WorldWideScience

Sample records for nuclear security human

  1. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  2. Formulating Human Resources Development Strategies for Nuclear R and D, Safety and Security

    Energy Technology Data Exchange (ETDEWEB)

    Min, B. J.; Kim, M. K.; Son, M. Y.

    2010-05-15

    Enforced by the recent launch of the 4th National Power Expansion Plan and the 1st Basic Plan for National Energy Policy with an ambitious goal of achieving 'Low CO2 Emission and Green Growth', a rapid expansion of nuclear technology development has been reemphasized. In addition, the nation, being a potential exporter of nuclear power plants and nuclear technologies strives to explore their exports markets. In response, it is inevitable to set the priority in human resource development (HRD) as nuclear technology development both requires and fosters HRD which in turn, enables to meet the successful implementation of nuclear power expansion. A continuous, consistent and well-managed programme of HRD is crucial to assure continuity over time in the needed capacities, skills and knowledge, and to establish and maintain a cadre of manpower variously trained in different nuclear-related skills and educated in nuclear relevant fields. The objective of the study is to conduct comprehensive quantitative analyses to estimate future human resources requirements, particularly in the field of nuclear R and D, safety and security in order to establish an appropriate long-term nuclear HRD plan

  3. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  4. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  5. Nuclear Security Futures Scenarios.

    Energy Technology Data Exchange (ETDEWEB)

    Keller, Elizabeth James Kistin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hayden, Nancy Kay [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Passell, Howard D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Malczynski, Leonard A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-01-01

    This report provides an overview of the scenarios used in strategic futures workshops conducted at Sandia on September 21 and 29, 2016. The workshops, designed and facilitated by analysts in Center 100, used scenarios to enable thought leaders to think collectively about the changing aspects of global nuclear security and the potential implications for the US Government and Sandia National Laboratories.

  6. The Security of Russia's Nuclear Arsenal: The Human Factor

    Energy Technology Data Exchange (ETDEWEB)

    Ball, D.Y.

    1999-10-12

    Assertions by the Russian military that all of their nuclear weapons are secure against theft and that nuclear units within the military are somehow insulated from the problems plaguing the Russian military should not be accepted uncritically. Accordingly, we should not give unwarranted credence to the pronouncements of military figures like Cal.-Gen. Igor Valynkin, Chief of the Defense Ministry's 12th Main Directorate, which oversees the country's nuclear arsenal. He contends that ''Russian nuclear weapons are under reliable supervision'' and that ''talk about the unreliability of our control over nuclear weapons has only one pragmatic goal--to convince international society that the country is incapable of maintaining nuclear safety and to introduce international oversight over those weapons, as it is done, for example, in Iraq.'' While the comparison to Iraq is preposterous, many analysts might agree with Valynkin's sanguine appraisal of the security of Russia's nuclear weapons. In contrast, I argue that the numerous difficulties confronting the military as a whole should cause concern in the West over the security of the Russian nuclear arsenal.

  7. Nuclear and radiological Security: Introduction.

    Energy Technology Data Exchange (ETDEWEB)

    Miller, James Christopher [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-02-24

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  8. Nuclear Threats and Security

    OpenAIRE

    Garry Jacobs; Winston P. Nagan

    2012-01-01

    This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legalit...

  9. Nuclear Security for Floating Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Skiba, James M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Scherer, Carolynn P. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-10-13

    Recently there has been a lot of interest in small modular reactors. A specific type of these small modular reactors (SMR,) are marine based power plants called floating nuclear power plants (FNPP). These FNPPs are typically built by countries with extensive knowledge of nuclear energy, such as Russia, France, China and the US. These FNPPs are built in one country and then sent to countries in need of power and/or seawater desalination. Fifteen countries have expressed interest in acquiring such power stations. Some designs for such power stations are briefly summarized. Several different avenues for cooperation in FNPP technology are proposed, including IAEA nuclear security (i.e. safeguards), multilateral or bilateral agreements, and working with Russian design that incorporates nuclear safeguards for IAEA inspections in non-nuclear weapons states

  10. Nuclear Physics for National Security

    Science.gov (United States)

    Mayo, Douglass

    2006-10-01

    Being a nuclear physicist and working at a national laboratory provides many opportunities to ply one's skills in support of national security and the benefit of all mankind. Over the last 40 years, Los Alamos National Laboratory has been pioneering the field of Domestic and International Safeguards through the research and development of instrumentation and systems used to monitor nuclear materials and nuclear facilities. With a projected increase in the use of nuclear energy, effective systems must be designed to reduce the possibility that nuclear materials may be diverted for used in weapons. The recent focus has been the many applications of radiation detection used for safeguarding nuclear material and to support Homeland Security. There is a critical need for trained nuclear scientists who can understand and overcome measurement complexities, combinations of multiple sensor inputs, data reduction, and automated analysis for these applications. This talk will focus on the opportunities and experiences afforded physicists in the support of national security, beyond the weapons program and travel to interesting locales.

  11. Human Security Agendas

    Institute of Scientific and Technical Information of China (English)

    Alan Hunter

    2012-01-01

    Ⅰ.IntroductionThe need for governments and international organisations to gain a better understanding of "security" is ever more urgent.For example in the conflict in Libya in early 2011,many security dilemmas were visible:the protection of Libyan civilians,the security of the regime,whether and how the UN or NATO should intervene,whether Europe would be threatened with a massive refugee flow,how to protect or evacuate foreign citizens (including Chinese),how to secure food and medical supplies in the midst of armed conflict.Such events may be termed "complex emergencies" which often raise legal, military and humanitarian issues simultaneously.International law and practice do not provide clear guidelines on such situations,and responses can be random,contingent on a variety of factors.Traditional concepts of security,for example protection of national borders,are certainly still relevant and legally enforceable,but more sophisticated concepts are needed to respond to security dilemmas in today's globalised world.Human security as a concept was first developed within the UN system in the 1990s,and set out,for example,in Human Security Now [1] The first section of this paper tracks the development of Human Security discourse,and also examines the broadening of the "security"concept in recent years.The second section reports on institutions with a specific interest in Human Security,for example within the UN system and in universities.The third section acknowledges some critiques of the Human Security paradigm.The last section reports on new directions that may enrich the Human Security agenda.

  12. Conducting a Nuclear Security Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Snell, Mark K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-06-01

    There are three general steps that make up a nuclear security assessment: 1. Develop data Libraries that indicate how effective the physical protection measures are both individually but also as parts of subsystems and actual systems. 2. Perform Path Analysis 3. Perform Scenario Analysis Depending upon the nature and objectives of the assessment not all three of these steps may need to be performed; for example, at facilities with simple layouts there may not be a need to perform path analysis. Each of these steps is described within this report.

  13. Human factors in network security

    OpenAIRE

    Jones, Francis B.

    1991-01-01

    Human factors, such as ethics and education, are important factors in network information security. This thesis determines which human factors have significant influence on network security. Those factors are examined in relation to current security devices and procedures. Methods are introduced to evaluate security effectiveness by incorporating the appropriate human factors into network security controls

  14. Compressive sensing for nuclear security.

    Energy Technology Data Exchange (ETDEWEB)

    Gestner, Brian Joseph

    2013-12-01

    Special nuclear material (SNM) detection has applications in nuclear material control, treaty verification, and national security. The neutron and gamma-ray radiation signature of SNMs can be indirectly observed in scintillator materials, which fluoresce when exposed to this radiation. A photomultiplier tube (PMT) coupled to the scintillator material is often used to convert this weak fluorescence to an electrical output signal. The fluorescence produced by a neutron interaction event differs from that of a gamma-ray interaction event, leading to a slightly different pulse in the PMT output signal. The ability to distinguish between these pulse types, i.e., pulse shape discrimination (PSD), has enabled applications such as neutron spectroscopy, neutron scatter cameras, and dual-mode neutron/gamma-ray imagers. In this research, we explore the use of compressive sensing to guide the development of novel mixed-signal hardware for PMT output signal acquisition. Effectively, we explore smart digitizers that extract sufficient information for PSD while requiring a considerably lower sample rate than conventional digitizers. Given that we determine the feasibility of realizing these designs in custom low-power analog integrated circuits, this research enables the incorporation of SNM detection into wireless sensor networks.

  15. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

  16. Security Guarantees and Nuclear Non-Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Bruno Tertrais

    2011-07-01

    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  17. Nuclear Cyber Security Issues and Policy Recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Cheol-Kwon; Lee, Dong-Young [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Na-Young; Hwang, Young-Soo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities.

  18. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  19. Nuclear power plant security assessment technical manual.

    Energy Technology Data Exchange (ETDEWEB)

    O' Connor, Sharon L.; Whitehead, Donnie Wayne; Potter, Claude S., III

    2007-09-01

    This report (Nuclear Power Plant Security Assessment Technical Manual) is a revision to NUREG/CR-1345 (Nuclear Power Plant Design Concepts for Sabotage Protection) that was published in January 1981. It provides conceptual and specific technical guidance for U.S. Nuclear Regulatory Commission nuclear power plant design certification and combined operating license applicants as they: (1) develop the layout of a facility (i.e., how buildings are arranged on the site property and how they are arranged internally) to enhance protection against sabotage and facilitate the use of physical security features; (2) design the physical protection system to be used at the facility; and (3) analyze the effectiveness of the PPS against the design basis threat. It should be used as a technical manual in conjunction with the 'Nuclear Power Plant Security Assessment Format and Content Guide'. The opportunity to optimize physical protection in the design of a nuclear power plant is obtained when an applicant utilizes both documents when performing a security assessment. This document provides a set of best practices that incorporates knowledge gained from more than 30 years of physical protection system design and evaluation activities at Sandia National Laboratories and insights derived from U.S. Nuclear Regulatory Commission technical staff into a manual that describes a development and analysis process of physical protection systems suitable for future nuclear power plants. In addition, selected security system technologies that may be used in a physical protection system are discussed. The scope of this document is limited to the identification of a set of best practices associated with the design and evaluation of physical security at future nuclear power plants in general. As such, it does not provide specific recommendations for the design and evaluation of physical security for any specific reactor design. These best practices should be applicable to the design and

  20. Nuclear Security in Asia: A Global Affair

    Energy Technology Data Exchange (ETDEWEB)

    Di Capua, M.

    2000-09-01

    My goal with this paper is to stimulate some thinking as to how scientists, concerned with nonproliferation and arms control, can address their efforts to improve the security environment in Asia, an environment that impacts the security of the entire world. The processes that led to the nuclearization of Asia are complex, with each country's nuclear weapons program tightly coupled to internal and regional politics and to national rivalries. Therefore, the first step toward nuclear stability, and ideally proliferation reversal, in Asia is to understand the motivations for and evolution of these programs. The author begins by addressing the evolution of the nuclear weapons programs of India, China, and Pakistan. Next he discusses why India (and then Pakistan) may have felt compelled to clear the ambiguity of their programs with their 1998 nuclear tests. He also explores why the P5 states (U.S., U.K., France, Russia, China) were unable to persuade India and Pakistan to stop or reverse their nuclear weapons programs. I then look at other countries' actions and reactions that may amplify or dampen the response of India, Pakistan, and China to what they perceive as a deterioration of their security environment. Finally he looks at regional activities that may reverse the deteriorating global security that has resulted from a nuclearized South Asia. This situation is something of a paradox because, at the same time the South Asia security environment is deteriorating, Russia and the U.S., the former Cold War adversaries, are finally taking steps to reduce the massive nuclear arsenals that threatened global security for so many years.

  1. Perspectives on the International and Internal Nuclear Security Regime

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon [Korea Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The term, 'Nuclear Security' became more familiar to Korean public after the government hosted 2012 Seoul Nuclear Security Summit. Nuclear Security is prevention of, detection of and response to criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Nuclear Security includes physical protection, security of radioactive sources, nuclear forensics, nuclear smuggling prevention, border monitoring, and cyber security with regard to nuclear and other radiological materials. This abstract will review recent international trends and discuss the nuclear security regime in the Republic of Korea (ROK). The international Nuclear Security Regime has been strengthened. The upcoming Chicago Summit in 2016 and the entry into force of the Amendment of Convention on Physical Protection of Nuclear Materials (CPPNM) will bring major changes in nuclear security. The Republic of Korea hosted the 2012 Seoul Summit and strengthened domestic regime to meet international standards. The ROK has worked hard to contribute to the international security regime and to establish a robust domestic security regime against terrorist threats. Even if the nuclear security regime is robust, Risk-informed Nuclear Security management should be established to meet international standards and to implement effective as well as an efficient nuclear security regime.

  2. Nuclear Security, Disarmament and Development

    Science.gov (United States)

    Salam, Abdus

    The world's stock of nuclear weapons, which was three in 1945, has been growing ever since and is 50,OOOa in 1985. Nearly two trillion dollars of the public funds have been spent over the years to improve their destructive power, and the means of delivering them. One indicator of the awful power of these weapons is that the explosive yield of the nuclear weapons stockpiled today by the US, USSR, UK, France, and China is equivalent to one million Hiroshima bombs. Less than 1,000 of these 50,000 weapons could destroy USA and USSR. A thousand more in an all-out nuclear exchange could destroy the world as a habitable planet, ending life for the living and the prospects of life for those not yet born, sparing no nation, no region of the world…

  3. International Nuclear Security Situation And China’s Approach

    Institute of Scientific and Technical Information of China (English)

    Liu Chong

    2016-01-01

    Since 2010,the three Nuclear Security Summits have made a number of achievements,but the international nuclear security situation is still not relaxed.The rapid development of China’s domestic nuclear facilities and a large amount of nuclear and radioactive materials related to nuclear power,active international nuclear black market in China’s surrounding regions,rather serious domestic and international terrorist threats as well as the emerging technology development bring about new challenges to nuclear security.Facing the complicated and long-term nuclear security situation,China from the perspective of monitoring mechanism,laws and regulations system,technical capability-building and nuclear emergency preparedness,takes a series of effective measures to build the national nuclear security capacity,and strictly fulfills its international obligations,actively participates in upgrading the international nuclear non-proliferation regime and relevant international rules,and actively takes part in the Nuclear Security Summit process,strengthens bilateral cooperation on nuclear security with major countries especially the United States of America,and jointly organizes various training with International Atomic Energy Agency,which has made great contributions to upgrading the global nuclear security level.At the end of the Nuclear Security Summit process,China should continue to strengthen its domestic nuclear security capacity building,and promote the international community to treat the root causes and symptoms,adopt a comprehensive strategy,and work together,effectively prevent and dissolve the nuclear terrorist threats.

  4. Security the human factor

    CERN Document Server

    Kearney, Paul

    2010-01-01

    This pocket guide is based on the approach used by BT to protect its own data security – one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.

  5. Nuclear Weapon Testing Limitations and International Security

    Science.gov (United States)

    Corden, Pierce S.

    2017-01-01

    For over 50 years stopping nuclear weapon tests has been sought to support achieving international security without nuclear weapons. Testing is the critical path beyond primitive fission devices, e.g. to develop thermonuclear weapons, reduce weight and volume and increase yield. The 1958 Geneva Conference of Experts considered ways to verify a test ban. With then-limitations on seismology, and lack of in-country monitoring and on-site inspections, the 1963 Limited Test Ban Treaty prohibits testing only in the atmosphere, outer space and under water, and is verified by National Technical Means. The US and USSR agreed to a limit of 150 kilotons on underground explosions in the 1970s-80s. The 1996 Comprehensive Nuclear-Test-Ban Treaty bans all nuclear explosions. Its International Monitoring System - seismic, hydroacoustic, infrasound and radionuclide sensors - is being used, and has easily detected testing by the DPRK. On-site inspections will be available under an in-force Treaty. A 2012 National Academy report concludes that cheating attempts would not undermine U.S. security, and the program for monitoring and extending the life of US weapons has succeeded since US testing ceased in 1992.

  6. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  7. Securing Humanity - Situating 'Human Security' as Concept and Discourse

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2005-01-01

    markdownabstractAbstract The label ‘human security’ (HS) has attracted much attention since the 1994 Human Development Report, but there are numerous conflicting definitions and agendas and widespread scepticism. The Ogata-Sen Commission report Human Security Now has proposed a unified yet

  8. Securing Humanity - Situating 'Human Security' as Concept and Discourse

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2005-01-01

    markdownabstractAbstract The label ‘human security’ (HS) has attracted much attention since the 1994 Human Development Report, but there are numerous conflicting definitions and agendas and widespread scepticism. The Ogata-Sen Commission report Human Security Now has proposed a unified yet flexibl

  9. Supply Security in Future Nuclear Fuel Markets

    Energy Technology Data Exchange (ETDEWEB)

    Seward, Amy M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Wood, Thomas W. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gitau, Ernest T. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ford, Benjamin E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2013-11-18

    Previous PNNL work has shown the existing nuclear fuel markets to provide a high degree of supply security, including the ability to respond to supply disruptions that occur for technical and non-technical reasons. It is in the context of new reactor designs – that is, reactors likely to be licensed and market ready over the next several decades – that fuel supply security is most relevant. Whereas the fuel design and fabrication technology for existing reactors are well known, the construction of a new set of reactors could stress the ability of the existing market to provide adequate supply redundancy. This study shows this is unlikely to occur for at least thirty years, as most reactors likely to be built in the next three decades will be evolutions of current designs, with similar fuel designs to existing reactors.

  10. Nuclear Security Summits:Drivers,Progress and Prospect

    Institute of Scientific and Technical Information of China (English)

    Jiang Yimin

    2016-01-01

    The challenge of nuclear security is the one shared by the international community as a whole.According to the IAEA,the term"nuclear security"refers to the prevention and detection of,and response to,theft,sabotage,unauthorized access,illegal transfer or other malicious acts involving nuclear material,other radioactive substances or their associated

  11. Nuclear Cyber Security Case Study and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Park, Sunae [ChungNam National Univ., Daejeon (Korea, Republic of); Kim, Kyung doo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Due to the new trend in cyber attacks, there is an increased security threat towards every country's infrastructure. So, security measures are required now than ever before. Previous cyber attacks normal process consists of paralyzing a server function, data extraction, or data control into the IT system for trespassing. However, nowadays control systems and infrastructures are also targeted and attacking methods have changed a lot. These days, the virus is becoming increasingly serious and hacker attacks are also becoming more frequent. This virus is a computer virus produced for the purpose of destroying the infrastructure, such as power plants, airports, railways June 2010, and it was first discovered in Belarus. Israel, the US, and other countries are believed culprits behind Stuxnet attacks on other nations such as Iran. Recent malware distribution, such as website hacking threat is growing. In surveys today one of the most long-term posing security threats is from North Korea. In particular, North Korea has been caught launching ongoing cyber-attacks after their latest nuclear test. South Korea has identified national trends regarding North Korean nuclear tests and analyzed them in order to catch disclosed confidential information. Especially, many nuclear power plants in the world are found to be vulnerable to cyber-attacks. Industrial facilities should be more wary of the risk of a serious cyber attack in the middle is going to increase the reliance on universal and commercial digital systems (off the shelf) software, civilian nuclear infrastructure. Senior executives’ current risk rate levels are increasing. Digitalization of the perception of risk is lacking in nuclear power plants and workers are creating prevention methods to make them fully aware of the risks of cyber-attacks. It is suggested that it may be inappropriate to assume we are prepared for potential attacks. Due to advances in technology, a warning that the growing sense of crisis

  12. Nuclear Smuggling and Threats to Lithuanian Security

    Directory of Open Access Journals (Sweden)

    Murauskaitė Eglė

    2016-12-01

    Full Text Available The article explores threats related to illicit trafficking of radioactive materials and dual-use goods applicable in state level nuclear programs, actualizing the global trends for the Baltic region. The article points to Eastern Europe’s changing risk profile in this respect, as increasing penetration of Russian criminal groups inside Ukraine and the destabilized situations in neighboring countries create an environment where the risk of nuclear smuggling is on the rise. Criminal entities can be seen forming new bonds, with trafficking routes intersecting and zones of influence shifting - consequently, an unusual level of criminal involvement in nuclear smuggling is observed, alongside a geographic shift of smuggling patterns. In addition, states seeking materials and technologies for their military programs have taken a notable interest in this region as a way of circumventing international transit regulations. The article looks at the likely implications of these new nuclear smuggling trends for the security of the Baltic states. It suggests that Lithuania may soon be facing a relatively new threat, and one that it is ill-prepared to counter. The article discusses the risk factors and indicators to watch before that risk becomes reality, and offers ways for Lithuania to contribute to addressing these increasingly acute problems on a regional level.

  13. Operating Nuclear Power Stations in a Regulated Cyber Security Environment

    Energy Technology Data Exchange (ETDEWEB)

    Dorman, E.

    2014-07-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NR C. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. (Author)

  14. Cyber security best practices for the nuclear industry

    Energy Technology Data Exchange (ETDEWEB)

    Badr, I. [Rational IBM Software Group, IBM Corporation, Evanston, IL 60201 (United States)

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  15. Study on Enhancing nuclear security cooperation in Northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jounghoon; Heo, Chul [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening.

  16. Evolution of nuclear security regulatory activities in Brazil

    Energy Technology Data Exchange (ETDEWEB)

    Mello, Luiz A. de; Monteiro Filho, Joselio S.; Belem, Lilia M.J.; Torres, Luiz F.B. [Comissao Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil). Diretoria de Radioprotecao e Segurania Nuclear. Coordenacao de Salvaguardas e Protecao Fisica], e-mail: gpf@cnen.gov.br

    2009-07-01

    The changing of the world scenario in the last 15 years has increased worldwide the concerns about overall security and, as a consequence, about the nuclear and radioactive material as well as their associated facilities. Considering the new situation, in February 2004, the Brazilian National Nuclear Energy Commission (CNEN), decided to create the Nuclear Security Office. This Office is under the Coordination of Nuclear Safeguards and Security, in the Directorate for Safety, Security and Safeguards (Regulatory Directorate). Before that, security regulation issues were dealt in a decentralized manner, within that Directorate, by different licensing groups in specific areas (power reactors, fuel cycle facilities, radioactive facilities, transport of nuclear material, etc.). This decision was made in order to allow a coordinated approach on the subject, to strengthen the regulation in nuclear/radioactive security, and to provide support to management in the definition of institutional security policies. The CNEN Security Office develops its work based in the CNEN Physical Protection Regulation for Nuclear Operational Units - NE-2.01, 1996, the Convention on the Physical Protection of Nuclear Material and the IAEA Nuclear Security Series . This paper aims at presenting the activities developed and the achievements obtained by this new CNEN office, as well as identifying the issues and directions for future efforts. (author)

  17. Human Security: Concept, Disputes and Practice

    Institute of Scientific and Technical Information of China (English)

    HU YUAN

    2011-01-01

    @@ Human security is a new concept in the area of security and constitutes one of the important indicators for realizing human rights.It puts the point of concern about security on humans and therefore embodies a people-centered idea.It has become a major hallmark of the shift in security after the cold war.

  18. Analysis of Current Global Nuclear Safety and Security Cooperation

    Institute of Scientific and Technical Information of China (English)

    Liu; Chong

    2014-01-01

    Last year, global nuclear security and safety cooperation achieved some progress. In terms of nuclear safety, too many flaws are exposed by the current severe situation of the Fukushima in Japan’s new nuclear safety regulation system, and sound the alarm for East Asia countries accelerating the regional nuclear safety cooperation. In terms of nuclear security, since the Seoul Summit in March 2012, global nuclear security cooperation has achieved new successes. IAEA has and would play the central role in pushing forward the international framework and strengthening nuclear security globally. However, there are still some obstacles to overcome in the future, which need international society to enhance communication and common understanding, especially high-level consultations.

  19. Human Rights, Human Needs, Human Development, Human Security

    OpenAIRE

    Gasper, Des

    2009-01-01

    Human rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and politics; each has emerged within the United Nations world; each relies implicitly on a conceptualisation of human need; each has specific strengths. Yet mutual communication, understanding and co-operation are deficient, espec...

  20. Development of undergraduate nuclear security curriculum at College of Engineering, Universiti Tenaga Nasional

    Science.gov (United States)

    Hamid, Nasri A.; Mujaini, Madihah; Mohamed, Abdul Aziz

    2017-01-01

    The Center for Nuclear Energy (CNE), College of Engineering, Universiti Tenaga Nasional (UNITEN) has a great responsibility to undertake educational activities that promote developing human capital in the area of nuclear engineering and technology. Developing human capital in nuclear through education programs is necessary to support the implementation of nuclear power projects in Malaysia in the near future. In addition, the educational program must also meet the nuclear power industry needs and requirements. In developing a certain curriculum, the contents must comply with the university's Outcomes Based Education (OBE) philosophy. One of the important courses in the nuclear curriculum is in the area of nuclear security. Basically the nuclear security course covers the current issues of law, politics, military strategy, and technology with regard to weapons of mass destruction and related topics in international security, and review legal regulations and political relationship that determine the state of nuclear security at the moment. In addition, the course looks into all aspects of the nuclear safeguards, builds basic knowledge and understanding of nuclear non-proliferation, nuclear forensics and nuclear safeguards in general. The course also discusses tools used to combat nuclear proliferation such as treaties, institutions, multilateral arrangements and technology controls. In this paper, we elaborate the development of undergraduate nuclear security course at the College of Engineering, Universiti Tenaga Nasional. Since the course is categorized as mechanical engineering subject, it must be developed in tandem with the program educational objectives (PEO) of the Bachelor of Mechanical Engineering program. The course outcomes (CO) and transferrable skills are also identified. Furthermore, in aligning the CO with program outcomes (PO), the PO elements need to be emphasized through the CO-PO mapping. As such, all assessments and distribution of Bloom Taxonomy

  1. The role of the health physicist in nuclear security.

    Science.gov (United States)

    Waller, Edward J; van Maanen, Jim

    2015-04-01

    Health physics is a recognized safety function in the holistic context of the protection of workers, members of the public, and the environment against the hazardous effects of ionizing radiation, often generically designated as radiation protection. The role of the health physicist as protector dates back to the Manhattan Project. Nuclear security is the prevention and detection of, and response to, criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Its importance has become more visible and pronounced in the post 9/11 environment, and it has a shared purpose with health physics in the context of protection of workers, members of the public, and the environment. However, the duties and responsibilities of the health physicist in the nuclear security domain are neither clearly defined nor recognized, while a fundamental understanding of nuclear phenomena in general, nuclear or other radioactive material specifically, and the potential hazards related to them is required for threat assessment, protection, and risk management. Furthermore, given the unique skills and attributes of professional health physicists, it is argued that the role of the health physicist should encompass all aspects of nuclear security, ranging from input in the development to implementation and execution of an efficient and effective nuclear security regime. As such, health physicists should transcend their current typical role as consultants in nuclear security issues and become fully integrated and recognized experts in the nuclear security domain and decision making process. Issues regarding the security clearances of health physics personnel and the possibility of insider threats must be addressed in the same manner as for other trusted individuals; however, the net gain from recognizing and integrating health physics expertise in all levels of a nuclear security regime far

  2. Special nuclear material information, security classification guidance. Instruction

    Energy Technology Data Exchange (ETDEWEB)

    Flickinger, A.

    1982-12-03

    The Instruction reissues DoD Instruction 5210.67, July 5, 1979, and provides security classification guidance for information concerning significant quantities of special nuclear material, other than that contained in nuclear weapons and that used in the production of energy in the reactor plant of nuclear-powered ships. Security classification guidance for these data in the latter two applications is contained in Joint DoE/DoD Nuclear Weapons Classification Guide and Joint DoE/DoD Classification Guide for the Naval Nuclear Propulsion Program.

  3. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    OpenAIRE

    Nguyen THI THUY HANG

    2012-01-01

    Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has change...

  4. Nuclear Arms and National Security. 1983 National Issues Forum.

    Science.gov (United States)

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  5. Applications of nuclear safety probabilistic risk assessment to nuclear security for optimized risk mitigation

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, S.K.; Harvey, S.B. [Amec Foster Wheeler, Toronto, Ontario (Canada)

    2016-06-15

    Critical infrastructure assets such as nuclear power generating stations are potential targets for malevolent acts. Probabilistic methodologies can be applied to evaluate the real-time security risk based upon intelligence and threat levels. By employing this approach, the application of security forces and other protective measures can be optimized. Existing probabilistic safety analysis (PSA) methodologies and tools employed. in the nuclear industry can be adapted to security applications for this purpose. Existing PSA models can also be adapted and enhanced to consider total plant risk, due to nuclear safety risks as well as security risks. By creating a Probabilistic Security Model (PSM), safety and security practitioners can maximize the safety and security of the plant while minimizing the significant costs associated with security upgrades and security forces. (author)

  6. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Kang, Mingyun [E-Gonggam Co. Ltd., Daejeon (Korea, Republic of)

    2015-10-15

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately.

  7. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  8. Public perspectives on nuclear security. US national security surveys, 1993--1997

    Energy Technology Data Exchange (ETDEWEB)

    Herron, K.G.; Jenkins-Smith, H.C. [Univ. of New Mexico, Albuquerque, NM (United States). UNM Inst. for Public Policy

    1998-08-01

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between US and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.

  9. Information security as part of the nuclear safety culture

    Energy Technology Data Exchange (ETDEWEB)

    Sitnica, A., E-mail: demetrkj@westinghouse.com [Westinghouse Electric Co., 1000 Westinghouse Drive, Cranberry Township, PA 16066 (United States)

    2016-09-15

    No industry, organization, individual or even the government is immune to the information security risks which are associated with nuclear power. It can no longer be ignored, delayed or treated as unimportant. Nuclear safety is paramount to our industry, and cyber security must be woven into the fabric of our safety culture in order to succeed. Achieving this in an environment which has remained relatively unchanged and conservative prior to digitalisation demands a shift in behavior and culture. (Author)

  10. NNSA Program Develops the Next Generation of Nuclear Security Experts

    Energy Technology Data Exchange (ETDEWEB)

    Brim, Cornelia P.; Disney, Maren V.

    2015-09-02

    NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.

  11. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  12. Applications of nuclear techniques relevant for civil security

    Science.gov (United States)

    Valkovi, Vlado

    2006-05-01

    The list of materials which are subject to inspection with the aim of reducing the acts of terrorism includes explosives, narcotics, chemical weapons, hazardous chemicals and radioactive materials. To this we should add also illicit trafficking with human beings. The risk of nuclear terrorism carried out by sub-national groups is considered not only in construction and/or use of nuclear device, but also in possible radioactive contamination of large urban areas. Modern personnel, parcel, vehicle and cargo inspection systems are non-invasive imaging techniques based on the use of nuclear analytical techniques. The inspection systems use penetrating radiations: hard x-rays (300 keV or more) or gamma-rays from radioactive sources (137Cs and 60Co with energies from 600 to 1300 keV) that produce a high resolution radiograph of the load. Unfortunately, this information is ''non-specific'' in that it gives no information on the nature of objects that do not match the travel documents and are not recognized by a visual analysis of the radiographic picture. Moreover, there are regions of the container where x and gamma-ray systems are ''blind'' due to the high average atomic number of the objects irradiated that appear as black spots in the radiographic image. Contrary to that is the use of neutrons; as results of the bombardment, nuclear reactions occur and a variety of nuclear particles, gamma and x-ray radiation is emitted, specific for each element in the bombarded material. The problem of material (explosive, drugs, chemicals, etc.) identification can be reduced to the problem of measuring elemental concentrations. Neutron scanning technology offers capabilities far beyond those of conventional inspection systems. The unique automatic, material specific detection of terrorist threats can significantly increase the security at ports, border-crossing stations, airports, and even within the domestic transportation infrastructure of potential urban targets as well as

  13. Applications of nuclear techniques relevant for civil security

    Energy Technology Data Exchange (ETDEWEB)

    Valkovi, Vlado [Institute Ruder Boskovi, Zagreb (Croatia)

    2006-05-15

    The list of materials which are subject to inspection with the aim of reducing the acts of terrorism includes explosives, narcotics, chemical weapons, hazardous chemicals and radioactive materials. To this we should add also illicit trafficking with human beings. The risk of nuclear terrorism carried out by sub-national groups is considered not only in construction and/or use of nuclear device, but also in possible radioactive contamination of large urban areas. Modern personnel, parcel, vehicle and cargo inspection systems are non-invasive imaging techniques based on the use of nuclear analytical techniques. The inspection systems use penetrating radiations: hard x-rays (300 keV or more) or gamma-rays from radioactive sources ({sup 137}Cs and {sup 60}Co with energies from 600 to 1300 keV) that produce a high resolution radiograph of the load. Unfortunately, this information is 'non-specific' in that it gives no information on the nature of objects that do not match the travel documents and are not recognized by a visual analysis of the radiographic picture. Moreover, there are regions of the container where x and gamma-ray systems are 'blind' due to the high average atomic number of the objects irradiated that appear as black spots in the radiographic image. Contrary to that is the use of neutrons; as results of the bombardment, nuclear reactions occur and a variety of nuclear particles, gamma and x-ray radiation is emitted, specific for each element in the bombarded material. The problem of material (explosive, drugs, chemicals, etc.) identification can be reduced to the problem of measuring elemental concentrations. Neutron scanning technology offers capabilities far beyond those of conventional inspection systems. The unique automatic, material specific detection of terrorist threats can significantly increase the security at ports, border-crossing stations, airports, and even within the domestic transportation infrastructure of potential

  14. Radiological and Nuclear Security in A Global Context

    CERN Document Server

    Jones, Nick

    2010-01-01

    This paper considers the state of nuclear and radiological security in the UK and abroad and reports on the methods that could be employed by terrorists with radiological or nuclear material to cause destruction. It is shown that despite current safeguards that problems arise due to materials that are unaccounted for and poor implementation of detection regimes in some geographical regions. The prospect of a future terrorist event that involves nuclear or radiological materials seems likely despite best efforts of prevention.

  15. The Nuclear Security Summit and Saft Development of China’s Nuclear Energy

    Institute of Scientific and Technical Information of China (English)

    Xu; Yu

    2014-01-01

    China always attaches great importance to the issue of nuclear safety,is opposed to nuclear terrorism,actively supports the strengthening of international cooperation,and has made remarkable achievements by actively participating in and promoting international nuclear security activities,

  16. SETT facility of International Nuclear Security Academy

    Energy Technology Data Exchange (ETDEWEB)

    Seo, Hyung Min [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2012-05-15

    After the Cold War was put to an end, the international community, especially the Western world, was concerned about Soviet nuclear materials falling into wrong hands, especially of terrorists. Later, the growing threat posed by terrorist networks such as the Taliban and al Qaeda led to a global campaign to deny such networks materials which may be used for the development of Weapons of Mass Destruction (WMD). The 9 11 attacks made a section of the international community highly apprehensive of WMD terrorism, especially its nuclear version. From this point of view, it is clear that nuclear facilities which contain nuclear materials are very attractive targets for those who have intention of nuclear terror

  17. Promoting International Cooperation on Nuclear Security

    Institute of Scientific and Technical Information of China (English)

    Page; O; Stoutland

    2014-01-01

    <正>If terrorists can obtain a sufficient quantity of weapons usable nuclear material,they could design,construct and detonate a nuclear bomb.The consequences of such a catastrophe would reverberate around the globe,with thousands of casualties,disruptions to economic markets,long-term implications for public health and the environment,and risks to civil liberties-not to mention the staggering cost of any response.

  18. Recommendations on legislative and regulatory framework and regulatory body of nuclear security in China

    Institute of Scientific and Technical Information of China (English)

    PU Jilong; LI Xiaoyan

    2007-01-01

    This paper describes the definition of nuclear security that has been changing from the cold war age to the post-911 period, and clarifies the close relationship and yet a clear distinction between nuclear security, nuclear safety and nuclear safeguard. Based on analyses of the current state of nuclear security activities in China as well as the requirements and the law infrastructure, a legislative and regulatory framework of nuclear security and the mandate of a regulatory body in China are recommended.

  19. Physical Security Modeling for the Shipboard Nuclear Weapons Security Program,

    Science.gov (United States)

    1982-04-01

    STATISTICS 3-11 NSWC TR 82-50 REFERENCES 3-1) Chapman, L.D., and Engi, D.,"Safeguards Network Analysis Procedure (Snap)-Overview," NUREG /CR-0960, SAND79...34 NUREG /CR-0725, SAND79-0617, Sandia Laboratories, March 1979. 3-3) Grant III, F.H., Engi, D., and Chapman, L.D.,"User’s Guide for SNAP," NUREG /CR...34 Science Applications, Inc., SAI-78-995-LJ, U. S. Nuclear Regulatory Commission report NUREG /CR-0532, December 1978 4-5) McDaniel, T. and Huszar, L

  20. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    Energy Technology Data Exchange (ETDEWEB)

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    2000-06-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

  1. Human Rights, Human Needs, Human Development, Human Security - Relationships between four international human discourses.

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2007-01-01

    markdownabstractAbstract: Human rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and

  2. Nuclear Theory for Astrophysics, Stockpile Stewardship, and Homeland Security

    Science.gov (United States)

    Hayes, Anna

    2004-10-01

    A large number of problems key to astrophysics, stockpile stewardship, and homeland defense rely on knowledge of nuclear physics in regimes inaccessible to experiment. In stellar and nuclear explosions unstable nuclei and nuclear isomers are produced in copious quantities and are used to diagnose the explosion. Similarly, analysis of the unstable nuclei from the debris will be key to attribution in the event of a terrorist domestic nuclear attack. In the case of nuclear non-proliferation a number of new schemes are being considered by the IAEA to address the ever greater needs, including neutrino monitoring of the plutonium content of reactors. For all of these problems detailed nuclear theory is required. In this talk I discuss the theoretical physics needs for the type of problems of overlapping interest to astrophysics and national security.

  3. Certified Training for Nuclear and Radioactive Source Security Management.

    Science.gov (United States)

    Johnson, Daniel

    2017-04-01

    Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  4. Human security from paradigm shift to operationalisation: job description for a human security worker

    NARCIS (Netherlands)

    Glasius, M.

    2008-01-01

    This article shows how human security has functioned as both a paradigm-shifting and a bridging concept, with its most significant implications being, first, the shift from a focus on state security to one on human rights, and, second, the indivisibility of physical and material security. The articl

  5. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    Science.gov (United States)

    2012-06-26

    construct radiological dispersal devices.160 Mahmood was a public figure well-known for his eccentric and extreme views about science and Islam, and...Nuclear Security: Workshop Synopsis . April 30, 2007. 168 Asif Shahzad, “Pakistani Governor Killed by own Bodyguard,” Associated Press, January 4, 2011

  6. Human Security Concept in the UN Practice

    Directory of Open Access Journals (Sweden)

    Svetlana Alexandrovna Bokeriya

    2017-12-01

    Full Text Available This article is devoted to the theme, scientific actuality and practical relevance of which is not in doubt, and is caused by a new wave of interest in human security. The human security concept has been the subject of active discussions on national and international security forums for the past 10 years. This article is focused on the human security concept evolution in the framework of the UN in conditions of the growing challenges and threats as well as polycentric world and international relations transformation. The author turned to the analysis of human security issues in the UN human rights dimension, as this organization performs a key role in the application and implementation of the concept on a global scale. The detailed periodization of human security development within the UN is presented for the first time. The analysis of the situation with Syrian refugees in Lebanon is carried out in the format of a case study. Author has made an attempt to undertake not a comprehensive analysis of the concept within the UN, but re-evaluation of new trends and dominant problems in practical application of human security idea and its impact on the effectiveness of international organizations.

  7. Human error: A significant information security issue

    Energy Technology Data Exchange (ETDEWEB)

    Banks, W.W.

    1994-12-31

    One of the major threats to information security human error is often ignored or dismissed with statements such as {open_quotes}There is not much we can do about it.{close_quotes} This type of thinking runs counter to reality because studies have shown that, of all systems threats, human error has the highest probability of occurring and that, with professional assistance, human errors can be prevented or significantly reduced Security analysts often overlook human error as a major threat; however, other professionals such as human factors engineers are trained to deal with these probabilistic occurrences and mitigate them. In a recent study 55% of the respondents surveyed considered human error as the most important security threat. Documentation exists to show that human error was a major cause of the consequences suffered at Three Mile Island, Chernobyl, Bhopal, and the Exxon tanker, Valdez. Ironically, causes of human error can usually be quickly and easily eliminated.

  8. Climate change, ethics and human security

    National Research Council Canada - National Science Library

    O'Brien, Karen L; St. Clair, Asuncion Lera; Kristoffersen, Berit; Cohen, Stewart J

    2010-01-01

    "Presenting human security perspectives on climate change, this volume raises issues of equity, ethics and environmental justice, as well as our capacity to respond to what is increasingly considered...

  9. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  10. Building Foundations for Nuclear Security Enterprise Analysis Utilizing Nuclear Weapon Data.

    Energy Technology Data Exchange (ETDEWEB)

    Josserand, Terry Michael; Young, Leone; Chamberlin, Edwin Phillip,

    2017-10-01

    T he Nuclear Security Enterprise , managed by the National Nuclear Security Administration - a semiautonomous agency within the Department of Energy - has been associated with numerous assessments with respect to the estimating, management capabilities, and practices pertaining to nuclear weapon modernization efforts. This report identifies challenges in estimating and analyzing the N uclear S ecurity E nterprise through an analysis of analogous timeframe conditions utilizing two types of nuclear weapon data - (1) a measure of effort and (2) a function of time. The analysis of analogous timeframe conditions that utilizes only two types of nuclear weapon d ata yields four summary observations that estimators and analysts of the N uclear S ecurity E nterprise will find useful. This Page Intentionally Left Blank

  11. Security risks in nuclear waste management: Exceptionalism, opaqueness and vulnerability.

    Science.gov (United States)

    Vander Beken, Tom; Dorn, Nicholas; Van Daele, Stijn

    2010-01-01

    This paper analyses some potential security risks, concerning terrorism or more mundane forms of crime, such as fraud, in management of nuclear waste using a PEST scan (of political, economic, social and technical issues) and some insights of criminologists on crime prevention. Nuclear waste arises as spent fuel from ongoing energy generation or other nuclear operations, operational contamination or emissions, and decommissioning of obsolescent facilities. In international and EU political contexts, nuclear waste management is a sensitive issue, regulated specifically as part of the nuclear industry as well as in terms of hazardous waste policies. The industry involves state, commercial and mixed public-private bodies. The social and cultural dimensions--risk, uncertainty, and future generations--resonate more deeply here than in any other aspect of waste management. The paper argues that certain tendencies in regulation of the industry, claimed to be justified on security grounds, are decreasing transparency and veracity of reporting, opening up invisible spaces for management frauds, and in doing allowing a culture of impunity in which more serious criminal or terrorist risks could arise. What is needed is analysis of this 'exceptional' industry in terms of the normal cannons of risk assessment - a task that this paper begins.

  12. Nuclear proliferation and national security in India and Pakistan

    Energy Technology Data Exchange (ETDEWEB)

    Joeck, N.H.A.

    1986-01-01

    This study develops an inventory of propositions from secondary literature about nuclear proliferation incentives and constraints. From this comprehensive inventory are derived eight dimensions of proliferation. Once a state has acquired the necessary technology and material to develop weapons, the critical factors that motivate proliferation are insecurity, alliance protection, and a threat of national extinction. The eight dimensions are then evaluated with respect to two critical states, India and Pakistan, both of which are on the brink of developing nuclear weapons. Extensive interviews were conducted in the United States, India, and Pakistan of senior Indian, Pakistani, and American military official, diplomats, politicians, scholars, and journalists. Based on these interviews, it is clear that Indians and Pakistanis feel themselves caught in a dilemma. Although the initial motivation for developing weapons was indeed found to be insecurity, as expected, it is generally assumed that the effect of proliferation will in fact be to render both states even less secure than they were before beginning their nuclear programs. India and Pakistan are a critical pair of states as they are in a position to assess the probable consequences of nuclear proliferation and back away from it. In so doing, they could set an example to other states of why nuclear proliferation is not in the security interest of nations.

  13. Human Insecurity: Understanding International Migration from A Human Security Perspective

    Directory of Open Access Journals (Sweden)

    Francesca Vietti

    2013-07-01

    Full Text Available This article examines contemporary, mass migration from the perspective of human security. It tracks the development of the human security model of international relations, and compares it to the well-established state security model that has served as the dominant paradigm for international relations since the seventeenth century. The article argues that human security offers a more effective approach to many of the underlying problems and threats associated with mass migration, than does the traditional state-security model.  It challenges national and international authorities to address threats to human security, in order to minimize forced migration and to create the conditions for migration by choice, not necessity.

  14. Security or armageddon: Israel's nuclear strategy

    Energy Technology Data Exchange (ETDEWEB)

    Beres, L.R.

    1986-01-01

    This book closely examines Israel's strategic choices and the probable impact of those choices on American and Soviet foreign policy. The contributors of this debate both Israeli and American, represent a very distinguished group of scholars, all well-known specialists on international security affairs. The author addresses such critical issues as Israel's dilemma of either continuing with its ''bomb in the basement'' policy or disclosing its nuclear capabilities; the long-term prospects for security through conventional deterrence; the probability of nuclear and other highly destructive forms of terrorism; the creation of a regional non-proliferation treaty for the Middle East; the role of international law; the effect of superpower relations on regional stability; the relevance of Jewish history; and the problem of regional proliferation.

  15. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    Science.gov (United States)

    2010-10-07

    on Fissile Materials http://www.fissilematerials.org/ipfm/ site_down/gfmr07.pdf; SIPRI Yearbook 2007. The International Panel on Fissile Materials...State for Foreign and Commonwealth Affairs David Miliband told the Charlie Rose Show December 15, 2008, that Islamabad’s nuclear weapons “are under...Weapons in Pakistan,” Pakistan Security Research Unit Brief Number 22, University of Bradford, November 18, 2007. Available at http://spaces.brad.ac.uk

  16. Survey Analysis on Nuclear Security Culture Recognition of Nuclear Facility in 2014

    Energy Technology Data Exchange (ETDEWEB)

    Hong, Yunjeong; Lee, Jeongho; Kim, Jaekwang [Korea Institute of Nonproliferation and Control International Nuclear Security Academy, Daejeon (Korea, Republic of)

    2015-05-15

    All organizations involved in implementing physical protection should give due priority to the security culture, to its development and maintenance necessary to ensure its effective implementation in the entire organization. In this context, Korea Institute of Non-proliferation and Control(KINAC) confirms recognition about protection of people who work in nuclear field and developed questionnaire for utilizing fundamental data for nuclear security culture enhancement activity and conducted a survey. As a result, systematic education needs to employees. Choosing differentiated topic is required to consider employees because recognition level of age, position and division is different. And a variety of education technology as obligatory education such as filling the course time or the one-off thing has limitation. And taking complementary measures needs since there were many opinions that employees feel difficult to understand papers such as regulation and guidelines and so on related security. Finally, we hope to make fundament available to evaluate nuclear security culture recognition level based on the existing questionnaire would be changed to realistic and enhancement in recognition survey for future nuclear security culture.

  17. R&D for Better Nuclear Security: Radiation Detector Materials

    Energy Technology Data Exchange (ETDEWEB)

    Kammeraad, J E

    2009-04-02

    I am going to talk about the need for better materials for radiation detectors. I believe that government investment in this area can enable transformational technology change that could impact domestic nuclear security and also national nuclear security in some very positive and powerful ways. I'm not going to give you a lecture on how radiation detectors work, but I am going to tell you a bit about today's off-the-shelf technology and why it is not sufficient, what we need, and what security benefit you could get from improvements. I think we're at a critical point in time for some very impactful investments. In particular I'm going to focus on the use of gamma-ray radiation detectors at ports of entry. Not long before DHS was formed, Congress decreed that counter measures against the delivery of radiological and nuclear threats would be put in place at US ports of entry, under the authority of US Customs (later Customs and Border Protection in DHS). This included the screening of all cars and trucks passing through a port of entry. Existing off-the-shelf radiation detectors had to be selected for this purpose. Plans were made to make the most of the available technologies, but there are some inherent limitations of these detectors, plus the operational setting can bring out other limitations.

  18. Security Design of Remote Maintenance Systems for Nuclear Power Plants Based on ISO/IEC 15408

    Science.gov (United States)

    Watabe, Ryosuke; Oi, Tadashi; Endo, Yoshio

    This paper presents a security design of remote maintenance systems for nuclear power plants. Based on ISO/IEC 15408, we list assets to be protected, threats to the assets, security objectives against the threats, and security functional requirements that achieve the security objectives. Also, we show relations between the threats and the security objectives, and relations between the security objectives and the security functional requirements. As a result, we concretize a necessary and sufficient security design of remote maintenance systems for nuclear power plants that can protect the instrumentation and control system against intrusion, impersonation, tapping, obstruction and destruction.

  19. Human Rights, Human Needs, Human Development, Human Security : Relationships between four international 'human' discourses

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2007-01-01

    textabstractHuman rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and politics; each

  20. Development on Guidance of Cyber Security Exercise for the Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyundoo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber threats and attacks are increasing rapidly against infrastructure including energy and utilities industry over the world. Because of lack of human resource and incident response system to prevent or defend increased cyber threats, many governments and major national infrastructures perform cyber security exercises to improve capabilities of cyber security incident response. Accordingly there are exponential growth in the number of cyber security exercises over the past decade with the trend expecting to accelerate in the coming years. Even though there were many cyber security exercises in the Nuclear Facilities, this exercise was first which focused on mitigation and recovery of the system of the Nuclear Facility against cyber incident. So many insufficient items were deduced such as absence of a procedure for mitigation and recovery of cyber incident. These procedures should be developed and established through 3rd phase of Cyber Security Plan (CSP) and other technical complement actions under regulatory body’s guidance. Also developed and existed procedures should be regularly performed to make cyber incident response team and related people rapidly response against cyber incident through exercises or other training. The insufficient items come from the exercise should be reflected to developed and existed procedures by periods.

  1. Global Ethics and Human Security

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2009-01-01

    textabstractTerms like ‘human security’ try to catch the attention of an audience and to catch the user’s own attention; in other words they aim to stimulate and motivate. Having caught attention they try to organize it: they link to a perspective, a direction for and way of looking. Having caught a

  2. The golden triangle of human dignity: human security, human development and human rights

    NARCIS (Netherlands)

    Gaay Fortman, B. de

    2004-01-01

    The success or failure of processes of democratization cannot be detached from processes of development related to the aspirations of people at the grassroots. Human rights, in a more theoretical terminology, require human development in order to enhance human security.

  3. Human Factors Research and Nuclear Safety.

    Science.gov (United States)

    Moray, Neville P., Ed.; Huey, Beverly M., Ed.

    The Panel on Human Factors Research Needs in Nuclear Regulatory Research was formed by the National Research Council in response to a request from the Nuclear Regulatory Commission (NRC). The NRC asked the research council to conduct an 18-month study of human factors research needs for the safe operation of nuclear power plants. This report…

  4. A Transferrable Belief Model Representation for Physical Security of Nuclear Materials

    Energy Technology Data Exchange (ETDEWEB)

    David Gerts

    2010-07-01

    This work analyzed various probabilistic methods such as classic statistics, Bayesian inference, possibilistic theory, and Dempster-Shafer theory of belief functions for the potential insight offered into the physical security of nuclear materials as well as more broad application to nuclear non-proliferation automated decision making theory. A review of the fundamental heuristic and basic limitations of each of these methods suggested that the Dempster-Shafer theory of belief functions may offer significant capability. Further examination of the various interpretations of Dempster-Shafer theory, such as random set, generalized Bayesian, and upper/lower probability demonstrate some limitations. Compared to the other heuristics, the transferrable belief model (TBM), one of the leading interpretations of Dempster-Shafer theory, can improve the automated detection of the violation of physical security using sensors and human judgment. The improvement is shown to give a significant heuristic advantage over other probabilistic options by demonstrating significant successes for several classic gedanken experiments.

  5. Security Implications of Human-Trafficking Networks

    Science.gov (United States)

    2007-06-15

    to those security concerns. Background How is Human Trafficking Carried Out? While trafficking victims are often found in sweatshops , domestic...labor. This type of trafficking is often found in agricultural labor, the production of goods (typically called sweatshops ) and construction labor

  6. Communiqué of the Washington Nuclear Security Summit%核安全峰会公报

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ Nuclear terrorism is one of the most challenging threats to international security,and strong nuclear security measures are the most effective means to prevent terrorists,criminals,or ther unauthorized actors from acquiring nuclear materials.

  7. Organizational Culture for Safety, Security, and Safeguards in New Nuclear Power Countries

    Energy Technology Data Exchange (ETDEWEB)

    Kovacic, Donald N [ORNL

    2015-01-01

    This chapter will contain the following sections: Existing international norms and standards for developing the infrastructure to support new nuclear power programs The role of organizational culture and how it supports the safe, secure, and peaceful application of nuclear power Identifying effective and efficient strategies for implementing safety, security and safeguards in nuclear operations Challenges identified in the implementation of safety, security and safeguards Potential areas for future collaboration between countries in order to support nonproliferation culture

  8. Reevaluating nuclear safety and security in a post 9/11 era.

    Energy Technology Data Exchange (ETDEWEB)

    Booker, Paul M.; Brown, Lisa M.

    2005-07-01

    This report has the following topics: (1) Changing perspectives on nuclear safety and security; (2) Evolving needs in a post-9/11 era; (3) Nuclear Weapons--An attractive terrorist target; (4) The case for increased safety; (5) Evolution of current nuclear weapons safety and security; (6) Integrated surety; (7) The role of safety and security in enabling responsiveness; (8) Advances in surety technologies; and (9) Reevaluating safety.

  9. Systems Thinking Safety Analysis: Nuclear Security Assessment of Physical Protection System in Nuclear Power Plants

    Directory of Open Access Journals (Sweden)

    Tae Ho Woo

    2013-01-01

    Full Text Available The dynamical assessment has been performed in the aspect of the nuclear power plants (NPPs security. The physical protection system (PPS is constructed by the cyber security evaluation tool (CSET for the nuclear security assessment. The systems thinking algorithm is used for the quantifications by the Vensim software package. There is a period of 60 years which is the life time of NPPs' operation. The maximum possibility happens as 3.59 in the 30th year. The minimum value is done as 1.26 in the 55th year. The difference is about 2.85 times. The results of the case with time delay have shown that the maximum possibility of terror or sabotage incident happens as 447.42 in the 58th year and the minimum value happens as 89.77 in the 51st year. The difference is about 4.98 times. Hence, if the sabotage happens, the worst case is that the intruder can attack the target of the nuclear material in about one and a half hours. The general NPPs are modeled in the study and controlled by the systematic procedures.

  10. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  11. Nuclear security policy in the context of counter-terrorism in Cambodia

    Science.gov (United States)

    Khun, Vuthy; Wongsawaeng, Doonyapong

    2016-01-01

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.

  12. Nuclear security policy in the context of counter-terrorism in Cambodia

    Energy Technology Data Exchange (ETDEWEB)

    Khun, Vuthy, E-mail: vuthy.khun@gmail.com; Wongsawaeng, Doonyapong [Department of Nuclear Engineering, Faculty of Engineering, Chulalongkorn University, 254 Phayathai Road, Pathumwan, Bangkok 10330 (Thailand)

    2016-01-22

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.

  13. An integrated design methodology for the safety and security of nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Joung, S. Y.; Chang, S. H. [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2012-03-15

    After Fukushima nuclear power plant accident, safety of nuclear power plant was issued. In Fukushima accident, one of main reason is location of emergency diesel power generators stop which locate under the sea water level when tsunami occurred. In view of security, emergency diesel generator location under reactor building design is good because for example to escape air strike but is not good for safety for example Fukushima accident. Sometimes safety and security design looks conflicting but nuclear safety and nuclear security share the goal of protecting but nuclear safety and nuclear power plants operate at acceptable risk levels. The purpose of this paper is to introduce safety and security integrated design for nuclear power plant in special emergency diesel generator and control room with simple probabilistic safety assessment analysis.

  14. 33 CFR 165.115 - Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts. 165.115 Section 165.115 Navigation and Navigable... Coast Guard District § 165.115 Safety and Security Zones; Pilgrim Nuclear Power Plant,...

  15. Computer Security for Commercial Nuclear Power Plants - Literature Review for Korea Hydro Nuclear Power Central Research Institute

    Energy Technology Data Exchange (ETDEWEB)

    Duran, Felicia Angelica [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Security Systems Analysis Dept.; Waymire, Russell L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Security Systems Analysis Dept.

    2013-10-01

    Sandia National Laboratories (SNL) is providing training and consultation activities on security planning and design for the Korea Hydro and Nuclear Power Central Research Institute (KHNPCRI). As part of this effort, SNL performed a literature review on computer security requirements, guidance and best practices that are applicable to an advanced nuclear power plant. This report documents the review of reports generated by SNL and other organizations [U.S. Nuclear Regulatory Commission, Nuclear Energy Institute, and International Atomic Energy Agency] related to protection of information technology resources, primarily digital controls and computer resources and their data networks. Copies of the key documents have also been provided to KHNP-CRI.

  16. Resizing the Euro-Mediterranean Dialogue in the Area of Security: The Challenge of Human Security

    Directory of Open Access Journals (Sweden)

    Eduard Soler i Lecha

    2007-02-01

    Full Text Available Although in the countries of the south the concept of human security is not very well-rooted and the security of states or regimes continues to take precedence, this article analyses the extent to which regional co-operation strategies, especially the BarcelonaProcess, have directly or indirectly promoted a new conception of security based on the protection of the citizen. For this, it analyses what had been done in the framework of the political and security basket of the Euro-Mediterranean Partnership up until the Euro-Mediterranean Summit in Barcelona, but it also emphasises some of the important deficiencies, such as inaction in the field of reformation of the security sector. This analysis is framed within a broader discussion about whether or not the Mediterranean is a security complex and whether or not it can become a security community that would make human security one of the foundations of a culture of shared security.

  17. Human Security: China’s Discourses and Experience

    Directory of Open Access Journals (Sweden)

    Xiao Ren

    2016-02-01

    Full Text Available This article addresses three research questions by elaborating on how the idea of human security is understood or defined by the government and social actors in China; how the distinction between the “protection” aspect and “empowerment” aspect of human security is understood and accepted; and what particular downside risks are perceived as pressing human security issues in China. Amongst these the major ones include air pollution, food security, and cyber security. The study reveals that, whilst as a term “human security” is not frequently used, there have been significant discussions leading to the consideration and implementation of various human security practices in China. The idea of human security has been firmly established and threats to human security detected. For both the government and academic community in China, human security and state security are not necessarily confrontational but can rather be combined, often complimenting each other. Recent developments in China are pointing to a positive direction in terms of human security in the country.

  18. Cooperative Security: A New Paradigm For A World Without Nuclear Weapons?

    Directory of Open Access Journals (Sweden)

    Marc Finaud

    2013-11-01

    Full Text Available If there is a loose consensus on aiming at a world free of nuclear weapons in the future, there are clear oppositions as to the timeframe as well as the means for achieving this goal. The approach to nuclear disarmament followed to date has only yielded limited success because it has been conceived in isolation from global and regional security environments and threat perceptions. A new paradigm should thus be sought in order to reconcile nuclear powers’ security doctrines with global aspirations for a safer world, and ensure that nuclear powers derive their security less from others’ insecurity but from mutually beneficial cooperative security. This should not become a pretext for preserving nuclear weapons for ever. It will on the contrary require parallel tracks addressing the initial motivations for acquiring nuclear weapons and other weapons of mass destruction (WMD, in particular in the context of regional conflicts, as well as dealing with the current issues necessarily related to nuclear disarmament (missile defence, weaponization of space, conventional imbalances and future weapon systems. Ultimately, in a globalised nuclear-weapon free world, state security will not require nuclear weapons because it will be inserted into a broader network encompass­ing all aspects of security addressed in cooperative and multilateral approaches.

  19. 33 CFR 165.106 - Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire.

    Science.gov (United States)

    2010-07-01

    ... Guard District § 165.106 Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire. (a... property boundary of Seabrook Nuclear Power Plant identified as follows: beginning at position 42°53′58″ N, 070°51′06″ W then running along the property boundaries of Seabrook Nuclear Power Plant to position...

  20. 33 CFR 165.1155 - Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach, California.

    Science.gov (United States)

    2010-07-01

    ... Nuclear Power Plant, Avila Beach, California. 165.1155 Section 165.1155 Navigation and Navigable Waters... Coast Guard District § 165.1155 Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach... surface to bottom, within a 2,000 yard radius of Diablo Canyon Nuclear Power Plant centered at position...

  1. Summary Report for the Radiation Detection for Nuclear Security Summer School 2012

    Energy Technology Data Exchange (ETDEWEB)

    Runkle, Robert C.; Baciak, James E.; Stave, Jean A.

    2012-08-22

    The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the inaugural Radiation Detection for Nuclear Security Summer School from June 11 – 22, 2012. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. The first week of the summer school focused on the foundational knowledge required by technology practitioners; the second week focused on contemporary applications. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security.

  2. International Relations and HRD Activities of the International Nuclear Nonproliferation and Security Academy of the ROK

    Directory of Open Access Journals (Sweden)

    Kwan Kyoo Choe

    2015-07-01

    Full Text Available The objective of this article is to explain the HRD activities on nuclear nonproliferation and security area of the International Nuclear Nonproliferation and Security Academy (INSA of the Korea Institute of Nuclear Nonproliferation and Control (KINAC. The HRD activities on nuclear security in international society have moved gradually from military dimension to the aspect of social management of conflict and threat. The paper would be developed in the following ways; First, the main concept of nuclear security in the Republic of Korea(ROK will be touched, which could show us why and how the ROK has put its step forward into the HRD efforts. Second, the background in conjunction with international relations and its developing process how the Korea Center of Excellence (COE, named as INSA, had been set would be described. Third, the detailed efforts of the ROK to build a COE in Korea in connection with the 2nd Nuclear Security Summit (NSS will be touched with a detailed explanation on its main activities, direction and the perspective. Finally, the aspect of nuclear culture issues and lessons learned in the first year of the nuclear nonproliferation and security HRD activities of the INSA would be developed.

  3. HUMAN SECURITY – BUILDING THE POST-2015 DEVELOPMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Andreea IANCU

    2015-04-01

    Full Text Available This article approaches the post-2015 Millennium Development Goals agenda through the human security paradigm. It suggests that the human security paradigm represents “the missing link” from the development agenda. Therefore, this analysis explains the necessity for extending the development agenda by including the human security doctrine. The first part of the article discusses the relation between human security and development. The next section analyzes the values of the Millennium Declaration and the Millennium Development Goals. The last part evaluates the improvements that the inclusion of the human security on the post-2015 development framework may bring. The results of this analysis present illustrate the opportunity of deepening the MDGs agenda with a more realistic and ethical approach, through the inclusion of the human security paradigm within the development agenda.

  4. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    Energy Technology Data Exchange (ETDEWEB)

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  5. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale (University of Oklahoma, Norman, OK); Jenkins-Smith, Hank C. (University of Oklahoma, Norman, OK)

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  6. Review of July 2013 Nuclear Security Insider Threat Exercise November 2013

    Energy Technology Data Exchange (ETDEWEB)

    Pederson, Ann C. [ORNL; Snow, Catherine L. [ORNL; Townsend, Jeremy [ORNL; Shannon, Michael [ORNL

    2013-11-01

    This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

  7. More work to do: a pathway for future progress on strengthening nuclear security

    NARCIS (Netherlands)

    Herbach, J.; Pitts-Kiefer, S.

    2015-01-01

    With the nuclear security summit process winding down but much work remaining, it is vital to initiate a process by which states can continue and expand on the substantial progress that already has been made.

  8. Soil, Food Security and Human Health

    Science.gov (United States)

    Oliver, Margaret

    2017-04-01

    "Upon this handful of soil our survival depends. Husband it and it will grow food, our fuel, and our shelter and surround us with beauty. Abuse it and the soil will collapse and die, taking humanity with it" Vedas Sanskrit Scripture, 1500 BC. As the world's population increases issues of food security become more pressing as does the need to sustain soil fertility and to minimize soil degradation. Soil and land are finite resources, and agricultural land is under severe competition from many other uses. Lack of adequate food and food of poor nutritional quality lead to under-nutrition of different degrees, all of which can cause ill- or suboptimal-health. The soil can affect human health directly and indirectly. Direct effects of soil or its constituents result from its ingestion, inhalation or absorption. For example, hook worms enter the body through the skin and cause anaemia, and fungi and dust can be inhaled resulting in respiratory problems. The soil is the source of actinomycetes on which our earliest antibiotics are based (actinomycin, neomycin and streptomycin). Furthermore, it is a potential reservoir of new antibiotics with methods such as functional metagenomics to identify antibiotic resistant genes. Indirect effects of soil arise from the quantity and quality of food that humans consume. Trace elements can have both beneficial and toxic effects on humans, especially where the range for optimal intake is narrow as for selenium. Deficiencies of four trace elements, iodine, iron, selenium and zinc, will be considered because of their substantial effects on human health. Relations between soil and human health are often difficult to extricate because of the many confounding factors present such as the source of food, social factors and so on. Nevertheless, recent scientific understanding of soil processes and factors that affect human health are enabling greater insight into the effects of soil on our health. Multidisciplinary research that includes soil

  9. Social impact theory based modeling for security analysis in the nuclear fuel cycle

    Energy Technology Data Exchange (ETDEWEB)

    Woo, Tae Ho [Systemix Global Co. Ltd., Seoul (Korea, Republic of)

    2015-03-15

    The nuclear fuel cycle is investigated for the perspective of the nuclear non-proliferation. The random number generation of the Monte-Carlo method is utilized for the analysis. Five cases are quantified by the random number generations. These values are summed by the described equations. The higher values are shown in 52{sup nd} and 73{sup rd} months. This way could be a useful obligation in the license of the plant construction. The security of the nuclear fuel cycle incorporated with nuclear power plants (NPPs) is investigated using social impact theory. The dynamic quantification of the theory shows the non-secured time for act of terrorism which is considered for the non-secured condition against the risk of theft in nuclear material. For a realistic consideration, the meta-theoretical framework for modeling is performed for situations where beliefs, attributes or behaviors of an individual are influenced by those of others.

  10. National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.

    Science.gov (United States)

    Dane, Ernest B.

    To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…

  11. The Study on Progression for Consolidating the Nuclear Security Legislative System

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jae San; Jung, Myung Tak [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    One is the International Convention for Suppressing Acts of Nuclear Terrorism (ICSANT) and the other is amendment to the Convention on Physical Protection of Nuclear Material (CPPNM). ICSANT and CPPNM were proposed by the UN and IAEA, respectively to strengthen the international framework of nuclear security. The ICSANT was entered into force in 2007, but CPPNM amendment is pending in force because the shortage of countries who ratify it. For going into effect this convention, it needs the two-thirds of the States Parties to the CPPNM. It is not completed, yet. So, various initiatives such as nuclear security summit, GICNT, UN ministerial conference, etc. treated that those two conventions were the primary basis to strengthen the global nuclear security architecture. The Republic of Korea (ROK) continuously has made an effort to consolidate the nuclear security legislative framework since the 2010. The purpose of this paper is to provide what we did to strengthen the nuclear security legal framework and what should we do next.

  12. Simulating human behavior for national security human interactions.

    Energy Technology Data Exchange (ETDEWEB)

    Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.; Glickman, Matthew R.; Wolfenbarger, Paul R.; Xavier, Patrick Gordon

    2007-01-01

    This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humans were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.

  13. Renovated Korean nuclear safety and security system: A review and suggestions to successful settlement

    Energy Technology Data Exchange (ETDEWEB)

    Chung, W. S.; Yun, S. W.; Lee, D. S. [Korea Atomic Energy Research Inst., Dukjin-dong 150, Yusung-gu, Daejon, R.O., 305-353 (Korea, Republic of); Go, D. Y. [Kyung Hee Univ., Kyung Hee daero 26, Dongdaemoon-gu, Seoul, R.O., 130-701 (Korea, Republic of)

    2012-07-01

    Questions of whether past nuclear regulatory body of Korea is not a proper system to monitor and check the country's nuclear energy policy and utilization have been raised. Moreover, a feeling of insecurity regarding nuclear safety after the nuclear accident in Japan has spread across the public. This has stimulated a renovation of the nuclear safety regime in Korea. The Nuclear Safety and Security Commission (NSSC) was launched on October 26, 2011 as a regulatory body directly under the President in charge of strengthening independence and nuclear safety. This was a meaningful event as the NSSC it is a much more independent regulatory system for Korea. However, the NSSC itself does not guarantee an enhanced public acceptance of the nuclear policy and stable use nuclear energy. This study introduces the new NSSC system and its details in terms of organization structure, appropriateness of specialty, budget stability, and management system. (authors)

  14. Nuclear Forensics: Scientific Analysis Supporting Law Enforcement and Nuclear Security Investigations.

    Science.gov (United States)

    Keegan, Elizabeth; Kristo, Michael J; Toole, Kaitlyn; Kips, Ruth; Young, Emma

    2016-02-02

    Nuclear forensic science, or "nuclear forensic", aims to answer questions about nuclear material found outside of regulatory control. In this Feature, we provide a general overview of nuclear forensics, selecting examples of key "nuclear forensic signatures" which have allowed investigators to determine the identity of unknown nuclear material in real investigations.

  15. Hard X-ray mirrors for Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Descalle, M. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Brejnholt, N. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hill, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Decker, T. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Alameda, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Soufli, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Pivovaroff, M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Pardini, T. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-01-07

    Research performed under this LDRD aimed to demonstrate the ability to detect and measure hard X-ray emissions using multilayer X-ray reflective optics above 400 keV, to enable the development of inexpensive and high-accuracy mirror substrates, and to investigate applications of hard X-ray mirrors of interest to the nuclear security community. Experiments conducted at the European Synchrotron Radiation Facility demonstrated hard X-ray mirror reflectivity up to 650 keV for the first time. Hard X-ray optics substrates must have surface roughness under 3 to 4 Angstrom rms, and three materials were evaluated as potential substrates: polycarbonates, thin Schott glass and a new type of flexible glass called Willow Glass®. Chemical smoothing and thermal heating of the surface of polycarbonate samples, which are inexpensive but have poor intrinsic surface characteristics, did not yield acceptable surface roughness. D263 Schott glass was used for the focusing optics of the NASA NuSTAR telescope. The required specialized hardware and process were costly and motivated experiments with a modified non-contact slumping technique. The surface roughness of the glass was preserved and the process yielded cylindrical shells with good net shape pointing to the potential advantage of this technique. Finally, measured surface roughness of 200 and 130 μm thick Willow Glass sheets was between 2 and 2.5 A rms. Additional results of flexibility tests and multilayer deposition campaigns indicated it is a promising substrate for hard X-ray optics. The detection of U and Pu characteristics X-ray lines and gamma emission lines in a high background environment was identified as an area for which X-ray mirrors could have an impact and where focusing optics could help reduce signal to noise ratio by focusing signal onto a smaller detector. Hence the first one twelvetant of a Wolter I focusing optics for the 90 to 140 keV energy range based on aperiodic multilayer coating was designed. Finally

  16. ICT security- aspects important for nuclear facilities; Information and Communication Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thunem, Atoosa P-J.

    2005-09-15

    Rapid application growth of complex Information and Communication Technologies (ICT) in every society and state infrastructure as well as industry has revealed vulnerabilities that eventually have given rise to serious security breaches. These vulnerabilities together with the course of the breaches from cause to consequence are gradually about to convince the field experts that ensuring the security of ICT-driven systems is no longer possible by only relying on the fundaments of computer science, IT, or telecommunications. Appropriating knowledge from other disciplines is not only beneficial, but indeed very necessary. At the same time, it is a common observation today that ICT-driven systems are used everywhere, from the nuclear, aviation, commerce and healthcare domains to camera-equipped web-enabled cellular phones. The increasing interdisciplinary and inter-sectoral aspects of ICT security worldwide have been providing updated and useful information to the nuclear domain, as one of the emerging users of ICT-driven systems. Nevertheless, such aspects have also contributed to new and complicated challenges, as ICT security for the nuclear domain is in a much more delicate manner than for any other domains related to the concept of safety, at least from the public standpoint. This report addresses some important aspects of ICT security that need to be considered at nuclear facilities. It deals with ICT security and the relationship between security and safety from a rather different perspective than usually observed and applied. The report especially highlights the influence on the security of ICT-driven systems by all other dependability factors, and on that basis suggests a framework for ICT security profiling, where several security profiles are assumed to be valid and used in parallel for each ICT-driven system, sub-system or unit at nuclear facilities. The report also covers a related research topic of the Halden Project with focus on cyber threats and

  17. Affordable and Secure Nuclear Energy Development: DOE Investments and Laboratory R&D Challenges - A Review

    Energy Technology Data Exchange (ETDEWEB)

    Dasari, Venkateswara Rao [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-12-20

    The need for sustainable and secure nuclear energy is summarized. Driven by economics and public-private partnerships, the technology is evolving. Cost control and regulatory simplification are needed for a nuclear renaissance. Small modular reactors--simple, scalable, and inherently safe--may be the future.

  18. 78 FR 77606 - Security Requirements for Facilities Storing Spent Nuclear Fuel

    Science.gov (United States)

    2013-12-24

    ... COMMISSION 10 CFR Parts 72 and 73 RIN 3150-AI78 Security Requirements for Facilities Storing Spent Nuclear... requirements for storing spent nuclear fuel (SNF) in an independent spent fuel storage installation (ISFSI), and for storing SNF and/or high-level radioactive waste (HLW) in a monitored retrievable storage...

  19. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  20. Defining nuclear security in the 21st century

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E [Los Alamos National Laboratory

    2009-01-01

    A conference devoted to Reducing the Risks from Radioactive and Nuclear Materials presupposes that such risks exist. Few would disagree, but what are they? While debate on the nature and severity of risks associated with nuclear energy will always remain, it is easy to define a set of risks that are almost universally acknowledged. These include: (1) Nuclear warfare between states; (2) Continued proliferation of nuclear weapons and weapons-grade nuclear materials to states and non-state actors; (3) Terrorists or non-state actor acquisition or use nuclear weapons or nuclear materials; (4) Terrorists or non-state actors attack on a nuclear facility; and (5) Loss or diversion of nuclear weapons or materials by a state to unauthorized uses. These are listed in no particular order of likelihood or potential consequence. They are also very broadly stated, each one could be broken down into a more detailed set of discrete risks or threats. The fact that there is a strong consensus on the existence of these risks is evidence that we remain in an era of nuclear insecurity. This becomes even clearer when we note that most major trends influencing the probability of these risks continue to run in a negative direction.

  1. Cyber security risk evaluation of a nuclear I and C using BN and ET

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jin Soo; Heo, Gyun Young [Dept. of Nuclear Engineering, Kyung Hee University, Yongin (Korea, Republic of); Son, Han Seong [Computer and Game Science, Joongbu University, Geumsan (Korea, Republic of)

    2017-04-15

    Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

  2. Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

    Directory of Open Access Journals (Sweden)

    Jinsoo Shin

    2017-04-01

    Full Text Available Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

  3. Summary Report for the Radiation Detection for Nuclear Security Summer School 2014

    Energy Technology Data Exchange (ETDEWEB)

    Runkle, Robert C.; Baciak, James E.; Woodring, Mitchell L.; Jenno, Diana M.

    2014-09-30

    Executive Summary The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the 3rd Radiation Detection for Nuclear Security Summer School from 16 – 27 June 2014. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security. In fact, we are beginning to see previous students both enroll in graduate programs (former undergraduates) and complete internships at agencies like the National Nuclear Security Administration.

  4. Summary Report for the Radiation Detection for Nuclear Security Summer School 2014

    Energy Technology Data Exchange (ETDEWEB)

    Runkle, Robert C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Baciak, James E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Woodring, Mitchell L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Jenno, Diana M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-09-01

    Executive Summary The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the 3rd Radiation Detection for Nuclear Security Summer School from 16 – 27 June 2014. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security. In fact, we are beginning to see previous students both enroll in graduate programs (former undergraduates) and complete internships at agencies like the National Nuclear Security Administration.

  5. Understanding the Value of a Computer Emergency Response Capability for Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Gasper, Peter Donald [Idaho National Laboratory; Rodriguez, Julio Gallardo [Idaho National Laboratory

    2015-06-01

    The international nuclear community has a great understanding of the physical security needs relating to the prevention, detection, and response of malicious acts associated with nuclear facilities and radioactive material. International Atomic Energy Agency (IAEA) Nuclear Security Recommendations (INFCIRC_225_Rev 5) outlines specific guidelines and recommendations for implementing and maintaining an organization’s nuclear security posture. An important element for inclusion into supporting revision 5 is the establishment of a “Cyber Emergency Response Team (CERT)” focused on the international communities cybersecurity needs to maintain a comprehensive nuclear security posture. Cybersecurity and the importance of nuclear cybersecurity require that there be a specific focus on developing an International Nuclear CERT (NS-CERT). States establishing contingency plans should have an understanding of the cyber threat landscape and the potential impacts to systems in place to protect and mitigate malicious activities. This paper will outline the necessary components, discuss the relationships needed within the international community, and outline a process by which the NS-CERT identifies, collects, processes, and reports critical information in order to establish situational awareness (SA) and support decision-making

  6. Redefining Human Security for Vulnerable Migrants in East Asia

    Directory of Open Access Journals (Sweden)

    Jiyoung Song

    2015-01-01

    Full Text Available This article proposes human security as an analytical framework to understand the current trends of irregular migration (both forced and unauthorised in East Asia and revisits the seven pillars of human security defined in the 1994 Human Development Report by the United Nations Development Programme (UNDP. It explains how the concepts of human security are parallel to those prescribed in international human rights conventions but different in terms of the attitude towards states. Human security does not directly challenge state authority and adds a sense of urgency and moral authority that requires extra-legal measures by the states. The author argues that human security is the securitisation of human rights and is a better framework and policy discourse than human rights to engage with state and non-state actors, especially in East Asia where political leaders are more receptive to the former idea. The study draws examples from stateless Rohingyas, undocumented sex workers in Thailand and Singapore, trafficked brides from Vietnam and Cambodia, and smuggled North Korean refugees in China to demonstrate the nexus between human security and irregular migration.

  7. Principles of Security: Human, Cyber, and Biological

    CERN Document Server

    Stacey, Blake C

    2013-01-01

    Cybersecurity attacks are a major and increasing burden to economic and social systems globally. Here we analyze the principles of security in different domains and demonstrate an architectural flaw in current cybersecurity. Cybersecurity is inherently weak because it is missing the ability to defend the overall system instead of individual computers. The current architecture enables all nodes in the computer network to communicate transparently with one another, so security would require protecting every computer in the network from all possible attacks. In contrast, other systems depend on system-wide protections. In providing conventional security, police patrol neighborhoods and the military secures borders, rather than defending each individual household. Likewise, in biology, the immune system provides security against viruses and bacteria using primarily action at the skin, membranes, and blood, rather than requiring each cell to defend itself. We propose applying these same principles to address the c...

  8. World population, human disaster, and nuclear holocaust.

    Science.gov (United States)

    Giddings, J C

    1973-09-01

    Too little attention is being paid to the theoretical mechanics of dealing with the optimum level of human population. Yet without such efforts, population goals are essentially meaningless and there is little incentive to curtail population growth. In an attempt to take a step in that direction, the author discusses a broad class of interrelated phenomena--consisting of various threats to human existence--that hinge strongly on population density. Then he develops simple conceptual models that provide a quantitative population dependence for various threats. These are always expressed as a simple power of population. Only threats of disasters that increase with an increase in population density are considered, eliminating most natural disasters. Threats of the 1st order, such as those from nuclear wastes and chemical pollutants, increase with an increase in population and a resultant increase in production. However, with increasing crowding and dependency upon high energy systems to provide basic resources, many 1st order threats can become threats of the 2nd of higher orders. The burial of nuclear wastes, for example, presents a threat of the 2nd order by affecting 1) the integrity of the geological formation at the burial site; and 2) the quantity of the radioactive material. As the relationship between population and interdependency strengthens, the crucial question will concern the stability of the independent networks; 1 error, due to human frailty or malice, can destroy a chain supplying food, energy, communications, or water. Into this system are thrown nuclear weapons, which, through human error or malice, could demolish the world. To illuminate some of the major elements of the nuclear threat, a model based on the threshold concept of nuclear armaments was created. This concept recognizes that any alliance of people possessing a minimum of technological and economic resources could build and deploy nuclear weapons. Most alliances will constitute no danger

  9. Measuring Human Performance within Computer Security Incident Response Teams

    Energy Technology Data Exchange (ETDEWEB)

    McClain, Jonathan T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Silva, Austin Ray [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Avina, Glory Emmanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Forsythe, James C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  10. Framework for Integrating Safety, Operations, Security, and Safeguards in the Design and Operation of Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Darby, John L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Horak, Karl Emanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); LaChance, Jeffrey L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Tolk, Keith Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Whitehead, Donnie Wayne [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2007-10-01

    The US is currently on the brink of a nuclear renaissance that will result in near-term construction of new nuclear power plants. In addition, the Department of Energy’s (DOE) ambitious new Global Nuclear Energy Partnership (GNEP) program includes facilities for reprocessing spent nuclear fuel and reactors for transmuting safeguards material. The use of nuclear power and material has inherent safety, security, and safeguards (SSS) concerns that can impact the operation of the facilities. Recent concern over terrorist attacks and nuclear proliferation led to an increased emphasis on security and safeguard issues as well as the more traditional safety emphasis. To meet both domestic and international requirements, nuclear facilities include specific SSS measures that are identified and evaluated through the use of detailed analysis techniques. In the past, these individual assessments have not been integrated, which led to inefficient and costly design and operational requirements. This report provides a framework for a new paradigm where safety, operations, security, and safeguards (SOSS) are integrated into the design and operation of a new facility to decrease cost and increase effectiveness. Although the focus of this framework is on new nuclear facilities, most of the concepts could be applied to any new, high-risk facility.

  11. Human somatic cell nuclear transfer and cloning.

    Science.gov (United States)

    2012-10-01

    This document presents arguments that conclude that it is unethical to use somatic cell nuclear transfer (SCNT) for infertility treatment due to concerns about safety; the unknown impact of SCNT on children, families, and society; and the availability of other ethically acceptable means of assisted reproduction. This document replaces the ASRM Ethics Committee report titled, "Human somatic cell nuclear transfer (cloning)," last published in Fertil Steril 2000;74:873-6. Copyright © 2012 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  12. Review of EPRI Nuclear Human Factors Program

    Energy Technology Data Exchange (ETDEWEB)

    Hanes, L.F.; O`Brien, J.F. [Electric Power Research Institute, Palo Alto, CA (United States)

    1996-03-01

    The Electric Power Research Institute (EPRI) Human Factors Program, which is part of the EPRI Nuclear Power Group, was established in 1975. Over the years, the Program has changed emphasis based on the shifting priorities and needs of the commercial nuclear power industry. The Program has produced many important products that provide significant safety and economic benefits for EPRI member utilities. This presentation will provide a brief history of the Program and products. Current projects and products that have been released recently will be mentioned.

  13. Cyber security in nuclear power plants and its portability to other industrial infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Champigny, Sebastien; Gupta, Deeksha; Watson, Venesa; Waedt, Karl [AREVA GmbH, Erlangen (Germany)

    2017-06-15

    Power generation increasingly relies on decentralised and interconnected computerised systems. Concepts like ''Industrial Internet of Things'' of the Industrial Internet Consortium (IIC), and ''Industry 4.0'' find their way in this strategic industry. Risk of targeted exploits of errors and vulnerabilities increases with complexity, interconnectivity and decentralization. Inherently stringent security requirements and features make nuclear computerised applications and systems a benchmark for industrial counterparts seeking to hedge against those risks. Consequently, this contribution presents usual cyber security regulations and practices for nuclear power plants. It shows how nuclear cyber security can be ported and used in an industrial context to protect critical infrastructures against cyber-attacks and industrial espionage.

  14. Child rights, right to water and sanitation, and human security.

    Science.gov (United States)

    Pink, Ross

    2012-06-15

    The article explores the intersection between child rights, water scarcity, sanitation, and the human security paradigm. The recognition of child rights has been advanced through the 1989 Convention on the Rights of the Child and other international legal instruments, while water rights are increasingly affirmed in international law and through the historic July 2010 United Nations General Assembly resolution that strengthened the legal foundation for water security and human rights. Yet there remains a development gap in terms of child access to clean and secure water sources for basic human development needs. The human security paradigm provides a legal and humanitarian foundation for the extension of child rights related to water and sanitation. Copyright © 2012 Pink.

  15. Current Status and Future Perspective of Nuclear Energy Human Resource Development

    Science.gov (United States)

    Yamamoto, Shinji

    In recent years, expectations for nuclear energy have been increasing in Japan because of its role and responsibility as a key power source, the contribution it can make to a global nuclear renaissance, the need for energy security, and the importance of combating global warming. Ensuring and fostering good human resources is essential if the nuclear industry is to maintain itself and expand its scale. There are obstacles, however, in doing so : a declining birth rate, job-hunting problem, the wave of retirements in 2007, the declining popularity of engineering departments and particularly nuclear-related subjects, a weakening of nuclear education, and deteriorating research facilities and equipment. While nuclear-related academic, industrial and governmental parties share this recognition and are cooperating and collaborating, all organizations are expected similarly to continue their own wholehearted efforts at human resource development.

  16. International and national security applications of cryogenic detectors - mostly nuclear safeguards

    Energy Technology Data Exchange (ETDEWEB)

    Rabin, Michael W [Los Alamos National Laboratory

    2009-01-01

    As with science, so with security - in both arenas, the extraordinary sensitivity of cryogenic sensors enables high-confidence detection and high-precision measurement even of the faintest signals. Science applications are more mature, but several national and international security applications have been identified where cryogenic detectors have high potential payoff. International safeguards and nuclear forensics are areas needing new technology and methods to boost speed, sensitivity, precision and accuracy. Successfully applied, improved nuclear materials analysis will help constrain nuclear materials diversion pathways and contribute to treaty verification. Cryogenic microcalorimeter detectors for X-ray, gamma ray, neutron, and alpha particle spectrometry are under development with these aims in mind. In each case the unsurpassed energy resolution of microcalorimeters reveals previously invi sible spectral features of nuclear materials. Preliminary results of quantitative analysis indicate substantial improvements are still possible, but significant work will be required to fully understand the ultimate performance limits.

  17. Integrated Approach to Peace & Human Security in the 21st Century

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2016-10-01

    Full Text Available Humanity has made remarkable progress during the past two centuries in advancing peace, democracy, human rights, economic development and social equality. The evolution of human relations has progressed far from the time when physical violence, war and conquest were the predominant form of international relations. Diplomacy has evolved from political negotiations at the conference table to mutually beneficial economic exchange and creative cultural integration. But the ideal of peace and human security for all human beings remains elusive, distant and utopian. Violence and insecurity persist and social harmony is threatened by the competition for political supremacy, markets, jobs and scarce resources. Thousands of nuclear weapons remain armed and on alert. Existential ecological threats increase daily. The roots of war and violence remain intact, even if their most horrendous expressions have receded from view. The permanent abolition of war and achievement of human security for all cannot be attained by narrowly conceived political alliances or collective security agreements. The negative concept of peace as the absence of war needs to be replaced by a positive conception of peace as the essential condition for the fullest development of human potential. The narrow concept of security in military and political terms needs to be replaced by an inclusive conception that views security as an emergent property of effective and harmonious social organization founded on the ultimate value of the human being. Peace and security are fundamental attributes of society as a whole. They can only be achieved by a comprehensive, integrated approach that addresses the roots of violence and disharmony in all forms—political, military, economic, social, cultural and ecological. This will require radical democratization of international institutions, establishment of an effective global legal process, abandonment of outmoded conceptions of national

  18. Effects of Nuclear Energy on Sustainable Development and Energy Security: Sodium-Cooled Fast Reactor Case

    OpenAIRE

    Sungjoo Lee; Byungun Yoon; Juneseuk Shin

    2016-01-01

    We propose a stepwise method of selecting appropriate indicators to measure effects of a specific nuclear energy option on sustainable development and energy security, and also to compare an energy option with another. Focusing on the sodium-cooled fast reactor, one of the highlighted Generation IV reactors, we measure and compare its effects with the standard pressurized water reactor-based nuclear power, and then with coal power. Collecting 36 indicators, five experts select seven key indic...

  19. Russian Military and Security Forces: A Postulated Reaction to a Nuclear Detonation

    Energy Technology Data Exchange (ETDEWEB)

    Ball, D

    2005-04-29

    In this paper, we will examine how Russia's military and security forces might react to the detonation of a 10-kiloton nuclear weapon placed next to the walls surrounding the Kremlin. At the time of this 'big bang,' Putin is situated outside Moscow and survives the explosion. No one claims responsibility for the detonation. No other information is known. Numerous variables will determine how events ultimately unfold and how the military and security forces will respond. Prior to examining these variables in greater detail, it is imperative to elucidate first what we mean by Russia's military and security forces.

  20. Securing the city: challenges to human rights

    NARCIS (Netherlands)

    Jaffe, R.; Grassiani, E.; van Lindert, T.; Lettinga, D.

    2014-01-01

    Walking through Downtown Kingston, you might see a tank roll past on its way to an inner-city neighbourhood. In Jerusalem, entering the bus station involves passing through a metal detector and having your bags scanned by private security. As these examples indicate, militarization and privatization

  1. Evolution of thinking and research on human security and personal security 1994-2013.

    NARCIS (Netherlands)

    D.R. Gasper (Des); O.A. Gómez (Oscar)

    2014-01-01

    markdownabstract__Abstract__ Human security analysis considers the intersection of deprivation and vulnerability, and is an essential part, or partner, of human development thinking, giving special attention to risks and forces of disruption and destruction. This paper highlights six strands or sty

  2. Legislating for Terrorism: The Philippines’ Human Security Act 2007

    Directory of Open Access Journals (Sweden)

    Pauline E. Eadie

    2011-11-01

    Full Text Available In February 2007 the Philippine Senate passed the Human Security Act (HSA otherwise known as Republic Act No. 9372: An Act to Secure the State and Protect our People From Terrorism. Philippine Senate Minority Leader Aquilino Q. Pimentel Jr. was heavily involved in the final drafting of the HSA. He gave it its final name shortly before the Senate Chamber passed it into law. Previously the Act had been known by various titles including ‘An Act to Deter and Punish Acts of Terrorism and for Other Purposes’ (Senate Bill No. 2137 and ‘An Act to Define and Punish the Crime of Terrorism, the Crime of Conspiracy to Commit Terrorism, and the Crime of Proposal to Commit Terrorism, and for Other Purposes (Senate Bill No. 2187. Thus the Human Security Act exists as an instrument of counter terrorism as opposed to human security policy.

  3. Report on nuclear installations safety and security control. Rapport sur le controle de la surete et de la securite des installations nucleaires. Surete des installations. Securite et information

    Energy Technology Data Exchange (ETDEWEB)

    Birraux, C.; Serusclat, F.

    1990-01-01

    This report of the parliamentary office for evaluation of scientific and technological choices bearing on the safety and security of nuclear installations is divided into 2 volumes bearing on: - Volume I: nuclear installations safety. - nuclear safety and international organizations. - works separation: Finland, Belgium and Federal Republic of Germany. - French organization. - Volume II: security and information. - French nuclear security. - Public information.

  4. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    Energy Technology Data Exchange (ETDEWEB)

    Zakaria, M.; Mandere, N.; Olsson, L. [Lund Univ., Centre for Sustainability Studies (LUCSUS) (Sweden)

    2006-07-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  5. Potential National Security Applications of Nuclear Resonance Fluorescence Methods

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Glen A.; Peplowski, Patrick N.; Caggiano, Joseph A.

    2009-06-09

    The objective of this report is to document the initial investigation into the possible research issues related to the development of NRF-based national security applications. The report discusses several potential applications ranging from measuring uranium enrichment in UF6 canisters to characterization of gas samples. While these applications are varied, there are only a few research issues that need to be addressed to understand the limitation of NRF in solving these problems. These research issues range from source and detector development to measuring small samples. The next effort is to determine how best to answer the research issues, followed by a prioritization of those questions to ensure that the most important are addressed. These issues will be addressed through either analytical calculations, computer simulations, analysis of previous data or collection of new measurements. It will also be beneficial to conduct a thorough examination of a couple of the more promising applications in order to develop concrete examples of how NRF may be applied in specific situations. The goals are to develop an understanding of whether the application of NRF is limited by technology or physics in addressing national security applications, to gain a motivation to explore those possible applications, and to develop a research roadmap so that those possibilities may be made reality.

  6. Ground Truth in Building Human Security

    Science.gov (United States)

    2012-11-01

    2011, equipped with a laptop computer and a digital camera, I accompanied a team implementing the USAID-funded Title Registration and Microfinance ...security or collateral for a microfinance loan, typically $100 to $500 USD for six months, to buy a sewing machine, basket weaving material, or other...equipment and supplies for an in- home business.82 The Title Registration and Microfinance Project ad- dresses the dual challenges of conducting land

  7. 33 CFR 165.505 - Security Zone; Calvert Cliffs Nuclear Power Plant, Chesapeake Bay, Calvert County, Maryland.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Calvert Cliffs Nuclear Power Plant, Chesapeake Bay, Calvert County, Maryland. 165.505 Section 165.505 Navigation and... Areas Fifth Coast Guard District § 165.505 Security Zone; Calvert Cliffs Nuclear Power Plant,...

  8. Use of video systems in securing nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Zakharko, Eleonora; Weizel, Udo [Gesellschaft fuer Anlagen- und Reaktorsicherheit mbH (GRS), Koeln (Germany); Rduch, Alexander

    2010-07-01

    Current paper considers application of video systems, so called Closed-Circuit Television (CCTV), in physical protection of nuclear facilities. CCTV is being used for general surveillance tasks, for alarm assessment, for detection purposes and is crucial for the efficient operation of physical protection system in whole. The main parts of general design layout are being analyzed: i.e. image obtaining, signal transmission, signal processing and signal visualization is being provided. It is underlined, that the general trend of high tech solutions in the field of physical protection is in particular based on innovations in the applications with video systems (orig.)

  9. Editorial for Journal of Human Security Volume 11

    Directory of Open Access Journals (Sweden)

    Sabina Lautensach

    2015-01-01

    Full Text Available This editorial marks the beginning of the journal's eleventh year since its inception as the Australasian Journal of Human Security. As a sample from an ex­tremely tumultuous era in human history, this time span has consistently provided an abundance of human security issues for me to comment on. Yet, for the first time since that fateful day in September of 2001, I feel that the world has arrived at another historical turning point. I am referring to the attack on the Paris office of the satirical journal Charlie Hebdo on January 7 and the events immediately following it.

  10. Neutron Time Projection Chamber for Nuclear Security and Verification Applications

    Science.gov (United States)

    Jovanovic, I.; Bowden, N. S.; Carosi, G. P.; Heffner, M.; Roecker, C.

    2011-12-01

    Detection of fast neutrons produced by fission is a powerful method for discovering, verifying the presence, or monitoring significant quantities of special nuclear material (SNM) at up to moderate distances. Fast neutrons are relatively rare in the natural background and can be very penetrating, even in situations when the energetic gamma-rays are well shielded. Fast neutrons point in the direction of their source and can thus be considered for use in imaging, a feature desirable for rapid, high-signal-to-noise detection of concealed SNM and for nuclear verification. We describe the development and performance of a prototype neutron time projection chamber (nTPC) and its use for directional neutron detection and high-resolution neutron imaging. The nTPC is based on ˜0.025 m3 of a hydrogen-methane mixture and utilizes a readout system with low channel count and is optimized for low event rates. We experimentally demonstrate robust operation, reliable particle identification, event-by-event directional reconstruction over the entire 4π solid angle, and insensitivity to gamma-rays. High-efficiency and high-resolution modes of operation based on single and double neutron scatters, respectively, have also been demonstrated.

  11. Nuclear Material Monitoring System (NMMS) for security screens

    Energy Technology Data Exchange (ETDEWEB)

    Hyun Kim, Kwang, E-mail: radkim@jwu.ac.kr [Faculty of Biomedical Engineering, Jungwon University, 5 Goesan-eup, Goesan-gun, Chungcheongbuk-do 367-805 (Korea, Republic of); Hong Chang, Ji [Faculty of Biomedical Engineering, Jungwon University, 5 Goesan-eup, Goesan-gun, Chungcheongbuk-do 367-805 (Korea, Republic of); Hyun Jung, Young [Department of Radiological Science, Yonsei University, Wonju (Korea, Republic of)

    2011-08-21

    As a Nuclear Material Monitoring System (NMMS), two large-volume plastic detectors and a NaI detector for gamma-ray sources and two He-3 tubes for neutron sources were integrated in a mobile box that can be mounted on a vehicle. Custom-made preamplifiers, shapers, and a MCA (Multi-Channel Analyzer) for each detector were conceived of and built on a compact circuit board to collect and integrate different types of data from each detector. The collected data, counts rates and spectra of the detected radiation, were continually monitored and plotted on several user-friendly display windows on a laptop computer. The system performance in the vehicle-mounted condition was tested for Co-60, Cs-137, and Cf-252 sources at various distances and speeds.

  12. Secured electrical supply at least cost: Coal, gas, nuclear, hydro

    Energy Technology Data Exchange (ETDEWEB)

    Gavor, J. [ENA Ltd., Prague (Czechoslovakia); Stary, O.; Vasicek, J. [Czech Technical Univ., Prague (Czechoslovakia)

    1995-12-01

    Electric power sector in East Central European countries finds in a difficult period. In the situation of demand stagnation, enormous investments must be realized in a very short time. Today`s decisions in the development strategy will influence the long term future of the industry. The optimal structure of the sources is one of the most important problem to be solved. Paper describes the current structure of the sources in electric power sector in the Czech Republic. The importance of coal, oil and gas, nuclear and hydro in electric power generation is compared. Taking into account the different position in the load coverage, economy of individual sources is evaluated and basic results of discounted cash flow calculations are presented. Information on specific investment programs and projects are included and further trends are estimated.

  13. Global Security Rule Sets An Analysis of the Current Global Security Environment and Rule Sets Governing Nuclear Weapons Release

    Energy Technology Data Exchange (ETDEWEB)

    Mollahan, K; Nattrass, L

    2004-09-30

    America is in a unique position in its history. In maintaining its position as the world's only superpower, the US consistently finds itself taking on the role of a global cop, chief exporter of hard and soft power, and primary impetus for globalization. A view of the current global situation shows an America that can benefit greatly from the effects of globalization and soft power. Similarly, America's power can be reduced significantly if globalization and its soft power are not handled properly. At the same time, America has slowly come to realize that its next major adversary is not a near peer competitor but terrorism and disconnected nations that seek nuclear capabilities. In dealing with this new threat, America needs to come to terms with its own nuclear arsenal and build a security rule set that will establish for the world explicitly what actions will cause the US to consider nuclear weapons release. This rule set; however, needs to be established with sensitivity to the US's international interests in globalization and soft power. The US must find a way to establish its doctrine governing nuclear weapons release without threatening other peaceful nations in the process.

  14. The development of mobile robot for security application and nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, B. S.; Lee, Y. B.; Choi, Y. S.; Seo, Y. C.; Park, Y. M

    1999-12-01

    The use of a mobile robot system in nuclear radioactive environments has the advantage of watching and inspecting the NPP safety-related equipment systematically and repairing damaged parts efficiently, thereby enhancing the safe operations of NPPs as well as reducing significantly personnel's dose rate to radioactive environment. Key technology achieved through the development of such robotic system can be used for security application and can offer new approaches to many of the tasks faced to the industry as well. The mobile robot system was composed of a mobile subsystem, a manipulator subsystem, a control subsystem, and a sensor subsystem to use in security application and nuclear radioactive environments. The mobile subsystem was adopted to synchro-drive method to improve the mobility of it. And the manipulator subsystem was developed to minimize the weight and easy to control at remote site. Finally, we developed the USB-based robot control system considering the expandability and modularity. The developed mobile robot for inspection and security was experimented for the collision avoidance and autonomous algorithm, and then it was confirmed that the mobile robot was very effective to the security application and inspection of nuclear facilities. (author)

  15. Human Security and Energy Security: A Sustainable Energy System as a Public Good

    NARCIS (Netherlands)

    Karlsson-Vinkhuyzen, S.I.S.E.; Jollands, N.

    2013-01-01

    This chapter is dedicated to the concept of human security and its link to energy and energy governance, particularly global energy governance. Through this focus emerges the need to look at the links between the concept of public goods and energy. Our starting argument is that conventional notions

  16. Digital Systems Security in the nuclear scope; Sistemas Digitales de Seguridad en el ambito nuclear

    Energy Technology Data Exchange (ETDEWEB)

    Amado, I.

    2011-07-01

    Overall nuclear power plants and in particular the Spanish, work well, but to modernize and improve the operation of existing Spanish plants, perhaps the natural evolution is to use digital technologies.

  17. Human Security: A Thematic Guidance Note for Regional and National Human Development Report Teams

    NARCIS (Netherlands)

    O.A. Gómez (Oscar); D.R. Gasper (Des)

    2013-01-01

    textabstractAbstract Many important aspects of human development relate also to people’s security: loosely defined as people’s freedom from fear and freedom from want in a broad sense. Applying a human security approach offers an opportunity to analyse many issues in an informative way.

  18. Human Security: A Thematic Guidance Note for Regional and National Human Development Report Teams

    NARCIS (Netherlands)

    O.A. Gómez (Oscar); D.R. Gasper (Des)

    2013-01-01

    textabstractAbstract Many important aspects of human development relate also to people’s security: loosely defined as people’s freedom from fear and freedom from want in a broad sense. Applying a human security approach offers an opportunity to analyse many issues in an informative way. This note

  19. Training on Transport Security of Nuclear/Radioactive Materials for Key Audiences

    Energy Technology Data Exchange (ETDEWEB)

    Pope, Ronald; Liu, Yung; Shuler, J.M.

    2016-01-01

    Beginning in 2013, the U.S. Department of Energy (DOE) Packaging Certification Program (PCP), Office of Packaging and Transportation, Office of Environmental Management has sponsored a series of three training courses on Security of Nuclear and Other Radioactive Materials during Transport. These courses were developed and hosted by Argonne National Laboratory staff with guest lecturers from both the U.S. and international organizations and agencies including the U.S. Nuclear Regulatory Commission (NRC), Federal Bureau of Investigation (FBI), the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), DOE national laboratories, the International Atomic Energy Agency (IAEA), the World Nuclear Transport Institute (WNTI), and the World Institute for Nuclear Security (WINS). Each of the three courses held to date were one-week in length. The courses delved in detail into the regulatory requirements for transport security, focusing on international and U.S.-domestic requirements and guidance documents. Lectures, in-class discussions and small group exercises, including tabletop (TTX) and field exercises were designed to enhance the learning objectives for the participants. For example, the field exercise used the ARG-US radio frequency identification (RFID) remote surveillance system developed by Argonne for DOE/PCP to track and monitor packages in a mock shipment, following in-class exercises of developing a transport security plan (TSP) for the mock shipment, performing a readiness review and identifying needed corrective actions. Participants were able to follow the mock shipment on the webpage in real time in the ARG-US Command Center at Argonne including “staged” incidents that were designed to illustrate the importance of control, command, communication and coordination in ensuring transport security. Great lessons were learned based on feedback from the participant’s course evaluations with the series of the courses. Since the

  20. Report on emergency electrical power supply systems for nuclear fuel cycle and reactor facilities security systems

    Energy Technology Data Exchange (ETDEWEB)

    1977-01-01

    The report includes information that will be useful to those responsible for the planning, design and implementation of emergency electric power systems for physical security and special nuclear materials accountability systems. Basic considerations for establishing the system requirements for emergency electric power for security and accountability operations are presented. Methods of supplying emergency power that are available at present and methods predicted to be available in the future are discussed. The characteristics of capacity, cost, safety, reliability and environmental and physical facility considerations of emergency electric power techniques are presented. The report includes basic considerations for the development of a system concept and the preparation of a detailed system design.

  1. Application of Framework for Integrating Safety, Security and Safeguards (3Ss) into the Design Of Used Nuclear Fuel Storage Facility

    Energy Technology Data Exchange (ETDEWEB)

    Badwan, Faris M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Demuth, Scott F [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-06

    Department of Energy’s Office of Nuclear Energy, Fuel Cycle Research and Development develops options to the current commercial fuel cycle management strategy to enable the safe, secure, economic, and sustainable expansion of nuclear energy while minimizing proliferation risks by conducting research and development focused on used nuclear fuel recycling and waste management to meet U.S. needs. Used nuclear fuel is currently stored onsite in either wet pools or in dry storage systems, with disposal envisioned in interim storage facility and, ultimately, in a deep-mined geologic repository. The safe management and disposition of used nuclear fuel and/or nuclear waste is a fundamental aspect of any nuclear fuel cycle. Integrating safety, security, and safeguards (3Ss) fully in the early stages of the design process for a new nuclear facility has the potential to effectively minimize safety, proliferation, and security risks. The 3Ss integration framework could become the new national and international norm and the standard process for designing future nuclear facilities. The purpose of this report is to develop a framework for integrating the safety, security and safeguards concept into the design of Used Nuclear Fuel Storage Facility (UNFSF). The primary focus is on integration of safeguards and security into the UNFSF based on the existing Nuclear Regulatory Commission (NRC) approach to addressing the safety/security interface (10 CFR 73.58 and Regulatory Guide 5.73) for nuclear power plants. The methodology used for adaptation of the NRC safety/security interface will be used as the basis for development of the safeguards /security interface and later will be used as the basis for development of safety and safeguards interface. Then this will complete the integration cycle of safety, security, and safeguards. The overall methodology for integration of 3Ss will be proposed, but only the integration of safeguards and security will be applied to the design of the

  2. Effects of Nuclear Energy on Sustainable Development and Energy Security: Sodium-Cooled Fast Reactor Case

    Directory of Open Access Journals (Sweden)

    Sungjoo Lee

    2016-09-01

    Full Text Available We propose a stepwise method of selecting appropriate indicators to measure effects of a specific nuclear energy option on sustainable development and energy security, and also to compare an energy option with another. Focusing on the sodium-cooled fast reactor, one of the highlighted Generation IV reactors, we measure and compare its effects with the standard pressurized water reactor-based nuclear power, and then with coal power. Collecting 36 indicators, five experts select seven key indicators to meet data availability, nuclear energy relevancy, comparability among energy options, and fit with Korean energy policy objectives. The results show that sodium-cooled fast reactors is a better alternative than existing nuclear power as well as coal electricity generation across social, economic and environmental dimensions. Our method makes comparison between energy alternatives easier, thereby clarifying consequences of different energy policy decisions.

  3. Regional, national and international security requirements for the transport of nuclear cargo by sea

    Energy Technology Data Exchange (ETDEWEB)

    Booker, P.A.; Barnwell, I. [Marine Operations, BNFL International Transport and British Nuclear Group Security (United Kingdom)

    2004-07-01

    Since the beginning of the nuclear age in the 1940's, the world has focused on the immense possibilities of nuclear power with both its destructive and productive capabilities. The civil nuclear industry in the UK, as in most nuclear weapons states, grew from the military facilities built in the post war years under the political climate of the Cold War. In the early years of the industry, civil and defence nuclear facilities were inextricably linked both in public perceptions and the regulatory infrastructure under which they operated. The nuclear arms race and the spread of communism overshadowed people's perceptions of there being two separate uses of nuclear material. This was a double edged sword which initially allowed the industry to develop largely unhindered by public concerns but latterly meant the industry could not break away from its roots and to many is still perceived as a dangerous and destructive force. Regulatory frameworks governing all aspects of the industry have developed both nationally and internationally driven by valid public concerns, political agendas and an international consensus that the unregulated use of nuclear material has catastrophic possibilities on an international scale. With the internationalisation of the civil nuclear industry and the costs associated with developing facilities to fully support each stage of the fuel cycle, from enrichment, fuel manufacturing, reprocessing and waste remediation, it became inevitable that a transport infrastructure would develop to make best use of the facilities. Regulations, both national and international are implicit in ensuring the security of nuclear material in transit. Due to the physical size of many of the irradiated fuel packages and implications of the changes to transport safety regulations, international transports of nuclear material, other than within mainland Europe, is predominantly carried out by sea.

  4. The Concept of Security Revisited New Approaches: Human Security and Risk Assessment

    OpenAIRE

    Adriana Mărgărit

    2009-01-01

    The field of study of security is confronted today with a proliferation of security relatedconcepts. In this regard we can mention various concepts, such as: “transnational security”, “extendedsecurity”, “human security”, “global security”, “cooperative security”, “international security”,“economic security” and many others. Ever since the end of the Cold War, the concept of humansecurity began to appear more often in the speeches of scholars, policy makers and even the media.Despite the more...

  5. Security after the revolutions of 1989 and 1991: The future with nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Weber, S. [Univ. of California, Berkeley, CA (United States)

    1992-12-31

    Political scientists typically view weapons within the realm of effects, not within the realm of cause. That is, weapons are a consequence of the great causal factors in international relations. Insecurity is the most important of these factors; it follows from the uneven distribution of power among states, the security dilemma, and the ever-present possibility that violence will be used to settle disagreements because there is no higher authority above states capable of enforcing rules. According to this logic weapons cause neither war nor peace. They are simply tools that states use to gain a share of the scarcest commodity - security - by fighting other states or by threatening to do so if necessary. Nuclear weapons are a product of great industrial capabilities, knowledge, and other resources. The United States and the Soviet Union had the largest arsenals of nuclear weapons because they were superpowers, not the other way around. On this logic, nuclear weapons reflect and reinforce a distribution of power that would exist in their absence. As the distribution of power among states changes, the status of nuclear weapons in the world will also change in a way that reflects the more fundamental causes that continue to drive state-state relationships in an anarchic world. In this chapter the author treat nuclears weapons within the realm of great causes. Arguing that nuclear weapons were a fundamental cause in bringing the Cold War, and with it the last vestiges of bipolarity, to an end. International life in the 1990s will not be the same as it was between 1945 and 1989. Will it be more like the multipolar world of the 1800s, with nuclear weapons simply grafted on the way other new weapons innovations have been in the past? That is not expected because nuclear weapons have altered the fundamental causal forces that drove previous international systems from peace to war and back again. 21 refs.

  6. Food Security and Human Rights in Indonesia

    NARCIS (Netherlands)

    Hadiprayitno, I.

    2010-01-01

    Food is crucial to an adequate standard of living. The acknowledgement of the right to food in government policies is fundamental to the protection of human dignity, particularly in relation to food insecurity. It allows the right-holder to seek redress and hold government accountable for non-fulfil

  7. REVIEW OF THE POTENTIAL OF NUCLEAR HYDROGEN FOR ADDRESSING ENERGY SECURITY AND CLIMATE CHANGE

    Energy Technology Data Exchange (ETDEWEB)

    James E. O' Brien

    2010-06-01

    Nuclear energy has the potential to exert a major positive impact on energy security and climate change by coupling it to the transportation sector, primarily through hydrogen production. In the short term, this coupling will provide carbon-free hydrogen for upgrading increasingly lower quality petroleum resources such as oil sands, offsetting carbon emissions associated with steam methane reforming. In the intermediate term, nuclear hydrogen will be needed for large-scale production of infrastructure-compatible synthetic liquid fuels. In the long term, there is great potential for the use of hydrogen as a direct vehicle fuel, most likely in the form of light-duty pluggable hybrid hydrogen fuel cell vehicles. This paper presents a review of the potential benefits of large-scale nuclear hydrogen production for energy security (i.e. displacing imported petroleum) and reduction of greenhouse gas emissions. Lifecycle benefits of nuclear energy in this context are presented, with reference to recent major publications on this topic. The status of US and international nuclear hydrogen research programs are discussed. Industry progress toward consumer-grade hydrogen fuel cell vehicles are also be examined.

  8. ENTNEA: A concept for enhancing regional atomic energy cooperation for securing nuclear transparency in northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Shin, S. T. [Korea Institute for Defence Analyses, Seoul (Korea)

    2000-11-01

    Nuclear energy continues to be a strong and growing component of economic development in Northeast Asia. A broad range of nuclear energy systems already exists across the region and vigorous growth is projected. Associated with these capabilities and plans are various concerns about operational safety, environmental protection, and accumulation of spent fuel and other nuclear materials. We consider cooperative measures that might address these concerns. The confidence building measures suggested here center on the sharing of information to lessen concerns about nuclear activities or to solve technical problems. These activities are encompassed by an Enhanced Nuclear Transparency in Northeast Asia (ENTNEA) concept that would be composed of near-term, information-sharing activities and an eventual regional institution. The near-term activities would address specific concerns and build a tradition of cooperation; examples include radiation measurements for public safety and emergency response, demonstration of safe operations at facilities and in transportation, and material security in the back end of the fuel cycle. Linkages to existing efforts and organizations would be sought to maximize the benefits of cooperation. In the longer term, the new cooperative tradition might evolve into an ENTNEA institution. In institutional form, ENTNEA could combine the near-term activities and new cooperative activities, which might require an institutional basis, for the mutual benefit and security of regional parties. 28 refs., 23 figs., 5 tabs. (Author)

  9. 76 FR 30204 - Exelon Nuclear, Dresden Nuclear Power Station, Unit 1; Exemption From Certain Security Requirements

    Science.gov (United States)

    2011-05-24

    ... the actions and decisions contained in the Responsibility Matrix of the safeguards contingency plan... program, to include a security organization, which will have as its objective to provide high assurance...., reactor vessel, piping systems, and building structures) for DNPS Unit 1 is in a form that does not pose a...

  10. Mitigating threat and risk in nuclear facilities through convergence of security systems

    Energy Technology Data Exchange (ETDEWEB)

    Flynn, Daniel John [Florida Institute of Technology (United States)

    2010-07-01

    The advancement of sensor and subsystems integration, facility network infrastructures, and situational awareness platforms now enable an integrated view of a comprehensive security solution on a single screen. A Radar Video Surveillance (RVS) system converges these aspects of security systems into a Geographic Information System (GIS) view, which conveys overall security status and reacts to potential threats. An overhead GIS view of the facility is populated with security sensors, including perimeter security sensors, CCTV cameras, access control equipment, radar sensors, and life safety equipment. The status and location of these sensors is displayed on the map, as well as the data from these sensors, such as intruder locations and live CCTV images. The software automatically directs PTZ cameras to the current location of a potential incident, displays that image, records it, and initiates an alarm and an automated response. This paper describes the concept of comprehensive security convergence, including sensor integration, situational awareness, automation of responses and notification, and the challenges and opportunities in providing true convergence as well as the benefits this approach delivers in a nuclear facility. (authors)

  11. Security Hardened Cyber Components for Nuclear Power Plants: Phase I SBIR Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Franusich, Michael D. [SpiralGen, Inc., Pittsburgh, PA (United States)

    2016-03-18

    SpiralGen, Inc. built a proof-of-concept toolkit for enhancing the cyber security of nuclear power plants and other critical infrastructure with high-assurance instrumentation and control code. The toolkit is based on technology from the DARPA High-Assurance Cyber Military Systems (HACMS) program, which has focused on applying the science of formal methods to the formidable set of problems involved in securing cyber physical systems. The primary challenges beyond HACMS in developing this toolkit were to make the new technology usable by control system engineers and compatible with the regulatory and commercial constraints of the nuclear power industry. The toolkit, packaged as a Simulink add-on, allows a system designer to assemble a high-assurance component from formally specified and proven blocks and generate provably correct control and monitor code for that subsystem.

  12. 1 THE HUMANITIES AND NATIONAL IDENTITY, SECURITY AND ...

    African Journals Online (AJOL)

    User

    looked at clarification of concepts like the humanities, national ... challenges of Nigeria in terms of national identity and security. The ... among different ethnic groups in Nigeria and also pose a .... with political representation as well as access to and control of ... identity instead of national identity is articulated in all aspects.

  13. What can Iran gain by having a nuclear weapons program that threatens to destabilize security in the Middle East?

    DEFF Research Database (Denmark)

    Nielsen, Thomas Galasz

    and a lot of neigh- bouring countries fear such a development for security reasons. But why is Iran following a nuclear path that may further destabilise the fragile security situation in the Middle East? It is to do with Iran’s own perception of security risks, its desire for greatness in the region......In this paper, Iran’s nuclear aspiration to destabilise power in the Middle East is analysed. Iran is attempting to develop a nuclear energy program, and perhaps even a nuclear weapons program, despite assurances of the opposite. An Iranian nuclear weapon would be a game changer in the region......, and domestic challenges, caused in part by United Nations’ sanctions, lack of development and internal political power struggles. Iran balances cleverly on the edge of either further international isolation or becoming a significant local power. It uses the threat of developing nuclear weapons, in com...

  14. Interaction profiling identifies the human nuclear exosome targeting complex

    DEFF Research Database (Denmark)

    Lubas, Michal Szymon; Christensen, Marianne Spangsberg; Kristiansen, Maiken Søndergaard

    2011-01-01

    of a similar activator(s) in humans remains elusive. By establishing an interaction network of the human nuclear exosome, we identify the trimeric Nuclear Exosome Targeting (NEXT) complex, containing hMTR4, the Zn-knuckle protein ZCCHC8, and the putative RNA binding protein RBM7. ZCCHC8 and RBM7 are excluded...... to nucleoli. Our results suggest that human nuclear exosome degradation pathways comprise modules of spatially organized cofactors that diverge from the yeast model....

  15. Human Reliability Analysis for Digitized Nuclear Power Plants: Case Study on the LingAo II Nuclear Power Plant

    Directory of Open Access Journals (Sweden)

    Yanhua Zou

    2017-03-01

    Full Text Available The main control room (MCR in advanced nuclear power plants (NPPs has changed from analog to digital control system (DCS. Operation and control have become more automated, centralized, and accurate due to the digitalization of NPPs, which has improved the efficiency and security of the system. New issues associated with human reliability inevitably arise due to the adoption of new accident procedures and digitalization of main control rooms in NPPs. The LingAo II NPP is the first digital NPP in China to apply the state-oriented procedure. In order to address issues related to human reliability analysis for DCS and DCS + state-oriented procedure, the Hunan Institute of Technology conducted a research project based on a cooperative agreement with the LingDong Nuclear Power Co. Ltd. This paper is a brief introduction to the project.

  16. Human Mars Surface Mission Nuclear Power Considerations

    Science.gov (United States)

    Rucker, Michelle A.

    2018-01-01

    A key decision facing Mars mission designers is how to power a crewed surface field station. Unlike the solar-powered Mars Exploration Rovers (MER) that could retreat to a very low power state during a Martian dust storm, human Mars surface missions are estimated to need at least 15 kilowatts of electrical (kWe) power simply to maintain critical life support and spacecraft functions. 'Hotel' loads alone for a pressurized crew rover approach two kWe; driving requires another five kWe-well beyond what the Curiosity rover’s Radioisotope Power System (RPS) was designed to deliver. Full operation of a four-crew Mars field station is estimated at about 40 kWe. Clearly, a crewed Mars field station will require a substantial and reliable power source, beyond the scale of robotic mission experience. This paper explores the applications for both fission and RPS nuclear options for Mars.

  17. Mediapolis, Human (In)Security and Citizenship

    DEFF Research Database (Denmark)

    Tufte, Thomas

    2011-01-01

    In a time when online territories are evolving as mediated practices and social spaces, how do we assess civic action and participation in social change processes? Moreover, how relevant is the debate about online territories when assessed from an East African reality where Internet access...... section I present the concept of ‘human (in)security’ which refers to how cultures of fear and insecurity permeate public discourse, public sentiment and ultimately civic action. Finally, I discuss how to theorize communication for social change in a digital era, approaching it from a citizens perspective...... is minimal? There are some of the questions addressed in this chapter. In the first section I assess communication for social change in the digital era from a citizen’s perspective. Secondly, I provide an example of a civil society driven media platform which seeks to enhance processes of empowerment...

  18. The CSN hosts the Second International Conference on Nuclear Security in Madrid; El CSN acoge en Madrid la Segunda Conferencia Internacional de Seguridad Fisica Nuclear

    Energy Technology Data Exchange (ETDEWEB)

    Scialdone Garcia, A.

    2016-08-01

    The second International Conference on Nuclear Security was held in Madrid between May 9th and 13th last. The acting Minister of the Interior announced that the number of officers of the Guardia Civil watching over the Spanish nuclear power plants will be doubled. (Author)

  19. Development of nuclear power and impacts on public safety and security

    Energy Technology Data Exchange (ETDEWEB)

    Bochmann, H.P.

    1985-07-01

    The author summarizes the contribution of nuclear power to the overall power supply in the FRG, impacts of the nuclear power industry on public safety and security, and the legal instruments available to protect the public. He concludes his discussion of facts and arguments with the following statements: protection against interference or any other harmful actions of third parties aimed against nuclear installations must be devised so as to practically guarantee prevention of sabotage or any acts of terrorism. Preventive measures have to be made with an eye to what is sensible in practice, as perfectionism might have the adverse effect. The available concept of integrated protection and engineered safety, which has been set up in 1977, will be a sufficient means of reacting to near developments and information in a flexible and effective manner.

  20. Development of human resources for Indian nuclear power programme

    Indian Academy of Sciences (India)

    R B Grover; R R Puri

    2013-10-01

    The continuing research and development on nuclear technology by research establishments in the country and maturing of Indian industry have brought the nuclear energy programme in India to a stage where it is poised to take a quantum leap forward. The vision of expansion of nuclear power also requires a wellstructured specialized human resource development programme. This paper discusses the requirements of the human resource development programme for nuclear energy, the challenges in the way of its realization, its national and international status and traces the history of nuclear education in the country. It brings out the linkage of human resource development programme with the nuclear energy programme in the country. It also describes the initiatives by the university system in the area of nuclear education and support provided by the Department of Atomic Energy to the university system by way of extra-mural funding and by providing access to research facilities.

  1. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.

    Science.gov (United States)

    Kraemer, Sara; Carayon, Pascale

    2007-03-01

    This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.

  2. Nuclear security

    Energy Technology Data Exchange (ETDEWEB)

    1990-06-01

    In June 1988, congressional hearings were held on allegations that government-owned equipment at DOE's Lawrence Livermore National Laboratory, including word processors, typewriters, video equipment, cordless hand tolls, and highly explosive materials, was being stolen to finance the purchase of illegal drugs. While the laboratory is government-owned, it is run by the University of California. GAO fond that the laboratory cannot account for over $45 million worth of government-owned property in its custody. Neither the laboratory's accounting controls nor its physical controls have protected the property in its custody against theft, unauthorized use, or loss. Despite the substantial number of missing items, the contract between DIE and the university generally protects the university against liability for such losses. This report concludes that DOE has not provided adequate oversight of the laboratory's property management system and, in essence, has allowed the university to prescribe the terms of the contract.

  3. Enhancement of the physical protection of waste storages. A step to maintain the nuclear security regime in Ukraine

    Energy Technology Data Exchange (ETDEWEB)

    Kuzmyak, Ihor; Kravtsov, Valery [State Scientific and Technical Center for Nuclear and Radiation Safety, Kyiv (Ukraine); Kushka, Victor [State Nuclear Regulatory Inspectorate of Ukraine, Kyiv (Ukraine)

    2013-07-01

    Radioactive wastes are unavoidable by-products in the use of nuclear materials and other radioactive sources and concurrently pose the threat to radiation safety. Ukraine has an advanced infrastructure of nuclear power engineering and is attaching great importance to nuclear security and particularly physical protection of not only nuclear facilities and nuclear materials but radioactive wastes as well. Furthermore, Ukraine has unique practices of ensuring nuclear safety and security of radioactive wastes and fuel-containing materials generated after the accident at Chornobyl NPP and during its decommissioning. To this end, the continuous improvement of physical protection systems for storages of radioactive wastes of industrial, medical and scientific origin, Chornobyl facilities containing radioactive materials, including the Shelter, takes place in our country. Such activities in synergy with nuclear and radiation safety measures are of great significance for implementation and maintenance of nuclear security regime in Ukraine. This paper is dedicated to activities on modernization of physical protection systems for radioactive wastes and some other radioactive materials and concise review of nuclear security regime status in Ukraine. (orig.)

  4. The science of human security: a response from political science.

    Science.gov (United States)

    Roberts, David

    2008-01-01

    The concept of human security has developed in significance in the last decade to the point that its meaning and validity is hotly contested in the field of international relations, security, and development studies. A key consideration relates to its ambiguity at best and its amorphousness at worst. Medical scholarship proposes approaches that may render more meaningful the concept. However, collaboration and co-operation between political scientists and medical practitioners offers even greater potential to this vital programme. The latter offer the technical and methodological skills and approaches lacking in political science, whilst the former develop political frameworks to shift the causal focus towards human, institutional and structural agency in mass avoidable global civilian mortality.

  5. Nuclear energy option for energy security and sustainable development in India

    Energy Technology Data Exchange (ETDEWEB)

    Mallah, Subhash, E-mail: subhas_mallah2k1@yahoo.com [Shri Mata Vaishno Devi University, Katra, Jammu and Kashmir 182301 (India)

    2011-02-15

    India is facing great challenges in its economic development due to the impact on climate change. Energy is the important driver of economy. At present Indian energy sector is dominated by fossil fuel. Due to international pressure for green house gas reduction in atmosphere there is a need of clean energy supply for energy security and sustainable development. The nuclear energy is a sustainable solution in this context to overcome the environmental problem due to fossil fuel electricity generation. This paper examines the implications of penetration of nuclear energy in Indian power sector. Four scenarios, including base case scenario, have been developed using MARKAL energy modeling software for Indian power sector. The least-cost solution of energy mix has been measured. The result shows that more than 50% of the electricity market will be captured by nuclear energy in the year 2045. This ambitious goal can be expected to be achieved due to Indo-US nuclear deal. The advanced nuclear energy with conservation potential scenario shows that huge amounts of CO{sub 2} can be reduced in the year 2045 with respect to the business as usual scenario.

  6. Nuclear Resonance Fluorescence Measurements on ^237Np for Security and Safeguards Applications

    Science.gov (United States)

    Angell, C. T.; Joshi, T.; Yee, Ryan; Norman, E. B.; Kulp, W. D.; Warren, G. A.; Korbly, S.; Klimenko, A.; Wilson, C.; Copping, R.; Shuh, D. K.

    2009-10-01

    The smuggling of nuclear material and the diversion of fissile material for covert weapon programs both present grave risks to world security. Methods are needed to detect nuclear material smuggled in cargo, and for proper material accountability in civilian fuel re-processing facilities. Nuclear resonance fluorescence (NRF) is a technique that can address both needs. It is a non-destructive active interrogation method that provides isotope-specific information. It works by using a γ-ray beam to resonantly excite levels in a nucleus and observing the γ-rays emitted whose energy and intensity are characteristic of that isotope. ^237Np presents significant safeguard challenges; it is fissile yet currently has fewer safeguard restrictions. NRF measurements on ^237Np will expand the nuclear database and will permit designing interrogation and assay systems. Measurements were made using the bremsstrahlung beam at the HVRL at MIT on a 7 g target of ^237Np with two incident electron energies of 2.8 and 3.1 MeV. Results will be presented with discussion of the relevant nuclear structure necessary to predict levels in other actinides.

  7. Functional Magnetic Resonance Imaging and the Challenge of Balancing Human Security with State Security

    CERN Document Server

    Sahito, Farhan

    2012-01-01

    Recent reports reveal that violent extremists are trying to obtain insider positions that may increase the impact of any attack on critical infrastructure and could potentially endanger state services, people's lives and even democracy. It is of utmost importance to be able to adopt extreme security measures in certain high-risk situations in order to secure critical infrastructure and thus lower the level of terrorist threats while preserving the rights of citizens. To counter these threats, our research is aiming for extreme measures to analyse and evaluate human threats related assessment methods for employee screening and evaluations using cognitive analysis technology, in particular functional Magnetic Resonance Imaging (fMRI). The development of fMRI has led some researchers to conclude that this technology has forensic potential and may be useful in investing personality traits, mental illness, psychopathology, racial prejudice and religious extremism. However, critics claim that this technology may pr...

  8. Virtual dosimetry applied to the physical security of a nuclear installation

    Energy Technology Data Exchange (ETDEWEB)

    Santo, Andre Cotelli do E.; Mol, Antonio C.A.; Machado, Daniel M.; Chelles, Daniel R.; Goncalves, Deise G.S., E-mail: cotelli.andre@gmail.com, E-mail: mol@ien.gov.br, E-mail: machado.mol@gmail.com, E-mail: daniel.chelles@gmail.com, E-mail: deise.galvao@gmail.com [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil)

    2013-07-01

    An important activity to be held in radiation protection is the location of radioactive sources. The present work was devoted to the development of a virtual dosimetry tool for locating and detecting such sources. To this end, was created a three-dimensional virtual model of the Instituto de Engenharia Nuclear - IEN, endowed with virtual characters (avatars), capable of move and interact with the environment, radiation detectors (fixed and mobile) and radioactive sources. Aiming to assist in planning physical security of nuclear installations, the tool developed allows the detection simulation of individuals carrying radioactive sources through detectors installed at strategic points of the site. In addition, it is possible to detect and locate sources by handling portable detectors, operated by characters within the virtual environment. The results obtained show the behavior of the radiation detectors on continuous profile of radioactive sources, allowing calculate the dose rate at any position of the virtual environment. Thus, this work can assist in the training of security officers, as well as in evaluating the radiological safety of the nuclear site. (author)

  9. Sustainability of a Nuclear Security Educational Program at Tomsk Polytechnic University

    Energy Technology Data Exchange (ETDEWEB)

    Boiko, Vladimir I.; Silaev, Maxim E.; Duncan, Cristen L.; Hazel, Michael J.; Heinberg, Cynthia L.; Goodey, Kent O.; Butler, Gilbert W.

    2012-06-07

    Educational programs for training of specialists in the area of material protection, control and accounting (MPC&A) for Russian nuclear facilities have been implemented at the National Research Tomsk Polytechnic University over the last eight years. The initial stage of creating the program, which can be deemed as successfully functioning, has been completed. The next stage entails further improvement of the program in order to create conditions for its sustainability and steady improvement. The educational program sustainability plan contains a number of steps, including the following: - Analysis of the status, standards and prospects for development of nuclear security educational programs in the world; - Analysis of the current educational program, level of its functionality and the demand for the program as well as its capability to react adequately to external influences; - Analysis of the factors influencing program development at its current stage and in the future; - Assessment of needs and development of proposals for the program’s sustainability; - Assessment of needs and development of proposals for improving quality and increasing the demand for the program by potential employers; - Assessment of needs and development of proposals for expansion of the program’s content and the scope of its application; - Development of short-term and long-term plans for functioning and development. Strategic prospects for development are associated with the transition from MPC&A to a broader range of tasks covered by the specialization in the area of nuclear security.

  10. Human Factors in Nuclear Power Engineering in Polish Conditions

    Directory of Open Access Journals (Sweden)

    Agnieszka Kaczmarek-Kacprzak

    2014-09-01

    Full Text Available The paper “Human factors in nuclear power engineering in Polish conditions” focuses on analysis of dynamics of preparing Polish society to build fi rst nuclear power plant in XXI century in Poland. Authors compare experience from constructing nuclear power plant Sizewell B (Great Britain and Sizewell C, which is in preparation phase with polish nuclear power program. Paper includes aspects e.g. of creating nuclear safety culture and social opinion about investment. Human factors in nuclear power engineering are as well important as relevant economical and technical factors, but very often negligible. In Poland where history about Czarnobyl is still alive, and social opinion is created on emotions after accident in Fukushima, human factors are crucial and should be under comprehensive consideration.

  11. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Moonsung; Jung, Myungtak [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities.

  12. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    Energy Technology Data Exchange (ETDEWEB)

    Mendez Cruz, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rochau, Gary E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Middleton, Bobby [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Salvador B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Carmelo [General Atomics, San Diego, CA (United States); Schleicher, Robert [General Atomics, San Diego, CA (United States)

    2016-06-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)’s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  13. Technical cooperation on nuclear security between the United States and China : review of the past and opportunities for the future.

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, Arian Leigh

    2011-12-01

    The United States and China are committed to cooperation to address the challenges of the next century. Technical cooperation, building on a long tradition of technical exchange between the two countries, can play an important role. This paper focuses on technical cooperation between the United States and China in the areas of nonproliferation, arms control and other nuclear security topics. It reviews cooperation during the 1990s on nonproliferation and arms control under the U.S.-China Arms Control Exchange, discusses examples of ongoing activities under the Peaceful Uses of Technology Agreement to enhance security of nuclear and radiological material, and suggests opportunities for expanding technical cooperation between the defense nuclear laboratories of both countries to address a broader range of nuclear security topics.

  14. Human factors aspects of advanced instrumentation in the nuclear industry

    Energy Technology Data Exchange (ETDEWEB)

    Carter, R.J.

    1989-01-01

    An important consideration in regards to the use of advanced instrumentation in the nuclear industry is the interface between the instrumentation system and the human. A survey, oriented towards identifying the human factors aspects of digital instrumentation, was conducted at a number of United States (US) and Canadian nuclear vendors and utilities. Human factors issues, subsumed under the categories of computer-generated displays, controls, organizational support, training, and related topics were identified. 20 refs., 2 tabs.

  15. Human Development Index and Efficiency level of Social Security Hospitals

    Directory of Open Access Journals (Sweden)

    H. Sepehrdost

    2012-04-01

    Full Text Available Introduction & Objective: Hospitals as one of the main institutions providing health care services play an important role in the health system and allocate a high percentage of health sector's budget to them. This study aimed to answer whether social security hospitals efficiency levels are the same for all provinces in Iran? And whether any relationship exists between the human development indexes (HDI of the provinces and technical efficiency levels of the hospitals?Materials & Methods: Data envelopment analysis model has been used to measure technical efficiency of 65 social security hospitals, including small hospitals (working with lower than one hundred active beds and large hospitals (working with over one hundred active beds during the years 2007 to 2009. Further, the relationship between human development index and technical efficiency of hospitals in the provinces has been analyzed.Results: Results show that the average technical efficiency of small and large hospitals working in low and medium HDI provinces (0.912 and 0.937 are more than the average technical efficiency of hospitals in higher HDI provinces (0.870 and 0.887.Conclusion: It is recommended that social security organization concentrated distribute its hospital services in provinces with lower HDI and higher density of population living under the coverage of organization’s insurance. This will eventually puts its positive effects on per capita income of people, as well as more equitable distribution of income. (Sci J Hamadan Univ Med Sci 2012;19(1:32-38

  16. American perspectives on security : energy, environment, nuclear weapons, and terrorism : 2010.

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale (University of Oklahoma, Norman, OK); Jenkins-Smith, Hank C. (University of Oklahoma, Norman, OK); Silva, Carol L. (University of Oklahoma, Norman, OK)

    2011-03-01

    We report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2010 on US energy and environmental security. Key areas of investigation include public perceptions shaping the context for debate about a comprehensive national energy policy, and what levels of importance are assigned to various prospective energy technologies. Additionally, we investigate how public views on global climate change are evolving, how the public assesses the risks and benefits of nuclear energy, preferences for managing used nuclear fuel, and public trust in sources of scientific and technical information. We also report findings from a national Internet survey and a subset of questions administered by telephone in mid-2010 on public views of the relevance of US nuclear weapons today, support for strategic arms control, and assessments of the potential for nuclear abolition. Additionally, we analyze evolving public views of the threat of terrorism, assessments of progress in the struggle against terrorism, and tolerance for intrusive antiterror policies. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.

  17. Graduate Research Assistant Program for Professional Development at Oak Ridge National Laboratory (ORNL) Global Nuclear Security Technology Division (GNSTD)

    Energy Technology Data Exchange (ETDEWEB)

    Eipeldauer, Mary D [ORNL; Shelander Jr, Bruce R [ORNL

    2012-01-01

    The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) was established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.

  18. Certified reference materials and reference methods for nuclear safeguards and security.

    Science.gov (United States)

    Jakopič, R; Sturm, M; Kraiem, M; Richter, S; Aregbe, Y

    2013-11-01

    Confidence in comparability and reliability of measurement results in nuclear material and environmental sample analysis are established via certified reference materials (CRMs), reference measurements, and inter-laboratory comparisons (ILCs). Increased needs for quality control tools in proliferation resistance, environmental sample analysis, development of measurement capabilities over the years and progress in modern analytical techniques are the main reasons for the development of new reference materials and reference methods for nuclear safeguards and security. The Institute for Reference Materials and Measurements (IRMM) prepares and certifices large quantities of the so-called "large-sized dried" (LSD) spikes for accurate measurement of the uranium and plutonium content in dissolved nuclear fuel solutions by isotope dilution mass spectrometry (IDMS) and also develops particle reference materials applied for the detection of nuclear signatures in environmental samples. IRMM is currently replacing some of its exhausted stocks of CRMs with new ones whose specifications are up-to-date and tailored for the demands of modern analytical techniques. Some of the existing materials will be re-measured to improve the uncertainties associated with their certified values, and to enable laboratories to reduce their combined measurement uncertainty. Safeguards involve the quantitative verification by independent measurements so that no nuclear material is diverted from its intended peaceful use. Safeguards authorities pay particular attention to plutonium and the uranium isotope (235)U, indicating the so-called 'enrichment', in nuclear material and in environmental samples. In addition to the verification of the major ratios, n((235)U)/n((238)U) and n((240)Pu)/n((239)Pu), the minor ratios of the less abundant uranium and plutonium isotopes contain valuable information about the origin and the 'history' of material used for commercial or possibly clandestine purposes, and

  19. International Security, Development, and Human Rights: Policy Conversion or Conflict?

    Directory of Open Access Journals (Sweden)

    Miao-ling Lin Hasenkamp

    2012-04-01

    Full Text Available This article uses an institutional network governance approach to explore the overlapping dimension of the policy fields between security, development, and human rights, reflected in the US and German provincial reconstruction teams (PRTs in Afghanistan. The past two decades have witnessed a gradually changing paradigm in academic and policy debates regarding the questions of the normative basis of world order and possibilities for tackling imminent threats to security and peace (i.e. intra-state armed conflicts, failed states, terrorism, poverty, and deepening inequality. The introduction of concepts such as “human security” and “the right to humanitarian intervention/responsibility to protect (R2P” as well as critical examinations of peace-, nation-, and state-building missions (PNSB have led to a relativist tendency of state sovereignty and a changing attitude regarding how to address the intersection of security, development, and human rights. Despite this shift, the policy commitments to integrating these policy considerations remain puzzling. How have they been redefined, conceptualized, and put into practice? I argue that an integrated conceptual approach has facilitated the redefinition of common policy goals, principles, and the mobilization of resources. At the same time, civil and military cooperation, as demonstrated in the multifunctional work of PRTs, has been Janus-headed—permanently caught in an ongoing tension between the war on terror and short-term stability operation on the one hand and long-term durable peace and development on the other. The misunderstanding of its interim character, the dynamics of Afghan environment, the blurring of policy lines, and the differences between national PRT models have made it difficult to systematically assess the efficiency and legitimacy of each policy frame and program.

  20. Human somatic cell nuclear transfer is alive and well.

    Science.gov (United States)

    Cibelli, Jose B

    2014-06-05

    In this issue, Chung et al. (2014) generate human embryonic stem cells by fusing an adult somatic cell to a previously enucleated human oocyte, in agreement with recent reports by the Mitalipov and Egli groups. We can now safely say that human somatic cell nuclear transfer is alive and well.

  1. Promotion of Bilateral Cooperative Programs in Nuclear Human Resources Development

    Energy Technology Data Exchange (ETDEWEB)

    Lee, E. J.; Han, K. W.; Nam, Y. M. (and others)

    2009-08-15

    The purpose of this project is strengthening of bilateral cooperation with those countries for sharing Korea's technology, and providing of education and training on Korean experience regarding national nuclear policy, technology self reliance, and technology itself, in the field of nuclear power generation and the application of radioisotopes and radiation. This project covers an analysis on the need of nuclear human resource development in countries having interest in the introduction of nuclear power and/or promotion of the use of nuclear energy, and provision of courses on 'nuclear power policy, planning and management' and 'design and operation of nuclear research reactor, and application of radiation technology' along with the country specific needs. Education and training of key members in nuclear energy development from Egypt: It was implemented through bilateral cooperation and support by KOICA program. The first part, which targeted staff members from Egypt Nuclear Commission, was held for 2 months providing a KOICA course on policy, planning and management for nuclear power project, and second part was on the job training in Korea Hydro and Nuclear Power and Korea Institute of Nuclear Safety, KAERI respectively. On the job training of 1 scientist from Vietnam was implemented on the basis of bilateral cooperation in a research laboratory on radioactive waste treatment technology, at KAERI. Education and training for scientists from South East RCA countries were carried out for 11 participants from Vietnam, Thailand, Indonesia, China, Pakistan, Malaysia, Philippines, and Bangladesh. The course dealt with nuclear research reactor and radiation application technology. Development of nuclear education and training programs for key persons involved in nuclear power projects from countries of Middle East: The developed program consists of 15 courses addressing 3 technical levels, i.e. high level policy makers, middle level project

  2. United States Seaport Security: Protection Against a Nuclear Device Attack Delivered in a Shipping Cargo Container

    Science.gov (United States)

    2014-06-13

    phone, laptop, airline mechanic’s certificate, and security passes for airports in Egypt, Thailand , and Canada. The following year, in March 2002...major operation areas for federal crime, including drug trafficking , cargo theft, and smuggling of contraband and aliens. 3. Ports are open and...container’s latch and continuously collects and transmits data without human intervention. This procedure is concurrently utilized as part of the C-TPAT

  3. Unmasking the social engineer the human element of security

    CERN Document Server

    Hadnagy, Christopher

    2014-01-01

    Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the c

  4. Public Security and Nuclear Monitoring%公共安全与核监测

    Institute of Scientific and Technical Information of China (English)

    毛用泽; 王善强; 梁卫平

    2012-01-01

    Four kinds of emergency social security events have been defined based on The People’s Republic of China Law on Response to Emergencies.This paper expounds one of the most challenging threats from the four types terrorism attack means of nuclear and radiation terrorist events which is considered in the range of international public security.According to the above law,the principle "Prevent firstly,Combining prevention with emergency response" is also put forward,which includes the corresponding action spectrum.Nuclear monitoring is the core technology for nuclear and radiation terrorist events prevention and emergency response.This paper has systematically discussed the special nuclear monitoring techniques,including strategy research of nuclear monitoring on nuclear and radiation terrorist events prevention and response.To prevent nuclear and radiation terrorist events,it is necessary to establish a national radiation monitoring network(system) to detect,alarm,locate and distinguish for the nuclear material and other radioactive substances and IND,RDD,RED.The radiation monitoring special requirements and the corresponding technology are described on nuclear and radiation terrorist events in the management of the consequences of emergency response.%针对"中华人民共和国突发事件应对法"界定的四类突发事件中社会安全事件,从核和辐射恐怖突发事件公共安全角度阐述了核和辐射恐怖主义四类袭击手段的潜在威胁是在国际范围内对公共安全最具挑战性的威胁之一。按照"应对法"提出了"预防为主,预防与应急响应相结合"原则以及相应的行动谱。核和辐射恐怖突发事件的防范与应急响应的核心技术是核监测。全面系统地论述了核监测技术,包括:开展核和辐射恐怖事件防范与响应的核监测战略研究;为防范核和辐射恐怖事件,对核材料与其他放射性物质以及IND,RDD,RED的探测、报警、定位与识

  5. Extensive nuclear sphere generation in the human Alzheimer's brain.

    Science.gov (United States)

    Kolbe, Katharina; Bukhari, Hassan; Loosse, Christina; Leonhardt, Gregor; Glotzbach, Annika; Pawlas, Magdalena; Hess, Katharina; Theiss, Carsten; Müller, Thorsten

    2016-12-01

    Nuclear spheres are protein aggregates consisting of FE65, TIP60, BLM, and other yet unknown proteins. Generation of these structures in the cellular nucleus is putatively modulated by the amyloid precursor protein (APP), either by its cleavage or its phosphorylation. Nuclear spheres were preferentially studied in cell culture models and their existence in the human brain had not been known. Existence of nuclear spheres in the human brain was studied using immunohistochemistry. Cell culture experiments were used to study regulative mechanisms of nuclear sphere generation. The comparison of human frontal cortex brain samples from Alzheimer's disease (AD) patients to age-matched controls revealed a dramatically and highly significant enrichment of nuclear spheres in the AD brain. Costaining demonstrated that neurons are distinctly affected by nuclear spheres, but astrocytes never are. Nuclear spheres were predominantly found in neurons that were negative for threonine 668 residue in APP phosphorylation. Cell culture experiments revealed that JNK3-mediated APP phosphorylation reduces the amount of sphere-positive cells. The study suggests that nuclear spheres are a new APP-derived central hallmark of AD, which might be of crucial relevance for the molecular mechanisms in neurodegeneration.

  6. Nuclear Human Resources Development Program using Educational Core Simulator

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Yu Sun; Hong, Soon Kwan [KHNP-CRI, Daejeon (Korea, Republic of)

    2015-10-15

    KHNP-CRI(Korea Hydro and Nuclear Power Co.-Central Research Institute) has redesigned the existing Core Simulator(CoSi) used as a sort of training tools for reactor engineers in operating nuclear power plant to support Nuclear Human Resources Development (NHRD) Program focusing on the nuclear department of Dalat university in Vietnam. This program has been supported by MOTIE in Korea and cooperated with KNA(Korea Nuclear Association for International Cooperation) and HYU(Hanyang University) for enhancing the nuclear human resources of potential country in consideration with Korean Nuclear Power Plant as a next candidate energy sources. KHNP-CRI has provided Edu-CoSi to Dalat University in Vietnam in order to support Nuclear Human Resources Development Program in Vietnam. Job Qualification Certificates Program in KHNP is utilized to design a training course for Vietnamese faculty and student of Dalat University. Successfully, knowhow on lecturing the ZPPT performance, training and maintaining Edu-CoSi hardware are transferred by several training courses which KHNP-CRI provides.

  7. Security during the Construction of New Nuclear Power Plants: Technical Basis for Access Authorization and Fitness-For-Duty Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Branch, Kristi M.; Baker, Kathryn A.

    2009-09-01

    A technical letter report to the NRC summarizing the findings of a benchmarking study, literature review, and workshop with experts on current industry standards and expert judgments about needs for security during the construction phase of critical infrastructure facilities in the post-September 11 U.S. context, with a special focus on the construction phase of nuclear power plants and personnel security measures.

  8. Nuclear security towards the adequate answers to the new challenge of nuclear and radiological terrorism; Seguridad nuclear hacia las respuestas adecuadas al nuevo reto del terrorismo nuclear y radiologico

    Energy Technology Data Exchange (ETDEWEB)

    Puig, D.E. [Pza. Cagancha 1387 / 404, Montevideo (Uruguay)]. e-mail: d.puig@adinet.com.uy

    2006-07-01

    The globalization phenomenon and the process of regional integration have generated new and defiant characteristics in the criminal activation, the one that has acquired growing trans national dimension. After September 11, 2001 it should to have bigger international initiative to reinforce the safety of materials and facilities in the entire world and to apply the international recommendations for to assure that all the nuclear materials of not used bombs are registered and secure of sabotage. Thousands of radioactive sources exist in the world. Possibility that the terrorists use radioactive sources as attack instruments since its are more easily available and its are more easy too to obtain in comparison with the uranium or plutonium classified for weapons. Dirty bomb. Effects of the Radiations. The Goiania accident. 'Orphans' sources Illicit traffic of radioactive material. Security. Measures of Physical Protection. Security of the radioactive sources. Role of the IAEA and other international organisms and regional CAN-MERCOSUR. Nuclear security and Legal frame. International and national instruments against the nuclear and radiological terrorism. Study from a proposal to Pan-American level to make in front of the problem. (Author)

  9. Human embryonic stem cells derived by somatic cell nuclear transfer.

    Science.gov (United States)

    Tachibana, Masahito; Amato, Paula; Sparman, Michelle; Gutierrez, Nuria Marti; Tippner-Hedges, Rebecca; Ma, Hong; Kang, Eunju; Fulati, Alimujiang; Lee, Hyo-Sang; Sritanaudomchai, Hathaitip; Masterson, Keith; Larson, Janine; Eaton, Deborah; Sadler-Fredd, Karen; Battaglia, David; Lee, David; Wu, Diana; Jensen, Jeffrey; Patton, Phillip; Gokhale, Sumita; Stouffer, Richard L; Wolf, Don; Mitalipov, Shoukhrat

    2013-06-06

    Reprogramming somatic cells into pluripotent embryonic stem cells (ESCs) by somatic cell nuclear transfer (SCNT) has been envisioned as an approach for generating patient-matched nuclear transfer (NT)-ESCs for studies of disease mechanisms and for developing specific therapies. Past attempts to produce human NT-ESCs have failed secondary to early embryonic arrest of SCNT embryos. Here, we identified premature exit from meiosis in human oocytes and suboptimal activation as key factors that are responsible for these outcomes. Optimized SCNT approaches designed to circumvent these limitations allowed derivation of human NT-ESCs. When applied to premium quality human oocytes, NT-ESC lines were derived from as few as two oocytes. NT-ESCs displayed normal diploid karyotypes and inherited their nuclear genome exclusively from parental somatic cells. Gene expression and differentiation profiles in human NT-ESCs were similar to embryo-derived ESCs, suggesting efficient reprogramming of somatic cells to a pluripotent state.

  10. Respect for Human Rights: a Fundamental Foundation for a World of Peace, Security and Harmony

    Institute of Scientific and Technical Information of China (English)

    陈淳安

    2007-01-01

    @@ Peace, security, harmonious development and human rights are closely related. Firstly,peace and security are premise and precondition for the insurance of human rights. It is obvious that when human beings continue to be threatening by wars, conflicts and chaos, their right to life is faint and insecure, and other human rights would not be fully respected or protected. On the other hand, peace and security are foundation for everyone to pursue his or her own objectives. In other words, in a society where peace and security are maitained, people will have opportunity to enjoy their human rights and to affirm their own ego.

  11. Japan and Human Security: A Powerful Discourse or a Useful Coping Mechanism?

    Directory of Open Access Journals (Sweden)

    CLAUSEN, Daniel

    2009-10-01

    Full Text Available The concept of human security has been gaining increasing currency in discussions over global security. Japan is considered a major contributor to both the intellectual mainstreaming of the concept and the implementation of human security through its financial support to the United Nations Trust Fund for Human Security, the establishment of the Commission on Human Security, and revision of its Official Development Assistance (ODA charter to meet human security guidelines. Japan’s pursuit of human security, as well as the status the concept enjoys among policy-makers and academics has led some to describe human security within Japan as a discourse. However, the literature remains ambivalent as to whether human security is a Discourse in the sense that it is hegemonic in the kinds of policy and policy thinking that it allows, or merely an instrumental discourse deployed in the service of Japanese foreign policy. This essay argues that human security should be seen as an instrumental discourse, currently used by the Ministry of Foreign Affairs (MOFA and the Japan International Cooperation Agency (JICA, to help pursue a greater international contribution without aggravating lingering controversies over Japanese militarism, but also, without directly rejecting a future move toward military normalization.

  12. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  13. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  14. The human security approach as a frame for considering ethics of global environmental change

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2010-01-01

    textabstractWe need languages for transition; a human security framework adds value to languages of human rights, human development, and global public goods, through its emphases on interconnectedness and solidarity.

  15. Spermatozoa-like cell invaders (nuclear vlimata) in human neoplasia.

    Science.gov (United States)

    Logothetou-Rella, H

    1993-07-01

    Spermatozoa-like cells (nuclear vlimata) have been identified in malignant cell cultures and embryonic cells, also common in the cytology and histology of all types of human neoplasia even after chemotherapy. A new mechanism of invasion of malignant cells has been described, according to which neoplastic cells behave and function as parasites using host-cells to divide, survive and eventually produce nuclear vlimata (bullets). Nuclear vlimata are the end cell products of incomplete, unequal, assymetrical division of neoplastic cells. The nuclear vlima exhibits similar morphology to spermatozoa and virus (head with, or without, tail) and invades the cytoplasm and/or nucleus of surrounding host-cells by a similar mechanism to sperm-oocyte interaction (fertilization) or viral cell infection, in the events of nuclear vlima-->tumor-->nuclear vlima-->tumor. The nuclear vlima head contains and transfers DNA, and when incorporated into the host-nucleus is indistinguishable from nucleoli and when in the cytoplasm is similar to sperm pronucleus, observed after sperm penetration of the oocyte. Function of nuclear vlimata is directly dependent on the specific extracellular matrix produced by malignant cells, consisting of glycosaminoglycans-protease-membranes. This mechanism of invasion constitutes the link of all scientific information concerning human neoplasia.

  16. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    Energy Technology Data Exchange (ETDEWEB)

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  17. Roadmap for human resources for expanded Indian nuclear industry

    Energy Technology Data Exchange (ETDEWEB)

    Singh, R.K. [Bhabha Atomic Research Centre, Mumbai (India); Indian Nuclear Society (India); Srinivasan, G.R.; Goyal, O.P. [Bhabha Atomic Research Centre, Mumbai (India)

    2011-07-01

    This paper deals with detailed requirement of human resources for all phases of nuclear power plant, for the manufacturing sector and the probable roadmap for achieving India's target. The accident in Fukushima has brought out that only nuclear power that avoids being a threat to the health and safety of the population and the environmental will be acceptable to the society and for this to be achieved human resources could be a single major contributor. India has ambitious plan of achieving 20,000MW by 2020 and 63,000MW by 2050. It is felt out of the three resources men, material and money; the critical shortage would be human resources both in quality and quantity. As per IAEA report (Publication of 2008 edition of energy, electricity and nuclear power estimates for the period of 2030), nuclear capacity must grow to at least 1.8 times current capacity by 2030 if global temperature rises are to be kept at 2°C. Objective of recruiting and training human resources for Indian Industry can be as follows: a) For catering domestic market. b) For catering international market later on for nuclear industries outside India. As India will be an important future international player. The above would require a multiplication of human resources by nearly seven times. In addition it has to be wholesome covering all levels and all skills and all disciplines and stages covering the whole nuclear cycle including regulators. Human resources are required for design and engineering, construction, commissioning, operation, manufacturing and for support services. The manpower for these has to be trained to achieve high quality of nuclear standards. Presently Indian Department of Atomic Energy(DAE) runs several training schools giving one year Post Graduate, tailor made courses. This needs to be multiplied by Joint efforts. Training should be on 'SAT (Systematic Approach to Training)' methodology to ensure focussed, specific, needed to culminate in safe, reliable and

  18. Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report.

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, Timothy A.; Denman, Matthew R; Williams, R. A.; Martin, Nevin; Jankovsky, Zachary Kyle

    2017-09-01

    Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities. iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber ex- ploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by cou- pling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated im- pact and the associated degree of difficulty to achieve the attack vector) on accident manage- ment establishes a technical risk informed framework for developing effective cyber security controls for nuclear power. iv

  19. Safety of spanish nuclear park. Analysis of the fundamental principles of security of nuclear facilities and activities; Seguridad del parque nuclear espanol. Analisis de los principios fundamentales de ls seguridad de las instalaciones y actividades nucleares

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The aim of this study is to analyze the fundamental principles underlying the safety of nuclear installations and activities, which defined the International Atomic Energy Agency (IAEA). These principles determine the roles of government and responsibilities of the holders of power, explain how to achieve security and nuclear energy to justify the society, present and future and the environment from the risks of ionizing radiation, both and explain natural and man must be managed as waste that occur or have occurred in the past. (Author)

  20. 76 FR 40352 - National Nuclear Security Administration; Amended Record of Decision: Site-Wide Environmental...

    Science.gov (United States)

    2011-07-08

    ...The National Nuclear Security Administration (NNSA), a semi- autonomous agency within the U.S. Department of Energy (DOE), is amending its September 26, 2008 Record of Decision (ROD) issued pursuant to the Site-Wide Environmental Impact Statement for the Continued Operation of Los Alamos National Laboratory, Los Alamos, New Mexico (LANL SWEIS; DOE/EIS-0380). That ROD announced NNSA's decision, among other things, to continue and expand support for the Global Threat Reduction Initiative (GTRI) Off-Site Source Recovery Project (OSRP). These activities include the recovery, storage, and disposal of certain high-activity sealed sources to minimize risks to national security and public health and safety. The LANL SWEIS and subsequent ROD did not address shipment of sealed sources through the global commons and the use of a commercial facility in managing these sealed sources as part of the GTRI program's recovery of sealed sources. In April, 2011, NNSA prepared a Supplement Analysis for the Transport and Storage of High-Activity Sealed Sources from Uruguay and Other Locations (DOE/EIS-0380-SA-02) to analyze the potential impacts of these actions. Based on the LANL SWEIS and the Supplement Analysis, NNSA is amending the ROD for the LANL SWEIS to announce its decision that these actions can be expected to take place as part of the ongoing GTRI program.

  1. Mechanisms for training security inspectors to enhance human performance

    Energy Technology Data Exchange (ETDEWEB)

    Burkhalter, H.E.; Sessions, J.C.

    1988-01-01

    The Department of Energy (DOE) has established qualification standards for protective force personnel employed at nuclear facilities (10 CFR Part 1046 (Federal Register)). Training mechanisms used at Los Alamos to enhance human performance in meeting DOE standards include, but are not limited to, the following: for cardio-respiratory training, they utilize distance running, interval training, sprint training, pacing, indoor aerobics and circuit training; for muscular strength, free weights, weight machines, light hand weights, grip strength conditioners, and calistenics are employed; for muscular endurance, participants do high repetitions (15 - 40) using dumbbells, flex weights, resistive rubber bands, benches, and calisthenics; for flexibility, each training session devotes specific times to stretch the muscles involved for a particular activity. These training mechanisms with specific protocols can enhance human performance.

  2. Human factors engineering plan for reviewing nuclear plant modernization programs

    Energy Technology Data Exchange (ETDEWEB)

    O' Hara, John; Higgins, James [Brookhaven National Laboratory, Upton, NY (United States)

    2004-12-01

    The Swedish Nuclear Power Inspectorate reviews the human factors engineering (HFE) aspects of nuclear power plants (NPPs) involved in the modernization of the plant systems and control rooms. The purpose of a HFE review is to help ensure personnel and public safety by verifying that accepted HFE practices and guidelines are incorporated into the program and nuclear power plant design. Such a review helps to ensure the HFE aspects of an NPP are developed, designed, and evaluated on the basis of a structured top-down system analysis using accepted HFE principles. The review addresses eleven HFE elements: HFE Program Management, Operating Experience Review, Functional Requirements Analysis and Allocation, Task Analysis, Staffing, Human Reliability Analysis, Human-System Interface Design, Procedure Development, Training Program Development, Human Factors Verification and Validation, and Design Implementation.

  3. An analysis of Technical Security Control Requirements For Digital I and C Systems in Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Song, Jaegu; Lee, Jungwoon; Park, Geeyong; Kwon, Keechoon; Lee, Dongyoung; Lee, Cheolkwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2013-10-15

    Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of maintenance and precise operation. This digitalization, however, brings out issues related to cyber security. In the most recent past, international standard organizations, regulatory institutes, and research institutes have performed a number of studies addressing these systems cyber security. In order to provide information helpful to the system designers in their application of cyber security for the systems, this paper presents methods and considerations to define attack vectors in a target system, to review and select the requirements in the Regulatory Guide 5.71, and to integrate the results to identify applicable technical security control requirements. In this study, attack vectors are analyzed through the vulnerability analyses and penetration tests with a simplified safety system, and the elements of critical digital assets acting as attack vectors are identified. Among the security control requirements listed in Appendices B and C to Regulatory Guide 5.71, those that should be implemented into the systems are selected and classified in groups of technical security control requirements using the results of the attack vector analysis. For the attack vector elements of critical digital assets, all the technical security control requirements are evaluated to determine whether they are applicable and effective, and considerations in this evaluation are also discussed. The technical security control requirements in three important categories of access control, monitoring and logging, and encryption are derived and grouped according to the elements of attack vectors as results for the sample safety system.

  4. Human factor engineering applied to nuclear power plant design

    Energy Technology Data Exchange (ETDEWEB)

    Manrique, A. [TECNATOM SA, BWR General Electric Business Manager, Madrid (Spain); Valdivia, J.C. [TECNATOM SA, Operation Engineering Project Manager, Madrid (Spain); Jimenez, A. [TECNATOM SA, Operation Engineering Div. Manager, Madrid (Spain)

    2001-07-01

    For the design and construction of new nuclear power plants as well as for maintenance and operation of the existing ones new man-machine interface designs and modifications are been produced. For these new designs Human Factor Engineering must be applied the same as for any other traditional engineering discipline. Advantages of implementing adequate Human Factor Engineering techniques in the design of nuclear reactors have become not only a fact recognized by the majority of engineers and operators but also an explicit requirement regulated and mandatory for the new designs of the so called advanced reactors. Additionally, the big saving achieved by a nuclear power plant having an operating methodology which significantly decreases the risk of operating errors makes it necessary and almost vital its implementation. The first step for this is preparing a plan to incorporate all the Human Factor Engineering principles and developing an integral design of the Instrumentation and Control and Man-machine interface systems. (author)

  5. A HUMAN FACTORS META MODEL FOR U.S. NUCLEAR POWER PLANT CONTROL ROOM MODERNIZATION

    Energy Technology Data Exchange (ETDEWEB)

    Joe, Jeffrey C.

    2017-03-01

    Over the last several years, the United States (U.S.) Department of Energy (DOE) has sponsored human factors research and development (R&D) and human factors engineering (HFE) activities through its Light Water Reactor Sustainability (LWRS) program to modernize the main control rooms (MCR) of commercial nuclear power plants (NPP). Idaho National Laboratory (INL), in partnership with numerous commercial nuclear utilities, has conducted some of this R&D to enable the life extension of NPPs (i.e., provide the technical basis for the long-term reliability, productivity, safety, and security of U.S. NPPs). From these activities performed to date, a human factors meta model for U.S. NPP control room modernization can now be formulated. This paper discusses this emergent HFE meta model for NPP control room modernization, with the goal of providing an integrated high level roadmap and guidance on how to perform human factors R&D and HFE for those in the U.S. nuclear industry that are engaging in the process of upgrading their MCRs.

  6. Rivers in the Anthropocene: Mapping Human Water Security

    Science.gov (United States)

    Vorosmarty, C. J.; Green, P.

    2014-12-01

    Fresh water underpins countless benefits to society and is pivotal to the success of the food and energy sectors, industry and commerce, and the expanding urban domain. It provides essential cultural, recreational, and aesthetic values and also plays a critical role in the maintenance of ecosystem services and biodiversity. Recent analyses of water systems across the planet, summarized using high resolution, geospatial indicator maps of rivers, demonstrate that a wide array of stressors combine to produce a pattern of worldwide threat to much of the freshwater resource base that sustains human water supply and aquatic biodiversity. A pervasive, globally-significant pattern of management is evident in the contemporary setting, through which impairment accumulates as a function of wealth, but is then remedied by costly, after-the-fact technological investments. This strategy of treating symptoms while leaving unabated the underlying causes is practiced widely across rich countries, but it strands poor nations and much of the world's aquatic lifeforms at high levels of vulnerability. The seeds of such an approach to water management are hardly new and are evident throughout human history. This talk will explore the implications of these global realities and will focus on the role of 21st century engineering as in both contributing to the growing water crisis and stimulating innovation for more effective stewardship of our water resource systems. It will also present a first global synthesis of the geography of freshwater provisioning source areas, evaluating jointly the quantity and condition of freshwater produced from these areas, and the downstream populations served by these resources. A geospatial indicator is derived, the freshwater provisioning index for humans (FPIh), which constitutes an objective measure of the state of the resource base and its role in supporting human water security.

  7. MAINTAINING HIGH RESOLUTION MASS SPECTROMETRY CAPABILITIES FOR NATIONAL NUCLEAR SECURITY ADMINISTRATION APPLICATIONS

    Energy Technology Data Exchange (ETDEWEB)

    Wyrick, S.; Cordaro, J.; Reeves, G.; Mcintosh, J.; Mauldin, C.; Tietze, K.; Varble, D.

    2011-06-06

    The Department of Energy (DOE) National Nuclear Security Administration (NNSA) has a specialized need for analyzing low mass gas species at very high resolutions. The currently preferred analytical method is electromagnetic sector mass spectrometry. This method allows the NNSA Nuclear Security Enterprise (NSE) to resolve species of similar masses down to acceptable minimum detection limits (MDLs). Some examples of these similar masses are helium-4/deuterium and carbon monoxide/nitrogen. Through the 1980s and 1990s, there were two vendors who supplied and supported these instruments. However, with declining procurements and down turns in the economy, the supply of instruments, service and spare parts from these vendors has become less available, and in some cases, nonexistent. The largest NSE user of this capability is the Savannah River Site (SRS), located near Aiken, South Carolina. The Research and Development Engineering (R&DE) Group in the Savannah River National Laboratory (SRNL) investigated the areas of instrument support that were needed to extend the life cycle of these aging instruments. Their conclusions, as to the focus areas of electromagnetic sector mass spectrometers to address, in order of priority, were electronics, software and hardware. Over the past 3-5 years, the R&DE Group has designed state of the art electronics and software that will allow high resolution legacy mass spectrometers, critical to the NNSA mission, to be operated for the foreseeable future. The funding support for this effort has been from several sources, including the SRS Defense Programs, NNSA Readiness Campaign, Pantex Plant and Sandia National Laboratory. To date, electronics systems have been upgraded on one development system at SRNL, two production systems at Pantex and one production system at Sandia National Laboratory. An NSE working group meets periodically to review strategies going forward. The R&DE Group has also applied their work to the electronics for a

  8. Join Hands to Meet Nuclear Security Challenge and Promote Peace and Development Statement at the Nuclear Security Summit%携手应对核安全挑战共同促进和平与发展在核安全峰会上的讲话

    Institute of Scientific and Technical Information of China (English)

    胡锦涛

    2010-01-01

    @@ President Obama, Dear Colleagues, Nuclear security concerns the sustainable development of nuclear energy and the wider economy.It bears on social stability and public safety,and affects international peace andtranquility.

  9. A Study on Human Resources Development in Nuclear Field

    Energy Technology Data Exchange (ETDEWEB)

    Moon, Keehwan; Lee, M. K.; Kim, S. S.; Nam, J. H.; Won, B. C.; Lee, D. S; Hwang, I. A.; Seo, M. W.

    2011-11-15

    The study encompasses 4 major parts, each results being described here under: Various policy alternatives through supply-demand analysis of domestic nuclear skilled manpower are suggested. Human resources development programs of main educational organizations in domestic and overseas are comprehensively reviewed. Establishment of 'Integrated Management Organization' which can combine and manage domestic educational organizations' educational functions is necessary to efficiently deal with the increased educational demand and the shift of educational paradigm from supply-driven to needs-driven education and to make nuclear energy export sustainable. And road map on human resource development to efficiently accomplish 'Integrated Management Organization's mission is suggested. It is provided that an overall strategies for the reasonable educational program reflecting the good practices with their implications in overseas nuclear education programs.

  10. [Nuclear transfer of goat somatic cells transgenic for human lactoferrin].

    Science.gov (United States)

    Li, Lan; Shen, Wei; Pan, Qing-Yu; Min, Ling-Jiang; Sun, Yu-Jiang; Fang, Yong-Wei; Deng, Ji-Xian; Pan, Qing-Jie

    2006-12-01

    Transgenic animal mammary gland bioreactors are being used to produce recombinant proteins with appropriate post-translational modifications, and nuclear transfer of transgenic somatic cells is a more powerful method to produce mammary gland bioreactor. Here we describe efficient gene transfer and nuclear transfer in goat somatic cells. Gene targeting vector pGBC2LF was constructed by cloning human lactoferrin (LF) gene cDNA into exon 2 of the milk goat beta-casein gene, and the endogenous start condon was replaced by that of human LF gene. Goat fetal fibroblasts were transfected with linearized pGBC2LF and 14 cell lines were positive according to PCR and Southern blot. The transgenic cells were used as donor cells of nuclear transfer, and some of reconstructed embryos could develop to blastocyst in vitro.

  11. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  12. ORIGIN, DEVELOPMENT AND PERSPECTIVES FOR THE HUMAN SECURITY CONCEPT IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Karina Paulina Marczuk

    2007-07-01

    Full Text Available The wide economic support and an attempt to guarantee safety, which the European governments are trying to provide for their citizens, are reasons why the European Union explores new directions of conducting common policies for which the most important is the human being and his needs. The European security policy – and the new concept of human security – could be one example of the EU`s new behavior. Taking into consideration the previous attempts at developing security theories in Europe and other countries, it is possible to state that the modern human security doctrine in the EU could be followed by creating a special kind of European corps which would be a new tool for ensuring security where it would be necessary to provide it – European Gendarmerie Forces (known as EGF or EUROGENDFOR. The aim of this article is to show the impact of the evolution of the modern security theories for creating a human security doctrine in the framework of the European Union. Moreover, genesis and activity of the EGF are presented and the author is trying to answer the question: could the EGF be a tool of human security in the EU?. Finally, a couple of proposals for the future development of the European security policy are mentioned.

  13. Radioisotope identification method for poorly resolved gamma-ray spectrum of nuclear security concern

    Energy Technology Data Exchange (ETDEWEB)

    Ninh, Giang Nguyen; Phongphaeth, Pengvanich, E-mail: phongphaeth.p@chula.ac.th; Nares, Chankow [Nuclear Engineering Department, Faculty of Engineering, Chulalongkorn University, 254 Phayathai Road, Pathumwan, Bangkok 10330 (Thailand); Hao, Quang Nguyen [Vietnam Atomic Energy Institute, Ministry of Science and Technology, Hanoi (Viet Nam)

    2016-01-22

    Gamma-ray signal can be used as a fingerprint for radioisotope identification. In the context of radioactive and nuclear materials security at the border control point, the detection task can present a significant challenge due to various constraints such as the limited measurement time, the shielding conditions, and the noise interference. This study proposes a novel method to identify the signal of one or several radioisotopes from a poorly resolved gamma-ray spectrum. In this method, the noise component in the raw spectrum is reduced by the wavelet decomposition approach, and the removal of the continuum background is performed using the baseline determination algorithm. Finally, the identification of radioisotope is completed using the matrix linear regression method. The proposed method has been verified by experiments using the poorly resolved gamma-ray signals from various scenarios including single source, mixing of natural uranium with five of the most common industrial radioactive sources (57Co, 60Co, 133Ba, 137Cs, and 241Am). The preliminary results show that the proposed algorithm is comparable with the commercial method.

  14. Radioisotope identification method for poorly resolved gamma-ray spectrum of nuclear security concern

    Science.gov (United States)

    Ninh, Giang Nguyen; Phongphaeth, Pengvanich; Nares, Chankow; Hao, Quang Nguyen

    2016-01-01

    Gamma-ray signal can be used as a fingerprint for radioisotope identification. In the context of radioactive and nuclear materials security at the border control point, the detection task can present a significant challenge due to various constraints such as the limited measurement time, the shielding conditions, and the noise interference. This study proposes a novel method to identify the signal of one or several radioisotopes from a poorly resolved gamma-ray spectrum. In this method, the noise component in the raw spectrum is reduced by the wavelet decomposition approach, and the removal of the continuum background is performed using the baseline determination algorithm. Finally, the identification of radioisotope is completed using the matrix linear regression method. The proposed method has been verified by experiments using the poorly resolved gamma-ray signals from various scenarios including single source, mixing of natural uranium with five of the most common industrial radioactive sources (57Co, 60Co, 133Ba, 137Cs, and 241Am). The preliminary results show that the proposed algorithm is comparable with the commercial method.

  15. 5 steps to delivering safe, secure and reliable rail solutions for the nuclear industry

    Energy Technology Data Exchange (ETDEWEB)

    Connelly, C. [Direct Rail Services, Warrington (United Kingdom)

    2004-07-01

    Direct Rail Services (DRS) has been operating since October 1995, following the decision by parent company, British Nuclear Fuels (BNFL), to create a strategic rail transport service. The decision came after the privatisation of the rail network in the UK, when the former British Rail was superseded by a range of private organisations responsible for separate areas of the industry. Individual companies became responsible for aspects such as the operation and maintenance of the network infrastructure and for passenger and freight train services. Rather than enter into contractual arrangements with third party contractors, DRS was formed - securing both the access and reliability of transport routes and availability of the rail network, providing greater guarantees about the levels of service delivery. The strategy of bringing this area of transport in house was concurrent with that of international transport, utilising its own fleet of ships for overseas fuel movements. Freight operations began in October 1995, with the first services operating between Sellafield and the low level radioactive waste facility at Drigg.

  16. Human and organizational factors in nuclear safety; Factores humanos y organizativos en la seguridad nuclear

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, A.; Barrientos, M.; Gil, B.

    2015-07-01

    Nuclear installations are socio technical systems where human and organizational factors, in both utilities and regulators, have a significant impact on safety. Three Mile Island (TMI) accident, original of several initiatives in the human factors field, nevertheless became a lost opportunity to timely acquire lessons related to the upper tiers of the system. Nowadays, Spanish nuclear installations have integrated in their processes specialists and activities in human and organizational factors, promoted by the licensees After many years of hard work, Spanish installations have achieved a better position to face new challenges, such as those posed by Fukushima. With this experience, only technology-centered action plan would not be acceptable, turning this accident in yet another lost opportunity. (Author)

  17. Using virtual reality in the training of security staff and evaluation of physical protection barriers in nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Augusto, Silas C.; Mol, Antonio C.A.; Mol, Pedro C.; Sales, Douglas S. [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil); Universidade do Estado do Rio de Janeiro (UERJ), RJ (Brazil)], e-mail: silas@ien.gov.br, e-mail: mol@ien.gov.br, e-mail: pedro98@gmail.com, e-mail: dsales@ien.gov.br

    2009-07-01

    The physical security of facilities containing radioactive objects, an already important matter, now has a new aggravating factor: the existence of groups intending to obtain radioactive materials for the purpose of intentionally induce radioactive contamination incidents, as for example the explosion of dirty bombs in populated regions, damaging both people and environment. In this context, the physical security of such facilities must be reinforced so to reduce the possibilities of such incidents. This paper presents a adapted game engine used as a virtual reality system, enabling the modeling and simulation of scenarios of nuclear facilities containing radioactive objects. In these scenarios, the physical protection barriers, as fences and walls, are simulated along with vigilance screens. Using a computer network, several users can participate simultaneously in the simulation, being represented by avatars. Users can play the roles of both invaders and security staff. The invaders have as objective to surpass the facility's physical protection barriers to steal radioactive objects and flee. The security staff have as objective to prevent and stop the theft of radioactive objects from the facility. The system can be used to analysis simulated scenarios and train vigilance/security staff. A test scenario was already developed and used, and the preliminary tests had satisfactory results, as they enabled the evaluation of the physical protection barriers of the virtual facility, and the training of those who participated in the simulations in the functions of a security staff. (author)

  18. Human Reliability for the Next Generation of Nuclear Experts

    Energy Technology Data Exchange (ETDEWEB)

    Coates, Cameron W [ORNL; Eisele, Gerhard R [ORNL

    2010-01-01

    As the nuclear renaissance progresses and today s nuclear and radiological experts retire, a new generation of experts will ultimately be recruited, trained, and replace the old guard. Selecting individuals who have the attitudes and values appropriate to work in the nuclear industry and who have the best qualifications for the position will be a key to the success of this renaissance. In a world with deep divisions on political and social issues; how a State, agency, or company assures that those hired can be trusted with the access to, and responsibilities for, nuclear and/or radiological materials is an important consideration. Human interactions invariably rely on the offering of assurance and the receipt of trust. A fundamental element in any human relationship is knowing when to trust and when to doubt. When are assurances to be believed or questioned? Human reliability programs (HRP) are used to assure a person s truthfulness and loyalty to the State. An HRP program has a number of elements and may not fit all cultures in the same form. An HRP can vary in scope from simple background checks of readily available data to full field investigations and testing. This presentation discusses possible elements for an HRP from regulation to implementation and the issues related to each element. The effects of an HRP on potential recruits will be discussed.

  19. Human Factors Considerations in New Nuclear Power Plants: Detailed Analysis.

    Energy Technology Data Exchange (ETDEWEB)

    OHara,J.; Higgins, J.; Brown, W.; Fink, R.

    2008-02-14

    This Nuclear Regulatory Commission (NRC) sponsored study has identified human-performance issues in new and advanced nuclear power plants. To identify the issues, current industry developments and trends were evaluated in the areas of reactor technology, instrumentation and control technology, human-system integration technology, and human factors engineering (HFE) methods and tools. The issues were organized into seven high-level HFE topic areas: Role of Personnel and Automation, Staffing and Training, Normal Operations Management, Disturbance and Emergency Management, Maintenance and Change Management, Plant Design and Construction, and HFE Methods and Tools. The issues where then prioritized into four categories using a 'Phenomena Identification and Ranking Table' methodology based on evaluations provided by 14 independent subject matter experts. The subject matter experts were knowledgeable in a variety of disciplines. Vendors, utilities, research organizations and regulators all participated. Twenty issues were categorized into the top priority category. This Brookhaven National Laboratory (BNL) technical report provides the detailed methodology, issue analysis, and results. A summary of the results of this study can be found in NUREG/CR-6947. The research performed for this project has identified a large number of human-performance issues for new control stations and new nuclear power plant designs. The information gathered in this project can serve as input to the development of a long-term strategy and plan for addressing human performance in these areas through regulatory research. Addressing human-performance issues will provide the technical basis from which regulatory review guidance can be developed to meet these challenges. The availability of this review guidance will help set clear expectations for how the NRC staff will evaluate new designs, reduce regulatory uncertainty, and provide a well-defined path to new nuclear power plant

  20. STUDY ON NUCLEAR MATRIX PROTEINS FROM HUMAN BREAST CARCINOMA

    Institute of Scientific and Technical Information of China (English)

    HE Qian; ZHANG Shu-qun; CHU Yong-lie; JIA Xiao-li; JIANG Jian-tao

    2009-01-01

    Objective To investigate the marker protein of human breast carcinoma from nuclear matrix proteins (NMPs).Methods NMPs were injected subcutaneously into rabbit to get antiserum, which was used to detect the NMPs specificity for breast carcinoma.Results There was an apparent positive band (100kD) in the NMPs of breast carcinoma, which did not exist in normal breast and other tumors that were detected.Conclusion One or one group of 100kD NMPs were found to be related to human breast carcinoma, which may be involved in the carcinogenesis and development of human breast carcinoma and valuable for breast carcinoma diagnosis.

  1. 华盛顿核安全峰会工作计划%Work Plan of Washington Nuclear Security Summit

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ This Work Plan supports the Communiqué of the Washington Nuclear Security Summit.It constitutes a political commitlnent bv the participating states to catty out,on a voluntary basis,applicable portions of this Work Plan,consistent with respective national laws and intemational obligations,in all aspects of the storage,use,transportation and disposal of uclear materials and in preventing non-state actors from obtaining the information required to use such materials for malicious purposes.

  2. Virtual reality in the creation of a tool to support planning of physical security at nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Santo, Andre Cotelli do E.; Mol, Antonio Carlos de A.; Goncalves, Deise Galvao de S.; Marins, Eugenio; Freitas, Victor Goncalves G., E-mail: cotelli.andre@gmail.com, E-mail: mol@ien.gov.br, E-mail: deise.galvao@gmail.com, E-mail: eugenio@ien.gov.br, E-mail: vgoncalves@ien.gov.br [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio De Janeiro, RJ (Brazil)

    2013-07-01

    In recent years was observed the importance of improving the physical security of nuclear facilities, mainly due to the increasing advancement of brazilian nuclear program. The present work aims to develop a tool that allows the visualization and planning of action strategies in a virtual environment, in order to improve this security. To this end, was created a virtual model of the Instituto de Engenharia Nuclear (IEN), which is located on Ilha do Fundao - Rio de Janeiro - Brazil. This environment is a three-dimensional model, with representations close to reality, where virtual characters (avatars) can move and interact in real time. In this virtual world, it was developed a dynamic weather system, where is possible to change between day and night, and climate changes such as: rain, storms, snow, among other features. Furthermore, the tool has a surveillance system using virtual cameras, allowing the monitoring of the environment. This way, making possible to simulate strategies approach, allowing an evaluation of the procedures performed, as well as assisting in the training of security installations subject to radiation. (author)

  3. AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

    Directory of Open Access Journals (Sweden)

    JAE-GU SONG

    2013-10-01

    Full Text Available Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of maintenance and precise operation. This digitalization, however, brings out issues related to cyber security. In the most recent past, international standard organizations, regulatory institutes, and research institutes have performed a number of studies addressing these systems cyber security. In order to provide information helpful to the system designers in their application of cyber security for the systems, this paper presents methods and considerations to define attack vectors in a target system, to review and select the requirements in the Regulatory Guide 5.71, and to integrate the results to identify applicable technical security control requirements. In this study, attack vectors are analyzed through the vulnerability analyses and penetration tests with a simplified safety system, and the elements of critical digital assets acting as attack vectors are identified. Among the security control requirements listed in Appendices B and C to Regulatory Guide 5.71, those that should be implemented into the systems are selected and classified in groups of technical security control requirements using the results of the attack vector analysis. For the attack vector elements of critical digital assets, all the technical security control requirements are evaluated to determine whether they are applicable and effective, and considerations in this evaluation are also discussed. The technical security control requirements in three important categories of access control, monitoring and logging, and encryption are derived and grouped according to the elements of attack vectors as results for the sample safety system.

  4. Human nucleoporins promote HIV-1 docking at the nuclear pore, nuclear import and integration.

    Directory of Open Access Journals (Sweden)

    Francesca Di Nunzio

    Full Text Available The nuclear pore complex (NPC mediates nucleo-cytoplasmic transport of macromolecules and is an obligatory point of passage and functional bottleneck in the replication of some viruses. The Human Immunodeficiency Virus (HIV has evolved the required mechanisms for active nuclear import of its genome through the NPC. However the mechanisms by which the NPC allows or even assists HIV translocation are still unknown. We investigated the involvement of four key nucleoporins in HIV-1 docking, translocation, and integration: Nup358/RanBP2, Nup214/CAN, Nup98 and Nup153. Although all induce defects in infectivity when depleted, only Nup153 actually showed any evidence of participating in HIV-1 translocation through the nuclear pore. We show that Nup358/RanBP2 mediates docking of HIV-1 cores on NPC cytoplasmic filaments by interacting with the cores and that the C-terminus of Nup358/RanBP2 comprising a cyclophilin-homology domain contributes to binding. We also show that Nup214/CAN and Nup98 play no role in HIV-1 nuclear import per se: Nup214/CAN plays an indirect role in infectivity read-outs through its effect on mRNA export, while the reduction of expression of Nup98 shows a slight reduction in proviral integration. Our work shows the involvement of nucleoporins in diverse and functionally separable steps of HIV infection and nuclear import.

  5. Nuclear transfer to study the nuclear reprogramming of human stem cells.

    Science.gov (United States)

    Saito, Shigeo; Sawai, Ken; Murayama, Yoshinobu; Fukuda, Keiichi; Yokoyama, Kazunari

    2008-01-01

    Research of stem cells will enable us to understand the development and function of tissues and organs in mammals. The ability to induce regeneration of new tissues from embryonic stem (ES) cells derived from cloned blastocysts via nuclear transfer can be expected in the not-too-distant future. The fact that there is no way except nuclear cloning for the return of differentiated cells to undifferentiated cells remains an interesting problem to be solved. We describe protocols for the production of cloned calves from bovine ES cells to study nuclear reprogramming ability of stem cells. The frequency of term pregnancies for blastocysts from ES cells is higher than those of early pregnancies and maintained pregnancies after nuclear transfer with bovine somatic cells. We also describe protocols for gene introduction into bovine ES cells in vitro, particularly the human leukocyte antigens (HLA). Bovine ES cells provide a powerful tool for the generation of transgenic clonal offspring. This technique, when perfected for humans, may be critical for neural stem cell transplantation.

  6. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    Energy Technology Data Exchange (ETDEWEB)

    Sinars, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Scott, Kimberly Carole [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Edwards, M. John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olson, Russell Teall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-17

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  7. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    Energy Technology Data Exchange (ETDEWEB)

    Sinars, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Scott, Kimberly Carole [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Edwards, M. John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olson, Russell Teall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-17

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three month long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Proceeding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near term, cost effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  8. The Spanish system of Physical Security of the facilities, activities and radioactive nuclear fuels; El sistema Espanol de Seguridad Fisica de las instalaciones, actividades y materiales nucleares radiactivos

    Energy Technology Data Exchange (ETDEWEB)

    Gil, E.; Gutierrez, M.

    2008-07-01

    The use of nuclear and radioactive materials has, from the very beginning, been characterized by the implementation of significant safety measures that are developed in parallel to the technology itself. The two facets of nuclear safety technological and physical have evolved at the same time as the technological advances, and also in terms of the social environment and awareness. Thus, the TMI and Chernobyl accidents were an important incentive for the evolution of technological safety, and the new context of the need for overall safety is providing the impetus for the evolution of physical security around the world. In Spain this impetus has materialized in the design and implementation of a physical security system for nuclear and radioactive installations, activities and materials, and putting it into practice has required the joint efforts of the public authorities and the private sector. The system is developed on the basis of three main components: installation protection, crime prevention, and preparation of the response to emergency situations caused by criminals acts. It is complemented by a series of horizontal actions aimed at improving institutional coordination, international collaboration, training of the agents involved in its implementation, and updating of the applicable regulatory framework. (Author)

  9. Human rights and internal security in Malaysia rhetoric and reality

    OpenAIRE

    Rahim, Noor Hishmuddian

    2006-01-01

    Since 1957, Malaysia has faced external and internal security threats. Over time, Malaysia has succeeded in solving the external threats but internal threats remained. The internal threats have come in many forms, including ethnic conflict, religious extremism and deviationism, and terrorism. Since the safety of the public lies in the hands of the government, measures have been taken to ensure the nation's stability and security, including restriction on civil and political liberties. This th...

  10. Standard guide for application of radiation monitors to the control and physical security of special nuclear material

    CERN Document Server

    American Society for Testing and Materials. Philadelphia

    1999-01-01

    1.1 This guide briefly describes the state-of-the-art of radiation monitors for detecting special nuclear material (SNM) (see 3.1.11) in order to establish the context in which to write performance standards for the monitors. This guide extracts information from technical documentation to provide information for selecting, calibrating, testing, and operating such radiation monitors when they are used for the control and protection of SNM. This guide offers an unobtrusive means of searching pedestrians, packages, and motor vehicles for concealed SNM as one part of a nuclear material control or security plan for nuclear materials. The radiation monitors can provide an efficient, sensitive, and reliable means of detecting the theft of small quantities of SNM while maintaining a low likelihood of nuisance alarms. 1.2 Dependable operation of SNM radiation monitors rests on selecting appropriate monitors for the task, operating them in a hospitable environment, and conducting an effective program to test, calibrat...

  11. Human security and access to water, sanitation, and hygiene: exploring the drivers and nexus

    NARCIS (Netherlands)

    P. Obani; J. Gupta

    2016-01-01

    Water security challenges are mostly covered in the literature on the food and energy nexus. This chapter however adopts a broader conception of water security in relation to lack of access to water, sanitation, and hygiene (WASH), and argues that the human rights approach could be instrumental in a

  12. Human Security Thinking in Practice - ’Personal Security’, ‘Citizen Security’ and Comprehensive Mappings.

    NARCIS (Netherlands)

    D.R. Gasper (Des); O.A. Gómez (Oscar)

    2015-01-01

    markdownabstract__Abstract__ The paper describes the introduction of an emphasis on ‘personal security’ in human security thinking and practice, as part of the ultimately unsuccessful attempt to compartmentalize the pursuit of security. It reviews the past twenty years of attention to ‘personal

  13. Human Security Thinking in Practice - ’Personal Security’, ‘Citizen Security’ and Comprehensive Mappings.

    NARCIS (Netherlands)

    D.R. Gasper (Des); O.A. Gómez (Oscar)

    2015-01-01

    markdownabstract__Abstract__ The paper describes the introduction of an emphasis on ‘personal security’ in human security thinking and practice, as part of the ultimately unsuccessful attempt to compartmentalize the pursuit of security. It reviews the past twenty years of attention to ‘personal sec

  14. Human Security and the Governmentality of Neo-Liberal Mobility : A Feminist Perspective

    NARCIS (Netherlands)

    T-D. Truong (Thanh-Dam)

    2006-01-01

    textabstractTransnational migration and its implications for human security as a policy field constitute one of the most complex issues of our time. Current experiences of displacement and security spans between a cyber world characterized by hyper mobility of finance, technology, information and th

  15. Nuclear responses to depletion of mitochondrial DNA in human cells.

    Science.gov (United States)

    Li, K; Neufer, P D; Williams, R S

    1995-11-01

    The derivation of human cell lines devoid of mitochondrial (mt) DNA (rho 0) provides an opportunity to study nuclear responses to a chronic impairment of mitochondrial oxidative phosphorylation. Expression of several nuclear genes is induced in human rho 0 cells, including those encoding integral proteins of the mitochondrial inner membrane, intermediate filaments, and ribosomes. In contrast to conditions in which mitochondrial respiration is altered acutely, expression of heat shock proteins and immediate early genes is not induced. Mitochondria from rho 0 cells maintain a transmembrane electrochemical potential and are distributed within the cytoplasm of these cells in a manner indistinguishable from that of wild-type cells. We conclude that a chronic deficiency of mitochondrial oxidative phosphorylation produced by elimination of mtDNA is associated with a different pattern of gene induction than that provoked by other acute or subacute conditions that impair mitochondrial respiration or create energy demands in excess of mitochondrial respiratory capacity.

  16. 76 FR 48184 - Exelon Nuclear, Peach Bottom Atomic Power Station, Unit 1; Exemption From Certain Security...

    Science.gov (United States)

    2011-08-08

    ... a permanently shut down nuclear reactor facility. PBAPS Unit 1 was a high-temperature, gas-cooled... nuclear power reactors against radiological sabotage,'' paragraph (b)(1) states, ``The licensee shall... its objective to provide high assurance that activities involving special nuclear material are...

  17. Ebola's Revelations — A Threefold Human Security Analysis of Liberia & Its Peacebuilding Efforts

    DEFF Research Database (Denmark)

    Ammann, Theresa

    2015-01-01

    This thesis examined in which ways Human Security can be employed as a peacebuilding analysis tool in different temporal settings of Liberia, namely, shortly before and after Ebola had entered Liberia. The articles employ Human Security to varying extents; Article 1 takes a broad, detailed approach...... to establish sustainable peace. Article 2 was published in October 2014 on the website of the journal Cultural Anthropology and was targeted at a broader audience with an interest in Ebola. The article, therefore, comprised a content analysis of newspaper articles to give an overview of the timeline...... at the time of Ebola’s entry to Liberia. In doing so, the article focused primarily on Ebola’s human security-related implications and found that Ebola has had devastating consequences on all levels of human security; most of which will quite likely be long-lasting, e.g., educational system cuts due...

  18. Book Review: Anja Jetschke: Human Rights and State Security: Indonesia and the Philippines

    Directory of Open Access Journals (Sweden)

    Salvador Santino F. Regilme, Jr.

    2013-01-01

    Full Text Available Book Review of the Monograph: Jetschke, Anja (2010, Human Rights and State Security: Indonesia and the Philippines ; Philadelphia: University of Pennsylvania Press, ISBN: 978-0-8122-4301-7, 368 pages

  19. Representing humans in system security models: An actor-network approach

    NARCIS (Netherlands)

    Pieters, Wolter

    2011-01-01

    System models to assess the vulnerability of information systems to security threats typically represent a physical infrastructure (buildings) and a digital infrastructure (computers and networks), in combination with an attacker traversing the system while acquiring credentials. Other humans are ge

  20. Representing humans in system security models: An actor-network approach

    NARCIS (Netherlands)

    Pieters, Wolter

    2011-01-01

    System models to assess the vulnerability of information systems to security threats typically represent a physical infrastructure (buildings) and a digital infrastructure (computers and networks), in combination with an attacker traversing the system while acquiring credentials. Other humans are ge

  1. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    Science.gov (United States)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive

  2. The U.S. Department of Energy, National Nuclear Security Agency's Use of Geographic Information Systems for Nuclear Emergency Response Support

    Energy Technology Data Exchange (ETDEWEB)

    A. L. Guber

    2001-06-01

    The U.S, Department of Energy (DOE), National Nuclear Security Agency's (NNSA) Remote Sensing Laboratory (RSL) provides Geographic Information System (GIS) support during nuclear emergency response activities. As directed by the NNSA, the RSL GIS staff maintains databases and equipment for rapid field deployment during an emergency response. When on location, GIS operators provide information products to on-site emergency managers as well as to emergency managers at the DOE Headquarters (HQ) Emergency Operations Center (EOC) in Washington, D.C. Data products are derived from multiple information sources in the field including radiological prediction models, field measurements taken on the ground and from the air, and pertinent information researched on the Internet. The GIS functions as a central data hub where it supplies the information to response elements in the field, as well as to headquarters officials at HQ during emergency response activities.

  3. Nuclear Accidents: Consequences for Human, Society and Energy Sector

    Directory of Open Access Journals (Sweden)

    L. A. Bolshov

    2016-01-01

    Full Text Available The article examines radiation and hygienic regulations with regard to the elimination of consequences of the Chernobyl NPP accident in the context of relationships with other aspects, primarily socio-economic and political factors. This experience is reasonable to take into account when defining criteria in other regulatory fields, for example, in radioactive waste classification and remediation of areas. The article presents an analysis of joint features and peculiarities of nuclear accidents in the industry and energy sectors. It is noted that the scale of global consequences of the Chernobyl NPP accident is defined by the large-scale release of radioactivity into the environment, as well as an affiliation of the nuclear installation with the energy sector. Large-scale radiation accidents affect the most diverse spheres of human activities, what, in its turn, evokes the reverse reaction from the society and its institutions, including involvement of political means of settlement. If the latter is seeing for criteria that are scientifically justified and feasible, then the preconditions for minimizing socio-economic impacts are created. In other cases, political decisions, such as nuclear units’ shutdown and phasing out of nuclear energy, appear to be an economic price which society, as a whole and a single industry sector, pay to compensate the negative public response. The article describes fundamental changes in approaches to ensure nuclear and radiation safety that occurred after the Chernobyl NPP accident. Multiple and negative consequences of the Chernobyl accident for human and society are balanced to some extent by a higher level of operational safety, emergency preparedness, and life-cycle safety. The article indicates that harmonization and ensuring consistency of regulations that involve different aspects of nuclear and radiation safety are important to implement practical solutions to the nuclear legacy problems. The

  4. Impact of Iran's Nuclear Program, on Turkey s National Security (In light of the Theory of Balance of Power

    Directory of Open Access Journals (Sweden)

    Hossein Masoudnia

    2012-01-01

    Full Text Available Since the nuclear program of the Islamic Republic of Iran It is always have been followed global and regional responses and objections. But after the election of Ahmadinejad as president of Iran and his willingness to advance the nuclear program, Western opposition to this trend intensified to the point where many of issuing sanctions against Iran. Among the countries that have been tried as a mediator between Iran and the International Union of Europe and the United States (5 +1 will act and encourage the parties to resolve the dispute diplomatically, Turkey. Considering this background, this paper attempts to link the Iranian nuclear program and Turkey's national security in light of the balance of power theory can be analyzed. The findings confirm the assumption that Turkey's concerns about Iran's nuclear program in the context of possible changes in the regional balance of power in the Islamic Republic's pursuit of nuclear energy is the analysis and evaluation, This is because the Turkish success in achieving the goals defined in the context of the challenges faced by policy-oriented Neo-Ottomans

  5. Implementation of Unclassified Controlled Nuclear Information guidelines for fixed-site safeguards and security (FSSS) at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Rood, P.L.

    1995-02-01

    Unclassified Controlled Nuclear Information (UCNI) is one type of sensitive information that DOE employees, including computer users, must now identify and protect. Guidelines to identify information as UCNI are gradually being put in place. The publication of Unclassified Controlled Nuclear Information Topical Guideline for Fixed-Site Safeguards and Security, TG-FSSS-1, is a major step in the development of UCNI guidelines. This DOE published guide cuts across and addresses many different programmatic areas including automated data processing. Our local guideline, Los Alamos National Laboratory Unclassified Controlled Nuclear Information Guideline for Fixed-Site Safeguards and Security, IG-LAFSSS-1, is based on TG-FSSS-1. In this paper, I plan to discuss the background of UCNI, the definition of UCNI, information that qualifies as UCNI, the consequences of information being UCNI, the development of UCNI guidelines, TG-FSSS-1 and IG-LAFSSS-1, the relationship of UCNI to classification, and the implementation of the IG-LAFSSS-1 at Los Alamos.

  6. When Should We Care About Sustainability? Applying Human Security as the Decisive Criterion

    Directory of Open Access Journals (Sweden)

    Alexander K. Lautensach

    2012-05-01

    Full Text Available It seems intuitively clear that not all human endeavours warrant equal concern over the extent of their sustainability. This raises the question about what criteria might best serve for their prioritisation. We refute, on empirical and theoretical grounds, the counterclaim that sustainability should be of no concern regardless of the circumstances. Human security can serve as a source of criteria that are both widely shared and can be assessed in a reasonably objective manner. Using established classifications, we explore how four forms of sustainability (environmental, economic, social, and cultural relate to the four pillars of human security (environmental, economic, sociopolitical, and health-related. Our findings, based on probable correlations, suggest that the criteria of human security allow for a reliable discrimination between relatively trivial incidences of unsustainable behavior and those that warrant widely shared serious concern. They also confirm that certain sources of human insecurity, such as poverty or violent conflict, tend to perpetuate unsustainable behavior, a useful consideration for the design of development initiatives. Considering that human security enjoys wide and increasing political support among the international community, it is to be hoped that by publicizing the close correlation between human security and sustainability greater attention will be paid to the latter and to its careful definition.

  7. Nuclear Security Summit and Workshop 2015: Preventing, Understanding and Recovering from Nuclear Accidents lessons learned from Chernobyl and Fukushima

    Science.gov (United States)

    2016-09-01

    every aspect of life. BIOGRAPHY Yooichi Tao was born in 1941 in Yokohama City . He earned a master’s degree in physics (high energy accelerator...speaks and reads Spanish, Italian , French, and some German. Unclassified “Preventing, Understanding and Recovering from Nuclear Accidents” – lessons...industry to enable this program. ● Solar Cities Business Model: Massachusetts and others allow homeowners to lease their roof space to private companies

  8. Human Security Analysis as a Framework for Value-Oriented Governance – the example of climate change.

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2014-01-01

    markdownabstract__Abstract__ ‘Good governance’ may be viewed as governance which effectively promotes human rights, human security and human development. The paper discusses human security analysis, which in certain ways offers an integration of these ‘human’ perspectives and also a ‘social’ orient

  9. Human Security Analysis as a Framework for Value-Oriented Governance – the example of climate change.

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2014-01-01

    markdownabstract__Abstract__ ‘Good governance’ may be viewed as governance which effectively promotes human rights, human security and human development. The paper discusses human security analysis, which in certain ways offers an integration of these ‘human’ perspectives and also a ‘social’

  10. Sixth Warren K. Sinclair keynote address: The role of a strong regulator in safe and secure nuclear energy.

    Science.gov (United States)

    Lyons, Peter B

    2011-01-01

    The history of nuclear regulation is briefly reviewed to underscore the early recognition that independence of the regulator was essential in achieving and maintaining public credibility. The current licensing process is reviewed along with the status of applications. Challenges faced by both the NRC and the industry are reviewed, such as new construction techniques involving modular construction, digital controls replacing analog circuitry, globalization of the entire supply chain, and increased security requirements. The vital area of safety culture is discussed in some detail, and its importance is emphasized. Copyright © 2010 Health Physics Society

  11. Analysis of trace neptunium in the vicinity of underground nuclear tests at the Nevada National Security Site.

    Science.gov (United States)

    Zhao, P; Tinnacher, R M; Zavarin, M; Kersting, A B

    2014-11-01

    A high sensitivity analytical method for (237)Np analysis was developed and applied to groundwater samples from the Nevada National Security Site (NNSS) using short-lived (239)Np as a yield tracer and HR magnetic sector ICP-MS. The (237)Np concentrations in the vicinity of the Almendro, Cambric, Dalhart, Cheshire, and Chancellor underground nuclear test locations range from tritium and other non-sorbing radionuclides ((14)C, (36)Cl, (99)Tc and (129)I) as expected. Surprisingly, (237)Np and plutonium ((239,240)Pu) retardation factors are very similar. It is possible that Np(IV) exists under mildly reducing groundwater conditions and exhibits a retardation behavior that is comparable to Pu(IV). Independent of the underlying process, (237)Np is migrating downgradient from NNSS underground nuclear tests at very low but measureable concentrations.

  12. Nuclear Energy Experiments to the Center for Global Security and Cooperation.

    Energy Technology Data Exchange (ETDEWEB)

    Osborn, Douglas M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-06-01

    This is to serve as verification that the Center 6200 experimental pieces supplied to the Technology Training and Demonstration Area within the Center of Global Security and Cooperation are indeed unclassified unlimited released for viewing.

  13. The Thai-Canadian nuclear human resources development linkage project

    Energy Technology Data Exchange (ETDEWEB)

    Sumitra, Tatchai; Chankow, Nares [Chulalongkorn university (Thailand); Bradley, K.; Bereznai, G. [Atomic Energy of Canada Limited (Canada)

    1998-07-01

    The Thai-Canadian Nuclear Human Resources Development Linkage Project (the ''Project'') was initiated in 1994 in order to develop the engineering and scientific expertise needed for Thailand to decide whether and how the country can best benefit from the establishment of a nuclear power program. The Project was designed to upgrade current academics and people in industry, and to develop an adequate supply of new technical personnel for academic, industry, utility, regulatory and other government institutions. The key Project objectives included the establishment of a Chair in Nuclear Engineering at Chulalongkorn University, the upgrading of the current Masters level curriculum, the establishment of undergraduate and doctorate level curricula, development and delivery of an industrial training program for people in industry and government, exchanges of Thai and Canadian academics and industry experts to establish common research programs and teaching interests, and a public education program that was to test in Thailand some of the techniques that have been successfully used in Canada. (author)

  14. In situ structural analysis of the human nuclear pore complex.

    Science.gov (United States)

    von Appen, Alexander; Kosinski, Jan; Sparks, Lenore; Ori, Alessandro; DiGuilio, Amanda L; Vollmer, Benjamin; Mackmull, Marie-Therese; Banterle, Niccolo; Parca, Luca; Kastritis, Panagiotis; Buczak, Katarzyna; Mosalaganti, Shyamal; Hagen, Wim; Andres-Pons, Amparo; Lemke, Edward A; Bork, Peer; Antonin, Wolfram; Glavy, Joseph S; Bui, Khanh Huy; Beck, Martin

    2015-10-01

    Nuclear pore complexes are fundamental components of all eukaryotic cells that mediate nucleocytoplasmic exchange. Determining their 110-megadalton structure imposes a formidable challenge and requires in situ structural biology approaches. Of approximately 30 nucleoporins (Nups), 15 are structured and form the Y and inner-ring complexes. These two major scaffolding modules assemble in multiple copies into an eight-fold rotationally symmetric structure that fuses the inner and outer nuclear membranes to form a central channel of ~60 nm in diameter. The scaffold is decorated with transport-channel Nups that often contain phenylalanine-repeat sequences and mediate the interaction with cargo complexes. Although the architectural arrangement of parts of the Y complex has been elucidated, it is unclear how exactly it oligomerizes in situ. Here we combine cryo-electron tomography with mass spectrometry, biochemical analysis, perturbation experiments and structural modelling to generate, to our knowledge, the most comprehensive architectural model of the human nuclear pore complex to date. Our data suggest previously unknown protein interfaces across Y complexes and to inner-ring complex members. We show that the transport-channel Nup358 (also known as Ranbp2) has a previously unanticipated role in Y-complex oligomerization. Our findings blur the established boundaries between scaffold and transport-channel Nups. We conclude that, similar to coated vesicles, several copies of the same structural building block--although compositionally identical--engage in different local sets of interactions and conformations.

  15. Computer science security research and human subjects: emerging considerations for research ethics boards.

    Science.gov (United States)

    Buchanan, Elizabeth; Aycock, John; Dexter, Scott; Dittrich, David; Hvizdak, Erin

    2011-06-01

    This paper explores the growing concerns with computer science research, and in particular, computer security research and its relationship with the committees that review human subjects research. It offers cases that review boards are likely to confront, and provides a context for appropriate consideration of such research, as issues of bots, clouds, and worms enter the discourse of human subjects review.

  16. "Securing our survival (SOS": non-state actors and the campaign for a nuclear weapons convention through the prism of securitisation theory

    Directory of Open Access Journals (Sweden)

    Renata H. Dalaqua

    2013-12-01

    Full Text Available This article analyses the security practices of the anti-nuclear movement in the post-Cold War period through the prism of securitisation theory. By exploring Buzan and Wæver's conceptual developments on macrosecuritisations, the practices involved in the struggle against the Bomb are interpreted as securitising moves, in which the anti-nuclear movement is the leading securitiser. In the capacity of securitising actors, nuclear abolition activists argue that nuclear disarmament, under a Nuclear Weapons Convention (NWC, would be the only way to protect humankind from the threat posed by the existence of nuclear weapons. The empirical analysis of these non-state actors and their campaign for a NWC shows that, despite uttering security, the anti-nuclear movement has so far failed to achieve the proposed security measure, that is, nuclear disarmament. Nonetheless, securitisation has been instrumental for these non-state actors as a way of raising an issue on the agenda of decision-makers and urging them to take action.

  17. Sustainable Health for All? The Tension Between Human Security and the Right to Health Care

    Directory of Open Access Journals (Sweden)

    Alexander K. Lautensach

    2015-01-01

    Full Text Available In the current global environmental crisis medical aid and disaster relief is given by the UN and its branches, by governments and by NGOs, who regard it as their duty to address large-scale humanitarian catastrophes. The duty to give medical aid rests on traditional interpretations of health security and on the bioethical imperatives to relieve suffering and to save lives. However, those principles are not easily reconciled in the current situation of global environmental change and the threats it poses to human security. The global demand for health care has already outpaced resources in many regions, and those resources are likely to decline further. An ethic based on more comprehensive concepts of human security can lessen the contra­dictions between ethical priorities because it takes into account environmental security. How­ever, that approach leads to clashes with common interpretations of human rights, including the so-called right to health care. The argument presented in this paper states that, under the imperative of ensuring the survival for humanity in acceptable and sustainable ways, the latest generation of human rights pertaining to health care and environmental quality have become ungrantable. While this does not render them negligible, it does necessitate a new approach to global development aid and health security, with severe consequences for individual autonomy.

  18. Neuron enriched nuclear proteome isolated from human brain.

    Science.gov (United States)

    Dammer, Eric B; Duong, Duc M; Diner, Ian; Gearing, Marla; Feng, Yue; Lah, James J; Levey, Allan I; Seyfried, Nicholas T

    2013-07-05

    The brain consists of diverse cell types including neurons, astrocytes, oligodendrocytes, and microglia. The isolation of nuclei from these distinct cell populations provides an opportunity to identify cell-type-specific nuclear proteins, histone modifications, and regulation networks that are altered with normal brain aging or neurodegenerative disease. In this study, we used a method by which intact neuronal and non-neuronal nuclei were purified from human post-mortem brain employing a modification of fluorescence activated cell sorting (FACS) termed fluorescence activated nuclei sorting (FANS). An antibody against NeuN, a neuron specific splicing factor, was used to isolate neuronal nuclei. Utilizing mass spectrometry (MS) based label-free quantitative proteomics, we identified 1755 proteins from sorted NeuN-positive and negative nuclear extracts. Approximately 20% of these proteins were significantly enriched or depleted in neuronal versus non-neuronal populations. Immunoblots of primary cultured rat neuron, astrocyte, and oligodendrocyte extracts confirmed that distinct members of the major nucleocytoplasmic structural linkage complex (LINC), nesprin-1 and nesprin-3, were differentially enriched in neurons and astrocytes, respectively. These comparative proteomic data sets also reveal a number of transcription and splicing factors that are selectively enriched in a cell-type-specific manner in human brain.

  19. Legislative dispositions relative to the clearness and security in nuclear matter; Dispositions legislatives relatives a la transparence et a la securite en matiere nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-11-01

    This file treats the legislative dispositions devoted to the clearness and security in the nuclear field. It is divided in four great parts. The first part is devoted to the general dispositions, the second part concerns public information, the third part is relative to the local information commissions, a special point is noticed for the creation of a high comity of clearness in nuclear safety, a fourth part is devoted to the nuclear facilities and the transport of nuclear materials, control and monitoring are included, legal dispositions and sanctions are tackled. (N.C.)

  20. The Global Nuclear Smuggling Situation and its Governance

    Institute of Scientific and Technical Information of China (English)

    Gao; Wanglai

    2015-01-01

    Since human kind enters the nuclear age,nuclear smuggling is an important way of nuclear proliferation.With proliferation of sensitive nuclear materials and nuclear technology,nuclear terrorism has become a real threat to global security,and is included in the global nuclear security agenda.To combat nuclear smuggling has become the front-line defense to prevent nuclear terrorism.In twenty-first Century,nuclear smuggling is featured by the development situation that the global architecture is decentralized,fissile material proportion immobilized,crime team organized,and criminal activities professionalized.The international community should strengthen multi-level cooperation in various fields completely plug the terrorist channels for obtaining nuclear capability at the roots-level,and eliminate the potential security risks of nuclear proliferation.

  1. Human Rights and Internal Security in Malaysia: Rhetoric and Reality

    Science.gov (United States)

    2006-03-01

    Rights, have become instruments for interpreting human rights as described in the UN Charter. 1 Mahatma ... Gandhi quoted in Aliran Homepage. Database on-line. Available at http://www.aliran.com; accessed 21 May 2005. 2 Lt Col Rosli bin Mohd Yusof, “Human

  2. Stakeholder Transportation Scorecard: Reviewing Nevada's Recommendations for Enhancing the Safety and Security of Nuclear Waste Shipments - 13518

    Energy Technology Data Exchange (ETDEWEB)

    Dilger, Fred C. [Black Mountain Research, Henderson, NV 81012 (United States); Ballard, James D. [Department of Sociology, California State University, Northridge, CA 91330 (United States); Halstead, Robert J. [State of Nevada Agency for Nuclear Projects, Carson City, NV 80906 (United States)

    2013-07-01

    As a primary stakeholder in the Yucca Mountain program, the state of Nevada has spent three decades examining and considering national policy regarding spent nuclear fuel and high-level radioactive waste transportation. During this time, Nevada has identified 10 issues it believes are critical to ensuring the safety and security of any spent nuclear fuel transportation program, and achieving public acceptance. These recommendations are: 1) Ship the oldest fuel first; 2) Ship mostly by rail; 3) Use dual-purpose (transportable storage) casks; 4) Use dedicated trains for rail shipments; 5) Implement a full-scale cask testing program; 6) Utilize a National Environmental Policy Act (NEPA) process for the selection of a new rail spur to the proposed repository site; 7) Implement the Western Interstate Energy Board (WIEB) 'straw man' process for route selection; 8) Implement Section 180C assistance to affected States, Tribes and localities through rulemaking; 9) Adopt safety and security regulatory enhancements proposed states; and 10) Address stakeholder concerns about terrorism and sabotage. This paper describes Nevada's proposals in detail and examines their current status. The paper describes the various forums and methods by which Nevada has presented its arguments and sought to influence national policy. As of 2012, most of Nevada's recommendations have been adopted in one form or another, although not yet implemented. If implemented in a future nuclear waste program, the State of Nevada believes these recommendations would form the basis for a successful national transportation plan for shipments to a geologic repository and/or centralized interim storage facility. (authors)

  3. The Concept and Use of Human Security: A Critical Analysis of its Potentialities and Risks

    Directory of Open Access Journals (Sweden)

    Karlos Pérez de Armiño

    2007-02-01

    Full Text Available Bearing in mind the existence of different approaches to human security (the broad one and the restricted one, this article analyses the scope of this new paradigm based on a study of its contributions and potentialities, as well as the risks entailed in applying it. Among the positive contributions, it must be highlighted that: it focuses on the person as the subject of security, and not on the State; it is linked to human development and human rights; and it underscores the need for public policies and so-called ‘humanitarianinterventions’. On the other hand, the risks have grown following 9/11, with the paradigm being used more in its security dimension and less in its development-related aspect.

  4. Chair Report Consultancy Meeting on Nuclear Security Assessment Methodologies (NUSAM) Transport Case Study Working Group

    Energy Technology Data Exchange (ETDEWEB)

    Shull, Doug [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-08-19

    The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.

  5. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source.

    Energy Technology Data Exchange (ETDEWEB)

    Tsvetkov, Pavel Valeryevich (Texas A& M University, College Station, TX); Rodriguez, Salvador B.; Ames, David E., II (Texas A& M University, College Station, TX); Rochau, Gary Eugene

    2009-09-01

    The impact associated with energy generation and utilization is immeasurable due to the immense, widespread, and myriad effects it has on the world and its inhabitants. The polar extremes are demonstrated on the one hand, by the high quality of life enjoyed by individuals with access to abundant reliable energy sources, and on the other hand by the global-scale environmental degradation attributed to the affects of energy production and use. Thus, nations strive to increase their energy generation, but are faced with the challenge of doing so with a minimal impact on the environment and in a manner that is self-reliant. Consequently, a revival of interest in nuclear energy has followed, with much focus placed on technologies for transmuting nuclear spent fuel. The performed research investigates nuclear energy systems that optimize the destruction of nuclear waste. In the context of this effort, nuclear energy system is defined as a configuration of nuclear reactors and corresponding fuel cycle components. The proposed system has unique characteristics that set it apart from other systems. Most notably the dedicated High-Energy External Source Transmuter (HEST), which is envisioned as an advanced incinerator used in combination with thermal reactors. The system is configured for examining environmentally benign fuel cycle options by focusing on minimization or elimination of high level waste inventories. Detailed high-fidelity exact-geometry models were developed for representative reactor configurations. They were used in preliminary calculations with Monte Carlo N-Particle eXtented (MCNPX) and Standardized Computer Analysis for Licensing Evaluation (SCALE) code systems. The reactor models have been benchmarked against existing experimental data and design data. Simulink{reg_sign}, an extension of MATLAB{reg_sign}, is envisioned as the interface environment for constructing the nuclear energy system model by linking the individual reactor and fuel component sub

  6. Countries at Risk: Heightened Human Security Risk to States With Transboundary Water Resources and Instability

    Science.gov (United States)

    Veilleux, J. C.; Sullivan, G. S.; Paola, C.; Starget, A.; Watson, J. E.; Hwang, Y. J.; Picucci, J. A.; Choi, C. S.

    2014-12-01

    The Countries at Risk project is a global assessment of countries with transboundary water resources that are at risk for conflict because of high human security instability. Building upon Basins at Risk (BAR) research, our team used updated Transboundary Freshwater Dispute Database georeferenced social and environmental data, quantitative data from global indices, and qualitative data from news media sources. Our assessment considered a combination of analyzing 15 global indices related to water or human security to identify which countries scored as highest risk in each index. From this information, we were able to assess the highest risk countries' human security risk by using a new human security measurement tool, as well as comparing this analysis to the World Bank's Fragile States Index and the experimental Human Security Index. In addition, we identified which countries have the highest number of shared basins, the highest percentage of territory covered by a transboundary basin, and the highest dependency of withdrawal from transboundary waters from outside their country boundaries. By synthesizing these social and environmental data assessments, we identified five countries to analyze as case studies. These five countries are Afghanistan, China, Iraq, Moldova, and Sudan. We created a series of 30 maps to spatial analyze the relationship between the transboundary basins and social and environmental parameters to include population, institutional capacity, and physical geography by country. Finally, we synthesized our spatial analysis, Human Security Key scores, and current events scored by using the BAR scale to determine what aspects and which basins are most at risk with each country in our case studies and how this concerns future global water resources.

  7. The Comprehensive Nuclear-Test-Ban Treaty and Its Relevance for the Global Security

    Directory of Open Access Journals (Sweden)

    Dáša ADAŠKOVÁ

    2013-06-01

    Full Text Available The Comprehensive Nuclear-Test-Ban Treaty (CTBT is one of important international nuclear non-proliferation and disarmament measures. One of its pillars is the verification mechanism that has been built as an international system of nuclear testing detection to enable the control of observance of the obligations anchored in the CTBT. Despite the great relevance to the global non-proliferation and disarmament efforts, the CTBT is still not in force. The main aim of the article is to summarize the importance of the CTBT and its entry into force not only from the international relations perspective but also from the perspective of the technical implementation of the monitoring system.

  8. Oak Ridge National Laboratory Office of International Nuclear Safeguards: Human Capital Development Activity in FY16

    Energy Technology Data Exchange (ETDEWEB)

    Gilligan, Kimberly V. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Nuclear Security and Isotope Technology Division; Gaudet, Rachel N. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Nuclear Security and Isotope Technology Division

    2016-09-30

    In 2007, the U.S. Department of Energy National Nuclear Security Administration (DOE NNSA) Office of Nonproliferation and Arms Control (NPAC) completed a comprehensive review of the current and potential future challenges facing the international safeguards system. One of the report’s key recommendations was for DOE NNSA to launch a major new program to revitalize the international safeguards technology and human resource base. In 2007, at the International Atomic Energy Agency (IAEA) General Conference, then Secretary of Energy Samuel W. Bodman announced the newly created Next Generation Safeguards Initiative (NGSI). NGSI consists of five program elements: policy development and outreach, concepts and approaches, technology and analytical methodologies, human capital development (HCD), and infrastructure development. This report addresses the HCD component of NGSI. The goal of the HCD component as defined in the NNSA Program Plan is “to revitalize and expand the international safeguards human capital base by attracting and training a new generation of talent.” The major objectives listed in the HCD goal include education and training, outreach to universities and professional societies, postdoctoral appointments, and summer internships at national laboratories.

  9. Factoring tradotronic media communication for human security management and social stability in Nigerian communities

    Directory of Open Access Journals (Sweden)

    Ani Kelechi Johnmary

    2014-04-01

    Full Text Available The level of killing and bloodletting in Nigeria is increasing every second, minute, hour, day, month and year. Man, animals, properties etc are increasingly under threat in contemporary Nigerian society. The causes of the massive insecurity of lives and properties remain multi-dimensional. This paper is centered on the need to factor tradotronic media for human security management in Nigeria. It reveals that the dimensions of human insecurity in Nigeria, include but not limited to assassination-based human insecurity, robbery/kidnapping related human insecurity, political-related human insecurity, ethnic-based human insecurity, inter-communal conflict-related human insecurity, religious-motivated human insecurity and multi-dimensional conflict related human insecurity. The paper calles on all lovers of life and human dignity to rise up and defend the survival and existence of every breathing soul around him or her in this sovereign entity, called Nigeria.

  10. Audited credential delegation: a usable security solution for the virtual physiological human toolkit.

    Science.gov (United States)

    Haidar, Ali N; Zasada, Stefan J; Coveney, Peter V; Abdallah, Ali E; Beckles, Bruce; Jones, Mike A S

    2011-06-06

    We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username-password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale.

  11. Facing global environmental change. Environmental, human, energy, food, health and water security concepts

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); AFES-Press, Mosbach (Germany); Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Cuernavaca, MOR (MX). Centro Regional de Investigaciones Multidiscipinarias (CRIM); United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); Grin, John [Amsterdam Univ. (Netherlands). Amsterdam School for Social Science Research; Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Kameri-Mbote, Patricia [Nairobi Univ. (Kenya). School of Law; International Environmental Law Research Centre, Nairobi (Kenya); Behera, Navnita Chadha [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Tunis-Carthage Univ., Hammam-Chatt (Tunisia); Krummenacher, Heinz (eds.) [swisspeace, Bern (Switzerland). FAST International

    2009-07-01

    This policy-focused, global and multidisciplinary security handbook on Facing Global Environmental Change addresses new security threats of the 21st century posed by climate change, desertification, water stress, population growth and urbanization. These security dangers and concerns lead to migration, crises and conflicts. They are on the agenda of the UN, OECD, OSCE, NATO and EU. In 100 chapters, 132 authors from 49 countries analyze the global debate on environmental, human and gender, energy, food, livelihood, health and water security concepts and policy problems. In 10 parts they discuss the context and the securitization of global environmental change and of extreme natural and societal outcomes. They suggest a new research programme to move from knowledge to action, from reactive to proactive policies and to explore the opportunities of environ-mental cooperation for a new peace policy. (orig.)

  12. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  13. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  14. Improving human reliability through better nuclear power plant system design: Program for advanced nuclear power studies. Progress report

    Energy Technology Data Exchange (ETDEWEB)

    Golay, M.W.

    1993-10-10

    The project on ``Development of a Theory of the Dependence of Human Reliability upon System Designs as a Means of Improving Nuclear Power Plant Performance`` was been undertaken in order to address the problem of human error in advanced nuclear power plant designs. Lack of a mature theory has retarded progress in reducing likely frequencies of human errors. Work being pursued in this project is to perform a set of experiments involving human subjects who are required to operate, diagnose and respond to changes in computer-simulated systems, relevant to those encountered in nuclear power plants, which are made to differ in complexity in a systematic manner. The computer program used to present the problems to be solved also records the response of the operator as it unfolds.

  15. Safety and security aspects in design of digital safety I and C in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ding, Yongjian [University of Applied Sciences Magdeburg-Stendal, Magdeburg (Germany). Inst. of Electrical Engineering; Waedt, Karl [Areva GmbH, Erlangen (Germany). PEAS-G

    2016-05-15

    The paper describes a safety objective oriented systematic design approach of digital (computerized) safety I and C in modern nuclear power plants which considers the plant safety requirements as well as cybersecurity needs. The defence in depth philosophy is applied by using different defence lines in the I and C architecture and protection zones in the plant IT environment.

  16. SCINTILLA A European project for the development of scintillation detectors and new technologies for nuclear security

    CERN Document Server

    Alemberti, A; Botta, E; De Vita, R; Fanchini, E; Firpo, G

    2014-01-01

    Europe monitors transits using radiation detectors to prevent illicit trafficking of nuclear materials. The SCINTILLA project aims to develop a toolbox of innovative technologies designed to address different usage cases. This article will review the scope, approach, results of the first benchmark campaign and future plans of the SCINTILLA project.

  17. Securitization, alterity, and the state Human (in)security on an Amazonian frontier.

    Science.gov (United States)

    Brightman, Marc; Grotti, Vanessa

    2014-12-01

    Focusing on the region surrounding the Maroni River, which forms the border between Suriname and French Guiana, we examine how relations between different state and non-state social groups are articulated in terms of security. The region is characterised by multiple "borders" and frontiers of various kinds, the state boundary having the features of an interface or contact zone. Several key collectivities meet in this border zone: native Amazonians, tribal Maroon peoples, migrant Brazilian gold prospectors, and metropolitan French state functionaries. We explore the relationships between these different sets of actors and describe how their mutual encounters center on discourses of human and state security, thus challenging the commonly held view of the region as a stateless zone and showing that the "human security" of citizens from the perspective of the state may compete with locally salient ideas or experiences of well-being.

  18. The Potential of Human Rights Education for Conflict Prevention and Security

    Science.gov (United States)

    Davies, Lynn

    2010-01-01

    This paper examines the contribution of human rights education (HRE) to conflict prevention and to the promotion of security. It outlines the difficulties in evaluating the long-term impact of HRE, but then proposes five benefits of a rights-based approach to education--rights as secular, man-made, requiring transparency, enabling freedom from…

  19. Initial results from a multiple monoenergetic gamma radiography system for nuclear security

    Science.gov (United States)

    O'Day, Buckley E.; Hartwig, Zachary S.; Lanza, Richard C.; Danagoulian, Areg

    2016-10-01

    The detection of assembled nuclear devices and concealed special nuclear materials (SNM) such as plutonium or uranium in commercial cargo traffic is a major challenge in mitigating the threat of nuclear terrorism. Currently available radiographic and active interrogation systems use ∼1-10 MeV bremsstrahlung photon beams. Although simple to build and operate, bremsstrahlung-based systems deliver high radiation doses to the cargo and to potential stowaways. To eliminate problematic issues of high dose, we are developing a novel technique known as multiple monoenergetic gamma radiography (MMGR). MMGR uses ion-induced nuclear reactions to produce two monoenergetic gammas for dual-energy radiography. This allows us to image the areal density and effective atomic number (Zeff) of scanned cargo. We present initial results from the proof-of-concept experiment, which was conducted at the MIT Bates Research and Engineering Center. The purpose of the experiment was to assess the capabilities of MMGR to measure areal density and Zeff of container cargo mockups. The experiment used a 3.0 MeV radiofrequency quadrupole accelerator to create sources of 4.44 MeV and 15.11 MeV gammas from the 11B(d,nγ)12C reaction in a thick natural boron target; the gammas are detected by an array of NaI(Tl) detectors after transmission through cargo mockups . The measured fluxes of transmitted 4.44 MeV and 15.11 MeV gammas were used to assess the areal density and Zeff. Initial results show that MMGR is capable of discriminating the presence of high-Z materials concealed in up to 30 cm of iron shielding from low- and mid-Z materials present in the cargo mockup.

  20. Dialogue on Climate, Water, Energy and Human Security in Africa

    Science.gov (United States)

    2014-07-01

    and  modern  biomass  energy  (ethanol,  biodiesel  and  biogas ).  Traditional biomass energy  support  livelihoods  for  the populations  in  rural...vii Coe, Michael; Foley, Jonathan (2001): Human and natural impacts on the water resources of the Lake Chad  basin. In:  Journal  of Geophysical

  1. Securing a cyber physical system in nuclear power plants using least square approximation and computational geometric approach

    Energy Technology Data Exchange (ETDEWEB)

    Gawand, Hemangi Laxman [Homi Bhabha National Institute, Computer Section, BARC, Mumbai (India); Bhattacharjee, A. K. [Reactor Control Division, BARC, Mumbai (India); Roy, Kallol [BHAVINI, Kalpakkam (India)

    2017-04-15

    In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.

  2. Inter-organisational knowledge transfer: building and sustaining the sources of innovation in nuclear safety and security

    Energy Technology Data Exchange (ETDEWEB)

    Staude, Fabio, E-mail: fstaude@cnen.gov.br [Comissao Nacional de Energia Nuclear (CNEN-RJ), Rio de Janeiro, RJ (Brazil); Ramirez, Matias, E-mail: matias.ramirez@sussex.ac.uk [University of Sussex (SPRU/US), Brighton (United Kingdom). Science and Technology Policy Research

    2013-07-01

    The current complexity of innovation processes has led to an understanding that the models of innovation have changed from linear model to a model characterised by multiple interactions and complex networks. Within this more multifaceted environment, has emerged a new set of actors, generally termed as intermediaries, performing a variety of tasks in the innovation process. The innovation literature has recognised various important supporting activities performed by intermediaries, by linking and facilitating the movement of information and knowledge between actors within an innovation system, in order to fill information gaps. Complementary, we make the assumption that the intermediary can assume a more central role in the innovation process, performing activities beyond to filling information gaps, since they intervene to create, prioritise, and articulate meaning to practices. Under this argument, this paper explores how intermediaries work in making innovation happen in the Brazilian nuclear safety and security area, demonstrating the influence of intermediary organisations in improving nuclear regulatory activities. We make sense of these processes by analyzing intermediary roles in the recent regulatory activities improvements, specifically those related to the practices involving radiation sources in medicine. Thus, through an empirical case study, this paper examines the issue of intermediation in a wide sense, including strategic activities preformed by intermediaries, associated with accessing, diffusing, coordinating and enabling knowledge activities. (author)

  3. Study on CDA Identification and Lesson Learned from the Result for the Cyber Security Regulation for Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Si Won [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-10-15

    It is the United States that shows the most enthusiastic preparation for the protection of NPPs from cyber threats. The United States has been trying to improve cybersecurity of NPPs since the 911 terror in 2001. In this process, the Nuclear Regulatory Commission (NRC) of the U.S. demanded the protection of the digital systems in NPPs to the licensee through 10 CFR 73.54. Moreover, RG 5.71 defined the assets, which should be protected from cyber threats, as Critical Digital Asset (CDA). Nuclear Energy Institute (NEI) provided the CDA identification guide through NEI 10-04. Meanwhile, International Electrotechnical Commission (IEC) presented the security program requirements of I and C computer in NPP, as well as category about systems and functions through IEC 61226 which is under revision. In Korea, Korea Institute of Nuclear Nonproliferation and Control (KINAC) established KINAC/RS-019, which is based upon NEI 10-04 and adapted to Korean circumstances. As time goes by, the digital systems in NPPs increase and the possibilities of cyber threats becomes greater. To protect these systems from cyber attacks, it is important to identify CDA, which is the target to be protect. For that, the standards to identify CDA were established, and according to the standards, the licensees could perform identification works and draw many CDAs. During the inspection processes for this, KINAC could find several problems and has been tried to look for the solutions. It is desired that such solutions will be actively used when identifying CDAs in NPPs, and also they should be applied to the systems which are added or changed during the whole facility life cycle.

  4. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    Directory of Open Access Journals (Sweden)

    Young-Sik Jeong

    2014-01-01

    Full Text Available Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT, which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.

  5. Preparation of human resources for future nuclear energy using FBNR as the instrument of learning

    Energy Technology Data Exchange (ETDEWEB)

    Sefidvash, Farhang; Espinoza, Patricio; Guerrero, Victor Hugo [Escuela Politecnica Nacional (EPN), Quito (Ecuador); and others

    2015-11-15

    An increasing number of developing countries are showing interest to become the emerging countries to nuclear energy. Most of these countries lack human resources and adequate infrastructures to enter such a venture. The principle objective of activities of FBNR Group is to train human resources for the countries that at the present lack the necessary conditions, but aim at the future clean and safe nuclear energy through the fourth generation and INPRO compatible nuclear reactors. The preparation for the future nuclear energy is done through development of innovative nuclear reactor that meets the INPRO philosophies and criteria. These countries may or may not have decided as yet to utilize nuclear energy, but are interested to gain a strong educational foundation for their future. The research and development of a small innovative nuclear reactor FBNR is used as the instrument for learning. The young scientists will learn how to be innovative with the vision of INPRO philosophy and criteria.

  6. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source.

    Energy Technology Data Exchange (ETDEWEB)

    Tsvetkov, Pavel Valeryevich (Texas A& M University, College Station, TX); Rodriguez, Salvador B.; Ames, David E., II (Texas A& M University, College Station, TX); Rochau, Gary Eugene

    2010-10-01

    A new high-fidelity integrated system method and analysis approach was developed and implemented for consistent and comprehensive evaluations of advanced fuel cycles leading to minimized Transuranic (TRU) inventories. The method has been implemented in a developed code system integrating capabilities of Monte Carlo N - Particle Extended (MCNPX) for high-fidelity fuel cycle component simulations. In this report, a Nuclear Energy System (NES) configuration was developed to take advantage of used fuel recycling and transmutation capabilities in waste management scenarios leading to minimized TRU waste inventories, long-term activities, and radiotoxicities. The reactor systems and fuel cycle components that make up the NES were selected for their ability to perform in tandem to produce clean, safe, and dependable energy in an environmentally conscious manner. The diversity in performance and spectral characteristics were used to enhance TRU waste elimination while efficiently utilizing uranium resources and providing an abundant energy source. A computational modeling approach was developed for integrating the individual models of the NES. A general approach was utilized allowing for the Integrated System Model (ISM) to be modified in order to provide simulation for other systems with similar attributes. By utilizing this approach, the ISM is capable of performing system evaluations under many different design parameter options. Additionally, the predictive capabilities of the ISM and its computational time efficiency allow for system sensitivity/uncertainty analysis and the implementation of optimization techniques.

  7. The Urban Crisis in Sub-Saharan Africa: A Threat to Human Security and Sustainable Development

    Directory of Open Access Journals (Sweden)

    Mediel Hove

    2013-03-01

    Full Text Available Urban centres have existed and have been evolving for many centuries across the world. However, the accelerated growth of urbanisation is a relatively recent phenomenon. The enormous size of urban populations and more significantly, the rapidity with which urban areas have been and are growing in many developing countries have severe social, economic and physical repercussions. This paper argues that the accelerated growth of urbanisation has amplified the demand for key services. However, the provision of shelter and basic services such as water and sanitation, education, public health, employment and transport has not kept pace with this increasing demand. Furthermore, accelerated and poorly managed urbanisation has resulted in various types of atmospheric, land and water pollution thereby jeopardising human security. This paper offers the conclusion that the increased environmental, social and economic problems associated with rapid urbanisation pose a threat to sustainable development, human security and, crucially, peace.

  8. Human trafficking in Southeast Asia and U.S. national security

    OpenAIRE

    Snoke, Joshua H.

    2015-01-01

    Approved for public release; distribution is unlimited The United States government finds human trafficking to be an important subject and is placing increasing focus on the issue. The Southeast Asian portion of the Western Pacific encompasses a substantial portion of global trafficking, much of which has a final destination in the United States. This thesis asks the following question: How does trafficking in persons (TIP) affect U.S. national security interests and regional stability in ...

  9. Historic images in nuclear medicine: 1976: the first issue of clinical nuclear medicine and the first human FDG study.

    Science.gov (United States)

    Hess, Søren; Høilund-Carlsen, Poul Flemming; Alavi, Abass

    2014-08-01

    In 1976, 2 major molecular imaging events coincidentally took place: Clinical Nuclear Medicine was first published in June, and in August researchers at the Hospital of the University of Pennsylvania created the first images in humans with F-FDG. FDG was initially developed as part of an evolution set in motion by fundamental research studies with positron-emitting tracers in the 1950s by Michel Ter-Pegossian and coworkers at the Washington University. Today, Clinical Nuclear Medicine is a valued scientific contributor to the molecular imaging community, and FDG PET is considered the backbone of this evolving and exciting discipline.

  10. The Praxis of Social Enterprise and Human Security: An Applied Research Agenda

    Directory of Open Access Journals (Sweden)

    Malcolm David Brown

    2014-01-01

    Full Text Available The growth of social enterprise within development NGO work might lead one to suspect it has been irredeemably corrupted by neo-liberal capitalism. However, using the tools of capitalism is not the same as subscribing to the values of capitalism. This paper is situated at the intersection of five fields: human security, international development, social enterprise, social franchising, and left-wing anti-capitalist thought. It examines the relevance of social en­terprise to human security and to development, the relationship between social enterprise and the anti-capitalist values of the left, and it then focuses on social franchising—a subset of social enterprise that highlights the importance of cooperation—suggesting that it may be a useful methodology for NGOs carrying out educational work in parts of the developing world. It syn­thesises and extends ideas that I have presented elsewhere [1-3], it draws on ethnographic fieldwork on the Thai-Burma border, and it puts forward an agenda for further applied research that is rooted in a sociological analysis of civil society and contributes to the human security paradigm.

  11. Spermatozoa-li ke cell invaders, nuclear vlimata, in human neoplasia

    OpenAIRE

    1993-01-01

    Spermatozoa-like cells (nuclear vlimata) have been identified in malignant cell cultures and embryonic cells, also common in the cytology and histology of all types of human neoplasia even after chemotherapy. A new mechanism of invasion of malignant cells has been described, according to which neoplastic cells behave and function as parasites using host-cells to divide, survive and eventually produce nuclear vlimata (bullets). Nuclear vlimata are the end ce...

  12. Taking the "waste" out of "wastewater" for human water security and ecosystem sustainability.

    Science.gov (United States)

    Grant, Stanley B; Saphores, Jean-Daniel; Feldman, David L; Hamilton, Andrew J; Fletcher, Tim D; Cook, Perran L M; Stewardson, Michael; Sanders, Brett F; Levin, Lisa A; Ambrose, Richard F; Deletic, Ana; Brown, Rebekah; Jiang, Sunny C; Rosso, Diego; Cooper, William J; Marusic, Ivan

    2012-08-10

    Humans create vast quantities of wastewater through inefficiencies and poor management of water systems. The wasting of water poses sustainability challenges, depletes energy reserves, and undermines human water security and ecosystem health. Here we review emerging approaches for reusing wastewater and minimizing its generation. These complementary options make the most of scarce freshwater resources, serve the varying water needs of both developed and developing countries, and confer a variety of environmental benefits. Their widespread adoption will require changing how freshwater is sourced, used, managed, and priced.

  13. Time pattern locking scheme for secure multimedia contents in human-centric device.

    Science.gov (United States)

    Kim, Hyun-Woo; Kim, Jun-Ho; Park, Jong Hyuk; Jeong, Young-Sik

    2014-01-01

    Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.

  14. Design and evaluation of multimedia security warnings for the interaction between humans and industrial robots

    Science.gov (United States)

    Fruth, Jana; Kraetzer, Christian; Dittmann, Jana

    2011-01-01

    In this document a multi-media security warning design approach for automated production scenarios with industrial robots is introduced. This first approach is based on and adapts design principles of common security programs and a German VDI standard for safety warnings design. We focus on direct human-to-robot interaction scenarios, e.g. the online-programming of industrial robots, because of their potential indirect safety impacts, which could be caused by malicious codes infection of a robots control computer. We designed ten different multi-media security warnings, composed of visual and acoustical information. Visual information of warnings is transported via a traffic light metaphor (symbolizing three different threat levels), different warn icons (symbolizing properties of malicious codes) and instructions icons to programmers or operators and additional textual information. With an acknowledgment button in the middle of the warning, the programmer's confirmation of the reception of the warning is verified. Additionally, three different acoustical signals also indicate the threat level of the warning. Furthermore, an evaluation is presented, which uses concepts known from usability testing (method of loud thinking, questionnaire, time measurement). The aim is to evaluate general design criteria of our developed security warnings and tendency of user perception for further advancement of our warnings design.

  15. Mixed-Initiative Cyber Security: Putting humans in the right loop

    Energy Technology Data Exchange (ETDEWEB)

    Haack, Jereme N.; Fink, Glenn A.; Maiden, Wendy M.; McKinnon, Archibald D.; Fulp, Errin W.

    2009-05-11

    In recent years, organizations and their computer infrastructures have grown intertwined in complex relationships through mergers, acquisitions, reorganizations, and cooperative service delivery. Defensive actions and policy changes by one organization may have far-reaching negative consequences on its partner organizations. Human-only or machine-only approaches are insufficient. The former are slow but highly adaptable, while the latter are fast but highly specialized. In either case, humans retain the ultimate responsibility for the actions of their automated systems. Deploying automated defenses does not absolve humans of their inherent responsibility. We believe the solution lies in mixed-initiative defense unifying the complementary qualities of both human- and machine-based approaches. We describe the Cooperative Infrastructure Defense (CID), a new cyber-defense paradigm employing complex-adaptive swarm intelligence, logical rational agents, and human insight to enable collaborative cyber defense among cooperating organizations in an infrastructure setting. CID takes a mixed-initiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem, sharing insights and solutions without violating proprietary boundaries. CID will help create security policy via dialogue between humans and agents, foster a collaborative problem-solving environment, and increase human situational awareness and influence through visualization and shared control. CID will provide a foundation for building trust between humans and agents within and between organizations.

  16. Human factors design review guidelines for advanced nuclear control room technologies

    Energy Technology Data Exchange (ETDEWEB)

    O' Hara, J.; Brown, W. (Brookhaven National Lab., Upton, NY (United States)); Granda, T.; Baker, C. (Carlow Associates, Inc., Fairfax, VA (United States))

    1991-01-01

    Advanced control rooms (ACRs) for future nuclear power plants are being designed utilizing computer-based technologies. The US Nuclear Regulatory Commission reviews the human engineering aspects of such control rooms to ensure that they are designed to good human factors engineering principles and that operator performance and reliability are appropriately supported in order to protect public health and safety. This paper describes the rationale, general approach, and initial development of an NRC Advanced Control Room Design Review Guideline. 20 refs., 1 fig.

  17. Human factors design guidelines for maintainability of Department of Energy nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Bongarra, J.P. Jr.; VanCott, H.P.; Pain, R.F.; Peterson, L.R.; Wallace, R.I.

    1985-06-18

    Intent of these guidelines is to provide design and design review teams of DOE nuclear facilities with human factors principles to enhance the design and aid in the inspection of DOE nuclear facilities, systems, and equipment. These guidelines are concerned with design features of DOE nuclear facilities which can potentially affect preventive and corrective maintenance of systems within DOE nuclear facilities. Maintenance includes inspecting, checking, troubleshooting, adjusting, replacing, repairing, and servicing activities. Other factors which influence maintainability such as repair and maintenance suport facilities, maintenance information, and various aspects of the environment are also addressed.

  18. Neutron flux from a 14‐MeV neutron generator with tungsten filter for research in NDA methods for nuclear safeguards and security

    OpenAIRE

    2009-01-01

    The Joint Research Centre has taken into operation a new experimental device designed for research in the fields of nuclear safeguards and security applications. The research projects currently undertaken include detection of shielded contraband materials, detection of fissile materials, and mass determination of small fissile materials in shielded containers. The device, called the Pulsed Neutron Interrogation Test Assembly (PUNITA), incorporates a pulsed 14‐MeV (D‐T) neutron generator and a...

  19. Human resource development for nuclear generation - from the perspective of a utility company

    Science.gov (United States)

    Kahar, Wan Shakirah Wan Abdul; Mostafa, Nor Azlan; Salim, Mohd Faiz

    2017-01-01

    Malaysia is currently in the planning phase of its nuclear power program, with the first unit targeted to be operational in 2030. Training of nuclear power plant (NPP) staffs are usually long and rigorous due to the complexity and safety aspects of nuclear power. As the sole electricity utility in the country, it is therefore essential that Tenaga Nasional Berhad (TNB) prepares early in developing its human resource and nuclear expertise as a potential NPP owner-operator. A utility also has to be prudent in managing its work force efficiently and effectively, while ensuring that adequate preparations are being made to acquire the necessary nuclear knowledge with sufficient training lead time. There are several approaches to training that can be taken by a utility company with no experience in nuclear power. These include conducting feasibility studies and benchmarking exercises, preparing long term human resource development, increasing the exposure on nuclear power technology to both the top management and general staff, and employing the assistance of relevant agencies locally and abroad. This paper discusses the activities done and steps taken by TNB in its human resource development for Malaysia's nuclear power program.

  20. The relationship between human security, demand for arms and disarmament in the horn of Africa.

    Science.gov (United States)

    Gebrewold, Kiflemariam

    2002-01-01

    The drive to find security through possession of weapons is linked to the history and culture of a social group. Amongst pastoralists in the Horn of Africa there is a failure of security through state systems such as police and the recent replacement of less-lethal traditional weapons by small arms and other light weapons. A warrior or vendetta culture with these arms leads to violent inter-clan clashes with many casualties, although traditional methods of weapons control still seem operational within clans. Understanding the drive to seek weapons is essential in finding ways to control their use. Improving the capacities of the police must come hand in hand with human rights training and an end to corruption. Further work is required on how traditional methods of arms control can be co-operatively linked with state controls.

  1. The European Court of Human Rights: Implications for United States National Security

    Science.gov (United States)

    2014-02-04

    to the Geneva Convention) to climate change ( Kyoto Protocols ) to arms control (Comprehensive Nuclear Test-Ban Treaty), including those related to...instruments that it perceives will encroach on its sovereignty. There are a wide variety of such treaties, from human rights (Additional Protocols I & II...Rights.” 5 In 1998, with the adoption of Protocol No. 11, individuals were allowed to petition the court directly, but only after exhausting their

  2. Evaluation of Cavity Collapse and Surface Crater Formation at the Norbo Underground Nuclear Test in U8c, Nevada Nuclear Security Site, and the Impact on Stability of the Ground Surface

    Energy Technology Data Exchange (ETDEWEB)

    Pawloski, G A

    2012-06-18

    Lawrence Livermore National Laboratory (LLNL) Containment Program performed a review of nuclear test-related data for the Norbo underground nuclear test in U8c to assist in evaluating this legacy site as a test bed for application technologies for use in On-Site Inspections (OSI) under the Comprehensive Nuclear Test Ban Treaty. This request is similar to one made for the Salut site in U8c (Pawloski, 2012b). Review of the Norbo site is complicated because the test first exhibited subsurface collapse, which was not unusual, but it then collapsed to the surface over one year later, which was unusual. Of particular interest is the stability of the ground surface above the Norbo detonation point. Proposed methods for on-site verification include radiological signatures, artifacts from nuclear testing activities, and imaging to identify alteration to the subsurface hydrogeology due to the nuclear detonation. Aviva Sussman from the Los Alamos National Laboratory (LANL) has also proposed work at this site. Both proposals require physical access at or near the ground surface of specific underground nuclear test locations at the Nevada Nuclear Security Site (NNSS), formerly the Nevada Test Site (NTS), and focus on possible activities such as visual observation, multispectral measurements, and shallow and deep geophysical surveys.

  3. Lamin A-dependent nuclear defects in human aging.

    Science.gov (United States)

    Scaffidi, Paola; Misteli, Tom

    2006-05-19

    Mutations in the nuclear structural protein lamin A cause the premature aging syndrome Hutchinson-Gilford progeria (HGPS). Whether lamin A plays any role in normal aging is unknown. We show that the same molecular mechanism responsible for HGPS is active in healthy cells. Cell nuclei from old individuals acquire defects similar to those of HGPS patient cells, including changes in histone modifications and increased DNA damage. Age-related nuclear defects are caused by sporadic use, in healthy individuals, of the same cryptic splice site in lamin A whose constitutive activation causes HGPS. Inhibition of this splice site reverses the nuclear defects associated with aging. These observations implicate lamin A in physiological aging.

  4. Challenges in education and qualification of human resources for next nuclear generation

    Energy Technology Data Exchange (ETDEWEB)

    Pupak, Marcia Orrico [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil)], e-mail: mopupak@ipen.br

    2009-07-01

    The general goal of this paper is to present an overview of Higher Education and personnel qualification for Nuclear Field by the perspective of the International Atomic Energy Agency (IAEA), also by the Organization for Economic Co-operation and Development (OECD and by the United Nations Educational Scientific and Cultural Organization (UNESCO). On the other hand to present the challenge of the Brazilian Government in redesigning, since 2003, the role of the state in order to make it active for younger generations, while promoting growth and social justice, has guided in all actions carried out under the Policy of Human Resources Management of public personnel. The government should be able to formulate and implement public policies and decide among various options, what is the most appropriate for its Human Resources. For this, they require the strengthening of strategic intelligence and government adoption of new ways of interaction and participation. The role played by the Brazilian Nuclear Energy Commission (CNEN) in looking forward to replace and qualify its nuclear staff, as soon as up, since that the qualification of a human resource in this field demands more than one decade. Last but not least the proactive work of IPEN-CNEN/SP to encourage young generation to enter nuclear area, and the efforts of the Brazilian government to implement an integrated Nuclear Programme to form human resources, to attract and retain students in nuclear engineering and related specialized fields, and how this problem should attract the attention of the entire nuclear community, government and industry. (author)

  5. Big data-based data mining modeling for nuclear security analysis in the modified physical protection system

    Energy Technology Data Exchange (ETDEWEB)

    Woo, Tae Ho [Systemix Global Co. Ltd, Seoul (Korea, Republic of)

    2014-10-15

    In this study, the social networking-related strategies have been developed to prepare against the terror. The conventional PPS is composed of detection, delay, and response. In the systems, each stage has particular characteristics where the detection state is to find out the intrusion and unauthorized behavior by some devices, the delay stage is to slow the malicious acts by some barriers, and finally the response stage is to interrupt the actions by several kinds of methods like the arms response. It is said there are some data mining activities by the department of homeland security in the United States. The Automated Targeting System (ATS) compares several factors like traveler, cargo, and conveyance information against intelligence and other enforcement data, which is managed by U.S. Customs and Border Protection (CBP) and includes modules for inbound (ATS-N) and outbound (ATS-AT) cargo, land border crossings (ATS-L), and passengers (ATS-P). The Data Analysis and Research for Trade Transparency System (DARTTS) analyzes possible data like the trade and financial stuff, which is administered by U.S. Immigration and Customs Enforcement (ICE).The modeling has accomplished successfully the random number generation-based quantifications for nuclear security incorporated with several complex algorithms, which is one of popular strategies in the technological-social science areas. In the calculations, the data are processed in every 7.5 minutes in which this means the calculation is done as 8 times in one hour. So, the graph has 100 hours with 800 times data processing. This means that 35,673.516 graphs are available by the big data processing. That is, 1 tera byte = 1,000,000,000,000 bytes = 800 2,500,000,000 bytes So, it is needed to process 2,500,000,000 bytes more for 1 tera byte. In the similar way, 2,500,000,000 bytes are done for 8 times in 1 hour. Then, 312,500,000 bytes are done for 24 hours in 1 day. Then, 13,020,833.33 bytes are done for 365 days in 1 year

  6. Climate change: The need for a human rights agenda within a framework of shared human security

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2012-01-01

    textabstractThis edited volume publishes as a special issue of the quarterly social science journal Social Research, a collection of articles on Human Rights and the Global Economy. The topics addressed are Human Rights and Economy Policy; Global Poverty and the Obligations of Rich Countries; Human

  7. Human (in)security at the livestock-crop-wildlife nexus

    DEFF Research Database (Denmark)

    Bond, Jennifer Lauren

    including agro-pastoral conflicts, cattle rustling and human-wildlife conflicts. The five articles of the thesis address the research questions through a human security lens drawing on quantitative and qualitative data. Analysis showed that there were several factors related to insecurity, weak governance...... and wildlife, or they may be in relation to the management or policy of a articular resource which creates an unequal distribution of benefits. This thesis takes its point of departure in a case study of natural resource conflict in Laikipia, Kenya, where various natural resource conflicts are occurring......, natural resource management and cultural practices which cut across each of the gropastoral, cattle rustling and human-wildlife conflicts focussed on in this study. Further analysis built on these cross-cutting issues to identify the hidden impacts of these interrelated forms of insecurity on people which...

  8. Soil science. Soil and human security in the 21st century.

    Science.gov (United States)

    Amundson, Ronald; Berhe, Asmeret Asefaw; Hopmans, Jan W; Olson, Carolyn; Sztein, A Ester; Sparks, Donald L

    2015-05-08

    Human security has and will continue to rely on Earth's diverse soil resources. Yet we have now exploited the planet's most productive soils. Soil erosion greatly exceeds rates of production in many agricultural regions. Nitrogen produced by fossil fuel and geological reservoirs of other fertilizers are headed toward possible scarcity, increased cost, and/or geopolitical conflict. Climate change is accelerating the microbial release of greenhouse gases from soil organic matter and will likely play a large role in our near-term climate future. In this Review, we highlight challenges facing Earth's soil resources in the coming century. The direct and indirect response of soils to past and future human activities will play a major role in human prosperity and survival.

  9. Nuclear lactate dehydrogenase modulates histone modification in human hepatocytes

    Energy Technology Data Exchange (ETDEWEB)

    Castonguay, Zachary; Auger, Christopher; Thomas, Sean C.; Chahma, M’hamed; Appanna, Vasu D., E-mail: vappanna@laurentian.ca

    2014-11-07

    Highlights: • Nuclear LDH is up-regulated under oxidative stress. • SIRT1 is co-immunoprecipitated bound to nuclear LDH. • Nuclear LDH is involved in histone deacetylation and epigenetics. - Abstract: It is becoming increasingly apparent that the nucleus harbors metabolic enzymes that affect genetic transforming events. Here, we describe a nuclear isoform of lactate dehydrogenase (nLDH) and its ability to orchestrate histone deacetylation by controlling the availability of nicotinamide adenine dinucleotide (NAD{sup +}), a key ingredient of the sirtuin-1 (SIRT1) deacetylase system. There was an increase in the expression of nLDH concomitant with the presence of hydrogen peroxide (H{sub 2}O{sub 2}) in the culture medium. Under oxidative stress, the NAD{sup +} generated by nLDH resulted in the enhanced deacetylation of histones compared to the control hepatocytes despite no discernable change in the levels of SIRT1. There appeared to be an intimate association between nLDH and SIRT1 as these two enzymes co-immunoprecipitated. The ability of nLDH to regulate epigenetic modifications by manipulating NAD{sup +} reveals an intricate link between metabolism and the processing of genetic information.

  10. Cloning, expression and nuclear localization of human NPM3, a member of the nucleophosmin/nucleoplasmin family of nuclear chaperones

    Directory of Open Access Journals (Sweden)

    Ganguly Amit

    2001-11-01

    Full Text Available Abstract Background Studies suggest that the related proteins nucleoplasmin and nucleophosmin (also called B23, NO38 or numatrin are nuclear chaperones that mediate the assembly of nucleosomes and ribosomes, respectively, and that these activities are accomplished through the binding of basic proteins via their acidic domains. Recently discovered and less well characterized members of this family of acidic phosphoproteins include mouse nucleophosmin/nucleoplasmin 3 (Npm3 and Xenopus NO29. Here we report the cloning and initial characterization of the human ortholog of Npm3. Results Human genomic and cDNA clones of NPM3 were isolated and sequenced. NPM3 lies 5.5 kb upstream of FGF8 and thus maps to chromosome 10q24-26. In addition to amino acid similarities, NPM3 shares many physical characteristics with the nucleophosmin/nucleoplasmin family, including an acidic domain, multiple potential phosphorylation sites and a putative nuclear localization signal. Comparative analyses of 14 members of this family from various metazoans suggest that Xenopus NO29 is a candidate ortholog of human and mouse NPM3, and they further group both proteins closer with the nucleoplasmins than with the nucleophosmins. Northern blot analysis revealed that NPM3 was strongly expressed in all 16 human tissues examined, with especially robust expression in pancreas and testis; lung displayed the lowest level of expression. An analysis of subcellular fractions of NIH3T3 cells expressing epitope-tagged NPM3 revealed that NPM3 protein was localized solely in the nucleus. Conclusions Human NPM3 is an abundant and widely expressed protein with primarily nuclear localization. These biological activities, together with its physical relationship to the chaparones nucleoplasmin and nucleophosmin, are consistent with the proposed function of NPM3 as a molecular chaperone functioning in the nucleus.

  11. Theater nuclear forces survivability and security. An Issue Evaluation Plan for fixed storage sites. Final report, 1 April-30 June 1979

    Energy Technology Data Exchange (ETDEWEB)

    Budd, A.S.; Hauser, F.H.; Kennedy, L.W.; Levy, P.H.

    1979-10-01

    This document is an Issue Evaluation Plan (IEP) which presents an approach to improving the operational effectiveness of the TNF by developing survivability and security (S2) options for use while nuclear weapons are in storage at Fixed Storage Sites (FSS). As such, it is one of three IEPs dealing with logistics issues. This IEP provides the Defense Nuclear Agency (DNA) with a description of the FSS issue, a scoping of the analytical and test approaches that might be employed in dealing with the issue, an initial S2 assessment of some aspects of weapons storage, a list of possible improvement options which could be developed, and a recommended FSS S2 Evaluation Plan. Its purpose is to provide DNA with the information necessary for making decisions regarding the development of S2 improvements to be used while nuclear weapons are stored at fixed sites in the TNF.

  12. Support of protective work of human error in a nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Yoshizawa, Yuriko [Tokyo Electric Power Co., Inc. (Japan)

    1999-12-01

    The nuclear power plant human factor group of the Tokyo Electric Power Co., Ltd. supports various protective work of human error conducted at the nuclear power plant. Its main researching theme are studies on human factor on operation of a nuclear power plant, and on recovery and common basic study on human factor. In addition, on a base of the obtained informations, assistance to protective work of human error conducted at the nuclear power plant as well as development for its actual use was also promoted. Especially, for actions sharing some dangerous informations, various assistances such as a proposal on actual example analytical method to effectively understand a dangerous information not facially but faithfully, construction of a data base to conveniently share such dangerous information, and practice on non-accident business survey for a hint of effective promotion of the protection work, were promoted. Here were introduced on assistance and investigation for effective sharing of the dangerous informations for various actions on protection of human error mainly conducted in nuclear power plant. (G.K.)

  13. Preparation of the Human Cytomegalovirus Nuclear Egress Complex and Associated Proteins.

    Science.gov (United States)

    Sharma, Mayuri; Kamil, Jeremy P; Coen, Donald M

    2016-01-01

    Herpesviruses, like most DNA viruses, replicate their genomes in the host cell nucleus. Their DNA is then packaged and assembled into viral nucleocapsids, which, in most cases, are too large to pass through the nuclear pore complex. Instead, herpesviruses use a complex multistep pathway, termed nuclear egress, to exit the nucleus. Key players in this process include two conserved viral proteins that form the nuclear egress complex (NEC). In human cytomegalovirus, these NEC proteins are UL50, embedded in the inner nuclear membrane, and its nucleoplasmic partner UL53. Both are essential for viral nuclear egress. However, other viral components as well as host nuclear envelope proteins may also participate in nuclear egress. Identifying these viral and cellular factors may provide important insight into the herpesvirus lifecycle and its relationship to the underlying, yet still-mysterious, host nuclear egress pathway. We developed an immunoprecipitation-based protocol, described herein, to identify protein-protein interactions involving the NEC from the nuclear fraction of infected cells that express an epitope-tagged version of NEC subunit UL53.

  14. 核电数字化控制系统安全综述%Control System Security in Nuclear Power Plant

    Institute of Scientific and Technical Information of China (English)

    李江海; 黄晓津

    2012-01-01

    核电站控制系统的数字化和联网化,在提高控制性能、方便操作维护的同时,也带来新的安全漏洞.特别是通用的协议、软件和设备正逐步取代原有的专用系统,这导致系统安全漏洞更容易被利用.而控制系统与现实世界直接相互作用,一旦出现安全问题,将威胁人身健康和环境安全,破坏关键基础设施,甚至危及国家安全.通过详细评述近年来数起与核电相关的控制系统安全事件,总结归纳控制系统安全的重要意义和难点问题.结合现有的研究成果,分析展望了有学术价值的研究方向.%The digitalization and networking of control systems in nuclear power plants has brought significant improvements in system control, operation and maintenance. However, the highly digitalized control system also introduces additional security vulnerabilities. Moreover, the replacement of conventional proprietary systems with common protocols, software and devices makes these vulnerabilities easy to be exploited. Through the interaction between control systems and the physical world, security issues in control systems impose high risks on health, safety and environment. These security issues may even cause damages of critical infrastructures and threaten national security. The importance of control system security by reviewing several control system security incidents that happened in nuclear power plants was showed in recent years. Several key difficulties in addressing these security issues were described. Finally, existing researches on control system security and propose several promising research directions were reviewed.

  15. Application of IOT security and protection in area of nuclear facilities%物联网安防在核设施领域中的应用

    Institute of Scientific and Technical Information of China (English)

    2013-01-01

      介绍了几种先进的物联网技术在核设施安防中的典型应用,包括控制区域防护、周界防护、用RFID技术对核燃料存储和运输的管理、无线传感器网络数据采集、基于ZigBee技术的无线传输等。提出了基于物联网技术的核设施安防实现架构,包括前端实现、通信模式和后端实现等。最后通过分析,论证了物联网技术在核设施安防中的应用有效性和可靠性。%The typical applications of several advanced IOT technology in the security and protection of nuclear facilities are introduced, such as control area protection, perimeter protection, using RFID technology to manage the storage and transportation of the nuclear fuel, the data collection of wireless sensor network, wireless transmission based on ZigBee technology and so on. The implementation architecture of the security and protection of nuclear facilities based on IOT technology is proposed, including the front-end implementation, communication mode and back-end realization etc. Through the analysis, the validity and reliability of the IOT technology applied in the security and protection of nuclear facilities is demonstrated.

  16. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  17. Risk Based Security Management at Research Reactors

    Energy Technology Data Exchange (ETDEWEB)

    Ek, David R. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    This presentation provides a background of what led to the international emphasis on nuclear security and describes how nuclear security is effectively implemented so as to preserve the societal benefits of nuclear and radioactive materials.

  18. Adapting Human Reliability Analysis from Nuclear Power to Oil and Gas Applications

    Energy Technology Data Exchange (ETDEWEB)

    Boring, Ronald Laurids [Idaho National Laboratory

    2015-09-01

    ABSTRACT: Human reliability analysis (HRA), as currently used in risk assessments, largely derives its methods and guidance from application in the nuclear energy domain. While there are many similarities be-tween nuclear energy and other safety critical domains such as oil and gas, there remain clear differences. This paper provides an overview of HRA state of the practice in nuclear energy and then describes areas where refinements to the methods may be necessary to capture the operational context of oil and gas. Many key distinctions important to nuclear energy HRA such as Level 1 vs. Level 2 analysis may prove insignifi-cant for oil and gas applications. On the other hand, existing HRA methods may not be sensitive enough to factors like the extensive use of digital controls in oil and gas. This paper provides an overview of these con-siderations to assist in the adaptation of existing nuclear-centered HRA methods to the petroleum sector.

  19. Yes we can! The Raffles Dialogue on Human Wellbeing and Security

    Directory of Open Access Journals (Sweden)

    Dr. Tikki Pang

    2015-08-01

    Full Text Available The future of human wellbeing and security depends on our ability to deal with the multiple effects of globalisation and on adoption of a new paradigm and philosophy for living and for health that emphasises people's wellbeing and social justice. Such was the topic of the inaugural Raffles Dialogue on Human Wellbeing and Security held in Singapore on Feb 2–3, 2015. Participants agreed that, to achieve these goals, four conditions must be met. First, equity must be integral to the implementation of technology. Second, there is an urgent need for innovations within our global institutions to make them “fit for purpose” in a rapidly changing world. Third, we must find the right balance between the roles of government and markets so that all those in need can access affordable medicine and health care. Finally, we must realise that we live in a small and interdependent “global village”, where Asian countries need to assume greater leadership of our global village councils. This is the great imperative of our times.

  20. Nuclear proliferation and Latin American Security: Is the bomb' program dead in Brazil. Master's thesis

    Energy Technology Data Exchange (ETDEWEB)

    De Jesus, E.

    1994-03-24

    This thesis addresses the possibility of a Brazilian hidden agenda in order to support one of the most advanced nuclear research and nuclear power programs in Latin America. From the early 1970s to the late 1980s Brazilian military leaders pursued the development of nuclear weapons. With the emergence of democratic regimes during the 1980s, these covert projects were halted or terminated. The civilian administration in Brazil is now supporting an ambiguous and uncompromising position by not ratifying significant agreements renouncing nuclear weapons programs. With Brazil still rejecting the Non-Proliferation Treaty (NPT), not formally embracing the Tlatelolco Treaty (which prohibits nuclear weapons in Latin America), and not allowing full implementation of inspections and International Atomic Energy Association (IAEA) Safeguards on its nuclear facilities, the future of the Brazilian nuclear program appears to be a dormant but potential political factor in Brazilian foreign policy.

  1. Laminopathies: involvement of structural nuclear proteins in the pathogenesis of an increasing number of human diseases.

    Science.gov (United States)

    Maraldi, Nadir M; Squarzoni, Stefano; Sabatelli, Patrizia; Capanni, Cristina; Mattioli, Elisabetta; Ognibene, Andrea; Lattanzi, Giovanna

    2005-05-01

    Just at the beginning of the millennium the neologism laminopathies has been introduced in the scientific vocabulary. An exponential increase of interest on the subject started concomitantly, so that a formerly quite neglected group of rare human diseases is now widely investigated. This review will cover the history of the identification of the molecular basis for fourteen (since now) hereditary diseases arising from defects in genes that encode nuclear envelope and nuclear lamina-associated proteins and will also consider the hypotheses that can account for the role of structural nuclear proteins in the pathogenesis of diseases affecting a wide spectrum of tissues.

  2. Russia's nuclear weapons dilemma: A cooperative approach to international security in the 1990s. Master's thesis

    Energy Technology Data Exchange (ETDEWEB)

    Wuchte, T.A.

    1993-01-01

    Although the threat of an East/West confrontation has diminished, additional concerns have been raised by new and unforeseen dangers to European and global security. Both the Russian Federation and the West want to mitigate the potential dangers arising from rapidly disintegrating control of a nuclear arsenal scattered throughout the former Soviet republics. These concerns have sparked a wide range of Western responses, most notably the U.S. decision to assist Russia with the construction of a nuclear weapons storage facility near the Siberian city of Tomsk 7. By assessing the threat of nuclear proliferation and the United State's interaction with the Russian Federation in resolving this nuclear dilemma, one can gain some measure of confidence about Moscow's reliability as a partner in nuclear arms control, disarmament, and in staunching proliferation. This paper concludes by comparing the emergent framework of international cooperation between Russia and the United States to the traditional Realpolitik balance of power policies that characterized the Cold War. The conclusion notes that the international community has started to adopt a more global view toward problem solving, but that obstacles still exist that can either slow such progress or cause a return to more traditional attitudes as seen during the Cold War. Because of this uncertainty, we must continue to press forward with new ideas and discard Cold War prejudices.

  3. Safe Operation of Nuclear Power Plants: Impacts of Human and Organisational Factors and Emerging Technologies

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    In co-operation with the OECD Nuclear Energy Agency (NEA), the Halden Reactor Project organised a Summer School on ''Safe Operation of Nuclear Power Plants: Impacts of Human and Organisational Factors and Emerging Technologies'' in the period August 27-August 31, 2001. The Summer School was intended for scientists, engineers and technicians working for nuclear installations, engineering companies, industry and members of universities and research institutes, who wanted to broaden their nuclear background by getting acquainted with Man-Technology-Organisation-related subjects and issues. The Summer School should also serve to transfer knowledge to the ''young generation'' in the nuclear field. The following presentations were given: (1) Overview of the Nuclear Community and Current issues, (2) The Elements of Safety Culture; Evaluation of Events, (3) Quality Management (QM), (4) Probabilistic Risk Assessment (PSA), (5) Human Behaviour from the Viewpoint of Industrial Psychology, (6) Technical tour of the Halden Project Experimental Facilities, (7) Human Factors in Control Room Design, (8) Computerised Operator Support Systems (COSSs) and (9) Artificial Intelligence; a new Approach. Most of the contributions are overhead figures from spoken lectures.

  4. Nuclear distribution of claudin-2 increases cell proliferation in human lung adenocarcinoma cells.

    Science.gov (United States)

    Ikari, Akira; Watanabe, Ryo; Sato, Tomonari; Taga, Saeko; Shimobaba, Shun; Yamaguchi, Masahiko; Yamazaki, Yasuhiro; Endo, Satoshi; Matsunaga, Toshiyuki; Sugatani, Junko

    2014-09-01

    Claudin-2 is expressed in human lung adenocarcinoma tissue and cell lines, although it is absent in normal lung tissue. However, the role of claudin-2 in cell proliferation and the regulatory mechanism of intracellular distribution remain undefined. Proliferation of human adenocarcinoma A549 cells was decreased by claudin-2 knockdown together with a decrease in the percentage of S phase cells. This knockdown decreased the expression levels of ZONAB and cell cycle regulators. Claudin-2 was distributed in the nucleus in human adenocarcinoma tissues and proliferating A549 cells. The nuclear distribution of ZONAB and percentage of S phase cells were higher in cells exogenously expressing claudin-2 with a nuclear localization signal than in cells expressing claudin-2 with a nuclear export signal. Nuclear claudin-2 formed a complex with ZO-1, ZONAB, and cyclin D1. Nuclear distribution of S208A mutant, a dephosphorylated form of claudin-2, was higher than that of wild type. We suggest that nuclear distribution of claudin-2 is up-regulated by dephosphorylation and claudin-2 serves to retain ZONAB and cyclin D1 in the nucleus, resulting in the enhancement of cell proliferation in lung adenocarcinoma cells.

  5. The Red Queen in mitochondria: cyto-nuclear co-evolution, hybrid breakdown and human disease

    Directory of Open Access Journals (Sweden)

    Jui-Yu eChou

    2015-05-01

    Full Text Available Cyto-nuclear incompatibility, a specific form of Dobzhansky-Muller incompatibility caused by incompatible alleles between mitochondrial and nuclear genomes, has been suggested to play a critical role during speciation. Several features of the mitochondrial genome (mtDNA, including high mutation rate, dynamic genomic structure, and uniparental inheritance, make mtDNA more likely to accumulate mutations in the population. Once mtDNA has changed, the nuclear genome needs to play catch-up due to the intimate interactions between these two genomes. In two populations, if cyto-nuclear co-evolution is driven in different directions, it may eventually lead to hybrid incompatibility. Although cyto-nuclear incompatibility has been observed in a wide range of organisms, it remains unclear what type of mutations drives the co-evolution. Currently, evidence supporting adaptive mutations in mtDNA remains limited. On the other hand, it has been known that some mutations allow mtDNA to propagate more efficiently but compromise the host fitness (described as selfish mtDNA. Arms races between such selfish mtDNA and host nuclear genomes can accelerate cyto-nuclear co-evolution and lead to a phenomenon called the Red Queen Effect. Here, we discuss how the Red Queen Effect may contribute to the frequent observation of cyto-nuclear incompatibility and be the underlying driving force of some human mitochondrial diseases.

  6. Bio-terrorism, human security and public health: can international law bring them together in an age of globalization?

    Science.gov (United States)

    Aginam, Obijiofor

    2005-09-01

    Bio-terrorism, the use of a microorganism with the deliberate intent of causing infection, before and since the anthrax attacks in the United States in October 2001, has emerged as a real medical and public health threat. The link between bio-terrorism, human security and public health raises complex questions on the normative trajectories of international law, the mandates of international organizations, and global health governance. In May 2001, the World Health Assembly of the World Health Organization (WHO) passed a resolution entitled "Global Health Security: Epidemic Alert and Response" which inter alia, urged WHO member states to participate actively in the verification and validation of surveillance data and information concerning health emergencies of international concern. This article explores the links between bio-terrorism, human security and public health, and investigates the effectiveness of international legal mechanisms that link them in an age of globalization of public health. The article explores the interaction of WHO's 'soft-law' approaches to global health security, and the 'moribund' negotiations of the verification and monitoring protocol to the Biological Weapons Convention 1972. Can international law link bio-terrorism, public health and human security? Does the WHO collaborate with other international organizations within and outside the United Nations system to develop effective legal and governance approaches to bio-terrorism and global health security? The article concludes that the globalization of public health threats like bio-terrorism requires globalized legal approaches.

  7. Los Alamos National Laboratory Human and Intellectual Capital for Sustaining Nuclear Deterrence

    Energy Technology Data Exchange (ETDEWEB)

    McAlpine, Bradley [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-04-01

    This paper provides an overview of the current human and intellectual capital at Los Alamos National Laboratory, through specific research into the statistics and demographics as well as numerous personal interviews at all levels of personnel. Based on this information, a series of recommendations are provided to assist Los Alamos National Laboratory in ensuring the future of the human and intellectual capital for the nuclear deterrence mission. While the current human and intellectual capital is strong it stands on the precipice and action must be taken to ensure Los Alamos National Laboratory maintains leadership in developing and sustaining national nuclear capabilities. These recommendations may be applicable to other areas of the nuclear enterprise, including the Air Force, after further research and study.

  8. The effects of different maceration techniques on nuclear DNA amplification using human bone.

    Science.gov (United States)

    Lee, Esther J; Luedtke, Jennifer G; Allison, Jamie L; Arber, Carolyn E; Merriwether, D Andrew; Steadman, Dawnie Wolfe

    2010-07-01

    Forensic anthropologists routinely macerate human bone for the purposes of identity and trauma analysis, but the heat and chemical treatments used can destroy genetic evidence. As a follow-up to a previous study on nuclear DNA recovery that used pig ribs, this study utilizes human skeletal remains treated with various bone maceration techniques for nuclear DNA amplification using the standard Combined DNA Index System (CODIS) markers. DNA was extracted from 18 samples of human lower leg bones subjected to nine chemical and heat maceration techniques. Genotyping was carried out using the AmpFlSTR COfiler and AmpFlSTR Profiler Plus ID kits. Results showed that heat treatments via microwave or Biz/Na(2)CO(3) in sub-boiling water efficiently macerate bone and produce amplifiable nuclear DNA for genetic analysis. Long-term use of chemicals such as hydrogen peroxide is discouraged as it results in poor bone quality and has deleterious effects on DNA amplification.

  9. Embryonic stem cells generated by nuclear transfer of human somatic nuclei into rabbit oocytes

    Institute of Scientific and Technical Information of China (English)

    YING CHEN; QING ZHANG YANG; DA YUAN CHEN; MIN KANG WANG; JIN SONG LI; SHAO LIANG HUANG; XIANG YIN KONG; YAO ZHOU SHI; ZHI QIANG WANG; JIA HUI XIA; ZHI GAO LONG; ZHI XU HE; ZHI GANG XUE; WEN XIANG DING; HUI ZHEN SHENG; AILIAN LIU; KAI WANG; WEN WEI MAO; JIAN XIN CHU; YONG LU; ZHENG FU FANG; YING TANG SHI

    2003-01-01

    To solve the problem of immune incompatibility, nuclear transplantation has been envisaged as a means to produce cells or tissues for human autologous transplantation. Here we have derived embryonic stem cells by the transfer of human somatic nuclei into rabbit oocytes. The number of blastocysts that developed from the fused nuclear transfer was comparable among nuclear donors at ages of 5, 42, 52 and 60 years, and nuclear transfer (NT) embryonic stem cells (ntES cells) were subsequently derived from each of the four age groups. These results suggest that human somatic nuclei can form ntES cells independent of the age of the donor. The derived ntES cells are human based on karyotype, isogenicity, in situ hybridization, PGR and immunocytochemistry with probes that distinguish between the various species. The ntES cells maintain the capability of sustained growth in an undifferentiated state, and form embryoid bodies, which, on further induction, give rise to cell types such as neuron and muscle, as well as mixed cell populations that express markers representative of all three germ layers. Thus, ntES cells derived from human somatic cells by NT to rabbit eggs retain phenotypes similar to those of conventional human ES cells, including the ability to undergo multilineage cellular differentiation.

  10. Improving human reliability through better nuclear power plant system design. Progress report

    Energy Technology Data Exchange (ETDEWEB)

    Golay, M.W.

    1995-01-10

    The project on {open_quotes}Development of a Theory of the Dependence of Human Reliability upon System Designs as a Means of Improving Nuclear Power Plant Performance{close_quotes} has been undertaken in order to address the important problem of human error in advanced nuclear power plant designs. Most of the creativity in formulating such concepts has focused upon improving the mechanical reliability of safety related plant systems. However, the lack of a mature theory has retarded similar progress in reducing the likely frequencies of human errors. The main design mechanism used to address this class of concerns has been to reduce or eliminate the human role in plant operations and accident response. The plan of work being pursued in this project is to perform a set of experiments involving human subject who are required to operate, diagnose and respond to changes in computer-simulated systems, relevant to those encountered in nuclear power plants. In the tests the systems are made to differ in complexity in a systematic manner. The computer program used to present the problems to be solved also records the response of the operator as it unfolds. Ultimately this computer is also to be used in compiling the results of the project. The work of this project is focused upon nuclear power plant applications. However, the persuasiveness of human errors in using all sorts of electromechanical machines gives it a much greater potential importance. Because of this we are attempting to pursue our work in a fashion permitting broad generalizations.

  11. Characterization of recombinant human nicotinamide mononucleotide adenylyl transferase (NMNAT), a nuclear enzyme essential for NAD synthesis.

    Science.gov (United States)

    Schweiger, M; Hennig, K; Lerner, F; Niere, M; Hirsch-Kauffmann, M; Specht, T; Weise, C; Oei, S L; Ziegler, M

    2001-03-09

    Nicotinamide mononucleotide adenylyl transferase (NMNAT) is an essential enzyme in all organisms, because it catalyzes a key step of NAD synthesis. However, little is known about the structure and regulation of this enzyme. In this study we established the primary structure of human NMNAT. The human sequence represents the first report of the primary structure of this enzyme for an organism higher than yeast. The enzyme was purified from human placenta and internal peptide sequences determined. Analysis of human DNA sequence data then permitted the cloning of a cDNA encoding this enzyme. Recombinant NMNAT exhibited catalytic properties similar to the originally purified enzyme. Human NMNAT (molecular weight 31932) consists of 279 amino acids and exhibits substantial structural differences to the enzymes from lower organisms. A putative nuclear localization signal was confirmed by immunofluorescence studies. NMNAT strongly inhibited recombinant human poly(ADP-ribose) polymerase 1, however, NMNAT was not modified by poly(ADP-ribose). NMNAT appears to be a substrate of nuclear kinases and contains at least three potential phosphorylation sites. Endogenous and recombinant NMNAT were phosphorylated in nuclear extracts in the presence of [gamma-(32)P]ATP. We propose that NMNAT's activity or interaction with nuclear proteins are likely to be modulated by phosphorylation.

  12. Experimental cloning of embryos through human-rabbit inter-species nuclear transfer

    Institute of Scientific and Technical Information of China (English)

    JI Jingjuan; GUO Tonghang; TONG Xianhong; LUO Lihua; ZHOU Guixiang; FU Yingyun; LIU Yusheng

    2007-01-01

    Therapeutic cloning,which is based on human somatic cell nuclear transfer,is one of our major research objectives.Though inter-species nuclear transfer has been introduced to construct human somatic cell cloned embryos,the effects of type,passage,and preparation method of donor cells on embryo development remain unclear.In our experiment,cloned embryos were reconstructed with different passage and preparation methods of ossocartilaginous cell,skin fibroblast,and cumulus cells.The cumulus cell embryos showed significantly higher development rates than the other two (P<0.05).The development rate of embryos reconstructed with skin fibroblasts of different passage number and somatic cells of different chilling durations showed no significant difference.Also,fluorescence in situ hybridization (FISH)was conducted to detect nuclear derivation of the embryos.The result showed that the nuclei of the inter-species cloned embryo cells came from human.We conclude that (1)cloned embryos can be constructed through human-rabbit interspecies nuclear transfer;(2)different kinds of somatic cells result in different efficiency of nuclear transfer,while in vitro passage of the donor does not influence embryo development;(3)refrigeration is a convenient and efficient donor cell preparation method.Finally,it is feasible to detect DNA gcnotype through FISH.

  13. Human Security Workers Deployed in Austere Environments: A Brief Guide to Self-Care, Sustainment, and Productivity

    Directory of Open Access Journals (Sweden)

    Thomas F. Ditzler

    2015-01-01

    Full Text Available Since the early 1990s, the human security movement has sought to expand the concept of security beyond the traditional military defense of national borders to focus on the intra-state security needs of populations at the individual level. Specific initiatives frequently address problems of population health, ethnic conflict, religious extremism, human rights, environmental or natural disasters, and other critical issues. For expatriate human security workers in the field, the environment may present meaningful challenges to their wellbeing and productivity. This can be especially so for those who have relatively more experience in academic, business, or administrative settings, and less in the field. The authors' goal is to illuminate practices that have demonstrated their efficacy in enhancing wellness, sustainment, and productivity for human security and other humanitarian and development workers deployed to austere environments. The content represents a synoptic consensus of best general practices and guidance from a range of resources comprising United Nations agencies and activities, national and international non-governmental organizations (NGO's, private volunteer organ­izations (PVO's, national military services, and international business concerns.

  14. United States Department of Energy National Nuclear Security Administration Sandia Field Office NESHAP Annual Report CY2014 for Sandia National Laboratories New Mexico

    Energy Technology Data Exchange (ETDEWEB)

    evelo, stacie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Miller, Mark L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-05-01

    This report provides a summary of the radionuclide releases from the United States (U.S.) Department of Energy (DOE) National Nuclear Security Administration facilities at Sandia National Laboratories, New Mexico (SNL/NM) during Calendar Year (CY) 2014, including the data, calculations, and supporting documentation for demonstrating compliance with 40 Code of Federal Regulation (CFR) 61, Subpart H--NATIONAL EMISSION STANDARDS FOR EMISSIONS OF RADIONUCLIDES OTHER THAN RADON FROM DEPARTMENT OF ENERGY FACILITIES. A description is given of the sources and their contributions to the overall dose assessment. In addition, the maximally exposed individual (MEI) radiological dose calculation and the population dose to local and regional residents are discussed.

  15. Collaborative human-machine nuclear non-proliferation analysis

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, F.L.; Badalamente, R.V.; Stewart, T.S.

    1993-10-01

    The purpose of this paper is to report on the results of a project investigating support concepts for the information treatment needs of the International Atomic Energy Agency (IAEA, also referred to as the Agency) and its attempts to strengthen international safeguards. The aim of the research was to define user/computer interface concepts and intelligent support features that will enhance the analyst`s access to voluminous and diverse information, the ability to recognize and evaluate uncertain data, and the capability to make decisions and recommendations. The objective was to explore techniques for enhancing safeguards analysis through application of (1) more effective user-computer interface designs and (2) advanced concepts involving human/system collaboration. The approach was to identify opportunities for human/system collaboration that would capitalize on human strengths and still accommodate human limitations. This paper documents the findings and describes a concept prototype, Proliferation Analysis Support System (PASS), developed for demonstration purposes. The research complements current and future efforts to enhance the information systems used by the IAEA, but has application elsewhere, as well.

  16. Collaborative human-machine nuclear non-proliferation analysis

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, F.L.; Badalamente, R.V.; Stewart, T.S.

    1993-10-01

    The purpose of this paper is to report on the results of a project investigating support concepts for the information treatment needs of the International Atomic Energy Agency (IAEA, also referred to as the Agency) and its attempts to strengthen international safeguards. The aim of the research was to define user/computer interface concepts and intelligent support features that will enhance the analyst`s access to voluminous and diverse information, the ability to recognize and evaluate uncertain data, and the capability to make decisions and recommendations. The objective was to explore techniques for enhancing safeguards analysis through application of (1) more effective user-computer interface designs and (2) advanced concepts involving human/system collaboration. The approach was to identify opportunities for human/system collaboration that would capitalize on human strengths and still accommodate human limitations. This paper documents the findings and describes a concept prototype, Proliferation Analysis Support System (PASS), developed for demonstration purposes. The research complements current and future efforts to enhance the information systems used by the IAEA, but has application elsewhere, as well.

  17. Acetylation dynamics of human nuclear proteins during the ionizing radiation-induced DNA damage response

    DEFF Research Database (Denmark)

    Bennetzen, Martin; Andersen, J.S.; Lasen, D.H.

    2013-01-01

    -dependent posttranslational modifications (PT Ms). To complement our previous analysis of IR-induced temporal dynamics of nuclear phosphoproteome, we now identify a range of human nuclear proteins that are dynamically regulated by acetylation, and predominantly deacetylation, during IR-induced DDR by using mass spectrometry......-based proteomic approaches. Apart from cataloging acetylation sites through SILAC proteomic analyses before IR and at 5 and 60 min after IR exposure of U2OS cells, we report that: (1) key components of the transcriptional machinery, such as EP 300 and CREBBP, are dynamically acetylated; (2) that nuclear...... to assess lysine acetylation status and thereby validate the mass spectrometry data. We thus present evidence that nuclear proteins, including those known to regulate cellular functions via epigenetic modifications of histones, are regulated by (de)acetylation in a timely manner upon cell's exposure...

  18. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  19. Linking human health, climate change, and food security through ecological-based sanitation systems

    Science.gov (United States)

    Ryals, R.; Kramer, S.; Porder, S.; Andersen, G. L.

    2015-12-01

    Ensuring access to clean, safe sanitation for the world's population remains a challenging, yet critical, global sustainability goal. Ecological-based sanitation (EcoSan) technology is a promising strategy for improving sanitation, particularly in areas where financial resources and infrastructure are limiting. The composting of human waste and its use as an agricultural soil amendment can tackle three important challenges in developing countries - providing improved sanitation for vulnerable communities, reducing the spread of intestinal-born pathogens, and returning nutrients and organic matter to degraded agricultural soils. The extent of these benefits and potential tradeoffs are not well known, but have important implications for the widespread adoption of this strategy to promote healthy communities and enhance food security. We quantified the effects of EcoSan on the climate and human health in partnership with Sustainable Organic Integrated Livelihoods (SOIL) in Haiti. We measured greenhouse gas emissions (nitrous oxide, methane, and carbon dioxide) from compost piles that ranged in age from 0 to 14 months (i.e. finished) from two compost facilities managed with or without cement lining. We also measured emissions from a government-operated waste treatment pond and a grass field where waste has been illegally dumped. The highest methane emissions were observed from the anaerobic waste pond, whereas the dump site and compost piles had higher nitrous oxide emissions. Net greenhouse gases (CO2-equivalents) from unlined compost piles were 8x lower than lined compost piles and 20 and 30x lower than the dump and waste pond, respectively. We screened finished compost for fecal pathogens using bacterial 16S sequencing. Bacterial pathogens were eliminated regardless of the type of composting process. Pilot trials indicate that the application of compost to crops has a large potential for increasing food production. This research suggests that EcoSan systems are

  20. 24/7 security system: 60-FPS color EMCCD camera with integral human recognition

    Science.gov (United States)

    Vogelsong, T. L.; Boult, T. E.; Gardner, D. W.; Woodworth, R.; Johnson, R. C.; Heflin, B.

    2007-04-01

    An advanced surveillance/security system is being developed for unattended 24/7 image acquisition and automated detection, discrimination, and tracking of humans and vehicles. The low-light video camera incorporates an electron multiplying CCD sensor with a programmable on-chip gain of up to 1000:1, providing effective noise levels of less than 1 electron. The EMCCD camera operates in full color mode under sunlit and moonlit conditions, and monochrome under quarter-moonlight to overcast starlight illumination. Sixty frame per second operation and progressive scanning minimizes motion artifacts. The acquired image sequences are processed with FPGA-compatible real-time algorithms, to detect/localize/track targets and reject non-targets due to clutter under a broad range of illumination conditions and viewing angles. The object detectors that are used are trained from actual image data. Detectors have been developed and demonstrated for faces, upright humans, crawling humans, large animals, cars and trucks. Detection and tracking of targets too small for template-based detection is achieved. For face and vehicle targets the results of the detection are passed to secondary processing to extract recognition templates, which are then compared with a database for identification. When combined with pan-tilt-zoom (PTZ) optics, the resulting system provides a reliable wide-area 24/7 surveillance system that avoids the high life-cycle cost of infrared cameras and image intensifiers.

  1. Hydrothermal Alteration of Glass from Underground Nuclear Tests: Formation and Transport of Pu-clay Colloids at the Nevada National Security Site

    Energy Technology Data Exchange (ETDEWEB)

    Zavarin, M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Zhao, P. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Joseph, C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Begg, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Boggs, M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Dai, Z. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kersting, A. B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-05-27

    The testing of nuclear weapons at the Nevada National Security Site (NNSS), formerly the Nevada Test Site (NTS), has led to the deposition of substantial quantities of plutonium into the environment. Approximately 2.8 metric tons (3.1×104 TBq) of Pu were deposited in the NNSS subsurface as a result of underground nuclear testing. While 3H is the most abundant anthropogenic radionuclide deposited in the NNSS subsurface (4.7×106 TBq), plutonium is the most abundant from a molar standpoint. The only radioactive elements in greater molar abundance are the naturally occurring K, Th, and U isotopes. 239Pu and 240Pu represent the majority of alpha-emitting Pu isotopes. The extreme temperatures associated with underground nuclear tests and the refractory nature of Pu results in most of the Pu (98%) being sequestered in melted rock, referred to as nuclear melt glass (Iaea, 1998). As a result, Pu release to groundwater is controlled, in large part, by the leaching (or dissolution) of nuclear melt glass over time. The factors affecting glass dissolution rates have been studied extensively. The dissolution of Pu-containing borosilicate nuclear waste glasses at 90ºC has been shown to lead to the formation of dioctahedral smectite colloids. Colloid-facilitated transport of Pu at the NNSS has been observed. Recent groundwater samples collected from a number of contaminated wells have yielded a wide range of Pu concentrations from 0.00022 to 2.0 Bq/L. While Pu concentrations tend to fall below the Maximum Contaminant Level (MCL) established by the Environmental Protection Agency (EPA) for drinking water (0.56 Bq/L), we do not yet understand what factors limit the Pu concentration or its transport behavior. To quantify the upper limit of Pu concentrations produced as a result of melt glass dissolution and determine the nature of colloids and Pu associations, we performed a 3 year nuclear melt glass dissolution experiment

  2. Nuclear transfer of goat somatic cells transgenic for human lactoferrin gene

    Institute of Scientific and Technical Information of China (English)

    Lan LI; Wei SHEN; Lingjiang MIN; Qingyu PAN; Yujiang SUN; Jixian DENG; Qingjie PAN

    2008-01-01

    Transgenic animal mammary gland bioreactors are used to produce recombinant proteins with appropri-ate post-translational modifications.The nuclear transfer of transgenic somatic cells is a powerful method to pro-duce mammary gland bioreactors.We established an effi-cient gene transfer and nuclear transfer approach in goat somatic cells.Gene targeting vector pGBC2LF was con-structed by cloning human lactoferrin (LF) gene cDNA into exon 2 of the milk goat beta-casein gene and the endogenous start codon was replaced by that of human LF gene.Goat fetal fibroblasts were transfected with lin-earized pGBC2LF and 14 cell lines were positive accord-ing to PCR and Southern blot.The transgenic cells were used as donor cells of nuclear transfer and some of recon-structed embryos could develop into blastocyst in vitro.

  3. Severely atrophic human muscle fibers with nuclear misplacement survive many years of permanent denervation

    Directory of Open Access Journals (Sweden)

    Ugo Carraro

    2016-06-01

    Full Text Available Likewise in rodents, after complete spinal cord injury (SCI the lower motor neuron (LMN denervated human muscle fibers lose completely the myofibrillar apparatus and the coil distribution of myonuclei that are relocated in groups (nuclear clumps in the center of severely atrophic muscle fibers. Up to two years of LMN denervation the muscle fibers with nuclear clumps are very seldom, but in this cohort of patients the severely atrophic muscle fibers are frequent in muscle biopsies harvested three to six years after SCI. Indeed, the percentage increased to 27 ± 9% (p< 0.001, and then abruptly decreased from the 6th year onward, when fibrosis takes over to neurogenic muscle atrophy. Immunohistochemical analyses shown that nuclear misplacements occurred in both fast and slow muscle fibers. In conclusion, human muscle fibers survive permanent denervation much longer than generally accepted and relocation of nuclei is a general behavior in long term denervated muscle fibers.

  4. Recommendations to the NRC on human engineering guidelines for nuclear power plant maintainability

    Energy Technology Data Exchange (ETDEWEB)

    Badalamente, R.V.; Fecht, B.A.; Blahnik, D.E.; Eklund, J.D.; Hartley, C.S.

    1986-03-01

    This document contains human engineering guidelines which can enhance the maintainability of nuclear power plants. The guidelines have been derived from general human engineering design principles, criteria, and data. The guidelines may be applied to existing plants as well as to plants under construction. They apply to nuclear power plant systems, equipment and facilities, as well as to maintenance tools and equipment. The guidelines are grouped into seven categories: accessibility and workspace, physical environment, loads and forces, maintenance facilities, maintenance tools and equipment, operating equipment design, and information needs. Each chapter of the document details specific maintainability problems encountered at nuclear power plants, the safety impact of these problems, and the specific maintainability design guidelines whose application can serve to avoid these problems in new or existing plants.

  5. Space nuclear power: technology, policy, and risk considerations in human missions to Mars.

    Science.gov (United States)

    Friedensen, V P

    1998-01-01

    There is a large discrepancy between potential needs for nuclear propulsion and power systems for the human exploration of Mars and the current status of R&D funding, public opinion, and governmental support for these technologies. Mission planners and spacecraft designers, energized by the recent claims of possible discovery of life on Mars and responding to increased public interest in the human exploration of Mars, frequently propose nuclear reactors and radioisotope thermoelectric generators (RTGs) for interplanetary spacecraft propulsion and for power supply on the surface of Mars. These plans and designs typically assume that reactors will be available "on-the-shelf," and do not take the extensive R&D costs required to develop such reactors into consideration. However, it is likely that current U.S. policies, if unchanged, will prohibit the launch of nuclear reactors and large RTGs in response to a perceived risk by the public.

  6. A global assessment of wildfire risks to human and environmental water security

    Science.gov (United States)

    Robinne, François-Nicolas; Parisien, Marc-André; Flannigan, Mike; Miller, Carol; Bladon, Kevin D.

    2017-04-01

    Extreme wildfire events extensively affect hydrosystem stability and generate an important threat to the reliability of the water supply for human and natural communities. While actively studied at the watershed scale, the development of a global vision of wildfire risk to water security has only been undertaken recently, pointing at potential water security concerns in an era of global changes. In order to address this concern, we propose a global-scale analysis of the wildfire risk to surface water supplies based on the Driving forces-Pressures-States-Impacts-Responses (DPSIR) framework. This framework relies on the cause-and-effect relationships existing between the five categories of the DPSIR chain. Based on the literature, we gathered an extensive set of spatial indicators relevant to fire-induced hydrological hazards and water consumption patterns by human and natural communities. Each indicator was assigned a DPSIR category. Then, we collapsed the information in each category using a principal component analysis in order to extract the most relevant pixel-based information provided by each spatial indicator. Finally, we compiled our five categories using an additive indexation process to produce a spatially-explicit index of the wildfire-water risk (WWR). For comparison purposes, we aggregated index scores by global hydrological regions, or hydrobelts, for analysis. Overall, our results show a distinct pattern of medium-to-high risk levels in areas where sizeable wildfire activity, water resources, and water consumption are concomitant, which mainly encompasses temperate and sub-tropical zones. A closer look at hydrobelts reveals differences in the factors driving the risk, with fire activity being the primary factor of risk in the circumboreal forest, and freshwater resource density being prevalent in tropical areas. We also identified major urban areas across the world whose source waters should be protected from extreme fire events, particularly when

  7. Procedure for conducting a human-reliability analysis for nuclear power plants. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Bell, B.J.; Swain, A.D.

    1983-05-01

    This document describes in detail a procedure to be followed in conducting a human reliability analysis as part of a probabilistic risk assessment when such an analysis is performed according to the methods described in NUREG/CR-1278, Handbook for Human Reliability Analysis with Emphasis on Nuclear Power Plant Applications. An overview of the procedure describing the major elements of a human reliability analysis is presented along with a detailed description of each element and an example of an actual analysis. An appendix consists of some sample human reliability analysis problems for further study.

  8. Epidemiological studies on radiation carcinogenesis in human populations following acute exposure: nuclear explosions and medical radiation

    Energy Technology Data Exchange (ETDEWEB)

    Fabrikant, J.I.

    1981-05-01

    The current knowledge of the carcinogenic effect of radiation in man is considered. The discussion is restricted to dose-incidence data in humans, particularly to certain of those epidemiological studies of human populations that are used most frequently for risk estimation for low-dose radiation carcinogenesis in man. Emphasis is placed solely on those surveys concerned with nuclear explosions and medical exposures. (ACR)

  9. AFTER ACTION REPORT Eleventh Annual Radiation Measurement Cross Calibration Workshop (RMCC XI) Applications to Nuclear Safeguards and Security

    Energy Technology Data Exchange (ETDEWEB)

    Davisson, M L [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kristo, M J [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Fei, E [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-01-04

    The intent of this trip was to initiate discussion with the appropriate Jordanian authorities on US collaboration in their development of a nuclear forensic capability. This required firstly to determine which agency has been legally mandated to receive and analyze nuclear forensic evidence and to review their current state of readiness to assess what assistance the US would need to provide. An additional purpose, was to introduce nuclear forensic analysis by example to the several Middle East and north African country labs present at this annual meeting.

  10. Consolidation: Thwarting Nuclear Theft

    OpenAIRE

    Bunn, Matthew G.; Harrell, Eben

    2013-01-01

    At the first nuclear security summit in April 2010, the assembled leaders agreed on the goal of securing all vulnerable nuclear material worldwide within four years, including consolidating plutonium and highly enriched uranium (HEU) to fewer locations and minimizing the use of HEU “where technically and economically feasible.†Reducing the number of buildings and sites where nuclear weapons and weapons-usable nuclear material exist is a key element of preventing nuclear theft and nuclear ...

  11. Nuclear thyroid hormone receptor binding in human mononuclear blood cells after goitre resection

    DEFF Research Database (Denmark)

    Kvetny, J; Matzen, L E; Blichert-Toft, M

    1989-01-01

    Nuclear thyroxine and triiodothyronine receptor-binding in human mononuclear blood cells were examined in 14 euthyroid persons prior to and 1, 6, 24 and 53 weeks after goitre resection. One week after resection decreased serum T3 from 1.47 nmol/l to 1.14 nmol/l (P less than 0.05), FT4I from 103 a...

  12. Human performance tools in nuclear power plants. Introduction, implementation and experiences; Human Performance Tools in Kernkraftwerken. Einfuehrung, Umsetzung und Erfahrungen

    Energy Technology Data Exchange (ETDEWEB)

    Dexheimer, Kai; Bassing, Gerd [Dexcon Consulting GmbH, Neuhausen (Switzerland); Kreuzer, Peter [E.ON Kernkraft GmbH, Essenbach (Germany). Kernkraftwerk Isar

    2015-06-01

    The basis of safe nuclear power plant operation (NPP) and a strong safety culture is the professional application of Human Performance Optimisation Tools (HPO). HPO trainings have been carried out by German NPPs for a number of years and recently also by Swiss NPPs. This article describes the origination, the bases, experiences and thereby the special features of the HPO training programme applied by German NPP operators. Moreover, this article provides an outlook on future developments - in particular when considering the requirements of the ongoing phase out of nuclear energy in Germany.

  13. Big ambitions, small returns: Nuclear energy development in China and India

    Energy Technology Data Exchange (ETDEWEB)

    Xu, Yi-hong

    2010-09-15

    This paper examines nuclear energy development in China and India and the obstacles they face. It discusses the challenges for nuclear expansion: technology, economic, nuclear fuel, and public acceptance. It concludes that (1) on all three counts - energy demands, energy security and environmental pollution - the potential impact of nuclear energy will be minimal in both countries; and (2) despite the political, financial and technical obstacles for nuclear expansion and the minimal contribution of energy security, both countries will devote financial, human and political resources to their nuclear expansion. Its speed will depend on domestic and international political development.

  14. 5. PRONUCLEAR (1976 – 1986) and the training of human resources for the area of nuclear energy in Brazil

    OpenAIRE

    Schmiedecke, Winston Gomes; Pontifícia Universidade Católica de São Paulo; Porto, Paulo Alves; Instituto de Química - Universidade de São Paulo

    2010-01-01

    This paper analyzes some aspects of the process of creating specialized human resources in nuclear technology during the extent of the agreement between Brazil and West Germany, by focusing on the PRONUCLEAR (Nuclear Sector Human Resources Program). Although not many, some important positive results can be identified from the analysis of reports describing the work and track record of PRONUCLEAR: the creation of specialized training programs in nuclear technology; the improvement and redirect...

  15. Physical security and cyber security issues and human error prevention for 3D printed objects: detecting the use of an incorrect printing material

    Science.gov (United States)

    Straub, Jeremy

    2017-06-01

    A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.

  16. What Are the Security Threats to Further Development of Nuclear Power Plants in the U.S.

    Science.gov (United States)

    2010-03-01

    Sweden.224 In July 2008, Greenpeace activists climbed the Eiffel Tower in Paris, France, and attached onto the Eiffel tower a large banner with a...nuclear symbol. This was in direct correlation to Paris hosting the EU members. Furthermore, on the Eiffel Tower were the EU stars, Internet signified...newswire.com/release_1106272.html. 225 Estelle Shirbon, “Greenpeace climb Eiffel Tower in nuclear protest,” Reuters UK, July 13, 2008, http

  17. Challenges in developing human resources for nuclear safety in South Africa

    Energy Technology Data Exchange (ETDEWEB)

    Tsatsi, Louisa [National Nuclear Regulator, PO BOX 7106, 00046 Centurion (South Africa)

    2008-07-01

    Challenges in developing Human Resources for nuclear safety in South Africa ESKOM Holding Limited which is the South African Government owned utility, operates over 10 power stations. The total installed is about 40 GW, and nuclear contributes only 6 percent. The existing nuclear power station, Koeberg NPP, is comprised of two 900 MW(e) units at the South African west coast near Cape Town. The South African Government has a policy to increase the share of nuclear in the generation mix from 6 percent to 15 percent before the year 2020. The challenge is that there have been a 'greying' of nuclear experts and a shrinking of nuclear engineering and science departments. As a consequence of this, ESKOM has realized that a large number of young engineers and scientists would have to be recruited and then trained in South Africa and abroad. Some people, especially high performers in the industry are continually looking for new challenges and opportunities and though it is important in the nuclear industry to retain these key staff members it have proved to be a serious challenge. The nuclear industry had to consider their national training infrastructures and the South African government in partnership with ESKOM, NECSA and PBMR has started a process of funding university chairs in reactor engineering and allied subjects. These departments undertake research and provide training for the South African nuclear industry. The recruitment process has initially involved the transfer of personnel from ESKOM, NECSA as well as direct recruitment from the market. The primary recruitment process going forward will be from universities and other Further Education Training (FET) institutions with a focus on ESKOM and PBMR providing the specific nuclear training. In this regard, both ESKOM and PBMR provide bursaries, project work and other assistance to selected candidates. Upon completion of studies, the specific training is provided both in-house and with partner national

  18. Present status and needs of human resource development in the nuclear field in the Philippines

    Energy Technology Data Exchange (ETDEWEB)

    Bernido, Corazon C.; Roceles, Pilar C. [Philippine Nuclear Research Institute, Commonwealth Avenue, Diliman, Quezon (Philippines)

    2000-12-01

    The first nuclear power plant was nearing completion. However, due to change in political climate and support for the nuclear power program, this has been mothballed. There is a possibility for the introduction of nuclear power plant in the country's projected energy sources by the year 2020. The country has one research reactor, but at the present time it is undergoing repair and is not operational. The Philippine Nuclear Research Institute (PNRI), an Institute under the Department of Science and Technology (DOST), is the sole government agency mandated by the law to take charge of all matters pertaining to nuclear science and technology, and the regulation of nuclear energy. There is one another government agency, the Radiation Health Service (RHS) of the Department of Health, which is responsible for regulating the use and application of X-rays and non-ionizing radiation. The PNRI conducts national training courses in nuclear science and technology, and radiation protection to users of radioisotopes. Individual courses are outlined in the paper. Up to the present time, around 7,300 have participated in national training courses conducted by PNRI. Distributions of PNRI trainees are: 53 % for industrial, 12 % medical, 12 % for academe, and 23 % for others. Nuclear science and technology education in schools and universities are presented. The International Atomic Energy Agency (IAEA) training activities availed 77 % of the total foreign training from 1993 to 1998; Japan follows next at 20 %; and others comprise the remaining 3 %. An approach to training and human resources development, which could reach out to more target trainees, is Distance Learning. In 1998, as a part of a Regional Cooperative Agreement (RCA) and IAEA project, the Philippines participated in the trial of distance learning modules in radiation protection. The distance learning modules were developed at the Australian Nuclear Science and Technology Organization (ANSTO). These modules will

  19. Identification of a functional nuclear localization signal within the human USP22 protein

    Energy Technology Data Exchange (ETDEWEB)

    Xiong, Jianjun [Key Laboratory of Jiangxi Province for the Systems Bio-Medicine, Jiujiang, Jiangxi Province 332000 (China); College of Basic Medical Science, Jiujiang University, Jiujiang, Jiangxi Province 332000 (China); Wang, Yaqin [Reproductive Medical Center, Renmin Hospital of Wuhan University, Wuhan, Hubei Province 430060 (China); Gong, Zhen [Key Laboratory of Jiangxi Province for the Systems Bio-Medicine, Jiujiang, Jiangxi Province 332000 (China); Liu, Jianyun [College of Basic Medical Science, Jiujiang University, Jiujiang, Jiangxi Province 332000 (China); Li, Weidong, E-mail: lwd626518@163.com [College of Basic Medical Science, Jiujiang University, Jiujiang, Jiangxi Province 332000 (China)

    2014-06-20

    Highlights: • USP22 was accumulated in nucleus. • We identified of a functional USP22 NLS. • The KRRK amino acid residues are indispensable in NLS. • The KRRK motif is conserved in USP22 homologues. - Abstract: Ubiquitin-specific processing enzyme 22 (USP22), a member of the deubiquitinase family, is over-expressed in most human cancers and has been implicated in tumorigenesis. Because it is an enzymatic subunit of the human SAGA transcriptional cofactor, USP22 deubiquitylates histone H2A and H2B in the nucleus, thus participating in gene regulation and cell-cycle progression. However, the mechanisms regulating its nuclear translocation have not yet been elucidated. It was here demonstrated that USP22 is imported into the nucleus through a mechanism mediated by nuclear localization signal (NLS). The bipartite NLS sequence KRELELLKHNPKRRKIT (aa152–168), was identified as the functional NLS for its nuclear localization. Furthermore, a short cluster of basic amino acid residues KRRK within this bipartite NLS plays the primary role in nuclear localization and is evolutionarily conserved in USP22 homologues. In the present study, a functional NLS and the minimal sequences required for the active targeting of USP22 to the nucleus were identified. These findings may provide a molecular basis for the mechanism underlying USP22 nuclear trafficking and function.

  20. Human sex ratio at birth and residential proximity to nuclear facilities in France.

    Science.gov (United States)

    Scherb, Hagen; Kusmierz, Ralf; Voigt, Kristina

    2016-04-01

    The possible detrimental genetic impact on humans living in the vicinity of nuclear facilities has been previously studied. We found evidence for an increase in the human secondary sex ratio (sex odds) within distances of up to 35km from nuclear facilities in Germany and Switzerland. Here, we extend our pilot investigations using new comprehensive data from France. The French data (1968-2011) account for 36,565 municipalities with 16,968,701 male and 16,145,925 female births. The overall sex ratio was 1.0510. Using linear and nonlinear logistic regression models with dummy variables coding for appropriately grouped municipalities, operation time periods, and corresponding spatiotemporal interactions, we consider the association between annual municipality-level birth sex ratios and minimum distances of municipalities from nuclear facilities. Within 35km from 28 nuclear sites in France, the sex ratio is increased relative to the rest of France with a sex odds ratio (SOR) of 1.0028, (95% CI: 1.0007, 1.0049). The detected association between municipalities' minimum distances from nuclear facilities and the sex ratio in France corroborates our findings for Germany and Switzerland.

  1. Technology Roadmap Instrumentation, Control, and Human-Machine Interface to Support DOE Advanced Nuclear Energy Programs

    Energy Technology Data Exchange (ETDEWEB)

    Donald D Dudenhoeffer; Burce P Hallbert

    2007-03-01

    Instrumentation, Controls, and Human-Machine Interface (ICHMI) technologies are essential to ensuring delivery and effective operation of optimized advanced Generation IV (Gen IV) nuclear energy systems. In 1996, the Watts Bar I nuclear power plant in Tennessee was the last U.S. nuclear power plant to go on line. It was, in fact, built based on pre-1990 technology. Since this last U.S. nuclear power plant was designed, there have been major advances in the field of ICHMI systems. Computer technology employed in other industries has advanced dramatically, and computing systems are now replaced every few years as they become functionally obsolete. Functional obsolescence occurs when newer, more functional technology replaces or supersedes an existing technology, even though an existing technology may well be in working order.Although ICHMI architectures are comprised of much of the same technology, they have not been updated nearly as often in the nuclear power industry. For example, some newer Personal Digital Assistants (PDAs) or handheld computers may, in fact, have more functionality than the 1996 computer control system at the Watts Bar I plant. This illustrates the need to transition and upgrade current nuclear power plant ICHMI technologies.

  2. Reconstruction of adenovirus replication origins with a human nuclear factor I binding site.

    Science.gov (United States)

    Adhya, S; Shneidman, P S; Hurwitz, J

    1986-03-05

    Nuclear factor I is a host-coded DNA-binding protein that stimulates initiation of adenovirus DNA replication. To understand the mechanism of action of nuclear factor I, we have constructed, by recombinant DNA techniques, origins of replication in which the adenovirus type 5 nuclear factor I binding site (FIB site) has been replaced by a FIB site isolated from human genomic DNA (Gronostajski, R. M., Nagata, K., and Hurwitz, J. (1984) Proc. Natl. Acad. Sci. U. S. A. 81, 4013-4017). Assays of such recombinants for initiation and elongation in vitro showed that nuclear factor I was active only when the FIB site was relatively close to the DNA terminus, i.e. the FIB site was centered at nucleotides 30-36 from the end of the DNA. Nuclear factor I was active in either orientation within this distance range. The presence of one or two additional FIB sites in the downstream region had no effect. The implications of these results for the mechanism of nuclear factor I action are discussed.

  3. Expression of maturation-specific nuclear antigens in differentiating human myeloid leukemia cells

    Energy Technology Data Exchange (ETDEWEB)

    Murao, S.; Epstein, A.L.; Clevenger, C.V.; Huberman, E.

    1985-02-01

    The expression of three myeloid-specific nuclear antigens was studied by indirect immunofluorescence with murine monoclonal antibodies in human myeloid (HL-60, ML-2, KG-1, and B-II) leukemia cells treated with chemical inducers of cell differentiation. Treatment of the promyelocytic HL-60 cells with dimethyl sulfoxide or 1,25-dihydroxyvitamin DT induced the cells to acquire a phenotype that resembled that of granulocytes and monocytesmacrophages, respectively. These phenotypes were characterized by changes in cell growth, cell morphology, expression of specific cell surface antigens, and activities of lysozyme and nonspecific esterase enzymes. Induction of these differentiation markers in the HL-60 cells was associated with induction of the myeloid-specific nuclear antigens. The ML-2 cells, which are arrested at the myeloblast-promyelocyte stage, were also susceptible to the induction of cell differentiation and to changes in the expression of the nuclear antigens, but the degree of susceptibility was less than in the HL-60 cells. The less-differentiated KG-1 and B-II myeloid cells were either not responsive or responded only in a limited degree to the induction of cell differentiation or to changes in the expression of the nuclear antigens. The authors suggest that the reactivity of cells with monoclonal antibodies to specific nuclear antigens can be used as a maturational marker in cell differentiation studies. Furthermore, nuclear antigens expressed early in cellular differentiation may provide information about changes in regulatory elements in normal and malignant cells. 40 references, 2 figures, 1 table.

  4. The human nuclear poly(a-binding protein promotes RNA hyperadenylation and decay.

    Directory of Open Access Journals (Sweden)

    Stefan M Bresson

    Full Text Available Control of nuclear RNA stability is essential for proper gene expression, but the mechanisms governing RNA degradation in mammalian nuclei are poorly defined. In this study, we uncover a mammalian RNA decay pathway that depends on the nuclear poly(A-binding protein (PABPN1, the poly(A polymerases (PAPs, PAPα and PAPγ, and the exosome subunits RRP6 and DIS3. Using a targeted knockdown approach and nuclear RNA reporters, we show that PABPN1 and PAPα, redundantly with PAPγ, generate hyperadenylated decay substrates that are recognized by the exosome and degraded. Poly(A tail extension appears to be necessary for decay, as cordycepin treatment or point mutations in the PAP-stimulating domain of PABPN1 leads to the accumulation of stable transcripts with shorter poly(A tails than controls. Mechanistically, these data suggest that PABPN1-dependent promotion of PAP activity can stimulate nuclear RNA decay. Importantly, efficiently exported RNAs are unaffected by this decay pathway, supporting an mRNA quality control function for this pathway. Finally, analyses of both bulk poly(A tails and specific endogenous transcripts reveals that a subset of nuclear RNAs are hyperadenylated in a PABPN1-dependent fashion, and this hyperadenylation can be either uncoupled or coupled with decay. Our results highlight a complex relationship between PABPN1, PAPα/γ, and nuclear RNA decay, and we suggest that these activities may play broader roles in the regulation of human gene expression.

  5. Managing the human factor in information security how to win over staff and influence business managers

    CERN Document Server

    Lacey, David

    2009-01-01

    With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years'' experience, this book examines how fundamental staff awareness is to establishing security and addresses such challenges as containing threats, managing politics, developing programs, and getting a business to buy into a security plan. Illustrated with real-world examples throughout, this is a must-have guide for security and IT professionals.

  6. A summary of the 2nd workshop on Human Resources Development (HRD) in the nuclear field in Asia. FY2000

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-06-01

    The Human Resources Development (HRD) Project was added in 1999 as a Cooperation Activity of 'the Forum for Nuclear Cooperation in Asia (FNCA)' which is organized by Nuclear Committee. The HRD Project supports to solidify the foundation of nuclear development utilization in Asia by promoting human resources development in Asian countries. The principal activity of the HRD Project is to hold the Workshop on Human Resources Development in the Nuclear Field in Asia once a year. The objective of the Workshop is to clarify problems and needs of the human resources development of each country and to support it mutually by exchanging information etc. The report consists of a summary of the 2nd Workshop on Human Resources Development in the Nuclear Field in Asia held on November 27 and 28, 2000 at Tokai Research Establishment of JAERI. (author)

  7. The human and the social: Asystematised comparison of the discourses of human development, human security and social quality.

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2011-01-01

    markdownabstract__Abstract__ This paper presents a structured comparison of the social quality approach with the UNDP-led ‘human development’ approach and the sister work (especially in the UN system and Japan) on ‘human security’. Through clarification of their respective foci and roles and underl

  8. Human somatic cell nuclear transfer and reproductive cloning: an Ethics Committee opinion.

    Science.gov (United States)

    2016-04-01

    This document presents arguments that conclude that it is unethical to use somatic cell nuclear transfer (SCNT) for infertility treatment due to concerns about safety; the unknown impact of SCNT on children, families, and society; and the availability of other ethically acceptable means of assisted reproduction. This document replaces the ASRM Ethics Committee report titled, "Human somatic cell nuclear transfer and cloning," last published in Fertil Steril 2012;98:804-7. Copyright © 2016 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  9. Fukushima nuclear accident: preliminary assessment of the risks to non-human biota.

    Science.gov (United States)

    Aliyu, Abubakar Sadiq; Ramli, Ahmad Termizi; Garba, Nuraddeen Nasiru; Saleh, Muneer Aziz; Gabdo, Hamman Tukur; Liman, Muhammad Sanusi

    2015-02-01

    This study assesses the 'radio-ecological' impacts of Fukushima nuclear accident on non-human biota using the ERICA Tool, which adopts an internationally verified methodology. The paper estimates the impacts of the accident on terrestrial and marine biota based on the environmental data reported in literature for Japan, China, South Korea and the USA. Discernible impacts have been detected in the marine biota around Fukushima Daiichi nuclear power plant. This study confirms that the Fukushima accident had caused heavier damage to marine bionts compared with terrestrial flora and fauna, in Japan.

  10. Modeling for climate change in the aspect of nuclear energy priority: Nuclear power energy-based convergence social-humanity analysis

    Energy Technology Data Exchange (ETDEWEB)

    Woo, Tae Ho [Systemix Global Co. Ltd., Seoul, (Korea, Republic of)

    2015-05-15

    Following the industry expansion, the energy consumptions have increased steeply, which have produced the global warming in our lives by carbon production energies. This climate change has provoked significant natural disasters which have damaged to social as well economic matters. Considering the non-carbon production which is the major factor of global warming, nuclear energy is a newly spotlighted source as the green energy source. The climate change factor is affected by the carbon productions made by humans. Then, the nuclear energy increasing rate with the climate change factor affects to the temperature change which is expressed by annual anomaly. Fig. 6 is the protocol for climate change investigation incorporated with the nuclear industry where the climate factor like the temperature is an important index to find out the priority of nuclear energy. The increased environmental pollutions can give the expanding of nuclear energy due to the carbon gas of fossil fuels. This study showed the effectiveness of the nuclear energy by the simulations. The seasonal climate disaster like the very cold winter and very hot summer can increase the necessity of nuclear energy development which could appeal to the general public persons as well as the politicians. So, it is important for the nuclear energy manager to make people understand the importance of the nuclear energy comparing to the oil or coal fuels. The regeneration energy has been considered as the alternative source.

  11. Human trafficking as a threat for the security of member states of EU

    Directory of Open Access Journals (Sweden)

    Mirela Kapo

    2017-07-01

    Full Text Available The topic “Trafficking of human beings” as subject to advanced studies has been chosen due to a growing interest linked with the phenomenon in question. The study introduces a legal criminal overview of the criminal activity consisted of the recruitment, transport, transfer or reception of persons by means of force or forms of fraud for exploitation purposes. Human trafficking represents a threat for the security of member states. The trend to penetrate to all spheres of the society has obliged the European states to draft a new directive reflecting the growing concern about the phenomenon in question, by respecting human rights in accordance with the legal framework under the United Nations, International Labor Organization (ILO, and Council of Europe etc. The new European priorities aim at victims’ identification, their protection and prevention of the phenomenon and more intense criminal prosecution of traffickers. With the view of fully developing this topic, the outline consists of four chapters preceded by a historical background of human trafficking. Special importance in this study, specifically in the second chapter, is attached to the assistance and protection of the victims of human trafficking. It is crucial that these victims exercise their rights effectively. Therefore, the European directives foresee assistance and support before, after and during the criminal proceeding. The third chapter refers to the relevant legal mechanisms in this field assuring the victims of trafficking legal defense, the right to information and their social, psychological and physical recovery. One of the “key” legal instruments is the Palermo Convention, which gives for the first time a detailed definition of the term of trafficking and smuggling and makes the differences between them. All legal instruments converge to one point: the consent of the human trafficking victim is not important when it is used any of the means of force, threat

  12. Study on Model for Human Resources Development Strategy in the Nuclear Field

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Eui Jin [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    2005-07-01

    Qualified manpower is an essential for the successful implementation of a national long-term nuclear development program as well as the associated R and D programs. Such manpower could only be developed systematically under a well-established national model and strategy, which addresses the demand for human resources, number of personnel and timing, and the education and training. To discuss a model for human resources development, it is suggested to consider the following: approach to the Human Resources Development (HRD) Model, HRD policy targets, estimation of the manpower requirement, organizational coordination frameworks for the HRD, promotion of HRD in the action plan.

  13. Expert system with fuzzy logic for the calculation of performance and security indicators in monitoring and strategic planning of nuclear power plants; Sistema especialista com logica nebulosa para o calculo de indicadores de desempenho e seguranca na monitoracao e planejamento estrategico de usinas nucleares

    Energy Technology Data Exchange (ETDEWEB)

    Souto, Kelling C.; Schirru, Roberto [Universidade Federal, Rio de Janeiro, RJ (Brazil). Coordenacao dos Programas de Pos-graduacao de Engenharia. Lab. de Monitoracao de Processos]. E-mail: kelling@lmp.ufrj.br; schirru@lmp.ufrj.br

    2005-07-01

    This work develops the start to an expert system, which is able to infer about a generic structure of indicators, in order to monitor, measure and evaluate questions related to project, security operation and human performance according to politics, objectives and goals of the nuclear power plant Angra 2. This structure, organized in graphics, inserted in the context of orientation towards objects, represents the knowledge about the expert system and is mapped out in a fuzzy context. The engine of inference is of backward chaining type associated to a process of search in depths, in such a way that it establishes the representative status of the plant, making possible to analyze and manage the mission of its situation. (author)

  14. Cultivation and differentiation change nuclear localization of chromosome centromeres in human mesenchymal stem cells.

    Directory of Open Access Journals (Sweden)

    Yana I Voldgorn

    Full Text Available Chromosome arrangement in the interphase nucleus is not accidental. Strong evidences support that nuclear localization is an important mechanism of epigenetic regulation of gene expression. The purpose of this research was to identify differences in the localization of centromeres of chromosomes 6, 12, 18 and X in human mesenchymal stem cells depending on differentiation and cultivating time. We analyzed centromere positions in more than 4000 nuclei in 19 mesenchymal stem cell cultures before and after prolonged cultivation and after differentiation into osteogenic and adipogenic directions. We found a centromere reposition of HSAX at late passages and after differentiation in osteogenic direction as well as of HSA12 and HSA18 after adipogenic differentiation. The observed changes of the nuclear structure are new nuclear characteristics of the studied cells which may reflect regulatory changes of gene expression during the studied processes.

  15. Interleukin-2 induces tyrosine phosphorylation and nuclear translocation of stat3 in human T lymphocytes

    DEFF Research Database (Denmark)

    Nielsen, M; Svejgaard, A; Skov, S

    1994-01-01

    that stimulation through the IL-2R induced tyrosine phosphorylation and subsequent nuclear translocation of stat3, a newly identified member of the signal transducers and activators of transcription (STAT) family of proteins. In contrast, stat1 proteins were not tyrosine phosphorylated after IL-2 ligation, whereas...... an apparent molecular mass of 84 kDa and was not recognized by stat3 or stat1 mAb or antisera. Since IL-2 induced nuclear translocation of the 84 kDa protein and stat3 followed identical kinetics, p84 is a candidate for a new, yet undefined, member of the STAT family. Taken together, we report that IL-2...... induces tyrosine phosphorylation and subsequent nuclear translocation of stat3 and an as yet undefined 84-kDa protein in antigen-specific human T cell lines....

  16. Cultivation and differentiation change nuclear localization of chromosome centromeres in human mesenchymal stem cells.

    Science.gov (United States)

    Voldgorn, Yana I; Adilgereeva, Elmira P; Nekrasov, Evgeny D; Lavrov, Alexander V

    2015-01-01

    Chromosome arrangement in the interphase nucleus is not accidental. Strong evidences support that nuclear localization is an important mechanism of epigenetic regulation of gene expression. The purpose of this research was to identify differences in the localization of centromeres of chromosomes 6, 12, 18 and X in human mesenchymal stem cells depending on differentiation and cultivating time. We analyzed centromere positions in more than 4000 nuclei in 19 mesenchymal stem cell cultures before and after prolonged cultivation and after differentiation into osteogenic and adipogenic directions. We found a centromere reposition of HSAX at late passages and after differentiation in osteogenic direction as well as of HSA12 and HSA18 after adipogenic differentiation. The observed changes of the nuclear structure are new nuclear characteristics of the studied cells which may reflect regulatory changes of gene expression during the studied processes.

  17. Investigation regarding the long-term security developments in the Swedish nuclear power and the response to the accident at Fukushima; Utredning avseende den laangsiktiga saekerhetsutvecklingen i den svenska kaernkraften och aatgaerder med anledning av olyckan i Fukushima

    Energy Technology Data Exchange (ETDEWEB)

    Skaanberg, Lars

    2012-07-01

    Swedish nuclear plants need to continue to work on analysis and actions in the plants, partly to meet the demands of legislation and agreed action plans, and partly due to additional security requirements on account of experiences from the Fukushima Dai-ichi accident, stress tests, security investigations and investigations relating to physical protection. It is also essential to continue with safety improvements to gradually increase margins against unforeseen events in aging plants during long-term operation.

  18. How Robust Refugee Protection Policies Can Strengthen Human and National Security

    Directory of Open Access Journals (Sweden)

    Donald Kerwin

    2016-09-01

    Full Text Available This paper makes the case that refugee protection and national security should be viewed as complementary, not conflicting state goals. It argues that refugee protection can further the security of refugees, affected states, and the international community. Refugees and international migrants can also advance national security by contributing to a state’s economic vitality, military strength, diplomatic standing, and civic values. The paper identifies several strategies that would, if implemented, promote both security and refugee protection. It also outlines additional steps that the US Congress should take to enhance US refugee protection policies and security. Finally, it argues for the efficacy of political engagement in support of pro-protection, pro-security policies, and against the assumption that political populism will invariably impede support for refugee protection.

  19. Establishing a value chain for human factors in nuclear power plantcontrol room modernization

    Energy Technology Data Exchange (ETDEWEB)

    Joe, Jeffrey Clark [Idaho National Laboratory; Thomas, Kenneth David [Idaho National Laboratory; Boring, Ronald Laurids [Idaho National Laboratory

    2015-07-01

    Commercial nuclear power plants in the United States (U.S.) have operated reliably and efficiently for decades. With the life extensions of plants now being planned for operation beyond their original operating licenses, there are opportunities to achieve even greater efficiencies, while maintaining high operational reliabilities, with strategic, risk- and economically-informed, upgrades to plant systems and infrastructure. The U.S. Department of Energy’s Light Water Reactor Sustainability (LWRS) program supports the commercial nuclear industry’s modernization efforts through research and development (R&D) activities across many areas to help establish the technical and economic bases for modernization activities. The Advanced Instrumentation, Information, and Control Systems Technologies pathway is one R&D focus area for the LWRS program, and has researchers at Idaho National Laboratory working with select utility partners to use human factors and instrumentation and controls R&D to help modernize the plant’s main control room. However, some in the nuclear industry have not been as enthusiastic about using human factors R&D to inform life extension decision making. Part of the reason for this may stem from uncertainty decision-makers have regarding how human factors fits into the value chain for nuclear power plant control room modernization. This paper reviews past work that has attempted to demonstrate the value of human factors, and then describes the value chain concept, how it applies to control room modernization, and then makes a case for how and why human factors is an essential link in the modernization value chain.

  20. An evaluation of the role of nuclear cytoplasmic ratios and nuclear volume densities as diagnostic indicators in metaplastic, dysplastic and neoplastic lesions of the human cheek

    OpenAIRE

    1997-01-01

    The increase in nuclear cytoplasmic (NIC) ratio is one of the features of cellular atypia which is used in the histopathological assessment of premalignant lesions of the oral mucosa. Since this feature is readily quantifiable using morphometry, we have analysed both N/C and nuclear volume densities in basal and spinous cells from human cheek lesions with and without malignant potential in order to ascertain the validity of this parameter as a predictor. Using ...

  1. Changing nuclear landscape and unique PML structures during early epigenetic transitions of human embryonic stem cells.

    Science.gov (United States)

    Butler, John T; Hall, Lisa L; Smith, Kelly P; Lawrence, Jeanne B

    2009-07-01

    The complex nuclear structure of somatic cells is important to epigenomic regulation, yet little is known about nuclear organization of human embryonic stem cells (hESC). Here we surveyed several nuclear structures in pluripotent and transitioning hESC. Observations of centromeres, telomeres, SC35 speckles, Cajal Bodies, lamin A/C and emerin, nuclear shape and size demonstrate a very different "nuclear landscape" in hESC. This landscape is remodeled during a brief transitional window, concomitant with or just prior to differentiation onset. Notably, hESC initially contain abundant signal for spliceosome assembly factor, SC35, but lack discrete SC35 domains; these form as cells begin to specialize, likely reflecting cell-type specific genomic organization. Concomitantly, nuclear size increases and shape changes as lamin A/C and emerin incorporate into the lamina. During this brief window, hESC exhibit dramatically different PML-defined structures, which in somatic cells are linked to gene regulation and cancer. Unlike the numerous, spherical somatic PML bodies, hES cells often display approximately 1-3 large PML structures of two morphological types: long linear "rods" or elaborate "rosettes", which lack substantial SUMO-1, Daxx, and Sp100. These occur primarily between Day 0-2 of differentiation and become rare thereafter. PML rods may be "taut" between other structures, such as centromeres, but clearly show some relationship with the lamina, where PML often abuts or fills a "gap" in early lamin A/C staining. Findings demonstrate that pluripotent hES cells have a markedly different overall nuclear architecture, remodeling of which is linked to early epigenomic programming and involves formation of unique PML-defined structures.

  2. The nuclear transport capacity of a human-pancreatic ribonuclease variant is critical for its cytotoxicity.

    Science.gov (United States)

    Tubert, Pere; Rodríguez, Montserrat; Ribó, Marc; Benito, Antoni; Vilanova, Maria

    2011-10-01

    We have previously described a human pancreatic-ribonuclease variant, named PE5, which carries a non-contiguous extended bipartite nuclear localization signal. This signal comprises residues from at least three regions of the protein. We postulated that the introduction of this signal in the ribonuclease provides it with cytotoxic activity because although the variant poorly evades the ribonuclease inhibitor in vitro, it is routed to the nucleus, which is devoid of the inhibitor. In this work, we have investigated the relationship between the cytotoxicity produced by PE5 and its ability to reach the nucleus. First, we show that this enzyme, when incubated with HeLa cells, specifically cleaves nuclear RNA while it leaves cytoplasmic RNA unaffected. On the other hand, we have created new variants in which the residues of the nuclear localization signal that are important for the nuclear transport have been replaced. As expected, the individual changes produce a significant decrease in the cytotoxicity of the resulting variants. We conclude that the nuclear transport of PE5 is critical for its cytotoxicity. Therefore, routing a ribonuclease to the nucleus is an alternative strategy to endow it with cytotoxic activity.

  3. Intracellular localization of human cytidine deaminase. Identification of a functional nuclear localization signal.

    Science.gov (United States)

    Somasekaram, A; Jarmuz, A; How, A; Scott, J; Navaratnam, N

    1999-10-01

    The cytidine deaminases belong to the family of multisubunit enzymes that catalyze the hydrolytic deamination of their substrate to a corresponding uracil product. They play a major role in pyrimidine nucleoside and nucleotide salvage. The intracellular distribution of cytidine deaminase and related enzymes has previously been considered to be cytosolic. Here we show that human cytidine deaminase (HCDA) is present in the nucleus. A highly specific, affinity purified polyclonal antibody against HCDA was used to analyze the intracellular localization of native HCDA in a variety of mammalian cells by in situ immunochemistry. Native HCDA was found to be present in the nucleus as well as the cytoplasm in several cell types. Indirect immunofluorescence microscopy indicated a predominantly nuclear localization of FLAG-tagged HCDA overexpressed in these cells. We have identified an amino-terminal bipartite nuclear localization signal that is both necessary and sufficient to direct HCDA and a non-nuclear reporter protein to the nucleus. We also show HCDA binding to the nuclear import receptor, importin alpha. Similar putative bipartite nuclear localization sequences are found in other cytidine/deoxycytidylate deaminases. The results presented here suggest that the pyrimidine nucleotide salvage pathway may operate in the nucleus. This localization may have implications in the regulation of nucleoside and nucleotide metabolism and nucleic acid biosynthesis.

  4. A development of the Human Factors Assessment Guide for the Study of Erroneous Human Behaviors in Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Yeon Ju; Lee, Yong Hee; Jang, Tong Il; Kim, Sa Kil [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-08-15

    The aim of this paper is to describe a human factors assessment guide for the study of the erroneous characteristic of operators in nuclear power plants (NPPs). We think there are still remaining the human factors issues such as an uneasy emotion, fatigue and stress, varying mental workload situation by digital environment, and various new type of unsafe response to digital interface for better decisions, although introducing an advanced main control room. These human factors issues may not be resolved through the current human reliability assessment which evaluates the total probability of a human error occurring throughout the completion of a specific task. This paper provides an assessment guide for the human factors issues a set of experimental methodology, and presents an assessment case of measurement and analysis especially from neuro physiology approach. It would be the most objective psycho-physiological research technique on human performance for a qualitative analysis considering the safety aspects. This paper can be trial to experimental assessment of erroneous behaviors and their influencing factors, and it can be used as an index for recognition and a method to apply human factors engineering V and V, which is required as a mandatory element of human factor engineering program plan for a NPP design.

  5. The doctrine of human security in Canadian foreign policy: Lloyd Axworthy’s contribution to the study of world policy

    Directory of Open Access Journals (Sweden)

    Jonathan Ortiz Navarrete

    2003-01-01

    Full Text Available The multitude of changes on the international scene during the 1990’s had a major impact on thinking in the area of international relations as well as on the foreign policy decision-making processes of all nation states. One of the most difficult issues to redefine and to give a meaning appropriate to the international needs of the moment was that of security. Lloyd Axworthy, Canada’s Minister of Foreign Affairs from 1996 to 2000, convinced that, with the end of bipolarity, the challenges to security had moved from the level of states to concerns more closely related to the well-being of individuals, undertook the task of promoting, as part of his country’s foreign policy, the concept of human security.

  6. Handbook of human-reliability analysis with emphasis on nuclear power plant applications. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Swain, A D; Guttmann, H E

    1983-08-01

    The primary purpose of the Handbook is to present methods, models, and estimated human error probabilities (HEPs) to enable qualified analysts to make quantitative or qualitative assessments of occurrences of human errors in nuclear power plants (NPPs) that affect the availability or operational reliability of engineered safety features and components. The Handbook is intended to provide much of the modeling and information necessary for the performance of human reliability analysis (HRA) as a part of probabilistic risk assessment (PRA) of NPPs. Although not a design guide, a second purpose of the Handbook is to enable the user to recognize error-likely equipment design, plant policies and practices, written procedures, and other human factors problems so that improvements can be considered. The Handbook provides the methodology to identify and quantify the potential for human error in NPP tasks.

  7. Human Security in World Affairs: A Pedagogical, Multi-disciplinary Approach

    Directory of Open Access Journals (Sweden)

    John Janzekovic

    2014-01-01

    Full Text Available Alexander and Sabina Lautensach (editors propose that their book is primarily intended for students and for teaching, and that a pedagogical approach was prioritised rather than a reproduction in the standard format of an academic monograph (p. XVII. Throughout, they aim for a diverse, multi/trans-disciplinary approach in content and presentation by contributors with potential student outcomes focused on flexibility and a broad spectrum knowledge and understanding of human security. To these ends they have been very successful. This hefty tome, almost encyclopaedic in its scope and depth, needs to be approached by students in a certain way. That is, students will benefit from some directed guidance regarding approach and methodology in order to successfully navigate through the many detailed concepts, theories and practicalities contained in the book. This is clearly provided in the preface where the authors spend quite some time outlining the rationale of the book in a simple and easy to understand way that will be particularly useful for students and other engaged readers.

  8. Protecting human health and security in digital Europe: how to deal with the "privacy paradox"?

    Science.gov (United States)

    Büschel, Isabell; Mehdi, Rostane; Cammilleri, Anne; Marzouki, Yousri; Elger, Bernice

    2014-09-01

    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to shed light on the tension between secrecy and transparency in the digital era. A special focus is put from the perspectives of psychology, medical ethics and European law on the contradiction between individuals' motivations for consented processing of personal data and their fears about unknown disclosure, transferal and sharing of personal data via information and communication technologies (named the "privacy paradox"). Potential benefits and harms for the individual and society resulting from the use of computers, mobile phones, the Internet and social media are being discussed. Furthermore, the authors point out the ethical and legal limitations inherent to the processing of personal data in a democratic society governed by the rule of law. Finally, they seek to demonstrate that the impact of information and communication technology use on the individuals' well-being, the latter being closely correlated with a high level of fundamental rights protection in Europe, is a promising feature of the socalled "e-democracy" as a new way to collectively attribute meaning to large-scale online actions, motivations and ideas.

  9. Human-Machine interface for off normal and emergency situations in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Kee Choon [Korea Atomic Energy Research Institute, Taejeon (Korea)

    2000-01-01

    Many nuclear power plants (NPPs) have reported that a high percentage of all major failures in the plants are caused by human errors. Therefore, there has been much focus on elimination of human errors, enhancement of human performance, and general improvement of human machine interface (HMI). Both the utility management and the regulators are demanding improvement in this area. The International Atomic Energy Agency (IAEA) Specialists' Meeting on 'Human-Machine Interface for Off Normal and Emergency Situations in Nuclear Power Plants' was co-organized by the Korea Atomic Energy Research Institute (KAERI) and the Korea Power Engineering Company, INC (KOPEC), and took place in Taejeon, Republic of Korea, 1999 October 26-28. Fifty eight participants, representing nine member countries reviewed recent developments and discussed directions for future efforts in the Human-Machine Interface for Off Normal and Emergency Situations in NPPs. Twenty papers were presented, covering a wide spectrum of technical and scientific subjects including recent experience and benefits from Operational Experience with HMI, Development of HMI System, Licensing Issues for HMI and Future Development and Trends. (Author)

  10. Timing of human protein evolution as revealed by massively parallel capture of Neandertal nuclear DNA sequences

    Science.gov (United States)

    Burbano, Hernán A.; Hodges, Emily; Green, Richard E.; Briggs, Adrian W.; Krause, Johannes; Meyer, Matthias; Good, Jeffrey M.; Maricic, Tomislav; Johnson, Philipp L.F.; Xuan, Zhenyu; Rooks, Michelle; Bhattacharjee, Arindam; Brizuela, Leonardo; Albert, Frank W.; de la Rasilla, Marco; Fortea, Javier; Rosas, Antonio; Lachmann, Michael; Hannon, Gregory J.; Pääbo, Svante

    2010-01-01

    Whole genome shotgun sequencing is now possible for extinct organisms, as well as the targeted capture of specific regions. However, targeted resequencing of megabase sized parts of nuclear genomes has yet to be demonstrated for ancient DNA. Here we show that hybridization capture on microarrays can be used to generate large scale targeted data from Neandertal DNA even in the presence of ~99.8% microbial DNA. It is thus now possible to generate high quality data from large regions of the nuclear genome from Neandertals and other extinct organisms. Using this approach we have sequenced ~14,000 protein coding positions that have been inferred to have changed on the human lineage since the last common ancestor shared with chimpanzees. We identify 88 amino acid substitutions that have become fixed in all humans since the divergence from the Neandertals. PMID:20448179

  11. Nuclear pseudogenes of mitochondrial DNA as a variable part of the human genome

    Institute of Scientific and Technical Information of China (English)

    YUANJINDUO; JINXIUSHI; 等

    1999-01-01

    Novel pseudogenes homologous to the mitochondrial (mt) 16S rRNA gene were detected via different approaches.Eight preudogenes were sequenced.Copy number polymorphism of the mtDNA pseudogenes was observed among randomly chosen individuals,and even among siblings.A mtDNA pseudogene in the Ychromosome was observed in a YAC clone carrying only repetitive sequence tag site(STS).PCR screening of human yeast artificial chromosome (YAC)libraries showed that there were at least 5.7×105 bp of the mtDNA pseudogenes in each haploid nuclear genome.Possible involvement of the mtDNA pseudogenes in the variable part of the human nuclear genome is discussed.

  12. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  13. (In)security factor atomic bomb. An analysis of the crisis with the Iranian nuclear program; (Un-)Sicherheitsfaktor Atombombe. Eine Analyse der Krise um das iranische Nuklearprogramm

    Energy Technology Data Exchange (ETDEWEB)

    Bock, Andreas [Augsburg Univ. (Germany). Lehrstuhl fuer Friedens- und Konfliktforschung

    2012-04-15

    Iran is a rational actor in the international politics that decides on the basis of the perception of threat. Iran's security situation is comparable with that of Israel with the rational consequence to rely on the atomic program with respect to deterrence and self-defense. The solution of the Iran crisis is basically dependent on a change of the perception of threat. A military act against the Iranian nuclear facilities would be counterproductive, would only slowing down the program but not prevent further activities. In fact a military act would enhance the perception of threat. For the analysis of the Iran crises the author used the Cuba crisis as blueprint, were mislead perceptions were responsible for the escalation.

  14. Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience

    Science.gov (United States)

    Thompson, Eleanor Elizabeth

    2014-01-01

    That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…

  15. Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience

    Science.gov (United States)

    Thompson, Eleanor Elizabeth

    2014-01-01

    That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…

  16. Nuclear Operations Application to Environmental Restoration at Corrective Action Unit 547, Miscellaneous Contaminated Waste Sites, at the Nevada National Security Site

    Energy Technology Data Exchange (ETDEWEB)

    Kevin Cabble (NSO), Mark Krauss and Patrick Matthews (N-I)

    2011-03-03

    The U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office has responsibility for environmental restoration at the Nevada National Security Site (formerly the Nevada Test Site). This includes remediation at locations where past testing activities have resulted in the release of plutonium to the environment. One of the current remediation efforts involves a site where an underground subcritical nuclear safety test was conducted in 1964. The underground test was vented through a steel pipe to the surface in a closed system where gas samples were obtained. The piping downstream of the gas-sampling apparatus was routed belowground to a location where it was allowed to vent into an existing radioactively contaminated borehole. The length of the pipe above the ground surface is approximately 200 meters. This pipe remained in place until remediation efforts began in 2007, at which time internal plutonium contamination was discovered. Following this discovery, an assessment was conducted to determine the quantity of plutonium present in the pipe. This site has been identified as Corrective Action Unit (CAU) 547, Miscellaneous Contaminated Waste Sites. The quantity of plutonium identified at CAU 547 exceeded the Hazard Category 3 threshold but was below the Hazard Category 2 threshold specified in DOE Standard DOE-STD-1027-92. This CAU, therefore, was initially categorized as a Hazard Category 3 environmental restoration site. A contaminated facility or site that is initially categorized as Hazard Category 3, however, may be downgraded to below Hazard Category 3 if it can be demonstrated through further analysis that the form of the material and the energy available for release support reducing the hazard category. This is an important consideration when performing hazard categorization of environmental restoration sites because energy sources available for release of material are generally fewer at an environmental restoration site

  17. An improvement of the applicability of human factors guidelines for coping with human factors issues in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Y. H.; Lee, J. Y. [KAERI, Taejon (Korea, Republic of)

    2003-07-01

    Human factors have been well known as one of the key factors to the system effectiveness as well as the efficiency and safety of nuclear power plants(NPPs). Human factors engineering(HFE) are included in periodic safety review(PSR) on the existing NPPs and the formal safety assessment for the new ones. However, HFE for NPPs is still neither popular in practice nor concrete in methodology. Especially, the human factors guidelines, which are the most frequent form of human factors engineering in practice, reveal the limitations in their applications. We discuss the limitations and their casual factors found in human factors guidelines in order to lesson the workload of HFE practitioners and to improve the applicability of human factors guidelines. According to the purposes and the phases of HFE for NPPs, more selective items and specified criteria should be prepared carefully in the human factors guidelines for the each HFE applications in practice. These finding on the human factors guidelines can be transferred to the other HFE application field, such as military, aviation, telecommunication, HCI, and product safety.

  18. Production of human CD59-transgenic pigs by embryonic germ cell nuclear transfer

    Energy Technology Data Exchange (ETDEWEB)

    Ahn, Kwang Sung; Won, Ji Young [Department of Physiology, Dankook University School of Medicine, Cheonan (Korea, Republic of); Park, Jin-Ki [Animal Biotechnology Division, National Institute of Animal Science, Suwon (Korea, Republic of); Sorrell, Alice M. [Department of Physiology, Dankook University School of Medicine, Cheonan (Korea, Republic of); Heo, Soon Young; Kang, Jee Hyun [Department of Nanobiomedical Science, Dankook University, Cheonan (Korea, Republic of); Woo, Jae-Seok [Animal Biotechnology Division, National Institute of Animal Science, Suwon (Korea, Republic of); Choi, Bong-Hwan [Genomics and Bioinformatics Division, National Institute of Animal Science, Suwon (Korea, Republic of); Chang, Won-Kyong [Animal Biotechnology Division, National Institute of Animal Science, Suwon (Korea, Republic of); Shim, Hosup, E-mail: shim@dku.edu [Department of Nanobiomedical Science, Dankook University, Cheonan (Korea, Republic of); Institute of Tissue Regeneration Engineering, Dankook University, Cheonan (Korea, Republic of)

    2010-10-01

    Research highlights: {yields} Human CD59 (hCD59) gene was introduced into porcine embryonic germ (EG) cells. {yields} hCD59-transgenic EG cells were resistant to hyperacute rejection in cytolytic assay. {yields} hCD59-transgenic pigs were produced by EG cell nuclear transfer. -- Abstract: This study was performed to produce transgenic pigs expressing the human complement regulatory protein CD59 (hCD59) using the nuclear transfer (NT) of embryonic germ (EG) cells, which are undifferentiated stem cells derived from primordial germ cells. Because EG cells can be cultured indefinitely in an undifferentiated state, they may provide an inexhaustible source of nuclear donor cells for NT to produce transgenic pigs. A total of 1980 NT embryos derived from hCD59-transgenic EG cells were transferred to ten recipients, resulting in the birth of fifteen piglets from three pregnancies. Among these offspring, ten were alive without overt health problems. Based on PCR analysis, all fifteen piglets were confirmed as hCD59 transgenic. The expression of the hCD59 transgene in the ten living piglets was verified by RT-PCR. Western analysis showed the expression of the hCD59 protein in four of the ten RT-PCR-positive piglets. These results demonstrate that hCD59-transgenic pigs could effectively be produced by EG cell NT and that such transgenic pigs may be used as organ donors in pig-to-human xenotransplantation.

  19. Differentiation of the nuclear groups in the posterior horn of the human embryonic spinal cord.

    Science.gov (United States)

    Pytel, A; Bruska, M; Woźniak, W

    2011-11-01

    The formation of nuclear groups in the posterior horns of the human embryonic spinal cord was traced in serial sections of embryos of developmental stages 13 to 23 (32 to 56 postovulatory days). The following observations, new for the human, are presented: 1. The differentiation of the neural tube into 3 zones (germinal, mantle and marginal) is detected in the middle of the 5(th) week. 2. The primordia of the posterior horns are marked at stage 14 (33 days). 3. In the middle of the 7(th) week the nucleus proprius and substantia gelatinosa are discerned. 4. Differentiation of the nuclei within the posterior horns proceeds in the ventrodorsal and rostrocaudal gradients.

  20. Measuring Human Performance in Simulated Nuclear Power Plant Control Rooms Using Eye Tracking

    Energy Technology Data Exchange (ETDEWEB)

    Kovesdi, Casey Robert [Idaho National Lab. (INL), Idaho Falls, ID (United States); Rice, Brandon Charles [Idaho National Lab. (INL), Idaho Falls, ID (United States); Bower, Gordon Ross [Idaho National Lab. (INL), Idaho Falls, ID (United States); Spielman, Zachary Alexander [Idaho National Lab. (INL), Idaho Falls, ID (United States); Hill, Rachael Ann [Idaho National Lab. (INL), Idaho Falls, ID (United States); LeBlanc, Katya Lee [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-11-01

    Control room modernization will be an important part of life extension for the existing light water reactor fleet. As part of modernization efforts, personnel will need to gain a full understanding of how control room technologies affect performance of human operators. Recent advances in technology enables the use of eye tracking technology to continuously measure an operator’s eye movement, which correlates with a variety of human performance constructs such as situation awareness and workload. This report describes eye tracking metrics in the context of how they will be used in nuclear power plant control room simulator studies.

  1. The nuclear proteome and DNA-binding fraction of human Raji lymphoma cells.

    Science.gov (United States)

    Henrich, Silke; Cordwell, Stuart J; Crossett, Ben; Baker, Mark S; Christopherson, Richard I

    2007-04-01

    Purification of organelles and analysis of their proteins is an important initial step for biological proteomics, simplifying the proteome prior to analysis by established techniques such as two-dimensional liquid chromatography (2-DLC) or two-dimensional gel electrophoresis (2-DE). Nuclear proteins play a central role in regulating gene expression, but are often under-represented in proteomic studies due to their lower abundance in comparison to cellular 'housekeeping' metabolic enzymes and structural proteins. A reliable procedure for separation and proteomic analysis of nuclear proteins would be useful for investigations of cell proliferation and differentiation during disease processes (e.g., human cancer). In this study, we have purified nuclei from the human Burkitt's lymphoma B-cell line, Raji, using sucrose density gradient centrifugation. The integrity and purity of the nuclei were assessed by light microscopy and proteins from the nuclear fractions were separated by 2-DE and identified using matrix assisted laser desorption ionization mass spectrometry (MALDI-MS). A total of 124 unique proteins were identified, of which 91% (n=110) were predicted to be nuclear using PSORT. Proteins from the nuclear fraction were subjected to affinity chromatography on DNA-agarose to isolate DNA-binding proteins. From this purified fraction, 131 unique proteins were identified, of which 69% (n=90) were known or predicted DNA-binding proteins. Purification of nuclei and subsequent enrichment of DNA-binding proteins allowed identification of a total of 209 unique proteins, many involved in transcription and/or correlated with lymphoma, leukemia or cancer in general. The data obtained should be valuable for identification of biomarkers and targets for cancer therapy, and for furthering our understanding of the molecular mechanisms underlying lymphoma development and progression.

  2. Review of Methods Related to Assessing Human Performance in Nuclear Power Plant Control Room Simulations

    Energy Technology Data Exchange (ETDEWEB)

    Katya L Le Blanc; Ronald L Boring; David I Gertman

    2001-11-01

    With the increased use of digital systems in Nuclear Power Plant (NPP) control rooms comes a need to thoroughly understand the human performance issues associated with digital systems. A common way to evaluate human performance is to test operators and crews in NPP control room simulators. However, it is often challenging to characterize human performance in meaningful ways when measuring performance in NPP control room simulations. A review of the literature in NPP simulator studies reveals a variety of ways to measure human performance in NPP control room simulations including direct observation, automated computer logging, recordings from physiological equipment, self-report techniques, protocol analysis and structured debriefs, and application of model-based evaluation. These methods and the particular measures used are summarized and evaluated.

  3. A REVIEW OF HUMAN-SYSTEM INTERFACE DESIGN ISSUES OBSERVED DURING ANALOG-TO-DIGITAL AND DIGITAL-TO-DIGITAL MIGRATIONS IN U.S. NUCLEAR POWER PLANTS

    Energy Technology Data Exchange (ETDEWEB)

    Kovesdi, C.; Joe, J.

    2017-05-01

    The United States (U.S.) Department of Energy (DOE) Light Water Reactor Sustainability (LWRS) program is developing a scientific basis through targeted research and development (R&D) to support the U.S. nuclear power plant (NPP) fleet in extending their existing licensing period and ensuring their long-term reliability, productivity, safety, and security. Over the last several years, human factors engineering (HFE) professionals at the Idaho National Laboratory (INL) have supported the LWRS Advanced Instrumentation, Information, and Control (II&C) System Technologies pathway across several U.S. commercial NPPs in analog-to-digital migrations (i.e., turbine control systems) and digital-to-digital migrations (i.e., Safety Parameter Display System). These efforts have included in-depth human factors evaluation of proposed human-system interface (HSI) design concepts against established U.S. Nuclear Regulatory Commission (NRC) design guidelines from NUREG-0700, Rev 2 to inform subsequent HSI design prior to transitioning into Verification and Validation. This paper discusses some of the overarching design issues observed from these past HFE evaluations. In addition, this work presents some observed challenges such as common tradeoffs utilities are likely to face when introducing new HSI technologies into NPP hybrid control rooms. The primary purpose of this work is to distill these observed design issues into general HSI design guidance that industry can use in early stages of HSI design.

  4. Preventing violence and reinforcing human security: a rights-based framework for top-down and bottom-up action.

    Science.gov (United States)

    Kjaerulf, Finn; Barahona, Rodrigo

    2010-05-01

    This article explores the violence reduction potential in the intersection between health, criminal justice, and development. It emphasizes public health, rule of law, and equality-driven socioeconomic development as principal concerns in preventing violence. In parts of Latin America, violence has become a serious public health and security problem. Prior studies have explored the risk factors associated with violence as well as experiences in its prevention. These studies and existing approaches to violence prevention provide evidence on where to direct attention and build prevention efforts. This article argues for integrated community-driven and national interventions to create cooperative national- local linkages and embed international human rights law at the national and local levels. Nations struggling with violence should be encouraged to apply an integrated framework to prevent violence and reinforce human security.

  5. Neurochemical dynamics of acute orofacial pain in the human trigeminal brainstem nuclear complex.

    Science.gov (United States)

    de Matos, Nuno M P; Hock, Andreas; Wyss, Michael; Ettlin, Dominik A; Brügger, Mike

    2017-09-04

    The trigeminal brainstem sensory nuclear complex is the first central relay structure mediating orofacial somatosensory and nociceptive perception. Animal studies suggest a substantial involvement of neurochemical alterations at such basal CNS levels in acute and chronic pain processing. Translating this animal based knowledge to humans is challenging. Human related examining of brainstem functions are challenged by MR related peculiarities as well as applicability aspects of experimentally standardized paradigms. Based on our experience with an MR compatible human orofacial pain model, the aims of the present study were twofold: 1) from a technical perspective, the evaluation of proton magnetic resonance spectroscopy at 3 T regarding measurement accuracy of neurochemical profiles in this small brainstem nuclear complex and 2) the examination of possible neurochemical alterations induced by an experimental orofacial pain model. Data from 13 healthy volunteers aged 19-46 years were analyzed and revealed high quality spectra with significant reductions in total N-acetylaspartate (N-acetylaspartate + N-acetylaspartylglutamate) (-3.7%, p = 0.009) and GABA (-10.88%, p = 0.041) during the pain condition. These results might reflect contributions of N-acetylaspartate and N-acetylaspartylglutamate in neuronal activity-dependent physiologic processes and/or excitatory neurotransmission, whereas changes in GABA might indicate towards a reduction in tonic GABAergic functioning during nociceptive signaling. Summarized, the present study indicates the applicability of (1)H-MRS to obtain neurochemical dynamics within the human trigeminal brainstem sensory nuclear complex. Further developments are needed to pave the way towards bridging important animal based knowledge with human research to understand the neurochemistry of orofacial nociception and pain. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. Human factors analysis and design methods for nuclear waste retrieval systems: Human factors design methodology and integration plan

    Science.gov (United States)

    Casey, S. M.

    1980-06-01

    The nuclear waste retrieval system intended to be used for the removal of storage canisters (each canister containing a spent fuel rod assembly) located in an underground salt bed depository is discussed. The implementation of human factors engineering principles during the design and construction of the retrieval system facilities and equipment is reported. The methodology is structured around a basic system development effort involving preliminary development, equipment development, personnel subsystem development, and operational test and evaluation. Examples of application of the techniques in the analysis of human tasks, and equipment required in the removal of spent fuel canisters is provided. The framework for integrating human engineering with the rest of the system development effort is documented.

  7. Nuclear localization of human DNA mismatch repair protein exonuclease 1 (hEXO1)

    DEFF Research Database (Denmark)

    Knudsen, Nina Østergaard; Nielsen, Finn Cilius; Vinther, Lena

    2007-01-01

    localization signals (NLSs) in hEXO1. Using fluorescent fusion proteins, we show that the sequence 418KRPR421, which exhibit strong homology to other monopartite NLS sequences, is responsible for correct nuclear localization of hEXO1. This NLS sequence is located in a region that is also required for hEXO1......Human exonuclease 1 (hEXO1) is implicated in DNA mismatch repair (MMR) and mutations in hEXO1 may be associated with hereditary nonpolyposis colorectal cancer (HNPCC). Since the subcellular localization of MMR proteins is essential for proper MMR function, we characterized possible nuclear...... interaction with hMLH1 and we show that defective nuclear localization of hEXO1 mutant proteins could be rescued by hMLH1 or hMSH2. Both hEXO1 and hMLH1 form complexes with the nuclear import factors importin beta/alpha1,3,7 whereas hMSH2 specifically recognizes importin beta/alpha3. Taken together, we infer...

  8. A Review on the Regulatory Strategy of Human Factors Engineering Consideration in Pakistan Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sohail, Sabir [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of); Choi, Seong Nam [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2013-10-15

    In this paper, the legal and regulatory infrastructure available in Pakistan for HFE requirements is assessed, and the methodology for strengthening of legal infrastructure is presented. The regulatory strategy on evaluation of HFE consideration should provide reviewers with guidance on review process. Therefore, the suggested methodology is based on preparation of guidance documents such as checklist, working procedures, S and Gs etc.; incorporation of PRM elements in regulatory system; and finally the development of PRM implementation criteria. Altogether, the scheme provide the enhancement in regulatory infrastructure and also the effective and efficient review process. The Three Mile Island (TMI) accident brought the general consensus among the nuclear community on the integration of human factors engineering (HFE) principles in all phases of nuclear power. This notion has further strengthened after the recent Fukushima nuclear accident. Much effort has been put over to incorporate the lesson learned and continuous technical evolution on HFE to device different standards. The total of 174 ergonomics standards are alone identified by Dul et al. (2004) published by International Organization for Standardization (ISO) and the European Committee for Standardization (CEN) and number of standards and HFE guidelines (S and Gs) are also published by organizations like Institute for Electrical and Electronics Engineering (IEEE), International Electrotechnical Commission (IEC), International Atomic Energy Agency (IAEA), United States Nuclear Regulatory Commission (USNRC), etc. The ambition of effective review on HFE integration in nuclear facility might be accomplished through the development of methodology for systematic implementation of S and Gs. Such kind of methodology would also be beneficial for strengthening the regulatory framework and practices for countries new in the nuclear arena and with small scale nuclear program. The objective of paper is to review the

  9. A global survey of CRM1-dependent nuclear export sequences in the human deubiquitinase family.

    Science.gov (United States)

    García-Santisteban, Iraia; Bañuelos, Sonia; Rodríguez, Jose A

    2012-01-01

    The mechanisms that regulate the nucleocytoplasmic localization of human deubiquitinases remain largely unknown. The nuclear export receptor CRM1 binds to specific amino acid motifs termed NESs (nuclear export sequences). By using in silico prediction and experimental validation of candidate sequences, we identified 32 active NESs and 78 inactive NES-like motifs in human deubiquitinases. These results allowed us to evaluate the performance of three programs widely used for NES prediction, and to add novel information to the recently redefined NES consensus. The novel NESs identified in the present study reveal a subset of 22 deubiquitinases bearing motifs that might mediate their binding to CRM1. We tested the effect of the CRM1 inhibitor LMB (leptomycin B) on the localization of YFP (yellow fluorescent protein)- or GFP (green fluorescent protein)-tagged versions of six NES-bearing deubiquitinases [USP (ubiquitin-specific peptidase) 1, USP3, USP7, USP21, CYLD (cylindromatosis) and OTUD7B (OTU-domain-containing 7B)]. YFP-USP21 and, to a lesser extent, GFP-OTUD7B relocated from the cytoplasm to the nucleus in the presence of LMB, revealing their nucleocytoplasmic shuttling capability. Two sequence motifs in USP21 had been identified during our survey as active NESs in the export assay. Using site-directed mutagenesis, we show that one of these motifs mediates USP21 nuclear export, whereas the second motif is not functional in the context of full-length USP21.

  10. Calpain-catalyzed proteolysis of human dUTPase specifically removes the nuclear localization signal peptide.

    Directory of Open Access Journals (Sweden)

    Zoltán Bozóky

    Full Text Available BACKGROUND: Calpain proteases drive intracellular signal transduction via specific proteolysis of multiple substrates upon Ca(2+-induced activation. Recently, dUTPase, an enzyme essential to maintain genomic integrity, was identified as a physiological calpain substrate in Drosophila cells. Here we investigate the potential structural/functional significance of calpain-activated proteolysis of human dUTPase. METHODOLOGY/PRINCIPAL FINDINGS: Limited proteolysis of human dUTPase by mammalian m-calpain was investigated in the presence and absence of cognate ligands of either calpain or dUTPase. Significant proteolysis was observed only in the presence of Ca(II ions, inducing calpain action. The presence or absence of the dUTP-analogue α,β-imido-dUTP did not show any effect on Ca(2+-calpain-induced cleavage of human dUTPase. The catalytic rate constant of dUTPase was unaffected by calpain cleavage. Gel electrophoretic analysis showed that Ca(2+-calpain-induced cleavage of human dUTPase resulted in several distinctly observable dUTPase fragments. Mass spectrometric identification of the calpain-cleaved fragments identified three calpain cleavage sites (between residues (4SE(5; (7TP(8; and (31LS(32. The cleavage between the (31LS(32 peptide bond specifically removes the flexible N-terminal nuclear localization signal, indispensable for cognate localization. CONCLUSIONS/SIGNIFICANCE: Results argue for a mechanism where Ca(2+-calpain may regulate nuclear availability and degradation of dUTPase.

  11. Human Cytomegalovirus Nuclear Egress Proteins Ectopically Expressed in the Heterologous Environment of Plant Cells are Strictly Targeted to the Nuclear Envelope.

    Science.gov (United States)

    Lamm, Christian E; Link, Katrin; Wagner, Sabrina; Milbradt, Jens; Marschall, Manfred; Sonnewald, Uwe

    2016-03-10

    In all eukaryotic cells, the nucleus forms a prominent cellular compartment containing the cell's nuclear genome. Although structurally similar, animal and plant nuclei differ substantially in details of their architecture. One example is the nuclear lamina, a layer of tightly interconnected filament proteins (lamins) underlying the nuclear envelope of metazoans. So far no orthologous lamin genes could be detected in plant genomes and putative lamin-like proteins are only poorly described in plants. To probe for potentially conserved features of metazoan and plant nuclear envelopes, we ectopically expressed the core nuclear egress proteins of human cytomegalovirus pUL50 and pUL53 in plant cells. pUL50 localizes to the inner envelope of metazoan nuclei and recruits the nuclear localized pUL53 to it, forming heterodimers. Upon expression in plant cells, a very similar localization pattern of both proteins could be determined. Notably, pUL50 is specifically targeted to the plant nuclear envelope in a rim-like fashion, a location to which coexpressed pUL53 becomes strictly corecruited from its initial nucleoplasmic distribution. Using pUL50 as bait in a yeast two-hybrid screening, the cytoplasmic re-initiation supporting protein RISP could be identified. Interaction of pUL50 and RISP could be confirmed by coexpression and coimmunoprecipitation in mammalian cells and by confocal laser scanning microscopy in plant cells, demonstrating partial pUL50-RISP colocalization in areas of the nuclear rim and other intracellular compartments. Thus, our study provides strong evidence for conserved structural features of plant and metazoan nuclear envelops and identifies RISP as a potential pUL50-interacting plant protein.

  12. The Nuclear Education and Staffing Challenge: Rebuilding Critical Skills in Nuclear Science and Technology

    Energy Technology Data Exchange (ETDEWEB)

    Wogman, Ned A.; Bond, Leonard J.; Waltar, Alan E.; Leber, R E.

    2005-01-01

    The United States, the Department of Energy (DOE) and its National Laboratories, including the Pacific Northwest National Laboratory (PNNL), are facing a serious attrition of nuclear scientists and engineers and their capabilities through the effects of aging staff. Within the DOE laboratories, 75% of nuclear personnel will be eligible to retire by 2010. It is expected that there will be a significant loss of senior nuclear science and technology staff at PNNL within five years. PNNL's nuclear legacy is firmly rooted in the DOE Hanford site, the World War II Manhattan Project, and subsequent programs. Historically, PNNL was a laboratory were 70% of its activities were nuclear/radiological, and now just under 50% of its current business science and technology are nuclear and radiologically oriented. Programs in the areas of Nuclear Legacies, Global Security, Nonproliferation, Homeland Security and National Defense, Radiobiology and Nuclear Energy still involve more than 1,000 of the 3,800 current laboratory staff, and these include more than 420 staff who are certified as nuclear/radiological scientists and engineers. This paper presents the current challenges faced by PNNL that require an emerging strategy to solve the nuclear staffing issues through the maintenance and replenishment of the human nuclear capital needed to support PNNL nuclear science and technology programs.

  13. The Nuclear Education and Staffing Challenge: Rebuilding Critical Skills in Nuclear Science and Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Wogman, Ned A.; Bond, Leonard J.; Waltar, Alan E.; Leber, R. E.

    2005-01-01

    The United States, the Department of Energy (DOE) and its National Laboratories, including the Pacific Northwest National Laboratory (PNNL), are facing a serious attrition of nuclear scientists and engineers and their capabilities through the effects of aging staff. Within the DOE laboratories, 75% of nuclear personnel will be eligible to retire by 2010. It is expected that there will be a significant loss of senior nuclear science and technology staff at PNNL within five years. PNNL's nuclear legacy is firmly rooted in the DOE Hanford site, the World War II Manhattan Project, and subsequent programs. Historically, PNNL was a laboratory where 70% of its activities were nuclear/radiological, and now just under 50% of its current business science and technology are nuclear and radiologically oriented. Programs in the areas of Nuclear Legacies, Global Security, Nonproliferation, Homeland Security and National Defense, Radiobiology and Nuclear Energy still involve more than 1,000 of the 3,800 current laboratory staff, and these include more than 420 staff who are certified as nuclear/radiological scientists and engineers. This paper presents the current challenges faced by PNNL that require an emerging strategy to solve the nuclear staffing issues through the maintenance and replenishment of the human nuclear capital needed to support PNNL nuclear science and technology programs.

  14. Results of a nuclear power plant application of A New Technique for Human Error Analysis (ATHEANA)

    Energy Technology Data Exchange (ETDEWEB)

    Whitehead, D.W.; Forester, J.A. [Sandia National Labs., Albuquerque, NM (United States); Bley, D.C. [Buttonwood Consulting, Inc. (United States)] [and others

    1998-03-01

    A new method to analyze human errors has been demonstrated at a pressurized water reactor (PWR) nuclear power plant. This was the first application of the new method referred to as A Technique for Human Error Analysis (ATHEANA). The main goals of the demonstration were to test the ATHEANA process as described in the frame-of-reference manual and the implementation guideline, test a training package developed for the method, test the hypothesis that plant operators and trainers have significant insight into the error-forcing-contexts (EFCs) that can make unsafe actions (UAs) more likely, and to identify ways to improve the method and its documentation. A set of criteria to evaluate the success of the ATHEANA method as used in the demonstration was identified. A human reliability analysis (HRA) team was formed that consisted of an expert in probabilistic risk assessment (PRA) with some background in HRA (not ATHEANA) and four personnel from the nuclear power plant. Personnel from the plant included two individuals from their PRA staff and two individuals from their training staff. Both individuals from training are currently licensed operators and one of them was a senior reactor operator on shift until a few months before the demonstration. The demonstration was conducted over a 5-month period and was observed by members of the Nuclear Regulatory Commission`s ATHEANA development team, who also served as consultants to the HRA team when necessary. Example results of the demonstration to date, including identified human failure events (HFEs), UAs, and EFCs are discussed. Also addressed is how simulator exercises are used in the ATHEANA demonstration project.

  15. A code for simulation of human failure events in nuclear power plants: SIMPROC

    Energy Technology Data Exchange (ETDEWEB)

    Gil, Jesus, E-mail: jesus.gil@indizen.co [Indizen Technologies S.L., Pablo Iglesias 2-3 oB-2, 28003 Madrid (Spain); Fernandez, Ivan, E-mail: ivan.fernandez@indizen.co [Indizen Technologies S.L., Pablo Iglesias 2-3 oB-2, 28003 Madrid (Spain); Murcia, Santiago, E-mail: santiago.murcia@indizen.co [Indizen Technologies S.L., Pablo Iglesias 2-3 oB-2, 28003 Madrid (Spain); Gomez, Javier, E-mail: javier.mundina@indizen.co [Indizen Technologies S.L., Pablo Iglesias 2-3 oB-2, 28003 Madrid (Spain); Marrao, Hugo, E-mail: hmarrao@indizen.co [Indizen Technologies S.L., Pablo Iglesias 2-3 oB-2, 28003 Madrid (Spain); Queral, Cesar, E-mail: cesar.queral@upm.e [ETSI Minas - Universidad Politecnica de Madrid, Alenza 4, 28003 Madrid (Spain); Exposito, Antonio, E-mail: antonio.exposito@upm.e [ETSI Minas - Universidad Politecnica de Madrid, Alenza 4, 28003 Madrid (Spain); Rodriguez, Gabriel, E-mail: gabriel.rodriguez.martin@upm.e [ETSI Minas - Universidad Politecnica de Madrid, Alenza 4, 28003 Madrid (Spain); Ibanez, Luisa, E-mail: luisa.ibanez@upm.e [ETSI Minas - Universidad Politecnica de Madrid, Alenza 4, 28003 Madrid (Spain); Hortal, Javier, E-mail: fjhr@csn.e [Consejo de Seguridad Nuclear, Justo Dorado 11, 28040 Madrid (Spain); Izquierdo, Jose M., E-mail: jmir@csn.e [Consejo de Seguridad Nuclear, Justo Dorado 11, 28040 Madrid (Spain); Sanchez, Miguel, E-mail: msp@csn.e [Consejo de Seguridad Nuclear, Justo Dorado 11, 28040 Madrid (Spain); Melendez, Enrique, E-mail: ema@csn.e [Consejo de Seguridad Nuclear, Justo Dorado 11, 28040 Madrid (Spain)

    2011-04-15

    Over the past years, many Nuclear Power Plant organizations have performed Probabilistic Safety Assessments to identify and understand key plant vulnerabilities. As part of enhancing the PSA quality, the Human Reliability Analysis is essential to make a realistic evaluation of safety and about the potential facility's weaknesses. Moreover, it has to be noted that HRA continues to be a large source of uncertainty in the PSAs. Within their current joint collaborative activities, Indizen, Universidad Politecnica de Madrid and Consejo de Seguridad Nuclear have developed the so-called SIMulator of PROCedures (SIMPROC), a tool aiming at simulate events related with human actions and able to interact with a plant simulation model. The tool helps the analyst to quantify the importance of human actions in the final plant state. Among others, the main goal of SIMPROC is to check the Emergency Operating Procedures being used by operating crew in order to lead the plant to a safe shutdown plant state. Currently SIMPROC is coupled with the SCAIS software package, but the tool is flexible enough to be linked to other plant simulation codes. SIMPROC-SCAIS applications are shown in the present article to illustrate the tool performance. The applications were developed in the framework of the Nuclear Energy Agency project on Safety Margin Assessment and Applications (SM2A). First an introductory example was performed to obtain the damage domain boundary of a selected sequence from a SBLOCA. Secondly, the damage domain area of a selected sequence from a loss of Component Cooling Water with a subsequent seal LOCA was calculated. SIMPROC simulates the corresponding human actions in both cases. The results achieved shown how the system can be adapted to a wide range of purposes such as Dynamic Event Tree delineation, Emergency Operating Procedures and damage domain search.

  16. Adopting Defence-in-depth Architecture,Ensuring the Reliability and Security of Nuclear Power%采用纵深防御体系架构,确保核电可靠安全

    Institute of Scientific and Technical Information of China (English)

    缪学勤

    2011-01-01

    Ensuring cyber security of the nuclear power plants is a critical priority. Due to higher safety requirements are requested, for industrial network, the hardware solution of industrial network is changing to the combination of industrial firewall/VPN technology. The main threats of the nuclear power plants cyber security are analyzed, and major technologies and solutions upon information security of industrial networks are expounded comprehensively. The multilayer defence-in-depth architecture solutions of the control system cyber security in the nuclear power technology plants are researched. Deploying the hardware-based information security technologies, the secured nuclear power plants with the multilayer protection are constructed.%核电安全关系国家安全,在建设核电厂时应优先考虑核电厂网络信息安全.由于工业网络安全有更高要求,所以工业网络开始转向基于工业防火墙/VPN技术相结合的硬件解决方案.深入分析了核电厂网络安全的主要威胁,比较全面地论述了工业网络信息安全中涉及的主要技术和解决方案,阐述了核电厂全数字化控制系统信息安全多层分布式纵深防御解决方案.采用基于硬件的信息安全技术,创建核电厂纵深防御体系架构,确保核电厂可靠安全.

  17. Epidemiological studies on radiation carcinogenesis in human populations following acute exposure: nuclear explosions and medical radiation

    Energy Technology Data Exchange (ETDEWEB)

    Fabrikant, J.I.

    1982-08-01

    The present review provides an understanding of our current knowledge of the carcinogenic effect of low-dose radiation in man, and surveys the epidemiological studies of human populations exposed to nuclear explosions and medical radiation. Discussion centers on the contributions of quantitative epidemiology to present knowledge, the reliability of the dose-incidence data, and those relevant epidemiological studies that provide the most useful information for risk estimation of cancer-induction in man. Reference is made to dose-incidence relationships from laboratory animal experiments where they may obtain for problems and difficulties in extrapolation from data obtained at high doses to low doses, and from animal data to the human situation. The paper describes the methods of application of such epidemiological data for estimation of excess risk of radiation-induced cancer in exposed human populations, and discusses the strengths and limitations of epidemiology in guiding radiation protection philosophy and public health policy.

  18. Epidemiological studies on radiation carcinogenesis in human populations following acute exposure: nuclear explosions and medical radiation

    Energy Technology Data Exchange (ETDEWEB)

    Fabrikant, J.I.

    1982-08-01

    The present review provides an understanding of our current knowledge of the carcinogenic effect of low-dose radiation in man, and surveys the epidemiological studies of human populations exposed to nuclear explosions and medical radiation. Discussion centers on the contributions of quantitative epidemiology to present knowledge, the reliability of the dose-incidence data, and those relevant epidemiological studies that provide the most useful information for risk estimation of cancer-induction in man. Reference is made to dose-incidence relationships from laboratory animal experiments where they may obtain for problems and difficulties in extrapolation from data obtained at high doses to low doses, and from animal data to the human situation. The paper describes the methods of application of such epidemiological data for estimation of excess risk of radiation-induced cancer in exposed human populations, and discusses the strengths and limitations of epidemiology in guiding radiation protection philosophy and public health policy.

  19. The Relationship between Human Operators' Psycho-physiological Condition and Human Errors in Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Arryum; Jang, Inseok; Kang, Hyungook; Seong, Poonghyun [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2013-05-15

    The safe operation of nuclear power plants (NPPs) is substantially dependent on the performance of the human operators who operate the systems. In this environment, human errors caused by inappropriate performance of operator have been considered to be critical since it may lead serious problems in the safety-critical plants. In order to provide meaningful insights to prevent human errors and enhance the human performance, operators' physiological conditions such as stress and workload have been investigated. Physiological measurements were considered as reliable tools to assess the stress and workload. T. Q. Tran et al. and J. B. Brooking et al pointed out that operators' workload can be assessed using eye tracking, galvanic skin response, electroencephalograms (EEGs), heart rate, respiration and other measurements. The purpose of this study is to investigate the effect of the human operators' tense level and knowledge level to the number of human errors. For this study, the experiments were conducted in the mimic of the main control rooms (MCR) in NPP. It utilized the compact nuclear simulator (CNS) which is modeled based on the three loop Pressurized Water Reactor, 993MWe, Kori unit 3 and 4 in Korea and the subjects were asked to follow the tasks described in the emergency operating procedures (EOP). During the simulation, three kinds of physiological measurement were utilized; Electrocardiogram (ECG), EEG and nose temperature. Also, subjects were divided into three groups based on their knowledge of the plant operation. The result shows that subjects who are tense make fewer errors. In addition, subjects who are in higher knowledge level tend to be tense and make fewer errors. For the ECG data, subjects who make fewer human errors tend to be located in higher tense level area of high SNS activity and low PSNS activity. The results of EEG data are also similar to ECG result. Beta power ratio of subjects who make fewer errors was higher. Since beta

  20. Physical fitness training reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Arzino, P.A.; Caplan, C.S.; Goold, R.E. (California State Univ., Hayward, CA (United States). Foundation)

    1991-09-01

    The recommendations contained throughout this NUREG are being provided to the Nuclear Regulatory Commission (NRC) as a reference manual which can be used by licensee management as they develop a program plan for the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The recommendations in this NUREG are similar in part to those contained within the Department of Energy (DOE) Medical and Fitness Implementation Guide which was published in March 1991. The guidelines contained in this NUREG are not requirements, and compliance is not required. 25 refs.

  1. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Arzino, P.A.; Brown, C.H. (California State Univ., Hayward, CA (United States). Foundation)

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs.

  2. A methodology to quantify the release of spent nuclear fuel from dry casks during security-related scenarios.

    Energy Technology Data Exchange (ETDEWEB)

    Durbin, Samuel G.; Luna, Robert Earl

    2013-11-01

    Assessing the risk to the public and the environment from a release of radioactive material produced by accidental or purposeful forces/environments is an important aspect of the regulatory process in many facets of the nuclear industry. In particular, the transport and storage of radioactive materials is of particular concern to the public, especially with regard to potential sabotage acts that might be undertaken by terror groups to cause injuries, panic, and/or economic consequences to a nation. For many such postulated attacks, no breach in the robust cask or storage module containment is expected to occur. However, there exists evidence that some hypothetical attack modes can penetrate and cause a release of radioactive material. This report is intended as an unclassified overview of the methodology for release estimation as well as a guide to useful resource data from unclassified sources and relevant analysis methods for the estimation process.

  3. (REBUILDING THE EUROPEAN UNION`S INTERNATIONAL ROLE THROUGH HUMAN SECURITY STRATEGY IN THE AFTREMATHS OF THE EUROPEAN CRISIS

    Directory of Open Access Journals (Sweden)

    Andreea IANCU

    2014-10-01

    Full Text Available In a globalized world, characterized by profound shifts in the dynamics of global power and by diverse threats to peace and security, the European Union should be an active and peace-promoter actor, according to its founding principles. Thus, the European crisis left hard to heal scars within the European Union internal coherence and for its international role and image. The European crisis determined a cleavage in foreign and defence policy between the EU`s member states, creating dissonances in its internal processes. Therefore, this incongruence determined flawed reactions to international events. In order to determine the impact of the European crisis on the EU`s international role, it is briefly analysed the EU`s and its member states reactions to the conflicts from Libya and Syria. The main hypothesis of this article is that in order to overcome the effects of the economic crisis and to rebuild its international trust, the EU should reaffirm its core principles through a coherent external policy, which should be embedded in a bottom-up legitimized paradigm. This analysis demonstrates that human security strategy and the responsibility to protect principle can become the new European meta-narrative, the fact that they have the potential to overcome the current gap between rhetoric and practice in foreign and defence European policies. Therefore, this article advocates that the human security strategy and the responsibility to protect principle represent an impetus to transform the EU in an important global actor.

  4. Updating Human Factors Engineering Guidelines for Conducting Safety Reviews of Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    O, J.M.; Higgins, J.; Stephen Fleger - NRC

    2011-09-19

    The U.S. Nuclear Regulatory Commission (NRC) reviews the human factors engineering (HFE) programs of applicants for nuclear power plant construction permits, operating licenses, standard design certifications, and combined operating licenses. The purpose of these safety reviews is to help ensure that personnel performance and reliability are appropriately supported. Detailed design review procedures and guidance for the evaluations is provided in three key documents: the Standard Review Plan (NUREG-0800), the HFE Program Review Model (NUREG-0711), and the Human-System Interface Design Review Guidelines (NUREG-0700). These documents were last revised in 2007, 2004 and 2002, respectively. The NRC is committed to the periodic update and improvement of the guidance to ensure that it remains a state-of-the-art design evaluation tool. To this end, the NRC is updating its guidance to stay current with recent research on human performance, advances in HFE methods and tools, and new technology being employed in plant and control room design. This paper describes the role of HFE guidelines in the safety review process and the content of the key HFE guidelines used. Then we will present the methodology used to develop HFE guidance and update these documents, and describe the current status of the update program.

  5. Production and Characterization of Monoclonal Antibodies against Human Nuclear Protein FAM76B.

    Directory of Open Access Journals (Sweden)

    Xiaojing Zheng

    Full Text Available Human FAM76B (hFAM76B is a 39 kDa protein that contains homopolymeric histidine tracts, a targeting signal for nuclear speckles. FAM76B is highly conserved among different species, suggesting that it may play an important physiological role in normal cellular functions. However, a lack of appropriate tools has hampered study of this potentially important protein. To facilitate research into the biological function(s of FAM76B, murine monoclonal antibodies (MAbs against hFAM76B were generated by using purified, prokaryotically expressed hFAM76B protein. Six strains of MAbs specific for hFAM76B were obtained and characterized. The specificity of MAbs was validated by using FAM76B-/- HEK 293 cell line. Double immunofluorescence followed by laser confocal microscopy confirmed the nuclear speckle localization of hFAM76B, and the specific domains recognized by different MAbs were further elucidated by Western blot. Due to the high conservation of protein sequences between mouse and human FAM76B, MAbs against hFAM76B were shown to react with mouse FAM76B (mFAM76B specifically. Lastly, FAM76B was found to be expressed in the normal tissues of most human organs, though to different extents. The MAbs produced in this study should provide a useful tool for investigating the biological function(s of FAM76B.

  6. Mainstreaming Human Security in the Philippines: Options and Prospects for Non-State Actors in Light of the 'ASEAN Way'

    Directory of Open Access Journals (Sweden)

    Eduardo T. Gonzalez

    2010-01-01

    Full Text Available Progress in human security in the Philippines is influenced by the ‘ASEAN Way’, which underscores consensual approach to decision-making, informal structures and processes, and the principle of non-interference in member-countries’ internal affairs. Along these lines, ASEAN broadened the agenda of security to encompass problems like poverty, epidemics, food security, human rights, and climate change, but failed to deepen security from a focus on the state to a focus on human individu- als and communities. Yet the ‘ASEAN Way’ offers enough tolerance for ‘operationalising’ possibili- ties for normative non-state securitisation. Philippine NGOs have intervened in the decision-making process, shaped and disseminated politically relevant values and norms, and have taken the initiative to set rules themselves. For the Philippine government labouring under ‘soft state’ conditions, the most appropriate role based on a human security agenda would be to strengthen existing institu- tional structures, expand the democratic space for non-state actors, and join inter-state regimes and quasi-diplomatic arrangements, thereby reducing transaction costs and facilitating reciprocity within ASEAN. ----- Der „ASEAN Way“, der konsensuelle Entscheidungsprozesse, informelle Strukturen und Prozesse sowie das Prinzip der Nichteinmischung in die inneren Angelegenheiten der Mitgliedstaaten betont, hat direkte Auswirkungen auf die Weiterentwicklung menschlicher Sicherheit auf den Philippinen. Innerhalb dieses Rahmens erweiterte ASEAN die sicherheitspolitische Agenda um Probleme wie Armut, Epidemien, Nahrungsmittelsicherheit, Menschenrechte und Klimawandel. Es erfolgte jedoch keine Vertiefung des Sicherheitsbegriffs durch einen Fokuswechsel vom Staat hin zu Individuen und Gruppen – und das obwohl der „ASEAN Way“ ausreichend Operationalisierungsspielraum für nor- mative nicht-staatliche Sekuritisierung böte. Philippinische NGOs beteiligen sich

  7. Nondestructive sampling of human skeletal remains yields ancient nuclear and mitochondrial DNA.

    Science.gov (United States)

    Bolnick, Deborah A; Bonine, Holly M; Mata-Míguez, Jaime; Kemp, Brian M; Snow, Meradeth H; LeBlanc, Steven A

    2012-02-01

    Museum curators and living communities are sometimes reluctant to permit ancient DNA (aDNA) studies of human skeletal remains because the extraction of aDNA usually requires the destruction of at least some skeletal material. Whether these views stem from a desire to conserve precious materials or an objection to destroying ancestral remains, they limit the potential of aDNA research. To help address concerns about destructive analysis and to minimize damage to valuable specimens, we describe a nondestructive method for extracting DNA from ancient human remains. This method can be used with both teeth and bone, but it preserves the structural integrity of teeth much more effectively than that of bone. Using this method, we demonstrate that it is possible to extract both mitochondrial and nuclear DNA from human remains dating between 300 BC and 1600 AD. Importantly, the method does not expose the remains to hazardous chemicals, allowing them to be safely returned to curators, custodians, and/or owners of the samples. We successfully amplified mitochondrial DNA from 90% of the individuals tested, and we were able to analyze 1-9 nuclear loci in 70% of individuals. We also show that repeated nondestructive extractions from the same tooth can yield amplifiable mitochondrial and nuclear DNA. The high success rate of this method and its ability to yield DNA from samples spanning a wide geographic and temporal range without destroying the structural integrity of the sampled material may make possible the genetic study of skeletal collections that are not available for destructive analysis. Copyright © 2011 Wiley Periodicals, Inc.

  8. Applying Human Factors Evaluation and Design Guidance to a Nuclear Power Plant Digital Control System

    Energy Technology Data Exchange (ETDEWEB)

    Thomas Ulrich; Ronald Boring; William Phoenix; Emily Dehority; Tim Whiting; Jonathan Morrell; Rhett Backstrom

    2012-08-01

    The United States (U.S.) nuclear industry, like similar process control industries, has moved toward upgrading its control rooms. The upgraded control rooms typically feature digital control system (DCS) displays embedded in the panels. These displays gather information from the system and represent that information on a single display surface. In this manner, the DCS combines many previously separate analog indicators and controls into a single digital display, whereby the operators can toggle between multiple windows to monitor and control different aspects of the plant. The design of the DCS depends on the function of the system it monitors, but revolves around presenting the information most germane to an operator at any point in time. DCSs require a carefully designed human system interface. This report centers on redesigning existing DCS displays for an example chemical volume control system (CVCS) at a U.S. nuclear power plant. The crucial nature of the CVCS, which controls coolant levels and boration in the primary system, requires a thorough human factors evaluation of its supporting DCS. The initial digital controls being developed for the DCSs tend to directly mimic the former analog controls. There are, however, unique operator interactions with a digital vs. analog interface, and the differences have not always been carefully factored in the translation of an analog interface to a replacement DCS. To ensure safety, efficiency, and usability of the emerging DCSs, a human factors usability evaluation was conducted on a CVCS DCS currently being used and refined at an existing U.S. nuclear power plant. Subject matter experts from process control engineering, software development, and human factors evaluated the DCS displays to document potential usability issues and propose design recommendations. The evaluation yielded 167 potential usability issues with the DCS. These issues should not be considered operator performance problems but rather opportunities

  9. Nuclear localization of phosphorylated c-Myc protein in human tumor cells.

    Directory of Open Access Journals (Sweden)

    C. Soldani

    2010-05-01

    Full Text Available Using immunocytochemical techniques at light and electron microscopy, we analysed the distribution of phosphorylated c-Myc in actively proliferating human HeLa cells. The distribution pattern of c-Myc was also compared with those of other ribonucleoprotein (RNP-containing components (PANA, hnRNP-core proteins, fibrillarin or RNP-associated nuclear proteins (SC-35 splicing factor. Our results provide the first evidence that phosphorylated c-Myc accumulates in the nucleus of tumor cells, where it colocalizes with fibrillarin, both in the nucleolus and in extranucleolar structures.

  10. Somatic cell nuclear transfer-derived embryonic stem cell lines in humans: pros and cons.

    Science.gov (United States)

    Langerova, Alena; Fulka, Helena; Fulka, Josef

    2013-12-01

    The recent paper, published by Mitalipov's group in Cell (Tachibana et al., 2013 ), reporting the production of human somatic cell nuclear transfer (SCNT) embryonic stem cells (ESCs), opens again the debate if, in the era of induced pluripotent stem cells (iPSCs), the production of these cells is indeed necessary and, if so, whether they are different from ESCs produced from spare embryos and iPSCs. It is our opinion that these questions are very difficult to answer because it is still unclear whether and how normal ESCs differ from iPSCs.

  11. Can active proton interrogation find shielded nuclear threats at human-safe radiation levels?

    Science.gov (United States)

    Liew, Seth Van

    2017-05-01

    A new method of low-dose proton radiography is presented. The system is composed of an 800 MeV proton source, bending magnets, and compact detectors, and is designed for drive-through cargo scanning. The system has been simulated using GEANT4. Material identification algorithms and pixel sorting methods are presented that allow the system to perform imaging at doses low enough to scan passenger vehicles and people. Results are presented on imaging efficacy of various materials and cluttered cargoes. The identification of shielded nuclear materials at human-safe doses has been demonstrated.

  12. A Review of "Human Security in World Affairs: Problems and Opportunities"

    Directory of Open Access Journals (Sweden)

    Arthur L. Fredeen

    2013-01-01

    Full Text Available While security of our hominid encampments and settlements must have been at or near the top of our species priorities since our evolution some several hundred thousand years ago, awareness of the magnitude of our alterations, interactions and impacts on our world is a very recent event. Even more recent is our collective and growing angst over how are species is to secure some sort of permanence on a planet that is ultimately governed by natural forces and is forever changing.

  13. e-Cluster Building and Using for Nuclear Industry Human Resources

    Energy Technology Data Exchange (ETDEWEB)

    Hur, Jung Hoon; Suh, Jang Soo [Nuclear Power Education Institute, KHNP, Ulsan (Korea, Republic of)

    2009-10-15

    In line with its industry support policy, KHNP provides training courses for small and medium sized companies within the nuclear sector. The courses cover three main areas; technical development, market expansion and human resource and finance. They are provided in traditional classroom settings and on-line. Employees from small and medium sized companies can take any of the available courses according to company and individual training and development requirements. While the training and development opportunities serve a role in the growth and development of skills and capabilities industry-wide, KHNP also sees the involvement of a wide range of nuclear industry participants in the program as a means of developing a safety consensus that addresses both operational and social safety concerns. The purpose of this paper is to outline the successes of the KHNP industry training support program to date and to propose the development of an e-Cluster model. This model envisages the development of a nuclear industry. It will provide a means for sharing information and developing and maintaining industry-wide technical, management and safety standards.

  14. Law n. 2006-686 of the 13 June 2006 relative to the transparency and the security in the nuclear (1); Loi n. 2006-686 du 13 juin 2006 relative a la transparence et a la securite en matiere nucleaire (1)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-07-01

    This document presents the 64 articles of the law n.2006-686 on the nuclear security. It concerns the regulation in matter of safety and transparency, the Authority of Nuclear Safety, the public information, the base nuclear installations and the radioactive substances transport, the risks prevention and the penalties. (A.L.B.)

  15. Human reliability analysis data obtainment through fuzzy logic in nuclear plants

    Energy Technology Data Exchange (ETDEWEB)

    Nascimento, C.S. do, E-mail: claudio.souza@ctmsp.mar.mil.br [Centro Tecnologico da Marinha em Sao Paulo (CTMSP), Av. Professor Lineu Prestes 2468, 05508-000 Sao Paulo, SP (Brazil); Mesquita, R.N. de, E-mail: rnavarro@ipen.br [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN - SP), Av. Professor Lineu Prestes 2242, 05508-000 Sao Paulo, SP (Brazil)

    2012-09-15

    Highlights: Black-Right-Pointing-Pointer Human Error Probability estimates from operator's reactions to emergency situations. Black-Right-Pointing-Pointer Human Reliability Analysis input data obtainment through fuzzy logic inference. Black-Right-Pointing-Pointer Performance Shaping Factors evaluation influence level onto the operator's actions. - Abstract: Human error has been recognized as an important factor for many industrial and nuclear accidents occurrence. Human error data is scarcely available for different reasons among which, lapses in historical database registry methodology is an important one. Human Reliability Analysis (HRA) is an usual tool employed to estimate the probability that an operator will reasonably perform a system required task in required time without degrading the system. This meta-analysis requires specific Human Error Probability estimates for most of its procedure. This work obtains Human Error Probability (HEP) estimates from operator's actions in response to emergency situations hypothesis on Research Reactor IEA-R1 from IPEN, Brazil. Through this proposed methodology HRA should be able to be performed even with shortage of related human error statistical data. A Performance Shaping Factors (PSF's) evaluation in order to classify and estimate their influence level onto the operator's actions and to determine their actual state over the plant was also done. Both HEP estimation and PSF evaluation were done based on expert judgment using interviews and questionnaires. Expert group was established based on selected IEA-R1 operators, and their evaluation were put into a knowledge representation system which used linguistic variables and group evaluation values that were obtained through Fuzzy Logic and Fuzzy Set theory. HEP obtained values show good agreement with literature published data corroborating the proposed methodology as a good alternative to be used on HRA.

  16. Applying human factors to the design of control centre and workstation of a nuclear reactor

    Energy Technology Data Exchange (ETDEWEB)

    Santos, Isaac J.A. Luquetti dos; Carvalho, Paulo V.R.; Goncalves, Gabriel de L., E-mail: luquetti@ien.gov.br [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil); Souza, Tamara D.M.F.; Falcao, Mariana A. [Universidade Federal do Rio de Janeiro (UFRJ), Rio de Janeiro, RJ (Brazil). Dept. de Desenho Industrial

    2013-07-01

    Human factors is a body of scientific factors about human characteristics, covering biomedical, psychological and psychosocial considerations, including principles and applications in the personnel selection areas, training, job performance aid tools and human performance evaluation. Control Centre is a combination of control rooms, control suites and local control stations which are functionally related and all on the same site. Digital control room includes an arrangement of systems, equipment such as computers and communication terminals and workstations at which control and monitoring functions are conducted by operators. Inadequate integration between control room and operators reduces safety, increases the operation complexity, complicates operator training and increases the likelihood of human errors occurrence. The objective of this paper is to present a specific approach for the conceptual and basic design of the control centre and workstation of a nuclear reactor used to produce radioisotope. The approach is based on human factors standards, guidelines and the participation of a multidisciplinary team in the conceptual and basic phases of the design. Using the information gathered from standards and from the multidisciplinary team, an initial sketch 3D of the control centre and workstation are being developed. (author)

  17. Nuclear microanalysis of the human amnion: A study of ionic cellular exchanges

    Science.gov (United States)

    Razafindrabe, L.; Moretto, Ph.; Llabador, Y.; Simonoff, M.; Bara, M.; Guiet-Bara, A.

    1995-09-01

    The epithelial cells of the human amniotic membrane have been extensively studied by electrophysiologists with the aim of elucidating the mechanisms of transmembrane ionic transfers. In order to provide complementary information about this model, nuclear microanalysis was performed using the CENBG ion microbeam. Quantitative mapping of the human amnion was carried out and the distributions of most mono- and divalent ions involved in cellular pathways (Na +, Mg 2+, Cl -, Ca 2+) were determined. The ionic cellular content was also compared, before and after incubation in a Hanks' physiological fluid and the resultant ions transfers were determined. The aim of this paper is to expose the advances of this experimental model, more particularly after the development of simulation programs which improved the accuracy of PIXE analysis in the measurement of low energy X-rays emitters. Statistically significant results can now be extracted and can be explained taking into account the results of previous electrophysiological experiments.

  18. Human Rights as Practice: Dalit Women's Collective Action to Secure Livelihood Entitlements in rural South India

    NARCIS (Netherlands)

    Mangubhai, Y.|info:eu-repo/dai/nl/412461277

    2012-01-01

    In this dissertation, I investigate how Dalit women in rural South India secure livelihood entitlements by analysing processes of social exclusion as well as collective action by these women through their perspectives. This problematic requires focus on how caste, class and gender mutually construct

  19. RADIATION DOSE TO HUMAN AND NON-HUMAN BIOTA IN THE REPUBLIC OF KOREA RESULTING FROM THE FUKUSHIMA NUCLEAR ACCIDENT

    Directory of Open Access Journals (Sweden)

    DONG-KWON KEUM

    2013-02-01

    Full Text Available This paper describes the radiation doses to human and non-human biota in the Republic of Korea, as a result of the Fukushima nuclear accident. By using the measured airborne activity and ground deposition, the effective and thyroid doses of five human age groups (infant, 5 years, 10 years, 15 years and adult were estimated by the ECOSYS code, and the whole body absorbed dose rate of the eight Korean reference animals and plants (RAPs was estimated by the K-BIOTA (the Korean computer code to assess the risk of radioactivity to wildlife. The first-year effective and thyroid human doses ranged from 5.7E-5 mSv in the infant group to 2.0E-4 mSv in the 5 years group, and from 5.0E-4 mSv in the infant group to 3.4E-3 mSv in the 5 years group, respectively. The life-time (70 years effective and thyroid human doses ranged from 1.5E-4 mSv in the infant group to 3.0E-4 mSv in the 5 years group, and from 6.0E-4 mSv in the infant group to 3.5E-3 mSv in the 5 years group, respectively. The estimated maximum whole body absorbed dose rate to the Korean RAPs was 6.7E-7 mGy/d for a snake living in soil (terrestrial biota, and 2.0E-5 mGy/d for freshwater fish (aquatic biota, both of which were far less than the generic dose criteria to protect biota from ionizing radiation. Also, the screening level assessment for ERICA's (Environmental Risks from Ionizing Contaminants: Assessments and management limiting organisms showed that the risk quotient (RQ for the estimated maximum soil and water activity was significantly less than unity for both the terrestrial and freshwater organisms. Conclusively, the radiological risk of the radioactivity released into the environment by the Fukushima nuclear accident to the public and the non-human biota in the republic of Korea is considered negligible.

  20. Virtual reality technology as a tool for human factors requirements evaluation in design of the nuclear reactors control desks

    Energy Technology Data Exchange (ETDEWEB)

    Grecco, Claudio H.S.; Santos, Isaac J.A.L.; Mol, Antonio C.A.; Carvalho, Paulo V.R.; Silva, Antonio C.F.; Ferreira, Francisco J.O.; Dutra, Marco A.M. [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil)]. E-mail: grecco@ien.gov.br; luquetti@ien.gov.br; mol@ien.gov.br; paulov@ien.gov.br; tonico@ien.gov.br; fferreira@ien.gov.br; dutra@ien.gov.br

    2007-07-01

    The Virtual Reality (VR) is an advanced computer interface technology that allows the user to internet or to explore a three-dimensional environment through the computer, as was part of the virtual world. This technology presents great applicability in the most diverse areas of the human knowledge. This paper presents a study on the use of the VR as tool for human factors requirements evaluation in design of the nuclear reactors control desks. Moreover, this paper presents a case study: a virtual model of the control desk, developed using virtual reality technology to be used in the human factors requirements evaluation. This case study was developed in the Virtual Reality Laboratory at IEN, and understands the stereo visualization of the Argonauta research nuclear reactor control desk for a static ergonomic evaluation using check-lists, in accordance to the standards and human factors nuclear international guides (IEC 1771, NUREG-0700). (author)

  1. Nuclear Nox4 Role in Stemness Power of Human Amniotic Fluid Stem Cells

    Directory of Open Access Journals (Sweden)

    Tullia Maraldi

    2015-01-01

    Full Text Available Human amniotic fluid stem cells (AFSC are an attractive source for cell therapy due to their multilineage differentiation potential and accessibility advantages. However the clinical application of human stem cells largely depends on their capacity to expand in vitro, since there is an extensive donor-to-donor heterogeneity. Reactive oxygen species (ROS and cellular oxidative stress are involved in many physiological and pathophysiological processes of stem cells, including pluripotency, proliferation, differentiation, and stress resistance. The mode of action of ROS is also dependent on the localization of their target molecules. Thus, the modifications induced by ROS can be separated depending on the cellular compartments they affect. NAD(PH oxidase family, particularly Nox4, has been known to produce ROS in the nucleus. In the present study we show that Nox4 nuclear expression (nNox4 depends on the donor and it correlates with the expression of transcription factors involved in stemness regulation, such as Oct4, SSEA-4, and Sox2. Moreover nNox4 is linked with the nuclear localization of redox sensitive transcription factors, as Nrf2 and NF-κB, and with the differentiation potential. Taken together, these results suggest that nNox4 regulation may have important effects in stem cell capability through modulation of transcription factors and DNA damage.

  2. Human GTPases associate with RNA polymerase II to mediate its nuclear import.

    Science.gov (United States)

    Carré, Clément; Shiekhattar, Ramin

    2011-10-01

    Small GTPases share a biochemical mechanism and act as binary molecular switches. One important function of small GTPases in the cell is nucleocytoplasmic transport of both proteins and RNA. Here, we show the stable association of human GPN1 and GPN3, small GTPases related to Ran, with RNA polymerase II (RNAPII) isolated from either the cytoplasmic or nuclear fraction. GPN1 and GPN3 directly interact with RNAPII subunit 7 (RPB7)/RPB4 and the C-terminal domain (CTD) of RNAPII. Depletion of GPN1 or GPN3 using small interfering RNAs led to decreased RNAPII levels in the nucleus and an accumulation of this enzyme in the cytoplasm of human cells. Furthermore, isolation of a GPN1/GPN3/RNAPII complex from stable cell lines expressing a dominant negative GPN1 harboring mutations in the GTP-binding pocket demonstrated a role for these proteins in nuclear import of RNAPII. Thus, GPN1/GPN3 define a new family of small GTPases that are specialized for the transport of RNA polymerase II into the nucleus.

  3. Human factors analysis and design methods for nuclear waste retrieval systems. Human factors design methodology and integration plan

    Energy Technology Data Exchange (ETDEWEB)

    Casey, S.M.

    1980-06-01

    The purpose of this document is to provide an overview of the recommended activities and methods to be employed by a team of human factors engineers during the development of a nuclear waste retrieval system. This system, as it is presently conceptualized, is intended to be used for the removal of storage canisters (each canister containing a spent fuel rod assembly) located in an underground salt bed depository. This document, and the others in this series, have been developed for the purpose of implementing human factors engineering principles during the design and construction of the retrieval system facilities and equipment. The methodology presented has been structured around a basic systems development effort involving preliminary development, equipment development, personnel subsystem development, and operational test and evaluation. Within each of these phases, the recommended activities of the human engineering team have been stated, along with descriptions of the human factors engineering design techniques applicable to the specific design issues. Explicit examples of how the techniques might be used in the analysis of human tasks and equipment required in the removal of spent fuel canisters have been provided. Only those techniques having possible relevance to the design of the waste retrieval system have been reviewed. This document is intended to provide the framework for integrating human engineering with the rest of the system development effort. The activities and methodologies reviewed in this document have been discussed in the general order in which they will occur, although the time frame (the total duration of the development program in years and months) in which they should be performed has not been discussed.

  4. Neutron flux from a 14-MeV neutron generator with tungsten filter for research in NDA methods for nuclear safeguards and security

    Science.gov (United States)

    Rennhofer, H.; Pedersen, B.; Crochemore, J.-M.

    2009-12-01

    The Joint Research Centre has taken into operation a new experimental device designed for research in the fields of nuclear safeguards and security applications. The research projects currently undertaken include detection of shielded contraband materials, detection of fissile materials, and mass determination of small fissile materials in shielded containers. The device, called the Pulsed Neutron Interrogation Test Assembly (PUNITA), incorporates a pulsed 14-MeV (D-T) neutron generator and a large graphite mantle surrounding the sample cavity. By pulsing the neutron generator with a frequency in the range of 10 to 150 Hz, a sample may be interrogated first by fast neutrons and a few hundred micro-seconds later by a pure thermal neutron flux. The permanent detection systems incorporated in PUNITA include 3He neutrons detectors, HPGe gamma detectors, and lanthanum bromide scintillation detectors. We have studied the effects of placing a tungsten liner around the neutron generator target. The 14-MeV neutrons induce (n, 2n) and (n, 3n) reactions. In addition the mean neutron energy emitted from generator/tungsten assembly is reduced to about 1 MeV. Both of these effects increase the thermal neutron flux in the sample cavity. The paper describes the observed advantages of the tungsten liner with respect to increase in thermal flux, and better shielding capabilities of the nearby gamma and neutron detectors.

  5. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  6. Nuclear Thermal Rocket (Ntr) Propulsion: A Proven Game-Changing Technology for Future Human Exploration Missions

    Science.gov (United States)

    Borowski, Stanley K.; McCurdy, David R.; Packard, Thomas W.

    2012-01-01

    The NTR represents the next evolutionary step in high performance rocket propulsion. It generates high thrust and has a specific impulse (Isp) of approx.900 seconds (s) or more V twice that of today s best chemical rockets. The technology is also proven. During the previous Rover and NERVA (Nuclear Engine for Rocket Vehicle Applications) nuclear rocket programs, 20 rocket reactors were designed, built and ground tested. These tests demonstrated: (1) a wide range of thrust; (2) high temperature carbide-based nuclear fuel; (3) sustained engine operation; (4) accumulated lifetime; and (5) restart capability V all the requirements needed for a human mission to Mars. Ceramic metal cermet fuel was also pursued, as a backup option. The NTR also has significant growth and evolution potential. Configured as a bimodal system, it can generate electrical power for the spacecraft. Adding an oxygen afterburner nozzle introduces a variable thrust and Isp capability and allows bipropellant operation. In NASA s recent Mars Design Reference Architecture (DRA) 5.0 study, the NTR was selected as the preferred propulsion option because of its proven technology, higher performance, lower launch mass, simple assembly and mission operations. In contrast to other advanced propulsion options, NTP requires no large technology scale-ups. In fact, the smallest engine tested during the Rover program V the 25,000 lbf (25 klbf) Pewee engine is sufficient for human Mars missions when used in a clustered engine arrangement. The Copernicus crewed spacecraft design developed in DRA 5.0 has significant capability and a human exploration strategy is outlined here that uses Copernicus and its key components for precursor near Earth asteroid (NEA) and Mars orbital missions prior to a Mars landing mission. Initially, the basic Copernicus vehicle can enable reusable 1-year round trip human missions to candidate NEAs like 1991 JW and Apophis in the late 2020 s to check out vehicle systems. Afterwards, the

  7. Human Rights in Times of Terror - Is Collective Security the Enemy of Individual Freedom?

    Directory of Open Access Journals (Sweden)

    Jutta Limbach

    2009-02-01

    -footnote-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" fs; mso-footnote-continuation-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" fcs; mso-endnote-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" es; mso-endnote-continuation-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" ecs;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 2.0cm 70.85pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} -->

    I have chosen a subject that concerns our two states - Israel and Germany - and that time and again poses a challenge to our courts: the respect of human rights in times of terrorism. In Israel as in Germany there exists a firm consensus on the need to fight terror. In both states there is much controversy regarding the best way to conduct this fight. The question is raised whether collective security is the enemy of individual freedom. As Aharon Barak rightly stated: “Fighting against terrorism in an effective manner entails finding the right balance between security and public interests, on one hand, and the need to safeguard human rights

  8. Joint Estimation of Contamination, Error and Demography for Nuclear DNA from Ancient Humans.

    Directory of Open Access Journals (Sweden)

    Fernando Racimo

    2016-04-01

    Full Text Available When sequencing an ancient DNA sample from a hominin fossil, DNA from present-day humans involved in excavation and extraction will be sequenced along with the endogenous material. This type of contamination is problematic for downstream analyses as it will introduce a bias towards the population of the contaminating individual(s. Quantifying the extent of contamination is a crucial step as it allows researchers to account for possible biases that may arise in downstream genetic analyses. Here, we present an MCMC algorithm to co-estimate the contamination rate, sequencing error rate and demographic parameters-including drift times and admixture rates-for an ancient nuclear genome obtained from human remains, when the putative contaminating DNA comes from present-day humans. We assume we have a large panel representing the putative contaminant population (e.g. European, East Asian or African. The method is implemented in a C++ program called 'Demographic Inference with Contamination and Error' (DICE. We applied it to simulations and genome data from ancient Neanderthals and modern humans. With reasonable levels of genome sequence coverage (>3X, we find we can recover accurate estimates of all these parameters, even when the contamination rate is as high as 50%.

  9. Expert judgment in analysis of human and organizational behaviour at nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Reiman, L. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland). Dept. of Nuclear Safety

    1994-12-01

    Probabilistic safety assessment (PSA) of a nuclear power plant includes an assessment of the probability of each event sequence that can lead to a reactor core damage and of their consequences. Despite increasing maturity of PSA methods, there are still several problems in their use. These include the assessment of human reliability and the impact of organizational factors on plant safety. The assessment of both these issues is based on expert judgment. Therefore, the use of expert judgment in analysis of human and organizational behaviour was studied theoretically and in practical case studies in this thesis. Human errors were analysed in two case studies. In the first study cognitive actions of control room operators were analysed. For this purpose methods were developed for the qualitative and quantitative phases of the analysis. Errors of test and maintenance personnel were analysed in the second case study. Especially the dependence of errors between sequential tasks performed in redundant subsystems of a safety system was studied. A method to assess organizational behaviour was developed and applied in the third case study. The three case studies demonstrated that expert judgment can be used in the analysis of human reliability and organizational behaviour taking into account the observations made and the remarks presented in the study. However, significant uncertainties are related with expert judgment. Recommendations are presented concerning the use of different methods. Also, some insights are presented into how reliance on expert judgment could be reduced. (241 refs., 20 figs., 36 tabs.).

  10. Japanese experiences in human resources development in the nuclear fields and proposal on procedure of the 1st seminar

    Energy Technology Data Exchange (ETDEWEB)

    Murao, Yoshio [Japan Atomic Energy Research Inst., Tokyo (Japan)

    2000-12-01

    The Atomic Energy Basic Act was enforced in 1956. The law prescribed establishment of the Atomic Energy Commission (establishment of the Nuclear Safety Commission was added in 1978), definition of administrative bodies for nuclear fuel materials and reactors and radiation protection, and necessary regulatory laws. The law also prescribed establishment of a national nuclear center for R and D and human resources development, i.e. Japan Atomic Energy Research Institute (JAERI) was established in 1956. The Nuclear Technology and Education Center (NuTEC) RI school was opened in 1958. Establishments of Power Reactor and Nuclear Fuel Development Corporation and National Institute of Radiological Science were in 1956 and 1957, respectively. In universities, nuclear facilities were constructed for supplying young human resources based on decision by Ministry of Education after 1961. The foundation of Japan Atomic Energy Power Co. (JAPCO) was in 1957. In the NuTEC, a variety of training courses had been prepared and carried out to meet the requirements of the nuclear community. Many leaders and experts had been produced and they worked for development of nuclear infrastructure in Japan. International training programs were started in 1985 and the experiences were applied for helping Asian countries to develop the manpower for nuclear infrastructure. Japanese safety actions for nuclear technology had strongly depended on that of USA. Therefore, much efforts on safety evaluation and phenomenological understanding are necessary in Japan. Recent tendency is changed from development-minded approach to safety-minded approach and is focused more on efforts to get public consent on nuclear energy. However, Japanese experiences will be useful for developing human resources in other countries. The NuTEC of JAERI will operate the seminar once a year. The seminar will be implemented; to get mutual recognition on present status and problems of regional countries by gathering information

  11. Nuclear localization of human spermine oxidase isoforms - possible implications in drug response and disease etiology.

    Science.gov (United States)

    Murray-Stewart, Tracy; Wang, Yanlin; Goodwin, Andrew; Hacker, Amy; Meeker, Alan; Casero, Robert A

    2008-06-01

    The recent discovery of the direct oxidation of spermine via spermine oxidase (SMO) as a mechanism through which specific antitumor polyamine analogues exert their cytotoxic effects has fueled interest in the study of the polyamine catabolic pathway. A major byproduct of spermine oxidation is H2O2, a source of toxic reactive oxygen species. Recent targeted small interfering RNA studies have confirmed that SMO-produced reactive oxygen species are directly responsible for oxidative stress capable of inducing apoptosis and potentially mutagenic DNA damage. In the present study, we describe a second catalytically active splice variant protein of the human spermine oxidase gene, designated SMO5, which exhibits substrate specificities and affinities comparable to those of the originally identified human spermine oxidase-1, SMO/PAOh1, and, as such, is an additional source of H2O2. Importantly, overexpression of either of these SMO isoforms in NCI-H157 human non-small cell lung carcinoma cells resulted in significant localization of SMO protein in the nucleus, as determined by confocal microscopy. Furthermore, cell lines overexpressing either SMO/PAOh1 or SMO5 demonstrated increased spermine oxidation in the nucleus, with accompanying alterations in individual nuclear polyamine concentrations. This increased oxidation of spermine in the nucleus therefore increases the production of highly reactive H2O2 in close proximity to DNA, as well as decreases nuclear spermine levels, thus altering the protective roles of spermine in free radical scavenging and DNA shielding, and resulting in an overall increased potential for oxidative DNA damage in these cells. The results of these studies therefore have considerable significance both with respect to targeting polyamine oxidation as an antineoplastic strategy, and in regard to the potential role of spermine oxidase in inflammation-induced carcinogenesis.

  12. Alteration of nuclear matrix-intermediate filament system and differential expression of nuclear matrix proteins during human hepatocarcinoma cell differentiation

    Institute of Scientific and Technical Information of China (English)

    Jian Tang; Jing-Wen Niu; Dong-Hui Xu; Zhi-Xing Li; Qi-Fu Li; Jin-An Chen

    2007-01-01

    AIM:To investigate the association between the configurational and compositional changes of nuclear matrix and the differentiation of carcinoma cells.METHODS: Cells cultured with or without 5 × 10-3mmol/L of hexamethylene bisacetamide (HMBA) on Nickel grids were treated by selective extraction and prepared for whole mount observation under electron microscopy. The samples were examined under transmission electron microscope. Nuclear matrix proteins were selectively extracted and subjected to subcellular proteomics study. The protein expression patterns were analyzed by PDQuest software. Spots of differentially expressed nuclear matrix proteins were excised and subjected to in situ digestion with trypsin.The peptides were analyzed by matrix-assisted laserdesorption/ionization time of flight mass spectrometry (MALDI-TOF-MS). Data were submitted for database searching using Mascot tool (www. Matrixscience.com).RESULTS: The nuclear matrix (NM) and intermediate filament (IF) in SMMC-7721 hepatocarcinoma cells were found relatively sparse and arranged irregularly.The nuclear lamina was non-uniform, and two kinds of filaments were not tightly connected. After induction for differentiation by HMBA, the NM-IF filaments were concentrated and distributed uniformly. The heterogeneous population of filaments, including highly branched utrathin filaments could also be seen in the regular meshwork. The connection between the two kinds of filaments and the relatively thin, condensed and sharply demarcated lamina composed of intermediatesized filaments was relatively fastened. Meanwhile, 21NM proteins changed remarkably during SMMC-7721cell differentiation. Four proteins, I.e. Mutant Pyst1,hypothetical protein, nucleophosmin1, and LBP were downregulated, whereas four other proteins, eIF6, p44subunit, β-tubulin, and SIN3B were upregulated with the last one, SR2/ASF found only in the differentiated SMMC-7721 cells.CONCLUSION: The induced differentiation of SMMC-7721cells by HMBA is

  13. 78 FR 51266 - International Security Advisory Board (ISAB) Meeting Notice

    Science.gov (United States)

    2013-08-20

    ...-military affairs, international security and related aspects of public diplomacy. The agenda for this... issues regarding arms control, international security, nuclear proliferation, and diplomacy. For more...

  14. Drosophila caliban, a nuclear export mediator, can function as a tumor suppressor in human lung cancer cells.

    Science.gov (United States)

    Bi, Xiaolin; Jones, Tamara; Abbasi, Fatima; Lee, Heuijung; Stultz, Brian; Hursh, Deborah A; Mortin, Mark A

    2005-12-15

    We previously showed that the Drosophila DNA binding homeodomain of Prospero included a 28 amino-acid sequence (HDA) that functions as a nuclear export signal. We describe here the identification of a protein we named Caliban, which can directly interact with the HDA. Caliban is homologous to human Sdccag1, which has been implicated in colon and lung cancer. Here we show that Caliban and Sdccag1 are mediators of nuclear export in fly and human cells, as interference RNA abrogates export of EYFP-HDA in normal fly and human lung cells. Caliban functions as a bipartite mediator nuclear export as the carboxy terminus binds HDA and the amino terminus itself functions as an NES, which directly binds the NES receptor Exportin. Finally, while non-cancerous lung cells have functional Sdccag1, five human lung carcinoma cell lines do not, even though Exportin still functions in these cells. Expression of fly Caliban in these human lung cancer cells restores EYFP-HDA nuclear export, reduces a cell's ability to form colonies on soft agar and reduces cell invasiveness. We suggest that Sdccag1 inactivation contributes to the transformed state of human lung cancer cells and that Caliban should be considered a candidate for use in lung cancer gene therapy.

  15. Quantitative real-time PCR (qPCR) assay for human-dog-cat species identification and nuclear DNA quantification.

    Science.gov (United States)

    Kanthaswamy, S; Premasuthan, A; Ng, J; Satkoski, J; Goyal, V

    2012-03-01

    In the United States, human forensic evidence collected from crime scenes is usually comingled with biomaterial of canine and feline origins. Knowledge of the concentration of nuclear DNA extracted from a crime scene biological sample and the species from which the sample originated is essential for DNA profiling. The ability to accurately detect and quantify target DNA in mixed-species samples is crucial when target DNA may be overwhelmed by non-target DNA. We have designed and evaluated a species-specific (human, dog and cat) nuclear DNA identification assay based on the TaqMan(®) quantitative real-time PCR (qPCR) technology that can simultaneously detect and measure minute quantities of DNA specific to either humans, dogs and/or cats. The fluorogenic triplex assay employs primers and hydrolysis probes that target the human TH01 locus as well as the dog and cat Melanocortin 1 Receptor (MC1R) sequences in a species-specific manner. We also demonstrate that the assay is a highly sensitive, reliable and robust method for identifying and quantifying mixed-species templates of human-dog-cat origin with as little as 0.4 pg of human and cat nuclear DNA, respectively, and 4.0 pg of dog nuclear DNA.

  16. To discuss illicit nuclear trafficking

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, Galya I [Los Alamos National Laboratory; Severe, William R [Los Alamos National Laboratory; Wallace, Richard K [Los Alamos National Laboratory

    2010-01-01

    The Illicit nuclear trafficking panel was conducted at the 4th Annual INMM workshop on Reducing the Risk from Radioactive and Nuclear Materials on February 2-3, 2010 in Washington DC. While the workshop occurred prior to the Nuclear Security Summit, April 12-13 2010 in Washington DC, some of the summit issues were raised during the workshop. The Communique of the Washington Nuclear Security Summit stated that 'Nuclear terrorism is one of the most challenging threats to international security, and strong nuclear security measures are the most effective means to prevent terrorists, criminals, or other unauthorized actors from acquiring nuclear materials.' The Illicit Trafficking panel is one means to strengthen nuclear security and cooperation at bilateral, regional and multilateral levels. Such a panel promotes nuclear security culture through technology development, human resources development, education and training. It is a tool which stresses the importance of international cooperation and coordination of assistance to improve efforts to prevent and respond to incidents of illicit nuclear trafficking. Illicit trafficking panel included representatives from US government, an international organization (IAEA), private industry and a non-governmental organization to discuss illicit nuclear trafficking issues. The focus of discussions was on best practices and challenges for addressing illicit nuclear trafficking. Terrorism connection. Workshop discussions pointed out the identification of terrorist connections with several trafficking incidents. Several trafficking cases involved real buyers (as opposed to undercover law enforcement agents) and there have been reports identifying individuals associated with terrorist organizations as prospective plutonium buyers. Some specific groups have been identified that consistently search for materials to buy on the black market, but no criminal groups were identified that specialize in nuclear materials or isotope

  17. Education in Responsibility in Order to Secure Human Rights in Times of Crisis

    Science.gov (United States)

    Merrigan, Michaël

    2014-01-01

    Education in and awareness about human rights is generally seen as one of the less contentious elements of citizenship education. However, it would seem that, for the concept of human rights to have a real impact in today's world, theoretical knowledge of human rights standards should be complemented by an understanding of the ethical concept of…

  18. Specificity of recognition of mRNA 5' cap by human nuclear cap-binding complex.

    Science.gov (United States)

    Worch, Remigiusz; Niedzwiecka, Anna; Stepinski, Janusz; Mazza, Catherine; Jankowska-Anyszka, Marzena; Darzynkiewicz, Edward; Cusack, Stephen; Stolarski, Ryszard

    2005-09-01

    The heterodimeric nuclear cap-binding complex (CBC) binds to the mono-methylated 5' cap of eukaryotic RNA polymerase II transcripts such as mRNA and U snRNA. The binding is important for nuclear maturation of mRNAs and possibly in the first round of translation and nonsense-mediated decay. It is also essential for nuclear export of U snRNAs in metazoans. We report characterization by fluorescence spectroscopy of the recognition of 5' capped RNA by human CBC. The association constants (K(as)) for 17 mono- and dinucleotide cap analogs as well as for the oligomer m7GpppA(m2') pU(m2')pA(m2') cover the range from 1.8 x 10(6) M(-1) to 2.3 x 10(8) M(-1). Higher affinity for CBC is observed for the dinucleotide compared with mononucleotide analogs, especially for those containing a purine nucleoside next to m7G. The mRNA tetramer associates with CBC as tightly as the dinucleotide analogs. Replacement of Tyr138 by alanine in the CBP20 subunit of CBC reduces the cap affinity except for the mononucleotide analogs, consistent with the crystallographic observation of the second base stacking on this residue. Our spectroscopic studies showed that contrary to the other known cap-binding proteins, the first two nucleotides of a capped-RNA are indispensable for its specific recognition by CBC. Differences in the cap binding of CBC compared with the eukaryotic translation initiation factor 4E (eIF4E) are analyzed and discussed regarding replacement of CBC by eIF4E.

  19. Immunodetection of fungal and oomycete pathogens: established and emerging threats to human health, animal welfare and global food security.

    Science.gov (United States)

    Thornton, Christopher R; Wills, Odette E

    2015-02-01

    Filamentous fungi (moulds), yeast-like fungi, and oomycetes cause life-threatening infections of humans and animals and are a major constraint to global food security, constituting a significant economic burden to both agriculture and medicine. As well as causing localized or systemic infections, certain species are potent producers of allergens and toxins that exacerbate respiratory diseases or cause cancer and organ damage. We review the pathogenic and toxigenic organisms that are etiologic agents of both animal and plant diseases or that have recently emerged as serious pathogens of immunocompromised individuals. The use of hybridoma and phage display technologies and their success in generating monoclonal antibodies for the detection and control of fungal and oomycete pathogens are explored. Monoclonal antibodies hold enormous potential for the development of rapid and specific tests for the diagnosis of human mycoses, however, unlike plant pathology, their use in medical mycology remains to be fully exploited.

  20. A Cultural Resources Inventory and Historical Evaluation of the Smoky Atmospheric Nuclear Test, Areas 8, 9, and 10, Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Robert C. [Desert Research Inst. (DRI), Reno, NV (United States); King, Maureen L. [Desert Research Inst. (DRI), Reno, NV (United States); Beck, Colleen M. [Desert Research Inst. (DRI), Reno, NV (United States); Falvey, Lauren W. [Desert Research Inst. (DRI), Reno, NV (United States); Menocal, Tatianna M. [Desert Research Inst. (DRI), Reno, NV (United States)

    2014-09-01

    This report presents the results of a National Historic Preservation Act Section 106 cultural resources inventory and historical evaluation of the 1957 Smoky atmospheric test location on the Nevada National Security Site (NNSS). The Desert Research Institute (DRI) was tasked to conduct a cultural resources study of the Smoky test area as a result of a proposed undertaking by the Department of Energy Environmental Management. This undertaking involves investigating Corrective Action Unit (CAU) 550 for potential contaminants of concern as delineated in a Corrective Action Investigation Plan. CAU 550 is an area that spatially overlaps portions of the Smoky test location. Smoky, T-2c, was a 44 kt atmospheric nuclear test detonated at 5:30 am on August 31, 1957, on top of a 213.4 m (700 ft) 200 ton tower (T-2c) in Area 8 of the NNSS. Smoky was a weapons related test of the Plumbbob series (number 19) and part of the Department of Defense Exercise Desert Rock VII and VIII. The cultural resources effort involved the development of a historic context based on archival documents and engineering records, the inventory of the cultural resources in the Smoky test area and an associated military trench location in Areas 9 and 10, and an evaluation of the National Register eligibility of the cultural resources. The inventory of the Smoky test area resulted in the identification of structures, features, and artifacts related to the physical development of the test location and the post-test remains. The Smoky test area was designated historic district D104 and coincides with a historic archaeological site recorded as 26NY14794 and the military trenches designed for troop observation, site 26NY14795. Sites 26NY14794 and 26NY14795 are spatially discrete with the trenches located 4.3 km (2.7 mi) southeast of the Smoky ground zero. As a result, historic district D104 is discontiguous and in total it covers 151.4 hectares (374 acres). The Smoky test location, recorded as historic

  1. Human reliability guidance - How to increase the synergies between human reliability, human factors, and system design and engineering. Phase 2: The American Point of View - Insights of how the US nuclear industry works with human reliability analysis

    Energy Technology Data Exchange (ETDEWEB)

    Oxstrand, J. (Vattenfall Ringhals AB, Stockholm (Sweden))

    2010-12-15

    The main goal of this Nordic Nuclear Safety Research Council (NKS) project is to produce guidance for how to use human reliability analysis (HRA) to strengthen overall safety. The project consists of two substudies: The Nordic Point of View - A User Needs Analysis, and The American Point of View - Insights of How the US Nuclear Industry Works with HRA. The purpose of the Nordic Point of View study was a user needs analysis that aimed to survey current HRA practices in the Nordic nuclear industry, with the main focus being to connect HRA to system design. In this study, 26 Nordic (Swedish and Finnish) nuclear power plant specialists with research, practitioner, and regulatory expertise in HRA, PRA, HSI, and human performance were interviewed. This study was completed in 2009. This study concludes that HRA is an important tool when dealing with human factors in control room design or modernizations. The Nordic Point of View study showed areas where the use of HRA in the Nordic nuclear industry could be improved. To gain more knowledge about how these improvements could be made, and what improvements to focus on, the second study was conducted. The second study is focused on the American nuclear industry, which has many more years of experience with risk assessment and human reliability than the Nordic nuclear industry. Interviews were conducted to collect information to help the author understand the similarities and differences between the American and the Nordic nuclear industries, and to find data regarding the findings from the first study. The main focus of this report is to identify potential HRA improvements based on the data collected in the American Point of View survey. (Author)

  2. Understanding global security

    OpenAIRE

    Hough, Peter

    2013-01-01

    Fully revised to incorporate recent developments, this third edition of Understanding Global Security analyzes the variety of ways in which peoples lives are threatened and / or secured in contemporary global politics. The traditional focus of Security Studies texts: war, deterrence and terrorism are analyzed alongside non-military security issues such as famine, crime, disease, disasters, environmental degradation and human rights abuses to provide a comprehensive survey of how and why peopl...

  3. LEM2 recruits CHMP7 for ESCRT-mediated nuclear envelope closure in fission yeast and human cells.

    Science.gov (United States)

    Gu, Mingyu; LaJoie, Dollie; Chen, Opal S; von Appen, Alexander; Ladinsky, Mark S; Redd, Michael J; Nikolova, Linda; Bjorkman, Pamela J; Sundquist, Wesley I; Ullman, Katharine S; Frost, Adam

    2017-03-14

    Endosomal sorting complexes required for transport III (ESCRT-III) proteins have been implicated in sealing the nuclear envelope in mammals, spindle pole body dynamics in fission yeast, and surveillance of defective nuclear pore complexes in budding yeast. Here, we report that Lem2p (LEM2), a member of the LEM (Lap2-Emerin-Man1) family of inner nuclear membrane proteins, and the ESCRT-II/ESCRT-III hybrid protein Cmp7p (CHMP7), work together to recruit additional ESCRT-III proteins to holes in the nuclear membrane. In Schizosaccharomyces pombe, deletion of the ATPase vps4 leads to severe defects in nuclear morphology and integrity. These phenotypes are suppressed by loss-of-function mutations that arise spontaneously in lem2 or cmp7, implying that these proteins may function upstream in the same pathway. Building on these genetic interactions, we explored the role of LEM2 during nuclear envelope reformation in human cells. We found that CHMP7 and LEM2 enrich at the same region of the chromatin disk periphery during this window of cell division and that CHMP7 can bind directly to the C-terminal domain of LEM2 in vitro. We further found that, during nuclear envelope formation, recruitment of the ESCRT factors CHMP7, CHMP2A, and IST1/CHMP8 all depend on LEM2 in human cells. We conclude that Lem2p/LEM2 is a conserved nuclear site-specific adaptor that recruits Cmp7p/CHMP7 and downstream ESCRT factors to the nuclear envelope.

  4. Human Cytomegalovirus Immediate Early Interaction with Host Nuclear Structures: Definition of an Immediate Transcript Environment

    Science.gov (United States)

    Ishov, Alexander M.; Stenberg, Richard M.; Maul, Gerd G.

    1997-01-01

    The development of an induced transcript environment was investigated at the supramolecular level through comparative localization of the human cytomegalovirus immediate early (IE) transcripts and specific nuclear domains shortly after infection. Compact aggregates of IE transcripts form only adjacent to nuclear domain 10 (ND10), and the viral protein IE86 accumulates exclusively juxtaposed to the subpopulation of ND10 with transcripts. The stream of transcripts is funneled from ND10 into the spliceosome assembly factor SC35 domain through the accumulation of IE86 protein, which recruits some components of the basal transcription machinery. Concomitantly the IE72 protein binds to ND10 and later disperses them. The domain containing the zinc finger region of IE72 is essential for this dispersal. Positional analysis of proteins IE86 and IE72, IE transcripts, ND10, the spliceosome assembly factor SC35, and basal transcription factors defines spatially and temporally an immediate transcript environment, the basic components of which exist in the cell before viral infection, providing the structural environment for the virus to usurp. PMID:9214377

  5. Comparative study between reconstructed and native human epidermis using nuclear microscopy

    Energy Technology Data Exchange (ETDEWEB)

    Ynsa, M.D. [Centre d' Etudes Nucleaires de Bordeaux-Gradignan, IN2P3-CNRS/Unite Interface Physique-Biologie, BP 120, Le Haut Vigneau, 33175 Gradignan Cedex (France)]. E-mail: ynsa@cenbg.in2p3.fr; Gontier, E. [Centre d' Etudes Nucleaires de Bordeaux-Gradignan, IN2P3-CNRS/Unite Interface Physique-Biologie, BP 120, Le Haut Vigneau, 33175 Gradignan Cedex (France); Mavon, A. [Institut de Recherche Pierre FABRE, Castanet Tolosan (France); Moretto, P. [Centre d' Etudes Nucleaires de Bordeaux-Gradignan, IN2P3-CNRS/Unite Interface Physique-Biologie, BP 120, Le Haut Vigneau, 33175 Gradignan Cedex (France); Rosdy, M. [SkinEthic Laboratories, 45 rue St. Philippe, 06000 Nice (France)

    2006-08-15

    The physiological status of native skin is suffering from large inter-individual variations, especially in terms of inorganic ions content. For this reason, together with the advent of ethic laws on animal experimentation, reconstructed skin or epidermis models are extensively employed nowadays in penetration studies for cosmetic or pharmacological applications. It has been already verified that reconstructed human epidermis (RHE) has similar physiological mechanisms to native human skin, but until now, there are few studies where the elemental concentrations of both skins, reconstructed and native, are compared. In this work, freeze-dried thin sections of human native skin obtained from surgery have been characterized using PIXE, RBS and STIM at the CENBG nuclear microprobe. RHE samples were treated and analyzed in the same conditions for comparison. The combination of the different imaging and analysis techniques made possible a clear delimitation and identification of skin ultrastructure. The elemental concentrations of P, S, Cl, K and Ca were measured in the different strata. For both skins, concentrations have been compared and significant differences in terms of elemental concentrations have been determined using statistical approaches. Similar physiological characteristics were pointed out in both skin models, in particular the Ca gradient presumably involved in the regulation of the barrier effect.

  6. Production of human apolipoprotein(a) transgenic NIBS miniature pigs by somatic cell nuclear transfer.

    Science.gov (United States)

    Shimatsu, Yoshiki; Horii, Wataru; Nunoya, Tetsuo; Iwata, Akira; Fan, Jianglin; Ozawa, Masayuki

    2016-01-01

    Most cases of ischemic heart disease and stroke occur as a result of atherosclerosis. The purpose of this study was to produce a new Nippon Institute for Biological Science (NIBS) miniature pig model by somatic cell nuclear transfer (SCNT) for studying atherosclerosis. The human apolipoprotein(a) (apo(a)) genes were transfected into kidney epithelial cells derived from a male and a female piglet. Male cells were used as donors initially, and 275 embryos were transferred to surrogates. Three offspring were delivered, and the production efficiency was 1.1% (3/275). Serial female cells were injected into 937 enucleated oocytes. Eight offspring were delivered (production efficiency: 0.9%) from surrogates. One male and 2 female transgenic miniature pigs matured well. Lipoprotein(a) was found in the male and one of the female transgenic animals. These results demonstrate successful production of human apo(a) transgenic NIBS miniature pigs by SCNT. Our goal is to establish a human apo(a) transgenic NIBS miniature pig colony for studying atherosclerosis.

  7. Comparative study between reconstructed and native human epidermis using nuclear microscopy

    Science.gov (United States)

    Ynsa, M. D.; Gontier, E.; Mavon, A.; Moretto, P.; Rosdy, M.

    2006-08-01

    The physiological status of native skin is suffering from large inter-individual variations, especially in terms of inorganic ions content. For this reason, together with the advent of ethic laws on animal experimentation, reconstructed skin or epidermis models are extensively employed nowadays in penetration studies for cosmetic or pharmacological applications. It has been already verified that reconstructed human epidermis (RHE) has similar physiological mechanisms to native human skin, but until now, there are few studies where the elemental concentrations of both skins, reconstructed and native, are compared. In this work, freeze-dried thin sections of human native skin obtained from surgery have been characterized using PIXE, RBS and STIM at the CENBG nuclear microprobe. RHE samples were treated and analyzed in the same conditions for comparison. The combination of the different imaging and analysis techniques made possible a clear delimitation and identification of skin ultrastructure. The elemental concentrations of P, S, Cl, K and Ca were measured in the different strata. For both skins, concentrations have been compared and significant differences in terms of elemental concentrations have been determined using statistical approaches. Similar physiological characteristics were pointed out in both skin models, in particular the Ca gradient presumably involved in the regulation of the barrier effect.

  8. Production of human lysozyme-transgenic cloned porcine embryos by somatic nuclear transfer

    Institute of Scientific and Technical Information of China (English)

    Qiuyan Li; Hengxi Wei; Ying Guo; Yan Li; Rui Zhao; Yufang Ma; Zhengquan Yu; Bo Tang; Lei Zhang; Yunping Dai; Ning Li

    2009-01-01

    Due to their physiology and organ size, pigs have significant potential as human disease models and as organ transplantation donors. Genetic modification of pigs could provide benefits for both agriculture and human medicine. In this study, five fetal pig fibroblast cell lines from two species (Wuzhishan and Landrace pigs) were transfected using double-marked human lysozyme (HLY) plasmids (pBC1-HLY-GFP-NEO) by a liposome-mediated method. The ratio of green fluorescent protein (GFP)-expressing cells was >95% in sw7, sw8, s1w3 and s1w6 cell lines, but only 49.3% in slw9 cells. Cells from the four highly transgenic lines were used as nuclear donors to construct embryos, which were then cultured after fusion and activation by electric stimulation. The rate of cleavage was 76.7%, 48 h after acti-vation. After 7 days, 18.5% of cleaved eggs had developed to the blastocyst stage and 93.3% of blastocysts were GFP-positive. These results indicate that transgenic fetal pig fibroblast cell lines could be obtained by a liposome-mediated method, though the transfection efficiency varied between cell lines. Reconstructed embryos derived from transgenic cells could successfully develop into blastocysts, most of which were GFP-positive.

  9. Analyzing and sense making of human factors in the Malaysian radiation and nuclear emergency planning framework

    Science.gov (United States)

    Hamid, A. H. A.; Rozan, M. Z. A.; Deris, S.; Ibrahim, R.; Abdullah, W. S. W.; Rahman, A. A.; Yunus, M. N. M.

    2016-01-01

    The evolution of current Radiation and Nuclear Emergency Planning Framework (RANEPF) simulator emphasizes on the human factors to be analyzed and interpreted according to the stakeholder's tacit and explicit knowledge. These human factor criteria are analyzed and interpreted according to the "sense making theory" and Disaster Emergency Response Management Information System (DERMIS) design premises. These criteria are corroborated by the statistical criteria. In recent findings, there were no differences of distributions among the stakeholders according to gender and organizational expertise. These criteria are incrementally accepted and agreed the research elements indicated in the respective emergency planning frameworks and simulator (i.e. 78.18 to 84.32, p-value human factors criteria in the associated analyses and theoretical perspectives to be further acomodated in the future simulator development. This development is in conjunction with the proposed hypothesis building of the process factors and responses diagram. We proposed that future work which implies the additional functionality of the simulator, as strategized, condensed and concise, comprehensive public disaster preparedness and intervention guidelines, to be a useful and efficient computer simulation.

  10. Novel splicing variant of the human orphan nuclear receptor Nurr1 gene

    Institute of Scientific and Technical Information of China (English)

    徐评议; 乐卫东

    2004-01-01

    Background Nurr1 is a member of the nuclear receptor superfamily of transcription factors. The objective of the present study was to identify novel splicing variants of the gene in neuronal and non-neuronal tissues and determine their functions. Methods Reverse transcription-polymerase chain reaction (RT-PCR) analysis was used to screen for Nurr1 splice variants in the adult human central nervous system (CNS) and in other tissues such as lymphocytes, and liver, muscle, and kidney cells. Functional assays of the variants were performed by measuring Nurr1 response element (NuRE) transcriptional activity in vitro. Results In this study, the authors identified a novel splicing variant of Nurr1 within exon 5, found in multiple adult human tissues, including lymphocytes, and liver, muscle, and kidney cells, but not in the brain or spinal cord. Sequencing analysis showed the variant has a 75 bp deletion between nucleotides 1402 and 1476. A functional assay of the Nurr1-c splicing variant, performed by measuring NuRE transcriptional activity in vitro, detected a 39% lower level of luciferase (LUC) activity (P<0.05).Conclusion A novel splicing variant of Nurr1 exists in human non-neuronal tissues and functional assays suggest that the variant may act as an alternate transcription regulator.

  11. Analyzing and sense making of human factors in the Malaysian radiation and nuclear emergency planning framework

    Energy Technology Data Exchange (ETDEWEB)

    Hamid, A. H. A., E-mail: amyhamijah@gmail.com, E-mail: amyhamijah@nm.gov.my [Faculty of Computing, Universiti Teknologi Malaysia (UTM), Skudai, 81310 Johor Bahru, Johor (Malaysia); Universiti Malaysia Kelantan (UMK), Pengkalan Chepa, 16100 Kota Bharu, Kelantan (Malaysia); Rozan, M. Z. A., E-mail: drmohdzaidi@gmail.com; Ibrahim, R. [Faculty of Computing, Universiti Teknologi Malaysia (UTM), Skudai, 81310 Johor Bahru, Johor (Malaysia); Deris, S. [Universiti Malaysia Kelantan (UMK), Pengkalan Chepa, 16100 Kota Bharu, Kelantan (Malaysia); Abdullah, W. S. W.; Yunus, M. N. M. [Malaysian Nuclear Agency (NM), Bangi, 43000 Kajang, Selangor (Malaysia); Rahman, A. A. [Faculty of Medicine and Health Sciences, Universiti Putra Malaysia (UPM), 43400 Serdang, Selangor (Malaysia)

    2016-01-22

    The evolution of current Radiation and Nuclear Emergency Planning Framework (RANEPF) simulator emphasizes on the human factors to be analyzed and interpreted according to the stakeholder’s tacit and explicit knowledge. These human factor criteria are analyzed and interpreted according to the “sense making theory” and Disaster Emergency Response Management Information System (DERMIS) design premises. These criteria are corroborated by the statistical criteria. In recent findings, there were no differences of distributions among the stakeholders according to gender and organizational expertise. These criteria are incrementally accepted and agreed the research elements indicated in the respective emergency planning frameworks and simulator (i.e. 78.18 to 84.32, p-value <0.05). This paper suggested these human factors criteria in the associated analyses and theoretical perspectives to be further acomodated in the future simulator development. This development is in conjunction with the proposed hypothesis building of the process factors and responses diagram. We proposed that future work which implies the additional functionality of the simulator, as strategized, condensed and concise, comprehensive public disaster preparedness and intervention guidelines, to be a useful and efficient computer simulation.

  12. Quercetin induces human colon cancer cells apoptosis by inhibiting the nuclear factor-kappa B Pathway.

    Science.gov (United States)

    Zhang, Xiang-An; Zhang, Shuangxi; Yin, Qing; Zhang, Jing

    2015-01-01

    Quercetin can inhibit the growth of cancer cells with the ability to act as chemopreventers. Its cancer-preventive effect has been attributed to various mechanisms, including the induction of cell-cycle arrest and/or apoptosis as well as the antioxidant functions. Nuclear factor kappa-B (NF-κB) is a signaling pathway that controls transcriptional activation of genes important for tight regulation of many cellular processes and is aberrantly expressed in many types of cancer. Inhibitors of NF-κB pathway have shown potential anti-tumor activities. However, it is not fully elucidated in colon cancer. In this study, we demonstrate that quercetin induces apoptosis in human colon cancer CACO-2 and SW-620 cells through inhibiting NF-κB pathway, as well as down-regulation of B-cell lymphoma 2 and up-regulation of Bax, thus providing basis for clinical application of quercetin in colon cancer cases.

  13. The acetyllysine reader BRD3R promotes human nuclear reprogramming and regulates mitosis.

    Science.gov (United States)

    Shao, Zhicheng; Zhang, Ruowen; Khodadadi-Jamayran, Alireza; Chen, Bo; Crowley, Michael R; Festok, Muhamad A; Crossman, David K; Townes, Tim M; Hu, Kejin

    2016-01-01

    It is well known that both recipient cells and donor nuclei demonstrate a mitotic advantage as observed in the traditional reprogramming with somatic cell nuclear transfer (SCNT). However, it is not known whether a specific mitotic factor plays a critical role in reprogramming. Here we identify an isoform of human bromodomain-containing 3 (BRD3), BRD3R (BRD3 with Reprogramming activity), as a reprogramming factor. BRD3R positively regulates mitosis during reprogramming, upregulates a large set of mitotic genes at early stages of reprogramming, and associates with mitotic chromatin. Interestingly, a set of the mitotic genes upregulated by BRD3R constitutes a pluripotent molecular signature. The two BRD3 isoforms display differential binding to acetylated histones. Our results suggest a molecular interpretation for the mitotic advantage in reprogramming and show that mitosis may be a driving force of reprogramming.

  14. Changes of Nuclear Matrix Proteins Following the Differentiation of Human Osteosarcoma MG-63 Cells

    Institute of Scientific and Technical Information of China (English)

    Chun-Hong Zhao; Qi-Fu Li; Yan Zhao; Jing-Wen Niu; Zhi-Xing Li; Jin-An Chen

    2006-01-01

    Human osteosarcoma MG-63 cells were induced into differentiation by 5 mmol/L hexamethylene bisacetamide (HMBA). Their nuclear matrix proteins (NMPs) were selectively extracted and subjected to two-dimensional gel electrophoresis analysis.The results of protein patterns were analyzed by Melanie software. The spots of differentially expressed NMPs were excised and subjected to in situ digestion with trypsin. The maps of peptide mass fingerprinting were obtained by MALDI-TOFMS analysis, and were submitted for NCBI database searches by Mascot tool.There were twelve spots changed remarkably during the differentiation induced by HMBA, nine of which were identified. The roles of the regulated proteins during the MG-63 differentiation were analyzed. This study suggests that the induced differentiation of cancer cells is accompanied by the changes of NMPs, and confirms the presence of some specific NMPs related to the cancer cell proliferation and differentiation. The changed NMPs are potential markers for cancer diagnosis or targets for cancer therapy.

  15. EXPRESSION OF P53 PROTEIN AND PROLIFERATING CELL NUCLEAR ANTIGEN IN HUMAN GESTATION TROPHOBLASTIC DISEASE

    Institute of Scientific and Technical Information of China (English)

    黄铁军; 王志忠; 方光光; 刘志恒

    2004-01-01

    Objective: To study the relationship between p53 protein, proliferating cell nuclear antigen (PCNA) expression and benign or malignant gestational trophoblastic disease (MGTD). Methods: The histotomic sections of 48 patients with gestational trophoblastic disease and 24 patients of normal chorionic villi were stained using immunohistochemistry. The monoclonal antibodies were used to determine p53 protein and PCNA. Results: The frequency of p53 and PCNA positive expression were significantly different among the chorionic villi of normal pregnancy, hydratidiform mole (HM) and MGTD. But neither p53 nor PCNA has any relation with the clinical staging or metastasis of MGTD. Conclusion: Both P53 and PCNA are valuable in diagnosis of human gestational trophoblastic disease.

  16. The passage of Australia’s data retention regime: national security, human rights, and media scrutiny

    Directory of Open Access Journals (Sweden)

    Nicolas Suzor

    2017-03-01

    Full Text Available In 2015, the Australian government passed the Telecommunications (Interception and Access Amendment (Data Retention Act, which requires ISPs to collect metadata about their users and store this metadata for two years. From its conception, Australia’s data retention scheme has been controversial. In this article we examine how public interest concerns were addressed in Australian news media during the Act’s passage. The Act was ultimately passed with bipartisan support, despite serious deficiencies. We show how the Act’s complexity seemed to limit engaged critique in the mainstream media and how fears over terrorist attacks were exploited to secure the Act’s passage through parliament.

  17. Prediction on Human Resource Supply/Demand in Nuclear Industry Using Markov Chains Model and Job Coefficient

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Hyuk; Min, Byung Joo; Lee, Eui Jin; You, Byung Hoon [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    2006-07-01

    According to the recent report by the OECD/NEA, there is a large imbalance between supply and demand of human resource in nuclear field. In the U.S., according to survey of Nuclear Engineering Department Heads Organization (NEDHO), 174 graduates in B.S or M.S degree were fed to nuclear industry in year 2004. Meanwhile, the total amount of demand in nuclear industry was about 642 engineers, which was approximately three times of the supply. In case of other developed western nations, the OECD/NEA report stated that the level of imbalance is similar to that of the U.S. However, nations having nuclear power development programs such as Korea, Japan and France seem to be in a different environment of supply and demand from that of the U.S. In this study, the difference of manpower status between the U.S and Korea has been investigated and the nuclear manpower required for the future in Korea is predicted. To investigate the factors making difference between the U.S. and NPP developing countries including Korea, a quantitative manpower planning model, Markov chains model, is applied. Since the Markov chains model has the strength of analyzing an inflow or push structure, the model fits the system governed by the inflow of manpower. A macroscopic status of manpower demand on nuclear industry is calculated up to 2015 using the Job coefficient (JC) and GDP, which are derived from the Survey for Roadmap of Electric Power Industry Manpower Planning. Furthermore, the total numbers of required manpower and supplied manpower up to 2030 were predicted by JC and Markov Chains model, respectively. Whereas the employee status of nuclear industries has been annually investigated by KAIF since 1995, the following data from the 10{sup th} survey and nuclear energy yearbooks from 1998 to 2005 are applied; (a) the status of the manpower demand of industry, (b) number of students entering, graduating and getting job in nuclear engineering.

  18. Indonesia's present status and needs of human resource development in nuclear field

    Energy Technology Data Exchange (ETDEWEB)

    Ruslan, Jeni; Sagala, F.P. [National Nuclear Energy Agency of Indonesia (Indonesia)

    2000-12-01

    BATAN, started out as a governmental committee established in 1954, has a new organizational structure, based on Presidential Decree of 1998. BATAN has developed its researches in almost practically all-nuclear fields. The situation in Indonesia has been much influenced by the economic crisis, which still being faced by Indonesia. BATAN's strategic planning is described in four areas, those are: 1. Basic human needs, 2. Energy, natural resources and environment, 3. Industry, 4. Socio-cultural and institution. Priority has been given to fulfill, as well as to promote agriculture, health and the industry related to people's welfare, which may develop and improve the immediate needs of the people. In the meantime, we have made considerable investments in manpower development in anticipation of the introduction of nuclear power. BATAN, as of September 1999, has 3889 employees, 26 % of them have bachelor degree, 6 % hold master degrees, and only 2% hold doctoral degree, a total of 34 % employees with university education. Others 11 % have either non-vocational or vocational education beyond High School. The rest of 55 % have high school education or lower, they are administrative clerks (25 %) or technicians (30 %). In the human resources development, BATAN's Education and Training Center, in collaboration with some universities and other national/international institutions, is managing education and training programs for employees. To date, there are 43 BATAN employees studying in various universities in Japan, while another 42 employees are studying in six different countries. Research and Development that have more direct impact to the community will become a priority in the coming years. Without undermining the importance of basic research in advanced fields, we will expect to have more research on application to optimize utilization of research reactors and related facilities for the benefit of both the energy and non-energy sectors. (Tanaka, Y.)

  19. Targeting Nuclear Receptors with Lentivirus-Delivered Small RNAs in Primary Human Hepatocytes

    Directory of Open Access Journals (Sweden)

    Maria Thomas

    2014-07-01

    Full Text Available Background: RNA interference (RNAi has tremendous potential for investigating gene function and for developing new therapies. Primary human hepatocytes (PHH are the “gold standard” for studying the regulation of hepatic metabolism in vitro. However, application of RNAi in PHH has some technical hurdles. The objective of this study was to develop effective and robust protocol for transduction of PHH with lentiviral vectors. Methods: We used lentiviral vectors to transduce PHH for introduction of short hairpin RNAs (shRNAs targeting constitutive androstane receptor (CAR, peroxisome proliferator activated receptor alpha (PPARα, and microRNA, miR-143. Infection efficiency was quantitatively analyzed by flow cytometry and microscopy. Target gene expression was assessed using quantitative real-time (qRT-PCR method. Results: Lentiviral vector transduction resulted in ≥95% of infected cells at low multiplicity of infection (MOI of 3, which did not impair cellular viability. We demonstrated the feasibility of this technique in studies on targeting nuclear receptors, PPARα and CAR, with shRNAs as well as in lentivirus-mediated overexpression and knock-down of miRNA-143 experiments. Conclusions: We developed an efficient and robust protocol with standardized procedures for virus production, method of titer determination, and infection procedure for RNAi in primary human hepatocytes based on delivery of shRNAs, microRNAs or anti-microRNAs in different laboratory settings. This approach should be useful to study not only the regulation via nuclear receptors but also other biological, pharmacological, and toxicological aspects of drug metabolism.

  20. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.