WorldWideScience

Sample records for safety information computational

  1. Knowledge management: Role of the the Radiation Safety Information Computational Center (RSICC)

    Science.gov (United States)

    Valentine, Timothy

    2017-09-01

    The Radiation Safety Information Computational Center (RSICC) at Oak Ridge National Laboratory (ORNL) is an information analysis center that collects, archives, evaluates, synthesizes and distributes information, data and codes that are used in various nuclear technology applications. RSICC retains more than 2,000 software packages that have been provided by code developers from various federal and international agencies. RSICC's customers (scientists, engineers, and students from around the world) obtain access to such computing codes (source and/or executable versions) and processed nuclear data files to promote on-going research, to ensure nuclear and radiological safety, and to advance nuclear technology. The role of such information analysis centers is critical for supporting and sustaining nuclear education and training programs both domestically and internationally, as the majority of RSICC's customers are students attending U.S. universities. Additionally, RSICC operates a secure CLOUD computing system to provide access to sensitive export-controlled modeling and simulation (M&S) tools that support both domestic and international activities. This presentation will provide a general review of RSICC's activities, services, and systems that support knowledge management and education and training in the nuclear field.

  2. The Role of the Radiation Safety Information Computational Center (RSICC) in Knowledge Management

    International Nuclear Information System (INIS)

    Valentine, T.

    2016-01-01

    Full text: The Radiation Safety Information Computational Center (RSICC) is an information analysis center that collects, archives, evaluates, synthesizes and distributes information, data and codes that are used in various nuclear technology applications. RSICC retains more than 2,000 packages that have been provided by contributors from various agencies. RSICC’s customers obtain access to such computing codes (source and/or executable versions) and processed nuclear data files to promote on-going research, to help ensure nuclear and radiological safety, and to advance nuclear technology. The role of such information analysis centers is critical for supporting and sustaining nuclear education and training programmes both domestically and internationally, as the majority of RSICC’s customers are students attending U.S. universities. RSICC also supports and promotes workshops and seminars in nuclear science and technology to further the use and/or development of computational tools and data. Additionally, RSICC operates a secure CLOUD computing system to provide access to sensitive export-controlled modeling and simulation (M&S) tools that support both domestic and international activities. This presentation will provide a general review of RSICC’s activities, services, and systems that support knowledge management and education and training in the nuclear field. (author

  3. Safety Information System Guide

    International Nuclear Information System (INIS)

    Bullock, M.G.

    1977-03-01

    This Guide provides guidelines for the design and evaluation of a working safety information system. For the relatively few safety professionals who have already adopted computer-based programs, this Guide may aid them in the evaluation of their present system. To those who intend to develop an information system, it will, hopefully, inspire new thinking and encourage steps towards systems safety management. For the line manager who is working where the action is, this Guide may provide insight on the importance of accident facts as a tool for moving ideas up the communication ladder where they will be heard and acted upon; where what he has to say will influence beneficial changes among those who plan and control his operations. In the design of a safety information system, it is suggested that the safety manager make friends with a computer expert or someone on the management team who has some feeling for, and understanding of, the art of information storage and retrieval as a new and better means for communication

  4. Soft computing in computer and information science

    CERN Document Server

    Fray, Imed; Pejaś, Jerzy

    2015-01-01

    This book presents a carefully selected and reviewed collection of papers presented during the 19th Advanced Computer Systems conference ACS-2014. The Advanced Computer Systems conference concentrated from its beginning on methods and algorithms of artificial intelligence. Further future brought new areas of interest concerning technical informatics related to soft computing and some more technological aspects of computer science such as multimedia and computer graphics, software engineering, web systems, information security and safety or project management. These topics are represented in the present book under the categories Artificial Intelligence, Design of Information and Multimedia Systems, Information Technology Security and Software Technologies.

  5. The Radiation Safety Information Computational Center (RSICC): A Resource for Nuclear Science Applications

    Energy Technology Data Exchange (ETDEWEB)

    Kirk, Bernadette Lugue [ORNL

    2009-01-01

    The Radiation Safety Information Computational Center (RSICC) has been in existence since 1963. RSICC collects, organizes, evaluates and disseminates technical information (software and nuclear data) involving the transport of neutral and charged particle radiation, and shielding and protection from the radiation associated with: nuclear weapons and materials, fission and fusion reactors, outer space, accelerators, medical facilities, and nuclear waste management. RSICC serves over 12,000 scientists and engineers from about 100 countries.

  6. The Radiation Safety Information Computational Center (RSICC): A Resource for Nuclear Science Applications

    International Nuclear Information System (INIS)

    Kirk, Bernadette Lugue

    2009-01-01

    The Radiation Safety Information Computational Center (RSICC) has been in existence since 1963. RSICC collects, organizes, evaluates and disseminates technical information (software and nuclear data) involving the transport of neutral and charged particle radiation, and shielding and protection from the radiation associated with: nuclear weapons and materials, fission and fusion reactors, outer space, accelerators, medical facilities, and nuclear waste management. RSICC serves over 12,000 scientists and engineers from about 100 countries. An important activity of RSICC is its participation in international efforts on computational and experimental benchmarks. An example is the Shielding Integral Benchmarks Archival Database (SINBAD), which includes shielding benchmarks for fission, fusion and accelerators. RSICC is funded by the United States Department of Energy, Department of Homeland Security and Nuclear Regulatory Commission.

  7. Improving operational safety management through probabilistic safety assessment on personal computers

    International Nuclear Information System (INIS)

    1988-10-01

    The Technical Committee Meeting considered the current effort in the implementation and use of PSA information for day-to-day operational safety management on Personal Computers. Due to the very recent development of the necessary hardware and software for Personal Computers, the application of PSA information for day-to-day operational safety management on PCs is essentially still in a pioneering stage. There is at present only one such system for end users existing, the PRISIM (Plant Risk Status Information Management) program for which a limited practical application experience is available. Others are still in the development stage. The main aim of the Technical Committee Meeting was to discuss the present status of PSA based systems for operational safety management support on small computers, to consider practical aspects when implementing these systems into a nuclear installation and to address problems related to the further work in the area. A separate abstract was prepared for the summary of the Technical Committee Meeting and for the 8 papers presented by the participants. Refs, figs and tabs

  8. EUMENES, a computer software for managing the radiation safety program information at an institutional level

    International Nuclear Information System (INIS)

    Hernandez Saiz, Alejandro; Cornejo Diaz, Nestor; Valdes Ramos, Maryzury; Martinez Gonzalez, Alina; Gonzalez Rodriguez, Niurka; Vergara Gil, Alex

    2008-01-01

    The correct application of national and international regulations in the field of Radiological Safety requires the implementation of Radiation Safety Programs appropriate to the developed practice. These Programs demand the preparation and keeping of an important number of records and data, the compliance with working schedules, systematic quality controls, audits, delivery of information to the Regulatory Authority, the execution of radiological assessments, etc. Therefore, it is unquestionable the necessity and importance of having a computer tool to support the management of the information related to the Radiation Safety Program in any institution. The present work describes a computer program that allows the efficient management of these data. Its design was based on the IAEA International Basic Safety Standards recommendations and on the requirements of the Cuban national standards, with the objective of being flexible enough to be applied in most of the institutions using ionizing radiations. The most important records of Radiation Safety Programs were incorporated and reports can be generated by the users. An additional tools-module allows the user to access to a radionuclide data library, and to carry out different calculations of interest in radiological protection. The program has been developed in Borland Delphi and manages Microsoft Access databases. It is a user friendly code that aims to support the optimization of Radiation Safety Programs. The program contributes to save resources and time, as the generated information is electronically kept and transmitted. The code has different security access levels according to the user responsibility at the institution and also provides for the analysis of the introduced data, in a quick and efficient way, as well as to notice deadlines, the exceeding of reference levels and situations that require attention. (author)

  9. Development and design of a computer-assisted information management system for radiation safety management at the University of Washington

    International Nuclear Information System (INIS)

    Riches, C.G.; Riordan, F.J.; Robb, D.; Grieb, C.; Pence, G.; O'Brien, M.J.

    1984-01-01

    The Radiation Safety Office (RSO) at the University of Washington (UW) found that it needed a computerized information system to help manage the campus radiation safety program and to help provide the records necessary to show compliance with regulations and license requirements. The John L. Locke Computer Center at the UW had just developed the GLAMOR system to aid information entry and query for their computer when the RSO turned to them for assistance. The module that was developed provided a mechanism for controlling and monitoring radioactive materials on campus. This became one part of a multi-faceted system that registers users, employees, sealed sources and radiation-producing machines. The system is designed to be interactive, for immediate information recall, and powerful enough to provide routine and special reports on compliance status. The RSO information system is designed to be flexible and can easily incorporate additional features. Some future features include an interactive SNM control program, an interface to the information system currently being developed for the occupational safety and health program and an interface to the database provided by the commercial film badge service used by the University. Development of this program lead the RSO to appreciate the usefulness of having health physics professionals on the staff who were also knowledgeable about computers and who could develop programs and reports necessary to their activities

  10. Computer aided safety analysis 1989

    International Nuclear Information System (INIS)

    1990-04-01

    The meeting was conducted in a workshop style, to encourage involvement of all participants during the discussions. Forty-five (45) experts from 19 countries, plus 22 experts from the GDR participated in the meeting. A list of participants can be found at the end of this volume. Forty-two (42) papers were presented and discussed during the meeting. Additionally an open discussion was held on the possible directions of the IAEA programme on Computer Aided Safety Analysis. A summary of the conclusions of these discussions is presented in the publication. The remainder of this proceedings volume comprises the transcript of selected technical papers (22) presented in the meeting. It is the intention of the IAEA that the publication of these proceedings will extend the benefits of the discussions held during the meeting to a larger audience throughout the world. The Technical Committee/Workshop on Computer Aided Safety Analysis was organized by the IAEA in cooperation with the National Board for Safety and Radiological Protection (SAAS) of the German Democratic Republic in Berlin. The purpose of the meeting was to provide an opportunity for discussions on experiences in the use of computer codes used for safety analysis of nuclear power plants. In particular it was intended to provide a forum for exchange of information among experts using computer codes for safety analysis under the Technical Cooperation Programme on Safety of WWER Type Reactors (RER/9/004) and other experts throughout the world. A separate abstract was prepared for each of the 22 selected papers. Refs, figs tabs and pictures

  11. Construction of Structure of Indicators of Efficiency of Counteraction to Threats of Information Safety in Interests of the Estimation of Security of Information Processes in Computer Systems

    Directory of Open Access Journals (Sweden)

    A. P. Kurilo

    2010-06-01

    Full Text Available The theorem of system of indicators for an estimation of the security of information processes in the computer systems is formulated and proved. A number of the signs is proved, allowing to consider set of the indicators of efficiency of counteraction to the threats of information safety of the computer systems as the system.

  12. Traffic information computing platform for big data

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Zongtao, E-mail: ztduan@chd.edu.cn; Li, Ying, E-mail: ztduan@chd.edu.cn; Zheng, Xibin, E-mail: ztduan@chd.edu.cn; Liu, Yan, E-mail: ztduan@chd.edu.cn; Dai, Jiting, E-mail: ztduan@chd.edu.cn; Kang, Jun, E-mail: ztduan@chd.edu.cn [Chang' an University School of Information Engineering, Xi' an, China and Shaanxi Engineering and Technical Research Center for Road and Traffic Detection, Xi' an (China)

    2014-10-06

    Big data environment create data conditions for improving the quality of traffic information service. The target of this article is to construct a traffic information computing platform for big data environment. Through in-depth analysis the connotation and technology characteristics of big data and traffic information service, a distributed traffic atomic information computing platform architecture is proposed. Under the big data environment, this type of traffic atomic information computing architecture helps to guarantee the traffic safety and efficient operation, more intelligent and personalized traffic information service can be used for the traffic information users.

  13. Traffic information computing platform for big data

    International Nuclear Information System (INIS)

    Duan, Zongtao; Li, Ying; Zheng, Xibin; Liu, Yan; Dai, Jiting; Kang, Jun

    2014-01-01

    Big data environment create data conditions for improving the quality of traffic information service. The target of this article is to construct a traffic information computing platform for big data environment. Through in-depth analysis the connotation and technology characteristics of big data and traffic information service, a distributed traffic atomic information computing platform architecture is proposed. Under the big data environment, this type of traffic atomic information computing architecture helps to guarantee the traffic safety and efficient operation, more intelligent and personalized traffic information service can be used for the traffic information users

  14. Computer codes for level 1 probabilistic safety assessment

    International Nuclear Information System (INIS)

    1990-06-01

    Probabilistic Safety Assessment (PSA) entails several laborious tasks suitable for computer codes assistance. This guide identifies these tasks, presents guidelines for selecting and utilizing computer codes in the conduct of the PSA tasks and for the use of PSA results in safety management and provides information on available codes suggested or applied in performing PSA in nuclear power plants. The guidance is intended for use by nuclear power plant system engineers, safety and operating personnel, and regulators. Large efforts are made today to provide PC-based software systems and PSA processed information in a way to enable their use as a safety management tool by the nuclear power plant overall management. Guidelines on the characteristics of software needed for management to prepare a software that meets their specific needs are also provided. Most of these computer codes are also applicable for PSA of other industrial facilities. The scope of this document is limited to computer codes used for the treatment of internal events. It does not address other codes available mainly for the analysis of external events (e.g. seismic analysis) flood and fire analysis. Codes discussed in the document are those used for probabilistic rather than for phenomenological modelling. It should be also appreciated that these guidelines are not intended to lead the user to selection of one specific code. They provide simply criteria for the selection. Refs and tabs

  15. Software for computer based systems important to safety in nuclear power plants. Safety guide

    International Nuclear Information System (INIS)

    2004-01-01

    Computer based systems are of increasing importance to safety in nuclear power plants as their use in both new and older plants is rapidly increasing. They are used both in safety related applications, such as some functions of the process control and monitoring systems, as well as in safety critical applications, such as reactor protection or actuation of safety features. The dependability of computer based systems important to safety is therefore of prime interest and should be ensured. With current technology, it is possible in principle to develop computer based instrumentation and control systems for systems important to safety that have the potential for improving the level of safety and reliability with sufficient dependability. However, their dependability can be predicted and demonstrated only if a systematic, fully documented and reviewable engineering process is followed. Although a number of national and international standards dealing with quality assurance for computer based systems important to safety have been or are being prepared, internationally agreed criteria for demonstrating the safety of such systems are not generally available. It is recognized that there may be other ways of providing the necessary safety demonstration than those recommended here. The basic requirements for the design of safety systems for nuclear power plants are provided in the Requirements for Design issued in the IAEA Safety Standards Series.The IAEA has issued a Technical Report to assist Member States in ensuring that computer based systems important to safety in nuclear power plants are safe and properly licensed. The report provides information on current software engineering practices and, together with relevant standards, forms a technical basis for this Safety Guide. The objective of this Safety Guide is to provide guidance on the collection of evidence and preparation of documentation to be used in the safety demonstration for the software for computer based

  16. Software for computer based systems important to safety in nuclear power plants. Safety guide

    International Nuclear Information System (INIS)

    2005-01-01

    Computer based systems are of increasing importance to safety in nuclear power plants as their use in both new and older plants is rapidly increasing. They are used both in safety related applications, such as some functions of the process control and monitoring systems, as well as in safety critical applications, such as reactor protection or actuation of safety features. The dependability of computer based systems important to safety is therefore of prime interest and should be ensured. With current technology, it is possible in principle to develop computer based instrumentation and control systems for systems important to safety that have the potential for improving the level of safety and reliability with sufficient dependability. However, their dependability can be predicted and demonstrated only if a systematic, fully documented and reviewable engineering process is followed. Although a number of national and international standards dealing with quality assurance for computer based systems important to safety have been or are being prepared, internationally agreed criteria for demonstrating the safety of such systems are not generally available. It is recognized that there may be other ways of providing the necessary safety demonstration than those recommended here. The basic requirements for the design of safety systems for nuclear power plants are provided in the Requirements for Design issued in the IAEA Safety Standards Series.The IAEA has issued a Technical Report to assist Member States in ensuring that computer based systems important to safety in nuclear power plants are safe and properly licensed. The report provides information on current software engineering practices and, together with relevant standards, forms a technical basis for this Safety Guide. The objective of this Safety Guide is to provide guidance on the collection of evidence and preparation of documentation to be used in the safety demonstration for the software for computer based

  17. Software for computer based systems important to safety in nuclear power plants. Safety guide

    International Nuclear Information System (INIS)

    2000-01-01

    Computer based systems are of increasing importance to safety in nuclear power plants as their use in both new and older plants is rapidly increasing. They are used both in safety related applications, such as some functions of the process control and monitoring systems, as well as in safety critical applications, such as reactor protection or actuation of safety features. The dependability of computer based systems important to safety is therefore of prime interest and should be ensured. With current technology, it is possible in principle to develop computer based instrumentation and control systems for systems important to safety that have the potential for improving the level of safety and reliability with sufficient dependability. However, their dependability can be predicted and demonstrated only if a systematic, fully documented and reviewable engineering process is followed. Although a number of national and international standards dealing with quality assurance for computer based systems important to safety have been or are being prepared, internationally agreed criteria for demonstrating the safety of such systems are not generally available. It is recognized that there may be other ways of providing the necessary safety demonstration than those recommended here. The basic requirements for the design of safety systems for nuclear power plants are provided in the Requirements for Design issued in the IAEA Safety Standards Series.The IAEA has issued a Technical Report to assist Member States in ensuring that computer based systems important to safety in nuclear power plants are safe and properly licensed. The report provides information on current software engineering practices and, together with relevant standards, forms a technical basis for this Safety Guide. The objective of this Safety Guide is to provide guidance on the collection of evidence and preparation of documentation to be used in the safety demonstration for the software for computer based

  18. Computer security at ukrainian nuclear facilities: interface between nuclear safety and security

    International Nuclear Information System (INIS)

    Chumak, D.; Klevtsov, O.

    2015-01-01

    Active introduction of information technology, computer instrumentation and control systems (I and C systems) in the nuclear field leads to a greater efficiency and management of technological processes at nuclear facilities. However, this trend brings a number of challenges related to cyber-attacks on the above elements, which violates computer security as well as nuclear safety and security of a nuclear facility. This paper considers regulatory support to computer security at the nuclear facilities in Ukraine. The issue of computer and information security considered in the context of physical protection, because it is an integral component. The paper focuses on the computer security of I and C systems important to nuclear safety. These systems are potentially vulnerable to cyber threats and, in case of cyber-attacks, the potential negative impact on the normal operational processes can lead to a breach of the nuclear facility security. While ensuring nuclear security of I and C systems, it interacts with nuclear safety, therefore, the paper considers an example of an integrated approach to the requirements of nuclear safety and security

  19. South Ukraine NPP: Safety improvements through Plant Computer upgrade

    International Nuclear Information System (INIS)

    Brenman, O.; Chernyshov, M. A.; Denning, R. S.; Kolesov, S. A.; Balakan, H. H.; Bilyk, B. I.; Kuznetsov, V. I.; Trosman, G.

    2006-01-01

    This paper summarizes some results of the Plant Computer upgrade at the Units 2 and 3 of South Ukraine Nuclear Power Plant (NPP). A Plant Computer, which is also called the Computer Information System (CIS), is one of the key safety-related systems at VVER-1000 nuclear plants. The main function of the CIS is information support for the plant operators during normal and emergency operational modes. Before this upgrade, South Ukraine NPP operated out-of-date and obsolete systems. This upgrade project wax founded by the U.S. DOE in the framework of the International Nuclear Safety Program (INSP). The most efficient way to improve the quality and reliability of information provided to the plant operator is to upgrade the Human-System Interface (HSI), which is the Upper Level (UL) CIS. The upgrade of the CIS data-acquisition system (DAS), which is the Lower Level (LL) CIS, would have less effect on the unit safety. Generally speaking, the lifetime of the LL CIS is much higher than one of the UL CIS. Unlike Plant Computers at the Western-designed plants, the functionality of the WER-1000 CISs includes a control function (Centralized Protection Testing) and a number of the plant equipment monitoring functions, for example, Protection and Interlock Monitoring and Turbo-Generator Temperature Monitoring. The new system is consistent with a historical migration of the format by which information is presented to the operator away from the traditional graphic displays, for example, Piping and Instrument Diagrams (P and ID's), toward Integral Data displays. The cognitive approach to information presentation is currently limited by some licensing issues, but is adapted to a greater degree with each new system. The paper provides some lessons learned on the management of the international team. (authors)

  20. Reactor safety: the Nova computer system

    International Nuclear Information System (INIS)

    Eisgruber, H.; Stadelmann, W.

    1991-01-01

    After instances of maloperation, the causes of defects, the effectiveness of the measures taken to control the situation, and possibilities to avoid future recurrences need to be investigated above all before the plant is restarted. The most important aspect in all these efforts is to check the sequence in time, and the completeness, of the control measures initiated automatically. For this verification, a computer system is used instead of time-consuming manual analytical techniques, which produces the necessary information almost in real time. The results are available within minutes after completion of the measures initiated automatically. As all short-term safety functions are initiated by automatic systems, their consistent and comprehensive verification results in a clearly higher level of safety. The report covers the development of the computer system, and its implementation, in the Gundremmingen nuclear power station. Similar plans are being pursued in Biblis and Muelheim-Kaerlich. (orig.) [de

  1. Risk assessment of computer-controlled safety systems for fusion reactors

    International Nuclear Information System (INIS)

    Fryer, M.O.; Bruske, S.Z.

    1983-01-01

    The complexity of fusion reactor systems and the need to display, analyze, and react promptly to large amounts of information during reactor operation will require a number of safety systems in the fusion facilities to be computer controlled. Computer software, therefore, must be included in the reactor safety analyses. Unfortunately, the science of integrating computer software into safety analyses is in its infancy. Combined plant hardware and computer software systems are often treated by making simple assumptions about software performance. This method is not acceptable for assessing risks in the complex fusion systems, and a new technique for risk assessment of combined plant hardware and computer software systems has been developed. This technique is an extension of the traditional fault tree analysis and uses structured flow charts of the software in a manner analogous to wiring or piping diagrams of hardware. The software logic determines the form of much of the fault trees

  2. Animal Product Safety Information

    Science.gov (United States)

    ... Home Animal & Veterinary Safety & Health Product Safety Information Product Safety Information Share Tweet Linkedin Pin it More ... to report adverse experiences with veterinary drugs. Additional Product Information Questions and Answers: Evanger’s Dog and Cat ...

  3. Anatomy of safety-critical computing problems

    International Nuclear Information System (INIS)

    Swu Yih; Fan Chinfeng; Shirazi, Behrooz

    1995-01-01

    This paper analyzes the obstacles faced by current safety-critical computing applications. The major problem lies in the difficulty to provide complete and convincing safety evidence to prove that the software is safe. We explain this problem from a fundamental perspective by analyzing the essence of safety analysis against that of software developed by current practice. Our basic belief is that in order to perform a successful safety analysis, the state space structure of the analyzed system must have some properties as prerequisites. We propose the concept of safety analyzability, and derive its necessary and sufficient conditions; namely, definability, finiteness, commensurability, and tractability. We then examine software state space structures against these conditions, and affirm that the safety analyzability of safety-critical software developed by current practice is severely restricted by its state space structure and by the problem of exponential growth cost. Thus, except for small and simple systems, the safety evidence may not be complete and convincing. Our concepts and arguments successfully explain the current problematic situation faced by the safety-critical computing domain. The implications are also discussed

  4. Making nuclear power plant operational decisions using probabilistic safety assessment information and personal computers. Working material

    International Nuclear Information System (INIS)

    1991-01-01

    PRISIM described in this case study makes a PSA useful to decision makers like plant managers, operational personnel or safety assessors because it provides a rapid access to specific information and the ability to generate updated PSA results that reflect the plant status at a particular time. From the capabilities of PRISIM one can conclude that the ability of a user friendly update of the system model in the PC or changes in the data files at the computer is not realized to data. Also the calculation of averaged probabilities instead of time dependent instantaneous probabilities is a sort of a restriction and will be changed in the future. 5 refs, 34 figs, 3 tabs

  5. Information systems in food safety management.

    Science.gov (United States)

    McMeekin, T A; Baranyi, J; Bowman, J; Dalgaard, P; Kirk, M; Ross, T; Schmid, S; Zwietering, M H

    2006-12-01

    Information systems are concerned with data capture, storage, analysis and retrieval. In the context of food safety management they are vital to assist decision making in a short time frame, potentially allowing decisions to be made and practices to be actioned in real time. Databases with information on microorganisms pertinent to the identification of foodborne pathogens, response of microbial populations to the environment and characteristics of foods and processing conditions are the cornerstone of food safety management systems. Such databases find application in: Identifying pathogens in food at the genus or species level using applied systematics in automated ways. Identifying pathogens below the species level by molecular subtyping, an approach successfully applied in epidemiological investigations of foodborne disease and the basis for national surveillance programs. Predictive modelling software, such as the Pathogen Modeling Program and Growth Predictor (that took over the main functions of Food Micromodel) the raw data of which were combined as the genesis of an international web based searchable database (ComBase). Expert systems combining databases on microbial characteristics, food composition and processing information with the resulting "pattern match" indicating problems that may arise from changes in product formulation or processing conditions. Computer software packages to aid the practical application of HACCP and risk assessment and decision trees to bring logical sequences to establishing and modifying food safety management practices. In addition there are many other uses of information systems that benefit food safety more globally, including: Rapid dissemination of information on foodborne disease outbreaks via websites or list servers carrying commentary from many sources, including the press and interest groups, on the reasons for and consequences of foodborne disease incidents. Active surveillance networks allowing rapid dissemination

  6. Software Safety Risk in Legacy Safety-Critical Computer Systems

    Science.gov (United States)

    Hill, Janice L.; Baggs, Rhoda

    2007-01-01

    Safety Standards contain technical and process-oriented safety requirements. Technical requirements are those such as "must work" and "must not work" functions in the system. Process-Oriented requirements are software engineering and safety management process requirements. Address the system perspective and some cover just software in the system > NASA-STD-8719.13B Software Safety Standard is the current standard of interest. NASA programs/projects will have their own set of safety requirements derived from the standard. Safety Cases: a) Documented demonstration that a system complies with the specified safety requirements. b) Evidence is gathered on the integrity of the system and put forward as an argued case. [Gardener (ed.)] c) Problems occur when trying to meet safety standards, and thus make retrospective safety cases, in legacy safety-critical computer systems.

  7. Computer-based systems important to safety (COMPSIS) - Reporting guidelines

    International Nuclear Information System (INIS)

    1999-07-01

    The objective of this procedure is to help the user to prepare an COMPSIS report on an event so that important lessons learned are most efficiently transferred to the database. This procedure focuses on the content of the information to be provided in the report rather than on its format. The established procedure follows to large extend the procedure chosen by the IRS incident reporting system. However this database is built for I and C equipment with the purpose of the event report database to collect and disseminate information on events of significance involving Computer-Based Systems important to safety in nuclear power plants, and feedback conclusions and lessons learnt from such events. For events where human performance is dominant to draw lessons, more detailed guidance on the specific information that should be supplied is spelled out in the present procedure. This guidance differs somewhat from that for the provision of technical information, and takes into account that the engineering world is usually less familiar with human behavioural analysis than with technical analysis. The events to be reported to the COMPSIS database should be based on the national reporting criteria in the participating member countries. The aim is that all reports including computer based systems that meet each country reporting criteria should be reported. The database should give a broad picture of events/incidents occurring in operation with computer control systems. As soon as an event has been identified, the insights and lessons learnt to be conveyed to the international nuclear community shall be clearly identified. On the basis of the description of the event, the event shall be analyzed in detail under the aspect of direct and potential impact to plant safety functions. The first part should show the common involvement of operation and safety systems and the second part should show the special aspects of I and C functions, hardware and software

  8. Safety campaigns. TIS Launches New Safety Information Campaign

    CERN Multimedia

    2001-01-01

    Need to start a new installation and worried about safety aspects? Or are you newly responsible for safety matters in a CERN building? Perhaps you're simply interested in how to make the working environment safer for yourself and your colleagues. Whatever the case, a new information campaign launched by TIS this week can help. The most visible aspects of the new campaign will be posters distributed around the Laboratory treating a different subject each month. The Web site - http://safety.cern.ch/ - which provides all safety related information. But these are not the only aspects of the new campaign. Members of the TIS/GS group, whose contact details can be found on the safety web site, are available to give information and advice on a one-to-one basis at any time. The campaign's launch has been timed to coincide with European Safety Week, organized by the European Agency for Safety and Health at Work and the subject treated in the first posters is safety inspection. This particular topic only concerns thos...

  9. Regulatory considerations for computational requirements for nuclear criticality safety

    International Nuclear Information System (INIS)

    Bidinger, G.H.

    1995-01-01

    As part of its safety mission, the U.S. Nuclear Regulatory Commission (NRC) approves the use of computational methods as part of the demonstration of nuclear criticality safety. While each NRC office has different criteria for accepting computational methods for nuclear criticality safety results, the Office of Nuclear Materials Safety and Safeguards (NMSS) approves the use of specific computational methods and methodologies for nuclear criticality safety analyses by specific companies (licensees or consultants). By contrast, the Office of Nuclear Reactor Regulation approves codes for general use. Historically, computational methods progressed from empirical methods to one-dimensional diffusion and discrete ordinates transport calculations and then to three-dimensional Monte Carlo transport calculations. With the advent of faster computational ability, three-dimensional diffusion and discrete ordinates transport calculations are gaining favor. With the proper user controls, NMSS has accepted any and all of these methods for demonstrations of nuclear criticality safety

  10. Industrial Personal Computer based Display for Nuclear Safety System

    International Nuclear Information System (INIS)

    Kim, Ji Hyeon; Kim, Aram; Jo, Jung Hee; Kim, Ki Beom; Cheon, Sung Hyun; Cho, Joo Hyun; Sohn, Se Do; Baek, Seung Min

    2014-01-01

    The safety display of nuclear system has been classified as important to safety (SIL:Safety Integrity Level 3). These days the regulatory agencies are imposing more strict safety requirements for digital safety display system. To satisfy these requirements, it is necessary to develop a safety-critical (SIL 4) grade safety display system. This paper proposes industrial personal computer based safety display system with safety grade operating system and safety grade display methods. The description consists of three parts, the background, the safety requirements and the proposed safety display system design. The hardware platform is designed using commercially available off-the-shelf processor board with back plane bus. The operating system is customized for nuclear safety display application. The display unit is designed adopting two improvement features, i.e., one is to provide two separate processors for main computer and display device using serial communication, and the other is to use Digital Visual Interface between main computer and display device. In this case the main computer uses minimized graphic functions for safety display. The display design is at the conceptual phase, and there are several open areas to be concreted for a solid system. The main purpose of this paper is to describe and suggest a methodology to develop a safety-critical display system and the descriptions are focused on the safety requirement point of view

  11. Industrial Personal Computer based Display for Nuclear Safety System

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Ji Hyeon; Kim, Aram; Jo, Jung Hee; Kim, Ki Beom; Cheon, Sung Hyun; Cho, Joo Hyun; Sohn, Se Do; Baek, Seung Min [KEPCO, Youngin (Korea, Republic of)

    2014-08-15

    The safety display of nuclear system has been classified as important to safety (SIL:Safety Integrity Level 3). These days the regulatory agencies are imposing more strict safety requirements for digital safety display system. To satisfy these requirements, it is necessary to develop a safety-critical (SIL 4) grade safety display system. This paper proposes industrial personal computer based safety display system with safety grade operating system and safety grade display methods. The description consists of three parts, the background, the safety requirements and the proposed safety display system design. The hardware platform is designed using commercially available off-the-shelf processor board with back plane bus. The operating system is customized for nuclear safety display application. The display unit is designed adopting two improvement features, i.e., one is to provide two separate processors for main computer and display device using serial communication, and the other is to use Digital Visual Interface between main computer and display device. In this case the main computer uses minimized graphic functions for safety display. The display design is at the conceptual phase, and there are several open areas to be concreted for a solid system. The main purpose of this paper is to describe and suggest a methodology to develop a safety-critical display system and the descriptions are focused on the safety requirement point of view.

  12. Flu Vaccine Safety Information

    Science.gov (United States)

    ... Influenza Types Seasonal Avian Swine Variant Pandemic Other Flu Vaccine Safety Information Questions & Answers Language: English (US) ... safety of flu vaccines monitored? Egg Allergy Are flu vaccines safe? Flu vaccines have good safety record. ...

  13. A Methodological Framework for Software Safety in Safety Critical Computer Systems

    OpenAIRE

    P. V. Srinivas Acharyulu; P. Seetharamaiah

    2012-01-01

    Software safety must deal with the principles of safety management, safety engineering and software engineering for developing safety-critical computer systems, with the target of making the system safe, risk-free and fail-safe in addition to provide a clarified differentaition for assessing and evaluating the risk, with the principles of software risk management. Problem statement: Prevailing software quality models, standards were not subsisting in adequately addressing the software safety ...

  14. Computer codes for safety analysis

    International Nuclear Information System (INIS)

    Holland, D.F.

    1986-11-01

    Computer codes for fusion safety analysis have been under development in the United States for about a decade. This paper will discuss five codes that are currently under development by the Fusion Safety Program. The purpose and capability of each code will be presented, a sample given, followed by a discussion of the present status and future development plans

  15. Enhanced operational safety of BWRs by advanced computer technology and human engineering

    International Nuclear Information System (INIS)

    Tomizawa, T.; Fukumoto, A.; Neda, T.; Toda, Y.; Takizawa, Y.

    1984-01-01

    In BWR nuclear power plants, where unit capacity is increasing and the demand for assured safety is growing, it has become important for the information interface between man and machine to work smoothly. Efforts to improve man-machine communication have been going on for the past ten years in Japan. Computer facilities and colour CRT display systems are amongst the most useful new methods. Advanced computer technology has been applied to operating plants and found to be very helpful for safe operation. A display monitoring system (DMS) is in operation in a 1100 MW(e) BWR plant. A total combination test was successfully completed on the 'plant operation by displayed information and automation' system (PODIA) in February 1983 before shipment to the site. The objective of this test was to verify the improved qualification of the newly developed advanced PODIA man-machine system by this enlarged fabrication test concept. In addition, the development of special graphics displays for the main control room and technical support centre to assist operators in assessing plant safety and diagnosing problems is required to meet post-TMI regulations. For this purpose, a prototype safety parameter display system (called Toshiba SPDS) with two colour CRT displays and a computer (TOSBAC-7/70) was developed in 1981 as an independent safety monitoring system. The PODIA and SPDS are now independent systems, but their combination has been found to be more useful and valuable for nuclear power plant safety. The paper discusses supervisory and operational concepts in the advanced main control room including SPDS, and describes the PODIA and SPDS verification tests including the valuable experience obtained after improvements in the qualification of these systems had been made to satisfactory operational safety levels. (author)

  16. The Commodity Form of Safety Information

    Directory of Open Access Journals (Sweden)

    Rodrigo Finkelstein

    2015-10-01

    Full Text Available The production of safety information is deemed a vital resource to protect human lives at the work site. The injury rate, lost days, incapacity rate, and fatality rate, are key indicators to prop up labour risk awareness and identify job hazards. However, safety information gets highly distorted because it does not only measure risk but serves as a means of exchange. It determines the amount of money to be swapped between Workers’ Compensation Boards and their client corporations. Moreover, as a depository of exchange value, safety information tends to exert pressure over social reality rather than just being a passive reflection of it. This paper discloses the commodity form of safety information. Based on a political economy of information framework, it identifies, describes, and analyses the safety information commodity in its active role of organizing safety and labour health.

  17. Cloud/Fog Computing System Architecture and Key Technologies for South-North Water Transfer Project Safety

    Directory of Open Access Journals (Sweden)

    Yaoling Fan

    2018-01-01

    Full Text Available In view of the real-time and distributed features of Internet of Things (IoT safety system in water conservancy engineering, this study proposed a new safety system architecture for water conservancy engineering based on cloud/fog computing and put forward a method of data reliability detection for the false alarm caused by false abnormal data from the bottom sensors. Designed for the South-North Water Transfer Project (SNWTP, the architecture integrated project safety, water quality safety, and human safety. Using IoT devices, fog computing layer was constructed between cloud server and safety detection devices in water conservancy projects. Technologies such as real-time sensing, intelligent processing, and information interconnection were developed. Therefore, accurate forecasting, accurate positioning, and efficient management were implemented as required by safety prevention of the SNWTP, and safety protection of water conservancy projects was effectively improved, and intelligential water conservancy engineering was developed.

  18. Safety analysis of control rod drive computers

    International Nuclear Information System (INIS)

    Ehrenberger, W.; Rauch, G.; Schmeil, U.; Maertz, J.; Mainka, E.U.; Nordland, O.; Gloee, G.

    1985-01-01

    The analysis of the most significant user programmes revealed no errors in these programmes. The evaluation of approximately 82 cumulated years of operation demonstrated that the operating system of the control rod positioning processor has a reliability that is sufficiently good for the tasks this computer has to fulfil. Computers can be used for safety relevant tasks. The experience gained with the control rod positioning processor confirms that computers are not less reliable than conventional instrumentation and control system for comparable tasks. The examination and evaluation of computers for safety relevant tasks can be done with programme analysis or statistical evaluation of the operating experience. Programme analysis is recommended for seldom used and well structured programmes. For programmes with a long, cumulated operating time a statistical evaluation is more advisable. The effort for examination and evaluation is not greater than the corresponding effort for conventional instrumentation and control systems. This project has also revealed that, where it is technologically sensible, process controlling computers or microprocessors can be qualified for safety relevant tasks without undue effort. (orig./HP) [de

  19. Study on 'Safety qualification of process computers used in safety systems of nuclear power plants'

    International Nuclear Information System (INIS)

    Bertsche, K.; Hoermann, E.

    1991-01-01

    The study aims at developing safety standards for hardware and software of computer systems which are increasingly used also for important safety systems in nuclear power plants. The survey of the present state-of-the-art of safety requirements and specifications for safety-relevant systems and, additionally, for process computer systems has been compiled from national and foreign rules. In the Federal Republic of Germany the KTA safety guides and the BMI/BMU safety criteria have to be observed. For the design of future computer-aided systems in nuclear power plants it will be necessary to apply the guidelines in [DIN-880] and [DKE-714] together with [DIN-192]. With the aid of a risk graph the various functions of a system, or of a subsystem, can be evaluated with regard to their significance for safety engineering. (orig./HP) [de

  20. Computer-based control of nuclear power information systems at international level

    International Nuclear Information System (INIS)

    Boniface, Ekechukwu; Okonkwo, Obi

    2011-01-01

    In most highly industrialized countries of the world information plays major role in anti-nuclear campaign. Information and discussions on nuclear power need critical and objective analysis before the structured information presentation to the public to avoid bias anti-nuclear information on one side and neglect of great risk in nuclear power. This research is developing a computer-based information system for the control of nuclear power at international level. The system is to provide easy and fast information highways for the followings: (1) Low Regulatory dose and activity limit as level of high danger for individuals and public. (2) Provision of relevant technical or scientific education among the information carriers in the nuclear power countries. The research is on fact oriented investigation about radioactivity. It also deals with fact oriented education about nuclear accidents and safety. A standard procedure for dissemination of latest findings using technical and scientific experts in nuclear technology is developed. The information highway clearly analyzes the factual information about radiation risk and nuclear energy. Radiation cannot be removed from our environment. The necessity of radiation utilizations defines nuclear energy as two-edge sword. It is therefore, possible to use computer-based information system in projecting and dissemination of expert knowledge about nuclear technology positively and also to use it in directing the public on the safety and control of the nuclear energy. The computer-based information highway for nuclear energy technology is to assist in scientific research and technological development at international level. (author)

  1. A Safety Resource Allocation Mechanism against Connection Fault for Vehicular Cloud Computing

    Directory of Open Access Journals (Sweden)

    Tianpeng Ye

    2016-01-01

    Full Text Available The Intelligent Transportation System (ITS becomes an important component of the smart city toward safer roads, better traffic control, and on-demand service by utilizing and processing the information collected from sensors of vehicles and road side infrastructure. In ITS, Vehicular Cloud Computing (VCC is a novel technology balancing the requirement of complex services and the limited capability of on-board computers. However, the behaviors of the vehicles in VCC are dynamic, random, and complex. Thus, one of the key safety issues is the frequent disconnections between the vehicle and the Vehicular Cloud (VC when this vehicle is computing for a service. More important, the connection fault will disturb seriously the normal services of VCC and impact the safety works of the transportation. In this paper, a safety resource allocation mechanism is proposed against connection fault in VCC by using a modified workflow with prediction capability. We firstly propose the probability model for the vehicle movement which satisfies the high dynamics and real-time requirements of VCC. And then we propose a Prediction-based Reliability Maximization Algorithm (PRMA to realize the safety resource allocation for VCC. The evaluation shows that our mechanism can improve the reliability and guarantee the real-time performance of the VCC.

  2. USSR orders computers to improve nuclear safety

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    Control Data Corp (CDC) has received an order valued at $32-million from the Soviet Union for six Cyber 962 mainframe computer systems to be used to increase the safety of civilian nuclear powerplants. The firm is now waiting for approval of the contract by the US government and Western Allies. The computers, ordered by the Soviet Research and Development Institute of Power Engineering (RDIPE), will analyze safety factors in the operation of nuclear reactors over a wide range of conditions. The Soviet Union's civilian nuclear program is one of the largest in the world, with over 50 plants in operation. Types of safety analyses the computers perform include: neutron-physics calculations, radiation-protection studies, stress analysis, reliability analysis of equipment and systems, ecological-impact calculations, transient analysis, and support activities for emergency response. They also include a simulator with realistic mathematical models of Soviet nuclear powerplants to improve operator training

  3. Overview of Risk Mitigation for Safety-Critical Computer-Based Systems

    Science.gov (United States)

    Torres-Pomales, Wilfredo

    2015-01-01

    This report presents a high-level overview of a general strategy to mitigate the risks from threats to safety-critical computer-based systems. In this context, a safety threat is a process or phenomenon that can cause operational safety hazards in the form of computational system failures. This report is intended to provide insight into the safety-risk mitigation problem and the characteristics of potential solutions. The limitations of the general risk mitigation strategy are discussed and some options to overcome these limitations are provided. This work is part of an ongoing effort to enable well-founded assurance of safety-related properties of complex safety-critical computer-based aircraft systems by developing an effective capability to model and reason about the safety implications of system requirements and design.

  4. Safety Metrics for Human-Computer Controlled Systems

    Science.gov (United States)

    Leveson, Nancy G; Hatanaka, Iwao

    2000-01-01

    The rapid growth of computer technology and innovation has played a significant role in the rise of computer automation of human tasks in modem production systems across all industries. Although the rationale for automation has been to eliminate "human error" or to relieve humans from manual repetitive tasks, various computer-related hazards and accidents have emerged as a direct result of increased system complexity attributed to computer automation. The risk assessment techniques utilized for electromechanical systems are not suitable for today's software-intensive systems or complex human-computer controlled systems.This thesis will propose a new systemic model-based framework for analyzing risk in safety-critical systems where both computers and humans are controlling safety-critical functions. A new systems accident model will be developed based upon modem systems theory and human cognitive processes to better characterize system accidents, the role of human operators, and the influence of software in its direct control of significant system functions Better risk assessments will then be achievable through the application of this new framework to complex human-computer controlled systems.

  5. Computer aided safety analysis

    International Nuclear Information System (INIS)

    1988-05-01

    The document reproduces 20 selected papers from the 38 papers presented at the Technical Committee/Workshop on Computer Aided Safety Analysis organized by the IAEA in co-operation with the Institute of Atomic Energy in Otwock-Swierk, Poland on 25-29 May 1987. A separate abstract was prepared for each of these 20 technical papers. Refs, figs and tabs

  6. Signal validation with control-room information-processing computers

    International Nuclear Information System (INIS)

    Belblidia, L.A.; Carlson, R.W.; Russell, J.L. Jr.

    1985-01-01

    One of the 'lessons learned' from the Three Mile Island accident focuses upon the need for a validated source of plant-status information in the control room. The utilization of computer-generated graphics to display the readings of the major plant instrumentation has introduced the capability of validating signals prior to their presentation to the reactor operations staff. The current operations philosophies allow the operator a quick look at the gauges to form an impression of the fraction of full scale as the basis for knowledge of the current plant conditions. After the introduction of a computer-based information-display system such as the Safety Parameter Display System (SPDS), operational decisions can be based upon precise knowledge of the parameters that define the operation of the reactor and auxiliary systems. The principal impact of this system on the operator will be to remove the continuing concern for the validity of the instruments which provide the information that governs the operator's decisions. (author)

  7. A Computer Program for Assessing Nuclear Safety Culture Impact

    Energy Technology Data Exchange (ETDEWEB)

    Han, Kiyoon; Jae, Moosung [Hanyang Univ., Seoul (Korea, Republic of)

    2014-10-15

    Through several accidents of NPP including the Fukushima Daiichi in 2011 and Chernobyl accidents in 1986, a lack of safety culture was pointed out as one of the root cause of these accidents. Due to its latent influences on safety performance, safety culture has become an important issue in safety researches. Most of the researches describe how to evaluate the state of the safety culture of the organization. However, they did not include a possibility that the accident occurs due to the lack of safety culture. Because of that, a methodology for evaluating the impact of the safety culture on NPP's safety is required. In this study, the methodology for assessing safety culture impact is suggested and a computer program is developed for its application. SCII model which is the new methodology for assessing safety culture impact quantitatively by using PSA model. The computer program is developed for its application. This program visualizes the SCIs and the SCIIs. It might contribute to comparing the level of the safety culture among NPPs as well as improving the management safety of NPP.

  8. Applications of computer based safety systems in Korea nuclear power plants

    International Nuclear Information System (INIS)

    Won Young Yun

    1998-01-01

    With the progress of computer technology, the applications of computer based safety systems in Korea nuclear power plants have increased rapidly in recent decades. The main purpose of this movement is to take advantage of modern computer technology so as to improve the operability and maintainability of the plants. However, in fact there have been a lot of controversies on computer based systems' safety between the regulatory body and nuclear utility in Korea. The Korea Institute of Nuclear Safety (KINS), technical support organization for nuclear plant licensing, is currently confronted with the pressure to set up well defined domestic regulatory requirements from this aspect. This paper presents the current status and the regulatory activities related to the applications of computer based safety systems in Korea. (author)

  9. INFORMATION CULTURE AND INFORMATION SAFETY OF SCHOOLCHILDREN

    Directory of Open Access Journals (Sweden)

    E. G. Belyakova

    2017-01-01

    Full Text Available Introduction. The article is devoted to the problem of interaction between schoolchildren and possible informational risks transmitted on the Internet. Considering the lack of external filters on the way of harmful information streams, it is actually necessary to develop information culture of schoolchildren, their abilities to sensibly and critically interpret the information on the Internet, and choice of adequate behaviour models surfing the Web. The aim of the present research is to analyze the state of informational safety of schoolchildren while using the Internet; gaining an understanding of the role of external restrictions and opportunities of intrapersonal filtration of the harmful Internet content depending on children age. Methodology and research methods. The methodology of the research is based on modern methods aimed to consider the problem of personal socialization in modern information society. Thus, the Internet Initiatives Development Fund (IIDF questionnaire let the authors define the level of awareness of recipients on the problem under consideration. Results and scientific novelty. The theoretical analysis helped the authors predict the correlation of basic methods in order to guarantee personal safety of schoolchildren taking into account the process of maturity as well as the decrease of external filters that may stop harmful content. Empirical part of the research has enabled to reveal decrease in external control of staying of a child in network in the process of growing up against the background of restrictive attitudes prevalence among teachers and parents. Therefore, the research supposed to improve information culture of schoolchildren from the earliest ages encouraging them to sensibly and correctly interpret the information on the Internet. Practical significance. The practical recommendations to parents and teachers in order to improve informational personal safety of schoolchildren are proposed. The relevancy

  10. Understanding computer and information technology

    International Nuclear Information System (INIS)

    Choi, Yun Cheol; Han, Tack Don; Im, Sun Beom

    2009-01-01

    This book consists of four parts. The first part describes IT technology and information community understanding of computer system, constitution of software system and information system and application of software. The second part is about computer network, information and communication, application and internet service. The third part contains application and multi media, application of mobile computer, ubiquitous computing and ubiquitous environment and computer and digital life. The last part explains information security and ethics of information-oriented society, information industry and IT venture, digital contents technology and industry and the future and development of information-oriented society.

  11. Computer information systems framework

    International Nuclear Information System (INIS)

    Shahabuddin, S.

    1989-01-01

    Management information systems (MIS) is a commonly used term in computer profession. The new information technology has caused management to expect more from computer. The process of supplying information follows a well defined procedure. MIS should be capable for providing usable information to the various areas and levels of organization. MIS is different from data processing. MIS and business hierarchy provides a good framework for many organization which are using computers. (A.B.)

  12. Environmental safety of the global information space

    Directory of Open Access Journals (Sweden)

    В’ячеслав Степанович Волошин

    2015-03-01

    Databases of full-text publications – journals, articles, monographs- are surely a means of salvation for science. There already exist a large number of such portals. Besides, advantages and disadvantages of electronic subscriptions to periodicals should certainly be considered. The former include the following most evident ones: aggregation of large data arrays, saving money on a subscription, an opportunity to work with relevant publications, thematic collections of materials, availability of records, simultaneous access of an unlimited number of users and others. Nevertheless, there are many disadvantages that make it difficult to work with full-text publications. They are the following: selective representativeness of publication numbers, complexity of keyword search, occasional presence of obsolete text formats, printed versions, possible psychological barrier, physiological incompatibility with computer equipment, fatigue caused by prolonged work on the computer. The Internet was followed by the appearance of global control networks, their aims ranging from control of a human life support to a unified control of humanity. So, the formed global information space promises the man to get access to almost any information source. Meanwhile, environmental safety of the man, his/her objective biological psyche and abilities in harmonious development are at serious risk

  13. Role of computer techniques for knowledge propagation about nuclear energetics safety

    International Nuclear Information System (INIS)

    Osachkin, V.S.

    1996-01-01

    The development of nuclear power engineering depends on the levels of nuclear, radiological and ecological safety. To ensure the approval of such levels by the community to spread the knowledge on Safety of Nuclear Engineering in understandable forms. New computer technologies may play an important role in the safety education of the public and upgrading of qualification of personnel. The progress in computer nets development makes it possible to use besides e-mail qualification of personnel. The progress in computer in nets development makes it possible to use besides e-mail and BBS the Internet system for remote education. As an example a computer course on Atomic Energy and its safety presented. This course now written in Russian consists of 6 parts, namely: physical basis of utilization of Nuclear energy; technical bases of uses of Nuclear energy; nuclear Reactors and their Systems; safety Principles, Goals, Nuclear Safety Regulation; the Environmental Impact of the us of Nuclear Power, severe accident consequences and scenarios

  14. Computer program for storage of historical and routine safety data related to radiologically controlled facilities

    International Nuclear Information System (INIS)

    Marsh, D.A.; Hall, C.J.

    1984-01-01

    A method for tracking and quick retrieval of radiological status of radiation and industrial safety systems in an active or inactive facility has been developed. The system uses a mini computer, a graphics plotter, and mass storage devices. Software has been developed which allows input and storage of architectural details, radiological conditions such as exposure rates, current location of safety systems, and routine and historical information on exposure and contamination levels. A blue print size digitizer is used for input. The computer program retains facility floor plans in three dimensional arrays. The software accesses an eight pen color plotter for output. The plotter generates color plots of the floor plans and safety systems on 8 1/2 x 11 or 20 x 30 paper or on overhead transparencies for reports and presentations

  15. 40 CFR 68.65 - Process safety information.

    Science.gov (United States)

    2010-07-01

    ... (CONTINUED) CHEMICAL ACCIDENT PREVENTION PROVISIONS Program 3 Prevention Program § 68.65 Process safety... 40 Protection of Environment 15 2010-07-01 2010-07-01 false Process safety information. 68.65... compilation of written process safety information before conducting any process hazard analysis required by...

  16. Analysis and design on airport safety information management system

    Directory of Open Access Journals (Sweden)

    Yan Lin

    2017-01-01

    Full Text Available Airport safety information management system is the foundation of implementing safety operation, risk control, safety performance monitor, and safety management decision for the airport. The paper puts forward the architecture of airport safety information management system based on B/S model, focuses on safety information processing flow, designs the functional modules and proposes the supporting conditions for system operation. The system construction is helpful to perfecting the long effect mechanism driven by safety information, continually increasing airport safety management level and control proficiency.

  17. Heat Transfer treatment in computer codes for safety analysis

    International Nuclear Information System (INIS)

    Jerele, A.; Gregoric, M.

    1984-01-01

    Increased number of operating nuclear power plants has stressed importance of nuclear safety evaluation. For this reason, accordingly to regulatory commission request, safety analyses with computer codes are preformed. In this paper part of this thermohydraulic models dealing with wall-to-fluid heat transfer correlations in computer codes TRAC=PF1, RELAP4/MOD5, RELAP5/MOD1 and COBRA-IV is discussed. (author)

  18. Toward introduction of risk informed safety regulation. Nuclear Safety Commission taskforce's interim report

    International Nuclear Information System (INIS)

    2006-01-01

    Nuclear Safety Commission's taskforce on 'Introduction of Safety Regulation Utilizing Risk Information' completed the interim report on its future subjects and directions in December 2005. Although current safety regulatory activities have been based on deterministic approach, this report shows the risk informed approach is expected to be very useful for making nuclear safety regulation and assurance activities reasonable and also for appropriate allocation of regulatory resources. For introduction of risk informed regulation, it also recommends pileups of experiences with gradual introduction and trial of the risk informed approach, improvement of plant maintenance rules and regulatory requirements utilizing risk information, and establishment of framework to assure quality of risk evaluation. (T. Tanaka)

  19. 49 CFR 211.61 - Informal safety inquiries.

    Science.gov (United States)

    2010-10-01

    ... information on selected topics relating to railroad safety. A notice of each such inquiry will be published in... 49 Transportation 4 2010-10-01 2010-10-01 false Informal safety inquiries. 211.61 Section 211.61..., DEPARTMENT OF TRANSPORTATION RULES OF PRACTICE Miscellaneous Safety-Related Proceedings and Inquiries § 211...

  20. Analysis of Critical Characteristics for Safety Graded Personnel Computers in the KNICS Architecture

    International Nuclear Information System (INIS)

    Lee, Hyun Chul; Lee, Dong Young

    2009-01-01

    Critical characteristics analysis of a safety related item is to identify characteristics to be verified to replace an original item with the dedicated item. It is sure that the dedicated item meeting critical characteristics would perform its intended safety function instead of the specified item. KNICS project developed two safety systems: IDiPS RPS (Reactor Protection System) and IDiPS ESF-CCS (Engineered Safety Features-Component Control System). Two safety systems of IDiPS are equipped with personnel computers, so-called COMs (Cabinet Operator Modules), in their cabinets. The personnel computers, COMs, are responsible for safety system monitoring, testing, and maintaining. Even though two safety systems are safety critical system, the personnel computers of two systems, i.e. COMs, are not graded as safety-graded items. Regulation requirements are expected to be strengthened, and the functions of the personnel computer may be enhanced to include safety-related functions and safety functions, it would be necessary that the grade of the personnel computers is adjusted to a higher level, the safety grade. To try to upgrade a non safety system, i.e. COMs, to a safety system, its safety functions and requirements, i.e. critical characteristics, must be identified and verified. This paper describes the process of the identification of critical characteristics and the results of analysis

  1. Computer graphics in reactor safety analysis

    International Nuclear Information System (INIS)

    Fiala, C.; Kulak, R.F.

    1989-01-01

    This paper describes a family of three computer graphics codes designed to assist the analyst in three areas: the modelling of complex three-dimensional finite element models of reactor structures; the interpretation of computational results; and the reporting of the results of numerical simulations. The purpose and key features of each code are presented. The graphics output used in actual safety analysis are used to illustrate the capabilities of each code. 5 refs., 10 figs

  2. Information processing, computation, and cognition.

    Science.gov (United States)

    Piccinini, Gualtiero; Scarantino, Andrea

    2011-01-01

    Computation and information processing are among the most fundamental notions in cognitive science. They are also among the most imprecisely discussed. Many cognitive scientists take it for granted that cognition involves computation, information processing, or both - although others disagree vehemently. Yet different cognitive scientists use 'computation' and 'information processing' to mean different things, sometimes without realizing that they do. In addition, computation and information processing are surrounded by several myths; first and foremost, that they are the same thing. In this paper, we address this unsatisfactory state of affairs by presenting a general and theory-neutral account of computation and information processing. We also apply our framework by analyzing the relations between computation and information processing on one hand and classicism, connectionism, and computational neuroscience on the other. We defend the relevance to cognitive science of both computation, at least in a generic sense, and information processing, in three important senses of the term. Our account advances several foundational debates in cognitive science by untangling some of their conceptual knots in a theory-neutral way. By leveling the playing field, we pave the way for the future resolution of the debates' empirical aspects.

  3. Role of computers in CANDU safety systems

    International Nuclear Information System (INIS)

    Hepburn, G.A.; Gilbert, R.S.; Ichiyen, N.M.

    1985-01-01

    Small digital computers are playing an expanding role in the safety systems of CANDU nuclear generating stations, both as active components in the trip logic, and as monitoring and testing systems. The paper describes three recent applications: (i) A programmable controller was retro-fitted to Bruce ''A'' Nuclear Generating Station to handle trip setpoint modification as a function of booster rod insertion. (ii) A centralized monitoring computer to monitor both shutdown systems and the Emergency Coolant Injection system, is currently being retro-fitted to Bruce ''A''. (iii) The implementation of process trips on the CANDU 600 design using microcomputers. While not truly a retrofit, this feature was added very late in the design cycle to increase the margin against spurious trips, and has now seen about 4 unit-years of service at three separate sites. Committed future applications of computers in special safety systems are also described. (author)

  4. A Nuclear Safety System based on Industrial Computer

    International Nuclear Information System (INIS)

    Kim, Ji Hyeon; Oh, Do Young; Lee, Nam Hoon; Kim, Chang Ho; Kim, Jae Hack

    2011-01-01

    The Plant Protection System(PPS), a nuclear safety Instrumentation and Control (I and C) system for Nuclear Power Plants(NPPs), generates reactor trip on abnormal reactor condition. The Core Protection Calculator System (CPCS) is a safety system that generates and transmits the channel trip signal to the PPS on an abnormal condition. Currently, these systems are designed on the Programmable Logic Controller(PLC) based system and it is necessary to consider a new system platform to adapt simpler system configuration and improved software development process. The CPCS was the first implementation using a micro computer in a nuclear power plant safety protection system in 1980 which have been deployed in Ulchin units 3,4,5,6 and Younggwang units 3,4,5,6. The CPCS software was developed in the Concurrent Micro5 minicomputer using assembly language and embedded into the Concurrent 3205 computer. Following the micro computer based CPCS, PLC based Common-Q platform has been used for the ShinKori/ShinWolsong units 1,2 PPS and CPCS, and the POSAFE-Q PLC platform is used for the ShinUlchin units 1,2 PPS and CPCS. In developing the next generation safety system platform, several factors (e.g., hardware/software reliability, flexibility, licensibility and industrial support) can be considered. This paper suggests an Industrial Computer(IC) based protection system that can be developed with improved flexibility without losing system reliability. The IC based system has the advantage of a simple system configuration with optimized processor boards because of improved processor performance and unlimited interoperability between the target system and development system that use commercial CASE tools. This paper presents the background to selecting the IC based system with a case study design of the CPCS. Eventually, this kind of platform can be used for nuclear power plant safety systems like the PPS, CPCS, Qualified Indication and Alarm . Pami(QIAS-P), and Engineering Safety

  5. A Nuclear Safety System based on Industrial Computer

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Ji Hyeon; Oh, Do Young; Lee, Nam Hoon; Kim, Chang Ho; Kim, Jae Hack [Korea Electric Power Corporation Engineering and Construction, Daejeon (Korea, Republic of)

    2011-05-15

    The Plant Protection System(PPS), a nuclear safety Instrumentation and Control (I and C) system for Nuclear Power Plants(NPPs), generates reactor trip on abnormal reactor condition. The Core Protection Calculator System (CPCS) is a safety system that generates and transmits the channel trip signal to the PPS on an abnormal condition. Currently, these systems are designed on the Programmable Logic Controller(PLC) based system and it is necessary to consider a new system platform to adapt simpler system configuration and improved software development process. The CPCS was the first implementation using a micro computer in a nuclear power plant safety protection system in 1980 which have been deployed in Ulchin units 3,4,5,6 and Younggwang units 3,4,5,6. The CPCS software was developed in the Concurrent Micro5 minicomputer using assembly language and embedded into the Concurrent 3205 computer. Following the micro computer based CPCS, PLC based Common-Q platform has been used for the ShinKori/ShinWolsong units 1,2 PPS and CPCS, and the POSAFE-Q PLC platform is used for the ShinUlchin units 1,2 PPS and CPCS. In developing the next generation safety system platform, several factors (e.g., hardware/software reliability, flexibility, licensibility and industrial support) can be considered. This paper suggests an Industrial Computer(IC) based protection system that can be developed with improved flexibility without losing system reliability. The IC based system has the advantage of a simple system configuration with optimized processor boards because of improved processor performance and unlimited interoperability between the target system and development system that use commercial CASE tools. This paper presents the background to selecting the IC based system with a case study design of the CPCS. Eventually, this kind of platform can be used for nuclear power plant safety systems like the PPS, CPCS, Qualified Indication and Alarm . Pami(QIAS-P), and Engineering Safety

  6. Safety Case Development as an Information Modelling Problem

    Science.gov (United States)

    Lewis, Robert

    This paper considers the benefits from applying information modelling as the basis for creating an electronically-based safety case. It highlights the current difficulties of developing and managing large document-based safety cases for complex systems such as those found in Air Traffic Control systems. After a review of current tools and related literature on this subject, the paper proceeds to examine the many relationships between entities that can exist within a large safety case. The paper considers the benefits to both safety case writers and readers from the future development of an ideal safety case tool that is able to exploit these information models. The paper also introduces the idea that the safety case has formal relationships between entities that directly support the safety case argument using a methodology such as GSN, and informal relationships that provide links to direct and backing evidence and to supporting information.

  7. Intercomparison and validation of computer codes for thermalhydraulic safety analysis of heavy water reactors

    International Nuclear Information System (INIS)

    2004-08-01

    Activities within the frame of the IAEA's Technical Working Group on Advanced Technologies for HWRs (TWG-HWR) are conducted in a project within the IAEA's subprogramme on nuclear power reactor technology development. The objective of the activities on HWRs is to foster, within the frame of the TWG-HWR, information exchange and co-operative research on technology development for current and future HWRs, with an emphasis on safety, economics and fuel resource sustainability. One of the activities recommended by the TWG-HWR was an international standard problem exercise entitled: Intercomparison and validation of computer codes for thermalhydraulics safety analyses. Intercomparison and validation of computer codes used in different countries for thermalhydraulics safety analyses will enhance the confidence in the predictions made by these codes. However, the intercomparison and validation exercise needs a set of reliable experimental data. The RD-14M Large-Loss Of Coolant Accident (LOCA) test B9401 simulating HWR LOCA behaviour that was conducted by Atomic Energy of Canada Ltd (AECL) was selected for this validation project. This report provides a comparison of the results obtained from six participating countries, utilizing four different computer codes. General conclusions are reached and recommendations made

  8. Discussion about risk-informed regulations on the nuclear safety

    International Nuclear Information System (INIS)

    Gu Yeyi

    2008-01-01

    The article introduces the background and status quo of regulations on the nuclear safety in China, and points out the inadequacies existing with the current regulations. The author explains the risk-informed safety management concerning its development, status quo, and achievements made, in an attempt to make out the trend of improving regulations on the nuclear safety through risk-informed methods. Combining the U.S. development program of establishing risk-informed regulations on the nuclear safety, the author narrates principles and features of the new regulations system, and provides suggestions for the promotion of risk-informed safety management and establishment of risk-informed regulations on the nuclear safety. (author)

  9. State Traffic Safety Information

    Data.gov (United States)

    Department of Transportation — The State Traffic Safety Information (STSI) portal is part of the larger Fatality Analysis Reporting System (FARS) Encyclopedia. STSI provides state-by-state traffic...

  10. An evaluation of The Great Escape: can an interactive computer game improve young children's fire safety knowledge and behaviors?

    Science.gov (United States)

    Morrongiello, Barbara A; Schwebel, David C; Bell, Melissa; Stewart, Julia; Davis, Aaron L

    2012-07-01

    Fire is a leading cause of unintentional injury and, although young children are at particularly increased risk, there are very few evidence-based resources available to teach them fire safety knowledge and behaviors. Using a pre-post randomized design, the current study evaluated the effectiveness of a computer game (The Great Escape) for teaching fire safety information to young children (3.5-6 years). Using behavioral enactment procedures, children's knowledge and behaviors related to fire safety were compared to a control group of children before and after receiving the intervention. The results indicated significant improvements in knowledge and fire safety behaviors in the intervention group but not the control. Using computer games can be an effective way to promote young children's understanding of safety and how to react in different hazardous situations.

  11. Computer-based and web-based radiation safety training

    Energy Technology Data Exchange (ETDEWEB)

    Owen, C., LLNL

    1998-03-01

    The traditional approach to delivering radiation safety training has been to provide a stand-up lecture of the topic, with the possible aid of video, and to repeat the same material periodically. New approaches to meeting training requirements are needed to address the advent of flexible work hours and telecommuting, and to better accommodate individuals learning at their own pace. Computer- based and web-based radiation safety training can provide this alternative. Computer-based and web- based training is an interactive form of learning that the student controls, resulting in enhanced and focused learning at a time most often chosen by the student.

  12. Safety aspects of the modernization of I and C and process information in nuclear power plants with special regard to alarm annunciation

    Energy Technology Data Exchange (ETDEWEB)

    Seidel, F [Bundesamt fuer Strahlenschutz, Salzgitter (Germany)

    1997-09-01

    In particular for older German nuclear power plants there are projects to modernize I and C and process information systems. This modernization mainly aims at improvements in plant operation. For instance, using modern computing technology, the plant operation can be optimized, according to further details. Furthermore, the problem of spare-part keeping for out-dated components can be solved. For modernizing the I and C or the process computer system, safety-relevant aspects have to be taken into account. For instance, the compatibility of the system modification with the existing alarm annunciation concept shall be considered, and for each modernization step, the interfaces between the equipment of different safety significance shall be assessed and observed. The functions and the associated equipment have to be qualified in accordance to their safety significance. At present, the regulatory framework for computer-based instrumentation and control as well as for information systems is being elaborated in Germany and worldwide. Recently, the guidelines of the German Reactor Safety Commission have been extended with regard to the introduction and safety application of modern computer-based I and C in nuclear power plants. Furthermore, some of the essential requirements for design and qualification of modern I and C can be derived from the existing rules and standards. Particularly, concerning the alarm annunciation system, this report summarizes safety-relevant aspects of the modernization of the instrumentation and control system as well as the process information system in nuclear power plants. (author). 4 refs.

  13. Safety aspects of the modernization of I and C and process information in nuclear power plants with special regard to alarm annunciation

    International Nuclear Information System (INIS)

    Seidel, F.

    1997-01-01

    In particular for older German nuclear power plants there are projects to modernize I and C and process information systems. This modernization mainly aims at improvements in plant operation. For instance, using modern computing technology, the plant operation can be optimized, according to further details. Furthermore, the problem of spare-part keeping for out-dated components can be solved. For modernizing the I and C or the process computer system, safety-relevant aspects have to be taken into account. For instance, the compatibility of the system modification with the existing alarm annunciation concept shall be considered, and for each modernization step, the interfaces between the equipment of different safety significance shall be assessed and observed. The functions and the associated equipment have to be qualified in accordance to their safety significance. At present, the regulatory framework for computer-based instrumentation and control as well as for information systems is being elaborated in Germany and worldwide. Recently, the guidelines of the German Reactor Safety Commission have been extended with regard to the introduction and safety application of modern computer-based I and C in nuclear power plants. Furthermore, some of the essential requirements for design and qualification of modern I and C can be derived from the existing rules and standards. Particularly, concerning the alarm annunciation system, this report summarizes safety-relevant aspects of the modernization of the instrumentation and control system as well as the process information system in nuclear power plants. (author). 4 refs

  14. Dynamics of Information as Natural Computation

    Directory of Open Access Journals (Sweden)

    Gordana Dodig Crnkovic

    2011-08-01

    Full Text Available Processes considered rendering information dynamics have been studied, among others in: questions and answers, observations, communication, learning, belief revision, logical inference, game-theoretic interactions and computation. This article will put the computational approaches into a broader context of natural computation, where information dynamics is not only found in human communication and computational machinery but also in the entire nature. Information is understood as representing the world (reality as an informational web for a cognizing agent, while information dynamics (information processing, computation realizes physical laws through which all the changes of informational structures unfold. Computation as it appears in the natural world is more general than the human process of calculation modeled by the Turing machine. Natural computing is epitomized through the interactions of concurrent, in general asynchronous computational processes which are adequately represented by what Abramsky names “the second generation models of computation” [1] which we argue to be the most general representation of information dynamics.

  15. Computer and Information Sciences III : 27th International Symposium on Computer and Information Sciences

    CERN Document Server

    Lent, Ricardo

    2013-01-01

    Information technology is the enabling foundation science and technology for all of human activity at the beginning of the 21st century, and advances in this area are crucial to all of us. These advances are taking place all over the world and can only be followed and perceived when researchers from all over the world assemble, and exchange their ideas in conferences such as the one presented in this proceedings volume regarding the 27th International Symposium on Computer and Information Systems, held at the Institut Henri Poincare' in Paris on October 3 and 4, 2012. Computer and Information Sciences III: 27th International Symposium on Computer and Information Sciences contains novel advances in the state of the art covering applied research in electrical and computer engineering and computer science, across the broad area of information technology. It provides access to the main innovative activities in research across the world, and points to the results obtained recently by some of the most active teams ...

  16. International exchange of safety and licensing information

    International Nuclear Information System (INIS)

    Lafleur, J.D. Jr.; Hauber, R.D.; Chenier, D.M.

    1977-01-01

    A network of formal and informal bilateral arrangements for the exchange of nuclear safety information is being established by the US Nuclear Regulatory Commission. For developing countries such arrangements can provide ready access to the extensive, fully documented safety analyses and safety research results that USNRC has accumulated. USNRC has been receiving foreign visitors at a rate of about 500 per year, largely for discussions of safety and licensing questions related to light water reactors. Exchanges also are taking place on the safety of advanced reactors. A special interest of the USNRC is in providing for reciprocal communication, at the earliest possible time, of important problems, decisions and other actions on nuclear safety matters. For example, it is essential that a newly discovered problem in a nuclear reactor be brought immediately to the attention of other governments that are responsible for the safety of similar reactors. Definite progress has been made in the USA in defining categories of information that USNRC can receive in confidence from foreign countries, and can protect from disclosure under the US Freedom of Information Act. Certain exchanges have taken place on this basis. Experience in the establishment and operation of USNRC's bilateral exchange arrangements is summarized. A typical exchange with the regulatory authority of a country building its first power reactor is described. (author)

  17. RESI-1 and RESI-2: pPrototypes of an information system on reactor safety

    International Nuclear Information System (INIS)

    Schultheiss, G.F.; Eglin, W.; Katz, F.W.; Krings, T.; Pee, A.; Schlechtendahl, E.G.

    1975-04-01

    To demonstrate by practical experience the feasibility of the information system elaborated in the 'Study of an Information System on Reactor Safety RESI' (KFK 1900), the prototype systems RESI-1 and RESI-2 were developed and tested in operation. The two systems have been considerably reduced both in extent and contents as compared to the information system described in the study. The RESI-1 prototype system is a paper version established for verification of all the individual functions before passing over to the computer-aided interactive version RESI-2. RESI-2 is based on the GOLEM system of Siemens. Both protoype systems have proved that the essential features: 1) documentation, 2) formulation of and answering to safety questions, which are relevant with respect to particular licensing cases, 3) formulation of safety questions related to individual reactor types can be managed satisfactorily. All the functions of information retrieval have been tested carefully over several months. Particularities of project development and of the methods elaborated are described in detail and presented in this report. (orig.) [de

  18. International exchange of safety and licensing information

    International Nuclear Information System (INIS)

    Lafleur, J.D. Jr.; Hauber, R.D.; Chenier, D.M.

    1977-01-01

    A network of formal and informal bilateral arrangements for the exchange of nuclear safety information is being established by the U.S. Nuclear Regulatory Commission. For developing countries, such arrangements can provide ready access to the extensive, fully documented safety analyses and safety research results that NRC has accumulated. NRC has been receiving foreign visitors at a rate of about 500 per year, largely for discussions of safety and licensing questions related to light water reactors. Exchanges also are taking place on the safety of advanced reactors. A special interest of the NRC is in providing for reciprocal communicaion, at the earliest possible time, of important problems, decisions and other actions on nuclear safety matters. For example, it is essential that a newly-discovered problem in a nuclear reactor be brought immediately to the attention of other governments which are responsible for the safety of similar reactors. Definite progress has been made in the U.S. Freedom of Information Act. Certain exchanges have taken place on this basis. Experience in the establishment and operation of NRC's bilateral exchange arrangements is summarized. A typical exchange with the regulatory authority of country building its first power reactor is described

  19. Computers in technical information transfer

    Energy Technology Data Exchange (ETDEWEB)

    Price, C.E.

    1978-01-01

    The use of computers in transferring scientific and technical information from its creation to its use is surveyed. The traditional publication and distribution processes for S and T literature in past years have been the vehicle for transfer, but computers have altered the process in phenomenal ways. Computers are used in literature publication through text editing and photocomposition applications. Abstracting and indexing services use computers for preparing their products, but the machine-readable document descriptions created for this purpose are input to a rapidly growing computerized information retrieval service industry. Computer use is making many traditional processes passe, and may eventually lead to a largely ''paperless'' information utility.

  20. Bibliography for computer security, integrity, and safety

    Science.gov (United States)

    Bown, Rodney L.

    1991-01-01

    A bibliography of computer security, integrity, and safety issues is given. The bibliography is divided into the following sections: recent national publications; books; journal, magazine articles, and miscellaneous reports; conferences, proceedings, and tutorials; and government documents and contractor reports.

  1. Safety Computer Vision Rules for Improved Sensor Certification

    DEFF Research Database (Denmark)

    Mogensen, Johann Thor Ingibergsson; Kraft, Dirk; Schultz, Ulrik Pagh

    2017-01-01

    Mobile robots are used across many domains from personal care to agriculture. Working in dynamic open-ended environments puts high constraints on the robot perception system, which is critical for the safety of the system as a whole. To achieve the required safety levels the perception system needs...... to be certified, but no specific standards exist for computer vision systems, and the concept of safe vision systems remains largely unexplored. In this paper we present a novel domain-specific language that allows the programmer to express image quality detection rules for enforcing safety constraints...

  2. The impact of health information technology on patient safety

    Directory of Open Access Journals (Sweden)

    Yasser K. Alotaibi

    2017-12-01

    Full Text Available Since the original Institute of Medicine (IOM report was published there has been an accelerated development and adoption of health information technology with varying degrees of evidence about the impact of health information technology on patient safety. This article is intended to review the current available scientific evidence on the impact of different health information technologies on improving patient safety outcomes. We conclude that health information technology improves patient’s safety by reducing medication errors, reducing adverse drug reactions, and improving compliance to practice guidelines. There should be no doubt that health information technology is an important tool for improving healthcare quality and safety. Healthcare organizations need to be selective in which technology to invest in, as literature shows that some technologies have limited evidence in improving patient safety outcomes.

  3. The impact of health information technology on patient safety.

    Science.gov (United States)

    Alotaibi, Yasser K; Federico, Frank

    2017-12-01

    Since the original Institute of Medicine (IOM) report was published there has been an accelerated development and adoption of health information technology with varying degrees of evidence about the impact of health information technology on patient safety.  This article is intended to review the current available scientific evidence on the impact of different health information technologies on improving patient safety outcomes. We conclude that health information technology improves patient's safety by reducing medication errors, reducing adverse drug reactions, and improving compliance to practice guidelines. There should be no doubt that health information technology is an important tool for improving healthcare quality and safety. Healthcare organizations need to be selective in which technology to invest in, as literature shows that some technologies have limited evidence in improving patient safety outcomes.

  4. 40 CFR 68.48 - Safety information.

    Science.gov (United States)

    2010-07-01

    ...) CHEMICAL ACCIDENT PREVENTION PROVISIONS Program 2 Prevention Program § 68.48 Safety information. (a) The... regulated substances, processes, and equipment: (1) Material Safety Data Sheets that meet the requirements...) Equipment specifications; and (5) Codes and standards used to design, build, and operate the process. (b...

  5. Safety applications of computer based systems for the process industry

    International Nuclear Information System (INIS)

    Bologna, Sandro; Picciolo, Giovanni; Taylor, Robert

    1997-11-01

    Computer based systems, generally referred to as Programmable Electronic Systems (PESs) are being increasingly used in the process industry, also to perform safety functions. The process industry as they intend in this document includes, but is not limited to, chemicals, oil and gas production, oil refining and power generation. Starting in the early 1970's the wide application possibilities and the related development problems of such systems were recognized. Since then, many guidelines and standards have been developed to direct and regulate the application of computers to perform safety functions (EWICS-TC7, IEC, ISA). Lessons learnt in the last twenty years can be summarised as follows: safety is a cultural issue; safety is a management issue; safety is an engineering issue. In particular, safety systems can only be properly addressed in the overall system context. No single method can be considered sufficient to achieve the safety features required in many safety applications. Good safety engineering approach has to address not only hardware and software problems in isolation but also their interfaces and man-machine interface problems. Finally, the economic and industrial aspects of the safety applications and development of PESs in process plants are evidenced throughout all the Report. Scope of the Report is to contribute to the development of an adequate awareness of these problems and to illustrate technical solutions applied or being developed

  6. Mass-media information campaigns about road safety. [previously known as: Public information about road safety.

    NARCIS (Netherlands)

    2009-01-01

    In the Netherlands, public information is often used as an instrument to improve road safety. The purpose of each public information campaign is a voluntary and lasting change in traffic behaviour. This requires road users to have sufficient knowledge about a problem and to adapt their behaviour.

  7. Patient safety goals for the proposed Federal Health Information Technology Safety Center.

    Science.gov (United States)

    Sittig, Dean F; Classen, David C; Singh, Hardeep

    2015-03-01

    The Office of the National Coordinator for Health Information Technology is expected to oversee creation of a Health Information Technology (HIT) Safety Center. While its functions are still being defined, the center is envisioned as a public-private entity focusing on promotion of HIT related patient safety. We propose that the HIT Safety Center leverages its unique position to work with key administrative and policy stakeholders, healthcare organizations (HCOs), and HIT vendors to achieve four goals: (1) facilitate creation of a nationwide 'post-marketing' surveillance system to monitor HIT related safety events; (2) develop methods and governance structures to support investigation of major HIT related safety events; (3) create the infrastructure and methods needed to carry out random assessments of HIT related safety in complex HCOs; and (4) advocate for HIT safety with government and private entities. The convening ability of a federally supported HIT Safety Center could be critically important to our transformation to a safe and effective HIT enabled healthcare system. © The Author 2014. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  8. Computer and information science

    CERN Document Server

    2016-01-01

    This edited book presents scientific results of the 15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016) which was held on June 26– 29 in Okayama, Japan. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 12 of the conference’s most promising...

  9. Aviation Safety Hotline Information System -

    Data.gov (United States)

    Department of Transportation — The Aviation Safety Hotline Information System (ASHIS) collects, stores, and retrieves reports submitted by pilots, mechanics, cabin crew, passengers, or the public...

  10. Computer and Information Sciences II : 26th International Symposium on Computer and Information Sciences

    CERN Document Server

    Lent, Ricardo; Sakellari, Georgia

    2012-01-01

    Information technology is the enabling foundation for all of human activity at the beginning of the 21st century, and advances in this area are crucial to all of us. These advances are taking place all over the world and can only be followed and perceived when researchers from all over the world assemble, and exchange their ideas in conferences such as the one presented in this proceedings volume regarding the 26th International Symposium on Computer and Information Systems, held at the Royal Society in London on 26th to 28th September 2011. Computer and Information Sciences II contains novel advances in the state of the art covering applied research in electrical and computer engineering and computer science, across the broad area of information technology. It provides access to the main innovative activities in research across the world, and points to the results obtained recently by some of the most active teams in both Europe and Asia.

  11. A Network Diffusion Model of Food Safety Scare Behavior considering Information Transparency

    Directory of Open Access Journals (Sweden)

    Tingqiang Chen

    2017-01-01

    Full Text Available This study constructs the network diffusion model of food safety scare behavior under the effect of information transparency and examines the network topology and evolution characteristics of food safety scare behavior in a numerical simulation. The main conclusions of this study are as follows. (1 Under the effect of information transparency, the network degree distribution of food safety scare behavior diffusion demonstrates the decreasing characteristics of diminishing margins. (2 Food safety scare behavior diffusion increases with the information dissemination rate and consumer concern about food safety incidents and shows the characteristics of monotone increasing. And with the increasing of the government food safety supervision information transparency and media food safety supervision information transparency, the whole is declining characteristic of diminishing marginal. In addition, the extinction of food safety scare behavior cannot be achieved gradually given a single regulation of government food safety supervision information transparency and media food safety supervision information transparency. (3 The interaction effects between improving government food safety supervision information transparency or media food safety supervision information transparency and declining consumer concerns about food safety incidents or information transmission rate can engender the suppression of food safety scare behavior diffusion.

  12. Improving plant state information for better operational safety

    International Nuclear Information System (INIS)

    Girard, C.; Olivier, E.; Grimaldi, X.

    1994-01-01

    Nuclear Power Plant (NPP) safety is strongly dependent on components' reliability and particularly on plant state information reliability. This information, used by the plant operators in order to produce appropriate actions, have to be of a high degree of confidence, especially in accidental conditions where safety is threatened. In this perspective, FRAMATOME, EDF and CEA have started a joint research program to prospect different solutions aiming at a better reliability for critical information needed to safety operate the plant. This paper gives the main results of this program and describes the developments that have been made in order to assess reliability of different information systems used in a Nuclear Power Plant. (Author)

  13. Computers and Information Flow.

    Science.gov (United States)

    Patrick, R. L.

    This paper is designed to fill the need for an easily understood introduction to the computing and data processing field for the layman who has, or can expect to have, some contact with it. Information provided includes the unique terminology and jargon of the field, the various types of computers and the scope of computational capabilities, and…

  14. Computer virus information update CIAC-2301

    Energy Technology Data Exchange (ETDEWEB)

    Orvis, W.J.

    1994-01-15

    While CIAC periodically issues bulletins about specific computer viruses, these bulletins do not cover all the computer viruses that affect desktop computers. The purpose of this document is to identify most of the known viruses for the MS-DOS and Macintosh platforms and give an overview of the effects of each virus. The authors also include information on some windows, Atari, and Amiga viruses. This document is revised periodically as new virus information becomes available. This document replaces all earlier versions of the CIAC Computer virus Information Update. The date on the front cover indicates date on which the information in this document was extracted from CIAC`s Virus database.

  15. Compendium of computer codes for the safety analysis of LMFBR's

    International Nuclear Information System (INIS)

    1975-06-01

    A high level of mathematical sophistication is required in the safety analysis of LMFBR's to adequately meet the demands for realism and confidence in all areas of accident consequence evaluation. The numerical solution procedures associated with these analyses are generally so complex and time consuming as to necessitate their programming into computer codes. These computer codes have become extremely powerful tools for safety analysis, combining unique advantages in accuracy, speed and cost. The number, diversity and complexity of LMFBR safety codes in the U. S. has grown rapidly in recent years. It is estimated that over 100 such codes exist in various stages of development throughout the country. It is inevitable that such a large assortment of codes will require rigorous cataloguing and abstracting to aid individuals in identifying what is available. It is the purpose of this compendium to provide such a service through the compilation of code summaries which describe and clarify the status of domestic LMFBR safety codes. (U.S.)

  16. Nuclear criticality information system

    International Nuclear Information System (INIS)

    Koponen, B.L.; Hampel, V.E.

    1981-01-01

    The nuclear criticality safety program at LLNL began in the 1950's with a critical measurements program which produced benchmark data until the late 1960's. This same time period saw the rapid development of computer technology useful for both computer modeling of fissile systems and for computer-aided management and display of the computational benchmark data. Database management grew in importance as the amount of information increased and as experimental programs were terminated. Within the criticality safety program at LLNL we began at that time to develop a computer library of benchmark data for validation of computer codes and cross sections. As part of this effort, we prepared a computer-based bibliography of criticality measurements on relatively simple systems. However, it is only now that some of these computer-based resources can be made available to the nuclear criticality safety community at large. This technology transfer is being accomplished by the DOE Technology Information System (TIS), a dedicated, advanced information system. The NCIS database is described

  17. 77 FR 15453 - Pipeline Safety: Information Collection Activities

    Science.gov (United States)

    2012-03-15

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No... information collection titled, ``Gas Pipeline Safety Program Certification and Hazardous Liquid Pipeline... collection request that PHMSA will be submitting to OMB for renewal titled, ``Gas Pipeline Safety Program...

  18. Development of the Advanced Nuclear Safety Information Management (ANSIM) System

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Jae Min; Ko, Young Cheol; Song, Tai Gil [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2012-05-15

    Korea has become a technically independent nuclear country and has grown into an exporter of nuclear technologies. Thus, nuclear facilities are increasing in significance at KAERI (Korea Atomic Energy Research Institute), and it is time to address the nuclear safety. The importance of nuclear safety cannot be overemphasized. Therefore, a management system is needed urgently to manage the safety of nuclear facilities and to enhance the efficiency of nuclear information. We have established ISP (Information Strategy Planning) for the Integrated Information System of nuclear facility and safety management. The purpose of this paper is to develop a management system for nuclear safety. Therefore, we developed the Advanced Nuclear Safety Information Management system (hereinafter referred to as the 'ANSIM system'). The ANSIM system has been designed and implemented to computerize nuclear safety information for standardization, integration, and sharing in real-time. Figure 1 shows the main home page of the ANSIM system. In this paper, we describe the design requirements, contents, configurations, and utilizations of the ANSIM system

  19. Think over nuclear safety. ''Information asymmetry'' and ''comminicative action''

    International Nuclear Information System (INIS)

    Suzuki, Atsuyuki

    2006-01-01

    Nuclear safety should be fully understood not only technically but also socially. In order to think over nuclear safety socially, four different concepts were recommended to refer, which were ''procedural rationality'', information asymmetry'', ''certainty effect'' and ''communicative action'' proposed by three economists and a philosopher respectively. Risk-based communication approach for nuclear safety could be effective within the higher frequency area than safety goal, but not good for the lower frequency area than safety goal. The latter could be highly subjective and more qualitative. For this area, ''safety communication'' would be highly maintained with taking account of existence of ''information asymmetry'' and need of ''communicative action''. (T.Tanaka)

  20. RISK-INFORMED SAFETY MARGIN CHARACTERIZATION

    International Nuclear Information System (INIS)

    Dinh, Nam; Szilard, Ronaldo

    2009-01-01

    The concept of safety margins has served as a fundamental principle in the design and operation of commercial nuclear power plants (NPPs). Defined as the minimum distance between a system's 'loading' and its 'capacity', plant design and operation is predicated on ensuring an adequate safety margin for safety-significant parameters (e.g., fuel cladding temperature, containment pressure, etc.) is provided over the spectrum of anticipated plant operating, transient and accident conditions. To meet the anticipated challenges associated with extending the operational lifetimes of the current fleet of operating NPPs, the United States Department of Energy (USDOE), the Idaho National Laboratory (INL) and the Electric Power Research Institute (EPRI) have developed a collaboration to conduct coordinated research to identify and address the technological challenges and opportunities that likely would affect the safe and economic operation of the existing NPP fleet over the postulated long-term time horizons. In this paper we describe a framework for developing and implementing a Risk-Informed Safety Margin Characterization (RISMC) approach to evaluate and manage changes in plant safety margins over long time horizons

  1. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  2. Functional safety of health information technology.

    LENUS (Irish Health Repository)

    Chadwick, Liam

    2012-03-01

    In an effort to improve patient safety and reduce adverse events, there has been a rapid growth in the utilisation of health information technology (HIT). However, little work has examined the safety of the HIT systems themselves, the methods used in their development or the potential errors they may introduce into existing systems. This article introduces the conventional safety-related systems development standard IEC 61508 to the medical domain. It is proposed that the techniques used in conventional safety-related systems development should be utilised by regulation bodies, healthcare organisations and HIT developers to provide an assurance of safety for HIT systems. In adopting the IEC 61508 methodology for HIT development and integration, inherent problems in the new systems can be identified and corrected during their development. Also, IEC 61508 should be used to develop a healthcare-specific standard to allow stakeholders to provide an assurance of a system\\'s safety.

  3. The Intelligent Safety System: could it introduce complex computing into CANDU shutdown systems

    International Nuclear Information System (INIS)

    Hall, J.A.; Hinds, H.W.; Pensom, C.F.; Barker, C.J.; Jobse, A.H.

    1984-07-01

    The Intelligent Safety System is a computerized shutdown system being developed at the Chalk River Nuclear Laboratories (CRNL) for future CANDU nuclear reactors. It differs from current CANDU shutdown systems in both the algorithm used and the size and complexity of computers required to implement the concept. This paper provides an overview of the project, with emphasis on the computing aspects. Early in the project several needs leading to an introduction of computing complexity were identified, and a computing system that met these needs was conceived. The current work at CRNL centers on building a laboratory demonstration of the Intelligent Safety System, and evaluating the reliability and testability of the concept. Some fundamental problems must still be addressed for the Intelligent Safety System to be acceptable to a CANDU owner and to the regulatory authorities. These are also discussed along with a description of how the Intelligent Safety System might solve these problems

  4. European Workshop Industrical Computer Science Systems approach to design for safety

    Science.gov (United States)

    Zalewski, Janusz

    1992-01-01

    This paper presents guidelines on designing systems for safety, developed by the Technical Committee 7 on Reliability and Safety of the European Workshop on Industrial Computer Systems. The focus is on complementing the traditional development process by adding the following four steps: (1) overall safety analysis; (2) analysis of the functional specifications; (3) designing for safety; (4) validation of design. Quantitative assessment of safety is possible by means of a modular questionnaire covering various aspects of the major stages of system development.

  5. Use of digital computing devices in systems important to safety

    International Nuclear Information System (INIS)

    1986-01-01

    The incorporation of digital computing devices in systems important to safety now is progressing fast in several countries, including Canada, France, Federal Republic of Germany, Japan, USA. There are now reactors with microprocessors in some trip systems. The major functions of those systems are: reactor trip initiation, display, monitoring, testing, re-calibration of detectors. The benefits of moving to a fully computerized shut-down system should be improved reliability, greater flexibility, better man-machine interface, improved testing, higher reactor output and lower overall cost. With the introduction of computer devices in systems important to safety, plant availability and safety are improved because disturbances are treated before they lead to safety action, in this way helping the operator to avoid errors. The Meeting presentations were divided into sessions devoted to the following topics: Needs for the use of digital devices (DCD) in safety important systems (SIS) (5 papers); Problems raised by the integration SIS in the NPP control (7 papers); Description and presentation of DCD of SIS (6 papers); Results of experiences in engineering, manufacture, qualification operation of DCD hardware and software (5 papers). A separate abstract was prepared for each of these papers

  6. Maintaining scale as a realiable computational system for criticality safety analysis

    International Nuclear Information System (INIS)

    Bowmann, S.M.; Parks, C.V.; Martin, S.K.

    1995-01-01

    Accurate and reliable computational methods are essential for nuclear criticality safety analyses. The SCALE (Standardized Computer Analyses for Licensing Evaluation) computer code system was originally developed at Oak Ridge National Laboratory (ORNL) to enable users to easily set up and perform criticality safety analyses, as well as shielding, depletion, and heat transfer analyses. Over the fifteen-year life of SCALE, the mainstay of the system has been the criticality safety analysis sequences that have featured the KENO-IV and KENO-V.A Monte Carlo codes and the XSDRNPM one-dimensional discrete-ordinates code. The criticality safety analysis sequences provide automated material and problem-dependent resonance processing for each criticality calculation. This report details configuration management which is essential because SCALE consists of more than 25 computer codes (referred to as modules) that share libraries of commonly used subroutines. Changes to a single subroutine in some cases affect almost every module in SCALE exclamation point Controlled access to program source and executables and accurate documentation of modifications are essential to maintaining SCALE as a reliable code system. The modules and subroutine libraries in SCALE are programmed by a staff of approximately ten Code Managers. The SCALE Software Coordinator maintains the SCALE system and is the only person who modifies the production source, executables, and data libraries. All modifications must be authorized by the SCALE Project Leader prior to implementation

  7. The role of CFD computer analyses in hydrogen safety management

    International Nuclear Information System (INIS)

    Komen, E.M.J; Visser, D.C; Roelofs, F.; Te Lintelo, J.G.T

    2014-01-01

    The risks of hydrogen release and combustion during a severe accident in a light water reactor have attracted considerable attention after the Fukushima accident in Japan. Reliable computer analyses are needed for the optimal design of hydrogen mitigation systems, like e.g. passive autocatalytic recombiners (PARs), and for the assessment of the associated residual risk of hydrogen combustion. Traditionally, so-called Lumped Parameter (LP) computer codes are being used for these purposes. In the last decade, significant progress has been made in the development, validation, and application of more detailed, three-dimensional Computational Fluid Dynamics (CFD) simulations for hydrogen safety analyses. The objective of the current paper is to address the following questions: - When are CFD computer analyses needed complementary to the traditional LP code analyses for hydrogen safety management? - What is the validation status of the CFD computer code for hydrogen distribution, mitigation, and combustion analyses? - Can CFD computer analyses nowadays be executed in practical and reliable way for full scale containments? The validation status and reliability of CFD code simulations will be illustrated by validation analyses performed for experiments executed in the PANDA, THAI, and ENACCEF facilities. (authors)

  8. Criticality Safety Information Resource Center Web portal: www.csirc.net

    International Nuclear Information System (INIS)

    Harmon, C.D. II; Jones, T.

    2000-01-01

    The Nuclear Criticality Safety Group (ESH-6) at Los Alamos National Laboratory (LANL) is in the process of collecting and archiving historical and technical information related to nuclear criticality safety from LANL and other facilities. In an ongoing effort, this information is being made available via the Criticality Safety Information Resource Center (CSIRC) web site, which is hosted and maintained by ESH-6 staff. Recently, the CSIRC Web site was recreated as a Web portal that provides the criticality safety community with much more than just archived data

  9. 47 CFR 80.1135 - Transmission of maritime safety information.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Transmission of maritime safety information. 80... RADIO SERVICES STATIONS IN THE MARITIME SERVICES Global Maritime Distress and Safety System (GMDSS) Operating Procedures for Distress and Safety Communications § 80.1135 Transmission of maritime safety...

  10. Independent peer review of nuclear safety computer codes

    International Nuclear Information System (INIS)

    Boyack, B.E.; Jenks, R.P.

    1993-01-01

    A structured, independent computer code peer-review process has been developed to assist the US Nuclear Regulatory Commission (NRC) and the US Department of Energy in their nuclear safety missions. This paper describes a structured process of independent code peer review, benefits associated with a code-independent peer review, as well as the authors' recent peer-review experience. The NRC adheres to the principle that safety of plant design, construction, and operation are the responsibility of the licensee. Nevertheless, NRC staff must have the ability to independently assess plant designs and safety analyses submitted by license applicants. According to Ref. 1, open-quotes this requires that a sound understanding be obtained of the important physical phenomena that may occur during transients in operating power plants.close quotes The NRC concluded that computer codes are the principal products to open-quotes understand and predict plant response to deviations from normal operating conditionsclose quotes and has developed several codes for that purpose. However, codes cannot be used blindly; they must be assessed and found adequate for the purposes they are intended. A key part of the qualification process can be accomplished through code peer reviews; this approach has been adopted by the NRC

  11. Safety of High Speed Ground Transportation Systems : Analytical Methodology for Safety Validation of Computer Controlled Subsystems : Volume 2. Development of a Safety Validation Methodology

    Science.gov (United States)

    1995-01-01

    This report describes the development of a methodology designed to assure that a sufficiently high level of safety is achieved and maintained in computer-based systems which perform safety cortical functions in high-speed rail or magnetic levitation ...

  12. Advances in Computing and Information Technology : Proceedings of the Second International Conference on Advances in Computing and Information Technology

    CERN Document Server

    Nagamalai, Dhinaharan; Chaki, Nabendu

    2013-01-01

    The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, ...

  13. Safety implications of using programmable digital computers in nuclear safety and control systems

    International Nuclear Information System (INIS)

    Adams, D.M.; Rohrdanz, R.R.

    1982-01-01

    This papers describes the activities being conducted at the Idaho National Engineering Laboratory associated with the use of stored-program computers for protection and control systems. This project has recently been initiated and a preliminary report will be available. The use of computers in plant control and protection (and more generally in system important to safety) represents a major departure from the systems which have been used in the past. The design, development, and audit methods used for these systems are significantly different, thus requiring different skills and different perspectives

  14. Maintenance of reactor safety and control computers at a large government facility

    International Nuclear Information System (INIS)

    Brady, H.G.

    1985-01-01

    In 1950 the US Government contracted the Du Pont Company to design, build, and operate the Savannah River Plant (SRP). At the time, it was the largest construction project ever undertaken by man. It is still the largest of the Department of Energy facilities. In the nearly 35 years that have elapsed, Du Pont has met its commitments to the US Government and set world safety records in the construction and operation of nuclear facilities. Contributing factors in achieving production goals and setting the safety records are a staff of highly qualified personnel, a well maintained plant, and sound maintenance programs. There have been many ''first ever'' achievements at SRP. These ''firsts'' include: (1) computer control of a nuclear rector, and (2) use of computer systems as safety circuits. This presentation discusses the maintenance program provided for these computer systems and all digital systems at SRP. An in-house computer maintenance program that was started in 1966 with five persons has grown to a staff of 40 with investments in computer hardware increasing from $4 million in 1970 to more than $60 million in this decade. 4 figs

  15. Fast reactor safety and computational thermo-fluid dynamics approaches

    International Nuclear Information System (INIS)

    Ninokata, Hisashi; Shimizu, Takeshi

    1993-01-01

    This article provides a brief description of the safety principle on which liquid metal cooled fast breeder reactors (LMFBRs) is based and the roles of computations in the safety practices. A number of thermohydraulics models have been developed to date that successfully describe several of the important types of fluids and materials motion encountered in the analysis of postulated accidents in LMFBRs. Most of these models use a mixture of implicit and explicit numerical solution techniques in solving a set of conservation equations formulated in Eulerian coordinates, with special techniques included to specific situations. Typical computational thermo-fluid dynamics approaches are discussed in particular areas of analyses of the physical phenomena relevant to the fuel subassembly thermohydraulics design and that involve describing the motion of molten materials in the core over a large scale. (orig.)

  16. Official communication of the Safety Commission

    CERN Multimedia

    DG Unit

    2009-01-01

    The Prevention and Training section of the Safety Commission, would like to inform you that the new Safety Awareness course for newcomers will replace the welcome video in building 55 as of 2 April. The 3 levels (‘Safety at CERN’, ‘General Risks’ and ‘Specific Risks’) followed by 3 tests will determine access to CERN. Thanks to the SIR (Safety Information Registration, http://sir.cern.ch) application, it will be possible for you to follow the awareness course from your computer. For more information, go to the Safety Commission web site: http://safety-commission.web.cern.ch

  17. Official communication of the Safety Commission

    CERN Multimedia

    DG Unit

    2009-01-01

    We, the Prevention and Training section of the Safety Commission, would like to inform you that the new Safety Awareness course for newcomers will replace the welcome video in building 55 as of the 2nd April. The 3 levels (‘Safety at CERN’, ‘General Risks’ and ‘Specific Risks’) followed by 3 tests will determine access to CERN. Thanks to the SIR (Safety Information Registration, http://sir.cern.ch) application, it will be possible for you to follow the awareness course from your computer. For more information, go to the Safety Commission web site: http://safety-commission.web.cern.ch

  18. Computer-aided safety systems of industrial high energy objects

    International Nuclear Information System (INIS)

    Topolsky, N.G.; Gordeev, S.G.

    1995-01-01

    Modern objects of fuel and energy, chemical industries are characterized by high power consumption; by presence of large quantities of combustible and explosive substances used in technological processes; by advanced communications of submission systems of initial liquid and gasiform reagents, lubricants and coolants, the products of processing, and wastes of production; by advanced ventilation and pneumatic transport; and by complex control systems of energy, material and information flows. Such objects have advanced infrastructures, including a significant quantity of engineering buildings intended for storage, transportation, and processing of combustible liquids, gasiform fuels and materials, and firm materials. Examples of similar objects are nuclear and thermal power stations, chemical plants, machine-building factories, iron and steel industry enterprises, etc. Many tasks and functions characterizing the problem of fire safety of these objects can be accomplished only upon the development of special Computer-Aided Fire Safety Systems (CAFSS). The CAFSS for these objects are intended to reduce the hazard of disastrous accidents both causing fires and caused by them. The tasks of fire prevention and rescue work of large-scale industrial objects are analyzed within the bounds of the recommended conception. A functional structure of CAFSS with a list of the main subsystems forming a part of its composition has been proposed

  19. Nuclear health and safety

    International Nuclear Information System (INIS)

    1990-04-01

    This report summarizes the responsiveness of DOE and contractors to findings contained in DOE technical safety appraisals and environmental surveys. These appraisals and surveys have been done at DOE facilities and sites to find out the extent of the environmental, safety, and health problems and to prioritize them for corrective action. As of January 1990, DOE computer data showed over 1,700 safety and health problems and almost 1,300 environmental problems. The majority of these problems, however, have not yet been corrected. GAO also looked at the extent to which DOE has developed a computerized tracking system to monitor the status of its environmental, safety, and health problems. GAO found that the computer system lacks important information, such as various field office and independent appraisals. Inclusion of this information would provide a more complete picture of the problems at the site

  20. Reactor safety research - visible demonstrations and credible computations

    Energy Technology Data Exchange (ETDEWEB)

    Loewenstein, W B; Divakaruni, S M

    1985-11-01

    EPRI has been conducting nuclear safety research for a number of years with the primary goal of assuring the safety and reliability of the nuclear plants. The visibility is emphasized by sponsoring or participating in large scale test demonstrations to credibly support the complex computations that are the basis for quantification of safety margins. Recognizing the success of the airline industry in receiving favorable public perception, the authors compare the design and operation practices of the airline industry with those of the nuclear industry practices to identify the elements contributing to public concerns and unfavorable perceptions. In this paper, authors emphasize the importance of proper communications of research results to the public in a manner that non-specialists understand. Further, EPRI supported research and results in the areas of source term, seismic and structural engineering research, analysis using probabilistic risk assessment (PRA), quantification of safety margins, digital technology development and implementation, and plant transient and performance evaluations are discussed in the paper. (orig./HP).

  1. Reactor safety research - visible demonstrations and credible computations

    International Nuclear Information System (INIS)

    Loewenstein, W.B.; Divakaruni, S.M.

    1985-01-01

    EPRI has been conducting nuclear safety research for a number of years with the primary goal of assuring the safety and reliability of the nuclear plants. The visibility is emphasized by sponsoring or participating in large scale test demonstrations to credibly support the complex computations that are the basis for quantification of safety margins. Recognizing the success of the airline industry in receiving favorable public perception, the authors compare the design and operation practices of the airline industry with those of the nuclear industry practices to identify the elements contributing to public concerns and unfavorable perceptions. In this paper, authors emphasize the importance of proper communications of research results to the public in a manner that non-specialists understand. Further, EPRI supported research and results in the areas of source term, seismic and structural engineering research, analysis using probabilistic risk assessment (PRA), quantification of safety margins, digital technology development and implementation, and plant transient and performance evaluations are discussed in the paper. (orig./HP)

  2. Organizing safety: conditions for successful information assurance programs.

    Science.gov (United States)

    Collmann, Jeff; Coleman, Johnathan; Sostrom, Kristen; Wright, Willie

    2004-01-01

    Organizations must continuously seek safety. When considering computerized health information systems, "safety" includes protecting the integrity, confidentiality, and availability of information assets such as patient information, key components of the technical information system, and critical personnel. "High Reliability Theory" (HRT) argues that organizations with strong leadership support, continuous training, redundant safety mechanisms, and "cultures of high reliability" can deploy and safely manage complex, risky technologies such as nuclear weapons systems or computerized health information systems. In preparation for the Health Insurance Portability and Accountability Act (HIPAA) of 1996, the Office of the Assistant Secretary of Defense (Health Affairs), the Offices of the Surgeons General of the United States Army, Navy and Air Force, and the Telemedicine and Advanced Technology Research Center (TATRC), US Army Medical Research and Materiel Command sponsored organizational, doctrinal, and technical projects that individually and collectively promote conditions for a "culture of information assurance." These efforts include sponsoring the "P3 Working Group" (P3WG), an interdisciplinary, tri-service taskforce that reviewed all relevant Department of Defense (DoD), Miliary Health System (MHS), Army, Navy and Air Force policies for compliance with the HIPAA medical privacy and data security regulations; supporting development, training, and deployment of OCTAVE(sm), a self-directed information security risk assessment process; and sponsoring development of the Risk Information Management Resource (RIMR), a Web-enabled enterprise portal about health information assurance.

  3. Application of life-cycle information for advancement in safety of nuclear fuel cycle facilities. Application of safety information to advanced safety management support system

    International Nuclear Information System (INIS)

    Suzuki, Kazuhiko; Ishida, Michihiko

    2005-08-01

    Risk management is major concern to nuclear energy reprocessing plants to improve plant and process reliability and ensure their safety. This is because we are required to predict potential risks before any accident or disaster occurs. The advancement of safety design and safety systems technologies showed large amount of useful safety-related knowledge that can be of great importance to plant operation to reduce operation risks and ensure safety. This research proposes safety knowledge modeling framework on the basis of ontology technologies to systematically construct plant knowledge model, which includes plant structure, operation, and the associated behaviors. In such plant knowledge model safety related information is defined and linked to the different elements of plant knowledge model. Ontology editor is employed to define the basic concepts and their inter-relations, which are used to capture and construct plant safety knowledge. In order to provide detailed safety knowledgebase, HAZOP results are analyzed and structured so that safety-related knowledge are identified and structured within the plant knowledgebase. The target safety knowledgebase includes: failures, deviations, causes, consequences, and fault propagation as mapped to plant knowledge. The proposed ontology-based safety framework is applied on case study nuclear plant to structure failures, causes, consequences, and fault propagation, which are used to support plant operation. (author)

  4. Providing public information in the Slovenian Nuclear Safety Administration

    International Nuclear Information System (INIS)

    Fon Jager, Mojca

    2000-01-01

    Full text: Good safety culture is strongly related to transparent and timely information. Experience has shown that radiation and nuclear safety are under continuous surveillance by the public. The provision of open and authentic information to the public is a fundamental policy of the SNSA. The SNSA endeavors to provide substantial and reliable information to the interested institutions, mass media and to the citizens through press conferences, public statements, media discussions, and active participation in domestic and international meetings, symposia and congresses, through publications, the Internet and direct contacts with the interested public. The SNSA regularly provides information on nuclear safety to the Government, the National Assembly and the citizens of the Republic of Slovenia. The Annual Report on Nuclear and Radiation Safety is published in Poroeevalec (Reporter) - the publication of the National Assembly - in autumn, and is available in public libraries throughout Slovenia. Annual Report is available also on the Internet (http://www.sigov.si/ursjv/uvod.html) in Slovene and English. Access to data of the Central Radiation Early Warning System of Slovenia (CROSS), recording the real time (at half-hour intervals) gamma dose rate levels, is also available through Internet. The report in English is sent every year to Slovenian embassies world-wide, to certain foreign embassies in Slovenia and to other organizations participating in the activities in the nuclear and radiological field. Reports on the SNSA activities are also published in the bulletin Okolje in prostor (Environment and Spatial Planning), published by the Ministry of Environment and Spatial Planning. The SNSA regularly contributes articles on courses, seminars and symposia attended at home and abroad. The articles are intended to give basic information on training and the names of contact persons to provide additional information on certain topics to those interested. More than half of

  5. 75 FR 53733 - Pipeline Safety: Information Collection Activities

    Science.gov (United States)

    2010-09-01

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2010-0246] Pipeline Safety: Information Collection Activities AGENCY: Pipeline and Hazardous... liquefied natural gas, hazardous liquid, and gas transmission pipeline systems operated by a company. The...

  6. Food safety: correct information for pregnant women

    Directory of Open Access Journals (Sweden)

    Bartolomeo Griglio

    2013-04-01

    Full Text Available This study was aimed at investigating the knowledge of pregnant women on food safety with particular attention to the effectiveness of the informative material (pamphlet and poster prepared in a previous study. To this scope, a questionnaire composed by 8 questions (Likert scaled was used except for one which was a Y/N question. Themes of the questionnaire were: level of concerns on food safety, and knowledge on foodborne diseases (salomonellosis, toxoplasmosis and listeriosis, risk factors and preventive measures. Results indicate that knowledge increased in respect to that of the previous study, but in relation to informative material previously distributed.

  7. Quantitative software-reliability analysis of computer codes relevant to nuclear safety

    International Nuclear Information System (INIS)

    Mueller, C.J.

    1981-12-01

    This report presents the results of the first year of an ongoing research program to determine the probability of failure characteristics of computer codes relevant to nuclear safety. An introduction to both qualitative and quantitative aspects of nuclear software is given. A mathematical framework is presented which will enable the a priori prediction of the probability of failure characteristics of a code given the proper specification of its properties. The framework consists of four parts: (1) a classification system for software errors and code failures; (2) probabilistic modeling for selected reliability characteristics; (3) multivariate regression analyses to establish predictive relationships among reliability characteristics and generic code property and development parameters; and (4) the associated information base. Preliminary data of the type needed to support the modeling and the predictions of this program are described. Illustrations of the use of the modeling are given but the results so obtained, as well as all results of code failure probabilities presented herein, are based on data which at this point are preliminary, incomplete, and possibly non-representative of codes relevant to nuclear safety

  8. Patterns of students' computer use and relations to their computer and information literacy

    DEFF Research Database (Denmark)

    Bundsgaard, Jeppe; Gerick, Julia

    2017-01-01

    Background: Previous studies have shown that there is a complex relationship between students’ computer and information literacy (CIL) and their use of information and communication technologies (ICT) for both recreational and school use. Methods: This study seeks to dig deeper into these complex...... relations by identifying different patterns of students’ school-related and recreational computer use in the 21 countries participating in the International Computer and Information Literacy Study (ICILS 2013). Results: Latent class analysis (LCA) of the student questionnaire and performance data from......, raising important questions about differences in contexts. Keywords: ICILS, Computer use, Latent class analysis (LCA), Computer and information literacy....

  9. Thermal reactor safety

    International Nuclear Information System (INIS)

    1980-06-01

    Information is presented concerning new trends in licensing; seismic considerations and system structural behavior; TMI-2 risk assessment and thermal hydraulics; statistical assessment of potential accidents and verification of computational methods; issues with respect to improved safety; human factors in nuclear power plant operation; diagnostics and activities in support of recovery; LOCA transient analysis; unresolved safety issues and other safety considerations; and fission product transport

  10. Thermal reactor safety

    Energy Technology Data Exchange (ETDEWEB)

    1980-06-01

    Information is presented concerning new trends in licensing; seismic considerations and system structural behavior; TMI-2 risk assessment and thermal hydraulics; statistical assessment of potential accidents and verification of computational methods; issues with respect to improved safety; human factors in nuclear power plant operation; diagnostics and activities in support of recovery; LOCA transient analysis; unresolved safety issues and other safety considerations; and fission product transport.

  11. Safety parameter display system functions are integrated parts of the KWU KONVOI process information system (SPDS functions are parts of the KWU-PRINS)

    International Nuclear Information System (INIS)

    Aleite, W.; Geyer, K.H.

    1984-01-01

    The desirability of having flexible overview as well as extended detail information with pictorial and abstraction features and easy and quick access throughout the large-size control rooms in German plants has been recognized. Developments over the last years now make it possible to add on extensive computer driven VDU-systems to the three German KONVOI NPPs (Isar II, Emsland and Neckarwestheim II) thereby creating the Process Information System ''PRINS''. The new system is driven by multiple computers at different locations controlling about 30 full-graphic, high resolution Video Display Units. They are arranged singly and in three ''mxn - Information Panels'' distributed about the control room and present all thinkable kinds of display formats with more than 1000 separate pictures. The display of only single ''Safety Parameters'' or even complete ''Safety Goal Information'' on single or multiple VDUs in parallel is only one aspect of this computerized part of the entire integrated Information System. (orig./HP)

  12. 75 FR 58014 - Pipeline Safety: Information Collection Activity; Request for Comments

    Science.gov (United States)

    2010-09-23

    ..., supports pipeline safety by ensuring the proper functioning of CPM leak detection systems. Affected Public...-phase hazardous liquid pipeline facilities that use computational pipeline monitoring (CPM) leak... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No...

  13. Modeling of requirement specification for safety critical real time computer system using formal mathematical specifications

    International Nuclear Information System (INIS)

    Sankar, Bindu; Sasidhar Rao, B.; Ilango Sambasivam, S.; Swaminathan, P.

    2002-01-01

    Full text: Real time computer systems are increasingly used for safety critical supervision and control of nuclear reactors. Typical application areas are supervision of reactor core against coolant flow blockage, supervision of clad hot spot, supervision of undesirable power excursion, power control and control logic for fuel handling systems. The most frequent cause of fault in safety critical real time computer system is traced to fuzziness in requirement specification. To ensure the specified safety, it is necessary to model the requirement specification of safety critical real time computer systems using formal mathematical methods. Modeling eliminates the fuzziness in the requirement specification and also helps to prepare the verification and validation schemes. Test data can be easily designed from the model of the requirement specification. Z and B are the popular languages used for modeling the requirement specification. A typical safety critical real time computer system for supervising the reactor core of prototype fast breeder reactor (PFBR) against flow blockage is taken as case study. Modeling techniques and the actual model are explained in detail. The advantages of modeling for ensuring the safety are summarized

  14. Sharing Elderly Healthcare information on Cloud Computing

    OpenAIRE

    Lu, Fangjie; Khan, Israr

    2012-01-01

    Context: Due to rapid increase in the population of elderly people, sharing healthcare information has become an essential requirement for the development of e-health system. By conducting a research in e-health and cloud computing we have explored the advantages and disadvantages of sharing healthcare information for elderly people through cloud computing. Objectives: The main purpose of this research is to investigate the suitability of cloud computing to share healthcare information. The s...

  15. Atomic Information Technology Safety and Economy of Nuclear Power Plants

    CERN Document Server

    Woo, Taeho

    2012-01-01

    Atomic Information Technology revaluates current conceptions of the information technology aspects of the nuclear industry. Economic and safety research in the nuclear energy sector are explored, considering statistical methods which incorporate Monte-Carlo simulations for practical applications. Divided into three sections, Atomic Information Technology covers: • Atomic economics and management, • Atomic safety and reliability, and • Atomic safeguarding and security. Either as a standalone volume or as a companion to conventional nuclear safety and reliability books, Atomic Information Technology acts as a concise and thorough reference on statistical assessment technology in the nuclear industry. Students and industry professionals alike will find this a key tool in expanding and updating their understanding of this industry and the applications of information technology within it.

  16. Computational methods for nuclear criticality safety analysis

    International Nuclear Information System (INIS)

    Maragni, M.G.

    1992-01-01

    Nuclear criticality safety analyses require the utilization of methods which have been tested and verified against benchmarks results. In this work, criticality calculations based on the KENO-IV and MCNP codes are studied aiming the qualification of these methods at the IPEN-CNEN/SP and COPESP. The utilization of variance reduction techniques is important to reduce the computer execution time, and several of them are analysed. As practical example of the above methods, a criticality safety analysis for the storage tubes for irradiated fuel elements from the IEA-R1 research has been carried out. This analysis showed that the MCNP code is more adequate for problems with complex geometries, and the KENO-IV code shows conservative results when it is not used the generalized geometry option. (author)

  17. An intelligent safety system concept for future CANDU reactors

    International Nuclear Information System (INIS)

    Hinds, H.W.

    1980-01-01

    A review of the current Regional Over-power Trip (ROPT) system employed on the Bruce NGS-A reactors confirmed the belief that future reactors should have an improved ROPT system. We are developing such an 'intelligent' safety system. It uses more of the available information on reactor status and employs modern computer technology. Fast triplicated safety computers compute maps of fuel channel power, based on readings from prompt-responding flux detectors. The coefficients for this calculation are downloaded periodically from a fourth supervisor computer. These coefficients are based on a detailed 3-D flux shape derived from physics data and other plant information. A demonstration of one of three safety channels of such a system is planned. (auth)

  18. Development of computer program for safety of nuclear power plant against tsunami

    International Nuclear Information System (INIS)

    Jin, S. B.; Choi, K. R.; Lee, S. K.; Cho, Y. S.

    2001-01-01

    The main objective of this study is the development of a computer program to check the safety of nuclear power plants along the coastline of the Korean Peninsula. The computer program describes the propagation and associated run-up process of tsunamis by solving linear and nonlinear shallow-water equations with finite difference methods. The computer program has been applied to several ideal and simplified problems. Obtained numerical solutions are compared to existing and available solutions and measurements. A very good agreement between numerical solutions and existing measurement is observed. The computer program developed in this study can be to check the safety analysis of nuclear power plants against tsunamis. The program can also be used to study the propagation of tsunamis for a long distance, and associated run-up and run-down process along a shoreline. Furthermore, the computer program can be used to provide the proper design criteria of coastal facilities and structures

  19. 77 FR 50720 - Test Documentation for Digital Computer Software Used in Safety Systems of Nuclear Power Plants

    Science.gov (United States)

    2012-08-22

    ... Used in Safety Systems of Nuclear Power Plants AGENCY: Nuclear Regulatory Commission. ACTION: Draft... Computer Software used in Safety Systems of Nuclear Power Plants.'' The DG-1207 is proposed Revision 1 of... for Digital Computer Software Used in Safety Systems of Nuclear Power Plants'' is temporarily...

  20. Collection and accumulation of seismic safety research findings, and considerations for information dissemination

    International Nuclear Information System (INIS)

    2013-01-01

    Seismic Safety Division of JNES is collecting and analyzing the findings of seismic safety research, and is developing a system to organize and disseminate the information internally and internationally. These tasks have been conducted in response to the lessons learned from Fukushima Daiichi NPP accident. The overview of the tasks is as follows; 1) Collection of the knowledge and findings from seismic safety research. JNES collects information on seismic safety researches including the 2011 off the Pacific coast of Tohoku Earthquake. The information is analyzed whether it is important for regulation to increase seismic safety of NPP. 2) Constructing database of seismic safety research. JNES collects information based on documents published by committee and constructs database of active faults around NPP sites in order to incorporate in the seismic safety review. 3) Dissemination of information related to seismic safety. JNES disseminates outcomes of own researches internally and internationally. (author)

  1. Collection and accumulation of seismic safety research findings, and considerations for information dissemination

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-15

    Seismic Safety Division of JNES is collecting and analyzing the findings of seismic safety research, and is developing a system to organize and disseminate the information internally and internationally. These tasks have been conducted in response to the lessons learned from Fukushima Daiichi NPP accident. The overview of the tasks is as follows; 1) Collection of the knowledge and findings from seismic safety research. JNES collects information on seismic safety researches including the 2011 off the Pacific coast of Tohoku Earthquake. The information is analyzed whether it is important for regulation to increase seismic safety of NPP. 2) Constructing database of seismic safety research. JNES collects information based on documents published by committee and constructs database of active faults around NPP sites in order to incorporate in the seismic safety review. 3) Dissemination of information related to seismic safety. JNES disseminates outcomes of own researches internally and internationally. (author)

  2. Interactive computer codes for education and training on nuclear safety and radioprotection

    International Nuclear Information System (INIS)

    Leszczynski, Francisco

    2008-01-01

    Two interactive computer codes for education and training on nuclear safety and radioprotection developed at RA6 Reactor Division-Bariloche Atomic Center-CNEA are presented on this paper. The first code named SIMREACT has been developed in order to simulate the control of a research nuclear reactor in real time with a simple but accurate approach. The code solves the equations of neutron punctual kinetics with time variable reactivity. Utilizing the timer of the computer and the controls of a PC keyboard, with an adequate graphic interface, a simulation in real time of the temporal behavior of a research reactor is obtained. The reactivity can be changed by means of the extraction or insertion of control rods. It was implemented also the simulation of automatic pilot and scram. The use of this code is focalized on practices of nuclear reactor control like start-up from the subcritical state with external source up to power to a desired level, change of power level, calibration of a control rod with different methods, and approach to critical condition by interpolation of the answer in function of reactivity. The second code named LICEN has been developed in order to help the studies of all the topics included in examination programs for obtaining licenses for research reactor operators and radioprotection officials. Using the PC mouse, with an adequate graphic interface, the student can gradually learn the topics related with general and special licenses. The general option includes nuclear reactor engineering, radioprotection, nuclear safety, documentation and normative. The specific option includes mandatory documentation, description of the installation and task on normal and emergency situations. For each of these topics there are sub-items with all the relevant information. The objective of this code is to joint in one electronic place a large amount of information which usually it is disseminated on difficult to find separated papers. (author)

  3. Computer/Information Science

    Science.gov (United States)

    Birman, Ken; Roughgarden, Tim; Seltzer, Margo; Spohrer, Jim; Stolterman, Erik; Kearsley, Greg; Koszalka, Tiffany; de Jong, Ton

    2013-01-01

    Scholars representing the field of computer/information science were asked to identify what they considered to be the most exciting and imaginative work currently being done in their field, as well as how that work might change our understanding. The scholars included Ken Birman, Jennifer Rexford, Tim Roughgarden, Margo Seltzer, Jim Spohrer, and…

  4. Design and installation of advanced computer safety related instrumentation

    International Nuclear Information System (INIS)

    Koch, S.; Andolina, K.; Ruether, J.

    1993-01-01

    The rapidly developing area of computer systems creates new opportunities for commercial utilities operating nuclear reactors to improve plant operation and efficiency. Two of the main obstacles to utilizing the new technology in safety-related applications is the current policy of the licensing agencies and the fear of decision making managers to introduce new technologies. Once these obstacles are overcome, advanced diagnostic systems, CRT-based displays, and advanced communication channels can improve plant operation considerably. The article discusses outstanding issues in the area of designing, qualifying, and licensing of computer-based instrumentation and control systems. The authors describe the experience gained in designing three safety-related systems, that include a Programmable Logic Controller (PLC) based Safeguard Load Sequencer for NSP Prairie Island, a digital Containment Isolation monitoring system for TVA Browns Ferry, and a study that was conducted for EPRI/NSP regarding a PLC-based Reactor Protection system. This article presents the benefits to be gained in replacing existing, outdated equipment with new advanced instrumentation

  5. Nuclear Criticality Safety Assessment Using the SCALE Computer Code Package. A demonstration based on an independent review of a real application

    International Nuclear Information System (INIS)

    Mennerdahl, Dennis

    1998-06-01

    the basic theory and limitations behind the calculation methods require both studies and experience in using the methods. Experience in safety assessment is useful to sort out the important facts from all others and to identify important missing information. Bugs or undocumented limitations with potentially significant consequences must be expected in any large computer code system. The safety report appears to lead to correct conclusions. The differences in results are probably caused by somewhat different geometry models. The safety report claims that significant fuel damage is not credible. This needs to be confirmed

  6. Transactions of the nineteenth water reactor safety information meeting

    International Nuclear Information System (INIS)

    Weiss, A.J.

    1991-10-01

    This report contains summaries of papers on reactor safety research to be presented at the 19th Water Reactor Safety Information Meeting at the Bethesda Marriott Hotel in Bethesda, Maryland, October 28--30, 1991. The summaries briefly describe the programs and results of nuclear safety research sponsored by the Office of Nuclear Regulatory Research, USNRC. Summaries of invited papers concerning nuclear safety issues from US government laboratories, the electric utilities, the Electric Power Research Institute (EPRI), the nuclear industry, and from the governments and industry in Europe and Japan are also included. The summaries have been compiled in one report to provide a basis for meaningful discussion and information exchange during the course of the meeting, and are given in the order of their presentation in each session. The individual summaries have been cataloged separately

  7. Semiotics, Information Science, Documents and Computers.

    Science.gov (United States)

    Warner, Julian

    1990-01-01

    Discusses the relationship and value of semiotics to the established domains of information science. Highlights include documentation; computer operations; the language of computing; automata theory; linguistics; speech and writing; and the written language as a unifying principle for the document and the computer. (93 references) (LRW)

  8. Safety Psychology Applicating on Coal Mine Safety Management Based on Information System

    Science.gov (United States)

    Hou, Baoyue; Chen, Fei

    In recent years, with the increase of intensity of coal mining, a great number of major accidents happen frequently, the reason mostly due to human factors, but human's unsafely behavior are affected by insecurity mental control. In order to reduce accidents, and to improve safety management, with the help of application security psychology, we analyse the cause of insecurity psychological factors from human perception, from personality development, from motivation incentive, from reward and punishment mechanism, and from security aspects of mental training , and put forward countermeasures to promote coal mine safety production,and to provide information for coal mining to improve the level of safety management.

  9. WSRC approach to validation of criticality safety computer codes

    International Nuclear Information System (INIS)

    Finch, D.R.; Mincey, J.F.

    1991-01-01

    Recent hardware and operating system changes at Westinghouse Savannah River Site (WSRC) have necessitated review of the validation for JOSHUA criticality safety computer codes. As part of the planning for this effort, a policy for validation of JOSHUA and other criticality safety codes has been developed. This policy will be illustrated with the steps being taken at WSRC. The objective in validating a specific computational method is to reliably correlate its calculated neutron multiplication factor (K eff ) with known values over a well-defined set of neutronic conditions. Said another way, such correlations should be: (1) repeatable; (2) demonstrated with defined confidence; and (3) identify the range of neutronic conditions (area of applicability) for which the correlations are valid. The general approach to validation of computational methods at WSRC must encompass a large number of diverse types of fissile material processes in different operations. Special problems are presented in validating computational methods when very few experiments are available (such as for enriched uranium systems with principal second isotope 236 U). To cover all process conditions at WSRC, a broad validation approach has been used. Broad validation is based upon calculation of many experiments to span all possible ranges of reflection, nuclide concentrations, moderation ratios, etc. Narrow validation, in comparison, relies on calculations of a few experiments very near anticipated worst-case process conditions. The methods and problems of broad validation are discussed

  10. MedWatch, the FDA Safety Information and Adverse Event Reporting Program

    Science.gov (United States)

    ... Reporting Program MedWatch: The FDA Safety Information and Adverse Event Reporting Program Share Tweet Linkedin Pin it ... approved information that can help patients avoid serious adverse events. Potential Signals of Serious Risks/New Safety ...

  11. Development and Verification of the Computer Codes for the Fast Reactors Nuclear Safety Justification

    International Nuclear Information System (INIS)

    Kisselev, A.E.; Mosunova, N.A.; Strizhov, V.F.

    2015-01-01

    The information on the status of the work on development of the system of the nuclear safety codes for fast liquid metal reactors is presented in paper. The purpose of the work is to create an instrument for NPP neutronic, thermohydraulic and strength justification including human and environment radiation safety. The main task that is to be solved by the system of codes developed is the analysis of the broad spectrum of phenomena taking place on the NPP (including reactor itself, NPP components, containment rooms, industrial site and surrounding area) and analysis of the impact of the regular and accidental releases on the environment. The code system is oriented on the ability of fully integrated modeling of the NPP behavior in the coupled definition accounting for the wide range of significant phenomena taking place on the NPP under normal and accident conditions. It is based on the models that meet the state-of-the-art knowledge level. The codes incorporate advanced numerical methods and modern programming technologies oriented on the high-performance computing systems. The information on the status of the work on verification of the separate codes of the system of codes is also presented. (author)

  12. Managing knowledge and information on nuclear safety

    International Nuclear Information System (INIS)

    Hahn, L.

    2005-01-01

    Described is the management of nuclear safety knowledge through education networks, knowledge pool, sharing, archiving and distributing the knowledge information. Demonstrated is the system used at Gesellschaft fuer Anlagen-und Reaktorsicherheit

  13. The eNanoMapper database for nanomaterial safety information.

    Science.gov (United States)

    Jeliazkova, Nina; Chomenidis, Charalampos; Doganis, Philip; Fadeel, Bengt; Grafström, Roland; Hardy, Barry; Hastings, Janna; Hegi, Markus; Jeliazkov, Vedrin; Kochev, Nikolay; Kohonen, Pekka; Munteanu, Cristian R; Sarimveis, Haralambos; Smeets, Bart; Sopasakis, Pantelis; Tsiliki, Georgia; Vorgrimmler, David; Willighagen, Egon

    2015-01-01

    The NanoSafety Cluster, a cluster of projects funded by the European Commision, identified the need for a computational infrastructure for toxicological data management of engineered nanomaterials (ENMs). Ontologies, open standards, and interoperable designs were envisioned to empower a harmonized approach to European research in nanotechnology. This setting provides a number of opportunities and challenges in the representation of nanomaterials data and the integration of ENM information originating from diverse systems. Within this cluster, eNanoMapper works towards supporting the collaborative safety assessment for ENMs by creating a modular and extensible infrastructure for data sharing, data analysis, and building computational toxicology models for ENMs. The eNanoMapper database solution builds on the previous experience of the consortium partners in supporting diverse data through flexible data storage, open source components and web services. We have recently described the design of the eNanoMapper prototype database along with a summary of challenges in the representation of ENM data and an extensive review of existing nano-related data models, databases, and nanomaterials-related entries in chemical and toxicogenomic databases. This paper continues with a focus on the database functionality exposed through its application programming interface (API), and its use in visualisation and modelling. Considering the preferred community practice of using spreadsheet templates, we developed a configurable spreadsheet parser facilitating user friendly data preparation and data upload. We further present a web application able to retrieve the experimental data via the API and analyze it with multiple data preprocessing and machine learning algorithms. We demonstrate how the eNanoMapper database is used to import and publish online ENM and assay data from several data sources, how the "representational state transfer" (REST) API enables building user friendly

  14. New Information Dispersal Techniques for Trustworthy Computing

    Science.gov (United States)

    Parakh, Abhishek

    2011-01-01

    Information dispersal algorithms (IDA) are used for distributed data storage because they simultaneously provide security, reliability and space efficiency, constituting a trustworthy computing framework for many critical applications, such as cloud computing, in the information society. In the most general sense, this is achieved by dividing data…

  15. Method for quantitative assessment of nuclear safety computer codes

    International Nuclear Information System (INIS)

    Dearien, J.A.; Davis, C.B.; Matthews, L.J.

    1979-01-01

    A procedure has been developed for the quantitative assessment of nuclear safety computer codes and tested by comparison of RELAP4/MOD6 predictions with results from two Semiscale tests. This paper describes the developed procedure, the application of the procedure to the Semiscale tests, and the results obtained from the comparison

  16. The development of regulatory expectations for computer-based safety systems for the UK nuclear programme

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, P. J. [HM Nuclear Installations Inspectorate Marine Engineering Submarines Defence Nuclear Safety Regulator Serco Assurance Redgrave Court, Merton Road, Bootle L20 7HS (United Kingdom); Westwood, R.N; Mark, R. T. [FLEET HQ, Leach Building, Whale Island, Portsmouth, PO2 8BY (United Kingdom); Tapping, K. [Serco Assurance,Thomson House, Risley, Warrington, WA3 6GA (United Kingdom)

    2006-07-01

    The Nuclear Installations Inspectorate (NII) of the UK's Health and Safety Executive (HSE) has completed a review of their Safety Assessment Principles (SAPs) for Nuclear Installations recently. During the period of the SAPs review in 2004-2005 the designers of future UK naval reactor plant were optioneering the control and protection systems that might be implemented. Because there was insufficient regulatory guidance available in the naval sector to support this activity the Defence Nuclear Safety Regulator (DNSR) invited the NII to collaborate with the production of a guidance document that provides clarity of regulatory expectations for the production of safety cases for computer based safety systems. A key part of producing regulatory expectations was identifying the relevant extant standards and sector guidance that reflect good practice. The three principal sources of such good practice were: IAEA Safety Guide NS-G-1.1 (Software for Computer Based Systems Important to Safety in Nuclear Power Plants), European Commission consensus document (Common Position of European Nuclear Regulators for the Licensing of Safety Critical Software for Nuclear Reactors) and IEC nuclear sector standards such as IEC60880. A common understanding has been achieved between the NII and DNSR and regulatory guidance developed which will be used by both NII and DNSR in the assessment of computer-based safety systems and in the further development of more detailed joint technical assessment guidance for both regulatory organisations. (authors)

  17. Transactions of the twenty-fifth water reactor safety information meeting

    Energy Technology Data Exchange (ETDEWEB)

    Monteleone, S. [comp.

    1997-09-01

    This report contains summaries of papers on reactor safety research to be presented at the 25th Water Reactor Safety Information Meeting at the Bethesda Marriott Hotel in Bethesda, Maryland, October 20--22, 1997. The summaries briefly describe the programs and results of nuclear safety research sponsored by the Office of Nuclear Regulatory Research, US NRC. Summaries of invited papers concerning nuclear safety issues from US government laboratories, the electric utilities, the nuclear industry, and from foreign governments and industry are also included. The summaries have been compiled in one report to provide a basis for meaningful discussion of information exchanged during the course of the meeting, and are given in order of their presentation in each session.

  18. Transactions of the twenty-fifth water reactor safety information meeting

    International Nuclear Information System (INIS)

    Monteleone, S.

    1997-09-01

    This report contains summaries of papers on reactor safety research to be presented at the 25th Water Reactor Safety Information Meeting at the Bethesda Marriott Hotel in Bethesda, Maryland, October 20--22, 1997. The summaries briefly describe the programs and results of nuclear safety research sponsored by the Office of Nuclear Regulatory Research, US NRC. Summaries of invited papers concerning nuclear safety issues from US government laboratories, the electric utilities, the nuclear industry, and from foreign governments and industry are also included. The summaries have been compiled in one report to provide a basis for meaningful discussion of information exchanged during the course of the meeting, and are given in order of their presentation in each session

  19. Radiation safety research information database

    International Nuclear Information System (INIS)

    Yukawa, Masae; Miyamoto, Kiriko; Takeda, Hiroshi; Kuroda, Noriko; Yamamoto, Kazuhiko

    2004-01-01

    National Institute of Radiological Sciences in Japan began to construct Radiation Safety Research Information Database' in 2001. The research information database is of great service to evaluate the effects of radiation on people by estimating exposure dose by determining radiation and radioactive matters in the environment. The above database (DB) consists of seven DB such as Nirs Air Borne Dust Survey DB, Nirs Environmental Tritium Survey DB, Nirs Environmental Carbon Survey DB, Environmental Radiation Levels, Abe, Metabolic Database for Assessment of Internal Dose, Graphs of Predicted Monitoring Data, and Nirs nuclear installation environment water tritium survey DB. Outline of DB and each DB are explained. (S.Y.)

  20. Information about the control of nuclear safety in France

    International Nuclear Information System (INIS)

    Gerster, D.

    1994-01-01

    The permanent objective of the French Nuclear Safety Authority is the public information about technical controls performed in French nuclear installations. Three publications from the DSIN (Direction of Nuclear Installations Safety) are devoted to this effort: the MAGNUC Minitel magazine, the annual activity report and the CONTROLE magazine. Details about the content of these publications are given. A large part of the information about control of nuclear safety concerns the incidents and accidents and their importance level. A seriousness scale was created in France at the beginning of 1988 and replaced in April 1994 by the very similar International Nuclear Event Scale (INES). Explanation of this scale is given and illustrated with examples of real events and accidents. However, international comparison between incidents and accidents remains delicate because the detailed content of safety reports can change significantly from one country to another. (J.S.). 1 fig

  1. An Adaptive Information Quantity-Based Broadcast Protocol for Safety Services in VANET

    Directory of Open Access Journals (Sweden)

    Wenjie Wang

    2016-01-01

    Full Text Available Vehicle-to-vehicle communication plays a significantly important role in implementing safe and efficient road traffic. When disseminating safety messages in the network, the information quantity on safety packets changes over time and space. However, most of existing protocols view each packet the same to disseminate, preventing vehicles from collecting more recent and precise safety information. Hence, an information quantity-based broadcast protocol is proposed in this paper to ensure the efficiency of safety messages dissemination. In particular, we propose the concept of emergency-degree to evaluate packets’ information quantity. Then we present EDCast, an emergency-degree-based broadcast protocol. EDCast differentiates each packet’s priority for accessing the channel based on its emergency-degree so as to provide vehicles with more safety information timely and accurately. In addition, an adaptive scheme is presented to ensure fast dissemination of messages in different network condition. We compare the performance of EDCast with those of three other representative protocols in a typical highway scenario. Simulation results indicate that EDCast achieves higher broadcast efficiency and less redundancy with less delivery delay. What we found demonstrates that it is feasible and necessary for incorporating information quantity of messages in designing an efficient safety message broadcast protocol.

  2. Information technology and computational physics

    CERN Document Server

    Kóczy, László; Mesiar, Radko; Kacprzyk, Janusz

    2017-01-01

    A broad spectrum of modern Information Technology (IT) tools, techniques, main developments and still open challenges is presented. Emphasis is on new research directions in various fields of science and technology that are related to data analysis, data mining, knowledge discovery, information retrieval, clustering and classification, decision making and decision support, control, computational mathematics and physics, to name a few. Applications in many relevant fields are presented, notably in telecommunication, social networks, recommender systems, fault detection, robotics, image analysis and recognition, electronics, etc. The methods used by the authors range from high level formal mathematical tools and techniques, through algorithmic and computational tools, to modern metaheuristics.

  3. Role of computers in quality assurance in the LLL Criticality Safety Program

    International Nuclear Information System (INIS)

    Koponen, B.L.

    1978-01-01

    Some of the aspects of computational criticality safety quality assurance that have been emphasized in recent years at LLL are summarized. In particular, computer code changes that have been made that help the criticality analyst reduce the number of errors that he makes and to locate those that he does make; and how a computerized ''benchmark'' data base aids him in the validation of his computational methods are discussed

  4. Computing, Information and Communications Technology (CICT) Website

    Science.gov (United States)

    Hardman, John; Tu, Eugene (Technical Monitor)

    2002-01-01

    The Computing, Information and Communications Technology Program (CICT) was established in 2001 to ensure NASA's Continuing leadership in emerging technologies. It is a coordinated, Agency-wide effort to develop and deploy key enabling technologies for a broad range of mission-critical tasks. The NASA CICT program is designed to address Agency-specific computing, information, and communications technology requirements beyond the projected capabilities of commercially available solutions. The areas of technical focus have been chosen for their impact on NASA's missions, their national importance, and the technical challenge they provide to the Program. In order to meet its objectives, the CICT Program is organized into the following four technology focused projects: 1) Computing, Networking and Information Systems (CNIS); 2) Intelligent Systems (IS); 3) Space Communications (SC); 4) Information Technology Strategic Research (ITSR).

  5. Current algorithms used in reactor safety codes and the impact of future computer development on these algorithms

    International Nuclear Information System (INIS)

    Mahaffy, J.H.; Liles, D.R.; Woodruff, S.B.

    1985-01-01

    Computational methods and solution procedures used in the US Nuclear Regulatory Commission's reactor safety systems codes, Transient Reactor Analysis Code (TRAC) and Reactor Leak and Power Safety Excursion Code (RELAP), are reviewed. Methods used in TRAC-PF1/MOD1, including the stability-enhancing two-step (SETS) technique, which permits fast computations by allowing time steps larger than the material Courant stability limit, are described in detail, and the differences from RELAP5/MOD2 are noted. Developments in computing, including parallel and vector processing, and their applicability to nuclear reactor safety codes are described. These developments, coupled with appropriate numerical methods, make detailed faster-than-real-time reactor safety analysis a realistic near-term possibility

  6. Transactions of the Twenty-First Water Reactor Safety Information Meeting

    International Nuclear Information System (INIS)

    Monteleone, S.

    1993-10-01

    This report contains summaries of papers on reactor safety research to be presented at the 21st Water Reactor Safety Information Meeting at the Bethesda Marriott Hotel, Bethesda, Maryland, October 25--27, 1993. The summaries briefly describe the programs and results of nuclear safety research sponsored by the Office of Nuclear Regulatory Research, US NRC. Summaries of invited papers concerning nuclear safety issues from US government laboratories, the electric utilities, the Electric Power Research Institute (EPRI), the nuclear industry, and from foreign governments and industry are also included. The summaries have been compiled in one report to provide a basis for meaningful discussion and information exchange during the course of the meeting and are given in the order of their presentation in each session

  7. Transactions of the Twenty-First Water Reactor Safety Information Meeting

    Energy Technology Data Exchange (ETDEWEB)

    Monteleone, S. [comp.

    1993-10-01

    This report contains summaries of papers on reactor safety research to be presented at the 21st Water Reactor Safety Information Meeting at the Bethesda Marriott Hotel, Bethesda, Maryland, October 25--27, 1993. The summaries briefly describe the programs and results of nuclear safety research sponsored by the Office of Nuclear Regulatory Research, US NRC. Summaries of invited papers concerning nuclear safety issues from US government laboratories, the electric utilities, the Electric Power Research Institute (EPRI), the nuclear industry, and from foreign governments and industry are also included. The summaries have been compiled in one report to provide a basis for meaningful discussion and information exchange during the course of the meeting and are given in the order of their presentation in each session.

  8. Transactions of the twenty-second water reactor safety information meeting

    International Nuclear Information System (INIS)

    1994-10-01

    This report contains summaries of papers on reactor safety research to be presented at the 22nd Water Reactor Safety Information Meeting at the Bethesda Marriott Hotel, Bethesda, Maryland, October 24--26, 1994. The summaries briefly describe the programs and results of nuclear safety research sponsored by the Office of Nuclear Regulatory Research, US NRC. Summaries of invited papers concerning nuclear safety issues from US government laboratories, the electric utilities, the nuclear industry, and from foreign governments and industry are also included. The summaries have been compiled in one report to provide a basis for meaningful discussion and information exchange during the course of the meeting and are given in the order of their presentation in each session. Individual papers have been cataloged separately

  9. Transactions of the Twentieth Water Reactor Safety Information Meeting

    International Nuclear Information System (INIS)

    Weiss, A.J.

    1992-10-01

    This report contains summaries of papers on reactor safety research to be presented at the 20th Water Reactor Safety Information Meeting at the Bethesda Marriott Hotel in Bethesda, Maryland, October 21--23, 1992. The summaries briefly describe the programs and results of nuclear safety research sponsored by the Office of Nuclear Regulatory Research, USNRC. Summaries of invited papers concerning nuclear safety issues from US government laboratories, the electric utilities, the Electric Power Research Institute (EPRI), the nuclear industry, and from foreign governments and industry are also included

  10. Maintenance of radiation safety information system

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Ho Sun [Korea Institute of Nuclear Safety, Taejon (Korea, Republic of); Park, Moon Il; Chung, Chong Kyu; Lim, Bock Soo; Kim, Hyung Uk; Chang, Kwang Il; Nam, Kwan Hyun; Cho, Hye Ryan [AD center incubation LAB, Taejon (Korea, Republic of)

    2001-12-15

    The objectives of radiation safety information system maintenance are to maintain the requirement of users, change of job process and upgrade of the system performance stably and effectively while system maintenance. We conduct the code of conduct recommended by IAEA, management of radioisotope inventory database systematically using analysis for the state of inventory database integrated in this system. This system and database will be support the regulatory guidance, rule making and information to the MOST, KINS, other regulatory related organization and general public optimizationally.

  11. AGIS: Evolution of Distributed Computing Information system for ATLAS

    CERN Document Server

    Anisenkov, Alexey; The ATLAS collaboration; Alandes Pradillo, Maria; Karavakis, Edward

    2015-01-01

    The variety of the ATLAS Computing Infrastructure requires a central information system to define the topology of computing resources and to store the different parameters and configuration data which are needed by the various ATLAS software components. The ATLAS Grid Information System is the system designed to integrate configuration and status information about resources, services and topology of the computing infrastructure used by ATLAS Distributed Computing applications and services.

  12. Computational Methods for Sensitivity and Uncertainty Analysis in Criticality Safety

    International Nuclear Information System (INIS)

    Broadhead, B.L.; Childs, R.L.; Rearden, B.T.

    1999-01-01

    Interest in the sensitivity methods that were developed and widely used in the 1970s (the FORSS methodology at ORNL among others) has increased recently as a result of potential use in the area of criticality safety data validation procedures to define computational bias, uncertainties and area(s) of applicability. Functional forms of the resulting sensitivity coefficients can be used as formal parameters in the determination of applicability of benchmark experiments to their corresponding industrial application areas. In order for these techniques to be generally useful to the criticality safety practitioner, the procedures governing their use had to be updated and simplified. This paper will describe the resulting sensitivity analysis tools that have been generated for potential use by the criticality safety community

  13. Analytical methodology for safety validation of computer controlled subsystems. Volume 1 : state-of-the-art and assessment of safety verification/validation methodologies

    Science.gov (United States)

    1995-09-01

    This report describes the development of a methodology designed to assure that a sufficiently high level of safety is achieved and maintained in computer-based systems which perform safety critical functions in high-speed rail or magnetic levitation ...

  14. Extreme Physics and Informational/Computational Limits

    Energy Technology Data Exchange (ETDEWEB)

    Di Sia, Paolo, E-mail: paolo.disia@univr.it, E-mail: 10alla33@virgilio.it [Department of Computer Science, Faculty of Science, Verona University, Strada Le Grazie 15, I-37134 Verona (Italy) and Faculty of Computer Science, Free University of Bozen, Piazza Domenicani 3, I-39100 Bozen-Bolzano (Italy)

    2011-07-08

    A sector of the current theoretical physics, even called 'extreme physics', deals with topics concerning superstring theories, multiverse, quantum teleportation, negative energy, and more, that only few years ago were considered scientific imaginations or purely speculative physics. Present experimental lines of evidence and implications of cosmological observations seem on the contrary support such theories. These new physical developments lead to informational limits, as the quantity of information, that a physical system can record, and computational limits, resulting from considerations regarding black holes and space-time fluctuations. In this paper I consider important limits for information and computation resulting in particular from string theories and its foundations.

  15. Extreme Physics and Informational/Computational Limits

    International Nuclear Information System (INIS)

    Di Sia, Paolo

    2011-01-01

    A sector of the current theoretical physics, even called 'extreme physics', deals with topics concerning superstring theories, multiverse, quantum teleportation, negative energy, and more, that only few years ago were considered scientific imaginations or purely speculative physics. Present experimental lines of evidence and implications of cosmological observations seem on the contrary support such theories. These new physical developments lead to informational limits, as the quantity of information, that a physical system can record, and computational limits, resulting from considerations regarding black holes and space-time fluctuations. In this paper I consider important limits for information and computation resulting in particular from string theories and its foundations.

  16. 49 CFR 575.301 - Vehicle Labeling of Safety Rating Information.

    Science.gov (United States)

    2010-10-01

    ... providing them with safety rating information developed by NHTSA in its New Car Assessment Program (NCAP..., as specified at 15 U.S.C. 1231-1233. (2) Safety rating label means the label with NCAP safety rating... has approved an optional NCAP test that will cover that category, the manufacturer may depict vehicles...

  17. Integrated care: an Information Model for Patient Safety and Vigilance Reporting Systems.

    Science.gov (United States)

    Rodrigues, Jean-Marie; Schulz, Stefan; Souvignet, Julien

    2015-01-01

    Quality management information systems for safety as a whole or for specific vigilances share the same information types but are not interoperable. An international initiative tries to develop an integrated information model for patient safety and vigilance reporting to support a global approach of heath care quality.

  18. Design Information from the PSA for Digital Safety-Critical Systems

    International Nuclear Information System (INIS)

    Kang, Hyun Gook; Jang, Seung Cheol

    2005-01-01

    Many safety-critical applications such as nuclear field application usually adopt a similar design strategy for digital safety-critical systems. Their differences from the normal design for the non-safety-critical applications could be summarized as: multiple-redundancy, highly reliable components, strengthened monitoring mechanism, verified software, and automated test procedure. These items are focusing on maintaining the capability to perform the given safety function when it is requested. For the past several decades, probabilistic safety assessment (PSA) techniques are used in the nuclear industry to assess the relative effects of contributing events on plant risk and system reliability. They provide a unifying means of assessing physical faults, recovery processes, contributing effects, human actions, and other events that have a high degree of uncertainty. The applications of PSA provide not only the analysis results of already installed system but also the useful information for the system under design. The information could be derived from the PSA experience of the various safety-critical systems. Thanks to the design flexibility, the digital system is one of the most suitable candidates for risk-informed design (RID). In this article, we will describe the feedbacks for system design and try to develop a procedure for RID. Even though the procedure is not sophisticated enough now, it could be the start point of the further investigation for developing more complete and practical methodology

  19. Philosophy of computing and information technology

    NARCIS (Netherlands)

    Brey, Philip A.E.; Soraker, Johnny; Meijers, A.

    2009-01-01

    Philosophy has been described as having taken a “computational turn,” referring to the ways in which computers and information technology throw new light upon traditional philosophical issues, provide new tools and concepts for philosophical reasoning, and pose theoretical and practical questions

  20. Quantum Computers: A New Paradigm in Information Technology

    Directory of Open Access Journals (Sweden)

    Mahesh S. Raisinghani

    2001-01-01

    Full Text Available The word 'quantum' comes from the Latin word quantus meaning 'how much'. Quantum computing is a fundamentally new mode of information processing that can be performed only by harnessing physical phenomena unique to quantum mechanics (especially quantum interference. Paul Benioff of the Argonne National Laboratory first applied quantum theory to computers in 1981 and David Deutsch of Oxford proposed quantum parallel computers in 1985, years before the realization of qubits in 1995. However, it may be well into the 21st century before we see quantum computing used at a commercial level for a variety of reasons discussed in this paper. The subject of quantum computing brings together ideas from classical information theory, computer science, and quantum physics. This paper discusses some of the current advances, applications, and chal-lenges of quantum computing as well as its impact on corporate computing and implications for management. It shows how quantum computing can be utilized to process and store information, as well as impact cryptography for perfectly secure communication, algorithmic searching, factorizing large numbers very rapidly, and simulating quantum-mechanical systems efficiently. A broad interdisciplinary effort will be needed if quantum com-puters are to fulfill their destiny as the world's fastest computing devices.

  1. Computer Simulation in Information and Communication Engineering

    CERN Multimedia

    Anton Topurov

    2005-01-01

    CSICE'05 Sofia, Bulgaria 20th - 22nd October, 2005 On behalf of the International Scientific Committee, we would like to invite you all to Sofia, the capital city of Bulgaria, to the International Conference in Computer Simulation in Information and Communication Engineering CSICE'05. The Conference is aimed at facilitating the exchange of experience in the field of computer simulation gained not only in traditional fields (Communications, Electronics, Physics...) but also in the areas of biomedical engineering, environment, industrial design, etc. The objective of the Conference is to bring together lectures, researchers and practitioners from different countries, working in the fields of computer simulation in information engineering, in order to exchange information and bring new contribution to this important field of engineering design and education. The Conference will bring you the latest ideas and development of the tools for computer simulation directly from their inventors. Contribution describ...

  2. Analytical Computation of Information Rate for MIMO Channels

    Directory of Open Access Journals (Sweden)

    Jinbao Zhang

    2017-01-01

    Full Text Available Information rate for discrete signaling constellations is significant. However, the computational complexity makes information rate rather difficult to analyze for arbitrary fading multiple-input multiple-output (MIMO channels. An analytical method is proposed to compute information rate, which is characterized by considerable accuracy, reasonable complexity, and concise representation. These features will improve accuracy for performance analysis with criterion of information rate.

  3. Multimodal Information Presentation for High-Load Human Computer Interaction

    NARCIS (Netherlands)

    Cao, Y.

    2011-01-01

    This dissertation addresses multimodal information presentation in human computer interaction. Information presentation refers to the manner in which computer systems/interfaces present information to human users. More specifically, the focus of our work is not on which information to present, but

  4. LIMBO computer code for analyzing coolant-voiding dynamics in LMFBR safety tests

    International Nuclear Information System (INIS)

    Bordner, G.L.

    1979-10-01

    The LIMBO (liquid metal boiling) code for the analysis of two-phase flow phenomena in an LMFBR reactor coolant channel is presented. The code uses a nonequilibrium, annular, two-phase flow model, which allows for slip between the phases. Furthermore, the model is intended to be valid for both quasi-steady boiling and rapid coolant voiding of the channel. The code was developed primarily for the prediction of, and the posttest analysis of, coolant-voiding behavior in the SLSF P-series in-pile safety test experiments. The program was conceived to be simple, efficient, and easy to use. It is particularly suited for parametric studies requiring many computer runs and for the evaluation of the effects of model or correlation changes that require modification of the computer program. The LIMBO code, of course, lacks the sophistication and model detail of the reactor safety codes, such as SAS, and is therefore intended to compliment these safety codes

  5. 77 FR 69899 - Public Conference on Geographic Information Systems (GIS) in Transportation Safety

    Science.gov (United States)

    2012-11-21

    ... NATIONAL TRANSPORTATION SAFETY BOARD Public Conference on Geographic Information Systems (GIS) in... Geographic Information Systems (GIS) in transportation safety on December 4-5, 2012. GIS is a rapidly... visualization of data. The meeting will bring researchers and practitioners in transportation safety and GIS...

  6. Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS

    OpenAIRE

    Bauereiss , Thomas; Hutter , Dieter

    2014-01-01

    Part 6: Information Flow Control; International audience; Motivated by typical security requirements of workflow management systems, we consider the integrated verification of both safety properties (e.g. separation of duty) and information flow security predicates of the MAKS framework (e.g. modeling confidentiality requirements). Due to the refinement paradox, enforcement of safety properties might violate possibilistic information flow properties of a system. We present an approach where s...

  7. The Criticality Safety Information Resource Center (CSIRC) at Los Alamos National Laboratory

    International Nuclear Information System (INIS)

    Henderson, B.D.; Meade, R.A.; Pruvost, N.L.

    1999-01-01

    The Criticality Safety Information Resource Center (CSIRC) at Los Alamos National Laboratory (LANL) is a program jointly funded by the U.S. Department of Energy (DOE) and the U.S. Nuclear Regulatory Commission (NRC) in conjunction with the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 97-2. The goal of CSIRC is to preserve primary criticality safety documentation from U.S. critical experimental sites and to make this information available for the benefit of the technical community. Progress in archiving criticality safety primary documents at the LANL archives as well as efforts to make this information available to researchers are discussed. The CSIRC project has a natural linkage to the International Criticality Safety Benchmark Evaluation Project (ICSBEP). This paper raises the possibility that the CSIRC project will evolve in a fashion similar to the ICSBEP. Exploring the implications of linking the CSIRC to the international criticality safety community is the motivation for this paper

  8. Philosophy of computing and information technology

    OpenAIRE

    Brey, Philip A.E.; Soraker, Johnny; Meijers, A.

    2009-01-01

    Philosophy has been described as having taken a “computational turn,” referring to the ways in which computers and information technology throw new light upon traditional philosophical issues, provide new tools and concepts for philosophical reasoning, and pose theoretical and practical questions that cannot readily be approached within traditional philosophical frameworks. As such, computer technology is arguably the technology that has had the most profound impact on philosophy. Philosopher...

  9. Thermal analysis and safety information for metal nanopowders by DSC

    Energy Technology Data Exchange (ETDEWEB)

    Tseng, J.M.; Huang, S.T. [Institute of Safety and Disaster Prevention Technology, Central Taiwan University of Science and Technology, 666, Buzih Road, Beitun District, Taichung 40601, Taiwan, ROC (China); Duh, Y.S.; Hsieh, T.Y.; Sun, Y.Y. [Department of Safety Health and Environmental Engineering, National United University, Miaoli, Taiwan, ROC (China); Lin, J.Z. [Institute of Safety and Disaster Prevention Technology, Central Taiwan University of Science and Technology, 666, Buzih Road, Beitun District, Taichung 40601, Taiwan, ROC (China); Wu, H.C. [Institute of Occupational Safety and Health, Council of Labor Affairs, Taipei, Taiwan, ROC (China); Kao, C.S., E-mail: jcsk@nuu.edu.tw [Department of Safety Health and Environmental Engineering, National United University, Miaoli, Taiwan, ROC (China)

    2013-08-20

    Highlights: • Metal nanopowders are common and frequently employed in industry. • Nano iron powder experimental results of T{sub o} were 140–150 °C. • Safety information can benefit relevant metal powders industries. - Abstract: Metal nanopowders are common and frequently employed in industry. Iron is mostly applied in high-performance magnetic materials and pollutants treatment for groundwater. Zinc is widely used in brass, bronze, die casting metal, alloys, rubber, and paints, etc. Nonetheless, some disasters induced by metal powders are due to the lack of related safety information. In this study, we applied differential scanning calorimetry (DSC) and used thermal analysis software to evaluate the related thermal safety information, such as exothermic onset temperature (T{sub o}), peak of temperature (T{sub p}), and heat of reaction (ΔH). The nano iron powder experimental results of T{sub o} were 140–150 °C, 148–158 °C, and 141–149 °C for 15 nm, 35 nm, and 65 nm, respectively. The ΔH was larger than 3900 J/g, 5000 J/g, and 3900 J/g for 15 nm, 35 nm, and 65 nm, respectively. Safety information can benefit the relevant metal powders industries for preventing accidents from occurring.

  10. Health and safety information program for hazardous materials

    International Nuclear Information System (INIS)

    O'Brien, M.P.; Fallon, N.J.; Kuehner, A.V.

    1979-01-01

    The system is used as a management tool in several safety and health programs. It is used to: trace the use of hazardous materials and to determine monitoring needs; inform the occupational physician of the potential health problems associated with materials ordered by a given individual; inform the fire and rescue group of hazardous materials in a given building; provide waste disposal recommendations to the hazardous waste management group; assist the hazardous materials shipping coordinator in identifying materials which are regulated by the Department of Transportation; and guide management decisions in the area of recognizing and rectifying unsafe conditions. The information system has been expanded from a manual effort to provide a brief description of health hazards of chemicals used at the lab to a computerized health and safety information system which serves the needs of all personnel who may encounter the material in the course of their work. The system has been designed to provide information needed to control the potential problems associated with a hazardous material up to the time that it is consumed in a given operation or is sent to the waste disposal facility

  11. Opportunities for Using Building Information Modeling to Improve Worker Safety Performance

    Directory of Open Access Journals (Sweden)

    Kasim Alomari

    2017-02-01

    Full Text Available Building information modelling (BIM enables the creation of a digital representation of a designed facility combined with additional information about the project attributes, performance criteria, and construction process. Users of BIM tools point to the ability to visualize the final design along with the construction process as a beneficial feature of using BIM. Knowing the construction process in relationship to a facility’s design benefits both safety professionals when planning worker safety measures for a project and designers when creating a project’s design. Success in using BIM to enhance safety partly depends on the familiarity of project personnel with BIM tools and the extent to which the tools can be used to identify and eliminate safety hazards. In a separate, ongoing study, the authors investigated the connection between BIM and safety to document the opportunities, barriers, and impacts. Utilizing an on-line survey of project engineers who work for construction firms together with a comprehensive literature review, the study found those who use BIM feel that it aids in communication of project information and project delivery, both of which have been found to have positive impacts on construction site safety. Further, utilizing the survey results, the authors apply the binary logistic regression econometric framework to better understand the factors that lead to safety professionals believing that BIM increases safety in the work place. In addition, according to the survey results, a large percentage of the engineers who use BIM feel that ultimately it helps to eliminate safety hazards and improve worker safety. The study findings suggest that improvements in safety performance across the construction industry may be due in part to increased use of BIM in the construction industry.

  12. The challenge of effectively communicating patient safety information.

    Science.gov (United States)

    Hugman, Bruce; Edwards, I Ralph

    2006-07-01

    Rational use of drugs and patient safety are seriously compromised by a lack of good information, education and effective communication at all stages of drug development and use. From animal trials through to dispensing, there are misconceptions and opportunities for error which current methods of drug information communication do not adequately address: they do not provide those responsible for prescribing and dispensing drugs with the data and information they need to pass on complex and often changing messages to patients and the public. The incidence of adverse reactions due to the way drugs are used; the variable impact of regulatory guidelines and warnings on prescribing behaviour; drug scares and crises suggest a great gap between the ideals of the safe use of medicines and the reality in homes, clinics and hospitals around the world. To address these challenges, the authors review the several levels at which safety information is generated and communicated, and examine how, at each stage, the content and its significance, and the method of communication can be improved.

  13. Information need about the safety of the final disposal of nuclear waste. Information receiver's views in Eurajoki, Kuhmo and Aeaenekoski municipalities

    International Nuclear Information System (INIS)

    Hautakangas, H.

    1997-03-01

    The study analyses the public's information need about the safety issues related to the final disposal of spent nuclear fuel generated by the Finnish nuclear power stations. Locals in three municipalities that are studied as possible sites for final disposal were interviewed for the study. Earlier studies made in Finland had indicated that the public's knowledge about safety issues related to the final disposal was almost opposite to the findings of the natural sciences. Also, the public had expressed a wish to receive more information from the safety authority, the Finnish Centre for Radiation and Nuclear Safety (STUK). This study therefore had two basic objectives: To find out what kind of safety information the locals need and what the safety authority's role could be in providing information. The main results show interest and need especially for information concerning the disposal phases taking place on the ground level, such as nuclear waste transportation and encapsulation. Also, the interviews show a clear need and desire for an impartial actor such as STUK in the information and communication process. (author) (107 refs.)

  14. Emerging Computation and Information teChnologies for Education : Proceeding of 2012 International Conference on Emerging Computation and Information teChnologies for Education

    CERN Document Server

    Xu, Linli; Tian, Wenya

    2012-01-01

    The 2012 International Conference on Emerging Computation and Information teChnologies for Education (ECICE 2012) was  held on Jan. 15-16, 2012, Hangzhou, China.  The main results of the conference are presented in this proceedings book of carefully reviewed and accepted paper addressing the hottest issues in emerging computation and information technologies used for education. The volume covers a wide series of topics in the area, including Computer-Assisted Education, Educational Information Systems, Web-based Learning, etc.

  15. Exchange of information between nuclear safety authorities: Policy of the French regulator

    International Nuclear Information System (INIS)

    Asty, Michel

    2000-01-01

    Full text: The decree setting up the Nuclear Safety Authority in 1973 entrusted it with international assignments whose objectives are still valid: - develop exchanges of information with foreign counterparts on regulatory systems and practices, on problems encountered in the nuclear safety field and on provisions made, with a view to enhancing its approach, and - becoming better acquainted with the actual operating practice of these Safety Authorities from which lessons could be learned for its own working procedures; - improving its position in the technical discussions with the French operators, since its arguments would be strengthened by practical knowledge of conditions abroad; - make known and explain the French approach and practices in the nuclear safety field and provide information on measures taken to deal with the problems encountered. This approach has several objectives: - promote the circulation of information on French positions on certain issues, such as very low level waste, for instance; - assist some countries wishing to create or modify their Nuclear Safety Authority, such as countries of the former USSR, the Central and Eastern European countries, and emerging countries on other continents; - help, when requested, foreign Safety Authorities required to issue permits for nuclear equipment of French origin; - provide the countries concerned with all relevant information on French nuclear installations located near their frontiers. Examples are given on the way the French Nuclear Safety Authority implements these objectives. (author)

  16. Impediments for the application of risk-informed decision making in nuclear safety

    International Nuclear Information System (INIS)

    Hahn, L.

    2001-01-01

    A broad application of risk-informed decision making in the regulation of safety of nuclear power plants is hindered by the lack of quantitative risk and safety standards as well as of precise instruments to demonstrate an appropriate safety. An additional severe problem is associated with the difficulty to harmonize deterministic design requirements and probabilistic safety assessment. The problem is strengthened by the vulnerability of PSA for subjective influences and the potential of misuse. Beside this scepticism the nuclear community is encouraged to intensify the efforts to improve the quality standards for probabilistic safety assessments and their quality assurance. A prerequisite for reliable risk-informed decision making processes is also a well-defined and transparent relationship between deterministic and probabilistic safety approaches. (author)

  17. Computing, Information, and Communications Technology (CICT) Program Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The Computing, Information and Communications Technology (CICT) Program's goal is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communication technologies

  18. Airline Safety and Economy

    Science.gov (United States)

    1993-01-01

    This video documents efforts at NASA Langley Research Center to improve safety and economy in aircraft. Featured are the cockpit weather information needs computer system, which relays real time weather information to the pilot, and efforts to improve techniques to detect structural flaws and corrosion, such as the thermal bond inspection system.

  19. Deterministic Safety Analysis for Nuclear Power Plants. Specific Safety Guide (Russian Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The objective of this Safety Guide is to provide harmonized guidance to designers, operators, regulators and providers of technical support on deterministic safety analysis for nuclear power plants. It provides information on the utilization of the results of such analysis for safety and reliability improvements. The Safety Guide addresses conservative, best estimate and uncertainty evaluation approaches to deterministic safety analysis and is applicable to current and future designs. Contents: 1. Introduction; 2. Grouping of initiating events and associated transients relating to plant states; 3. Deterministic safety analysis and acceptance criteria; 4. Conservative deterministic safety analysis; 5. Best estimate plus uncertainty analysis; 6. Verification and validation of computer codes; 7. Relation of deterministic safety analysis to engineering aspects of safety and probabilistic safety analysis; 8. Application of deterministic safety analysis; 9. Source term evaluation for operational states and accident conditions; References

  20. System and software safety analysis for the ERA control computer

    International Nuclear Information System (INIS)

    Beerthuizen, P.G.; Kruidhof, W.

    2001-01-01

    The European Robotic Arm (ERA) is a seven degrees of freedom relocatable anthropomorphic robotic manipulator system, to be used in manned space operation on the International Space Station, supporting the assembly and external servicing of the Russian segment. The safety design concept and implementation of the ERA is described, in particular with respect to the central computer's software design. A top-down analysis and specification process is used to down flow the safety aspects of the ERA system towards the subsystems, which are produced by a consortium of companies in many countries. The user requirements documents and the critical function list are the key documents in this process. Bottom-up analysis (FMECA) and test, on both subsystem and system level, are the basis for safety verification. A number of examples show the use of the approach and methods used

  1. The eNanoMapper database for nanomaterial safety information

    Directory of Open Access Journals (Sweden)

    Nina Jeliazkova

    2015-07-01

    Full Text Available Background: The NanoSafety Cluster, a cluster of projects funded by the European Commision, identified the need for a computational infrastructure for toxicological data management of engineered nanomaterials (ENMs. Ontologies, open standards, and interoperable designs were envisioned to empower a harmonized approach to European research in nanotechnology. This setting provides a number of opportunities and challenges in the representation of nanomaterials data and the integration of ENM information originating from diverse systems. Within this cluster, eNanoMapper works towards supporting the collaborative safety assessment for ENMs by creating a modular and extensible infrastructure for data sharing, data analysis, and building computational toxicology models for ENMs.Results: The eNanoMapper database solution builds on the previous experience of the consortium partners in supporting diverse data through flexible data storage, open source components and web services. We have recently described the design of the eNanoMapper prototype database along with a summary of challenges in the representation of ENM data and an extensive review of existing nano-related data models, databases, and nanomaterials-related entries in chemical and toxicogenomic databases. This paper continues with a focus on the database functionality exposed through its application programming interface (API, and its use in visualisation and modelling. Considering the preferred community practice of using spreadsheet templates, we developed a configurable spreadsheet parser facilitating user friendly data preparation and data upload. We further present a web application able to retrieve the experimental data via the API and analyze it with multiple data preprocessing and machine learning algorithms.Conclusion: We demonstrate how the eNanoMapper database is used to import and publish online ENM and assay data from several data sources, how the “representational state

  2. Safety integrity requirements for computer based I ampersand C systems

    International Nuclear Information System (INIS)

    Thuy, N.N.Q.; Ficheux-Vapne, F.

    1997-01-01

    In order to take into account increasingly demanding functional requirements, many instrumentation and control (I ampersand C) systems in nuclear power plants are implemented with computers. In order to ensure the required safety integrity of such equipment, i.e., to ensure that they satisfactorily perform the required safety functions under all stated conditions and within stated periods of time, requirements applicable to these equipment and to their life cycle need to be expressed and followed. On the other hand, the experience of the last years has led EDF (Electricite de France) and its partners to consider three classes of systems and equipment, according to their importance to safety. In the EPR project (European Pressurized water Reactor), these classes are labeled E1A, E1B and E2. The objective of this paper is to present the outline of the work currently done in the framework of the ETC-I (EPR Technical Code for I ampersand C) regarding safety integrity requirements applicable to each of the three classes. 4 refs., 2 figs

  3. Computational Intelligence in Information Systems Conference

    CERN Document Server

    Au, Thien-Wan; Omar, Saiful

    2017-01-01

    This book constitutes the Proceedings of the Computational Intelligence in Information Systems conference (CIIS 2016), held in Brunei, November 18–20, 2016. The CIIS conference provides a platform for researchers to exchange the latest ideas and to present new research advances in general areas related to computational intelligence and its applications. The 26 revised full papers presented in this book have been carefully selected from 62 submissions. They cover a wide range of topics and application areas in computational intelligence and informatics.

  4. Introduction to Quantum Information/Computing

    National Research Council Canada - National Science Library

    Costianes, Peter J

    2005-01-01

    Quantum Information Technology (QIT) is a relatively new area of research whose purpose is to take advantage of the quantum nature of matter and energy to design and build quantum computers which have the potential of improved...

  5. Feedback from incident reporting: information and action to improve patient safety.

    Science.gov (United States)

    Benn, J; Koutantji, M; Wallace, L; Spurgeon, P; Rejman, M; Healey, A; Vincent, C

    2009-02-01

    Effective feedback from incident reporting systems in healthcare is essential if organisations are to learn from failures in the delivery of care. Despite the wide-scale development and implementation of incident reporting in healthcare, studies in the UK suggest that information concerning system vulnerabilities could be better applied to improve operational safety within organisations. In this article, the findings and implications of research to identify forms of effective feedback from incident reporting are discussed, to promote best practices in this area. The research comprised a mixed methods review to investigate mechanisms of effective feedback for healthcare, drawing upon experience within established reporting programmes in high-risk industry and transport domains. Systematic searches of published literature were undertaken, and 23 case studies describing incident reporting programmes with feedback were identified for analysis from the international healthcare literature. Semistructured interviews were undertaken with 19 subject matter experts across a range of domains, including: civil aviation, maritime, energy, rail, offshore production and healthcare. In analysis, qualitative information from several sources was synthesised into practical requirements for developing effective feedback in healthcare. Both action and information feedback mechanisms were identified, serving safety awareness, improvement and motivational functions. The provision of actionable feedback that visibly improved systems was highlighted as important in promoting future reporting. Fifteen requirements for the design of effective feedback systems were identified, concerning: the role of leadership, the credibility and content of information, effective dissemination channels, the capacity for rapid action and the need for feedback at all levels of the organisation, among others. Above all, the safety-feedback cycle must be closed by ensuring that reporting, analysis and

  6. 'BeSAFE', effect-evaluation of internet-based, tailored safety information combined with personal counselling on parents' child safety behaviours: study design of a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    van Beeck Eduard F

    2010-08-01

    Full Text Available Abstract Background Injuries in or around the home are the most important cause of death among children aged 0-4 years old. It is also a major source of morbidity and loss of quality of life. In order to reduce the number of injuries, the Consumer Safety Institute introduced the use of Safety Information Leaflets in the Netherlands to provide safety education to parents of children aged 0-4 years. Despite current safety education, necessary safety behaviours are still not taken by a large number of parents, causing unnecessary risk of injury among young children. In an earlier study an E-health module with internet-based, tailored safety information was developed and applied. It concerns an advice for parents on safety behaviours in their homes regarding their child. The aim of this study is to evaluate the effect of this safety information combined with personal counselling on parents' child safety behaviours. Methods/Design Parents who are eligible for the regular well-child visit with their child at child age 5-8 months are invited to participate in this study. Participating parents are randomized into one of two groups: 1 internet-based, tailored safety information combined with personal counselling (intervention group, or 2 personal counselling using the Safety Information Leaflets of the Consumer Safety Institute in the Netherlands for children aged 12 to 24 months (control group. All parents receive safety information on safety topics regarding the prevention of falling, poisoning, drowning and burning. Parents of the intervention group will access the internet-based, tailored safety information module when their child is approximately 10 months old. After completion of the assessment questions, the program compiles a tailored safety advice. The parents are asked to devise and inscribe a personal implementation intention. During the next well-child visit, the Child Health Clinic professional will discuss this tailored safety information

  7. Use of risk information to safety regulation. Fabrication facilities

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-15

    A procedure of ISA (Integrated Safety Analysis) for uranium fuel fabrication/enrichment facilities has been under the development aiming to utilize risk information for safety regulations in this project. Activities in the fiscal year 2012 are summarized in the paper. There are two major activities in the year. First one is a study on ISA procedure for external events such as earthquakes. Second one is that for chemical consequences such as UF6 and HF. Other than the activities a fundamental study on a policy of utilizing risk information was conducted. The outline and results are provided in the chapter 1 and 2 respectively. (author)

  8. Quantifying Safety Margin Using the Risk-Informed Safety Margin Characterization (RISMC)

    Energy Technology Data Exchange (ETDEWEB)

    Grabaskas, David; Bucknor, Matthew; Brunett, Acacia; Nakayama, Marvin

    2015-04-26

    The Risk-Informed Safety Margin Characterization (RISMC), developed by Idaho National Laboratory as part of the Light-Water Reactor Sustainability Project, utilizes a probabilistic safety margin comparison between a load and capacity distribution, rather than a deterministic comparison between two values, as is usually done in best-estimate plus uncertainty analyses. The goal is to determine the failure probability, or in other words, the probability of the system load equaling or exceeding the system capacity. While this method has been used in pilot studies, there has been little work conducted investigating the statistical significance of the resulting failure probability. In particular, it is difficult to determine how many simulations are necessary to properly characterize the failure probability. This work uses classical (frequentist) statistics and confidence intervals to examine the impact in statistical accuracy when the number of simulations is varied. Two methods are proposed to establish confidence intervals related to the failure probability established using a RISMC analysis. The confidence interval provides information about the statistical accuracy of the method utilized to explore the uncertainty space, and offers a quantitative method to gauge the increase in statistical accuracy due to performing additional simulations.

  9. Acquisition of Computers That Process Corporate Information

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1999-01-01

    The Secretary of Defense announced the Corporate Information Management initiative on November 16, 1990, to establish a DoD-wide concept for managing computer, communications, and information management functions...

  10. Exploiting heterogeneous publicly available data sources for drug safety surveillance: computational framework and case studies.

    Science.gov (United States)

    Koutkias, Vassilis G; Lillo-Le Louët, Agnès; Jaulent, Marie-Christine

    2017-02-01

    Driven by the need of pharmacovigilance centres and companies to routinely collect and review all available data about adverse drug reactions (ADRs) and adverse events of interest, we introduce and validate a computational framework exploiting dominant as well as emerging publicly available data sources for drug safety surveillance. Our approach relies on appropriate query formulation for data acquisition and subsequent filtering, transformation and joint visualization of the obtained data. We acquired data from the FDA Adverse Event Reporting System (FAERS), PubMed and Twitter. In order to assess the validity and the robustness of the approach, we elaborated on two important case studies, namely, clozapine-induced cardiomyopathy/myocarditis versus haloperidol-induced cardiomyopathy/myocarditis, and apixaban-induced cerebral hemorrhage. The analysis of the obtained data provided interesting insights (identification of potential patient and health-care professional experiences regarding ADRs in Twitter, information/arguments against an ADR existence across all sources), while illustrating the benefits (complementing data from multiple sources to strengthen/confirm evidence) and the underlying challenges (selecting search terms, data presentation) of exploiting heterogeneous information sources, thereby advocating the need for the proposed framework. This work contributes in establishing a continuous learning system for drug safety surveillance by exploiting heterogeneous publicly available data sources via appropriate support tools.

  11. Use of information technologies to contribute for optimizing the safety radiation management in Cuba

    International Nuclear Information System (INIS)

    Valdes Ramos, M.; Prendes Alonso, M.; Hernandez Saiz, A.; Manzano de Armas, J.

    2013-01-01

    This paper presents the results achieved in Cuba, with the development of a group of information management tools to implement radiation safety systemic and proactive approaches to safety and ICT supported. These tools were designed for different organisms with responsibility for the security at the country level, to the regulatory authority, for user entities, for individual monitoring services and other radiation protection services. It describes the philosophy of information management model used, the characteristics of the developed tools and their integration, the work performed for the homogenization of information available and the ability to capture and deliver data at different levels in decision making. The tools developed are based on the use of variables and indicators of importance to the safety and the systemic approach adopted allows to facilitate the optimization process for supervision of safety practices as well as contribute to the management of knowledge in radiation safety, through a synergistic combination of process data, information, information management systems, and the creative and innovative radiation safety experts

  12. THE FORMATION OF THE CONTOUR OF THE DOCUMENTED AND REAL FLIGHT SAFETY IN THE SYSTEM OF THE INFORMATION PROVISION OF SAFETY OF FLIGHTS

    Directory of Open Access Journals (Sweden)

    B. I. Bachkalo

    2015-01-01

    Full Text Available The article discusses the principles and mechanisms of formation of the contour of the real safety of flights and contour of the documented safety, allowing us to obtain information to control fligh safety. The proposed approach can be used in the algorithms of active on-board flight safety management system for the implementation of information support to the crew in flight and automatic control of flight safety.

  13. 75 FR 36615 - Pipeline Safety: Information Collection Gas Distribution Annual Report Form

    Science.gov (United States)

    2010-06-28

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration 49 CFR Part 192 [Docket No. PHMSA-RSPA-2004-19854] Pipeline Safety: Information Collection Gas Distribution Annual Report Form AGENCY: Pipeline and Hazardous Materials Safety Administration (PHMSA), DOT. ACTION: Request...

  14. Children's (Pediatric) CT (Computed Tomography)

    Medline Plus

    Full Text Available ... information about radiation dose. There always is a risk of complications from general anesthesia or sedation. Every measure will be taken to ... in X-Ray and CT Exams Contrast Materials Anesthesia Safety Children and Radiation Safety ... (Pediatric) CT (Computed Tomography) Videos related to Children's (Pediatric) ...

  15. Patient-Reported Safety Information: A Renaissance of Pharmacovigilance?

    Science.gov (United States)

    Härmark, Linda; Raine, June; Leufkens, Hubert; Edwards, I Ralph; Moretti, Ugo; Sarinic, Viola Macolic; Kant, Agnes

    2016-10-01

    The role of patients as key contributors in pharmacovigilance was acknowledged in the new EU pharmacovigilance legislation. This contains several efforts to increase the involvement of the general public, including making patient adverse drug reaction (ADR) reporting systems mandatory. Three years have passed since the legislation was introduced and the key question is: does pharmacovigilance yet make optimal use of patient-reported safety information? Independent research has shown beyond doubt that patients make an important contribution to pharmacovigilance signal detection. Patient reports provide first-hand information about the suspected ADR and the circumstances under which it occurred, including medication errors, quality failures, and 'near misses'. Patient-reported safety information leads to a better understanding of the patient's experiences of the ADR. Patients are better at explaining the nature, personal significance and consequences of ADRs than healthcare professionals' reports on similar associations and they give more detailed information regarding quality of life including psychological effects and effects on everyday tasks. Current methods used in pharmacovigilance need to optimise use of the information reported from patients. To make the most of information from patients, the systems we use for collecting, coding and recording patient-reported information and the methodologies applied for signal detection and assessment need to be further developed, such as a patient-specific form, development of a severity grading and evolution of the database structure and the signal detection methods applied. It is time for a renaissance of pharmacovigilance.

  16. Report on probabilistic safety assessment (PSA) quality assurance in utilization of risk information

    International Nuclear Information System (INIS)

    2006-12-01

    Recently in Japan, introduction of nuclear safety regulations using risk information such as probabilistic safety assessment (PSA) has been considered and utilization of risk information in the rational and practical measures on safety assurance has made a progress to start with the operation or inspection area. The report compiled results of investigation and studies of PSA quality assurance in risk-informed activities in the USA. Relevant regulatory guide and standard review plan as well as issues and recommendations were reviewed for technical adequacy and advancement of probabilistic risk assessment technology in risk-informed decision making. Useful and important information to be referred as issues in PSA quality assurance was identified. (T. Tanaka)

  17. High committee for nuclear safety transparency and information. July 1, 2009 meeting

    International Nuclear Information System (INIS)

    2009-07-01

    The high committee for the nuclear safety transparency and information (HCTISN) is an information, consultation and debate authority devoted to the assessment of the risks linked with nuclear activities and to the analysis of their impact on public health, on the environment and on nuclear safety. Each year, the HCTISN organizes several ordinary meetings in order to analyze some specific topics of the moment. This meeting was organized around 5 main points: 1 - radioactive waste management: status and steps of the June 28, 2006 law, ANDRA's projects of deep geologic disposal for long living/high-medium activity wastes and of low depth disposal for long living/low activity wastes, French nuclear safety authority (ASN) opinion about the sites choice, implementation of article 10 of the June 28, 2006 law relative to public information; 2 - progress of the working groups' works on transparency and secrecy, on the development of a communication scale, and on the creation of an Internet portal for the radio-ecological follow-up of nuclear sites; 3 - comments of the ASN's report on the nuclear safety and radiation protection in France in 2008; 4 - procedure of management of the radio-physicists shortage in order to warrant the patients' safety and information; 5 - miscellaneous points: project of European directive on nuclear safety, organisation of a visit day onboard of a ship for nuclear materials transportation, comments about the by-law from May 5, 2009, relative to the exemption to informing consumers about the addition of radionuclides to consumption and construction products. (J.S.)

  18. Risk-informed decision making a keystone in advanced safety assessment

    International Nuclear Information System (INIS)

    Reinhart, M.

    2007-01-01

    Probabilistic Safety Assessment (PSA) has provided extremely valuable complementary insight, perspective, comprehension, and balance to deterministic nuclear reactor safety assessment. This integrated approach of risk-informed management and decision making has been called Risk-Informed Decision Making (RIDM). RIDM provides enhanced safety, reliability, operational flexibility, reduced radiological exposure, and improved fiscal economy. Applications of RIDM continuously increase. Current applications are in the areas of design, construction, licensing, operations, and security. Operational phase safety applications include the following: technical specifications improvement, risk-monitors and configuration control, maintenance planning, outage planning and management, in-service inspection, inservice testing, graded quality assurance, reactor oversight and inspection, inspection finding significance determination, operational events assessment, and rulemaking. Interestingly there is a significant spectrum of approaches, methods, programs, controls, data bases, and standards. The quest of many is to assimilate the full compliment of PSA and RIDM information and to achieve a balanced international harmony. The goal is to focus the best of the best, so to speak, for the benefit of all. Accordingly, this presentation will address the principles, benefits, and applications of RIDM. It will also address some of the challenges and areas to improve. Finally it will highlight efforts by the IAEA and others to capture the international thinking, experience, successes, challenges, and lessons in RIDM. (authors)

  19. 10 CFR 52.157 - Contents of applications; technical information in final safety analysis report.

    Science.gov (United States)

    2010-01-01

    ...; technical information in final safety analysis report. The application must contain a final safety analysis... 10 Energy 2 2010-01-01 2010-01-01 false Contents of applications; technical information in final safety analysis report. 52.157 Section 52.157 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES...

  20. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Science.gov (United States)

    2010-01-01

    ...; technical information in final safety analysis report. (a) The application must contain a final safety... 10 Energy 2 2010-01-01 2010-01-01 false Contents of applications; technical information in final safety analysis report. 52.79 Section 52.79 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES...

  1. The NUSS safety guides in design and the use of computers

    International Nuclear Information System (INIS)

    Fischer, J.

    1986-01-01

    After a brief summary of the NUSS programme, the two design guides are discussed which deal with instrumentation and control circuitry. The potential use of computers is covered differently in these guides because of the historical development and more importantly because of the difference in importance to safety of the I and C systems which are dealt with in these papers. The Agency would consider modifications to the existing guides only when sufficient consensus about the use of computers would warrant a revision of the documents. (author)

  2. Risk-informed approaches to assess ecological safety of facilities with radioactive waste

    International Nuclear Information System (INIS)

    Vashchenko, V.N.; Zlochevskij, V.V.; Skalozubov, V.I.

    2011-01-01

    Ingenious risk-informed methods to assess ecological safety of facilities with radioactive waste are proposed in the paper. Probabilistic norms on lethal outcomes and reliability of safety barriers are used as safety criteria. Based on the probability measures, it is established that ecological safety conditions are met for the standard criterion of lethal outcomes

  3. Computer-assisted navigational surgery enhances safety in dental implantology.

    Science.gov (United States)

    Ng, F C; Ho, K H; Wexler, A

    2005-06-01

    Dental implants are increasingly used to restore missing dentition. These titanium implants are surgically installed in the edentulous alveolar ridge and allowed to osteointegrate with the bone during the healing phase. After osseo-integration, the implant is loaded with a prosthesis to replace the missing tooth. Conventional implant treatment planning uses study models, wax-ups and panoramic x-rays to prefabricate surgical stent to guide the preparation of the implant site. The drilling into the alveolar ridge is invariably a "blind" procedure as the part of the drill in bone is not visible. Stereotactic systems were first introduced into neurosurgery in 1986. Since then, computer-assisted navigational technology has brought major advances to neuro-, midface and orthopaedic surgeries, and more recently, to implant placement. This paper illustrates the use of real-time computer-guided navigational technology in enhancing safety in implant surgical procedures. Real-time computer-guided navigational technology enhances accuracy and precision of the surgical procedure, minimises complications and facilitates surgery in challenging anatomical locations.

  4. Factors shaping effective utilization of health information technology in urban safety-net clinics.

    Science.gov (United States)

    George, Sheba; Garth, Belinda; Fish, Allison; Baker, Richard

    2013-09-01

    Urban safety-net clinics are considered prime targets for the adoption of health information technology innovations; however, little is known about their utilization in such safety-net settings. Current scholarship provides limited guidance on the implementation of health information technology into safety-net settings as it typically assumes that adopting institutions have sufficient basic resources. This study addresses this gap by exploring the unique challenges urban resource-poor safety-net clinics must consider when adopting and utilizing health information technology. In-depth interviews (N = 15) were used with key stakeholders (clinic chief executive officers, medical directors, nursing directors, chief financial officers, and information technology directors) from staff at four clinics to explore (a) nonhealth information technology-related clinic needs, (b) how health information technology may provide solutions, and (c) perceptions of and experiences with health information technology. Participants identified several challenges, some of which appear amenable to health information technology solutions. Also identified were requirements for effective utilization of health information technology including physical infrastructural improvements, funding for equipment/training, creation of user groups to share health information technology knowledge/experiences, and specially tailored electronic billing guidelines. We found that despite the potential benefit that can be derived from health information technologies, the unplanned and uninformed introduction of these tools into these settings might actually create more problems than are solved. From these data, we were able to identify a set of factors that should be considered when integrating health information technology into the existing workflows of low-resourced urban safety-net clinics in order to maximize their utilization and enhance the quality of health care in such settings.

  5. Human-computer interaction and management information systems

    CERN Document Server

    Galletta, Dennis F

    2014-01-01

    ""Human-Computer Interaction and Management Information Systems: Applications"" offers state-of-the-art research by a distinguished set of authors who span the MIS and HCI fields. The original chapters provide authoritative commentaries and in-depth descriptions of research programs that will guide 21st century scholars, graduate students, and industry professionals. Human-Computer Interaction (or Human Factors) in MIS is concerned with the ways humans interact with information, technologies, and tasks, especially in business, managerial, organizational, and cultural contexts. It is distinctiv

  6. Development of a computational database for application in Probabilistic Safety Analysis of nuclear research reactors

    International Nuclear Information System (INIS)

    Macedo, Vagner dos Santos

    2016-01-01

    The objective of this work is to present the computational database that was developed to store technical information and process data on component operation, failure and maintenance for the nuclear research reactors located at the Nuclear and Energy Research Institute (Instituto de Pesquisas Energéticas e Nucleares, IPEN), in São Paulo, Brazil. Data extracted from this database may be applied in the Probabilistic Safety Analysis of these research reactors or in less complex quantitative assessments related to safety, reliability, availability and maintainability of these facilities. This database may be accessed by users of the corporate network, named IPEN intranet. Professionals who require the access to the database must be duly registered by the system administrator, so that they will be able to consult and handle the information. The logical model adopted to represent the database structure is an entity-relationship model, which is in accordance with the protocols installed in IPEN intranet. The open-source relational database management system called MySQL, which is based on the Structured Query Language (SQL), was used in the development of this work. The PHP programming language was adopted to allow users to handle the database. Finally, the main result of this work was the creation a web application for the component reliability database named PSADB, specifically developed for the research reactors of IPEN; furthermore, the database management system provides relevant information efficiently. (author)

  7. Information Management of Health and Safety at the Tarkwa Mine of ...

    African Journals Online (AJOL)

    Michael

    2016-06-01

    Jun 1, 2016 ... Information Management of Health and Safety at the Tarkwa ... heap leach technology. ... the quality of information was assessed using the content of information ..... managing library users' expectations; and reference service.

  8. Computer and information security handbook

    CERN Document Server

    Vacca, John R

    2012-01-01

    The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed

  9. Federal High End Computing (HEC) Information Portal

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — This portal provides information about opportunities to engage in U.S. Federal government high performance computing activities, including supercomputer use,...

  10. 77 FR 50723 - Verification, Validation, Reviews, and Audits for Digital Computer Software Used in Safety...

    Science.gov (United States)

    2012-08-22

    ... regulations with respect to software verification and auditing of digital computer software used in the safety... Standards and Records,'' which requires, in part, that a quality assurance program be established and implemented to provide adequate assurance that systems and components important to safety will satisfactorily...

  11. Methods of Certification tests PLC-Networks in Compliance Safety Information

    Directory of Open Access Journals (Sweden)

    A. A. Balaev

    2011-12-01

    Full Text Available The aim of this research was description of the methodology of the audit plc-network to meet the requirements of information security. The technique is based on the provisions of the guidance documents and model FSTEC Russia test object methods of information on safety information.

  12. International Conference on Computer Science and Information Technologies

    CERN Document Server

    2017-01-01

    The book reports on new theories and applications in the field of intelligent systems and computing. It covers computational and artificial intelligence methods, as well as advances in computer vision, current issue in big data and cloud computing, computation linguistics, cyber-physical systems as well as topics in intelligent information management. Written by active researchers, the different chapters are based on contributions presented at the workshop in intelligent systems and computing (ISC), held during CSIT 2016, September 6-9, and jointly organized by the Lviv Polytechnic National University, Ukraine, the Kharkiv National University of RadioElectronics, Ukraine, and the Technical University of Lodz, Poland, under patronage of Ministry of Education and Science of Ukraine. All in all, the book provides academics and professionals with extensive information and a timely snapshot of the field of intelligent systems, and it is expected to foster new discussions and collaborations among different groups. ...

  13. Improved Safety Margin Characterization of Risk from Loss of Offsite Power

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Paul [Texas A & M Univ., College Station, TX (United States)

    2017-11-07

    Original intent: The original intent of this task was “support of the Risk-Informed Safety Margin Characteristic (RISMC) methodology in order” “to address … efficiency of computation so that more accurate and cost-effective techniques can be used to address safety margin characterizations” (S. M. Hess et al., “Risk-Informed Safety Margin Characterization,” Procs. ICONE17, Brussels, July 2009, CD format). It was intended that “in Task 1 itself this improvement will be directed toward upon the very important issue of Loss of Offsite Power (LOOP) events,” more specifically toward the challenge of efficient computation of the multidimensional nonrecovery integral that has been discussed by many previous contributors to the theory of nuclear safety. It was further envisioned that “three different computational approaches will be explored,” corresponding to the three subtasks listed below; deliverables were tied to the individual subtasks.

  14. Super analog computer for evaluating the safety of buried radioactive waste

    International Nuclear Information System (INIS)

    Cohen, B.L.

    1980-01-01

    It is argued that the past use of digital computer programs for evaluating the safety of buried radioactive waste has been largely wasteful and dangerously delusive. It is suggested to use actual rocks as the analog of buried waste. The problem of comparable rates of leaching of radioactive waste and of natural rock is discussed. Two examples are given of the use of natural rock as an ''analog computer'': one for high-level radioactive waste, and one for low-level radioactive waste. Digital computers have not contributed anything to two crucial questions: Can shafts be securely sealed. Does the heat crack the rock or have important effects on its chemistry. 4 refs

  15. Partial safety factor calibration from stochastic finite element computation of welded joint with random geometries

    International Nuclear Information System (INIS)

    Schoefs, Franck; Chevreuil, Mathilde; Pasqualini, Olivier; Cazuguel, Mikaël

    2016-01-01

    Welded joints are used in various structures and infrastructures like bridges, ships and offshore structures, and are submitted to cyclic stresses. Their fatigue behaviour is an industrial key issue to deal with and still offers original research subjects. One of the available methods relies on the computing of the stress concentration factor. Even if some studies were previously driven to evaluate this factor onto some cases of welded structures, the shape of the weld joint is generally idealized through a deterministic parametric geometry. Previous experimental works however have shown that this shape plays a key role in the lifetime assessment. We propose in this paper a methodology for computing the stress concentration factor in presence of random geometries of welded joints. In view to make the results available by engineers, this method merges stochastic computation and semi-probabilistic analysis by computing partial safety factors with a dedicated method. - Highlights: • Numerical computation of stress concentration factor with random geometry of weld. • Real data are used for probabilistic modelling. • Identification of partial safety factor from SFEM computation in case of random geometries.

  16. Conceptual design of an integrated information system for safety related analysis of nuclear power plants (IRIS Phase 1)

    International Nuclear Information System (INIS)

    Hofer, K.; Zehnder, P.; Galperin, A.

    1994-01-01

    This report deals with a conceptual design of an integrated information management system, called PSI-IRIS, as needed to assist the analysts for reactor safety related investigations on Swiss nuclear power plants within the project STARS. Performing complicated engineering analyses of an NPP requires storage and manipulation of a large amount of information, both data and knowledge. This information is characterized by its multi-disciplinary nature, complexity, and diversity. The problems caused by inefficient and lengthy manual operations involving the data flow management within the framework of the safety related analysis of an NPP, can be solved by applying computer aided engineering (CAE) principles. These principles are the basis for the design of the integrated information management system PSI-IRIS presented in this report. The basic idea is to create a computerized environment, which includes both database and functional capabilities. The database of the PSI-IRIS consists of two parts, an NPP generic database (GDB) and a collection of analysis results (CASE L IB). The GDB includes all technical plant data and information needed to generate input decks for all computer codes utilized within the STARS project. The CASE L IB storage contains the accumulated knowledge, input decks, and result files of the NPP transient analyses. Considerations and analysis of the data types and the required data manipulation capabilities as well as operational requirements resulted in the choice of an object-oriented database management system (OODBMS) as a development platform for solving the software engineering problems. Several advantages of OODBMS's over conventional relational database management systems were found of crucial importance, especially providing the necessary flexibility for different data types and the potential for extensibility. (author) 15 figs., tabs., 20 refs

  17. Analysis of Computer Network Information Based on "Big Data"

    Science.gov (United States)

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  18. Operating and maintenance experience with computer-based systems in nuclear power plants - A report by the PWG-1 Task Group on Computer-based Systems Important to Safety

    International Nuclear Information System (INIS)

    1998-01-01

    changes for the new installation or the upgrade. Procedures, training, and other practices, as well, may be affected by the failure analysis because administration controls, periodic calibration and surveillance procedures may all be used to provide defence against potential failures. An important input to the failure analysis activities comes from the feedback of operating and maintenance experience. Feedback of operating experience in nuclear power plants has long been recognised as a valuable source for improving system design, procedures or human performance to achieve safety and to prevent recurrence of failures. This is particularly true in the case of complex systems such as computer-based systems. The process of feedback would provide designers with information on systems failures, unforeseen scenarios, or unanalysed configurations. The review of operating experience and the identification of causes of failures is also essential for the regulators in performing their safety assessments. Currently, the NRC reviews the electromagnetic compatibility (EMC), software reliability, and the human-machine interface when it performs a safety evaluation of digital upgrades to ensure that the digital system failures resulting from the identified causes are within the acceptable level of a system's reliability. Operating experience with computer-based system is one of the topics raised in the SESAR report. The CSNI Bureau of the OECD has requested NEA Principal Working Group No. 1 (PWG1) to review this topic. A task group led by Canada was therefore formed within PWG1, including France, Japan, U.K., and U.S.A. to address the related issues. The purpose of this report is to summarise the observations and some findings related to the operating and maintenance experience, based on contributions from France, U.S.A., U.K., Japan, and Canada. Additional information from the review of the open literature is also included. A number of the operational incidents, selected as case

  19. Information collection and processing of dam distortion in digital reservoir system

    Science.gov (United States)

    Liang, Yong; Zhang, Chengming; Li, Yanling; Wu, Qiulan; Ge, Pingju

    2007-06-01

    The "digital reservoir" is usually understood as describing the whole reservoir with digital information technology to make it serve the human existence and development furthest. Strictly speaking, the "digital reservoir" is referred to describing vast information of the reservoir in different dimension and space-time by RS, GPS, GIS, telemetry, remote-control and virtual reality technology based on computer, multi-media, large-scale memory and wide-band networks technology for the human existence, development and daily work, life and entertainment. The core of "digital reservoir" is to realize the intelligence and visibility of vast information of the reservoir through computers and networks. The dam is main building of reservoir, whose safety concerns reservoir and people's safety. Safety monitoring is important way guaranteeing the dam's safety, which controls the dam's running through collecting the dam's information concerned and developing trend. Safety monitoring of the dam is the process from collection and processing of initial safety information to forming safety concept in the brain. The paper mainly researches information collection and processing of the dam by digital means.

  20. A DDC Bibliography on Computers in Information Sciences. Volume II. Information Sciences Series.

    Science.gov (United States)

    Defense Documentation Center, Alexandria, VA.

    The unclassified and unlimited bibliography compiles references dealing specifically with the role of computers in information sciences. The volume contains 239 annotated references grouped under three major headings: Artificial and Programming Languages, Computer Processing of Analog Data, and Computer Processing of Digital Data. The references…

  1. Measuring and improving patient safety through health information technology: The Health IT Safety Framework.

    Science.gov (United States)

    Singh, Hardeep; Sittig, Dean F

    2016-04-01

    Health information technology (health IT) has potential to improve patient safety but its implementation and use has led to unintended consequences and new safety concerns. A key challenge to improving safety in health IT-enabled healthcare systems is to develop valid, feasible strategies to measure safety concerns at the intersection of health IT and patient safety. In response to the fundamental conceptual and methodological gaps related to both defining and measuring health IT-related patient safety, we propose a new framework, the Health IT Safety (HITS) measurement framework, to provide a conceptual foundation for health IT-related patient safety measurement, monitoring, and improvement. The HITS framework follows both Continuous Quality Improvement (CQI) and sociotechnical approaches and calls for new measures and measurement activities to address safety concerns in three related domains: 1) concerns that are unique and specific to technology (e.g., to address unsafe health IT related to unavailable or malfunctioning hardware or software); 2) concerns created by the failure to use health IT appropriately or by misuse of health IT (e.g. to reduce nuisance alerts in the electronic health record (EHR)), and 3) the use of health IT to monitor risks, health care processes and outcomes and identify potential safety concerns before they can harm patients (e.g. use EHR-based algorithms to identify patients at risk for medication errors or care delays). The framework proposes to integrate both retrospective and prospective measurement of HIT safety with an organization's existing clinical risk management and safety programs. It aims to facilitate organizational learning, comprehensive 360 degree assessment of HIT safety that includes vendor involvement, refinement of measurement tools and strategies, and shared responsibility to identify problems and implement solutions. A long term framework goal is to enable rigorous measurement that helps achieve the safety

  2. 29 CFR 1960.12 - Dissemination of occupational safety and health program information.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Dissemination of occupational safety and health program... OCCUPATIONAL SAFETY AND HEALTH PROGRAMS AND RELATED MATTERS Administration § 1960.12 Dissemination of occupational safety and health program information. (a) Copies of the Act, Executive Order 12196, program...

  3. Thirteenth water reactor safety research information meeting: proceedings Volume 1

    International Nuclear Information System (INIS)

    Weiss, A.J.

    1986-02-01

    This six-volume report contains 151 papers out of the 178 that were presented at the Thirteenth Water Reactor Safety Research Information Meeting held at the National Bureau of Standards, Gaithersburg, Maryland, during the week of October 22-25, 1985. The papers are printed in the order of their presentation in each session and describe progress and results of programs in nuclear safety research conducted in this country and abroad. Foreign participation in the meeting included thirty-one different papers presented by researchers from Japan, Canada and eight European countries. The title of the papers and the names of the authors have been updated and may differ from those that appeared in the final program of the meeting. This volume presents information on: risk analysis PRA application; severe accident sequence analysis; risk analysis/dependent failure analysis; and industry safety research

  4. Three computer codes for safety and stability of large superconducting magnets

    International Nuclear Information System (INIS)

    Turner, L.R.

    1985-01-01

    For analyzing the safety and stability of large superconducting magnets, three computer codes TASS, SHORTURN, and SSICC have been developed, applicable to bath-cooled magnets, bath-cooled magnets with shorted turns, and magnets with internally cooled conductors respectively. The TASS code is described, and the use of the three codes is reviewed

  5. SCALE criticality safety verification and validation package

    International Nuclear Information System (INIS)

    Bowman, S.M.; Emmett, M.B.; Jordan, W.C.

    1998-01-01

    Verification and validation (V and V) are essential elements of software quality assurance (QA) for computer codes that are used for performing scientific calculations. V and V provides a means to ensure the reliability and accuracy of such software. As part of the SCALE QA and V and V plans, a general V and V package for the SCALE criticality safety codes has been assembled, tested and documented. The SCALE criticality safety V and V package is being made available to SCALE users through the Radiation Safety Information Computational Center (RSICC) to assist them in performing adequate V and V for their SCALE applications

  6. Patterns of patient safety culture: a complexity and arts-informed project of knowledge translation.

    Science.gov (United States)

    Mitchell, Gail J; Tregunno, Deborah; Gray, Julia; Ginsberg, Liane

    2011-01-01

    The purpose of this paper is to describe patterns of patient safety culture that emerged from an innovative collaboration among health services researchers and fine arts colleagues. The group engaged in an arts-informed knowledge translation project to produce a dramatic expression of patient safety culture research for inclusion in a symposium. Scholars have called for a deeper understanding of the complex interrelationships among structure, process and outcomes relating to patient safety. Four patterns of patient safety culture--blinding familiarity, unyielding determination, illusion of control and dismissive urgency--are described with respect to how they informed creation of an arts-informed project for knowledge translation.

  7. Health Information Technology in Healthcare Quality and Patient Safety: Literature Review.

    Science.gov (United States)

    Feldman, Sue S; Buchalter, Scott; Hayes, Leslie W

    2018-06-04

    The area of healthcare quality and patient safety is starting to use health information technology to prevent reportable events, identify them before they become issues, and act on events that are thought to be unavoidable. As healthcare organizations begin to explore the use of health information technology in this realm, it is often unclear where fiscal and human efforts should be focused. The purpose of this study was to provide a foundation for understanding where to focus health information technology fiscal and human resources as well as expectations for the use of health information technology in healthcare quality and patient safety. A literature review was conducted to identify peer-reviewed publications reporting on the actual use of health information technology in healthcare quality and patient safety. Inductive thematic analysis with open coding was used to categorize a total of 41 studies. Three pre-set categories were used: prevention, identification, and action. Three additional categories were formed through coding: challenges, outcomes, and location. This study identifies five main categories across seven study settings. A majority of the studies used health IT for identification and prevention of healthcare quality and patient safety issues. In this realm, alerts, clinical decision support, and customized health IT solutions were most often implemented. Implementation, interface design, and culture were most often noted as challenges. This study provides valuable information as organizations determine where they stand to get the most "bang for their buck" relative to health IT for quality and patient safety. Knowing what implementations are being effectivity used by other organizations helps with fiscal and human resource planning as well as managing expectations relative to cost, scope, and outcomes. The findings from this scan of the literature suggest that having organizational champion leaders that can shepherd implementation, impact culture

  8. Improved Safety Margin Characterization of Risk from Loss of Offsite Power

    International Nuclear Information System (INIS)

    Nelson, Paul

    2017-01-01

    Original intent: The original intent of this task was ''support of the Risk-Informed Safety Margin Characteristic (RISMC) methodology in order'' ''to address ... efficiency of computation so that more accurate and cost-effective techniques can be used to address safety margin characterizations'' (S. M. Hess et al., ''Risk-Informed Safety Margin Characterization,'' Procs. ICONE17, Brussels, July 2009, CD format). It was intended that ''in Task 1 itself this improvement will be directed toward upon the very important issue of Loss of Offsite Power (LOOP) events,'' more specifically toward the challenge of efficient computation of the multidimensional nonrecovery integral that has been discussed by many previous contributors to the theory of nuclear safety. It was further envisioned that ''three different computational approaches will be explored,'' corresponding to the three subtasks listed below; deliverables were tied to the individual subtasks.

  9. Information security as part of the nuclear safety culture

    Energy Technology Data Exchange (ETDEWEB)

    Sitnica, A., E-mail: demetrkj@westinghouse.com [Westinghouse Electric Co., 1000 Westinghouse Drive, Cranberry Township, PA 16066 (United States)

    2016-09-15

    No industry, organization, individual or even the government is immune to the information security risks which are associated with nuclear power. It can no longer be ignored, delayed or treated as unimportant. Nuclear safety is paramount to our industry, and cyber security must be woven into the fabric of our safety culture in order to succeed. Achieving this in an environment which has remained relatively unchanged and conservative prior to digitalisation demands a shift in behavior and culture. (Author)

  10. Information security as part of the nuclear safety culture

    International Nuclear Information System (INIS)

    Sitnica, A.

    2016-09-01

    No industry, organization, individual or even the government is immune to the information security risks which are associated with nuclear power. It can no longer be ignored, delayed or treated as unimportant. Nuclear safety is paramount to our industry, and cyber security must be woven into the fabric of our safety culture in order to succeed. Achieving this in an environment which has remained relatively unchanged and conservative prior to digitalisation demands a shift in behavior and culture. (Author)

  11. Storing and managing information artifacts collected by information analysts using a computing device

    Science.gov (United States)

    Pike, William A; Riensche, Roderick M; Best, Daniel M; Roberts, Ian E; Whyatt, Marie V; Hart, Michelle L; Carr, Norman J; Thomas, James J

    2012-09-18

    Systems and computer-implemented processes for storage and management of information artifacts collected by information analysts using a computing device. The processes and systems can capture a sequence of interactive operation elements that are performed by the information analyst, who is collecting an information artifact from at least one of the plurality of software applications. The information artifact can then be stored together with the interactive operation elements as a snippet on a memory device, which is operably connected to the processor. The snippet comprises a view from an analysis application, data contained in the view, and the sequence of interactive operation elements stored as a provenance representation comprising operation element class, timestamp, and data object attributes for each interactive operation element in the sequence.

  12. Establishing management information system to solve the information management problem of nuclear safety related personnel's qualification management

    International Nuclear Information System (INIS)

    Sun Haipeng; Liu Zhijun; Li Tianshu

    2013-01-01

    With the rapid progress of nuclear energy and nuclear technology utilization, nuclear safety related personnel play an increasingly important role in ensuring nuclear safety. NNSA personnel qualification management information system conducts a multi-faceted, effective, real-time monitoring and information collection for nuclear safety staff practice unit management, knowledge management, license application, appraisal management or supervision, training management or supervision and certified staff management, and also is a milestone for NNSA to build the state department with 'five-feature' (learning-oriented, service-oriented, economical, innovative, clean-type). (authors)

  13. New technique for determining unavailability of computer controlled safety systems

    International Nuclear Information System (INIS)

    Fryer, M.O.; Bruske, S.Z.

    1984-04-01

    The availability of a safety system for a fusion reactor is determined. A fusion reactor processes tritium and requires an Emergency Tritium Cleanup (ETC) system for accidental tritium releases. The ETC is computer controlled and because of its complexity, is an excellent candidate for this analysis. The ETC system unavailability, for preliminary untested software, is calculated based on different assumptions about operator response. These assumptions are: (a) the operator shuts down the system after the first indication of plant failure; (b) the operator shuts down the system after following optimized failure verification procedures; or (c) the operator is taken out of the decision process, and the computer uses the optimized failure verification procedures

  14. Concepts and techniques: Active electronics and computers in safety-critical accelerator operation

    International Nuclear Information System (INIS)

    Frankel, R.S.

    1995-01-01

    The Relativistic Heavy Ion Collider (RHIC) under construction at Brookhaven National Laboratory, requires an extensive Access Control System to protect personnel from Radiation, Oxygen Deficiency and Electrical hazards. In addition, the complicated nature of operation of the Collider as part of a complex of other Accelerators necessitates the use of active electronic measurement circuitry to ensure compliance with established Operational Safety Limits. Solutions were devised which permit the use of modern computer and interconnections technology for Safety-Critical applications, while preserving and enhancing, tried and proven protection methods. In addition a set of Guidelines, regarding required performance for Accelerator Safety Systems and a Handbook of design criteria and rules were developed to assist future system designers and to provide a framework for internal review and regulation

  15. Concepts and techniques: Active electronics and computers in safety-critical accelerator operation

    Energy Technology Data Exchange (ETDEWEB)

    Frankel, R.S.

    1995-12-31

    The Relativistic Heavy Ion Collider (RHIC) under construction at Brookhaven National Laboratory, requires an extensive Access Control System to protect personnel from Radiation, Oxygen Deficiency and Electrical hazards. In addition, the complicated nature of operation of the Collider as part of a complex of other Accelerators necessitates the use of active electronic measurement circuitry to ensure compliance with established Operational Safety Limits. Solutions were devised which permit the use of modern computer and interconnections technology for Safety-Critical applications, while preserving and enhancing, tried and proven protection methods. In addition a set of Guidelines, regarding required performance for Accelerator Safety Systems and a Handbook of design criteria and rules were developed to assist future system designers and to provide a framework for internal review and regulation.

  16. Advances in Computing and Information Technology : Proceedings of the Second International

    CERN Document Server

    Nagamalai, Dhinaharan; Chaki, Nabendu

    2012-01-01

    The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, ...

  17. Environmental tests of a digital safety channel: An investigation of stress-related vulnerabilities of computer-based safety system

    International Nuclear Information System (INIS)

    Korsah, K.; Wilson, T.L.; Wood, R.; Tanaka, T.

    1997-01-01

    This article presents the results of environmental stress tests performed on an experimental digital safety channel (EDSC) assembled at the Oak Ridge National Laboratory as part of the Qualification of Advanced Instrumentation and Controls Systems Research program, which was sponsored by the US Nuclear Regulatory Commission. The program is expected to provide recommendations for environmental qualification of digital safety systems. The purpose of the study was to investigate potential vulnerabilities of distributed computer systems used in safety applications when subjected to environmental stressors. The EDSC assembled for the tests employs technologies and digital subsystems representative of those proposed for use in advanced light-water reactors or as retrofits in existing plants. Subsystems include computers, electrical and optical serial communication links, fiber-optic network links, analog-to-digital and digital-to-analog converters, and multiplexers. The EDSC was subjected to selected stressors that are a potential risk to digital equipment in a mild environment. The selected stressors were electromagnetic and radiofrequency interferences (EMI-RFI), temperature, humidity, and smoke exposure. The stressors were applied at levels of intensity considerably higher than the safety channel is likely to experience in a normal nuclear power plant environment. Ranges of stress were selected at a sufficiently high level to induce errors so that failure modes that are characteristic of the technologies employed could be identified. On the basis of the incidence of functional errors observed during testing, EMI-RFI, smoke exposure, and high temperature coupled with high relative humidity, in that order, were found to have the greatest impact of the stressors investigated. The most prevalent stressor-induced upsets, as well as the most severe, were found to occur during the EMI-RFI tests

  18. (CICT) Computing, Information, and Communications Technology Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The goal of the Computing, Information, and Communications Technology (CICT) program is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communications technologies. This viewgraph presentation includes diagrams of how the political guidance behind CICT is structured. The presentation profiles each part of the NASA Mission in detail, and relates the Mission to the activities of CICT. CICT's Integrated Capability Goal is illustrated, and hypothetical missions which could be enabled by CICT are profiled. CICT technology development is profiled.

  19. Information-theoretic temporal Bell inequality and quantum computation

    International Nuclear Information System (INIS)

    Morikoshi, Fumiaki

    2006-01-01

    An information-theoretic temporal Bell inequality is formulated to contrast classical and quantum computations. Any classical algorithm satisfies the inequality, while quantum ones can violate it. Therefore, the violation of the inequality is an immediate consequence of the quantumness in the computation. Furthermore, this approach suggests a notion of temporal nonlocality in quantum computation

  20. High committee for nuclear safety transparency and information. March 17, 2009 meeting

    International Nuclear Information System (INIS)

    2009-03-01

    The high committee for the nuclear safety transparency and information (HCTISN) is an information, consultation and debate authority devoted to the assessment of the risks linked with nuclear activities and to the analysis of their impact on public health, on the environment and on nuclear safety. Each year, the HCTISN organizes several ordinary meetings in order to analyze some specific topics of the moment. This meeting was organized around 9 main topics: 1 - presentation by the French nuclear safety authority (ASN) of a dismantling strategy for nuclear facilities, in particular taking into account a final state for the site and the information of populations; 2 - status of the next campaign of iodine tablets distribution; 3 - the management of ancient uranium mines and in particular the long-term environmental and health impact of mine tailings; 4 - the implementation of the high committee's recommendations; 5 - work progress of the working group on information transparency; 6 - Areva's invitation of the working group on information transparency to assist to the organisation of a Mox fuel convoy between Cherbourg and Japan; 7 - progress of the working group on the elaboration of a 'communication scale' comparable to the INES scale; 8 - presentation of the meetings organized by the ANCLI (French national association of local information commissions) about the implementation of the Aarhus convention; 9 - presentation by the IRSN (Institute of radiation protection and nuclear safety) of its communication approach towards the public. (J.S.)

  1. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  2. Food Safety and Nutrition Information for Kids and Teens

    Science.gov (United States)

    ... Vaccines, Blood & Biologics Animal & Veterinary Cosmetics Tobacco Products Food Home Food Resources for You Consumers Kids & Teens ... More sharing options Linkedin Pin it Email Print Food Safety & Nutrition Information for Kids and Teens Fun & ...

  3. Mechanisms of protection of information in computer networks and systems

    Directory of Open Access Journals (Sweden)

    Sergey Petrovich Evseev

    2011-10-01

    Full Text Available Protocols of information protection in computer networks and systems are investigated. The basic types of threats of infringement of the protection arising from the use of computer networks are classified. The basic mechanisms, services and variants of realization of cryptosystems for maintaining authentication, integrity and confidentiality of transmitted information are examined. Their advantages and drawbacks are described. Perspective directions of development of cryptographic transformations for the maintenance of information protection in computer networks and systems are defined and analyzed.

  4. Twenty-First Water Reaction Safety Information Meeting

    International Nuclear Information System (INIS)

    Monteleone, S.

    1994-04-01

    This three-volume report contains 90 papers out of the 102 that were presented at the Twenty-First Water Reactor Safety Information Meeting held at the Bethesda Marriott Hotel, Bethesda, Maryland, during the week of October 25--27, 1993. The papers are printed in the order of their presentation in each session and describe progress and results of programs in nuclear safety research conducted in this country and abroad. Foreign participation in the meeting included papers presented by researchers from France, Germany, Japan, Russia, Switzerland, Taiwan, and United Kingdom. The titles of the papers and the names of the authors have been updated and may differ from those that appeared in the final program of the meeting. Individual papers have been cataloged separately. This document, Volume 2, presents papers on severe accident research

  5. Twenty-First Water Reactor Safety Information Meeting

    International Nuclear Information System (INIS)

    Monteleone, S.

    1994-04-01

    This three-volume report contains 90 papers out of the 102 that were presented at the Twenty-First Water Reactor Safety Information Meeting held at the Bethesda Marriott Hotel, Bethesda, Maryland, during the week of October 25-27, 1993. The papers are printed in the order of their presentation in each session and describe progress and results of programs in nuclear safety research conducted in this country and abroad. Foreign participation in the meeting included papers presented by researchers from France, Germany, Japan, Russia, Switzerland, Taiwan, and United Kingdom. The titles of the papers and the names of the authors have been updated and may differ from those that appeared in the final program of the meeting. Selected papers were indexed separately for inclusion in the Energy Science and Technology Database

  6. Standardized System of Nuclear Safety Information for the Promotion of Transparency and Openness

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Gihyung; Kim, Sanghyun; Lee, Gyehwi; Yoon, Yeonhwa; Song, Song Hyerim; Jeong, Jina [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Byun, Jaehyung; Seo, Jonghwan [Dong-A Univ., Busan (Korea, Republic of)

    2013-05-15

    There has been an increasing emphasis on the need for increased disclosure of information through the home page of the Korea Institute of Nuclear Safety (KINS), responsible for nuclear safety regulations, and the Nuclear Safety Information Center (NSIC) to enhance public understanding of nuclear safety. However, due to the dazzled structure of the existing KINS and NSIC home pages, improvements in accessibility and convenience are necessary. At the same time, content standardization is required to increase operational efficiency and provide coherent information. In this study, the Delphi method was used to select the major contents to make available on the home page as well as the main user base definition for the home page layout development. Also, internal and external expert groups were created to conduct AHP (Analytic Hierarchy Process) analysis and develop the comparative analysis items for the U. S. Nuclear Regulatory Commission(NRC)/KINS/NSIC home pages. Afterwards, problems and points of improvements for the home page system, design, and profile were derived using heuristic analysis. The implications arising from the Delphi analysis results were applied to the home page layout. In the nuclear safety information standardized system construction process, the comparative analysis conducted using the AHP and heuristic analyses of the NRC home page resulted in deriving improvements for the Guidance, Organization, and Trustworthy items of the KINS/NSIC home page. Furthermore, through the Delphi analysis, a clear purpose and core values were set for the KINS web site, and the needs of the main user base were identified. By developing the home page layout, user interest and utility were raised to improve the organization method and layout. Through this study, KINS was able to construct a nuclear safety information standardized system and increase transparency and openness by providing feature enhancements in information provision as well as user accessibility and

  7. Standardized System of Nuclear Safety Information for the Promotion of Transparency and Openness

    International Nuclear Information System (INIS)

    Lee, Gihyung; Kim, Sanghyun; Lee, Gyehwi; Yoon, Yeonhwa; Song, Song Hyerim; Jeong, Jina; Byun, Jaehyung; Seo, Jonghwan

    2013-01-01

    There has been an increasing emphasis on the need for increased disclosure of information through the home page of the Korea Institute of Nuclear Safety (KINS), responsible for nuclear safety regulations, and the Nuclear Safety Information Center (NSIC) to enhance public understanding of nuclear safety. However, due to the dazzled structure of the existing KINS and NSIC home pages, improvements in accessibility and convenience are necessary. At the same time, content standardization is required to increase operational efficiency and provide coherent information. In this study, the Delphi method was used to select the major contents to make available on the home page as well as the main user base definition for the home page layout development. Also, internal and external expert groups were created to conduct AHP (Analytic Hierarchy Process) analysis and develop the comparative analysis items for the U. S. Nuclear Regulatory Commission(NRC)/KINS/NSIC home pages. Afterwards, problems and points of improvements for the home page system, design, and profile were derived using heuristic analysis. The implications arising from the Delphi analysis results were applied to the home page layout. In the nuclear safety information standardized system construction process, the comparative analysis conducted using the AHP and heuristic analyses of the NRC home page resulted in deriving improvements for the Guidance, Organization, and Trustworthy items of the KINS/NSIC home page. Furthermore, through the Delphi analysis, a clear purpose and core values were set for the KINS web site, and the needs of the main user base were identified. By developing the home page layout, user interest and utility were raised to improve the organization method and layout. Through this study, KINS was able to construct a nuclear safety information standardized system and increase transparency and openness by providing feature enhancements in information provision as well as user accessibility and

  8. Safety Requirements and Modern Technical Requirements in Human Information Systems in Amman Hotels

    OpenAIRE

    Farouq Ahmad Alazzam; Sattam Rakan Allahawiah; Mohammad Nayef Alsarayreh; Kafa Hmoud Abdallah al Nawaiseh

    2015-01-01

    This study aimed to demonstrate the availability of Safety requirements and modern technical requirements in human information systems in Amman hotels. an the most important results of this study is the availability of security and safety requirements in human information systems In Amman hotels and The adequacy of the information that it provided .and show that all departments are not connected by appropriate and effective communication networks in adequate form . Also sophisticated operatin...

  9. Riding on air: critical safety information for you and your tires

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    This booklet is issued for public distribution by Transport Canada. It provides a few simple tips concerning automobile tire safety which, if followed, is expected to result in increased personal and vehicle safety, improved fuel economy, prolonged tire life, energy savings and reduced environmental pollution. The information provided include tips about tire pressure, tire inspection for damage and wear, rotation of tires for more even wear, replacing worn tires, the advantages of using snow tires in winter and an explanation of the meaning of the information found on the tire sidewall.

  10. A risk-informed perspective on deterministic safety analysis of nuclear power plants

    International Nuclear Information System (INIS)

    Wan, P.T.

    2009-01-01

    In this work, the deterministic safety analysis (DSA) approach to nuclear safety is examined from a risk-informed perspective. One objective of safety analysis of a nuclear power plant is to demonstrate via analysis that the risks to the public from events or accidents that are within the design basis of the power plant are within acceptable levels with a high degree of assurance. This nuclear safety analysis objective can be translated into two requirements on the risk estimates of design basis events or accidents: the nominal risk estimate to the public must be shown to be within acceptable levels, and the uncertainty in the risk estimates must be shown to be small on an absolute or relative basis. The DSA approach combined with the defense-in-depth (DID) principle is a simplified safety analysis approach that attempts to achieve the above safety analysis objective in the face of potentially large uncertainties in the risk estimates of a nuclear power plant by treating the various uncertainty contributors using a stylized conservative binary (yes-no) approach, and applying multiple overlapping physical barriers and defense levels to protect against the release of radioactivity from the reactor. It is shown that by focusing on the consequence aspect of risk, the previous two nuclear safety analysis requirements on risk can be satisfied with the DSA-DID approach to nuclear safety. It is also shown the use of multiple overlapping physical barriers and defense levels in the traditional DSA-DID approach to nuclear safety is risk-informed in the sense that it provides a consistently high level of confidence in the validity of the safety analysis results for various design basis events or accidents with a wide range of frequency of occurrence. It is hoped that by providing a linkage between the consequence analysis approach in DSA with a risk-informed perspective, greater understanding of the limitation and capability of the DSA approach is obtained. (author)

  11. Preliminary safety information document for the standard MHTGR. Volume 4

    Energy Technology Data Exchange (ETDEWEB)

    None

    1986-01-01

    This report contains information concerning: operational radionuclide control; occupational radiation protection, conduct of operations; initial test program; safety analysis; technical specifications; and quality assurance. (JDB)

  12. Evaluating and Predicting Patient Safety for Medical Devices With Integral Information Technology

    Science.gov (United States)

    2005-01-01

    323 Evaluating and Predicting Patient Safety for Medical Devices with Integral Information Technology Jiajie Zhang, Vimla L. Patel, Todd R...errors are due to inappropriate designs for user interactions, rather than mechanical failures. Evaluating and predicting patient safety in medical ...the users on the identified trouble spots in the devices. We developed two methods for evaluating and predicting patient safety in medical devices

  13. 30th International Symposium on Computer and Information Sciences

    CERN Document Server

    Gelenbe, Erol; Gorbil, Gokce; Lent, Ricardo

    2016-01-01

    The 30th Anniversary of the ISCIS (International Symposium on Computer and Information Sciences) series of conferences, started by Professor Erol Gelenbe at Bilkent University, Turkey, in 1986, will be held at Imperial College London on September 22-24, 2015. The preceding two ISCIS conferences were held in Krakow, Poland in 2014, and in Paris, France, in 2013.   The Proceedings of ISCIS 2015 published by Springer brings together rigorously reviewed contributions from leading international experts. It explores new areas of research and technological development in computer science, computer engineering, and information technology, and presents new applications in fast changing fields such as information science, computer science and bioinformatics.   The topics covered include (but are not limited to) advances in networking technologies, software defined networks, distributed systems and the cloud, security in the Internet of Things, sensor systems, and machine learning and large data sets.

  14. "Glitch Logic" and Applications to Computing and Information Security

    Science.gov (United States)

    Stoica, Adrian; Katkoori, Srinivas

    2009-01-01

    This paper introduces a new method of information processing in digital systems, and discusses its potential benefits to computing and information security. The new method exploits glitches caused by delays in logic circuits for carrying and processing information. Glitch processing is hidden to conventional logic analyses and undetectable by traditional reverse engineering techniques. It enables the creation of new logic design methods that allow for an additional controllable "glitch logic" processing layer embedded into a conventional synchronous digital circuits as a hidden/covert information flow channel. The combination of synchronous logic with specific glitch logic design acting as an additional computing channel reduces the number of equivalent logic designs resulting from synthesis, thus implicitly reducing the possibility of modification and/or tampering with the design. The hidden information channel produced by the glitch logic can be used: 1) for covert computing/communication, 2) to prevent reverse engineering, tampering, and alteration of design, and 3) to act as a channel for information infiltration/exfiltration and propagation of viruses/spyware/Trojan horses.

  15. An approach for risk informed safety culture assessment for Canadian nuclear power stations

    International Nuclear Information System (INIS)

    Nelson, W.R.

    2010-01-01

    One of the most important components of effective safety and risk management for nuclear power stations is a healthy safety culture. DNV has developed an approach for risk informed safety culture assessment that combines two complementary paradigms for safety and risk management: loss prevention - for preventing and intervening in accidents; and critical function management - for achieving safety and performance goals. Combining these two paradigms makes it possible to provide more robust systems for safety management and to support a healthy safety culture. This approach is being applied to safety culture assessment in partnership with a Canadian nuclear utility. (author)

  16. Development of a Safety Assessment Information System for the Management of Periodic Safety Assessment Activities

    International Nuclear Information System (INIS)

    Song, Tae Young

    2007-01-01

    At present, the 10-year Periodic Safety Review(PSR) has been performing to confirm all the aspects of safety issues for all the operating plants in compliance with domestic nuclear law of article 23, subarticle 3. For each plant, in addition, Probabilistic Safety Assessment(PSA) and Severe Accident Management Guideline(SAMG) are being implemented and revised periodically to reflect the latest safety level according to principle fulfillment of severe accident policy statement. The assessment reports, as one of outcomes from these activities, are submitted into and reviewed by domestic regulatory body. During reviewing (in-office duty) and licensing (regulatory duty) process, a large number of outcomes of which most are the formal technical reports and licensing materials, are inevitably produced. Moreover, repeated review process over the plants can make them accumulated and produce a variety of documents additionally. This circumstance motivates to develop effective tool or system for the management of these reports and related technical documents for the future use in licensing process and for subsequent plant assessments. This paper presents the development status of Safety Assessment Information System(SAIS) which manages safety-related documents of PSR, PSA and SAMG for practical use for experienced engineers in charge of these areas

  17. Development of a Safety Assessment Information System for the Management of Periodic Safety Assessment Activities

    Energy Technology Data Exchange (ETDEWEB)

    Song, Tae Young [Nuclear Engineering and Technology Institute, Daejeon (Korea, Republic of)

    2007-07-01

    At present, the 10-year Periodic Safety Review(PSR) has been performing to confirm all the aspects of safety issues for all the operating plants in compliance with domestic nuclear law of article 23, subarticle 3. For each plant, in addition, Probabilistic Safety Assessment(PSA) and Severe Accident Management Guideline(SAMG) are being implemented and revised periodically to reflect the latest safety level according to principle fulfillment of severe accident policy statement. The assessment reports, as one of outcomes from these activities, are submitted into and reviewed by domestic regulatory body. During reviewing (in-office duty) and licensing (regulatory duty) process, a large number of outcomes of which most are the formal technical reports and licensing materials, are inevitably produced. Moreover, repeated review process over the plants can make them accumulated and produce a variety of documents additionally. This circumstance motivates to develop effective tool or system for the management of these reports and related technical documents for the future use in licensing process and for subsequent plant assessments. This paper presents the development status of Safety Assessment Information System(SAIS) which manages safety-related documents of PSR, PSA and SAMG for practical use for experienced engineers in charge of these areas.

  18. Mississippi Curriculum Framework for Computer Information Systems Technology. Computer Information Systems Technology (Program CIP: 52.1201--Management Information Systems & Business Data). Computer Programming (Program CIP: 52.1201). Network Support (Program CIP: 52.1290--Computer Network Support Technology). Postsecondary Programs.

    Science.gov (United States)

    Mississippi Research and Curriculum Unit for Vocational and Technical Education, State College.

    This document, which is intended for use by community and junior colleges throughout Mississippi, contains curriculum frameworks for two programs in the state's postsecondary-level computer information systems technology cluster: computer programming and network support. Presented in the introduction are program descriptions and suggested course…

  19. NASA Aviation Safety Program Weather Accident Prevention/weather Information Communications (WINCOMM)

    Science.gov (United States)

    Feinberg, Arthur; Tauss, James; Chomos, Gerald (Technical Monitor)

    2002-01-01

    Weather is a contributing factor in approximately 25-30 percent of general aviation accidents. The lack of timely, accurate and usable weather information to the general aviation pilot in the cockpit to enhance pilot situational awareness and improve pilot judgment remains a major impediment to improving aviation safety. NASA Glenn Research Center commissioned this 120 day weather datalink market survey to assess the technologies, infrastructure, products, and services of commercial avionics systems being marketed to the general aviation community to address these longstanding safety concerns. A market survey of companies providing or proposing to provide graphical weather information to the general aviation cockpit was conducted. Fifteen commercial companies were surveyed. These systems are characterized and evaluated in this report by availability, end-user pricing/cost, system constraints/limits and technical specifications. An analysis of market survey results and an evaluation of product offerings were made. In addition, recommendations to NASA for additional research and technology development investment have been made as a result of this survey to accelerate deployment of cockpit weather information systems for enhancing aviation safety.

  20. Memorandum on the use of information technology to improve medication safety.

    Science.gov (United States)

    Ammenwerth, E; Aly, A-F; Bürkle, T; Christ, P; Dormann, H; Friesdorf, W; Haas, C; Haefeli, W E; Jeske, M; Kaltschmidt, J; Menges, K; Möller, H; Neubert, A; Rascher, W; Reichert, H; Schuler, J; Schreier, G; Schulz, S; Seidling, H M; Stühlinger, W; Criegee-Rieck, M

    2014-01-01

    Information technology in health care has a clear potential to improve the quality and efficiency of health care, especially in the area of medication processes. On the other hand, existing studies show possible adverse effects on patient safety when IT for medication-related processes is developed, introduced or used inappropriately. To summarize definitions and observations on IT usage in pharmacotherapy and to derive recommendations and future research priorities for decision makers and domain experts. This memorandum was developed in a consensus-based iterative process that included workshops and e-mail discussions among 21 experts coordinated by the Drug Information Systems Working Group of the German Society for Medical Informatics, Biometry and Epidemiology (GMDS). The recommendations address, among other things, a stepwise and comprehensive strategy for IT usage in medication processes, the integration of contextual information for alert generation, the involvement of patients, the semantic integration of information resources, usability and adaptability of IT solutions, and the need for their continuous evaluation. Information technology can help to improve medication safety. However, challenges remain regarding access to information, quality of information, and measurable benefits.

  1. Trade associations and labor organizations as intermediaries for disseminating workplace safety and health information.

    Science.gov (United States)

    Okun, Andrea H; Watkins, Janice P; Schulte, Paul A

    2017-09-01

    There has not been a systematic study of the nature and extent to which business and professional trade associations and labor organizations obtain and communicate workplace safety and health information to their members. These organizations can serve as important intermediaries and play a central role in transferring this information to their members. A sample of 2294 business and professional trade associations and labor organizations in eight industrial sectors identified by the National Occupational Research Agenda was surveyed via telephone. A small percent of these organizations (40.9% of labor organizations, 15.6% of business associations, and 9.6% of professional associations) were shown to distribute workplace safety and health information to their members. Large differences were also observed between industrial sectors with construction having the highest total percent of organizations disseminating workplace safety and health information. There appears to be significant potential to utilize trade and labor organizations as intermediaries for transferring workplace safety and health information to their members. Government agencies have a unique opportunity to partner with these organizations and to utilize their existing communication channels to address high risk workplace safety and health concerns. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.

  2. Informatics everywhere : information and computation in society, science, and technology

    NARCIS (Netherlands)

    Verhoeff, T.

    2013-01-01

    Informatics is about information and its processing, also known as computation. Nowadays, children grow up taking smartphones and the internet for granted. Information and computation rule society. Science uses computerized equipment to collect, analyze, and visualize massive amounts of data.

  3. Validation of computer codes used in the safety analysis of Canadian research reactors

    International Nuclear Information System (INIS)

    Bishop, W.E.; Lee, A.G.

    1998-01-01

    AECL has embarked on a validation program for the suite of computer codes that it uses in performing the safety analyses for its research reactors. Current focus is on codes used for the analysis of the two MAPLE reactors under construction at Chalk River but the program will be extended to include additional codes that will be used for the Irradiation Research Facility. The program structure is similar to that used for the validation of codes used in the safety analyses for CANDU power reactors. (author)

  4. Safety recommendation component of mobile information assistant of the tourist

    Science.gov (United States)

    Savchuk, Valeriya V.; Kunanec, Natalia E.; Pasichnyk, Volodymyr V.; Popiel, Piotr; Weryńska-Bieniasz, RóŻa; Kashaganova, Gulzhamal; Kalizhanova, Aliya

    2017-08-01

    The goal of article is to introduce and justify the need for the safety system components of Mobile Information of the tourist (MIAT). One of the objectives of the system is to determine the level of risk in a particular tourist destination on the basis of available information in the knowledge base.

  5. State Traffic Safety Information - 2010-2015 FARS Accident File data

    Data.gov (United States)

    Department of Transportation — The State Traffic Safety Information (STSI) portal is part of the larger Fatality Analysis Reporting System (FARS) Encyclopedia. STSI provides state-by-state traffic...

  6. Reliability analysis and computation of computer-based safety instrumentation and control used in German nuclear power plant. Final report

    International Nuclear Information System (INIS)

    Ding, Yongjian; Krause, Ulrich; Gu, Chunlei

    2014-01-01

    The trend of technological advancement in the field of safety instrumentation and control (I and C) leads to increasingly frequent use of computer-based (digital) control systems which consisting of distributed, connected bus communications computers and their functionalities are freely programmable by qualified software. The advantages of the new I and C system over the old I and C system with hard-wired technology are e.g. in the higher flexibility, cost-effective procurement of spare parts, higher hardware reliability (through higher integration density, intelligent self-monitoring mechanisms, etc.). On the other hand, skeptics see the new technology with the computer-based I and C a higher potential by influences of common cause failures (CCF), and the easier manipulation by sabotage (IT Security). In this joint research project funded by the Federal Ministry for Economical Affaires and Energy (BMWi) (2011-2014, FJZ 1501405) the Otto-von-Guericke-University Magdeburg and Magdeburg-Stendal University of Applied Sciences are therefore trying to develop suitable methods for the demonstration of the reliability of the new instrumentation and control systems with the focus on the investigation of CCF. This expertise of both houses shall be extended to this area and a scientific contribution to the sound reliability judgments of the digital safety I and C in domestic and foreign nuclear power plants. First, the state of science and technology will be worked out through the study of national and international standards in the field of functional safety of electrical and I and C systems and accompanying literature. On the basis of the existing nuclear Standards the deterministic requirements on the structure of the new digital I and C system will be determined. The possible methods of reliability modeling will be analyzed and compared. A suitable method called multi class binomial failure rate (MCFBR) which was successfully used in safety valve applications will be

  7. The Research on Safety Management Information System of Railway Passenger Based on Risk Management Theory

    Science.gov (United States)

    Zhu, Wenmin; Jia, Yuanhua

    2018-01-01

    Based on the risk management theory and the PDCA cycle model, requirements of the railway passenger transport safety production is analyzed, and the establishment of the security risk assessment team is proposed to manage risk by FTA with Delphi from both qualitative and quantitative aspects. The safety production committee is also established to accomplish performance appraisal, which is for further ensuring the correctness of risk management results, optimizing the safety management business processes and improving risk management capabilities. The basic framework and risk information database of risk management information system of railway passenger transport safety are designed by Ajax, Web Services and SQL technologies. The system realizes functions about risk management, performance appraisal and data management, and provides an efficient and convenient information management platform for railway passenger safety manager.

  8. Identification of risk factors of computer information technologies in education

    Directory of Open Access Journals (Sweden)

    Hrebniak M.P.

    2014-03-01

    Full Text Available The basic direction of development of secondary school and vocational training is computer training of schoolchildren and students, including distance forms of education and widespread usage of world information systems. The purpose of the work is to determine risk factors for schoolchildren and students, when using modern information and computer technologies. Results of researches allowed to establish dynamics of formation of skills using computer information technologies in education and characteristics of mental ability among schoolchildren and students during training in high school. Common risk factors, while operating CIT, are: intensification and formalization of intellectual activity, adverse ergonomic parameters, unfavorable working posture, excess of hygiene standards by chemical and physical characteristics. The priority preventive directions in applying computer information technology in education are: improvement of optimal visual parameters of activity, rationalization of ergonomic parameters, minimizing of adverse effects of chemical and physical conditions, rationalization of work and rest activity.

  9. Risk-informed regulation: handling uncertainty for a rational management of safety

    International Nuclear Information System (INIS)

    Zio, Enrico

    2008-01-01

    A risk-informed regulatory approach implies that risk insights be used as supplement of deterministic information for safety decision-making purposes. In this view, the use of risk assessment techniques is expected to lead to improved safety and a more rational allocation of the limited resources available. On the other hand, it is recognized that uncertainties affect both the deterministic safety analyses and the risk assessments. In order for the risk-informed decision making process to be effective, the adequate representation and treatment of such uncertainties is mandatory. In this paper, the risk-informed regulatory framework is considered under the focus of the uncertainty issue. Traditionally, probability theory has provided the language and mathematics for the representation and treatment of uncertainty. More recently, other mathematical structures have been introduced. In particular, the Dempster-Shafer theory of evidence is here illustrated as a generalized framework encompassing probability theory and possibility theory. The special case of probability theory is only addressed as term of comparison, given that it is a well known subject. On the other hand, the special case of possibility theory is amply illustrated. An example of the combination of probability and possibility for treating the uncertainty in the parameters of an event tree is illustrated

  10. Quality and safety implications of emergency department information systems.

    Science.gov (United States)

    Farley, Heather L; Baumlin, Kevin M; Hamedani, Azita G; Cheung, Dickson S; Edwards, Michael R; Fuller, Drew C; Genes, Nicholas; Griffey, Richard T; Kelly, John J; McClay, James C; Nielson, Jeff; Phelan, Michael P; Shapiro, Jason S; Stone-Griffith, Suzanne; Pines, Jesse M

    2013-10-01

    The Health Information Technology for Economic and Clinical Health Act of 2009 and the Centers for Medicare & Medicaid Services "meaningful use" incentive programs, in tandem with the boundless additional requirements for detailed reporting of quality metrics, have galvanized hospital efforts to implement hospital-based electronic health records. As such, emergency department information systems (EDISs) are an important and unique component of most hospitals' electronic health records. System functionality varies greatly and affects physician decisionmaking, clinician workflow, communication, and, ultimately, the overall quality of care and patient safety. This article is a joint effort by members of the Quality Improvement and Patient Safety Section and the Informatics Section of the American College of Emergency Physicians. The aim of this effort is to examine the benefits and potential threats to quality and patient safety that could result from the choice of a particular EDIS, its implementation and optimization, and the hospital's or physician group's approach to continuous improvement of the EDIS. Specifically, we explored the following areas of potential EDIS safety concerns: communication failure, wrong order-wrong patient errors, poor data display, and alert fatigue. Case studies are presented that illustrate the potential harm that could befall patients from an inferior EDIS product or suboptimal execution of such a product in the clinical environment. The authors have developed 7 recommendations to improve patient safety with respect to the deployment of EDISs. These include ensuring that emergency providers actively participate in selection of the EDIS product, in the design of processes related to EDIS implementation and optimization, and in the monitoring of the system's ongoing success or failure. Our recommendations apply to emergency departments using any type of EDIS: custom-developed systems, best-of-breed vendor systems, or enterprise systems

  11. 78 FR 34703 - Pipeline Safety: Information Collection Activities, Revision to Gas Distribution Annual Report

    Science.gov (United States)

    2013-06-10

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2013-0004] Pipeline Safety: Information Collection Activities, Revision to Gas Distribution Annual Report AGENCY: Pipeline and Hazardous Materials Safety Administration, DOT. ACTION: Notice and request...

  12. Splash, pop, sizzle: Information processing with phononic computing

    Directory of Open Access Journals (Sweden)

    Sophia R. Sklan

    2015-05-01

    Full Text Available Phonons, the quanta of mechanical vibration, are important to the transport of heat and sound in solid materials. Recent advances in the fundamental control of phonons (phononics have brought into prominence the potential role of phonons in information processing. In this review, the many directions of realizing phononic computing and information processing are examined. Given the relative similarity of vibrational transport at different length scales, the related fields of acoustic, phononic, and thermal information processing are all included, as are quantum and classical computer implementations. Connections are made between the fundamental questions in phonon transport and phononic control and the device level approach to diodes, transistors, memory, and logic.

  13. A qualitative exploration of the perceptions and information needs of public health inspectors responsible for food safety

    Directory of Open Access Journals (Sweden)

    Sargeant Jan M

    2010-06-01

    Full Text Available Abstract Background In Ontario, local public health inspectors play an important frontline role in protecting the public from foodborne illness. This study was an in-depth exploration of public health inspectors' perceptions of the key food safety issues in public health, and their opinions and needs with regards to food safety information resources. Methods Four focus group discussions were conducted with public health inspectors from the Central West region of Ontario, Canada during June and July, 2008. A questioning route was used to standardize qualitative data collection. Audio recordings of sessions were transcribed verbatim and data-driven content analysis was performed. Results A total of 23 public health inspectors participated in four focus group discussions. Five themes emerged as key food safety issues: time-temperature abuse, inadequate handwashing, cross-contamination, the lack of food safety knowledge by food handlers and food premise operators, and the lack of food safety information and knowledge about specialty foods (i.e., foods from different cultures. In general, participants reported confidence with their current knowledge of food safety issues and foodborne pathogens. Participants highlighted the need for a central source for food safety information, access to up-to-date food safety information, resources in different languages, and additional food safety information on specialty foods. Conclusions The information gathered from these focus groups can provide a basis for the development of resources that will meet the specific needs of public health inspectors involved in protecting and promoting food safety.

  14. Design of the Information Science and Systems (IS Curriculum in a Computer and Information Sciences Department

    Directory of Open Access Journals (Sweden)

    Behrooz Seyed-Abbassi

    2004-12-01

    Full Text Available Continuous technological changes have resulted in a rapid turnover of knowledge in the computing field. The impact of these changes directly affects the computer-related curriculum offered by educational institutions and dictates that curriculum must evolve to keep pace with technology and to provide students with the skills required by businesses. At the same time, accreditations of curricula from reviewing organizations provide additional guidelines and standardization for computing science as well as information science programs. One of the areas significantly affected by these changes is the field of information systems. This paper describes the evaluation and course structure for the undergraduate information science and systems program in the Computer and Information Sciences Department at the University of North Florida. A list of the major required and elective courses as well as an overview of the challenges encountered during the revision of the curriculum is given.

  15. Is Model-Based Development a Favorable Approach for Complex and Safety-Critical Computer Systems on Commercial Aircraft?

    Science.gov (United States)

    Torres-Pomales, Wilfredo

    2014-01-01

    A system is safety-critical if its failure can endanger human life or cause significant damage to property or the environment. State-of-the-art computer systems on commercial aircraft are highly complex, software-intensive, functionally integrated, and network-centric systems of systems. Ensuring that such systems are safe and comply with existing safety regulations is costly and time-consuming as the level of rigor in the development process, especially the validation and verification activities, is determined by considerations of system complexity and safety criticality. A significant degree of care and deep insight into the operational principles of these systems is required to ensure adequate coverage of all design implications relevant to system safety. Model-based development methodologies, methods, tools, and techniques facilitate collaboration and enable the use of common design artifacts among groups dealing with different aspects of the development of a system. This paper examines the application of model-based development to complex and safety-critical aircraft computer systems. Benefits and detriments are identified and an overall assessment of the approach is given.

  16. Soft Computing in Construction Information Technology

    NARCIS (Netherlands)

    Ciftcioglu, O.; Durmisevic, S.; Sariyildiz, S.

    2001-01-01

    The last decade, civil engineering has exercised a rapidly growing interest in the application of neurally inspired computing techniques. The motive for this interest was the promises of certain information processing characteristics, which are similar to some extend, to those of human brain. The

  17. A Computational Model and Multi-Agent Simulation for Information Assurance

    Science.gov (United States)

    2002-06-01

    Podell , Information Security: an Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA, 1994. Brinkley, D. L. and Schell, R...R., “What is There to Worry About? An Introduction to the Computer Security Problem,” ed. Abrams and Jajodia and Podell , Information Security: an

  18. Entrepreneurial Health Informatics for Computer Science and Information Systems Students

    Science.gov (United States)

    Lawler, James; Joseph, Anthony; Narula, Stuti

    2014-01-01

    Corporate entrepreneurship is a critical area of curricula for computer science and information systems students. Few institutions of computer science and information systems have entrepreneurship in the curricula however. This paper presents entrepreneurial health informatics as a course in a concentration of Technology Entrepreneurship at a…

  19. Development of a quality assurance safety assessment database for near surface radioactive waste disposal

    International Nuclear Information System (INIS)

    Park, J. W.; Kim, C. L.; Park, J. B.; Lee, E. Y.; Lee, Y. M.; Kang, C. H.; Zhou, W.; Kozak, M. W.

    2003-01-01

    A quality assurance safety assessment database, called QUARK (QUality Assurance program for Radioactive waste management in Korea), has been developed to manage both analysis information and parameter database for safety assessment of Low- and Intermediate-Level radioactive Waste (LILW) disposal facility in Korea. QUARK is such a tool that serves QA purposes for managing safety assessment information properly and securely. In QUARK, the information is organized and linked to maximize the integrity of information and traceability. QUARK provides guidance to conduct safety assessment analysis, from scenario generation to result analysis, and provides a window to inspect and trace previous safety assessment analysis and parameter values. QUARK also provides default database for safety assessment staff who construct input data files using SAGE(Safety Assessment Groundwater Evaluation), a safety assessment computer code

  20. A Survey of Pilots on the Dissemination of Safety Information

    National Research Council Canada - National Science Library

    Rakovan, Lori

    1999-01-01

    A survey was conducted to obtain information from the pilot population on erections of safety-related training currently being offered, its usefulness, and the process through which it might be better...

  1. 78 FR 47014 - Configuration Management Plans for Digital Computer Software Used in Safety Systems of Nuclear...

    Science.gov (United States)

    2013-08-02

    .... ML12354A524. 3. Revision 1 of RG 1.170, ``Test Documentation for Digital Computer Software used in Safety... is in ADAMS at Accession No. ML12354A531. 4. Revision 1 of RG 1.171, ``Software Unit Testing for... Software Used in Safety Systems of Nuclear Power Plants AGENCY: Nuclear Regulatory Commission. ACTION...

  2. Participatory approach to improving safety, health and working conditions in informal economy workplaces in Cambodia.

    Science.gov (United States)

    Kawakami, Tsuyoshi; Tong, Leng; Kannitha, Yi; Sophorn, Tun

    2011-01-01

    The present study aimed to improve safety and health in informal economy workplaces such as home workplaces, small construction sites, and rural farms in Cambodia by using "participatory" approach. The government, workers' and employers' organizations and NGOs jointly assisted informal economy workers in improving safety and health by using participatory training methodologies. The steps taken were: (1) to collect existing good practices in safety and health in Cambodia; (2) to develop new participatory training programmes for home workers and small construction sites referring to ILO's WISE training programme, and (3) to train government officers, workers, employers and NGOs as safety and health trainers. The participatory training programmes developed consisted of action-checklists associated with illustrations, good example photo sheets, and texts explaining practical, low-cost improvement measures. The established safety and health trainers reached many informal economy workers through their human networks, and trained them by using the developed participatory training programmes. More than 3,000 informal economy workers were trained and they implemented improvements by using low-cost methods. Participatory training methodologies and active cooperation between the government, workers, employers and NGOs made it possible to provide practical training for those involved in the informal economy workplaces.

  3. Human-Computer Interaction and Information Management Research Needs

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — In a visionary future, Human-Computer Interaction HCI and Information Management IM have the potential to enable humans to better manage their lives through the use...

  4. Availability and Use of Telecommunication/Computer Information ...

    African Journals Online (AJOL)

    buz_centr_03

    the study area, identify Information and Communication Technologies (ICTs) in telecommunication/computer .... recommended that extension should forge new links and create network for sharing knowledge and experience .... Food Security.

  5. ESRS guidelines for software safety reviews. Reference document for the organization and conduct of Engineering Safety Review Services (ESRS) on software important to safety in nuclear power plants

    International Nuclear Information System (INIS)

    2000-01-01

    The IAEA provides safety review services to assist Member States in the application of safety standards and, in particular, to evaluate and facilitate improvements in nuclear power plant safety performance. Complementary to the Operational Safety Review Team (OSART) and the International Regulatory Review Team (IRRT) services are the Engineering Safety Review Services (ESRS), which include reviews of siting, external events and structural safety, design safety, fire safety, ageing management and software safety. Software is of increasing importance to safety in nuclear power plants as the use of computer based equipment and systems, controlled by software, is increasing in new and older plants. Computer based devices are used in both safety related applications (such as process control and monitoring) and safety critical applications (such as reactor protection). Their dependability can only be ensured if a systematic, fully documented and reviewable engineering process is used. The ESRS on software safety are designed to assist a nuclear power plant or a regulatory body of a Member State in the review of documentation relating to the development, application and safety assessment of software embedded in computer based systems important to safety in nuclear power plants. The software safety reviews can be tailored to the specific needs of the requesting organization. Examples of such reviews are: project planning reviews, reviews of specific issues and reviews prior final acceptance. This report gives information on the possible scope of ESRS software safety reviews and guidance on the organization and conduct of the reviews. It is aimed at Member States considering these reviews and IAEA staff and external experts performing the reviews. The ESRS software safety reviews evaluate the degree to which software documents show that the development process and the final product conform to international standards, guidelines and current practices. Recommendations are

  6. A DDC Bibliography on Computers in Information Sciences. Volume I. Information Sciences Series.

    Science.gov (United States)

    Defense Documentation Center, Alexandria, VA.

    The unclassified and unlimited bibliography compiles references dealing specifically with the role of computers in information sciences. The volume contains 249 annotated references grouped under two major headings: Time Shared, On-Line, and Real Time Systems, and Computer Components. The references are arranged in accesion number (AD-number)…

  7. Group Awareness and Self-Presentation in Computer-Supported Information Exchange

    Science.gov (United States)

    Kimmerle, Joachim; Cress, Ulrike

    2008-01-01

    A common challenge in many situations of computer-supported collaborative learning is increasing the willingness of those involved to share their knowledge with other group members. As a prototypical situation of computer-supported information exchange, a shared-database setting was chosen for the current study. This information-exchange situation…

  8. Quantum Computers: A New Paradigm in Information Technology

    OpenAIRE

    Mahesh S. Raisinghani

    2001-01-01

    The word 'quantum' comes from the Latin word quantus meaning 'how much'. Quantum computing is a fundamentally new mode of information processing that can be performed only by harnessing physical phenomena unique to quantum mechanics (especially quantum interference). Paul Benioff of the Argonne National Laboratory first applied quantum theory to computers in 1981 and David Deutsch of Oxford proposed quantum parallel computers in 1985, years before the realization of qubits in 1995. However, i...

  9. Towards Information Security Metrics Framework for Cloud Computing

    OpenAIRE

    Muhammad Imran Tariq

    2012-01-01

    Cloud computing has recently emerged as new computing paradigm which basically aims to provide customized, reliable, dynamic services over the internet.  Cost and security are influential issues to deploy cloud computing in large enterprise.  Privacy and security are very important issues in terms of user trust and legal compliance. Information Security (IS) metrics are best tool used to measure the efficiency, performance, effectiveness and impact of the security constraints. It is very hard...

  10. Information System Passive Safety at DaimlerChrysler: from vision to reality

    Energy Technology Data Exchange (ETDEWEB)

    Ruoff, H. [DaimlerChrysler AG, Sindelfingen (Germany)

    2001-07-01

    Today, short development times and an extensive model range are key factors when it comes to remaining a leading force in the highly competitive automobile market. Information technology plays a crucial role as an 'enabler' in keeping this competitive edge. It is only possible to make full use of existing potential by using 'state-of-the-art' information technology. In particular, this involves making knowledge that is distributed in various systems and 'heads' available quickly and transparently anytime and anywhere. The improved re-use of acquired expertise, efficient information searches, and standardized and seamless applications lead to a high level of performance. This often involves the transformation of a company culture from 'information hider' to 'information provider'. The vision of converting a gradually created, complex range of systems into a seamless sequence of distributed working processes with numerous participants is becoming reality in the Passive Safety area in Automobile/Vehicle Development at DaimlerChrysler. The INFOS Passive Safety information system provides all the data and information, which is required for, or results from, the entire crash test process. (orig.)

  11. Information dissemination and use: critical components in occupational safety and health.

    Science.gov (United States)

    Schulte, P A; Okun, A; Stephenson, C M; Colligan, M; Ahlers, H; Gjessing, C; Loos, G; Niemeier, R W; Sweeney, M H

    2003-11-01

    Information dissemination is a mandated, but understudied, requirement of occupational and environmental health laws and voluntary initiatives. Research is needed on the factors that enhance and limit the development, transfer, and use of occupational safety and health information (OSH). Contemporary changes in the workforce, workplaces, and the nature of work will require new emphasis on the dissemination of information to foster prevention. Legislative and regulatory requirements and voluntary initiatives for dissemination of OSH information were identified and assessed. Literature on information dissemination was reviewed to identify important issues and useful approaches. More than 20 sections of laws and regulations were identified that mandated dissemination of occupational and environmental safety and health information. A four-stage approach for tracking dissemination and considering the flow of information was delineated. Special areas of dissemination were identified: the information needs of the changing workforce, new and young workers; small businesses; and workers with difficulty in understanding or reading English. We offer a framework for dissemination of OSH information and underscore the need to focus on the extent to which decision-makers and others receive and use such information. More solid data are also needed on current investments in disseminating, diffusing and applying OSH information and on the utility of that information. Am. J. Ind. Med. 44:515-531, 2003. Published 2003 Wiley-Liss, Inc.

  12. An Anesthesia Preinduction Checklist to Improve Information Exchange, Knowledge of Critical Information, Perception of Safety, and Possibly Perception of Teamwork in Anesthesia Teams.

    Science.gov (United States)

    Tscholl, David W; Weiss, Mona; Kolbe, Michaela; Staender, Sven; Seifert, Burkhardt; Landert, Daniel; Grande, Bastian; Spahn, Donat R; Noethiger, Christoph B

    2015-10-01

    An anesthesia preinduction checklist (APIC) to be performed before anesthesia induction was introduced and evaluated with respect to 5 team-level outcomes, each being a surrogate end point for patient safety: information exchange (the percentage of checklist items exchanged by a team, out of 12 total items); knowledge of critical information (the percentage of critical information items out of 5 total items such as allergies, reported as known by the members of a team); team members' perceptions of safety (the median scores given by the members of a team on a continuous rating scale); their perception of teamwork (the median scores given by the members of a team on a continuous rating scale); and clinical performance (the percentage of completed items out of 14 required tasks, e.g., suction device checked). A prospective interventional study comparing anesthesia teams using the APIC with a control group not using the APIC was performed using a multimethod design. Trained observers rated information exchange and clinical performance during on-site observations of anesthesia inductions. After the observations, each team member indicated the critical information items they knew and their perceptions of safety and teamwork. One hundred five teams using the APIC were compared with 100 teams not doing so. The medians of the team-level outcome scores in the APIC group versus the control group were as follows: information exchange: 100% vs 33% (P safety: 91% vs 84% (P improves information exchange, knowledge of critical information, and perception of safety in anesthesia teams-all parameters contributing to patient safety. There was a trend indicating improved perception of teamwork.

  13. Innovations and Advances in Computer, Information, Systems Sciences, and Engineering

    CERN Document Server

    Sobh, Tarek

    2013-01-01

    Innovations and Advances in Computer, Information, Systems Sciences, and Engineering includes the proceedings of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2011). The contents of this book are a set of rigorously reviewed, world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of  Industrial Electronics, Technology and Automation, Telecommunications and Networking, Systems, Computing Sciences and Software Engineering, Engineering Education, Instructional Technology, Assessment, and E-learning.

  14. Manual on quality assurance for computer software related to the safety of nuclear power plants

    International Nuclear Information System (INIS)

    1988-01-01

    The objective of the Manual is to provide guidance in the assurance of quality of specification, design, maintenance and use of computer software related to items and activities important to safety (hereinafter referred to as safety related) in nuclear power plants. This guidance is consistent with, and supplements, the requirements and recommendations of Quality Assurance for Safety in Nuclear Power Plants: A Code of Practice, 50-C-QA, and related Safety Guides on quality assurance for nuclear power plants. Annex A identifies the IAEA documents referenced in the Manual. The Manual is intended to be of use to all those who, in any way, are involved with software for safety related applications for nuclear power plants, including auditors who may be called upon to audit management systems and product software. Figs

  15. AGIS: Evolution of Distributed Computing information system for ATLAS

    Science.gov (United States)

    Anisenkov, A.; Di Girolamo, A.; Alandes, M.; Karavakis, E.

    2015-12-01

    ATLAS, a particle physics experiment at the Large Hadron Collider at CERN, produces petabytes of data annually through simulation production and tens of petabytes of data per year from the detector itself. The ATLAS computing model embraces the Grid paradigm and a high degree of decentralization of computing resources in order to meet the ATLAS requirements of petabytes scale data operations. It has been evolved after the first period of LHC data taking (Run-1) in order to cope with new challenges of the upcoming Run- 2. In this paper we describe the evolution and recent developments of the ATLAS Grid Information System (AGIS), developed in order to integrate configuration and status information about resources, services and topology of the computing infrastructure used by the ATLAS Distributed Computing applications and services.

  16. Radiation safety training for accelerator facilities

    International Nuclear Information System (INIS)

    Trinoskey, P.A.

    1997-02-01

    In November 1992, a working group was formed within the U.S. Department of Energy's (DOE's) accelerator facilities to develop a generic safety training program to meet the basic requirements for individuals working in accelerator facilities. This training, by necessity, includes sections for inserting facility-specific information. The resulting course materials were issued by DOE as a handbook under its technical standards in 1996. Because experimenters may be at a facility for only a short time and often at odd times during the day, the working group felt that computer-based training would be useful. To that end, Lawrence Livermore National Laboratory (LLNL) and Argonne National Laboratory (ANL) together have developed a computer-based safety training program for accelerator facilities. This interactive course not only enables trainees to receive facility- specific information, but time the training to their schedule and tailor it to their level of expertise

  17. 3rd ACIS International Conference on Applied Computing and Information Technology

    CERN Document Server

    2016-01-01

    This edited book presents scientific results of the 3nd International Conference on Applied Computing and Information Technology (ACIT 2015) which was held on July 12-16, 2015 in Okayama, Japan. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.

  18. 4th IEEE/ACIS International Conference on Computer and Information Science

    CERN Document Server

    2016-01-01

    This edited book presents scientific results of the 14th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015) which was held on June 28 – July 1, 2015 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.

  19. Analysis of safety information for nuclear power plants and development of source term estimation program

    International Nuclear Information System (INIS)

    Kim, Tae Woon; Choi, Seong Soo; Park, Jin Hee

    1999-12-01

    Current CARE(Computerized Advisory System for Radiological Emergency) in KINS(Korea Institute of Nuclear Safety) has no STES(Source Term Estimation System) which links between SIDS(Safety Information Display System) and FADAS(Following Accident Dose Assessment System). So in this study, STES is under development. STES system is the system that estimates the source term based on the safety information provided by SIDS. Estimated source term is given to FADAS as an input for estimation of environmental effect of radiation. Through this first year project STES for the Kori 3,4 and Younggwang 1,2 has been developed. Since there is no CARE for Wolsong(PHWR) plants yet, CARE for Wolsong is under construction. The safety parameters are selected and the safety information display screens and the alarm logic for plant status change are developed for Wolsong Unit 2 based on the design documents for CANDU plants

  20. A Multi-agent Supply Chain Information Coordination Mode Based on Cloud Computing

    OpenAIRE

    Wuxue Jiang; Jing Zhang; Junhuai Li

    2013-01-01

     In order to improve the high efficiency and security of supply chain information coordination under cloud computing environment, this paper proposes a supply chain information coordination mode based on cloud computing. This mode has two basic statuses which are online status and offline status. At the online status, cloud computing center is responsible for coordinating the whole supply chain information. At the offline status, information exchange can be realized among different nodes by u...

  1. Information Security in the Age of Cloud Computing

    Science.gov (United States)

    Sims, J. Eric

    2012-01-01

    Information security has been a particularly hot topic since the enhanced internal control requirements of Sarbanes-Oxley (SOX) were introduced in 2002. At about this same time, cloud computing started its explosive growth. Outsourcing of mission-critical functions has always been a gamble for managers, but the advantages of cloud computing are…

  2. Computer Security: Introduction to information and computer security (1/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Aix-en-Provence and Haute Ecole de Gestion in Geneva in 2010. His professional interests include software and network security, distributed systems, and Web and mobile technologies. With the prevalence of modern information te...

  3. Fundamental challenging problems for developing new nuclear safety standard computer codes

    International Nuclear Information System (INIS)

    Wong, P.K.; Wong, A.E.; Wong, A.

    2005-01-01

    Based on the claims of the US Basic patents number 5,084,232; 5,848,377 and 6,430,516 that can be obtained from typing the Patent Numbers into the Box of the Web site http://164.195.100.11/netahtml/srchnum.htm and their associated published technical papers having been presented and published at International Conferences in the last three years and that all these had been sent into US-NRC by E-mail on March 26, 2003 at 2:46 PM., three fundamental challenging problems for developing new nuclear safety standard computer codes had been presented at the US-NRC RIC2003 Session W4. 2:15-3:15 PM. at the Washington D.C. Capital Hilton Hotel, Presidential Ballroom on April 16, 2003 in front of more than 800 nuclear professionals from many countries worldwide. The objective and scope of this paper is to invite all nuclear professionals to examine and evaluate all the current computer codes being used in their own countries by means of comparison of numerical data from these three specific openly challenging fundamental problems in order to set up a global safety standard for all nuclear power plants in the world. (authors)

  4. Smooth handling: the lack of safety-related consumer information in car advertisements.

    Science.gov (United States)

    Wilson, Nick; Maher, Anthony; Thomson, George; Keall, Michael

    2007-10-01

    To examine the content and trends of safety-related consumer information in magazine vehicle advertisements, as a case study within the worldwide marketing of vehicles. Content analysis of popular current affairs magazines in New Zealand for the 5-year period 2001-2005 was undertaken (n = 514 advertisements), supplemented with vehicle data from official websites. Safety information in advertisements for light passenger vehicles was relatively uncommon with only 27% mentioning one or more of nine key safety features examined (average: 1.7 out of nine features in this 27%). Also included were potentially hazardous features of: speed imagery (in 29% of advertisements), power references (14%), and acceleration data (4%). The speed and power aspects became relatively more common over the 5-year period (p advertisements and vehicle marketing - as already occurs with many other consumer products.

  5. International Nuclear Safety Center (INSC) database

    International Nuclear Information System (INIS)

    Sofu, T.; Ley, H.; Turski, R.B.

    1997-01-01

    As an integral part of DOE's International Nuclear Safety Center (INSC) at Argonne National Laboratory, the INSC Database has been established to provide an interactively accessible information resource for the world's nuclear facilities and to promote free and open exchange of nuclear safety information among nations. The INSC Database is a comprehensive resource database aimed at a scope and level of detail suitable for safety analysis and risk evaluation for the world's nuclear power plants and facilities. It also provides an electronic forum for international collaborative safety research for the Department of Energy and its international partners. The database is intended to provide plant design information, material properties, computational tools, and results of safety analysis. Initial emphasis in data gathering is given to Soviet-designed reactors in Russia, the former Soviet Union, and Eastern Europe. The implementation is performed under the Oracle database management system, and the World Wide Web is used to serve as the access path for remote users. An interface between the Oracle database and the Web server is established through a custom designed Web-Oracle gateway which is used mainly to perform queries on the stored data in the database tables

  6. SACRD: a data base for fast reactor safety computer codes, general description

    International Nuclear Information System (INIS)

    Greene, N.M.; Forsberg, V.M.; Raiford, G.B.; Arwood, J.W.; Simpson, D.B.; Flanagan, G.F.

    1979-01-01

    SACRD is a data base of material properties and other handbook data needed in computer codes used for fast reactor safety studies. Data are available in the thermodynamics, heat transfer, fluid mechanics, structural mechanics, aerosol transport, meteorology, neutronics, and dosimetry areas. Tabular, graphical and parameterized data are provided in many cases. A general description of the SACRD system is presented in the report

  7. Compendium of computer codes for the safety analysis of fast breeder reactors

    International Nuclear Information System (INIS)

    1977-10-01

    The objective of the compendium is to provide the reader with a guide which briefly describes many of the computer codes used for liquid metal fast breeder reactor safety analyses, since it is for this system that most of the codes have been developed. The compendium is designed to address the following frequently asked questions from individuals in licensing and research and development activities: (1) What does the code do. (2) To what safety problems has it been applied. (3) What are the code's limitations. (4) What is being done to remove these limitations. (5) How does the code compare with experimental observations and other code predictions. (6) What reference documents are available

  8. Comparison of the safety information on drug labels in three developed countries: The USA, UK and Canada

    Directory of Open Access Journals (Sweden)

    Thamir M. Alshammari

    2017-12-01

    Full Text Available The safety information on drug labels of a company marketing the same drugs in different countries is sometimes different. The aim of the present study is to understand the differences in the volume and content of safety information on the drug labels from the same manufacturers in three developed countries: the United States of America (USA, the United Kingdom (UK and Canada. This study involved the calculation of the proportion of total safety information (PSI and of contraindications (PCI in comparison to all information on the label and the percentage of boxed warnings (PBW among the 100 labels studied from each country. The PSI on the labels of different countries is different with USA labels bearing lesser value PSI and UK labels bearing higher value PSI. The qualitative information provided on these drug labels from each country in ‘contraindications’ sections, ‘boxed/serious warnings’ and ‘overdosage’ sections presented differences in the information provided on most of the labels. We have found distinct differences between the safety information available on drug labels in terms of volume and content. We conclude that the safety information for the same products should be standardised across all countries.

  9. Monitoring and Auditing Residual Information on the User’s Computer

    Directory of Open Access Journals (Sweden)

    Vladlena Sergeevna Oladk

    2015-06-01

    Full Text Available This paper considers the problem of violation of information security components such as confidentiality and availability in the event of a computer user's residual information. Analyze the requirements of regulators and mechanisms to be applied in the organization to monitor the residual information or its destruction.Approach to monitoring and auditing residual information on the user's computer, which allows monitoring the residual information in certain areas proposed. Approach allows us to identify the detected information and rank it according to the degree of criticality, as well as calculate the risk of leakage and its potential to develop recommendations aimed at its reduction. The proposed approach is formally described and automated in a software system.

  10. International Conference on Emerging Technologies for Information Systems, Computing, and Management

    CERN Document Server

    Ma, Tinghuai; Emerging Technologies for Information Systems, Computing, and Management

    2013-01-01

    This book aims to examine innovation in the fields of information technology, software engineering, industrial engineering, management engineering. Topics covered in this publication include; Information System Security, Privacy, Quality Assurance, High-Performance Computing and Information System Management and Integration. The book presents papers from The Second International Conference for Emerging Technologies Information Systems, Computing, and Management (ICM2012) which was held on December 1 to 2, 2012 in Hangzhou, China.

  11. The development of an information system and installation of an Internet web database for the purposes of the occupational health and safety management system.

    Science.gov (United States)

    Mavrikakis, I; Mantas, J; Diomidous, M

    2007-01-01

    This paper is based on the research on the possible structure of an information system for the purposes of occupational health and safety management. We initiated a questionnaire in order to find the possible interest on the part of potential users in the subject of occupational health and safety. The depiction of the potential interest is vital both for the software analysis cycle and development according to previous models. The evaluation of the results tends to create pilot applications among different enterprises. Documentation and process improvements ascertained quality of services, operational support, occupational health and safety advice are the basics of the above applications. Communication and codified information among intersted parts is the other target of the survey regarding health issues. Computer networks can offer such services. The network will consist of certain nodes responsible to inform executives on Occupational Health and Safety. A web database has been installed for inserting and searching documents. The submission of files to a server and the answers to questionnaires through the web help the experts to perform their activities. Based on the requirements of enterprises we have constructed a web file server. We submit files so that users can retrieve the files which they need. The access is limited to authorized users. Digital watermarks authenticate and protect digital objects.

  12. A computer-oriented system for assembling and displaying land management information

    Science.gov (United States)

    Elliot L. Amidon

    1964-01-01

    Maps contain information basic to land management planning. By transforming conventional map symbols into numbers which are punched into cards, the land manager can have a computer assemble and display information required for a specific job. He can let a computer select information from several maps, combine it with such nonmap data as treatment cost or benefit per...

  13. Classification of antecedents towards safety use of health information technology: A systematic review.

    Science.gov (United States)

    Salahuddin, Lizawati; Ismail, Zuraini

    2015-11-01

    This paper provides a systematic review of safety use of health information technology (IT). The first objective is to identify the antecedents towards safety use of health IT by conducting systematic literature review (SLR). The second objective is to classify the identified antecedents based on the work system in Systems Engineering Initiative for Patient Safety (SEIPS) model and an extension of DeLone and McLean (D&M) information system (IS) success model. A systematic literature review (SLR) was conducted from peer-reviewed scholarly publications between January 2000 and July 2014. SLR was carried out and reported based on the preferred reporting items for systematic reviews and meta-analyses (PRISMA) statement. The related articles were identified by searching the articles published in Science Direct, Medline, EMBASE, and CINAHL databases. Data extracted from the resultant studies included are to be analysed based on the work system in Systems Engineering Initiative for Patient Safety (SEIPS) model, and also from the extended DeLone and McLean (D&M) information system (IS) success model. 55 articles delineated to be antecedents that influenced the safety use of health IT were included for review. Antecedents were identified and then classified into five key categories. The categories are (1) person, (2) technology, (3) tasks, (4) organization, and (5) environment. Specifically, person is attributed by competence while technology is associated to system quality, information quality, and service quality. Tasks are attributed by task-related stressor. Organisation is related to training, organisation resources, and teamwork. Lastly, environment is attributed by physical layout, and noise. This review provides evidence that the antecedents for safety use of health IT originated from both social and technical aspects. However, inappropriate health IT usage potentially increases the incidence of errors and produces new safety risks. The review cautions future

  14. Public information and education on radiation safety and protection in Indonesia

    Energy Technology Data Exchange (ETDEWEB)

    Djaloeis, Azhar [National Atomic Energy Agency, Jalan KH Abdul Rohim, Mampang Prapatan, Jakarta (Indonesia)

    1999-09-01

    This paper presents a brief overview of public information and education concerning nuclear science and technology in general and radiation safety and protection in particular in Indonesia from the perspective of promoting the development and utilization of nuclear science and technology in the country. The role of nuclear science and technology in Indonesia is first introduced, followed by an overview of the nuclear activities in the country. Basic considerations, major objectives of the public information and education program on radiation safety and protection as well as basic and operational strategies to achieve those objectives are then presented. Major programs including highlights of the past and present activities as well as prospect on future course of actions are discussed. (author)

  15. Public information and education on radiation safety and protection in Indonesia

    International Nuclear Information System (INIS)

    Djaloeis, Azhar

    1999-01-01

    This paper presents a brief overview of public information and education concerning nuclear science and technology in general and radiation safety and protection in particular in Indonesia from the perspective of promoting the development and utilization of nuclear science and technology in the country. The role of nuclear science and technology in Indonesia is first introduced, followed by an overview of the nuclear activities in the country. Basic considerations, major objectives of the public information and education program on radiation safety and protection as well as basic and operational strategies to achieve those objectives are then presented. Major programs including highlights of the past and present activities as well as prospect on future course of actions are discussed. (author)

  16. A spread willingness computing-based information dissemination model.

    Science.gov (United States)

    Huang, Haojing; Cui, Zhiming; Zhang, Shukui

    2014-01-01

    This paper constructs a kind of spread willingness computing based on information dissemination model for social network. The model takes into account the impact of node degree and dissemination mechanism, combined with the complex network theory and dynamics of infectious diseases, and further establishes the dynamical evolution equations. Equations characterize the evolutionary relationship between different types of nodes with time. The spread willingness computing contains three factors which have impact on user's spread behavior: strength of the relationship between the nodes, views identity, and frequency of contact. Simulation results show that different degrees of nodes show the same trend in the network, and even if the degree of node is very small, there is likelihood of a large area of information dissemination. The weaker the relationship between nodes, the higher probability of views selection and the higher the frequency of contact with information so that information spreads rapidly and leads to a wide range of dissemination. As the dissemination probability and immune probability change, the speed of information dissemination is also changing accordingly. The studies meet social networking features and can help to master the behavior of users and understand and analyze characteristics of information dissemination in social network.

  17. Information management system for the control of the data of the safety and radiological protection on a national scale

    International Nuclear Information System (INIS)

    Valdes Ramos, Maryzury; Prendes Alonso, Miguel; Arnau Fernadez, Alma

    2005-01-01

    The Center for Radiation Protection and Hygiene (CPHR) and the National Center for Nuclear Safety (CNSN), have been working in the last years in the design and improvement of a computing tool that allows the management of all the important information, which should be controlled by the Regulatory Authority. The results obtained with the design and implementation of the Integrated System of Data (RASSYN) for the management of the National Regulatory Authority's information in the country are shown in this paper. The software allows an efficient management of the information related to several regulatory aspects such as: the radiation sources in the national territory; the practices associated to the sources; the personnel associated to the practices and their doses; the instruments for the measurement; the waste management; the radiological events; the conditions and requirements of the given authorizations and the inspections results

  18. Computing, information, and communications: Technologies for the 21. Century

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-01

    To meet the challenges of a radically new and technologically demanding century, the Federal Computing, Information, and Communications (CIC) programs are investing in long-term research and development (R and D) to advance computing, information, and communications in the United States. CIC R and D programs help Federal departments and agencies to fulfill their evolving missions, assure the long-term national security, better understand and manage the physical environment, improve health care, help improve the teaching of children, provide tools for lifelong training and distance learning to the workforce, and sustain critical US economic competitiveness. One of the nine committees of the National Science and Technology Council (NSTC), the Committee on Computing, Information, and Communications (CCIC)--through its CIC R and D Subcommittee--coordinates R and D programs conducted by twelve Federal departments and agencies in cooperation with US academia and industry. These R and D programs are organized into five Program Component Areas: (1) HECC--High End Computing and Computation; (2) LSN--Large Scale Networking, including the Next Generation Internet Initiative; (3) HCS--High Confidence Systems; (4) HuCS--Human Centered Systems; and (5) ETHR--Education, Training, and Human Resources. A brief synopsis of FY 1997 accomplishments and FY 1998 goals by PCA is presented. This report, which supplements the President`s Fiscal Year 1998 Budget, describes the interagency CIC programs.

  19. Computational methods assuring nuclear power plant structural integrity and safety: an overview of the recent activities at VTT

    International Nuclear Information System (INIS)

    Keinaenen, H.; Talja, H.; Rintamaa, R.

    1998-01-01

    Numerical, simplified engineering and standardised methods are applied in the safety analyses of primary circuit components and reactor pressure vessels. The integrity assessment procedures require input relating both to the steady state and transient loading actual material properties data and precise knowledge of the size and geometry of defects. Current procedures bold extensive information regarding these aspects. It is important to verify the accuracy of the different assessment methods especially in the case of complex structures and loading. The focus of this paper is on the recent results and development of computational fracture assessment methods at VTT Manufacturing Technology. The methods include effective engineering type tools for rapid structural integrity assessments and more sophisticated finite-element based methods. An integrated PC-based program system MASI for engineering fracture analysis is described. A summary of the verification of the methods in computational benchmark analyses and against the results of large scale experiments is presented. (orig.)

  20. Data Analysis Approaches for the Risk-Informed Safety Margins Characterization Toolkit

    International Nuclear Information System (INIS)

    Mandelli, Diego; Alfonsi, Andrea; Maljovec, Daniel P.; Parisi, Carlo; Cogliati, Joshua J.; Talbot, Paul W.; Smith, Curtis L.; Rabiti, Cristian; Picoco, Claudia

    2016-01-01

    In the past decades, several numerical simulation codes have been employed to simulate accident dynamics (e.g., RELAP5-3D, RELAP-7, MELCOR, MAAP). In order to evaluate the impact of uncertainties into accident dynamics, several stochastic methodologies have been coupled with these codes. These stochastic methods range from classical Monte-Carlo and Latin Hypercube sampling to stochastic polynomial methods. Similar approaches have been introduced into the risk and safety community where stochastic methods (such as RAVEN, ADAPT, MCDET, ADS) have been coupled with safety analysis codes in order to evaluate the safety impact of timing and sequencing of events. These approaches are usually called Dynamic PRA or simulation-based PRA methods. These uncertainties and safety methods usually generate a large number of simulation runs (database storage may be on the order of gigabytes or higher). The scope of this paper is to present a broad overview of methods and algorithms that can be used to analyze and extract information from large data sets containing time dependent data. In this context, ''extracting information'' means constructing input-output correlations, finding commonalities, and identifying outliers. Some of the algorithms presented here have been developed or are under development within the RAVEN statistical framework.

  1. Status, plans, and capabilities of the Nuclear Criticality Information System

    International Nuclear Information System (INIS)

    Koponen, B.L.

    1984-01-01

    The Nuclear Criticality Information System (NCIS), in preparation since 1981, has substantially evolved and now contains a growing number of resources pertinent to nuclear criticality safety. These resources include bibliographic compilations, experimental data, communications media, and the International Directory of Nuclear Criticality Safety Personnel. These resources are part of the LLNL Technology Information System (TIS) which provides the host computer for NCIS. The TIS provides nationwide access to authorized members of the nuclear criticality community via interactive dial-up from computer terminals that utilize communication facilities such as commercial and federal telephone networks, toll-free WATS lines, TYMNET, and the ARPANET/MILNET computer network

  2. Treatment of Passive Component Reliability in Risk-Informed Safety Margin Characterization FY 2010 Report

    Energy Technology Data Exchange (ETDEWEB)

    Robert W Youngblood

    2010-09-01

    The Risk-Informed Safety Margin Characterization (RISMC) pathway is a set of activities defined under the U.S. Department of Energy (DOE) Light Water Reactor Sustainability Program. The overarching objective of RISMC is to support plant life-extension decision-making by providing a state-of-knowledge characterization of safety margins in key systems, structures, and components (SSCs). A technical challenge at the core of this effort is to establish the conceptual and technical feasibility of analyzing safety margin in a risk-informed way, which, unlike conventionally defined deterministic margin analysis, is founded on probabilistic characterizations of SSC performance.

  3. The First NAFOSTED Conference on Information and Computer Science

    CERN Document Server

    Nguyen, Xuan; Le, Hoai; Nguyen, Viet; Bao, Vo

    2015-01-01

    This book includes the extended and revised versions of a set of selected papers from the First NAFOSTED Conference on Information and Computer Science (NICS’2014), held at Le Quy Don Technical Academy, Hanoi, Vietnam from 13/Mar./2014 to 14/Mar./2014. The conference was co-organized by The National Foundation for Science and Technology Development (NAFOSTED) and Le Quy Don Technical Academy. The purpose of the NICS conference series is to promote scientific publications in the country and to provide a platform for high quality academic exchange among scientists in the fields of computer science, information and communication. The conference includes five tracks, namely “Computer Science”, “Artificial Intelligence”, “Network Systems”, “Software Engineering”, and “Information Systems”.  The papers in this book are among the best contributions at NICS’2014 taken into account the quality of their presentation at the conference and the recommendation of the two experts in the extra round ...

  4. The Radiological Safety Analysis Computer Program (RSAC-5) user's manual

    International Nuclear Information System (INIS)

    Wenzel, D.R.

    1994-02-01

    The Radiological Safety Analysis Computer Program (RSAC-5) calculates the consequences of the release of radionuclides to the atmosphere. Using a personal computer, a user can generate a fission product inventory from either reactor operating history or nuclear criticalities. RSAC-5 models the effects of high-efficiency particulate air filters or other cleanup systems and calculates decay and ingrowth during transport through processes, facilities, and the environment. Doses are calculated through the inhalation, immersion, ground surface, and ingestion pathways. RSAC+, a menu-driven companion program to RSAC-5, assists users in creating and running RSAC-5 input files. This user's manual contains the mathematical models and operating instructions for RSAC-5 and RSAC+. Instructions, screens, and examples are provided to guide the user through the functions provided by RSAC-5 and RSAC+. These programs are designed for users who are familiar with radiological dose assessment methods

  5. Five Years of a Computer Based New Training Program in Safety and Radiation Protection

    International Nuclear Information System (INIS)

    Ben-Shachar, B.; Tshuva, M.; Fitussi, I.; Ankri, D.

    2004-01-01

    One of the main goals of the Department of Human Resources Development is to give employees fundamental knowledge, refreshing know-how and increasing safety awareness. In this regard safety deals with risks in operating nuclear facilities, including radiation, industrial risks and fire. Israeli Work Supervision (informing and training employees, 1992) (1) and work safety regulations (industrial safety and health for ionization radiation employees) state the need for training by the employer at least once a year. The employer also must take means to verify that the employees actually understand what they were trained for

  6. 4th International Conference on Applied Computing and Information Technology

    CERN Document Server

    2017-01-01

    This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on December 12–14, 2016 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. The aim of this conference was also to bring out the research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the Program Committee, and underwent further rigorous rounds of review. Th...

  7. The computer vision in the service of safety and reliability in steam generators inspection services

    International Nuclear Information System (INIS)

    Pineiro Fernandez, P.; Garcia Bueno, A.; Cabrera Jordan, E.

    2012-01-01

    The actual computational vision has matured very quickly in the last ten years by facilitating new developments in various areas of nuclear application allowing to automate and simplify processes and tasks, instead or in collaboration with the people and equipment efficiently. The current computer vision (more appropriate than the artificial vision concept) provides great possibilities of also improving in terms of the reliability and safety of NPPS inspection systems.

  8. Design tools for computer-generated display of information to operators

    International Nuclear Information System (INIS)

    O'Brien, J.F.; Cain, D.G.; Sun, B.K.H.

    1985-01-01

    More and more computers are being used to process and display information to operators who control nuclear power plants. Implementation of computer-generated displays in power plant control rooms represents a considerable design challenge for industry designers. Over the last several years, the EPRI has conducted research aimed at providing industry designers tools to meet this new design challenge. These tools provide guidance in defining more 'intelligent' information for plant control and in developing effective displays to communicate this information to the operators. (orig./HP)

  9. FY 1999 Blue Book: Computing, Information, and Communications: Networked Computing for the 21st Century

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — U.S.research and development R and D in computing, communications, and information technologies has enabled unprecedented scientific and engineering advances,...

  10. 78 FR 50079 - Information Collection Activities: Safety and Environmental Management Systems (SEMS); Proposed...

    Science.gov (United States)

    2013-08-16

    ... DEPARTMENT OF THE INTERIOR Bureau of Safety and Environmental Enforcement [Docket ID BSEE-2013-0005; OMB Control Number 1014-0017: 134E1700D2 EEEE500000 ET1SF0000.DAQ000] Information Collection Activities: Safety and Environmental Management Systems (SEMS); Proposed Collection; Comment Request...

  11. Database search for safety information on cosmetic ingredients.

    Science.gov (United States)

    Pauwels, Marleen; Rogiers, Vera

    2007-12-01

    Ethical considerations with respect to experimental animal use and regulatory testing are worldwide under heavy discussion and are, in certain cases, taken up in legislative measures. The most explicit example is the European cosmetic legislation, establishing a testing ban on finished cosmetic products since 11 September 2004 and enforcing that the safety of a cosmetic product is assessed by taking into consideration "the general toxicological profile of the ingredients, their chemical structure and their level of exposure" (OJ L151, 32-37, 23 June 1993; OJ L066, 26-35, 11 March 2003). Therefore the availability of referenced and reliable information on cosmetic ingredients becomes a dire necessity. Given the high-speed progress of the World Wide Web services and the concurrent drastic increase in free access to information, identification of relevant data sources and evaluation of the scientific value and quality of the retrieved data, are crucial. Based upon own practical experience, a survey is put together of freely and commercially available data sources with their individual description, field of application, benefits and drawbacks. It should be mentioned that the search strategies described are equally useful as a starting point for any quest for safety data on chemicals or chemical-related substances in general.

  12. Prospects of cloud technology development: information safety and personal data protection in cloud media

    International Nuclear Information System (INIS)

    Malyuk, A.A.; Ozhered, I.V.

    2013-01-01

    Proper definitions are given and an architecture is proposed for the model of cloud computing. Approaches that can ensure the safety on each level of the architecture are considered. Special attention is given to issues related to the confidence of providers, authentic user identification, and data encoding, juridical issues that are encountered in the use of this technology, prospects of its implementation, and further development of cloud computing [ru

  13. The 9th international conference on computing and information technology

    CERN Document Server

    Unger, Herwig; Boonkrong, Sirapat; IC2IT2013

    2013-01-01

    This volume contains the papers of the 9th International Conference on Computing and Information Technology (IC2IT 2013) held at King Mongkut's University of Technology North Bangkok (KMUTNB), Bangkok, Thailand, on May 9th-10th, 2013. Traditionally, the conference is organized in conjunction with the National Conference on Computing and Information Technology, one of the leading Thai national events in the area of Computer Science and Engineering. The conference as well as this volume is structured into 3 main tracks on Data Networks/Communication, Data Mining/Machine Learning, and Human Interfaces/Image processing.  

  14. Intelligent Information Processing for Enhanced Safety in the NAS, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Our Phase I work focused on how improved information flow between actors in a flight deck environment can improve safety performance. An operational prototype was...

  15. Intelligent Information Processing for Enhanced Safety in the NAS, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — We propose a system that focuses on how improved information flow between agents acting in a flight deck environment can improve safety performance. Agents are...

  16. A Spread Willingness Computing-Based Information Dissemination Model

    Science.gov (United States)

    Cui, Zhiming; Zhang, Shukui

    2014-01-01

    This paper constructs a kind of spread willingness computing based on information dissemination model for social network. The model takes into account the impact of node degree and dissemination mechanism, combined with the complex network theory and dynamics of infectious diseases, and further establishes the dynamical evolution equations. Equations characterize the evolutionary relationship between different types of nodes with time. The spread willingness computing contains three factors which have impact on user's spread behavior: strength of the relationship between the nodes, views identity, and frequency of contact. Simulation results show that different degrees of nodes show the same trend in the network, and even if the degree of node is very small, there is likelihood of a large area of information dissemination. The weaker the relationship between nodes, the higher probability of views selection and the higher the frequency of contact with information so that information spreads rapidly and leads to a wide range of dissemination. As the dissemination probability and immune probability change, the speed of information dissemination is also changing accordingly. The studies meet social networking features and can help to master the behavior of users and understand and analyze characteristics of information dissemination in social network. PMID:25110738

  17. A Spread Willingness Computing-Based Information Dissemination Model

    Directory of Open Access Journals (Sweden)

    Haojing Huang

    2014-01-01

    Full Text Available This paper constructs a kind of spread willingness computing based on information dissemination model for social network. The model takes into account the impact of node degree and dissemination mechanism, combined with the complex network theory and dynamics of infectious diseases, and further establishes the dynamical evolution equations. Equations characterize the evolutionary relationship between different types of nodes with time. The spread willingness computing contains three factors which have impact on user’s spread behavior: strength of the relationship between the nodes, views identity, and frequency of contact. Simulation results show that different degrees of nodes show the same trend in the network, and even if the degree of node is very small, there is likelihood of a large area of information dissemination. The weaker the relationship between nodes, the higher probability of views selection and the higher the frequency of contact with information so that information spreads rapidly and leads to a wide range of dissemination. As the dissemination probability and immune probability change, the speed of information dissemination is also changing accordingly. The studies meet social networking features and can help to master the behavior of users and understand and analyze characteristics of information dissemination in social network.

  18. Principles of quantum computation and information volume II

    International Nuclear Information System (INIS)

    Kok, P

    2007-01-01

    Any new textbook in quantum information has some pretty strong competition to contend with. Not only is there the classic text by Nielsen and Chuang from 2000, but also John Preskill's lecture notes, available for free online. Nevertheless, a proper textbook seems more enduring than online notes, and the field has progressed considerably in the seven years since Nielsen and Chuang was published. A new textbook is a great opportunity to give a snapshot of our current state of knowledge in quantum information. Therein also lies a problem: The field has expanded so much that it is impossible to cover everything at the undergraduate level. Quantum information theory is relevant to an extremely large portion of physics, from solid state and condensed matter physics to particle physics. Every discipline that has some relation to quantum mechanics is affected by our understanding of quantum information theory. Those who wish to write a book on quantum information therefore have to make some profound choices: Do you keep the ultimate aim of a quantum computer in mind, or do you focus on quantum communication and precision measurements as well? Do you describe how to build a quantum computer with all possible physical systems or do you present only the underlying principles? Do you include only the tried and tested ideas, or will you also explore more speculative directions? You don't have to take a black-or-white stance on these questions, but how you approach them will profoundly determine the character of your book. The authors of 'Principles of Quantum Computation and Information (Volume II: Basic Tools and Special Topics)' have chosen to focus on the construction of quantum computers, but restrict themselves mainly to general techniques. Only in the last chapter do they explicitly address the issues that arise in the different implementations. The book is the second volume in a series, and consists of four chapters (labelled 5 to 8) called 'Quantum Information Theory

  19. Computational Fluid Dynamics (CFD) in Nuclear Reactor Safety (NRS) - Proceedings of the workshop on Experiments and CFD Code Application to Nuclear Reactor Safety (XCFD4NRS)

    International Nuclear Information System (INIS)

    2008-01-01

    Computational Fluid Dynamics (CFD) is to an increasing extent being adopted in nuclear reactor safety analyses as a tool that enables specific safety relevant phenomena occurring in the reactor coolant system to be better described. The Committee on the Safety of Nuclear Installations (CSNI), which is responsible for the activities of the OECD Nuclear Energy Agency that support advancing the technical base of the safety of nuclear installations, has in recent years conducted an important activity in the CFD area. This activity has been carried out within the scope of the CSNI working group on the analysis and management of accidents (GAMA), and has mainly focused on the formulation of user guidelines and on the assessment and verification of CFD codes. It is in this GAMA framework that a first workshop CFD4NRS was organized and held in Garching, Germany in 2006. Following the CFD4NRS workshop, this XCFD4NRS Workshop was intended to extend the forum created for numerical analysts and experimentalists to exchange information in the field of Nuclear Reactor Safety (NRS) related activities relevant to Computational Fluid Dynamics (CFD) validation, but this time with more emphasis placed on new experimental techniques and two-phase CFD applications. The purpose of the workshop was to provide a forum for numerical analysts and experimentalists to exchange information in the field of NRS-related activities relevant to CFD validation, with the objective of providing input to GAMA CFD experts to create a practical, state-of-the-art, web-based assessment matrix on the use of CFD for NRS applications. The scope of XCFD4NRS includes: - Single-phase and two-phase CFD simulations with an emphasis on validation in areas such as: boiling flows, free-surface flows, direct contact condensation and turbulent mixing. These applications should relate to NRS-relevant issues such as: pressurized thermal shocks, critical heat flux, pool heat exchangers, boron dilution, hydrogen

  20. Risk-Informing Safety Reviews for Non-Reactor Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Mubayi, V.; Azarm, A.; Yue, M.; Mukaddam, W.; Good, G.; Gonzalez, F.; Bari, R.A.

    2011-03-13

    This paper describes a methodology used to model potential accidents in fuel cycle facilities that employ chemical processes to separate and purify nuclear materials. The methodology is illustrated with an example that uses event and fault trees to estimate the frequency of a specific energetic reaction that can occur in nuclear material processing facilities. The methodology used probabilistic risk assessment (PRA)-related tools as well as information about the chemical reaction characteristics, information on plant design and operational features, and generic data about component failure rates and human error rates. The accident frequency estimates for the specific reaction help to risk-inform the safety review process and assess compliance with regulatory requirements.

  1. Risk-Informing Safety Reviews for Non-Reactor Nuclear Facilities

    International Nuclear Information System (INIS)

    Mubayi, V.; Azarm, A.; Yue, M.; Mukaddam, W.; Good, G.; Gonzalez, F.; Bari, R.A.

    2011-01-01

    This paper describes a methodology used to model potential accidents in fuel cycle facilities that employ chemical processes to separate and purify nuclear materials. The methodology is illustrated with an example that uses event and fault trees to estimate the frequency of a specific energetic reaction that can occur in nuclear material processing facilities. The methodology used probabilistic risk assessment (PRA)-related tools as well as information about the chemical reaction characteristics, information on plant design and operational features, and generic data about component failure rates and human error rates. The accident frequency estimates for the specific reaction help to risk-inform the safety review process and assess compliance with regulatory requirements.

  2. Efficient computation of discounted asymmetric information zero-sum stochastic games

    KAUST Repository

    Li, Lichun; Shamma, Jeff S.

    2015-01-01

    In asymmetric information zero-sum games, one player has superior information about the game over the other. Asymmetric information games are particularly relevant for security problems, e.g., where an attacker knows its own skill set or alternatively a system administrator knows the state of its resources. In such settings, the informed player is faced with the tradeoff of exploiting its superior information at the cost of revealing its superior information. This tradeoff is typically addressed through randomization, in an effort to keep the uninformed player informationally off balance. A lingering issue is the explicit computation of such strategies. This paper, building on prior work for repeated games, presents an LP formulation to compute suboptimal strategies for the informed player in discounted asymmetric information stochastic games in which state transitions are not affected by the uninformed player. Furthermore, the paper presents bounds between the security level guaranteed by the sub-optimal strategy and the optimal value. The results are illustrated on a stochastic intrusion detection problem.

  3. Efficient computation of discounted asymmetric information zero-sum stochastic games

    KAUST Repository

    Li, Lichun

    2015-12-15

    In asymmetric information zero-sum games, one player has superior information about the game over the other. Asymmetric information games are particularly relevant for security problems, e.g., where an attacker knows its own skill set or alternatively a system administrator knows the state of its resources. In such settings, the informed player is faced with the tradeoff of exploiting its superior information at the cost of revealing its superior information. This tradeoff is typically addressed through randomization, in an effort to keep the uninformed player informationally off balance. A lingering issue is the explicit computation of such strategies. This paper, building on prior work for repeated games, presents an LP formulation to compute suboptimal strategies for the informed player in discounted asymmetric information stochastic games in which state transitions are not affected by the uninformed player. Furthermore, the paper presents bounds between the security level guaranteed by the sub-optimal strategy and the optimal value. The results are illustrated on a stochastic intrusion detection problem.

  4. 77 FR 22387 - Pipeline Safety: Information Collection Activities, Revision to Gas Transmission and Gathering...

    Science.gov (United States)

    2012-04-13

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2012-0024] Pipeline Safety: Information Collection Activities, Revision to Gas Transmission and Gathering Pipeline Systems Annual Report, Gas Transmission and Gathering Pipeline Systems Incident Report...

  5. 77 FR 58616 - Pipeline Safety: Information Collection Activities, Revision to Gas Transmission and Gathering...

    Science.gov (United States)

    2012-09-21

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2012-0024] Pipeline Safety: Information Collection Activities, Revision to Gas Transmission and Gathering Pipeline Systems Annual Report, Gas Transmission and Gathering Pipeline Systems Incident Report...

  6. 78 FR 47011 - Software Unit Testing for Digital Computer Software Used in Safety Systems of Nuclear Power Plants

    Science.gov (United States)

    2013-08-02

    ... NUCLEAR REGULATORY COMMISSION [NRC-2012-0195] Software Unit Testing for Digital Computer Software... revised regulatory guide (RG), revision 1 of RG 1.171, ``Software Unit Testing for Digital Computer Software Used in Safety Systems of Nuclear Power Plants.'' This RG endorses American National Standards...

  7. 77 FR 50722 - Software Unit Testing for Digital Computer Software Used in Safety Systems of Nuclear Power Plants

    Science.gov (United States)

    2012-08-22

    ... NUCLEAR REGULATORY COMMISSION [NRC-2012-0195] Software Unit Testing for Digital Computer Software...) is issuing for public comment draft regulatory guide (DG), DG-1208, ``Software Unit Testing for Digital Computer Software used in Safety Systems of Nuclear Power Plants.'' The DG-1208 is proposed...

  8. Toward risk assessment 2.0: Safety supervisory control and model-based hazard monitoring for risk-informed safety interventions

    International Nuclear Information System (INIS)

    Favarò, Francesca M.; Saleh, Joseph H.

    2016-01-01

    Probabilistic Risk Assessment (PRA) is a staple in the engineering risk community, and it has become to some extent synonymous with the entire quantitative risk assessment undertaking. Limitations of PRA continue to occupy researchers, and workarounds are often proposed. After a brief review of this literature, we propose to address some of PRA's limitations by developing a novel framework and analytical tools for model-based system safety, or safety supervisory control, to guide safety interventions and support a dynamic approach to risk assessment and accident prevention. Our work shifts the emphasis from the pervading probabilistic mindset in risk assessment toward the notions of danger indices and hazard temporal contingency. The framework and tools here developed are grounded in Control Theory and make use of the state-space formalism in modeling dynamical systems. We show that the use of state variables enables the definition of metrics for accident escalation, termed hazard levels or danger indices, which measure the “proximity” of the system state to adverse events, and we illustrate the development of such indices. Monitoring of the hazard levels provides diagnostic information to support both on-line and off-line safety interventions. For example, we show how the application of the proposed tools to a rejected takeoff scenario provides new insight to support pilots’ go/no-go decisions. Furthermore, we augment the traditional state-space equations with a hazard equation and use the latter to estimate the times at which critical thresholds for the hazard level are (b)reached. This estimation process provides important prognostic information and produces a proxy for a time-to-accident metric or advance notice for an impending adverse event. The ability to estimate these two hazard coordinates, danger index and time-to-accident, offers many possibilities for informing system control strategies and improving accident prevention and risk mitigation

  9. Sodium fast reactor gaps analysis of computer codes and models for accident analysis and reactor safety.

    Energy Technology Data Exchange (ETDEWEB)

    Carbajo, Juan (Oak Ridge National Laboratory, Oak Ridge, TN); Jeong, Hae-Yong (Korea Atomic Energy Research Institute, Daejeon, Korea); Wigeland, Roald (Idaho National Laboratory, Idaho Falls, ID); Corradini, Michael (University of Wisconsin, Madison, WI); Schmidt, Rodney Cannon; Thomas, Justin (Argonne National Laboratory, Argonne, IL); Wei, Tom (Argonne National Laboratory, Argonne, IL); Sofu, Tanju (Argonne National Laboratory, Argonne, IL); Ludewig, Hans (Brookhaven National Laboratory, Upton, NY); Tobita, Yoshiharu (Japan Atomic Energy Agency, Ibaraki-ken, Japan); Ohshima, Hiroyuki (Japan Atomic Energy Agency, Ibaraki-ken, Japan); Serre, Frederic (Centre d' %C3%94etudes nucl%C3%94eaires de Cadarache %3CU%2B2013%3E CEA, France)

    2011-06-01

    This report summarizes the results of an expert-opinion elicitation activity designed to qualitatively assess the status and capabilities of currently available computer codes and models for accident analysis and reactor safety calculations of advanced sodium fast reactors, and identify important gaps. The twelve-member panel consisted of representatives from five U.S. National Laboratories (SNL, ANL, INL, ORNL, and BNL), the University of Wisconsin, the KAERI, the JAEA, and the CEA. The major portion of this elicitation activity occurred during a two-day meeting held on Aug. 10-11, 2010 at Argonne National Laboratory. There were two primary objectives of this work: (1) Identify computer codes currently available for SFR accident analysis and reactor safety calculations; and (2) Assess the status and capability of current US computer codes to adequately model the required accident scenarios and associated phenomena, and identify important gaps. During the review, panel members identified over 60 computer codes that are currently available in the international community to perform different aspects of SFR safety analysis for various event scenarios and accident categories. A brief description of each of these codes together with references (when available) is provided. An adaptation of the Predictive Capability Maturity Model (PCMM) for computational modeling and simulation is described for use in this work. The panel's assessment of the available US codes is presented in the form of nine tables, organized into groups of three for each of three risk categories considered: anticipated operational occurrences (AOOs), design basis accidents (DBA), and beyond design basis accidents (BDBA). A set of summary conclusions are drawn from the results obtained. At the highest level, the panel judged that current US code capabilities are adequate for licensing given reasonable margins, but expressed concern that US code development activities had stagnated and that the

  10. Guaranteed safety information for rising traffic safety at roads main junctions using infrastructure-aided driver-assistance systems; Sichere Information durch infrastrukturgestuetzte Fahrerassistenzsysteme zur Steigerung der Verkehrssicherheit an Strassenknotenpunkten

    Energy Technology Data Exchange (ETDEWEB)

    Wiltschko, T.

    2004-07-01

    Progress of development of driver assistance systems have more and more lead to systems assisting the driver on guidance level. These systems allow direct or indirect driving process contact thus being safety relevant vehicle systems, and their operation requires high safety and reliability standards. To realize the necessary driver assistance, complete collection and interpretation of traffic actions are required and a number of information and information sources has to be integrated, especially in case of traffic situations at junctions in urban areas. The requirements, however, cannot only be reduced to technical reliability of the system and system components but have also to be extended to the information in- and output thus guaranteeing safe operation. This information has to reach the required quality thus avoiding any hazards during the complete time of information use. It is evident that none of the existing models and methods allow a uniform description of information quality of driver assistance systems. The thesis shows a quality concept for description and evaluation of information quality within information processing systems. The quality concept consists of a quality model and an analysing procedure. The quality model is the basis of the quality concept. All types of information are described by a fixed set of quality characteristic, and suitable parameters are used for concretion and quantification. (orig.)

  11. Guidelines for nuclear-power-plant safety-issue prioritization information development

    International Nuclear Information System (INIS)

    Andrews, W.B.; Gallucci, R.H.V.; Konzek, G.J.

    1983-05-01

    This is the second in a series of reports to document the use of a methodology developed by the Pacific Northwest Laboratory to calculate, for prioritization purposes, the risk, dose and cost impacts of implementing resolutions to reactor safety issues. This report contains results of issue-specific analyses for 15 issues. Each issue was considered within the contraints of available information as of September 1982 and two staff-weeks of labor. The results will be referenced, as one consideration in setting priorities for reactor safety issues, in an NRC prioritization report to be published at a future date

  12. 13thInternational Conference on Computer and Information Science

    CERN Document Server

    Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2012

    2013-01-01

    The purpose of the 13th  International Conference on Computer and Information Science (SNPD 2012) held on August 8-10, 2012 in Kyoto, Japan was to bring together researchers and scientists, businessmen and entrepreneurs, teachers and students to discuss the numerous fields of computer science, and to share ideas and information in a meaningful way.  Our conference officers selected the best 17 papers from those papers accepted for presentation at the conference in order to publish them in this volume.  The papers were chosen based on review scores submitted by members of the program committee, and underwent further rounds of rigorous review.   The  conference organizers selected 17 outstanding papers from SNPD 2012, all of which you will find in this volume of Springer’s Studies in Computational Intelligence.

  13. Why consumers behave as they do with respect to food safety and risk information

    DEFF Research Database (Denmark)

    Verbeke, Wim; Frewer, Lynn J.; Scholderer, Joachim

    2007-01-01

    rankings. The aim of this contribution is to provide a better understanding to food risk analysts of why consumers behave as they do with respect to food safety and risk information. This paper presents some cases of seemingly irrational and inconsistent consumer behaviour with respect to food safety...... and risk information and provides explanations for these behaviours based on the nature of the risk and individual psychological processes. Potential solutions for rebuilding consumer confidence in food safety and bridging between lay and expert opinions towards food risks are reviewed. These include......In recent years, it seems that consumers are generally uncertain about the safety and quality of their food and their risk perception differs substantially from that of experts. Hormone and veterinary drug residues in meat persist to occupy a high position in European consumers' food concern...

  14. 78 FR 47015 - Software Requirement Specifications for Digital Computer Software Used in Safety Systems of...

    Science.gov (United States)

    2013-08-02

    ... NUCLEAR REGULATORY COMMISSION [NRC-2012-0195] Software Requirement Specifications for Digital Computer Software Used in Safety Systems of Nuclear Power Plants AGENCY: Nuclear Regulatory Commission... issuing a revised regulatory guide (RG), revision 1 of RG 1.172, ``Software Requirement Specifications for...

  15. Using Active Learning to Identify Health Information Technology Related Patient Safety Events.

    Science.gov (United States)

    Fong, Allan; Howe, Jessica L; Adams, Katharine T; Ratwani, Raj M

    2017-01-18

    The widespread adoption of health information technology (HIT) has led to new patient safety hazards that are often difficult to identify. Patient safety event reports, which are self-reported descriptions of safety hazards, provide one view of potential HIT-related safety events. However, identifying HIT-related reports can be challenging as they are often categorized under other more predominate clinical categories. This challenge of identifying HIT-related reports is exacerbated by the increasing number and complexity of reports which pose challenges to human annotators that must manually review reports. In this paper, we apply active learning techniques to support classification of patient safety event reports as HIT-related. We evaluated different strategies and demonstrated a 30% increase in average precision of a confirmatory sampling strategy over a baseline no active learning approach after 10 learning iterations.

  16. Geo-scientific Information in the Radioactive Waste Management Safety Case Main Messages from the AMIGO Project

    International Nuclear Information System (INIS)

    2010-01-01

    Radioactive waste is associated with all phases of the nuclear fuel cycle as well as the use of radioactive materials in medicine, research and industry. For the most hazardous and long-lived waste, the solution being investigated worldwide is disposal in engineered repositories deep underground. The importance of geo-scientific information in selecting a site for geological disposal has long been recognised, but there has been growing acknowledgement of the broader role of this information in assessing and documenting the safety of disposal. The OECD/NEA Approaches and Methods for Integrating Geological Information in the Safety Case (AMIGO) project has demonstrated that geological data and understanding serve numerous roles in safety cases. The project, which ran from 2002 to 2008, underscored the importance of integrating geo-scientific information in the development of a disposal safety case and increasingly in the overall process of repository development, including, for example, siting decisions and ensuring the practical feasibility of repository layout and engineering. (authors)

  17. 11th International Conference on Computer and Information Science

    CERN Document Server

    Computer and Information 2012

    2012-01-01

    The series "Studies in Computational Intelligence" (SCI) publishes new developments and advances in the various areas of computational intelligence – quickly and with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life science, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems, and hybrid intelligent systems. Critical to both contributors and readers are the short publication time and world-wide distribution - this permits a rapid and broad dissemination of research results.   The purpose of the 11th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2012...

  18. The Development of Computer Code for Safety Injection Tank (SIT) with Fluidic Device(FD) Blowdown Test

    International Nuclear Information System (INIS)

    Lee, Joo Hee; Kim, Tae Han; Choi, Hae Yun; Lee, Kwang Won; Chung, Chang Kyu

    2007-01-01

    Safety Injection Tanks (SITs) with the Fluidic Device (FD) of APR1400 provides a means of rapid reflooding of the core following a large break Loss Of Coolant Accident (LOCA), and keeping it covered until flow from the Safety Injection Pump (SIP) becomes available. A passive FD can provide two operation stages of a safety water injection into the RCS and allow more effective use of borated water in case of LOCA. Once a large break LOCA occurs, the system will deliver a high flow rate of cooling water for a certain period of time, and thereafter, the flow rate is reduced to a lower flow rate. The conventional computer code 'TURTLE' used to simulate the blowdown of OPR1000 SIT can not be directly applied to simulate a blowdown process of the SIT with FD. A new computer code is needed to be developed for the blowdown test evaluation of the APR1400 SIT with FD. Korea Power Engineering Company (KOPEC) has developed a new computer code to analyze the characteristics of the SIT with FD and validated the code through the comparison of the calculation results with the test results obtained by Ulchin 5 and 6 units pre-operational test and VAlve Performance Evaluation Rig (VAPER) tests performed by The Korea Atomic Energy Research Institute (KAERI)

  19. Computational information geometry for image and signal processing

    CERN Document Server

    Critchley, Frank; Dodson, Christopher

    2017-01-01

    This book focuses on the application and development of information geometric methods in the analysis, classification and retrieval of images and signals. It provides introductory chapters to help those new to information geometry and applies the theory to several applications. This area has developed rapidly over recent years, propelled by the major theoretical developments in information geometry, efficient data and image acquisition and the desire to process and interpret large databases of digital information. The book addresses both the transfer of methodology to practitioners involved in database analysis and in its efficient computational implementation.

  20. Building Up an On-Line Plant Information System for the Emergency Response Center of the Hungarian Nuclear Safety Directorate

    International Nuclear Information System (INIS)

    Vegh, Janos; Major, Csaba; Horvath, Csaba; Hozer, Zoltan; Adorjan, Ferenc; Lux, Ivan; Horvath, Kristof

    2002-01-01

    The main design features, services, and human-machine interface characteristics are described of the CERTA VITA on-line plant information system developed and installed by KFKI AEKI at the Nuclear Safety Directorate (NSD) of the Hungarian Atomic Energy Authority (HAEA) in cooperation with experts from the NSD. The Center for Emergency Response, Training, and Analysis (CERTA) located at the headquarters of NSD, Budapest, Hungary, was established in 1997. The center supports the NSD installation, radiological monitoring, and advisory team in case of nuclear emergencies, with appropriate hardware and software for communication, diagnosis, prognosis, and prediction. The vital information transfer and analysis (VITA) system represents an important part of the CERTA, as it provides for the continuous remote inspection of the four VVER-440/V213 units of the Hungarian Paks nuclear power plant (NPP). The on-line information system maintains a continuous data link with the NPP through a managed leased line that connects CERTA to a gateway computer located at the Paks NPP. The present scope of the system is a result of a 4-yr development project: In addition to the basic safety parameter display functions, the VITA system now includes an on-line break parameter estimation module, an extensive training package based on simulated transients, and on-line data transfer capabilities to feed accident diagnosis/analysis codes

  1. A briefing to verification and validation of computer software

    International Nuclear Information System (INIS)

    Zhang Aisen; Xie Yalian

    2012-01-01

    Nowadays, the computer equipment and information processing technology is coming into the engineering of instrument and process control. Owing to its convenient and other advantages, more and more utilities are more than happy to use it. After initial utilization in basic functional controlling, the computer equipment and information processing technology is widely used in safety critical control. Consequently, the people pay more attentions to the quality of computer software. How to assess and ensure its quality are the most concerned problems. The verification and validation technology of computer software are important steps to the quality assurance. (authors)

  2. 78 FR 71036 - Pipeline Safety: Random Drug Testing Rate; Contractor Management Information System Reporting...

    Science.gov (United States)

    2013-11-27

    ... PHMSA-2013-0248] Pipeline Safety: Random Drug Testing Rate; Contractor Management Information System Reporting; and Obtaining Drug and Alcohol Management Information System Sign-In Information AGENCY: Pipeline... Management Information System (MIS) Data; and New Method for Operators to Obtain User Name and Password for...

  3. Guidelines for nuclear power plant safety issue prioritization information development. Supplement 2

    International Nuclear Information System (INIS)

    Andrews, W.B.; Gallucci, R.H.V.; Konzek, G.J.; Heaberlin, S.W.; Fecht, B.A.; Allen, C.H.; Allen, R.D.; Bickford, W.E.; Carbaugh, E.H.; Lewis, J.R.

    1983-12-01

    This is the third in a series of reports to document the use of a methodology developed by the Pacific Northwest Laboratory to calculate, for prioritization purposes, the risk, dose and cost impacts of implementing resolutions to reactor safety issues (NUREG/CR-2800, Andrews et al. 1983). This report contains results of issue-specific analyses for 31 issues. Each issue was considered within the constraints of available information as of summer 1983, and two staff-weeks of labor. The results are referenced, as one consideration in setting priorities for reactor safety issues, in NUREG-0933, A Prioritization of Generic Safety Issues

  4. Improved Flow Modeling in Transient Reactor Safety Analysis Computer Codes

    International Nuclear Information System (INIS)

    Holowach, M.J.; Hochreiter, L.E.; Cheung, F.B.

    2002-01-01

    A method of accounting for fluid-to-fluid shear in between calculational cells over a wide range of flow conditions envisioned in reactor safety studies has been developed such that it may be easily implemented into a computer code such as COBRA-TF for more detailed subchannel analysis. At a given nodal height in the calculational model, equivalent hydraulic diameters are determined for each specific calculational cell using either laminar or turbulent velocity profiles. The velocity profile may be determined from a separate CFD (Computational Fluid Dynamics) analysis, experimental data, or existing semi-empirical relationships. The equivalent hydraulic diameter is then applied to the wall drag force calculation so as to determine the appropriate equivalent fluid-to-fluid shear caused by the wall for each cell based on the input velocity profile. This means of assigning the shear to a specific cell is independent of the actual wetted perimeter and flow area for the calculational cell. The use of this equivalent hydraulic diameter for each cell within a calculational subchannel results in a representative velocity profile which can further increase the accuracy and detail of heat transfer and fluid flow modeling within the subchannel when utilizing a thermal hydraulics systems analysis computer code such as COBRA-TF. Utilizing COBRA-TF with the flow modeling enhancement results in increased accuracy for a coarse-mesh model without the significantly greater computational and time requirements of a full-scale 3D (three-dimensional) transient CFD calculation. (authors)

  5. PWR hybrid computer model for assessing the safety implications of control systems

    International Nuclear Information System (INIS)

    Smith, O.L.; Renier, J.P.; Difilippo, F.C.; Clapp, N.E.; Sozer, A.; Booth, R.S.; Craddick, W.G.; Morris, D.G.

    1986-03-01

    The ORNL study of safety-related aspects of nuclear power plant control systems consists of two interrelated tasks: (1) failure mode and effects analysis (FMEA) that identified single and multiple component failures that might lead to significant plant upsets and (2) computer models that used these failures as initial conditions and traced the dynamic impact on the control system and remainder of the plant. This report describes the simulation of Oconee Unit 1, the first plant analyzed. A first-principles, best-estimate model was developed and implemented on a hybrid computer consisting of AD-4 analog and PDP-10 digital machines. Controls were placed primarily on the analog to use its interactive capability to simulate operator action. 48 refs., 138 figs., 15 tabs

  6. Increase plant safety and reduce cost by implementing risk-informed in-service inspection programs

    International Nuclear Information System (INIS)

    Billington, A.; Monette, P.

    2001-01-01

    The idea behind the program is that it is possible to 'inspect less, but inspect better'. In other words, the risk-informed In-Service Inspection (ISI) process is used to improve the effectiveness of examination of piping components, i.e. concentrate inspection resources and enhance inspection strategies on high safety significant locations, and reduce inspection requirements on others. The Westinghouse Owners Group (WOG) risk-informed ISI process has already been applied for full scope (Millstone 3, Surry 1) and limited scope (Beznau, Ringhals 4, Asco, Turkey Point 3). By examining the high safety significant piping segments for the different fluid piping systems, the total piping core damage frequency is reduced. In addition, more than 80% of the risk associated with potential pressure boundary failures is addressed with the WOG risk-informed ISI process, while typically less that 50% of this same risk is addressed by the current inspection programs. The risk-informed ISI processes are used to improve the effectiveness of inspecting safety-significant piping components, to reduce inspection requirements on other piping components, to evaluate improvements to plant availability and enhanced safety measures, including reduction of personnel radiation exposure, and to reduce overall Operation and Maintenance (O and M) costs while maintaining regulatory compliance. A description of the process as well as benefits from past projects is presented, since the methodology is applicable for WWER plant design. (author)

  7. Increase plant safety and reduce cost by implementing risk-informed In-Service Inspection programs

    International Nuclear Information System (INIS)

    Billington, A.; Monette, P.; Doumont, C.

    2000-01-01

    The idea behind the program is that it is possible to 'inspect less, but inspect better'. In other words, the risk-informed In-Service Inspection (ISI) process is used to improve the effectiveness of examination of piping components, i.e. concentrate inspection resources and enhance inspection strategies on high safety significant locations, and reduce inspection requirements on others. The Westinghouse Owners Group (WOG) risk-informed ISI process has already been applied for full scope (Millstone 3, Surry 1) and limited scope (Beznau, Ringhals 4, Asco, Turkey Point 3). By examining the high safety significant piping segments for the different fluid piping systems, the total piping core damage frequency is reduced. In addition, more than 80% of the risk associated with potential pressure boundary failures is addressed with the WOG risk-informed ISI process, while typically less than 50% of this same risk is addressed by the current inspection programs. The risk-informed ISI processes are used: to improve the effectiveness of inspecting safety-significant piping components; to reduce inspection requirements on other piping components; to evaluate improvements to plant availability and enhanced safety measures, including reduction of personnel radiation exposure; and to reduce overall Operation and Maintenance (O and M) costs while maintaining regulatory compliance. A description of the process as well as benefits of past projects is presented, since the methodology is applicable for VVER plant design. (author)

  8. Radiological Safety Analysis Computer (RSAC) Program Version 7.0 Users’ Manual

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Bradley J Schrader

    2009-03-01

    The Radiological Safety Analysis Computer (RSAC) Program Version 7.0 (RSAC-7) is the newest version of the RSAC legacy code. It calculates the consequences of a release of radionuclides to the atmosphere. A user can generate a fission product inventory from either reactor operating history or a nuclear criticality event. RSAC-7 models the effects of high-efficiency particulate air filters or other cleanup systems and calculates the decay and ingrowth during transport through processes, facilities, and the environment. Doses are calculated for inhalation, air immersion, ground surface, ingestion, and cloud gamma pathways. RSAC-7 can be used as a tool to evaluate accident conditions in emergency response scenarios, radiological sabotage events and to evaluate safety basis accident consequences. This users’ manual contains the mathematical models and operating instructions for RSAC-7. Instructions, screens, and examples are provided to guide the user through the functions provided by RSAC-7. This program was designed for users who are familiar with radiological dose assessment methods.

  9. Radiological Safety Analysis Computer (RSAC) Program Version 7.2 Users’ Manual

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Bradley J Schrader

    2010-10-01

    The Radiological Safety Analysis Computer (RSAC) Program Version 7.2 (RSAC-7) is the newest version of the RSAC legacy code. It calculates the consequences of a release of radionuclides to the atmosphere. A user can generate a fission product inventory from either reactor operating history or a nuclear criticality event. RSAC-7 models the effects of high-efficiency particulate air filters or other cleanup systems and calculates the decay and ingrowth during transport through processes, facilities, and the environment. Doses are calculated for inhalation, air immersion, ground surface, ingestion, and cloud gamma pathways. RSAC-7 can be used as a tool to evaluate accident conditions in emergency response scenarios, radiological sabotage events and to evaluate safety basis accident consequences. This users’ manual contains the mathematical models and operating instructions for RSAC-7. Instructions, screens, and examples are provided to guide the user through the functions provided by RSAC-7. This program was designed for users who are familiar with radiological dose assessment methods.

  10. Radiological Safety Analysis Computer (RSAC) Program Version 7.0 Users Manual

    International Nuclear Information System (INIS)

    Schrader, Bradley J.

    2009-01-01

    The Radiological Safety Analysis Computer (RSAC) Program Version 7.0 (RSAC-7) is the newest version of the RSAC legacy code. It calculates the consequences of a release of radionuclides to the atmosphere. A user can generate a fission product inventory from either reactor operating history or a nuclear criticality event. RSAC-7 models the effects of high-efficiency particulate air filters or other cleanup systems and calculates the decay and ingrowth during transport through processes, facilities, and the environment. Doses are calculated for inhalation, air immersion, ground surface, ingestion, and cloud gamma pathways. RSAC-7 can be used as a tool to evaluate accident conditions in emergency response scenarios, radiological sabotage events and to evaluate safety basis accident consequences. This users manual contains the mathematical models and operating instructions for RSAC-7. Instructions, screens, and examples are provided to guide the user through the functions provided by RSAC-7. This program was designed for users who are familiar with radiological dose assessment methods

  11. Nuclear medicine software: safety aspects

    International Nuclear Information System (INIS)

    Anon.

    1989-01-01

    A brief editorial discusses the safety aspects of nuclear medicine software. Topics covered include some specific features which should be incorporated into a well-written piece of software, some specific points regarding software testing and legal liability if inappropriate medical treatment was initiated as a result of information derived from a piece of clinical apparatus incorporating a malfunctioning computer program. (U.K.)

  12. An approach to the efficient assessment of safety and usability of computer based control systems, VeNuS 2. Global final report

    International Nuclear Information System (INIS)

    Nelke, T.; Dlugosch, C.; Olaverri Monreal, C.; Sachse, K.; Thuering, M.

    2015-01-01

    Prior to the use of computer-based instrumentation and control the evidence of sufficient safety, development methods and the suitability of man-machine interface must be provided. For this purpose, validation methods must be available, if possible supported by appropriate tools. Based on the multitude of the data which has to be taken into account it is important to generate technical documentation, to realize efficient operation and to prevent human based errors. An approach for computer based generation of user manuals for the operation of technical systems was developed in the VeNuS 2 project. A second goal was to develop an approach to evaluate the usability of safety relevant digital human-machine-interfaces (e.g. for nuclear industries). Therefore a software tool has been developed to assess aspects of usability of user interfaces by considering safety-related priorities. Additionally new or well known methods for provision of evidence of sufficient safety and usability for computer based systems shall be developed in a prototyped way.

  13. 78 FR 10200 - Proposed Information Collection; Captive Wildlife Safety Act

    Science.gov (United States)

    2013-02-13

    ... DEPARTMENT OF THE INTERIOR Fish and Wildlife Service [FWS-HQ-LE-2013-N020; FF09L00200-FX-LE12200900000] Proposed Information Collection; Captive Wildlife Safety Act AGENCY: Fish and Wildlife Service, Interior. ACTION: Notice; request for comments. SUMMARY: We (U.S. Fish and Wildlife Service) will ask the...

  14. Decree No 87-137 of 2 March 1987 concerning the High Council for nuclear safety and information

    International Nuclear Information System (INIS)

    1987-01-01

    This Decree amends the Decree of 13th March 1973 setting up a High Council for Nuclear Safety. Its purpose is to widen the terms of reference of the High Council for Nuclear Safety. In addition to its responsibilities as regards the safety of nuclear installations, it is now competent in the field of information. The Council is now charged with informing the media as well as the public not only on questions of safety proper but also on incidents and accidents occurring in nuclear installations. (NEA) [fr

  15. Computer network access to scientific information systems for minority universities

    Science.gov (United States)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  16. Feasibility of a computer-delivered driver safety behavior screening and intervention program initiated during an emergency department visit.

    Science.gov (United States)

    Murphy, Mary; Smith, Lucia; Palma, Anton; Lounsbury, David; Bijur, Polly; Chambers, Paul; Gallagher, E John

    2013-01-01

    Injuries from motor vehicle crashes are a significant public health problem. The emergency department (ED) provides a setting that may be used to screen for behaviors that increase risk for motor vehicle crashes and provide brief interventions to people who might otherwise not have access to screening and intervention. The purpose of the present study was to (1) assess the feasibility of using a computer-assisted screening program to educate ED patients about risky driving behaviors, (2) evaluate patient acceptance of the computer-based traffic safety educational intervention during an ED visit, and (3) assess postintervention changes in risky driving behaviors. Pre/posteducational intervention involving medically stable adult ED patients in a large urban academic ED serving over 100,000 patients annually. Patients completed a self-administered, computer-based program that queried patients on risky driving behaviors (texting, talking, and other forms of distracted driving) and alcohol use. The computer provided patients with educational information on the dangers of these behaviors and data were collected on patient satisfaction with the program. Staff called patients 1 month post-ED visit for a repeat query. One hundred forty-nine patients participated, and 111 completed 1-month follow up (75%); the mean age was 39 (range: 21-70), 59 percent were Hispanic, and 52 percent were male. Ninety-seven percent of patients reported that the program was easy to use and that they were comfortable receiving this education via computer during their ED visit. All driving behaviors significantly decreased in comparison to baseline with the following reductions reported: talking on the phone, 30 percent; aggressive driving, 30 percent; texting while driving, 19 percent; drowsy driving, 16 percent; driving while multitasking, 12 percent; and drinking and driving, 9 percent. Overall, patients were very satisfied receiving educational information about these behaviors via computer

  17. Pesticide Health and Safety Information

    Science.gov (United States)

    Animal Health Safe Use Practices Pest Control Food Safety Low Risk Pesticides Integrated Pest Management directed by the product label. Pesticides may be ingested if stored improperly in food or beverage ; Environment Human Health Animal Health Safe Use Practices Food Safety Environment Air Water Soil Wildlife

  18. 3th IEEE/ACIS International Conference on Computer and Information Science

    CERN Document Server

    2015-01-01

    This edited book presents scientific results of the 13th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014) which was held on June 4-6, 2014 in Taiyuan, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference.  The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 14 of the conference’s most promis...

  19. 10th International Conference on Computing and Information Technology

    CERN Document Server

    Unger, Herwig; Meesad, Phayung

    2014-01-01

    Computer and Information Technology (CIT) are now involved in governmental, industrial, and business domains more than ever. Thus, it is important for CIT personnel to continue academic research to improve technology and its adoption to modern applications. The up-to-date research and technologies must be distributed to researchers and CIT community continuously to aid future development. The 10th International Conference on Computing and Information Technology (IC 2 IT2014) organized by King Mongkut's University of Technology North Bangkok (KMUTNB) and partners provides an exchange of the state of the art and future developments in the two key areas of this process: Computer Networking and Data Mining. Behind the background of the foundation of ASEAN, it becomes clear that efficient languages, business principles and communication methods need to be adapted, unified and especially optimized to gain a maximum benefit to the users and customers of future IT systems.

  20. 77 FR 28602 - Agency Information Collection Activities; Proposed Collection; Comment Request; Early Food Safety...

    Science.gov (United States)

    2012-05-15

    ... appropriate, and other forms of information technology. Early Food Safety Evaluation of New Non-Pesticidal... Evaluation of New Non-Pesticidal Proteins Produced by New Plant Varieties Intended for Food Use AGENCY: Food... for early food safety evaluation of new non-pesticidal proteins produced by new plant varieties...

  1. A soft-contact model for computing safety margins in human prehension.

    Science.gov (United States)

    Singh, Tarkeshwar; Ambike, Satyajit

    2017-10-01

    The soft human digit tip forms contact with grasped objects over a finite area and applies a moment about an axis normal to the area. These moments are important for ensuring stability during precision grasping. However, the contribution of these moments to grasp stability is rarely investigated in prehension studies. The more popular hard-contact model assumes that the digits exert a force vector but no free moment on the grasped object. Many sensorimotor studies use this model and show that humans estimate friction coefficients to scale the normal force to grasp objects stably, i.e. the smoother the surface, the tighter the grasp. The difference between the applied normal force and the minimal normal force needed to prevent slipping is called safety margin and this index is widely used as a measure of grasp planning. Here, we define and quantify safety margin using a more realistic contact model that allows digits to apply both forces and moments. Specifically, we adapt a soft-contact model from robotics and demonstrate that the safety margin thus computed is a more accurate and robust index of grasp planning than its hard-contact variant. Previously, we have used the soft-contact model to propose two indices of grasp planning that show how humans account for the shape and inertial properties of an object. A soft-contact based safety margin offers complementary insights by quantifying how humans may account for surface properties of the object and skin tissue during grasp planning and execution. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. Use of risk information to safety regulation. Reprocessing facilities

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-15

    A procedure of probabilistic risk assessment (PRA) for a reprocessing facility has been under the development aiming to utilize risk information for safety regulations in this project. Activities in the fiscal year 2012 are summarized in the paper. A major activity is a fundamental study on a concept of serious accidents, requirements of serious accident management, and a policy of utilizing risk information for fabrication and reprocessing facilities. Other than the activity a study on release and transport of aerial radioactive materials at a serious accident in a reprocessing facility has been conducted. The outline and results are provided in the chapter 1 and 2 respectively. (author)

  3. Training and qualification program for nuclear criticality safety technical staff. Revision 1

    International Nuclear Information System (INIS)

    Taylor, R.G.; Worley, C.A.

    1997-01-01

    A training and qualification program for nuclear criticality safety technical staff personnel has been developed and implemented. All personnel who are to perform nuclear criticality safety technical work are required to participate in the program. The program includes both general nuclear criticality safety and plant specific knowledge components. Advantage can be taken of previous experience for that knowledge which is portable such as performance of computer calculations. Candidates step through a structured process which exposes them to basic background information, general plant information, and plant specific information which they need to safely and competently perform their jobs. Extensive documentation is generated to demonstrate that candidates have met the standards established for qualification

  4. Clinical Computer Systems Survey (CLICS): learning about health information technology (HIT) in its context of use.

    Science.gov (United States)

    Lichtner, Valentina; Cornford, Tony; Klecun, Ela

    2013-01-01

    Successful health information technology (HIT) implementations need to be informed on the context of use and on users' attitudes. To this end, we developed the CLinical Computer Systems Survey (CLICS) instrument. CLICS reflects a socio-technical view of HIT adoption, and is designed to encompass all members of the clinical team. We used the survey in a large English hospital as part of its internal evaluation of the implementation of an electronic patient record system (EPR). The survey revealed extent and type of use of the EPR; how it related to and integrated with other existing systems; and people's views on its use, usability and emergent safety issues. Significantly, participants really appreciated 'being asked'. They also reminded us of the wider range of administrative roles engaged with EPR. This observation reveals pertinent questions as to our understanding of the boundaries between administrative tasks and clinical medicine - what we propose as the field of 'administrative medicine'.

  5. Computer aided information system for a PWR

    International Nuclear Information System (INIS)

    Vaidian, T.A.; Karmakar, G.; Rajagopal, R.; Shankar, V.; Patil, R.K.

    1994-01-01

    The computer aided information system (CAIS) is designed with a view to improve the performance of the operator. CAIS assists the plant operator in an advisory and support role, thereby reducing the workload level and potential human errors. The CAIS as explained here has been designed for a PWR type KLT- 40 used in Floating Nuclear Power Stations (FNPS). However the underlying philosophy evolved in designing the CAIS can be suitably adopted for other type of nuclear power plants too (BWR, PHWR). Operator information is divided into three broad categories: a) continuously available information b) automatically available information and c) on demand information. Two in number touch screens are provided on the main control panel. One is earmarked for continuously available information and the other is dedicated for automatically available information. Both the screens can be used at the operator's discretion for on-demand information. Automatically available information screen overrides the on-demand information screens. In addition to the above, CAIS has the features of event sequence recording, disturbance recording and information documentation. CAIS design ensures that the operator is not overburdened with excess and unnecessary information, but at the same time adequate and well formatted information is available. (author). 5 refs., 4 figs

  6. High committee for nuclear safety transparency and information. December 18, 2008 meeting

    International Nuclear Information System (INIS)

    2008-12-01

    The high committee for the nuclear safety transparency and information (HCTISN) is an information, consultation and debate authority devoted to the assessment of the risks linked with nuclear activities and to the analysis of their impact on public health, on the environment and on nuclear safety. Each year, the HCTISN organizes several ordinary meetings in order to analyze some specific topics of the moment. This meeting was organized around 6 main topics: 1 - a presentation of nuclear medicine by Prof. Devaux, of its domains of application and the respect of radiation protection rules; 2 - the launching of a working group on the transparency/secrecy problem with nuclear activities; 3 - the elaboration of an environmental radioactivity index by the nuclear safety authority (ASN); 4 - the order addressed to the Cruas nuclear facility for the lack of standardized marking and maintenance of pipes used for the transport of explosive fluids; 5 - the consequences of the blocking of 2 fuel assemblies (out of 157) in the Tricastin reactor core; 6 - the flood at the Tricastin site, its origin and consequences. (J.S.)

  7. Management benefits and safety of computed tomography in patients undergoing extracorporeal membrane oxygenation therapy: experience of a single centre

    International Nuclear Information System (INIS)

    Jepson, S.L.; Harvey, C.; Entwisle, J.J.; Peek, G.J.

    2010-01-01

    Aim: To evaluate the benefits and logistical safety of computed tomography (CT) imaging in patients undergoing extracorporeal membrane oxygenation (ECMO) therapy in a single institution. Materials and methods: Over a period of 25 months, 134 patients (80 neonates, 19 children, and 35 adults) underwent ECMO therapy at this institution. The imaging of these patients was reviewed to identify patients who had undergone CT imaging whilst on ECMO. Patient notes were retrospectively reviewed. CT findings and subsequent decisions were analysed to assess the benefit of CT imaging. Complications arising due to the logistics of performing the scan were analysed to assess the safety of performing CT in ECMO patients. Results: Of 134 patients, 14 (10%) had a total of 15 CT examinations whilst undergoing ECMO therapy. Indications for CT included new neurology, increased respiratory demand, and increasing requirement for high ECMO flows. There were no major complications and two minor complications associated with the logistics of performing a CT examination on an ECMO patient. Significant findings resulted from 73.3% (11/15) of the CT examinations, and in all 15 examinations information was provided that was used in making further management decisions, including, in some cases, withdrawal of ECMO therapy. Conclusion: With an experienced team, CT imaging of patients on ECMO can be performed safely. CT provides valuable information for subsequent management of patients undergoing ECMO therapy.

  8. CAISSE (Computer Aided Information System on Solar Energy) technical manual

    Energy Technology Data Exchange (ETDEWEB)

    Cantelon, P E; Beinhauer, F W

    1979-01-01

    The Computer Aided Information System on Solar Energy (CAISSE) was developed to provide the general public with information on solar energy and its potential uses and costs for domestic consumption. CAISSE is an interactive computing system which illustrates solar heating concepts through the use of 35 mm slides, text displays on a screen and a printed report. The user communicates with the computer by responding to questions about his home and heating requirements through a touch sensitive screen. The CAISSE system contains a solar heating simulation model which calculates the heating load capable of being supplied by a solar heating system and uses this information to illustrate installation costs, fuel savings and a 20 year life-cycle analysis of cost and benefits. The system contains several sets of radiation and weather data for Canada and USA. The selection of one of four collector models is based upon the requirements input during the computer session. Optimistic and pessimistic fuel cost forecasts are made for oil, natural gas, electricity, or propane; and the forecasted fuel cost is made the basis of the life cycle cost evaluation for the solar heating application chosen. This manual is organized so that each section describes one major aspect of the use of solar energy systems to provide energy for domestic consumption. The sources of data and technical information and the method of incorporating them into the CAISSE display system are described in the same order as the computer processing. Each section concludes with a list of future developments that could be included to make CAISSE outputs more regionally specific and more useful to designers. 19 refs., 1 tab.

  9. Effectiveness of transmitting safety-measures information in risk communication of nuclear power generation. Evaluation by the receiver of the messages

    International Nuclear Information System (INIS)

    Matsumoto, Takanobu; Shiomi, Tetsuro

    2004-01-01

    Effectiveness of risk communication were previously discussed through both ''risk information'' and ''benefit information'' of its topics. However, in technical facilities facilities such as nuclear power plant where safeness is an important concern, not only these two aspects but also safety-measures information'' are required. There have been previously no such discussions about risk communication that included ''safety-measures information''. In this report, we investigated general public's view of the difference in effectiveness of risk communication between two cases. In the first case, only ''risk'' and ''benefit information'' were given. In the second case, we added ''safety-measures information'' as well as ''risk'' and benefit information''. Measurement of the effect was performed using a questionnaire. We divided the subjects into two groups. Each group was shown one side of two pamphlets which had information concerning two conditions, and asked how it feels about ''reliance on information'', ''reliance on informer'', ''posture considered with informer'' which are factors in the process of the attitude change that is shown in the paradigm of risk communication (Kinoshita and Kikkawa, (1990)). Prior to this investigation, we identified each subject is position on nuclear power generation. Thus we were able to clarify the effectiveness of each risk communication style depending on each subject is position (approval, neutrality, objection). As a result, we reached the following conclusions: First about ''reliance on information'', where asked whether the contents of a pamphlet would be reliable, it was found that the person negative to nuclear power generation evaluated lower the pamphlet which included ''safety-measures information'' than the other. However, it was found that regardless of the difference in the position towards nuclear power generation, people who read the pamphlet including ''safety-measures information'' evaluated higher ''reliance on

  10. Learners' perceived information overload in online learning via computer-mediated communication

    Directory of Open Access Journals (Sweden)

    Karen L. Murphy

    2011-12-01

    Full Text Available Many studies report information overload as one of the main problems that students encounter in online learning via computer-mediated communication. This study aimed to explore the sources of online students' information overload and offer suggestions for increasing students' cognitive resources for learning. Participants were 12 graduate students from two online courses in the United States. Their learning experiences in both online discussions and on the course website were explored through semi-structured interviews. They also completed a background questionnaire that assessed three constructs that limit learner readiness and are likely to lead to online students' perceived information overload: inadequate prior knowledge, inadequate English proficiency, and lack of technical skills for participating in computer-mediated communications. The findings suggest that varied learner characteristics led some students to be more susceptible than others to information overload. Emerging data-driven risk factors were: lack of efficiency in reading from computer screens, visual and auditory learning preferences, and time constraints. Difficulties associated with students' perceptions of information overload are addressed and implications for course design are offered.

  11. Analysis of the Health Information and Communication System and Cloud Computing

    Directory of Open Access Journals (Sweden)

    Matija Varga

    2015-05-01

    Full Text Available This paper describes an analysis and shows its use in analysing strengths, weaknesses, opportunities and threats (risks within the health care system.The aim is further more to show strengths, weaknesses, opportunities and threats when using cloud computing in the health care system. Cloud computing in medicine is an integral part of telemedicine. Based on the information presented in this paper, employees may identify the advantages and disadvantages of using cloud computing. When introducing new information technologies in the health care business the implementers will encounter numerous problems, such as: the complexity of the existing and the new information system, the costs of maintaining and updating the software, the cost of implementing new modules,a way of protecting the existing data in the database and the data that will be collected in the diagnosis. Using the SWOT analysis this paper evaluates the feasibility and possibility of adopting cloud computing in the health sector to improve health services based on samples (examples from abroad. The intent of cloud computing in medicine is to send data of the patient to the doctor instead of the patient sending it himself/herself.

  12. Efficient improvement of nuclear power plant safety by reorganization of risk-informed safety importance evaluation methods for piping welded portions

    Energy Technology Data Exchange (ETDEWEB)

    Irie, Takashi; Hanafusa, Hidemitsu; Suyama, Takeshi [Institute of Nuclear Safety System, Inc., Mihama, Fukui (Japan); Morota, Hidetsugu; Kojima, Sigeo; Mizuno, Yoshinobu [Computer Software Development Co., Ltd., Tokyo (Japan)

    2002-09-01

    In this work, risk information was used to evaluate the safety importance of piping welded portions which were important for plant operation and maintenance of nuclear power plants. There are two types of risk-informed safety importance evaluation methods, namely the ASME method and the EPRI method. Since both methods have advantages and disadvantages, elements of each method were combined and reorganized. Considerations included whether the degradation mechanisms would be objectively evaluated and whether plant safety would be efficiently improved. The most objective and efficient method was as follows. Piping failure potential is quantitatively and objectively evaluated for failure with probabilistic fracture mechanics (PFM) and for other degradation mechanisms with empirical failure rates, and conditional core damage probability (CCDP) is calculated with PSA. This method reduces the inspected segment numbers to 1/4 of the deterministic method and increases the ratio of risk, which is covered by the inspected segments, to total risk from 80% of the deterministic method to 95%. Piping inspection numbers decreased for safety injection systems that were required the inspections by the deterministic method. Piping inspections were required for part of main feed water and main steam systems that were not required the inspections by the deterministic method. (author)

  13. Computer-based information management system for interventional radiology

    International Nuclear Information System (INIS)

    Forman, B.H.; Silverman, S.G.; Mueller, P.R.; Hahn, P.F.; Papanicolaou, N.; Tung, G.A.; Brink, J.A.; Ferrucci, J.T.

    1989-01-01

    The authors authored and implemented a computer-based information management system (CBIMS) for the integrated analysis of data from a variety of abdominal nonvascular interventional procedures. The CBIMS improved on their initial handwritten-card system (which listed only patient name, hospital number, and type of procedure) by capturing relevant patient data in an organized fashion and integrating information for meaningful analysis. Advantages of CBIMS include enhanced compilation of monthly census, easy access to a patient's interventional history, and flexible querying capability that allows easy extraction of subsets of information from the patient database

  14. Fault-tolerant search algorithms reliable computation with unreliable information

    CERN Document Server

    Cicalese, Ferdinando

    2013-01-01

    Why a book on fault-tolerant search algorithms? Searching is one of the fundamental problems in computer science. Time and again algorithmic and combinatorial issues originally studied in the context of search find application in the most diverse areas of computer science and discrete mathematics. On the other hand, fault-tolerance is a necessary ingredient of computing. Due to their inherent complexity, information systems are naturally prone to errors, which may appear at any level - as imprecisions in the data, bugs in the software, or transient or permanent hardware failures. This book pr

  15. Distributed Information and Control system reliability enhancement by fog-computing concept application

    Science.gov (United States)

    Melnik, E. V.; Klimenko, A. B.; Ivanov, D. Ya

    2018-03-01

    The paper focuses on the information and control system reliability issue. Authors of the current paper propose a new complex approach of information and control system reliability enhancement by application of the computing concept elements. The approach proposed consists of a complex of optimization problems to be solved. These problems are: estimation of computational complexity, which can be shifted to the edge of the network and fog-layer, distribution of computations among the data processing elements and distribution of computations among the sensors. The problems as well as some simulated results and discussion are formulated and presented within this paper.

  16. NCIS: a nuclear criticality information system

    International Nuclear Information System (INIS)

    Koponen, B.L.; Hampel, V.E.

    1984-01-01

    The NCIS is one of the developments carried out to meet the requirements in the field of criticality safety information. Its primary goal is to enhance nuclear criticality safety by dissemination of data, standards, and training material. This paper presents the ''NCIS'' progess since 1950: computer-searching, database management, nuclear critical experiments bibliography. American Nuclear Society transactions criticality safety publications compilation, edition of a personnel directory representing over 140 organizations located in 16 countries and showing a wide range of specialists involved in the field of nuclear criticality safety. The NCIS uses the information management and communication resources of TIS (Technology Information System): automated access procedures; creation of program-dependent information systems; communications. The NCIS is still in a growing, formative stage; it has concentrated first on collecting and organizing the nuclear criticality literature; nuclear critical data, calculational tools, standards, and training materials will follow. Finally the planned and contemplated resources are dealt with: expansion of bibliographic compilations; news database; fundamental criticality safety reference; criticality benchmarck database; user community; training resources; related resources; criticality accident database; dynamic databook; dynamic textbook; expert knowledge system; and, extraction of intelligence

  17. 76 FR 20051 - Advisory Committee for Computer and Information; Science and Engineering; Notice of Meeting

    Science.gov (United States)

    2011-04-11

    ... NATIONAL SCIENCE FOUNDATION Advisory Committee for Computer and Information; Science and... Committee for Computer and Information Science and Engineering--(1115). Date and Time: May 6, 2011 8:30 a.m... Meeting: Open. Contact Person: Carmen Whitson, Directorate for Computer and Information, Science and...

  18. 76 FR 61118 - Advisory Committee for Computer and Information Science and Engineering; Notice of Meeting

    Science.gov (United States)

    2011-10-03

    ... NATIONAL SCIENCE FOUNDATION Advisory Committee for Computer and Information Science and... Computer and Information Science and Engineering (1115). Date and Time: November 1, 2011 from 12 p.m.-5:30... Computer and Information Science and Engineering, National Science Foundation, 4201 Wilson Blvd., Suite...

  19. Status of SACRD: a data base for fast reactor safety computer codes

    International Nuclear Information System (INIS)

    Greene, N.M.; Flanagan, G.F.; Alter, H.

    1982-01-01

    In 1975 work was initiated to provide a central computerized data collection of evaluated data for use in fast reactor safety computer codes. This data base is called SACRD and is intended to encompass handbook and other nonproblem-dependent data related to LMFBR's, especially at extreme conditions where little or no experimental data are available. Version 1 of the data base was released in the latter part of 1978 and remained the standard version until Version 81, which was released in October 1981

  20. DART - for design basis justification and safety related information management

    International Nuclear Information System (INIS)

    Billington, A.; Blondiaux, P.; Boucau, J.; Cantineau, B.; Doumont, C.; Mared, A.

    2000-01-01

    DART is the acronym for Design Analysis Re-engineering Tool. It embodies a systematic and integrated approach to NPP safety re-assessment and configuration management, that makes use of Reverse Failure Mode and Effect Analysis in conjunction with a state-of-the-art relational database and a standardized data format, to permit long-term management of plant safety related information. The plant design is reviewed in a step-by-step logical fashion by constructing fault trees that identify the link between undesired consequences and their causes. Each failure cause identified in a fault tree is addressed by defining functional requirements, which are in turn addressed by documenting the specific manner in which the plant complies with the requirement. The database can be used to generate up-to-date plant safety related documents, including: SAR, Systems Descriptions, Technical Specifications and plant procedures. The approach is open-minded by nature and therefore is not regulatory driven, however the plant licensing basis will also be reviewed and documented within the same database such that a Regulatory Conformance Program may be integrated with the other safety documentation. This methodology can thus reconstitute the plant design bases in a comprehensive and systematic way, while allowing to uncover weaknesses in design. The original feature of the DART methodology is that it links all the safety related documents together, facilitating the evaluation of the safety impact resulting from any plant modification. Due to its capability to retrieve the basic justifications of the plant design, it is also a useful tool for training the young generation of plant personnel. The DART methodology has been developed for application to units 2, 3 and 4 at Vattenfall's Ringhals site in Sweden. It may be applied to any nuclear power plant or industrial facility where public safety is a concern. (author)

  1. DART - for design basis justification and safety related information management

    International Nuclear Information System (INIS)

    Billington, A.; Blondiaux, B.; Boucau, J.; Cantineau, B.; Mared, A.

    2001-01-01

    DART is the acronym for Design Analysis Re-Engineering Tool. It embodies a systematic and integrated approach to NPP safety re-assessment and configuration management, that makes use of Reverse Failure Mode and Effect Analysis in conjunction with a state-of-the-art relational database and a standardized data format, to permit long-term management of plant safety related information. The plant design is reviewed in a step-by-step logical fashion by constructing fault trees that identify the link between undesired consequences and their causes. Each failure cause identified in a fault tree is addressed by defining functional requirements, which are in turn addressed by documenting the specific manner in which the plant complies with the requirement. The database can then be used to generate up-to-date plant safety related documents, including: SAR, Systems Descriptions, Technical Specifications and plant procedures. The approach is open-minded by nature and therefore is not regulatory driven, however the plant licensing basis will also be reviewed and documented within the same database such that a Regulatory Conformance Program may be integrated with the other safety documentation. This methodology can thus reconstitute the plant design bases in a comprehensive and systematic way, while allowing to uncover weaknesses in design. The original feature of the DART methodology is that it links all the safety related documents together, facilitating the evaluation of the safety impact resulting from any plant modification. Due to its capability to retrieve the basic justifications of the plant design, it is also a useful tool for training the young generation of plant personnel. The DART methodology has been developed for application to units 2, 3 and 4 at Vattenfall's Ringhals site in Sweden. It may be applied to any nuclear power plant or industrial facility where public safety is a concern. (author)

  2. Information System Hazard Analysis: A Method for Identifying Technology-induced Latent Errors for Safety.

    Science.gov (United States)

    Weber, Jens H; Mason-Blakley, Fieran; Price, Morgan

    2015-01-01

    Many health information and communication technologies (ICT) are safety-critical; moreover, reports of technology-induced adverse events related to them are plentiful in the literature. Despite repeated criticism and calls to action, recent data collected by the Institute of Medicine (IOM) and other organization do not indicate significant improvements with respect to the safety of health ICT systems. A large part of the industry still operates on a reactive "break & patch" model; the application of pro-active, systematic hazard analysis methods for engineering ICT that produce "safe by design" products is sparse. This paper applies one such method: Information System Hazard Analysis (ISHA). ISHA adapts and combines hazard analysis techniques from other safety-critical domains and customizes them for ICT. We provide an overview of the steps involved in ISHA and describe.

  3. The use of information technology to enhance patient safety and nursing efficiency.

    Science.gov (United States)

    Lee, Tso-Ying; Sun, Gi-Tseng; Kou, Li-Tseng; Yeh, Mei-Ling

    2017-10-23

    Issues in patient safety and nursing efficiency have long been of concern. Advancing the role of nursing informatics is seen as the best way to address this. The aim of this study was to determine if the use, outcomes and satisfaction with a nursing information system (NIS) improved patient safety and the quality of nursing care in a hospital in Taiwan. This study adopts a quasi-experimental design. Nurses and patients were surveyed by questionnaire and data retrieval before and after the implementation of NIS in terms of blood drawing, nursing process, drug administration, bar code scanning, shift handover, and information and communication integration. Physiologic values were easier to read and interpret; it took less time to complete electronic records (3.7 vs. 9.1 min); the number of errors in drug administration was reduced (0.08% vs. 0.39%); bar codes reduced the number of errors in blood drawing (0 vs. 10) and transportation of specimens (0 vs. 0.42%); satisfaction with electronic shift handover increased significantly; there was a reduction in nursing turnover (14.9% vs. 16%); patient satisfaction increased significantly (3.46 vs. 3.34). Introduction of NIS improved patient safety and nursing efficiency and increased nurse and patient satisfaction. Medical organizations must continually improve the nursing information system if they are to provide patients with high quality service in a competitive environment.

  4. High committee for nuclear safety transparency and information. October 8, 2009 meeting

    International Nuclear Information System (INIS)

    2009-10-01

    The high committee for the nuclear safety transparency and information (HCTISN) is an information, consultation and debate authority devoted to the assessment of the risks linked with nuclear activities and to the analysis of their impact on public health, on the environment and on nuclear safety. Each year, the HCTISN organizes several ordinary meetings in order to analyze some specific topics of the moment. This meeting was organized around 3 main points: 1 - the progress of the different working groups work: elaboration of a communication scale, comparable to the INES scale, for the evaluation of environmental radioactivity, the realisation of a web site for the HCTISN, the question of transparency and secrecy around the maritime transportation of radioactive materials after the visit by the High Committee of two ships from the British INS company; 2 - the management of radioactive wastes with the concept of storage reversibility: political, technical and decisional aspects, position of the National Evaluation Committee for the researches and studies relative to radioactive materials and wastes management (CNE), position of the ANCLI (French national association of local information commissions), debate; 3 - the shortage of radio-physicists in France and the information of populations and patients (declaration of incidents). Some miscellaneous points are reported as well: the first draft of the first annual report of the HCTISN, development of a societal approach for the research programs of the French institute of radiation protection and nuclear safety (IRSN), validation of a collaboration proposal with the ANCLI. (J.S.)

  5. New enhancements to SCALE for criticality safety analysis

    International Nuclear Information System (INIS)

    Hollenbach, D.F.; Bowman, S.M.; Petrie, L.M.; Parks, C.V.

    1995-01-01

    As the speed, available memory, and reliability of computer hardware increases and the cost decreases, the complexity and usability of computer software will increase, taking advantage of the new hardware capabilities. Computer programs today must be more flexible and user friendly than those of the past. Within available resources, the SCALE staff at Oak Ridge National Laboratory (ORNL) is committed to upgrading its computer codes to keep pace with the current level of technology. This paper examines recent additions and enhancements to the criticality safety analysis sections of the SCALE code package. These recent additions and enhancements made to SCALE can be divided into nine categories: (1) new analytical computer codes, (2) new cross-section libraries, (3) new criticality search sequences, (4) enhanced graphical capabilities, (5) additional KENO enhancements, (6) enhanced resonance processing capabilities, (7) enhanced material information processing capabilities, (8) portability of the SCALE code package, and (9) other minor enhancements, modifications, and corrections to SCALE. Each of these additions and enhancements to the criticality safety analysis capabilities of the SCALE code system are discussed below

  6. A comparative review of patient safety initiatives for national health information technology

    DEFF Research Database (Denmark)

    Magrabi, Farah; Aarts, Jos; Nøhr, Christian

    2013-01-01

    OBJECTIVE: To collect and critically review patient safety initiatives for health information technology (HIT). METHOD: Publicly promulgated set of advisories, recommendations, guidelines, or standards potentially addressing safe system design, build, implementation or use were identified...... by searching the websites of regional and national agencies and programmes in a non-exhaustive set of exemplar countries including England, Denmark, the Netherlands, the USA, Canada and Australia. Initiatives were categorised by type and software systems covered. RESULTS: We found 27 patient safety initiatives...... were aimed at certification in the USA, Canada and Australia. Safety is addressed alongside interoperability in the Australian certification programme but it is not explicitly addressed in the US and Canadian programmes, though conformance with specific functionality, interoperability, security...

  7. The electronic security partnership of safety/security and information systems departments.

    Science.gov (United States)

    Yow, J Art

    2012-01-01

    The ever-changing world of security electronics is reviewed in this article. The author focuses on its usage in a hospital setting and the need for safety/security and information systems departments to work together to protect and get full value from IP systems.

  8. Analysis on the security of cloud computing

    Science.gov (United States)

    He, Zhonglin; He, Yuhua

    2011-02-01

    Cloud computing is a new technology, which is the fusion of computer technology and Internet development. It will lead the revolution of IT and information field. However, in cloud computing data and application software is stored at large data centers, and the management of data and service is not completely trustable, resulting in safety problems, which is the difficult point to improve the quality of cloud service. This paper briefly introduces the concept of cloud computing. Considering the characteristics of cloud computing, it constructs the security architecture of cloud computing. At the same time, with an eye toward the security threats cloud computing faces, several corresponding strategies are provided from the aspect of cloud computing users and service providers.

  9. 14 CFR 193.5 - How may I submit safety or security information and have it protected from disclosure?

    Science.gov (United States)

    2010-01-01

    ... SUBMITTED INFORMATION § 193.5 How may I submit safety or security information and have it protected from... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false How may I submit safety or security information and have it protected from disclosure? 193.5 Section 193.5 Aeronautics and Space FEDERAL AVIATION...

  10. Patient and nurse safety: how information technology makes a difference.

    Science.gov (United States)

    Simpson, Roy L

    2005-01-01

    The Institute of Medicine's landmark report asserted medical error is seldom the fault of individuals, but the result of faulty healthcare policy/procedure systems. Numerous studies have shown that information technology can shore up weak systems. For nursing, information technology plays a key role in protecting patients by eliminating nursing mistakes and protecting nurses by reducing their negative exposure. However, managing information technology is a function of managing the people who use it. This article examines critical issues that impact patient and nurse safety, both physical and professional. It discusses the importance of eliminating the culture of blame, the requirements of process change, how to implement technology in harmony with the organization and the significance of vision.

  11. 78 FR 57839 - Request for Information on Computer Security Incident Coordination (CSIC)

    Science.gov (United States)

    2013-09-20

    ...-02] Request for Information on Computer Security Incident Coordination (CSIC) AGENCY: National... Computer Security Incident Coordination. NIST experienced technical difficulties with receiving email... Technology (NIST) announced that it was soliciting comments relating to Computer Security Incident...

  12. A framework of risk-informed seismic safety evaluation of nuclear power plants in Japan

    International Nuclear Information System (INIS)

    Kondo, S.; Sakagami, M.; Hirano, M.; Shiba, M.

    2001-01-01

    A framework of risk-informed seismic design and safety evaluation of nuclear power plants is under consideration in Japan so as to utilize the progress in the seismic probabilistic safety assessment methodology. Issues resolved to introduce this framework are discussed after the concept, evaluation process and characteristics of the framework are described. (author)

  13. 75 FR 11988 - Notice of Request for Approval To Collect New Information: Collection of Safety Culture Data

    Science.gov (United States)

    2010-03-12

    ..., information about changes to the safety culture of the affected workplaces will be used as one of several data...: RITA-2008-0002] Notice of Request for Approval To Collect New Information: Collection of Safety Culture.... mail to Federal offices in Washington, DC, we recommend that persons consider an alternative method...

  14. Department of Energy: MICS (Mathematical Information, and Computational Sciences Division). High performance computing and communications program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-06-01

    This document is intended to serve two purposes. Its first purpose is that of a program status report of the considerable progress that the Department of Energy (DOE) has made since 1993, the time of the last such report (DOE/ER-0536, {open_quotes}The DOE Program in HPCC{close_quotes}), toward achieving the goals of the High Performance Computing and Communications (HPCC) Program. The second purpose is that of a summary report of the many research programs administered by the Mathematical, Information, and Computational Sciences (MICS) Division of the Office of Energy Research under the auspices of the HPCC Program and to provide, wherever relevant, easy access to pertinent information about MICS-Division activities via universal resource locators (URLs) on the World Wide Web (WWW). The information pointed to by the URL is updated frequently, and the interested reader is urged to access the WWW for the latest information.

  15. Research on advanced system safety assessment procedures (4)

    International Nuclear Information System (INIS)

    Suzuki, Kazuhiko; Shimada, Yukiyasu

    2001-03-01

    The past research reports in the area of safety engineering proposed the Computer-aided HAZOP system to be applied to Nuclear Reprocessing Facilities. Automated HAZOP system has great advantage compared with human analysts in terms of accuracy of the results, and time required to conduct HAZOP studies. This report surveys the literature on risk assessment and safety design based on the concept of independent protection layers (IPLs). Furthermore, to improve HAZOP System, tool is proposed to construct the basic model and the internal state model. Such HAZOP system is applied to analyze two kinds of processes, where the ability of the proposed system is verified. In addition, risk assessment support system is proposed to integrate safety design environment and assessment result to be used by other plants as well as to enable the underline plant to use other plants' information. This technique can be implemented using web-based safety information systems. (author)

  16. Summary of researches being performed in the Institute of Mathematics and Computer Science on computer science and information technologies

    Directory of Open Access Journals (Sweden)

    Artiom Alhazov

    2008-07-01

    Full Text Available Evolution of the informatization notion (which assumes automation of majority of human activities applying computers, computer networks, information technologies towards the notion of {\\it Global Information Society} (GIS challenges the determination of new paradigms of society: automation and intellectualization of production, new level of education and teaching, formation of new styles of work, active participation in decision making, etc. To assure transition to GIS for any society, including that from Republic of Moldova, requires both special training and broad application of progressive technologies and information systems. Methodological aspects concerning impact of GIS creation over the citizen, economic unit, national economy in the aggregate demands a profound study. Without systematic approach to these aspects the GIS creation would have confront great difficulties. Collective of researchers from the Institute of Mathematics and Computer Science (IMCS of Academy of Sciences of Moldova, which work in the field of computer science, constitutes the center of advanced researches and activates in those directions of researches of computer science which facilitate technologies and applications without of which the development of GIS cannot be assured.

  17. Annual progress report FY 1977. [Computer calculations of light water reactor dynamics and safety

    Energy Technology Data Exchange (ETDEWEB)

    Hansen, K.F.; Henry, A.F.

    1977-07-01

    Progress is summarized in a project directed toward development of numerical methods suitable for the computer solution of problems in reactor dynamics and safety. Specific areas of research include methods of integration of the time-dependent diffusion equations by finite difference and finite element methods; representation of reactor properties by various homogenization procedures; application of synthesis methods; and development of response matrix techniques.

  18. The Study of Pallet Pooling Information Platform Based on Cloud Computing

    Directory of Open Access Journals (Sweden)

    Jia-bin Li

    2018-01-01

    Full Text Available Effective implementation of pallet pooling system needs a strong information platform to support. Through the analysis of existing pallet pooling information platform (PPIP, the paper pointed out that the existing studies of PPIP are mainly based on traditional IT infrastructures and technologies which have software, hardware, resource utilization, and process restrictions. Because of the advantages of cloud computing technology like strong computing power, high flexibility, and low cost which meet the requirements of the PPIP well, this paper gave a PPIP architecture of two parts based on cloud computing: the users client and the cloud services. The cloud services include three layers, which are IaaS, PaaS, and SaaS. The method of how to deploy PPIP based on cloud computing is proposed finally.

  19. The SCALE Web site: Resources for the worldwide nuclear criticality safety community

    International Nuclear Information System (INIS)

    Bowman, S.M.

    2000-01-01

    The Standardized Computer Analyses for Licensing Evaluations (SCALE) computer software system developed at Oak Ridge National Laboratory (ORNL) is widely used and accepted around the world for criticality safety analyses. SCALE includes the well-known KENO V.a and KENO VI three-dimensional Monte Carlo criticality computer codes. For several years, the SCALE staff at ORNL has maintained a Web site to provide information and support to sponsors and users in the worldwide criticality safety community. The SCALE WEB site is located at www.cped.ornl.gov/scale and provides information in the following areas: 1. important notices to users; 2. SCALE Users Electronic Notebook; 3. current and past issues of the SCALE Newsletter; 4. verification and validation (V and V) and benchmark reports; 5. download updates, utilities, and V and V input files; 6. SCALE training course information; 7. SCALE Manual on-line; 8. overview of SCALE system; 9. how to install and run SCALE; 10. SCALE quality assurance documents; and 11. nuclear resources on the Internet

  20. Selective Bibliography on the History of Computing and Information Processing.

    Science.gov (United States)

    Aspray, William

    1982-01-01

    Lists some of the better-known and more accessible books on the history of computing and information processing, covering: (1) popular general works; (2) more technical general works; (3) microelectronics and computing; (4) artificial intelligence and robotics; (5) works relating to Charles Babbage; (6) other biographical and personal accounts;…

  1. Enabling social listening for cardiac safety monitoring: Proceedings from a drug information association-cardiac safety research consortium cosponsored think tank.

    Science.gov (United States)

    Seifert, Harry A; Malik, Raleigh E; Bhattacharya, Mondira; Campbell, Kevin R; Okun, Sally; Pierce, Carrie; Terkowitz, Jeffrey; Turner, J Rick; Krucoff, Mitchell W; Powell, Gregory E

    2017-12-01

    This white paper provides a summary of the presentations and discussions from a think tank on "Enabling Social Listening for Cardiac Safety Monitoring" trials that was cosponsored by the Drug Information Association and the Cardiac Safety Research Consortium, and held at the White Oak headquarters of the US Food and Drug Administration on June 3, 2016. The meeting's goals were to explore current methods of collecting and evaluating social listening data and to consider their applicability to cardiac safety surveillance. Social listening is defined as the act of monitoring public postings on the Internet. It has several theoretical advantages for drug and device safety. First, these include the ability to detect adverse events that are "missed" by traditional sources and the ability to detect adverse events sooner than would be allowed by traditional sources, both by affording near-real-time access to data from culturally and geographically diverse sources. Social listening can also potentially introduce a novel patient voice into the conversation about drug safety, which could uniquely augment understanding of real-world medication use obtained from more traditional methodologies. Finally, it can allow for access to information about drug misuse and diversion. To date, the latter 2 of these have been realized. Although regulators from the Food and Drug Administration and the United Kingdom's Medicines and Healthcare Products Regulatory Agency participated in the think tank along with representatives from industry, academia, and patient groups, this article should not be construed to constitute regulatory guidance. Copyright © 2017 Elsevier Inc. All rights reserved.

  2. The Information Science Experiment System - The computer for science experiments in space

    Science.gov (United States)

    Foudriat, Edwin C.; Husson, Charles

    1989-01-01

    The concept of the Information Science Experiment System (ISES), potential experiments, and system requirements are reviewed. The ISES is conceived as a computer resource in space whose aim is to assist computer, earth, and space science experiments, to develop and demonstrate new information processing concepts, and to provide an experiment base for developing new information technology for use in space systems. The discussion covers system hardware and architecture, operating system software, the user interface, and the ground communication link.

  3. Insights from an international stakeholder consultation to identify informational needs related to seafood safety

    Energy Technology Data Exchange (ETDEWEB)

    Tediosi, Alice, E-mail: alice.tediosi@aeiforia.eu [Aeiforia Srl, 29027 Gariga di Podenzano (PC) (Italy); Fait, Gabriella [Aeiforia Srl, 29027 Gariga di Podenzano (PC) (Italy); Jacobs, Silke [Department of Public Health, Ghent University, 9000 Ghent (Belgium); Department of Agricultural Economics, Ghent University, 9000 Ghent (Belgium); Verbeke, Wim [Department of Agricultural Economics, Ghent University, 9000 Ghent (Belgium); Álvarez-Muñoz, Diana [Catalan Institute for Water Research (ICRA), Parc Científic i Tecnològic de la Universitat de Girona, 17003 Girona (Spain); Diogene, Jorge [IRTA, 43540 Sant Carles de la Ràpita (Spain); Reuver, Marieke [AquaTT, Dublin 2 (Ireland); Marques, António [Division of Aquaculture and Upgrading (DivAV), Portuguese Institute for the Sea and Atmosphere (IPMA), 1449-006 Lisbon (Portugal); Capri, Ettore [Università Cattolica del Sacro Cuore, 29122 Piacenza (Italy)

    2015-11-15

    Food safety assessment and communication have a strong importance in reducing human health risks related to food consumption. The research carried out within the ECsafeSEAFOOD project aims to assess seafood safety issues, mainly related to non-regulated priority environmental contaminants, and to evaluate their impact on public health. In order to make the research results accessible and exploitable, and to respond to actual stakeholders' demands, a consultation with international stakeholders was performed by means of a survey. The focus was on policy and decision makers, food producers and processors, and agencies (i.e. EU and National or Regional agencies related to Food Safety or Public Health) and consumer organisations. The survey considered questions related to: seafood safety assessment and mitigation strategies, availability of data, such as the level of information on different contaminants, and communication among different stakeholder groups. Furthermore, stakeholders were asked to give their opinion on how they believe consumers perceive risks associated with environmental contaminants. The survey was distributed to 531 key stakeholders and 91 responses were received from stakeholders from 30 EU and non-EU countries. The main results show that communication between different groups of stakeholders needs to be improved and that there is a deficit of information and data in the field of seafood safety. This pertains mainly to the transfer of contaminants between the environment and seafood, and to the diversity of environmental contaminants such as plastic additives, algal toxins and hormones. On-line tools were perceived to be the most useful communication channel. - Highlights: • We consulted stakeholders to identify their needs about seafood safety. • An on-line survey was prepared and sent to gather stakeholders' opinions. • Communication among stakeholders needs to be improved. • There is a deficit of information and data in the

  4. Insights from an international stakeholder consultation to identify informational needs related to seafood safety

    International Nuclear Information System (INIS)

    Tediosi, Alice; Fait, Gabriella; Jacobs, Silke; Verbeke, Wim; Álvarez-Muñoz, Diana; Diogene, Jorge; Reuver, Marieke; Marques, António; Capri, Ettore

    2015-01-01

    Food safety assessment and communication have a strong importance in reducing human health risks related to food consumption. The research carried out within the ECsafeSEAFOOD project aims to assess seafood safety issues, mainly related to non-regulated priority environmental contaminants, and to evaluate their impact on public health. In order to make the research results accessible and exploitable, and to respond to actual stakeholders' demands, a consultation with international stakeholders was performed by means of a survey. The focus was on policy and decision makers, food producers and processors, and agencies (i.e. EU and National or Regional agencies related to Food Safety or Public Health) and consumer organisations. The survey considered questions related to: seafood safety assessment and mitigation strategies, availability of data, such as the level of information on different contaminants, and communication among different stakeholder groups. Furthermore, stakeholders were asked to give their opinion on how they believe consumers perceive risks associated with environmental contaminants. The survey was distributed to 531 key stakeholders and 91 responses were received from stakeholders from 30 EU and non-EU countries. The main results show that communication between different groups of stakeholders needs to be improved and that there is a deficit of information and data in the field of seafood safety. This pertains mainly to the transfer of contaminants between the environment and seafood, and to the diversity of environmental contaminants such as plastic additives, algal toxins and hormones. On-line tools were perceived to be the most useful communication channel. - Highlights: • We consulted stakeholders to identify their needs about seafood safety. • An on-line survey was prepared and sent to gather stakeholders' opinions. • Communication among stakeholders needs to be improved. • There is a deficit of information and data in the field of

  5. A Computer-Based System Integrating Instruction and Information Retrieval: A Description of Some Methodological Considerations.

    Science.gov (United States)

    Selig, Judith A.; And Others

    This report, summarizing the activities of the Vision Information Center (VIC) in the field of computer-assisted instruction from December, 1966 to August, 1967, describes the methodology used to load a large body of information--a programed text on basic opthalmology--onto a computer for subsequent information retrieval and computer-assisted…

  6. A Study of the Programming Languages Used in Information Systems and in Computer Science Curricula

    Science.gov (United States)

    Russell, Jack; Russell, Barbara; Pollacia, Lissa F.; Tastle, William J.

    2010-01-01

    This paper researches the computer languages taught in the first, second and third programming courses in Computer Information Systems (CIS), Management Information Systems (MIS or IS) curricula as well as in Computer Science (CS) and Information Technology (IT) curricula. Instructors teaching the first course in programming within a four year…

  7. Proceedings of the US Nuclear Regulatory Commission twentieth water reactor safety information meeting

    International Nuclear Information System (INIS)

    Weiss, A.J.

    1993-03-01

    This three-volume report contains papers presented at the Twentieth Water Reactor Safety Information Meeting held at the Bethesda Marriott Hotel, Bethesda, Maryland, during the week of October 21--23, 1992. The papers describe progress and results of programs in nuclear safety research conducted in this country and abroad. Foreign participation in the meeting included 10 different papers presented by researchersfrom CEC, China, Finland, France, Germany, Japan, Spain and Taiwan

  8. INFORMATION DISPLAY: CONSIDERATIONS FOR DESIGNING COMPUTER-BASED DISPLAY SYSTEMS

    International Nuclear Information System (INIS)

    O'HARA, J.M.; PIRUS, D.; BELTRATCCHI, L.

    2004-01-01

    This paper discussed the presentation of information in computer-based control rooms. Issues associated with the typical displays currently in use are discussed. It is concluded that these displays should be augmented with new displays designed to better meet the information needs of plant personnel and to minimize the need for interface management tasks (the activities personnel have to do to access and organize the information they need). Several approaches to information design are discussed, specifically addressing: (1) monitoring, detection, and situation assessment; (2) routine task performance; and (3) teamwork, crew coordination, collaborative work

  9. Survivorship Care Plan Information Needs: Perspectives of Safety-Net Breast Cancer Patients.

    Science.gov (United States)

    Burke, Nancy J; Napoles, Tessa M; Banks, Priscilla J; Orenstein, Fern S; Luce, Judith A; Joseph, Galen

    2016-01-01

    Despite the Institute of Medicine's (IOM) 2005 recommendation, few care organizations have instituted standard survivorship care plans (SCPs). Low health literacy and low English proficiency are important factors to consider in SCP development. Our study aimed to identify information needs and survivorship care plan preferences of low literacy, multi-lingual patients to support the transition from oncology to primary care and ongoing learning in survivorship. We conducted focus groups in five languages with African American, Latina, Russian, Filipina, White, and Chinese medically underserved breast cancer patients. Topics explored included the transition to primary care, access to information, knowledge of treatment history, and perspectives on SCPs. Analysis of focus group data identified three themes: 1) the need for information and education on the transition between "active treatment" and "survivorship"; 2) information needed (and often not obtained) from providers; and 3) perspectives on SCP content and delivery. Our data point to the need to develop a process as well as written information for medically underserved breast cancer patients. An SCP document will not replace direct communication with providers about treatment, symptom management and transition, a communication that is missing in participating safety-net patients' experiences of cancer care. Women turned to peer support and community-based organizations in the absence of information from providers. "Clear and effective" communication of survivorship care for safety-net patients requires dedicated staff trained to address wide-ranging information needs and uncertainties.

  10. Information Management system of the safety regulatory requirements and guidance for the Korea next generation reactors

    International Nuclear Information System (INIS)

    Yun, Y. C.; Lee, J. H.; Lee, H. C.; Lee, J. S.

    2000-01-01

    In order to achieve the safety of the Korea Next Generation Reactors (KNGR), the Korea Institute of Nuclear Safety has carried out the Safety and Regulatory Requirements and Guidance (SRRG) development program from 1992 such as establishment of the SRRG hierarchy, development of technical requirements and guidance, and consideration of new licensing system. The SRRG hierarchy for the KNGR was consisted of five tiers; Safety Objectives, Safety Principles, General Safety Criteria, Specific Safety Requirements and Safety Regulatory Guides. The developed SRRG have been compared the criteria in 10CFR and Reg. Guide in the U.S.A and the IAEA documents for assuring internationally acceptable level of the SRRG. To improve the efficiency and accuracy of SRRG development, the construction of database system was required in the course of development. Therefore, the Information Management System of SRRG for the KNGR has been developed which enables developers to quickly and accurately seek and systematically manage whole contexts of the SRRG, reference requirements, and current atomic energy regulation rules. Moreover, through homepage whose URL is 'http://kngr.kins.re.kr', the concerned persons and public can acquire the information related with SRRG and KNGR project, and post his/her thought to the opinion forum in the homepage

  11. Information Management system of the safety regulatory requirements and guidance for the Korea next generation reactors

    Energy Technology Data Exchange (ETDEWEB)

    Yun, Y. C. [LG-EDS Systems, Seoul (Korea, Republic of); Lee, J. H.; Lee, H. C.; Lee, J. S. [Korea Institute of Nuclear Safety, Taejon (Korea, Republic of)

    2000-05-01

    In order to achieve the safety of the Korea Next Generation Reactors (KNGR), the Korea Institute of Nuclear Safety has carried out the Safety and Regulatory Requirements and Guidance (SRRG) development program from 1992 such as establishment of the SRRG hierarchy, development of technical requirements and guidance, and consideration of new licensing system. The SRRG hierarchy for the KNGR was consisted of five tiers; Safety Objectives, Safety Principles, General Safety Criteria, Specific Safety Requirements and Safety Regulatory Guides. The developed SRRG have been compared the criteria in 10CFR and Reg. Guide in the U.S.A and the IAEA documents for assuring internationally acceptable level of the SRRG. To improve the efficiency and accuracy of SRRG development, the construction of database system was required in the course of development. Therefore, the Information Management System of SRRG for the KNGR has been developed which enables developers to quickly and accurately seek and systematically manage whole contexts of the SRRG, reference requirements, and current atomic energy regulation rules. Moreover, through homepage whose URL is 'http://kngr.kins.re.kr', the concerned persons and public can acquire the information related with SRRG and KNGR project, and post his/her thought to the opinion forum in the homepage.

  12. Time series modeling in traffic safety research.

    Science.gov (United States)

    Lavrenz, Steven M; Vlahogianni, Eleni I; Gkritza, Konstantina; Ke, Yue

    2018-08-01

    The use of statistical models for analyzing traffic safety (crash) data has been well-established. However, time series techniques have traditionally been underrepresented in the corresponding literature, due to challenges in data collection, along with a limited knowledge of proper methodology. In recent years, new types of high-resolution traffic safety data, especially in measuring driver behavior, have made time series modeling techniques an increasingly salient topic of study. Yet there remains a dearth of information to guide analysts in their use. This paper provides an overview of the state of the art in using time series models in traffic safety research, and discusses some of the fundamental techniques and considerations in classic time series modeling. It also presents ongoing and future opportunities for expanding the use of time series models, and explores newer modeling techniques, including computational intelligence models, which hold promise in effectively handling ever-larger data sets. The information contained herein is meant to guide safety researchers in understanding this broad area of transportation data analysis, and provide a framework for understanding safety trends that can influence policy-making. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Informational-computer system for the neutron spectra analysis

    International Nuclear Information System (INIS)

    Berzonis, M.A.; Bondars, H.Ya.; Lapenas, A.A.

    1979-01-01

    In this article basic principles of the build-up of the informational-computer system for the neutron spectra analysis on a basis of measured reaction rates are given. The basic data files of the system, needed software and hardware for the system operation are described

  14. Modular multiple sensors information management for computer-integrated surgery.

    Science.gov (United States)

    Vaccarella, Alberto; Enquobahrie, Andinet; Ferrigno, Giancarlo; Momi, Elena De

    2012-09-01

    In the past 20 years, technological advancements have modified the concept of modern operating rooms (ORs) with the introduction of computer-integrated surgery (CIS) systems, which promise to enhance the outcomes, safety and standardization of surgical procedures. With CIS, different types of sensor (mainly position-sensing devices, force sensors and intra-operative imaging devices) are widely used. Recently, the need for a combined use of different sensors raised issues related to synchronization and spatial consistency of data from different sources of information. In this study, we propose a centralized, multi-sensor management software architecture for a distributed CIS system, which addresses sensor information consistency in both space and time. The software was developed as a data server module in a client-server architecture, using two open-source software libraries: Image-Guided Surgery Toolkit (IGSTK) and OpenCV. The ROBOCAST project (FP7 ICT 215190), which aims at integrating robotic and navigation devices and technologies in order to improve the outcome of the surgical intervention, was used as the benchmark. An experimental protocol was designed in order to prove the feasibility of a centralized module for data acquisition and to test the application latency when dealing with optical and electromagnetic tracking systems and ultrasound (US) imaging devices. Our results show that a centralized approach is suitable for minimizing synchronization errors; latency in the client-server communication was estimated to be 2 ms (median value) for tracking systems and 40 ms (median value) for US images. The proposed centralized approach proved to be adequate for neurosurgery requirements. Latency introduced by the proposed architecture does not affect tracking system performance in terms of frame rate and limits US images frame rate at 25 fps, which is acceptable for providing visual feedback to the surgeon in the OR. Copyright © 2012 John Wiley & Sons, Ltd.

  15. SACS2: Dynamic and Formal Safety Analysis Method for Complex Safety Critical System

    International Nuclear Information System (INIS)

    Koh, Kwang Yong; Seong, Poong Hyun

    2009-01-01

    Fault tree analysis (FTA) is one of the most widely used safety analysis technique in the development of safety critical systems. However, over the years, several drawbacks of the conventional FTA have become apparent. One major drawback is that conventional FTA uses only static gates and hence can not capture dynamic behaviors of the complex system precisely. Although several attempts such as dynamic fault tree (DFT), PANDORA, formal fault tree (FFT) and so on, have been made to overcome this problem, they can not still do absolute or actual time modeling because they adapt relative time concept and can capture only sequential behaviors of the system. Second drawback of conventional FTA is its lack of rigorous semantics. Because it is informal in nature, safety analysis results heavily depend on an analyst's ability and are error-prone. Finally reasoning process which is to check whether basic events really cause top events is done manually and hence very labor-intensive and timeconsuming for the complex systems. In this paper, we propose a new safety analysis method for complex safety critical system in qualitative manner. We introduce several temporal gates based on timed computational tree logic (TCTL) which can represent quantitative notion of time. Then, we translate the information of the fault trees into UPPAAL query language and the reasoning process is automatically done by UPPAAL which is the model checker for time critical system

  16. Outline of the requirements of application of computer based instrumentation and control systems in the systems important to safety on Bohunice NPPs

    International Nuclear Information System (INIS)

    Bacurik, J.

    1997-01-01

    The most important regulatory requirements and issues are described related to the review, evaluation and assessment of computer-based safety-related IandC systems, with emphasis on safety instrumentation and control. These aspects include safety classification and categorization of IandC, ranking of applicable codes and standards, design evaluation on the system level, and software assessment. (author)

  17. Department of Energy Mathematical, Information, and Computational Sciences Division: High Performance Computing and Communications Program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-11-01

    This document is intended to serve two purposes. Its first purpose is that of a program status report of the considerable progress that the Department of Energy (DOE) has made since 1993, the time of the last such report (DOE/ER-0536, The DOE Program in HPCC), toward achieving the goals of the High Performance Computing and Communications (HPCC) Program. The second purpose is that of a summary report of the many research programs administered by the Mathematical, Information, and Computational Sciences (MICS) Division of the Office of Energy Research under the auspices of the HPCC Program and to provide, wherever relevant, easy access to pertinent information about MICS-Division activities via universal resource locators (URLs) on the World Wide Web (WWW).

  18. Cloud Computing in the Curricula of Schools of Computer Science and Information Systems

    Science.gov (United States)

    Lawler, James P.

    2011-01-01

    The cloud continues to be a developing area of information systems. Evangelistic literature in the practitioner field indicates benefit for business firms but disruption for technology departments of the firms. Though the cloud currently is immature in methodology, this study defines a model program by which computer science and information…

  19. The Impact of Cloud Computing on Information Systems Agility

    Directory of Open Access Journals (Sweden)

    Mohamed Sawas

    2015-09-01

    Full Text Available As businesses are encountering frequent harsh economic conditions, concepts such as outsourcing, agile and lean management, change management and cost reduction are constantly gaining more attention. This is because these concepts are all aimed at saving on budgets and facing unexpected changes. Latest technologies like cloud computing promise to turn IT, that has always been viewed as a cost centre, into a source of saving money and driving flexibility and agility to the business. The purpose of this paper is to first compile a set of attributes that govern the agility benefits added to information systems by cloud computing and then develop a survey-based instrument to measure these agility benefits. Our research analysis employs non-probability sampling based on a combination of convenience and judgment. This approach was used to obtain a representative sample of participants from potential companies belonging to various industries such as oil & gas, banking, private, government and semi-governmental organizations. This research will enable decision makers to measure agility enhancements and hence compare the agility of Information Systems before and after deploying cloud computing.

  20. Abstracts of computer programs and data libraries pertaining to photon production data

    Energy Technology Data Exchange (ETDEWEB)

    White, J.E.; Manneschmidt, J.B.; Finch, S.Y.; Dickens, J.K.

    1998-06-01

    Abstracts, or descriptions, of computer programs and data libraries pertaining to Photon Production Data (Measurements, Evaluations and Calculations) maintained in the collections of the Radiation Safety Information Computational Center, Oak Ridge, Tennessee USA and at the OECD/NEA Data Bank, Paris, are collected in this document.

  1. Abstracts of computer programs and data libraries pertaining to photon production data

    International Nuclear Information System (INIS)

    White, J.E.; Manneschmidt, J.B.; Finch, S.Y.; Dickens, J.K.

    1998-01-01

    Abstracts, or descriptions, of computer programs and data libraries pertaining to Photon Production Data (Measurements, Evaluations and Calculations) maintained in the collections of the Radiation Safety Information Computational Center, Oak Ridge, Tennessee USA and at the OECD/NEA Data Bank, Paris, are collected in this document

  2. Features of the Synthesis of Performance Security Information in Computer Systems

    Directory of Open Access Journals (Sweden)

    V. K. Dzhogan

    2011-12-01

    Full Text Available Synthesis of a scorecard is a gradual process of composition, since the set of elements that reflect the original, systematized their condition, and, through a series of intermediates, linking them in a single bound to the structure ends with one element that reflects the purpose of the system. The hierarchical structure of the system performance of information security in computer systems is a structure with regard to “one to many”. The article reflects the extent of information security tools capabilities influence at the security of information resources of computer systems (from indirect — Class 1, to direct — Class 4.

  3. Health Information System in a Cloud Computing Context.

    Science.gov (United States)

    Sadoughi, Farahnaz; Erfannia, Leila

    2017-01-01

    Healthcare as a worldwide industry is experiencing a period of growth based on health information technology. The capabilities of cloud systems make it as an option to develop eHealth goals. The main objectives of the present study was to evaluate the advantages and limitations of health information systems implementation in a cloud-computing context that was conducted as a systematic review in 2016. Science direct, Scopus, Web of science, IEEE, PubMed and Google scholar were searched according study criteria. Among 308 articles initially found, 21 articles were entered in the final analysis. All the studies had considered cloud computing as a positive tool to help advance health technology, but none had insisted too much on its limitations and threats. Electronic health record systems have been mostly studied in the fields of implementation, designing, and presentation of models and prototypes. According to this research, the main advantages of cloud-based health information systems could be categorized into the following groups: economic benefits and advantages of information management. The main limitations of the implementation of cloud-based health information systems could be categorized into the 4 groups of security, legal, technical, and human restrictions. Compared to earlier studies, the present research had the advantage of dealing with the issue of health information systems in a cloud platform. The high frequency of studies conducted on the implementation of cloud-based health information systems revealed health industry interest in the application of this technology. Security was a subject discussed in most studies due to health information sensitivity. In this investigation, some mechanisms and solutions were discussed concerning the mentioned systems, which would provide a suitable area for future scientific research on this issue. The limitations and solutions discussed in this systematic study would help healthcare managers and decision

  4. Quality and safety issues of web-based information about herbal medicines in the treatment of cancer.

    Science.gov (United States)

    Molassiotis, Alexander; Xu, Min

    2004-12-01

    A number of studies have been carried out to assess health information on the internet and they all have demonstrated that, whereas the internet can be the third opinion for many patients, often contains inaccurate and misleading information. Furthermore, as herbal medicines are increasingly used by patients, it is imperative to assess the quality of information presented on the internet. Hence, the aim of this study was to assess the quality and safety of the information presented on the internet about medicinal herbs specifically in the field of cancer. Two hundred relevant websites were initially selected from a process using 10 search engines and the keywords 'herbs' and 'cancer', and 43 sites actually met all inclusion criteria. Assessment of both quality and safety indicators was carried out using the DISCERN instrument, which has been developed to enable consumers and information providers to judge the quality of health information. Readability scores of the sites were also obtained (Flesch formula). It was shown that most sites had low quality in a number of indicators, including accuracy of information, revealing sources of information, biased presentation of information or regularity of updates. The mean score for quality was 22.12 (S.D.=4.18) out of a maximum score of 50. The mean safety score was 13.26 (S.D.=2.14) out of a maximum score of 30. Commercial sites had the most inaccurate or misleading information, emphasizing only the positive aspects of the use of herbs, with little or no evidence. The only biomedical sites assessed achieved the highest score in both quality and safety. Readability of the information was equal to the school level of college (mean=44.63). Seven percent of the sites discouraged the use of conventional medicine. Results suggest that health professionals should talk about use of alternative therapies with their patients and help them find the best available information when using the internet.

  5. RISMC Advanced Safety Analysis Project Plan – FY 2015 - FY 2019

    Energy Technology Data Exchange (ETDEWEB)

    Szilard, Ronaldo H. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Smith, Curtis L. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Youngblood, Robert [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2014-09-01

    In this report, a project plan is developed, focused on industry applications, using Risk-Informed Safety Margin Characterization (RISMC) tools and methods applied to realistic, relevant, and current interest issues to the operating nuclear fleet. RISMC focuses on modernization of nuclear power safety analysis (tools, methods and data); implementing state-of-the-art modeling techniques (which include, for example, enabling incorporation of more detailed physics as they become available); taking advantage of modern computing hardware; and combining probabilistic and mechanistic analyses to enable a risk informed safety analysis process. The modernized tools will maintain the current high level of safety in our nuclear power plant fleet, while providing an improved understanding of safety margins and the critical parameters that affect them. Thus, the set of tools will provide information to inform decisions on plant modifications, refurbishments, and surveillance programs, while improving economics. This set of tools will also benefit the design of new reactors, enhancing safety per unit cost of a nuclear plant. The proposed plan will focus on application of the RISMC toolkit, in particular, solving realistic problems of important current issues to the nuclear industry, in collaboration with plant owners and operators to demonstrate the usefulness of these tools in decision making.

  6. User-oriented information access by information need recontextualisation and articulation. Application in nuclear criticality safety

    International Nuclear Information System (INIS)

    Medini, Lionel

    2001-01-01

    This research thesis addresses the design methodology of a system of access to information which is based on an access to relevant information with respect to user needs. In a first part, the author addresses the various issues related to access to information and to information understanding. The next part addresses the involved methods and tools and presents the operational approach adopted for this research regarding access to information. Different disciplines are addressed (knowledge management, ergonomics and information science) and different technologies are used (W3 and XML, DVP, ActiveX, pdf format and the Adobe suite). In the core chapter, the author reports the design of a LMCE (a multi-user book of electronic knowledge) which allows both hypermedia navigation in knowledge diagrams and a construction of a document query. This design is based on a knowledge-management modelling to define diagrams, on ergonomics modelling for user profile identification, and on information science for a specific indexing of the information system. The prototype can be visualized with a web browser such as Internet Explorer 5. The author reports a first assessment and discusses the contribution of his approach to the problematic of access to information which is to be applied to nuclear criticality safety [fr

  7. Towards a strategy for the introduction of information and computer literacy (ICL) courses

    NARCIS (Netherlands)

    Plomp, T.; Carleer, G.J.

    1987-01-01

    An important goal of the national policy on computers in education in the Netherlands is the familiarization of all citizens with information technology. This policy was a plea for some basic education in information and computer literacy. In the beginning of the implementation of this basic

  8. Academic Training Lecture Regular Programme: Computer Security - Introduction to information and computer security (1/4)

    CERN Multimedia

    2012-01-01

    Computer Security: Introduction to information and computer security (1/4), by Sebastian Lopienski (CERN).   Monday, 21 May, 2012 from 11:00 to 12:00 (Europe/Zurich) at CERN ( 31-3-004 - IT Auditorium ) Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Ai...

  9. 77 FR 50724 - Developing Software Life Cycle Processes for Digital Computer Software Used in Safety Systems of...

    Science.gov (United States)

    2012-08-22

    ... review of applications for permits and licenses. The DG entitled ``Developing Software Life Cycle... NUCLEAR REGULATORY COMMISSION [NRC-2012-0195] Developing Software Life Cycle Processes for Digital Computer Software Used in Safety Systems of Nuclear Power Plants AGENCY: Nuclear Regulatory Commission...

  10. RISK-INFORMED BALANCING OF SAFETY, NONPROLIFERATION, AND ECONOMICS FOR THE SFR

    Energy Technology Data Exchange (ETDEWEB)

    Apostolakis, George; Driscoll, Michael; Golay, Michael; Kadak, Andrew; Todreas, Neil; Aldmir, Tunc; Denning, Richard; Lineberry, Michael

    2011-10-20

    A substantial barrier to the implementation of Sodium-cooled Fast Reactor (SFR) technology in the short term is the perception that they would not be economically competitive with advanced light water reactors. With increased acceptance of risk-informed regulation, the opportunity exists to reduce the costs of a nuclear power plant at the design stage without applying excessive conservatism that is not needed in treating low risk events. In the report, NUREG-1860, the U.S. Nuclear Regulatory Commission describes developmental activities associated with a risk-informed, scenario-based technology neutral framework (TNF) for regulation. It provides quantitative yardsticks against which the adequacy of safety risks can be judged. We extend these concepts to treatment of proliferation risks. The objective of our project is to develop a risk-informed design process for minimizing the cost of electricity generation within constraints of adequate safety and proliferation risks. This report describes the design and use of this design optimization process within the context of reducing the capital cost and levelized cost of electricity production for a small (possibly modular) SFR. Our project provides not only an evaluation of the feasibility of a risk-informed design process but also a practical test of the applicability of the TNF to an actual advanced, non-LWR design. The report provides results of five safety related and one proliferation related case studies of innovative design alternatives. Applied to previously proposed SFR nuclear energy system concepts We find that the TNF provides a feasible initial basis for licensing new reactors. However, it is incomplete. We recommend improvements in terms of requiring acceptance standards for total safety risks, and we propose a framework for regulation of proliferation risks. We also demonstrate methods for evaluation of proliferation risks. We also suggest revisions to scenario-specific safety risk acceptance standards

  11. Risk-Informed Balancing Of Safety, Nonproliferation, And Economics For The SFR

    International Nuclear Information System (INIS)

    Apostolakis, George; Driscoll, Michael; Golay, Michael; Kadak, Andrew; Todreas, Neil; Aldmir, Tunc; Denning, Richard; Lineberry, Michael

    2011-01-01

    A substantial barrier to the implementation of Sodium-cooled Fast Reactor (SFR) technology in the short term is the perception that they would not be economically competitive with advanced light water reactors. With increased acceptance of risk-informed regulation, the opportunity exists to reduce the costs of a nuclear power plant at the design stage without applying excessive conservatism that is not needed in treating low risk events. In the report, NUREG-1860, the U.S. Nuclear Regulatory Commission describes developmental activities associated with a risk-informed, scenario-based technology neutral framework (TNF) for regulation. It provides quantitative yardsticks against which the adequacy of safety risks can be judged. We extend these concepts to treatment of proliferation risks. The objective of our project is to develop a risk-informed design process for minimizing the cost of electricity generation within constraints of adequate safety and proliferation risks. This report describes the design and use of this design optimization process within the context of reducing the capital cost and levelized cost of electricity production for a small (possibly modular) SFR. Our project provides not only an evaluation of the feasibility of a risk-informed design process but also a practical test of the applicability of the TNF to an actual advanced, non-LWR design. The report provides results of five safety related and one proliferation related case studies of innovative design alternatives. Applied to previously proposed SFR nuclear energy system concepts We find that the TNF provides a feasible initial basis for licensing new reactors. However, it is incomplete. We recommend improvements in terms of requiring acceptance standards for total safety risks, and we propose a framework for regulation of proliferation risks. We also demonstrate methods for evaluation of proliferation risks. We also suggest revisions to scenario-specific safety risk acceptance standards

  12. Development of Necessary Technology for Safety Grade I and C System

    International Nuclear Information System (INIS)

    Lee, Dong Young; Jang, Tong Il; Kim, Jung Tack

    2010-08-01

    Through KNICS and Nu-Tech 2012, a MMIS(Man-Machine Interface System) package for nuclear plants was localized and is expected to be applied to SUN 1,2 plants. This study is aimed to support the application of the MMIS package including the following technologies that meet strengthened regulation requirements and enhanced utility's performance requirements to nuclear plants. - Dedication to safety-grade computers - The broadband communication network for safety information - Application of the automatic test for safety systems - Application of programmable logic controllers to nuclear plant

  13. Reactor operation safety information document

    Energy Technology Data Exchange (ETDEWEB)

    1990-01-01

    The report contains a reactor facility description which includes K, P, and L reactor sites, structures, operating systems, engineered safety systems, support systems, and process and effluent monitoring systems; an accident analysis section which includes cooling system anomalies, radioactive materials releases, and anticipated transients without scram; a summary of onsite doses from design basis accidents; severe accident analysis (reactor core disruption); a description of operating contractor organization and emergency planning; and a summary of reactor safety evolution. (MB)

  14. A simplified computational memory model from information processing.

    Science.gov (United States)

    Zhang, Lanhua; Zhang, Dongsheng; Deng, Yuqin; Ding, Xiaoqian; Wang, Yan; Tang, Yiyuan; Sun, Baoliang

    2016-11-23

    This paper is intended to propose a computational model for memory from the view of information processing. The model, called simplified memory information retrieval network (SMIRN), is a bi-modular hierarchical functional memory network by abstracting memory function and simulating memory information processing. At first meta-memory is defined to express the neuron or brain cortices based on the biology and graph theories, and we develop an intra-modular network with the modeling algorithm by mapping the node and edge, and then the bi-modular network is delineated with intra-modular and inter-modular. At last a polynomial retrieval algorithm is introduced. In this paper we simulate the memory phenomena and functions of memorization and strengthening by information processing algorithms. The theoretical analysis and the simulation results show that the model is in accordance with the memory phenomena from information processing view.

  15. Information need about the safety of the final disposal of nuclear waste. Information receiver`s views in Eurajoki, Kuhmo and Aeaenekoski municipalities; Tiedontarve ydinjaetteen loppusijoituksen turvallisuudesta. Vastaanottajan naekoekulmia Eurajoella, Kuhmossa ja Aeaenekoskella

    Energy Technology Data Exchange (ETDEWEB)

    Hautakangas, H

    1997-03-01

    The study analyses the public`s information need about the safety issues related to the final disposal of spent nuclear fuel generated by the Finnish nuclear power stations. Locals in three municipalities that are studied as possible sites for final disposal were interviewed for the study. Earlier studies made in Finland had indicated that the public`s knowledge about safety issues related to the final disposal was almost opposite to the findings of the natural sciences. Also, the public had expressed a wish to receive more information from the safety authority, the Finnish Centre for Radiation and Nuclear Safety (STUK). This study therefore had two basic objectives: To find out what kind of safety information the locals need and what the safety authority`s role could be in providing information. The main results show interest and need especially for information concerning the disposal phases taking place on the ground level, such as nuclear waste transportation and encapsulation. Also, the interviews show a clear need and desire for an impartial actor such as STUK in the information and communication process. (author) (107 refs.).

  16. Figures and information on nuclear safety and radiation protection on the Tricastin AREVA site

    International Nuclear Information System (INIS)

    2010-01-01

    This report presents and briefly comments figures concerning the environment (water consumption, greenhouse gas emissions, liquid releases in a canal, radioactive and hazardous industrial wastes), radiological impact and radiation protection (computed dose for a reference group, computed maximum dose for the reference group, radiological exposures of workers), nuclear safety (number of events, controls and audits), production (quantities of various materials) and transport (flows of radioactive products) for the whole Tricastin site for which only some general data are indicated, and more precisely the various installations and establishments it comprises: AREVA NC Pierrelatte, COMURHEX Pierrelatte, EURODIF Production, FBFC Pierrelatte, SET, SOCATRI

  17. Transport safety research abstracts. No. 2. Information on research recently concluded and in progress

    International Nuclear Information System (INIS)

    1994-09-01

    Transport Safety Research Abstracts (TSRA) was first published by the IAEA in 1991 as a means of disseminating information on research in radioactive material transport. This second edition utilizes International Nuclear Information System (INIS) protocol for data processing and report preparation for a research-in-progress database established by the IAEA's Division of Scientific and Technical Information. INIS subject categories and descriptors are included in the information about each project

  18. Transport safety research abstracts. No. 2. Information on research recently concluded and in progress

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1994-09-01

    Transport Safety Research Abstracts (TSRA) was first published by the IAEA in 1991 as a means of disseminating information on research in radioactive material transport. This second edition utilizes International Nuclear Information System (INIS) protocol for data processing and report preparation for a research-in-progress database established by the IAEA`s Division of Scientific and Technical Information. INIS subject categories and descriptors are included in the information about each project.

  19. Green Computing in Local Governments and Information Technology Companies

    Directory of Open Access Journals (Sweden)

    Badar Agung Nugroho

    2013-06-01

    Full Text Available Green computing is a study and practice of designing, manufacturing, using, and disposing of information and communication devices efficiently and effectively with minimum impact on the environment. If the green computing concept was implemented, it will help the agencies or companies to reduce energy and capital cost from their IT infrastructure. The goal from this research is to explore the current condition about the efforts from local governments and IT companies at West Java to implement the green computing concept at their working environment. The primary data were collected by using focus group discussion by inviting the local governments and IT companies representatives who responsible to manage their IT infrastructure. And then, the secondary data were collected by doing brief observation in order to see the real effort of green computing implementation at each institution. The result shows that there are many different perspectives and efforts of green computing implementation between local governments and IT companies.

  20. Application of the defense-in-depth concept to qualify computer-based instrumentation and control systems important to safety

    International Nuclear Information System (INIS)

    Seidel, F.

    1998-01-01

    In parallel to the technological development, the authorities and expert organisations are preparing the application of computer-based I and C to NPPs from the regulatory point of view. Generally the associated world-wide procedure follows steps like identification of safety issues, completion of the regulatory framework particularly regarding the licensing requirements and furthermore, recommendation of an appropriate set of qualification methods to prove that the requirements are met. The paper's intention is to show from the regulatory point of view that the choice as well as the combination of the qualification methods depend on system design features and development strategy. Similar as for the safety system design required, a defense-in-depth qualification concept is suggested to be helpful in order to prove that the computer-based system meets the licensing requirements. (author)

  1. Application of the defense-in-depth concept to qualify computer-based instrumentation and control systems important to safety

    Energy Technology Data Exchange (ETDEWEB)

    Seidel, F [Federal Office for Radiation Protection, Salzgitter (Germany)

    1998-10-01

    In parallel to the technological development, the authorities and expert organisations are preparing the application of computer-based I and C to NPPs from the regulatory point of view. Generally the associated world-wide procedure follows steps like identification of safety issues, completion of the regulatory framework particularly regarding the licensing requirements and furthermore, recommendation of an appropriate set of qualification methods to prove that the requirements are met. The paper`s intention is to show from the regulatory point of view that the choice as well as the combination of the qualification methods depend on system design features and development strategy. Similar as for the safety system design required, a defense-in-depth qualification concept is suggested to be helpful in order to prove that the computer-based system meets the licensing requirements. (author)

  2. PWR hybrid computer model for assessing the safety implications of control systems

    International Nuclear Information System (INIS)

    Smith, O.L.; Booth, R.S.; Clapp, N.E.; DiFilippo, F.C.; Renier, J.P.; Sozer, A.

    1985-01-01

    The ORNL study of safety-related aspects of control systems consists of two interrelated tasks, (1) a failure mode and effects analysis that, in part, identifies single and multiple component failures that may lead to significant plant upsets, and (2) a hybrid computer model that uses these failures as initial conditions and traces the dynamic impact on the control system and remainder of the plant. The second task is reported here. The initial step in model development was to define a suitable interface between the FMEA and computer simulation tasks. This involved identifying primary plant components that must be simulated in dynamic detail and secondary components that can be treated adequately by the FMEA alone. The FMEA in general explores broader spectra of initiating events that may collapse into a reduced number of computer runs. A portion of the FMEA includes consideration of power supply failures. Consequences of the transients may feedback on the initiating causes, and there may be an interactive relationship between the FMEA and the computer simulation. Since the thrust of this program is to investigate control system behavior, the controls are modeled in detail to accurately reproduce characteristic response under normal and off-normal transients. The balance of the model, including neutronics, thermohydraulics and component submodels, is developed in sufficient detail to provide a suitable support for the control system

  3. System of Information in Conceptual Maps for students of Computer Engineering.

    Directory of Open Access Journals (Sweden)

    Lydia Rosa Ríos Rodríguez

    2014-06-01

    Full Text Available The university students, in their daily activities make some decisions which contribute in their professional formation; in many occasions they don't have the enough help to make it in the best way. The systems of information constitute an important alternative to take into consideration in these cases. This work refers to the experience of the department of Computer Engineering of the University of Sancti Spíritus José Martí Pérez (UNISS in the conception and creation of a system of information for the students of the career Computer Engineering on the discipline Artificial Intelligence which uses the conceptual maps as form of representing the information.

  4. Dissemination of Information in Developing Countries: The Personal Computer and beyond

    Science.gov (United States)

    Wong, Wai-Man

    2005-01-01

    With the blooming of information in digital format, dissemination of information is becoming a big challenge for developing countries. It is not only due to the limited provision of personal computers--in addition, the technological infrastructure and the ability to access information are also becoming major concerns in developing countries. This…

  5. Medical-Information-Management System

    Science.gov (United States)

    Alterescu, Sidney; Friedman, Carl A.; Frankowski, James W.

    1989-01-01

    Medical Information Management System (MIMS) computer program interactive, general-purpose software system for storage and retrieval of information. Offers immediate assistance where manipulation of large data bases required. User quickly and efficiently extracts, displays, and analyzes data. Used in management of medical data and handling all aspects of data related to care of patients. Other applications include management of data on occupational safety in public and private sectors, handling judicial information, systemizing purchasing and procurement systems, and analyses of cost structures of organizations. Written in Microsoft FORTRAN 77.

  6. Online Food Safety Information System for Nuclear or Radiological Emergencies

    International Nuclear Information System (INIS)

    Albinet, Franck; Adjigogov, Lazar; Dercon, Gerd

    2016-01-01

    Over the last year, the protocol with regards to data management and visualization requirements for food safety decision-making, developed under CRP D1.50.15 on R esponse to Nuclear Emergency Affecting Food and Agriculture , was further implemented. The development team moved away from early series of disconnected prototypes to a more advanced Information System integrating both data management and visualization components outlined in the agreed protocol

  7. Games that "work": using computer games to teach alcohol-affected children about fire and street safety.

    Science.gov (United States)

    Coles, Claire D; Strickland, Dorothy C; Padgett, Lynne; Bellmoff, Lynnae

    2007-01-01

    Unintentional injuries are a leading cause of death and disability for children. Those with developmental disabilities, including children affected by prenatal alcohol exposure, are at highest risk for injuries. Although teaching safety skills is recommended to prevent injury, cognitive limitations and behavioral problems characteristic of children with fetal alcohol spectrum disorder make teaching these skills challenging for parents and teachers. In the current study, 32 children, ages 4-10, diagnosed with fetal alcohol syndrome (FAS) and partial FAS, learned fire and street safety through computer games that employed "virtual worlds" to teach recommended safety skills. Children were pretested on verbal knowledge of four safety elements for both fire and street safety conditions and then randomly assigned to one condition. After playing the game until mastery, children were retested verbally and asked to "generalize" their newly acquired skills in a behavioral context. They were retested after 1 week follow-up. Children showed significantly better knowledge of the game to which they were exposed, immediately and at follow-up, and the majority (72%) was able to generalize all four steps within a behavioral setting. Results suggested that this is a highly effective method for teaching safety skills to high-risk children who have learning difficulties.

  8. Stakeholder Safety in Information Systems Research

    Directory of Open Access Journals (Sweden)

    R.H. Barbour

    2006-11-01

    Full Text Available Information Communication Technology (ICT researchers adapt and use tools from reference and cognate disciplines. This application of existing tools outside the context of their development has implications beyond the immediate problem context. ICT researchers have access to a wide variety of data sources including newer ones, such as the Internet, that may bring unexpected outcomes. ICT research can impact on researchers, their institutions and the researched in unexpected ways. People so affected are the stakeholders in ICT research activities. Reputations, welfare and property may be put at risk by unplanned events described in this paper. Legal aspects of ICT research are broadly identified and linked to the tort of negligence. The Social Research Association’s Code for researcher safety is described and its application extended to include the Internet as a potential data source. A common set of underlying ethical principles is identified suggesting that the ICT researcher can refine particular research protocols for specific social contexts.

  9. 75 FR 42818 - Agency Information Collection; Activity Under OMB Review; Collection of Safety Culture Data for...

    Science.gov (United States)

    2010-07-22

    ... Collection; Activity Under OMB Review; Collection of Safety Culture Data for Program Evaluation AGENCY... . SUPPLEMENTARY INFORMATION: Title: Collection of Safety Culture Data for Program Evaluation. Type of Request... data on the nation's transportation system is an important component of BTS' responsibility to the...

  10. Third International Conference on Computational Science, Engineering and Information Technology (CCSEIT-2013), v.1

    CERN Document Server

    Kumar, Ashok; Annamalai, Annamalai

    2013-01-01

      This book is the proceedings of Third International Conference on Computational Science, Engineering and Information Technology (CCSEIT-2013) that was held in Konya, Turkey, on June 7-9. CCSEIT-2013 provided an excellent international forum for sharing knowledge and results in theory, methodology and applications of computational science, engineering and information technology. This book contains research results, projects, survey work and industrial experiences representing significant advances in the field. The different contributions collected in this book cover five main areas: algorithms, data structures and applications;  wireless and mobile networks; computer networks and communications; natural language processing and information theory; cryptography and information security.  

  11. Mobiele computers in personenauto’s en mogelijke effecten op de verkeersveiligheid : een inventarisatie.

    NARCIS (Netherlands)

    Braimaister, L.G.

    2002-01-01

    This literature study makes an inventory of developments in the field of mobile computers in cars: mobile multi-media information and communication systems. The report also contains an exploration of possible road safety effects of such systems. The developments in the field of computer functions in

  12. Nuclear safety research collaborations between the U.S. and Russian Federation International Nuclear Safety Centers

    International Nuclear Information System (INIS)

    Hill, D. J.; Braun, J. C.; Klickman, A. E.; Bougaenko, S. E.; Kabonov, L. P.; Kraev, A. G.

    2000-01-01

    The Russian Federation Ministry for Atomic Energy (MINATOM) and the US Department of Energy (USDOE) have formed International Nuclear Safety Centers to collaborate on nuclear safety research. USDOE established the US Center (ISINSC) at Argonne National Laboratory (ANL) in October 1995. MINATOM established the Russian Center (RINSC) at the Research and Development Institute of Power Engineering (RDIPE) in Moscow in July 1996. In April 1998 the Russian center became a semi-independent, autonomous organization under MINATOM. The goals of the center are to: Cooperate in the development of technologies associated with nuclear safety in nuclear power engineering; Be international centers for the collection of information important for safety and technical improvements in nuclear power engineering; and Maintain a base for fundamental knowledge needed to design nuclear reactors. The strategic approach is being used to accomplish these goals is for the two centers to work together to use the resources and the talents of the scientists associated with the US Center and the Russian Center to do collaborative research to improve the safety of Russian-designed nuclear reactors. The two centers started conducting joint research and development projects in January 1997. Since that time the following ten joint projects have been initiated: INSC databases--web server and computing center; Coupled codes--Neutronic and thermal-hydraulic; Severe accident management for Soviet-designed reactors; Transient management and advanced control; Survey of relevant nuclear safety research facilities in the Russian Federation; Computer code validation for transient analysis of VVER and RBMK reactors; Advanced structural analysis; Development of a nuclear safety research and development plan for MINATOM; Properties and applications of heavy liquid metal coolants; and Material properties measurement and assessment. Currently, there is activity in eight of these projects. Details on each of these

  13. A simplified computational memory model from information processing

    Science.gov (United States)

    Zhang, Lanhua; Zhang, Dongsheng; Deng, Yuqin; Ding, Xiaoqian; Wang, Yan; Tang, Yiyuan; Sun, Baoliang

    2016-01-01

    This paper is intended to propose a computational model for memory from the view of information processing. The model, called simplified memory information retrieval network (SMIRN), is a bi-modular hierarchical functional memory network by abstracting memory function and simulating memory information processing. At first meta-memory is defined to express the neuron or brain cortices based on the biology and graph theories, and we develop an intra-modular network with the modeling algorithm by mapping the node and edge, and then the bi-modular network is delineated with intra-modular and inter-modular. At last a polynomial retrieval algorithm is introduced. In this paper we simulate the memory phenomena and functions of memorization and strengthening by information processing algorithms. The theoretical analysis and the simulation results show that the model is in accordance with the memory phenomena from information processing view. PMID:27876847

  14. First International Symposium on Applied Computing and Information Technology (ACIT 2013)

    CERN Document Server

    Applied Computing and Information Technology

    2014-01-01

    This book presents the selected results of the 1st International Symposium on Applied Computers and Information Technology (ACIT 2013) held on August 31 – September 4, 2013 in Matsue City, Japan, which brought together researchers, scientists, engineers, industry practitioners, and students to discuss all aspects of  Applied Computers & Information Technology, and its practical challenges. This book includes the best 12 papers presented at the conference, which were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review.  

  15. Optimal nonlinear information processing capacity in delay-based reservoir computers

    Science.gov (United States)

    Grigoryeva, Lyudmila; Henriques, Julie; Larger, Laurent; Ortega, Juan-Pablo

    2015-09-01

    Reservoir computing is a recently introduced brain-inspired machine learning paradigm capable of excellent performances in the processing of empirical data. We focus in a particular kind of time-delay based reservoir computers that have been physically implemented using optical and electronic systems and have shown unprecedented data processing rates. Reservoir computing is well-known for the ease of the associated training scheme but also for the problematic sensitivity of its performance to architecture parameters. This article addresses the reservoir design problem, which remains the biggest challenge in the applicability of this information processing scheme. More specifically, we use the information available regarding the optimal reservoir working regimes to construct a functional link between the reservoir parameters and its performance. This function is used to explore various properties of the device and to choose the optimal reservoir architecture, thus replacing the tedious and time consuming parameter scannings used so far in the literature.

  16. COMPUTER ORIENTED FACILITIES OF TEACHING AND INFORMATIVE COMPETENCE

    Directory of Open Access Journals (Sweden)

    Olga M. Naumenko

    2010-09-01

    Full Text Available In the article it is considered the history of views to the tasks of education, estimations of its effectiveness from the point of view of forming of basic vitally important competences. Opinions to the problem in different countries, international organizations, corresponding experience of the Ukrainian system of education are described. The necessity of forming of informative competence of future teacher is reasonable in the conditions of application of the computer oriented facilities of teaching at the study of naturally scientific cycle subjects in pedagogical colleges. Prognosis estimations concerning the development of methods of application of computer oriented facilities of teaching are presented.

  17. International Conference on Computer Science and Information Technology

    CERN Document Server

    Li, Xiaolong

    2014-01-01

    The main objective of CSAIT 2013 is to provide a forum for researchers, educators, engineers and government officials involved in the general areas of Computational Sciences and Information Technology to disseminate their latest research results and exchange views on the future research directions of these fields. A medium like this provides an opportunity to the academicians and industrial professionals to exchange and integrate practice of computer science, application of the academic ideas, improve the academic depth. The in-depth discussions on the subject provide an international communication platform for educational technology and scientific research for the world's universities, engineering field experts, professionals and business executives.

  18. Safety analysis of a sub-seabed repository of HLW

    International Nuclear Information System (INIS)

    Karpf, A.D.

    1989-01-01

    This national safety study of a repository in the Atlantic Ocean uses as much input from German research work as possible. It is based on a computer code IMPONADOR which can be run on a personal computer. It also introduces a new way of presenting information about radionuclide confinement to individual compartments to facilitate the understanding of release processes. The work is part of the international cooperation within the Seabed Working Group of the OECD/NEA

  19. International Conference on Soft Computing in Information Communication Technology

    CERN Document Server

    Soft Computing in Information Communication Technology

    2012-01-01

      This is a collection of the accepted papers concerning soft computing in information communication technology. All accepted papers are subjected to strict peer-reviewing by 2 expert referees. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Neural Networks, Swarm Intelligence, Evolutionary Computing, Image Processing Internet Security, Data Security, Data Mining, Network Security and Protection of data and Cyber laws. Our sincere appreciation and thanks go to these authors for their contributions to this conference. I hope you can gain lots of useful information from the book.

  20. Advances in Computer Science and Information Engineering Volume 2

    CERN Document Server

    Lin, Sally

    2012-01-01

    CSIE2012 is an integrated conference concentrating its focus on Computer Science and Information Engineering . In the proceeding, you can learn much more knowledge about Computer Science and Information Engineering of researchers from all around the world. The main role of the proceeding is to be used as an exchange pillar for researchers who are working in the mentioned fields. In order to meet the high quality of Springer, AISC series, the organization committee has made their efforts to do the following things. Firstly, poor quality paper has been refused after reviewing course by anonymous referee experts. Secondly, periodically review meetings have been held around the reviewers about five times for exchanging reviewing suggestions. Finally, the conference organizers had several preliminary sessions before the conference. Through efforts of different people and departments, the conference will be successful and fruitful.