated cartographic techniques. Traditional cartographic methods, including data classification, may inadvertently hide geospatial and statistical patterns in the underlying data. This presentation demonstrates how to use smart web APIs that quickly analyze the data when it loads, and provides suggestions for the most appropriate visualizations based on the statistics of the data. Since there are just a few ways to visualize any given dataset well, it is imperative to provide smart default color schemes tailored to the dataset as opposed to static defaults. Since many users don't go beyond default values, it is imperative that they are provided with smart default visualizations. Multiple functions for automating visualizations are available in the Smart APIs, along with UI elements allowing users to create more than one visualization for a dataset since there isn't a single best way to visualize a given dataset. Since bivariate and multivariate visualizations are particularly difficult to create effectively, this automated approach removes the guesswork out of the process and provides a number of ways to generate multivariate visualizations for the same variables. This allows the user to choose which visualization is most appropriate for their presentation. The methods used in these APIs and the renderers generated by them are not available elsewhere. The presentation will show how statistics can be used as the basis for automating default visualizations of data along continuous ramps, creating more refined visualizations while revealing the spread and outliers of the data. Adding interactive components to instantaneously alter visualizations allows users to unearth spatial patterns previously unknown among one or more variables. These applications may focus on a single dataset that is frequently updated, or configurable

  15. Detector applications

    International Nuclear Information System (INIS)

    Pehl, R.H.

    1977-10-01

    Semiconductor detectors are now applied to a very wide range of problems. The combination of relatively low cost, excellent energy resolution, and simultaneous broad energy-spectrum analysis is uniquely suited to many applications in both basic and applied physics. Alternative techniques, such as magnetic spectrometers for charged-particle spectroscopy, while offering better energy resolution, are bulky, expensive, and usually far more difficult to use. Furthermore, they do not directly provide the broad energy-spectrum measurements easily accomplished using semiconductor detectors. Scintillation detectors, which are approximately equivalent to semiconductor detectors in convenience and cost, exhibit 10 to 100 times worse energy resolution. However, their high efficiency and large potential size recommend their use in some measurements

  16. Connected vehicle applications : environment.

    Science.gov (United States)

    2016-01-01

    The U.S. Department of Transportation has developed a number of connected vehicle environmental applications, including the Applications for the Environment Real-Time Information Synthesis (AERIS) research program applications and road weather applic...

  17. Definition of intrusion scenarios and example concentration ranges for the disposal of near-surface waste at the Hanford Site

    International Nuclear Information System (INIS)

    Aaberg, R.L.; Kennedy, W.E. Jr.

    1990-10-01

    The US Department of Energy (DOE) is in the process of conducting performance assessments of its radioactive waste sites and disposal systems to ensure that public health and safety are protected, the environment is preserved, and that no remedial actions after disposal are required. Hanford Site low-level waste performance assessments are technical evaluations of waste sites or disposal systems that provide a basis for making decisions using established criteria. The purpose of this document is to provide a family of scenarios to be considered when calculating radionuclide exposure to individuals who may inadvertently intrude into near-surface waste disposal sites. Specific performance assessments will use modifications of the general scenarios described here to include additional site/system details concerning the engineering design, waste form, inventory, and environmental setting. This document also describes and example application of the Hanford-specific scenarios in the development of example concentration ranges for the disposal of near-surface wastes. The overall goal of the example calculations is to illustrate the application of the scenarios in a performance assessment to assure that people in the future cannot receive a dose greater than an established limit. 24 refs., 2 figs., 5 tabs

  18. Context for performance assessment

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1997-01-01

    In developing its recommendations on performance assessment for disposal of low-level radioactive waste, Scientific committee 87-3 of the National Council on Radiation Protection and Measurements (NCRP) has considered a number of topics that provide a context for the development of suitable approaches to performance assessment. This paper summarizes the Committee' discussions on these topics, including (1) the definition of low-level waste and its sources and properties, as they affect the variety of wastes that must be considered, (2) fundamental objectives and principles of radioactive waste disposal and their application to low-level waste, (3) current performance objectives for low-level waste disposal in the US, with particular emphasis on such unresolved issues of importance to performance assessment as the time frame for compliance, requirements for protection of groundwater and surface water, inclusion of doses from radon, demonstrating compliance with fixed performance objectives using highly uncertain model projections, and application of the principle that releases to the environment should be maintained as low as reasonably achievable (ALARA), (4) the role of active and passive institutional controls over disposal sites, (5) the role of the inadvertent human intruder in low-level waste disposal, (6) model validation and confidence in model outcomes, and (7) the concept of reasonable assurance of compliance

  19. Performance Assessment for the Idaho National Laboratory Remote-Handled Low-Level Waste Disposal Facility

    Energy Technology Data Exchange (ETDEWEB)

    Annette L. Schafer; A. Jeffrey Sondrup; Arthur S. Rood

    2012-05-01

    This performance assessment for the Remote-Handled Low-Level Radioactive Waste Disposal Facility at the Idaho National Laboratory documents the projected radiological dose impacts associated with the disposal of low-level radioactive waste at the facility. This assessment evaluates compliance with the applicable radiological criteria of the U.S. Department of Energy and the U.S. Environmental Protection Agency for protection of the public and the environment. The calculations involve modeling transport of radionuclides from buried waste to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses are calculated for both offsite receptors and individuals who inadvertently intrude into the waste after site closure. The results of the calculations are used to evaluate the future performance of the low-level radioactive waste disposal facility and to provide input for establishment of waste acceptance criteria. In addition, one-factor-at-a-time, Monte Carlo, and rank correlation analyses are included for sensitivity and uncertainty analysis. The comparison of the performance assessment results to the applicable performance objectives provides reasonable expectation that the performance objectives will be met

  20. Teleneurology applications

    Science.gov (United States)

    Wechsler, Lawrence R.; Tsao, Jack W.; Levine, Steven R.; Swain-Eng, Rebecca J.; Adams, Robert J.; Demaerschalk, Bart M.; Hess, David C.; Moro, Elena; Schwamm, Lee H.; Steffensen, Steve; Stern, Barney J.; Zuckerman, Steven J.; Bhattacharya, Pratik; Davis, Larry E.; Yurkiewicz, Ilana R.; Alphonso, Aimee L.

    2013-01-01

    Objective: To review current literature on neurology telemedicine and to discuss its application to patient care, neurology practice, military medicine, and current federal policy. Methods: Review of practice models and published literature on primary studies of the efficacy of neurology telemedicine. Results: Teleneurology is of greatest benefit to populations with restricted access to general and subspecialty neurologic care in rural areas, those with limited mobility, and those deployed by the military. Through the use of real-time audio-visual interaction, imaging, and store-and-forward systems, a greater proportion of neurologists are able to meet the demand for specialty care in underserved communities, decrease the response time for acute stroke assessment, and expand the collaboration between primary care physicians, neurologists, and other disciplines. The American Stroke Association has developed a defined policy on teleneurology, and the American Academy of Neurology and federal health care policy are beginning to follow suit. Conclusions: Teleneurology is an effective tool for the rapid evaluation of patients in remote locations requiring neurologic care. These underserved locations include geographically isolated rural areas as well as urban cores with insufficient available neurology specialists. With this technology, neurologists will be better able to meet the burgeoning demand for access to neurologic care in an era of declining availability. An increase in physician awareness and support at the federal and state level is necessary to facilitate expansion of telemedicine into further areas of neurology. PMID:23400317

  1. State-specific Multi-reference Perturbation Theories with Relaxed Coefficients: Molecular Applications

    Directory of Open Access Journals (Sweden)

    Debashis Mukherjee

    2002-06-01

    Full Text Available Abstract: We present in this paper two new versions of Rayleigh-Schr¨odinger (RS and the Brillouin-Wigner (BW state-specific multi-reference perturbative theories (SSMRPT which stem from our state-specific multi-reference coupled-cluster formalism (SS-MRCC, developed with a complete active space (CAS. They are manifestly sizeextensive and are designed to avoid intruders. The combining coefficients cμ for the model functions φμ are completely relaxed and are obtained by diagonalizing an effective operator in the model space, one root of which is the target eigenvalue of interest. By invoking suitable partitioning of the hamiltonian, very convenient perturbative versions of the formalism in both the RS and the BW forms are developed for the second order energy. The unperturbed hamiltonians for these theories can be chosen to be of both Mφller-Plesset (MP and Epstein-Nesbet (EN type. However, we choose the corresponding Fock operator fμ for each model function φμ, whose diagonal elements are used to define the unperturbed hamiltonian in the MP partition. In the EN partition, we additionally include all the diagonal direct and exchange ladders. Our SS-MRPT thus utilizes a multi-partitioning strategy. Illustrative numerical applications are presented for potential energy surfaces (PES of the ground (1Σ+ and the first delta (1Δ states of CH+ which possess pronounced multi-reference character. Comparison of the results with the corresponding full CI values indicates the efficacy of our formalisms.

  2. Validation of a Rapid Bacteria Endospore Enumeration System for Planetary Protection Application

    Science.gov (United States)

    Chen, Fei; Kern, Roger; Kazarians, Gayane; Venkateswaran, Kasthuri

    NASA monitors spacecraft surfaces to assure that the presence of bacterial endospores meets strict criteria at launch, to minimize the risk of inadvertent contamination of the surface of Mars. Currently, the only approved method for enumerating the spores is a culture based assay that requires three days to produce results. In order to meet the demanding schedules of spacecraft assembly, a more rapid spore detection assay is being considered as an alternate method to the NASA standard culture-based assay. The Millipore Rapid Microbiology Detection System (RMDS) has been used successfully for rapid bioburden enumeration in the pharmaceutical and food industries. The RMDS is rapid and simple, shows high sensitivity (to 1 colony forming unit [CFU]/sample), and correlates well with traditional culture-based methods. It combines membrane filtration, adenosine triphosphate (ATP) bioluminescence chemistry, and image analysis based on photon detection with a Charge Coupled Device (CCD) camera. In this study, we have optimized the assay conditions and evaluated the use of the RMDS as a rapid spore detection tool for NASA applications. In order to select for spores, the samples were subjected to a heat shock step before proceeding with the RMDS incubation protocol. Seven species of Bacillus (nine strains) that have been repeatedly isolated from clean room environments were assayed. All strains were detected by the RMDS in 5 hours and these assay times were repeatedly demonstrated along with low image background noise. Validation experiments to compare the Rapid Sore Assay (RSA) and NASA standard assay (NSA) were also performed. The evaluation criteria were modeled after the FDA Guideline of Process Validation, and Analytical Test Methods. This body of research demonstrates that the Rapid Spore Assay (RSA) is quick, and of equivalent sensitivity to the NASA standard assay, potentially reducing the assay time for bacterial endospores from over 72 hours to less than 8 hours

  3. Safety Framework for Nuclear Power Source Applications in Outer Space

    International Nuclear Information System (INIS)

    2009-01-01

    Nuclear power sources (NPS) for use in outer space have been developed and used in space applications where unique mission requirements and constraints on electrical power and thermal management precluded the use of non-nuclear power sources. Such missions have included interplanetary missions to the outer limits of the Solar System, for which solar panels were not suitable as a source of electrical power because of the long duration of these missions at great distances from the Sun. According to current knowledge and capabilities, space NPS are the only viable energy option to power some space missions and significantly enhance others. Several ongoing and foreseeable missions would not be possible without the use of space NPS. Past, present and foreseeable space NPS applications include radioisotope power systems (for example, radioisotope thermoelectric generators and radioisotope heater units) and nuclear reactor systems for power and propulsion. The presence of radioactive materials or nuclear fuels in space NPS and their consequent potential for harm to people and the environment in Earth's biosphere due to an accident require that safety should always be an inherent part of the design and application of space NPS. NPS applications in outer space have unique safety considerations compared with terrestrial applications. Unlike many terrestrial nuclear applications, space applications tend to be used infrequently and their requirements can vary significantly depending upon the specific mission. Mission launch and outer space operational requirements impose size, mass and other space environment limitations not present for many terrestrial nuclear facilities. For some applications, space NPS must operate autonomously at great distances from Earth in harsh environments. Potential accident conditions resulting from launch failures and inadvertent re-entry could expose NPS to extreme physical conditions. These and other unique safety considerations for the use of

  4. Learning Android application testing

    CERN Document Server

    Blundell, Paul

    2015-01-01

    If you are an Android developer looking to test your applications or optimize your application development process, then this book is for you. No previous experience in application testing is required.

  5. Promise Zones for Applicants

    Data.gov (United States)

    Department of Housing and Urban Development — This tool assists applicants to HUD's Promise Zone initiative prepare data to submit with their application by allowing applicants to draw the exact location of the...

  6. Development of closure criteria for inactive radioactive waste disposal sites at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1989-01-01

    The Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA), as amended, specifies that cleanup of inactive waste disposal sites at Department of Energy (DOE) facilities shall at least attain legally applicable or relevant and appropriate requirements (ARARs) for cleanup or control of environmental contamination. This paper discusses potential ARARs for cleanup of inactive radioactive waste disposal sites and proposes a set of closure criteria for such sites at Oak Ridge National Laboratory (ORNL). The most important potential ARARs include Federal standards for radiation protection of the public, radioactivity in drinking water, and near-surface land disposal of radioactive wastes. On the basis of these standards, we propose that cleanup and closure of inactive radioactive waste disposal sites at ORNL shall achieve (1) limits on annual effective dose equivalent for off-site individuals and inadvertent intruders that conform to the DOE's performance objectives for new low-level waste disposal facilities and (2) to the extent reasonably achievable, limits on radionuclide concentrations in ground water and surface waters in accordance with Federal drinking water standards and ground-water protection requirements

  7. Performance objectives for disposal of low-level radioactive wastes on the Oak Ridge Reservation

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1987-07-01

    This report presents a set of performance objectives for disposal of low-level radioactive wastes in a new facility on the Oak Ridge Reservation. The principal performance objectives include a limit on annual committed effective dose equivalent averaged over a lifetime of 0.25 mSv (25 mrem) for any member of the public beyond the boundary of the disposal facility, and a limit on annual committed effective dose equivalent averaged over a lifetime of 1 mSv (0.1 rem) and a limit on committed effective dose equivalent in any year of 5 mSv (0.5 rem) for any individual who inadvertently intrudes onto the disposal site after loss of active institutional controls. In addition, releases of radioactivity beyond the site boundary shall not result in annual dose equivalents to any number of the public from all sources of exposure that exceed limits established by Federal regulatory authorities and shall be kept as low as reasonably achievable. This report reviews generally applicable radiation protection standards for the public and environmental radiation standards for specific practices that have been developed by national and international authorities and discusses the use of limits on risk rather than dose as performance objectives and consideration of chemical toxicity rather than radiation dose in establishing limits on intakes of uranium. 63 refs., 7 figs., 2 tabs

  8. Low-Level Waste Regulation: Putting Principles Into Practice - 13297 - The Richard S. Hodes, M.D., Honor Lecture Award

    International Nuclear Information System (INIS)

    Kennedy, James E.

    2013-01-01

    In carrying out its mission to ensure the safe use of radioactive materials for beneficial civilian purposes while protecting people and the environment, the U.S. Nuclear Regulatory Commission (NRC) adheres to its Principles of Good Regulation. The Principles-Independence, Openness, Efficiency, Clarity, and Reliability-apply to the agency as a whole in its decision-making and to the individual conduct of NRC employees. This paper describes the application of the Principles in a real-life staff activity, a guidance document used in the NRC's low-level radioactive waste (LLW) program, the Concentration Averaging and Encapsulation Branch Technical Position (CA BTP). The staff's process to revise the document, as well as the final content of the document, were influenced by following the Principles. For example, consistent with the Openness Principle, the staff conducted a number of outreach activities and received many comments on three drafts of the document. Stakeholder comments affected the final staff positions in some cases. The revised CA BTP, once implemented, is expected to improve management and disposal of LLW in the United States. Its positions have an improved nexus to health and safety; are more performance-based than previously, thus providing licensees with options for how they achieve the required outcome of protecting an inadvertent human intruder into a disposal facility; and provide for disposal of more sealed radioactive sources, which are a potential threat to national security. (author)

  9. Performance objectives for disposal of low-level radioactive wastes on the Oak Ridge Reservation

    Energy Technology Data Exchange (ETDEWEB)

    Kocher, D.C.

    1987-07-01

    This report presents a set of performance objectives for disposal of low-level radioactive wastes in a new facility on the Oak Ridge Reservation. The principal performance objectives include a limit on annual committed effective dose equivalent averaged over a lifetime of 0.25 mSv (25 mrem) for any member of the public beyond the boundary of the disposal facility, and a limit on annual committed effective dose equivalent averaged over a lifetime of 1 mSv (0.1 rem) and a limit on committed effective dose equivalent in any year of 5 mSv (0.5 rem) for any individual who inadvertently intrudes onto the disposal site after loss of active institutional controls. In addition, releases of radioactivity beyond the site boundary shall not result in annual dose equivalents to any number of the public from all sources of exposure that exceed limits established by Federal regulatory authorities and shall be kept as low as reasonably achievable. This report reviews generally applicable radiation protection standards for the public and environmental radiation standards for specific practices that have been developed by national and international authorities and discusses the use of limits on risk rather than dose as performance objectives and consideration of chemical toxicity rather than radiation dose in establishing limits on intakes of uranium. 63 refs., 7 figs., 2 tabs.

  10. Selection of Computer Codes for Shallow Land Waste Disposal in PPTA Serpong

    International Nuclear Information System (INIS)

    Syahrir

    1996-01-01

    Selection of Computer Codes for Shallow Land Waste Disposal in PPTA Serpong. Models and computer codes have been selected for safety assessment of near surface waste disposal facility. This paper provides a summary and overview of the methodology and codes selected. The methodology allows analyses of dose to individuals from offsite releases under normal conditions as well as on-site doses to inadvertent intruders. A demonstration in the case of shallow land waste disposal in Nuclear Research Establishment are in Serpong has been given for normal release scenario. The assessment includes infiltration of rainfall, source-term, ground water (well) and surface water transport, food-chain and dosimetry. The results show dose history of maximally exposed individuals. The codes used are VS2DT, PAGAN and GENII. The application of 1 m silt loam as a moisture barrier cover decreases flow in the disposal unit by a factor of 27. The selected radionuclides show variety of dose histories according to their chemical and physical characteristics and behavior in the environment

  11. Development of closure criteria for inactive radioactive waste-disposal sites at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1990-01-01

    The Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) specifies that the U.S. Department of Energy shall comply with the procedural and substantive requirements of CERCLA regarding cleanup of inactive waste-disposal sites. Remedial actions require a level of control for hazardous substances that at least attains legally applicable or relevant and appropriate requirements (ARAR). This requirement may be waived if compliance with ARAR results in greater risk to human health and the environment than alternatives or is technically impractical. It will review potential ARAR for cleanup of inactive radioactive waste-disposal sites and propose a set of closure criteria for such sites at Oak Ridge National Laboratory. Important potential ARAR include federal standards for radiation protection of the public, radioactivity in drinking water, and near-surface land disposal of radioactive wastes. Proposed criteria for cleanup of inactive radioactive waste-disposal sites are: (1) a limit of 0.25 mSv on annual effective dose equivalent for offsite individuals; (2) limits of 1 mSv for continuous exposures and 5 mSv for occasional exposures on annual effective dose equivalent for inadvertent intruders, following loss of institutional controls over disposal sites; and (3) limits on concentrations of radionuclides in potable ground and surface waters in accordance with federal drinking-water standards, to the extent reasonably achievable

  12. Low-Level Waste Regulation: Putting Principles Into Practice - 13297 - The Richard S. Hodes, M.D., Honor Lecture Award

    Energy Technology Data Exchange (ETDEWEB)

    Kennedy, James E. [Low-Level Waste Branch Division of Waste Management and Environmental Protection, U.S. Nuclear Regulatory Commission, Washington, DC, 20555-0001 (United States)

    2013-07-01

    In carrying out its mission to ensure the safe use of radioactive materials for beneficial civilian purposes while protecting people and the environment, the U.S. Nuclear Regulatory Commission (NRC) adheres to its Principles of Good Regulation. The Principles-Independence, Openness, Efficiency, Clarity, and Reliability-apply to the agency as a whole in its decision-making and to the individual conduct of NRC employees. This paper describes the application of the Principles in a real-life staff activity, a guidance document used in the NRC's low-level radioactive waste (LLW) program, the Concentration Averaging and Encapsulation Branch Technical Position (CA BTP). The staff's process to revise the document, as well as the final content of the document, were influenced by following the Principles. For example, consistent with the Openness Principle, the staff conducted a number of outreach activities and received many comments on three drafts of the document. Stakeholder comments affected the final staff positions in some cases. The revised CA BTP, once implemented, is expected to improve management and disposal of LLW in the United States. Its positions have an improved nexus to health and safety; are more performance-based than previously, thus providing licensees with options for how they achieve the required outcome of protecting an inadvertent human intruder into a disposal facility; and provide for disposal of more sealed radioactive sources, which are a potential threat to national security. (author)

  13. Credential Application Awaiting Information

    Data.gov (United States)

    Department of Homeland Security — When a Credential application or required documentation is incomplete, an Awaiting Information letter is issued. The application process cannot continue until all...

  14. Sight Application Analysis Tool

    Energy Technology Data Exchange (ETDEWEB)

    Bronevetsky, G. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-09-17

    The scale and complexity of scientific applications makes it very difficult to optimize, debug and extend them to support new capabilities. We have developed a tool that supports developers’ efforts to understand the logical flow of their applications and interactions between application components and hardware in a way that scales with application complexity and parallelism.

  15. Microwave power engineering applications

    CERN Document Server

    Okress, Ernest C

    2013-01-01

    Microwave Power Engineering, Volume 2: Applications introduces the electronics technology of microwave power and its applications. This technology emphasizes microwave electronics for direct power utilization and transmission purposes. This volume presents the accomplishments with respect to components, systems, and applications and their prevailing limitations in the light of knowledge of the microwave power technology. The applications discussed include the microwave heating and other processes of materials, which utilize the magnetron predominantly. Other applications include microwave ioni

  16. Wapice News Mobile Application

    OpenAIRE

    Söylemez, Ilke

    2017-01-01

    Since the mobile phones started to have an increasingly significant role in daily life, the mobile application development also started to be an important area in the software industry. The problem for mobile application developers is to develop a mobile application which supports all the devices and platforms on the market. This issue created a need for cross platform mobile applications. The cross platform mobile development refers to the development of mobile applications that could be use...

  17. Bending transition in the penetration of a flexible intruder in a two-dimensional dense granular medium.

    Science.gov (United States)

    Algarra, Nicolas; Karagiannopoulos, Panagiotis G; Lazarus, Arnaud; Vandembroucq, Damien; Kolb, Evelyne

    2018-02-01

    We study the quasistatic penetration of a flexible beam into a two-dimensional dense granular medium lying on a horizontal plate. Rather than a buckling-like behavior we observe a transition between a regime of crack-like penetration in which the fiber only shows small fluctuations around a stable straight geometry and a bending regime in which the fiber fully bends and advances through series of loading and unloading steps. We show that the shape reconfiguration of the fiber is controlled by a single nondimensional parameter L/L_{c}, which is the ratio of the length of the flexible beam L to L_{c}, a bending elastogranular length scale that depends on the rigidity of the fiber and on the departure from the jamming packing fraction of the granular medium. We show, moreover, that the dynamics of the bending transition in the course of the penetration experiment is gradual and is accompanied by a symmetry breaking of the granular packing fraction in the vicinity of the fiber. Together with the progressive bending of the fiber, a cavity grows downstream of the fiber and the accumulation of grains upstream of the fiber leads to the development of a jammed cluster of grains. We discuss our experimental results in the framework of a simple model of bending-induced compaction and we show that the rate of the bending transition only depends on the control parameter L/L_{c}.

  18. A brief review of intruder rotational bands and magnetic rotation in the A = 110 mass region

    Science.gov (United States)

    Banerjee, P.

    2018-05-01

    Nuclei in the A ∼ 110 mass region exhibit interesting structural features. One of these relates to the process by which specific configurations, built on the excitation of one or more protons across the Z = 50 shell-gap, manifest as collective rotational bands at intermediate spins and gradually lose their collectivity with increase in spin and terminate in a non-collective state at the maximum spin which the configuration can support. These bands are called terminating bands that co-exist with spherical states. Some of these bands are said to terminate smoothly underlining the continuous character of the process by which the band evolves from significant collectivity at low spin to a pure particle-hole non-collective state at the highest spin. The neutron-deficient A ∼ 110 mass region provides the best examples of smoothly terminating bands. The present experimental and theoretical status of such bands in several nuclei with 48 ≤ Z ≤ 52 spanning the 106 ≤ A ≤ 119 mass region have been reviewed in this article. The other noteworthy feature of nuclei in the A ∼ 110 mass region is the observation of regular rotation-like sequences of strongly enhanced magnetic dipole transitions in near-spherical nuclei. These bands, unlike the well-studied rotational sequences in deformed nuclei, arise from a spontaneous symmetry breaking by the anisotropic currents of a few high-j excited particles and holes. This mode of excitation is called magnetic rotation and was first reported in the Pb region. Evidence in favor of the existence of such structures, also called shears bands, are reported in the literature for a large number of Cd, In, Sn and Sb isotope with A ∼ 110. The present article provides a general overview of these reported structures across this mass region. The review also discusses antimagnetic rotation bands and a few cases of octupole correlations in the A = 110 mass region.

  19. Lifetime in 181Ir and 187Au: enhanced deformation of the πi 13/2 intruder orbital

    International Nuclear Information System (INIS)

    Walpe, J.C.; Garg, U.; Naguleswaran, S.; Ren, Q.W.

    1995-01-01

    Lifetimes have been measured in the πh 9/2 (yrast) and πi 13/2 (excited) bands in the nuclei 181 Ir and 187 Au using the Recoil Distance Method (RDM). The results clearly indicate that the πi 13/2 band exhibits an increased deformation over the πh 9/2 band, in keeping with the premise that the delayed crossing in this band is due to enhanced quadrupole deformation. (author). 3 refs, 1 fig, 2 tab

  20. Bird Killer, Industrial Intruder or Clean Energy? Perceiving Risks to Ecosystem Services Due to an Offshore Wind Farm

    KAUST Repository

    Klain, Sarah C.; Satterfield, Terre; Sinner, Jim; Ellis, Joanne; Chan, Kai M.A.

    2017-01-01

    Proposals to develop renewable energy technologies may threaten local values, which can generate opposition. Efforts to explain this opposition have focused on perceived negative aesthetic and environmental impact. Less attention has been paid to a fuller suite of the perceived risks and benefits associated with new energy technologies. This paper thus investigates impacts of an offshore wind farm pertaining to individual perceptions and judgments, and why risks to some ecosystem services might be cause for greater public concern than others. We find that this difference can be attributed to the affective and intuitive ways in which people perceive risk. Our mixed-methods design used interviews (n=27) that involved risk-benefit weighting tasks and an animated visualization to help people imagine an offshore wind farm in a familiar place. We found that affectively-loaded impacts (harm to charismatic wildlife and visual intrusion) were assigned greater weight than more easily quantifiable impacts (displacement of fishing, impact to tourism, cost of compliance with regulations). Interviewees identified increased regional energy self-sufficiency as the most valued potential benefit of an offshore wind farm. These results have implications for ecosystem service assessments generally and, more specifically, for our understanding of ‘affective’ dimensions of development proposals.

  1. Differentiation of pre-existing trapped methane from thermogenic methane in an igneous-intruded coal by hydrous pyrolysis

    Science.gov (United States)

    Dias, Robert F.; Lewan, Michael D.; Birdwell, Justin E.; Kotarba, Maciej J.

    2014-01-01

    So as to better understand how the gas generation potential of coal changes with increasing rank, same-seam samples of bituminous coal from the Illinois Basin that were naturally matured to varying degrees by the intrusion of an igneous dike were subjected to hydrous pyrolysis (HP) conditions of 360 °C for 72 h. The accumulated methane in the reactor headspace was analyzed for δ13C and δ2H, and mol percent composition. Maximum methane production (9.7 mg/g TOC) occurred in the most immature samples (0.5 %Ro), waning to minimal methane values at 2.44 %Ro (0.67 mg/g TOC), and rebounding to 3.6 mg/g TOC methane in the most mature sample (6.76 %Ro). Methane from coal with the highest initial thermal maturity (6.76 %Ro) shows no isotopic dependence on the reactor water and has a microbial δ13C value of −61‰. However, methane from coal of minimal initial thermal maturity (0.5 %Ro) shows hydrogen isotopic dependence on the reaction water and has a δ13C value of −37‰. The gas released from coals under hydrous pyrolysis conditions represents a quantifiable mixture of ancient (270 Ma) methane (likely microbial) that was generated in situ and trapped within the rock during the rapid heating by the dike, and modern (laboratory) thermogenic methane that was generated from the indigenous organic matter due to thermal maturation induced by hydrous pyrolysis conditions. These findings provide an analytical framework for better assessment of natural gas sources and for differentiating generated gas from pre-existing trapped gas in coals of various ranks.

  2. Bending transition in the penetration of a flexible intruder in a two-dimensional dense granular medium

    Science.gov (United States)

    Algarra, Nicolas; Karagiannopoulos, Panagiotis G.; Lazarus, Arnaud; Vandembroucq, Damien; Kolb, Evelyne

    2018-02-01

    We study the quasistatic penetration of a flexible beam into a two-dimensional dense granular medium lying on a horizontal plate. Rather than a buckling-like behavior we observe a transition between a regime of crack-like penetration in which the fiber only shows small fluctuations around a stable straight geometry and a bending regime in which the fiber fully bends and advances through series of loading and unloading steps. We show that the shape reconfiguration of the fiber is controlled by a single nondimensional parameter L /Lc , which is the ratio of the length of the flexible beam L to Lc, a bending elastogranular length scale that depends on the rigidity of the fiber and on the departure from the jamming packing fraction of the granular medium. We show, moreover, that the dynamics of the bending transition in the course of the penetration experiment is gradual and is accompanied by a symmetry breaking of the granular packing fraction in the vicinity of the fiber. Together with the progressive bending of the fiber, a cavity grows downstream of the fiber and the accumulation of grains upstream of the fiber leads to the development of a jammed cluster of grains. We discuss our experimental results in the framework of a simple model of bending-induced compaction and we show that the rate of the bending transition only depends on the control parameter L /Lc .

  3. Nest defence against conspecific intruders in the common pochard Aythya ferina: natural observations and an experimental test

    Czech Academy of Sciences Publication Activity Database

    Honza, Marcel; Piálková, Radka; Albrecht, Tomáš; Neužilová, Š.

    2009-01-01

    Roč. 44, č. 2 (2009), s. 151-158 ISSN 0001-6454 R&D Projects: GA AV ČR IAA6093403; GA AV ČR KJB600930611 Institutional research plan: CEZ:AV0Z60930519 Keywords : waterfowl * brood parasitism * intraspecific parasitism * breeding strategy * egg rejection Subject RIV: EG - Zoology Impact factor: 1.018, year: 2009 http://www.bioone.org/doi/pdf/10.3161/000164509X482713

  4. Intruder states in sd-shell nuclei: from 1p-1t to np-nt in Si isotopes

    International Nuclear Information System (INIS)

    Goasduff, A.

    2012-01-01

    New large-scale shell-model calculations with full 1ℎω valence space for the sd-nuclei has been used for the first time to predict lifetimes of positive and negative parity states in neutron rich Si isotopes. The predicted lifetimes (1 - 100 ps) fall in the range of the differential Doppler shift method. Using the demonstrator of the European next generation γ-ray array, AGATA, in coincidence with the large acceptance PRISMA magnetic spectrometer from LNL (Legnaro) and the differential plunger of the University of Cologne, lifetimes of excited states in 32;33 Si and 35;36 S nuclei were measured. In a second step, the nℎω structure in the stable 28 Si nucleus was also studied. 28 Si is an important nucleus in order to understand the competition between mean-field and cluster structures. It displays a wealth of structures in terms of deformation and clustering. Light heavy-ion resonant radiative capture 12 C+ 16 O has been performed at energies below the Coulomb barrier. The measure γ-spectra indicate for the first time at these energies that the strongest part of the resonance decay proceeds though intermediate states around 10 MeV. Comparisons with previous radiative capture studies above the Coulomb barrier have been performed and the results have been interpreted in terms of a favoured feeding of T=1 states in the 28 Si self-conjugate nucleus. (author)

  5. Bird Killer, Industrial Intruder or Clean Energy? Perceiving Risks to Ecosystem Services Due to an Offshore Wind Farm

    KAUST Repository

    Klain, Sarah C.

    2017-07-19

    Proposals to develop renewable energy technologies may threaten local values, which can generate opposition. Efforts to explain this opposition have focused on perceived negative aesthetic and environmental impact. Less attention has been paid to a fuller suite of the perceived risks and benefits associated with new energy technologies. This paper thus investigates impacts of an offshore wind farm pertaining to individual perceptions and judgments, and why risks to some ecosystem services might be cause for greater public concern than others. We find that this difference can be attributed to the affective and intuitive ways in which people perceive risk. Our mixed-methods design used interviews (n=27) that involved risk-benefit weighting tasks and an animated visualization to help people imagine an offshore wind farm in a familiar place. We found that affectively-loaded impacts (harm to charismatic wildlife and visual intrusion) were assigned greater weight than more easily quantifiable impacts (displacement of fishing, impact to tourism, cost of compliance with regulations). Interviewees identified increased regional energy self-sufficiency as the most valued potential benefit of an offshore wind farm. These results have implications for ecosystem service assessments generally and, more specifically, for our understanding of ‘affective’ dimensions of development proposals.

  6. Quadrupole collectivity of angular-momentum projected states of nucleons in the high-j intruder single-particle states

    International Nuclear Information System (INIS)

    Raman, S.; Kahane, S.; Bhatt, K.H.

    1999-01-01

    Ever since the pioneering work of Elliott (Elliott J P 1958 London Series A 245 128, 562), quadrupole collectivity in deformed nuclei has been economically described in terms of SU 3 symmetry. Microscopic SU 3 symmetry is not present in the deformed intrinsic states of n nucleons in the abnormal-parity single-particle states j a . However, such (j a ) n states do possess some SU 3 -symmetry-like properties as shown in this work. (author)

  7. Terrain Considerations and Data Base Development for the Design and Testing of Devices to Detect Intruder-Induced Ground Motion

    Science.gov (United States)

    1978-05-01

    4 5-H 03 4) 0 5-. 4)H EL4 +,)r F-4 In5- 5q 4) 0 -r4 (n 0a0 4. ) >. ., m- (d COosv -0 0ca+ H 0a t-4 j~S.~C+H 4 5~C H co A’~ ) 4) U) U30~ ’’C Q 4 V...axial force on the cone. The force is measured by a load cell , and the vertical distance traveled is measured mechanically. Mechanical cone

  8. Approaches for quantifying reactive and low-volatility biogenic organic compound emissions by vegetation enclosure techniques - part B: applications.

    Science.gov (United States)

    Ortega, John; Helmig, Detlev; Daly, Ryan W; Tanner, David M; Guenther, Alex B; Herrick, Jeffrey D

    2008-06-01

    The focus of the studies presented in the preceding companion paper (Part A: Review) and here (Part B: Applications) is on defining representative emission rates from vegetation for determining the roles of biogenic volatile organic compound (BVOC) emissions in atmospheric chemistry and aerosol processes. The review of previously published procedures for identifying and quantifying BVOC emissions has revealed a wide variety of experimental methods used by various researchers. Experimental details become increasingly critical for quantitative emission measurements of low volatility monoterpenes (MT) and sesquiterpenes (SQT). These compounds are prone to be lost inadvertently by uptake to materials in contact with the sample air or by reactions with atmospheric oxidants. These losses become more prominent with higher molecular weight compounds, potentially leading to an underestimation of their emission rates. We present MT and SQT emission rate data from numerous experiments that include 23 deciduous tree species, 14 coniferous tree species, 8 crops, and 2 shrubs. These data indicate total, normalized (30 degrees C) basal emission rates from emissions have exponential dependencies on temperature (i.e. rates are proportional to e(betaT)). The inter-quartile range of beta-values for MT was between 0.12 and 0.17K(-1), which is higher than the value commonly used in models (0.09K(-1)). However many of the MT emissions also exhibited light dependencies, making it difficult to separate light and temperature influences. The primary light-dependent MT was ocimene, whose emissions were up to a factor of 10 higher than light-independent MT emissions. The inner-quartile range of beta-values for SQT was between 0.15 and 0.21K(-1).

  9. Connected vehicle applications : safety.

    Science.gov (United States)

    2016-01-01

    Connected vehicle safety applications are designed to increase situational awareness : and reduce or eliminate crashes through vehicle-to-infrastructure, vehicle-to-vehicle, : and vehicle-to-pedestrian data transmissions. Applications support advisor...

  10. Applicant Satisfaction Survey

    Data.gov (United States)

    Office of Personnel Management — The Chief Human Capital Officers developed 3 surveys that asks applicants to assess their satisfaction with the application process on a 1-10 point scale, with 10...

  11. Web Application Vulnerabilities

    OpenAIRE

    Yadav, Bhanu

    2014-01-01

    Web application security has been a major issue in information technology since the evolvement of dynamic web application. The main objective of this project was to carry out a detailed study on the top three web application vulnerabilities such as injection, cross site scripting, broken authentication and session management, present the situation where an application can be vulnerable to these web threats and finally provide preventative measures against them. ...

  12. Mobile food ordering application

    OpenAIRE

    Yang, Fan

    2014-01-01

    The purpose of this thesis was to build a food ordering client server application for Tom Yum Thai Oy, which is a Thai restaurant in Vaasa. For the customer, this application provides a view of current food information (category, name, image,price, description etc.) on the website and Android application. The customer can order food from these two platforms. For the administrator in restaurant, this application offers a series of operations to add, update, delete and query the information of ...

  13. SIMS applications workshop. Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-04-01

    The first ANSTO/AINSE SIMS Workshop drew together a mixture of Surface Analysis experts and Surface Analysis users with the concept that SIMS analysis has to be enfolded within the spectrum of surface analysis techniques and that the user should select the technique most applicable to the problem. With this concept in mind the program was structured as sessions on SIMS Facilities; Applications to Mineral Surfaces; Applications to Biological Systems, Applications to Surfaces as Semi- conductors, Catalysts and Surface Coatings; and Applications to Ceramics

  14. Application Portable Parallel Library

    Science.gov (United States)

    Cole, Gary L.; Blech, Richard A.; Quealy, Angela; Townsend, Scott

    1995-01-01

    Application Portable Parallel Library (APPL) computer program is subroutine-based message-passing software library intended to provide consistent interface to variety of multiprocessor computers on market today. Minimizes effort needed to move application program from one computer to another. User develops application program once and then easily moves application program from parallel computer on which created to another parallel computer. ("Parallel computer" also include heterogeneous collection of networked computers). Written in C language with one FORTRAN 77 subroutine for UNIX-based computers and callable from application programs written in C language or FORTRAN 77.

  15. Application of artificial intelligence to improve plant availability

    International Nuclear Information System (INIS)

    Frank, M.V.; Epstein, S.A.

    1986-01-01

    Using artificial intelligence software techniques, Management Analysis Company (MAC) has developed two complementary software packages that together provide a workstation environment for maintenance and operations personnel to dramatically reduce inadvertent reactor trips. They are called the Reactor Trip Simulation Environment (RTSE) and the Key Component Generation Environment (KCGE). They are not proposed or being designed. They are in use today. The plants component and process interdependencies are modeled within RTSE - using modeling practices and notations familiar to engineers which accelerated the acceptance of the software. KCGE provides the groups of key components that would cause a reactor trip

  16. Criteria for Social Applications

    DEFF Research Database (Denmark)

    Atzenbeck, Claus; Tzagarakis, Manolis

    2007-01-01

    Social networks are becoming increasingly important for a wide number of applications. This is in particular true in the context of the Web 2.0 movement where a number of Web-based applications emerged - termed social networking applications or services - that allow the articulation of social...... relationships between individuals thus creating social networks. Although Web 2.0 applications are a popular and characteristic class of such applications they are not the only representatives that permit such functionality. Applications in the Personal Information Management domain exhibit similar...... characteristics but have never been mentioned in the context of social networking. The increasing number and diversity of such applications makes their study, analysis and evaluation from a systems point of view critical and important as their study may help identify relationships that are useful when attempting...

  17. Probabilistic consequence study of residual radiological effects from a hypothetical ten-ton inadvertent nuclear yield. Weapons Safety Program

    International Nuclear Information System (INIS)

    Harvey, T.; Peters, L.; Serduke, F.; Edwards, L.

    1994-01-01

    In this paper we study the potential radiological consequences of a strategic bomber accident, in which one of the assumed on-board nuclear weapons explodes with an arbitrarily chosen 10-ton nuclear yield. The frequency of such an occurrence is infinitesimal. The safety design features in today s nuclear weapons' systems essentially forbid its occurrence. We have a chosen a military base which has the feature of being a representative combination of urban and rural populations. The assumed ''crash site'' is near the northwest comer of the military base, close to civilian housing located just across the street from the base. A worst case wind would be from the ESE (east south east). This would cause fission debris to be dispersed toward the largest population centers and, thus, would lead to the largest Pu ''collective'' doses (i.e., a dose integrated over time and summed over individuals). Also, if an ESE wind were blowing at accident time, some people in nearby housing could receive lethal gamma-ray doses from fallout before evacuation could occur. It is assumed only one weapon undergoes nuclear yield; the other on-board weapons would HE detonate and the Pu would be aerosolized and lofted. We assume an activity-size distribution and lofting similar to those used to predict fallout measured at NTS. The main thrust of our study is to provide estimates of probabilistic radiological risks to the population local to a strategic bomber crash site. The studied radiological consequences are: cloud-passage doses from Pu inhalation; doses from groundshine due to gamma-producing radionuclides; and areal contamination from Pu and the long-lived fission products Cs-137 and Sr-90

  18. “Real Men Don't”: Constructions of Masculinity and Inadvertent Harm in Public Health Interventions

    Science.gov (United States)

    Lee, Joseph G. L.; Dworkin, Shari L.

    2014-01-01

    Research shows that constraining aspects of male gender norms negatively influence both women’s and men’s health. Messaging that draws on norms of masculinity in health programming has been shown to improve both women’s and men’s health, but some types of public health messaging (e.g., Man Up Monday, a media campaign to prevent the spread of sexually transmitted infections) can reify harmful aspects of hegemonic masculinity that programs are working to change. We critically assess the deployment of hegemonic male norms in the Man Up Monday campaign. We draw on ethical paradigms in public health to challenge programs that reinforce harmful aspects of gender norms and suggest the use of gender-transformative interventions that challenge constraining masculine norms and have been shown to have a positive effect on health behaviors. PMID:24825202

  19. Fear and overprotection in Australian residential aged-care facilities: The inadvertent impact of regulation on quality continence care.

    Science.gov (United States)

    Ostaszkiewicz, Joan; O'Connell, Beverly; Dunning, Trisha

    2016-06-01

    Most residents in residential aged-care facilities are incontinent. This study explored how continence care was provided in residential aged-care facilities, and describes a subset of data about staffs' beliefs and experiences of the quality framework and the funding model on residents' continence care. Using grounded theory methodology, 18 residential aged-care staff members were interviewed and 88 hours of field observations conducted in two facilities. Data were analysed using a combination of inductive and deductive analytic procedures. Staffs' beliefs and experiences about the requirements of the quality framework and the funding model fostered a climate of fear and risk adversity that had multiple unintended effects on residents' continence care, incentivising dependence on continence management, and equating effective continence care with effective pad use. There is a need to rethink the quality of continence care and its measurement in Australian residential aged-care facilities. © 2015 AJA Inc.

  20. Study of possible modifications to equipment used for industrial gammagraphy minimizing the risk of inadvertent exposures to radiation

    International Nuclear Information System (INIS)

    Wesenack, Martin P.; Corvalan, Carolina

    2008-01-01

    Full text: The industrial gammagraphy is a practice designed to monitor structural changes in materials used 'in situ' in industries such as nuclear, steel, shipbuilding, etc. This practice involves the use of a source of radiation (such as 137 Cs, 192 Ir) housed in a container. Despite the controls in place, this is the possibility that the source to be 'lost' in the workplace. In this research is analyzed, based on specific instances of accidents such as the one that occurred at a distillery located in the city of La Plata, Buenos Aires, the possibility of introducing simple changes in the containers, increasing safety. In particular evaluates the use of thermocouple to activate an alarm system. (author)

  1. Exclusion, Exemption and Clearance in the Frame of the Control and Management of Inadvertent Radioactive Material in Scrap Metal

    International Nuclear Information System (INIS)

    Gonzalez, Abel J.

    2011-01-01

    Radioactive substances are incorporated into materials, goods, merchandises, products and in scrap and, as scrap would recycle into new produce, the process of introduction of radioactive susbtanaces into commodities will continue. The situation is unstoppable and requires straightforward solutions. The problem is global and therefore the solution(s) should be global. A clear intergovernmental agreement is needed establishing to what extent commodities should be regulated

  2. Inadvertent gene silencing of argininosuccinate synthase (bcass1) in Botrytis cinerea by the pLOB1 vector system

    NARCIS (Netherlands)

    Patel, R.M.; Kan, van J.A.L.; Bailey, A.M.; Foster, G.D.

    2010-01-01

    For several years, researchers working on the plant pathogen Botrytis cinerea and a number of other related fungi have routinely used the pLOB1 vector system, based on hygromycin resistance, under the control of the Aspergillus nidulans oliC promoter and what was reported to be the ß-tubulin (tubA)

  3. Electronic Submissions of Pesticide Applications

    Science.gov (United States)

    Applications for pesticide registration can be submitted electronically, including forms, studies, and draft product labeling. Applicants need not submit multiple electronic copies of any pieces of their applications.

  4. Technical applications of aerogels

    International Nuclear Information System (INIS)

    Hrubesh, L.W.

    1997-01-01

    Aerogel materials posses such a wide variety of exceptional properties that a striking number of applications have developed for them. Many of the commercial applications of aerogels such as catalysts, thermal insulation, windows, and particle detectors are still under development and new application as have been publicized since the ISA4 Conference in 1994: e.g.; supercapacitors, insulation for heat storage in automobiles, electrodes for capacitive deionization, etc. More applications are evolving as the scientific and engineering community becomes familiar with the unusual and exceptional physical properties of aerogels, there are also scientific and technical application, as well. This paper discusses a variety of applications under development at Lawrence Livermore National Laboratory for which several types of aerogels are formed in custom sizes and shapes. Particular discussions will focus on the uses of aerogels for physics experiments which rely on the exceptional, sometimes unique, properties of aerogels

  5. Industrial Application of Accelerators

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    At CERN, we are very familiar with large, high energy particle accelerators. However, in the world outside CERN, there are more than 35000 accelerators which are used for applications ranging from treating cancer, through making better electronics to removing harmful micro-organisms from food and water. These are responsible for around $0.5T of commerce each year. Almost all are less than 20 MeV and most use accelerator types that are somewhat different from what is at CERN. These lectures will describe some of the most common applications, some of the newer applications in development and the accelerator technology used for them. It will also show examples of where technology developed for particle physics is now being studied for these applications. Rob Edgecock is a Professor of Accelerator Science, with a particular interest in the medical applications of accelerators. He works jointly for the STFC Rutherford Appleton Laboratory and the International Institute for Accelerator Applications at the Univer...

  6. Industrial Application of Accelerators

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    At CERN, we are very familiar with large, high energy particle accelerators. However, in the world outside CERN, there are more than 35000 accelerators which are used for applications ranging from treating cancer, through making better electronics to removing harmful micro-organisms from food and water. These are responsible for around $0.5T of commerce each year. Almost all are less than 20 MeV and most use accelerator types that are somewhat different from what is at CERN. These lectures will describe some of the most common applications, some of the newer applications in development and the accelerator technology used for them. It will also show examples of where technology developed for particle physics is now being studied for these applications. Rob Edgecock is a Professor of Accelerator Science, with a particular interest in the medical applications of accelerators. He works jointly for the STFC Rutherford Appleton Laboratory and the International Institute for Accelerator Applications at the Uni...

  7. Applications of Photocatalytic Disinfection

    Directory of Open Access Journals (Sweden)

    Joanne Gamage

    2010-01-01

    Full Text Available Due to the superior ability of photocatalysis to inactivate a wide range of harmful microorganisms, it is being examined as a viable alternative to traditional disinfection methods such as chlorination, which can produce harmful byproducts. Photocatalysis is a versatile and effective process that can be adapted for use in many applications for disinfection in both air and water matrices. Additionally, photocatalytic surfaces are being developed and tested for use in the context of “self-disinfecting” materials. Studies on the photocatalytic technique for disinfection demonstrate this process to have potential for widespread applications in indoor air and environmental health, biological, and medical applications, laboratory and hospital applications, pharmaceutical and food industry, plant protection applications, wastewater and effluents treatment, and drinking water disinfection. Studies on photocatalytic disinfection using a variety of techniques and test organisms are reviewed, with an emphasis on the end-use application of developed technologies and methods.

  8. Support vector machines applications

    CERN Document Server

    Guo, Guodong

    2014-01-01

    Support vector machines (SVM) have both a solid mathematical background and good performance in practical applications. This book focuses on the recent advances and applications of the SVM in different areas, such as image processing, medical practice, computer vision, pattern recognition, machine learning, applied statistics, business intelligence, and artificial intelligence. The aim of this book is to create a comprehensive source on support vector machine applications, especially some recent advances.

  9. Microprocessors principles and applications

    CERN Document Server

    Debenham, Michael J

    1979-01-01

    Microprocessors: Principles and Applications deals with the principles and applications of microprocessors and covers topics ranging from computer architecture and programmed machines to microprocessor programming, support systems and software, and system design. A number of microprocessor applications are considered, including data processing, process control, and telephone switching. This book is comprised of 10 chapters and begins with a historical overview of computers and computing, followed by a discussion on computer architecture and programmed machines, paying particular attention to t

  10. Applications of combinatorial optimization

    CERN Document Server

    Paschos, Vangelis Th

    2013-01-01

    Combinatorial optimization is a multidisciplinary scientific area, lying in the interface of three major scientific domains: mathematics, theoretical computer science and management. The three volumes of the Combinatorial Optimization series aims to cover a wide range of topics in this area. These topics also deal with fundamental notions and approaches as with several classical applications of combinatorial optimization. "Applications of Combinatorial Optimization" is presenting a certain number among the most common and well-known applications of Combinatorial Optimization.

  11. Android Applications Security

    OpenAIRE

    Paul POCATILU

    2011-01-01

    The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the a...

  12. Galileo Timing Applications

    Science.gov (United States)

    2007-11-01

    public bodies like university and research institutes. The user community analysis also includes a market analysis performed by a specialized company to... companies and public institutions (e.g., universities, research laboratories) that work in several different application domains in order to virtually...Summary of application domains for the use of time in cryptography. B2G B2B B2C Applications Military waypoints, judicial reports, construction

  13. Refrigeration systems and applications

    CERN Document Server

    Dincer, Ibrahim

    2010-01-01

    Refrigeration Systems and Applications, 2nd edition offers a comprehensive treatise that addresses real-life technical and operational problems, enabling the reader to gain an understanding of the fundamental principles and the practical applications of refrigeration technology. New and unique analysis techniques (including exergy as a potential tool), models, correlations, procedures and applications are covered, and recent developments in the field are included - many of which are taken from the author's own research activities in this area. The book also includes so

  14. Exploiting chaos for applications

    Energy Technology Data Exchange (ETDEWEB)

    Ditto, William L., E-mail: wditto@hawaii.edu [Department of Physics and Astronomy, University of Hawaii at Mānoa, Honolulu, Hawaii 96822 (United States); Sinha, Sudeshna, E-mail: sudeshna@iisermohali.ac.in [Indian Institute of Science Education and Research (IISER), Mohali, Knowledge City, Sector 81, SAS Nagar, PO Manauli 140306, Punjab (India)

    2015-09-15

    We discuss how understanding the nature of chaotic dynamics allows us to control these systems. A controlled chaotic system can then serve as a versatile pattern generator that can be used for a range of application. Specifically, we will discuss the application of controlled chaos to the design of novel computational paradigms. Thus, we present an illustrative research arc, starting with ideas of control, based on the general understanding of chaos, moving over to applications that influence the course of building better devices.

  15. Microcomputer interfacing and applications

    CERN Document Server

    Mustafa, M A

    1990-01-01

    This is the applications guide to interfacing microcomputers. It offers practical non-mathematical solutions to interfacing problems in many applications including data acquisition and control. Emphasis is given to the definition of the objectives of the interface, then comparing possible solutions and producing the best interface for every situation. Dr Mustafa A Mustafa is a senior designer of control equipment and has written many technical articles and papers on the subject of computers and their application to control engineering.

  16. Exploiting chaos for applications.

    Science.gov (United States)

    Ditto, William L; Sinha, Sudeshna

    2015-09-01

    We discuss how understanding the nature of chaotic dynamics allows us to control these systems. A controlled chaotic system can then serve as a versatile pattern generator that can be used for a range of application. Specifically, we will discuss the application of controlled chaos to the design of novel computational paradigms. Thus, we present an illustrative research arc, starting with ideas of control, based on the general understanding of chaos, moving over to applications that influence the course of building better devices.

  17. Application Layer Multicast

    Science.gov (United States)

    Allani, Mouna; Garbinato, Benoît; Pedone, Fernando

    An increasing number of Peer-to-Peer (P2P) Internet applications rely today on data dissemination as their cornerstone, e.g., audio or video streaming, multi-party games. These applications typically depend on some support for multicast communication, where peers interested in a given data stream can join a corresponding multicast group. As a consequence, the efficiency, scalability, and reliability guarantees of these applications are tightly coupled with that of the underlying multicast mechanism.

  18. REST based mobile applications

    Science.gov (United States)

    Rambow, Mark; Preuss, Thomas; Berdux, Jörg; Conrad, Marc

    2008-02-01

    Simplicity is the major advantage of REST based webservices. Whereas SOAP is widespread in complex, security sensitive business-to-business aplications, REST is widely used for mashups and end-user centric applicatons. In that context we give an overview of REST and compare it to SOAP. Furthermore we apply the GeoDrawing application as an example for REST based mobile applications and emphasize on pros and cons for the use of REST in mobile application scenarios.

  19. Irregular Applications: Architectures & Algorithms

    Energy Technology Data Exchange (ETDEWEB)

    Feo, John T.; Villa, Oreste; Tumeo, Antonino; Secchi, Simone

    2012-02-06

    Irregular applications are characterized by irregular data structures, control and communication patterns. Novel irregular high performance applications which deal with large data sets and require have recently appeared. Unfortunately, current high performance systems and software infrastructures executes irregular algorithms poorly. Only coordinated efforts by end user, area specialists and computer scientists that consider both the architecture and the software stack may be able to provide solutions to the challenges of modern irregular applications.

  20. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  1. Application Technology Research Unit

    Data.gov (United States)

    Federal Laboratory Consortium — To conduct fundamental and developmental research on new and improved application technologies to protect floricultural, nursery, landscape, turf, horticultural, and...

  2. Mongoose for application development

    CERN Document Server

    Holmes, Simon

    2013-01-01

    This book is a mini tutorial full of code examples and strategies to give you plenty of options when building your own applications with MongoDB.This book is ideal for people who want to develop applications on the Node.js stack quickly and efficiently. Prior knowledge of the stack is not essential as the book briefly covers the installation of the core components and builds all aspects of the example application. The focus of the book is on what Mongoose adds to you applications, so experienced Node.js developers will also benefit.

  3. Hardening Azure applications

    CERN Document Server

    Gaurav, Suraj

    2015-01-01

    Learn what it takes to build large scale, mission critical applications -hardened applications- on the Azure cloud platform. This 208 page book covers the techniques and engineering principles that every architect and developer needs to know to harden their Azure/.NET applications to ensure maximum reliability and high availability when deployed at scale. While the techniques are implemented in .NET and optimized for Azure, the principles here will also be valuable for users of other cloud-based development platforms. Applications come in a variety of forms, from simple apps that can be bui

  4. Electrical applications 2

    CERN Document Server

    Tyler, David W

    1998-01-01

    Electrical Applications 2 covers the BTEC NII level objectives in Electrical Applications U86/330. To understand the applications, a knowledge of the underlying principles is needed and these are covered briefly in the text. Key topics discussed are: the transmission and distribution of electrical energy; safety and regulations; tariffs and power factor correction; materials and their applications in the electrical industry; transformers; DC machines; illumination; and fuse protection. Included in each chapter are worked examples which should be carefully worked through before progressing to t

  5. Nanotechnology in Aerospace Applications

    National Research Council Canada - National Science Library

    Meyyappan, M

    2007-01-01

    The aerospace applications for nanotechnology include high strength, low weight composites, improved electronics and displays with low power consumption, variety of physical sensors, multifunctional...

  6. Background information for the development of a low-level waste performance assessment methodology

    International Nuclear Information System (INIS)

    Shipers, L.R.

    1989-12-01

    This document identifies and describes the potential postclosure pathways of radionuclide release, migration, and exposure from low-level radioactive waste disposal facilities. Each pathway identified is composed of a combination of migration pathways (air, surface water, ground water, food chain) and exposure pathways (direct gamma, inhalation, ingestion, surface contact). The pathway identification is based on a review and evaluation of existing information, and not all pathways presented in the document would necessarily be of importance at a given low-level waste disposal site. This document presents pathways associated with undisturbed (ground water, gas generation), naturally disturbed (erosion, bathtubbing, earth creep, frost heave, plant and animal intruder), and inadvertent intruder (construction, agriculture) scenarios of a low-level waste disposal facility. 20 refs., 1 fig

  7. Fabrication and characterization of two-layered nanofibrous membrane for guided bone and tissue regeneration application.

    Science.gov (United States)

    Masoudi Rad, Maryam; Nouri Khorasani, Saied; Ghasemi-Mobarakeh, Laleh; Prabhakaran, Molamma P; Foroughi, Mohammad Reza; Kharaziha, Mahshid; Saadatkish, Niloufar; Ramakrishna, Seeram

    2017-11-01

    Membranes used in dentistry act as a barrier to prevent invasion of intruder cells to defected area and obtains spaces that are to be subsequently filled with new bone and provide required bone volume for implant therapy when there is insufficient volume of healthy bone at implant site. In this study a two-layered bioactive membrane were fabricated by electrospinning whereas one layer provides guided bone regeneration (GBR) and fabricated using poly glycerol sebacate (PGS)/polycaprolactone (PCL) and Beta tri-calcium phosphate (β-TCP) (5, 10 and 15%) and another one containing PCL/PGS and chitosan acts as guided tissue regeneration (GTR). The morphology, chemical, physical and mechanical characterizations of the membranes were studied using scanning electron microscopy (SEM), Fourier transform infrared spectroscopy (FTIR), X-ray diffraction (XRD), tensile testing, then biodegradability and bioactivity properties were evaluated. In vitro cell culture study was also carried out to investigate proliferation and mineralization of cells on different membranes. Transmission electron microscope (TEM) and SEM results indicated agglomeration of β-TCP nanoparticles in the structure of nanofibers containing 15% β-TCP. Moreover by addition of β-TCP from 5% to 15%, contact angle decreased due to hydrophilicity of nanoparticles and bioactivity was found to increase. Mechanical properties of the membrane increased by incorporation of 5% and 10% of β-TCP in the structure of nanofibers, while addition of 15% of β-TCP was found to deteriorate mechanical properties of nanofibers. Although the presence of 5% and 10% of nanoparticles in the nanofibers increased proliferation of cells on GBR layer, cell proliferation was observed to decrease by addition of 15% β-TCP in the structure of nanofibers which is likely due to agglomeration of nanoparticles in the nanofiber structure. Our overall results revealed PCL/PGS containing 10% β-TCP could be selected as the optimum GBR membrane

  8. Operator agency in process intervention: tampering versus application of tacit knowledge

    Science.gov (United States)

    Van Gestel, P.; Pons, D. J.; Pulakanam, V.

    2015-09-01

    Statistical process control (SPC) theory takes a negative view of adjustment of process settings, which is termed tampering. In contrast, quality and lean programmes actively encourage operators to acts of intervention and personal agency in the improvement of production outcomes. This creates a conflict that requires operator judgement: How does one differentiate between unnecessary tampering and needful intervention? Also, difficult is that operators apply tacit knowledge to such judgements. There is a need to determine where in a given production process the operators are applying tacit knowledge, and whether this is hindering or aiding quality outcomes. The work involved the conjoint application of systems engineering, statistics, and knowledge management principles, in the context of a case study. Systems engineering was used to create a functional model of a real plant. Actual plant data were analysed with the statistical methods of ANOVA, feature selection, and link analysis. This identified the variables to which the output quality was most sensitive. These key variables were mapped back to the functional model. Fieldwork was then directed to those areas to prospect for operator judgement activities. A natural conversational approach was used to determine where and how operators were applying judgement. This contrasts to the interrogative approach of conventional knowledge management. Data are presented for a case study of a meat rendering plant. The results identify specific areas where operators' tacit knowledge and mental model contribute to quality outcomes and untangles the motivations behind their agency. Also evident is how novice and expert operators apply their knowledge differently. Novices were focussed on meeting throughput objectives, and their incomplete understanding of the plant characteristics led them to inadvertently sacrifice quality in the pursuit of productivity in certain situations. Operators' responses to the plant are affected by

  9. Advertising on mobile applications

    OpenAIRE

    Sobolevsky, Alexandr

    2015-01-01

    The article analyzes the new method of mobile advertising. Advertising in mobile applications - a subspecies of mobile marketing, where advertising is distributed using mobile phones and smartphones. Ad placement is going on inside of applications and games for smartphones. It has a high potential due to the large number of mobile phone users (over 6.5 billion in 2013).

  10. Dilemmas in SEA application

    DEFF Research Database (Denmark)

    Lyhne, Ivar

    Dilemmas in SEA Application: The DK Energy SectorIvar Lyhne - lyhne@plan.aau.dk. Based on three years of collaborative research, this paper outlines dilemmas in the application of SEA in the strategic development of the Danish energy sector. The dilemmas are based on concrete examples from practice...

  11. Medical application of EPR

    International Nuclear Information System (INIS)

    Eichhoff, Uwe; Hoefer, Peter

    2015-01-01

    Selected applications of continuous-wave EPR in medicine are reviewed. This includes detection of reactive oxygen and nitrogen species, pH measurements and oxymetry. Applications of EPR imaging are demonstrated on selected examples and future developments to faster imaging methods are discussed

  12. Connected vehicle application : safety.

    Science.gov (United States)

    2015-01-01

    Connected vehicle safety applications are designed to increase situational awareness : and reduce or eliminate crashes through vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and vehicle-to-pedestrian (V2P) data transmissions. Applications...

  13. Industrial applications and metallurgy

    International Nuclear Information System (INIS)

    Torres M, N.; Melendrez C, G.; Morales, F.L.

    1989-01-01

    From 1961 the use of nuclear energy in the industrial field in Colombia has a big advance. Today nuclear isotopes are used by private companies in this kind of application the Area of Industrial Applications and Metallurgy was the institution section that has trained and has transferred the technology needed for this purpose

  14. Energy applications of superconductivity

    International Nuclear Information System (INIS)

    Schneider, T.R.; Dale, S.J.; Wolf, S.M.

    1991-01-01

    Recent progress in developing high-temperature superconductors has enhanced the economic viability of energy applications such as power systems, motors, material processing and handling, refrigeration, transportation, and power electronics. This paper discusses the technical and economic issues associated with these applications

  15. Applications of Evolutionary Computation

    NARCIS (Netherlands)

    Mora, Antonio M.; Squillero, Giovanni; Di Chio, C; Agapitos, Alexandros; Cagnoni, Stefano; Cotta, Carlos; Fernández De Vega, F; Di Caro, G A; Drechsler, R.; Ekárt, A; Esparcia-Alcázar, Anna I.; Farooq, M; Langdon, W B; Merelo-Guervós, J.J.; Preuss, M; Richter, O.-M.H.; Silva, Sara; Sim$\\$~oes, A; Squillero, Giovanni; Tarantino, Ernesto; Tettamanzi, Andrea G B; Togelius, J; Urquhart, Neil; Uyar, A S; Yannakakis, G N; Smith, Stephen L; Caserta, Marco; Ramirez, Adriana; Voß, Stefan; Squillero, Giovanni; Burelli, Paolo; Mora, Antonio M.; Squillero, Giovanni; Jan, Mathieu; Matthias, M; Di Chio, C; Agapitos, Alexandros; Cagnoni, Stefano; Cotta, Carlos; Fernández De Vega, F; Di Caro, G A; Drechsler, R.; Ekárt, A; Esparcia-Alcázar, Anna I.; Farooq, M; Langdon, W B; Merelo-Guervós, J.J.; Preuss, M; Richter, O.-M.H.; Silva, Sara; Sim$\\$~oes, A; Squillero, Giovanni; Tarantino, Ernesto; Tettamanzi, Andrea G B; Togelius, J; Urquhart, Neil; Uyar, A S; Yannakakis, G N; Caserta, Marco; Ramirez, Adriana; Voß, Stefan; Squillero, Giovanni; Burelli, Paolo; Esparcia-Alcazar, Anna I; Silva, Sara; Agapitos, Alexandros; Cotta, Carlos; De Falco, Ivanoe; Cioppa, Antonio Della; Diwold, Konrad; Ekart, Aniko; Tarantino, Ernesto; Vega, Francisco Fernandez De; Burelli, Paolo; Sim, Kevin; Cagnoni, Stefano; Simoes, Anabela; Merelo, J.J.; Urquhart, Neil; Haasdijk, Evert; Zhang, Mengjie; Squillero, Giovanni; Eiben, A E; Tettamanzi, Andrea G B; Glette, Kyrre; Rohlfshagen, Philipp; Schaefer, Robert; Caserta, Marco; Ramirez, Adriana; Voß, Stefan

    2015-01-01

    The application of genetic and evolutionary computation to problems in medicine has increased rapidly over the past five years, but there are specific issues and challenges that distinguish it from other real-world applications. Obtaining reliable and coherent patient data, establishing the clinical

  16. Application Security Automation

    Science.gov (United States)

    Malaika, Majid A.

    2011-01-01

    With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…

  17. Engineering Adaptive Applications

    DEFF Research Database (Denmark)

    Dolog, Peter

    for a domain.In this book, we propose a new domain engineering framework which extends a development process of Web applications with techniques required when designing such adaptive customizable Web applications. The framework is provided with design abstractions which deal separately with information served...

  18. Modelling Foundations and Applications

    DEFF Research Database (Denmark)

    This book constitutes the refereed proceedings of the 8th European Conference on Modelling Foundations and Applications, held in Kgs. Lyngby, Denmark, in July 2012. The 20 revised full foundations track papers and 10 revised full applications track papers presented were carefully reviewed...

  19. Computer algebra applications

    International Nuclear Information System (INIS)

    Calmet, J.

    1982-01-01

    A survey of applications based either on fundamental algorithms in computer algebra or on the use of a computer algebra system is presented. Recent work in biology, chemistry, physics, mathematics and computer science is discussed. In particular, applications in high energy physics (quantum electrodynamics), celestial mechanics and general relativity are reviewed. (Auth.)

  20. Nanomaterials in biomedical applications

    DEFF Research Database (Denmark)

    Christiansen, Jesper de Claville; Potarniche, Catalina-Gabriela; Vuluga, Z.

    2011-01-01

    Advances in nano materials have lead to applications in many areas from automotive to electronics and medicine. Nano composites are a popular group of nano materials. Nanocomposites in medical applications provide novel solutions to common problems. Materials for implants, biosensors and drug del...

  1. Progressive Web applications

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Progressive Web Applications are native-like applications running inside of a browser context. In my presentation I would like describe their characteristics, benchmarks and building process using a quick and simple case study example with focus on Service Workers api.

  2. Rayleigh reciprocity relations: Applications

    International Nuclear Information System (INIS)

    Lin Ju; Li Xiao-Lei; Wang Ning

    2016-01-01

    Classical reciprocity relations have wide applications in acoustics, from field representation to generalized optical theorem. In this paper we introduce our recent results on the applications and generalization of classical Rayleigh reciprocity relation: higher derivative reciprocity relations as a generalization of the classical one and a theoretical proof on the Green’s function retrieval from volume noises. (special topic)

  3. Performance Assessment Position Paper: Time for Compliance

    International Nuclear Information System (INIS)

    Wilhite, E.L.

    2003-01-01

    This study lays out the historical development of the time frame for a low-level waste disposal facility to demonstrate compliance with the DOE performance objectives and requirements. The study recommends that 1,000 years should be used as the time for compliance for all of the performance objectives and requirements (i.e., for the all-pathways, air pathway, radon emanation, water resource protection and inadvertent intruder analyses) for all low-level waste disposal facility performance assessments at the Savannah River Site

  4. Development of polymer concrete radioactive waste management containers

    Energy Technology Data Exchange (ETDEWEB)

    Chung, H.; Lee, M. S.; Ahn, D. H.; Won, H. J.; Kang, H. S.; Lee, H. S.; Lim, S.P.; Kim, Y. E.; Lee, B. O.; Lee, K. P.; Min, B. Y.; Lee, J.K.; Jang, W. S.; Sim, W. B.; Lee, J. C.; Park, M. J.; Choi, Y. J.; Shin, H. E.; Park, H. Y.; Kim, C. Y

    1999-11-01

    A high-integrity radioactive waste container has been developed to immobilize the spent resin wastes from nuclear power plants, protect possible future, inadvertent intruders from damaging radiation. The polymer concrete container is designed to ensure safe and reliable disposal of the radioactive waste for a minimum period of 300 years. A built-in vent system for each container will permit the release of gas. An experimental evaluation of the mechanical, chemical, and biological tests of the container was carried out. The tests showed that the polymer concrete container is adequate for safe disposal of the radioactive wastes. (author)

  5. Database Application Schema Forensics

    Directory of Open Access Journals (Sweden)

    Hector Quintus Beyers

    2014-12-01

    Full Text Available The application schema layer of a Database Management System (DBMS can be modified to deliver results that may warrant a forensic investigation. Table structures can be corrupted by changing the metadata of a database or operators of the database can be altered to deliver incorrect results when used in queries. This paper will discuss categories of possibilities that exist to alter the application schema with some practical examples. Two forensic environments are introduced where a forensic investigation can take place in. Arguments are provided why these environments are important. Methods are presented how these environments can be achieved for the application schema layer of a DBMS. A process is proposed on how forensic evidence should be extracted from the application schema layer of a DBMS. The application schema forensic evidence identification process can be applied to a wide range of forensic settings.

  6. Geometry and its applications

    CERN Document Server

    Meyer, Walter J

    2006-01-01

    Meyer''s Geometry and Its Applications, Second Edition, combines traditional geometry with current ideas to present a modern approach that is grounded in real-world applications. It balances the deductive approach with discovery learning, and introduces axiomatic, Euclidean geometry, non-Euclidean geometry, and transformational geometry. The text integrates applications and examples throughout and includes historical notes in many chapters. The Second Edition of Geometry and Its Applications is a significant text for any college or university that focuses on geometry''s usefulness in other disciplines. It is especially appropriate for engineering and science majors, as well as future mathematics teachers.* Realistic applications integrated throughout the text, including (but not limited to): - Symmetries of artistic patterns- Physics- Robotics- Computer vision- Computer graphics- Stability of architectural structures- Molecular biology- Medicine- Pattern recognition* Historical notes included in many chapters...

  7. Applications of ionizing radiations

    International Nuclear Information System (INIS)

    2014-01-01

    Developments in standard applications and brand new nuclear technologies, with high impact on the future of the agriculture, medicine, industry and the environmental preservation. The Radiation Technology Center (CTR) mission is to apply the radiation and radioisotope technologies in Industry, Health, Agriculture, and Environmental Protection, expanding the scientific knowledge, improving human power resources, transferring technology, generating products and offering services for the Brazilian society. The CTR main R and D activities are in consonance with the IPEN Director Plan (2011-2013) and the Applications of Ionizing Radiation Program, with four subprograms: Irradiation of Food and Agricultural Products; Radiation and Radioisotopes Applications in Industry and Environment; Radioactive Sources and Radiation Applications in Human Health; and Radioactive Facilities and Equipment for the Applications of Nuclear Techniques

  8. GPU computing and applications

    CERN Document Server

    See, Simon

    2015-01-01

    This book presents a collection of state of the art research on GPU Computing and Application. The major part of this book is selected from the work presented at the 2013 Symposium on GPU Computing and Applications held in Nanyang Technological University, Singapore (Oct 9, 2013). Three major domains of GPU application are covered in the book including (1) Engineering design and simulation; (2) Biomedical Sciences; and (3) Interactive & Digital Media. The book also addresses the fundamental issues in GPU computing with a focus on big data processing. Researchers and developers in GPU Computing and Applications will benefit from this book. Training professionals and educators can also benefit from this book to learn the possible application of GPU technology in various areas.

  9. Applications of ionizing radiations

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2014-07-01

    Developments in standard applications and brand new nuclear technologies, with high impact on the future of the agriculture, medicine, industry and the environmental preservation. The Radiation Technology Center (CTR) mission is to apply the radiation and radioisotope technologies in Industry, Health, Agriculture, and Environmental Protection, expanding the scientific knowledge, improving human power resources, transferring technology, generating products and offering services for the Brazilian society. The CTR main R and D activities are in consonance with the IPEN Director Plan (2011-2013) and the Applications of Ionizing Radiation Program, with four subprograms: Irradiation of Food and Agricultural Products; Radiation and Radioisotopes Applications in Industry and Environment; Radioactive Sources and Radiation Applications in Human Health; and Radioactive Facilities and Equipment for the Applications of Nuclear Techniques.

  10. Stirling engine application study

    Science.gov (United States)

    Teagan, W. P.; Cunningham, D.

    1983-01-01

    A range of potential applications for Stirling engines in the power range from 0.5 to 5000 hp is surveyed. Over one hundred such engine applications are grouped into a small number of classes (10), with the application in each class having a high degree of commonality in technical performance and cost requirements. A review of conventional engines (usually spark ignition or Diesel) was then undertaken to determine the degree to which commercial engine practice now serves the needs of the application classes and to detemine the nature of the competition faced by a new engine system. In each application class the Stirling engine was compared to the conventional engines, assuming that objectives of ongoing Stirling engine development programs are met. This ranking process indicated that Stirling engines showed potential for use in all application classes except very light duty applications (lawn mowers, etc.). However, this potential is contingent on demonstrating much greater operating life and reliability than has been demonstrated to date by developmental Stirling engine systems. This implies that future program initiatives in developing Stirling engine systems should give more emphasis to life and reliability issues than has been the case in ongoing programs.

  11. OCT for industrial applications

    Science.gov (United States)

    Song, Guiju; Harding, Kevin

    2012-11-01

    Optical coherence tomography (OCT), as an interferometric method, has been studied as a distance ranger. As a technology capable of producing high-resolution, depth-resolved images of biological tissue, OCT had been widely used for the application of ophthalmology and has been commercialized in the market today. Enlightened by the emerging research interest in biomedical domain, the applications of OCT in industrial inspection were rejuvenated by a few groups to explore its potential for characterizing new materials, imaging or inspecting industrial parts as a service solution[3]. Benefiting from novel photonics components and devices, the industrial application of the older concepts in OCT can be re-visited with respect to the unique performance and availability. Commercial OCT developers such as Michelson Diagnostics (MDL; Orpington, U.K.) and Thorlabs (Newton, NJ) are actively exploring the application of OCT to industrial applications and they have outlined meaningful path toward the metrology application in emerging industry[3]. In this chapter, we will introduce the fundamental concepts of OCT and discuss its current and potential industrial applications.

  12. The application of RFQs

    International Nuclear Information System (INIS)

    Schempp, A.

    1992-01-01

    The Radio Frequency Quadrupole Accelerator (RFQ) has found wide application, not only as the preinjector linac for new high energy light ion accelerators but also in a variety of other projects. Progress in development has made ion linacs practical for medical and industrial applications including radiation therapy, isotope and neutron production, material modification and ion beam diagnostic. The paper discusses various projects together with applications in science where RFQs serve as stand-alone tools, for example for the calibration of detectors, as decelerators or as small compact beam sources for atomic physics and materials research. (Author) 7 figs., 40 refs

  13. Lift application development cookbook

    CERN Document Server

    Garcia, Gilberto T

    2013-01-01

    Lift Application Development Cookbook contains practical recipes on everything you will need to create secure web applications using this amazing framework.The book first teaches you basic topics such as starting a new application and gradually moves on to teach you advanced topics to achieve a certain task. Then, it explains every step in detail so that you can build your knowledge about how things work.This book is for developers who have at least some basic knowledge about Scala and who are looking for a functional, secure, and modern web framework. Prior experience with HTML and JavaScript

  14. Biomedical applications of polymers

    CERN Document Server

    Gebelein, C G

    1991-01-01

    The biomedical applications of polymers span an extremely wide spectrum of uses, including artificial organs, skin and soft tissue replacements, orthopaedic applications, dental applications, and controlled release of medications. No single, short review can possibly cover all these items in detail, and dozens of books andhundreds of reviews exist on biomedical polymers. Only a few relatively recent examples will be cited here;additional reviews are listed under most of the major topics in this book. We will consider each of the majorclassifications of biomedical polymers to some extent, inclu

  15. Underground engineering applications

    Energy Technology Data Exchange (ETDEWEB)

    Nordyke, M D [Lawrence Radiation Laboratory, Livermore, CA (United States)

    1969-07-01

    Developments of any underground engineering application utilizing nuclear explosives involve answering the same questions one encounters in any new area of technology: What are the characteristics of the new tool? How is it applicable to the job to be done? Is it safe to use? and, most importantly, is its use economically acceptable? The many facets of the answers to these questions will be explored. The general types of application presently under consideration will also be reviewed, with particular emphasis on those specific projects actively being worked on by commercial interests and by the U.S. Atomic Energy Commission. (author)

  16. Excimer laser applications

    International Nuclear Information System (INIS)

    Fantoni, R.

    1988-01-01

    This lecture deals with laser induced material photoprocessing, especially concerning those processes which are initiated by u.v. lasers (mostly excimer laser). Advantages of using the u.v. radiation emitted by excimer lasers, both in photophysical and photochemical processes of different materials, are discussed in detail. Applications concerning microelectronics are stressed with respect to other applications in different fields (organic chemistry, medicine). As further applications of excimer lasers, main spectroscopic techniques for ''on line'' diagnostics which employ excimer pumped dye lasers, emitting tunable radiation in the visible and near u.v. are reviewed

  17. Android Applications Security

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2011-01-01

    Full Text Available The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the architecture of a mobile security system for Android devices.

  18. Handbook of satellite applications

    CERN Document Server

    Madry, Scott; Camacho-Lara, Sergio

    2017-01-01

    The first edition of this ground breaking reference work was the most comprehensive reference source available about the key aspects of the satellite applications field. This updated second edition covers the technology, the markets, applications and regulations related to satellite telecommunications, broadcasting and networking—including civilian and military systems; precise satellite navigation and timing networks (i.e. GPS and others); remote sensing and meteorological satellite systems. Created under the auspices of the International Space University based in France, this brand new edition is now expanded to cover new innovative small satellite constellations, new commercial launching systems, innovation in military application satellites and their acquisition, updated appendices, a useful glossary and more.

  19. Professional Tizen application development

    CERN Document Server

    Jaygarl, HoJun; Kim, YoonSoo; Choi, Eunyoung; Bradwick, Kevin; Lansdell

    2014-01-01

    Create powerful, marketable applications with Tizen for the smartphone and beyond  Tizen is the only platform designed for multiple device categories that is HTML5-centric and entirely open source. Written by experts in the field, this comprehensive guide includes chapters on both web and native application development, covering subjects such as location and social features, advanced UIs, animations, sensors and multimedia. This book is a comprehensive resource for learning how to develop Tizen web and native applications that are polished, bug-free and ready to sell on a range of smart dev

  20. Underground engineering applications

    International Nuclear Information System (INIS)

    Nordyke, M.D.

    1969-01-01

    Developments of any underground engineering application utilizing nuclear explosives involve answering the same questions one encounters in any new area of technology: What are the characteristics of the new tool? How is it applicable to the job to be done? Is it safe to use? and, most importantly, is its use economically acceptable? The many facets of the answers to these questions will be explored. The general types of application presently under consideration will also be reviewed, with particular emphasis on those specific projects actively being worked on by commercial interests and by the U.S. Atomic Energy Commission. (author)

  1. Mobile Application Recommender System

    OpenAIRE

    Davidsson, Christoffer

    2010-01-01

    With the amount of mobile applications available increasing rapidly, users have to put a lot of effort into finding applications of interest. The purpose of this thesis is to investigate how to aid users in the process of discovering new mobile applications by providing them with recommendations. A prototype system is then built as a proof-of-concept. The work of the thesis is divided into three phases where the aim of the first phase is to study related work and related systems to identify p...

  2. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  3. Developing Large Web Applications

    CERN Document Server

    Loudon, Kyle

    2010-01-01

    How do you create a mission-critical site that provides exceptional performance while remaining flexible, adaptable, and reliable 24/7? Written by the manager of a UI group at Yahoo!, Developing Large Web Applications offers practical steps for building rock-solid applications that remain effective even as you add features, functions, and users. You'll learn how to develop large web applications with the extreme precision required for other types of software. Avoid common coding and maintenance headaches as small websites add more pages, more code, and more programmersGet comprehensive soluti

  4. Superconductivity and its application

    International Nuclear Information System (INIS)

    Spadoni, M.

    1988-01-01

    This paper, after a short introduction to superconductivity and to multifilamentary superconducting composites is aiming to review the state of the art and the future perspective of some of the applications of the superconducting materials. The main interest is focussed to large scale applications like, for istance, magnets for accelerators or fusion reactors, superconducting system for NMR thomography, etc. A short paragraph is dedicated to applications for high sensitivity instrumentation. The paper is then concluded by some considerations about the potentialities of the newly discovered high critical temperature materials

  5. Express web application development

    CERN Document Server

    Yaapa, Hage

    2013-01-01

    Express Web Application Development is a practical introduction to learning about Express. Each chapter introduces you to a different area of Express, using screenshots and examples to get you up and running as quickly as possible.If you are looking to use Express to build your next web application, ""Express Web Application Development"" will help you get started and take you right through to Express' advanced features. You will need to have an intermediate knowledge of JavaScript to get the most out of this book.

  6. Application of expert systems

    Energy Technology Data Exchange (ETDEWEB)

    Basden, A

    1983-11-01

    This article seeks to bring together a number of issues relevant to the application of expert systems by discussing their advantages and limitations, their roles and benefits, and the influence that real-life applications might have on the design of expert systems software. Part of the expert systems strategy of one major chemical company is outlined. Because it was in constructing one particular expert system that many of these issues became important this system is described briefly at the start of the paper and used to illustrate much of the later discussion. It is of the plausible-inference type and has application in the field of materials engineering. 22 references.

  7. Biomaterials and therapeutic applications

    Science.gov (United States)

    Ferraro, Angelo

    2016-03-01

    A number of organic and inorganic, synthetic or natural derived materials have been classified as not harmful for the human body and are appropriate for medical applications. These materials are usually named biomaterials since they are suitable for introduction into living human tissues of prosthesis, as well as for drug delivery, diagnosis, therapies, tissue regeneration and many other clinical applications. Recently, nanomaterials and bioabsorbable polymers have greatly enlarged the fields of application of biomaterials attracting much more the attention of the biomedical community. In this review paper I am going to discuss the most recent advances in the use of magnetic nanoparticles and biodegradable materials as new biomedical tools.

  8. Building Social Web Applications

    CERN Document Server

    Bell, Gavin

    2009-01-01

    Building a web application that attracts and retains regular visitors is tricky enough, but creating a social application that encourages visitors to interact with one another requires careful planning. This book provides practical solutions to the tough questions you'll face when building an effective community site -- one that makes visitors feel like they've found a new home on the Web. If your company is ready to take part in the social web, this book will help you get started. Whether you're creating a new site from scratch or reworking an existing site, Building Social Web Applications

  9. Professional mobile application development

    CERN Document Server

    McWherter, Jeff

    2012-01-01

    Create applications for all major smartphone platforms Creating applications for the myriad versions and varieties of mobile phone platforms on the market can be daunting to even the most seasoned developer. This authoritative guide is written in such as way that it takes your existing skills and experience and uses that background as a solid foundation for developing applications that cross over between platforms, thereby freeing you from having to learn a new platform from scratch each time. Concise explanations walk you through the tools and patterns for developing for all the mobile platfo

  10. User Types in Online Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2011-08-01

    Full Text Available Online applications are presented in the context of information society. Online applications characteristics are analyzed. Quality characteristics are presented in relation to online applications users. Types of users for AVIO application are presented. Use cases for AVIO application are identified. The limitations of AVIO application are defined. Types of users in online applications are identified. The threedimensional matrix of access to the online application resources is built. The user type-oriented database is structured. Access management of the fields related to the database tables is analyzed. The classification of online applications users is done.

  11. Summary of Remediated and Unremediated Nitrate Salt Surrogate Testing in Support of the Waste Treatment Permit Application to the New Mexico Environment Department (NMED)

    Energy Technology Data Exchange (ETDEWEB)

    Funk, David John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-06-22

    The inadvertent creation of transuranic waste carrying hazardous waste codes D001 and D002 requires the treatment of the material to eliminate the hazardous characteristics and allow its eventual shipment and disposal at the Waste Isolation Pilot Plant (WIPP). This report briefly summarizes the surrogate testing that was done in support of our understanding of this waste form.

  12. Designing Adaptive Web Applications

    DEFF Research Database (Denmark)

    Dolog, Peter

    2008-01-01

    Learning system to study a discipline. In business to business interaction, different requirements and parameters of exchanged business requests might be served by different services from third parties. Such applications require certain intelligence and a slightly different approach to design. Adpative web......The unique characteristic of web applications is that they are supposed to be used by much bigger and diverse set of users and stakeholders. An example application area is e-Learning or business to business interaction. In eLearning environment, various users with different background use the e......-based applications aim to leave some of their features at the design stage in the form of variables which are dependent on several criteria. The resolution of the variables is called adaptation and can be seen from two perspectives: adaptation by humans to the changed requirements of stakeholders and dynamic system...

  13. Nanobiomaterials development and applications

    CERN Document Server

    Papaefthymiou-Davis, Georgia C

    2013-01-01

    Nanomaterials in Nanobiotechnologies: Preparation, Characterization, and ApplicationsBio-Inspired Magnetic NanoparticlesGeorgia C. Papaefthymiou and Eamonn DevlinNanoparticles for BioimagingHye Sun Park and Yong Taik LimBiomedical Applications of Dendrimer Porphyrin or PhthalocyanineWoo-Dong Jang and Won-Gun KohPolymeric Nanoparticles in Cancer TherapyHeebeom Koo, Ji Young Yhee, Ick Chan Kwon, Kwangmeyung Kim, and Ramesh SubbiahCarbon Nanotube BioconjugatesMonica Samal, Dong Kee Yi, and Shashadhar SamalBiocatalytic NanosystemsJaehong Lim and Su Seong LeeMagnetically Induced Hyperthermia for Biomedical ApplicationsMichael Fardis, Ioannis Rabias, Georgios Diamantopoulos, Eleni Karakosta, Danai Tsitrouli, Vassilios Tzitzios, and Georgios PapavassiliouSoft Block Nanobuilding: New Preparation Routes of Soft Nanomaterials Using BiomoleculesEngineered Biomolecules as NanomaterialsYun Jung Lee and Ki Tae NamNanomaterials and Bio-MEMS: Nano- and Microscale Hybridization of Materials and ApplicationsMicrofluidic-Based ...

  14. Pedal Application Errors

    Science.gov (United States)

    2012-03-01

    This project examined the prevalence of pedal application errors and the driver, vehicle, roadway and/or environmental characteristics associated with pedal misapplication crashes based on a literature review, analysis of news media reports, a panel ...

  15. Microtron for radiation applications

    International Nuclear Information System (INIS)

    Soni, H.C.; Ramamurthi, S.S.

    1993-01-01

    The electron accelerator called microtron is a powerful tool for research, medical and industrial applications which need electron beam in energy range of few tens of MeV. Either electron beam from microtron is directly used for radiation applications or electron beam is utilized to produce x-rays or neutrons which are eventually used for radiation applications. After considering the vast potential, lower cost, simpler construction and excellent quality of electron beam from microtron, it was decided to develop this machine at Centre for Advanced Technology (CAT). The microtrons in two standard models have been developed which will cover all the above mentioned applications except free electron lasers. The microtron of model 1 provides electron beam of 20 MeV, 15/30 mA and that of model 2 provides electron beam of 8/12 MeV, 50/30 mA. (author). 2 figs., 1 tab

  16. Applications of quantum chromodynamics

    International Nuclear Information System (INIS)

    Field, R.D.

    1979-01-01

    Perturbative application of the theory of Quantum Chromodynamics (QCQ) are examined and compared with experimental data. Particular emphasis is placed on understanding the similarities and differences between the QCD results and the expectations of the naive parton model

  17. Thermoluminescence and applications

    International Nuclear Information System (INIS)

    Rodrigues, G.V.

    1986-01-01

    The theory of thermoluminescent emission, the characteristics of main thermoluminescent phosphorus, and some applications are presented. The main thermoluminescent dosemeters used in dosimetry are related. (M.C.K.)

  18. Thermoluminescence and their applications

    International Nuclear Information System (INIS)

    Rodrigues, G.V.

    1986-01-01

    The theory involved in the phenomenon of thermoluminescence emission, the characteristics of the main thermoluminescent phosphorus and some of their applications are presented. Some of the main thermoluminescent dosemeters used in dosimetry are described. (M.C.K.) [pt

  19. BIOSENSORS FOR ENVIRONMENTAL APPLICATIONS

    Science.gov (United States)

    A review, with 19 references, is given on challenges and possible opportunities for the development of biosensors for environmental monitoring applications. The high cost and slow turnaround times typically associated with the measurement of regulated pollutants clearly indicates...

  20. Nuclear Technology applications

    International Nuclear Information System (INIS)

    Cibils Machado, W. E- mail: wrcibils@adinet.com.uy

    2002-01-01

    The present work tries on the applications of the nuclear technology in the life daily, such as agriculture and feeding, human health, industry, non destructive essays, isotopic hydrology, and the nuclear power stations for electricity production and radioisotopes production

  1. Evolution of Mobile Applications

    Directory of Open Access Journals (Sweden)

    Phongtraychack Anachack

    2018-01-01

    Full Text Available Currently, we can see the rapid evolution of mobile technology, which involves mobile communication, mobile hardware, and mobile software. Features of mobile phones largely depend on software. In contemporary information and communication age [1–4], mobile application is one of the most concerned and rapidly developing areas. At the same time, the development of mobile application undergoes great changes with the introduction of new software, service platforms and software development kits (SDK. These changes lead to appearance of many new service platforms such as Google with Android and Apple with iOS. This article presents the information about the evolution of mobile application, gives some statistical data on the past and present situation, demonstrates how individual users of mobile devices can benefit, and shows how mobile applications affect society from the ethical perspective.

  2. Thermal Cameras and Applications

    DEFF Research Database (Denmark)

    Gade, Rikke; Moeslund, Thomas B.

    2014-01-01

    Thermal cameras are passive sensors that capture the infrared radiation emitted by all objects with a temperature above absolute zero. This type of camera was originally developed as a surveillance and night vision tool for the military, but recently the price has dropped, significantly opening up...... a broader field of applications. Deploying this type of sensor in vision systems eliminates the illumination problems of normal greyscale and RGB cameras. This survey provides an overview of the current applications of thermal cameras. Applications include animals, agriculture, buildings, gas detection......, industrial, and military applications, as well as detection, tracking, and recognition of humans. Moreover, this survey describes the nature of thermal radiation and the technology of thermal cameras....

  3. Thermodynamics foundations and applications

    CERN Document Server

    Gyftopoulos, Elias P

    2005-01-01

    Designed by two MIT professors, this authoritative text discusses basic concepts and applications in detail, emphasizing generality, definitions, and logical consistency. More than 300 solved problems cover realistic energy systems and processes.

  4. Wordpress web application development

    CERN Document Server

    Ratnayake, Rakhitha Nimesh

    2015-01-01

    This book is intended for WordPress developers and designers who want to develop quality web applications within a limited time frame and for maximum profit. Prior knowledge of basic web development and design is assumed.

  5. Applications of decelerated ions

    International Nuclear Information System (INIS)

    Johnson, B.M.

    1985-03-01

    Many facilities whose sole purpose had been to accelerate ion beams are now becoming decelerators as well. The development and current status of accel-decel operations is reviewed here. Applications of decelerated ions in atomic physics experiments are discussed

  6. Applications of Piezoelectric Ceramics

    Indian Academy of Sciences (India)

    Applications of Piezoelectric Ceramics. Piezoelectric Actuators. Nano and Micropositioners. Vibration Control Systems. Computer Printers. Piezoelectric Transformers,Voltage Generators, Spark Plugs, Ultrasonic Motors,. Ultrasonic Generators and Sensors. Sonars, Medical Diagnostic. Computer Memories. NVFRAM ...

  7. Engineering Adaptive Web Applications

    DEFF Research Database (Denmark)

    Dolog, Peter

    2007-01-01

    suit the user profile the most. This paper summarizes the domain engineering framework for such adaptive web applications. The framework provides guidelines to develop adaptive web applications as members of a family. It suggests how to utilize the design artifacts as knowledge which can be used......Information and services on the web are accessible for everyone. Users of the web differ in their background, culture, political and social environment, interests and so on. Ambient intelligence was envisioned as a concept for systems which are able to adapt to user actions and needs....... With the growing amount of information and services, the web applications become natural candidates to adopt the concepts of ambient intelligence. Such applications can deal with divers user intentions and actions based on the user profile and can suggest the combination of information content and services which...

  8. Special functions & their applications

    CERN Document Server

    Lebedev, N N

    1972-01-01

    Famous Russian work discusses the application of cylinder functions and spherical harmonics; gamma function; probability integral and related functions; Airy functions; hyper-geometric functions; more. Translated by Richard Silverman.

  9. Capital Projects Application (CPA)

    Data.gov (United States)

    General Services Administration — Capital Projects application (CPA) provides users with the ability to maintain project related financial data for Budget Activity (BA) 51, 55, 64, 01, 02, 03, 04....

  10. Electronic applications presentation

    Science.gov (United States)

    Grants.gov requirement effective February 17, 2015. All initial applications submitted for competitiveawards based on solicitations issued on or after February 17, 2015 must be submitted to EPAelectronically through Grants.gov.

  11. Neutron sources and applications

    Energy Technology Data Exchange (ETDEWEB)

    Price, D.L. [ed.] [Argonne National Lab., IL (United States); Rush, J.J. [ed.] [National Inst. of Standards and Technology, Gaithersburg, MD (United States)

    1994-01-01

    Review of Neutron Sources and Applications was held at Oak Brook, Illinois, during September 8--10, 1992. This review involved some 70 national and international experts in different areas of neutron research, sources, and applications. Separate working groups were asked to (1) review the current status of advanced research reactors and spallation sources; and (2) provide an update on scientific, technological, and medical applications, including neutron scattering research in a number of disciplines, isotope production, materials irradiation, and other important uses of neutron sources such as materials analysis and fundamental neutron physics. This report summarizes the findings and conclusions of the different working groups involved in the review, and contains some of the best current expertise on neutron sources and applications.

  12. Applications of Clustering

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Applications of Clustering. Biology – medical imaging, bioinformatics, ecology, phylogenies problems etc. Market research. Data Mining. Social Networks. Any problem measuring similarity/correlation. (dimensions represent different parameters)

  13. Food Applications and Regulation

    Science.gov (United States)

    Gálvez, Antonio; Abriouel, Hikmate; Omar, Nabil Ben; Lucas, Rosario

    This chapter deals with food applications of bacteriocins. Regulatory issues on the different possibilities for incorporating bacteriocins as bioprotectants are discussed. Specific applications of bacteriocins or bacteriocin-producing strains are described for main food categories, including milk and dairy products, raw meats, ready-to-eat meat and poultry products, fermented meats, fish and fish products or fermented fish. The last section of the chapter deals with applications in foods and beverages derived from plant materials, such as raw vegetable foods, fruits and fruit juices, cooked food products, fermented vegetable foods and ­fermented beverages. Results obtained for application of bacteriocins in combination with other hurdles are also discussed for each specific case, with a special emphasis on novel food packaging and food-processing technologies, such as irradiation, pulsed electric field treatments or high hydrostatic pressure treatment.

  14. Neutron sources and applications

    International Nuclear Information System (INIS)

    Price, D.L.; Rush, J.J.

    1994-01-01

    Review of Neutron Sources and Applications was held at Oak Brook, Illinois, during September 8--10, 1992. This review involved some 70 national and international experts in different areas of neutron research, sources, and applications. Separate working groups were asked to (1) review the current status of advanced research reactors and spallation sources; and (2) provide an update on scientific, technological, and medical applications, including neutron scattering research in a number of disciplines, isotope production, materials irradiation, and other important uses of neutron sources such as materials analysis and fundamental neutron physics. This report summarizes the findings and conclusions of the different working groups involved in the review, and contains some of the best current expertise on neutron sources and applications

  15. Magnesium motorcycle applications

    International Nuclear Information System (INIS)

    Jianyong Cao; Zonghe Zhang; Dongxia Xiang; Jun Wang

    2005-01-01

    Magnesium, the lightest engineering structural metal, has been comprehensively used in castings of aviation and aerospace, communication and transportation, and IT components. This paper introduced the history, advantages and difficulties of magnesium castings for motorcycle application as well as its application state in China. It also indicated the production situation of magnesium motorcycle components in CQMST and difficulties need to overcome for further development. (orig.)

  16. Applications of Genetic Programming

    DEFF Research Database (Denmark)

    Gaunholt, Hans; Toma, Laura

    1996-01-01

    In this report a study of genetic programming (GP) has been performed with respect to a number of applications such as Symbolic function regression, Solving Symbolic Differential Equations, Image encoding, the ant problem etc.......In this report a study of genetic programming (GP) has been performed with respect to a number of applications such as Symbolic function regression, Solving Symbolic Differential Equations, Image encoding, the ant problem etc....

  17. Applications for alliform carbon

    Energy Technology Data Exchange (ETDEWEB)

    Gogotsi, Yury; Mochalin, Vadym; McDonough, IV, John Kenneth; Simon, Patrice; Taberna, Pierre Louis

    2017-02-21

    This invention relates to novel applications for alliform carbon, useful in conductors and energy storage devices, including electrical double layer capacitor devices and articles incorporating such conductors and devices. Said alliform carbon particles are in the range of 2 to about 20 percent by weight, relative to the weight of the entire electrode. Said novel applications include supercapacitors and associated electrode devices, batteries, bandages and wound healing, and thin-film devices, including display devices.

  18. Applications of neutron irradiation

    International Nuclear Information System (INIS)

    Ito, Yasuo

    1999-01-01

    The present state of art of applications of neutron irradiation is overviewed taking neutron activation analysis, prompt gamma-ray analysis, fission/alpha track methods, boron neutron capture therapy as examples. What is common among them is that the technologies are nearly matured for wide use by non- nuclear scientists. But the environment around research reactors is not prospective. These applications should be encouraged by incorporating in the neutron science society. (author)

  19. Superconductivity and their applications

    OpenAIRE

    Roque, António; Sousa, Duarte M.; Fernão Pires, Vítor; Margato, Elmano

    2017-01-01

    Trabalho apresentado em International Conference on Renewable Energies and Power Quality (ICREPQ’17), 4 a 6 de Abril de 2017, Málaga, Espanha The research in the field of superconductivity has led to the synthesis of superconducting materials with features that allow you to expand the applicability of this kind of materials. Among the superconducting materials characteristics, the critical temperature of the superconductor is framing the range and type of industrial applications that can b...

  20. Mobile Augmented Reality Applications

    OpenAIRE

    Prochazka, David; Stencl, Michael; Popelka, Ondrej; Stastny, Jiri

    2011-01-01

    Augmented reality have undergone considerable improvement in past years. Many special techniques and hardware devices were developed, but the crucial breakthrough came with the spread of intelligent mobile phones. This enabled mass spread of augmented reality applications. However mobile devices have limited hardware capabilities, which narrows down the methods usable for scene analysis. In this article we propose an augmented reality application which is using cloud computing to enable using...

  1. Modular Mobile Application Design

    OpenAIRE

    Jim Hahn; Nathaniel Ryckman

    2012-01-01

    This article describes the development of the Minrva library app for Android phones. The decisions to build a native application with Java and use a modular design are discussed. The application includes five modules: catalog search, in-building navigation, a barcode scanning feature, and up to date notifications of circulating technology availability. A sixth module, Amazon recommendations, that is not included in the version of the app that was released is also discussed. The article also r...

  2. Accounting Applications---Introduction

    OpenAIRE

    Joshua Ronen

    1980-01-01

    Introduction to special issue on accounting applications. By publishing these papers together in one issue of Management Science we wish to accomplish the dual purpose of exposing management scientists to the application of their discipline to important accounting problems and of allowing management scientists and accountants to interact in areas of research and problem-solving, thus stimulating the interest of readers who are concerned with the problems of accounting.

  3. Technological laser application

    International Nuclear Information System (INIS)

    Shia, D.O.; Kollen, R.; Rods, U.

    1980-01-01

    Problems of the technological applications of lasers are stated in the popular form. Main requirements to a technological laser as well as problems arising in designing any system using lasers have been considered. Areas of the laser applications are described generally: laser treatment of materials, thermal treatment, welding, broach and drilling of holes, scribing, microtreatment and adjustment of resistors, material cutting, investigations into controlled thermonuclear fussion

  4. Applications of Nuclear Physics

    OpenAIRE

    Hayes, Anna C.

    2017-01-01

    Today the applications of nuclear physics span a very broad range of topics and fields. This review discusses a number of aspects of these applications, including selected topics and concepts in nuclear reactor physics, nuclear fusion, nuclear non-proliferation, nuclear-geophysics, and nuclear medicine. The review begins with a historic summary of the early years in applied nuclear physics, with an emphasis on the huge developments that took place around the time of World War II, and that und...

  5. Particles beams and applications

    International Nuclear Information System (INIS)

    Uzureau, J.L.

    1996-01-01

    This issue of the ''Chocs'' journal is devoted to particles beams used by the D.A.M. (Direction of Military Applications) and to their applications. The concerned beams are limited to those in an energy range from hundred of Kev to several Gev. Light ions (protons, deuterons, alpha) where it is easy to produce neutrons sources and heavy ions (from carbon to gold). (N.C.). 8 refs., 2 figs

  6. Technology Applications Team: Applications of aerospace technology

    Science.gov (United States)

    1993-01-01

    Highlights of the Research Triangle Institute (RTI) Applications Team activities over the past quarter are presented in Section 1.0. The Team's progress in fulfilling the requirements of the contract is summarized in Section 2.0. In addition to our market-driven approach to applications project development, RTI has placed increased effort on activities to commercialize technologies developed at NASA Centers. These Technology Commercialization efforts are summarized in Section 3.0. New problem statements prepared by the Team in the reporting period are presented in Section 4.0. The Team's transfer activities for ongoing projects with the NASA Centers are presented in Section 5.0. Section 6.0 summarizes the status of four add-on tasks. Travel for the reporting period is described in Section 7.0. The RTI Team staff and consultants and their project responsibilities are listed in Appendix A. The authors gratefully acknowledge the contributions of many individuals to the RTI Technology Applications Team program. The time and effort contributed by managers, engineers, and scientists throughout NASA were essential to program success. Most important to the program has been a productive working relationship with the NASA Field Center Technology Utilization (TU) Offices. The RTI Team continues to strive for improved effectiveness as a resource to these offices. Industry managers, technical staff, medical researchers, and clinicians have been cooperative and open in their participation. The RTI Team looks forward to continuing expansion of its interaction with U.S. industry to facilitate the transfer of aerospace technology to the private sector.

  7. LCS Content Document Application

    Science.gov (United States)

    Hochstadt, Jake

    2011-01-01

    My project at KSC during my spring 2011 internship was to develop a Ruby on Rails application to manage Content Documents..A Content Document is a collection of documents and information that describes what software is installed on a Launch Control System Computer. It's important for us to make sure the tools we use everyday are secure, up-to-date, and properly licensed. Previously, keeping track of the information was done by Excel and Word files between different personnel. The goal of the new application is to be able to manage and access the Content Documents through a single database backed web application. Our LCS team will benefit greatly with this app. Admin's will be able to login securely to keep track and update the software installed on each computer in a timely manner. We also included exportability such as attaching additional documents that can be downloaded from the web application. The finished application will ease the process of managing Content Documents while streamlining the procedure. Ruby on Rails is a very powerful programming language and I am grateful to have the opportunity to build this application.

  8. Radioisotopes production and applications

    International Nuclear Information System (INIS)

    Dash, Ashutosh

    2015-01-01

    Application of radioisotopes for both medical and industrial applications constitutes one of the most important peaceful uses of atomic energy. The striking diffusion and the exciting perspective of radioisotope for a plethora of medical and industrial applications are mainly attributable to the penetrating and ionization properties of radiation emanating from radioisotopes. The revolutionary medical applications of radioisotopes for the diagnosis and treatment of a multitude of diseases are causing a rapid expansion of the nuclear medicine field. While the industrial uses of radioisotopes are not expanding as quickly, also require large amounts of radioisotopes. Production of radioisotopes is not only the first step, but also the most crucial for the success as well as sustainable growth of radioisotope applications. With the rapid growth and expanding areas of applications, the demands for isotopes have increased several folds. A number of radioisotopes of different physical half-life, energy of the particle or gamma emission, specific activity and chemistry are now regularly produced both at commercial centers as well as at selected nuclear science research institutes utilizing reactors and cyclotrons to meet the ever growing need

  9. Computer Applications in Educational Audiology.

    Science.gov (United States)

    Mendel, Lisa Lucks; And Others

    1995-01-01

    This article provides an overview of how computer technologies can be used by educational audiologists. Computer technologies are classified into three categories: (1) information systems applications; (2) screening and diagnostic applications; and (3) intervention applications. (Author/DB)

  10. Quality attributes for mobile applications

    OpenAIRE

    Fernandes, João M.; Ferreira, André Leite

    2016-01-01

    A mobile application is a type of software application developed to run on a mobile device. The chapter discusses the main characteristics of mobile devices, since they have a great impact on mobile applications. It also presents the classification of mobile applications according to two main types: native and web-based applications. Finally, this chapter identifies the most relevant types of quality attributes for mobile applications. It shows that the relevant quality attributes for mobile ...

  11. Retirement Applicant Satisfaction Survey Results

    Data.gov (United States)

    Social Security Administration — This dataset contains information about the Retirement Applicant Survey (RAS). The survey measured satisfaction results with the retirement application process. The...

  12. Applications of Cell Microencapsulation.

    Science.gov (United States)

    Opara, Emmanuel C

    2017-01-01

    The goal of this chapter is to provide an overview of the different purposes for which the cell microencapsulation technology can be used. These include immunoisolation of non-autologous cells used for cell therapy; immobilization of cells for localized (targeted) delivery of therapeutic products to ablate, repair, or regenerate tissue; simultaneous delivery of multiple therapeutic agents in cell therapy; spatial compartmentalization of cells in complex tissue engineering; expansion of cells in culture; and production of different probiotics and metabolites for industrial applications. For each of these applications, specific examples are provided to illustrate how the microencapsulation technology can be utilized to achieve the purpose. However, successful use of the cell microencapsulation technology for whatever purpose will ultimately depend upon careful consideration for the choice of the encapsulating polymers, the method of fabrication (cross-linking) of the microbeads, which affects the permselectivity, the biocompatibility and the mechanical strength of the microbeads as well as environmental parameters such as temperature, humidity, osmotic pressure, and storage solutions.The various applications discussed in this chapter are illustrated in the different chapters of this book and where appropriate relevant images of the microencapsulation products are provided. It is hoped that this outline of the different applications of cell microencapsulation would provide a good platform for tissue engineers, scientists, and clinicians to design novel tissue constructs and products for therapeutic and industrial applications.

  13. Nonlinear Optics and Applications

    Science.gov (United States)

    Abdeldayem, Hossin A. (Editor); Frazier, Donald O. (Editor)

    2007-01-01

    Nonlinear optics is the result of laser beam interaction with materials and started with the advent of lasers in the early 1960s. The field is growing daily and plays a major role in emerging photonic technology. Nonlinear optics play a major role in many of the optical applications such as optical signal processing, optical computers, ultrafast switches, ultra-short pulsed lasers, sensors, laser amplifiers, and many others. This special review volume on Nonlinear Optics and Applications is intended for those who want to be aware of the most recent technology. This book presents a survey of the recent advances of nonlinear optical applications. Emphasis will be on novel devices and materials, switching technology, optical computing, and important experimental results. Recent developments in topics which are of historical interest to researchers, and in the same time of potential use in the fields of all-optical communication and computing technologies, are also included. Additionally, a few new related topics which might provoke discussion are presented. The book includes chapters on nonlinear optics and applications; the nonlinear Schrodinger and associated equations that model spatio-temporal propagation; the supercontinuum light source; wideband ultrashort pulse fiber laser sources; lattice fabrication as well as their linear and nonlinear light guiding properties; the second-order EO effect (Pockels), the third-order (Kerr) and thermo-optical effects in optical waveguides and their applications in optical communication; and, the effect of magnetic field and its role in nonlinear optics, among other chapters.

  14. Practical applications of phosphors

    CERN Document Server

    Yen, William M; Yamamoto, Hajime

    2006-01-01

    Drawn from the second edition of the best-selling Phosphor Handbook, Practical Applications of Phosphors outlines methods for the production of various phosphors and discusses a broad spectrum of applications. Beginning with methods for synthesis and related technologies, the book sets the stage by classifying and then explaining practical phosphors according to usage. It describes the operating principle and structure of phosphor devices and the phosphor characteristics required for a given device, then covers the manufacturing processes and characteristics of phosphors. The book discusses research and development currently under way on phosphors with potential for practical usage and touches briefly on phosphors that have played a historical role, but are no longer of practical use. It provides a comprehensive treatment of applications including lamps and cathode-ray tubes, x-ray and ionizing radiation, and for vacuum fluorescent and field emission displays and covers inorganic and organic electroluminescen...

  15. Radioisotope applications in industry

    International Nuclear Information System (INIS)

    Frevert, E.

    1983-03-01

    The practical applications of the isotope technique are reported and illustrated by examples of works of the Department of Isotope Application of the Austrian Research Centre Seibersdorf. First the field of process controlling device and controll is described, including thickness, density and moisture gauging, the estimation of coatings and material compounds, the location of material defects and the level control. After this a detailed description of all kinds of tracer investigations is given like measurements of flow rate, intermixture, distribution and volume, investigations of corrosion, wear and lubrication and locations of all kind. A short description of gas ionisation, sources of light and isotope batteries is mentioned. Finally a general view of the applications in the fields of chemistry, biology, agriculture and medicine and the most important of the Austrian law of protective screen and its enactment are given. (Author) [de

  16. Lie algebras and applications

    CERN Document Server

    Iachello, Francesco

    2015-01-01

    This course-based primer provides an introduction to Lie algebras and some of their applications to the spectroscopy of molecules, atoms, nuclei and hadrons. In the first part, it concisely presents the basic concepts of Lie algebras, their representations and their invariants. The second part includes a description of how Lie algebras are used in practice in the treatment of bosonic and fermionic systems. Physical applications considered include rotations and vibrations of molecules (vibron model), collective modes in nuclei (interacting boson model), the atomic shell model, the nuclear shell model, and the quark model of hadrons. One of the key concepts in the application of Lie algebraic methods in physics, that of spectrum generating algebras and their associated dynamic symmetries, is also discussed. The book highlights a number of examples that help to illustrate the abstract algebraic definitions and includes a summary of many formulas of practical interest, such as the eigenvalues of Casimir operators...

  17. Discrete mathematics with applications

    CERN Document Server

    Koshy, Thomas

    2003-01-01

    This approachable text studies discrete objects and the relationsips that bind them. It helps students understand and apply the power of discrete math to digital computer systems and other modern applications. It provides excellent preparation for courses in linear algebra, number theory, and modern/abstract algebra and for computer science courses in data structures, algorithms, programming languages, compilers, databases, and computation.* Covers all recommended topics in a self-contained, comprehensive, and understandable format for students and new professionals * Emphasizes problem-solving techniques, pattern recognition, conjecturing, induction, applications of varying nature, proof techniques, algorithm development and correctness, and numeric computations* Weaves numerous applications into the text* Helps students learn by doing with a wealth of examples and exercises: - 560 examples worked out in detail - More than 3,700 exercises - More than 150 computer assignments - More than 600 writing projects*...

  18. Applications of stable isotopes

    International Nuclear Information System (INIS)

    Gregg, C.T.

    1977-01-01

    Clinical applications include the galactose breath test which consists of oral administration of 13 C-labeled galactose and measurement of the 13 C content of respired CO 2 as a function of time in patients with cirrhotic livers for diagnosis of liver dysfunction. Another application was the breath test to study glucose metabolism in children. Respired 13 CO 2 from ingested glucose- 13 C was measured for normal and diabetic children. Studies on mice in which 60 percent of the body carbon was replaced with 13 C failed to show significant effects of the isotope. Studies on biochemical applications include nuclear magnetic resonance studies of 13 C-labeled amino acids from Chlorella pyrenoidosa; studies on 15 N nmr spectra of arginine-guanidino- 13 C-2,3-- 15 N 2 as a function of pH; and isolation of fatty acids from algae

  19. Elasticity theory and applications

    CERN Document Server

    Saada, Adel S; Hartnett, James P; Hughes, William F

    2013-01-01

    Elasticity: Theory and Applications reviews the theory and applications of elasticity. The book is divided into three parts. The first part is concerned with the kinematics of continuous media; the second part focuses on the analysis of stress; and the third part considers the theory of elasticity and its applications to engineering problems. This book consists of 18 chapters; the first of which deals with the kinematics of continuous media. The basic definitions and the operations of matrix algebra are presented in the next chapter, followed by a discussion on the linear transformation of points. The study of finite and linear strains gradually introduces the reader to the tensor concept. Orthogonal curvilinear coordinates are examined in detail, along with the similarities between stress and strain. The chapters that follow cover torsion; the three-dimensional theory of linear elasticity and the requirements for the solution of elasticity problems; the method of potentials; and topics related to cylinders, ...

  20. Functional analysis and applications

    CERN Document Server

    Siddiqi, Abul Hasan

    2018-01-01

    This self-contained textbook discusses all major topics in functional analysis. Combining classical materials with new methods, it supplies numerous relevant solved examples and problems and discusses the applications of functional analysis in diverse fields. The book is unique in its scope, and a variety of applications of functional analysis and operator-theoretic methods are devoted to each area of application. Each chapter includes a set of problems, some of which are routine and elementary, and some of which are more advanced. The book is primarily intended as a textbook for graduate and advanced undergraduate students in applied mathematics and engineering. It offers several attractive features making it ideally suited for courses on functional analysis intended to provide a basic introduction to the subject and the impact of functional analysis on applied and computational mathematics, nonlinear functional analysis and optimization. It introduces emerging topics like wavelets, Gabor system, inverse pro...

  1. Superconductivity: materials and applications

    International Nuclear Information System (INIS)

    Duchateau, J.L.; Kircher, F.; Leveque, J.; Tixador, P.

    2008-01-01

    This digest paper presents the different types of superconducting materials: 1 - the low-TC superconductors: the multi-filament composite as elementary constituent, the world production of NbTi, the superconducting cables of the LHC collider and of the ITER tokamak; 2 - the high-TC superconductors: BiSrCaCuO (PIT 1G) ribbons and wires, deposited coatings; 3 - application to particle physics: the the LHC collider of the CERN, the LHC detectors; 4 - applications to thermonuclear fusion: Tore Supra and ITER tokamaks; 5 - NMR imaging: properties of superconducting magnets; 6 - applications in electrotechnics: cables, motors and alternators, current limiters, transformers, superconducting energy storage systems (SMES). (J.S.)

  2. Applications of interval computations

    CERN Document Server

    Kreinovich, Vladik

    1996-01-01

    Primary Audience for the Book • Specialists in numerical computations who are interested in algorithms with automatic result verification. • Engineers, scientists, and practitioners who desire results with automatic verification and who would therefore benefit from the experience of suc­ cessful applications. • Students in applied mathematics and computer science who want to learn these methods. Goal Of the Book This book contains surveys of applications of interval computations, i. e. , appli­ cations of numerical methods with automatic result verification, that were pre­ sented at an international workshop on the subject in EI Paso, Texas, February 23-25, 1995. The purpose of this book is to disseminate detailed and surveyed information about existing and potential applications of this new growing field. Brief Description of the Papers At the most fundamental level, interval arithmetic operations work with sets: The result of a single arithmetic operation is the set of all possible results as the o...

  3. Applications of photovoltaics

    International Nuclear Information System (INIS)

    Pearsall, N.

    1999-01-01

    The author points out that although photovoltaics can be used for generating electricity for the same applications as many other means of generation, they really come into their own where disadvantages associated with an intermittent unpredictable supply are not severe. The paper discusses the advantages and disadvantages to be taken into account when considering a photovoltaic power system. Five main applications, based on the system features, are listed and explained. They are: consumer, professional, rural electrification, building-integrated, centralised grid connected and space power. A brief history of the applications of photovoltaics is presented with statistical data on the growth of installed capacity since 1992. The developing market for photovoltaics is discussed together with how environmental issues have become a driver for development of building-integrated photovoltaics

  4. Optimized packings with applications

    CERN Document Server

    Pintér, János

    2015-01-01

    This volume presents a selection of case studies that address a substantial range of optimized object packings (OOP) and their applications. The contributing authors are well-recognized researchers and practitioners. The mathematical modelling and numerical solution aspects of each application case study are presented in sufficient detail. A broad range of OOP problems are discussed: these include various specific and non-standard container loading and object packing problems, as well as the stowing of hazardous and other materials on container ships, data centre resource management, automotive engineering design, space station logistic support, cutting and packing problems with placement constraints, the optimal design of LED street lighting, robust sensor deployment strategies, spatial scheduling problems, and graph coloring models and metaheuristics for packing applications. Novel points of view related to model development and to computational nonlinear, global, mixed integer optimization and heuristic st...

  5. Engineering Web Applications

    DEFF Research Database (Denmark)

    Casteleyn, Sven; Daniel, Florian; Dolog, Peter

    Nowadays, Web applications are almost omnipresent. The Web has become a platform not only for information delivery, but also for eCommerce systems, social networks, mobile services, and distributed learning environments. Engineering Web applications involves many intrinsic challenges due...... to their distributed nature, content orientation, and the requirement to make them available to a wide spectrum of users who are unknown in advance. The authors discuss these challenges in the context of well-established engineering processes, covering the whole product lifecycle from requirements engineering through...... design and implementation to deployment and maintenance. They stress the importance of models in Web application development, and they compare well-known Web-specific development processes like WebML, WSDM and OOHDM to traditional software development approaches like the waterfall model and the spiral...

  6. Plasmonics theory and applications

    CERN Document Server

    Shahbazyan, Tigran V

    2014-01-01

    This contributed volume summarizes recent theoretical developments in plasmonics and its applications in physics, chemistry, materials science, engineering, and medicine. It focuses on recent advances in several major areas of plasmonics including plasmon-enhanced spectroscopies, light scattering, many-body effects, nonlinear optics, and ultrafast dynamics. The theoretical and computational methods used in these investigations include electromagnetic calculations, density functional theory calculations, and nonequilibrium electron dynamics calculations. The book presents a comprehensive overview of these methods as well as their applications to various current problems of interest.

  7. Pump characteristics and applications

    CERN Document Server

    Volk, Michael

    2013-01-01

    Providing a wealth of information on pumps and pump systems, Pump Characteristics and Applications, Third Edition details how pump equipment is selected, sized, operated, maintained, and repaired. The book identifies the key components of pumps and pump accessories, introduces the basics of pump and system hydraulics as well as more advanced hydraulic topics, and details various pump types, as well as special materials on seals, motors, variable frequency drives, and other pump-related subjects. It uses example problems throughout the text, reinforcing the practical application of the formulae

  8. Application of stepping motor

    International Nuclear Information System (INIS)

    1980-10-01

    This book is divided into three parts, which is about practical using of stepping motor. The first part has six chapters. The contents of the first part are about stepping motor, classification of stepping motor, basic theory og stepping motor, characteristic and basic words, types and characteristic of stepping motor in hybrid type and basic control of stepping motor. The second part deals with application of stepping motor with hardware of stepping motor control, stepping motor control by microcomputer and software of stepping motor control. The last part mentions choice of stepping motor system, examples of stepping motor, measurement of stepping motor and practical cases of application of stepping motor.

  9. Experimental approaches and applications

    CERN Document Server

    Crasemann, Bernd

    1975-01-01

    Atomic Inner-Shell Processes, Volume II: Experimental Approaches and Applications focuses on the physics of atomic inner shells, with emphasis on experimental aspects including the use of radioactive atoms for studies of atomic transition probabilities. Surveys of modern techniques of electron and photon spectrometry are also presented, and selected practical applications of inner-shell processes are outlined. Comprised of six chapters, this volume begins with an overview of the general principles underlying the experimental techniques that make use of radioactive isotopes for inner-sh

  10. Superconductors and their applications

    Energy Technology Data Exchange (ETDEWEB)

    Fahlenbrach, H

    1976-05-01

    A brief introduction is given to the physics and technology of superconductivity, covering the proposed application of V/sub 3/Ga and Nb/sub 3/Sn which have a Tc at 20K and of Nb/sub 3/Ge (in thin layers) with a Tc of up to 23K. A table is given of the latest materials with Tc values around 11K, and high Hc values (up to 440 kA/cm), all based on molybdenum compounds. A brief discussion of practical applications includes a Hover vehicle with linear motor propulsion and low current usage in measuring and computing devices based on the Josephson effect.

  11. Medical applications of accelerators

    CERN Document Server

    Rossi, Sandro

    1998-01-01

    At Present, about five thousands accelerators are devoted to biomedical applications. They are mainly used in radiotherapy, research and medical radioisotopes production. In this framework oncological hadron-therapy deserves particular attention since it represents a field in rapid evolution thanks to the joint efforts of laboratories with long experiences in particle physics. It is the case of CERN where the design of an optimised synchrotron for medical applications has been pursued. These lectures present these activities with particular attention to the new developments which are scientifically interesting and/or economically promising.

  12. Gas solubilities widespread applications

    CERN Document Server

    Gerrard, William

    1980-01-01

    Gas Solubilities: Widespread Applications discusses several topics concerning the various applications of gas solubilities. The first chapter of the book reviews Henr's law, while the second chapter covers the effect of temperature on gas solubility. The third chapter discusses the various gases used by Horiuti, and the following chapters evaluate the data on sulfur dioxide, chlorine data, and solubility data for hydrogen sulfide. Chapter 7 concerns itself with solubility of radon, thoron, and actinon. Chapter 8 tackles the solubilities of diborane and the gaseous hydrides of groups IV, V, and

  13. Medical applications of cyclotrons

    International Nuclear Information System (INIS)

    Jean, R.; Fauchet, M.

    1978-01-01

    Isochronous cyclotrons used to accelerate different charged particles (protons, deuterons, alphas...) at variable energies, have important medical applications, for neutron teletherapy, in vivo or in vitro activation analysis or production of short-lived radioisotopes for nuclear medicine. The characteristics of the cyclotron presently available are described for these three applications (low energy 'compact' cyclotrons, cyclotrons of intermediate and high energies), and their advantages are discussed from the points of view of the medical requirements, the financial investments and the results obtained. (orig.) [de

  14. Modular Mobile Application Design

    Directory of Open Access Journals (Sweden)

    Jim Hahn

    2012-10-01

    Full Text Available This article describes the development of the Minrva library app for Android phones. The decisions to build a native application with Java and use a modular design are discussed. The application includes five modules: catalog search, in-building navigation, a barcode scanning feature, and up to date notifications of circulating technology availability. A sixth module, Amazon recommendations, that is not included in the version of the app that was released is also discussed. The article also reports on the findings of two rounds of usability testing and the plans for future development of the app.

  15. Location Based Application Availability

    Science.gov (United States)

    Naeem Akram, Raja; Markantonakis, Konstantinos; Mayes, Keith

    Smart cards are being integrated into a diverse range of industries: ranging from banking, telecom, transport, home/office access control to health and E-passport. Traditionally, cardholders are required to carry a smart card for each application. However, recent developments in the Near Field Communication (NFC) have renewed the interest in multiple applications for different services on a single device. This paper builds onto the NFC initiative and avoids the smart card ownership issues that hinder the adoption of such devices. The proposal integrates the Global Positioning System with the NFC in mobile phones to provide a ubiquitously and flexible service access model.

  16. Developing Web Applications

    CERN Document Server

    Moseley, Ralph

    2007-01-01

    Building applications for the Internet is a complex and fast-moving field which utilizes a variety of continually evolving technologies. Whether your perspective is from the client or server side, there are many languages to master - X(HTML), JavaScript, PHP, XML and CSS to name but a few. These languages have to work together cleanly, logically and in harmony with the systems they run on, and be compatible with any browsers with which they interact. Developing Web Applications presents script writing and good programming practice but also allows students to see how the individual technologi

  17. Optimization : insights and applications

    CERN Document Server

    Brinkhuis, Jan

    2005-01-01

    This self-contained textbook is an informal introduction to optimization through the use of numerous illustrations and applications. The focus is on analytically solving optimization problems with a finite number of continuous variables. In addition, the authors provide introductions to classical and modern numerical methods of optimization and to dynamic optimization. The book's overarching point is that most problems may be solved by the direct application of the theorems of Fermat, Lagrange, and Weierstrass. The authors show how the intuition for each of the theoretical results can be s

  18. Laravel application development blueprints

    CERN Document Server

    Kiliçdagi, Arda

    2013-01-01

    Follow along as we work together to build 10 different applications using Laravel 4. Since each chapter is devoted to the design of a different application, there is no need to read the book in any particular order. Instead, you can pick and choose the blueprints that are of most interest to you and dive right in.This book is for intermediate to advanced level PHP programmers who want to master Laravel. It's assumed that you will have some experience with PHP already. This book is also for those who are already using a different PHP framework and are looking for better solutions.

  19. Nanoelectronic device applications handbook

    CERN Document Server

    Morris, James E

    2013-01-01

    Nanoelectronic Device Applications Handbook gives a comprehensive snapshot of the state of the art in nanodevices for nanoelectronics applications. Combining breadth and depth, the book includes 68 chapters on topics that range from nano-scaled complementary metal-oxide-semiconductor (CMOS) devices through recent developments in nano capacitors and AlGaAs/GaAs devices. The contributors are world-renowned experts from academia and industry from around the globe. The handbook explores current research into potentially disruptive technologies for a post-CMOS world.These include: Nanoscale advance

  20. Tunable laser applications

    CERN Document Server

    Duarte, FJ

    2008-01-01

    Introduction F. J. Duarte Spectroscopic Applications of Tunable Optical Parametric Oscillators B. J. Orr, R. T. White, and Y. He Solid-State Dye Lasers Costela, I. García-Moreno, and R. Sastre Tunable Lasers Based on Dye-Doped Polymer Gain Media Incorporating Homogeneous Distributions of Functional Nanoparticles F. J. Duarte and R. O. James Broadly Tunable External-Cavity Semiconductor Lasers F. J. Duarte Tunable Fiber Lasers T. M. Shay and F. J. Duarte Fiber Laser Overview and Medical Applications

  1. Cluster analysis for applications

    CERN Document Server

    Anderberg, Michael R

    1973-01-01

    Cluster Analysis for Applications deals with methods and various applications of cluster analysis. Topics covered range from variables and scales to measures of association among variables and among data units. Conceptual problems in cluster analysis are discussed, along with hierarchical and non-hierarchical clustering methods. The necessary elements of data analysis, statistics, cluster analysis, and computer implementation are integrated vertically to cover the complete path from raw data to a finished analysis.Comprised of 10 chapters, this book begins with an introduction to the subject o

  2. Mixtures Estimation and Applications

    CERN Document Server

    Mengersen, Kerrie; Titterington, Mike

    2011-01-01

    This book uses the EM (expectation maximization) algorithm to simultaneously estimate the missing data and unknown parameter(s) associated with a data set. The parameters describe the component distributions of the mixture; the distributions may be continuous or discrete. The editors provide a complete account of the applications, mathematical structure and statistical analysis of finite mixture distributions along with MCMC computational methods, together with a range of detailed discussions covering the applications of the methods and features chapters from the leading experts on the subject

  3. Language Modelling for Collaborative Filtering: Application to Job Applicant Matching

    OpenAIRE

    Schmitt , Thomas; Gonard , François; Caillou , Philippe; Sebag , Michèle

    2017-01-01

    International audience; This paper addresses a collaborative retrieval problem , the recommendation of job ads to applicants. Specifically, two proprietary databases are considered. The first one focuses on the context of unskilled low-paid jobs/applicants; the second one focuses on highly qualified jobs/applicants. Each database includes the job ads and applicant resumes together with the collaborative filtering data recording the applicant clicks on job ads. The proposed approach, called LA...

  4. Prospective radiological dose assessment. Amersham plc (Amersham site) variation application December 1998

    International Nuclear Information System (INIS)

    Allott, R.

    2001-01-01

    Amersham plc (previously Nycomed-Amersham plc) submitted an application to the Environment Agency in December 1998 for a variation to their radioactive waste discharge authorisations granted under the Radioactive Substances Act 1993. The application requested a reduction in the discharge limits for certain radionuclides and no change for the remaining radionuclides. Amersham plc undertook a further review of their discharge requirements and submitted a new assessment for revised limits in January 2001. This report provides an assessment of the radiological implications of discharges at these revised limits requested by Amersham plc and the limits proposed by the Agency. It has been prepared by the National Compliance Assessment Service at the request of Thames Region to support their determination of the application. Four candidate critical groups were identified who could be exposed to discharges from the Amersham site: 1) Sewage workers at the Maple Lodge sewage works who might be exposed to external radiation from discharges contained within sewage and inadvertently inhale or ingest sewage. 2) Anglers on the Grand Union Canal who eat a small proportion of their annual catch of freshwater fish, who drink water abstracted solely from the River Colne and eat vegetables irrigated by water from the canal. 3) Persons living closest to site who eat locally produced food. 4) Dog walkers living near to site who eat locally produced food. For continuous discharges at the Agency's proposed annual limits, the highest dose of 160 μSv/y is predicted to be received by infants who live closest to the site and eat locally produced food. Therefore, this has been identified as the critical group. Children and adults living at the same location and eating locally produced food receive doses of 140 μSv/y and 130 μSv/y respectively. The critical group dose is less than the source constraint of 300 μSv/y. The dose is dominated by direct radiation from the site (110 μSv/y) and the

  5. Distributed Parameter Modelling Applications

    DEFF Research Database (Denmark)

    Sales-Cruz, Mauricio; Cameron, Ian; Gani, Rafiqul

    2011-01-01

    and the development of a short-path evaporator. The oil shale processing problem illustrates the interplay amongst particle flows in rotating drums, heat and mass transfer between solid and gas phases. The industrial application considers the dynamics of an Alberta-Taciuk processor, commonly used in shale oil and oil...... the steady state, distributed behaviour of a short-path evaporator....

  6. Forensic Applications of LIBS

    Science.gov (United States)

    Hark, Richard R.; East, Lucille J.

    Forensic science is broadly defined as the application of science to matters of the law. Practitioners typically use multidisciplinary scientific techniques for the analysis of physical evidence in an attempt to establish or exclude an association between a suspect and the scene of a crime.

  7. Beaming teaching application

    DEFF Research Database (Denmark)

    Markovic, Milos; Madsen, Esben; Olesen, Søren Krarup

    2012-01-01

    BEAMING is a telepresence research project aiming at providing a multimodal interaction between two or more participants located at distant locations. One of the BEAMING applications allows a distant teacher to give a xylophone playing lecture to the students. Therefore, rendering of the xylophon...

  8. Medical applications of colloids

    CERN Document Server

    Matijevic, Egon

    2008-01-01

    The first book of its type on the medical and biomedical applications of colloids, although there are some related titles on different topicsDiscusses the effects of uniform particles in drug formulations and releaseEvaluates particle transport and deposition in the human body.

  9. Permit application modifications

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-11-01

    This document contains the Permit Application Modifications for the Y-12 Industrial Landfill V site on the Oak Ridge Reservation. These modifications include the assessment of stability of the proposed Landfill V under static and loading conditions. Analyses performed include the general slope stability, veneer stability of the bottom liner and cover system, and a liquefaction potential assessment of the foundation soils.

  10. Applications Using AIRS Data

    Science.gov (United States)

    Ray, S. E.; Pagano, T. S.; Fetzer, E. J.; Lambrigtsen, B.; Olsen, E. T.; Teixeira, J.; Licata, S. J.; Hall, J. R.; Thompson, C. K.

    2015-12-01

    The Atmospheric Infrared Sounder (AIRS) on NASA's Aqua spacecraft has been returning daily global observations of Earth's atmospheric constituents and properties since 2002. With a 12-year data record and daily, global observations in near real-time, AIRS data can play a role in applications that fall under many of the NASA Applied Sciences focus areas. For vector-borne disease, research is underway using AIRS near surface retrievals to assess outbreak risk, mosquito incubation periods and epidemic potential for dengue fever, malaria, and West Nile virus. For drought applications, AIRS temperature and humidity data are being used in the development of new drought indicators and improvement in the understanding of drought development. For volcanic hazards, new algorithms using AIRS data are in development to improve the reporting of sulfur dioxide concentration, the burden and height of volcanic ash and dust, all of which pose a safety threat to aircraft. In addition, anomaly maps of many of AIRS standard products are being produced to help highlight "hot spots" and illustrate trends. To distribute it's applications imagery, AIRS is leveraging existing NASA data frameworks and organizations to facilitate archiving, distribution and participation in the BEDI. This poster will communicate the status of the applications effort for the AIRS Project and provide examples of new maps designed to best communicate the AIRS data.

  11. Microfluidics for medical applications

    NARCIS (Netherlands)

    van den Berg, Albert; van den Berg, A.; Segerink, L.I.; Segerink, Loes Irene; Unknown, [Unknown

    2015-01-01

    Lab-on-a-chip devices for point of care diagnostics have been present in clinics for several years now. Alongside their continual development, research is underway to bring the organs and tissue on-a-chip to the patient, amongst other medical applications of microfluidics. This book provides the

  12. Intertwiners and their applications

    International Nuclear Information System (INIS)

    Breitenecker, M.; Gruemm, H.R.

    1982-01-01

    The concept of 'intertwiner' - less familiar to physicists - appears to be quite useful for the applications of group theory. We present as examples the change of ground field as well as a basis-free version of the Wigner-Eckart theorem. (Author)

  13. Applications of QCD

    International Nuclear Information System (INIS)

    Landshoff, P.V.

    1983-01-01

    The author describes the application of quantum chromodynamics to deep inelastic lepton scattering, the Drell-Yan process, e + e - -annihilation, #betta##betta#-physics, large psub(T) processes, and wide angle quark-quark scattering. Furthermore higher order terms are considered. (HSI)

  14. Thermoelectricity: materials and applications

    International Nuclear Information System (INIS)

    Elberg, S.; Mathonnet, P.

    1975-01-01

    After a brief recall of the basic principles of thermoelectricity, the essential characteristics intervening in the different thermoelectric devices operating modes are defined. Properties of the materials the most used nowadays and performances of the apparatus that they allow to realize are indicated. Advantages and drawbacks of the principal applications in the form of electrical generators, refrigerators and heat pumps are pointed out [fr

  15. Biomedical applications engineering tasks

    Science.gov (United States)

    Laenger, C. J., Sr.

    1976-01-01

    The engineering tasks performed in response to needs articulated by clinicians are described. Initial contacts were made with these clinician-technology requestors by the Southwest Research Institute NASA Biomedical Applications Team. The basic purpose of the program was to effectively transfer aerospace technology into functional hardware to solve real biomedical problems.

  16. Application of ion exchangers

    International Nuclear Information System (INIS)

    Markhol, M.

    1985-01-01

    Existing methods of multi-element separation for radiochemical analysis are considered. The majority of existing methods is noted to be based on application of organic and inorganic ion exchangers. Distillation, coprecipitation, extraction as well as combination of the above methods are also used. Concrete flowsheets of multi-element separation are presented

  17. Business Applications of WAP.

    Science.gov (United States)

    van Steenderen, Margaret

    2002-01-01

    Explains the development of WAP (wireless application protocol), how it works, and what the major advantages and disadvantages are, especially when applied to the use of information. Topics include standardization; mobile communications; the effect of WAP on business tools, electronic commerce, and information services; consumers; corporate users;…

  18. Permit application modifications

    International Nuclear Information System (INIS)

    1995-11-01

    This document contains the Permit Application Modifications for the Y-12 Industrial Landfill V site on the Oak Ridge Reservation. These modifications include the assessment of stability of the proposed Landfill V under static and loading conditions. Analyses performed include the general slope stability, veneer stability of the bottom liner and cover system, and a liquefaction potential assessment of the foundation soils

  19. Knotoids, Braidoids and Applications

    Directory of Open Access Journals (Sweden)

    Neslihan Gügümcü

    2017-12-01

    Full Text Available This paper is an introduction to the theory of braidoids. Braidoids are geometric objects analogous to classical braids, forming a counterpart theory to the theory of knotoids. We introduce these objects and their topological equivalences, and we conclude with a potential application to the study of proteins.

  20. Learning analytics dashboard applications

    NARCIS (Netherlands)

    Verbert, K.; Duval, E.; Klerkx, J.; Govaerts, S.; Santos, J.L.

    2013-01-01

    This article introduces learning analytics dashboards that visualize learning traces for learners and teachers. We present a conceptual framework that helps to analyze learning analytics applications for these kinds of users. We then present our own work in this area and compare with 15 related